Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and device for authenticating radio frequency tag

A radio frequency tag and key authentication technology, applied in the field of information security, can solve the problems of difficult implementation of Hash function, low security level, processing power, and storage space, etc., to ensure anonymity, privacy protection, and improve the security level. Effect

Active Publication Date: 2011-02-23
BEIJING WATCH DATA SYST
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its processing power and storage space are relatively small, which makes it difficult to implement the Hash function in the randomized Hash-Lock protocol in the tag
[0015] It can be seen that there are still some hidden dangers in the security authentication mechanism adopted by the existing RFID system, and its security level is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for authenticating radio frequency tag
  • Method, system and device for authenticating radio frequency tag
  • Method, system and device for authenticating radio frequency tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] Embodiment 1. In this embodiment, the database of the reader has the storage identification ID of each radio frequency tag i (Among them, i=1, 2, 3----n), Query is a query request; R r Is the first random number generated by the reader, R t Is the second random number generated by the radio frequency tag; ID is the current identification of the radio frequency tag; CRC is the cyclic check function; Is the exclusive OR operator, || is the string associative, ∮ is the string concatenation, and f is the algorithm identifier.

[0098] See image 3 , The process of radio frequency label certification includes:

[0099] Step 301: The reader sends a query request Query and the first random number R to the radio frequency tag r Give the radio frequency tag.

[0100] Step 302: The radio frequency tag according to the received first random number R r , For the second random number R t , And the current identification of the radio frequency tag are encrypted to generate the first key.

[...

Embodiment 2

[0131] Embodiment 2. In this embodiment, the database of the reader has the storage identification ID of each radio frequency tag i (Among them, i=1, 2, 3----n), Query is a query request; R r Is the first random number generated by the reader, R t Is the second random number generated by the radio frequency tag; R u Is the fourth random number generated by the reader, here, it can be a four random number generated by the database in the reader; ID is the current identification of the radio frequency tag; CRC is a cyclic check function; It is the exclusive OR operator, || is the string associator, ∮ is the string concatenation, f is the algorithm identifier, and Computer is the operation instruction sent by the reader to the radio frequency tag.

[0132] See Image 6 , The process of radio frequency label certification includes:

[0133] Step 601: The reader initiates a query request Query, and generates a first random number R r .

[0134] Step 602: The reader requests Query and the ...

Embodiment 3

[0163] Embodiment 3: The identification protection key E stored in the RFID system k , That is, the reader of the RFID system, the identification protection key E is stored in the radio frequency tag k , That is, there is the identification protection key E in the reader's database k And, in this embodiment, the database of the reader has the storage identification ID of each radio frequency tag i (Among them, i=1, 2, 3----n), Query is a query request; R r Is the first random number generated by the reader, R t Is the second random number generated by the radio frequency tag; R u Is the fourth random number generated by the reader, here, it can be a four random number generated by the database in the reader; ID is the current identification of the radio frequency tag; CRC is a cyclic check function; It is the exclusive OR operator, || is the string associator, ∮ is the string concatenation, f is the algorithm identifier, and Computer is the operation instruction sent by the reader...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for authenticating a radio frequency tag. The method comprises the following steps that: the radio frequency tag receives a query request transmitted by a reader and a first random number generated by the reader; the radio frequency tag encrypts a generated second random number and a current identifier of the radio frequency tag according to the received first random number so as to generate a first key and transmit the first key to the reader; the radio frequency tag receives a second key returned by the reader, wherein the second key is generated by obtaining the second random number and a corresponding memory identifier by passing the authentication of the first key by the reader and encrypting the memory identifier by utilizing a third random number generated by the first random number and the second random number; and the radio frequency tag encrypts the current identifier by utilizing the third random number generated by the first random number and the second random number so as to generate a third key and confirms that the authentication of the reader is passed when the third key is equal to the received second key.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to a method, system and device for radio frequency tag authentication. Background technique [0002] Radio Frequency Identification (RFID) technology is a non-contact automatic identification technology that emerged from the 1960s and 1970s. Because RFID technology has the characteristics of multi-target recognition and non-contact recognition, it has been widely used in manufacturing, commerce, military, daily life and other fields, and has shown great development potential and application space. [0003] The RFID system generally consists of three parts: tags, readers and databases. In the RFID system, the database can be a database system running on any hardware platform, with powerful computing and storage capabilities, and it saves all tag information. The reader is a wireless transmitting and receiving device with an antenna, which has strong processing power a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/07G06K7/00
Inventor 张振宇
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products