Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method of radio-frequency identification system

A radio frequency identification system and security authentication technology, which is applied in the field of radio frequency identification system security authentication based on hash function, can solve the problems of increasing system cost, being vulnerable to counterfeiting attacks and retransmission attacks, and tags being easily traced, so as to ensure legality. performance, cost reduction

Inactive Publication Date: 2014-09-10
JIANGSU UNIV OF SCI & TECH +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the Hash lock protocol and the random Hash lock protocol, the ID is transmitted through an insecure channel in the form of plain text, so it is very vulnerable to counterfeit attacks and retransmission attacks, and attackers can easily track tags; the Hash chain protocol is A one-way authentication protocol, that is, it can only enable the reader to authenticate the identity of the tag, but the tag cannot verify the identity of the reader; in the Hash chain protocol and the distributed query-response protocol, the execution of an authentication protocol requires the tag to Two hash operations increase the cost of the system; there is no dynamic ID update mechanism in the Hash lock protocol, random Hash lock protocol, and distributed query-response protocol, making tags easy to track

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method of radio-frequency identification system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0021] The specific implementation of the radio frequency identification system security authentication method is as follows:

[0022] First, the RFID system is initialized.

[0023] The radio frequency identification system includes three components: background database, reader and tag. When the system is initialized, a unique identifier ID is assigned to each tag. The background database has the identifier ID of all tags. In the background database, each tag Create an array (oldID, newID). The array corresponding to each tag is (0, newID) during initialization, newID is the ID value of each tag, and the oldID value is 0 when initialized.

[0024] Second, the security authentication process, such as figure 1 As shown, including five rounds of communication process:

[0025] (1) In the first round, the reader sends data to the tag;

[0026] The reader generates a pseudorandom number r R , the reader sends a query authentication request to the RFID tag, and sends r R give ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method of a radio-frequency identification system, belonging to the field of communication technology. The radio-frequency identification system comprises a background database, a reader and a label; and an authentication process comprises five rounds of communication process, realizes bidirectional authentication between the label and the reader and ensures the legality of the label and the reader. In the authentication process, the label only needs to execute the operation of a Hash function once, thereby reducing the system cost; and the label ID also has a dynamic updating function so that the label is not easily tracked. In the invention, the problem that a legal label cannot be authenticated due to the asynchronous ID update is solved by storing a label oldID and a label newID in the background database.

Description

technical field [0001] The invention belongs to the technical field of communication, and relates to a safety authentication method of a radio frequency identification system based on a hash (hash) function. Background technique [0002] The application of radio frequency identification (RFID) technology is becoming more and more widespread, and it has shown strong practical value in the fields of manufacturing, retailing and logistics, but it is followed by various security and privacy issues of RFID. Mainly manifested in the following two aspects: [0003] (a) User information privacy and security. When the RFID reader communicates with the RFID tag, the communication content contains the personal privacy information of the tag user, which will cause the leakage of the user's private information when it is attacked by security. [0004] (b) User location privacy and security. The RFID reader can easily detect the activity location of the tag user through the RFID tag, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00G06F17/30H04L9/32
Inventor 段勇钱萍刘镇
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products