A radio frequency identification security authentication method and system
A security authentication and radio frequency identification technology, applied in the field of security authentication, can solve the problems of denial of service, spending a lot of resources, destroying the synchronization of key updates, etc., to prevent counterfeiting attacks, help scale, and reduce difficulty.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0028] Example 1
[0029] This embodiment proposes a radio frequency identification security authentication method based on the quadratic residue law hybrid public key encryption and symmetric encryption mechanism, which can be applied to an electronic ticket authentication system. In the electronic ticketing system implemented by radio frequency identification, it is necessary to design an electronic bill with a globally unique identifier through the anti-counterfeiting feature of the radio frequency identification technology itself, and the basic personnel information stored in the back-end database must be associated with the identification to ensure the real name system. Attackers can easily use the uniqueness of the identification to track the user's location information by tracking electronic bills. In addition, the attacker may infer the private information in the bill through eavesdropping, and use the information to further carry out malicious actions. Therefore, to pro...
Example Embodiment
[0049] Example 2
[0050] Reference figure 2 In this example, a security authentication system is proposed, which uses the radio frequency identification security authentication method proposed in the first embodiment. Specifically, the security authentication system includes a tag, a reader, and a server. The reader includes a reader communication module 101, a control module 102, a display module 103, and a reader storage module 104; the server includes a server communication module 201, a database 202, and a database 202. Internal storage and identification related information; and the tag includes a tag storage module 301, an execution module 302, and a radio frequency module 303. The radio frequency module 303 is connected to a server for data forwarding. Specifically, the reader includes a control module 102 that mainly performs calculation operations in the protocol and system settings; the display module 103 implements human-computer interaction to display status inform...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap