Method for effectively transferring label ownership in RFID system

An effective transfer and ownership technology, which is applied in the field of information security, can solve the problems of complete label transfer, failure to realize ownership transfer, etc., and achieve the effect of protecting user privacy, reducing work costs, and not easy to leak

Inactive Publication Date: 2014-07-30
TIANJIN UNIV
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Kapoor et al. believe that without the use of public key encryption technology, without the participation of TTP, it will be difficult to achieve the complete transfer of label ownership
For example, the Song agreement and the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for effectively transferring label ownership in RFID system
  • Method for effectively transferring label ownership in RFID system
  • Method for effectively transferring label ownership in RFID system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0023] The present invention uses Status to identify the current owner of the tag, adopts a challenge response mechanism, and implements the ownership transfer process by exchanging messages between the tag and the old and new owners, and designs a safe, simple and efficient RFID tag ownership transfer protocol. The complete agreement includes the process of making a transfer request, authenticating the tag identity, approving the transfer request, authenticating the identity of the original owner, and initializing the new owner. Where S 1 The list of keys stored in is shown in Table 1.

[0024] Table 1: S 1 List of keys stored in

[0025]

[0026] Before transfer S 2 The key list stored in is shown in Table 2.

[0027] Table 2: S before transfer 2 List of keys stored in

[0028]

[0029] T i The communication data stored in is shown in Table 3.

[0030] Table 3: T i Communication data stored in

[0031]

[0032] The following combined with the flowchart (attached figure 1 ) Introduce ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information security and relates to a method for effectively transferring label ownership in an RFID system. The method adopts a challenge responding mechanism. An ownership transference process of a label is realized through mutual message sending between old and new owners. A complete method includes transference request proposal, label identity authentication and transference request approval and original-owner identity authentication. The method realizes that when a new owner proposes a label control request, through permission of the original owner, the new owner can obtain the ownership of a target label and in the ownership transference process, the label can and only can be owned uniquely by the new owner or the original owner so that requirements for safe transference of the label in the security aspect can be met.

Description

Technical field [0001] The invention belongs to the field of information security; it is mainly used for the transfer of label ownership in the RFID system, that is, the new owner puts forward a control label request, and obtains the ownership of the target label with the permission of the original owner. At the same time, the tag can and can only be uniquely owned by the new owner or the original owner during the ownership transfer process. It is especially suitable for providing a certain security guarantee for the transfer of ownership of RFID system tags in the product supply chain. Background technique [0002] RFID (Radio Frequency Identification), that is, radio frequency identification technology, is a non-contact automatic identification technology, which has a wide range of applications in commodity management, cargo transportation, vehicle identification, supply chain management, etc., and its security problems have always been much attention. An RFID system gen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08G06K17/00
Inventor 孙达志毛雅佼李晓红许光全
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products