Two-way authentication method of radio frequency identification based on elliptic curve
An elliptic curve, two-way authentication technology, applied in the field of information security, can solve the problems of poor security performance, consumption of storage resources, and high computational complexity, and achieve the effects of improving efficiency, reducing resources, and reducing data length.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The two-way authentication method between the tag and the reader in the RFID system proposed by the present invention is based on the elliptic curve cryptography in the public key cryptography, and is known to be realized based on the elliptic curve on the finite field GF(q), where q is The length is the order of the finite field of 160 bits, and the base point on the elliptic curve is P.
[0041] The parameters required in the authentication process include: reader ID R , the public key Q of the reader R =s R P, the private key s of the reader R , the ID of the tag T , the tag’s public key Q T =s T P, the tag's private key s T , the tag's certificate CERT, where the reader public key Q R The length of is 32bit, the tag public key Q T The length is 32bit.
[0042] refer to figure 1 , the two-way authentication process of the present invention is as follows:
[0043] Step 1, the trusted third party injects pre-stored data into the tag.
[0044] (1a) The trust...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com