Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A radio frequency identification security authentication method and system

A security authentication and radio frequency identification technology, applied in the field of security authentication, can solve the problems of denial of service, spending a lot of resources, destroying the synchronization of key updates, etc., to prevent counterfeiting attacks, help scale, and reduce difficulty.

Active Publication Date: 2019-05-03
JIANGNAN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the synchronous update of the secret key in this strategy is the prerequisite for the reliability of the authentication protocol. The attacker can intercept or tamper with the messages generated by the entity interaction in the wireless link to destroy the synchronization of the secret key update and cause a security problem of denial of service.
In addition, the storage and management of the secret key of the general symmetric encryption mechanism limits the scalability of the radio frequency identification system, and some protocols consider using the elliptic hyperbola to construct the public key encryption mechanism to design the radio frequency identification authentication protocol. However, the elliptic hyperbola is a A complex encryption primitive, its storage and calculation require a lot of resources, which does not meet the low-cost requirements of electronic bills

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A radio frequency identification security authentication method and system
  • A radio frequency identification security authentication method and system
  • A radio frequency identification security authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029]This embodiment proposes a radio frequency identification security authentication method based on quadratic remainder law mixed public key encryption and symmetric encryption mechanism, which can be applied to an electronic ticket authentication system. In the electronic ticketing system implemented by radio frequency identification, it is necessary to use the anti-counterfeiting characteristics of radio frequency identification technology itself to design electronic bills with globally unique identifiers, and the basic personnel information stored in the back-end database must be associated with the identifiers to ensure real-name registration. Attackers can easily take advantage of the uniqueness of the identifier to track the user's location information by tracking electronic bills. In addition, attackers may infer the private information in the note through eavesdropping, and use this information to further carry out malicious acts. Therefore, in order to promote the...

Embodiment 2

[0050] refer to figure 2 To illustrate, this example proposes a security authentication system that uses the radio frequency identification security authentication method proposed in the first embodiment. Specifically, the security authentication system includes a tag, a reader and a server, and the reader includes a reader communication module 101, a control module 102, a display module 103 and a reader storage module 104; the server includes a server communication module 201 and a database 202, and the database 202 Internally store information related to the identification; and the tag includes a tag storage module 301, an execution module 302 and a radio frequency module 303, and the radio frequency module 303 is connected to an external server for data forwarding. Specifically, the reader includes a control module 102 that mainly performs calculation operations in the protocol and system settings, etc.; realizes human-computer interaction through the display module 103 to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a radio frequency identification security authentication method. The method comprises the following steps: initializing parameters of a tag, a reader and a server; Wherein authentication is started after parameter initialization is completed, and the method further comprises the steps that the reader sends an authentication request message to the tag; The tag generates a tag authentication signal after receiving the request message; And when the tag judges that the reader is a legal reader, the authentication is completed. The method has the advantages that security threats such as counterfeit attacks, replay attacks, tracking attacks and denial of service can be prevented, it can be guaranteed that strong forward privacy is not leaked under the enemy enhancement capacity, in addition, a public key encryption mechanism is adopted, the difficulty of secret key storage and management of the system is lowered, and scale expansion of the radio frequency identification system is facilitated.

Description

technical field [0001] The present invention relates to the technical field of security authentication, in particular to a radio frequency identification security authentication method based on quadratic remainder law mixed public key encryption and symmetric encryption mechanism. Background technique [0002] In recent years, as a key technology of the sensing layer of the Internet of Things, radio frequency identification has been widely used in public transportation, automatic toll stations, and social security fields due to its advantages of non-contact, readable and writable, and fast identification. In today's society, various forms of performances and public activities such as exhibitions, performances, and sports events are becoming more and more frequent. Traditional manual ticket cutting and checking are inefficient, easy to be damaged, and easy to forge. Applying radio frequency identification technology to tickets can ensure the integration of ticket information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W4/80H04W12/04H04W12/03H04W12/122
Inventor 李智聪周治平王康张敏
Owner JIANGNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products