Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation
A technology of cyclic redundancy check and passive radio frequency, which is applied in the field of radio frequency identification, can solve the problems of low tag utilization rate, difficult passive tag implementation, and poor security, so as to meet the requirements of safety certification and implementability Strong, low power consumption effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0060] Initial state: The reader uses the anti-collision mechanism to identify a single tag from multiple tags, and obtains the item code information stored on the tag through the code acquisition command.
[0061] figure 1 For the one-way authentication process of the passive RFID system tag of the present invention to the reader, the specific implementation includes:
[0062] (1) The reader sends the security parameter acquisition command Get_SecPara;
[0063] The frame format of the security parameter acquisition command is as follows:
[0064]
[0065] in:
[0066] Command code: The code of the security parameter acquisition command.
[0067] Tag handle: 11-bit random number and CRC-5 sent by the tag during the inventory process. The generator polynomial of CRC-5 is x 5 +x 3 +1.
[0068] Checksum: The CRC-16 calculation contai...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 