Communication method for improving security of radio frequency identification system

The technology of a radio frequency identification system and communication method is applied in the field of communication to improve the security of the radio frequency identification system, and can solve problems such as low security of the key system, long time required for accessing keys, and large number of keys, etc., to achieve The effect of saving key storage resources, occupying less resources, and fast access speed

Active Publication Date: 2014-08-13
SHANGHAI ADVANCED RES INST CHINESE ACADEMY OF SCI +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a communication method for improving the security of the radio frequency identification system, which is used to solve the problem that the number of keys stored in the database in the prior art is too large and the access keys need Problems such as long time and low system security due to the periodicity of the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method for improving security of radio frequency identification system
  • Communication method for improving security of radio frequency identification system
  • Communication method for improving security of radio frequency identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] The invention provides a communication method for improving the security of a radio frequency identification system, the radio frequency identification system at least includes a tag, a reader-writer communicating with the tag, and an application for controlling the reader-writer and processing the data information of the tag system (not shown). In this example, see Figure 2 to Figure 5 , the communication method for improving the security of the radio frequency identification system of the present invention adds a high-authority access process and a high-authority state, and the tag in the open state can enter the high-authority state through the high-authority access process. In this state, the reader The content and length of the key can be modified to improve the security of the system, such as image 3 As shown, the communication method for improving the security of the radio frequency identification system at least includes the following steps:

[0032] Such as...

Embodiment 2

[0043] In this example, see Figure 6 , showing that the label can only enter the high-privilege state through the high-privilege access process in the secure state, that is, the label in the open (open) state must enter the secure (secure) state through an effective access process, and can pass the high-privilege state only in the secure state The access process enters a high-privilege state. As shown in the figure, compared with Embodiment 1, the communication method for improving the security of the radio frequency identification system of the present invention adds a tag. The access key needs to be detected through the access process, so Figure 6 The high-privilege state is the most secure. In the specific implementation process, in the step S102, after the tag has gone through the inventory and opening process, it needs to go through a security access process to enter the security state, and then the reader sends a random number Obtain instructions and request to ente...

Embodiment 3

[0045] In this example, see Figure 7 , showing that tags in the open and secure states can enter the high-privilege state through the more secure high-privilege access process. In the state of high-privilege access, the reader can modify the content and length of the key. Thereby improving the security of the system. In other words, in the open (open) or secure (secure) state, the reader and tag go through a high-privilege access process to make the tag enter a high-privilege state. In this state, the reader can modify the relevant information by sending a key. The method of instruction modifies the content and length of the key, and after the tag returns the message of successful modification, the new key replaces the old key and is stored in the corresponding key storage location. It should be noted that the process of the tag requesting to enter the high-privilege access is the same as that described in Embodiment 1 and Embodiment 2, and will not be repeated here.

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a communication method for improving the security of a radio frequency identification system. The communication method mainly comprises the steps as follows: adding a space for pre-storing a high-permission access password in a physical storage space of a label and a driver for sending an instruction with a preset format in a mapping rule of a read-write device, and enabling the label to identify and respond; checking and opening the label, and feeding back a random number according to a random number obtaining instruction sent by the read-write device; sending the instruction with the preset format including an xor result of the random number and a key to the label by the read-write device; comparing the analyzed key with the high-permission access password by the label, and sending a key update instruction including the length and the content of a new key to the label by the read-write device after the label is in a high-permission state; and enabling the label to update the key and replace the pre-stored high-permission access password. Therefore, the problems of a large amount of keys stored in the traditional database, long key access time and low system security due to the periodicity of the key are solved.

Description

technical field [0001] The invention relates to a radio frequency identification technology, in particular to a communication method for improving the security of a radio frequency identification system. Background technique [0002] With the continuous expansion of the scope and scale of radio frequency identification systems in practical applications, its data security has attracted more and more attention from the industry. At present, in order to improve the security of the radio frequency identification system, various effective methods have been proposed, the most typical methods are security authentication and data encryption. Through the process of security authentication, one-way or multi-way authentication can be performed between the tag and the reader to prevent unmatched readers or tags from stealing data and destroying the security of the entire system. The data encryption method is to use an encryption algorithm to encrypt the data communication between the r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00H04L9/08
Inventor 晏莎莎叶显阳梅年松张钊锋邵轲李海峰
Owner SHANGHAI ADVANCED RES INST CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products