Bidirectional authentication method of radio frequency identification system

An identification system and two-way authentication technology, applied in the field of information security

Active Publication Date: 2013-11-27
徐州虹智智能科技有限公司
View PDF4 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution finally solves the legal identity between the tag and the reader of the RFID system, as well as the authentication of read and write permissions and the privacy of data information, and coordinates the issues of safety, efficiency and tag cost well.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication method of radio frequency identification system
  • Bidirectional authentication method of radio frequency identification system
  • Bidirectional authentication method of radio frequency identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The invention will be further illustrated by the following examples.

[0080] Specific simulation standard data selection.

[0081] (1) The tag TID is 1000100010001000; the corresponding tent mapping initial value:

[0082] x 0 =(1000100010001000) 2 '1.5259'10 -5 =0.5348.

[0083] (2) The RID of the reader is 0010001000100010; the corresponding Tent mapping parameters:

[0084] α= (0010001000100010) 2 '1.5259'10 -5 =0.1337.

[0085] (3) The random number R generated by the reader during the authentication process is 0000000000111010; according to the "set interval sampling key" introduced in the encrypted technical solution S4 in the summary of the invention k ( n , m , w )", the key can be obtained:

[0086] k ( n , m , w )=(0000000000111010) 2 ⊕(2 16 -1)=(1111111111000101) 2 = k (512,3,10).

[0087] (4) Suppose the confidential information text stored in the RFID tag is "one world one dream", and the ASCII code corresponding to the information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a bidirectional authentication method of a radio frequency identification system. The simple and rapid method with chaotic mapping combined with the Hash function, the exclusive-or operation and the like is adopted, filter operation is conducted together with bidirectional authentication, search and computing loads of a back-end data base are reduced, the safety problems of impersonation, retransmission attack, tracing and the like are avoided, a label of the radio frequency identification system and TID and RID of the unique mark amount of a reader are used as an initial value and parameters of the chaotic mapping, and chaotic scrambling and exclusive-or encryption are performed on confidential information of the label by being combined with the authentication process. On the basis of taking full consideration of saving the cost of the passive radio frequency identification label, data encryption and safety authentication are organically combined, and accordingly the safety problems such as illegal access, counterfeiting and cheating and data leakage in the radio frequency identification system can be solved.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to encryption of confidential data and two-way authentication between RFID tags and readers in the Internet of Things. Background technique [0002] Radio Frequency Identification (RFID) is a non-contact automatic identification technology. Its basic principle is to use the spatial coupling (inductive coupling or electromagnetic backscatter coupling) transmission characteristics of radio frequency signals to realize automatic identification of identified objects. identify. RFID systems usually consist of tags ( tag ),Reader( reader ) and the backend database ( Database ) consists of three parts. The communication between the reader and the tag is carried out on a wireless, non-contact channel. With the wide application of RFID technology in an open system environment, the information exchange between the tag and the reader is vulnerable to various interference and at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00H04L9/32
Inventor 张小红肖娟凤钟小勇
Owner 徐州虹智智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products