Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for generating key of rfid system based on tag id

A key generation and system key technology, applied in the field of radio frequency identification, to achieve the effect of avoiding hidden safety problems

Active Publication Date: 2018-09-07
GUANGDONG UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] An object of the present invention is to overcome the shortcomings and deficiencies of the prior art, and provide a RFID system key generation method based on the tag ID, which solves the problem that the shared key between the tag and the reader in the RFID system does not need to be set in advance. The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating key of rfid system based on tag id
  • Method and device for generating key of rfid system based on tag id
  • Method and device for generating key of rfid system based on tag id

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] In the traditional RFID system, the shared key between the tag and the reader is pre-set and fixed during each reading and writing process, which is vulnerable to attacks and leaks. This embodiment discloses a tag ID-based RFID system key generation method. In the method, a reader / writer generates a shared key for a tag, that is, it is used to generate a single tag key.

[0059] Before describing the generation method in detail, the meaning of each symbol is given:

[0060] R: reader;

[0061] T: label;

[0062] r: random number generated by the reader (length is L bits);

[0063] k: the shared key between the reader and the tag (the length is L bits);

[0064] ⊕: XOR operation;

[0065] ||: AND operation;

[0066] [X] L : Take the first L bits of the operation result X;

[0067] ID_L: the value of the first half of the identifier (the value of the length of the first L bits);

[0068] ID_R: the value of the second half of the identifier (the value of the last L...

Embodiment 2

[0081] This embodiment has the same structure as Embodiment 1 except for the following features: this embodiment discloses a tag ID-based RFID system key generation method, in which the reader / writer generates different shared keys for a batch of tags , that is, for batch key generation.

[0082] The meaning of each parameter in the present embodiment is referring to embodiment 1, and its steps are as follows:

[0083] (1) The reader first broadcasts a key generation request command Request to the whole group of tags.

[0084] (2) After receiving the Request command, the tag first calculates M=ID_R⊕ID_L, and transmits the calculation result M to the reader.

[0085] (3) After the reader receives the M sent by the tag, it first calculates IDi_R⊕IDi_L through its stored IDi_R and IDi_L, and judges whether the calculation result is equal to the received M:

[0086] If they are equal, then the reader will immediately generate a random number r with a length of L bits, calculate ...

Embodiment 3

[0090] This embodiment has the same structure as Embodiment 1 except for the following features: this embodiment discloses a tag ID-based RFID system key generation method, in which the reader / writer generates a common group key for a group of tags , which is used for group key generation.

[0091] The meaning of each parameter in the present embodiment is referring to embodiment 1, and its steps are as follows:

[0092] (1) The reader first broadcasts a key generation request command Request to the whole group of tags, which is used to inform all tags to start group key generation.

[0093] (2) After the tag in the group receives the command, the tag Ti sends the IDi_R it stores to the reader.

[0094] (3) After the reader receives the reply from the tag, the reader will compare whether the received IDi_R is completely consistent with the information stored in itself. If not, it means that there is a tag that did not respond to the command. The writer will send the Request ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for generating a key for an RFID system based on tag ID. The method is: the reader first determines whether to generate a key for one tag, a batch of tags, or a group of tags, and determines the type of key generation. , and then send a key generation request command to the tag. The tag feeds back the information corresponding to the tag ID according to the type. The reader and the tag form a shared key between them through certain calculations based on the tag ID information. Using this key, subsequent two-way authentication can be performed. Based on the above types, the present invention specifically discloses three types of key generation devices. The method of the invention improves the reading and writing security of the RFID system, greatly reduces the calculation amount on the tag side, and reduces the cost of the tag.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification, in particular to a tag ID-based RFID system key generation method and device. Background technique [0002] In the RFID system, tags can be divided into two types according to their own characteristics, one is passive passive tags, and the other is active active tags. The former cannot implement security authentication protocols based on conventional encryption algorithms (such as RSA, DES, etc.) due to low cost, low computing power, and limited resource storage; at the same time, because the tags are passive, the tags are only Little energy can be obtained from the interrogator signal for information transmission, resulting in such tags being able to respond to all interrogator accesses that provide energy. The latter is superior to the former in terms of computing power and resource storage, so this type of tag can use a dynamic verification key to improve system securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04B5/00
CPCH04L9/0833H04L9/0838H04L9/0869H04B5/77
Inventor 凌捷刘道微谢锐柳毅
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products