Encryption method and device, decryption method and device and security system of RFID asset information

A technology of asset information and encryption methods, applied in the field of data security, can solve the problems of easy duplication of tags, easy extraction of tags, and easy exposure of information, etc., to achieve the effect of easy duplication of tags and improvement of security

Pending Publication Date: 2021-12-21
FIBRLINK NETWORKS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the traditional asset management system, the content of RFID tags is stored and transmitted in plain text, and the tags are not dedicated, so there are problems such as easy copying of tags, easy exposure of information, and easy extraction of tags

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device, decryption method and device and security system of RFID asset information
  • Encryption method and device, decryption method and device and security system of RFID asset information
  • Encryption method and device, decryption method and device and security system of RFID asset information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0075] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in the embodiments of the present disclosure shall have ordinary meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in the embodiments of the present disclosure do not indicate any sequence, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "connected" are not lim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption method and device, a decryption method and device and a security system of RFID asset information. The encryption method comprises the following steps: reading original RFID asset information data, wherein the original RFID asset information data comprises a public key; preprocessing the original RFID asset information data to obtain preprocessed data; generating a random number, calculating a function value of a first elliptic curve point of the random number, and verifying the public key; calculating a first key derived function value of a second elliptic curve point of the public key passing the verification and performing result verification; performing bitwise exclusive-or calculation on the horizontal and vertical coordinates of the first key derived function value passing verification and the preprocessed data to obtain a first exclusive-or value; performing hash calculation on the values of the abscissa and the ordinate of the first key derived function value passing verification and the splicing value of the preprocessed data to obtain a first Hash value; and splicing the function value of the first elliptic curve point related to the random number, the first hash value and the first XOR value to obtain ciphertext data related to the RFID asset information.

Description

technical field [0001] The disclosure belongs to the field of data security, and in particular relates to an RFID asset information encryption method and device, a decryption method and device, and a security system. Background technique [0002] As the economic foundation of individuals and enterprises, assets are the basic guarantee for the survival of individuals and enterprises. If there is a problem with asset security, it will cause direct economic losses. The identification barcodes used in traditional information asset management are easy to copy, so asset information security There will be great dangers. [0003] RFID radio frequency technology is a kind of automatic identification technology. It performs non-contact two-way data communication through radio frequency, and uses radio frequency to read and write recording media such as electronic tags or radio frequency cards, so as to achieve the purpose of identification and data exchange. At present, RFID radio fr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 詹治国王奔邓伟赵晴林少波郭栋李天杰宋雪赵静刘利强关博高威代素敏孙雷展敬宇李文昭韩飞飞张弛程鹏柯真奎石慧于美婷张楠
Owner FIBRLINK NETWORKS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products