Binary mode collision-proof method with safe mechanism in RFID

A security mechanism, binary technology, applied in the field of RFID, can solve the problem of small storage capacity, achieve the effect of privacy and security guarantee, strong flexibility, prevent malicious testing and steal the internal information of the tag

Inactive Publication Date: 2009-10-21
INST OF ACOUSTICS CHINESE ACAD OF SCI
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The anti-collision method based on binary tree search is a deterministic method, which has been adopted by ISO / IEC18000-6 and EPC Classl Gen2 standards. Its advantages are strong anti-collision ability, simple data structure and instructions, and its disadvantage is that it supports relatively large storage capacity. Small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary mode collision-proof method with safe mechanism in RFID
  • Binary mode collision-proof method with safe mechanism in RFID
  • Binary mode collision-proof method with safe mechanism in RFID

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0045] RFID systems usually consist of tags, readers and data management systems. Before explaining the anti-collision method of the present invention, the tags and tag readers used are firstly described.

[0046] The tag includes: antenna, modulator, encoder, controller, and memory. The controller includes a slot counter, a loop address counter, and an anti-malicious test self-destruction module. The sub-slot counter is a decremental counter, which is used to complete the binary tree search process; the circular address selection counter is used to circularly select the position number of the ID pseudonym; the anti-malicious test self-destruction module is used when the illegal reader repeatedly tests the label content Automatically destroy the label, so as to achieve the purpose of protecting the label secret.

[0047] The tag reader includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a binary anti-collision method with a security mechanism in RFID, comprising: a new low-cost security authentication mechanism and a conventional RFID binary anti-collision method. The main contribution of the invention is that the conventional electronic tag binary anti-collision method is vulnerable to various attacks such as eavesdropping and tracking, and the invention enhances the security performance of RFID by introducing a new security authentication mechanism. From the perspective of application, the present invention combines physical methods and cryptographic mechanisms, and proposes a new way to solve the RFID privacy problem, which includes a Hash encryption module, a cycle counting address selection circuit, an anti-malicious test self-destruction module, and a terminal database. The present invention adopts Hash encryption technology and a plurality of pseudonym technologies comprehensively, can be applied in distributed RFID application system, and its main technical characteristic is: do not use Hash encryption module in label, but adopt Hash encryption module in RFID reader, like this More than 20,000 circuits can be saved in the label. In addition, the establishment of multiple pseudonyms can effectively prevent being tracked. The invention not only realizes the encryption function, but also can effectively reduce the cost of the electronic label, and is beneficial to the large-scale promotion of the RFID label in the market.

Description

technical field [0001] The invention relates to the field of RFID (Radio Frequency Identification, radio frequency identification), in particular to a binary anti-collision method with a security mechanism applied in low-cost RFID. Background technique [0002] In the 1960s, the first electronic item monitoring and anti-theft system began to be put into commercial operation. Today, RFID has been widely used in various fields, from keyless car opening, animal tracking, highway toll collection to commercial supply chain management, RFID can be seen everywhere. [0003] With the large-scale application of RFID, the problems exposed in security and privacy have attracted more and more attention, mainly in the following aspects: data security threats, personal privacy threats and cloning threats. [0004] One of the threats to data security is that competitors may illegally collect enterprise RFID data, seriously endangering business secrets. The second threat is that RFID itse...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K7/00
Inventor 张晖侯朝焕王东辉张铁军
Owner INST OF ACOUSTICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products