Unlock instant, AI-driven research and patent intelligence for your innovation.

RFID group verification method based on ecc

A verification method and group technology, applied in the field of ECC-based RFID group verification, can solve problems such as insufficient security, achieve strong privacy protection, improve generation efficiency, and prevent forgery attacks.

Active Publication Date: 2018-11-13
HEZE UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to make up for the deficiencies of the existing technology and solve the problem that only the security of a single entity is not enough under the group model in the prior art, the present invention provides an ECC-based system that can guarantee the integrity and security of the group entity RFID Group Verification Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID group verification method based on ecc

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The ECC-based RFID group verification method of the present invention consists of four stages, namely system initialization stage, reader-writer authorization stage, reader-writer and tag bidirectional authentication stage, group certificate generation and group certificate verification stage.

[0033] In the system initialization stage, set the communication key of the server, reader and tag;

[0034] In the reader-writer authorization stage, the verifier authorizes the reader-writer to generate a group certificate;

[0035] The mutual authentication between the reader and the tag is completed in the phase of two-way authentication between the reader and the tag;

[0036] In the stage of group certificate generation and group certificate verification, the reader / writer generates the group certificate according to the tag information, and then the verifier verifies the legitimacy of the group certificate.

[0037] Specifically, the RFID group verification method based ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ECC-based RFID group verification method, which belongs to the technical field of group verification. The invention includes a system initialization phase, a reader authorization phase, a reader-writer and tag two-way authentication phase, a group certificate generation and a group certificate verification phase; the system initialization phase sets the communication keys of the server, the reader-writer and the tag; the reader-writer In the authorization phase, the verifier authorizes the reader to generate a group certificate; in the two-way authentication phase of the reader and tag, the mutual authentication between the reader and the tag is completed; in the group certificate generation and group certificate verification phases, the reader generates a group certificate based on the tag information. The proof is then verified by the verifier to verify the legality of the group's proof. The invention has strong privacy protection, untraceability, reader anonymity, tag anonymity, authorization authentication and other security aspects; and reduces the computational load of the tag during the interaction process, and adopts two-way authentication between the reader and the tag. , to prevent forgery attacks.

Description

technical field [0001] The invention relates to the technical field of group verification, in particular to an ECC-based RFID group verification method. Background technique [0002] Compared with barcodes, RFID technology has the advantages of non-contact, cheap, flexible deployment, easy management, and identifiable moving objects, and has gradually become one of the most popular technologies in automatic identification technology. [0003] The existing RFID single-tag identification authentication protocol has been widely used in supply chain management, automatic identification of people or objects, warehouse management, identification and other fields. In the rapid development and practical application of RFID, in some special occasions, the tags that need to be identified often have group characteristics, that is, two or more tags need to be scanned "simultaneously" within a certain range, and two or more tags must be provided. Evidence that tags were scanned by the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B5/00H04L9/32H04L9/30H04L9/08
CPCH04L9/085H04L9/3066H04L9/3273H04B5/77
Inventor 康鸿雁
Owner HEZE UNIV