Binary mode collision-proof method with safe mechanism in RFID

A security mechanism, binary technology, applied in the field of RFID, can solve the problem of small storage capacity, achieve the effect of privacy and security, prevent eavesdropping and tracking, and strong flexibility

Inactive Publication Date: 2008-08-06
INST OF ACOUSTICS CHINESE ACAD OF SCI
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The anti-collision method based on binary tree search is a deterministic method, which has been adopted by ISO / IEC18000-6 and EPC Class1 Gen2 standards. Its advantages are strong anti-collision ability, simple data structure and instructions, and its disadvantage is that it supports relatively large storage capacity. Small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Binary mode collision-proof method with safe mechanism in RFID
  • Binary mode collision-proof method with safe mechanism in RFID
  • Binary mode collision-proof method with safe mechanism in RFID

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0046] RFID systems usually consist of tags, readers and data management systems. Before explaining the anti-collision method of the present invention, the tags and tag readers used are firstly described.

[0047] The tag includes: antenna, modulator, encoder, controller, and memory. The controller includes a slot counter, a loop address counter, and an anti-malicious test self-destruction module. The sub-slot counter is a decremental counter, which is used to complete the binary tree search process; the circular address selection counter is used to circularly select the position number of the ID pseudonym; the anti-malicious test self-destruction module is used when the illegal reader repeatedly tests the label content Automatically destroy the label, so as to achieve the purpose of protecting the label secret.

[0048] The tag reader includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a binary system anti-collision method with a security mechanism in RFID, which comprises a new low-cost security authentication mechanism and a routine RFID binary system anti-collision method. The major contribution of the invention lies in that: a routine electronic tag binary system anti-collision method is easy to suffer wire tapping, tracing and various attacks; through introducing the new security authentication mechanism, the invention strengthens the safety performance of the RFID. From the point of view of application, the invention combines a physical method with a cipher mechanism and proposes a new approach to solve the problem of RFID privacy; the security authentication mechanism comprises an Hash encryption module, a cycle count addressing circuit, an anti-malicious test self-destruction module, a terminal database, etc. The invention comprehensively adopts Hash encryption technology and a plurality of pseudonym technology and can be applied to a distributed RFID application system; the invention has the main technical characteristics: the Hash encryption module is not used in the tag, but the Hash encryption module is adopted in an RFID reader; therefore, 20 thousand of multi-door circuits can be saved in the tag; in addition, the binary system anti-collision method with a security mechanism in RFID can prevent from tracing through the setting of a plurality of pseudonyms . The method not only realizes the encryption function, but also effectively reduces the cost of the electronic tags and is favorable for large-scale popularization of the RFID tags in the market.

Description

technical field [0001] The invention relates to the field of RFID (Radio Frequency Identification, radio frequency identification), in particular to a binary anti-collision method with a security mechanism applied in low-cost RFID. Background technique [0002] In the 1960s, the first electronic item monitoring and anti-theft system began to be put into commercial operation. Today, RFID has been widely used in various fields, from keyless car opening, animal tracking, highway toll collection to commercial supply chain management, RFID can be seen everywhere. [0003] With the large-scale application of RFID, the problems exposed in security and privacy have attracted more and more attention, mainly in the following aspects: data security threats, personal privacy threats and cloning threats. [0004] One of the threats to data security is that competitors may illegally collect enterprise RFID data, seriously endangering business secrets. The second threat is that RFID itse...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00
Inventor 张晖侯朝焕王东辉张铁军
Owner INST OF ACOUSTICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products