CN109309916A - A kind of transmission of RFID data and Verification System and method - Google Patents
A kind of transmission of RFID data and Verification System and method Download PDFInfo
- Publication number
- CN109309916A CN109309916A CN201710673334.9A CN201710673334A CN109309916A CN 109309916 A CN109309916 A CN 109309916A CN 201710673334 A CN201710673334 A CN 201710673334A CN 109309916 A CN109309916 A CN 109309916A
- Authority
- CN
- China
- Prior art keywords
- electronic tag
- reader
- verifying
- authentication server
- epc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of transmission of RFID data and Verification System and method, the system includes: the verifying reading and writing device system and background authentication server system at user terminal, wherein, the verifying reading and writing device system at user terminal includes verifying reader and electronic tag;Background authentication server system includes authentication server and data center.Radio frequency identification field step section is in based on the transmission of above-mentioned data and Verification System, RFID data safe transmission and authentication method proposed by the present invention, preparation stage and electronic tag including electronic tag.Method and system of the invention utilizes the sleep technology of electronic tag; in conjunction with private key encryption EPC, verifying reader identification and background server certification; cooperate passive ultrahigh frequency electronic tag; the practicability for various particular applications is enhanced, the safety of target information is effectively protected, reduces application cost, realizes RFID data safety and false-proof function.
Description
Technical field
The invention belongs to technical field of RFID, and in particular to a kind of radio frequency identification (RFID, Radio Frequency
Identification) data transmission and Verification System and method.
Background technique
Radio Frequency Identification Technology is communicated at a distance using radio frequency method to reach the identification of article, tracking, positioning and pipe
The purpose of reason.Radio Frequency Identification Technology is managed in industrial automation, business automation, communications and transportation control, the various fields such as anti-fake,
Even military use is with a wide range of applications, and has caused extensive concern at present.
It is widely used using the electronic tag and reader of Radio Frequency Identification Technology production, especially as Internet of Things section
The electronic tag of point can effectively store the various information of accompanying article and by these letters of the communications with reader
Breath.In logistics field, using Radio Frequency Identification Technology compared to it is traditional manually take stock by the way of can significantly improve
Working efficiency.But since the opening of Radio Frequency Identification Technology its wireless channel makes any read-write for meeting relevant art parameter
Device can obtain the information of electronic tag, in certain pairs of merchandise newss than being inappropriate in more sensitive application.It is special
It is not even to be stolen in turn by criminal in commodity logistics field since the opening of wireless channel causes data to be easy leakage
It forges, if criminal uses the reader corresponding to electronic radio frequency tags technical parameter, and then steals the electronics mark of commodity
Label information is attached in fake and inferior commodities even with the information forgery electronic tag stolen and adulterates, and can upset in this way
Normal commercial activity.This problem become influence Radio Frequency Identification Technology large-scale promotion application a main problem it
One.
Current RFID data safe practice is also in the exploratory stage, and there are no general international agreement or marks so far
Standard, the EPC (Electronic Product Code) being stored in due to the main information carrier of Radio Frequency Identification Technology in label
Code, EPC code are the global unique encodings assigned to each electronic radio frequency tags, and carrying out encryption to EPC code is mesh
Preceding more popular method.Concrete measure is included in electronic tag and introduces encrypted circuit, realizes that the encryption of label and reader is logical
Letter protects the original EPC of product not to be leaked out to ensure the safety of communication, and this method can prevent criminal from stealing
Label information is taken to protect communication data.But such method only proposes a kind of thought, does not propose system-level solution
Scheme lacks a series of mating safety measure in production, circulation links, so only proposing this encryption EPC's
Thought be it is far from being enough, since existing RFID data security strategy is not mature enough, without system-level solution etc. lack
It falls into,
Summary of the invention
The purpose of the present invention is to solve the above problems existing for existing RFID data safe practice, propose one kind
RFID data safe transmission and Verification System.
The technical scheme is that a kind of RFID data safe transmission and Verification System, comprising: testing at user terminal
Demonstrate,prove reading and writing device system and background authentication server system, wherein the verifying reading and writing device system at user terminal includes verifying read-write
Device and electronic tag;Background authentication server system includes authentication server and data center;
The electronic tag includes the EPC information of encryption, and before the use in a dormant state;
The verifying reader is for sending label suspend mode activating pin to activate the electronic tag of suspend mode and read electronics
The encryption EPC information read is then sent to together with its own identification password and tests by the encryption EPC information of label
Demonstrate,prove server;
The data center be used for store electronic tag EPC information, verify reader own identification recognition code and
The corresponding target information of electronic tag, and communicated with authentication server;
The authentication server stores the private cipher key of encrypted electronic label, and authentication server first verifies that verifying read-write
Whether the identity of device is legal, and the identity for verifying reader is legal, decrypts original EPC data by key, is connected to number later
Determine whether according to center for legal EPC, if it is confirmed that the legal target information that will just store in data center and destroying order
It is sent to verifying reader, verifying reader receives the destruction order of authentication server, then can send self-destruction to electronic tag and refer to
It enables, electronic tag is made to enter permanent failure state.
Further, the safe transmission and Verification System further include the user terminal at verifying reading and writing device system,
The user terminal is used to receive the target information of authentication server transmission.
Further, the verifying reader is communicated especially by Wi-Fi mode with authentication server.
Further, the electronic tag is passive ultrahigh frequency electronic tag.
To solve the above-mentioned problems, the invention also provides a kind of RFID data safe transmission and authentication methods, including electricity
The preparation stage of subtab and electronic tag are in radio frequency identification field step section, wherein
The preparation stage of electronic tag includes the following steps:
Step (a): the key encryption EPC information of authorization is written in electronic tag, and is referred to by the suspend mode of electronic tag
Password is enabled to be at dormant state before the use,
Step (b): together with corresponding target association by electronic tag, by the EPC information of electronic tag, certainly mark information
It is imported in the data center of background authentication server system with the own identification recognition code of preset authority checking reader;
Step (c): verifying reader is read to authentication server application authentication, authentication server to the verifying put on record
Device distribution reader identification password and label breaking dormancy password and label command-destruct information are write, for illegally reading and writing
Device will be unable to obtain corresponding identification password;
Electronic tag is in radio frequency identification field step section and includes the following steps:
Step (d): verifying reader sends label suspend mode activating pin to activate the electronic tag of suspend mode and read electronics
The encryption EPC information read is then sent to together with its own identification password and tests by the encryption EPC information of label
Demonstrate,prove server;
Step (e): authentication server first verifies that whether the identity of verifying reader is legal, and the identity for verifying reader is closed
Rule decrypts original EPC data by key, is connected to data center later and determines whether for legal EPC, if it is confirmed that
The legal target information that will just store in data center and destruction order are sent to verifying reader, and verifying reader receives verifying
The destruction order of server then can send command-destruct to electronic tag, electronic tag is made to enter permanent failure state.
Beneficial effects of the present invention: method and system of the invention utilizes the sleep technology of electronic tag, in conjunction with privately owned close
Key encrypts EPC, verifying reader identification and background server certification, cooperates passive ultrahigh frequency electronic tag, enhances pair
In the practicability of various particular applications, it is effectively protected the safety of target information, application cost is reduced, realizes RFID number
According to safety and false-proof function.
Detailed description of the invention
Fig. 1 is RFID data transmission and Verification System structural schematic diagram of the invention.
Fig. 2 is RFID data transmission and authentication method flow diagram of the invention.
Specific embodiment
The present invention is described further with specific specific embodiment with reference to the accompanying drawing.
RFID data transmission of the invention is completed with Verification System and method especially by the following three stage.
Data encapsulation: commodity production manufacturer as needed to electronic radio frequency tags manufacturer have made to order electronic radio frequency tags and to
It authorizes privately owned encryption key, it is therefore an objective to encrypt original commodity EPC and write with a brush dipped in Chinese ink the EPC of encryption into electronic tag, be formed
Unique encryption EPC information, accordingly even when the encryption EPC information leaks out, it is external because also can not be extensive without grasping key
It appears again original EPC information, this action provides basic encryption measures.Tailor-made electronic radio frequency tags are it is characterized in that customization is stopped
Dormancy function: electronic radio frequency tags notice suspend mode password by just no longer any in addition to breaking dormancy order of response asks after suspend mode
It asks.It can guarantee that the reader for not grasping breaking dormancy password can not spy upon the information of electronic tag in this way.Electronic tag
So that label is entered dormant state using preset label sleep command when factory and delivers businessman.Customize electronic tag simultaneously
The EPC of encryption is write with a brush dipped in Chinese ink into the process that the process to electronic tag is considered as data encapsulation.
Data acquisition: the effect for verifying the identification password of reader is in order to avoid authentication server is illegally read
It writes the malicious data attack of device and sets up, authentication server is only close to the verifying reader authorization identification of legal authorization
Code, and reader must first verify reader identity, authentication server system before sending verification information to authentication server
The reader information of identification failure is abandoned without exception, only responds the information that valid reader sends over;Label suspend mode swashs
Password living is used to activate electronic radio frequency tags in order to read electronic radio frequency tags encryption EPC information by reader.Work as needs
Reader can first attempt to send label suspend mode activating pin to activate the label of suspend mode and read radio frequency when verifying electronic tag
The encryption EPC information read is then passed through control together with self identification password by the encryption EPC information of electronic tag
Terminal processed, which is uploaded in authentication server, to be verified.Reader reads the encryption EPC of radio electronic label and combines own identification
The stage that recognition code uploads to authentication server verifying is considered as the process of data acquisition and data transmission.
Data verification: store the private cipher key of encrypted electronic label in authentication server.Authentication server only receives
The information that is sended over by the valid reader of authentication and the request for being not responding to all unidentified readers.Work as verifying
Server after data center's verifying by determining whether then to decrypt by key original for legal electronic tag data
EPC data connects data center later and determines whether for legal EPC, if it is confirmed that legal will just store in data center
Commodity details are sent on user terminal.If verifying electronic radio frequency tags information success so reader can be penetrated to electronics
Frequency marking, which is signed and issued, send command-destruct, and label is made to enter permanent failure state.
It is specific as shown in Figure 1, comprising: verifying reading and writing device system and background authentication server system at user terminal,
In, the verifying reading and writing device system at user terminal includes verifying reader and electronic tag;Background authentication server system includes
Authentication server and data center;
The electronic tag includes the EPC information of encryption, and before the use in a dormant state;
The verifying reader is for sending label suspend mode activating pin to activate the electronic tag of suspend mode and read electronics
The encryption EPC information read is then sent to together with its own identification password and tests by the encryption EPC information of label
Demonstrate,prove server;
The data center be used for store electronic tag EPC information, verify reader own identification recognition code and
The corresponding target information of electronic tag, and communicated with authentication server;
The authentication server stores the private cipher key of encrypted electronic label, and authentication server first verifies that verifying read-write
Whether the identity of device is legal, and the identity for verifying reader is legal, decrypts original EPC data by key, is connected to number later
Determine whether according to center for legal EPC, if it is confirmed that the legal target information that will just store in data center and destroying order
It is sent to verifying reader, verifying reader receives the destruction order of authentication server, then can send self-destruction to electronic tag and refer to
It enables, electronic tag is made to enter permanent failure state.
Here, safe transmission and Verification System further include the user terminal at verifying reading and writing device system, the use
Family terminal is used to receive the target information of authentication server transmission.
Here, the verifying reader is communicated especially by Wi-Fi mode with authentication server.
Here, electronic tag can specifically use passive ultrahigh frequency electronic tag, can also effectively reduce disappearing for power consumption
Consumption and volume in kind, reduce the dependence for external power supply, enhance the practicability for various particular applications.
The system can be applied in RFID commodity counterfeit prevention and Information Authentication field, and coded communication and multifactor authentication are cooperated
Equal measures, can preferably realize RFID data safe transmission and authentication function.
Based on the transmission of above-mentioned data and Verification System, RFID data safe transmission and authentication method proposed by the present invention, tool
Body process is as shown in Fig. 2, include that the preparation stage of electronic tag and electronic tag are in radio frequency identification field step section, wherein
The preparation stage of electronic tag includes the following steps:
Step (a): the key encryption EPC information of authorization is written in electronic tag, and is referred to by the dormancy of electronic tag
Enable password before the use in a dormant state,
Step (b): together with corresponding target association by electronic tag, by the EPC information of electronic tag, target information
It is imported in the data center of background authentication server system with the own identification recognition code of preset authority checking reader:
Step (c): verifying reader is read to authentication server application authentication, authentication server to the verifying put on record
Device distribution reader identification password and label breaking dormancy password and label command-destruct information are write, for illegally reading and writing
Device will be unable to obtain corresponding identification password;
In tag sleep state, the request of any reader will not be responded, that is to say, that sleep label can not be read
Information, can prevent illegal reader from spying upon the information to label in this way, and legal reader sends to radio electronic label and solves
Except suspend mode password attempt activates dormancy label and starts to read label data, together with own identification recognition code one after reading successfully
It rises and uploads in authentication server.
Electronic tag is in radio frequency identification field step section and includes the following steps:
Step (d): verifying reader sends label suspend mode activating pin to activate the electronic tag of suspend mode and read electronics
The encryption EPC information read is then sent to together with its own identification password and tests by the encryption EPC information of label
Demonstrate,prove server;
Step (e): authentication server first verifies that whether the identity of verifying reader is legal, if the identity of verifying reader
It is legal, original EPC data is decrypted by key, data center is connected to later and determines whether for legal EPC, if really
Recognize the legal target information that will just store in data center and destroy order and be sent to verifying reader, verifying reader, which receives, to be tested
The destruction order of server is demonstrate,proved, then can send command-destruct to electronic tag, electronic tag is made to enter permanent failure state.
Here, it is illegal verifying reader if recognizing, the request for illegally verifying reader can be refused, abandon illegal number
According to.
As can be seen that RFID data transmission of the invention with Verification System and method there is high reliability and cost to be easy to control
The advantages of processed, establishes data encapsulation, data acquisition, data transmission and the data verification of electronic tag in the application system of one
System, therefore this RFID data safe transmission and Verification System can be relatively easy to electronic tag connected applications in logistics row
For target information quick-searching and anti-fake in industry, the status information and true and false information of target can in time, be effectively verified, simultaneously
Using label self-destruction technology, electronic tag in target is made to fail after the true and false of effective safety detection to target at once,
Prevent reuse of the electronic tag by criminal.Method and system of the invention utilizes the sleep technology of electronic tag, in conjunction with
Private key encryption EPC, verifying reader identification and background server certification, cooperate passive ultrahigh frequency electronic tag, increase
The strong practicability for various particular applications, is effectively protected the safety of target information, reduces application cost, realizes
RFID data safety and false-proof function.
Those of ordinary skill in the art will understand that the embodiments described herein, which is to help reader, understands this hair
Bright principle, it should be understood that protection scope of the present invention is not limited to such specific embodiments and embodiments.This field
Those of ordinary skill disclosed the technical disclosures can make according to the present invention and various not depart from the other each of essence of the invention
The specific variations and combinations of kind, these variations and combinations are still within the scope of the present invention.
Claims (5)
1. a kind of RFID data safe transmission and Verification System characterized by comprising the verifying reader system at user terminal
System and background authentication server system, wherein the verifying reading and writing device system at user terminal includes verifying reader and electronics mark
Label;Background authentication server system includes authentication server and data center;
The electronic tag includes the EPC information of encryption, and before the use in a dormant state;
The verifying reader is for sending label suspend mode activating pin to activate the electronic tag of suspend mode and read electronic tag
Encryption EPC information, then by read encryption EPC information together with verifying reader one starting of own identification recognition code
It send to authentication server;
The data center is used to store the EPC information of electronic tag, verifies the own identification recognition code and electronics of reader
The corresponding target information of label, and communicated with authentication server;
The authentication server stores the private cipher key of encrypted electronic label, and authentication server first verifies that verifying reader
Whether identity is legal, and the identity for verifying reader is legal, decrypts original EPC data by private cipher key, is connected to number later
Determine whether according to center for legal EPC, if it is confirmed that the legal destruction order that will just store in data center is sent to verifying
The target information stored in data center is sent user terminal by reader, and verifying reader receives the pin of authentication server
Order is ruined, then can send command-destruct to electronic tag, electronic tag is made to enter permanent failure state.
2. safe transmission according to claim 1 and Verification System, which is characterized in that the verifying reader especially by
Wi-Fi mode is communicated with authentication server.
3. safe transmission according to claim 1 and Verification System, which is characterized in that the electronic tag is passive super
Ultra high frequency IC tag.
4. a kind of RFID data safe transmission and authentication method, preparation stage and electronic tag including electronic tag are in radio frequency
Identify field step section, wherein
The preparation stage of electronic tag includes the following steps:
Step (a): the dormancy instruction for being encrypted EPC information with the key of authorization and being written in electronic tag, and passing through electronic tag
Password is at dormant state before the use,
Step (b): together with corresponding target association by electronic tag, by the EPC information of electronic tag, target information and pre-
If authority checking reader own identification recognition code import background authentication server system data center in;
Step (c): verifying reader is to authentication server application authentication, and authentication server is to the verifying reader put on record
Distribute reader identification password and label breaking dormancy password and label command-destruct information, it will for illegal reader
Corresponding identification password can not be obtained;
Electronic tag is in radio frequency identification field step section and includes the following steps:
Step (e): verifying reader sends label suspend mode activating pin to activate the electronic tag of suspend mode and read electronic tag
Encryption EPC information, then by the encryption EPC information read together with its own identification password be sent to verifying clothes
Business device;
Step (f): authentication server first verifies that whether the identity of verifying reader is legal, and the identity for verifying reader is legal then
Original EPC data is decrypted by the key in step (a), data center is connected to later and determines whether for legal EPC, such as
Fruit confirms that the legal destruction order that will just store in data center is sent to verifying reader, the target that will be stored in data center
Information is sent to user terminal, and verifying reader receives the destruction order of authentication server, then can send self-destruction to electronic tag
Instruction, makes electronic tag enter permanent failure state.
5. safe transmission according to claim 4 and authentication method, which is characterized in that the electronic tag is passive super
Ultra high frequency IC tag.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710673334.9A CN109309916A (en) | 2017-07-28 | 2017-07-28 | A kind of transmission of RFID data and Verification System and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710673334.9A CN109309916A (en) | 2017-07-28 | 2017-07-28 | A kind of transmission of RFID data and Verification System and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109309916A true CN109309916A (en) | 2019-02-05 |
Family
ID=65205310
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710673334.9A Pending CN109309916A (en) | 2017-07-28 | 2017-07-28 | A kind of transmission of RFID data and Verification System and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109309916A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112184201A (en) * | 2020-08-29 | 2021-01-05 | 微码科技咸宁有限公司 | Charging station payment system and method based on bidirectional encryption verification |
CN113536286A (en) * | 2021-06-10 | 2021-10-22 | 山东特检鲁安工程技术服务有限公司 | Connection authentication system used between tank car and storage tank |
WO2022141600A1 (en) * | 2020-12-31 | 2022-07-07 | 华为技术有限公司 | Authentication method and communication apparatus |
CN116132986A (en) * | 2022-12-16 | 2023-05-16 | 中国铁塔股份有限公司 | Data transmission method, electronic equipment and storage medium |
-
2017
- 2017-07-28 CN CN201710673334.9A patent/CN109309916A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112184201A (en) * | 2020-08-29 | 2021-01-05 | 微码科技咸宁有限公司 | Charging station payment system and method based on bidirectional encryption verification |
WO2022141600A1 (en) * | 2020-12-31 | 2022-07-07 | 华为技术有限公司 | Authentication method and communication apparatus |
CN113536286A (en) * | 2021-06-10 | 2021-10-22 | 山东特检鲁安工程技术服务有限公司 | Connection authentication system used between tank car and storage tank |
CN113536286B (en) * | 2021-06-10 | 2024-05-14 | 山东特检鲁安工程技术服务有限公司 | Connection authentication system for tank truck and storage tank |
CN116132986A (en) * | 2022-12-16 | 2023-05-16 | 中国铁塔股份有限公司 | Data transmission method, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102646203B (en) | RFID (Radio Frequency Identification Device) data transmission and authentication system and method | |
EP3118776B1 (en) | Security authentication method for hiding ultra high frequency electronic tag identifier | |
Aggarwal et al. | RFID security in the context of" internet of things" | |
US9300665B2 (en) | Credential authentication methods and systems | |
EP1755061B1 (en) | Protection of non-promiscuous data in an RFID transponder | |
CN101369306B (en) | Electronic label security system | |
CN103516520A (en) | Data safe transmission system and method based on electronic tag | |
CN102831529B (en) | A kind of commodity information identification method based on radio frequency and system | |
CN107231231B (en) | Method and system for terminal equipment to safely access Internet of things | |
US20110068894A1 (en) | Method for authenticating an rfid tag | |
CN102081727B (en) | Safety certificate method and system for radio frequency identification | |
CN109309916A (en) | A kind of transmission of RFID data and Verification System and method | |
CN104966111A (en) | Low-voltage transformer security system and method based on radio frequency encryption technology | |
CN103281189A (en) | Light weight class safe protocol certification system and method for radio frequency identification equipment | |
CN102855574A (en) | Method and system for identifying commodity information based on NFC (Near Field Communication) | |
CN202870900U (en) | NFC (Near Field Communication)-based commodity information identification system | |
CN102662874B (en) | Double-interface encryption memory card and management method and system of data in double-interface encryption memory card | |
CN103235995A (en) | Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone | |
CN106096700B (en) | Electronic tag encryption method and its method for reading data | |
CN104700125A (en) | AES encryption and verification of ultra high frequency radio identification system | |
Kim et al. | MARP: Mobile agent for RFID privacy protection | |
WO2006030344A1 (en) | Rf transponder for off-line authentication of a source of a product carrying the transponder | |
CN103793742A (en) | Technology of electronic tag safety authentication and information encryption of traffic electronic license plate | |
Jain et al. | Analysis of vulnerabilities in radio frequency identification (RFID) systems | |
Finkenzeller | Known attacks on RFID systems, possible countermeasures and upcoming standardisation activities |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190205 |
|
WD01 | Invention patent application deemed withdrawn after publication |