Radio frequency identification (RFID) privacy authenticating method

An authentication method and radio frequency identification technology, applied in the security technology field related to radio frequency identification tag authentication, can solve problems such as inability to meet forward security, affect tag privacy, lack of update mechanism, etc. Security, the effect of ensuring forward security

Inactive Publication Date: 2010-02-10
XI AN JIAOTONG UNIV
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

1) Lack of update mechanism, cannot satisfy forward security
2) At least one key is shared between an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification (RFID) privacy authenticating method
  • Radio frequency identification (RFID) privacy authenticating method
  • Radio frequency identification (RFID) privacy authenticating method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] In order to make the purpose, technical solutions and advantages of the present invention clearer, the following will be attached image 3 , 4 The present invention will be described in further detail.

[0026] Let h(·) and F(·) be the digest function {0, 1} in the cryptographic sense * →{0, 1} l , Where l is the security parameter of the RFID system, and here is the security strength of the tag. Suppose there are n tags T in the system i , 1≤i≤n, and reader R. The reader R organizes the keys of all tags according to the index of the tag.

[0027] When the RFID system is initialized, the security parameters and index length b of the system are selected. Reader for each tag T i Randomly assign a key key i And index i . And use the digest function h(·) to calculate the index i The summary value {h(s)} corresponding to all elements s in the domain S of. The tuple (h(s), s) is stored at the physical address F(h(s)). The function F(·) is a processing of the output content of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a radio frequency identification (RFID) privacy authenticating method which comprises the following steps: system initialization: a reader-writer stores secret keys and indexesof all labels and a summary value of an index space; label recognition: the reader-writer transmits an authenticating request to the labels, the labels calculate and transmit authenticating information to the reader-writer, and reader-writer recognizes the labels after receiving the authenticating information; updating: after the labels are authenticated, the reader-writer updates the secret keysand the indexes of the labels and transmits updated information to the labels, and the labels update the stored secret keys and the indexes; and system maintenance: when the labels enter or depart from an RFID system, the reader-writer maintains the secret keys and the indexes of the labels. The invention can effectively resist various prior passive and active attacks; compared with an RFID authenticating method based on a balanced tree structure, the invention greatly reduces the storage and calculation cost at the label ends.

Description

technical field [0001] The invention relates to radio frequency identification technology, in particular to safety technology related to radio frequency identification label authentication. Background technique [0002] Radio Frequency Identification (Radio Frequency Identification, referred to as "RFID") is the use of radio frequency technology for non-contact identification of objects. A significant advantage of this technique is that no physical or actual contact is required. RFID has a wide range of application prospects, and has been widely used in retail, electronic passports, personal ID cards, logistics, food storage, drug monitoring and other fields. [0003] The main components of the RFID system include a tag (Tag), a reader (Reader) and a back-end database (Back-end database, referred to as "DB"). The tags contain an antenna and an integrated circuit, usually without a processor. Some information and a unique identification (ID) of the item to which it is atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K17/00
Inventor 齐勇姚青松韩劲松赵季中李向阳刘云浩
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products