HK1203672B - System and method capable of verifying contactless sensor tag - Google Patents
System and method capable of verifying contactless sensor tag Download PDFInfo
- Publication number
- HK1203672B HK1203672B HK15103836.5A HK15103836A HK1203672B HK 1203672 B HK1203672 B HK 1203672B HK 15103836 A HK15103836 A HK 15103836A HK 1203672 B HK1203672 B HK 1203672B
- Authority
- HK
- Hong Kong
- Prior art keywords
- mode
- dynamic value
- verification code
- reader
- generating
- Prior art date
Links
Description
Technical Field
The invention relates to a system and a method for verifying a non-contact inductive label.
Background
The non-contact inductive tag refers to an electronic device that can recognize or read/write related data through radio signals, and the reading system and the inductive tag do not need any mechanical or optical contact, but communicate with each other through radio signals, for example: the system is a leisure card, an inductive credit card, an entrance guard inductive button or an NFC mobile phone which exchanges data in a Radio Frequency Identification (RFID) or Near Field Communication (NFC) mode and the like, and has great convenience in use. The identifier of the known inductive tag is fixed data or the encrypted data is fixed and is easy to be recorded or decrypted, and the security is poor.
Taiwan patent No. I384405 proposes a verification method, in which a reader sends a first verification code to a transponder, and then the first verification code is analyzed from a signal responded by the transponder, and a difference comparison is performed between the first verification code and a second verification code generated when the reader receives the first verification code. The first verification code and the second verification code have related dynamic values, so that the anti-counterfeiting function is achieved. However, since the transponder and the reader are easily accessible devices, the conventional authentication method is more likely to be forged or cracked, and thus is not suitable for application environments with high security requirements, such as financial transactions.
Further, U.S. patent application publication No. 20050071231 discloses a system including an authorization device (authorization) that verifies the authenticity of a tag by using a random number generated by a sensed tag and retrieving a verification code associated with the random number from a database, the authorization device verifying the authenticity of the tag from the association of the random number and the verification code. In addition, taiwan patent No. I325566 discloses an improved verification method, which uses a variable key to replace the above-mentioned method of taking out the random number and verification code from the database, so as to increase the difficulty of decryption. Although both of the above-mentioned conventional authentication systems introduce an authentication device, rather than performing authentication by a reader, since the authentication device trusts the reader and only determines authenticity and falsification according to contradictions in the authentication information, the conventional authentication systems are spoofed when an authorized person issues an authentication request by logging in the authentication information and falsifiing the reader.
To solve the above problems, a more reliable non-contact inductive tag verification mechanism is needed.
Disclosure of Invention
The invention aims to provide a verification system and a verification method capable of improving the true and false identification reliability of a non-contact induction tag so as to improve the true and false identification reliability of the induction tag.
To achieve the above object, the present invention provides a system for authenticating a non-contact inductive tag, comprising:
a reader for generating a first verification code according to a first dynamic value and generating an authorization request according to an authorization code;
the inductive tag is used for acquiring the first verification code of the reader in a non-contact mode, generating a second verification code according to a second dynamic value, carrying out encryption operation according to an identifier, the first verification code and the second verification code to generate the authorization code, and transmitting the authorization code to the reader in the non-contact mode; and
a verification device, configured to receive the authorization request of the reader, perform a decryption operation on the authorization request to obtain the first dynamic value and the second dynamic value, perform a first comparison operation on a third dynamic value and the first dynamic value to generate a first difference value, perform a second comparison operation on a fourth dynamic value and the second dynamic value to generate a second difference value, and determine whether the reader is true according to the first difference value and determine whether the inductive tag is true according to the second difference value, where the decryption operation corresponds to the encryption operation.
In one embodiment, the reader has a first dynamic value generator for generating the first dynamic value in accordance with a first operator mode, a first verification code generator for generating the first verification code in accordance with a first ciphertext mode, the inductive tag has a second dynamic value generator for generating the second dynamic value in accordance with a second operator mode, a second verification code generator for generating the second verification code in accordance with a second ciphertext mode, and the verification device has a third dynamic value generator for generating the third dynamic value in accordance with the first operator mode and a fourth dynamic value generator for generating the fourth dynamic value in accordance with the second operator mode.
In one embodiment, the first operator mode and the second operator mode are each a mode selected from the group consisting of a timestamp mode, a count mode, and a password mode.
In one embodiment, the first ciphertext mode and the second ciphertext mode are each selected from the group consisting of a predetermined formula mode, and a lookup table mode.
In one embodiment, the encryption operation uses the identifier, the first verification code, and the second verification code as source operands, and the contents of the destination operands are the authorization codes; the decryption operation uses the authorization code as a source operand, and the contents of the destination operand are the identifier, the first verification code and the second verification code, respectively.
In one embodiment, the non-contact mode is a wireless radio frequency communication mode.
The invention provides a method for verifying a non-contact induction label, which comprises the following steps:
the first step is as follows: enabling a reader to generate a first verification code according to a first dynamic value and an authorization request according to an authorization code;
the second step is as follows: enabling an induction tag to obtain the first verification code of the reader in a non-contact mode, generating a second verification code according to a second dynamic value, performing encryption operation according to an identifier, the first verification code and the second verification code to generate the authorization code, and transmitting the authorization code to the reader in the non-contact mode;
the third step: enabling a verification device to receive the authorization request of the reader, performing decryption operation on the authorization request to obtain the first dynamic value and the second dynamic value, performing first comparison operation on a third dynamic value and the first dynamic value to generate a first difference value, performing second comparison operation on a fourth dynamic value and the second dynamic value to generate a second difference value, and judging whether the reader is true according to the first difference value and whether the induction tag is true according to the second difference value, wherein the decryption operation corresponds to the encryption operation; and
the fourth step: the verification device determines the authenticity of the identifier according to the authenticity and the authenticity judgment of the reader and the induction tag.
In one embodiment, the reader has a first dynamic value generator for generating the first dynamic value in accordance with a first operator mode, a first verification code generator for generating the first verification code in accordance with a first ciphertext mode, the inductive tag has a second dynamic value generator for generating the second dynamic value in accordance with a second operator mode, a second verification code generator for generating the second verification code in accordance with a second ciphertext mode, and the verification device has a third dynamic value generator for generating the third dynamic value in accordance with the first operator mode and a fourth dynamic value generator for generating the fourth dynamic value in accordance with the second operator mode.
In one embodiment, the first operator mode and the second operator mode are each a mode selected from the group consisting of a timestamp mode, a count mode, and an instruction mode.
In one embodiment, the first ciphertext mode and the second ciphertext mode are each selected from the group consisting of a predetermined formula mode, and a lookup table mode.
In one embodiment, the encryption operation uses the identifier, the first verification code, and the second verification code as source operands, and the contents of the destination operands are the authorization codes; the decryption operation uses the authorization code as a source operand, and the contents of the destination operand are the identifier, the first verification code and the second verification code, respectively.
In one embodiment, the non-contact mode is a wireless radio frequency communication mode.
The verification system and the verification method can improve the true and false identification reliability of the non-contact induction tag, and can simultaneously verify the true and false of the induction tag and the reader so as to improve the true and false identification reliability of the induction tag.
Drawings
FIG. 1 is a block diagram illustrating an embodiment of a system for verifying a non-contact inductive tag according to the present invention.
FIG. 2 is a flow chart of one embodiment of a method for verifying a non-contact inductive tag according to the present invention.
Detailed Description
For a further understanding of the structure, features and objects of the present invention, reference should be made to the following detailed description taken in conjunction with the accompanying drawings and preferred embodiments.
Referring to fig. 1, a block diagram of an embodiment of a system for verifying a non-contact inductive tag according to the present invention is shown. As shown in fig. 1, the system includes a reader 10, an inductive tag 20, and a verification device 30.
The reader 10 is used for generating a first verification code according to a first dynamic value and generating an authorization request according to an authorization code. The reader 10 has a first dynamic value generator 11, a first verification code generator 12, a read request generator 13, a response signal parser 14, and an authorization request generator 15.
The first dynamic value generator 11 generates the first dynamic value according to a first operator pattern selected from the group consisting of a timestamp pattern and a count pattern. The timestamp mode generates the first dynamic value according to the current time of a clock; the counting mode is to generate the first dynamic value according to the current counting value of a counter.
The first verification code generator 12 processes the first dynamic value in a first ciphertext mode to generate the first verification code, wherein the first ciphertext mode is a mode selected from the group consisting of a predetermined formula mode and a lookup table mode, and the first verification code is reversible.
The read request generator 13 generates a read request including the first verification code according to a predetermined encoding standard, so that the reader 10 can transmit the read request to the inductive tag 20.
The response signal analyzer 14 analyzes a response signal sent by the inductive tag 20 according to the agreed encoding standard to obtain the authorization code.
The authorization request generator 15 generates the authorization request including the authorization code according to a predetermined communication protocol, so that the reader 10 can transmit the authorization request to the verification device 30.
The inductive tag 20 is configured to obtain the first verification code of the reader 10 in a non-contact manner, generate a second verification code according to a second dynamic value, perform an encryption operation according to an identifier, the first verification code, and the second verification code to generate the authorization code, and convert the authorization code into the response signal to be transmitted to the reader 10 in the non-contact manner, wherein the non-contact manner is an RF (radio frequency) communication manner. The inductive tag 20 has a read request parser 21, a second dynamic value generator 22, a second verification code generator 23, an identifier storage unit 24, an authorization code generator 25, and a response signal generator 26.
The read request parser 21 is configured to parse the read request sent by the reader 10 according to the agreed encoding standard to obtain the first verification code.
The second dynamic value generator 22 generates the second dynamic value according to a second operator mode, and the second operator mode is a mode selected from the group consisting of the timestamp mode and the count mode. The second operator mode and the first operator mode are independent of each other, i.e., they may be the same or different.
The second verification code generator 23 generates the second verification code according to the second dynamic value and a second ciphertext mode, wherein the second ciphertext mode is a mode selected from the group consisting of a predetermined formula mode and a table look-up mode, and the second verification code has reversibility. The second ciphertext mode and the first ciphertext mode may be independent of each other, i.e., the two may be the same or different.
The authorization code generator 25 is configured to perform an encryption operation according to the identifier stored in the identifier storage unit 24, the first verification code, and the second verification code to generate the authorization code, wherein the identifier represents data related to the identity of the inductive tag 20, the encryption operation uses the identifier, the first verification code, and the second verification code as source operands, and the content of the destination operand is the authorization code.
The response signal generator 26 is configured to generate the response signal including the authorization code according to the predetermined encoding standard.
The authentication device 30 is used to receive the authorization request from the reader 10, perform a decryption operation on the authorization request to obtain the identifier, the first dynamic value and the second dynamic value, performing a first comparison operation with a third dynamic value and the first dynamic value to generate a first difference value, performing a second comparison operation on a fourth dynamic value and the second dynamic value to generate a second difference value, and determining whether the reader 10 is true according to the first difference value and determining whether the inductive tag 20 is true according to the second difference value, wherein the decryption operation corresponds to the encryption operation, i.e., the decryption operation uses the authorization code as a source operand, and the contents of the destination operands are the identifier, the first verification code, and the second verification code, respectively. The verification device 30 has an authorization request parser 31, an authorization code checker 32, a third dynamic value generator 33, a reader verifier 34, a fourth dynamic value generator 35, an inductive tag verifier 36, and a verification result generator 37.
The authorization request parser 31 is used for parsing the authorization request sent by the reader 10 according to the agreed communication protocol to obtain the authorization code.
The authorization code checker 32 is configured to perform the decryption operation according to the authorization code to obtain the identifier, the first verification code, and the second verification code.
The third dynamic value generator 33 is used for generating the third dynamic value according to the first operator mode.
The reader verifier 34 is configured to obtain the first dynamic value according to the first ciphertext mode and the first verification code, perform the first comparison operation according to the third dynamic value and the first dynamic value to generate the first difference value, and determine whether the reader 10 is true according to whether the first difference value is within a first predetermined range.
The fourth dynamic value generator 35 is used for generating the fourth dynamic value according to the second operator mode.
The inductive tag verifier 36 is configured to obtain the second dynamic value according to the second ciphertext mode and the second verification code, perform the second comparison operation according to the fourth dynamic value and the second dynamic value to generate the second difference value, and determine whether the inductive tag 20 is true according to whether the second difference value is within a second predetermined range.
The verification result generator 37 is used to generate the final true and false judgment for the inductive tag 20 according to the judgment results of the reader verifier 34 and the inductive tag verifier 36.
In addition, the system for verifying the non-contact inductive tag of the invention can also adopt a password mode to generate the first dynamic value, the second dynamic value, the third dynamic value and the fourth dynamic value. In the password mode, the authentication device 30 generates a first dynamic password data and a second dynamic password data, which are independent of each other and may be the same or different, wherein the first dynamic password data is assigned as the third dynamic value and the second dynamic password data is assigned as the fourth dynamic value. The authentication device 30 transmits the first dynamic password data and the second dynamic password data to the reader 10. The reader 10 takes the first dynamic password data as the first dynamic value and transmits the second dynamic password data to the inductive tag 20. The inductive tag 20 uses the second dynamic password data as the second dynamic value. The following verification process is the same as the above description, and therefore, is not repeated herein.
According to the above principle, the present invention further provides a method for verifying a non-contact inductive tag, comprising the steps of:
the first step is as follows: enabling a reader to generate a first verification code according to a first dynamic value and an authorization request according to an authorization code;
the second step is as follows: enabling an induction tag to receive the first verification code of the reader in a non-contact mode, generate a second verification code according to a second dynamic value, perform encryption operation according to an identifier, the first verification code and the second verification code to generate the authorization code, and transmit the authorization code to the reader in the non-contact mode;
the third step: enabling a verification device to receive the authorization request of the reader, performing decryption operation on the authorization request to obtain the first dynamic value and the second dynamic value, performing first comparison operation on a third dynamic value and the first dynamic value to generate a first difference value, performing second comparison operation on a fourth dynamic value and the second dynamic value to generate a second difference value, and judging whether the reader is true according to the first difference value and whether the induction tag is true according to the second difference value, wherein the decryption operation corresponds to the encryption operation; and
the fourth step: the verification device determines the authenticity of the identifier according to the authenticity and the authenticity judgment of the reader and the induction tag.
The reader has a first dynamic value generator for generating the first dynamic value according to a first operator mode, a first verification code generator for generating the first verification code according to a first cipher mode, the induction tag has a second dynamic value generator for generating the second dynamic value according to a second operator mode, a second verification code generator for generating the second verification code according to a second cipher mode, and the verification device has a third dynamic value generator for generating the third dynamic value according to the first operator mode and a fourth dynamic value generator for generating the fourth dynamic value according to the second operator mode.
Wherein the first operator mode and the second operator mode are each a mode selected from the group consisting of a timestamp mode, a count mode, and an password mode.
Wherein the first ciphertext mode and the second ciphertext mode are each selected from the group consisting of a predetermined formula mode and a lookup table mode.
Wherein the encryption operation uses the identifier, the first verification code, and the second verification code as source operands, and the contents of the destination operand is the authorization code; the decryption operation uses the authorization code as a source operand, and the contents of the destination operand are the identifier, the first verification code and the second verification code, respectively.
Wherein the non-contact mode is a wireless radio frequency communication mode.
Referring to fig. 2, a flow chart of an embodiment of the method for verifying a non-contact inductive tag according to the present invention is shown, and the specific implementation steps thereof are described in conjunction with the system of fig. 1 as follows:
step a: a reader generates a first verification code according to a first dynamic value and generates a read request containing the first verification code. For example: when a reader 10 sends a read request, if the first dynamic value generator 11 uses a count mode as the first operator mode, and the count value "123" at the time of the request is the first dynamic value, if the first verification code generator 12 uses a table look-up mode as the first cipher text mode, the first verification code generator 12 will read a table according to the pointer position "123" to generate a first verification code "ABC", and then generate a read request containing "ABC" according to a predetermined encoding standard (e.g. ISO/IEC14443) via the read request generator 13.
Step b: an inductive tag receives the read request to obtain the first verification code, and generates a second verification code according to a second dynamic value. For example: the read request parser 21 of the inductive tag 20 parses the first verification code "ABC" from the received read request according to the encoding standard (ISO/IEC14443), and if the second dynamic value generator 22 uses a timestamp mode as the second operator mode, and responds to the current value "201307041259" as the second dynamic value, and if the second verification code generator 23 uses a predetermined formula mode as the second ciphertext mode, the second verification code generator 23 generates a second verification code "952140703102" according to the predetermined formula mode and the second dynamic value.
Step c: the inductive tag generates an authorization code containing an identifier, the first verification code and the second verification code information according to an encryption operation. For example: the identifier storage unit 24 of the inductive tag 20 stores an identifier "a, B, C", the authorization code generator 25 generates an authorization code "ABC 952140703102A a 952140B 703102C", the encryption operation uses the first english letter "ABC" as the first verification code, the first digit "952140703102" as the second verification code, the remaining "a, 952140B, B703102C" as the symmetric encrypted ciphertext (ciphertext) containing the identifier, the first verification code and the second verification code are keys (secret key), and the identifier "a, B, C" as the plaintext (plaintext).
For another example, another encryption operation generates another authorization code "ABC 952140703102, a first and second alphabets and abcxyz", that is, the foremost capital letter "ABC" is the first verification code, the foremost digit "952140703102" is the second verification code, the foremost Chinese character "a and second alphabets" is the identifier, and the remaining "abcxyz" is the hash value of the first verification code, the second verification code and the identifier, so as to confirm the correctness of the authorization code.
Step d: the inductive tag generates a response signal containing the authorization code. For example: the response signal generator 26 of a sensor tag 20 generates a response signal containing the authorization code "ABC 952140703102A A952140B 703102C" or another example "ABC 952140703102A B C a B C y z" according to the encoding standard (ISO/IEC 14443).
Step e: the reader receives the response signal and transmits an authorization request containing the authorization code to a verification device. For example: the response signal analyzer 14 of a reader 10 can analyze the authorization code contained in the response signal according to the encoding standard (ISO/IEC14443), and the authorization request generator 15 generates an authorization request containing the authorization code "ABC 952140703102A a 952140B 703102C.
Step f: the verification device receives the authorization request and obtains the authorization code, and obtains the identifier, the first verification code and the second verification code according to a decryption operation. For example: the authorization request parser 31 of the verification device 30 obtains the authorization code "ABC 952140703102A a 952140B 703102C" included in the authorization request according to the communication protocol (e.g. HTTPS or UART), the authorization code checker 32 performs the decryption operation according to the authorization code, that is, the first verification code is the first english letter "ABC" at the head end, the second verification code is the number "952140703102" at the head end, the remaining "a 952140B 703102C" is the symmetric encrypted ciphertext including the identifier, the first verification code and the second verification code are the keys thereof, and the identifier "a and B" is the plaintext thereof.
For another example, another decryption operation is performed according to the another authorization code "ABC 952140703102, first and second, third and fourth, that is, the foremost capital english letter" ABC "is used as the first verification code, the foremost number" 952140703102 "is used as the second verification code, the foremost Chinese character" first and second "is used as the identifier, and the hash values of the first verification code, the second verification code and the identifier are compared to determine whether the hash values are the remaining" abcxyz ", so as to check the correctness of the encrypted information.
Step g: the verification device calculates a difference value between the third dynamic value and the first dynamic value contained in the first verification code according to a third dynamic value so as to judge whether the reader is true; and calculating a difference value between the fourth dynamic value and the second dynamic value contained in the second verification code according to a fourth dynamic value to judge whether the induction label is true or not. For example: the reader verifier 34 of the verification device 30 verifies whether the reader 10 is true by using the count value generated by the third dynamic value generator 33 according to the first operator mode, i.e. the first dynamic value "108" successfully verified at the previous time is the third dynamic value. The reader verifier 34 obtains the first dynamic value "123" by looking up the table with the first verification code "ABC" according to the first ciphertext mode, and subtracts the third dynamic value from the first dynamic value through the first comparison operation to obtain a first difference value (= 123-. In this example, we set the reader 10 to be true when the first difference value is positive. Since the first difference value is 15, the reader 10 is true.
The inductive tag verifier 36 of the verification apparatus 30 verifies whether the inductive tag 20 is true by using the time stamp generated by the fourth dynamic value generator 35 according to the second operator mode, i.e. the current value "201307041302" is the fourth dynamic value, the inductive tag verifier 36 obtains the second dynamic value "201307041259" according to the second ciphertext mode and the predetermined formula mode by using the second verification code "952140703102", and subtracts the second dynamic value from the fourth dynamic value by the second comparison operation to obtain a second difference value (= 3). In this example, it is assumed that the inductive tag 20 is true when the second difference value is greater than or equal to 0 and less than or equal to 5(5 minutes). Since the second difference is equal to 3, the inductive tag 20 is true.
Step h: the verification device determines the authenticity of the identifier according to the authenticity and the authenticity judgment of the reader and the induction tag. For example: when the reader verifier 34 verifies that the reader 10 is true and the inductive tag verifier 36 verifies that the inductive tag 20 is true, the verification result generator 37 determines that the identifier "a, b, c" read from the inductive tag 20 is true.
In addition, the method for verifying the non-contact inductive tag of the invention can also adopt a password mode to generate the first dynamic value, the second dynamic value, the third dynamic value and the fourth dynamic value. In the password mode, the authentication device 30 generates a first dynamic password data and a second dynamic password data, which are independent of each other and may be the same or different, wherein the first dynamic password data is assigned as the third dynamic value and the second dynamic password data is assigned as the fourth dynamic value. The authentication device 30 transmits the first dynamic password data and the second dynamic password data to the reader 10. The reader 10 takes the first dynamic password data as the first dynamic value and transmits the second dynamic password data to the inductive tag 20. The inductive tag 20 uses the second dynamic password data as the second dynamic value. The following verification process is the same as the above description, and therefore, is not repeated herein.
The present invention is disclosed in the preferred embodiments, and it is apparent to those skilled in the art that the present invention is not limited thereto.
Claims (10)
1. A system for verifiable non-contact inductive tags, having:
a reader for generating a first verification code according to a first dynamic value and generating an authorization request according to an authorization code;
the inductive tag is used for acquiring the first verification code of the reader in a non-contact mode, generating a second verification code according to a second dynamic value, carrying out encryption operation according to an identifier, the first verification code and the second verification code to generate the authorization code, and transmitting the authorization code to the reader in the non-contact mode; and
a verification device, configured to receive the authorization request of the reader, perform a decryption operation on the authorization request to obtain the first dynamic value and the second dynamic value, perform a first comparison operation on a third dynamic value and the first dynamic value to generate a first difference value, perform a second comparison operation on a fourth dynamic value and the second dynamic value to generate a second difference value, and determine whether the reader is true according to the first difference value and determine whether the inductive tag is true according to the second difference value, where the decryption operation corresponds to the encryption operation;
the reader has a first dynamic value generator for generating the first dynamic value according to a first operator mode, a first verification code generator for generating the first verification code according to a first cipher mode, the induction tag has a second dynamic value generator for generating the second dynamic value according to a second operator mode, a second verification code generator for generating the second verification code according to a second cipher mode, and the verification device has a third dynamic value generator for generating the third dynamic value according to the first operator mode and a fourth dynamic value generator for generating the fourth dynamic value according to the second operator mode.
2. The system of claim 1, wherein the first and second operator patterns are each a pattern selected from the group consisting of a timestamp pattern, a count pattern, and a password pattern.
3. The system of claim 1, wherein the first ciphertext mode and the second ciphertext mode each comprise a mode selected from the group consisting of a predetermined formula mode and a lookup table mode.
4. The system of claim 1, wherein the encryption operation uses the identifier, the first verification code, and the second verification code as source operands, and the contents of the destination operands are the authorization codes; the decryption operation uses the authorization code as a source operand, and the contents of the destination operand are the identifier, the first verification code and the second verification code, respectively.
5. The system of claim 1, wherein the non-contact mode is a wireless radio frequency communication mode.
6. A method of verifiable non-contact inductive tags, comprising the steps of:
the first step is as follows: enabling a reader to generate a first verification code according to a first dynamic value and an authorization request according to an authorization code;
the second step is as follows: enabling an induction tag to obtain the first verification code of the reader in a non-contact mode, generating a second verification code according to a second dynamic value, performing encryption operation according to an identifier, the first verification code and the second verification code to generate the authorization code, and transmitting the authorization code to the reader in the non-contact mode;
the third step: enabling a verification device to receive the authorization request of the reader, performing decryption operation on the authorization request to obtain the first dynamic value and the second dynamic value, performing first comparison operation on a third dynamic value and the first dynamic value to generate a first difference value, performing second comparison operation on a fourth dynamic value and the second dynamic value to generate a second difference value, and judging whether the reader is true according to the first difference value and whether the induction tag is true according to the second difference value, wherein the decryption operation corresponds to the encryption operation; and
the fourth step: the verification device determines the authenticity and the falseness of the identifier according to the authenticity and the falseness judgment of the reader and the induction tag;
the reader has a first dynamic value generator for generating the first dynamic value according to a first operator mode, a first verification code generator for generating the first verification code according to a first cipher mode, the induction tag has a second dynamic value generator for generating the second dynamic value according to a second operator mode, a second verification code generator for generating the second verification code according to a second cipher mode, and the verification device has a third dynamic value generator for generating the third dynamic value according to the first operator mode and a fourth dynamic value generator for generating the fourth dynamic value according to the second operator mode.
7. The method of claim 6, wherein the first and second operator patterns are each a pattern selected from the group consisting of a timestamp pattern, a count pattern, and a password pattern.
8. The method of claim 6, wherein the first ciphertext mode and the second ciphertext mode each comprise a mode selected from the group consisting of a predetermined formula mode and a look-up table mode.
9. The method of claim 6, wherein the encryption operation uses the identifier, the first verification code, and the second verification code as encryption operands, and the contents of the destination operands are the authorization codes; the decryption operation uses the authorization code as a source operand, and the contents of the destination operand are the identifier, the first verification code and the second verification code, respectively.
10. The method of claim 6, wherein the non-contact mode is a radio frequency communication mode.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW102131146 | 2013-08-29 | ||
TW102131146A TWI627551B (en) | 2013-08-29 | 2013-08-29 | System and method for verifying non-contact sensing tags |
Publications (2)
Publication Number | Publication Date |
---|---|
HK1203672A1 HK1203672A1 (en) | 2015-10-30 |
HK1203672B true HK1203672B (en) | 2019-08-02 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102277646B1 (en) | Method for authentication a user with respect to a machine | |
US10044512B2 (en) | Decoupling of measuring the response time of a transponder and its authentication | |
US8447991B2 (en) | Card authentication system | |
CN107231231B (en) | Method and system for terminal equipment to safely access Internet of things | |
US20110068894A1 (en) | Method for authenticating an rfid tag | |
EP3807831A1 (en) | Method and system to create a trusted record or message and usage for a secure activation or strong customer authentication | |
US20110010289A1 (en) | Method And System For Controlling Risk Using Static Payment Data And An Intelligent Payment Device | |
CN101842792A (en) | Method for protecting a chip card from unauthorized use, chip card and chip card terminal | |
CN110290134A (en) | A kind of identity identifying method, device, storage medium and processor | |
JP2015525386A (en) | Payment device, payment system, and payment method | |
CN104424453B (en) | System and method for verifying non-contact inductive label | |
CN104700125A (en) | AES encryption and verification of ultra high frequency radio identification system | |
Finkenzeller | Known attacks on RFID systems, possible countermeasures and upcoming standardisation activities | |
CN103793742A (en) | Technology of electronic tag safety authentication and information encryption of traffic electronic license plate | |
EP2286373B1 (en) | Reader and transponder for obscuring the applications supported by a reader and/or a transponder and method thereof | |
US20090037744A1 (en) | Biometric pin block | |
CN113873488B (en) | An anti-counterfeiting method based on NFC | |
CN104537298A (en) | Authorizing method and device based on micro-processor card | |
HK1203672B (en) | System and method capable of verifying contactless sensor tag | |
KR20170121737A (en) | Method for Providing Non-Facing Certification by using Camera | |
EP2620902A1 (en) | Central security device, system and method for smart cards | |
KR102838489B1 (en) | System, method, and computer program for verifying payment device using magnetometer | |
JP2013051577A (en) | Communication system, transmission device, and reception device | |
KR101622073B1 (en) | Identity card, access control system, and identification system | |
US20160205131A1 (en) | Method and Apparatus for Transmitting Information |