Authentication method, reader and label

An authentication method and reader technology, applied in the fields of authentication methods, readers and labels, can solve the problems of poor forward security and achieve the effect of ensuring forward security

Inactive Publication Date: 2012-04-04
BEIJING BAILETU TECH CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] The embodiment of the present invention provides an authentication method, a reader and a tag to solve the defect of poor forward security in the prior art and ensure authentication security between the reader and the tag

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, reader and label
  • Authentication method, reader and label
  • Authentication method, reader and label

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The technical solutions of the embodiments of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0050] figure 2 It is a flowchart of an authentication method embodiment of the present invention, such as figure 2 As shown, the method includes:

[0051] Step 100, receiving the updated flag bit information sent by the tag and the first encrypted information obtained by encrypting the first information on the first flag bit of the tag as a key;

[0052]In the process of authenticating a tag, the reader needs to receive the authentication information sent by the tag. The authentication information includes the update flag information of the tag and the first encrypted information. The first encrypted information is the authentication information sent by the tag to the reader. Before the information, firstly receive the reader random number sent by the reader, and then the tag itself generates a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authentication method, a reader and a label. The method comprises the steps: receiving an updated mark bit message sent by the label and a first enciphered message; deciphering the first enciphered message according to the updated mark bit message and authenticating the label according to the deciphering result. The reader authenticates the label by applying corresponding deciphered and enciphered messages of an encryption key according to the updated mark bit message sent by the label; and the adopted encryption key is relevant to a cipher code adopted before, therefore, an attacker cannot calculate a symmetric key used in previous communication, and the forward security can be ensured; the encryption key is updated and the updated encryption key is synchronized with the label after the communication is successful; and if the updated mark bit message applied by the label is updated successfully or not can ensure the data synchronism.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of information authentication, in particular to an authentication method, a reader and a tag. Background technique [0002] Radio Frequency Identification (Radio Frequency Identification; hereinafter referred to as: RFID) technology is a non-contact automatic identification technology that automatically identifies target objects and obtains relevant data through radio frequency signals without manual intervention. Due to its characteristics of multi-target recognition and non-contact recognition, it has been widely used in manufacturing, commerce, military, daily life and other fields. [0003] figure 1 It is a schematic diagram of the existing RFID system structure, such as figure 1 As shown, the RFID system generally consists of three parts: tags, readers, and background databases. The background database can be a database system running on any hardware platform, which can be se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/16H04L9/08
Inventor 张向东刘培李立娟谷勇浩张振宇辛阳
Owner BEIJING BAILETU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products