Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ownership Transfer Method of Radio Frequency Identification Tags Based on Quadratic Residue

A radio frequency identification tag and secondary residual technology, applied in the field of communication and information security, can solve problems such as not supporting mobile readers, delaying protocol authentication time, increasing tag cost, etc., to overcome high cost, poor flexibility, and convenience The effect of management and maintenance

Active Publication Date: 2019-04-23
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the protocol uses hash function encryption on the label side, and random numbers need to be generated. These functions require the label to integrate related hardware circuits, which increases the cost of the label; under the same conditions, the time to complete the hash function The overhead is far greater than the logical operation, and the authentication time of the protocol is delayed
The disadvantage of this method is that this method does not support mobile readers and has poor flexibility; this method uses the Rabin encryption method, and the tag end is composed of 5000-10000 logic gate circuits, which is expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ownership Transfer Method of Radio Frequency Identification Tags Based on Quadratic Residue
  • Ownership Transfer Method of Radio Frequency Identification Tags Based on Quadratic Residue
  • Ownership Transfer Method of Radio Frequency Identification Tags Based on Quadratic Residue

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Attached below figure 1 , to further describe the specific steps of the present invention.

[0074] Step 1, send a request message.

[0075] The transfer reader generates a random number N 1 .

[0076] The transferring reader queries the identity information of the receiving reader from the database.

[0077] Using the modulus formula of the quadratic remainder, calculate the modulus of the identity information of the receiving reader and the random number generated by the transferring reader, and obtain the encrypted request message.

[0078] The modulo formula of the quadratic remainder is as follows:

[0079] m 1 =(A||B) 2 mod n 1

[0080] Among them, M 1 Indicates the encrypted message, A indicates the identity information of the receiving reader, || indicates the message cascade operation, B indicates the random number generated by the transfer reader, (·) 2 Represents square operation, mod represents modulo operation, n 1 Indicates the public key of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for transferring the ownership of a radio frequency identification label based on quadratic residue. The method comprises the following specific steps: (1) a transfer reader and a receiving reader authenticate each other to confirm mutual identities; (2) the transfer reader sends a public key of the receiving reader to the radio frequency identification label; (3) the transfer reader sends the information of the radio frequency identification label to the receiving reader; (4) the receiving reader negotiates a new shared key with the label; and (5) the receiving reader establishes communication with the label by using the new shared key. According to the method disclosed by the invention, the ownership of an electronic label is transferred between the transfer reader and the receiving reader, thereby effectively reducing the calculated amount and occupied resources of the electronic label, guaranteeing the communication security at the same time, and being better applicable to low-cost radio frequency identification systems.

Description

technical field [0001] The invention belongs to the technical field of communication, and further relates to a radio frequency identification RFID (Radio Frequency Identification) tag ownership transfer method based on secondary residue in the technical field of information security. The invention can realize the conversion of the shared secret key between the old mobile reader and the radio frequency tag, thereby ensuring the safe transfer of the ownership of the radio frequency tag. Background technique [0002] At present, the existing methods for transferring the ownership of radio frequency tags can be roughly divided into two categories: methods based on non-public key encryption and methods based on public keys. Among them, the ownership transfer protocol based on public key can achieve higher security, but increases the overhead of radio frequency tags; the ownership transfer protocol based on non-public key encryption reduces the overhead of radio frequency tags, bu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0819H04L9/0869H04L9/3273H04L2209/805
Inventor 董庆宽薄星樊凯吴克强李军辉陶雅欣
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products