RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key

A security authentication and key technology, applied in the field of RFID communication security, can solve the problems of denial of service, security risks, counterfeiting, etc., to achieve the effect of easy hardware implementation, improve system security, and save label cost and power consumption

Inactive Publication Date: 2012-07-04
BEIHANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the openness and wirelessness of the communication link, the air interface has great security risks and security vulnerabilities, and faces various security risks and threats, such as attacks such as counterfeiting, replay, tracking, traffic analysis, and denial of service. It is urgent to propose security measures and solutions suitable for RFID system hardware conditions
[0003] At present, most security mechanisms have no detailed restrictions on the access rights of legitimate readers. As long as the readers meet the identity authentication, they can read all the information of the tag. However, in different application scenarios, it may involve multiple parties. There is a commercial interest relationship between users and some tag data information involves the privacy protection of different users, so it is necessary to implement a certain access control mechanism for different readers to achieve security and privacy protection for different users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
  • RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The security authentication protocol proposed by the present invention will be illustrated and described below in conjunction with the accompanying drawings and the application examples of the valuables traceability management system.

[0046] 1. System scene construction

[0047] In the terminal data acquisition system for the traceability management of RFID valuables, there are M legal readers R i (i=1, 2, ..., M), N tags T j (j=1, 2, . . . , N) and the background database DB. Among them, the reader can be divided into three access levels, authorized to access part or all of the data information of the specified tag. Tags store user data involved in the production, processing, circulation, and consumption of valuable materials (including relevant manufacturer information, material information, supply chain relationship information, storage and transportation information, etc.). Authorize the reader to read. There are designated authentication keys K between reader...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on a grading key. In the certificate method provided in the invention, a grading key mechanism is introduced, thereby the problem of data safety of a forward air interface and a backward communication link in a RFID system can be effectively solved, access authority control among different users is realized, typical active and passive attacks can be effectively resisted, and the safety and privacy protection requirements of the system are satisfied. At the same time, in the protocol, complex encryption, decryption and verification operation are mainly delivered to a background database and a reader, thereby the calculated load and storage load of a label are reduced, the cost and power consumption of the label is saved, and the security of the system is improved. The invention is suitable for RFID application scenes that system resource is limited, and high security and privacy authentication protection are requested.

Description

technical field [0001] The invention relates to a hierarchical key-based RFID inquiry-response safety authentication method, belongs to the technical field of RFID communication safety, and relates to an RFID label safety authentication protocol. Background technique [0002] With the extensive development of RFID (Radio Frequency Identification) technology, the security issues of RFID systems, especially the security and privacy issues of the air interface, have become increasingly prominent, and have attracted widespread attention in the industry, becoming one of the key factors restricting the development of RFID technology applications. Due to the openness and wirelessness of the communication link, the air interface has great security risks and security vulnerabilities, and faces various security risks and threats, such as attacks such as counterfeiting, replay, tracking, traffic analysis, and denial of service. It is urgent to propose security measures and solutions su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K7/00G06K17/00
Inventor 宁焕生刘虹
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products