Methods and system for secure communication between RFID tag and reader

一种读取设备、安全通信的技术,应用在RFID标签和相应的读取设备领域,能够解决验证过程缓慢等问题,达到节省处理时间的效果

Active Publication Date: 2018-11-16
JIEDE MOBILE SECURITY CO LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] However, the advantage of avoiding long division in the WIPR method is obtained by the fact that the ciphertext C' is usually Very long, which makes the authentication process between the RFID tag and the reading device slow, because a greater amount of data has to be transferred from the RFID tag to the reading device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and system for secure communication between RFID tag and reader
  • Methods and system for secure communication between RFID tag and reader
  • Methods and system for secure communication between RFID tag and reader

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] figure 1 A schematic diagram of a system 10 for secure communication between RFID tags and reading devices according to a preferred embodiment of the present invention is shown. System 10 may be, for example, an electronic ticketing system in which the RFID tag is an electronic ticket carried by a person.

[0041] The system 10 includes two RFID tags, for example, an RFID tag 20a and an RFID tag 20b, which can communicate with a reading device 30a and a reading device 30b through an air interface respectively, and the respective RFID tags 20a, 20b are located in their communication range or reading range. Take the range. Preferably, the RFID tags 20a, 20b are RFID tags according to standard ISO / IEC 18000-63 or EPC Class-1 Generation-2, also referred to herein as EPC tags.

[0042] The reading devices 30a, 30b are connected via a suitable communication network 40 to a background or backend system 50 in which data associated with the RFID tags 20a, 20b are stored, prefe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to methods and a system for secure communication between an RFID tag and a reader via the air interface and to corresponding RFID tags and corresponding readers. The invention isbased on the fundamental idea that, for the purpose of secure communication between an RFID tag and a reader, a modification of Rabin's method is used, in which, within the scope of encrypting plaintext M, which includes an identification element of the RFID tag or of an object provided with the latter, the Montgomery residual ('Montgomery reduction') of the square of the plain text M modulo n with respect to a Montgomery base R, that is to say C* = M<2>R<-1>mod n, is calculated from the RFID tag instead of the square of the plain text M modulo n, that is to say M<2>mod n, and the resultantciphertext C* is used to authenticate the RFID tag. In this case, the modulus n (being equal to p.q) is the public key of the reader, the prime numbers p, q are the private key of the reader and the Montgomery base R is an integer greater than the modulus n.

Description

[0001] This application is a divisional case of a patent application with an application date of November 6, 2014, a Chinese patent application number of 201380024160.3, and an invention title of "Method and system for secure communication between radio frequency identification tags and reading devices" Application. technical field [0002] The invention relates to a method and a system for secure communication between an RFID tag and a reading device via an air interface, as well as a corresponding RFID tag and a corresponding reading device. Background technique [0003] RFID technology ("radio frequency identification, radio frequency identification") in particular enables the automatic identification of people and objects and is widely used in many applications, such as in supply chain management, access control systems, systems for goods theft prevention, electronic Tickets are waiting. RFID usually consists of a portable data carrier (also known as a transceiver) in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32G06K7/10
CPCH04L9/302H04L9/3271H04L2209/08H04L2209/805H04W12/069G06K7/10257H04L9/0618H04L9/0869H04L9/3247H04L2209/24H04L2209/72H04L2209/80
Inventor W.欣茨K.芬肯泽勒M.赛森
Owner JIEDE MOBILE SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products