CN112487839B - Anti-copy RFID safety system - Google Patents

Anti-copy RFID safety system Download PDF

Info

Publication number
CN112487839B
CN112487839B CN202011473718.4A CN202011473718A CN112487839B CN 112487839 B CN112487839 B CN 112487839B CN 202011473718 A CN202011473718 A CN 202011473718A CN 112487839 B CN112487839 B CN 112487839B
Authority
CN
China
Prior art keywords
data
rfid
module
key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011473718.4A
Other languages
Chinese (zh)
Other versions
CN112487839A (en
Inventor
吴传勇
范麟
王浩
向兴勇
陈华锋
陈刚
袁素
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Southwest Integrated Circuit Design Co ltd
Original Assignee
Chongqing Southwest Integrated Circuit Design Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Southwest Integrated Circuit Design Co ltd filed Critical Chongqing Southwest Integrated Circuit Design Co ltd
Priority to CN202011473718.4A priority Critical patent/CN112487839B/en
Publication of CN112487839A publication Critical patent/CN112487839A/en
Application granted granted Critical
Publication of CN112487839B publication Critical patent/CN112487839B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Toxicology (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a copy-prevention RFID (radio frequency identification) safety system, which comprises an encrypted RFID label, a label card sender, a safety RFID reader, a key management and card sending system and a data distribution and identity authentication system, wherein the encrypted RFID label is used for storing a plurality of encrypted RFID labels; the method is characterized in that: the key management and issuing system issues an initial key and an ID to the encrypted RFID label through the label issuing device, and uploads the ID and key information of the encrypted RFID label to the data distribution and identity authentication system; the secure RFID reader is used for carrying out secure authentication and encrypted communication with the key management and card issuing system, the data distribution and identity authentication system and the encrypted RFID tag; the safety RFID reader reads the ID of the encrypted RFID tag and reads the random number of the encrypted RFID tag with a password; the invention can be applied to the fields of logistics storage, production and manufacturing, high-value commodity anti-counterfeiting, drug production, patient nursing, environmental perception, check anti-counterfeiting and the like.

Description

Anti-copy RFID safety system
Technical Field
The invention relates to RFID, in particular to an anti-copy RFID security system.
Background
At present, the RFID technology is applied to the fields of logistics storage, production and manufacturing, high-value commodity anti-counterfeiting, medicine production, patient nursing, environmental perception, check anti-counterfeiting and the like. However, some potential safety hazards exist in the RFID, which causes difficulty in applying the RFID to critical tasks, and hinders application and popularization of the RFID system. Generally, common security attacks of RFID systems are: acquiring and attacking electronic tag data; communication intrusion between the electronic tag and the reader-writer; infringes the data inside the reader.
There are two types of current RFID anti-copy methods: physical methods and logical methods. The following methods are mainly used for security by physical methods: kill tags, faraday cages, active interference, and blocking tags. These methods all bring inconvenience to users in use and are difficult to popularize. If the attack happens, the kill label can damage the label, and the label is protected from being cracked, but is damaged along with the attack, so that inconvenience in use is brought to a user. The logic method comprises the following steps: hash lock, anonymous ID scheme, etc. However, these methods also have the problem that the tag is easily cracked, the reader is also easily cracked, and the security problem of the RFID is difficult to solve.
Aiming at the potential safety hazards of the RFID, the invention provides an anti-copy RFID system, so that the safety of the RFID is guaranteed.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an anti-copy RFID safety system.
The technical scheme of the invention is as follows: an anti-copy RFID security system comprises an encrypted RFID label, a label card sender, a secure RFID reader, a key management and card sending system and a data distribution and identity authentication system; the method is characterized in that:
the security RFID reader assembles related information into a security protocol frame, sends the security protocol frame to the key management and issuing system 4, carries out a key distribution request, the key management and issuing system acquires a label ID, generates a label authentication key, carries out password operation, and after the security protocol frame is assembled, the key management and issuing system issues an initial key and an ID into an encrypted RFID label through a label issuing device, and uploads the ID and key information of the encrypted RFID label to a data distribution and identity authentication system; meanwhile, the key management and card issuing system issues the initial key to the secure RFID reader;
the safety RFID reader is used for carrying out safety authentication and encryption communication with the data distribution and identity authentication system and the encryption RFID tag; the safety RFID reader reads the ID of the encrypted RFID tag and reads the random number of the encrypted RFID tag with the password; the secure RFID reader encrypts the read data and transmits the encrypted data to the data distribution and identity authentication system; the safety RFID reader decrypts the data sent by the data distribution and identity authentication system, verifies the data with the encrypted RFID tag, and updates the ID and the secret key of the encrypted RFID tag after the verification is successful; each time the safety RFID reader and the encrypted RFID tag are successfully verified, the secret key and the ID of the encrypted RFID tag are updated to form rolling encryption;
and the data distribution and identity authentication system is used for calculating the data transmitted by the safety RFID reader and returning the data to the safety RFID reader.
The safety RFID reader mainly has the functions of carrying out safety authentication on the encrypted RFID tag, acquiring new parameters such as the ID of the encrypted RFID tag, a rolling authentication key and the like from a background and writing the new parameters into the corresponding encrypted RFID tag. The external data protocol processing in the safety RFID reader is realized by a built-in data processing module, and the functions of data encryption, decryption and the like are realized by a built-in data encryption and decryption module.
According to the preferred scheme of the anti-copy RFID safety system, the safety RFID reader comprises a data processing module, a data encryption and decryption module, an RFID read-write module and a power management module;
the RFID read-write module is used for carrying out data interaction with the encrypted RFID tag and the data processing module; the RFID read-write module reads the ID of the encrypted RFID tag, reads the random number of the encrypted RFID tag with the password and transmits the read data to the data processing module; the data processing module performs format conversion and data processing on the data transmitted by the RFID read-write module and then outputs the data to the data encryption and decryption module; the data encryption and decryption module encrypts the received data, returns the encrypted data to the data processing module for format conversion and processing, and then transmits the data to the data distribution and identity authentication system through the data processing module;
the data processing module receives the data returned by the data distribution and identity authentication system, performs format conversion and processing on the data, and then transmits the data to the data encryption and decryption module, and the data encryption and decryption module performs decryption processing on the received data, performs format conversion and processing on the data through the data processing module, and then transmits the data to the RFID read-write module; and the RFID read-write module checks the encrypted RFID tag after receiving the data returned by the data processing module, and updates the ID and the secret key of the encrypted RFID tag after the verification is successful.
The power management module is used for providing required power for the RFID read-write module and the data processing module to the data encryption and decryption module.
According to the preferred scheme of the anti-copy RFID security system, the data distribution and identity authentication system comprises an authentication layer, a presentation layer, a business layer, a persistence layer and a system layer;
the authentication layer consists of a USBKey authentication module; the system is used for authenticating the initial login of the data distribution and identity authentication system; the system is used for detecting whether a USBKey is inserted and carrying out USBKey password verification, and carrying out system initialization and starting a business process after the USBKey password verification is passed;
the presentation layer consists of an external interface module and is used for receiving requests of all service instructions and replies of the instructions; externally providing an HTTP-based restful style interface;
the service layer consists of an identity authentication module; the system comprises a presentation layer, a display layer and a control layer, wherein the presentation layer is used for receiving various service instructions;
the persistence layer is used for providing data access capability for the business layer;
the system layer is a Linux operating system, and a JRE8 is installed on the Linux operating system to serve as a basic operating environment of software.
According to the preferred scheme of the anti-copy RFID security system, the service layer comprises a user management module, a key resource import and export module, a key management module, a reader authentication module and a tag identity authentication module;
a user management module: the system is used for realizing login authentication of a user, authentication of an administrator on system initialization operation, modification of Usbkey Pin codes and other business functions by the administrator;
the key resource import and export module: the system is used for exporting the public key data of the system and importing the ID and the key information of the encrypted RFID label issued by the key management and card issuing system;
the key management module is used for realizing a key management interface, such as operations of generating a key, inquiring the key, updating the key, destroying the key and the like;
the reader authentication module is used for authenticating the safety RFID reader;
the label identity authentication module is used for carrying out identity authentication on the encrypted RFID label.
The anti-copy RFID safety system has the beneficial effects that: the invention adopts an ID and rolling key mechanism, the encryption RFID label, the safety RFID reader and the data distribution and identity authentication system have the anti-copying function, the safety RFID reader and the data distribution and identity authentication system carry out safety authentication and encryption communication, and meanwhile, the safety RFID reader and the encryption RFID label also carry out safety authentication and encryption communication, thereby ensuring the safety of the system.
Drawings
Fig. 1 is a schematic block circuit diagram of a copy protection RFID security system according to the present invention.
Fig. 2 is a schematic block circuit diagram of the secure RFID reader 3.
Fig. 3 is a schematic diagram of the data distribution and identity authentication system 5.
Fig. 4 is a schematic diagram of the authentication of the secure RFID reader 3.
Fig. 5 is a schematic diagram of authentication of the encrypted RFID tag 1.
Fig. 6 is a schematic diagram of the key management and card issuing system 4.
Detailed Description
Referring to fig. 1 to 6, a copy prevention RFID security system includes an encrypted RFID tag 1, a tag issuer 2, a secure RFID reader 3, a key management and issuing system 4, and a data distribution and identity authentication system 5.
The security RFID reader assembles related information into a security protocol frame, sends the security protocol frame to the key management and card issuing system 4, carries out a key distribution request, the key management and card issuing system acquires a label ID, generates a label authentication key, carries out password operation, and after the security protocol frame is assembled, the key management and card issuing system 4 issues an initial key and an ID to the encryption RFID label 1 through the label card issuing device 2 and uploads the ID and the key information of the encryption RFID label 1 to the data distribution and identity authentication system 5; meanwhile, the key management and issuing system 4 issues the initial key to the secure RFID reader 3;
the secure RFID reader 3 is used for performing secure authentication and encrypted communication with the data distribution and identity authentication system 5 and the encrypted RFID tag 1; the safety RFID reader 3 reads the ID of the encrypted RFID label 1 and reads the random number of the encrypted RFID label 1 with the password; the secure RFID reader 3 encrypts the read data and transmits the encrypted data to the data distribution and identity authentication system 5; the safety RFID reader 3 decrypts the data sent by the data distribution and identity authentication system 5, verifies the data with the encrypted RFID tag 1, and updates the ID and the secret key of the encrypted RFID tag 1 after the verification is successful; each time the safety RFID reader 3 and the encryption RFID tag 1 are successfully verified, the secret key and the ID of the encryption RFID tag are updated to form rolling encryption;
the data distribution and identity authentication system 5 is used for calculating the data transmitted by the secure RFID reader 3 and then returning the data to the secure RFID reader 3.
The secure RFID reader 3 is used for performing secure authentication and encrypted communication with the data distribution and identity authentication system 5 and the encrypted RFID tag 1;
the secure RFID reader mainly performs security authentication on the encrypted RFID tag, acquires new parameters such as an encrypted RFID tag ID and a rolling authentication key from the data distribution and identity authentication system 5, and writes the new parameters into the corresponding encrypted RFID tag. The data protocol processing of the upper computer in the safety RFID reader is realized by a built-in data processing module 31, and the functions of data encryption and decryption and the like are realized by a built-in data encryption and decryption module 32.
In a specific embodiment, the secure RFID reader 3 includes a data processing module 31, a data encryption/decryption module 32, an RFID read/write module 33, and a power management module 34;
the RFID read-write module 33 is used for performing data interaction with the encrypted RFID tag 1 and the data processing module 31; the RFID read-write module 33 reads the ID of the encrypted RFID tag 1, reads the random number of the encrypted RFID tag 1 with the password, and transmits the read data to the data processing module 31; the data processing module 31 performs format conversion and data processing on the data transmitted by the RFID read-write module 33, and then outputs the data to the data encryption and decryption module 32; the data encryption and decryption module 32 encrypts the received data, returns the encrypted data to the data processing module 31 for format conversion and processing, and transmits the data to the data distribution and identity authentication system 5 through the data processing module 31;
the data processing module 31 receives the data returned by the data distribution and identity authentication system 5, performs format conversion and processing, and then transmits the data to the data encryption and decryption module 32, and the data encryption and decryption module 32 performs decryption processing on the received data, and performs format conversion and processing through the data processing module 31, and then transmits the data to the RFID read-write module 33; after receiving the data returned by the data processing module 31, the RFID read-write module 33 verifies the encrypted RFID tag 1, and updates the ID and the key of the encrypted RFID tag 1 after the verification is successful.
The power management module 34 is used for providing a required power for the RFID read-write module 33 and the data processing module 31 to the data encryption and decryption module 32.
The data processing module 31 is used for performing data interaction with the RFID read-write module 33, the data encryption and decryption module 32, the data distribution and identity authentication system 5 and the key management and card issuing system 4; the data processing module 31 performs format conversion and data processing on the received data.
The data encryption and decryption module 32 is used for data interaction with the data processing module 31; the data encryption and decryption module 32 encrypts the data output by the RFID read-write module 33 through the data processing module 31, and transmits the encrypted data to the data distribution and identity authentication system 5 through the data processing module 31; the data encryption and decryption module 32 decrypts the data returned by the data distribution and identity authentication system 5 through the data processing module 31, and returns the decrypted data to the RFID read-write module 33 through the data processing module 31; referring to fig. 3, the data distribution and identity authentication system 5 includes an authentication layer 51, a presentation layer 52, a business layer 53, a persistence layer 54, and a system layer 55.
The authentication layer 51 consists of a USBKey authentication module; the system is used for authenticating the initial login of the data distribution and identity authentication system; is it used to detect whether the chinese name of the USBKey is inserted? And carrying out USBKey password verification, and after the USBKey password verification is passed, carrying out system initialization and starting a service process;
the presentation layer 52 is composed of external modules and is used for receiving requests of all service instructions and replies of the instructions; externally providing an HTTP (hyper text transport protocol) -based restful style interface;
the service layer 53 is composed of an identity authentication module; the system is used for processing various service instructions received by the presentation layer 52 and returning the processing result to the presentation layer 52;
the persistence layer 54 is used to provide the business layer 53 with the ability to access data;
the system layer 55 is a Linux operating system, and a JRE8 is installed on the Linux operating system to serve as a basic operating environment for software.
The service layer 53 includes a user management module 531, a key resource import and export module 532, a key management module 533, a reader authentication module 534, and a tag identity authentication module 535;
the user management module 531: the system is used for realizing login authentication of a user, authentication of an administrator on system initialization operation, modification of Usbkey Pin codes and other business functions by the administrator;
the key resource import/export module 532: the system is used for exporting the public key data of the system and importing the ID and the key information of the encrypted RFID label 1 issued by the key management and card issuing system 4;
the key management module 533 is configured to implement a key management interface, such as generating a key, querying the key, updating the key, and destroying the key;
the reader authentication module 534 is used for authenticating the secure RFID reader 3;
the tag authentication module 535 is used to authenticate the encrypted RFID tag 1.
Referring to fig. 4, the working principle of the authentication of the secure RFID reader 3 is: the secure RFID reader 3 assembles the authentication information into a secure protocol frame to the data distribution and identity authentication system 5 to make an authentication request. And the data distribution and identity authentication system 5 calls a PCIE password card related algorithm to perform key agreement with the secure RFID reader. The secure RFID reader 3 authentication is completed.
Referring to fig. 5, the identity authentication operation principle of the encrypted RFID tag 1 is as follows: the secure RFID reader 3 assembles the authentication information into a secure protocol frame to the data distribution and identity authentication system 5 to perform a tag authentication request. The data distribution and identity authentication system 5 verifies the integrity of the information and queries the database for the information of the tag. Dak, if present, generates a new tag ID and the key tag.back to the secure RFID reader 3. After the encrypted RFID tag 1 completes the updating of the ID and the secret key, the secure RFID reader 3 assembles the authentication feedback information into a secure protocol frame to be sent to the data distribution and identity authentication system 5 to perform a feedback request of tag identity authentication. And after the data distribution and identity authentication system 5 verifies and passes the verification, the encrypted RFID tag 1 passes the authentication.
The key distribution working principle of the encryption RFID tag 1 is as follows: and the safety RFID reader assembles the related information into a safety protocol frame, and sends the safety protocol frame to the key management and issuing system 4 to carry out a key distribution request. The key management and card issuing system 4 obtains the tag ID, generates a tag authentication key tag. And then, carrying out cryptographic operation such as SM4 on the TAG.DAK by using the encryption key TF.TEK, assembling a security protocol frame, and then issuing the security protocol frame to the encryption RFID tag 1.
Referring to fig. 6, the key management and card issuance system 4 includes an authentication layer two, a presentation layer two 52, a business layer two, a persistence layer two, and a system layer two. The key management and card issuing system 4 carries out startup authentication and system initialization by calling the USBKey and calls the PCIE password card to realize the functions of key storage, password operation, random number generation and the like. The USBKey and the PCIE password cards pass the security certification of the national password administration.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (3)

1. An anti-copy RFID security system comprises an encryption RFID label (1), a label card sender (2), a security RFID reader (3), a key management and card sending system (4) and a data distribution and identity authentication system (5); the method is characterized in that:
the security RFID reader (3) carries out a key distribution request to the key management and card issuing system (4), the key management and card issuing system (4) acquires a label ID, generates a label authentication key and then carries out password operation, the key management and card issuing system (4) issues an initial key and an ID to the encryption RFID label (1) through the label card issuing device (2), and uploads the ID and key information of the encryption RFID label (1) to the data distribution and identity authentication system (5); meanwhile, the key management and card issuing system (4) issues the initial key to the secure RFID reader (3);
the secure RFID reader (3) is used for carrying out secure authentication and encrypted communication with the data distribution and identity authentication system (5) and the encrypted RFID tag (1); the safety RFID reader (3) reads the ID of the encrypted RFID label (1) and reads out the random number of the encrypted RFID label (1) with the password; the secure RFID reader (3) encrypts the read data and transmits the encrypted data to the data distribution and identity authentication system (5); the safety RFID reader (3) decrypts data sent by the data distribution and identity authentication system (5), verifies the data with the encrypted RFID tag (1), and updates the ID and the secret key of the encrypted RFID tag (1) after verification is successful; each time the safety RFID reader (3) and the encryption RFID tag (1) are successfully verified, the secret key and the ID of the encryption RFID tag are updated to form rolling encryption;
the data distribution and identity authentication system (5) is used for calculating the data transmitted by the secure RFID reader (3) and returning the data to the secure RFID reader (3);
the safety RFID reader (3) comprises a data processing module (31), a data encryption and decryption module (32), an RFID reading and writing module (33) and a power management module (34);
the RFID read-write module (33) is used for carrying out data interaction with the encrypted RFID tag (1) and the data processing module (31); the RFID read-write module (33) reads the ID of the encrypted RFID label (1), reads the random number of the encrypted RFID label (1) with the password, and transmits the read data to the data processing module (31); the data processing module (31) performs format conversion and data processing on the data transmitted by the RFID read-write module (33), and outputs the data to the data encryption and decryption module (32); the data encryption and decryption module (32) encrypts the received data, returns the encrypted data to the data processing module (31) for format conversion and processing, and transmits the data to the data distribution and identity authentication system (5) through the data processing module (31);
the data processing module (31) receives the data returned by the data distribution and identity authentication system (5), performs format conversion and processing, and then transmits the data to the data encryption and decryption module (32), the data encryption and decryption module (32) performs decryption processing on the received data, and performs format conversion and processing through the data processing module (31), and then transmits the data to the RFID read-write module (33); after receiving the data returned by the data processing module (31), the RFID read-write module (33) verifies the encrypted RFID tag (1), and after verification succeeds, the ID and the secret key of the encrypted RFID tag (1) are updated;
the power management module (34) is used for providing required power for the RFID read-write module (33) and the data processing module (31) for the data encryption and decryption module (32).
2. The copy-resistant RFID security system of claim 1, wherein: the data distribution and identity authentication system (5) comprises an authentication layer (51), a presentation layer (52), a business layer (53), a persistence layer (54) and a system layer (55);
the authentication layer (51) consists of a USBKey authentication module; the system is used for authenticating the initial login of the data distribution and identity authentication system; the USBKey is used for detecting whether the USBKey is inserted and carrying out USBKey password verification, and after the USBKey password verification is passed, carrying out system initialization and starting a service process;
the presentation layer (52) consists of an external interface module and is used for receiving requests of all service instructions and replies of the instructions; providing an interface to the outside;
the service layer (53) is composed of an identity authentication module; the system is used for processing various service instructions received by the presentation layer (52) and returning the processing result to the presentation layer (52);
a persistence layer (54) for providing data access capabilities to the business layer (53);
the system layer (55) is an operating system, which serves as the basic operating environment for the software.
3. The copy-resistant RFID security system of claim 2, wherein: the service layer (53) comprises a user management module (531), a key resource import and export module (532), a key management module (533), a reader authentication module (534) and a tag identity authentication module (535);
user management module (531): the system is used for realizing login authentication of a user;
key resource import-export module (532): the system is used for exporting the public key data of the system and importing the ID and the key information of the encrypted RFID label (1) issued by the key management and card issuing system (4);
the key management module (533) is used for realizing a key management interface, and comprises key generation, key inquiry, key updating and key destruction operations;
the reader authentication module (534) is used for authenticating the safety RFID reader (3);
the label identity authentication module (535) is used for identity authentication of the encrypted RFID label (1).
CN202011473718.4A 2020-12-15 2020-12-15 Anti-copy RFID safety system Active CN112487839B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011473718.4A CN112487839B (en) 2020-12-15 2020-12-15 Anti-copy RFID safety system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011473718.4A CN112487839B (en) 2020-12-15 2020-12-15 Anti-copy RFID safety system

Publications (2)

Publication Number Publication Date
CN112487839A CN112487839A (en) 2021-03-12
CN112487839B true CN112487839B (en) 2022-09-20

Family

ID=74917833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011473718.4A Active CN112487839B (en) 2020-12-15 2020-12-15 Anti-copy RFID safety system

Country Status (1)

Country Link
CN (1) CN112487839B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469677B (en) * 2021-06-11 2024-04-19 深圳市雪球科技有限公司 DESFire card data safety read-write method and device
CN116669025B (en) * 2023-07-26 2023-10-13 长沙盈芯半导体科技有限公司 Safety anti-counterfeiting method and system for ultrahigh frequency RFID chip

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014187674A (en) * 2013-03-22 2014-10-02 Cyber Creative Institute Co Ltd Rfid tag authentication system and rfid tag capable of switching security level
CN104966111A (en) * 2015-06-04 2015-10-07 中国电力科学研究院 Low-voltage transformer security system and method based on radio frequency encryption technology
CN205091758U (en) * 2015-08-07 2016-03-16 北京亿速码数据处理有限责任公司 Card reader and CPU card transaction system
CN106209768A (en) * 2016-06-20 2016-12-07 广东工业大学 A kind of extendible RFID mutual authentication method
CN111132152A (en) * 2019-12-16 2020-05-08 成都三零瑞通移动通信有限公司 RFID (radio frequency identification) tag authentication method based on multi-layer secret key system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005295408A (en) * 2004-04-02 2005-10-20 Tepco Uquest Ltd Enciphering device, decoding device, enciphering and decoding system, and key information updating system
CN101986597A (en) * 2010-10-20 2011-03-16 杭州晟元芯片技术有限公司 Identity authentication system with biological characteristic recognition function and authentication method thereof
CN111931533B (en) * 2020-07-16 2023-04-21 西安电子科技大学 Authentication method for multi-owner RFID tag

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014187674A (en) * 2013-03-22 2014-10-02 Cyber Creative Institute Co Ltd Rfid tag authentication system and rfid tag capable of switching security level
CN104966111A (en) * 2015-06-04 2015-10-07 中国电力科学研究院 Low-voltage transformer security system and method based on radio frequency encryption technology
CN205091758U (en) * 2015-08-07 2016-03-16 北京亿速码数据处理有限责任公司 Card reader and CPU card transaction system
CN106209768A (en) * 2016-06-20 2016-12-07 广东工业大学 A kind of extendible RFID mutual authentication method
CN111132152A (en) * 2019-12-16 2020-05-08 成都三零瑞通移动通信有限公司 RFID (radio frequency identification) tag authentication method based on multi-layer secret key system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
结合Hash函数和密钥阵列的RFID安全认证协议;谢川;《计算机应用》;20110331;第31卷(第3期);第805-811页 *

Also Published As

Publication number Publication date
CN112487839A (en) 2021-03-12

Similar Documents

Publication Publication Date Title
US11664997B2 (en) Authentication in ubiquitous environment
JP6989929B2 (en) Systems and methods for creating fingerprints of cryptographic devices
US9686250B2 (en) Systems and methods for decryption as a service via a hardware security module
EP3288214B1 (en) Authentication in ubiquitous environment
US9300665B2 (en) Credential authentication methods and systems
EP2143028B1 (en) Secure pin management
US20070067634A1 (en) System and method for restricting access to a terminal
US20050055318A1 (en) Secure PIN management
CN102831529A (en) Radio frequency based commodity information identification method and system
CN112487839B (en) Anti-copy RFID safety system
CN110533417B (en) Digital asset management device, issuing method and system
CN105791277A (en) Identity authentication method
US20240056438A1 (en) Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities
CN113595714A (en) Contactless card with multiple rotating security keys
KR20040104854A (en) Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone
Kumari Real time authentication system for RFID applications
US20080144829A1 (en) Wireless tag, wireless tag reader, decryptor, method for controlling wireless tag and method for managing wireless tag
KR101162227B1 (en) RFID Terminal
KR100951527B1 (en) Encrypting method for id of rfid tag, authenticating method of rfid tag and rfid authenticating system using the same
KR100742778B1 (en) Method for user certification using radio frequency identification signature, recording medium thereof and apparatus for user certification using radio frequency identification signature
KR20180085504A (en) office automation
KR100834701B1 (en) Rfid tag issue system and method, rfid tag authorization system and method
US20240104187A1 (en) Systems and methods for decryption as a service
ES2597808B1 (en) METHOD AND AUTHENTICATION SYSTEM OF RADIO FREQUENCY IDENTIFICATION ELEMENTS, AND COMPUTER PROGRAM
TW202236121A (en) Identification verification and product permission obtaining method, device end for verifying identification and user end for obtaining product privilege further avoid information security risk of stealing information from third parties during transmission process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant