Unlock instant, AI-driven research and patent intelligence for your innovation.

Token verification and data integrity protection

A data integrity and token technology, applied in digital data protection, digital data authentication, data processing applications, etc., can solve problems such as large hardware costs and high computing intensity

Inactive Publication Date: 2015-08-19
SIEMENS AG
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the solutions known so far require a relatively large hardware outlay on the RFID tag side due to the computationally intensive encryption and the complex key agreement protocol.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token verification and data integrity protection
  • Token verification and data integrity protection
  • Token verification and data integrity protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] figure 1 The inventive system is shown with a wired connection between the checking entity and the verification token. In this embodiment, the checking entity is a laptop 101 which is at least indirectly connected to the verification token, for example via a serial interface. The verification token 102 is included in a device 103 , for example a control device, and is connected to the laptop 101 via the device 103 .

[0020] figure 2 The system of the invention is shown with connections formed through a network between inspection entities and verification tokens. The checking entity is, for example, a computer 201 designed to manage devices through remote access (Remote Device Management, remote device management). The computer 201 is connected to a verification token 202 , which is included by the device 203 , through a network such as the Internet. The device 203 is connected to the network 205 through an M2M (Machine-to-Machine, machine-to-machine) module 204 an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In deriving a cryptographic key from the response message in a challenge-response message in a challenge-response authentication, a checksum for the related response is calculated after receiving a challenge message and before the related response has been transferred. A cryptographic key is derived from the response, which is used to determine the cryptographic checksum. The cryptographic checksum is transferred in a first time period after receiving the challenge message. The response message is transferred during a later, second time period. The duration of validity of the key derived from the response message ends before the response message is transferred. A theoretical attacker who can overhear and manipulate the communication will not know the response message until a point in time when the cryptographic key which can be derived therefrom is already no longer valid.

Description

technical field [0001] The invention relates to a method for authenticating at least one token by using a challenge-response protocol and for protecting the data integrity of data stored on the token by using a symmetric key. Furthermore, the invention relates to a system with a checking entity for authenticating at least one token by using a challenge-response protocol and for protecting the data integrity of data stored on the token by using a symmetric key. Background technique [0002] With RFID (Radio Frequency Identification, radio frequency identification), tags or tags can be equipped with chips that can be read without contact. RFID tags were first used to mark goods. In addition, with RFID tags, payment systems can be equipped with cards and identification documents for access control. People distinguish between active RFID tags and passive RFID tags. Active RFID tags have their own power supply, while passive RFID tags do not have their own power supply. Passi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G07F7/10H04W12/06H04L9/32H04L29/06G06K7/00G06F21/31
CPCG06Q20/341G06F21/64H04L63/0492G07F7/12H04L63/08H04L9/3271G07F7/082H04L2209/56G06F21/31H04L2209/805H04L9/3236
Inventor R.法尔克
Owner SIEMENS AG