Method and device for generating key of rfid system based on tag id
A key generation and system key technology, applied in the field of radio frequency identification, to achieve the effect of avoiding hidden safety problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] In the traditional RFID system, the shared key between the tag and the reader is pre-set and fixed during each reading and writing process, which is vulnerable to attacks and leaks. This embodiment discloses a tag ID-based RFID system key generation method. In the method, a reader / writer generates a shared key for a tag, that is, it is used to generate a single tag key.
[0059] Before describing the generation method in detail, the meaning of each symbol is given:
[0060] R: reader;
[0061] T: label;
[0062] r: random number generated by the reader (length is L bits);
[0063] k: the shared key between the reader and the tag (the length is L bits);
[0064] ⊕: XOR operation;
[0065] ||: AND operation;
[0066] [X] L : Take the first L bits of the operation result X;
[0067] ID_L: the value of the first half of the identifier (the value of the length of the first L bits);
[0068] ID_R: the value of the second half of the identifier (the value of the last L...
Embodiment 2
[0081] This embodiment has the same structure as Embodiment 1 except for the following features: this embodiment discloses a tag ID-based RFID system key generation method, in which the reader / writer generates different shared keys for a batch of tags , that is, for batch key generation.
[0082] The meaning of each parameter in the present embodiment is referring to embodiment 1, and its steps are as follows:
[0083] (1) The reader first broadcasts a key generation request command Request to the whole group of tags.
[0084] (2) After receiving the Request command, the tag first calculates M=ID_R⊕ID_L, and transmits the calculation result M to the reader.
[0085] (3) After the reader receives the M sent by the tag, it first calculates IDi_R⊕IDi_L through its stored IDi_R and IDi_L, and judges whether the calculation result is equal to the received M:
[0086] If they are equal, then the reader will immediately generate a random number r with a length of L bits, calculate ...
Embodiment 3
[0090] This embodiment has the same structure as Embodiment 1 except for the following features: this embodiment discloses a tag ID-based RFID system key generation method, in which the reader / writer generates a common group key for a group of tags , which is used for group key generation.
[0091] The meaning of each parameter in the present embodiment is referring to embodiment 1, and its steps are as follows:
[0092] (1) The reader first broadcasts a key generation request command Request to the whole group of tags, which is used to inform all tags to start group key generation.
[0093] (2) After the tag in the group receives the command, the tag Ti sends the IDi_R it stores to the reader.
[0094] (3) After the reader receives the reply from the tag, the reader will compare whether the received IDi_R is completely consistent with the information stored in itself. If not, it means that there is a tag that did not respond to the command. The writer will send the Request ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com