Unlock instant, AI-driven research and patent intelligence for your innovation.

Strong safety certification method based on HB+ in RFID (Radio Frequency Identification Devices) system

A technology of security authentication and labeling, which is applied in the field of information security, can solve problems such as simplicity, efficiency, increased complexity, and complex calculations that do not conform to the HB protocol family, and achieve the effect of reducing communication times, overcoming insecure factors, and simplifying the communication process

Inactive Publication Date: 2012-10-17
TIANJIN UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 2. Complicated calculations, not suitable for low-end RFID systems
In order to meet the security requirements, many protocols use encryption operations such as hash functions in the process of authentication interaction. Although this has certain security guarantees, it increases the complexity and does not meet the original intention of the HB protocol family to be simple and efficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strong safety certification method based on HB+ in RFID (Radio Frequency Identification Devices) system
  • Strong safety certification method based on HB+ in RFID (Radio Frequency Identification Devices) system
  • Strong safety certification method based on HB+ in RFID (Radio Frequency Identification Devices) system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention is based on the HB+ protocol, and achieves the purpose of the tag being authenticated by the reader by sending messages between the tag and the reader. The complete protocol process includes r rounds, where r is a security parameter. Reader and Tag share n-bit keys x and y. Tag has a noise generator that generates a bit of noise v={0, 1|prob(v=1)=η} with the probability of η∈(0, 1 / 2). (prob(v=1) refers to the probability of v=1 happening)

[0037]During one round of authentication, Reader randomly generates n-bit sequence a and sends it to Tag. After receiving a, Tag generates n-bit random number b, calculates z, and sends (b, z) to Reader. Finally the Reader checks the correctness of z. After r rounds in this way, if the number of rounds in which the Tag responds incorrectly is less than ηr, the authentication is passed.

[0038] Combined with the flow chart below (attached figure 1 ) introduces the specific steps of the one-round certificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information safety and relates to a strong safety certification method based on HB+ in an RFID (Radio Frequency Identification Devices) system. A reader and a tag in the system share n-bit secret keys x and y; the tag owns a noise generator; in each turn of certificating, the possibility of a formula that eta belongs to (0, 1 / 2) is utilized to generate one bit of noise v={0,1 / prob(v=1)=eta}, wherein the prob(v=1) refers to the generation possibility of v=1; the strong safety certification method comprises r turns of certification processes between the reader and the tag; after the r turns of certificating are carried out, if a responding error turn of the tag is less than etar, the certification passes. The invention provides the safe, simple and efficient RFID strong safety certification method which is suitably applied to a low-end RFID system.

Description

technical field [0001] The invention belongs to the field of information security; it is mainly used for one-way authentication of tags by a reader in an RFID system, and is especially suitable for providing a certain security guarantee for a low-end RFID system. Background technique [0002] RFID (Radio Frequency Identification), that is, radio frequency identification technology, is a technology that uses radio frequency signals to automatically identify target objects and obtain relevant information without contact. It will become a basic technology for the construction of the information society in the future. A key issue affecting the application of RFID systems is the security of information in the system. A complete RFID system generally consists of three parts: a back-end database, a reader, and a tag. The communication between the RFID tag and the reader uses wireless communication, and this communication channel is considered insecure and vulnerable to attack. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06K17/00
Inventor 孙达志王月娇李晓红
Owner TIANJIN UNIV