Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-invasion detection method based on RFID bill

A detection method and RFID tag technology, applied in the field of RFID bills, can solve problems such as hindering market development and hidden dangers of RFID storage security, and achieve the effect of protecting security and reducing attack rate.

Active Publication Date: 2015-04-22
BEIJING HONGMA MEDIA CULTURE DEV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The security risk of RFID storage is one of the factors hindering its market development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-invasion detection method based on RFID bill

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] Such as figure 1 As shown, the embodiment of the present invention provides a technical solution of an RFID ticket-based anti-intrusion detection method as follows:

[0032] S101: Obtain abnormal behavior characteristics of the air interface when data is written into the RFID tag;

[0033] S102: Extracting preliminary abnormal intrusion rules according to the abnormal behavior characteristics, updating the preliminary abnormal intrusion rules to an intrusion rule database, and sending the preliminary abnormal intrusion rules and abnormal behavior characteristics to an intrusion analysis server;

[0034] S103: The intrusion analysis server dynamically camouflages the data passing through the air interface according to the received preliminary abnormal intrusion rules and abnormal behavior characteristics, and at the same time sends a dynamic key to the air interface;

[0035] S104: When the disguised data is successfully written into the RFID tag after passing the decry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-invasion detection method based on an RFID bill. The anti-invasion detection method comprises the following steps: obtaining the abnormal behavior characteristics of an air interface when data are written into an RFID tag; extracting a primary abnormal invasion rule according to the abnormal behavior characteristics, updating an invasion rule database by use of the primary abnormal invasion rule and sending the primary abnormal invasion rule and the abnormal behavior characteristics to an invasion analysis server; performing dynamic masquerading on data to be passed through the air interface by the invasion analysis server according to the received primary abnormal invasion rule and abnormal behavior characteristics, and meanwhile, sending a dynamic secret key to the air interface; when the masqueraded data are successfully written into the RFID tag by decrypting the private key, locking the data so that the data only can be read and cannot be rewritten. The anti-invasion detection method is capable of reducing the attack rate of the RFID data and protecting the security of a user.

Description

technical field [0001] The invention relates to the technical field of RFID bills, in particular to an anti-intrusion detection method based on RFID bills. Background technique [0002] RFID technology, radio frequency identification technology, also known as radio frequency identification, is a communication technology that can identify specific targets and read and write related data through radio signals. [0003] For large-scale concerts or other important conferences, it takes several years from the pre-sale of tickets to the end of the exhibition, and the denomination of tickets is relatively large. The cost and other aspects have put forward very high requirements. And these requirements are finally solved with the RFID ticket solution; [0004] RFID data is very vulnerable to attacks, mainly the RFID chip itself, and the chip is easily used by hackers in the process of reading or writing data. At the Black Hat 2004 conference held in Las Vegas, USA, Lukas Grunwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00H04L29/06
Inventor 李新伟姜作鹏胡海峰
Owner BEIJING HONGMA MEDIA CULTURE DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products