Dynamic ID based RFID verification method and system

A verification method and verification system technology, applied in the field of dynamic ID-based RFID verification, can solve problems such as increased manufacturing and use costs, increased manufacturing costs of RFID tags, inconvenient use, etc., to prevent illegal reading, increase manufacturing costs, The effect of preventing replay attacks

Inactive Publication Date: 2017-03-29
珠海南方集成电路设计服务中心
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The first is that the communication between the RFID electronic tag and the card reader is transmitted through radio frequency signals, and the transmitted information is all exposed to the outside, and the privacy of the data cannot be well protected.
[0004] The second is that the limited computing power and small storage space of RFID electronic tags have brought greater difficulties to the security design of RFID systems.
[0007] The physical mechanisms mainly include: Faraday cage, blocker label, active interference, button label, crop label technology, elimination of label data, frequency modulation communication technology, but these physical methods add additional physical equipment and original parts, which are extremely inconvenient to use. Increased manufacturing and usage costs
[0008] The security mechanisms based on cryptographic technology mainly include: Hash lock protocol, Hash chain protocol, HSAP protocol, etc. These methods either cannot effectively prevent illegal reading, camouflage and spoofing, etc., or require too high computing power and storage space, resulting in RFID tags The manufacturing cost has been greatly increased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic ID based RFID verification method and system
  • Dynamic ID based RFID verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. The dynamic ID-based RFID verification method and system of the present invention are suitable for RFID verification.

[0023] figure 1 Shown is an overall flow chart according to an embodiment of the present invention. The details are shown in S101~S104 as follows, including:

[0024] S101) The reader sends an authentication request

[0025] The reader sends an authentication request to the tag, and at the same time the reader generates a random number RR and sends it to the tag.

[0026] S102) The tag responds to the authentication request

[0027] After the tag receives the reader authentication request, it generates a random number TR (the second random number), and calculates RID1 through the formula f and parameters RR and TID [RID1 is cal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention comprises a dynamic ID based RFID verification method. The method is characterized by comprising the realization steps that S1) a reader sends an authentication request, and the authentication request is completed; S2) a label makes response feedback in response to the authentication request; S3) a background database is used to verify authentication preliminarily; and S4) the label is used for verify authentication secondarily. The method and system have the advantages that use of formula encryption can ensure that private content is safe and eavesdropping and position tracking are prevented; use of double-randomized-number verification can prevent playback attack effectively; neither an invalid card reader nor an invalid label can pass validity authentication, invalid reading, counterfeiting attack and disguising can be prevented effectively; and due to a formula is simple, neither too high computing capability nor too much storage space is needed, and the manufacture cost is not increased.

Description

technical field [0001] The invention relates to the field of computer information technology, in particular to a dynamic ID-based RFID verification method and system. Background technique [0002] With the development of informatization and the Internet of Things in today's society, the application of RFID is becoming more and more extensive, but the security risks of RFID are also becoming more and more prominent. The security of RFID is mainly restricted by two reasons: [0003] The first is that the communication between the RFID electronic tag and the card reader is transmitted through radio frequency signals, and the transmitted information is all exposed to the outside, and the privacy of the data cannot be well protected. [0004] The second is that the limited computing power and small storage space of RFID electronic tags have brought greater difficulties to the security design of RFID systems. [0005] The specific security issues faced by RFID systems mainly inc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00G06K7/10H04L29/06
CPCG06K7/0008G06K7/10009H04L63/08
Inventor 赵希军张留全李毅郑韵秋
Owner 珠海南方集成电路设计服务中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products