Anti-tampering and forgery method of paper secret-related carrier based on RFID key chain

A technology of secret-related carriers and RFID tags, applied in the field of security protection of secret-related carriers, can solve the problems of heavy manual detection work, loose structure of paper-based secret-related carriers, and difficulty in ensuring the safety of inner pages, etc. The effect of counterfeit paper secret carrier attack, high-intensity security check, and high robustness

Active Publication Date: 2019-02-01
JIANGSU ELECTRIC POWER CO
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The intensity of manual inspection is high: after long-term accumulation of paper-based secret-related carriers, including various files, drawings and other materials, it is difficult to manually detect them one by one;
[0004] 2. The result of manual inspection cannot be guaranteed: manual inspection can only detect whether the paper-based confidential carrier exists, whether the surface and inner pages are complete, and cannot detect whether the inner pages have been tampered with, etc.;
[0006] 1. The information in the RFID tag can be forged. Although some studies have encrypted the unique tag ID in the RFID combined with the information of the confidential carrier and written it into the RFID tag, so as to identify the corresponding confidential carrier through the unique RFID tag ID, but There are still problems with this method. Although the ID in the RFID tag is unique, it is feasible to forge the RFID tag with the same ID through certain means;
[0007] 2. Although the unique identification ID of the RFID tag can be bound to a unique and corresponding secret-related carrier, this method is not suitable for paper-based secret-related carriers, because the structure of paper-based secret-related carriers is relatively loose, and its inner pages are easily stolen. Page extraction, replacement, and tampering. Although RFID tags can be bound to the cover information of paper-based confidential carriers, it is difficult to ensure the security of their inner pages.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-tampering and forgery method of paper secret-related carrier based on RFID key chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described below in conjunction with specific drawings and embodiments.

[0041] The present invention proposes a method for anti-tampering and counterfeiting of a paper-based secret-related carrier based on an RFID key chain, including:

[0042] (1) Establishing an information database of paper-based secret-related carriers;

[0043] The paper secret-related carrier information database mainly includes: the global information of the paper secret-related carrier, the RFID unique identification ID corresponding to the paper secret-related carrier, and the summary information string of the inner page of the paper secret-related carrier; among them:

[0044] The global information of the paper-based secret-related carrier includes but is not limited to: the secret-related number, level, name, carrier creator, creation date, etc. of the paper-based secret-related carrier;

[0045] The unique identification ID of the RFID tag correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a paper secret-related carrier anti-tampering and forgery method based on RFID key chain, which comprises the following steps: step S2, generating a paper secret-related carrierkey chain; Includes S2.1, generating root key V0 of paper secret-related carrier key chain, generating parameters of V0 include: global information character string of paper secret-related carrier, recorded as G, The unique identification ID of RFID tag corresponding to the paper secret-related carrier is recorded as RID. A formula shown in the description is computed and generated by one-way HASH function F, where the symbol shown in the description is string join operator; S2.2, construction of key chain; A summary information string corresponding to a page in each page of that pap secret-related carrier is sequentially obtained, and the key string Vx generate on the previous page of the page is determined by using a one-way HASH function F. 1 and an inner page summary information string S of the page to generate a key Vx-1 of the page; Step S3, the key chain of the paper secret-related carrier is attached to the paper secret-related carrier. The invention realizes the safety protection of the paper secret-related carrier.

Description

technical field [0001] The invention relates to the technical field of security protection of secret-related carriers, and in particular to technologies such as anti-alteration, tampering, page extraction, and page addition of inner-page documents of paper-based secret-related carriers. Background technique [0002] Paper-based secret-related carriers account for a large proportion of secret-related materials, and most of them are long-term preserved secret-related carriers. The preservation and confidentiality inspection of this part of materials is an important part of the management of secret-related materials. Paper-based secret-related carriers are different from electronic carriers, such as U disks and mobile storage devices. Electronic secret-related carriers such as U disks and mobile storage devices can be detected by various software and intelligent hardware. Paper-based secret-related carriers themselves are not electronic. At present, the confidentiality inspecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00H04L29/06H04L9/08
CPCG06K17/00H04L9/0863H04L63/123
Inventor 程熹黄峻岭张磊波陈莉孙加洪雅迪袁田
Owner JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products