Method for asymmetrically authenticating radio frequency electronic tag
An authentication method and electronic tag technology, applied in user identity/authority verification, instruments, computer components, etc., can solve the problems of increasing the complexity of tag chips
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.
[0053] The radio frequency electronic tag asymmetric authentication method of the present invention can be applied to general wireless radio frequency communication systems, wherein the radio frequency terminal can be other mobile devices, such as smart cards, mobile phones, etc., and correspondingly, the tag reader can also be other authentication devices or facilities. Such as smart card readers, computer hosts, access control equipment, etc., the certification center can be a self-developed system module with a function similar to the security certification center in the public key infrastructure (Public key Infrastructure, PKI), or it can directly use the PKI security certification center.
[0054] The following...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 