防止复制nfc芯片信号 [英] Prevent copying nfc chip signal

查看:136
本文介绍了防止复制nfc芯片信号的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我想知道 NFC 芯片是否有某种唯一标识符?我有 Mifare Classic 1K 和 Mifare Ultralight C 贴纸,我希望 NFC 手机使用我的 android 应用程序读取它们,是否有一些常见的做法来保护信号,这样有人就不能使用通用应用程序(NFC 阅读器)来扫描数据),然后将数据写入另一个芯片以伪造我的贴纸信号.或者,这些芯片中是否有像手机 UUID 一样的唯一 ID?

I'm wondering if NFC chips have some kind of unique identifier? I have Mifare Classic 1K and Mifare Ultralight C stickers that I want NFC phones to read using my android application, is there some common practice to protect the signal so someone can't just come in and scan the data using a generic app (NFC Reader), and write the data to another chip in order to fake my sticker signal. Or, is there a unique ID like how phone UUID works built in these chips?

推荐答案

我担心标签总是存在窃听、中间人或中继攻击的风险.您所希望的最好的方法是使用设备和标签上的已知秘密对数据进行加密.

I'm afraid with tags there is always the risk of evesdropping, man-in-the-middle or relay attacks. The best you could hope for would be encrypt the data using a pre-known secret on your device and the tag.

这仍然存在秘密被发现然后复制的风险.

This still has the risk of the secret being found out and then copied.

NFC 确实不是设计为高度安全的平台.

NFC really isn't designed to be a highly secure platform.

对于设备到设备,您可以在现有 NFC 堆栈(例如 SSL)的 TOP 上实施协议,但这不适用于预先生成的标签.

For device to device you can implement protocols on TOP of the existing NFC stack (such as SSL) however this wouldn't work with pre-generated tags.

这篇关于防止复制nfc芯片信号的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆