[go: up one dir, main page]

CN102122340A - Method for preventing radio from being exposed in radio frequency identification system - Google Patents

Method for preventing radio from being exposed in radio frequency identification system Download PDF

Info

Publication number
CN102122340A
CN102122340A CN2010105468607A CN201010546860A CN102122340A CN 102122340 A CN102122340 A CN 102122340A CN 2010105468607 A CN2010105468607 A CN 2010105468607A CN 201010546860 A CN201010546860 A CN 201010546860A CN 102122340 A CN102122340 A CN 102122340A
Authority
CN
China
Prior art keywords
radio
reader
identity
state
electronic tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105468607A
Other languages
Chinese (zh)
Inventor
兰天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CEC Huada Electronic Design Co Ltd
Original Assignee
Beijing CEC Huada Electronic Design Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CEC Huada Electronic Design Co Ltd filed Critical Beijing CEC Huada Electronic Design Co Ltd
Priority to CN2010105468607A priority Critical patent/CN102122340A/en
Publication of CN102122340A publication Critical patent/CN102122340A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Burglar Alarm Systems (AREA)

Abstract

The invention provides a method for preventing radio from being exposed in a radio frequency identification system. The radio frequency identification (RFID) system can automatically identify a target object and obtain relevant data by a radio frequency signal, thus being applicable to various aspects in living and production. In the present RFID system, a tag unconditionally responds to an inventory instruction, and the process has the danger of exposing the radio. The danger causes an attacker to use the inventory instruction without authorization, the tag is forced to emit electromagnetic wave so as to expose the information, such as target object position and the like, and concealment is damaged so as to carry out destructive activities of tracking, interfering, stealing, bombing and the like. The state machine of the RFID system is simply revised, and the state machine is requested to respond to the inventory instruction after correctly verifying the identity of a reader, thereby favorably eliminating the danger that the radio is exposed under the condition of hardly adding cost.

Description

A kind of method that anti-radio exposes in electronic labelling system
Technical field
The invention belongs to electronic labelling system (rfid system) field, relate in particular to safe rfid system.
Background technology
Electronic labelling system (rfid system) can pass through radiofrequency signal, realizes automatic recognition objective object and obtains related data, is widely used in the various aspects of productive life.
The most basic rfid system is made up of three parts: 1) label (Tag): be made up of antenna, coupling element and chip, each label has unique electronic code, attached to identifying target product on the object; 2) reader (Reader): read the equipment of (also can write) label information, can be designed to hand-held or fixed; 3) back-end data system.
The groundwork flow process of rfid system is as follows: 1) reader launching electromagnetic wave; 2) after label enters the coverage of this electromagnetic field, rely on inductive energy to enter the state of working on power; 3) because reader and do not know to power on number of tags and unique identification need cooperate collision detection method to determine by checking order; 4), just can carry out the Card read/write operation to this label in case reader is determined its discernible label; 5) after the read write line reading tag information, deliver to CIS and carry out the relevant data processing.
In existing RFID technical standard and product realization, for above-mentioned workflow 3), in case sending, reader checks order, label will unconditionally respond.Fig. 2 has described the state transition diagram of label in the ISO/IEC18000-6C standard of present widespread use, can see that electronic tag powers on after, can the unconditional instruction of checking of replying reader, thereby it is dangerous to exist radio to expose.
At the radio exposure, the assailant can implement the attack of following process targetedly: 1) with high-power high sensitivity reader directive sending electromagnetic wave, send " checking " instruction then; 2) if this zone has label to exist, can detect tag responses so, survey otherwise move on to adjacent area; 3) through the covering in the zone is surveyed, just can expose article storage place and scope; 4) carry out probability analysis according to mark transmitting boundary and tag responses, and then can infer the characteristic dimension of article by the density of judging label; And then by analyzing its classification of exposure.
The assailant is by above-mentioned attack process; the information such as position, scope, product density, feature classification of product can give away one's position; realize destructive activities such as tracking, interference, theft, explosion, bombing, cause great harm for the product of the hidden protection of needs.
The present invention proposes a kind of method that radio exposes in the rfid system of protecting, by the rfid system state machine is carried out simple modification, require reader at first to announce its identity, label only after correct verification reader identity just response instruction such as check, thereby increasing hardly under the condition of cost, well solving the line electric storm and reveal dangerous.
Summary of the invention
The present invention proposes a kind of radio exposure method of in electronic labelling system, preventing.As shown in Figure 1, this Figure illustrates the reciprocal process of the inventive method.
1) system of the inventive method application is made of electronic tag and read write line.Wherein read write line eats dishes without rice or wine electronic tag is given an order by radio frequency, and electronic tag is handled the order of reader according to own residing state, and by the radio frequency echo reply of eating dishes without rice or wine.
2) electronic tag increases " radio listening silence " state newly, at first enters this state after electronic tag powers on.The electronic tag that enters this state is only handled it to reader identity announcement order, and the mode of processing is that state transitions is carried out in label inside, avoids outwards launching information.
3) before reader is picked up electronic tag, at first to send out an identity announcement order, there is the field that can identify its identity in this order, this field can be a password, the encrypted fields that can be to use key to do, the completeness check code that can be to use key to do, the signature that can be to use key to do.Identity announcement order is broadcast to all labels, only is used for unidirectional announcement reader identity, does not require response.
4) electronic tag that is in " radio listening silence " state is carried out the reader authentication operation after receiving reader identity announcement order.This verification operation can be a password authentication, can be decryption verification, can be with key integrity check value verification again, also can be to signature verification with key.After the electronic tag identity verification success, transfer to other states, under this state, can carry out radio-frequency response orders such as checking of sending of reader, read-writes.
Description of drawings
Fig. 1 is a procedure synoptic diagram of the present invention
Fig. 2 is the tag state figure that defines in the ISO/IEC 18000-6C standard
Fig. 3 forms synoptic diagram for the label product that realizes the inventive method
Fig. 4 is the constitutional diagram example of the label of realization the inventive method
Fig. 5 is for realizing the reader identity announcement order example of the inventive method
Specific embodiments
Come the present invention is described further below in conjunction with specific implementation of the present invention.
As shown in Figure 3, this Figure illustrates an electronic tag product of realizing the inventive method and form signal.This electronic tag is made of label chip M1 and antenna M2.
In label chip M1, comprise a radio listening silence status indicator position S1, this position is used for identification (RFID) tag and " starts/close " the radio listening silence ability; Comprise an identity authentication key S2, this authentication key is a label and the shared shared key of reader; For fear of Replay Attack, also comprise the timestamp of one 4 byte length; Comprise a state machine processing module M3, be used to realize that tag state shifts control; Functions such as the power taking of other functional modules M4 realization label, transmitting-receiving.
As shown in Figure 4, this Figure illustrates on the basis of ISO/IEC 18000-6C, realize the state exchange synoptic diagram of the electronic tag of the inventive method.In conjunction with Fig. 3 and Fig. 4, the state machine processing module M3 in the electronic tag realizes that the reciprocal process of the inventive method is described below:
1) label is not received the signal of reader, when not having power supply, is in off-position.
2) enter the communication field of reader when label, receive reader signal after, power on, if label is not kill label, judge whether to start the radio listening silence zone bit so,, change 3 then if this position, position so just enters " radio listening silence " state); Otherwise directly enter " preparation " state.
3) reader is before to tag operational, sends " announcement of reader identity " order, has the integrity check value that a timestamp and use have the integral algorithm calculating of key in this order, shown in C1 among Fig. 5.
4) label that is in " radio listening silence " state is received " announcement of reader identity " order C1, at first judges the timestamp in ordering, if early than the timestamp of depositing in the label then do not do any processing; Otherwise use oneself the storage authentication key S2 recomputate integrity check value, and and the order in proof test value compare.If the proof test value unanimity, checking is passed through so, and label enters " preparation " state, stabs update time simultaneously to be the timestamp in the order; Otherwise continue to keep " radio listening silence " state.
5) label that is in " radio listening silence " state is received " renewals of reader identity authentication key " order C2, at first judges the timestamp in ordering, if early than the timestamp of depositing in the label then do not do any processing; Otherwise use oneself the storage authentication key S2 recomputate integrity check value, and and the order in proof test value compare.If the proof test value unanimity, checking is passed through so, and the key seed in the label utility command regenerates identity authentication key, stabs update time simultaneously to be the timestamp in the order; Otherwise continue to keep " radio listening silence " state.
6) label returns off-position under can't the situation of normal power supply.
As above describe, the inventive method " radio listening silence " state by in label, increasing newly, eat dishes without rice or wine to increase " announcement of reader identity " and " renewals of reader identity authentication key " order newly on mutual at reader and label, can be good at solving and have the radio exposure danger that exists in the rfid system now.Among the present invention, be used for the eat dishes without rice or wine algorithm of information security of algorithm reusable label that the reader identity differentiates, do not need to increase in addition cost.Entire method increases hardware cost hardly, has extremely strong realizability.

Claims (4)

1. an anti-radio exposure method in electronic labelling system is characterized in that: enter " radio listening silence " state after electronic tag powers on; Before reader is picked up electronic tag, at first to send its identity of identity announcement order announcement; After the electronic tag that is in " radio listening silence " state had only the identity that verification reader sends, just radio-frequency response was made in order to reader operation.
2. according to claim 1 a kind of anti-radio exposure method in electronic labelling system, it is characterized in that: at first enter " radio listening silence " state after electronic tag powers on, the electronic tag that enters this state is only handled it to reader identity announcement order, the mode of handling is that state transitions is carried out in label inside, avoids outwards launching information.
3. according to claim 1 a kind of anti-radio exposure method in electronic labelling system, it is characterized in that: have the field that can identify its identity in the identity announcement order that reader sends, this order sends to all labels, only is used for unidirectional announcement reader identity, does not require response.
4. according to claim 1 a kind of anti-radio exposure method in electronic labelling system, it is characterized in that: after the electronic tag verification reader identity, to the another one state, the electronic tag under this state can carry out radio-frequency response to the reader order from " radio listening silence " state transitions.
CN2010105468607A 2010-11-16 2010-11-16 Method for preventing radio from being exposed in radio frequency identification system Pending CN102122340A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105468607A CN102122340A (en) 2010-11-16 2010-11-16 Method for preventing radio from being exposed in radio frequency identification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105468607A CN102122340A (en) 2010-11-16 2010-11-16 Method for preventing radio from being exposed in radio frequency identification system

Publications (1)

Publication Number Publication Date
CN102122340A true CN102122340A (en) 2011-07-13

Family

ID=44250895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105468607A Pending CN102122340A (en) 2010-11-16 2010-11-16 Method for preventing radio from being exposed in radio frequency identification system

Country Status (1)

Country Link
CN (1) CN102122340A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105980942A (en) * 2014-03-14 2016-09-28 欧姆龙株式会社 Process management system, individual controller used therein, and access control method
CN114819030A (en) * 2022-05-12 2022-07-29 北京京东乾石科技有限公司 Electronic face sheet, mobile terminal, device, method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1728162A (en) * 2005-07-07 2006-02-01 复旦大学 Anti-counterfeiting verification method and anti-counterfeiting system based on radio frequency identification technology
CN101038619A (en) * 2007-02-06 2007-09-19 中国科学院研究生院 Radio frequency recognition system privacy identification method
CN101089872A (en) * 2006-06-13 2007-12-19 中兴通讯股份有限公司 A communication method between reader and tag in RFID system
CN101648554A (en) * 2008-08-15 2010-02-17 郭佳 Method and system for antitheft positioning and tracking of automobile

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1728162A (en) * 2005-07-07 2006-02-01 复旦大学 Anti-counterfeiting verification method and anti-counterfeiting system based on radio frequency identification technology
CN101089872A (en) * 2006-06-13 2007-12-19 中兴通讯股份有限公司 A communication method between reader and tag in RFID system
CN101038619A (en) * 2007-02-06 2007-09-19 中国科学院研究生院 Radio frequency recognition system privacy identification method
CN101648554A (en) * 2008-08-15 2010-02-17 郭佳 Method and system for antitheft positioning and tracking of automobile

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105980942A (en) * 2014-03-14 2016-09-28 欧姆龙株式会社 Process management system, individual controller used therein, and access control method
EP3118701A4 (en) * 2014-03-14 2018-02-21 Omron Corporation Process management system, individual controller used therein, and access control method
CN105980942B (en) * 2014-03-14 2018-11-30 欧姆龙株式会社 Flow chart management system and respective controllers and access restriction method for the system
US10395046B2 (en) 2014-03-14 2019-08-27 Omron Corporation Work process management system, individual controller used therein, and access restriction method
CN114819030A (en) * 2022-05-12 2022-07-29 北京京东乾石科技有限公司 Electronic face sheet, mobile terminal, device, method, device and storage medium
CN114819030B (en) * 2022-05-12 2025-02-21 北京京东乾石科技有限公司 Electronic waybill, mobile terminal, device, method, apparatus and storage medium

Similar Documents

Publication Publication Date Title
US9000892B2 (en) Detecting RFID tag and inhibiting skimming
US8797144B2 (en) Authorizing RFID reader and inhibiting skimming
EP2377076B1 (en) Method and system for item level uhf rfid tag with low frequency power assist
US8570172B2 (en) RFID system with distributed transmitters
US8717145B2 (en) RFID portal system with RFID tags having various read ranges
US8947528B2 (en) Container-classification identification using directional-antenna RFID
US9607286B1 (en) RFID tags with brand protection and loss prevention
US20130314212A1 (en) Rfid marking of units in a space
Nekoogar et al. Ultra-wideband radio frequency identification systems
US8937532B2 (en) Reading RFID tag using antenna within enclosure
Xiao et al. RFID security issues in military supply chains
CN103679358A (en) Bank tail case safety management system and handover method based on radio frequency identification technology
CA2490510A1 (en) Multiple rfid anti-collision interrogation method
US8593257B1 (en) RFID-based loss-prevention system
CN203659052U (en) Bank tail box safety management system based on radio frequency identification technology
CN102122340A (en) Method for preventing radio from being exposed in radio frequency identification system
Haring et al. A review of network evolution towards a smart connected world
Guizani Security applications challenges of RFID technology and possible countermeasures
Huang et al. Implementing a passive RFID e-seal system for transit container security: a case study of Kaohsiung Port.
Sethi et al. Challenges of radio frequency identification technique
Singh et al. Radio frequency identification: applications and security issues
Dahariya et al. Study on RFID, architecture, service and privacy with limitation
US20130314211A1 (en) Container-type identification using directional-antenna rfid
CN103426129B (en) Overhead communication cable and house service resource management system
Kuang et al. The application of management information system in internet of things based on RFID technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110713