摘自:物联网安全技术 施荣华
原论文:A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone
EPC memory bank
EPC Memory: This memory bank stores the EPC code, or the Electronic Product Code. It has a minimum of 96 bits of writable memory. The EPC memory is what is typically used in most applications if they only need 96 bits of memory. There are some tags that have the capability of allocating more bits to the EPC memory from the user memory. EPC memory is your first writable memory bank.
Types of Memory in RFID Tags - atlasRFIDstore
Unless the EPC memory area is locked, EPC values can be read and rewritten as many times as necessary.
17 Things You Might Not Know About Gen 2 RFID Tag Memory Banks - atlasRFIDstore
The purpose of this document is to outline a common process for write-protecting the EPC memory bank of UHF RFID tags while avoiding technical details that may become antiquated or vary between RFID chip supplier. While some RFID applications (such as those in a closed-loop environment) may not opt to write-protect RFID tags, many RFID solutions rely on tag data to be write protected. The EPC memory bank (MB01) contains serialized identification keys (EPC) that allow the unique identification of items to which the RFID tag is attached to. If the desire is to possibly change the EPC tag data after it is encoded, then the approach of “Locking” the tag (and readprotecting the password) may be used. If the desire is to not allow any changes to the EPC-enabled RFID tags, then Permalocking the EPC memory bank may be used.
GS1 US EPC Write Protection Recommendation
从上面直到EPC memory bank就是标签里放信息的位置,但它有权限,所有有lock和unlock。
passive tag, mobile phone provides write lock and write unlock feature against EPC memory bank.
Figure 4 shows the modification process and restoration process of RFID tag ID.
The original tag I D ( I D O ) ID(ID_O) ID(IDO) at figure 4 applies the specific code standard. Generally, it is the initial tag ID written by manufacturer or retailer.
Mobile phone makes the temporal tag I D ( I D E ) ID(ID_E) ID(IDE) by using cryptographic algorithm.
As shown at figure 4, the procedure of modification applies the following steps.
Figure 4 shows how to restore the original tag ID from encrypted tag ID, in order to connect the ODS server and application server located at the backend. The following steps are for it.
步骤中也明显显示了是new id
摘自:物联网安全技术 施荣华
原论文:Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security
示意图如下所示,这个示意图有点不一样,稍微改了下,可以看原论文:
S S S | A nonce generated by pseudorandom number generator
E I D E_{ID} EID | Encrypted tag ID using current key, an operation done in tag.
E I D ′ E'_{ID} EID′ | Encrypted tag ID using current key, an operation done in database.
R R R | Random bit streams generated in tag
R ′ R' R′ | Random bit streams generated in database
这里主要有几点可以辅助理解,具体的流程还是看论文中3.3 Authentication Process节