CN1433558A - Method of authenticating tag - Google Patents
Method of authenticating tag Download PDFInfo
- Publication number
- CN1433558A CN1433558A CN00818777A CN00818777A CN1433558A CN 1433558 A CN1433558 A CN 1433558A CN 00818777 A CN00818777 A CN 00818777A CN 00818777 A CN00818777 A CN 00818777A CN 1433558 A CN1433558 A CN 1433558A
- Authority
- CN
- China
- Prior art keywords
- tag
- data set
- stored
- security block
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Data Mining & Analysis (AREA)
- Accounting & Taxation (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Burglar Alarm Systems (AREA)
- Credit Cards Or The Like (AREA)
Abstract
本发明揭示了一种用于认证如射频识别(RFID)标签的方法,该方法提供具有与标签地址密码相关的存储安全块的RFID标签;从该标签获得标签地址;至少密码转换标签地址和专用数据组以获得安全块;随后将该安全块与储存的安全块比较。如果两个安全块匹配,则认为该标签是认证的。或者,至少使用专用数据组对储存的安全块作密码转换,以获得标签地址,而且随后将该标签地址与储存的标签地址比较。如果两个标签地址匹配,则认为标签是认证的。
The present invention discloses a method for authenticating tags such as radio frequency identification (RFID) by providing an RFID tag with a stored security block cryptographically associated with the tag address; deriving the tag address from the tag; converting at least the tag address and the private data set to obtain a security block; this security block is then compared with the stored security block. If the two security blocks match, the tag is considered authenticated. Alternatively, at least the stored security block is cryptographically transformed using the private data set to obtain the tag address, and the tag address is then compared with the stored tag address. If the two tag addresses match, the tag is considered authenticated.
Description
发明领域field of invention
本发明涉及认证设备,标签,标记或类似物品的方法,在一个实施例中涉及密码地验证一个匹配部件系统的标签的方法,使得作为匹配部件系统的一部分的硬件只要询问认证为匹配部件系统的一部分的标签。The present invention relates to a method of authenticating a device, tag, tag or the like, and in one embodiment to a method of cryptographically authenticating a tag of a matched component system such that hardware that is part of the matched component system is only required to query for authentication as the matched component system part of the label.
发明背景Background of the invention
加密已经使用多年,使得信息安全,防止不应访问那些信息的人获取信息的努力。信息首先被第一授权用户编码,并随后由第二授权用户解码以获取对该信息的访问。简单的加密例子是使字母表中的每个字母对应唯一的数,然后使用这些数,而不是字母表示感兴趣的信息。知道该加密算法(对每个字母用唯一的数替代)的人然后能对此信息解码以获得对它的访问。然而,此类简单加密容易破密,因此不是非常安全。Encryption has been used for many years to keep information secure and prevent efforts to obtain it by those who should not have access to it. The information is first encoded by a first authorized user and then decoded by a second authorized user to gain access to the information. A simple example of encryption is to make each letter of the alphabet correspond to a unique number, and then use these numbers instead of letters to represent information of interest. Someone who knows the encryption algorithm (replacing each letter with a unique number) can then decode this information to gain access to it. However, such simple encryption is easy to break and therefore not very secure.
尤其在现在,使用其它更加复杂的加密形式,保证从一个授权用户到另一个用户电子传输的信息的安全。例如,常希望在因特网上发送如消息,信用卡号等私人信息并以适当的安全方式加密该信息。为这些目的的合适类型的加密是“公共密钥/专用密钥”加密技术,这在有关加密的普通教科书及专利中有叙述。Especially now, other more complex forms of encryption are used to secure information transmitted electronically from one authorized user to another. For example, it is often desirable to send private information such as messages, credit card numbers, etc. over the Internet and encrypt the information in a suitable secure manner. A suitable type of encryption for these purposes is "public key/private key" encryption, which is described in general textbooks and patents on encryption.
本专利文献包括一系列有关使用技术跟踪制造物品或完成物品认证的参考文献。例如,见题为“Methods and System for Performing ArticleAuthentication”的欧洲专利0 710 934 A2;题为“Method of PreventingCounterfeiting of Articles of Manufacture”为欧洲专利0 889 448 A2,和题为“System for Identifying,Authenticating and Tracking ManufacturedArticle”的美国专利No.5,768,384。但是,在这些和其他参考文献中叙述的方法不适合于象在下面参考本发明描述的用标签作为认证的手段。This patent document includes a series of references to the use of technology to track manufactured items or to complete the authentication of items. See, for example, European Patent 0 710 934 A2 entitled "Methods and System for Performing Article Authentication"; European Patent 0 889 448 A2 entitled "Method of Preventing Counterfeiting of Articles of Manufacture", and European Patent 0 889 448 A2 entitled "System for Identifying, Authenticating and US Patent No. 5,768,384 for "Tracking Manufacturing Article". However, the methods described in these and other references are not suitable for using tags as a means of authentication as described below with reference to the present invention.
发明概述Summary of the invention
能提供包含有关物品信息的标签或标记与用于读、扫描或询问那些标签和标记的硬件一起作为匹配部件系统的部分。那样系统的例子包括条形码标记(或打印设备)和扫描器;和射频识别(RFID)标签和RFID询问器。鼓励使用匹配部件系统的一个理由是能使系统避免询问属于其它系统的标签。因此,错误消息减少,而且可能使用两个或多个系统在同一位置识别不同的物料。其他理由涉及产品和系统保修。即,制造商常保修他们的产品一段时间,或只有当那些产品与制造者用于反复测试该产品的部件一起用时才实现给定的功能,但如果不是如此则不提供或减少保修。在这里描述类型的匹配部件系统的情况下,如果标签询问器与认证的标签一起使用,系统提供者保修系统的操作,其他情况下不保修。具体说来,当系统提供者卖给用户RFID标签和用于将信息写入那些标签和/或从标签中读出信息的设备时,系统提供者可以保修RFID系统的操作。Tags or tags containing information about the item can be provided as part of a matching component system along with hardware for reading, scanning or interrogating those tags and tags. Examples of such systems include bar code labels (or printing devices) and scanners; and radio frequency identification (RFID) tags and RFID interrogators. One reason to encourage the use of matching component systems is to enable the system to avoid interrogating tags belonging to other systems. As a result, there are fewer error messages and it is possible to use two or more systems to identify different materials at the same location. Other reasons relate to product and system warranties. That is, manufacturers often warrant their products for a period of time, or perform a given function only when those products are used with components that the manufacturer used to repeatedly test the product, but otherwise no or reduced warranty. In the case of matched component systems of the type described here, the system provider warrants the operation of the system if the tag interrogator is used with an authenticated tag, and not otherwise. Specifically, the system provider may warrant the operation of the RFID system when it sells the user RFID tags and the equipment used to write information to and/or read information from those tags.
例如,这里描述的认证方法使系统或用户能认证射频识别(RFID)标签,该方法通过提供具有密码上与标签地址相关的存储安全块的RFID标签,从该标签获取标签地址,将密码转换至少施加到标签地址和专用数据组以获得安全块,并随后将该安全块与储存的安全块比较。如果两个安全块匹配,则认为该标签是认证的。另外,储存的安全块能使用至少一个专用数据组作密码上转换以获取标签地址,然后该标签地址能与储存的标签地址比较。如果两个标签地址匹配,则认为该标签是认证的。还描述了使用本发明的RFID标签。本发明在图书馆资料(如图书)中RFID标签的便携式或固定式RFID询问器的询问中发现特别有用的应用。For example, the authentication method described herein enables a system or user to authenticate a radio frequency identification (RFID) tag by providing the RFID tag with a stored security block cryptographically associated with the tag address, deriving the tag address from the tag, translating the cryptographic at least Applied to the tag address and private data set to obtain a security block, which is then compared with the stored security block. If the two security blocks match, the tag is considered authenticated. Additionally, the stored security block can be cryptographically up-converted using at least one private data set to obtain the tag address, which can then be compared with the stored tag address. If the two tag addresses match, the tag is considered authenticated. RFID tags using the present invention are also described. The present invention finds particularly useful application in the interrogation of RFID tags in library materials, such as books, by portable or fixed RFID interrogators.
附图简述Brief description of the drawings
本发明参考附图作更详细的描述,附图中:The present invention is described in more detail with reference to the accompanying drawings, in which:
图1是一个过程图,示出本发明方法提供带有作为标签地址的密码转换的安全块的标签的一个实施例。Figure 1 is a process diagram illustrating an embodiment of the inventive method for providing a tag with a cryptographically translated security block as the tag address.
图2是一个过程图,示出本发明方法通过现场加密和比较认证标签的一个Fig. 2 is a process diagram showing that the method of the present invention encrypts and compares an authentication tag by field
实施例。Example.
图3是一个过程图,示出本发明方法通过现场解密和比较认证标签的一个Fig. 3 is a process diagram showing that the method of the present invention deciphers and compares an authentication tag on the spot
实施例。Example.
图4是按本发明的一个RFID标签的示意图。Figure 4 is a schematic diagram of an RFID tag according to the present invention.
本发明的详细描述Detailed description of the invention
I.概述I. Overview
简言之,按本发明认证RFID标签的一个较佳方法包括下列步骤。首先从标签存储器中获取识别该标签的标签地址。其次,标签地址和专用数据组以及可选的公用数据组被密码转换以提供存入标签存储器中的安全块。第三,当希望认证该标签时,再次获取该标签地址,并与数据组一起作密码转换以提供安全块,该安全块与储存的安全块比较。或者,换一种方法,使用初始转换的逆转换将安全块作密码转换,包括适当的数据,获得标签地址,后者与储存的标签地址比较,第四,如果两个安全块(或标签地址,取决于使用哪个过程)相同,则该标签是认证的。否则,该标签不是认证的。Briefly, a preferred method of authenticating an RFID tag according to the present invention includes the following steps. First obtain the tag address identifying the tag from the tag memory. Next, the tag address and the private data set and optionally the public data set are cryptographically converted to provide a secure block stored in the tag's memory. Third, when it is desired to authenticate the tag, the tag address is again obtained and cryptographically converted with the data set to provide a security block which is compared with the stored security block. Or, alternatively, use the inverse of the initial transformation to cryptographically transform the security block, include the appropriate data, and obtain the tag address, which is compared to the stored tag address. Fourth, if two security blocks (or tag addresses , depending on which process is used), the tag is authenticated. Otherwise, the label is not certified.
下面将更详细地描述本发明的这些步骤,和其他特征,变化及实施例。虽然借助于RFID系统描述了本发明,但能将信息写入标签或从标签中读出(最好是电方法)的其他系统也在本发明的范围之内。These steps, and other features, variations and embodiments of the invention will be described in more detail below. Although the invention has been described in terms of an RFID system, other systems capable of writing information to or reading (preferably electronically) information from tags are also within the scope of the invention.
II.标签II. Label
适合于结合本发明使用的RFID标签在题为“Identification Tag WithEnhanced Security”的PCT公开号99/65006中有描述,它的权利赋予了本发明的受让人。如图4所示,RFID标签10通常包括一个连接到如集成电路(IC)那样的存储设备14的天线12。标签能包括如电池或电容那样的电源,或可由RFID询问器单独供电,使得它从RFID询问器以无线电波的形式既接受电能又接收信息。提供的标签可带有粘合剂(通常是压敏粘合剂)。使得它能粘合到例如图书馆的图书上。本专业的熟练人员知晓,图4只表示适用于RFID标签的几何形状和天线设计的许多实施例中的一个。RFID tags suitable for use in connection with the present invention are described in PCT Publication No. 99/65006 entitled "Identification Tag With Enhanced Security," the rights of which are assigned to the assignee of the present invention. As shown in FIG. 4, RFID tag 10 generally includes an antenna 12 connected to a memory device 14, such as an integrated circuit (IC). The tag can include a power source such as a battery or capacitor, or can be powered solely by the RFID interrogator so that it receives both power and information in the form of radio waves from the RFID interrogator. Labels can be provided with an adhesive (usually a pressure sensitive adhesive). This enables it to be glued to e.g. library books. Those skilled in the art appreciate that Figure 4 represents only one of many embodiments of geometries and antenna designs suitable for RFID tags.
适用的RFID标签的一个商业例子是从Dallas,Texas的Texas InstrumentsCompany可得到牌号为“TIRIS Tag-it”的标签。Tag-it商标的RFID标签包括存储不可变数据的第一存储器存储区(称为“永久性标签存储器”),这些数据如识别特定标签的唯一不可变数据(这里称为“标签地址”);和储存用户提供的可变信息的第二存储器存储区(这里称为“可变标签存储器“)。现在的Tag-it商标RFID标签包括256位可变标签存储器,虽然将来似乎可得到更多关于上述或其他RFID标签的存储器。Tag-it商标RFID标签以13.56MHz通讯频率工作,虽然可以使用在其他频率下工作的标签和询问器。Tag-it商标RFID标签系统也能与从Texas Instruments得到的Windows兼容软件一起使用,以简化Tag-it商标RFID标签和设备的使用。A commercial example of a suitable RFID tag is available under the designation "TIRIS Tag-it" from Texas Instruments Company of Dallas, Texas. RFID tags of the Tag-it trademark include a first memory storage area (referred to as "permanent tag memory") that stores immutable data such as unique immutable data that identifies a particular tag (referred to herein as a "tag address"); and a second memory storage area (referred to herein as "variable tag memory") for storing variable information provided by the user. Current Tag-it branded RFID tags include 256 bits of variable tag memory, although more memory on these or other RFID tags appears to be available in the future. Tag-it trademarked RFID tags operate on the 13.56MHz communication frequency, although tags and interrogators operating on other frequencies can be used. The Tag-it Trademark RFID Labeling System can also be used with Windows-compatible software from Texas Instruments to simplify the use of Tag-it Trademark RFID labels and equipment.
A.永久性标签存储器A. Permanent Tag Storage
标签地址最好存入永久性标签存储器。而且最好此标签地址是唯一的,以保证在使用过程中能识别和访问特定的标签。例如,此标签地址可是32位长,允许超过40亿个唯一的地址。通常此标签地址在制造期间被编程在标签中并“在工厂被锁定”,使得以后不能修改。如下所述,标签地址可以包括储存在永久性标签存储器和可变标签存储器中的信息。Tag addresses are preferably stored in permanent tag memory. And it is preferable that the tag address is unique, so as to ensure that a specific tag can be identified and accessed during use. For example, the tag address can be 32 bits long, allowing over 4 billion unique addresses. Typically this tag address is programmed into the tag during manufacture and is "factory locked" so that it cannot be modified later. As described below, tag addresses may include information stored in permanent tag memory and variable tag memory.
B.可变标签存储器B. Variable Tag Memory
受到可用存储器数量的任何应用限止,可变标签存储器可用于储存有关标签制造者和标签本身的信息(例如标签何时何地制造),和/或有关该标签附着的或将附着的物品的信息。例如,当RFID标签将附着在图书馆的图书或其他资料上时,关于该书的题目,作者,借用次数,检查状态和使用统计能存入该可变标签存储器中。存入可变标签存储器的其他信息包括拥有此图书和资料的图书馆名,出借图书的特定图书馆部门,该图书和资料的适当位置(如特定书架位置),物品类型(书,CD,录像带)等。Subject to any application limitations of the amount of memory available, variable tag memory can be used to store information about the maker of the tag and the tag itself (such as when and where the tag was made), and/or information about the item to which the tag is or will be attached . For example, when an RFID tag is to be attached to a book or other material in a library, the title, author, borrowing times, checking status and usage statistics about the book can be stored in the variable tag memory. Other information stored in variable tag memory includes the name of the library that owns the book and material, the specific library department that lent the book, the appropriate location for the book and material (e.g., a specific shelf location), the type of item (book, CD, videotape, etc.) )wait.
可变标签存储器的一部分能被锁定,使得不能被不小心地修改,例如,标签上与属于图书馆的物品有关的数据能受保护,免受基于RFID的航线包裹处理系统或其他RFID写入器的不小心的修改。锁定过程因不同RFID标签供应商而异。在Texas Instruments Tag-it商标的RFID标签的情况下,能以此方式锁定的最小可变存储器块是32位,它能以下述方式存储某些密码转换信息。A portion of the variable tag memory can be locked so that it cannot be inadvertently modified, for example, data on the tag related to items belonging to a library can be protected from RFID-based airline package handling systems or other RFID writers inadvertent modification. The locking process varies between different RFID tag suppliers. In the case of Texas Instruments Tag-it brand RFID tags, the smallest block of variable memory that can be locked in this way is 32 bits, which can store certain cryptographic information in the following manner.
III.阅读器(询问源)和写入器(编程器)III. Reader (query source) and writer (programmer)
在本发明的一个实施例中使用的RFID标签是可读且可编程的。即,RFID标签能被询问源读或询问以获取存储在标签的可变标签存储器中的某些或所有信息,供用户使用或处理,并且RFID标签也能用系统或用户提供的信息编程(写入)。合适的RFID询问源和RFID写入器可以从Dallas,Texas的TexasInstruments买到,名为“Commander 320”。The RFID tags used in one embodiment of the invention are readable and programmable. That is, the RFID tag can be read or interrogated by an interrogating source to obtain some or all of the information stored in the tag's variable tag memory for use or processing by the user, and the RFID tag can also be programmed (written) with system or user-supplied information. enter). A suitable RFID interrogation source and RFID writer is commercially available from Texas Instruments of Dallas, Texas under the designation "Commander 320".
在本发明的一个实施例中,某些信息被密码转换,并由RFID写入器写入到可用的可变标签存储器的一部分,且在使用时RFID阅读器询问该标签,确定该标签是否为认证的,下面将作详细描述。RFID阅读器最好能实际上同时询问多个RFID标签(Commander 320商标的询问源现在能每秒询问30个RFID标签),虽然此特征是不是必须的。In one embodiment of the invention, certain information is cryptographically converted and written to a portion of the variable tag memory available by the RFID writer, and in use the RFID reader interrogates the tag to determine if the tag is authentication, which will be described in detail below. Preferably, the RFID reader can actually interrogate multiple RFID tags simultaneously (the Interrogation Source of the Commander 320 brand can currently interrogate 30 RFID tags per second), although this feature is not required.
IV.加密IV. Encryption
在标签被认证以前,从标签获得某些信息且将其他信息存入其中。具体说来,从标签获得标签地址,如下所述作密码转换,然后将得到的安全块存入标签。图1中示出按本发明提供具有存储安全块的标签的示例性过程。Before a tag is authenticated, certain information is obtained from the tag and other information is stored in it. Specifically, the tag address is obtained from the tag, cryptographically converted as described below, and the resulting security block is stored in the tag. An exemplary process for providing a tag with a stored security block according to the present invention is shown in FIG. 1 .
步骤100读出或询问标签以获得标签地址102。然后标签地址与至少一个数据组级联,最好是二个数据组。如果使用一个数据组,则该数据组是通常不面向大众的专用数据组106,但被存入询问源并被其使用。如果,如在本描述中余下部分中那样使用两个数据组,则一个数据组是专用的,另一个是公用数据组104,如图1所示。标签地址和数据组可以是交叉的或者若需要是混合编码的(而不是级联的),虽然并不认为这样大大增加了系统的安全性和可靠性。Step 100 reads or interrogates the tag to obtain the tag address 102 . The tag address is then concatenated with at least one data set, preferably two data sets. If a data set is used, it is a private data set 106 which is generally not available to the general public, but is stored and used by the query source. If, as in the remainder of this description, two data sets are used, one data set is private and the other is public data set 104, as shown in FIG. 1 . Tag addresses and data sets can be interleaved or mixed coded if desired (rather than concatenated), although this is not believed to add much to the security and reliability of the system.
公用及专用的数据组可以包括任何字符和/或数字串,并可以是用如ASCII,UTF-8或Unicode标准方法表示成二进制数据的人们可读字符串。根据需要,公用数据能广泛发布或不发布。换言之,公用和专用数据组仅仅是两个数据组,用户对它们施加了不同的安全等级。数据组,尤其是专用数据组,最好是随机字符和/或数字串,使得很难或不可能从密码转换的信息逆向操纵数据组。为建立数据组,能使用随机或基本上随机的处理,如随机数生成器。The public and private data sets can include any string of characters and/or numbers, and can be human-readable strings represented as binary data using standard methods such as ASCII, UTF-8 or Unicode. Public data can be widely distributed or not, as required. In other words, public and private data groups are just two data groups to which users impose different levels of security. The data set, especially the private data set, is preferably a random string of characters and/or numbers, making it difficult or impossible to reverse engineer the data set from the cryptographically converted information. To create data sets, random or substantially random processes can be used, such as random number generators.
公用的或专用的数据组能包含在用于建立和认证标签的软件中。通常,软件包括机器语言指令,它们对人们是不容易理解且不能被破译的,除非由非常专门的人花费大量的时间去做。因此,数据组最好很难在软件中定位,使得即使软件本身广泛发布,数据组对所有实际目的仍认为是专用的。公用和专用数据组的形式也可以选择,以便于在版权、贸易机密或其他法律下的合法保护,使得该数据组的任何非授权用户将侵犯合法保护的权利。Public or private data sets can be included in the software used to create and authenticate tags. Often, software includes machine language instructions that are not easily understood by humans and cannot be deciphered unless a very specialized human spends a significant amount of time doing it. Therefore, the data set is preferably difficult to locate in the software, so that even if the software itself is widely distributed, the data set is considered private for all practical purposes. The form of public and private data sets may also be selected to facilitate legal protection under copyright, trade secret or other laws such that any unauthorized user of the data set would violate legally protected rights.
虽然标签地址、公用数据组和专用数据组可以具有任何希望的长度和内容,例如标签地址可以具有32位信息,公用数据组至少具有32个字节信息,专用数据组至少具有32个字节信息。一个示例性标签地址是十六进制值0×012345678,示例性公用数据组可以是ASCII串“3M Radio FrequencyIdentification Systems”,而示例性专用数据组可以是0×0001E2882AC7B5C613FAF447170E90702957A5053C5C013D7235168E268DE990。Although the tag address, public data group, and private data group can have any desired length and content, for example, the tag address can have 32 bits of information, the public data group has at least 32 bytes of information, and the private data group has at least 32 bytes of information . An exemplary tag address is the hexadecimal value 0x012345678, an exemplary public data set may be the ASCII string "3M Radio Frequency Identification Systems", and an exemplary private data set may be 0x0001E2882AC7B5C613FAF447170E90702957A5053C5C013D7235168E268DE99
然后,标签地址102和专用数据组106及可选的公用数据组104送入密码转换算法108,如密码的散列算法,该算法转换数据,并输出如160位长的消息摘要110。密码转换包括传统的可逆加密,如数据加密标准(DES,它也被ANSI称为数据加密算法(DEA),被ISO称为DEA-1),以及其他有关技术,如使用诸如安全散列算法1或SHA1之类的单向密码散列。两种类型算法的例子及C编程语言的的详细源程序一起包括在由Bruce Schneier写的书AppliedCryptography,Protocols,Algorithms,and Source Code in C(John Wileyand Sons,Inc.1996(2d版))第442页开始部分和A.Menezes等人的书,“Handbook of Applied Cryptography,”第238页的开始部分中。虽然如DES-CBC-MAC和DES-DMAC那样的其他密码算法也能用作本发明的密码转换方法,但最好是如SHA1,MD5和RIPEMD-160那样的密码散列算法,因为它们针对已知消息摘要和公用数据组时逆向操纵专用数据的企图提供相当高级的安全性,还因为它们容易得到、容易实现、并免去重要的政府对使用的限止。与上面引用的参考文献Applied Cryptography中描述的SHA1相关的源程序现在可以从Bruce Schneier,Counterpane Systems,7115 W.North Ave.,Suit 16,OakPark,IL 60302-1002得到计算机盘片上获得。The tag address 102 and private data set 106 and optional public data set 104 are then fed into a cryptographic transformation algorithm 108, such as a cryptographic hash algorithm, which transforms the data and outputs a message digest 110, eg, 160 bits long. Cryptographic transformations include traditional reversible encryption such as the Data Encryption Standard (DES, which is also known as the Data Encryption Algorithm (DEA) by ANSI and DEA-1 by ISO), and other related techniques such as the use of secure hashing algorithms such as 1 Or a one-way cryptographic hash like SHA1. Examples of both types of algorithms are included in the book Applied Cryptography, Protocols, Algorithms, and Source Code in C (John Wiley and Sons, Inc. 1996 (2d edition)) by Bruce Schneier, along with detailed source code for the C programming language, page 442 at the beginning of page 1 and in the beginning of page 238 of A. Menezes et al., "Handbook of Applied Cryptography." Although other cryptographic algorithms such as DES-CBC-MAC and DES-DMAC can also be used as the cryptographic conversion method of the present invention, cryptographic hash algorithms such as SHA1, MD5, and RIPEMD-160 are preferred because they are specific to existing cryptographic algorithms. Provides a fairly high level of security against attempts to reverse-manipulate private data while knowing message digests and public data sets, also because they are readily available, easy to implement, and free from significant government restrictions on use. Source programs related to SHA1 as described in the reference Applied Cryptography cited above are now available on computer disks from Bruce Schneier, Counterpane Systems, 7115 W. North Ave., Suit 16, Oak Park, IL 60302-1002.
若由于可变标签存储器限止,希望在标签上不存储整个消息摘要,则可指定消息摘要的特定部分并存入(写入)RFID标签的可变标签存储器。这部分消息摘要是安全块112。此外,如上所述,若希望在可变标签存储器中锁定安全块以防不小心的更改,则可能是32位的可变标签存储器的锁定单元或块,可根据指定或存入可变标签存储器的消息摘要确定安全信息块的适当大小。也可以希望将消息摘要或安全块存入永久性标签存储器,或只将消息摘要或安全块存入永久性标签存储器,永久性标签存储器通常由标签的制造者制造,或其他人为他们制造。为方便起见,密码转换(如SHA1)的输出称为“消息摘要”,而存入RFID标签的消息摘要的整体或部分被称为“安全块”。因此,安全块112能通过指定至少部分消息摘要建立,随后以上述步骤114所示的方式写入RFID标签。If it is desired not to store the entire message digest on the tag due to variable tag memory limitations, then a particular portion of the message digest can be designated and stored (written) into the RFID tag's variable tag memory. This part of the message digest is the security block 112 . In addition, as mentioned above, if it is desired to lock the security block in the variable tag memory to prevent inadvertent changes, it may be a 32-bit variable tag memory lock unit or block, which can be specified or stored in the variable tag memory The message digest determines the appropriate size of the security information block. It may also be desirable to store the message digest or security block, or only the message digest or security block, in permanent tag memory, which is typically made by the tag's maker, or someone else makes it for them. For convenience, the output of cryptographic conversion (such as SHA1) is called "message digest", and the whole or part of the message digest stored in the RFID tag is called "safety block". Thus, the security block 112 can be established by specifying at least a partial message digest, which is then written to the RFID tag in the manner shown at step 114 above.
V.认证V. Certification
一旦根据密码转换表示消息摘要或消息摘要一部分的安全块被存入标签,该标签能用于现场认证。认证以若干不同方式完成,下面描述其中的两种。第一种包括下面用于加密标签相同的过程,随后将结果(安全块)与存储的安全块比较以确定它们是否相同。如果两个安全块相同,则标签是认证的。如果它们不同,则标签不是认证的。这称为“现场加密和比较”。Once a security block representing a message digest or a portion of a message digest is stored in a tag according to a cryptographic transformation, the tag can be used for field authentication. Authentication is accomplished in a number of different ways, two of which are described below. The first involves following the same process for encrypting the tags, then comparing the result (the security block) with the stored security block to determine if they are the same. If the two security blocks are the same, the tag is authenticated. If they are different, the label is not certified. This is called "field encryption and comparison".
下面描述的第二种认证过程主要包括逆过程。即,认证过程开始于从标签存储器获取存储的安全块,使用专用数据组,若需要包括公用数据组,执行逆向加密转换以获得标签地址。然后将标签地址与存储的标签地址比较。如果两个标签地址相同,则标签是认证的。若它们不同,则标签不是认证的。这称为“现场解密和比较”。为使用这第二种认证过程,安全块应包括整个消息摘要。The second authentication process described below mainly includes the reverse process. That is, the authentication process begins by retrieving the stored security block from the tag memory, using the private data set, including the public data set if necessary, performing an inverse cryptographic transformation to obtain the tag address. The tag address is then compared to the stored tag address. If the addresses of two tags are the same, the tags are authenticated. If they are different, the tag is not certified. This is called "field decryption and comparison". To use this second authentication procedure, the security block should include the entire message digest.
这些认证过程参考图2和3作更详细描述。These authentication processes are described in more detail with reference to FIGS. 2 and 3 .
A.现场加密和比较A. Field Encryption and Comparison
图2示出用于判定某个标签是否认证的现场加密和比较过程步骤。现场用户遵循图1所示的同样方法,随后将最终的值与储存的安全块比较以判定标签是否为认证的。Figure 2 illustrates the field encryption and comparison process steps used to determine whether a tag is authenticated. The field user follows the same method as shown in Figure 1, then compares the final value to the stored security block to determine if the tag is authenticated.
在图2所示的实施例中,步骤200到212与图1的对应部分相同。即,获得标签地址200;将标签地址202、专用数据组206及可选的公用数据组204提供给密码转换算法208,后者提供消息摘要210,从中建立安全块212。为通过比较认证标签,如214所示RFID阅读器从标签获得存储的安全块,并将安全块212的结果(如216所示)与214中从标签获得的存储安全块比较。若两个安全块相同,则标签是认证的。若两个消息不匹配,则用户能得出结论,该物品不是认证的,并采取任何适当的行动。例如,这种行动包括终止处理粘贴此标签的物品。In the embodiment shown in FIG. 2 , steps 200 to 212 are the same as the corresponding parts in FIG. 1 . That is, the tag address 200 is obtained; the tag address 202, private data set 206 and optional public data set 204 are provided to a cryptographic transformation algorithm 208 which provides a message digest 210 from which a security block 212 is built. To authenticate the tag by comparison, the RFID reader obtains the stored security block from the tag as shown at 214 and compares the result of the security block 212 (shown at 216 ) with the stored security block obtained from the tag at 214 . If the two security blocks are the same, the tag is authenticated. If the two messages do not match, the user can conclude that the item is not authenticated and take any appropriate action. Such action includes, for example, terminating processing of items with this label attached.
B.现场解密和比较B. Field decryption and comparison
图3示出现场解密和比较过程步骤,用于判定某个标签是否为认证的。如图3所示,步骤300从标签获得安全块(在此实施例中安全块等同于消息摘要);安全块302、专用数据集306和可选的公用数据集304被送到密码转换算法308,后者提供标签地址310。然后,RFID阅读器从标签获得储存的标签地址312,并将标签地址310与312中获得的储存标签地址比较(如314所示)。如果两个标签地址相同,则标签是认证的。如果两个标签地址不同,则标签不是认证的。密码转换可以是可逆的块密码、流密码、或其他合适的过程。Figure 3 shows the field decryption and comparison process steps for determining whether a tag is authenticated or not. As shown in Figure 3,
密码转换308可以是用于建立存储在RFID标签上的安全块的密码转换的逆过程。在一个实施例中,密码转换可以是块密码,如以加密方式(加密安全块)和解密方式(现场解密安全块)运行的DES,其中块密码的密钥是公用和专用数据组的函数。例如,数据组能通过密码散列函数以产生160位的消息摘要,且选择这些位的预定子集以建立DES块密码的56位密钥。对于如RC5那样接收长密钥的块密码,密钥可以是级联或组成数据组的位的其他预定排列。
VI.本发明过程的变化VI. Variations of the Process of the Invention
应该注意到,在图1、2和3中示出的某些步骤能以与图中示出的不同的次序完成。例如在图2中从标签中获取存储安全块的步骤214可发生在过程的较早阶段,甚至作为过程的第一步骤。类似地,在图3中从标签获取存储的标签地址的步骤312可以发生在过程的较早阶段。而且,虽然标签地址、公用数据组和专用数据组示为到密码转换算法的独立输入,但是如上所述它们在输入密码变换算法以前可以级联、交叉或另外组合。It should be noted that some of the steps shown in Figures 1, 2 and 3 can be performed in a different order than shown in the figures. For example in Figure 2 the step 214 of retrieving the stored security block from the tag may occur at an earlier stage of the process, even as the first step of the process. Similarly, step 312 of retrieving the stored tag address from the tag in FIG. 3 may occur at an earlier stage in the process. Also, while the tag address, public data set, and private data set are shown as separate inputs to the cryptographic transformation algorithm, they may be concatenated, interleaved, or otherwise combined as described above prior to input into the cryptographic transformation algorithm.
在另外实施例中,标签地址和安全块的作用能够颠倒。当存储标签地址和安全块使得一个比另一个更难改变时,这样的颠倒是有用的。如果标签制造者写入标签地址而应用经销商写入安全块,则颠倒标签地址和安全块的作用在某些情况是有用的。In another embodiment, the roles of tag address and security block can be reversed. Such inversion is useful when storing tag addresses and security blocks makes one more difficult to change than the other. Reversing the role of the tag address and security block is useful in some cases if the tag manufacturer writes the tag address and the application distributor writes the security block.
按照下例,本发明被更详细地描述。According to the following examples, the present invention is described in more detail.
例子example
本例是能与本发明方法结合使用的任意标签地址、公用数据组、和专用数据组的表示。以十六进制表示,标签地址可以是0×12345678。此地址能与ASCII串公用数据组“Copyright(c)2000,3M IPC.ALL Rights Reserved”级联,后者的十六进制标记是“0×43 0×6f 0×70 0×79 0×72 0×69 0×67 0×68 0×74 0×200×28 0×63 0×29 0×20 0×32 0×30 0×30 0×30 0×2c 0×20 0×33 0×4d 0×20 0×490×50 0×43 0×2e 0×20 0×41 0×6c 0×6c 0×20 0×52 0×69 0×67 0×68 0×74 0×730×20 0×52 0×65 0×73 0×65 0×72 0×76 0×65 0×64”。此级联数据将进一步与下述十六进制专用数据组级联:“0×e0 0×34 0×c7 0×f0 0×f9 0×f7 0×37 0×260×f6 0×19 0×53 0×15 0×11 0×64 0×e5 0×30 0×45 0×4b 0×e3 0×bf 0×6a 0×ca0×dc 0×6e 0×be 0×b4 0×84 0×e3 0×b1 0×2d 0×77 0×38”,后者可由计算机用伪随机数生成器产生。整个级联串使用SHA1密码散列算法处理,以十六进制表示的最终消息摘要是0×3 38 52 75 89 1c eb 2e 69cdc4a56031276413d6d702d。从中可以选择消息摘要中前8个字节中每一个的低半字节(4位)(如在上面消息摘要中下划线字符所示),随后它们被级联以提供安全块,以十六进制表示为0×35781e26,它能由RFID写入器存在RFID标签上。该标签随后使用上述现场加密和比较过程被认证,以判定该标签是否为认证的。This example is a representation of arbitrary tag addresses, public data sets, and private data sets that can be used in conjunction with the method of the present invention. In hexadecimal notation, the tag address can be 0×12345678. This address can be concatenated with the ASCII string public data set "Copyright(c) 2000, 3M IPC.ALL Rights Reserved", whose hexadecimal notation is "0×43 0×6f 0×70 0×79 0× 72 0×69 0×67 0×68 0×74 0×200×28 0×63 0×29 0×20 0×32 0×30 0×30 0×30 0×2c 0×20 0×33 0× 4d 0×20 0×490×50 0×43 0×2e 0×20 0×41 0×6c 0×6c 0×20 0×52 0×69 0×67 0×68 0×74 0×730×20 0×52 0×65 0×73 0×65 0×72 0×76 0×65 0×64”. This concatenated data will be further concatenated with the following hexadecimal dedicated data set: "0×e0 0×34 0×c7 0×f0 0×f9 0×f7 0×37 0×260×f6 0×19 0 ×53 0×15 0×11 0×64 0×e5 0×30 0×45 0×4b 0×e3 0×bf 0×6a 0×ca0×dc 0×6e 0×be 0×b4 0×84 0 ×e3 0×b1 0×2d 0×77 0×38”, the latter can be generated by a computer using a pseudo-random number generator. The entire concatenated string is processed using the SHA1 cryptographic hashing algorithm, and the final message digest in hexadecimal is 0×3 3 8 5 2 7 5 8 9 1 c e b 2 e 6 9cdc4a56031276413d6d702d. From which the lower nibbles (4 bits) of each of the first 8 bytes in the message digest are selected (as indicated by the underscore character in the message digest above), which are then concatenated to provide the security block, in hexadecimal The format is expressed as 0×35781e26, which can be stored on the RFID tag by the RFID writer. The tag is then authenticated using the field encryption and comparison process described above to determine whether the tag is authenticated.
在与图书馆资料(如图书)一起使用的RFID标签认证中,这里描述的认证方法发现特别有用的应用。能使用便携式(如手提的)RFID询问器询问RFID标签,且若标签是认证的,从RFID标签获得对图书馆馆员有用的其他信息。固定的RFID询问器,如顾客自助设备、职员工作站和只有光条形码的图书馆资料被转换成具有RFID标签的站点,也能使用本发明的认证方法。The authentication method described here finds particularly useful application in the authentication of RFID tags for use with library materials such as books. A portable (eg, hand-held) RFID interrogator can be used to interrogate the RFID tag and, if the tag is authenticated, obtain other information useful to the librarian from the RFID tag. Stationary RFID interrogators, such as customer self-service kiosks, staff workstations, and sites where only light barcoded library materials are converted to have RFID tags, can also use the authentication method of the present invention.
虽然大多数上述揭示被局限在由RFID阅读器通过使用某些加密(和在某些情况下解密)技术认证RFID标签的特定内容中,但是所揭示的方法的变化也在本发明的范围内。例如,可用以非射频的频率工作的标签、阅读器和写入器替代所述的那些。通过适当的修改,本发明能适用于条形码(包括二维条形码),其中条形码地址替代RFID标签地址,如此等等。While most of the above disclosure is limited to authenticating the specific content of an RFID tag by an RFID reader using certain encryption (and in some cases decryption) techniques, variations of the methods disclosed are within the scope of the present invention. For example, tags, readers and writers operating at frequencies other than radio frequency may be substituted for those described. With appropriate modifications, the present invention can be applied to barcodes (including two-dimensional barcodes) where the barcode address replaces the RFID tag address, and so on.
Claims (100)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US49890200A | 2000-02-04 | 2000-02-04 | |
| US09/498,902 | 2000-02-04 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN1433558A true CN1433558A (en) | 2003-07-30 |
Family
ID=23982972
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN00818777A Pending CN1433558A (en) | 2000-02-04 | 2000-05-23 | Method of authenticating tag |
Country Status (10)
| Country | Link |
|---|---|
| EP (1) | EP1257974A1 (en) |
| JP (1) | JP2003524242A (en) |
| KR (1) | KR20020074494A (en) |
| CN (1) | CN1433558A (en) |
| AR (1) | AR029034A1 (en) |
| AU (1) | AU5157600A (en) |
| BR (1) | BR0017090A (en) |
| CA (1) | CA2399092A1 (en) |
| MX (1) | MXPA02007518A (en) |
| WO (1) | WO2001057807A1 (en) |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100356384C (en) * | 2004-12-07 | 2007-12-19 | 三菱电机株式会社 | User authentication system and room entry/exit management system |
| CN101201943B (en) * | 2007-07-23 | 2010-12-29 | 游忠惠 | System and method for managing test paper using radio frequency recognizing technique |
| CN101976365A (en) * | 2010-11-05 | 2011-02-16 | 中国航天科工集团第二研究院七○六所 | Safe radio frequency identification system |
| CN101111853B (en) * | 2004-12-31 | 2012-07-04 | 英国电讯有限公司 | Device, method and system of control of data exchange |
| CN101305385B (en) * | 2005-09-07 | 2012-12-19 | Mil.数码贴标公司 | Digital labels for product authentication |
| CN102930303A (en) * | 2012-09-25 | 2013-02-13 | 安徽思米来电子科技有限公司 | Active and passive radio frequency identification method and system for security domains |
| CN102932338A (en) * | 2012-10-24 | 2013-02-13 | 中国航天科工集团第二研究院七〇六所 | System and method for safe network access of radio-frequency identification system |
| CN103679080A (en) * | 2012-09-20 | 2014-03-26 | 中兴通讯股份有限公司 | Tag identification distance control method, reader and system |
| US9218585B2 (en) | 2007-05-25 | 2015-12-22 | Hussmann Corporation | Supply chain management system |
Families Citing this family (42)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6724895B1 (en) | 1998-06-18 | 2004-04-20 | Supersensor (Proprietary) Limited | Electronic identification system and method with source authenticity verification |
| US7113095B2 (en) | 2000-05-22 | 2006-09-26 | Avery Dennison Corp. | Trackable files and systems for using the same |
| US6816075B2 (en) | 2001-02-21 | 2004-11-09 | 3M Innovative Properties Company | Evidence and property tracking for law enforcement |
| US7588185B2 (en) | 2001-06-07 | 2009-09-15 | 3M Innovative Properties Company | RFID data collection and use |
| US7137000B2 (en) | 2001-08-24 | 2006-11-14 | Zih Corp. | Method and apparatus for article authentication |
| US6894615B2 (en) | 2001-10-09 | 2005-05-17 | 3M Innovative Properties Company | Article with retroreflective and radio frequency-responsive features |
| WO2003050757A1 (en) | 2001-12-11 | 2003-06-19 | Tagsys Australia Pty Ltd | Secure data tagging systems |
| US6758405B2 (en) | 2001-12-19 | 2004-07-06 | 3M Innovative Properties Company | Article with retroreflective and radio frequency-responsive features |
| US20030130912A1 (en) | 2002-01-04 | 2003-07-10 | Davis Tommy Lee | Equipment management system |
| WO2004038644A2 (en) | 2002-10-25 | 2004-05-06 | Symbol Technologies, Inc. | Optimization of a binary tree traversal with secure communications |
| CZ20023713A3 (en) * | 2002-11-08 | 2004-06-16 | Atme S. R. O. | Method of registering and/or protecting goods and an implementation system for this method |
| WO2004086290A1 (en) * | 2003-03-26 | 2004-10-07 | Supersensor (Pty) Ltd (In Liquidation) | Authentication of radio frequency transponders |
| WO2005029764A1 (en) * | 2003-09-22 | 2005-03-31 | Nokia Corporation | Method and electronic terminal for rfid tag type encryption |
| EP2141629B1 (en) * | 2003-09-26 | 2017-06-21 | Nippon Telegraph and Telephone Corporation | Tag privacy protection method, tag device, program therefor and record medium carrying such program in storage |
| JP2005338908A (en) * | 2004-05-24 | 2005-12-08 | Sato Corp | Information recording medium and information alteration determination method for information recording medium |
| JP2005348306A (en) * | 2004-06-07 | 2005-12-15 | Yokosuka Telecom Research Park:Kk | Electronic tag system, electronic tag, electronic tag reader / writer, and program |
| US20080258864A1 (en) * | 2004-10-28 | 2008-10-23 | Mitsubishi Electeic Corporation | Communication Apparatus and Communication Method |
| JP2006127228A (en) * | 2004-10-29 | 2006-05-18 | Sato Corp | Warranty system and warranty card |
| KR100628315B1 (en) | 2004-11-29 | 2006-09-27 | 한국전자통신연구원 | Method and system for updating electronic identification tag value of transferred goods |
| DE102004059391C5 (en) * | 2004-12-09 | 2012-01-12 | Jörg Eberwein | Crypto-wireless-tag |
| JP4139382B2 (en) | 2004-12-28 | 2008-08-27 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Device for authenticating ownership of product / service, method for authenticating ownership of product / service, and program for authenticating ownership of product / service |
| US7647499B2 (en) * | 2005-03-24 | 2010-01-12 | Avaya Inc | Apparatus and method for ownership verification |
| KR100818244B1 (en) * | 2005-05-10 | 2008-04-02 | 삼성전자주식회사 | System for protecting tag-related information and method thereof |
| KR100682062B1 (en) * | 2005-06-23 | 2007-02-15 | 삼성전자주식회사 | Reader, Tag, Radio Identification System and Radio Identification Method |
| US8917159B2 (en) | 2005-08-19 | 2014-12-23 | CLARKE William McALLISTER | Fully secure item-level tagging |
| KR100699467B1 (en) * | 2005-09-28 | 2007-03-26 | 삼성전자주식회사 | RF-ID tag, RF-ID privacy system and method |
| GB2431545B (en) * | 2005-10-24 | 2011-01-12 | Chien Yaw Wong | Security-enhanced RFID system |
| KR100799560B1 (en) * | 2005-12-01 | 2008-01-31 | 한국전자통신연구원 | Security Method for Mobile Radio Identification, Mobile Radio Identification Reader and System for It |
| KR100772521B1 (en) * | 2005-12-12 | 2007-11-01 | 한국전자통신연구원 | RFID tag authentication apparatus and method in RFID system |
| US20070205864A1 (en) * | 2006-02-17 | 2007-09-06 | Datamars S.A. | Secure radio frequency identification system |
| KR100722363B1 (en) * | 2006-03-13 | 2007-05-28 | 강민섭 | RFID system, tag and authentication method with strong authentication protocol |
| US8791794B2 (en) * | 2006-03-31 | 2014-07-29 | British Telecommunications Plc | Method and device for obtaining item information using RFID tags |
| KR100760044B1 (en) | 2006-04-27 | 2007-09-18 | 고려대학교 산학협력단 | Tag read system and its method using self re-encryption protocol |
| JP4913520B2 (en) * | 2006-09-28 | 2012-04-11 | 株式会社横須賀テレコムリサーチパーク | Data authentication system and data authentication method |
| JP2008143669A (en) * | 2006-12-11 | 2008-06-26 | Brother Ind Ltd | Article management system, wireless tag, and wireless tag information reader |
| DE102007016329B4 (en) | 2007-04-04 | 2012-08-30 | Embedded Innovation Gmbh & Co. Kg | Authenticable label and apparatus for authenticating an authenticatable label |
| KR100848791B1 (en) * | 2007-11-06 | 2008-07-28 | 주식회사 이시티 | Tag data recording and acquisition method that enables security verification, tag data recording and acquisition device |
| JP5525133B2 (en) * | 2008-01-17 | 2014-06-18 | 株式会社日立製作所 | System and method for digital signature and authentication |
| DE102012109446B4 (en) * | 2012-10-04 | 2016-09-08 | Eckhard Rüter | System for the forgery-proof coding of electronic pigeon rings |
| US9225519B1 (en) | 2015-03-02 | 2015-12-29 | Federico Fraccaroli | Method, system, and apparatus for enabling secure functionalities |
| CN110366441B (en) | 2017-03-06 | 2022-06-28 | 康明斯滤清系统知识产权公司 | Original filter identification with filter monitoring system |
| US20210248439A1 (en) * | 2018-04-25 | 2021-08-12 | Eagile Incorporated | Method and apparatus for rfid authentication |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE2949351C2 (en) * | 1979-12-07 | 1982-04-15 | The Grey Lab. Establishment, 9490 Vaduz | Method and device for generating and checking documents and the document used therewith |
| FR2653248B1 (en) * | 1989-10-13 | 1991-12-20 | Gemolus Card International | PAYMENT OR INFORMATION TRANSFER SYSTEM BY ELECTRONIC MEMORY CARD. |
| FR2697929B1 (en) * | 1992-11-10 | 1995-01-13 | Innovatron Sa | Secure protocol for data exchange between a transfer device and a portable object. |
| US5832090A (en) * | 1995-08-10 | 1998-11-03 | Hid Corporation | Radio frequency transponder stored value system employing a secure encryption protocol |
| FR2764977B1 (en) * | 1997-06-18 | 1999-08-20 | Stella | ELECTRONIC LABEL COMPRISING MEANS FOR DETECTING A PHYSICAL SIZE |
| US6154137A (en) * | 1998-06-08 | 2000-11-28 | 3M Innovative Properties Company | Identification tag with enhanced security |
| EP0982687A1 (en) * | 1998-08-26 | 2000-03-01 | Datamars SA | Method for preventing or detecting fraud in an identification system |
-
2000
- 2000-05-23 BR BR0017090-9A patent/BR0017090A/en not_active IP Right Cessation
- 2000-05-23 CN CN00818777A patent/CN1433558A/en active Pending
- 2000-05-23 AU AU51576/00A patent/AU5157600A/en not_active Abandoned
- 2000-05-23 WO PCT/US2000/014191 patent/WO2001057807A1/en not_active Ceased
- 2000-05-23 MX MXPA02007518A patent/MXPA02007518A/en unknown
- 2000-05-23 JP JP2001556986A patent/JP2003524242A/en active Pending
- 2000-05-23 KR KR1020027010069A patent/KR20020074494A/en not_active Withdrawn
- 2000-05-23 CA CA002399092A patent/CA2399092A1/en not_active Abandoned
- 2000-05-23 EP EP00936230A patent/EP1257974A1/en not_active Withdrawn
-
2001
- 2001-02-01 AR ARP010100471A patent/AR029034A1/en not_active Application Discontinuation
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100356384C (en) * | 2004-12-07 | 2007-12-19 | 三菱电机株式会社 | User authentication system and room entry/exit management system |
| CN101111853B (en) * | 2004-12-31 | 2012-07-04 | 英国电讯有限公司 | Device, method and system of control of data exchange |
| CN101305385B (en) * | 2005-09-07 | 2012-12-19 | Mil.数码贴标公司 | Digital labels for product authentication |
| US9218585B2 (en) | 2007-05-25 | 2015-12-22 | Hussmann Corporation | Supply chain management system |
| CN101201943B (en) * | 2007-07-23 | 2010-12-29 | 游忠惠 | System and method for managing test paper using radio frequency recognizing technique |
| CN101976365A (en) * | 2010-11-05 | 2011-02-16 | 中国航天科工集团第二研究院七○六所 | Safe radio frequency identification system |
| CN103679080A (en) * | 2012-09-20 | 2014-03-26 | 中兴通讯股份有限公司 | Tag identification distance control method, reader and system |
| CN103679080B (en) * | 2012-09-20 | 2017-02-15 | 天津中兴智联科技有限公司 | Tag identification distance control method, reader and system |
| CN102930303A (en) * | 2012-09-25 | 2013-02-13 | 安徽思米来电子科技有限公司 | Active and passive radio frequency identification method and system for security domains |
| CN102932338A (en) * | 2012-10-24 | 2013-02-13 | 中国航天科工集团第二研究院七〇六所 | System and method for safe network access of radio-frequency identification system |
| CN102932338B (en) * | 2012-10-24 | 2015-01-21 | 中国航天科工集团第二研究院七〇六所 | System and method for safe network access of radio-frequency identification system |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20020074494A (en) | 2002-09-30 |
| EP1257974A1 (en) | 2002-11-20 |
| AU5157600A (en) | 2001-08-14 |
| MXPA02007518A (en) | 2003-01-28 |
| CA2399092A1 (en) | 2001-08-09 |
| BR0017090A (en) | 2003-02-25 |
| JP2003524242A (en) | 2003-08-12 |
| WO2001057807A1 (en) | 2001-08-09 |
| AR029034A1 (en) | 2003-06-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1433558A (en) | Method of authenticating tag | |
| US20050036620A1 (en) | Encryption of radio frequency identification tags | |
| US6434561B1 (en) | Method and system for accessing electronic resources via machine-readable data on intelligent documents | |
| US20060181397A1 (en) | Method and apparatus for associating randomized identifiers with tagged assets | |
| US20110161674A1 (en) | Document authentication using document digest verification by remote server | |
| CN105550730B (en) | Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier | |
| WO2001054396A1 (en) | Invisible encoding of meta-information | |
| JPH0614018A (en) | Method and apparatus for electronic authentication | |
| CN111919215A (en) | Authentication of packaged products | |
| JPH075809A (en) | Method and device for preparing and validating safe document | |
| US12432195B2 (en) | Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities | |
| CN103886469A (en) | Product two-dimension code generation and query system | |
| US20020044655A1 (en) | Information appliance and use of same in distributed productivity environments | |
| US20060288236A1 (en) | Electronic document protection system and method | |
| JP4105583B2 (en) | Wireless tag security expansion method, ID management computer device, proxy server device, program thereof, and recording medium of the program | |
| US7548665B2 (en) | Method, systems, and media for identifying whether a machine readable mark may contain sensitive data | |
| CN115511019A (en) | Anti-counterfeiting verification method for binding RFID (radio frequency identification) label and article bar code | |
| RU2259639C2 (en) | Method for complex protection of distributed information processing in computer systems and system for realization of said method | |
| CN103544511A (en) | Anti-counterfeiting identification | |
| CN110443326B (en) | Method for improving safety of RFID (radio frequency identification) tag system | |
| US20250069095A1 (en) | Systems and methods for product authentication | |
| CN1286050C (en) | Encipher / decipher method for identity information and recognition system | |
| US20100027785A1 (en) | Device and method for security handshaking using mixed media | |
| CN1971589A (en) | System and method for anti-counterfeiting of passive radio frequency tags | |
| KR101210605B1 (en) | Method for passive RFID security according to security mode |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
| WD01 | Invention patent application deemed withdrawn after publication |