Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of authentication method of RFID system

An authentication method and authentication failure technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve the problems of not providing resistance to denial-of-service attacks, blocking, and legal labels cannot be authenticated, and achieve resistance to denial-of-service attacks. effect of attack

Active Publication Date: 2020-01-31
LANGFANG BOLIAN TECH DEV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the RFID authentication methods in the prior art can improve the security performance of the RFID system to a certain extent, they do not provide effective means of resisting denial-of-service attacks.
When an attacker uses a counterfeit reader to continuously send false authentication information to the background database, the background database will always be under heavy load, which can easily cause congestion, resulting in the failure of legitimate tags to be authenticated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of authentication method of RFID system
  • A kind of authentication method of RFID system
  • A kind of authentication method of RFID system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] Such as figure 1 As shown, when the database is an effective database, the authentication methods of the RFID system include:

[0070] Step 11: After receiving the query message sent by the requesting reader, the valid database uses a hash function to perform hash encryption on the string including the timestamp and the first local time of the valid database to obtain the first ciphertext, and convert the first ciphertext to A ciphertext is sent to a valid reader-writer, wherein the requesting reader-writer is divided into a valid reader-writer and an illegal reader-writer. In this embodiment, the timestamp is the second local time read by the requesting reader-writer;

[0071] Step 12: The valid database judges whether the requesting reader has passed the preliminary authentication according to the value of the time verification code sent by the requesting reader and the first local time:

[0072] Step 13: If the value of the time verification code is different from t...

Embodiment 2

[0124] Such as Figure 6 As shown, when the reader-writer is a valid reader-writer, the authentication method also includes:

[0125] Step 27: According to the third local time of the valid reader and the verification information of the first database sent by the requesting database, the valid reader determines the reader verifier sent by the requesting database, wherein the valid first database sent by the valid database The verification information is an encrypted character string obtained by the valid database encrypting the string containing the third local time of the valid reader-writer and the identifier of the valid reader-writer using a hash function, that is, valid first database verification information;

[0126] Step 28: judging whether the reader-writer verifier is consistent with the identifier of a valid reader-writer;

[0127] If the reader-writer verifier is consistent with the identifier of the valid reader-writer, perform step 29;

[0128] If the reader-wr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method for an RFID system, which includes: after an effective database receives an inquiry message sent by a requesting reader-writer, it uses a hash function to perform hash encryption on a character string including a time stamp and a first local time. According to the value of the time verification code sent by the requesting reader, it is judged whether the requesting reader has passed the preliminary authentication; if the value of the time verification code is different from the first local time, the authentication fails and the communication ends; otherwise , to determine that the requesting reader may be a valid reader; the valid database determines the first identifier of the requesting reader according to the timestamp and the first matching verification information sent by the requesting reader, and matches the requesting reader Authentication; if the valid database matches the requesting reader, then the requesting reader corresponding to the first identifier is a valid reader; otherwise, end the communication. The authentication method of the invention can effectively resist denial of service attacks caused by counterfeit readers.

Description

technical field [0001] The invention relates to the field of radio frequency identification (Radio Frequency Identification, RFID), in particular to an authentication method for an RFID system. Background technique [0002] In recent years, with the rapid development of the Internet of Things technology and the large-scale promotion of its application, the prospect of RFID technology is becoming more and more broad. At present, the RFID system has been deployed in different application scenarios, such as automatic payment, asset tracking, supply chain and inventory management, etc., and has become the most critical and widely used technology in the sensing layer of the Internet of Things. It has an important impact on the economic benefits of enterprises and the improvement of the level of social informatization. [0003] RFID technology is a non-contact automatic identification technology. It identifies specific targets through radio signals and can read and write related ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/32H04L29/06
CPCH04L9/002H04L9/0869H04L9/3273H04L63/1458
Inventor 郑丽娟宋春蕾张琳浩王凯兵崔梦章睿张云佐岳欢欢刘富贵
Owner LANGFANG BOLIAN TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products