Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-tampering and forgery method of paper-based confidential carrier based on rfid key chain

A technology of secret-related carriers and RFID tags, which is applied in the field of security protection of secret-related carriers, can solve the problems of loose structure of paper-based secret-related carriers, heavy manual inspection work, and difficulty in ensuring the safety of inner pages, etc., and achieves high-intensity security inspection, Realize the effect of security check and high robustness

Active Publication Date: 2021-11-02
JIANGSU ELECTRIC POWER CO
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The intensity of manual inspection is high: after long-term accumulation of paper-based secret-related carriers, including various files, drawings and other materials, it is difficult to manually detect them one by one;
[0004] 2. The result of manual inspection cannot be guaranteed: manual inspection can only detect whether the paper-based confidential carrier exists, whether the surface and inner pages are complete, and cannot detect whether the inner pages have been tampered with, etc.;
[0006] 1. The information in the RFID tag can be forged. Although some studies have encrypted the unique tag ID in the RFID combined with the information of the confidential carrier and written it into the RFID tag, so as to identify the corresponding confidential carrier through the unique RFID tag ID, but There are still problems with this method. Although the ID in the RFID tag is unique, it is feasible to forge the RFID tag with the same ID through certain means;
[0007] 2. Although the unique identification ID of the RFID tag can be bound to a unique and corresponding secret-related carrier, this method is not suitable for paper-based secret-related carriers, because the structure of paper-based secret-related carriers is relatively loose, and its inner pages are easily stolen. Page extraction, replacement, and tampering. Although RFID tags can be bound to the cover information of paper-based confidential carriers, it is difficult to ensure the security of their inner pages.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-tampering and forgery method of paper-based confidential carrier based on rfid key chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described below in conjunction with specific drawings and embodiments.

[0041] The present invention proposes a method for anti-tampering and counterfeiting of a paper-based secret-related carrier based on an RFID key chain, including:

[0042] (1) Establishing an information database of paper-based secret-related carriers;

[0043] The paper secret-related carrier information database mainly includes: the global information of the paper secret-related carrier, the RFID unique identification ID corresponding to the paper secret-related carrier, and the summary information string of the inner page of the paper secret-related carrier; among them:

[0044] The global information of the paper-based secret-related carrier includes but is not limited to: the secret-related number, level, name, carrier creator, creation date, etc. of the paper-based secret-related carrier;

[0045] The unique identification ID of the RFID tag correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an RFID key chain-based anti-tampering and forgery method for a paper-based secret-related carrier, comprising the following steps: step S2, generating a paper-based secret-related carrier key chain; including: S2.1, generating a paper-based secret-related carrier The root key V0 of the key chain, the generation parameters of V0 include: the global information string of the paper-based secret-related carrier, denoted as G; the unique ID of the RFID tag corresponding to the paper-based secret-related carrier, denoted as RID; HASH function F, calculate and generate V0=F(G || RID), where || is a string connection operator; S2.2, construction of key chain; sequentially obtain the correspondence of each inner page of the paper secret-related carrier Use the one-way HASH function F to generate the key Vx of the page from the key string Vx-1 generated on the previous page of the page and the summary information string S of the inner page of the page; steps S3, the attachment of the paper secret-related carrier key chain and the paper secret-related carrier. The invention realizes the safety protection of the paper secret-related carrier.

Description

technical field [0001] The invention relates to the technical field of security protection of secret-related carriers, and in particular to technologies such as anti-alteration, tampering, page extraction, and page addition of inner-page documents of paper-based secret-related carriers. Background technique [0002] Paper-based secret-related carriers account for a large proportion of secret-related materials, and most of them are long-term preserved secret-related carriers. The preservation and confidentiality inspection of this part of materials is an important part of the management of secret-related materials. Paper-based secret-related carriers are different from electronic carriers, such as U disks and mobile storage devices. Electronic secret-related carriers such as U disks and mobile storage devices can be detected by various software and intelligent hardware. Paper-based secret-related carriers themselves are not electronic. At present, the confidentiality inspecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00H04L29/06H04L9/08
CPCG06K17/00H04L9/0863H04L63/123
Inventor 程熹黄峻岭张磊波陈莉孙加洪雅迪袁田
Owner JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products