Method for verifying RFID label group

A RFID tag and tag technology, applied in the field of RFID security communication, can solve the problems of poor scalability and low efficiency

Inactive Publication Date: 2017-06-30
JIANGNAN UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The partial evidence generated by the group proof using the first mode depends on the mutual transmission of messages between labels. Obviously, in the case of a large number of labels, the efficiency is low and the scalability is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying RFID label group
  • Method for verifying RFID label group
  • Method for verifying RFID label group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] specific implementation plan

[0021] The invention is aimed at a tag group certification method under the RFID system environment, and the system includes a verifier, a reader-writer and multiple tags. The communication process between entities uses ciphertext to transmit messages, which ensures the security of sensitive information. The invention uses time series TS and threshold ΔT to control a round of communication session period, which can not only effectively resist common attack types, but also prevent the reader from waiting and receiving tag messages without limit. In addition, the group ID sharing technology is used to realize the independence of the tag reading sequence, avoiding the forwarding of communication messages between the reader and multiple tags, thereby improving the system efficiency.

[0022] First, initialize the RFID automatic identification system, the specific steps are as follows:

[0023] Store a set of tuple information (ID G ,ID i ,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for verifying an RFID label group, wherein the method relates to the technical field of Internet-of-things safe communication. An entity of the method comprises a verifier, reader-writer and multiple labels. In each group proving and authentication process, the reader-writer firstly acquires authorization and then broadcasts a message to a label in an anonymous packaging manner; and after label receives the message, the label verifies validity of the reader-writer and transmits the sensitive message to the reader-writer in a ciphertext manner. After the reader-writer receives the message of the group label, the reader-writer generates a group identification and transmits to the verifier for verification by the verifier. In the verification process, exchange and transmission between the entities are realized through the encrypted message. The method comprises the steps of authorization, challenge, response, calculation, matching, etc. According to the method, by means of group identity identification sharing technology, not only is expandability problem settled, but also independence of a label reading sequence is realized. Playback attack, impersonation attack and the like are resisted through a time sequence manner. Furthermore the message is transmitted between the entities in the ciphertext manner, thereby improving privacy protection for the sensitive message.

Description

technical field [0001] The invention is based on the RFID tag group certification method under the Internet of Things, belongs to the field of RFID security communication technology, and relates to secure communication between a back-end server (verifier), a reader, and multiple tags in an RFID system, as well as a single reader and multiple tags. Issues with parallel authentication between tags. Background technique [0002] With the widespread application of RFID systems, in many practical application scenarios, it is necessary to prove that the objects to which the tags are attached appear at the same place at the same time. For example, in supply chain management, the manufacturer attaches the RFID tag to the goods object and entrusts the goods to the logistics company. When the logistics personnel determine whether the goods are lost during the delivery process, they will generate a group certificate of the goods through the reader to check the integrity of the goods i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K7/10
Inventor 李静周治平张威王萍
Owner JIANGNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products