Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for mobile RFID authentication

A technology for verifying modules and communication messages, which is applied in the field of mobile RFID authentication, and can solve problems such as user privacy leakage, counterfeiting, replay, and potential safety hazards

Active Publication Date: 2017-11-28
GUANGDONG UNIV OF TECH
View PDF13 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, the reader and the back-end database in the mobile RFID system communicate in a wireless manner, and there is no relevant authentication method, but the wireless connection makes the communication under this link a potential safety hazard and is vulnerable to counterfeiting. , replay and other attacks, resulting in the leakage of user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for mobile RFID authentication
  • Method and system for mobile RFID authentication
  • Method and system for mobile RFID authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0051] see below figure 1 , figure 1 It is a flow chart of a method for mobile RFID authentication provided by the embodiment of the present application;

[0052] Specific steps can include:

[0053]Step S101: The tag judges the authenticity of the reader-writer according to the first communication message sent by the reader-writer, and if the read...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for mobile RFID authentication. The method includes the following steps: a tag and a reader-writer authenticate each other according to signals sent by each other, and send authentication messages to a background database after authentication; the background database determines whether the reader-writer and the tag are both true; if the reader-writer and the tag are both true, the background database updates a shared key to get a new shared key, and sends the new shared key to the reader-writer; if the reader-writer determines that the background database is true, the reader-writer updates the new shared key, and sends the new shared key to the tag; and if the tag determines that the background database is true, the tag updates the new shared key. A secure mobile RFID system two-way authentication scheme is designed in the method, which improves the security of the system and protects the privacy of users. The invention further discloses a system for mobile RFID authentication which has the same advantage.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a mobile RFID authentication method and system. Background technique [0002] RFID (Radio Frequency Identification, also known as radio frequency identification) technology is a communication technology that can identify specific targets through radio signals and read and write related data without establishing mechanical or optical contact between the identification system and specific targets. The RFID system generally consists of three parts: background database, tags and readers. [0003] In the early days of RFID technology, there was a wired connection between the reader and the back-end database, so it was considered a secure communication. However, with the rapid development of science and technology, the close integration of the Internet of Things and wireless communications, and the rapid development of mobile payment and other services, mobile RFID systems have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K17/00H04L9/08
CPCG06K17/0022H04L9/085H04L9/0891
Inventor 朱润盈谢国波
Owner GUANGDONG UNIV OF TECH