RFID multi-tag joint authentication system and method based on Internet-of-Things application

An authentication method and technology of the Internet of Things, which is applied to the joint authentication of tags in the radio frequency identification technology. In the field of radio frequency identification of the Internet of Things, it can solve the problem that it is impossible to determine which group of items the counterfeit tags or missing tags are from, and it is impossible to determine the integrity of the tags. , product inspection difficulty, etc.

Active Publication Date: 2021-09-07
深圳市科易博软件有限公司
View PDF13 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most radio frequency authentication technologies use the reader and the tag as a one-to-one mapping relationship to identify each other's identity information, but in practical applications, this method is still used for multiple tag carriers with a binding relationship. This authentication method can only determine the authenticity of each label one by one, but cannot determine which group of items the fake or missing label is from, that is, it cannot determine the integrity of all labels in each group
For example: in a product with an outer package, some counterfeit products with false labels are mixed into it. Since the products in the package are independent of each other and have no relationship, it will inevitably bring difficulties to product inspection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID multi-tag joint authentication system and method based on Internet-of-Things application
  • RFID multi-tag joint authentication system and method based on Internet-of-Things application
  • RFID multi-tag joint authentication system and method based on Internet-of-Things application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0064] With the wide application of radio frequency identification (RFID) systems, it is found that multiple tags need to be authenticated simultaneously in some specific scenarios. For example: in the commodity supply chain, many goods need to be transmitted and sold in groups or in wholesale; in the distribution of medicines, it is necessary to put the doctor's prescription and specific medicines together, which must be required to leave the medicine warehouse at the same time; Commodities that consist of kits are packaged together and sold in bundles, each of which is unique and indispensable during use.

[0065] In the case where multiple tags bound together need to be authenticated, it is not enough to ensure the security of a sin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an RFID multi-label joint authentication system and method based on Internet-of-Things application. The method comprises the following steps: constructing a key sequence distribution function and a main control key, and setting a shared key of a reader and a label; constructing a first key sequence based on the sub-key, the shared key and a public key of the reader, and sending the first key sequence to the tag; enabling the reader to send a random number and an authentication request message, enabling the tag to construct a response message based on the random number sent by the reader, the random number of the tag and the sub-key, and encrypting and then returning the response message through the public key to the reader; enabling the reader to decrypt the ciphertext by using the private key and obtain the sub-key of the tag; judging whether the reader receives response messages sent by all the tags within a set time, if so, substituting the sub-keys of the tags into a key sequence distribution function, reconstructing to obtain a key value, and comparing the key value with a main control key, if the sub-keys of the tags are the same, indicating that all the tags participating in authentication pass the authentication, and otherwise, judging that the authentication fails; and therefore, achieving a multi-label joint authentication function.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification of the Internet of things, in particular to the field of tag joint authentication in the radio frequency identification technology. Background technique [0002] In the initial stage of the development of the Internet of Things technology, the most important thing for the application of the Internet of Things is to realize the corresponding functions and improve the sense of use. Due to the lack of a lot of practical experience, its security maintenance system still uses the old and customary safety protection system. As the Internet of Things technology is used more and more widely, the old protection mechanism should also improve with the development of Internet technology. In recent years, Radio Frequency Identification (RFID) technology has developed rapidly, and it is committed to identifying target objects in a cost-effective and non-contact manner, and has gradually ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/041H04W12/06H04W12/069
CPCH04W12/041H04W12/069H04W12/03H04W12/068
Inventor 吴小平周訾顺王云森王训辉
Owner 深圳市科易博软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products