[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN103516520A - Data safe transmission system and method based on electronic tag - Google Patents

Data safe transmission system and method based on electronic tag Download PDF

Info

Publication number
CN103516520A
CN103516520A CN201310459905.0A CN201310459905A CN103516520A CN 103516520 A CN103516520 A CN 103516520A CN 201310459905 A CN201310459905 A CN 201310459905A CN 103516520 A CN103516520 A CN 103516520A
Authority
CN
China
Prior art keywords
electronic tag
write line
read write
authentication server
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310459905.0A
Other languages
Chinese (zh)
Inventor
袁磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhangjagang City Su Da Ecommerce Co Ltd
Original Assignee
Zhangjagang City Su Da Ecommerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhangjagang City Su Da Ecommerce Co Ltd filed Critical Zhangjagang City Su Da Ecommerce Co Ltd
Priority to CN201310459905.0A priority Critical patent/CN103516520A/en
Publication of CN103516520A publication Critical patent/CN103516520A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a data safe transmission system and method based on an electronic tag. The method comprises the steps of electronic tag generation and electronic tag identification. The generation step of the electronic tag is used for generating the electronic tag. Under the sleep condition of the electronic tag, requirements of any readers can not be responded, information of the electronic tag is prevented from being pried upon by illegal readers, a legal reader sends a sleep release code to a radio frequency electronic tag to attempt to activate the sleep tag to read tag data, after the tag data are successfully read, and the tag data and an identify identification code are together uploaded to a verification server. The identification step of the electronic tag is mainly used for reading encryption information of the electronic tag, and identifying the electronic tag through the encryption information. Through identification and verification of the electronic tag, safety of data transmission is effectively protected.

Description

A kind of data safe transmission system and method based on electronic tag
Technical field
The present invention relates to electronic information technical field, particularly a kind of data safe transmission system and method based on electronic tag.
Background technology
REID is to utilize RF-wise to communicate by letter to reach the objects such as identification, tracking, location and management of article at a distance.REID is in industrial automation, business automation, and communications and transportation control and management, the various fields such as false proof, even military use is with a wide range of applications, and has caused at present widely and has paid close attention to.
Utilize electronic tag and the reader that REID is made to be widely used, particularly as the electronic tag of Internet of things node, can effectively store the various information of accompanying article and by these information of the communications with reader.In logistics field, adopt REID can increase work efficiency significantly compared to traditional mode manually taking stock.But because the opening of its wireless channel of REID makes any read write line that meets relevant art parameter can obtain the information of electronic tag, some to merchandise news than more sensitive application scenario in, be inappropriate.Particularly in commodity logistics field, because the opening of wireless channel causes data, easily reveal and even by lawless person, stolen and then forge, if lawless person uses the read write line corresponding to electronic radio frequency tags technical parameter, and then the electronic labeling information of stealing commodity even utilizes the information that steals to forge electronic tag to be attached in fake and inferior commodities and to adulterate, can upset normal commercial activity like this.This problem becomes one of subject matter affecting REID large-scale promotion application.
Current RFID Technology On Data Encryption is also in the exploratory stage, so far also there is no general international agreement or standard, because the main information carrier of REID is EPC (the Electronic Product Code) code being stored in label, EPC code is the unique coding in the whole world that each electronic radio frequency tags is given, and it is current comparatively popular method that EPC code is carried out to encryption.Concrete measure is included in electronic tag and introduces encrypted circuit, and the coded communication that realizes label and reader is not leaked out with the original EPC of protection product to ensure the fail safe of communicating by letter, and this method can prevent that lawless person from stealing label information protection communication data.But these class methods have only proposed a kind of thought, system-level solution is not proposed, lack a series of supporting safety measure in the links of producing, circulate, so it is far from being enough only proposing the thought of this encryption EPC, because existing RFID Data Security is not mature enough, there is no the defects such as system-level solution
Summary of the invention
For this reason, the present invention proposes a kind of data safe transmission system and method based on electronic tag, can eliminate fully one or more problems that restriction and defect due to prior art cause.
Additional advantages of the present invention, object and characteristic, a part will be elucidated in the following description, and another part will be significantly or be acquired from enforcement of the present invention by the investigation of the explanation to below for those of ordinary skill in the art.By the structure of pointing out especially in the specification at word and claims and accompanying drawing, can realize and obtain the object of the invention and advantage.
The invention provides a kind of data safe transmission method based on electronic tag, comprise the generation step of electronic tag and the identification step of electronic tag, it is characterized in that,
The generation step of described electronic tag is mainly used in generating electronic tag, at electronic tag sleep state, to can not respond the request of any read write line, to prevent illegal read write line, spy upon the information of label, legal read write line sends breaking dormancy password attempt to radio electronic label and activates dormancy label and start reading tag data, uploads in authentication server after reading successfully together with self identification password;
The identification step of described electronic tag is mainly used in the enciphered message of reading electronic labels, and by described enciphered message, electronic tag is identified.
Preferably, the generation step of electronic tag specifically comprises the steps:
Step (a): the secret key encryption EPC information of mandate is write in electronic tag, and before using, make it in resting state by the dormancy instruction password of electronic tag,
Step (b): by electronic tag with corresponding target association together, self identification password of the EPC information of electronic tag, target information and default authority checking read write line is imported in the data center of background authentication server system.
Preferably, the generation step of described electronic tag further comprises:
Step (c): checking read write line is to authentication server application authentication, authentication server, to checking read write line distribution read write line identification password and label breaking dormancy password and the label command-destruct information of having put on record, cannot obtain corresponding authentication password for illegal read write line.
Preferably, the identification step of electronic tag specifically comprises the steps:
Step (e): checking read write line sends label dormancy activating pin to activate the electronic tag of dormancy the encryption EPC information of reading electronic labels, is sent to authentication server by the encryption EPC information reading together with himself identification password subsequently;
Step (f): whether the authentication server first identity of authentication read write line is legal, the identity of checking read write line is legal goes out original EPC data by secret key decryption, is connected to afterwards data center and determines whether as legal EPC.
Preferably, described step (f) further comprises: if confirm that target information and the destroy command of storing in legal Jiu Jiang data center send to checking read write line, checking read write line is received the destroy command of authentication server, can send command-destruct to electronic tag, make electronic tag enter permanent failure state.
Preferably, described electronic tag is passive ultrahigh frequency electronic tag.
The present invention also provides a kind of data safe transmission system based on electronic tag, it is characterized in that, described system comprises: the checking reading and writing device system at user terminal place and background authentication server system, and wherein, the checking reading and writing device system at user terminal place comprises checking read write line and electronic tag; Background authentication server system comprises authentication server and data center;
The EPC information that described electronic tag comprises encryption, and before using in resting state;
Described checking read write line is for sending label dormancy activating pin to activate the electronic tag of dormancy the encryption EPC information of reading electronic labels, subsequently the encryption EPC information reading is sent to authentication server together with himself identification password;
Described data center is for self identification password and target information corresponding to electronic tag of the EPC information of store electrons label, checking read write line, and communicates with authentication server;
Described authentication server is being stored the private cipher key of encrypted electronic label, whether the authentication server first identity of authentication read write line is legal, the identity of checking read write line legally goes out original EPC data by secret key decryption, being connected to afterwards data center determines whether as legal EPC, if confirm that target information and the destroy command of storing in legal Jiu Jiang data center send to checking read write line, checking read write line is received the destroy command of authentication server, can send command-destruct to electronic tag, make electronic tag enter permanent failure state.
Preferably, described safe transmission and Verification System also comprise the user terminal that is positioned at checking reading and writing device system place, the target information that described user terminal sends for Receipt Validation server.
Preferably, described checking read write line specifically communicates by Wi-Fi mode and authentication server.
Preferably, described electronic tag is passive ultrahigh frequency electronic tag.
Beneficial effect of the present invention: method and system of the present invention utilizes the sleep technology of electronic tag; in conjunction with private key encryption EPC, checking read write line identification and background server authentication; coordinate passive ultrahigh frequency electronic tag; strengthened the practicality for various particular application, effectively protected target information safe, reduce application cost, realize RFID data security and false-proof function.
Accompanying drawing explanation
Fig. 1 is according to the structural representation of the data safe transmission system embodiment of the present invention, based on electronic tag.
Fig. 2 is according to the flow chart of the data safe transmission method embodiment of the present invention, based on electronic tag.
Embodiment
Below in conjunction with accompanying drawing, embodiment of the present invention is described further.
RFID transfer of data of the present invention and Verification System and method specifically complete by following three phases.
Data encapsulation: commodity production manufacturer has electronic radio frequency tags made to order and authorizes privately owned encryption key to it to electronic radio frequency tags manufacturer as required, object is encrypt original commodity EPC and the EPC of encryption is write with a brush dipped in Chinese ink to electronic tag, form unique encryption EPC information, even if this encryption EPC information leakage is gone out like this, outside because not grasping key also cannot recover original EPC information, this measure provides basic encryption measures.Tailor-made electronic radio frequency tags is characterized in that the sleep mode of customization: electronic radio frequency tags is noticed dormancy password by the just no longer any request of response except breaking dormancy order after dormancy.Can guarantee so not grasp the information that the read write line of breaking dormancy password cannot be spied upon electronic tag.Electronic tag is used default label sleep command to make label enter into resting state and pays businessman when dispatching from the factory.Customization of electronic label is also write with a brush dipped in Chinese ink the EPC of encryption the process that can regard data encapsulation to the process in electronic tag as.
Data acquisition: the malicious data attack that the effect of the identification password of checking read write line is subject to illegal read write line for fear of authentication server is set up, an authentication server checking read write line mandate identification password to legal authorization, and read write line must first be verified read write line identity before sending authorization information to authentication server, authentication server system abandons without exception to the read write line information of identification failure, only responds the information that valid reader sends over; Label dormancy activating pin is used for active electron radio-frequency (RF) tag so that read electronic radio frequency tags encryption EPC information by read write line.In the time need to verifying electronic tag, first read write line can attempt sending label dormancy activating pin to activate the label of dormancy and to read the encryption EPC information of radio electronic label, subsequently the encryption EPC information reading is uploaded in authentication server and is verified by control terminal together with self-identification password.Read write line reads the encryption EPC of radio electronic label and in conjunction with the stage that self identification password uploads to authentication server checking, can regard the process of data acquisition and transfer of data as.
Data verification: the private cipher key of storing encrypted electronic label in authentication server.Authentication server is only accepted the request that information that the valid reader by authentication sends over does not respond all unidentified read write lines.After verifying by data center, authentication server determines whether as legal electronic tag data, then by secret key decryption, go out original EPC data, connection data center determines whether as legal EPC afterwards, if confirm that the commodity details of storing in legal Jiu Jiang data center send on user terminal.If checking electronic radio frequency tags information success so read write line can send command-destruct to electronic radio frequency tags, make label enter into permanent failure state.
Specifically as shown in Figure 1, comprising: the checking reading and writing device system at user terminal place and background authentication server system, wherein, the checking reading and writing device system at user terminal place comprises checking read write line and electronic tag; Background authentication server system comprises authentication server and data center;
The EPC information that described electronic tag comprises encryption, and before using in resting state;
Described checking read write line is for sending label dormancy activating pin to activate the electronic tag of dormancy the encryption EPC information of reading electronic labels, subsequently the encryption EPC information reading is sent to authentication server together with himself identification password;
Described data center is for self identification password and target information corresponding to electronic tag of the EPC information of store electrons label, checking read write line, and communicates with authentication server;
Described authentication server is being stored the private cipher key of encrypted electronic label, whether the authentication server first identity of authentication read write line is legal, the identity of checking read write line legally goes out original EPC data by secret key decryption, being connected to afterwards data center determines whether as legal EPC, if confirm that target information and the destroy command of storing in legal Jiu Jiang data center send to checking read write line, checking read write line is received the destroy command of authentication server, can send command-destruct to electronic tag, make electronic tag enter permanent failure state.
Here, safe transmission and Verification System also comprise the user terminal that is positioned at checking reading and writing device system place, the target information that described user terminal sends for Receipt Validation server.
Here, described checking read write line specifically communicates by Wi-Fi mode and authentication server.
Here, electronic tag specifically can adopt passive ultrahigh frequency electronic tag, can also effectively reduce the consumption of power consumption and volume in kind, has reduced the dependence for external power source, has strengthened the practicality for various particular application.
This system can be applied in RFID commodity counterfeit prevention and Information Authentication field, coordinates the measures such as coded communication and multifactor authentication, can realize preferably RFID Security Data Transmission and authentication function.
Based on above-mentioned transfer of data and Verification System, RFID Security Data Transmission and authentication method that the present invention proposes, idiographic flow as shown in Figure 2, comprises that preparatory stage of electronic tag and electronic tag are in the radio-frequency (RF) identification field stage, wherein,
The preparatory stage of electronic tag comprises the steps:
Step (a): the secret key encryption EPC information of mandate is write in electronic tag, and the dormancy instruction password by electronic tag before using in resting state,
Step (b): by electronic tag with corresponding target association together, self identification password of the EPC information of electronic tag, target information and default authority checking read write line is imported in the data center of background authentication server system;
Step (c): checking read write line is to authentication server application authentication, authentication server, to checking read write line distribution read write line identification password and label breaking dormancy password and the label command-destruct information of having put on record, cannot obtain corresponding authentication password for illegal read write line;
At label sleep state, to can not respond the request of any read write line, that is to say the information that cannot read sleep label, can prevent that so illegal read write line from spying upon the information of label, legal read write line sends breaking dormancy password attempt to radio electronic label and activates dormancy label and start reading tag data, uploads in authentication server after reading successfully together with self identification password.
Electronic tag comprised the steps: in the radio-frequency (RF) identification field stage
Step (d): checking read write line sends label dormancy activating pin to activate the electronic tag of dormancy the encryption EPC information of reading electronic labels, is sent to authentication server by the encryption EPC information reading together with himself identification password subsequently;
Step (e): whether the authentication server first identity of authentication read write line is legal, if the identity of checking read write line is legal, by secret key decryption, go out original EPC data, being connected to afterwards data center determines whether as legal EPC, if confirm that target information and the destroy command of storing in legal Jiu Jiang data center send to checking read write line, checking read write line is received the destroy command of authentication server, can send command-destruct to electronic tag, make electronic tag enter permanent failure state.
Here, if recognize, be illegally to verify read write line, can refuse illegally to verify the request of read write line, abandon invalid data.
Can find out, RFID transfer of data of the present invention and Verification System and method have advantages of that high reliability and cost are easy to control, set up the data encapsulation of electronic tag, data acquisition, transfer of data and data verification are in the application system of one, therefore this RFID Security Data Transmission can be relatively easy to be combined and be applied in logistic industry for target information quick-searching and false proof with electronic tag with Verification System, can be in time, effectively verify state information and the true and false information of target, adopt label self-destruction technology simultaneously, in effective safety detection makes target after the true and false of target, electronic tag lost efficacy at once, prevented electronic tag reusing by lawless person.Method and system of the present invention utilizes the sleep technology of electronic tag; in conjunction with private key encryption EPC, checking read write line identification and background server authentication; coordinate passive ultrahigh frequency electronic tag; strengthened the practicality for various particular application, effectively protected target information safe, reduce application cost, realize RFID data security and false-proof function.
Above content is only preferred embodiment of the present invention, for those of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, and this description should not be construed as limitation of the present invention.

Claims (10)

1. the data safe transmission method based on electronic tag, comprises the generation step of electronic tag and the identification step of electronic tag, it is characterized in that,
The generation step of described electronic tag is mainly used in generating electronic tag, at electronic tag sleep state, to can not respond the request of any read write line, to prevent illegal read write line, spy upon the information of label, legal read write line sends breaking dormancy password attempt to radio electronic label and activates dormancy label and start reading tag data, uploads in authentication server after reading successfully together with self identification password;
The identification step of described electronic tag is mainly used in the enciphered message of reading electronic labels, and by described enciphered message, electronic tag is identified.
2. the data safe transmission method based on electronic tag according to claim 1, is characterized in that, the generation step of electronic tag specifically comprises the steps:
Step (a): the secret key encryption EPC information of mandate is write in electronic tag, and before using, make it in resting state by the dormancy instruction password of electronic tag,
Step (b): by electronic tag with corresponding target association together, self identification password of the EPC information of electronic tag, target information and default authority checking read write line is imported in the data center of background authentication server system.
3. the data safe transmission method based on electronic tag according to claim 2, is characterized in that, the generation step of described electronic tag further comprises:
Step (c): checking read write line is to authentication server application authentication, authentication server, to checking read write line distribution read write line identification password and label breaking dormancy password and the label command-destruct information of having put on record, cannot obtain corresponding authentication password for illegal read write line.
4. the data safe transmission method based on electronic tag according to claim 1, is characterized in that, the identification step of electronic tag specifically comprises the steps:
Step (e): checking read write line sends label dormancy activating pin to activate the electronic tag of dormancy the encryption EPC information of reading electronic labels, is sent to authentication server by the encryption EPC information reading together with himself identification password subsequently;
Step (f): whether the authentication server first identity of authentication read write line is legal, the identity of checking read write line is legal goes out original EPC data by secret key decryption, is connected to afterwards data center and determines whether as legal EPC.
5. the data safe transmission method based on electronic tag according to claim 4, it is characterized in that, described step (f) further comprises: if confirm that target information and the destroy command of storing in legal Jiu Jiang data center send to checking read write line, checking read write line is received the destroy command of authentication server, can send command-destruct to electronic tag, make electronic tag enter permanent failure state.
6. the data safe transmission method based on electronic tag according to claim 5, is characterized in that, described electronic tag is passive ultrahigh frequency electronic tag.
7. the data safe transmission system based on electronic tag, it is characterized in that, described system comprises: the checking reading and writing device system at user terminal place and background authentication server system, and wherein, the checking reading and writing device system at user terminal place comprises checking read write line and electronic tag; Background authentication server system comprises authentication server and data center;
The EPC information that described electronic tag comprises encryption, and before using in resting state;
Described checking read write line is for sending label dormancy activating pin to activate the electronic tag of dormancy the encryption EPC information of reading electronic labels, subsequently the encryption EPC information reading is sent to authentication server together with himself identification password;
Described data center is for self identification password and target information corresponding to electronic tag of the EPC information of store electrons label, checking read write line, and communicates with authentication server;
Described authentication server is being stored the private cipher key of encrypted electronic label, whether the authentication server first identity of authentication read write line is legal, the identity of checking read write line legally goes out original EPC data by secret key decryption, being connected to afterwards data center determines whether as legal EPC, if confirm that target information and the destroy command of storing in legal Jiu Jiang data center send to checking read write line, checking read write line is received the destroy command of authentication server, can send command-destruct to electronic tag, make electronic tag enter permanent failure state.
8. the data safe transmission system based on electronic tag according to claim 7, it is characterized in that, described safe transmission and Verification System also comprise the user terminal that is positioned at checking reading and writing device system place, the target information that described user terminal sends for Receipt Validation server.
9. the data safe transmission system based on electronic tag according to claim 7, is characterized in that, described checking read write line specifically communicates by Wi-Fi mode and authentication server.
10. the data safe transmission system based on electronic tag according to claim 7, is characterized in that, described electronic tag is passive ultrahigh frequency electronic tag.
CN201310459905.0A 2013-09-30 2013-09-30 Data safe transmission system and method based on electronic tag Pending CN103516520A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310459905.0A CN103516520A (en) 2013-09-30 2013-09-30 Data safe transmission system and method based on electronic tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310459905.0A CN103516520A (en) 2013-09-30 2013-09-30 Data safe transmission system and method based on electronic tag

Publications (1)

Publication Number Publication Date
CN103516520A true CN103516520A (en) 2014-01-15

Family

ID=49898602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310459905.0A Pending CN103516520A (en) 2013-09-30 2013-09-30 Data safe transmission system and method based on electronic tag

Country Status (1)

Country Link
CN (1) CN103516520A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550313A (en) * 2015-09-21 2017-03-29 深圳洲斯移动物联网技术有限公司 A kind of automatic identifying method of goods
CN106850604A (en) * 2017-01-22 2017-06-13 陕西外号信息技术有限公司 A kind of safety recognizing method of optical label
CN107491795A (en) * 2016-06-13 2017-12-19 摩托罗拉移动有限责任公司 Silent RFID states and recovery
CN108734238A (en) * 2018-05-11 2018-11-02 上海宜链物联网有限公司 A kind of quick sorting method and system based on EPC
CN109146038A (en) * 2018-09-11 2019-01-04 安徽安为科技有限公司 The recognition methods and its system that train based on RFID misses the stop
CN109255267A (en) * 2018-09-11 2019-01-22 安徽安为科技有限公司 Vehicle platform RFID identification device
CN110390377A (en) * 2019-07-11 2019-10-29 柏仁新材料(广州)股份有限公司 A kind of RFID electronic label system and method for anti-copying
CN111182068A (en) * 2019-12-31 2020-05-19 广州万物信息科技股份有限公司 Internet of things gateway control method and system
CN111552538A (en) * 2020-04-21 2020-08-18 深圳信息职业技术学院 Virtual simulation-based training system construction method and device and computer equipment
CN112184201A (en) * 2020-08-29 2021-01-05 微码科技咸宁有限公司 Charging station payment system and method based on bidirectional encryption verification
CN112800407A (en) * 2021-02-06 2021-05-14 深圳市新时空智能系统有限公司 Remote management intelligent electronic tag safety read-write system and read-write method thereof
CN112861550A (en) * 2019-11-27 2021-05-28 思力科(深圳)电子科技有限公司 Electronic tag object searching method, object searching system and computer readable storage medium

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550313A (en) * 2015-09-21 2017-03-29 深圳洲斯移动物联网技术有限公司 A kind of automatic identifying method of goods
CN107491795B (en) * 2016-06-13 2020-11-03 摩托罗拉移动有限责任公司 Silent RFID status and recovery
CN107491795A (en) * 2016-06-13 2017-12-19 摩托罗拉移动有限责任公司 Silent RFID states and recovery
CN106850604A (en) * 2017-01-22 2017-06-13 陕西外号信息技术有限公司 A kind of safety recognizing method of optical label
CN108734238A (en) * 2018-05-11 2018-11-02 上海宜链物联网有限公司 A kind of quick sorting method and system based on EPC
CN109146038A (en) * 2018-09-11 2019-01-04 安徽安为科技有限公司 The recognition methods and its system that train based on RFID misses the stop
CN109255267A (en) * 2018-09-11 2019-01-22 安徽安为科技有限公司 Vehicle platform RFID identification device
CN110390377A (en) * 2019-07-11 2019-10-29 柏仁新材料(广州)股份有限公司 A kind of RFID electronic label system and method for anti-copying
CN110390377B (en) * 2019-07-11 2023-01-10 柏仁新材料(广州)股份有限公司 Anti-copy RFID electronic tag system and method thereof
CN112861550A (en) * 2019-11-27 2021-05-28 思力科(深圳)电子科技有限公司 Electronic tag object searching method, object searching system and computer readable storage medium
CN112861550B (en) * 2019-11-27 2024-04-26 思力科(深圳)电子科技有限公司 Electronic tag object searching method, object searching system and computer readable storage medium
CN111182068A (en) * 2019-12-31 2020-05-19 广州万物信息科技股份有限公司 Internet of things gateway control method and system
CN111552538A (en) * 2020-04-21 2020-08-18 深圳信息职业技术学院 Virtual simulation-based training system construction method and device and computer equipment
CN111552538B (en) * 2020-04-21 2023-03-24 深圳信息职业技术学院 Virtual simulation-based training system construction method and device and computer equipment
CN112184201A (en) * 2020-08-29 2021-01-05 微码科技咸宁有限公司 Charging station payment system and method based on bidirectional encryption verification
CN112800407A (en) * 2021-02-06 2021-05-14 深圳市新时空智能系统有限公司 Remote management intelligent electronic tag safety read-write system and read-write method thereof
CN112800407B (en) * 2021-02-06 2022-09-02 深圳市新时空智能系统有限公司 Remote management intelligent electronic tag safety read-write system and read-write method thereof

Similar Documents

Publication Publication Date Title
CN102646203B (en) RFID (Radio Frequency Identification Device) data transmission and authentication system and method
CN103516520A (en) Data safe transmission system and method based on electronic tag
CN103065168B (en) A kind of electronic tag method for anti-counterfeit and system
CN102737260B (en) Method and apparatus for identifying and verifying RFID privacy protection
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
CN107231231B (en) Method and system for terminal equipment to safely access Internet of things
CN102855504B (en) RFID label tag ownership transfer method and device thereof
US20100277287A1 (en) Communication data protection method based on symmetric key encryption in rfid system, and apparatus for enabling the method
CN103443719A (en) Anti-identity theft and information security system process
CN106411505B (en) A kind of mutual authentication method and Mobile RFID system of Mobile RFID
CN103281189A (en) Light weight class safe protocol certification system and method for radio frequency identification equipment
JP2009521041A (en) Method for controlling communication in RFID system, RFID device and RFID system
CN102855574A (en) Method and system for identifying commodity information based on NFC (Near Field Communication)
CN101976363A (en) Hash function based RFID (Radio Frequency Identification Devices) authentication method
CN109309916A (en) A kind of transmission of RFID data and Verification System and method
CN104217335A (en) Storing device and method for commodity authenticity verification information, and commodity authenticity verification method
CN102594550A (en) RFID internal mutual authentication safety protocol based on secret key array
CN102289701A (en) Labeled data burglary prevention method based on EPC (Electronic Product Code) protocol, electronic label and reader-writer
CN102289688A (en) Method and device for label processing and access
CN103235995A (en) Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone
CN104537539A (en) Method for activating and forbidding anti-counterfeit label based on two-dimension code recognition technology
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
CN106339888A (en) RFID wine product all-round anti-fake monitoring method
CN103793742A (en) Technology of electronic tag safety authentication and information encryption of traffic electronic license plate
CN103455927A (en) Dark-red enameled pottery anti-counterfeiting recognition system based on RFID

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140115

WD01 Invention patent application deemed withdrawn after publication