Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method for RFID chip

An identity authentication and chip technology, applied in the field of RFID chip identity authentication, can solve the problems of easy duplication of mapping information, inability to verify the unique relationship between the mapping value and the chip, etc., to achieve the effect of increasing flexibility and ensuring authenticity and accuracy

Inactive Publication Date: 2018-01-26
SHANGHAI FEIJU MICROELECTRONICS
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the problem that the mapping information in the existing RFID chip is static and easy to be copied, and the unique relationship between the mapping value and the chip cannot be verified. Method for realizing RFID chip communication by self-signed random change data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for RFID chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0016] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0017] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0018] Such as figure 1 Shown, a kind of communication method of RFID chip, described method comprises the foll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In order to solve the problem that a unique relationship between a mapping value and a chip cannot be verified due to the fact mapping information in an existing RFID chip is static and is liable to be copied, the invention discloses an identity authentication method for an RFID chip and relates to the technical field of communication. According to the method, a piece of random change data on which self-signature operation is carried out can be mapped in a memory of the RFID chip. The method comprises the following steps that S1, a terminal sends a read command to the RFID chip; S2, the RFID chip receives the read command, the piece of random change data on which the self-signature operation and encryption operation are carried out is mapped in an appointed address of the memory of the RFID chip; S3, a server checks the self-signed and encrypted random change data, and the S4 is turned to; and S4, the terminal displays a check result.

Description

technical field [0001] The invention relates to the technical field of authentication, in particular to an identity authentication method of an RFID chip. Background technique [0002] At present, the mainstream NFC tag chips on the market all have the mapping function of ASCII code. It can convert some internal information of the chip, such as the static User Identification (UID) of the chip, the internal counter value or the combination of the two into ASCII codes and map them to the specified address in the chip storage space. In this way, after reading the specified address, the corresponding mapping information will be read in the form of ASCII code. The advantage of this is that this information can be integrated into various NDEF format data stored in the chip, such as integrating this information into the URL as a parameter of the URL. The above-mentioned mapping information is a static UID value or a value of a counter incremented each time. These information are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04W4/00H04W12/02H04W12/10H04W12/06
Inventor 初建朋曹玉升
Owner SHANGHAI FEIJU MICROELECTRONICS