Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security access method and system based on improved EPC G1G2 protocol

An improved technology for secure access, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as increasing the burden on readers, achieve the effects of narrowing the search range, resisting information leakage, and improving search efficiency

Active Publication Date: 2018-10-12
CHENGDU UNIV
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a security access method and system based on the improved EPC G1G2 protocol, which is used to solve the problem of increasing the burden on the reader when the number of tags is large in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] A security access method based on the improved EPC G1G2 protocol, including:

[0048]Step S100: dividing the storage space of the tag into reserved memory, TID storage area, EPC storage area and user storage area;

[0049] Step S200: The tag information includes identification number TID, EPCi code, key Ki, access password PWAi, and destruction password PWKi; store the destruction password PWKi and access password PWAi in the reserved memory, and store the identification number TID To the TID storage area, the key Ki and EPCi code are stored in the EPC storage area, and the user storage area is used to store user-specified data;

[0050] Step S300: storing the tag information in the database of the background server;

[0051] Step S400: establish a communication connection between the reader and the tag and the background server;

[0052] Step S500: When the reader accesses the tag, the background server calls the tag information in the database for third-party verifi...

Embodiment 2

[0063] On the basis of Embodiment 1, the EPC storage area also stores CRC check codes and protocol control bits.

[0064] The EPC storage area stores a CRC check code, which is used for information verification during the protocol authentication process.

Embodiment 3

[0066] On the basis of Embodiment 2, the step S400 specifically includes:

[0067] Step S501: The reader generates a 32bits random number Rr1, and then the reader sends an inquiry request Query and Rr1 to the tag;

[0068] Step S502: After receiving the query request from the reader, the tag generates a 32bits random number Rt1, calculates M1=CRC(EPCi‖Rt1‖Rr1)⊕Ki, and sends M1 to the reader;

[0069] Step S503: After receiving M1, the reader generates a 32bits random number Rr2, calculates M2=M1⊕Rr2, and then sends {ACK(M2), Rr2} to the tag Tagi;

[0070] Step S504: After the tag receives {ACK(M2), Rr2}, it calculates y=M2⊕Rr2 and judges whether y is the same as M1. If the two values ​​are the same, calculate M3=[CRC(EPCi||Rt1|| Rr1]⊕Ki, and send {M3, CRC-16, pci, Rt1⊕Ki} to the reader, go to step S405, otherwise end the operation and do nothing;

[0071] Step S505: After the reader receives {M3, CRC-16, pci, Rt1⊕Ki} from the tag, it adds Rr1, and then sends {M3, CRC-16, pci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security access method based on the improved EPC G1G2 protocol, comprising: dividing the storage space of a label into a reserved memory, a TID storage area, an EPC storage area and a user storage area; storing the destruction password PWKi and the access password PWAi to the reserved memory, storing the identification number TID to the TID storage area, storing the key Ki and the EPCi code to the EPC storage area; storing the information of the label to the database of the background server; establishing a communication connection between the reader and the label andthe background server; and calling the information of the tag in the database by the background server for third-party verification during the process of accessing the tag by the reader. A system based on the improved EPC G1G2 protocol includes a background server, a tag, and a reader, wherein a database for storing information of tag is installed in the server. The improved EPC G1G2 protocol inthe invention realizes the third-party authentication of the database, the tag and the reader, and the database undertakes part of the job of authentication and verification of the tag information, thereby reducing the burden on the reader.

Description

technical field [0001] The invention relates to the technical field of security authentication, in particular to a security access method and system based on the improved EPC G1G2 protocol. Background technique [0002] EPCglobal (Global Product Electronic Code Management Center) is currently the most powerful RFID standard organization in the world. Its predecessor is UCC (Unified Code Organization) in North America and the European EAN product standard organization. After the merger, it is called EPCglobal. EPCglobal is an industry alliance with the purpose of promoting the network application of RFID electronic tags. It not only released the technical standards for EPC electronic tags and readers, but also promoted the network management and application of RFID in the field of logistics management. It is also responsible for EPCglobal Number registration management. The communication between RFID readers and RFID tags in the prior art is generally limited to identificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/10H04L29/06H04L9/32
CPCG06K7/10257H04L9/3273H04L63/0428H04L63/0869H04L63/1458
Inventor 范文杰黎忠文游磊巫恒强张海军宋春林
Owner CHENGDU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products