Methods and system for secure communication between an rfid tag and a reader

A technology for reading equipment and secure communication, applied in the field of RFID tags and corresponding reading equipment, can solve problems such as slow verification process, and achieve the effect of saving processing time

Active Publication Date: 2015-04-01
捷德移动安全有限责任公司
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] However, the advantage of avoiding long division in the WIPR method is obtained by the fact that the ciphertext C' is usually Very long, which makes the authentication process between the RFID tag and the reading device slow, because a greater amount of data has to be transferred from the RFID tag to the reading device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and system for secure communication between an rfid tag and a reader
  • Methods and system for secure communication between an rfid tag and a reader
  • Methods and system for secure communication between an rfid tag and a reader

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] figure 1 A schematic diagram of a system 10 for secure communication between an RFID tag and a reading device according to a preferred embodiment of the present invention is shown. The system 10 may be, for example, an electronic ticketing system, where the RFID tag is an electronic ticket carried by a person.

[0040] The system 10 includes, for example, two RFID tags, namely, an RFID tag 20a and an RFID tag 20b, which can communicate with a reading device 30a and a reading device 30b through an air interface, and the respective RFID tags 20a, 20b are located in their communication ranges or reading devices. Take the range. Preferably, the RFID tags 20a, 20b are RFID tags in accordance with the standard ISO / IEC 18000-63 or EPC Class-1 Generation-2, which are also referred to as EPC tags herein.

[0041] The reading devices 30a, 30b are connected to the back-end system or back-end system 50 via a suitable communication network 40, in which the data associated with the RFID...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to methods and a system for secure communication between an RFID tag and a reader via the air interface and to corresponding RFID tags and corresponding readers. The invention is based on the fundamental idea that, for the purpose of secure communication between an RFID tag and a reader, a modification of Rabin's method is used, in which, within the scope of encrypting plain text M, which includes an identification element of the RFID tag or of an object provided with the latter, the Montgomery residual ('Montgomery reduction') of the square of the plain text M modulo n with respect to a Montgomery base R, that is to say C* = Mu2 R-1mod n, is calculated from the RFID tag instead of the square of the plain text M modulo n, that is to say M2 mod n, and the resultant ciphertext C* is used to authenticate the RFID tag. In this case the modulus n = p.q is the public key of the reader, the prime numbers p, q are the private key of the reader and the Montgomery base R is an integer greater than the modulus n.

Description

Technical field [0001] The invention relates to a method and system for secure communication between an RFID tag and a reading device through an air interface, and a corresponding RFID tag and a corresponding reading device. Background technique [0002] RFID technology ("radio frequency identification") in particular makes it possible to automatically identify people and objects and is widely used in many applications, such as supply chain management, access control systems, systems for anti-theft of goods, electronic Ticket waiting. RFID usually consists of a portable data carrier (also called a transceiver) in the form of an RFID tag, and a reading device for contactless reading of the identification code of the RFID tag. The portable data carrier is carried by a person or in the object. The identification code (also known as unique ID (UID), tag ID (TID) or "Unique Identifier of Item (UII)" is installed on the portable data carrier and stored in the portable data carrier to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/302H04L9/3271H04L2209/08H04L2209/805H04W12/069G06K7/10257H04L9/0618H04L9/0869H04L9/3247H04L2209/24H04L2209/72H04L2209/80
Inventor W.欣茨K.芬肯泽勒M·赛森
Owner 捷德移动安全有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products