A radio frequency identification security authentication method and system

A security authentication and radio frequency identification technology, applied in the field of security authentication, can solve the problems of denial of service, spending a lot of resources, destroying the synchronization of key updates, etc., to prevent counterfeiting attacks, help scale, and reduce difficulty.

Active Publication Date: 2019-05-03
JIANGNAN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the synchronous update of the secret key in this strategy is the prerequisite for the reliability of the authentication protocol. The attacker can intercept or tamper with the messages generated by the entity interaction in the wireless link to destroy the synchronization of the secret key update and cause a security problem of denial of service.
In addition, the storage and management of the secret key of the general symmetric encrypti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A radio frequency identification security authentication method and system
  • A radio frequency identification security authentication method and system
  • A radio frequency identification security authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] Example 1

[0029] This embodiment proposes a radio frequency identification security authentication method based on the quadratic residue law hybrid public key encryption and symmetric encryption mechanism, which can be applied to an electronic ticket authentication system. In the electronic ticketing system implemented by radio frequency identification, it is necessary to design an electronic bill with a globally unique identifier through the anti-counterfeiting feature of the radio frequency identification technology itself, and the basic personnel information stored in the back-end database must be associated with the identification to ensure the real name system. Attackers can easily use the uniqueness of the identification to track the user's location information by tracking electronic bills. In addition, the attacker may infer the private information in the bill through eavesdropping, and use the information to further carry out malicious actions. Therefore, to pro...

Example Embodiment

[0049] Example 2

[0050] Reference figure 2 In this example, a security authentication system is proposed, which uses the radio frequency identification security authentication method proposed in the first embodiment. Specifically, the security authentication system includes a tag, a reader, and a server. The reader includes a reader communication module 101, a control module 102, a display module 103, and a reader storage module 104; the server includes a server communication module 201, a database 202, and a database 202. Internal storage and identification related information; and the tag includes a tag storage module 301, an execution module 302, and a radio frequency module 303. The radio frequency module 303 is connected to a server for data forwarding. Specifically, the reader includes a control module 102 that mainly performs calculation operations in the protocol and system settings; the display module 103 implements human-computer interaction to display status inform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a radio frequency identification security authentication method. The method comprises the following steps: initializing parameters of a tag, a reader and a server; Wherein authentication is started after parameter initialization is completed, and the method further comprises the steps that the reader sends an authentication request message to the tag; The tag generates a tag authentication signal after receiving the request message; And when the tag judges that the reader is a legal reader, the authentication is completed. The method has the advantages that security threats such as counterfeit attacks, replay attacks, tracking attacks and denial of service can be prevented, it can be guaranteed that strong forward privacy is not leaked under the enemy enhancement capacity, in addition, a public key encryption mechanism is adopted, the difficulty of secret key storage and management of the system is lowered, and scale expansion of the radio frequency identification system is facilitated.

Description

technical field [0001] The present invention relates to the technical field of security authentication, in particular to a radio frequency identification security authentication method based on quadratic remainder law mixed public key encryption and symmetric encryption mechanism. Background technique [0002] In recent years, as a key technology of the sensing layer of the Internet of Things, radio frequency identification has been widely used in public transportation, automatic toll stations, and social security fields due to its advantages of non-contact, readable and writable, and fast identification. In today's society, various forms of performances and public activities such as exhibitions, performances, and sports events are becoming more and more frequent. Traditional manual ticket cutting and checking are inefficient, easy to be damaged, and easy to forge. Applying radio frequency identification technology to tickets can ensure the integration of ticket information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W4/80H04W12/04H04W12/03H04W12/122
Inventor 李智聪周治平王康张敏
Owner JIANGNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products