Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bidirectional authentication method of near field communication technology

A two-way authentication and near-field communication technology, applied in the field of two-way authentication of near-field communication technology, can solve problems such as untraceability, achieve the effect of solving security and privacy issues, reducing computing and storage costs, and ensuring label anonymity

Active Publication Date: 2020-02-07
ZHENGZHOU UNIV +1
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the deficiencies in the use of the existing near-field communication technology authentication method proposed in the background technology, the present invention provides a two-way authentication method of near-field communication technology, which has two-way authentication security, guarantees label anonymity, data The advantages of integrity and confidentiality and untraceability solve the problems raised in the above background technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication method of near field communication technology
  • Bidirectional authentication method of near field communication technology
  • Bidirectional authentication method of near field communication technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0017] For ease of understanding, the agreements involved in this application are first described as follows:

[0018] 1) permutation operation function (Per), which is defined as follows:

[0019] Suppose A and B are two binary numbers of length l, where

[0020] A=a 1 a 2 …a l ,a i ∈{0,1},i=1,2,...,l (1)

[0021] B=b 1 b 2 …b l ,b j ∈{0,1},j=1,2,...,l (2)

[0022] The Hamming weight wt(B) of B is m (0≤m≤l), and

[0023]

[0024]

[0025] in, To arrange A according to B, Per(A,B) is expressed as:

[0026]

[0027] 2) MixBits function, which is defined as follows

[0028] Z=Mixbits(X,Y)

[0029] ---------------------------------

[0030] Z=X;

[0031] for(i=0; i<32; i++){

[0032] Z=(Z>>1)+Z+Z+Y

[0033]}

[0034] ------------------...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a bidirectional authentication method of a near field communication technology. The system comprises a real identity (ID) and a temporary identity (IDS) of a label held by thelabel and a back-end database together, and shared keys K1 and K2 of a current session, in addition, the label also needs to store a timestamp Tt required by authentication, and the back-end databasestores last and latest IDS and shared keys K1 and K2. The bidirectional authentication method has the advantages that the bidirectional authentication method for near field communication safety canbe provided, the safety of the bidirectional authentication method is proved through simple bit and exclusive OR operation without hash and other function encryption operation and BAN logic, bidirectional authentication can be achieved, and label anonymity, data integrity and confidentiality and non-traceability are guaranteed. Common attacks including denial of service attacks, asynchronous attacks, replay attacks, algebraic attacks and the like can be resisted. Compared with the traditional scheme, the protocol not only solves the security and privacy problems, but also reduces the calculation and storage cost.

Description

technical field [0001] The invention belongs to the technical field of Internet near-field communication, and in particular relates to a two-way authentication method of near-field communication technology. Background technique [0002] The Internet of Things is a large-scale network composed of the Internet and various information sensing devices, which has developed very rapidly in recent years. Near Field Communication (NFC) is one of the core technologies of the Internet of Things and is listed as one of the most promising technologies. NFC is a short-distance, high-frequency, non-contact automatic identification wireless communication technology. It uses 13.56MHz and the distance is less than 10cm. This is the development and breakthrough of radio frequency identification technology. At present, near-field communication technology has been widely used in electronic ticketing, Product anti-counterfeiting, smart locks and other fields. But the security problem, especial...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/80H04W12/00G06F21/44G06K7/10G06K19/073H04W12/069
CPCG06F21/445G06K7/10257G06K19/07309H04W4/80H04W12/47H04W12/69Y02D30/70
Inventor 孙钢灿赵传勇
Owner ZHENGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products