Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and apparatus for wireless radio frequency recognition system

An authentication method and radio frequency technology, applied in the field of communication, can solve the problems of asynchronous data update, no dynamic ID refresh mechanism, legal tags cannot pass authentication, etc., to achieve the effect of ensuring anonymity

Inactive Publication Date: 2009-07-22
HUAWEI TECH CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0035] There is no dynamic ID refresh mechanism in the authentication based on the query-response method in the prior art. Once the attacker obtains the ID of the tag, the tag can be counterfeited; holder to track
Although dynamic refresh is used in the method based on two-way authentication, there is a problem of out-of-sync data update: if the tag is not updated successfully twice in a row, then in the next communication, due to the encryption of the key pair stored in the tag and the background database The key pair does not match, and the legal label cannot pass the authentication
In the final step of authentication, if M 2 intercepted, the tag's key pair (K x_i , P x_i ) will not be updated in time, and the background database key pair (K old , P old ), (K new , P new ) has been updated, but at this time there is still a pair of keys in the two sets of key pairs in the background database that can match the key pair of the label, but if M 2 It has been intercepted more than twice. At this time, the two sets of key pairs in the background database have been updated, but the key pair of the tag has not been updated. There is no matching key pair between the tag and the background database. Therefore, the next time the tag communicates and the reader will not be able to mutually authenticate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and apparatus for wireless radio frequency recognition system
  • Authentication method and apparatus for wireless radio frequency recognition system
  • Authentication method and apparatus for wireless radio frequency recognition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In the following, the embodiments of the present invention will be further described with reference to the drawings and examples.

[0072] The embodiment of the present invention provides an authentication method, which ensures the anonymity of the tag by updating the ID in each authentication, and stores the (ID, P_key) pair of the tag on the reader side, and the reader side only Update the (ID, P_key) part that is inconsistent with the content sent by the tag. Therefore, while ensuring anonymity, even if there are multiple abnormal situations that cause the tag to not be updated, the tag used in the last communication is still stored in the reader's form, so the tag can still be normal with the trusted reader. Communication.

[0073] The embodiment of the present invention is used for the authentication between the reader and the tag in the RFID system, and mainly solves the communication security problem between the reader and the tag, that is, the air interface part. Fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method for a wireless radio frequency identification (RFID) system. Anonymity of a tag is ensured by updating ID in each authentication; and an (ID, P-key) pair of the tag is stored in a reader party, and only the (ID, P-key) part in the reader party, which is inconsistent with the content transmitted by the tag, is updated by the reader party, such that synchronicity of data update can be ensured. The embodiment of the invention also discloses an authentication device for the wireless radio frequency identification (RFID) system. By adopting the embodiment of the invention and by ensuring the anonymity of the tag through ID update, the asynchronism of data update easily caused by the adoption of an ID updating mechanism in a common RFID air interface protocol can be simultaneously solved.

Description

Technical field [0001] The present invention relates to the field of communication technology, and in particular to an authentication method and equipment in an RFID (Radio Frequency Identification, radio frequency identification) system. Background technique [0002] RFID technology is a non-contact automatic identification technology that has matured since the 1980s. It uses radio frequency signals to automatically identify target objects and obtain relevant data without manual intervention. Because RFID technology has the characteristics of multi-target recognition and non-contact recognition, it has been widely used in manufacturing, commerce, military, daily life and other fields, and has shown huge development potential and application space. It is considered to be the most promising development in the 21st century. One of the promising technologies. [0003] Although RFID technology has a wide range of application prospects, the lack of effective security mechanisms in RFI...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K7/00G06K17/00G06K19/07
Inventor 张向东刘培李立娟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products