Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for asymmetrically authenticating radio frequency electronic tag

An authentication method and electronic tag technology, applied in user identity/authority verification, instruments, computer components, etc., can solve the problems of increasing the complexity of tag chips

Inactive Publication Date: 2014-08-27
北京联合世龙科技有限公司 +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, implanting existing asymmetric cryptographic algorithms in electronic tags (especially passive electronic tags) is bound to greatly increase the complexity of the tag chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for asymmetrically authenticating radio frequency electronic tag
  • Method for asymmetrically authenticating radio frequency electronic tag
  • Method for asymmetrically authenticating radio frequency electronic tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0053] The radio frequency electronic tag asymmetric authentication method of the present invention can be applied to general wireless radio frequency communication systems, wherein the radio frequency terminal can be other mobile devices, such as smart cards, mobile phones, etc., and correspondingly, the tag reader can also be other authentication devices or facilities. Such as smart card readers, computer hosts, access control equipment, etc., the certification center can be a self-developed system module with a function similar to the security certification center in the public key infrastructure (Public key Infrastructure, PKI), or it can directly use the PKI security certification center.

[0054] The following...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for asymmetrically authenticating a radio frequency electronic tag. In the method, an algebraic integer a serves as a public key, and an algebraic integer b serves as a private key; wherein b=b1*sqrt(p) + b2*sqrt(q), a=b2=a1 +a2*sqrt(n); validation is accomplished by using a challenge-responder protocol; a challenge code c is a random integer; and in an expression of a responder code z=bx=z1 +z2*sqrt(n), x is an algebraic integer which is formed by mapping the c. The validation of the responder code z comprises the following two steps of: 1, validating whether the algebraic integer y=y1 +y2*sqrt(n) meets the condition that z2=ay; and 2, validating whether a preset mapping relation is formed between the responder code z and the challenge code c. Compared with the conventional symmetric cryptographic algorithm, an algorithm provided by the invention has the advantage that: an elliptic curve cryptography algorithm is simpler and relatively smaller in calculated quantity. Therefore, by adoption of the technical scheme provided by the invention in a passive electronic tag, an authentication process is accomplished, so the safety of a radio frequency identification system can be ensured, and the cost of an electronic tag chip can be effectively controlled.

Description

technical field [0001] The invention relates to an asymmetric authentication method of a radio frequency electronic tag. Background technique [0002] Radio frequency identification technology (RFID) has become a popular new technology in the world. So far, many high-tech companies, such as Philips, Siemens, Intel, Microsoft, Oracle, etc., have actively participated in the development of radio frequency identification hardware and software. The radio frequency identification system mainly includes two parts, the electronic tag and the reader. The electronic tag is the carrier of the radio frequency identification data. It is composed of a tag antenna and a tag chip. The commonly used tag chip is a passive chip. From the perspective of security, tag chips can be divided into three categories: with symmetric cryptographic algorithm (Symmetric Cryptographic Algorithm), with asymmetric cryptographic algorithm (Asymmetric Cryptographic Algorithm), and without cryptographic algori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06K17/00
Inventor 郑建德
Owner 北京联合世龙科技有限公司