Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety protection method for limited operations of electronic tags

A technology for electronic tags and security protection, applied in the field of radio frequency identification, can solve the problems that electronic tags cannot bear resources and power consumption, and occupy large resources

Active Publication Date: 2021-04-13
华大恒芯科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to enable electronic tags to resist side channel attacks, technologies such as random clock technology, dual-track technology, and masking technology have been proposed one after another. However, these technologies need to occupy a large amount of resources, and electronic tags cannot bear the corresponding resources and power consumption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method for limited operations of electronic tags
  • Safety protection method for limited operations of electronic tags
  • Safety protection method for limited operations of electronic tags

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Several technical features and advantageous details of the disclosure are explained more fully with reference to the non-limiting embodiments illustrated in the drawings and detailed in the following description. Also, the following description omits descriptions of well-known raw materials, processing techniques, components, and equipment so as not to unnecessarily obscure the technical gist of the present disclosure. However, those skilled in the art will understand that, in describing the embodiments of the present disclosure hereinafter, the description and specific examples are given by way of illustration only and not limitation.

[0020] Wherever possible, the same numbers will be used throughout the drawings to refer to the same or like parts. In addition, although the terms used in the present disclosure are selected from well-known and commonly used terms, some terms mentioned in the specification of the present disclosure may be selected by the discloser at h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a security protection method for a limited number of operations of an electronic tag, including: setting a first signature and a second signature, the first signature and the second signature are used to protect and / or record the electronic tag the number of executions of the specified operation; load the first signature into the signature algorithm to obtain the operation result of the first signature; and verify the operation result and the second signature, if the two are inconsistent, then The electronic tag performs a self-destruct function. The above-mentioned method proposed by the present invention can protect the key information against side channel attacks—the execution times of specified operations.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification, in particular to a safety protection method for limited operations of electronic tags. Background technique [0002] With the wide application of electronic tags, the security requirements of electronic tags have become increasingly prominent. Electronic tags based on two-way authentication of algorithms have come out. However, without other auxiliary means of protection, electronic tags are vulnerable to increasingly complex and advanced attack techniques. Due to the limitation of power consumption, electronic tags cannot carry complex detection circuits to detect external attacks in time. Therefore, the security level of electronic tags is at the lowest level of chip security level, which cannot meet the current security requirements. [0003] Side channel attack is a new attack technology for electronic tags. It first obtains the physical signals generated by electroni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K19/073G06F21/44
CPCG06F21/44G06K19/07309
Inventor 沈红伟
Owner 华大恒芯科技有限公司