RFID (radio frequency identification) mutual authentication protocol method

A two-way authentication and protocol technology, which is used in collaborative devices, user identity/authority verification, instruments, etc., and can solve the problems of large storage space for tags, no forward security, weak authentication and data integrity, etc.

Active Publication Date: 2013-05-01
上海诚扬信息科技有限公司
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these protocols still have their own defects, which can be roughly summarized as follows: 1) Authentication and data integrity are not strong
2) It cannot resist attacks such as retransmission and denial of service, and has no forward security
3) Tags require a large storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID (radio frequency identification) mutual authentication protocol method
  • RFID (radio frequency identification) mutual authentication protocol method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention and its advantages will be further described below in conjunction with the accompanying drawings and its embodiments.

[0034] In order to be suitable for low-cost labels, the present invention newly defines word synthesis operation Syn ( X , Y ): Syn ( X , Y ) by the array Y after the M Bit and X before L - M made up of bits L A new array of bits. in X , Y Two binary arrays required for word synthesis operations, , , ;one of them M set as: M=Hw ( Y ), can also be M = L - hw ( Y );or M = hw ( X ), can also be M = L - hw ( X );or M = HD ( X , Y ), can also be M = L - HD ( X , Y ); hw ( X )for X The Hamming weight of hw ( Y ) for Y The Hamming weight, HD ( X , Y )for X and Y The Hamming distance of .

[0035] For example, take L =16, set X =1001110101100101, Y =0110101011011001, set M = hw ( Y )=9, then according to the above word synthesis operation, get Syn ( X , Y )=01101...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an RFID (radio frequency identification) mutual authentication protocol method, which comprises the following three stages: a tag identification stage, a mutual authentication stage and an update stage, wherein at the tag identification stage, a reader sends a request to a tag, and the tag returns an identification section (IDS) to the reader after receiving the request; at the mutual authentication stage, after the IDS is identified by the reader, an exclusive-or operation related to a digital synthetic operation is conducted to obtain A and B, A and B are sent to the tag, after the reader is identified by the tag through received A||B, related calculation is conducted to obtain C, C is sent to the reader, and the tag is identified by the reader; and at the update stage, after C is successfully identified by the reader, IDS and secret keys (K1 and K2) in C are updated, then D and E are calculated and sent to the tag, and after E is successfully identified by the tag, IDS and secret keys of E are updated. Only the simple digital synthetic or exclusive-or operation exists in the RFID mutual authentication protocol method. Therefore, the RFID mutual authentication protocol method has the beneficial effects that the calculation amount and storage space of the tag can be effectively reduced, various attacks such as impersonation, retransmission, tracking and denial of service can be resisted, and forward security is provided.

Description

[0001] technical field [0002] The invention relates to the technical field of radio frequency identification and identity authentication, in particular to an RFID two-way authentication protocol method. Background technique [0003] The RFID system is mainly composed of three parts: tags, readers, and back-end databases. In the design of RFID communication protocols, the transmission channel between the back-end database and readers is generally safe, and there is no security risk. They can be regarded as One side of the protocol is collectively referred to as a reader or a reader with a back-end database in this invention; while the wireless transmission channel between the tag and the reader is not safe, there are many potential attacks, and the tag can be regarded as the other party of the protocol . At the same time, since the hardware resources of the RFID system are limited by many factors such as computing power, storage space, and power supply, security, high effi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K17/00
Inventor 章国安杜宗印袁红林包志华徐晨季彦呈邱恭安
Owner 上海诚扬信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products