Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of rfid two-way authentication protocol method

A two-way authentication and protocol technology, which is used in collaborative devices, user identity/authority verification, instruments, etc., can solve problems such as weak authentication and data integrity, large storage space for labels, and no forward security. Achieve strong authentication and data integrity, ensure freshness, and ensure forward security.

Active Publication Date: 2016-04-20
上海诚扬信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these protocols still have their own defects, which can be roughly summarized as follows: 1) Authentication and data integrity are not strong
2) It cannot resist attacks such as retransmission and denial of service, and has no forward security
3) Tags require a large storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of rfid two-way authentication protocol method
  • A kind of rfid two-way authentication protocol method
  • A kind of rfid two-way authentication protocol method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention and its advantages will be further described below in conjunction with the accompanying drawings and its embodiments.

[0033]In order to be suitable for low-cost labels, the present invention newly defines the word synthesis operation Syn(X,Y): Syn(X,Y) is a new array of L bits formed by combining the last M bits of the array Y and the first L-M bits of X. Wherein X, Y are two binary arrays required for the word synthesis operation, , , ;Where M is set as: M=Hw(Y), also can be M=L-Hw(Y); or M=Hw(X), can also be M=L-Hw(X); or M= Hd(X,Y) can also be M=L-Hd(X,Y); Hw(X) is the Hamming weight of X, Hw(Y) is the Hamming weight of Y, Hd(X,Y) is The Hamming distance between X and Y.

[0034] For example, take L=16, set X=1001110101100101, Y=0110101011011001, set M=Hw(Y)=9, then get Syn(X,Y)=0110110011001110 according to the above word synthesis operation, the specific operation process is as attached figure 1 shown. This operation can be realized...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an RFID (radio frequency identification) mutual authentication protocol method, which comprises the following three stages: a tag identification stage, a mutual authentication stage and an update stage, wherein at the tag identification stage, a reader sends a request to a tag, and the tag returns an identification section (IDS) to the reader after receiving the request; at the mutual authentication stage, after the IDS is identified by the reader, an exclusive-or operation related to a digital synthetic operation is conducted to obtain A and B, A and B are sent to the tag, after the reader is identified by the tag through received A||B, related calculation is conducted to obtain C, C is sent to the reader, and the tag is identified by the reader; and at the update stage, after C is successfully identified by the reader, IDS and secret keys (K1 and K2) in C are updated, then D and E are calculated and sent to the tag, and after E is successfully identified by the tag, IDS and secret keys of E are updated. Only the simple digital synthetic or exclusive-or operation exists in the RFID mutual authentication protocol method. Therefore, the RFID mutual authentication protocol method has the beneficial effects that the calculation amount and storage space of the tag can be effectively reduced, various attacks such as impersonation, retransmission, tracking and denial of service can be resisted, and forward security is provided.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification and identity authentication, in particular to an RFID two-way authentication protocol method. Background technique [0002] The RFID system is mainly composed of three parts: tags, readers, and back-end databases. In the design of RFID communication protocols, the transmission channel between the back-end database and readers is generally safe, and there is no security risk. They can be regarded as One side of the protocol is collectively referred to as a reader or a reader with a back-end database in this invention; while the wireless transmission channel between the tag and the reader is not safe, there are many potential attacks, and the tag can be regarded as the other party of the protocol . At the same time, since the hardware resources of the RFID system are limited by many factors such as computing power, storage space, and power supply, security, high efficiency, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06K17/00
Inventor 章国安杜宗印袁红林包志华徐晨季彦呈邱恭安
Owner 上海诚扬信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products