RFID two-way authentication method based on asymmetric key and hash function
An asymmetric key and two-way authentication technology, applied in digital transmission systems, user identity/authority verification, electrical components, etc., to achieve the effect of solving Hash conflicts
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] RFID mutual authentication methods based on asymmetric keys and Hash functions include:
[0058] Step 1001: The reader sends the request information to the tag.
[0059] Step 1002: After the tag receives the request information, it sends the tag identifier DID encrypted with the public key to the reader.
[0060] Step 1003: The reader receives the tag identifier DID encrypted by the public key and decrypts it with the private key to obtain the tag identifier ID.
[0061] Step 1004: The reader forwards the tag identifier ID to the database, and the database searches the corresponding public key encrypted digital string Dnum and the public key encrypted item information DM according to the tag identifier ID, and encrypts the public key The digital string Dnum and the item information DM encrypted by the public key are sent to the reader.
[0062] Step 1005: The reader decrypts the digital string Dnum encrypted by the public key and the item information DM encrypted by the public k...
Embodiment 2
[0074] RFID mutual authentication methods based on asymmetric keys and Hash functions include:
[0075] Step 2001: The reader sends the request information to the tag.
[0076] Step 2002: After the tag receives the request information, it sends the tag identifier DID encrypted with the public key to the reader.
[0077] Step 2003: The reader receives the tag identifier DID encrypted by the public key and decrypts it with the private key to obtain the tag identifier ID.
[0078] Step 2004: The reader forwards the tag identifier ID to the database, and the database searches the corresponding public key encrypted digital string Dnum and the public key encrypted item information DM according to the tag identifier ID, and encrypts the public key The digital string Dnum and the item information DM encrypted by the public key are sent to the reader.
[0079] Step 2005: The reader decrypts the digital string Dnum encrypted by the public key and the item information DM encrypted by the public k...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


