CN102122340A - Method for preventing radio from being exposed in radio frequency identification system - Google Patents
Method for preventing radio from being exposed in radio frequency identification system Download PDFInfo
- Publication number
- CN102122340A CN102122340A CN2010105468607A CN201010546860A CN102122340A CN 102122340 A CN102122340 A CN 102122340A CN 2010105468607 A CN2010105468607 A CN 2010105468607A CN 201010546860 A CN201010546860 A CN 201010546860A CN 102122340 A CN102122340 A CN 102122340A
- Authority
- CN
- China
- Prior art keywords
- radio
- reader
- identity
- state
- electronic tag
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000002372 labelling Methods 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 8
- 238000012795 verification Methods 0.000 claims description 8
- 230000007704 transition Effects 0.000 claims description 4
- 230000008569 process Effects 0.000 abstract description 6
- 230000001066 destructive effect Effects 0.000 abstract description 2
- 238000013475 authorization Methods 0.000 abstract 1
- 230000002452 interceptive effect Effects 0.000 abstract 1
- 238000012545 processing Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 241000209094 Oryza Species 0.000 description 4
- 235000007164 Oryza sativa Nutrition 0.000 description 4
- 235000021186 dishes Nutrition 0.000 description 4
- 235000009566 rice Nutrition 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 238000000151 deposition Methods 0.000 description 2
- 238000002360 preparation method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000005672 electromagnetic field Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Landscapes
- Burglar Alarm Systems (AREA)
Abstract
The invention provides a method for preventing radio from being exposed in a radio frequency identification system. The radio frequency identification (RFID) system can automatically identify a target object and obtain relevant data by a radio frequency signal, thus being applicable to various aspects in living and production. In the present RFID system, a tag unconditionally responds to an inventory instruction, and the process has the danger of exposing the radio. The danger causes an attacker to use the inventory instruction without authorization, the tag is forced to emit electromagnetic wave so as to expose the information, such as target object position and the like, and concealment is damaged so as to carry out destructive activities of tracking, interfering, stealing, bombing and the like. The state machine of the RFID system is simply revised, and the state machine is requested to respond to the inventory instruction after correctly verifying the identity of a reader, thereby favorably eliminating the danger that the radio is exposed under the condition of hardly adding cost.
Description
Technical field
The invention belongs to electronic labelling system (rfid system) field, relate in particular to safe rfid system.
Background technology
Electronic labelling system (rfid system) can pass through radiofrequency signal, realizes automatic recognition objective object and obtains related data, is widely used in the various aspects of productive life.
The most basic rfid system is made up of three parts: 1) label (Tag): be made up of antenna, coupling element and chip, each label has unique electronic code, attached to identifying target product on the object; 2) reader (Reader): read the equipment of (also can write) label information, can be designed to hand-held or fixed; 3) back-end data system.
The groundwork flow process of rfid system is as follows: 1) reader launching electromagnetic wave; 2) after label enters the coverage of this electromagnetic field, rely on inductive energy to enter the state of working on power; 3) because reader and do not know to power on number of tags and unique identification need cooperate collision detection method to determine by checking order; 4), just can carry out the Card read/write operation to this label in case reader is determined its discernible label; 5) after the read write line reading tag information, deliver to CIS and carry out the relevant data processing.
In existing RFID technical standard and product realization, for above-mentioned workflow 3), in case sending, reader checks order, label will unconditionally respond.Fig. 2 has described the state transition diagram of label in the ISO/IEC18000-6C standard of present widespread use, can see that electronic tag powers on after, can the unconditional instruction of checking of replying reader, thereby it is dangerous to exist radio to expose.
At the radio exposure, the assailant can implement the attack of following process targetedly: 1) with high-power high sensitivity reader directive sending electromagnetic wave, send " checking " instruction then; 2) if this zone has label to exist, can detect tag responses so, survey otherwise move on to adjacent area; 3) through the covering in the zone is surveyed, just can expose article storage place and scope; 4) carry out probability analysis according to mark transmitting boundary and tag responses, and then can infer the characteristic dimension of article by the density of judging label; And then by analyzing its classification of exposure.
The assailant is by above-mentioned attack process; the information such as position, scope, product density, feature classification of product can give away one's position; realize destructive activities such as tracking, interference, theft, explosion, bombing, cause great harm for the product of the hidden protection of needs.
The present invention proposes a kind of method that radio exposes in the rfid system of protecting, by the rfid system state machine is carried out simple modification, require reader at first to announce its identity, label only after correct verification reader identity just response instruction such as check, thereby increasing hardly under the condition of cost, well solving the line electric storm and reveal dangerous.
Summary of the invention
The present invention proposes a kind of radio exposure method of in electronic labelling system, preventing.As shown in Figure 1, this Figure illustrates the reciprocal process of the inventive method.
1) system of the inventive method application is made of electronic tag and read write line.Wherein read write line eats dishes without rice or wine electronic tag is given an order by radio frequency, and electronic tag is handled the order of reader according to own residing state, and by the radio frequency echo reply of eating dishes without rice or wine.
2) electronic tag increases " radio listening silence " state newly, at first enters this state after electronic tag powers on.The electronic tag that enters this state is only handled it to reader identity announcement order, and the mode of processing is that state transitions is carried out in label inside, avoids outwards launching information.
3) before reader is picked up electronic tag, at first to send out an identity announcement order, there is the field that can identify its identity in this order, this field can be a password, the encrypted fields that can be to use key to do, the completeness check code that can be to use key to do, the signature that can be to use key to do.Identity announcement order is broadcast to all labels, only is used for unidirectional announcement reader identity, does not require response.
4) electronic tag that is in " radio listening silence " state is carried out the reader authentication operation after receiving reader identity announcement order.This verification operation can be a password authentication, can be decryption verification, can be with key integrity check value verification again, also can be to signature verification with key.After the electronic tag identity verification success, transfer to other states, under this state, can carry out radio-frequency response orders such as checking of sending of reader, read-writes.
Description of drawings
Fig. 1 is a procedure synoptic diagram of the present invention
Fig. 2 is the tag state figure that defines in the ISO/IEC 18000-6C standard
Fig. 3 forms synoptic diagram for the label product that realizes the inventive method
Fig. 4 is the constitutional diagram example of the label of realization the inventive method
Fig. 5 is for realizing the reader identity announcement order example of the inventive method
Specific embodiments
Come the present invention is described further below in conjunction with specific implementation of the present invention.
As shown in Figure 3, this Figure illustrates an electronic tag product of realizing the inventive method and form signal.This electronic tag is made of label chip M1 and antenna M2.
In label chip M1, comprise a radio listening silence status indicator position S1, this position is used for identification (RFID) tag and " starts/close " the radio listening silence ability; Comprise an identity authentication key S2, this authentication key is a label and the shared shared key of reader; For fear of Replay Attack, also comprise the timestamp of one 4 byte length; Comprise a state machine processing module M3, be used to realize that tag state shifts control; Functions such as the power taking of other functional modules M4 realization label, transmitting-receiving.
As shown in Figure 4, this Figure illustrates on the basis of ISO/IEC 18000-6C, realize the state exchange synoptic diagram of the electronic tag of the inventive method.In conjunction with Fig. 3 and Fig. 4, the state machine processing module M3 in the electronic tag realizes that the reciprocal process of the inventive method is described below:
1) label is not received the signal of reader, when not having power supply, is in off-position.
2) enter the communication field of reader when label, receive reader signal after, power on, if label is not kill label, judge whether to start the radio listening silence zone bit so,, change 3 then if this position, position so just enters " radio listening silence " state); Otherwise directly enter " preparation " state.
3) reader is before to tag operational, sends " announcement of reader identity " order, has the integrity check value that a timestamp and use have the integral algorithm calculating of key in this order, shown in C1 among Fig. 5.
4) label that is in " radio listening silence " state is received " announcement of reader identity " order C1, at first judges the timestamp in ordering, if early than the timestamp of depositing in the label then do not do any processing; Otherwise use oneself the storage authentication key S2 recomputate integrity check value, and and the order in proof test value compare.If the proof test value unanimity, checking is passed through so, and label enters " preparation " state, stabs update time simultaneously to be the timestamp in the order; Otherwise continue to keep " radio listening silence " state.
5) label that is in " radio listening silence " state is received " renewals of reader identity authentication key " order C2, at first judges the timestamp in ordering, if early than the timestamp of depositing in the label then do not do any processing; Otherwise use oneself the storage authentication key S2 recomputate integrity check value, and and the order in proof test value compare.If the proof test value unanimity, checking is passed through so, and the key seed in the label utility command regenerates identity authentication key, stabs update time simultaneously to be the timestamp in the order; Otherwise continue to keep " radio listening silence " state.
6) label returns off-position under can't the situation of normal power supply.
As above describe, the inventive method " radio listening silence " state by in label, increasing newly, eat dishes without rice or wine to increase " announcement of reader identity " and " renewals of reader identity authentication key " order newly on mutual at reader and label, can be good at solving and have the radio exposure danger that exists in the rfid system now.Among the present invention, be used for the eat dishes without rice or wine algorithm of information security of algorithm reusable label that the reader identity differentiates, do not need to increase in addition cost.Entire method increases hardware cost hardly, has extremely strong realizability.
Claims (4)
1. an anti-radio exposure method in electronic labelling system is characterized in that: enter " radio listening silence " state after electronic tag powers on; Before reader is picked up electronic tag, at first to send its identity of identity announcement order announcement; After the electronic tag that is in " radio listening silence " state had only the identity that verification reader sends, just radio-frequency response was made in order to reader operation.
2. according to claim 1 a kind of anti-radio exposure method in electronic labelling system, it is characterized in that: at first enter " radio listening silence " state after electronic tag powers on, the electronic tag that enters this state is only handled it to reader identity announcement order, the mode of handling is that state transitions is carried out in label inside, avoids outwards launching information.
3. according to claim 1 a kind of anti-radio exposure method in electronic labelling system, it is characterized in that: have the field that can identify its identity in the identity announcement order that reader sends, this order sends to all labels, only is used for unidirectional announcement reader identity, does not require response.
4. according to claim 1 a kind of anti-radio exposure method in electronic labelling system, it is characterized in that: after the electronic tag verification reader identity, to the another one state, the electronic tag under this state can carry out radio-frequency response to the reader order from " radio listening silence " state transitions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105468607A CN102122340A (en) | 2010-11-16 | 2010-11-16 | Method for preventing radio from being exposed in radio frequency identification system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105468607A CN102122340A (en) | 2010-11-16 | 2010-11-16 | Method for preventing radio from being exposed in radio frequency identification system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102122340A true CN102122340A (en) | 2011-07-13 |
Family
ID=44250895
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010105468607A Pending CN102122340A (en) | 2010-11-16 | 2010-11-16 | Method for preventing radio from being exposed in radio frequency identification system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102122340A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105980942A (en) * | 2014-03-14 | 2016-09-28 | 欧姆龙株式会社 | Process management system, individual controller used therein, and access control method |
CN114819030A (en) * | 2022-05-12 | 2022-07-29 | 北京京东乾石科技有限公司 | Electronic face sheet, mobile terminal, device, method, device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1728162A (en) * | 2005-07-07 | 2006-02-01 | 复旦大学 | Anti-counterfeiting verification method and anti-counterfeiting system based on radio frequency identification technology |
CN101038619A (en) * | 2007-02-06 | 2007-09-19 | 中国科学院研究生院 | Radio frequency recognition system privacy identification method |
CN101089872A (en) * | 2006-06-13 | 2007-12-19 | 中兴通讯股份有限公司 | A communication method between reader and tag in RFID system |
CN101648554A (en) * | 2008-08-15 | 2010-02-17 | 郭佳 | Method and system for antitheft positioning and tracking of automobile |
-
2010
- 2010-11-16 CN CN2010105468607A patent/CN102122340A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1728162A (en) * | 2005-07-07 | 2006-02-01 | 复旦大学 | Anti-counterfeiting verification method and anti-counterfeiting system based on radio frequency identification technology |
CN101089872A (en) * | 2006-06-13 | 2007-12-19 | 中兴通讯股份有限公司 | A communication method between reader and tag in RFID system |
CN101038619A (en) * | 2007-02-06 | 2007-09-19 | 中国科学院研究生院 | Radio frequency recognition system privacy identification method |
CN101648554A (en) * | 2008-08-15 | 2010-02-17 | 郭佳 | Method and system for antitheft positioning and tracking of automobile |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105980942A (en) * | 2014-03-14 | 2016-09-28 | 欧姆龙株式会社 | Process management system, individual controller used therein, and access control method |
EP3118701A4 (en) * | 2014-03-14 | 2018-02-21 | Omron Corporation | Process management system, individual controller used therein, and access control method |
CN105980942B (en) * | 2014-03-14 | 2018-11-30 | 欧姆龙株式会社 | Flow chart management system and respective controllers and access restriction method for the system |
US10395046B2 (en) | 2014-03-14 | 2019-08-27 | Omron Corporation | Work process management system, individual controller used therein, and access restriction method |
CN114819030A (en) * | 2022-05-12 | 2022-07-29 | 北京京东乾石科技有限公司 | Electronic face sheet, mobile terminal, device, method, device and storage medium |
CN114819030B (en) * | 2022-05-12 | 2025-02-21 | 北京京东乾石科技有限公司 | Electronic waybill, mobile terminal, device, method, apparatus and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9000892B2 (en) | Detecting RFID tag and inhibiting skimming | |
US8797144B2 (en) | Authorizing RFID reader and inhibiting skimming | |
EP2377076B1 (en) | Method and system for item level uhf rfid tag with low frequency power assist | |
US8570172B2 (en) | RFID system with distributed transmitters | |
US8717145B2 (en) | RFID portal system with RFID tags having various read ranges | |
US8947528B2 (en) | Container-classification identification using directional-antenna RFID | |
US9607286B1 (en) | RFID tags with brand protection and loss prevention | |
US20130314212A1 (en) | Rfid marking of units in a space | |
Nekoogar et al. | Ultra-wideband radio frequency identification systems | |
US8937532B2 (en) | Reading RFID tag using antenna within enclosure | |
Xiao et al. | RFID security issues in military supply chains | |
CN103679358A (en) | Bank tail case safety management system and handover method based on radio frequency identification technology | |
CA2490510A1 (en) | Multiple rfid anti-collision interrogation method | |
US8593257B1 (en) | RFID-based loss-prevention system | |
CN203659052U (en) | Bank tail box safety management system based on radio frequency identification technology | |
CN102122340A (en) | Method for preventing radio from being exposed in radio frequency identification system | |
Haring et al. | A review of network evolution towards a smart connected world | |
Guizani | Security applications challenges of RFID technology and possible countermeasures | |
Huang et al. | Implementing a passive RFID e-seal system for transit container security: a case study of Kaohsiung Port. | |
Sethi et al. | Challenges of radio frequency identification technique | |
Singh et al. | Radio frequency identification: applications and security issues | |
Dahariya et al. | Study on RFID, architecture, service and privacy with limitation | |
US20130314211A1 (en) | Container-type identification using directional-antenna rfid | |
CN103426129B (en) | Overhead communication cable and house service resource management system | |
Kuang et al. | The application of management information system in internet of things based on RFID technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110713 |