Two-way authentication method based on simple logic encryption and time stamp
A two-way authentication and timestamp technology, applied in the field of communication, can solve the problems of low protocol security performance, not fully solving the problems of anti-counterfeiting, anti-replay, and security attack prevention, so as to resist tracking attacks and improve resistance to replay attacks. ability, the effect of guaranteeing legitimacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] refer to figure 1 , the radio frequency identification RFID system that the present invention uses mainly is made up of label, reader and server. in:
[0030] Tag: It is mainly composed of coupling elements and chips. Each tag has a unique electronic code and is attached to the surface of the object to identify the target object. The tag is the real data carrier in the RFID system, which communicates with the reader through radio frequency signals communication.
[0031] Reader: It is a device that reads or writes tag information, and communicates with the server through a wired communication network to complete various operations on the data in the tag.
[0032] Back-end server: It is mainly used to read and write tags, and its database stores the relevant record information of all tags in the radio frequency identification system.
[0033] The invention is an authentication method for a tag and a server, and only when both parties pass the security authentication c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

