CN102855504A - Method and device for ownership transfer of radio frequency identification (RFID) tag - Google Patents

Method and device for ownership transfer of radio frequency identification (RFID) tag Download PDF

Info

Publication number
CN102855504A
CN102855504A CN2011102191739A CN201110219173A CN102855504A CN 102855504 A CN102855504 A CN 102855504A CN 2011102191739 A CN2011102191739 A CN 2011102191739A CN 201110219173 A CN201110219173 A CN 201110219173A CN 102855504 A CN102855504 A CN 102855504A
Authority
CN
China
Prior art keywords
rfid
label
rfid interrogator
interrogator
rfid label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102191739A
Other languages
Chinese (zh)
Other versions
CN102855504B (en
Inventor
徐勇军
尹喜
陈静华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN ZHIYUAN (BEIJING) TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN ZHIYUAN (BEIJING) TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN ZHIYUAN (BEIJING) TECHNOLOGY Co Ltd filed Critical SHENZHEN ZHIYUAN (BEIJING) TECHNOLOGY Co Ltd
Priority to CN201110219173.9A priority Critical patent/CN102855504B/en
Publication of CN102855504A publication Critical patent/CN102855504A/en
Application granted granted Critical
Publication of CN102855504B publication Critical patent/CN102855504B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method and a device for ownership transfer of a radio frequency identification (RFID) tag. Ownership transfer of the RFID tag is achieved through the RFID tag and a RFID reader-writer of an original owner and secret key updating of the RFID tag and a RFID reader-writer of a new owner. A temporary secret key Ktemp for the RFID tag is arranged by the RFID reader-writer of the original owner through shared ciphertext Kold. After the Ktemp is transmitted to the RFID reader-writer of the new owner through a secure channel, a temporary secret key in the RFID reader-writer of the original owner is deleted. After the RFID tag is read and authenticated by the RFID reader-writer of the new owner through tag identification (ID) and the temporary secret key save in a background server, a new secret key Knew is updated and set to replace the temporary secret key Ktemp. A hash function and an exclusive-or operation are led in the transfer of the RFID tag, secret keys of the RFID reader-writer of the original owner and the RFID reader-writer of the new owner are updated successively through the RFID tag so as to achieve that ownership of the RFID tag is transferred from a commercial retail organization to consumers really, the RFID tag on purchased commodities can be controlled by the consumers totally, and tag information illegal stealing of other people can be prevented.

Description

RFID label ownership transfer method and device thereof
Technical field
The present invention relates to RFID radio-frequency card apparatus field, especially a kind of RFID label ownership transfer method and device thereof.
Background technology
At present, the RFID technology has become the powerful that the retailing tissue reduces merchandise control and storehouse management cost, increases employee work usefulness, enterprise core competitiveness.Utilize RFID technology realization supply chain management significantly to increase work efficiency, reduce overall cost, have sizable economic benefit.Yet, meanwhile, with the commodity selling of RFID label to the consumer after, because the entitlement of RFID label is not transferred to the consumer, retailing is organized still can utilize hidden rfid interrogator, in the situation that the consumer has no the access control of perceiveing label, thereby cause consumer privacy to reveal, infringement consumer's legitimate rights and interests.
Privacy for Protection of consumer; allow the consumer can control fully buy RFID label on the commodity; prevent that all other men from illegally stealing label information; researchers have proposed the method for some label ownership transfers; these methods totally can be divided into two classes: only comprise two side's label ownership transfer methods of the former owner and new owner two sides, comprise the tripartite label ownership transfer method of the former owner and new owner and trusted third party.
2007, the people such as Osaka have designed the two side's label ownership transfer schemes (An efficient and secure RFID security method with ownership transfer) based on hash, but this scheme can not be resisted Replay Attack and other attack such as desynchronize.
Similarly, the people such as Lei proposed agreement RFID protocol enabling ownership transfer to protect against traceability and DoS attacks in 2007, had equally the nonsynchronous potential potential safety hazard of Replay Attack and background server database and label information.
In addition, the people such as Kulseng in 2010 have proposed the agreement (Lightweight mutual authentication and ownership transfer for RFID systems) of a tripartite label ownership transfer.The trusted third party (TTP) that this agreement introducing RFID label and possessory read write line are trusted simultaneously realizes the label ownership transfer.Its weakness is: must just can finish the label ownership transfer by trusted third party, and will guarantee that trusted third party is perfectly safe, in case trusted third party's victim is broken through, whole system will completely lose safeguard protection.
Summary of the invention
In order to remedy the deficiency of label ownership transfer method in the above-mentioned RFID communication, realize that RFID label entitlement really is transferred to the consumer from commercial retail organization, the invention discloses a kind of RFID label ownership transfer method and device thereof.
A kind of RFID label ownership transfer method, by RFID label and former possessory rfid interrogator, and with new owner's rfid interrogator new key more, realize RFID label ownership transfer, rfid interrogator by original person is that the RFID label arranges temporary key Ktemp by shared cryptograph Kold, and Ktemp being transferred to the temporary key in the former holder's rfid interrogator of deletion behind new owner's the rfid interrogator by safe lane, label ID and the temporary key of new owner's rfid interrogator by the background server storage reads to upgrade behind the authentication RFID label and new key K new is set replaces temporary key Ktemp.
Described former possessory rfid interrogator comprises following step to the process of the deletion of RFID label key:
(1) former possessory rfid interrogator sends query requests Query signal to the RFID label, and the random number R r of its generation is together sent to the RFID label;
(2) the RFID label produces random number R tag behind the Query signal that receives former possessory rfid interrogator transmission and random number R r, and Rtag is sent to former possessory rfid interrogator; Subsequently, RFID tag computation hash function H=H (Kold||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts;
(3) calculate hash function H=H (Kold||Rr||Rtag) behind the random number R tag that former possessory rfid interrogator reception RFID label sends, and H is divided into H Left, H In, H RightThree parts are afterwards H LeftSend to the RFID label;
(4) the RFID label is received H LeftAfter, verify the H that this is sent from former possessory rfid interrogator LeftThe H that self calculates with the RFID label LeftWhether consistent, if consistent, former possessory rfid interrogator is by authentication, RFID tag computation dynamic I D result
Figure BSA00000548892800021
And with DID and H RightTogether send to read write line, if inconsistent, read write line authentification failure then, label keep mourning in silence;
(5) former possessory rfid interrogator receives DID and the H that the RFID label sends Right, the H that checking receives RightThe H that self calculates with former possessory rfid interrogator RightWhether consistent, if consistent, the RFID label has passed through the authentication of read write line, and former possessory rfid interrogator calculates the RFID label subsequently
Figure BSA00000548892800031
And ID sent to background server, background server is verified the ID of label again, is confirmed to be the label ID that will pass ownership, and then produces new random number R rr, and Rrr and the order Updata that passes ownership are sent to label; If inconsistent, the smart-tag authentication failure, read write line keeps mourning in silence;
(6) label receives random number R rr and also carries out the order of passing ownership with the order Updata that passes ownership, namely calculate hash function Ktemp=H (Kold||Rrr||Rtag), the value of Kold is updated to Ktemp, returns Updata settling signal UpdataACK with backward former possessory rfid interrogator;
(7) former possessory rfid interrogator receives UpdataACK, calculates hash function Ktemp=H (Kold||Rrr||Rtag), and the information exchange of Ktemp and ID and label is crossed the rfid interrogator that safe lane sends to the new owner;
(8) Ktemp that new owner's rfid interrogator receives and storage is received and the information of ID and label send to former possessory rfid interrogator delete command Delete simultaneously;
(9) former possessory rfid interrogator is received the information of deleting corresponding RF ID label after the Delete order.
The described former rfid interrogator that the person newly do not arranged comprises following step to the process of the setting of RFID label key:
(1) new owner's rfid interrogator sends query requests Query signal to the RFID label, and the random number R r of its generation is together sent to the RFID label;
(2) the RFID label receives Query signal and the random number R r of new owner's rfid interrogator transmission, and produces random number R tag, Rtag is sent to new owner's rfid interrogator; Subsequently, RFID tag computation hash function H=H (Ktemp||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts;
(3) new owner's rfid interrogator receives the random number R tag that the RFID label sends, and calculates hash function H=H (Ktemp||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts are afterwards H LeftSend to the RFID label;
(4) the RFID label is received H LeftAfter, verify the H that this is sent from new owner's rfid interrogator LeftThe H that self calculates with the RFID label LeftWhether consistent, if consistent, new owner's rfid interrogator is by authentication, RFID tag computation dynamic I D result And with DID and H RightTogether send to read write line, if inconsistent, label keeps mourning in silence;
(5) new owner's rfid interrogator receives DID and the H that the RFID label sends Right, the H that checking receives RightThe H that calculates with new owner's rfid interrogator self RightWhether consistent, if consistent, the RFID label has passed through the authentication of read write line, new owner's rfid interrogator calculating RFID label
Figure BSA00000548892800042
And ID sent to background server, background server is verified the ID of label again, is confirmed to be the label ID that will pass ownership and produces new random number R rr, and Rrr and the order Updata that passes ownership are sent to label; If inconsistent, read write line keeps mourning in silence;
(6) label receives Rrr and passes ownership order Udpata, the execution order of passing ownership, calculate hash function Knew=H (Ktemp||Rrr||Rtag) and the value of K is updated to Knew, the rfid interrogator to the new owner returns Updata settling signal UpdataACK afterwards;
(7) new owner's rfid interrogator receives UpdataACK, calculates hash function Knew=H (Ktemp||Rrr||Rtag), and Knew is preserved.
Described rfid interrogator and label adopt wireless connections, are connected between the former owner and new owner's the rfid interrogator and between rfid interrogator and the background server and all adopt wired connection.
Described RFID label has changeless unique ID number code.
A kind of device that adopts RFID label ownership transfer method, comprise background server, respectively with the former possessory rfid interrogator of background server wired connection and new owner's rfid interrogator, former possessory rfid interrogator and new owner's rfid interrogator wired connection, wireless connections between RFID label and former possessory rfid interrogator and new owner's the rfid interrogator.
In the RFID label, also be provided with the interconnective miniature processing components that stores the miniature memory assembly of transformable key K and unique static ID and have generation pseudo random number and safe unilateral hash function arithmetic capability.
In rfid interrogator, also be provided with and interconnectively store the storage assembly that can change key K and have the pseudo random number generative capacity, and can carry out hash and calculate, can transmit the processing components of the communication data between background server and the label.
Also be provided with the memory module that stores all RFID label informations in the described background server.
The present invention introduces hash function and XOR in the transfer of RFID label, by the RFID label successively with the former owner and new owner's rfid interrogator new key more, realize that RFID label entitlement really is transferred to the consumer from commercial retail organization, allow the consumer can control fully buy RFID label on the commodity, prevent that all other men from illegally stealing label information, the proprietorial transfer of RFID label is secret, complete, true, available and stable.The RFID security mechanism of the present invention's design solves in the current mechanism preferably can't resist the attacks such as illegal monitoring, deception, tracking and playback comprehensively; simultaneously; the present invention has also protected former owner's privacy and new owner's privacy simultaneously; the entitlement of RFID label is transferred to the consumer fully, has reached the target of the consumer privacy that adequately protects.
Description of drawings
Fig. 1 is the schematic flow sheet of the inventive method;
Fig. 2 is that the former possessory rfid interrogator of the inventive method is to the schematic flow sheet of the delete procedure of RFID label key;
Fig. 3 is that new owner's the rfid interrogator of the inventive method is to the schematic flow sheet of the setting up procedure of RFID label key;
Fig. 4 is the structural frames type schematic diagram of apparatus of the present invention.
Embodiment
The present invention will be further described below in conjunction with Figure of description.
With reference to Fig. 1, RFID label ownership transfer method, by RFID label and former possessory rfid interrogator, and with new owner's rfid interrogator new key more, realize RFID label ownership transfer, described method comprises that former possessory rfid interrogator is to the setting to RFID label key of the deletion of RFID label key and new owner's rfid interrogator, rfid interrogator by original person is that the RFID label arranges temporary key Ktemp, and delete temporary key after Ktemp being transferred to new owner's rfid interrogator by safe lane, new owner's rfid interrogator reads and new key is set behind the temporary key Ktemp of authentication RFID label and replaces temporary key.
Fig. 2 is that the former possessory rfid interrogator of the inventive method is to the schematic flow sheet of the delete procedure of RFID label key; this stage produces the temporary key Ktemp that is used for ownership transfer synchronously by RFID label and former possessory rfid interrogator; realize RFID label ownership transfer, protect the former possessory right of privacy.In RFID label and rfid interrogator authentication, introduce hash function H (x) and XOR
Figure BSA00000548892800061
In the RFID label, introduce pseudo random number generation module and safe unilateral hash function module, in rfid interrogator, introduce pseudo random number generation module module, background server stores RFID label id number and other label informations, also stores shared cryptograph K in RFID label and rfid interrogator.
This stage step comprises:
(1) former possessory rfid interrogator sends query requests Query signal to the RFID label, and the random number R r of its generation is together sent to the RFID label;
(2) the RFID label receives Query signal and the random number R r that former possessory rfid interrogator sends, and produces random number R tag, and Rtag is sent to former possessory rfid interrogator; Subsequently, RFID tag computation hash function H=H (Kold||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts;
(3) former possessory rfid interrogator receives the random number R tag that the RFID label sends, and calculates hash function H=H (Kold||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts are afterwards H LeftSend to the RFID label;
(4) the RFID label is received H LeftAfter, verify the H that this is sent from former possessory rfid interrogator LeftThe H that self calculates with the RFID label LeftWhether consistent, if consistent, former possessory rfid interrogator is by authentication, subsequently RFID tag computation dynamic I D result
Figure BSA00000548892800062
And with DID and H RightTogether send to read write line, if inconsistent, read write line authentification failure, label keep mourning in silence;
(5) former possessory rfid interrogator receives DID and the H that the RFID label sends Right, the H that checking receives RightThe H that self calculates with former possessory rfid interrogator RightWhether consistent, if consistent, the RFID label has passed through the authentication of read write line, and former possessory rfid interrogator calculates the RFID label subsequently
Figure BSA00000548892800063
And ID sent to background server, background server is verified the ID of label again, is confirmed to be the label ID that will pass ownership, and then produces new random number R rr, and Rrr and the order Updata that passes ownership are sent to label; If inconsistent, the smart-tag authentication failure, read write line keeps mourning in silence;
(6) label receives Rrr and passes ownership order Updata, carries out the order of passing ownership: calculate hash function Ktemp=H (Kold||Rrr||Rtag), and the value of K is updated to Ktemp.Afterwards, return Updata settling signal UpdataACK to former possessory rfid interrogator.
(7) former possessory rfid interrogator receives UpdataACK, calculates hash function Ktemp=H (Kold||Rrr||Rtag), and with other information of Ktemp and ID and label, by safe lane, sends to new owner's rfid interrogator.
(8) new owner's rfid interrogator receives and storage information, sends to former possessory rfid interrogator delete command Delete.
(9) former possessory rfid interrogator is received the Delete order, the information of deletion respective labels.
Fig. 3 is that the inventive method new owner's rfid interrogator is to the schematic flow sheet of the setting up procedure of RFID label key; the rfid interrogator of this stage by RFID label and new owner generates new key Knew synchronously; substitute temporary key Ktemp; finish RFID label ownership transfer, protection new owner's the right of privacy.
This stage step comprises:
(1) new owner's rfid interrogator sends query requests Query signal to the RFID label, and the random number R r of its generation is together sent to the RFID label;
(2) the RFID label receives Query signal and the random number R r of new owner's rfid interrogator transmission, and produces random number R tag, Rtag is sent to new owner's rfid interrogator; Subsequently, RFID tag computation hash function H=H (Ktemp||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts;
(3) new owner's rfid interrogator receives the random number R tag that the RFID label sends, and calculates hash function H=H (Ktemp||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts are afterwards H LeftSend to the RFID label;
(4) the RFID label is received H LeftAfter, verify the H that this is sent from new owner's rfid interrogator LeftThe H that self calculates with the RFID label LeftWhether consistent, if consistent, new owner's rfid interrogator is by authentication, subsequently RFID tag computation dynamic I D result
Figure BSA00000548892800081
And with DID and H RightTogether send to read write line, if inconsistent, read write line authentification failure, label keep mourning in silence;
(5) new owner's rfid interrogator receives DI and the H that the RFID label sends Right, the H that checking receives RightThe H that calculates with new owner's rfid interrogator self RightWhether consistent, if consistent, the RFID label has passed through the authentication of read write line, subsequently new owner's rfid interrogator calculating RFID label
Figure BSA00000548892800082
And ID sent to background server, background server is verified the ID of label again, is confirmed to be the label ID that will pass ownership, and then produces new random number R rr, and Rrr and the order Updata that passes ownership are sent to label; If inconsistent, read write line authentification failure, read write line keep mourning in silence;
(6) label receives Rrr and passes ownership order Updata, carries out the order of passing ownership: calculate hash function Knew=H (Ktemp||Rrr||Rtag), and the value of K is updated to Knew.Afterwards, the rfid interrogator to the new owner returns Updata settling signal UpdataACK.
(7) new owner's rfid interrogator receives UpdataACK, calculates hash function Knew=H (Kold||Rrr||Rtag), and Knew is preserved.
Need be decomposed into 3 parts by hash value H in the inventive method, calculate the hash function, with the acquired results assignment to H (h-bit, h=n+2m), H=H (Ktemp||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts, wherein H LeftThe m position bit value on the H left side, m=(h-n)/2; H InBe the n position bit value in the middle of the H, n is the length of label ID, i.e. H InWith label ID all be that n-bit is long; H RightThe m position bit value on H the right, m=(h-n)/2.
Fig. 4 is the apparatus structure schematic diagram that uses the inventive method, described device comprise background server, respectively with the former possessory rfid interrogator of background server wired connection and new owner's rfid interrogator, former possessory rfid interrogator and new owner's rfid interrogator wired connection, wireless connections between RFID label and former possessory rfid interrogator and new owner's the rfid interrogator.
In the RFID label, also be provided with the interconnective miniature processing components that stores the miniature memory assembly of transformable key K and unique static ID and have generation pseudo random number and safe unilateral hash function arithmetic capability.
In the former owner/new owner's rfid interrogator, also be provided with and interconnectively store the storage assembly that can change key K and have the pseudo random number generative capacity and can carry out hash and calculate, can transmit the processing components of the communication data between background server and the label.
Also be provided with the memory module that stores all RFID label informations in the described background server.
Described RFID label has unique static ID, the RFID label only need to carry out a random number and generate computing and once unidirectional hash calculating, can finish the authentication to the former owner/new owner's rfid interrogator, meet the requirement of RFID label high efficiency, and shortened computing time, improved efficient.
Store the static ID of all RFID labels in the background server, background server needs to carry out database lookup altogether one time, do not need any hash to calculate the authentication that to finish the RFID label, do not need behind the authentication success RFID label ID is carried out any change yet, reduce the background server load, can not occur the asynchronous problem of data between background server and the RFID label.The general fit calculation applied environment that is fit to distributed data base is fit to have the large-scale RFID applied environment of a large amount of RFID labels simultaneously.
The miniature processing components of RFID label has the pseudo random number of generation and hash functional operation ability, when rfid interrogator is filed a request, the RFID label only returns a random number, only have the rfid interrogator of working as again to return correct information, when the RFID label was verified as the rfid interrogator of legal authorization, the RFID label just continued response.Like this, before by authentication, any illegal rfid interrogator all can not obtain any information of RFID label, thereby has protected the privacies such as position of RFID label fully.
Rfid interrogator has the pseudo random number generative capacity, and can carry out hash and calculate, and can store and transmit the communication data between background server and the RFID label.
The present invention is applicable to the general calculation entironment of distributed data base, has eliminated the database of background server and label potential potential safety hazard synchronously; Simultaneously, the present invention also is fit to have the large complicated RFID applied environment of a large amount of labels.Really enlarged the scope of application of such security authentication mechanism towards rfid system.
The above; be better case study on implementation of the present invention; be not that the present invention is imposed any restrictions, every any simple modification, change and equivalent structure of above embodiment being done according to the technology of the present invention essence changes, and all still belongs in the protection domain of technical solution of the present invention.

Claims (9)

1.RFID label ownership transfer method, by RFID label and former possessory rfid interrogator, and with new owner's rfid interrogator new key more, realize RFID label ownership transfer, it is characterized in that, rfid interrogator by original person is that the RFID label arranges temporary key Ktemp by shared cryptograph Kold, and Ktemp being transferred to the temporary key in the former holder's rfid interrogator of deletion behind new owner's the rfid interrogator by safe lane, label ID and the temporary key of new owner's rfid interrogator by the background server storage reads to upgrade behind the authentication RFID label and new key K new is set replaces temporary key Ktemp.
2. RFID label ownership transfer method according to claim 1 is characterized in that, described former possessory rfid interrogator comprises following step to the process of the deletion of RFID label key:
(1) former possessory rfid interrogator sends query requests Query signal to the RFID label, and the random number R r of its generation is together sent to the RFID label;
(2) the RFID label produces random number R tag behind the Query signal that receives former possessory rfid interrogator transmission and random number R r, and Rtag is sent to former possessory rfid interrogator; Subsequently, RFID tag computation hash function H=H (Kold||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts;
(3) calculate hash function H=H (Kold||Rr||Rtag) behind the random number R tag that former possessory rfid interrogator reception RFID label sends, and H is divided into H Left, H In, H RightThree parts are afterwards H LeftSend to the RFID label;
(4) the RFID label is received H LeftAfter, verify the H that this is sent from former possessory rfid interrogator LeftThe H that self calculates with the RFID label LeftWhether consistent, if consistent, former possessory rfid interrogator is by authentication, RFID tag computation dynamic I D result
Figure FSA00000548892700011
And with DID and H RightTogether send to read write line, if inconsistent, read write line authentification failure then, label keep mourning in silence;
(5) former possessory rfid interrogator receives DID and the H that the RFID label sends Right, the H that checking receives RightThe H that self calculates with former possessory rfid interrogator RightWhether consistent, if consistent, the RFID label has passed through the authentication of read write line, and former possessory rfid interrogator calculates the RFID label subsequently
Figure FSA00000548892700012
And ID sent to background server, background server is verified the ID of label again, is confirmed to be the label ID that will pass ownership, and then produces new random number R rr, and Rrr and the order Updata that passes ownership are sent to label; If inconsistent, the smart-tag authentication failure, read write line keeps mourning in silence;
(6) label receives random number R rr and also carries out the order of passing ownership with the order Updata that passes ownership, namely calculate hash function Ktemp=H (Kold||Rrr||Rtag), the value of Kold is updated to Ktemp, returns Updata settling signal UpdataACK with backward former possessory rfid interrogator;
(7) former possessory rfid interrogator receives UpdataACK, calculates hash function Ktemp=H (Kold||Rrr||Rtag), and the information exchange of Ktemp and ID and label is crossed the rfid interrogator that safe lane sends to the new owner;
(8) Ktemp that new owner's rfid interrogator receives and storage is received and the information of ID and label send to former possessory rfid interrogator delete command Delete simultaneously;
(9) former possessory rfid interrogator is received the information of deleting corresponding RF ID label after the Delete order.
3. RFID label ownership transfer method according to claim 1 is characterized in that, the described former rfid interrogator that the person newly do not arranged comprises following step to the process of the setting of RFID label key:
(1) new owner's rfid interrogator sends query requests Query signal to the RFID label, and the random number R r of its generation is together sent to the RFID label;
(2) the RFID label receives Query signal and the random number R r of new owner's rfid interrogator transmission, and produces random number R tag, Rtag is sent to new owner's rfid interrogator; Subsequently, RFID tag computation hash function H=H (Ktemp||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts;
(3) new owner's rfid interrogator receives the random number R tag that the RFID label sends, and calculates hash function H=H (Ktemp||Rr||Rtag), and H is divided into H Left, H In, H RightThree parts are afterwards H LeftSend to the RFID label;
(4) the RFID label is received H LeftAfter, verify the H that this is sent from new owner's rfid interrogator LeftThe H that self calculates with the RFID label LeftWhether consistent, if consistent, new owner's rfid interrogator is by authentication, RFID tag computation dynamic I D result And with DID and H RightTogether send to read write line, if inconsistent, label keeps mourning in silence;
(5) new owner's rfid interrogator receives DID and the H that the RFID label sends Right, the H that checking receives RightThe H that calculates with new owner's rfid interrogator self RightWhether consistent, if consistent, the RFID label has passed through the authentication of read write line, new owner's rfid interrogator calculating RFID label And ID sent to background server, background server is verified the ID of label again, is confirmed to be the label ID that will pass ownership and produces new random number R rr, and Rrr and the order Updata that passes ownership are sent to label; If inconsistent, read write line keeps mourning in silence;
(6) label receives Rrr and passes ownership order Updata, the execution order of passing ownership, calculate hash function Knew=H (Ktemp||Rrr||Rtag) and the value of K is updated to Knew, the rfid interrogator to the new owner returns Updata settling signal UpdataACK afterwards;
(7) new owner's rfid interrogator receives UpdataACK, calculates hash function Knew=H (Ktemp||Rrr||Rtag), and Knew is preserved.
4. RFID label ownership transfer method according to claim 1, it is characterized in that, described rfid interrogator and label adopt wireless connections, are connected between the former owner and new owner's the rfid interrogator and between rfid interrogator and the background server and all adopt wired connection.
5. RFID label ownership transfer method according to claim 1 is characterized in that, described RFID label has changeless unique ID number code.
6. right to use requires the device of 1 described RFID label ownership transfer method, it is characterized in that, described device comprise background server, respectively with the former possessory rfid interrogator of background server wired connection and new owner's rfid interrogator, former possessory rfid interrogator and new owner's rfid interrogator wired connection, wireless connections between RFID label and former possessory rfid interrogator and new owner's the rfid interrogator.
7. device according to claim 6, it is characterized in that, in the RFID label, also be provided with the interconnective miniature processing components that stores the miniature memory assembly of transformable key K and unique static ID and have generation pseudo random number and safe unilateral hash function arithmetic capability.
8. device according to claim 6, it is characterized in that, in rfid interrogator, also be provided with and interconnectively store the storage assembly that can change key K and have the pseudo random number generative capacity and can carry out hash and calculate, can transmit the processing components of the communication data between background server and the label.
9. device according to claim 6 is characterized in that, also is provided with the memory module that stores all RFID label informations in the described background server.
CN201110219173.9A 2011-08-02 2011-08-02 RFID label tag ownership transfer method and device thereof Expired - Fee Related CN102855504B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110219173.9A CN102855504B (en) 2011-08-02 2011-08-02 RFID label tag ownership transfer method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110219173.9A CN102855504B (en) 2011-08-02 2011-08-02 RFID label tag ownership transfer method and device thereof

Publications (2)

Publication Number Publication Date
CN102855504A true CN102855504A (en) 2013-01-02
CN102855504B CN102855504B (en) 2015-11-25

Family

ID=47402080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110219173.9A Expired - Fee Related CN102855504B (en) 2011-08-02 2011-08-02 RFID label tag ownership transfer method and device thereof

Country Status (1)

Country Link
CN (1) CN102855504B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281194A (en) * 2013-06-15 2013-09-04 杨涛 Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN103701785A (en) * 2013-12-13 2014-04-02 天津大学 Ownership transfer and key array-based RFID (radio frequency identification) security authentication method
CN103957186A (en) * 2014-02-27 2014-07-30 天津大学 Method for effectively transferring label ownership in RFID system
CN104618340A (en) * 2014-12-31 2015-05-13 蓝盾信息安全技术股份有限公司 Radio Frequency Identification (RFID) ownership transfer method
CN105046462A (en) * 2015-06-17 2015-11-11 清华大学 Article safety circulation, anti-counterfeit authentication, and tracking and tracing method and system
CN105100112A (en) * 2015-08-25 2015-11-25 西安电子科技大学 Cloud-storing based radio frequency identification (RFID) group tag ownership transferring method
CN105160279A (en) * 2015-08-07 2015-12-16 郑州轻工业学院 Multi-owner label ownership transferring method characterized in that RFID system needs trusted third party
CN105681041A (en) * 2014-11-18 2016-06-15 航天信息股份有限公司 RFID ownership transfer method
CN105812130A (en) * 2014-12-31 2016-07-27 航天信息股份有限公司 RFID ownership transferring method
CN106066975A (en) * 2016-05-30 2016-11-02 广东工业大学 A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic
CN106330451A (en) * 2016-08-11 2017-01-11 广东工业大学 Radio frequency identification (RFID) tag ownership transfer method
CN107067058A (en) * 2017-03-20 2017-08-18 广东工业大学 A kind of radio frequency identification system label ownership transfer method
CN109302290A (en) * 2018-08-30 2019-02-01 仲恺农业工程学院 It is a kind of to be mutually authenticated protocol method with ownership transfer
CN113726777A (en) * 2021-08-30 2021-11-30 浙江工商大学 Electronic tag ownership transfer method and system
CN115690962A (en) * 2022-10-25 2023-02-03 浙江天怀数智科技有限公司 Intelligent entrance guard management method based on long and short rental ecological chain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114270A1 (en) * 2003-11-21 2005-05-26 International Business Machines Corporation Merchandise-integral transaction receipt and auditable product ownership trail
CN102043973A (en) * 2010-12-13 2011-05-04 北京交通大学 RFID ownership transfer method based on partially trusted centre

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114270A1 (en) * 2003-11-21 2005-05-26 International Business Machines Corporation Merchandise-integral transaction receipt and auditable product ownership trail
CN102043973A (en) * 2010-12-13 2011-05-04 北京交通大学 RFID ownership transfer method based on partially trusted centre

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
KYOSUKE OSAKA等: "An Efficient and Secure RFID Security Method with Ownership Transfer", 《COMPUTATIONAL INTELLIGENCE AND SECURITY, 2006 INTERNATIONAL CONFERENCE》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281194A (en) * 2013-06-15 2013-09-04 杨涛 Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN103281194B (en) * 2013-06-15 2018-12-28 杨涛 A kind of safety and lightweight RFID ownership transfer method based on Bilinear map
CN103701785A (en) * 2013-12-13 2014-04-02 天津大学 Ownership transfer and key array-based RFID (radio frequency identification) security authentication method
CN103957186A (en) * 2014-02-27 2014-07-30 天津大学 Method for effectively transferring label ownership in RFID system
CN103957186B (en) * 2014-02-27 2017-02-15 天津大学 Method for effectively transferring label ownership in RFID system
CN105681041A (en) * 2014-11-18 2016-06-15 航天信息股份有限公司 RFID ownership transfer method
CN105681041B (en) * 2014-11-18 2019-09-17 航天信息股份有限公司 A kind of RFID ownership transfer method
CN104618340B (en) * 2014-12-31 2018-04-27 蓝盾信息安全技术股份有限公司 A kind of RFID ownership transfers method
CN104618340A (en) * 2014-12-31 2015-05-13 蓝盾信息安全技术股份有限公司 Radio Frequency Identification (RFID) ownership transfer method
CN105812130B (en) * 2014-12-31 2020-01-24 航天信息股份有限公司 RFID ownership transfer method
CN105812130A (en) * 2014-12-31 2016-07-27 航天信息股份有限公司 RFID ownership transferring method
CN105046462A (en) * 2015-06-17 2015-11-11 清华大学 Article safety circulation, anti-counterfeit authentication, and tracking and tracing method and system
CN105160279A (en) * 2015-08-07 2015-12-16 郑州轻工业学院 Multi-owner label ownership transferring method characterized in that RFID system needs trusted third party
CN105160279B (en) * 2015-08-07 2017-07-14 郑州轻工业学院 RFID system needs the multiple-owner label ownership conversion method of trusted third party
CN105100112B (en) * 2015-08-25 2018-03-06 西安电子科技大学 RFID cluster label ownership transfer methods based on cloud storage
CN105100112A (en) * 2015-08-25 2015-11-25 西安电子科技大学 Cloud-storing based radio frequency identification (RFID) group tag ownership transferring method
CN106066975A (en) * 2016-05-30 2016-11-02 广东工业大学 A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic
CN106330451A (en) * 2016-08-11 2017-01-11 广东工业大学 Radio frequency identification (RFID) tag ownership transfer method
CN107067058A (en) * 2017-03-20 2017-08-18 广东工业大学 A kind of radio frequency identification system label ownership transfer method
CN109302290A (en) * 2018-08-30 2019-02-01 仲恺农业工程学院 It is a kind of to be mutually authenticated protocol method with ownership transfer
CN113726777A (en) * 2021-08-30 2021-11-30 浙江工商大学 Electronic tag ownership transfer method and system
CN113726777B (en) * 2021-08-30 2023-04-14 浙江工商大学 Electronic tag ownership transfer method and system
CN115690962A (en) * 2022-10-25 2023-02-03 浙江天怀数智科技有限公司 Intelligent entrance guard management method based on long and short rental ecological chain
CN115690962B (en) * 2022-10-25 2023-10-13 浙江天怀数智科技有限公司 Intelligent entrance guard management method based on long-short renting ecological chain

Also Published As

Publication number Publication date
CN102855504B (en) 2015-11-25

Similar Documents

Publication Publication Date Title
CN102855504B (en) RFID label tag ownership transfer method and device thereof
Ohkubo et al. Cryptographic approach to “privacy-friendly” tags
AU2004323883C1 (en) RFID transponder information security methods systems and devices
CN101847199B (en) Security authentication method for radio frequency recognition system
CN102034123B (en) RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division
CN103795543B (en) A kind of secure two-way authentication method for rfid system
CN102737260B (en) Method and apparatus for identifying and verifying RFID privacy protection
CN106845304B (en) A kind of method and system for realizing reader and smart-tag authentication in RFID system
CN101882197B (en) RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
CN100504908C (en) Method and system for protecting radio frequency identification tag and reader data safety
CN102646203B (en) RFID (Radio Frequency Identification Device) data transmission and authentication system and method
CN101976363B (en) Hash function based RFID (Radio Frequency Identification Devices) authentication method
CN103281189A (en) Light weight class safe protocol certification system and method for radio frequency identification equipment
CN102103651B (en) Method and system for realizing all-purpose card system and smart card
CN102081744A (en) Path identification system and secure interaction method thereof
CN103516520A (en) Data safe transmission system and method based on electronic tag
CN103235995A (en) Electronic anti-counterfeiting and logistics management system based on NFC (near field communication) mobile phone
CN102904723B (en) Privacy protection method of radio frequency identification device (RFID) system
Lin et al. Nonidentifiable RFID privacy protection with ownership transfer
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
CN104616039A (en) Card sending method and card sending device for RFID label
CN103701785A (en) Ownership transfer and key array-based RFID (radio frequency identification) security authentication method
CN110492992A (en) A kind of data encryption and transmission method based on radio RF recognition technology
CN103793742A (en) Technology of electronic tag safety authentication and information encryption of traffic electronic license plate
CN1286050C (en) Encipher / decipher method for identity information and recognition system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151125

Termination date: 20200802

CF01 Termination of patent right due to non-payment of annual fee