RFID authentication method and RFID authentication system

A technology of radio frequency identification and authentication method, applied in the field of radio frequency identification, can solve the problems of security threats, limited computing power of tags and readers, and achieve the effect of improving security

Active Publication Date: 2015-11-11
RUN TECH CO LTD BEIJING
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limitations of the RFID system's own hardware system and the particularity of the communication link, the air interface between the tag and the reader faces severe security threats and privacy issues, making RFID system security an important research topic
[0003] Since the communication channel between the tag and the reader in the RFID system is a wireless channel, and the computing power of the tag and the reader is limited, when the mutual authentication between the tag and the reader is performed, the interaction between them faces severe challenges. security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID authentication method and RFID authentication system
  • RFID authentication method and RFID authentication system
  • RFID authentication method and RFID authentication system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0023] This embodiment provides a technical solution of the radio frequency identification authentication method. The radio frequency identification authentication method can be implemented by a radio frequency identification system. The radio frequency identification system includes: a radio frequency identification tag, a radio frequency identification reader and a background database. The radio frequency identification reader / writer is connected to the radio frequency identification tag and the background database respectively, and there is no communication connection between the radio frequency identification tag and the background database. In the above two communication connections, the connection between the RFID tag and the RFID reader is a wireless connection using RFID technology, so the communication connection is vulnerable to attacks; and the RFID read / write The connection between the RFID reader and the background database is a wired communication connection, whi...

no. 2 example

[0072] This embodiment provides another technical solution of the radio frequency identification authentication method. In this technical solution,

[0073] See figure 2 , The radio frequency identification authentication method includes:

[0074] S201, the radio frequency identification reader generates a pseudo-random number r at the reader R .

[0075] S202, the RFID reader sends the generated pseudo-random number r on the reader to the RFID tag R .

[0076] S203, the RFID tag generates a pseudo-random number r on the tag side T .

[0077] S204: According to the pseudo-random number r at the tag end T At least one tag end identification bit in B rT Select the label side key k T And the tag side share secret value S T .

[0078] Exemplarily, mark B at the tag end rT In the case of only one bit, if the pseudo-random number r T The last digit B rT The value of is 0, the radio frequency identification tag selects k T0 Is the label side key, and select S T0 Is the shared secret value at ...

no. 3 example

[0108] This embodiment provides a technical solution of the radio frequency identification authentication system. See image 3 In this technical solution, the radio frequency identification authentication system includes: a radio frequency identification tag 31, a radio frequency identification reader 32 and a background database 33.

[0109] The RFID tag 31 is used to generate a tag end pseudo-random number after receiving the request message, and pre-share the secret value set and the tag end key from the tag end according to at least one tag end identification bit in the tag end pseudo random number The tag-end pre-shared secret value and tag-end key are respectively selected in the set, and the tag-end message authentication code is calculated according to the tag-end pre-shared secret value and the tag-end key, and will include the tag-end pseudo-random number and The response message of the tag-side message authentication code is sent to the RFID reader 32, and after receiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an RFID (Radio Frequency Identification) authentication method and an RFID authentication system. According to the method, at least one identification bit number in pseudo random numbers is used for realizing the dynamic selection of labels, a reader-writer pre-shared value and a reader-writer pre-shared key; and the randomness of a protocol conversation period is improved. By aiming at the speciality and the limitation of an RFID system label and a reader-writer air interface, the method introduces an Hash-based message authentication code and a one-way Hash function to realize the forward security of an interaction message; an authentication mechanism is used for realizing the identity authenticity verification of a label and a reader-writer; and the secure data transmission problem of an RFID system is effectively solved. The method is practical and novel; a lightweight cryptology operator is used for identity verification; the dynamic performance of conversation period interaction data is improved; and the method is applicable to an RFID application scene with limited system resources.

Description

Technical field [0001] The embodiment of the present invention relates to the field of radio frequency identification technology, and in particular to a radio frequency identification authentication method and system. Background technique [0002] RFID (Radio Frequency Identification) technology uses wireless radio frequency signals to achieve non-contact automatic identification of target objects, and is gradually popularized in areas such as identity recognition, security and anti-counterfeiting, transportation and logistics, and asset management. As an emerging wireless identification technology, RFID technology, as a typical wireless sensor technology of the Internet of Things system, can realize object perception and information sharing on a global scale, and has a broad market application prospect. However, due to the limitations of the RFID system's own hardware system and the particularity of the communication link, the air interface between the tag and the reader is faci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00
Inventor 刘虹火一莽万月亮
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products