Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

RFID authentication system and authentication method based on position privacy cloud

An authentication system and privacy cloud technology, applied in the RFID authentication system based on the location privacy cloud, mutual authentication between RFID tags and readers, can solve the problem of insufficient communication channel security, exposure of reader location privacy, and limited tag storage resources and other problems, to achieve the effect of solving the location privacy problem, high retrieval efficiency, and low label calculation complexity

Active Publication Date: 2015-06-03
XIDIAN UNIV
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The purpose of the present invention is to propose an RFID authentication system and authentication method based on location privacy cloud, which not only meets the requirements of RFID application big data generated by RFID technology identification and authentication for mass items in the era of the Internet of Things, but also solves the problem of reader Exposure of location privacy, lack of communication channel security, limited tag storage resources, and high computational complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID authentication system and authentication method based on position privacy cloud
  • RFID authentication system and authentication method based on position privacy cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] The present invention first proposes an RFID authentication system based on location privacy cloud.

[0039] see figure 1 , the RFID authentication system based on the location privacy cloud includes a radio frequency identification tag, a mobile reader and a cloud database server, and it is important that the present invention also includes a public access platform that can protect the location privacy of the mobile reader, that is, a location privacy cloud, and a location privacy cloud It is an IoT infrastructure maintained by a trusted third party or a trusted organization that provides privacy services, such as an IoT public access platform. It can provide readers with support for public services such as location privacy protection transmission and data information aggregation. The background server of the present invention is constituted by a cloud database server. The interactive information between the reader and the tag of the present invention is forwarded to...

Embodiment 2

[0046] The composition of the RFID authentication system based on the location privacy cloud is the same as that in Embodiment 1. There are independent public access points distributed in the location privacy cloud, and one of the public access points is called an edge access point, and the edge access point is connected to the cloud database. The server is directly connected, and the rest are ordinary access points, all of which are directly or indirectly connected to the edge access point. After the mobile reader moves to a certain place and registers with the public access point of the location privacy cloud, the information exchanged between the reader and the tag The public access point of the location privacy cloud is successively forwarded to the cloud database server, thereby protecting the location privacy of the mobile reader. When the mobile reader is directly registered to the edge access point, the information exchanged between the reader and the tag is directly fo...

Embodiment 3

[0062] The present invention also proposes an RFID authentication method based on location privacy cloud. Based on the above system structure, it is the same as Embodiment 1-2. After system initialization, refer to figure 2 , the specific process of authentication is as follows:

[0063] Step (1) The reader sends an authentication request to the tag.

[0064] (1a) The mobile reader R uses the lightweight sequence cipher algorithm Grain v1 to generate a random number r 1 .

[0065] (1b) Send an authentication request Request||r to the tag T 1 .

[0066] Step (2) Tag's response to reader.

[0067] (2a) The tag uses the lightweight sequence cipher algorithm Grain v1 to generate another random number r 2 .

[0068] (2b) The tag uses the hash function SHA-3 standard algorithm to calculate M 1 =H(Key||id T ||r 1 ) and M 2 =H(Key||id T ).

[0069] (2c) send r 1 ||r 2 ||M 1 ||M 2 to the reader in response to it.

[0070] Step (3) The reader sends a request to the cloud...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an RFID authentication system and an authentication method based on position privacy cloud, and aims to solve the problems that the position privacy of a reader is revealed, and the tag calculation complexity degree is too high. The authentication method mainly comprises the following steps: transmitting an authentication request to a tag through the reader; responding to the request of the reader through the tag; forwarding the response of the tag to a cloud database server to check and match through the reader through position privacy cloud; feeding back succeeded matching to the reader through the cloud database server; decrypting messages through the reader, completing authentication on the tag, and calculating records required to be updated; after the cloud database server is updated, transmitting verification information to the reader; transmitting privacy values to the tag through the reader in an encryption manner; verifying through the tag, completing authentication on the reader, and updating the privacy value. Due to adoption of the position privacy cloud, the position privacy of the reader is effectively protected, the privacy security problem in the radio frequency recognition and authentication process is successfully solved, the application requirements of RFID are met, and the RFID authentication system and the authentication method are wide in application prospect.

Description

technical field [0001] The invention belongs to the field of information security, relates to cloud database services and radio frequency identification (RFID) authentication, specifically a location privacy cloud-based RFID authentication system and authentication method, mainly used in RFID tags and readers in cloud computing environments mutual authentication. Background technique [0002] Radio Frequency Identification (RFID) technology is an automatic identification technology that uses radio frequency signals to identify specific items. Compared with the traditional barcode, it has the advantages of non-contact, fast recognition speed, multiple labels can be recognized at a time, tracking management and other advantages, so it is widely used in logistics applications, retail industry, animal identification, book management and other fields . [0003] RFID can indeed improve management and operational efficiency and save costs for many fields. However, once an item is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06H04L29/08
Inventor 董庆宽童嘉庆陈原霍玮光胡景秀秦涛
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products