Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID)

An electronic label and security authentication technology, which is applied in the direction of security communication devices, electrical components, and cooperative operation devices, etc., can solve problems such as potential safety hazards, inability to read and protect TID information, and achieve the effect of preventing theft

Active Publication Date: 2014-12-17
TRAFFIC MANAGEMENT RES INST OF THE MIN OF PUBLIC SECURITY
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the national standard GB / T29768 uses the electronic tag identification number (TID) as the key dispersion parameter in the security authentication process, the TID needs to be returned in plain text, therefore, the national standard GB / T29768 still cannot protect the TID information from reading
In the field of vehicle-related applications, TID is the unique identification information of the vehicle identified by the electronic tag, and is the core information of vehicle-related applications. If the TID cannot be protected, there will be illegal reading and writing devices. Trajectory tracking of vehicles has serious safety hazards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID)
  • Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID)
  • Safety authentication method for hiding ultrahigh-frequency electronic tag identifier (TID)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with specific drawings and embodiments.

[0039] Such as figure 1 Shown: a schematic diagram of the structure of the passive UHF radio frequency identification system authentication system of the present invention, the system includes electronic tags and read-write equipment.

[0040] The electronic tag includes three storage partitions: an identification information area, a user data area, and a security information area. The identification information area stores electronic tag identification number TID (unique serial number) and electronic tag batch number TBN information. The electronic label identification number TID is initialized and written by the label chip manufacturer, and the electronic label batch number TBN is initialized and written by the key management center. The electronic label identification number TID and the electronic label batch number TBN cannot be changed after being written...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety authentication method for hiding an ultrahigh-frequency electronic tag identifier (TID). According to the safety authentication method, the TID is encrypted by using a random number, and is returned in the form of ciphertext, so that an illegal reading-writing device can be effectively prevented from acquiring TID information and performing illegal tracking and identification on an object marked by an electronic tag. Meanwhile, through the authentication method, attacks such as wiretapping, counterfeiting and replaying can be effectively resisted; and the method has the advantages of preventing electronic tag information from being stolen, preventing tag counterfeiting and the like. According to the safety authentication method, a domestic symmetric encryption algorithm is adopted, and double-key and secondary authentication mechanisms are adopted, so that electronic tag validation of batch cards and keys and bilateral safety verification of a single tag and a single key are realized.

Description

technical field [0001] The invention relates to an authentication method, in particular to a security authentication method for hiding the identification number of an ultra-high frequency electronic tag, and belongs to the technical field of ultra-high frequency radio frequency identification. Background technique [0002] Radio Frequency Identification (RFID) is a non-contact automatic identification technology based on wireless communication and one of the six basic technologies in the field of the Internet of Things. Radio frequency identification technology can realize automatic identification or reading and writing of object information without physical contact, and is widely used in automatic identification and digital management of people, animals, objects and other identities. [0003] Passive ultra-high frequency radio frequency identification (UHF RFID) refers to a radio frequency identification system with a working frequency of 840-845MHz and 920-925Mhz. The sim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00
CPCG06K7/10257H04W12/069H04W12/037G06K17/00H04L9/0625
Inventor 孙正良黄金蔡岗刘东波胡家彬
Owner TRAFFIC MANAGEMENT RES INST OF THE MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products