RFID (Radio Frequency Identification Device) mutual authentication method based on secret key and cache mechanism

A two-way authentication and key technology, applied in the field of communication, can solve the problem of not being able to effectively solve anti-denial of service attacks, replay and spoofing attacks, unable to resist eavesdropping, replay, spoofing and tracking attacks, and unable to resist denial of service attacks. , to prevent location tracking problems, reduce the number of searches, and have little impact on authentication speed

Active Publication Date: 2012-03-28
北京中科蓝信科技有限公司
View PDF6 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, most of the existing RFID protocols have defects that cannot fully satisfy the above security
For example, the Hash-Lock protocol cannot resist eavesdropping, replay, spoofing and tracking attacks, and its security is very poor; although the random Hash-Lock protocol solves the tracking problem on the basis of the Hash-Lock protocol, it still cannot effectively prevent denial of service attacks. , replay and spoofing attacks; the Hash chain protocol and the Hash-based ID change protocol cannot resist denial of service and spoofing attacks; have achieved good results, but they are still not immune to denial of service attacks
Therefore, designing a safe, efficient and low-cost RFID security authentication protocol is still a challenging research problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID (Radio Frequency Identification Device) mutual authentication method based on secret key and cache mechanism
  • RFID (Radio Frequency Identification Device) mutual authentication method based on secret key and cache mechanism
  • RFID (Radio Frequency Identification Device) mutual authentication method based on secret key and cache mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] refer to figure 1 , the most basic radio frequency identification RFID system is mainly composed of tags, readers and background databases. in:

[0028] Tags: Composed of coupling elements and chips, each tag has a unique electronic code, which is attached to the object to identify the target object. Communicate with the reader through radio frequency signals.

[0029] Reader: It is a device that writes and reads tag information, and communicates with the database through the network to complete multiple tasks for the data of the radio frequency electronic tag.

[0030] Back-end database: Read and write control on tags, which stores tag-related information.

[0031] The invention is an authentication method for a reader-writer and a label, and only when both parties pass the security authentication can relevant data communication be carried out.

[0032] Initial conditions:

[0033] The tag contains a random number generation module and a Hash function, and stores it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an RFID (Radio Frequency Identification Device) mutual authentication method based on a secret key and a cache mechanism, which mainly solves the problems in the prior art that illegal reading, position tracking, eavesdropping, camouflage cajoling and unsafe resetting can not be resisted simultaneously. The achieving steps are as follows: a reader-writer and a tag adopt typical inquire response mechanism, the tag generates two authentication information values, namely beta is equal to hash (rl and Pr0), and sends the authentication information values to the reader-writer, the reader-writer compares received information value with self-computed information value, if the comparison results are same, returning authentication information hash (k' Pr0 and Prl') is sent to the tag through authentication. If the comparison results are different, the information is sent to back-end data base, authentication judgment is conducted by the back-end data base, the returning authentication information hash (k'' Pr0 and Prl'') is sent to the tag, after the tag receives the returning authentication information, authentication is carried out on the reader-writer by comparing the tag with self-computed value hash (k Pr0 and Prl), if the tag and the self-computed value hash (k Pr0 Prl) are same, the authentication is passed. The RFID (Radio Frequency Identification Device) mutual authentication method has the advantages of high safety performance and high execution efficiency, and can be applied to the RFID application context with limited resources and high safety requirements.

Description

technical field [0001] The invention belongs to the technical field of communication, relates to the transmission of digital information, and specifically relates to an RFID two-way authentication method based on a key and a cache mechanism. Background technique [0002] Radio frequency identification (RFID), commonly known as electronic tag technology, is a high-tech technology for fast, real-time and accurate collection and processing of information, and is listed as one of the top ten important technologies in the 21st century. RFID is widely used in production, retail, logistics, transportation and other industries, and has gradually become an indispensable technology and technology for enterprises to improve logistics supply chain management level, enterprise management informationization, reduce costs, participate in the international economic cycle, and enhance the core competitiveness of enterprises. means. The rise of RFID technology is not because it is a new tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K17/00
Inventor 樊凯李晖梁晨李杰
Owner 北京中科蓝信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products