Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of RFID two-way authentication protocol method and device

A two-way authentication and protocol technology, applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve the problems that the LPNAP protocol does not achieve two-way authentication, and the Auth protocol cannot resist man-in-the-middle attacks.

Active Publication Date: 2020-11-10
ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The invention provides an RFID two-way authentication protocol method and device, which solves the technical problem that the current Auth protocol cannot resist man-in-the-middle attacks, and the LPNAP protocol does not realize two-way authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of RFID two-way authentication protocol method and device
  • A kind of RFID two-way authentication protocol method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The embodiment of the present invention provides an RFID two-way authentication protocol method and device, which solves the technical problem that the current Auth protocol cannot resist man-in-the-middle attacks, and the LPNAP protocol does not realize two-way authentication.

[0037] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] An embodiment of an RFID two-way authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an RFID two-way authentication protocol method and apparatus. By means of two rounds of communication, five message vectors are transmitted, a common hash function f and a pointer value are used for realizing tag authentication of a reader, and a strong universal hash function g is used for concealing the third message vector b and implementing the secure transmission of thethird message vector b, the man-in-the-middle attack is defended, and the technical problems that the existing Auth protocol that cannot resist the man-in-the-middle attack and that the LPNAP protocol does not realize two-way authentication are solved.

Description

technical field [0001] The invention relates to the field of power system stability control, in particular to an RFID bidirectional authentication protocol method and device. Background technique [0002] In the Internet of Things, RFID technology carries a large amount of secret information of national materials, corporate customer relationship information and user personal information. For the sake of national security, corporate interests and user privacy, it is necessary to authenticate and protect the RFID technology that identifies objects, otherwise Will affect the reliability of the Internet of Things. Therefore, realizing authenticity in a low-cost RFID system is the only way for the development of RFID technology today. Numerous cryptographers have conducted research on the authenticity of RFID protocols and achieved great results, but most of the current protocols only pay attention to the security authentication of tags, while ignoring the security identificatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3242H04L9/3273H04L2209/805
Inventor 姜晓林国营党三磊林佳赵闻胡皓鹏
Owner ELECTRIC POWER RES INST OF GUANGDONG POWER GRID