Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device for ownership transfer of radio frequency identification (RFID) tag

A technology of RFID tags and transfer methods, applied in the direction of cooperative devices, instruments, computer components, etc., can solve the problems of loss of security protection, inability to resist replay attacks, etc., and achieve the effect of protecting privacy

Inactive Publication Date: 2013-01-02
深联致远(北京)科技有限公司
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In 2007, Osaka et al. designed a hash-based two-party tag ownership transfer scheme (An efficient and secure RFID security method with ownership transfer), but this scheme cannot resist replay attacks and other attacks such as desynchronization
Its weakness lies in: the transfer of label ownership must be completed with the help of a trusted third party, and the absolute security of the trusted third party must be guaranteed. Once the trusted third party is compromised by an attacker, the entire system will completely lose security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for ownership transfer of radio frequency identification (RFID) tag
  • Method and device for ownership transfer of radio frequency identification (RFID) tag
  • Method and device for ownership transfer of radio frequency identification (RFID) tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings of the description.

[0039] refer to figure 1 , the RFID tag ownership transfer method, through the RFID tag and the original owner's RFID reader, and with the new owner's RFID reader to renew the key, realize the RFID tag ownership transfer, the method includes the original owner's RFID reader The writer deletes the RFID tag key and the new owner’s RFID reader sets the RFID tag key. The original owner’s RFID reader sets the temporary key Ktemp for the RFID tag, and transfers Ktemp to the RFID tag through a secure channel. The temporary key is deleted after being transmitted to the RFID reader of the new owner, and the new owner's RFID reader reads the temporary key Ktemp of the authenticated RFID tag and sets a new key instead of the temporary key.

[0040] figure 2 It is a schematic flow diagram of the deletion process of the RFID tag key by the original owner's RFI...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for ownership transfer of a radio frequency identification (RFID) tag. Ownership transfer of the RFID tag is achieved through the RFID tag and a RFID reader-writer of an original owner and secret key updating of the RFID tag and a RFID reader-writer of a new owner. A temporary secret key Ktemp for the RFID tag is arranged by the RFID reader-writer of the original owner through shared ciphertext Kold. After the Ktemp is transmitted to the RFID reader-writer of the new owner through a secure channel, a temporary secret key in the RFID reader-writer of the original owner is deleted. After the RFID tag is read and authenticated by the RFID reader-writer of the new owner through tag identification (ID) and the temporary secret key save in a background server, a new secret key Knew is updated and set to replace the temporary secret key Ktemp. A hash function and an exclusive-or operation are led in the transfer of the RFID tag, secret keys of the RFID reader-writer of the original owner and the RFID reader-writer of the new owner are updated successively through the RFID tag so as to achieve that ownership of the RFID tag is transferred from a commercial retail organization to consumers really, the RFID tag on purchased commodities can be controlled by the consumers totally, and tag information illegal stealing of other people can be prevented.

Description

technical field [0001] The invention relates to the field of RFID radio frequency card equipment, in particular to a method and device for transferring the ownership of an RFID tag. Background technique [0002] At present, RFID technology has become a powerful tool for commercial retail organizations to reduce commodity management and warehouse management costs, increase employee work efficiency, and enhance the core competitiveness of enterprises. The use of RFID technology to realize supply chain management can greatly improve work efficiency, reduce overall costs, and have considerable economic benefits. However, at the same time, after the goods with RFID tags are sold to consumers, since the ownership of the RFID tags has not been transferred to consumers, commercial retail organizations can still use concealed RFID readers to read and write products without consumers noticing. access control labels, resulting in the leakage of consumer privacy and infringement of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K17/00
Inventor 徐勇军尹喜陈静华
Owner 深联致远(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products