Check patentability & draft patents in minutes with Patsnap Eureka AI!

Radio frequency identification (RFID) encryption verification system and method

A technology of radio frequency identification and verification method, applied in the field of information security and radio frequency identification encryption and verification system, can solve the problems of increase of electronic label logic and control circuit, increase of chip cost, etc., and achieve the effect of low-cost hardware encryption and decryption algorithm

Inactive Publication Date: 2011-11-09
AEROSPACE INFORMATION
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to solve the technical problems that both symmetric encryption and asymmetric encryption need to be used in the existing RFID system, resulting in the increase of logic and control circuits in the electronic tag and the increase of chip cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification (RFID) encryption verification system and method
  • Radio frequency identification (RFID) encryption verification system and method
  • Radio frequency identification (RFID) encryption verification system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Embodiment 1 The process of card reader verification electronic label

[0061] The first embodiment is used to illustrate a situation of one-way authentication, that is, the RFID card reader performs one-way authentication on the electronic tag. This embodiment only uses a general public key algorithm to complete the process of identity authentication. According to the computing power and storage space of different chips, many public key schemes such as RSA, ECC, Rabin, ElGamal, etc. may be used.

[0062] In the RFID encryption verification system of the present invention, the first memory 13 of the electronic tag 1 stores the private key of the electronic tag 1 and the public key of the card reader 2, and the backend server stores the private key of the card reader 2 And the public key of electronic label 1.

[0063] image 3 Shown is the flow chart of the first embodiment, including:

[0064] Step 11. The card reader 2 sends a signal to the electronic tag 1;

[0065] Step 12....

Embodiment 2

[0076] Embodiment 2 Electronic tag verification card reader process

[0077] The second embodiment is used to illustrate a situation of one-way authentication, that is, the RFID electronic tag performs one-way authentication on the card reader.

[0078] Figure 4 The flow chart of the second embodiment is shown, including:

[0079] Step 21: The card reader 2 sends a signature request to the background server 3;

[0080] Step 22: The backend server 3 generates a random number r2, a timestamp t2, and uses the private key of the card reader 2 to sign hash(r2, t2). The result is S2. Concatenate r2 and t2 to S2 to generate second encrypted information , Namely r2||t2||S2, sent to reader 2;

[0081] Step 23: The card reader 2 sends the second encrypted information to the electronic label 2, and the electronic label 2 reads the second encrypted information;

[0082] Step 24: The electronic tag 2 uses the public key of the card reader 2 to decrypt the second encrypted information and verify the...

Embodiment 3

[0090] Embodiment 3 Two-way verification process of electronic tag and card reader

[0091] Different from the first and second embodiments, the third embodiment is used to illustrate the situation of mutual authentication between the RFID electronic tag 1 and the card reader.

[0092] Figure 5 The flow chart of the third embodiment is shown, including:

[0093] Step 31: The card reader 2 sends a signal to the electronic tag 1;

[0094] Step 32, the second memory 143 of the electronic tag 2 generates a random number r3 and a time stamp t3, the encryption and decryption controller 141 of the electronic tag 2 reads the private key of the electronic tag 2 in the first memory 13, and the arithmetic unit 142 uses the electronic tag The private key of 2 signs hash(r3, t3), and the result is S3. The r3 and t3 are cascaded to S3 to generate the third encrypted information, namely r3||t3||S3;

[0095] Step 33: The card reader 2 reads the third encrypted information;

[0096] Step 34: The card ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a radio frequency identification (RFID) encryption verification system, which consists of at least one electronic tag, at least one reader and a background server, wherein the electronic tag comprises an antenna subsystem, an RFID controller, a first storage and an encryption / decryption unit; the first storage stores a serial number of the electronic tag, a private key of the electronic tag and a public key of a card reader; the encryption / decryption unit generates first encryption information by utilizing the private key of the electronic tag; the RFID controller forwards the first encryption information output by the encryption / decryption unit to the antenna subsystem, the antenna subsystem forwards the first encryption information to the reader, and the reader forwards the first encryption information to the background server; and the background server stores a private key of the card reader and a public key of the electronic tag to decrypt the first encryption information sent by the electronic tag.

Description

Technical field [0001] The present invention relates to information security technology in the field of radio frequency identification communication, in particular to a radio frequency identification encryption verification system and method. Background technique [0002] RFID (Radio Frequency Identification, radio frequency identification) electronic tag is a new type of electronic card that encapsulates antenna and IC chip on a plastic substrate; it has large data storage capacity, wireless transmission, small and light weight, long service life, waterproof, antimagnetic and safe Anti-counterfeiting and other features are one of the key technologies that will replace barcodes into the "Internet of Things" era in the future. [0003] For ordinary RFID electronic tags and RFID card readers, whether it is high frequency or low frequency, whether it is an active card or a passive card, there are very few measures to ensure the communication security between the card and the reader. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K7/00
Inventor 郭宝安徐树民王磊田心王绍麟杜彦哲
Owner AEROSPACE INFORMATION
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More