Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for transferring ownership of an electronic label

A transfer method and electronic label technology, applied in the field of information security, can solve the problems of desynchronization and mutual independence, and achieve the effect of avoiding resource occupation

Active Publication Date: 2022-01-07
XIDIAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The technical problems in this technical solution are: the random number in the new owner update phase of the second stage is sent in plain text, and the attacker tampering with the random number and sending it to the tag will cause the tag to be updated with a key different from the new owner, thus Causes de-synchronization problems; the first phase and the second phase are independent of each other. If the second phase fails, since the original owner and the tag still have the original key at the same time, it will appear that both the new owner and the original owner can The case of the authentication label, the window problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for transferring ownership of an electronic label
  • A method for transferring ownership of an electronic label
  • A method for transferring ownership of an electronic label

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]In order to further explain the technical means and effects adopted by the present invention to achieve the intended purpose of the invention, the specific implementation methods, The structure, characteristics and effects thereof are described in detail as follows. In the following description, different "one embodiment" or "another embodiment" do not necessarily refer to the same embodiment. Furthermore, the particular features, structures, or characteristics of one or more embodiments may be combined in any suitable manner.

[0047] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention.

[0048] A specific scheme of an electronic tag ownership transfer method and system provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0049] see figure 1 , figure 2 and image 3 , figure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, in particular to a method for transferring the ownership of an electronic label. The method includes: after the verification of the identity information of the tag and the original owner is passed, the original owner feeds back the first authentication information carrying the first shared key, the first random number and the identity information; after the tag passes the verification of the first authentication information, , generate intermediate information and a transfer key according to the first random number, the second random number and the first shared key, obtain the authentication information according to the first random number, the second random number and the transfer key; send the authentication information and the intermediate information To the original owner, the original owner obtains the suspected authentication information, and after the suspected authentication information is verified, transfers the first random number, the second random number and the transfer key to the new owner; The second shared key replaces the first shared key. The method separates the shared key from the transfer key, and solves the window problem and desynchronization problem in the prior art.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for transferring the ownership of an electronic label. Background technique [0002] At present, electronic label technology has been widely used in various fields such as logistics, transportation, anti-counterfeiting, and book management. Compared with traditional barcodes, electronic tags can realize longer-distance non-line-of-sight contact identification. The electronic tag system generally includes a background server, a reader, and an electronic tag. The former two can use complex encryption algorithms due to unrestricted calculations, so the data transmission between them is safe by default, but the connection between the reader and the tag is based on a wireless open channel. Vulnerable to various attacks. In general, the communication between the tag and the reader must be authenticated, and we need to design a secure protocol for it to resist at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0891H04L9/0869H04L9/3226
Inventor 高明董振杰路玉斌葛建华
Owner XIDIAN UNIV