Unlock instant, AI-driven research and patent intelligence for your innovation.

A security authentication method for limited distance of RFID

A technology of security authentication and distance, applied in the field of security authentication, can solve the problems of not considering the authentication distance, the radiation hazard of high-power transmitters, and the poor anti-attack ability

Inactive Publication Date: 2018-08-24
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most protocols do not consider the issue of authentication distance, that is, whether the tag that needs to be authenticated by the reader is within a legal physical range
This makes them unsuitable for use in RFID authentication systems for many limited distances
Specifically, the limited-range RFID is mainly used in applications that have special requirements for the recognition distance. Issues such as radiation hazards from transmitters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Below in conjunction with describe technical scheme of the present invention in detail:

[0023] system initialization:

[0024] According to the security parameter l, the issuer selects the corresponding elliptic curve group G and the whole ring Zp with modulus p, randomly selects a y from Zp as the private key of the reader, and calculates Y=yP as the public key of the reader ;Randomly select an x ​​from Zp as the tag’s private key, and calculate X=xP as the tag’s public key; send x, Y to the tag secretly, and y, X to the reader; where, the order of G is p, the generator is P;

[0025] Initialization of the reader: According to the security parameter l, the reader determines the maximum distance ∈ between a legal tag and itself; at the same time, according to ∈ and the system parameters, the reader determines the maximum number of communication rounds n and the maximum round communication required time Δt.

[0026] The specific methods for reader authentication tag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication, and in particular relates to a safety authentication protocol for a limited distance of RFID. The main method of the present invention includes: the tag initiates an authentication request and sends a random number to the reader, and the reader responds with a random number to the tag; the tag and the reader calculate and authenticate through their respective private keys, the public key of the other party, and the received random number At the same time, n rounds of sessions with strict timing are conducted between the tag and the reader to verify the limited distance; the reader receives and verifies whether the authentication value calculated by the tag is legal, and at the same time verifies whether the distance of the tag is valid. If it passes, the authentication is passed. Otherwise authentication fails. The beneficial effect of the present invention is that, in addition to allowing the reader to authenticate the identity of the tag, it can also authenticate the distance between the tag and the reader.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a safety authentication method for a limited distance of RFID. Background technique [0002] Radio Frequency Identification (RFID) is an automatic identification technology with the characteristics of non-physical contact, low cost, and low power consumption. In the RFID system, information is transmitted between the reader and the tag through radio frequency signals, thereby identifying the information of the marked object. Because RFID technology has advantages that traditional identification technologies do not have, such as no need for human intervention, no need for physical contact, and easy operation, it is widely used in many industries based on cloud computing and Internet of Things environments. This makes RFID technology occupy an important position in people's life. [0003] However, with the large-scale popularization of RFID technology, the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/062H04L63/067H04L63/0807H04L63/083H04L69/03
Inventor 许春香张源温俊伟金春花何瑜
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA