Wireless radio frequency equipment, authentication server and authentication method

An authentication server, radio frequency technology, applied in the field of authentication server and authentication, radio frequency equipment, can solve the problems of inability to meet the requirements of user security, poor authentication security, etc., to prevent counterfeiting of radio frequency equipment, improve the effect of security

Active Publication Date: 2017-12-19
SHANGHAI FUDAN MICROELECTRONICS GROUP
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, in the process of mutual authentication between the existing PUF-based wireless radio equipment and the authentication server, attackers can sti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless radio frequency equipment, authentication server and authentication method
  • Wireless radio frequency equipment, authentication server and authentication method
  • Wireless radio frequency equipment, authentication server and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In a wireless radio frequency device equipped with a PUF unit, the response exists when the PUF unit is powered on, and disappears when the power is turned off. Therefore, using the PUF unit for authentication can prevent physical attacks such as probes and electronic scanning. In addition, since each PUF unit will inevitably produce many individual differences during its manufacturing process, the physical difference comes from uncontrollable factors in the manufacturing process, so no matter how the PUF unit is designed, the difference between the PUF unit and the PUF unit There will always be some slight differences between them. Even if the design, packaging, and manufacturing processes are completely consistent, it is impossible to replicate two identical PUF units. Therefore, the PUF unit is naturally unique and unclonable, and can resist Attacks such as replay attacks, side channel attacks, and malicious attacks.

[0046] At present, in the process of mutual auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Wireless radio frequency equipment, an authentication server and an authentication method are disclosed. The wireless radio frequency equipment comprises a first authentication unit. The first authentication unit comprises a PUF subunit, an encoder and a first processing subunit, wherein the PUF subunit is used to output real response data at power on; the encoder is used to carry out coding processing on the real response data to acquire corresponding auxiliary data and send the auxiliary data to the authentication server; and the first processing subunit is used to process the real response data, acquire first corresponding processing data and send the data to the authentication server. In the above scheme, safety of the wireless radio frequency equipment and the authentication server during an authentication process can be increased.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a wireless radio frequency device, an authentication server and an authentication method. Background technique [0002] The Internet of Things is called the third wave of the world's information industry after computers and the Internet. Radio Frequency Identification (RFID) technology, as a key technology for building the Internet of Things, has attracted widespread attention in recent years. There are also more and more RFID-based wireless radio frequency devices, such as smart cards, mobile terminals, microprocessors, computers, routers, set-top boxes, and so on. [0003] In practical applications, cloning, counterfeiting attacks, replay attacks, malicious monitoring, malicious interception, and asynchronous attacks are the main attack methods on wireless radio frequency devices. In order to deal with the above-mentioned attacks, before using the radio frequen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/08H04W12/03H04W12/041
CPCH04W12/06H04W12/08
Inventor 刘丹郭丽敏俞军李清王立辉王磊陈政
Owner SHANGHAI FUDAN MICROELECTRONICS GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products