[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109309916A - A kind of transmission of RFID data and Verification System and method - Google Patents

A kind of transmission of RFID data and Verification System and method Download PDF

Info

Publication number
CN109309916A
CN109309916A CN201710673334.9A CN201710673334A CN109309916A CN 109309916 A CN109309916 A CN 109309916A CN 201710673334 A CN201710673334 A CN 201710673334A CN 109309916 A CN109309916 A CN 109309916A
Authority
CN
China
Prior art keywords
electronic tag
reader
verifying
authentication server
epc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710673334.9A
Other languages
Chinese (zh)
Inventor
颜馨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710673334.9A priority Critical patent/CN109309916A/en
Publication of CN109309916A publication Critical patent/CN109309916A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of transmission of RFID data and Verification System and method, the system includes: the verifying reading and writing device system and background authentication server system at user terminal, wherein, the verifying reading and writing device system at user terminal includes verifying reader and electronic tag;Background authentication server system includes authentication server and data center.Radio frequency identification field step section is in based on the transmission of above-mentioned data and Verification System, RFID data safe transmission and authentication method proposed by the present invention, preparation stage and electronic tag including electronic tag.Method and system of the invention utilizes the sleep technology of electronic tag; in conjunction with private key encryption EPC, verifying reader identification and background server certification; cooperate passive ultrahigh frequency electronic tag; the practicability for various particular applications is enhanced, the safety of target information is effectively protected, reduces application cost, realizes RFID data safety and false-proof function.

Description

A kind of transmission of RFID data and Verification System and method
Technical field
The invention belongs to technical field of RFID, and in particular to a kind of radio frequency identification (RFID, Radio Frequency Identification) data transmission and Verification System and method.
Background technique
Radio Frequency Identification Technology is communicated at a distance using radio frequency method to reach the identification of article, tracking, positioning and pipe The purpose of reason.Radio Frequency Identification Technology is managed in industrial automation, business automation, communications and transportation control, the various fields such as anti-fake, Even military use is with a wide range of applications, and has caused extensive concern at present.
It is widely used using the electronic tag and reader of Radio Frequency Identification Technology production, especially as Internet of Things section The electronic tag of point can effectively store the various information of accompanying article and by these letters of the communications with reader Breath.In logistics field, using Radio Frequency Identification Technology compared to it is traditional manually take stock by the way of can significantly improve Working efficiency.But since the opening of Radio Frequency Identification Technology its wireless channel makes any read-write for meeting relevant art parameter Device can obtain the information of electronic tag, in certain pairs of merchandise newss than being inappropriate in more sensitive application.It is special It is not even to be stolen in turn by criminal in commodity logistics field since the opening of wireless channel causes data to be easy leakage It forges, if criminal uses the reader corresponding to electronic radio frequency tags technical parameter, and then steals the electronics mark of commodity Label information is attached in fake and inferior commodities even with the information forgery electronic tag stolen and adulterates, and can upset in this way Normal commercial activity.This problem become influence Radio Frequency Identification Technology large-scale promotion application a main problem it One.
Current RFID data safe practice is also in the exploratory stage, and there are no general international agreement or marks so far Standard, the EPC (Electronic Product Code) being stored in due to the main information carrier of Radio Frequency Identification Technology in label Code, EPC code are the global unique encodings assigned to each electronic radio frequency tags, and carrying out encryption to EPC code is mesh Preceding more popular method.Concrete measure is included in electronic tag and introduces encrypted circuit, realizes that the encryption of label and reader is logical Letter protects the original EPC of product not to be leaked out to ensure the safety of communication, and this method can prevent criminal from stealing Label information is taken to protect communication data.But such method only proposes a kind of thought, does not propose system-level solution Scheme lacks a series of mating safety measure in production, circulation links, so only proposing this encryption EPC's Thought be it is far from being enough, since existing RFID data security strategy is not mature enough, without system-level solution etc. lack It falls into,
Summary of the invention
The purpose of the present invention is to solve the above problems existing for existing RFID data safe practice, propose one kind RFID data safe transmission and Verification System.
The technical scheme is that a kind of RFID data safe transmission and Verification System, comprising: testing at user terminal Demonstrate,prove reading and writing device system and background authentication server system, wherein the verifying reading and writing device system at user terminal includes verifying read-write Device and electronic tag;Background authentication server system includes authentication server and data center;
The electronic tag includes the EPC information of encryption, and before the use in a dormant state;
The verifying reader is for sending label suspend mode activating pin to activate the electronic tag of suspend mode and read electronics The encryption EPC information read is then sent to together with its own identification password and tests by the encryption EPC information of label Demonstrate,prove server;
The data center be used for store electronic tag EPC information, verify reader own identification recognition code and The corresponding target information of electronic tag, and communicated with authentication server;
The authentication server stores the private cipher key of encrypted electronic label, and authentication server first verifies that verifying read-write Whether the identity of device is legal, and the identity for verifying reader is legal, decrypts original EPC data by key, is connected to number later Determine whether according to center for legal EPC, if it is confirmed that the legal target information that will just store in data center and destroying order It is sent to verifying reader, verifying reader receives the destruction order of authentication server, then can send self-destruction to electronic tag and refer to It enables, electronic tag is made to enter permanent failure state.
Further, the safe transmission and Verification System further include the user terminal at verifying reading and writing device system, The user terminal is used to receive the target information of authentication server transmission.
Further, the verifying reader is communicated especially by Wi-Fi mode with authentication server.
Further, the electronic tag is passive ultrahigh frequency electronic tag.
To solve the above-mentioned problems, the invention also provides a kind of RFID data safe transmission and authentication methods, including electricity The preparation stage of subtab and electronic tag are in radio frequency identification field step section, wherein
The preparation stage of electronic tag includes the following steps:
Step (a): the key encryption EPC information of authorization is written in electronic tag, and is referred to by the suspend mode of electronic tag Password is enabled to be at dormant state before the use,
Step (b): together with corresponding target association by electronic tag, by the EPC information of electronic tag, certainly mark information It is imported in the data center of background authentication server system with the own identification recognition code of preset authority checking reader;
Step (c): verifying reader is read to authentication server application authentication, authentication server to the verifying put on record Device distribution reader identification password and label breaking dormancy password and label command-destruct information are write, for illegally reading and writing Device will be unable to obtain corresponding identification password;
Electronic tag is in radio frequency identification field step section and includes the following steps:
Step (d): verifying reader sends label suspend mode activating pin to activate the electronic tag of suspend mode and read electronics The encryption EPC information read is then sent to together with its own identification password and tests by the encryption EPC information of label Demonstrate,prove server;
Step (e): authentication server first verifies that whether the identity of verifying reader is legal, and the identity for verifying reader is closed Rule decrypts original EPC data by key, is connected to data center later and determines whether for legal EPC, if it is confirmed that The legal target information that will just store in data center and destruction order are sent to verifying reader, and verifying reader receives verifying The destruction order of server then can send command-destruct to electronic tag, electronic tag is made to enter permanent failure state.
Beneficial effects of the present invention: method and system of the invention utilizes the sleep technology of electronic tag, in conjunction with privately owned close Key encrypts EPC, verifying reader identification and background server certification, cooperates passive ultrahigh frequency electronic tag, enhances pair In the practicability of various particular applications, it is effectively protected the safety of target information, application cost is reduced, realizes RFID number According to safety and false-proof function.
Detailed description of the invention
Fig. 1 is RFID data transmission and Verification System structural schematic diagram of the invention.
Fig. 2 is RFID data transmission and authentication method flow diagram of the invention.
Specific embodiment
The present invention is described further with specific specific embodiment with reference to the accompanying drawing.
RFID data transmission of the invention is completed with Verification System and method especially by the following three stage.
Data encapsulation: commodity production manufacturer as needed to electronic radio frequency tags manufacturer have made to order electronic radio frequency tags and to It authorizes privately owned encryption key, it is therefore an objective to encrypt original commodity EPC and write with a brush dipped in Chinese ink the EPC of encryption into electronic tag, be formed Unique encryption EPC information, accordingly even when the encryption EPC information leaks out, it is external because also can not be extensive without grasping key It appears again original EPC information, this action provides basic encryption measures.Tailor-made electronic radio frequency tags are it is characterized in that customization is stopped Dormancy function: electronic radio frequency tags notice suspend mode password by just no longer any in addition to breaking dormancy order of response asks after suspend mode It asks.It can guarantee that the reader for not grasping breaking dormancy password can not spy upon the information of electronic tag in this way.Electronic tag So that label is entered dormant state using preset label sleep command when factory and delivers businessman.Customize electronic tag simultaneously The EPC of encryption is write with a brush dipped in Chinese ink into the process that the process to electronic tag is considered as data encapsulation.
Data acquisition: the effect for verifying the identification password of reader is in order to avoid authentication server is illegally read It writes the malicious data attack of device and sets up, authentication server is only close to the verifying reader authorization identification of legal authorization Code, and reader must first verify reader identity, authentication server system before sending verification information to authentication server The reader information of identification failure is abandoned without exception, only responds the information that valid reader sends over;Label suspend mode swashs Password living is used to activate electronic radio frequency tags in order to read electronic radio frequency tags encryption EPC information by reader.Work as needs Reader can first attempt to send label suspend mode activating pin to activate the label of suspend mode and read radio frequency when verifying electronic tag The encryption EPC information read is then passed through control together with self identification password by the encryption EPC information of electronic tag Terminal processed, which is uploaded in authentication server, to be verified.Reader reads the encryption EPC of radio electronic label and combines own identification The stage that recognition code uploads to authentication server verifying is considered as the process of data acquisition and data transmission.
Data verification: store the private cipher key of encrypted electronic label in authentication server.Authentication server only receives The information that is sended over by the valid reader of authentication and the request for being not responding to all unidentified readers.Work as verifying Server after data center's verifying by determining whether then to decrypt by key original for legal electronic tag data EPC data connects data center later and determines whether for legal EPC, if it is confirmed that legal will just store in data center Commodity details are sent on user terminal.If verifying electronic radio frequency tags information success so reader can be penetrated to electronics Frequency marking, which is signed and issued, send command-destruct, and label is made to enter permanent failure state.
It is specific as shown in Figure 1, comprising: verifying reading and writing device system and background authentication server system at user terminal, In, the verifying reading and writing device system at user terminal includes verifying reader and electronic tag;Background authentication server system includes Authentication server and data center;
The electronic tag includes the EPC information of encryption, and before the use in a dormant state;
The verifying reader is for sending label suspend mode activating pin to activate the electronic tag of suspend mode and read electronics The encryption EPC information read is then sent to together with its own identification password and tests by the encryption EPC information of label Demonstrate,prove server;
The data center be used for store electronic tag EPC information, verify reader own identification recognition code and The corresponding target information of electronic tag, and communicated with authentication server;
The authentication server stores the private cipher key of encrypted electronic label, and authentication server first verifies that verifying read-write Whether the identity of device is legal, and the identity for verifying reader is legal, decrypts original EPC data by key, is connected to number later Determine whether according to center for legal EPC, if it is confirmed that the legal target information that will just store in data center and destroying order It is sent to verifying reader, verifying reader receives the destruction order of authentication server, then can send self-destruction to electronic tag and refer to It enables, electronic tag is made to enter permanent failure state.
Here, safe transmission and Verification System further include the user terminal at verifying reading and writing device system, the use Family terminal is used to receive the target information of authentication server transmission.
Here, the verifying reader is communicated especially by Wi-Fi mode with authentication server.
Here, electronic tag can specifically use passive ultrahigh frequency electronic tag, can also effectively reduce disappearing for power consumption Consumption and volume in kind, reduce the dependence for external power supply, enhance the practicability for various particular applications.
The system can be applied in RFID commodity counterfeit prevention and Information Authentication field, and coded communication and multifactor authentication are cooperated Equal measures, can preferably realize RFID data safe transmission and authentication function.
Based on the transmission of above-mentioned data and Verification System, RFID data safe transmission and authentication method proposed by the present invention, tool Body process is as shown in Fig. 2, include that the preparation stage of electronic tag and electronic tag are in radio frequency identification field step section, wherein
The preparation stage of electronic tag includes the following steps:
Step (a): the key encryption EPC information of authorization is written in electronic tag, and is referred to by the dormancy of electronic tag Enable password before the use in a dormant state,
Step (b): together with corresponding target association by electronic tag, by the EPC information of electronic tag, target information It is imported in the data center of background authentication server system with the own identification recognition code of preset authority checking reader:
Step (c): verifying reader is read to authentication server application authentication, authentication server to the verifying put on record Device distribution reader identification password and label breaking dormancy password and label command-destruct information are write, for illegally reading and writing Device will be unable to obtain corresponding identification password;
In tag sleep state, the request of any reader will not be responded, that is to say, that sleep label can not be read Information, can prevent illegal reader from spying upon the information to label in this way, and legal reader sends to radio electronic label and solves Except suspend mode password attempt activates dormancy label and starts to read label data, together with own identification recognition code one after reading successfully It rises and uploads in authentication server.
Electronic tag is in radio frequency identification field step section and includes the following steps:
Step (d): verifying reader sends label suspend mode activating pin to activate the electronic tag of suspend mode and read electronics The encryption EPC information read is then sent to together with its own identification password and tests by the encryption EPC information of label Demonstrate,prove server;
Step (e): authentication server first verifies that whether the identity of verifying reader is legal, if the identity of verifying reader It is legal, original EPC data is decrypted by key, data center is connected to later and determines whether for legal EPC, if really Recognize the legal target information that will just store in data center and destroy order and be sent to verifying reader, verifying reader, which receives, to be tested The destruction order of server is demonstrate,proved, then can send command-destruct to electronic tag, electronic tag is made to enter permanent failure state.
Here, it is illegal verifying reader if recognizing, the request for illegally verifying reader can be refused, abandon illegal number According to.
As can be seen that RFID data transmission of the invention with Verification System and method there is high reliability and cost to be easy to control The advantages of processed, establishes data encapsulation, data acquisition, data transmission and the data verification of electronic tag in the application system of one System, therefore this RFID data safe transmission and Verification System can be relatively easy to electronic tag connected applications in logistics row For target information quick-searching and anti-fake in industry, the status information and true and false information of target can in time, be effectively verified, simultaneously Using label self-destruction technology, electronic tag in target is made to fail after the true and false of effective safety detection to target at once, Prevent reuse of the electronic tag by criminal.Method and system of the invention utilizes the sleep technology of electronic tag, in conjunction with Private key encryption EPC, verifying reader identification and background server certification, cooperate passive ultrahigh frequency electronic tag, increase The strong practicability for various particular applications, is effectively protected the safety of target information, reduces application cost, realizes RFID data safety and false-proof function.
Those of ordinary skill in the art will understand that the embodiments described herein, which is to help reader, understands this hair Bright principle, it should be understood that protection scope of the present invention is not limited to such specific embodiments and embodiments.This field Those of ordinary skill disclosed the technical disclosures can make according to the present invention and various not depart from the other each of essence of the invention The specific variations and combinations of kind, these variations and combinations are still within the scope of the present invention.

Claims (5)

1. a kind of RFID data safe transmission and Verification System characterized by comprising the verifying reader system at user terminal System and background authentication server system, wherein the verifying reading and writing device system at user terminal includes verifying reader and electronics mark Label;Background authentication server system includes authentication server and data center;
The electronic tag includes the EPC information of encryption, and before the use in a dormant state;
The verifying reader is for sending label suspend mode activating pin to activate the electronic tag of suspend mode and read electronic tag Encryption EPC information, then by read encryption EPC information together with verifying reader one starting of own identification recognition code It send to authentication server;
The data center is used to store the EPC information of electronic tag, verifies the own identification recognition code and electronics of reader The corresponding target information of label, and communicated with authentication server;
The authentication server stores the private cipher key of encrypted electronic label, and authentication server first verifies that verifying reader Whether identity is legal, and the identity for verifying reader is legal, decrypts original EPC data by private cipher key, is connected to number later Determine whether according to center for legal EPC, if it is confirmed that the legal destruction order that will just store in data center is sent to verifying The target information stored in data center is sent user terminal by reader, and verifying reader receives the pin of authentication server Order is ruined, then can send command-destruct to electronic tag, electronic tag is made to enter permanent failure state.
2. safe transmission according to claim 1 and Verification System, which is characterized in that the verifying reader especially by Wi-Fi mode is communicated with authentication server.
3. safe transmission according to claim 1 and Verification System, which is characterized in that the electronic tag is passive super Ultra high frequency IC tag.
4. a kind of RFID data safe transmission and authentication method, preparation stage and electronic tag including electronic tag are in radio frequency Identify field step section, wherein
The preparation stage of electronic tag includes the following steps:
Step (a): the dormancy instruction for being encrypted EPC information with the key of authorization and being written in electronic tag, and passing through electronic tag Password is at dormant state before the use,
Step (b): together with corresponding target association by electronic tag, by the EPC information of electronic tag, target information and pre- If authority checking reader own identification recognition code import background authentication server system data center in;
Step (c): verifying reader is to authentication server application authentication, and authentication server is to the verifying reader put on record Distribute reader identification password and label breaking dormancy password and label command-destruct information, it will for illegal reader Corresponding identification password can not be obtained;
Electronic tag is in radio frequency identification field step section and includes the following steps:
Step (e): verifying reader sends label suspend mode activating pin to activate the electronic tag of suspend mode and read electronic tag Encryption EPC information, then by the encryption EPC information read together with its own identification password be sent to verifying clothes Business device;
Step (f): authentication server first verifies that whether the identity of verifying reader is legal, and the identity for verifying reader is legal then Original EPC data is decrypted by the key in step (a), data center is connected to later and determines whether for legal EPC, such as Fruit confirms that the legal destruction order that will just store in data center is sent to verifying reader, the target that will be stored in data center Information is sent to user terminal, and verifying reader receives the destruction order of authentication server, then can send self-destruction to electronic tag Instruction, makes electronic tag enter permanent failure state.
5. safe transmission according to claim 4 and authentication method, which is characterized in that the electronic tag is passive super Ultra high frequency IC tag.
CN201710673334.9A 2017-07-28 2017-07-28 A kind of transmission of RFID data and Verification System and method Pending CN109309916A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710673334.9A CN109309916A (en) 2017-07-28 2017-07-28 A kind of transmission of RFID data and Verification System and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710673334.9A CN109309916A (en) 2017-07-28 2017-07-28 A kind of transmission of RFID data and Verification System and method

Publications (1)

Publication Number Publication Date
CN109309916A true CN109309916A (en) 2019-02-05

Family

ID=65205310

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710673334.9A Pending CN109309916A (en) 2017-07-28 2017-07-28 A kind of transmission of RFID data and Verification System and method

Country Status (1)

Country Link
CN (1) CN109309916A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112184201A (en) * 2020-08-29 2021-01-05 微码科技咸宁有限公司 Charging station payment system and method based on bidirectional encryption verification
CN113536286A (en) * 2021-06-10 2021-10-22 山东特检鲁安工程技术服务有限公司 Connection authentication system used between tank car and storage tank
WO2022141600A1 (en) * 2020-12-31 2022-07-07 华为技术有限公司 Authentication method and communication apparatus
CN116132986A (en) * 2022-12-16 2023-05-16 中国铁塔股份有限公司 Data transmission method, electronic equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112184201A (en) * 2020-08-29 2021-01-05 微码科技咸宁有限公司 Charging station payment system and method based on bidirectional encryption verification
WO2022141600A1 (en) * 2020-12-31 2022-07-07 华为技术有限公司 Authentication method and communication apparatus
CN113536286A (en) * 2021-06-10 2021-10-22 山东特检鲁安工程技术服务有限公司 Connection authentication system used between tank car and storage tank
CN113536286B (en) * 2021-06-10 2024-05-14 山东特检鲁安工程技术服务有限公司 Connection authentication system for tank truck and storage tank
CN116132986A (en) * 2022-12-16 2023-05-16 中国铁塔股份有限公司 Data transmission method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102646203B (en) RFID (Radio Frequency Identification Device) data transmission and authentication system and method
EP3118776B1 (en) Security authentication method for hiding ultra high frequency electronic tag identifier
Aggarwal et al. RFID security in the context of" internet of things"
US9300665B2 (en) Credential authentication methods and systems
EP1755061B1 (en) Protection of non-promiscuous data in an RFID transponder
CN101369306B (en) Electronic label security system
CN103516520A (en) Data safe transmission system and method based on electronic tag
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
CN107231231B (en) Method and system for terminal equipment to safely access Internet of things
US20110068894A1 (en) Method for authenticating an rfid tag
CN102081727B (en) Safety certificate method and system for radio frequency identification
CN109309916A (en) A kind of transmission of RFID data and Verification System and method
CN104966111A (en) Low-voltage transformer security system and method based on radio frequency encryption technology
CN103281189A (en) Light weight class safe protocol certification system and method for radio frequency identification equipment
CN102855574A (en) Method and system for identifying commodity information based on NFC (Near Field Communication)
CN202870900U (en) NFC (Near Field Communication)-based commodity information identification system
CN102662874B (en) Double-interface encryption memory card and management method and system of data in double-interface encryption memory card
CN103235995A (en) Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone
CN106096700B (en) Electronic tag encryption method and its method for reading data
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
Kim et al. MARP: Mobile agent for RFID privacy protection
WO2006030344A1 (en) Rf transponder for off-line authentication of a source of a product carrying the transponder
CN103793742A (en) Technology of electronic tag safety authentication and information encryption of traffic electronic license plate
Jain et al. Analysis of vulnerabilities in radio frequency identification (RFID) systems
Finkenzeller Known attacks on RFID systems, possible countermeasures and upcoming standardisation activities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190205

WD01 Invention patent application deemed withdrawn after publication