TWI419055B - Group proving method and radio frequency identification reader and tags using thereof - Google Patents
Group proving method and radio frequency identification reader and tags using thereof Download PDFInfo
- Publication number
- TWI419055B TWI419055B TW99117896A TW99117896A TWI419055B TW I419055 B TWI419055 B TW I419055B TW 99117896 A TW99117896 A TW 99117896A TW 99117896 A TW99117896 A TW 99117896A TW I419055 B TWI419055 B TW I419055B
- Authority
- TW
- Taiwan
- Prior art keywords
- parameter
- round
- rfid tags
- rfid
- tag
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 85
- 238000012795 verification Methods 0.000 claims description 134
- 230000004044 response Effects 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 5
- 238000012550 audit Methods 0.000 claims description 4
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 claims description 2
- 239000010931 gold Substances 0.000 claims description 2
- 229910052737 gold Inorganic materials 0.000 claims description 2
- 230000001960 triggered effect Effects 0.000 claims 4
- 230000002776 aggregation Effects 0.000 claims 1
- 238000004220 aggregation Methods 0.000 claims 1
- 238000002372 labelling Methods 0.000 claims 1
- 230000008569 process Effects 0.000 description 17
- 238000010586 diagram Methods 0.000 description 12
- 229910009447 Y1-Yn Inorganic materials 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 230000001419 dependent effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Landscapes
- Near-Field Transmission Systems (AREA)
- Storage Device Security (AREA)
Description
發明所屬之技術領域是有關於一種群聚驗證方法,且有關於一種應用於無線射頻辨識(Radio Frequency Identification,RFID)之標籤及讀取器間之驗證操作之群聚驗證方法。The technical field to which the invention pertains relates to a clustering verification method, and to a clustering verification method applied to a radio frequency identification (RFID) tag and a verification operation between readers.
在科技發展日新月異的現今時代中,無線射頻辨識(Radio Frequency Identification,RFID)技術係被開發出來,並廣泛地應用在許多物流管理應用場合中。一般來說,現有之RFID驗證機制多採取單一項目稽核,即是判斷個別RFID標籤對應到產品資料庫的內容是否與被標籤的物品相符。換言之,現有RFID驗證機制無法證明所有RFID標籤皆在同一時間內配置。這樣一來,在有心人士地經由電子記錄側錄複製RFID標籤並據以調換原本以RFID標籤標示之物品時,點收人員無法依據現有RFID驗證機制查驗出前述物品掉包之情形。據此,如何提出可有效地克服前述單一項目稽核機制之缺失之RFID驗證方法為業界不斷致力的方向之一。In today's fast-changing technology era, Radio Frequency Identification (RFID) technology has been developed and widely used in many logistics management applications. In general, the existing RFID verification mechanism adopts a single item audit, that is, whether the content of the individual RFID tag corresponding to the product database matches the tagged item. In other words, the existing RFID verification mechanism cannot prove that all RFID tags are configured at the same time. In this way, when the person who is interested in copying the RFID tag through the electronic recording side record and replacing the original item marked with the RFID tag, the ordering personnel cannot check the situation of the above item under the existing RFID verification mechanism. Based on this, how to propose an RFID verification method that can effectively overcome the lack of the aforementioned single project audit mechanism is one of the directions that the industry is constantly striving for.
有關於一種群聚驗證方法被揭露,其係透過無線射頻辨識(Radio Frequency Identification,RFID)讀取器來平行地與多個RFID標籤進行訊號交換操作,以產生可以證明所有RFID標籤在同時存在之群聚驗證電子記錄。應用所揭露的相關之群聚驗證方法之RFID標籤中並未設置有群聚金鑰,換言之,各RFID標籤彼此不具群聚相依關係。應用所揭露的相關之群聚驗證方法之RFID標籤及RFID讀取器有充足之運算能力,以執行金鑰加密、雜湊運算(Hash)及亂數產生等運算操作,使得所揭露的相關之群聚驗證方法可在不和驗證伺服器相連之離線狀態下執行。據此,相較於傳統RFID技術,所揭露的相關之群聚驗證方法具有可有效地在不與驗證伺服器連線之離線狀態下,經由RFID讀取器與RFID標籤間之平行化訊號交換操作產生跨越一個或一個以上不同物品類別之群聚驗證資料的優點。A method for verifying clustering is disclosed in which a radio frequency identification (RFID) reader is used to perform signal exchange operations with a plurality of RFID tags in parallel to generate a proof that all RFID tags are present at the same time. Cluster verification electronic records. The cluster tag is not provided in the RFID tag of the related clustering verification method disclosed in the application. In other words, each RFID tag does not have a cluster-dependent relationship with each other. The RFID tags and RFID readers that apply the related clustering verification methods have sufficient computing power to perform operations such as key encryption, hashing, and random number generation, so that the disclosed related groups are The poly authentication method can be performed in an offline state that is not connected to the authentication server. Accordingly, compared with the conventional RFID technology, the disclosed clustering verification method has the function of effectively parallelizing the signal exchange between the RFID reader and the RFID tag in an offline state without being connected to the verification server. The operation yields the advantage of clustering verification data across one or more different item categories.
根據一實施例,提出一種群聚驗證方法,應用於多個RFID標籤中,以和RFID讀取器執行群聚驗證操作。群聚驗證方法包括下列之步驟。首先回應於RFID讀取器提供之第一回合參數產生亂數參數,第一回合參數相關於各RFID標籤之標籤身份資料。接著根據第一回合參數、亂數參數及標籤金鑰產生第一回傳參數。然後判斷各RFID標籤是否在接收到第一回合參數之起始時點起預定期間內接收到RFID讀取器提供之第二回合參數,第二回合參數相關於各RFID標籤之第一回傳參數。接著判斷第一與第二回合參數是否相互對應。當第一與第二回合參數相互對應且在起始時點起預定期間內接收到第二回合參數時,根據亂數參數來更新標籤金鑰。之後根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。According to an embodiment, a clustering verification method is proposed for application to a plurality of RFID tags to perform a cluster verification operation with an RFID reader. The clustering verification method includes the following steps. First, in response to the first round parameter provided by the RFID reader, a random number parameter is generated, and the first round parameter is related to the tag identity data of each RFID tag. Then, the first backhaul parameter is generated according to the first round parameter, the random number parameter, and the label key. Then, it is judged whether each RFID tag receives the second round parameter provided by the RFID reader within a predetermined period from the start of receiving the first round parameter, and the second round parameter is related to the first return parameter of each RFID tag. It is then determined whether the first and second round parameters correspond to each other. When the first and second round parameters correspond to each other and the second round parameter is received within a predetermined period from the start time point, the label key is updated according to the random number parameter. Then, the second backhaul parameter is generated and output according to the second round parameter, the random number parameter, and the updated label key.
根據另一實施例,提出一種群聚驗證方法,應用於RFID讀取器中,以和多個RFID標籤執行群聚驗證操作。群聚驗證方法包括下列之步驟。首先廣播查詢指令(Query),各RFID標籤回應於查詢指令回傳標籤身份資料。接著根據接收到之標籤身份資料決定標籤集合,並產生及廣播第一回合參數,各RFID標籤回應於第一回合參數回傳第一回傳參數,其中第一回傳參數相關於第一回合參數、各RFID標籤之標籤金鑰及各RFID標籤產生之亂數參數。然後根據對應至各RFID標籤之第一回傳參數產生並廣播第二回合參數,各RFID標籤判斷是否在接收到第一回合參數之起始時點起一預定期間內接收到第二回合參數且第一與第二回合參數是否相互對應,若是,各RFID標籤根據亂數參數更新標籤金鑰,並根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。之後根據讀取器金鑰、各RFID標籤之標籤身份資料、第一及第二回傳參數產生群聚驗證資料。According to another embodiment, a clustering verification method is proposed for use in an RFID reader to perform a cluster verification operation with a plurality of RFID tags. The clustering verification method includes the following steps. First, a query command (Query) is broadcast, and each RFID tag returns a tag identity data in response to the query command. Then, determining the label set according to the received tag identity data, and generating and broadcasting the first round parameter, each RFID tag returns a first backhaul parameter in response to the first round parameter, where the first backhaul parameter is related to the first round parameter The tag key of each RFID tag and the random number parameter generated by each RFID tag. And generating and broadcasting a second round parameter according to the first backhaul parameter corresponding to each RFID tag, each RFID tag determining whether to receive the second round parameter within a predetermined period from the start of receiving the first round parameter and Whether the first and second round parameters correspond to each other, and if so, each RFID tag updates the tag key according to the random number parameter, and generates and outputs the second backhaul parameter according to the second round parameter, the random number parameter, and the updated tag key. Then, the cluster verification data is generated according to the reader key, the tag identity data of each RFID tag, and the first and second backhaul parameters.
根據另一實施例,提出一種群聚驗證方法,應用於RFID讀取器及多個RFID標籤之間。群聚驗證方法包括下列之步驟。首先經由RFID讀取器廣播查詢指令。接著回應於查詢指令經由各RFID標籤回傳標籤身份資料至RFID讀取器。然後經由RFID讀取器來根據接收到之標籤身份資料決定標籤集合並產生及廣播第一回合參數。接著經由各RFID標籤儲存第一回合參數、產生亂數參數並根據第一回合參數、亂數參數及標籤金鑰產生第一回傳參數。然後經由RFID讀取器來根據對應至各RFID標籤之第一回傳參數產生並廣播第二回合參數。然後經由各RFID標籤判斷各RFID標籤是否在接收到第一回合參數之起始時點起一預定期間內接收到RFID讀取器提供之第二回合參數,及判斷第二回合參數是否對應至第一回合參數。當第一與第二回合參數相互對應且在起始時點起預定期間內接收到第二回合參數時,經由各RFID標籤根據亂數參數來更新標籤金鑰、根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。之後經由RFID讀取器根據讀取器金鑰、各RFID標籤之標籤身份資料、第一及第二回傳參數產生群聚驗證資料。According to another embodiment, a clustering verification method is proposed for application between an RFID reader and a plurality of RFID tags. The clustering verification method includes the following steps. The query command is first broadcast via the RFID reader. The tag identity data is then returned to the RFID reader via the RFID tags in response to the query command. The set of tags is then determined via the RFID reader based on the received tag identity data and the first round parameters are generated and broadcast. The first round parameter is stored via each RFID tag, the random number parameter is generated, and the first back pass parameter is generated according to the first round parameter, the random number parameter, and the tag key. A second round parameter is then generated and broadcast via the RFID reader based on the first backhaul parameter corresponding to each RFID tag. And determining, by each RFID tag, whether each RFID tag receives the second round parameter provided by the RFID reader within a predetermined period of time after receiving the start of the first round parameter, and determining whether the second round parameter corresponds to the first Round parameters. When the first and second round parameters correspond to each other and the second round parameter is received within a predetermined period from the start time point, the label key is updated according to the random number parameter via each RFID tag, according to the second round parameter, the random number parameter And the updated tag key generates and outputs a second passback parameter. The cluster verification data is then generated via the RFID reader based on the reader key, the tag identity data of each RFID tag, and the first and second backhaul parameters.
根據另一實施例,提出一種RFID標籤組,包括多個RFID標籤,用以和RFID讀取器進行群聚驗證操作,各RFID標籤包括亂數產生器、加密模組、記憶體及處理器。記憶體儲存程式碼,並回應於初始化操作儲存標籤身份資料及標籤金鑰。控制器執行根據程式碼執行群聚驗證方法,群聚驗證方法包括下列之步驟。首先儲存RFID讀取器提供之第一回合參數並產生亂數參數,其中第一回合參數相關於各RFID標籤之標籤身份資料。接著根據第一回合參數、亂數參數及標籤金鑰產生第一回傳參數。然後判斷各RFID標籤是否在接收到第一回合參數之起始時點起一預定期間內接收到RFID讀取器提供之第二回合參數,第二回合參數相關於RFID標籤之第一回傳參數。接著判斷第一與該第二回合參數是否相互對應。當第一與第二回合參數相互對應且在起始時點起預定期間內接收到第二回合參數時,接收第二回合參數並根據亂數參數來更新標籤金鑰。之後根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。According to another embodiment, an RFID tag set is provided, including a plurality of RFID tags for performing a group verification operation with an RFID reader, each RFID tag including a random number generator, an encryption module, a memory, and a processor. The memory stores the code and stores the tag identity and tag key in response to the initialization operation. The controller performs a cluster verification method according to the code, and the cluster verification method includes the following steps. First, the first round parameter provided by the RFID reader is stored and a random number parameter is generated, wherein the first round parameter is related to the tag identity data of each RFID tag. Then, the first backhaul parameter is generated according to the first round parameter, the random number parameter, and the label key. Then, it is judged whether each RFID tag receives the second round parameter provided by the RFID reader within a predetermined period of time from the start of receiving the first round parameter, and the second round parameter is related to the first backhaul parameter of the RFID tag. Then, it is determined whether the first and the second round parameters correspond to each other. When the first and second round parameters correspond to each other and the second round parameter is received within a predetermined period from the start time point, the second round parameter is received and the label key is updated according to the random number parameter. Then, the second backhaul parameter is generated and output according to the second round parameter, the random number parameter, and the updated label key.
根據再一實施例,提出一種RFID讀取器,和多個RFID標籤進行群聚驗證操作,RFID讀取器包括多個天線、記憶體及處理器。記憶體儲存程式碼,並回應於初始化操作儲存讀取器金鑰。處理器根據程式碼執行群聚驗證方法,群聚驗證方法包括下列之步驟。首先廣播查詢指令,各RFID標籤回應於查詢指令回傳標籤身份資料。接著根據接收到之該標籤身份資料決定一標籤集合,並產生及廣播第一回合參數,各RFID標籤回應於第一回合參數回傳第一回傳參數,第一回傳參數相關於第一回合參數、各RFID標籤之標籤金鑰及各RFID標籤產生之亂數參數。然後根據對應至各RFID標籤之第一回傳參數產生並廣播第二回合參數,各RFID標籤判斷是否在接收到第一回合參數之起始時點起一預定期間內接收到第二回合參數且第一與第二回合參數是否相互對應,若是,各RFID標籤根據亂數參數更新該標籤金鑰,並根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。之後根據讀取器金鑰、各RFID標籤之標籤身份資料、第一及第二回傳參數產生群聚驗證資料。According to still another embodiment, an RFID reader is provided, and a plurality of RFID tags are subjected to a cluster verification operation, and the RFID reader includes a plurality of antennas, a memory, and a processor. The memory stores the code and stores the reader key in response to the initialization operation. The processor performs a clustering verification method according to the code, and the clustering verification method includes the following steps. First, the query command is broadcasted, and each RFID tag returns the tag identity data in response to the query command. And then determining, according to the received tag identity data, a tag set, and generating and broadcasting the first round parameter, each RFID tag returns a first backhaul parameter in response to the first round parameter, where the first backhaul parameter is related to the first round Parameters, tag keys for each RFID tag, and random number parameters generated by each RFID tag. And generating and broadcasting a second round parameter according to the first backhaul parameter corresponding to each RFID tag, each RFID tag determining whether to receive the second round parameter within a predetermined period from the start of receiving the first round parameter and Whether the first and second round parameters correspond to each other, and if so, each RFID tag updates the tag key according to the random number parameter, and generates and outputs the second backhaul parameter according to the second round parameter, the random number parameter, and the updated tag key. . Then, the cluster verification data is generated according to the reader key, the tag identity data of each RFID tag, and the first and second backhaul parameters.
為讓本發明之上述內容能更明顯易懂,下文特舉一較佳實施例,並配合所附圖式,作詳細說明如下:In order to make the above-mentioned contents of the present invention more comprehensible, a preferred embodiment will be described below, and in conjunction with the drawings, a detailed description is as follows:
所揭露實施例之群聚驗證方法係在未與驗證伺服器連線的情況下,經由無線射頻辨識(Radio Frequency Identification,RFID)讀取器與多個RFID標籤間之平行化訊息交換,來產生群聚驗證資料。The clustering verification method of the disclosed embodiment generates a parallelized message exchange between a radio frequency identification (RFID) reader and a plurality of RFID tags without being connected to the verification server. Cluster verification data.
請參照第1圖,其繪示依照一實施例之無線射頻辨識系統的方塊圖。RFID系統1包括多個RFID標籤12_1、12_2、…、12_n、RFID讀取器14及驗證伺服器16,其中n為大於1之自然數。在一個例子中,RFID讀取器14具有如第2圖所示之方塊圖,其中包括記憶體14a、網路介面電路14b、輸出/輸入控制電路14c、處理器14d及天線模組14e1、14e2、…、14em。其中記憶體14a儲存有程式碼,而處理器14d係執行記憶體14a中儲存之程式碼,來對控制RFID讀取器14中各個電路進行操作控制。Please refer to FIG. 1 , which is a block diagram of a radio frequency identification system according to an embodiment. The RFID system 1 includes a plurality of RFID tags 12_1, 12_2, ..., 12_n, an RFID reader 14, and a verification server 16, where n is a natural number greater than one. In one example, the RFID reader 14 has a block diagram as shown in FIG. 2, including a memory 14a, a network interface circuit 14b, an output/input control circuit 14c, a processor 14d, and antenna modules 14e1, 14e2. ,..., 14em. The memory 14a stores the code, and the processor 14d executes the code stored in the memory 14a to control the operation of each circuit in the RFID reader 14.
在一個例子中,各RFID標籤12_1-12_n具有實質上相同之電路結構。以RFID標籤12_1-12_n中之第i個RFID標籤12_i為例,其具有如第3圖所示之方塊圖,其中i為小於或等於n之自然數。RFID標籤12_i包括控制器12a、非揮發性記憶體12b、計時器12c、隨取記憶體12d、亂數產生器12e及加密模組12f。其中非揮發性記憶體12b儲存有程式碼,經由對應之記憶體存取操作,非揮發性記憶體12b中之程式碼係被提供至隨取記憶體12d中,而控制器12a執行隨取記憶體12d中之程式碼來對RFID標籤12_i中各個電路進行操作控制。In one example, each RFID tag 12_1-12_n has substantially the same circuit structure. Taking the i-th RFID tag 12_i of the RFID tags 12_1-12_n as an example, it has a block diagram as shown in FIG. 3, where i is a natural number less than or equal to n. The RFID tag 12_i includes a controller 12a, a non-volatile memory 12b, a timer 12c, a follow-up memory 12d, a random number generator 12e, and an encryption module 12f. The non-volatile memory 12b stores a code, and the code in the non-volatile memory 12b is supplied to the memory 12d via the corresponding memory access operation, and the controller 12a performs the memory. The code in the body 12d is used to control the operation of each circuit in the RFID tag 12_i.
經由RFID標籤12_1-12_n、RFID讀取器14及驗證伺服器16間之訊號交換操作,無線射頻辨識系統1係依序地執行初始化金鑰部署流程、群聚證明產生流程、群聚證明上傳流程及盤點驗證流程,藉此完成一個完整的群聚驗證程序。接下來,係舉例來對群聚驗證程序中前述各流程做進一步的說明。Through the signal exchange operation between the RFID tag 12_1-12_n, the RFID reader 14 and the verification server 16, the RFID system 1 sequentially performs the initialization key deployment process, the cluster certification generation process, and the cluster certification upload process. And the inventory verification process to complete a complete cluster verification process. Next, an example will be given to further describe the foregoing processes in the cluster verification procedure.
在初始化金鑰部署流程中,驗證伺服器16產生對應至RFID讀取器14之讀取器金鑰kreader,並將讀取器金鑰kreader儲存在驗證伺服器16端。驗證伺服器16更將讀取器金鑰kreader透過中介軟體(Middleware)儲存在RFID讀取器14之記憶體14a中。In the initialization key deployment process, the verification server 16 generates a reader key kreader corresponding to the RFID reader 14, and stores the reader key kreader at the verification server 16 side. The verification server 16 further stores the reader key kreader in the memory 14a of the RFID reader 14 through the intermediate software (Middleware).
在初始化金鑰部署流程中,驗證伺服器16更產生對應至各RFID標籤12_1-12_n之標籤身份資料A1、A2、…、An及標籤金鑰k1、k2、…kn,並將標籤身份資料A1-An及標籤金鑰k1-kn及各RFID標籤12_1-12_n對應之貨品資料(以各RFID標籤12_1-12_n對應標示之貨品資訊)儲存在驗證伺服器16端。驗證伺服器16更將標籤身份資料A1-An、標籤金鑰k1-kn寫入各RFID標籤12_1-12-n中之非揮發性記憶體12b中。據此,在初始化金鑰部署流程中,驗證伺服器16係對RFID讀取器14及各RFID標籤12_1-12_n進行初始化操作,使其具有對應之標籤身份資料A1-An、標籤金鑰k1-kn及產品資訊。In the initialization key deployment process, the verification server 16 further generates the tag identity data A1, A2, ..., An and the tag keys k1, k2, ... kn corresponding to the RFID tags 12_1-12_n, and the tag identity data A1. -An and the tag key k1-kn and the item information corresponding to each RFID tag 12_1-12_n (information information corresponding to each RFID tag 12_1-12_n) are stored in the verification server 16 end. The verification server 16 further writes the tag identification data A1-An and the tag key k1-kn into the non-volatile memory 12b of each of the RFID tags 12_1-12-n. Accordingly, in the initialization key deployment process, the verification server 16 performs an initialization operation on the RFID reader 14 and each of the RFID tags 12_1-12_n to have corresponding tag identity data A1-An, tag key k1- Kn and product information.
在群聚證明產生流程中,RFID讀取器14及RFID標籤12_1-12_n例如處在未和驗證伺服器16相互連結之離線狀態,而RFID讀取器14係平行地與所有RFID標籤12_1-12_n進行訊息交換操作,藉此產生群聚驗證資料P。舉例來說,群聚證明產生流程中之各流程步驟如第4圖所示,其繪示乃第1圖中RFID讀取器14與RFID標籤12_1-12_n間之群聚證明產生流程的次序圖。In the clustering certification generation process, the RFID reader 14 and the RFID tags 12_1-12_n are, for example, in an offline state in which the authentication server 16 is not connected to each other, and the RFID reader 14 is in parallel with all the RFID tags 12_1-12_n. A message exchange operation is performed, thereby generating a cluster verification data P. For example, the process steps in the clustering certification generation process are as shown in FIG. 4, which is a sequence diagram showing the flow of the clustering proof generation between the RFID reader 14 and the RFID tags 12_1-12_n in FIG. .
在初始化金鑰部署流程後,首先執行操作流程(a1),處理器14d產生查詢指令(Query),並將此查詢指令廣播至各RFID標籤12_1-12_n。接著執行操作流程(a2),各RFID標籤12_1-12_n中之控制器12a接收此查詢指令,並回應於此查詢指令回傳其對應之標籤身份資料A1-An。After initializing the key deployment process, the operational flow (a1) is first performed, the processor 14d generates a query command (Query), and broadcasts the query command to each of the RFID tags 12_1-12_n. Then, the operation flow (a2) is executed, and the controller 12a in each of the RFID tags 12_1-12_n receives the query command, and returns its corresponding tag identity data A1-An in response to the query command.
然後執行操作流程(b1),處理器14d根據其接收到之標籤身份資料來決定產生之群聚證明資料P對應之RFID標籤集合。舉例來說,處理器14d接收到n個RFID標籤12_1-12_n之標籤身份資料A1-An,據此,本次群聚證明資料產生流程將RFID標籤12_1-12_n視為一個RFID標籤集合,並產生對應之群聚證明資料P指示此RFID標籤集合是否滿足特定之驗證條件。處理器14d根據接收到之標籤身份資料A1-An產生回合參數m,並將回合參數m廣播至各RFID標籤12_1-12_n。舉例來說,處理器14d係經由下列雜湊運算(Hash)來產生回合參數m,∥代表字串的連接:Then, the operation flow (b1) is executed, and the processor 14d determines the RFID tag set corresponding to the generated cluster certification data P according to the tag identity data received by the processor 14d. For example, the processor 14d receives the tag identity data A1-An of the n RFID tags 12_1-12_n, according to which the current cluster certification data generation process treats the RFID tags 12_1-12_n as an RFID tag set and generates The corresponding clustering proof material P indicates whether the RFID tag set satisfies a specific verification condition. The processor 14d generates a round parameter m based on the received tag identity data A1-An, and broadcasts the round parameter m to each of the RFID tags 12_1-12_n. For example, the processor 14d generates a round parameter m via the following hash operation, and represents a connection of the string:
m=hash(A1 ∥A2 ∥...∥An )m=hash(A 1 ∥A 2 ∥...∥A n )
接著執行操作流程(b2),各RFID標籤12_1-12_n中之控制器12a接收並儲存回合參數m。然後如步驟(b3),各RFID標籤12_1-12_n中之控制器12a驅動計時器12c進行計時操作,並據以判斷對應之RFID標籤12_1-12_n是否在接收到回合參數m之起始時點起一段預定期間內接收到RFID讀取器14在下一個訊息交換回合中廣播之回合參數s及m。Next, the operational flow (b2) is performed, and the controller 12a of each of the RFID tags 12_1-12_n receives and stores the round parameter m. Then, as in step (b3), the controller 12a of each of the RFID tags 12_1-12_n drives the timer 12c to perform a timing operation, and accordingly determines whether the corresponding RFID tag 12_1-12_n is at the beginning of receiving the round parameter m. The round parameters s and m broadcast by the RFID reader 14 in the next message exchange round are received during the predetermined period.
然後執行操作流程(b4),各RFID標籤12_1-12_n中之控制器12a接收並儲存回合參數m及驅動對應之亂數產生器12e產生對應之亂數參數r1、r2、…、rn。各RFID標籤12_1-12_n中之控制器12a更經由加密模組12f來根據回合參數m、及各對應之亂數參數r1-rn來產生對應之回傳參數X1、X2、…、Xn。各RFID標籤12_1-12_n中之控制器12a更分別將回傳參數X1-Xn回傳至RFID讀取器14。在一個例子中,各RFID標籤12_1-12_n產生回傳參數X1-Xn之步驟為實質上相同,若以RFID標籤12_1-12_n中之RFID標籤12_i為例,其中之加密模組12f例如係經由下列加密運算(ENC)來產生回傳參數Xi:Then, the operation flow (b4) is executed, and the controller 12a of each of the RFID tags 12_1-12_n receives and stores the round parameter m and the drive corresponding random number generator 12e to generate corresponding random number parameters r1, r2, ..., rn. The controller 12a of each of the RFID tags 12_1-12_n further generates corresponding backhaul parameters X1, X2, ..., Xn according to the rounding parameter m and each corresponding random number parameter r1-rn via the encryption module 12f. The controller 12a of each of the RFID tags 12_1-12_n further transmits the return parameters X1-Xn back to the RFID reader 14, respectively. In an example, the steps of generating the backhaul parameters X1-Xn by the RFID tags 12_1-12_n are substantially the same. If the RFID tags 12_i in the RFID tags 12_1-12_n are taken as an example, the encryption module 12f is, for example, via the following Encryption operation (ENC) to generate the return parameter Xi:
Xi =(m⊕ri )X i = (m⊕r i )
換言之,RFID標籤12_i中之控制器12a係根據回合參數m及亂數參數ri進行互斥或(Exclusive OR,XOR)運算,並根據標籤金鑰ki對前述回合參數m及亂數參數ri之XOR運算結果進行加密,以產生對應之回傳參數Xi。In other words, the controller 12a in the RFID tag 12_i performs an exclusive OR (XOR) operation based on the round parameter m and the random parameter ri, and XORs the round parameter m and the random number parameter ri according to the tag key ki. The result of the operation is encrypted to generate a corresponding backhaul parameter Xi.
然後執行操作流程(c1),處理器14d根據回傳參數X1-Xn產生回合參數s,並將回合參數s及m廣播至各個RFID標籤12_1-12_n。舉例來說,處理器14d係經由下列雜湊運算來產生回合參數s,∥代表字串的連接:Then, the operational flow (c1) is executed, the processor 14d generates a round parameter s based on the backhaul parameters X1-Xn, and broadcasts the round parameters s and m to the respective RFID tags 12_1-12_n. For example, processor 14d generates a round parameter s via the following hash operations, ∥ representing the connection of the string:
s=hash(X1 ∥X2 ∥...∥Xn )s=hash(X 1 ∥X 2 ∥...∥X n )
接著執行操作流程(c2),各RFID標籤12_1-12_n中之控制器12a接收回合參數s與m。Next, the operational flow (c2) is executed, and the controller 12a of each of the RFID tags 12_1-12_n receives the round parameters s and m.
令各RFID標籤12_1-12_n執行操作流程(c2)以接收回合參數s及m之時點觸發在各RFID標籤12_1-12_n對應之此起始時點起此段預定期間內,據此對於各RFID標籤12_1-12_n來說,其係在前述操作流程(b3)中得到接收到回合參數m及接收到回合參數s與m間之時間延遲小於此段預定期間的判斷結果。Having each of the RFID tags 12_1-12_n perform the operation flow (c2) to receive the round parameters s and m at the time point of the start of the respective RFID tags 12_1-12_n for a predetermined period of time, according to which for each RFID tag 12_1 -12_n, in the foregoing operational flow (b3), the judgment result of receiving the round parameter m and receiving the time difference between the round parameters s and m is less than the predetermined period of the period.
在前述操作流程(b3)之判斷結果的條件成立時執行操作流程(c3),各RFID標籤12_1-12_n中之控制器12a更判斷RFID讀取器14於操作流程(c2)中接收到之回合參數是否實質上對應至其於操作流程(b2)中接收並儲存之回合參數。更進一步的說,各RFID標籤12_1-12_n中之控制器12a例如經由比較其於操作流程(c2)接收到之回合參數m及其於操作流程(b2)中接收到之回合參數m是否實質上相等,來判斷操作流程(c2)及(b2)中接收到之回合參數是否彼此對應。When the condition of the judgment result of the foregoing operation flow (b3) is satisfied, the operation flow (c3) is executed, and the controller 12a of each of the RFID tags 12_1-12_n further judges the round received by the RFID reader 14 in the operation flow (c2). Whether the parameter substantially corresponds to the round parameter that it receives and stores in the operational flow (b2). Further, the controller 12a of each of the RFID tags 12_1-12_n, for example, compares the round parameter m received by the operation flow (c2) and the round parameter m received in the operation flow (b2), whether substantially Equal to determine whether the round parameters received in the operational flows (c2) and (b2) correspond to each other.
令RFID讀取器14於操作流程(c2)及(b2)中接收到之回合參數為實質上對應,據此對於各RFID標籤12_1-12_n來說,其係在前述操作流程(c3)中得到其於操作流程(c2)及(b2)中接收到之回合參數彼此相互對應的判斷結果。The round parameters received by the RFID reader 14 in the operational flows (c2) and (b2) are substantially corresponding, and accordingly, for each of the RFID tags 12_1-12_n, they are obtained in the foregoing operational flow (c3). The result of the determination that the round parameters received in the operational flows (c2) and (b2) correspond to each other.
接著執行操作流程(c4),各RFID標籤12_1-12_n中之控制器12a根據對應之亂數參數r1-rn更新對應之標籤金鑰k1-kn以分別得到更新標籤金鑰k1'、k2'、…、kn'。各RFID標籤12_1-12_n中之控制器12a更經由加密模組12f來根據回合參數s、亂數參數r1-rn及更新後之標籤金鑰k1'-kn'產生回傳參數Y1、Y2、…、Yn,而各RFID標籤12_1-12_n更將對應之回傳參數Y1-Yn回傳至RFID讀取器14。在一個例子中,各RFID標籤12_1-12_n產生回傳參數Y1-Yn之步驟為實質上相同,若以RFID標籤12_i為例,其例如係經由下列更新運算及加密運算來產生更新後之標籤金鑰ki'及產生回傳參數Yi:Then, the operation flow (c4) is executed, and the controller 12a of each of the RFID tags 12_1-12_n updates the corresponding tag key k1-kn according to the corresponding random number parameter r1-rn to obtain the update tag keys k1', k2', respectively. ..., kn'. The controller 12a of each of the RFID tags 12_1-12_n further generates a backhaul parameter Y1, Y2, based on the round parameter s, the random number parameter r1-rn, and the updated tag key k1'-kn' via the encryption module 12f. Yn, and each of the RFID tags 12_1-12_n returns the corresponding backhaul parameters Y1-Yn to the RFID reader 14. In one example, the steps of generating the backhaul parameters Y1-Yn for each of the RFID tags 12_1-12_n are substantially the same. If the RFID tag 12_i is taken as an example, the updated tag gold is generated, for example, by the following update operation and encryption operation. Key ki' and generate return parameter Yi:
之後執行操作流程(c5),處理器14d接收回傳參數Y1-Yn,並根據讀取器金鑰kreader、各RFID標籤12_1-12_n之標籤身份資料A1-An、回傳參數X1-Xn及Y1-Yn產生群聚驗證資料P。舉例來說,處理器14d係經由下列加密運算來產生群聚驗證資料P:After the operation flow (c5) is executed, the processor 14d receives the return parameters Y1-Yn, and according to the reader key kreader, the tag identity data A1-An of each RFID tag 12_1-12_n, and the return parameters X1-Xn and Y1 -Yn generates cluster verification data P. For example, the processor 14d generates the cluster verification data P via the following encryption operations:
在其他例子中,若在前述操作流程(c2)中,任一個RFID標籤12_1-12_n(例如是第y個RFID標籤12_y,y為小於或等於n之自然數)接收回合參數s及m之時點觸發在其對應之此起始時點起此段預定期間之外,則RFID標籤12_y對應之執行之次序圖如第5圖所示。其中步驟(c2)係執行此起始時點起此段預定期間之外,則於操作流程(b3)之後係執行操作流程(c6),RFID標籤12_y中之控制器12a係觸發終止事件,以放棄前述操作流程得到之參數。In other examples, if in the foregoing operation flow (c2), any one of the RFID tags 12_1-12_n (for example, the yth RFID tag 12_y, y is a natural number less than or equal to n) receives the round parameters s and m The sequence diagram of the execution of the RFID tag 12_y corresponding to the triggering of the corresponding start point is shown in FIG. 5. Wherein step (c2) is performed outside the predetermined period from the start point, then after the operation flow (b3), the operation flow (c6) is executed, and the controller 12a in the RFID tag 12_y triggers the termination event to abandon The parameters obtained in the foregoing operational procedures.
在其他例子中,若在前述操作流程(c3)中,任一個RFID標籤12_1-12_n(例如是第z個RFID標籤12_z,z為小於或等於n之自然數)於步驟(b2)及(c2)接收到之回合參數彼此不相互對應,則RFID標籤12_z對應之執行之次序圖如第6圖所示。其中於操作流程(c3)之後係執行操作流程(c7),RFID標籤12_z中之控制器12a係觸發終止事件,以放棄前述操作流程得到之參數。In other examples, in the foregoing operation flow (c3), any one of the RFID tags 12_1-12_n (for example, the zth RFID tag 12_z, z is a natural number less than or equal to n) in steps (b2) and (c2) The received round parameters do not correspond to each other, and the sequence diagram of the execution of the RFID tag 12_z is as shown in FIG. After the operation flow (c3), the operation flow (c7) is executed, and the controller 12a in the RFID tag 12_z triggers the termination event to abandon the parameters obtained by the foregoing operation flow.
請參照第7圖,其繪示應用於各RFID標籤12_1-12_n端之群聚證明產生方法的流程圖。由於各RFID標籤12_1-12_n執行之群聚驗證方法為實質上相同,接下來,係僅以RFID標籤12_i所執行之群聚驗證方法為例做說明。首先如步驟(A),RFID標籤12_i判斷是否接收到查詢指令;若否,則重複執行步驟(A);若是,則執行步驟(B),RFID標籤12_i回傳對應之標籤身份資料Ai至RFID讀取器14。Please refer to FIG. 7 , which illustrates a flow chart of a method for generating a clustering certificate applied to each RFID tag 12_1-12_n. Since the clustering verification method performed by each of the RFID tags 12_1-12_n is substantially the same, the cluster verification method executed by the RFID tag 12_i is taken as an example for explanation. First, as in step (A), the RFID tag 12_i determines whether a query command is received; if not, repeats step (A); if so, performs step (B), and the RFID tag 12_i returns the corresponding tag identity data Ai to RFID. Reader 14.
然後如步驟(C),RFID標籤12_i判斷是否接收到回合參數m;若否,則重複執行步驟(C);若是,則執行步驟(D),RFID標籤12_i儲存回合參數m、產生亂數參數ri、根據回合參數m、對應之亂數參數ri及對應之標籤金鑰ki產生回傳參數Xi與標籤身份資料Ai。Then, as in step (C), the RFID tag 12_i determines whether the round parameter m is received; if not, repeats step (C); if so, performs step (D), the RFID tag 12_i stores the round parameter m, generates a random number parameter Ri, generating the backhaul parameter Xi and the tag identity data Ai according to the round parameter m, the corresponding random number parameter ri and the corresponding tag key ki.
接著如步驟(E),RFID標籤12_i判斷是否接收到回合參數s與m;若否,則重複執行步驟(E);若是,則執行步驟(F),RFID標籤12_i判斷是否在接收到回合參數m之起始時點起預定期間內接收到RFID讀取器14提供之回合參數s與m及步驟(G),RFID標籤12_i判斷前後兩次接收到之回合參數是否相互對應。Then, as in step (E), the RFID tag 12_i determines whether the round parameters s and m are received; if not, repeats step (E); if so, performs step (F), and the RFID tag 12_i determines whether the round parameter is received. The round parameters s and m provided by the RFID reader 14 and the step (G) are received within a predetermined period from the start of the m, and the RFID tag 12_i determines whether the round parameters received twice before and after correspond to each other.
當RFID標籤12_i判斷其前後兩次接收到之回合參數相互對應且其在接收到第一筆回合參數(即是回合參數m)起此預定期間內接收到第二筆回合參數(即是回合參數s與m)時執行步驟(I),RFID標籤12_i根據對應之亂數參數ri來更新標籤金鑰ki為更新後之標籤金鑰ki'、根據回合參數s、對應之亂數參數ri及更新後之標籤金鑰ki'產生並輸出回傳參數Yi與標籤身份資料Ai。When the RFID tag 12_i judges that the round parameters received twice before and after each other correspond to each other and it receives the first round round parameter (ie, the round parameter m), the second round round parameter is received within the predetermined period (ie, the round parameter) Steps (I) are performed when s and m), and the RFID tag 12_i updates the tag key ki as the updated tag key ki' according to the corresponding random number parameter ri, according to the round parameter s, the corresponding random number parameter ri, and the update The subsequent tag key ki' generates and outputs the return parameter Yi and the tag identity data Ai.
當RFID標籤12_i判斷其前後兩次接收到之回合參數彼此不相互對應,或判斷其在接收到第一筆回合參數(即是回合參數m)起此預定期間內並未接收到第二筆回合參數(即是回合參數s與m)時執行步驟(H),RFID標籤12_i觸發終止事件。When the RFID tag 12_i determines that the round parameters received twice before and after do not correspond to each other, or judge that it has received the first round round parameter (ie, the round parameter m), the second round is not received within the predetermined period. The step (H) is performed when the parameters (ie, the round parameters s and m), and the RFID tag 12_i triggers the termination event.
請參照第8圖,其繪示應用於各RFID讀取器14之群聚證明產生方法的流程圖。首先如步驟(A),RFID讀取器14廣播查詢指令(Query)至各RFID標籤12_1-12_n,接收到此廣播指令之RFID標籤對應地回傳標籤身份資料。舉例來說,所有之RFID標籤12_1-12_n均接收到此查詢指令並對應地回傳標籤身份資料A1-An。接著如步驟(B),RFID讀取器14根據標籤身份資料A1-An產生並廣播回合參數m至各RFID標籤12_1-12_n,各RFID標籤12_1-12_n對應地回傳回傳參數X1-Xn,其中回傳參數X1-Xn相關於回合參數m、各RFID標籤12_1-12_n之標籤金鑰k1-kn及各RFID標籤產生之亂數參數r1-rn。Please refer to FIG. 8 , which illustrates a flow chart of a method for generating a cluster certificate applied to each RFID reader 14 . First, as step (A), the RFID reader 14 broadcasts a query command (Query) to each of the RFID tags 12_1-12_n, and the RFID tag receiving the broadcast command correspondingly returns the tag identity data. For example, all of the RFID tags 12_1-12_n receive the query command and correspondingly return the tag identity data A1-An. Then, as in step (B), the RFID reader 14 generates and broadcasts the round parameter m to each of the RFID tags 12_1-12_n according to the tag identity data A1-An, and each of the RFID tags 12_1-12_n correspondingly returns the return parameters X1-Xn. The return parameters X1-Xn are related to the round parameter m, the label key k1-kn of each RFID tag 12_1-12_n, and the random number parameter r1-rn generated by each RFID tag.
然後執行步驟(C),RFID讀取器14判斷是否接收到所有RFID標籤12_1-12_n之回傳參數X1-Xn及標籤身份資料A1-An;若否,則重複執行步驟(C);若是,則執行步驟(D),RFID讀取器14根據回傳參數X1-Xn產生並廣播回合參數s與m至RFID標籤12_1-12_n。Then, performing step (C), the RFID reader 14 determines whether the return parameters X1-Xn and the tag identity data A1-An of all the RFID tags 12_1-12_n are received; if not, the step (C) is repeated; if yes, Then step (D) is performed, and the RFID reader 14 generates and broadcasts the round parameters s and m to the RFID tags 12_1-12_n according to the return parameters X1-Xn.
接著執行步驟(E),RFID讀取器14判斷是否接收到所有RFID標籤12_1-12_n之回傳參數Y1-Yn及標籤身份資料A1-An;若否,則重複執行步驟(E);若是,則執行步驟(F),RFID讀取器14根據讀取器金鑰kreader、標籤身份資料A1-An、回傳參數X1-Xn及Y1-Yn產生群聚驗證資料P,並將群聚驗證資料P儲存於記憶體14a中。Then, in step (E), the RFID reader 14 determines whether the return parameters Y1-Yn and the tag identity data A1-An of all the RFID tags 12_1-12_n are received; if not, the step (E) is repeated; if yes, Then, in step (F), the RFID reader 14 generates the cluster verification data P according to the reader key kreader, the tag identity data A1-An, the return parameters X1-Xn, and Y1-Yn, and the cluster verification data is generated. P is stored in the memory 14a.
請參照第9圖,其繪示依照一實施例之群聚證明上傳方法的流程圖。首先如步驟(A),處理器14d詢問網路介面電路14b,以判斷RFID讀取器14是否經由對應之通訊連結連接至驗證伺服器16;若否,則重複執行步驟(A);若是,則執行步驟(B),處理器14d更判斷記憶體14a中是否儲存有群聚驗證資料P;若否,則執行步驟(A);若是,則執行步驟(C),處理器14d驅動網路介面電路14b將群聚驗證資料P傳輸至驗證伺服器16。Please refer to FIG. 9 , which illustrates a flow chart of a method for uploading a cluster certificate according to an embodiment. First, as step (A), the processor 14d queries the network interface circuit 14b to determine whether the RFID reader 14 is connected to the verification server 16 via a corresponding communication link; if not, repeats step (A); if so, Step (B) is executed, the processor 14d further determines whether the clustered verification data P is stored in the memory 14a; if not, executing step (A); if yes, executing step (C), the processor 14d drives the network The interface circuit 14b transmits the cluster verification data P to the verification server 16.
請參照第10圖,其繪示依照一實施例之盤點驗證方法的流程圖。首先如步驟(A),驗證伺服器16根據預先儲存之讀取器金鑰kreader對群聚驗證資料P進行解密,以找出標籤身份資料A1-An、回傳參數X1-Xn及Y1-Yn。接著如步驟(B),驗證伺服器16更根據標籤身份資料A1-An找出對應至各RFID標籤12_1-12_n之標籤金鑰k1-kn。Please refer to FIG. 10, which illustrates a flow chart of an inventory verification method according to an embodiment. First, as step (A), the verification server 16 decrypts the cluster verification data P according to the pre-stored reader key kreader to find the tag identity data A1-An, the return parameters X1-Xn and Y1-Yn. . Next, as in step (B), the verification server 16 further finds the tag key k1-kn corresponding to each of the RFID tags 12_1-12_n based on the tag identity data A1-An.
然後如步驟(C),驗證伺服器16根據標籤身份資料A1-An進行雜湊運算,以產生回合參數m,並根據回傳參數X1-Xn、標籤金鑰k1-kn及回合參數m產生亂數參數r1-rn。接著如步驟(D),驗證伺服器16更根據回傳參數X1-Xn進行雜湊運算以產生回合參數s、根據亂數參數r1-rn及標籤金鑰k1-kn找出更新標籤金鑰k1'-kn'及根據前述回合參數s、亂數參數r1-rn與更新標籤金鑰k1'-kn'運算得到參考參數Y1'、Y2'、…、Yn'。Then, as in step (C), the verification server 16 performs a hash operation based on the tag identity data A1-An to generate a round parameter m, and generates a random number according to the return parameter X1-Xn, the tag key k1-kn, and the round parameter m. Parameter r1-rn. Then, as in step (D), the verification server 16 performs a hash operation according to the return parameters X1-Xn to generate a round parameter s, and finds an update label key k1' according to the random number parameter r1-rn and the label key k1-kn. -kn' and the reference parameters Y1', Y2', ..., Yn' are obtained according to the aforementioned round parameter s, random number parameter r1-rn and update tag key k1'-kn'.
然後如步驟(E),驗證伺服器16判斷於步驟(A)中解出之回傳參數Y1-Yn是否分別等於參考參數Y1'-Yn';若是,執行步驟(F),驗證伺服器16判斷群聚驗證資料P具有合法性而驗證成功,驗證伺服器16將對應至各RFID標籤12_1-12_n之標籤金鑰更新為更新標籤金鑰k1'-kn'。當回傳參數Y1-Yn分別等於參考參數Y1'-Yn'之條件未成立時執行步驟(G),驗證伺服器16判斷群聚驗證資料P不具有合法性而驗證失敗,驗證伺服器16更將產生錯誤事件,通知使用者此時之驗證結果指示可能有物品遺失或掉包之情形。Then, as in step (E), the verification server 16 determines whether the return parameters Y1-Yn solved in the step (A) are equal to the reference parameters Y1'-Yn', respectively; if yes, performing step (F), the verification server 16 It is judged that the cluster verification data P has legality and the verification is successful, and the verification server 16 updates the tag key corresponding to each of the RFID tags 12_1-12_n to the update tag key k1'-kn'. When the condition that the return parameters Y1-Yn are equal to the reference parameter Y1'-Yn' respectively is not established, the step (G) is executed, and the verification server 16 judges that the cluster verification data P has no legality and the verification fails, and the verification server 16 further An error event will be generated to inform the user that the verification result at this time indicates that there may be missing or dropped items.
本實施例之群聚驗證方法透過RFID讀取器來平行地與多個RFID標籤進行訊號交換操作,以產生可以證明所有RFID標籤在同時存在之群聚驗證電子記錄。據此,相較於傳統RFID技術,本實施例之群聚驗證方法具有可經由RFID讀取器與RFID標籤間之平行化訊號交換來產生群聚驗證資料的優點。The clustering verification method of this embodiment performs a signal exchange operation with a plurality of RFID tags in parallel through an RFID reader to generate a clustered verification electronic record that can prove that all RFID tags are present at the same time. Accordingly, the clustering verification method of the present embodiment has the advantage of generating clustered verification data via parallelized signal exchange between the RFID reader and the RFID tag as compared to the conventional RFID technology.
另外,應用本實施例之群聚驗證方法之RFID標籤中並未設置有群聚金鑰來預先設定各個RFID標籤之分組關係,而經由RFID讀取器及RFID標籤間之查詢指令/標籤身份資料訊息交換來決定本次群聚驗證操作欲進行之RFID標籤集合。據此,相較於傳統RFID技術,本實施例之群聚驗證方法更具有可彈性地對任意選取之RFID標籤集合進行群聚驗證的優點。In addition, the RFID tag to which the cluster verification method of the embodiment is applied is not provided with a cluster key to pre-set the grouping relationship of each RFID tag, and the query command/tag identity data between the RFID reader and the RFID tag is used. The message exchange determines the set of RFID tags to be performed by this cluster verification operation. Accordingly, the clustering verification method of the present embodiment has the advantage of elastically performing cluster verification on an arbitrarily selected RFID tag set compared to the conventional RFID technology.
再者,應用本實施例之群聚驗證方法之RFID標籤及RFID讀取器有充足之運算能力,以執行產生群聚驗證資料之相關金鑰加密、雜湊運算(Hash)及亂數產生等運算操作。換言之,本實施例之群聚驗證方法可在不和驗證伺服器相連之離線狀態下執行。據此,相較於傳統RFID技術,本實施例之群聚驗證方法更具有可在不與驗證伺服器連線之離線狀態下產生群聚驗證資料的優點。Furthermore, the RFID tag and the RFID reader applying the clustering verification method of the present embodiment have sufficient computing power to perform operations such as correlation key encryption, hashing (Hash), and random number generation for generating cluster verification data. operating. In other words, the clustering verification method of the present embodiment can be executed in an offline state that is not connected to the authentication server. Accordingly, the cluster verification method of the present embodiment has the advantage of generating cluster verification data in an offline state that is not connected to the verification server, compared to the conventional RFID technology.
綜上所述,雖然本發明已以若干實施例揭露如上,然其並非用以限定本發明。本發明所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作各種之更動與潤飾。因此,本發明之保護範圍當視後附之申請專利範圍所界定者為準。In the above, the present invention has been disclosed in several embodiments, but it is not intended to limit the present invention. A person skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention. Therefore, the scope of the invention is defined by the scope of the appended claims.
1...無線射頻辨識系統1. . . Radio frequency identification system
12_1-12_n...無線射頻辨識標籤12_1-12_n. . . Radio frequency identification tag
14...無線射頻辨識讀取器14. . . Radio frequency identification reader
16...驗證伺服器16. . . Authentication server
14a...記憶體14a. . . Memory
14b...網路介面電路14b. . . Network interface circuit
14c...輸出輸入控制器14c. . . Output input controller
14d...處理器14d. . . processor
14e1-14em...天線模組14e1-14em. . . Antenna module
12a...控制器12a. . . Controller
12b...非揮發性記憶體12b. . . Non-volatile memory
12c...計時器12c. . . Timer
12d...隨取記憶體12d. . . Accompanying memory
12e...亂數產生器12e. . . Random generator
12f...加密模組12f. . . Cryptographic module
第1圖繪示依照一實施例之無線射頻辨識系統的方塊圖。FIG. 1 is a block diagram of a radio frequency identification system in accordance with an embodiment.
第2圖繪示乃第1圖中之無線射頻辨識讀取器14的詳細方塊圖。FIG. 2 is a detailed block diagram of the RFID reader 14 in FIG. 1.
第3圖繪示乃第1圖中之第i個無線射頻辨識標籤12_i的詳細方塊圖。FIG. 3 is a detailed block diagram of the i-th radio frequency identification tag 12_i in FIG. 1.
第4圖繪示乃第1圖中RFID讀取器14與RFID標籤12_1-12_n間之群聚證明產生流程的次序圖。Fig. 4 is a sequence diagram showing the flow of the clustering proof generation between the RFID reader 14 and the RFID tags 12_1-12_n in Fig. 1.
第5圖繪示乃第1圖中RFID讀取器14與RFID標籤12_1-12_n間之群聚證明產生流程的另一次序圖。FIG. 5 is another sequence diagram showing the flow of the clustering proof generation between the RFID reader 14 and the RFID tags 12_1-12_n in FIG.
第6圖繪示乃第1圖中RFID讀取器14與RFID標籤12_1-12_n間之群聚證明產生流程的再一次序圖。FIG. 6 is a further sequence diagram showing the flow of the clustering proof generation between the RFID reader 14 and the RFID tags 12_1-12_n in FIG.
第7圖繪示應用於各RFID標籤12_1-12_n端之群聚證明產生方法的流程圖。FIG. 7 is a flow chart showing a method for generating a clustering certificate applied to each of the RFID tags 12_1-12_n.
第8圖繪示應用於RFID讀取器14之群聚證明產生方法的流程圖。FIG. 8 is a flow chart showing a method of generating a clustering certificate applied to the RFID reader 14.
第9圖繪示依照一實施例之群聚證明上傳方法的流程圖。FIG. 9 is a flow chart showing a method for uploading a cluster certificate according to an embodiment.
第10圖繪示依照一實施例之盤點驗證方法的流程圖。FIG. 10 is a flow chart showing an inventory verification method according to an embodiment.
(A)-(F)...操作步驟(A)-(F). . . Steps
Claims (19)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/859,008 US8446260B2 (en) | 2009-11-30 | 2010-08-18 | Group proving method and radio frequency identification reader and tags using thereof |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US26491609P | 2009-11-30 | 2009-11-30 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW201118750A TW201118750A (en) | 2011-06-01 |
| TWI419055B true TWI419055B (en) | 2013-12-11 |
Family
ID=44087685
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW99117896A TWI419055B (en) | 2009-11-30 | 2010-06-03 | Group proving method and radio frequency identification reader and tags using thereof |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN102081729B (en) |
| TW (1) | TWI419055B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW201329850A (en) * | 2012-01-09 | 2013-07-16 | jun-heng Li | Wireless information display device |
| CN108989994A (en) * | 2018-07-13 | 2018-12-11 | 京东方科技集团股份有限公司 | A kind of data-updating method, electronic tag, control terminal and system |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030137403A1 (en) * | 2001-10-09 | 2003-07-24 | Carrender Curtis L. | Methods and apparatuses for identification |
| TW200604953A (en) * | 2004-07-29 | 2006-02-01 | Mitsubishi Electric Corp | Radio frequency indentification tag reading system, radio frequency identification tag reading device, and radio frequency identification tag |
| US20070164863A1 (en) * | 2006-01-17 | 2007-07-19 | International Business Machines Corporation | System and method to track inventory using RFID tags |
| TW200935318A (en) * | 2008-02-14 | 2009-08-16 | Nec China Co Ltd | Radio frequency identification system and method |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6424263B1 (en) * | 2000-12-01 | 2002-07-23 | Microchip Technology Incorporated | Radio frequency identification tag on a single layer substrate |
| CN101246538A (en) * | 2007-02-14 | 2008-08-20 | 日电(中国)有限公司 | Radio frequency recognition system and method |
| CN100449569C (en) * | 2007-03-23 | 2009-01-07 | 东莞市太平洋计算机科技有限公司 | Active radio frequency electronic label power-controlling method |
-
2010
- 2010-06-03 TW TW99117896A patent/TWI419055B/en active
- 2010-07-07 CN CN201010219601.3A patent/CN102081729B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030137403A1 (en) * | 2001-10-09 | 2003-07-24 | Carrender Curtis L. | Methods and apparatuses for identification |
| TW200604953A (en) * | 2004-07-29 | 2006-02-01 | Mitsubishi Electric Corp | Radio frequency indentification tag reading system, radio frequency identification tag reading device, and radio frequency identification tag |
| US20070164863A1 (en) * | 2006-01-17 | 2007-07-19 | International Business Machines Corporation | System and method to track inventory using RFID tags |
| TW200935318A (en) * | 2008-02-14 | 2009-08-16 | Nec China Co Ltd | Radio frequency identification system and method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102081729B (en) | 2014-05-21 |
| TW201118750A (en) | 2011-06-01 |
| CN102081729A (en) | 2011-06-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110442652B (en) | Cross-chain data processing method and device based on block chain | |
| CN109756338B (en) | Authentication apparatus, computer-implemented method of authentication apparatus, and computer-readable medium | |
| CN110489485B (en) | Federated blockchain network, method and storage medium for storing product data therein | |
| US12141306B2 (en) | Integrity auditing for multi-copy storage | |
| CN108924130B (en) | Block data verification method, device, equipment and storage medium | |
| CN111314172B (en) | Block chain-based data processing method, device, equipment and storage medium | |
| US11146410B2 (en) | Pseudo-random generation of matrices for a computational fuzzy extractor and method for authentication | |
| CN102419809B (en) | Safe, efficient and universal method for proving original value of electronic document | |
| CN108694594A (en) | Commodity source tracing method and device, electronic equipment based on block chain | |
| CN110036389A (en) | Quickly to track the method and system of the navigation of block chain via data manipulation | |
| JP2021514510A (en) | Logistics tracking and source identification methods, application servers, blockchain nodes and media | |
| Lin et al. | A cloud-based authentication protocol for RFID supply chain systems | |
| WO2020121265A1 (en) | System, device and method for securely transferring information from a hardware to a blockchain | |
| US20220398601A1 (en) | System and Method for Verifying Authenticity of Physical Goods | |
| CN110740038A (en) | Block chain and communication method, gateway, communication system and storage medium thereof | |
| KR102272928B1 (en) | Operating method for machine learning model using encrypted data and apparatus based on machine learning model | |
| CN109815289A (en) | Block generation method, calculating equipment, storage medium for block chain network | |
| CN111798254A (en) | Tracing code generation method, device, equipment and readable storage medium | |
| TWI419055B (en) | Group proving method and radio frequency identification reader and tags using thereof | |
| CN109034842B (en) | Blockchain-based agricultural product supply chain traceability system and method | |
| US8446260B2 (en) | Group proving method and radio frequency identification reader and tags using thereof | |
| CN119204942B (en) | Photovoltaic product supply chain tracing method and system | |
| CN102227108B (en) | Electronic pedigree single point generation method with credible processes and verification method thereof | |
| CN115643047B (en) | A Blockchain Identity Authentication Method Based on Integrity Rewards | |
| WO2024221420A1 (en) | Anti-counterfeiting information generation method and apparatus, and product verification method and apparatus |