Security protocol authentication method based on mobile RFID system

A technology of security protocols and authentication methods, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of short service life, low efficiency, and the system being vulnerable to illegal attacks.

Inactive Publication Date: 2016-03-30
JILIN UNIV
View PDF5 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the physical method has the disadvantages of short service life, low efficiency, and non-reusability. Based on the Hash function encryption mechanism, it is widely used because of the one-way and encryption of the Hash function.
However, existing security protocols cannot fully meet the security requirements of mobile RFID systems.
[0004] This invention is based on the original patent application: RFID securi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protocol authentication method based on mobile RFID system
  • Security protocol authentication method based on mobile RFID system
  • Security protocol authentication method based on mobile RFID system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention is aimed at the two-way authentication protocol based on the dynamic ID and the Hash function mechanism under the environment of the mobile RFID system, and the overall flow of the system image 3 , in the authentication protocol, the tags, mobile readers, and background servers are transmitted in ciphertext, which effectively protects the security of information, and ensures that attackers cannot be eavesdropped, tracked, Fake and replay.

[0058] Below in conjunction with embodiment, refer to Figure 4 , describe the specific implementation steps of the present invention:

[0059] protocol initial conditions

[0060] In the initial stage of the agreement, the server database stores the information of tags and mobile readers, mainly including ,in Indicates the ID value of the previous successful authentication, Indicates that generated during this authentication process Value, the initial value is the random key shared by the database an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protocol authentication method based on a mobile RFID system, and relates to the technical field of communications, for realizing security authentication by use of a method of a dynamic ID and a Hash function mechanism. In the authentication process of a protocol, a background server needs to carry out dual verification of an label identification ID and a mobile reader-writer identification RID and updates a label identification after verification succeeds, and an RFID label and a mobile reader-writer are each provided with a pseudorandom number generator and have capabilities of executing Hash operation and XOR logic operation. In each authentication process, a label, the mobile reader-writer and the background server perform transmission and exchange of encryption information, and through such processes of inquiry, response, search, calculation, verification, updating and the like, the effect of security authentication is realized. According to the invention, a new system can fend off various attacks by use of the dynamic ID and the Hash function mechanism.

Description

【Technical field】 [0001] The invention relates to the technical field of communication, and more specifically relates to the problem of security authentication among labels, mobile readers and background servers in a mobile RFID system. 【Background technique】 [0002] Radio frequency identification technology (RFID) is a comprehensive technology that combines non-contact automatic identification technology and data information acquisition technology. It uses radio frequency signals through spatial coupling (alternating magnetic field or electromagnetic field ) realizes non-contact information transmission and achieves the purpose of identification through the transmitted information, and has the advantages of non-contact, simple operation, fast reading and writing, and high reliability. Therefore, RFID technology has been widely used, and its application fields include vehicle transportation and distribution, production automation, logistics identification, mail tracking, ro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06K17/00
CPCG06K17/00H04L9/3273H04L63/0869
Inventor 于银辉张磊陈倩王达田小建
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products