A method for wireless generation of rfid system key

A system key and key generation technology, applied in the field of radio frequency identification, can solve problems such as security defects, security risks, and key security defects

Active Publication Date: 2018-12-18
GUANGDONG UNIV OF TECH +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing RFID system, it is generally composed of three parts: the reader, the label, and the back-end database. The reader and the back-end database are wired data transmission through the network cable, so the connection between the two Communication is generally considered to be safe and reliable, so the two can be regarded as a whole; while the transmission between the reader and the tag is to exchange data information in a wireless way, which has certain security defects, among which the reader The security of the shared key between the writer and the tag will directly affect whether the data transmitted between the two is safe and reliable, so the security of the shared key is the key object to ensure security during the communication process
[0003] In the existing RFID system, due to the low-cost requirements of the tag, the storage space, computing power, and data exchange methods of the tag side are severely restricted. The computing power of the tag side is particularly limited, and traditional large-scale calculations cannot be performed. Therefore, in the existing RFID system, the shared key between the tag and the reader is mostly set with the initial key value in advance.
Although this reduces the amount of calculation on the tag side to a certain extent, it also has certain security risks. Attackers can use some attack methods to obtain the initial key value, thereby further obtaining other private information. The key has certain security flaws

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for wireless generation of rfid system key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0043] Such as figure 1 As shown, a method for wirelessly generating an RFID system key, the RFID system includes a label, a display screen, and a reader-writer, the display screen is connected to the reader-writer, and the reader-writer includes a background database for storing tags. The corresponding tag identifier ID.

[0044] Specifically include:

[0045] The reader / writer determines the key generation type; specifically, the key generation type button is displayed on the display screen, and the key generation type includes single label key generation, batch key generation and group key generation, the user selects the type, reads and writes The device determines the type of key generation;

[0046] According to different key generation types, a shared key is generated between the reader and tag.

[0047] The single tag key generation type specifically generates a shared key for a tag, and the specific process is as follows:

[0048] S1.1 The reader sends a key gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless key generation method for an RFID system. The RFID system includes a tag and a reader, specifically: the reader determines the key generation type; the key generation type includes a single tag key generation , batch key generation and group key generation; according to different key generation types, a shared key is generated between the reader and the tag. The security analysis shows that this method can not only resist active attack and passive attack, but also can make up for the deficiencies of existing technologies, and can completely resist brute force attack.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification, in particular to a method for wirelessly generating an RFID system key. Background technique [0002] With the continuous advancement of science and technology, radio frequency identification technology is more and more widely used in daily life. In the existing RFID system, it is generally composed of three parts: the reader, the label, and the back-end database. The reader and the back-end database are wired data transmission through the network cable, so the connection between the two Communication is generally considered to be safe and reliable, so the two can be regarded as a whole; while the transmission between the reader and the tag is to exchange data information in a wireless way, which has certain security defects, among which the reader The security of the shared key between the writer and the tag will directly affect whether the data transmitted between them i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W4/00H04W12/04H04W12/06H04W12/041
CPCH04L63/06H04L63/0807H04L63/1441H04W4/80H04W12/04H04W12/06
Inventor 凌捷刘道微王进宏谢锐汪疆平
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products