Unlock instant, AI-driven research and patent intelligence for your innovation.

Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation

A technology of cyclic redundancy check and passive radio frequency, which is applied in the field of radio frequency identification, can solve the problems of low tag utilization rate, difficult passive tag implementation, and poor security, so as to meet the requirements of safety certification and implementability Strong, low power consumption effect

Active Publication Date: 2015-07-22
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Physical methods can solve the security problems of RFID systems to a certain extent, but the utilization rate of tags is low, and the security is not very good. Security protocols based on cryptography are more and more popular. It mainly uses authentication methods and encryption algorithms. To ensure data security between tags and readers
At present, security protocols based on cryptographic technology mainly use Hash function, block encryption algorithm and stream encryption algorithm, but there are some security risks or difficulties in implementing passive tags, so it is urgent to design low-cost, efficient and practical Security Mechanism Suitable for RFID System Hardware Conditions and Application Requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation
  • Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation
  • Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0060] Initial state: The reader uses the anti-collision mechanism to identify a single tag from multiple tags, and obtains the item code information stored on the tag through the code acquisition command.

[0061] figure 1 For the one-way authentication process of the passive RFID system tag of the present invention to the reader, the specific implementation includes:

[0062] (1) The reader sends the security parameter acquisition command Get_SecPara;

[0063] The frame format of the security parameter acquisition command is as follows:

[0064]

[0065] in:

[0066] Command code: The code of the security parameter acquisition command.

[0067] Tag handle: 11-bit random number and CRC-5 sent by the tag during the inventory process. The generator polynomial of CRC-5 is x 5 +x 3 +1.

[0068] Checksum: The CRC-16 calculation contai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation. The method comprises the following steps of unidirectional authentication of a reader-writer by a system label and unidirectional authentication of the label by the system reader-writer, as well as bidirectional authentication of the system reader-writer and label. A 16-bit CRC code circuit built in the passive RFID label is utilized, so that the unidirectional function feature of CRC operation can be utilized to protect authentication keys, and further avoid code operational circuit with large power consumption. The method has the advantages of low cost, little power consumption, and strong feasibility, and being capable of meeting security authentication requirements of the reader-writer and the label in middle-low passive RFID system.

Description

technical field [0001] The invention belongs to the technical field of radio frequency identification, and relates to a security authentication method of a radio frequency identification system, in particular to a security authentication method of a passive radio frequency identification system based on a cyclic redundancy check code operation. Background technique [0002] Radio Frequency Identification (RFID) technology is a non-contact automatic identification technology that uses radio frequency signals and spatial coupling transmission characteristics to realize the identification of objects. RFID systems can be divided into active RFID systems and passive RFID systems according to whether the label contains data power. The basic passive RFID system includes passive tags (referred to as tags), readers and antennas. Among them, the tag stores various information of related objects, and the reader communicates with the tag through radio frequency signals to obtain the id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00
Inventor 张琛李建成王宏义杨青李聪
Owner NAT UNIV OF DEFENSE TECH