Unlock instant, AI-driven research and patent intelligence for your innovation.

Electronic tag ownership transfer method

A transfer method and electronic label technology, applied in the field of information security, can solve the problems of desynchronization and mutual independence

Active Publication Date: 2021-04-30
XIDIAN UNIV
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The technical problems in this technical solution are: the random number in the new owner update phase of the second stage is sent in plain text, and the attacker tampering with the random number and sending it to the tag will cause the tag to be updated with a key different from the new owner, thus Causes de-synchronization problems; the first phase and the second phase are independent of each other. If the second phase fails, since the original owner and the tag still have the original key at the same time, it will appear that both the new owner and the original owner can The case of the authentication label, the window problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic tag ownership transfer method
  • Electronic tag ownership transfer method
  • Electronic tag ownership transfer method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to further explain the technical means and effects adopted by the present invention to achieve the intended purpose of the invention, the specific implementation methods, The structure, characteristics and effects thereof are described in detail as follows. In the following description, different "one embodiment" or "another embodiment" do not necessarily refer to the same embodiment. Furthermore, the particular features, structures, or characteristics of one or more embodiments may be combined in any suitable manner.

[0047] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention.

[0048] A specific scheme of an electronic tag ownership transfer method and system provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0049] see figure 1 , figure 2 and image 3 , figure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, in particular to an electronic tag ownership transfer method. The method comprises the steps: after a label and identity information of an original owner pass verification, enabling the original owner to feed back first authentication information carrying a first shared key, a first random number and the identity information; after the label verifies the first authentication information, generating intermediate information and a transfer key according to the first random number, the second random number and the first shared key, and obtaining the authentication information according to the first random number, the second random number and the transfer key; sending the authentication information and the intermediate information to an original owner, the original owner obtains suspected authentication information, and after the suspected authentication information passes verification, the first random number, transferring the second random number and the transfer key to a new owner; and replacing the first shared key with a second shared key between the tag and the new owner. According to the method, the shared key and the transfer key are separated, and the window problem and the desynchronization problem in the prior art are solved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for transferring the ownership of an electronic label. Background technique [0002] At present, electronic label technology has been widely used in various fields such as logistics, transportation, anti-counterfeiting, and book management. Compared with traditional barcodes, electronic tags can realize longer-distance non-line-of-sight contact identification. The electronic tag system generally includes a background server, a reader, and an electronic tag. The former two can use complex encryption algorithms due to unrestricted calculations, so the data transmission between them is safe by default, but the connection between the reader and the tag is based on a wireless open channel. Vulnerable to various attacks. In general, the communication between the tag and the reader must be authenticated, and we need to design a secure protocol for it to resist at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0891H04L9/0869H04L9/3226
Inventor 高明董振杰路玉斌葛建华
Owner XIDIAN UNIV