Unlock instant, AI-driven research and patent intelligence for your innovation.

Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag

A passive electronic tag, encryption authentication technology, applied in the field of radio frequency identification, can solve the problem of chip power consumption tag identification distance contradiction

Active Publication Date: 2014-01-15
BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention is mainly used to solve the contradiction between chip power consumption and label identification distance brought about by the introduction of UHF passive electronic label encryption authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag
  • Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Introduce working principle of the present invention in detail below in conjunction with accompanying drawing:

[0015] The encryption authentication process is as follows:

[0016] 1) The reader-writer sends an authentication request command to the tag in the authentication state, and the command includes the fields Randl and handle. Randl is the random number generated by the reader, and handle is the handle.

[0017] 2) After the tag receives the authentication command, it discusses with the reader the required continuous carrier time, and the tag returns information carrying the time parameter Treply in response.

[0018] 3) The reader sends an acknowledgment command and sends a continuous carrier wave of Treply time. If the reader does not receive a tag response after waiting for the Treply time, end or resend the authentication command.

[0019] 4) After the tag receives the confirmation command, it completes the operation within the Treply time and returns a r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power consumption processing method for encryption and authentication of an ultrahigh-frequency passive electronic tag. The method is mainly used for solving the contradiction problem of chip power consumption and tag identification distance due to the introduction of an ultrahigh-frequency passive electronic tag security algorithm. The invention mainly relates to a tag identification flow. After an authentication command is received, the tag consults the required time of continuous carriers with a reader, and the tag returns the information of a response carrying time parameter Treply. The reader sends a confirmation command, and sends the continuous carriers of the Treply time. If the tag response is not received in the waiting Treply time, the flow is ended or the authentication command is retransmitted. After the confirmation command is received, the tag completes operation in the Treply time and returns data. The reader authenticates whether the tag is a valid tag, if so, the reader encrypts the random number carried by the tag by using an algorithm and sends the encrypted random number to the tag. The tag confirms the authentication result.

Description

technical field [0001] The invention belongs to the technical field of radio frequency identification, and relates to a method for processing power consumption during encryption authentication of an ultra-high frequency passive electronic tag. Background technique [0002] In the field of radio frequency identification, passive electronic tags receive electromagnetic field energy through antennas to power chips. The characteristics of fast and long-distance identification are the advantages of UHF passive electronic tags, but the current safety performance of tags is far from meeting the application requirements, which restricts its large-scale application. In the existing RFID protocol, introducing an encryption authentication process is a method to make up for the security performance. Although some documents mention the encryption authentication process, they have not solved the contradiction between the tag encryption algorithm and the tag power consumption. If the intr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K7/00H04L9/32
Inventor 沈红伟
Owner BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD