[go: up one dir, main page]

CN113052284A - Electronic seal safety performance detection method - Google Patents

Electronic seal safety performance detection method Download PDF

Info

Publication number
CN113052284A
CN113052284A CN202110299982.9A CN202110299982A CN113052284A CN 113052284 A CN113052284 A CN 113052284A CN 202110299982 A CN202110299982 A CN 202110299982A CN 113052284 A CN113052284 A CN 113052284A
Authority
CN
China
Prior art keywords
detection
data
fails
successful
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110299982.9A
Other languages
Chinese (zh)
Other versions
CN113052284B (en
Inventor
王汉维
曹亮
郭广权
张能娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Xike Microelectronics Co ltd
Original Assignee
Xi'an Xike Microelectronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Xike Microelectronics Co ltd filed Critical Xi'an Xike Microelectronics Co ltd
Priority to CN202110299982.9A priority Critical patent/CN113052284B/en
Priority claimed from CN202110299982.9A external-priority patent/CN113052284B/en
Publication of CN113052284A publication Critical patent/CN113052284A/en
Application granted granted Critical
Publication of CN113052284B publication Critical patent/CN113052284B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本发明提供了一种电子封印安全性能检测方法,针对已发行状态的电子封印安全性能检测包括封印盘点、封印核对、数据验证、身份鉴别检测、访问控制检测、信息读取检测、信息验证检测和密钥更新检测;与现有技术相比,本发明用户在初始化时设置的状态不同时,对应的检测内容不同,可单步检测,也可自动检测,检测流程简化,在不减少检测内容的情况下,检测流程结构清晰,支持查询结果,打印检测文档等,能为操作员带来极大的便利,提高了工作效率。

Figure 202110299982

The invention provides a method for detecting the security performance of an electronic seal. The security performance detection of an electronic seal in the issued state includes a seal inventory, a seal check, data verification, identity authentication detection, access control detection, information reading detection, information verification detection and Key update detection; compared with the prior art, when the state set by the user during initialization is different, the corresponding detection content is different. Single-step detection or automatic detection can be performed, the detection process is simplified, and the detection content is not reduced. Under the circumstance, the inspection process has a clear structure, supports query results, prints inspection documents, etc., which can bring great convenience to the operator and improve work efficiency.

Figure 202110299982

Description

Electronic seal safety performance detection method
Technical Field
The invention relates to the technical field of electronic seals, in particular to a method for detecting the safety performance of an electronic seal.
Background
The existing detection method of the electronic seal has no standard, each enterprise completes detection according to the related non-standard machinery or by adopting manual test, detection data cannot be recorded uniformly, the detection process cannot be managed and controlled centrally, data inquiry is not supported, a recorded result is not supported, a printed report is not supported, the working efficiency is low, and the like.
Disclosure of Invention
The invention provides a method for detecting the safety performance of an electronic seal, which is used for at least solving the problems of low working efficiency caused by the fact that data query, record result and print report are not supported in the related technology.
Therefore, the technical scheme provided by the invention is as follows:
a method for detecting the safety performance of an electronic seal aims at the safety performance detection of the electronic seal in a published state and comprises seal checking, data verification, identity authentication detection, access control detection, information reading detection, information verification detection and key updating detection; the method specifically comprises the following steps:
the seal checking module is used for receiving a corresponding instruction of a user, reading all electronic seals in the current working area, storing the serial numbers of the electronic seals and displaying the serial numbers of the electronic seals in a pull-down menu corresponding to the storage codes in the seal label code area;
seal checking, namely receiving a corresponding instruction of a user, acquiring a seal number selected from a pull-down menu corresponding to a current storage code, and reading data of a seal represented by the seal number; if the read data is correctly returned, prompting that the checking is successful; if the data is not returned, prompting that the checking fails;
data verification, namely receiving a corresponding instruction of a user, requesting a set number of random numbers from the electronic seal, starting a verification pseudo-random number interface, inputting the requested random numbers into the verification pseudo-random number interface for verification, and prompting that the data verification fails if the probability of the random numbers passing the verification is smaller than a set value, otherwise, the data verification succeeds; and outputting the verification result to an input field of the random number verification area;
identity authentication detection, receiving corresponding instructions of a user, performing encryption server and reader-writer state detection and seal matching detection, if successful, continuing execution, and if failed, ending, and not performing subsequent steps;
access control detection, namely receiving data selected or filled by a USER, placing the data in a USER data area, receiving a corresponding instruction of the USER, writing the data in the USER data area into a pre-designed data storage structure, and performing access control detection;
reading and detecting information, receiving a corresponding instruction of a user, and reading data in the electronic seal by calling an interface operation controller and an antenna;
information verification detection, namely receiving a corresponding instruction of a user, reading data in the electronic seal, and storing verification after reading; the storage verification specifically comprises the following steps: acquiring data filled in the USER data area by a USER, and comparing the data with the read decrypted data; if the comparison fails, the information verification detection fails;
and key updating detection, receiving a corresponding instruction of a user, and executing the following steps:
detecting the states of the GX1, the encryption server and the reader-writer and detecting the seal matching, if the detection is successful, continuing to execute, and if the detection is failed, locking detection fails;
GX2, acquiring a new key and an original key by calling an interface provided by an encryption server, and if the key acquisition fails, failing to detect the key update;
GX3, writing a new key into the reserved area through a calling interface, and if the writing fails, failing to update and detect the key;
GX4, downloading the new key to the controller through a calling interface, and if downloading fails, failing in key updating detection;
if all of the above steps GX1, GX2, GX3 and GX4 are successfully executed, the key update detection is successful.
Optionally, in the seal verification step, if the data is not returned, repeated verification is performed, and if the verification still fails after repeated verification for multiple times, the process is ended.
Optionally, in the step of identity authentication detection, the encryption server and the reader/writer state detection and the seal matching detection are performed, and the method specifically includes the following SF1 step and/or SF2 step:
SF1, updating the error key to the reader through the key issuing interface, at this time, writing data into the chip, and detecting that the error key is used for writing data into the electronic seal; if the data is successfully written, prompting that the identity authentication detection fails;
SF2, obtaining a correct initial key through a key issuing interface, updating the correct initial key into a reader-writer, writing data into a chip at the moment, and detecting that the correct initial key is used for writing the data into an electronic seal; if the data is successfully written, the identity authentication is prompted to be successful, otherwise, the identity authentication detection fails.
Optionally, the access control detection specifically sequentially executes the following steps:
FW1, encryption server and reader/writer state detection and seal matching detection, if successful, continuing execution, and if failed, failing access control detection;
FW2, which calls the interface of the encryption server to encrypt the data storage structure; if the encryption processing fails, the access control detection fails;
FW3, writing the encrypted data into the USER data area of the electronic seal by calling the service interface; if the data writing fails, the access control detection fails;
and if the three steps are executed successfully in sequence, the access control detection is successful.
Optionally, the reading of the data in the electronic seal specifically includes the following steps:
DQ1, encryption server and reader-writer state detection and seal matching detection, and the successful execution continues, and the failure information reading detection fails;
DQ2, setting a data reading structure, configuring related data into the structure, calling a provided data reading function interface, and reading data in an EPC area; if the read data is not returned, reading the EPC data fails;
DQ3, setting a data reading structure, configuring related data into the structure, calling a provided data reading function interface, and reading data in the TID area; if the read data is not returned, the TID data reading fails;
DQ4, setting a data reading structure, configuring related data into the structure, calling a provided data reading function interface, and reading data in a USER area; if the read data is not returned, the USER data is failed to be read;
and if the four steps are successfully executed, the information reading detection is successful.
Optionally, before detecting the security performance of the electronic seal in the issued state, receiving an initialization setting performed by a user;
if the user selects to issue, the electronic seal safety performance detection aiming at the issued state is carried out;
if the user selects not to issue and not to deactivate, the corresponding electronic seal safety performance detection comprises seal checking, locking detection, unlocking detection and information reading detection;
if the user selects not to issue and inactivate, the corresponding electronic seal safety performance detection comprises seal checking, locking detection, unlocking detection, information reading detection and inactivation detection.
Optionally, the lock detection includes the following steps:
the SD1 receives the electronic seal number selected by the user and provides a correct password and an incorrect password for the user;
SD2, encryption server and reader-writer state detection and seal matching detection, if successful, the execution is continued, and if failed, the locking detection is failed;
SD3, locking USER area test, writing access password into REV area; the USER area is not locked by using a password for testing, and if the locking is successful, the locking is tested to be failed; locking the USER area by using an error password for testing, and if the locking is successful, the locking is tested to be failed; using correct password to lock the test, if the locking fails, the locking test is failed; if all three small steps in the step are successfully detected, the detection of locking the USER area is successful;
SD4, locking access test, writing access password into REV area; the password locking access test is not used, and if the locking is successful, the locking test is failed; locking the access area by using an error password, and if the locking is successful, the locking detection is failed; locking the access area by using a correct password, and if the locking fails, the locking detection is failed; if the detection of all the three small steps in the step is successful, the detection of the lock access is successful;
the above steps SD2, SD3, and SD4 are all performed successfully, the lock detection is successful.
Optionally, the unlocking detection includes the following steps:
JS1, detecting the states of the encryption server and the reader-writer, and detecting seal matching, if the detection is successfully executed continuously, and if the detection is failed to be locked;
JS2, detecting an unlocked USER area, testing without using a password to unlock the USER area, and if unlocking is successful, failing to unlock the USER area; using a wrong password to unlock the USER area test, and if unlocking is successful, failing to unlock the USER area; unlocking the USER area test by using a correct password, and if the unlocking fails, the USER area unlocking test fails; if the detection of the three sub-steps is successful, the detection of unlocking the USER area is successful;
JS3, detecting an unlocking access area, testing without using a password to unlock the access area, and if unlocking is successful, detecting failure of unlocking the access area; unlocking detection of the access area by using the wrong password, and if unlocking is successful, detecting failure of unlocking the access area; unlocking detection of the access area by using a correct password, and if unlocking fails, detecting the unlocking detection of the access area fails; if the detection of the three sub-steps is successful, the unlocking access detection is successful;
and if the steps JS1, JS2 and JS3 are successfully executed, the unlocking detection is successful.
Optionally, the inactivation detection comprises the following steps:
MH1, receiving the corresponding instruction of the user, and acquiring the inactivation password;
MH2, calling the interface to write the right inactivation password into REV area; if the writing fails, the inactivation detection fails;
MH3, calling an interface to use an error inactivation password to carry out inactivation detection; if the inactivation is successful, the inactivation detection fails;
MH4 calls the interface to use the right inactivation password to carry out inactivation detection, if the inactivation fails, the inactivation detection fails;
and if the detection of the four steps is successful, the inactivation detection is successful.
Optionally, the method for detecting the security performance of the electronic seal is implemented based on the following devices;
the device comprises a reader-writer, an antenna, a wireless scanning gun and a computer; the reader-writer is connected with the computer through a first USB data interface to transmit data; the reader-writer is also connected with the antenna through a corresponding radio frequency data transmission line, and the antenna is used for transmitting radio frequency signals to read and write data of the electronic seal; the wireless scanning gun is used for scanning the two-dimensional code on the front surface of the ultrahigh frequency electronic seal to acquire data therein, and is connected with the computer through a second USB data interface to perform data transmission; the computer is used for running detection software, configuring detection parameters through the information input and output component of the computer and outputting detection results.
The invention has the following beneficial effects:
the invention has the advantages that when the states set by the user during initialization are different, the corresponding detection contents are different, single-step detection can be realized, automatic detection can also be realized, the detection process is simplified, the detection process has a clear structure under the condition of not reducing the detection contents, the query result is supported, the detection document is printed, the like, great convenience is brought to operators, and the working efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of an initialization logic of an embodiment of the present invention;
FIG. 2 is a flow chart of seal detection logic according to an embodiment of the present invention;
FIG. 3 is a logic flow diagram of an auxiliary function according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that, although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order different from that shown or described herein.
Fig. 1 is a flow chart of initialization logic for an embodiment of the present invention, as shown in fig. 1,
firstly, the method comprises the following steps: connecting encryption servers
The user sets the correct IP address and port, clicks the login button, and the detection software logs in the encryption server by calling the login interface of the encryption server provided by the third party. The log-in result is output in the log column, if the log-in fails, an error code is returned to search the cause and eliminate the fault.
II, secondly: connection reader-writer
And a user clicks a button for connecting the reader-writer, the detection software is connected to the reader-writer by calling a request connection interface provided by the ultrahigh-frequency single-channel reader-writer, a connection result is output in a log column, and if the connection fails, an error code is returned so as to search for reasons and eliminate faults. After the connection is successful, the updating power frequency button is changed from an unavailable state to an available state, at the moment, the power frequency value needing to be set can be input into the corresponding input box, and the current power frequency value can be updated by clicking the updating power frequency button.
Thirdly, the method comprises the following steps: set state
The user needs to select the seal release state, which includes two types of release state and non-release state, the seal in the release state can not be inactivated, the non-release seal supports inactivation, and the user also needs to select whether to perform inactivation detection. And selecting different states, wherein the seal detection process corresponds to different detection processes.
Fourthly, the method comprises the following steps: logic flow diagram
Flow analysis: after the user opens the detection software for the first time, the correct IP address and port are set, after the user successfully logs in the encryption server by clicking the button, the user can click the button to connect the reader-writer, after the reader-writer is successfully connected, the updating power and frequency can be set, and then the issuing state and whether to be inactivated or not are selected according to the requirement, so that the initialization work is completed.
FIG. 2 is a flow chart of seal detection logic according to an embodiment of the present invention, as shown in FIG. 2:
firstly, the method comprises the following steps: analysis of detection procedure
When the states set by the user during initialization are different, the corresponding detection contents are different:
when the selection is issued: the detection function comprises 8 steps of seal checking, data verification, identity authentication, access control, information reading, information verification and key updating.
Selection without release and inactivation: the detection function comprises 5 steps of seal checking, locking detection, unlocking detection and information reading.
Selection without release and inactivation: the detection function comprises 6 steps of seal checking, locking detection, unlocking detection, information reading and inactivation detection.
II, secondly: single step detection process
This section details the logic in performing each of the functions.
Key setting
The user selects the type of the key firstly when entering the seal detection page, the key is divided into a public key and a private key, and the state of the key is selected automatically according to the current electronic seal.
Seal scanning
A user scans the two-dimensional code pattern on the front surface of the electronic seal through a scanning gun, obtains serial number data, transmits the serial number data to detection software through a USB data line, displays the serial number data in a scanning code input field in a seal label code area, collects data for later seal check detection, and enables the user to know the serial number of the seal in operation.
Seal checking
And clicking a seal checking button by a user, calling an interface function by detection software, controlling a reader-writer and an antenna, reading all seals in the current working area, storing the serial numbers of the seals and displaying the serial numbers in a pull-down menu corresponding to the storage codes in the seal label code area.
Seal verification
The user clicks a seal checking button, the detection software acquires a seal number selected from a pull-down menu of the current storage code, the data of the seal represented by the seal number is read by using a reader-writer and an antenna by calling a data interface function, if the read data is correctly returned, the checking is successful, if the data is not returned, the checking is failed, and the checking can be repeated for multiple times.
Lock detection
The user selects the electronic seal number to obtain a correct password and an incorrect password. And clicking a locking detection button, and controlling the controller and the antenna to perform locking test on the seal by the detection software. The test flow comprises the following steps:
and detecting the states of the encryption server and the reader-writer and matching and detecting the seal, and if the detection is successfully continued, the detection of the failed locking fails.
Locking the USER area detection and writing the access password into the REV area. The USER area is locked without using the password for testing, and if the locking is successful, the locking detection fails; the USER area is locked by using the error password for testing, and if the locking is successful, the locking detection fails; using correct password to lock the test, if the locking fails, the locking detection fails; and if the detection of the three small steps is successful, the detection of the locked USER area is successful.
The access test is locked, and the access password is written to the REV area. If the password locking access test is not used, and the locking is successful, the locking detection fails; locking the access area by using the error password, and if the locking is successful, the locking detection fails; and locking the access area by using the correct password, and if the locking fails, failing to detect the locking. And if the detection of the three small steps is successful, the locking access detection is successful.
And when the three steps are successfully executed, the locking detection is successful.
Unlock detection
The user clicks the locking detection button, the detection software controls the controller and the antenna to carry out unlocking detection on the seal, and the test flow comprises the following steps:
and detecting the states of the encryption server and the reader-writer and matching and detecting the seal, and if the detection is successfully continued, the detection of the failed locking fails.
Detecting an unlocking USER area, testing without using a password to unlock the USER area, and if the unlocking is successful, failing to unlock the USER area; and (4) unlocking the USER area by using the wrong password for testing, and if the unlocking is successful, failing to unlock the USER area. And unlocking the USER area test by using the correct password, and if the unlocking fails, unlocking the USER area test fails. And if the detection of the three small steps is successful, the detection of unlocking the USER area is successful.
Unlocking the access area detection, unlocking the access area test without using a password, and if the unlocking is successful, the unlocking of the access area detection fails; unlocking the access area detection by using the wrong password, and if the unlocking is successful, the unlocking of the access area detection fails; and unlocking the access area detection by using the correct password, and if the unlocking fails, the unlocking of the access area detection fails. And if the detection of the three small steps is successful, the unlocking access detection is successful.
And if the three steps are successfully executed, the unlocking detection is successful.
Data validation
The user clicks a data verification button, the detection software requests a certain number of random numbers from the electronic seal through calling the interface, controls the controller and the antenna, inputs the requested random numbers into the verification interface for verification according to the provided verification pseudo-random number interface, and if the probability that the random numbers pass the verification is less than 90%, the verification is failed, otherwise, the verification is successful. The authentication result is output to an input field of the random number authentication area.
Identity authentication
And clicking an identity authentication button by a user, and controlling the reader-writer and the antenna by the detection software through a calling interface to carry out identity authentication. The method comprises the following main steps:
and (4) detecting the states of the encryption server and the reader-writer and performing seal matching detection, and if the execution is successfully continued, failing identity authentication detection fails.
And updating the error key into a reader-writer through a key issuing interface, writing data into the chip at the moment, and detecting that the data is written into the electronic seal by using the error key. If the data writing is successful, the identity authentication detection fails.
And acquiring a correct initial key through the interface, updating the initial key into the reader-writer, writing data into the chip at the moment, and detecting that the correct key is used for writing the data into the electronic seal. If the data is successfully written, the identity authentication is successful, otherwise, the identity authentication detection fails.
Access control
The USER firstly selects or fills data in the USER data area, clicks an access control button, and the detection software writes the data in the USER data area into a designed data storage structure to perform access control detection, and the main steps comprise:
and detecting the states of the encryption server and the reader-writer and matching and detecting the seal, and if the detection is successfully continued, the detection of the failed access control fails.
And carrying out encryption processing on the data storage structure by calling an interface of the encryption server. If the encryption process fails, the access control detection fails.
And writing the encrypted data into a USER data area of the electronic seal by calling the service interface, operating the controller and the antenna. If the write data fails, the access control detection fails.
And if the three steps are executed successfully in sequence, the access control detection is successful.
Information reading
And clicking an information reading button by a user, and reading the data in the electronic seal by the detection software by calling the interface operation controller and the antenna. The method comprises the following main steps:
and detecting the states of the encryption server and the reader-writer and matching and detecting the seal, successfully continuing to execute, and failing to read and detect the failure information.
And setting a data reading structure, configuring related data into the structure, and calling a provided data reading function interface to read the data in the EPC area. If the read data is not returned, reading the EPC data fails.
And setting a data reading structure body, configuring related data into the structure body, calling the provided data reading function interface, and reading the data of the TID zone. If the read data is not returned, the TID data reading fails.
And setting a data reading structure body, configuring related data into the structure body, calling the provided data reading function interface, and reading the data in the USER area. If the read data is not returned, reading the USER data fails.
If the four steps are successfully executed, the information reading and detection are successful.
Information verification
And clicking an information verification button by a user, operating the controller and the antenna by the detection software through calling an interface, reading the data in the electronic seal, and storing and verifying the read data. The method comprises the following main steps:
and detecting the states of the encryption server and the reader-writer and matching and detecting the seal, successfully continuing to execute, and failing to verify and detect the failure information.
And calling the function of the encryption library, reading the data stored in the electronic seal, decrypting and storing. If the information fails, the information verification detection fails.
And acquiring the data filled in the USER data area by the USER, and comparing the data with the decrypted data in the previous step. If the comparison fails, the information verification detection fails.
The three steps are successfully executed, and the information verification and detection are successful.
Key renewal
And (4) clicking the key update by a user, and operating the controller and the antenna by the detection software through calling the interface to read and write data in the electronic seal. The method comprises the following main steps:
and detecting the states of the encryption server and the reader-writer and matching and detecting the seal, and if the detection is successfully continued, the detection of the failed locking fails.
And acquiring a new key and an original key by calling an interface provided by the encryption server, wherein if the key acquisition fails, the key updating detection fails.
And writing the new key into the reserved area through the calling interface, wherein if the writing fails, the key updating detection fails.
Downloading the new key to the controller through a calling interface, wherein the key updating detection fails when the downloading fails.
The four steps are successfully executed, and the key updating detection is successful.
Inactivation assay
The user clicks the key to update, the detection software operates the controller and the antenna by calling the interface, and reads and writes the data in the electronic seal, and the main steps are as follows:
and clicking the inactivation detection by the user, and acquiring an inactivation password by the detection software.
The detection software calls the interface to write the correct deactivation password to the REV area. If the write fails, the deactivation detection fails.
And the detection software calls an interface to use the wrong inactivation password to carry out inactivation detection, and if the inactivation is successful, the inactivation detection fails.
And the detection software calls an interface to use a correct inactivation password to carry out inactivation detection, and if inactivation fails, the inactivation detection fails.
The four steps are successful in detection, and the inactivation detection is successful.
Automatic verification display
And (3) automatic verification display: mainly, in the detection process, the detection result is displayed in a gray square block behind the corresponding detection step.
Single self test
Single self-test: and in the area of the seal label code, using the currently selected electronic seal in the drop-down list corresponding to the storage code to automatically detect the complete process. And after the detection is completed, a report document of the detection result of the selected electronic seal can be generated by clicking a report generation button under the single self-test.
Multiple self-test
A plurality of self-tests: in the area of the seal label code, all seals which are rolled out by using the seal rolling function are automatically detected. And after the detection is finished, a detection result report document of the electronic seal which just finishes the detection can be generated through a plurality of report generation buttons below the self-detection.
Generating reports
A single or multiple sealed test result report document is generated. Each seal generates a test result report document.
Thirdly, the method comprises the following steps: logic flow diagram
Analyzing a flow chart:
the seal detection logic service flow chart is mainly used for describing the flow of a seal detection service module of ultrahigh frequency electronic seal detection software. In the initialized service logic, when different issuing states and inactivation states are selected, the seal detection will perform different detection processes:
when the issued state is selected, the detected contents include: seal checking, data verification, identity authentication, access control, information reading, information verification and key updating.
When the unpublished state is selected and inactivation is not required, the detected content includes: seal checking, lock detection, unlock detection and information reading.
When the unpublished state is selected and inactivation is desired, the detected content includes: seal checking, locking detection, unlocking detection, information reading and inactivation detection.
FIG. 3 is a logic flow diagram of an auxiliary function according to an embodiment of the present invention, as shown in FIG. 3:
firstly, the method comprises the following steps: auxiliary function page operations
The seal is scanned using a scanning gun and the seal is clicked for confirmation.
And in the key recovery, clicking a one-key recovery key to recover the key.
Clicking to begin scanning in the power frequency sweep will display the frequency points of the sweep in the underlying planar coordinate system.
All logs printed in the execution steps are output in the log column in real time.
II, secondly: detailed detection procedure
Seal validation
The main contents are as follows: and scanning the two-dimensional code on the front surface of the electronic seal by using a scanning gun, comparing and confirming the scanning code and the storage code, and executing one-key recovery and scanning functions after successful confirmation.
One-key recovery
The process comprises the following steps:
and (4) detecting the states of the encryption server and the reader-writer, continuing to execute successfully, and failing to recover and detect the failed key.
The detection software obtains the serial number, the public key and the private key through the function interface. If the acquisition fails, the key recovery fails.
The detection software obtains the wrong key by calling the interface to attempt to write data and download the key to the controller. And if the key recovery detection fails, the key recovery detection fails.
The detection software attempts to write the data and update the correct key to the controller by calling the interface. And if the key recovery detection fails, the key recovery detection fails.
And if the four steps are successful, the key recovery detection is successful.
Start scanning
The method comprises the following steps:
and (4) detecting the states of the encryption server and the reader-writer, and if the states of the encryption server and the reader-writer are detected successfully, continuing to execute the encryption server and the reader-writer, and if the states of the encryption server and the reader-writer are detected failed, scanning fails.
And the detection software acquires the frequency range, the power range and the step data set by the user through the interface. And displaying prompt information to the user. If the scan fails, the scan fails.
And sequentially setting the power and frequency of each test through the step length, calling an interface to perform read-write operation on the electronic seal through a read-write controller and an antenna, and displaying the result in a two-dimensional coordinate system. If the read-write operation fails, the scanning fails.
If the three steps are successfully executed, the scanning is successfully executed.
Thirdly, the method comprises the following steps: logic flow diagram
Flow analysis: the auxiliary function is mainly to help recover the key and frequency range scan when the key is wrong. Firstly, a scanning gun is used for scanning the two-dimensional code on the front surface of the electronic seal, then seal confirmation is carried out, and after the confirmation is successful, the functions of key recovery and frequency scanning can be executed.
The embodiment of the invention also provides a storage medium which comprises a stored program, wherein when the program runs, the device where the storage medium is located is controlled to execute any one of the electronic seal safety performance detection methods.
The embodiment of the invention also provides a processor, wherein the processor is used for running the program, and the method for detecting the safety performance of the electronic seal is executed when the program runs.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. The electronic seal safety performance detection method is characterized in that the electronic seal safety performance detection aiming at a published state comprises seal checking, data verification, identity authentication detection, access control detection, information reading detection, information verification detection and key updating detection; the method specifically comprises the following steps:
the seal checking module is used for receiving a corresponding instruction of a user, reading all electronic seals in the current working area, storing the serial numbers of the electronic seals and displaying the serial numbers of the electronic seals in a pull-down menu corresponding to the storage codes in the seal label code area;
seal checking, namely receiving a corresponding instruction of a user, acquiring a seal number selected from a pull-down menu corresponding to a current storage code, and reading data of a seal represented by the seal number; if the read data is correctly returned, prompting that the checking is successful; if the data is not returned, prompting that the checking fails;
data verification, namely receiving a corresponding instruction of a user, requesting a set number of random numbers from the electronic seal, starting a verification pseudo-random number interface, inputting the requested random numbers into the verification pseudo-random number interface for verification, and prompting that the data verification fails if the probability of the random numbers passing the verification is smaller than a set value, otherwise, the data verification succeeds; and outputting the verification result to an input field of the random number verification area;
identity authentication detection, receiving corresponding instructions of a user, performing encryption server and reader-writer state detection and seal matching detection, if successful, continuing execution, and if failed, ending, and not performing subsequent steps;
access control detection, namely receiving data selected or filled by a USER, placing the data in a USER data area, receiving a corresponding instruction of the USER, writing the data in the USER data area into a pre-designed data storage structure, and performing access control detection;
reading and detecting information, receiving a corresponding instruction of a user, and reading data in the electronic seal by calling an interface operation controller and an antenna;
information verification detection, namely receiving a corresponding instruction of a user, reading data in the electronic seal, and storing verification after reading; the storage verification specifically comprises the following steps: acquiring data filled in the USER data area by a USER, and comparing the data with the read decrypted data; if the comparison fails, the information verification detection fails;
and key updating detection, receiving a corresponding instruction of a user, and executing the following steps:
detecting the states of the GX1, the encryption server and the reader-writer and detecting the seal matching, if the detection is successful, continuing to execute, and if the detection is failed, locking detection fails;
GX2, acquiring a new key and an original key by calling an interface provided by an encryption server, and if the key acquisition fails, failing to detect the key update;
GX3, writing a new key into the reserved area through a calling interface, and if the writing fails, failing to update and detect the key;
GX4, downloading the new key to the controller through a calling interface, and if downloading fails, failing in key updating detection;
if all of the above steps GX1, GX2, GX3 and GX4 are successfully executed, the key update detection is successful.
2. The method for detecting the security of the electronic seal according to claim 1, wherein in the seal verification step, if data is not returned, the verification is repeated, and if the verification fails after repeated verification for a plurality of times, the method is ended.
3. The method for detecting the security of the electronic seal according to claim 1, wherein in the step of identity authentication detection, the detection of the states of the encryption server and the reader/writer and the detection of seal matching are performed, and the method specifically comprises the following steps of SF1 and/or SF 2:
SF1, updating the error key to the reader through the key issuing interface, at this time, writing data into the chip, and detecting that the error key is used for writing data into the electronic seal; if the data is successfully written, prompting that the identity authentication detection fails;
SF2, obtaining a correct initial key through a key issuing interface, updating the correct initial key into a reader-writer, writing data into a chip at the moment, and detecting that the correct initial key is used for writing the data into an electronic seal; if the data is successfully written, the identity authentication is prompted to be successful, otherwise, the identity authentication detection fails.
4. The method for detecting the security performance of the electronic seal according to claim 1, wherein the access control detection specifically performs the following steps in sequence:
FW1, encryption server and reader/writer state detection and seal matching detection, if successful, continuing execution, and if failed, failing access control detection;
FW2, which calls the interface of the encryption server to encrypt the data storage structure; if the encryption processing fails, the access control detection fails;
FW3, writing the encrypted data into the USER data area of the electronic seal by calling the service interface; if the data writing fails, the access control detection fails;
and if the three steps are executed successfully in sequence, the access control detection is successful.
5. The method for detecting the security performance of the electronic seal according to claim 1, wherein reading the data in the electronic seal specifically comprises the following steps:
DQ1, encryption server and reader-writer state detection and seal matching detection, and the successful execution continues, and the failure information reading detection fails;
DQ2, setting a data reading structure, configuring related data into the structure, calling a provided data reading function interface, and reading data in an EPC area; if the read data is not returned, reading the EPC data fails;
DQ3, setting a data reading structure, configuring related data into the structure, calling a provided data reading function interface, and reading data in the TID area; if the read data is not returned, the TID data reading fails;
DQ4, setting a data reading structure, configuring related data into the structure, calling a provided data reading function interface, and reading data in a USER area; if the read data is not returned, the USER data is failed to be read;
and if the four steps are successfully executed, the information reading detection is successful.
6. The method for detecting the security performance of the electronic seal according to claim 1, wherein initialization settings made by a user are received before the detection of the security performance of the electronic seal for the issued state;
if the user selects to issue, the electronic seal safety performance detection aiming at the issued state is carried out;
if the user selects not to issue and not to deactivate, the corresponding electronic seal safety performance detection comprises seal checking, locking detection, unlocking detection and information reading detection;
if the user selects not to issue and inactivate, the corresponding electronic seal safety performance detection comprises seal checking, locking detection, unlocking detection, information reading detection and inactivation detection.
7. The electronic seal security performance detection method of claim 6, wherein the lock detection comprises the following steps:
the SD1 receives the electronic seal number selected by the user and provides a correct password and an incorrect password for the user;
SD2, encryption server and reader-writer state detection and seal matching detection, if successful, the execution is continued, and if failed, the locking detection is failed;
SD3, locking USER area test, writing access password into REV area; the USER area is not locked by using a password for testing, and if the locking is successful, the locking is tested to be failed; locking the USER area by using an error password for testing, and if the locking is successful, the locking is tested to be failed; using correct password to lock the test, if the locking fails, the locking test is failed; if all three small steps in the step are successfully detected, the detection of locking the USER area is successful;
SD4, locking access test, writing access password into REV area; the password locking access test is not used, and if the locking is successful, the locking test is failed; locking the access area by using an error password, and if the locking is successful, the locking detection is failed; locking the access area by using a correct password, and if the locking fails, the locking detection is failed; if the detection of all the three small steps in the step is successful, the detection of the lock access is successful;
the above steps SD2, SD3, and SD4 are all performed successfully, the lock detection is successful.
8. The electronic seal security performance detection method of claim 7, wherein the unlocking detection comprises the following steps:
JS1, detecting the states of the encryption server and the reader-writer, and detecting seal matching, if the detection is successfully executed continuously, and if the detection is failed to be locked;
JS2, detecting an unlocked USER area, testing without using a password to unlock the USER area, and if unlocking is successful, failing to unlock the USER area; using a wrong password to unlock the USER area test, and if unlocking is successful, failing to unlock the USER area; unlocking the USER area test by using a correct password, and if the unlocking fails, the USER area unlocking test fails; if the detection of the three sub-steps is successful, the detection of unlocking the USER area is successful;
JS3, detecting an unlocking access area, testing without using a password to unlock the access area, and if unlocking is successful, detecting failure of unlocking the access area; unlocking detection of the access area by using the wrong password, and if unlocking is successful, detecting failure of unlocking the access area; unlocking detection of the access area by using a correct password, and if unlocking fails, detecting the unlocking detection of the access area fails; if the detection of the three sub-steps is successful, the unlocking access detection is successful;
and if the steps JS1, JS2 and JS3 are successfully executed, the unlocking detection is successful.
9. The method for detecting the security performance of the electronic seal according to claim 6, wherein the inactivation detection comprises the following steps:
MH1, receiving the corresponding instruction of the user, and acquiring the inactivation password;
MH2, calling the interface to write the right inactivation password into REV area; if the writing fails, the inactivation detection fails;
MH3, calling an interface to use an error inactivation password to carry out inactivation detection; if the inactivation is successful, the inactivation detection fails;
MH4 calls the interface to use the right inactivation password to carry out inactivation detection, if the inactivation fails, the inactivation detection fails;
and if the detection of the four steps is successful, the inactivation detection is successful.
10. The method for detecting the safety performance of the electronic seal according to claim 1, wherein the method for detecting the safety performance of the electronic seal is realized based on the following devices;
the device comprises a reader-writer, an antenna, a wireless scanning gun and a computer; the reader-writer is connected with the computer through a first USB data interface to transmit data; the reader-writer is also connected with the antenna through a corresponding radio frequency data transmission line, and the antenna is used for transmitting radio frequency signals to read and write data of the electronic seal; the wireless scanning gun is used for scanning the two-dimensional code on the front surface of the ultrahigh frequency electronic seal to acquire data therein, and is connected with the computer through a second USB data interface to perform data transmission; the computer is used for running detection software, configuring detection parameters through the information input and output component of the computer and outputting detection results.
CN202110299982.9A 2021-03-22 Electronic seal safety performance detection method Active CN113052284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110299982.9A CN113052284B (en) 2021-03-22 Electronic seal safety performance detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110299982.9A CN113052284B (en) 2021-03-22 Electronic seal safety performance detection method

Publications (2)

Publication Number Publication Date
CN113052284A true CN113052284A (en) 2021-06-29
CN113052284B CN113052284B (en) 2025-10-17

Family

ID=

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118484347A (en) * 2024-05-20 2024-08-13 北京智芯微电子科技有限公司 Consistency detection and data writing equipment, system, method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070055707A (en) * 2005-11-28 2007-05-31 노태호 Digital door lock system
CN101136073A (en) * 2007-10-15 2008-03-05 北京派瑞根科技开发有限公司 Electronic label safety identification method
CN101592704A (en) * 2008-05-28 2009-12-02 北京中食新华科技有限公司 Radio frequency identification RFID test method
US20100150348A1 (en) * 2008-01-30 2010-06-17 Neology, Lnc. Rfid authentication architecture and methods for rfid authentication
CN102983633A (en) * 2012-12-25 2013-03-20 北京四方继保自动化股份有限公司 State monitoring equipment and monitoring method for relay protection device based on RFID
CN106485292A (en) * 2015-08-28 2017-03-08 重庆品胜科技有限公司 The method and system of the carbon tape box true and false on a kind of checking heat-transfer printing device
CN209496391U (en) * 2019-03-18 2019-10-15 中国电力科学研究院有限公司 A detection device for electronic tags of electric power metering equipment
US20200082396A1 (en) * 2013-02-08 2020-03-12 Taiwan Development & Construction Co. Electronic tag and system and method for securing electronic tag
CN111212408A (en) * 2019-12-24 2020-05-29 国网北京市电力公司 Electronic seal detection method and device
CN112487839A (en) * 2020-12-15 2021-03-12 重庆西南集成电路设计有限责任公司 Anti-copy RFID safety system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070055707A (en) * 2005-11-28 2007-05-31 노태호 Digital door lock system
CN101136073A (en) * 2007-10-15 2008-03-05 北京派瑞根科技开发有限公司 Electronic label safety identification method
US20100150348A1 (en) * 2008-01-30 2010-06-17 Neology, Lnc. Rfid authentication architecture and methods for rfid authentication
CN101592704A (en) * 2008-05-28 2009-12-02 北京中食新华科技有限公司 Radio frequency identification RFID test method
CN102983633A (en) * 2012-12-25 2013-03-20 北京四方继保自动化股份有限公司 State monitoring equipment and monitoring method for relay protection device based on RFID
US20200082396A1 (en) * 2013-02-08 2020-03-12 Taiwan Development & Construction Co. Electronic tag and system and method for securing electronic tag
CN106485292A (en) * 2015-08-28 2017-03-08 重庆品胜科技有限公司 The method and system of the carbon tape box true and false on a kind of checking heat-transfer printing device
CN209496391U (en) * 2019-03-18 2019-10-15 中国电力科学研究院有限公司 A detection device for electronic tags of electric power metering equipment
CN111212408A (en) * 2019-12-24 2020-05-29 国网北京市电力公司 Electronic seal detection method and device
CN112487839A (en) * 2020-12-15 2021-03-12 重庆西南集成电路设计有限责任公司 Anti-copy RFID safety system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118484347A (en) * 2024-05-20 2024-08-13 北京智芯微电子科技有限公司 Consistency detection and data writing equipment, system, method and device
CN118484347B (en) * 2024-05-20 2025-09-09 北京智芯微电子科技有限公司 Consistency detection and data writing equipment, system, method and device

Similar Documents

Publication Publication Date Title
US6226749B1 (en) Method and apparatus for operating resources under control of a security module or other secure processor
CN101939754B (en) Using mix-and-match finger sensing devices and related methods
US10063538B2 (en) System for secure login, and method and apparatus for same
CN113591059B (en) User login authentication method
JPH10282884A (en) Data processing method and its system
GB2457733A (en) Securing inputting of sensitive information
CN105809045A (en) Method and device for processing equipment systems during data reset
CN113052284B (en) Electronic seal safety performance detection method
CN113052284A (en) Electronic seal safety performance detection method
CN111127019B (en) Method, system and device for backing up mnemonic words
CN111770132B (en) Work order downloading method, work order uploading method, device and computer equipment
CN113515738A (en) Two-dimensional code-based security authentication method, device and storage medium
JP5418135B2 (en) Test program execution program, test program execution method, and test program execution apparatus
CN110417784B (en) Authorization method and device of access control equipment
CN112612721A (en) Method, system, equipment and storage medium for testing terminal fingerprint identification function
CN115208587B (en) System and method for realizing cryptographic algorithm based on cryptographic module
CN112351043A (en) Vehicle navigation factory setting password management method and system
CN116389013A (en) Short message password verification method, mobile terminal and system
CN114428975B (en) Method and device for detecting data directional sharing, storage medium and server
CN101296080A (en) Authorized user confirmation method and related device
EP4055796B1 (en) Systems and methods for cross coupling risk analytics and one-time-passcodes
KR102378989B1 (en) System and method for verifying vulnerability test results in consideration of industrial control system operating environment
KR20070024100A (en) Network security system and its method through image key input
CN114826600B (en) Key instruction confirmation method, device, medium and electronic equipment
CN115296797B (en) A password management system for substation automation equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant