Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing RFID (Radio Frequency Identification) two-way authentication by use of physical no-cloning technology

A two-way authentication and physical technology, applied in the field of radio frequency identification, can solve the security defects of the two-way authentication between tags and readers, and achieve the effect of reducing the amount of calculation, reducing the introduction and storage, and reducing the cost of tags

Active Publication Date: 2016-09-21
GUANGDONG UNIV OF TECH
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the shortcomings and deficiencies of the existing technology, the present invention provides a method for implementing RFID bidirectional authentication using physical unclonable technology, which can solve the problem of security defects in bidirectional authentication between tags and readers in RFID systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing RFID (Radio Frequency Identification) two-way authentication by use of physical no-cloning technology
  • Method for realizing RFID (Radio Frequency Identification) two-way authentication by use of physical no-cloning technology
  • Method for realizing RFID (Radio Frequency Identification) two-way authentication by use of physical no-cloning technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] It should be noted that the embodiments in the application and the features in the embodiments can be combined with each other if there is no conflict. The application will be further described in detail below with reference to the drawings and specific embodiments.

[0026] Such as figure 1 As shown, the present invention provides a method for realizing RFID mutual authentication using physical unclonable technology, and the method includes the following steps:

[0027] S1. The reader sends a command requesting authentication to the tag;

[0028] S2. After the tag receives the command, it will send the IDS stored by itself to the reader as a response, the IDS is the index of the tag, and the IDS will be updated after the entire protocol is successfully authenticated;

[0029] S3. The reader verifies the authenticity of the tag: the reader finds whether there is a corresponding IDS, if it exists, it means that the tag is authentic, and the reader generates a random number r for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing RFID (Radio Frequency Identification) two-way authentication by use of a physical no-cloning technology. The method comprises the steps that a reader / writer sends a command for requesting authentication to a label; the label sends IDS stored by the label to the reader / writer as response after receiving the command; the reader / writer verifies the authenticity of the sent IDS, calculates the values of K<n >(+)r and ID(+)F(IDS(+)r) and sends the calculation results to the label; the label verifies the authenticity of the calculation results sent by the reader / writer, obtains a random number r through calculation of K<n >(+)r (+)K<n > and further calculates F(IDS(+)r); the label verifies the accuracy of the ID through calculation of ID(+)F(IDS(+)r)(+)F(IDS(+)r); the label calculates the values of G<n+1>=P(G<n>) and G<n+2>=P(G<n+1>) if the ID is accurate and then sends the values of G<n+1>(+) G<n+2>(+)r and the G<n+2>(+)F(r) to the reader / writer; the reader / writer verifies the authenticity of the values sent by the label again; the reader / writer obtains G<n+2> through calculation of the G<n+1>(+)G<n+2>(+)rG<n+1>(+)r; further, the reader / writer verifies the accuracy of a message G<n+2>=G<n+2>(+)F(r) (+)F(r); and finishing the authentication process if the message is accurate. According to the method, the problem that safety defects exist in two-way authentication between the label and the reader / writer in an RFID system is solved, and the cost of the label end is reduced.

Description

Technical field [0001] The present invention relates to the technical field of radio frequency identification, in particular to a method for realizing RFID two-way authentication using physical unclonable technology. Background technique [0002] Radio Frequency Identification (RFID) technology has been widely used in many fields, such as logistics, national defense, and transportation. RFID system is an automatic identification system, which usually consists of three parts: tag, reader and back-end database. The reader can access the information stored in the tag, and can also forward the messages communicated between the tag and the back-end database. The back-end database can provide a variety of services, such as identity verification services, inventory management services, and so on. [0003] Many RFID authentication protocols based on pseudo-random number generators have been proposed. Such protocols can achieve security and privacy protection. At the same time, some ligh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32H04L29/06
CPCH04L9/06H04L9/0866H04L9/3278H04L63/0428H04L63/0807H04L63/0853
Inventor 凌捷刘道微谢锐龚怡
Owner GUANGDONG UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More