RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division

A security authentication and re-authentication technology, applied in the field of RFID air interface security, can solve problems such as single authentication mode and security risks, and achieve the effect of anonymity and forward untraceability

Inactive Publication Date: 2011-04-27
BEIHANG UNIV
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the entire communication process, the tag ID is almost encrypted, decrypted, transmitted and authenticated in its complete form, which to a certain extent poses a great security risk
Furthermore, due to the different characteristics of the RFID forward link and the backward link, the single authentication mode also creates a potential attack vulnerability for the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division
  • RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] 1. RFID system initialization

[0038] When the RFID system is initialized, each tag and reader has a unique identifier ID T and ID R ; The database has all tags and identifiers of readers; tags, readers and background databases have a secret shared key K. In this system, the backward communication link from the reader to the background database is considered safe.

[0039] 2. Certification process

[0040] RFID system security authentication protocol such as figure 1 As shown, the authentication steps are as follows:

[0041] (1) Reader query request: the reader R first generates two random numbers r R and p, and r R and p are sent to tag T as an inquiry request;

[0042] (2) The tag ID is randomly divided: after the tag T receives the request, it R Perform Hash operation to get H(r R ). At the same time, the tag T sends its own identifier ID T Randomly divide into left identifiers and the right identifier Two parts (of which, with The division of i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division, comprising the following steps of: introducing a dynamic updating mechanism to randomly divide label ID into a left identifier and a right identifier for the data transmission of a communication link, and realizing the two-time certification of the identification validity of a label and a reader-writer in a triple certification mode; and meanwhile, by aiming at the particularity and the limitations of a forward air interface and a backward communication link of an RFID system, the method effectively solves the problems of label data safety and secret protection of the RFID system by utilizing an unidirectional Hash function and a symmetric encryption algorithm. The invention is novel and practical, adopts the lightweight operations of encryption, decryption, search and verification, saves label cost and power consumption, increases system safety and is suitable for the RFID system with higher safety and privacy requirements.

Description

technical field [0001] The invention relates to an RFID triple safety authentication method based on tag ID random division, belongs to the technical field of RFID air interface safety, and relates to an RFID safety authentication protocol. Background technique [0002] RFID (Radio Frequency Identification) technology uses radio frequency signals to realize the non-contact automatic identification of target objects, and is gradually popularized and applied in identification, security and anti-counterfeiting, transportation and logistics, asset management and other fields. As an emerging sensing technology, the combination of RFID technology and the Internet can realize item tracking and information sharing on a global scale, and has broad application prospects. However, due to the limitations of the RFID system's own hardware system and the particularity of the communication link, the air interface between the tag and the reader faces serious security threats and privacy iss...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00
Inventor 宁焕生刘虹
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products