Unlock instant, AI-driven research and patent intelligence for your innovation.

Label chip authentication system and method, label chip and storage medium

A label chip, authentication system technology, applied in the label chip authentication system, computer equipment and storage media fields, can solve the problems of criminals breaking through and low security.

Pending Publication Date: 2020-08-28
GUANGZHOU KETENG INFORMATION TECH
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of communication technology, each communication device usually needs to interact with information in the process of interaction, and information transmission through RFID technology is one of the important ways. In the process of information transmission using RFID technology, Usually, RFID tags are used to store relevant data, and read or write through the reader. In this process, data transmission is usually involved, so the information exchange between the RFID tag and the reader is guaranteed. Security is very necessary. At present, the measures to protect information security when reading and writing RFID tags are usually authenticated through passwords. However, the way of authentication through passwords is easy to be broken by criminals.
[0003] Therefore, the traditional RFID tag authentication method has the defect of low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Label chip authentication system and method, label chip and storage medium
  • Label chip authentication system and method, label chip and storage medium
  • Label chip authentication system and method, label chip and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0038] In one embodiment, such as figure 1 As shown, a tag chip authentication system is provided. The tag chip authentication system can be realized by setting two devices. Specifically, the system can include: a tag chip 102 and a reader-writer 104 . Among them, the tag chip 102 and the reader-writer 104 can be in different positions in the above-mentioned tag chip authentication system, the number of the tag chip 102 can be set according to the actual situation, and the functions of the tag chip 102 and the reader-writer 104 can not only be limited to The functions des...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a label chip authentication system and method, a label chip, computer equipment and a storage medium. To-be-encrypted authentication data is obtained through a tag chip; a secret key and safety configuration information which are sent by the reader-writer on the basis of an EPC protocol and generated on the basis of a national cryptographic algorithm are obtained; a presetrandom number is generated, the authentication data is encrpted according to a national cryptographic algorithm and the random number, the encrypted authentication data sent by the tag chip is obtained through a reader-writer, and the bidirectional authentication is carried out on the label chip based on an EPC protocol and the encrypted authentication data. Compared with a traditional password passing authentication mode, the authentication data is read and encrypted through the tag chip by utilizing the EPC protocol and the national cryptographic algorithm, and the encrypted authenticationdata is acquired through the reader-writer and is subjected to bidirectional authentication, so that the security authentication between the tag chip and the reader-writer can be realized, and the security of RFID tag authentication is improved.

Description

technical field [0001] The present application relates to the technical field of data security, in particular to an authentication system and method for a tag chip, a tag chip, computer equipment and a storage medium. Background technique [0002] With the development of communication technology, each communication device usually needs to interact with information in the process of interaction, and information transmission through RFID technology is one of the important ways. In the process of information transmission using RFID technology, Usually, RFID tags are used to store relevant data, and read or write through the reader. In this process, data transmission is usually involved, so the information exchange between the RFID tag and the reader is guaranteed. Security is very necessary. At present, the measures for protecting information security when reading and writing RFID tags are usually authenticated by passwords. However, authentication by passwords is easy to be br...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W12/06H04L9/08H04L29/06G06K17/00
CPCH04W12/06H04L9/0869H04L9/0863H04L63/0869G06K17/0029H04W12/03Y02D30/70
Inventor 陈强杨骏陈竞凌传干皮云霞侯怡汝刘力倪隽赵劲志周幸白振东梁祖坤陈灏
Owner GUANGZHOU KETENG INFORMATION TECH