A group label authentication method based on secondary residual lightweight RFID

A secondary residual and authentication method technology, applied in the field of information processing, can solve the problems of high consumption of storage resources, high computational complexity, long authentication time, etc., and achieve the effect of cost reduction, wide application range, and efficient two-way authentication

Active Publication Date: 2019-06-28
XIDIAN UNIV
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to address the shortcomings of the above-mentioned prior art, and propose a group tag authentication method based on secondary residual lightweight radio frequency identification RFID, which solves the complex calculation of electronic tags in the radio frequency identification RFID system in the prior art It also solves the problems of long authentication time, low efficiency, and poor scalability when authenticating a large number of labels.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A group label authentication method based on secondary residual lightweight RFID
  • A group label authentication method based on secondary residual lightweight RFID
  • A group label authentication method based on secondary residual lightweight RFID

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] Attached below figure 1 , to further describe the specific steps of the present invention.

[0062] Step 1, calculate the protocol initial value.

[0063] Use a pseudo-random number generator to generate a large prime number n of length 1024 bits T Group public key as tag group.

[0064] Use a pseudo-random number generator to generate N random numbers as the private key of each tag in the group, where N represents the number of group tags, and each random number corresponds to a group tag.

[0065] The padding encoding method is used to perform padding encoding on the private key of each tag in the group to obtain the private key encoding value of each tag in the group.

[0066] The steps of the filling coding method are as follows:

[0067] Step 1, at length l 1 Bit tail padding of the character string to be encoded 256-l 1 0 characters, fill the character string to be encoded into a character string with a length of 256 bits;

[0068] Step 2, divide the charac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a group label authentication method based on secondary residual lightweight RFID, and mainly solves the problems of high communication overhead, low authentication efficiency and poor expansibility in the existing RFID group label authentication. The method comprises the following steps: firstly, initializing parameters, storing a private key encryption value of a tag in abackground database in a pre-calculation manner, then realizing bidirectional authentication between a reader and an electronic tag in a broadcast group authentication manner, and finally, generatinga group proof by the reader, and carrying out legality verification on a tag group. Compared with the prior art, the method has the advantages that the calculation amount of the electronic tags and the consumption of hardware resources are reduced, the communication safety is ensured, the efficiency and the expansibility of the reader for authenticating the plurality of tags are improved, and theapplication range is wider.

Description

technical field [0001] The invention belongs to the technical field of information processing, and further relates to a group tag authentication method based on secondary residual lightweight radio frequency identification RFID (radio frequency identification) in the technical field of information processing security. The invention can be used for mutual authentication between readers and multi-labels in a radio frequency identification (RFID) system. Background technique [0002] With the widespread application of radio frequency identification (RFID) systems, it is found that multiple tags need to be certified simultaneously in some specific scenarios. For example, in the commodity supply chain, many goods need to be transported and sold in groups or wholesales; in the distribution of medicines, it is necessary to put the doctor's prescription and specific medicines together, which must be required to leave the medicine warehouse at the same time. In the case where multip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/10G06K17/00
Inventor 董庆宽刘至球樊凯陈原马晓潇丁文静姚雪
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products