NFC 标签和密码保护以及唯一标识符

发布于 2024-11-27 12:18:47 字数 248 浏览 4 评论 0原文

我想将数据写入 NFC 标签,这样当我读取数据时我就知道它实际上来自我。我可以使标签永久只读,但这只会阻止写入该特定标签。不良行为者可以复制数据并冒充标签。我怎样才能防止这种情况发生?

我可以用我的私钥加密数据,然后用我的公钥签名,这意味着它肯定来自我,只有我可以读取它。但什么可以阻止某人简单地复制数据并冒充该标签。

每个标签是否有一些独特的东西可以读取和记录并且无法更改并且对于所有标签和所有时间都是唯一的?我可以记录下来,以确保该标签是我写的。

I'd like to write data to NFC tags such that I know that when I read it that it actually came from me. I could make the tag permanently read only but that only prevents writing of that particular tag. A bad actor could copy the data and impersonate the tag. How can I prevent this?

I could encrypt the data with my private key and then sign with my public key, which would mean that it definitely came from me and only I could read it. But what stops someone from simply duplicating the data and impersonating that tag.

Is there something unique to each tag that can be read and recorded and cannot be changed and is unique for all tags and all time? I could record that to make sure that tag is one that I've written.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(2

骑趴 2024-12-04 12:18:47

大多数 NFC 标签都有一个该标签唯一的硬件 UID。例如,Mifare Ultralight 标签具有 7 字节 UID,可唯一标识该标签。可以将其视为类似于网卡的 MAC 地址。

该 UID 是只读的,制造后无法更改。如果您阅读特定标签的规范,您可以看到它的位置。对于 Mifare Ultralight,这 7 个字节位于前几页。请参阅此处的规范:

http://www.nxp.com/acrobat_download2/其他/识别/M028634_MF0ICU1_Functional_Spec_V3.4.pdf

有一个名为 NFC Tag Info 的免费 Android 应用程序,我用它来查看标签的页面结构,并查找标签的 UID:
https://market.android.com/details?id=at .mroland.android.apps.nfctaginfo

Most NFC tags have a hardware UID that's unique to the tag. For instance, a Mifare Ultralight tag has a 7 byte UID that identifies the tag uniquely. Think of it as similar to a MAC address for your network card.

This UID is read-only and can't be changed after manufacture. If you read the spec for the particular tag, you can see where it's located. For Mifare Ultralight, these 7 bytes are located on the first few pages. See the spec here:

http://www.nxp.com/acrobat_download2/other/identification/M028634_MF0ICU1_Functional_Spec_V3.4.pdf

There's a free android app called NFC Tag Info that I use to poke around the page structure of a tag, as well as find the UID for a tag:
https://market.android.com/details?id=at.mroland.android.apps.nfctaginfo

难得心□动 2024-12-04 12:18:47

有人仍然可以冒充定制卡上的 UID。如果您制作了自己的自定义卡,则可以包含某种验证算法,您可以向其发送随机数据并从中获得预期的响应。但标准标签很容易被假冒。

Someone could still impersonate the UID on a custom card. If you made your own custom card you could include a validation algorithm of some sort that you could send random data to and get an expected response from. But standard tags are very susceptible to impersonation.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文