Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division

A security authentication and labeling technology, applied to computer components, collaborative devices, instruments, etc., can solve problems such as single authentication mode and potential safety hazards

Inactive Publication Date: 2012-11-07
BEIHANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the entire communication process, the tag ID is almost encrypted, decrypted, transmitted and authenticated in its complete form, which to a certain extent poses a great security risk
Furthermore, due to the different characteristics of the RFID forward link and the backward link, the single authentication mode also creates a potential attack vulnerability for the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] 1. RFID system initialization

[0038] When the RFID system is initialized, each tag and reader has a unique identifier ID T and ID R ; The database has all tags and identifiers of readers; tags, readers and background databases have a secret shared key K. In the described RFID system, the backward communication link from the reader to the backend database is considered secure.

[0039] 2. Certification process

[0040] The safety authentication protocol steps of the RFID system are as follows:

[0041] Step 1: The reader R first generates two random numbers r R and p, and r R and p are sent to tag T as an inquiry request;

[0042] Step 2: After tag T receives the request, it sends its own identifier ID T Randomly divide into left identifiers and the right identifier two parts; of which, and The division of is determined by p, which changes dynamically in different session periods; the label T is to r R Perform Hash operation to get H(r R ), and perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division, comprising the following steps of: introducing a dynamic updating mechanism to randomly divide label ID into a left identifier and a right identifier for the data transmission of a communication link, and realizing the two-time certification of the identification validity of a label and a reader-writer in a triple certification mode; and meanwhile, by aiming at the particularity and the limitations of a forward air interface and a backward communication link of an RFID system, the method effectively solves the problems of label data safety and secret protection of the RFID system by utilizing an unidirectional Hash function and a symmetric encryption algorithm. The invention is novel and practical, adopts the lightweight operations of encryption, decryption, search and verification, saves label cost and power consumption, increases system safety and is suitable for the RFID system with higher safety and privacy requirements.

Description

technical field [0001] The invention relates to an RFID triple safety authentication method based on tag ID random division, belongs to the technical field of RFID air interface safety, and relates to an RFID safety authentication protocol. Background technique [0002] RFID (Radio Frequency Identification) technology uses radio frequency signals to realize the non-contact automatic identification of target objects, and is gradually popularized and applied in identification, security and anti-counterfeiting, transportation and logistics, asset management and other fields. As an emerging sensing technology, the combination of RFID technology and the Internet can realize item tracking and information sharing on a global scale, and has broad application prospects. However, due to the limitations of the RFID system's own hardware system and the particularity of the communication link, the air interface between the tag and the reader faces serious security threats and privacy iss...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00
Inventor 宁焕生刘虹
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products