Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for proving privacy protection attribute of RFID protocol

A privacy protection and attribute technology, applied in the field of Internet of Things communication technology and security, to improve computing efficiency, prevent tracking problems, and achieve the effect of privacy

Inactive Publication Date: 2019-04-12
ANHUI UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of privacy protection in the process of reading and writing RFID, the embodiment of the present invention provides a method and device for proving the privacy protection attribute of the RFID protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for proving privacy protection attribute of RFID protocol
  • Method and device for proving privacy protection attribute of RFID protocol
  • Method and device for proving privacy protection attribute of RFID protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] see figure 1 , a communication method in the Internet of Things is provided in this embodiment, including:

[0038] 101. The reader sends inquiry information to all tags within the communication range;

[0039] 102. After receiving the query information, the tag generates a random number, determines the value of the bit information, generates a first verification function according to the random number, the identity mark, and the value of the bit information, and sends a request to the reader The writer sends authentication information, where the authentication information includes: the generated random number, the first verification function, and the index value of the tag;

[0040] 103. The reader / writer authenticates the authentication information sent by the tag, and generates a second verification function after successful authentication, and sends verification information to the tag, where the verification information includes the second verification function;

...

Embodiment 2

[0049] see figure 2 , the embodiment of the present invention provides a method for proving the privacy protection attribute of the RFID protocol, including:

[0050] 201. Formally process the number of messages and message lengths sent by all tags within the communication range, and formally process the messages received by the reader / writer;

[0051] 202. Time-associate the message number and message length of the formalized tag with the messages received by the formalized reader-writer;

[0052] 203. When the total messages sent to the reader by the tags within the communication range are obtained, determine the probability distribution parameters of the number of true messages and false messages in the total messages and the probability distribution parameters of the message lengths, and The relationship between the message number and message length of the true message and the message number and message length of the false message and the message number and message lengt...

Embodiment 3

[0058] An embodiment of the present invention provides a communication method in the Internet of Things. The application scenario of this embodiment includes: multiple tags enter the reading and writing range of the reader, and the reader communicates with the multiple tags. Inside the tag includes: ID, key k, index Index, and hash function h(), encrypted pseudo-random function F ki () and bit information bit. In this embodiment, the reader-writer and the background database are considered as a whole. When the protocol is initialized, the reader internally stores the tuple (Index i , ID i , k i ), the value of the preset bit information bit and the pseudo-random function F ki (). see image 3 , the method flow includes:

[0059] 301. The reader / writer detects the tags entering its read / write range.

[0060] In this embodiment, the reader / writer detects the surrounding environment to confirm whether a tag enters its read / write range. The specific detection method is si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for proving a privacy protection attribute of an RFID protocol, and belongs to the field of Internet of Things communication technology and security technology. The method includes: the reader sends inquiry information to all tags within the communication range; the tag generates a random number after receiving the inquiry information, determines the value of the bit information, and according to the random number, identity and The value of the bit information generates a first verification function, and sends authentication information to the reader, and the reader authenticates the authentication information sent by the tag, and generates a second verification function after the authentication is successful, and sends it to the reader. The tag sends verification information, and after receiving the verification information, the tag verifies the second verification function, and completes a communication with the reader after the verification is passed.

Description

technical field [0001] The invention relates to the field of Internet of Things communication technology and security technology, and in particular to a method and device for proving privacy protection attributes of an RFID protocol. Background technique [0002] With the development of the Internet of Things, privacy protection has become the main challenge faced by the current information society. As an important tool for object identification in the Internet of Things, the RFID (Radio Frequency Identification) system is also very important for its security. RFID is a two-way communication network consisting of readers, tags, and background databases. The reader is generally directly connected to the background database, and the tag contains a chip, which can communicate through the radio frequency channel. Tags are integrated into various objects to facilitate long-distance identification. [0003] In the application scenario, many tags will inevitably move into the rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06K17/00G06K19/067
Inventor 王良民缪静钧罗斌汤进郑爱华孙登第蔡继盛
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products