Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of rfid security middleware

A middleware and security technology, applied in the field of information security, can solve problems such as tampering with middleware information settings, stealing legitimate users, and data vulnerable to attacks, so as to achieve the effect of protecting interests

Active Publication Date: 2020-09-22
HENAN UNIV OF SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Data is vulnerable to attacks during network transmission;
[0008] (2) The attacker steals the personal information of legitimate users through the security loopholes of the middleware, or tampers with the information settings of the middleware;
[0009] (3) The attacker steals the operating authority through illegal means to manipulate the middleware for unauthorized access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of rfid security middleware
  • A kind of rfid security middleware
  • A kind of rfid security middleware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings.

[0039] An RFID security middleware model, including a data layer, an implementation layer, a service layer, and an application layer. The data layer is a module for collecting original tag data through a reader, and the implementation layer processes the collected original tag data. The service layer is Provide services to the upper layer with a standard service interface, and the application layer provides data services to the enterprise application system; the implementation layer includes the following modules:

[0040] Encryption / decryption module, which encrypts or decrypts information to improve the security of middleware;

[0041] Intrusion detection module, which can detect information with virus or malicious access;

[0042] Anti-virus module, when information carrying viruses or malicious access is detected, the modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An RFID security middleware model includes a data layer, an implementation layer, a service layer and an application layer. The implementation layer includes the following modules: an encryption / decryption module, which encrypts or decrypts information to improve the security of the middleware; intrusion The detection module can detect virus-carrying information or malicious access; the anti-virus module, when the virus-carrying information or malicious access is detected, starting this module can ensure the security of the middleware; the implementation layer also It has a digital signature module and an elliptic curve digital signature scheme is embedded in the digital signature module. The present invention divides the implementation layer of the middleware into functional modules, and uses the digital signature module to perform identity verification on the signed information to ensure the authenticity of the information source, thereby improving the security of the RFID middleware.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an RFID security middleware model. Background technique [0002] With the development of e-commerce, more and more people like to shop online. In order to buy goods from all over the world at home, a large number of people choose Haitao. But in Haitao, how to verify the authenticity of goods has become a big problem. Radio Frequency Identification (RFID, Radio Frequency Identification) is a non-contact automatic identification technology. As early as the 1940s, the improvement and application of radar gave birth to RFID technology. In 1948, the theoretical basis of RFID technology was born. At the end of the 1960s, RFID technology was mainly in the experimental stage and initial application attempts. It was not until the 1970s that the earliest RFID applications appeared. Due to the emergence of RFID applications, RFID technology has gradually entered the stage o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04B5/00
CPCH04L9/3066H04L9/3247H04L63/1416H04L63/16H04L63/1433H04B5/77
Inventor 张平赵旭辉刘牧华刘江辉阴晶栗亚敏
Owner HENAN UNIV OF SCI & TECH