A security access method and system based on improved epc G1G2 protocol
An improved technology for secure access, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as increasing the burden on readers, achieve the effects of narrowing the search range, resisting information leakage, and improving search efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0047] A security access method based on the improved EPC G1G2 protocol, including:
[0048]Step S100: dividing the storage space of the tag into reserved memory, TID storage area, EPC storage area and user storage area;
[0049] Step S200: The tag information includes identification number TID, EPCi code, key Ki, access password PWAi, and destruction password PWKi; store the destruction password PWKi and access password PWAi in the reserved memory, and store the identification number TID To the TID storage area, the key Ki and EPCi code are stored in the EPC storage area, and the user storage area is used to store user-specified data;
[0050] Step S300: storing the tag information in the database of the background server;
[0051] Step S400: establish a communication connection between the reader and the tag and the background server;
[0052] Step S500: When the reader accesses the tag, the background server calls the tag information in the database for third-party verifi...
Embodiment 2
[0063] On the basis of Embodiment 1, the EPC storage area also stores CRC check codes and protocol control bits.
[0064] The EPC storage area stores a CRC check code, which is used for information verification during the protocol authentication process.
Embodiment 3
[0066] On the basis of Embodiment 2, the step S400 specifically includes:
[0067] Step S501: The reader generates a 32bits random number Rr1, and then the reader sends an inquiry request Query and Rr1 to the tag;
[0068] Step S502: After receiving the query request from the reader, the tag generates a 32bits random number Rt1, calculates M1=CRC(EPCi‖Rt1‖Rr1)⊕Ki, and sends M1 to the reader;
[0069] Step S503: After receiving M1, the reader generates a 32bits random number Rr2, calculates M2=M1⊕Rr2, and then sends {ACK(M2), Rr2} to the tag Tagi;
[0070] Step S504: After the tag receives {ACK(M2), Rr2}, it calculates y=M2⊕Rr2 and judges whether y is the same as M1. If the two values are the same, calculate M3=[CRC(EPCi||Rt1|| Rr1]⊕Ki, and send {M3, CRC-16, pci, Rt1⊕Ki} to the reader, go to step S405, otherwise end the operation and do nothing;
[0071] Step S505: After the reader receives {M3, CRC-16, pci, Rt1⊕Ki} from the tag, it adds Rr1, and then sends {M3, CRC-16, pci...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com