Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-way authentication method based on simple logic encryption and time stamp

A two-way authentication and timestamp technology, applied in the field of communication, can solve the problems of low protocol security performance, not fully solving the problems of anti-counterfeiting, anti-replay, and security attack prevention, so as to resist tracking attacks and improve resistance to replay attacks. ability, the effect of guaranteeing legitimacy

Active Publication Date: 2018-03-06
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although such protocols are simple in operation and high in execution efficiency, the security performance of these protocols is relatively low, and they have not completely solved the deficiencies in resisting tracking, anti-counterfeiting, anti-replay, and preventing security attacks, and these simple operations are often accompanied by Potential Security Vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way authentication method based on simple logic encryption and time stamp
  • Two-way authentication method based on simple logic encryption and time stamp

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] refer to figure 1 , the radio frequency identification RFID system that the present invention uses mainly is made up of label, reader and server. in:

[0030] Tag: It is mainly composed of coupling elements and chips. Each tag has a unique electronic code and is attached to the surface of the object to identify the target object. The tag is the real data carrier in the RFID system, which communicates with the reader through radio frequency signals communication.

[0031] Reader: It is a device that reads or writes tag information, and communicates with the server through a wired communication network to complete various operations on the data in the tag.

[0032] Back-end server: It is mainly used to read and write tags, and its database stores the relevant record information of all tags in the radio frequency identification system.

[0033] The invention is an authentication method for a tag and a server, and only when both parties pass the security authentication c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dual authentication method based on simple logic security and timestamp, and mainly solves the problem that an existing RFID (Radio Frequency Identification) system is bad in safety performance. The method comprises the following steps: 1, generating a random timestamp TR and transmitting a session initiation request to a label by a reader of an RFID network; 2, comparing the TR with a timestamp Tt stored by the label by the label to generate and transmit displacement authentication information value to a reader; 3, transmitting the received information value to a server by the reader; 4, verifying a label identity by the server, and terminating the session according to a verification result or transmitting the returned authentication information value to the reader through authentication information value; 5, transmitting the information value received by the reader to the label; 6, verifying the identity of a rear-end server to confirm whether the label is authenticated. The method provided by the invention has the advantages of high safety and high execution efficiency, and can be applied to an RFID application field with high safety requirement and low cost.

Description

technical field [0001] The invention belongs to the technical field of communication, in particular to a radio frequency identification two-way authentication method, which can be used for the transmission of digital information. Background technique [0002] Radio Frequency Identification (RFID), as a fast, real-time, accurate collection and processing of high-tech information, has been listed as one of the ten most important technologies in the 21st century. Since RFID has the advantages of non-contact, batch and remote reading, long service life, and convenient and quick operation, it has been widely used in many fields such as production, retail, logistics, and transportation. In addition, in the foreseeable future, RFID will become more portable and efficient, and its cost will be further reduced. At that time, its application fields will become more extensive. [0003] However, since the tags and readers communicate through radio frequency signals, this open wireless ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3273H04L9/3297H04L63/0869
Inventor 樊凯龚圆圆常晋云李晖
Owner XIDIAN UNIV