Method and system for mutual authentication based on hash function

A two-way authentication and hash function technology, applied in the direction of digital transmission systems, transmission systems, collaborative devices, etc., can solve the problem of inappropriate low-performance electronic tags

Active Publication Date: 2010-03-03
CHINA IWNCOMM
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although the authentication scheme based on the public key system is flexible and has good sca

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for mutual authentication based on hash function
  • Method and system for mutual authentication based on hash function
  • Method and system for mutual authentication based on hash function

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0076] see figure 1 , the present invention provides a kind of two-way authentication method based on hash function, and this method comprises the following steps:

[0077] 1) Authentication activation: the authentication activation packet is sent by the reader-writer READER to the electronic tag TAG. The content of this group is empty, mainly to complete the READER providing energy to the electronic tag TAG.

[0078] After receiving the authentication activation packet, the electronic tag TAG constructs and sends the authentication request packet to the reader.

[0079] 2) Authentication request: the authentication request packet is sent by the electronic tag TAG to the READER. The content of the authentication request packet includes:

[0080] PIDs

[0081] in:

[0082] PID field: the current pseudo-identity of the electronic tag TAG;

[0083] N1 field: a one-time random number selected by the electronic tag TAG;

[0084] MIC1 field: The electronic tag TAG us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system for mutual authentication based on a hash function. The method comprises the following steps: 1) transmitting an authentication activation packet to an electronic tag through a reader; 2) performing tag construction and transmitting an authentication request packet to the reader; 3) constructing and transmitting a key request packet to an electronic tag application system database DB; 4) transmitting a certificate authentication request packet to an authentication server AS; 5) transmitting a certificate authentication response packet to the DB; 6) transmitting a key response packet to the reader; 7) transmitting an authentication response packet to the TAG; and 8) transmitting an authentication acknowledgment packet to the reader. The invention provides a method and a system for mutual authentication based on a hash function, which can achieve the purpose of no safety linkage between the database and the reader, perform mutual authentication and reasonably utilize the device performance.

Description

technical field [0001] The invention relates to a two-way authentication method and system applied in the wireless network field, in particular to a hash function-based two-way authentication method and system. Background technique [0002] For wireless networks, such as wireless local area network or wireless metropolitan area network, etc., its security problems are far more serious than wired Ethernet. Radio frequency identification tags (RFID) also face security issues. Before secure communication, security authentication and key negotiation issues between RFID readers and electronic tags must be effectively resolved. [0003] Electronic tags are usually a low-performance device with low processing power; devices such as readers and database servers generally have high performance, and their processing power is not limited, which can meet various calculations and operations on PCs. Therefore, when designing an electronic tag application system, the performance of the el...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06K17/00
CPCH04L9/3273H04L9/3236
Inventor 庞辽军曹军铁满霞黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products