Bidirectional authentication method and system based on symmetric encipherment algorithm

A technology of symmetric encryption algorithm and two-way authentication, which is applied in the field of two-way authentication method and system based on symmetric encryption algorithm, and can solve the problems of inappropriate and high-performance electronic tags with low performance

Active Publication Date: 2010-02-10
CHINA IWNCOMM
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although the authentication scheme based on the public key system is flexible and has good scalability, the public key operation it requires is not suitable for low-performance el

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication method and system based on symmetric encipherment algorithm
  • Bidirectional authentication method and system based on symmetric encipherment algorithm
  • Bidirectional authentication method and system based on symmetric encipherment algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] see figure 1 , the present invention provides a two-way authentication method based on a symmetric encryption algorithm, the method comprising:

[0072] 1) Collision process: the grouping is completed jointly by the reader-writer READER, the electronic tag TAG and the electronic tag application system database DB. First, the READER selects an electronic tag TAG from multiple associated electronic tags TAG through the collision protocol, and then sends its own digital certificate CERT_R and the selected tag PID information to the electronic tag application system database DB.

[0073] 2) Certificate authentication request: After the collision process is completed, when the electronic tag application system database DB obtains the information sent by the READER, it constructs and sends a certificate authentication request group to the authentication server AS, and the group is sent by the electronic tag application system database DB. sent to the authentication server AS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a bidirectional authentication method and a system based on a symmetric encipherment algorithm. The method comprises: 1) a READER, a TAG and an electronic tag application system database (DB) corporately finish the collision process; 2) DB constructs and sends a certificate discrimination request grouping to an authentication server (AS); 3) sending a certificate discrimination response grouping to DB; 4) sending challenge information grouping to READER; 5) sending authentication request grouping to TAG; 8) sending the authentication response grouping to the READER; 7)sending certificate request grouping to DB; and 8) sending certificate response grouping to the READER. The invention can realize the bidirectional authentication method and the system based on the symmetric encipherment algorithm, which can perform bidirectional authentication and can reasonably utilize equipment performance without secure link between the database and the electronic tag.

Description

technical field [0001] The invention relates to a two-way authentication method and system, in particular to a two-way authentication method and system based on a symmetric encryption algorithm. Background technique [0002] For wireless networks, such as wireless local area network or wireless metropolitan area network, etc., its security problems are far more serious than wired Ethernet. Radio frequency identification tags (RFID) also face security issues. Before secure communication, security authentication and key negotiation issues between RFID readers and electronic tags must be effectively resolved. [0003] Electronic tags are usually a low-performance device with low processing power; devices such as readers and database servers generally have high performance, and their processing power is not limited, which can meet various calculations and operations on PCs. Therefore, when designing an electronic tag application system, the performance of the electronic tag wil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06K17/00
CPCH04L9/3263H04L9/3271
Inventor 庞辽军曹军铁满霞黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products