RFID security authentication method based on physical unclonable function
A security authentication and function technology, applied in security communication devices, digital transmission systems, user identity/authority verification, etc., can solve security threats and attacks on labels and readers, to ensure system security and save system resources , the effect of improving execution efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] 1. RFID system initialization
[0041] When the RFID system is initialized, each tag T has an identity identifier PID T and the physical unclonable function PUF(·); the reader R has the identity identifier PID R ;The background database DB has all tags, the identifiers of the readers and the mathematical model of the integrated PUF( ) circuit structure inside all tags; the tag T, the reader R and the database DB have a secret shared secret value S n ; In the RFID system, the communication link from the reader to the background database is considered safe.
[0042] 2. Certification process
[0043] The safety authentication protocol steps of the RFID system are as follows:
[0044] Step 1: The reader R first generates a random number r R , and r R Sent to tag T as an inquiry request;
[0045] Step 2: After the tag T receives the request, it generates a random number r T ; Label T uses physical unclonable function to get S n+1 =PUF(S n ) and S n+2 =PUF(S n+1 ||...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com