[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN103246903A - Method for enhancing radio-frequency identification information safety and privacy protection - Google Patents

Method for enhancing radio-frequency identification information safety and privacy protection Download PDF

Info

Publication number
CN103246903A
CN103246903A CN201310170371XA CN201310170371A CN103246903A CN 103246903 A CN103246903 A CN 103246903A CN 201310170371X A CN201310170371X A CN 201310170371XA CN 201310170371 A CN201310170371 A CN 201310170371A CN 103246903 A CN103246903 A CN 103246903A
Authority
CN
China
Prior art keywords
authentication
label
reader
data base
end data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310170371XA
Other languages
Chinese (zh)
Inventor
赵彬
钟辉
朱晓东
姚飞
孔维新
李鹤鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI ZHIKUN SEMICONDUCTOR CO., LTD.
Zhi Kun (Jiangsu) Semiconductor Co., Ltd.
Original Assignee
ZHI KUN (JIANGSU) SEMICONDUCTOR Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHI KUN (JIANGSU) SEMICONDUCTOR Co Ltd filed Critical ZHI KUN (JIANGSU) SEMICONDUCTOR Co Ltd
Priority to CN201310170371XA priority Critical patent/CN103246903A/en
Publication of CN103246903A publication Critical patent/CN103246903A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

Aiming at the possibility that user data can be stolen illegally to produce heavy losses in the RFID (Radio Frequency Identification Device) label read-write process, the invention provides a method for enhancing radio-frequency identification information safety and privacy protection and belongs to the technical field of wireless radio-frequency. The method is characterized in that ECC (Error Correction Code)or PCF (Physical Unclonable Functions) circuit authentication is adopted between a reader-writer and labels and RSA (Rational Software Architect) or ECC authentication technology is adopted between the reader-writer and a back end data base to protect communication; as for the authorization access, the labels can be accessed and the back end data base can be queried only by the reader-writer being subjected to legal authentication; the reader is authenticated by the back end data base; traditional public key based authentication method is adopted between the back end data base and the reader; and only legal labels can be acquired by the legal reader-writer or can update status information in the identification of the labels. The method has the advantage that in conventional RFID label read-write, the defect that the RFID label can respond the reader-writer directly without the permission of the owner to query and steal the existent user data which results in the possibility of heavy losses and the like can be overcome.

Description

Strengthen the method for information in radio frequency safety and secret protection
Technical field
The present invention is directed to the RFID(radio-frequency (RF) identification) user data can illegally be usurped the possibility that produces heavy losses in the label read-write process, has proposed a kind of method that strengthens information in radio frequency safety and secret protection, belongs to the wireless radio-frequency field.
Background technology
Internet of Things (Internet of things) is the important trend of present information networking development, is called as computing machine, the internet third wave of world's information industry afterwards, and radio RF recognition technology RFID is one of Internet of Things gordian technique.The RFID technology is a kind of contactless automatic identification technology, it is identified destination object automatically and obtains related data by radiofrequency signal, but, distance strong with its identification radio read-write, signal penetration capacity, long service life, good environmental adaptability, can many labels identify simultaneously, the information storage easily big and data advantage such as can rewrite, be used widely in recent years.
When existing RFID label is read and write, the RFID label does not need just directly to respond through its owner's permission the inquiry of read write line, do not have the user to be read by near read write line under the situation of perception, exist user data can illegally be usurped the possibility that produces heavy losses.Perhaps reveal individual's sensitive information, particularly may expose user's location privacy, make the user tracked.In addition, after label information is read, itself also exist to be replicated or the risk of " clone ".
Summary of the invention
The purpose of this invention is to provide a kind of method that strengthens information in radio frequency safety and secret protection; when solving existing RFID label read-write, do not inquire about existing user data and can illegally be usurped the deficiencies such as possibility that produce heavy losses because the RFID label does not need to allow just directly to respond read write line through its owner.
The objective of the invention is to be achieved through the following technical solutions, a kind of method that strengthens information in radio frequency safety and secret protection is characterized in that, described method is the authentication of granted access and label; Described granted access, have only read write line ability access tag, inquiry back-end data base through legal authentication, back-end data base authenticates reader, adopt tradition based on the authentication method of PKI between back-end data base and the reader, as the authentication based on RSA or ECC, also can adopt the authentication based on symmetric key; The authentication of described label has only legal label just can be obtained by legal read write line or update mode information, thereby can prevent bootlegging or " clone's " label.
The authentication of described label can be adopted the authentication based on ECC, also can adopt PCF(Physical Unclonable Functions) circuit realizes the uniqueness of label.
Described PCF circuit refers to that there is the difference of inevitable technological parameter in the chip production process, extract the difference parameter that produces in the chip manufacturing proces, generate a plurality of, unique, uncertain challenge responses is right, be stored in back-end data base, during each authenticating tag, select a challenge message to send to label, make the authentication to label after then the response message of the response message of label and storage being compared, in order to guarantee privacy, the reader end need be right to the enough challenge responses of each tag storage, challenge response between reader and the label can have strict time restriction, attacks thereby resist possible third party.
The present invention is by increasing the mode of granted access, to adopting ECC or PCF(Physical Unclonable Functions between read write line and the label) adopt RSA or ECC authentication techniques to protect communicating by letter between circuit authentication, read write line and the back-end data base, have only through the read write line of legal authentication could access tag, the inquiry back-end data base; Described granted access, have only read write line ability access tag, inquiry back-end data base through legal authentication, back-end data base authenticates reader, adopt tradition based on the authentication method of PKI between back-end data base and the reader, as the authentication based on RSA or ECC, also can adopt the authentication based on symmetric key; The authentication of described label has only legal label just can be obtained by legal read write line or update mode information, thereby can prevent bootlegging or " clone's " label.When having solved the read-write of existing RFID label, do not inquire about existing user data and can illegally be usurped the deficiencies such as possibility that produce heavy losses because the RFID label does not need to allow just directly to respond read write line through its owner.
Embodiment
Further specify the present invention in conjunction with the embodiments, back-end data base authenticates read write line, adopt tradition based on the authentication method of PKI between back-end data base and the read write line, comprise the authentication based on RSA or ECC, also can adopt the authentication mode based on symmetric key.
Authentication between read write line and the label comprises the authentication based on ECC, and PCF circuit authentication cheaply.The PCF authentication refers to that there is inevitable technologic nuance in the chip production process, the characteristic that these differences have is unpredictable, can not imitate and copy, even the manufacturer of chip also can not copy identical difference parameter from the another one chip, this unique trait of chip can be used as the anti-clone's of chip function: the difference of extracting inevitable generation in the chip manufacturing proces, generate a plurality of, unique, uncertain challenge responses is right, is stored in back-end data base.During each authenticating tag, select a challenge message to send to label, make the authentication to label after then the response message of the response message of label and storage being compared.In order to guarantee privacy, reader need be right to the enough challenge responses of each tag storage, to satisfy a large amount of label authentication needs.
In addition, in order further to strengthen the safety of the challenge response between reader and the label, can strictness limit the time of challenge response, attack thereby resist possible third party.Have only legal label just can be obtained by legal read write line or update mode information.Thereby can prevent bootlegging or " clone's " label.

Claims (3)

1. a method that strengthens information in radio frequency safety and secret protection is characterized in that, described method is the authentication of granted access and label; Described granted access, have only read write line ability access tag, inquiry back-end data base through legal authentication, back-end data base authenticates reader, adopt tradition based on the authentication method of PKI between back-end data base and the reader, as the authentication based on RSA or ECC, also can adopt the authentication based on symmetric key; The authentication of described label has only legal label just can be obtained by legal read write line or update mode information, thereby can prevent bootlegging or " clone's " label.
2. the method for enhancing information in radio frequency safety according to claim 1 and secret protection; it is characterized in that; the authentication of label can be adopted the authentication based on ECC, also can adopt PCF(Physical Unclonable Functions) circuit realizes the uniqueness of label.
3. the method for enhancing information in radio frequency safety according to claim 2 and secret protection; it is characterized in that; the PCF circuit refers to that there is the difference of inevitable technological parameter in the chip production process; extract the difference parameter that produces in the chip manufacturing proces; generate a plurality of; unique; uncertain challenge responses is right; be stored in back-end data base; during each authenticating tag; select a challenge message to send to label; make the authentication to label after then the response message of the response message of label and storage being compared; in order to guarantee privacy; the reader end need be right to the enough challenge responses of each tag storage; challenge response between reader and the label can have strict time restriction, attacks thereby resist possible third party.
CN201310170371XA 2013-05-10 2013-05-10 Method for enhancing radio-frequency identification information safety and privacy protection Pending CN103246903A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310170371XA CN103246903A (en) 2013-05-10 2013-05-10 Method for enhancing radio-frequency identification information safety and privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310170371XA CN103246903A (en) 2013-05-10 2013-05-10 Method for enhancing radio-frequency identification information safety and privacy protection

Publications (1)

Publication Number Publication Date
CN103246903A true CN103246903A (en) 2013-08-14

Family

ID=48926416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310170371XA Pending CN103246903A (en) 2013-05-10 2013-05-10 Method for enhancing radio-frequency identification information safety and privacy protection

Country Status (1)

Country Link
CN (1) CN103246903A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899827A (en) * 2015-12-17 2017-06-27 杭州海康威视数字技术股份有限公司 Image data acquiring, inquiry, video frequency monitoring method, equipment and system
CN108021835A (en) * 2016-11-04 2018-05-11 Em微电子-马林有限公司 For providing the method for distorting ring status of radio frequency transponder to reader

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101542496A (en) * 2007-09-19 2009-09-23 美国威诚股份有限公司 Authentication with physical unclonable functions
CN102158494A (en) * 2011-04-18 2011-08-17 电子科技大学 Low-cost radio frequency identification (RFID) security authentication protocol capable of shielding illegal reader-writer
CN102646203A (en) * 2012-02-29 2012-08-22 电子科技大学 RFID (Radio Frequency Identification Device) data transmission and authentication system and method
CN102916957A (en) * 2012-10-15 2013-02-06 北京理工大学 Safe, reliable and low-cost RFID mutual authentication method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101542496A (en) * 2007-09-19 2009-09-23 美国威诚股份有限公司 Authentication with physical unclonable functions
CN102158494A (en) * 2011-04-18 2011-08-17 电子科技大学 Low-cost radio frequency identification (RFID) security authentication protocol capable of shielding illegal reader-writer
CN102646203A (en) * 2012-02-29 2012-08-22 电子科技大学 RFID (Radio Frequency Identification Device) data transmission and authentication system and method
CN102916957A (en) * 2012-10-15 2013-02-06 北京理工大学 Safe, reliable and low-cost RFID mutual authentication method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899827A (en) * 2015-12-17 2017-06-27 杭州海康威视数字技术股份有限公司 Image data acquiring, inquiry, video frequency monitoring method, equipment and system
CN108021835A (en) * 2016-11-04 2018-05-11 Em微电子-马林有限公司 For providing the method for distorting ring status of radio frequency transponder to reader
CN108021835B (en) * 2016-11-04 2020-12-08 Em微电子-马林有限公司 Method for providing a tamper ring status of a radio frequency transponder to a reader

Similar Documents

Publication Publication Date Title
US10916114B1 (en) Exit-code-based RFID loss-prevention system
EP3118776B1 (en) Security authentication method for hiding ultra high frequency electronic tag identifier
CN105554035B (en) A kind of electronic lock system and its control method
US12093767B1 (en) RFID tags with public and private inventory states
US20070034686A1 (en) Protection of non-promiscuous data in an rfid transponder
CN103854042B (en) RFID label reader-writer authentication and label anti-cloning method
CN103218591A (en) Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same
CN106161442A (en) A kind of system control user login method
WO2014177934A2 (en) Chain of custody with release process
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
US9911018B1 (en) RFID tags with digital signature subportions
CN101945123A (en) RFID mobile phone and combination key technology-based authenticity identification method
CN101645138A (en) Radio frequency identification (RFID) privacy authenticating method
CN201229570Y (en) Mobile hard disc data protection apparatus
WO2012041070A1 (en) Radio frequency identification tag access method and device
CN103246903A (en) Method for enhancing radio-frequency identification information safety and privacy protection
US9495570B2 (en) Method for authenticating an RFID tag
CN110276423A (en) A kind of RFID Verification System for chip finger print of high encryption
CN203104483U (en) Fingerprint authentication platform and NFC application terminal
CN104579673A (en) Interactive authentication method between RFID card and card reader
KR101053636B1 (en) Encryption/decryption method and system for rfid tag and reader using multi algorithm
CN113988103A (en) RFID identification method based on multiple tags
US20230376703A1 (en) Multiple identifiers of radio frequency identification (rfid) tags
CN104680225A (en) Security certificate and AES (Advanced Encryption Standard) encryption method of RFID (radio frequency identification device) (840MHz - 845MHz) automobile electronic mark
JP6616179B2 (en) Electronic key system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB03 Change of inventor or designer information

Inventor after: Zhu Xiaodong

Inventor after: Zhong Hui

Inventor before: Zhao Bin

Inventor before: Zhong Hui

Inventor before: Zhu Xiaodong

Inventor before: Yao Fei

Inventor before: Kong Weixin

Inventor before: Li Heming

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: ZHAO BIN ZHONG HUI ZHU XIAODONG YAO FEI KONG WEIXIN LI HEMING TO: ZHU XIAODONG ZHONG HUI

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160127

Address after: 211400, No. 9, Tai Tai Road, Yizheng Economic Development Zone, Yizheng, Jiangsu, Yangzhou

Applicant after: Zhi Kun (Jiangsu) Semiconductor Co., Ltd.

Applicant after: SHANGHAI ZHIKUN SEMICONDUCTOR CO., LTD.

Address before: 211400, No. 9, Tai Tai Road, Yizheng Economic Development Zone, Yizheng, Jiangsu, Yangzhou

Applicant before: Zhi Kun (Jiangsu) Semiconductor Co., Ltd.

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130814