Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial RFID safety communication method

A secure communication and RFID tag technology, applied in the field of industrial RFID secure communication, can solve problems such as immature autonomous controllability, poor security mechanism performance, impersonation attacks, etc., to reduce the waiting time of the production process, improve the efficiency of encryption and decryption, The effect of resisting differential attacks

Pending Publication Date: 2022-07-12
JINAN VOCATIONAL COLLEGE
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the main methods of physical security mechanism are: Kill command, Sleep command and electrostatic shielding, etc. These security mechanisms do not perform well in practical applications. Cryptography technology has certain application effects, but it is still immature and the degree of autonomous control is not high. For example, if the Hash-Lock protocol scheme is adopted, the same metaID of the response message transmitted by the tag each time will cause a tracking attack; the introduction of a random number scheme solves the tracking attack, but the ID exposure in the transmission environment is easy to cause impersonation attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial RFID safety communication method
  • Industrial RFID safety communication method
  • Industrial RFID safety communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further explained below according to the accompanying drawings:

[0063] The embodiment of the present invention provides an industrial RFID security communication method, the hardware composition is as follows figure 1 As shown, it is mainly composed of RFID tags, readers and servers, and the workflow is as follows figure 2 As shown, it mainly consists of three processes: label registration, identity authentication, and communication interaction. In the tag registration stage, the RFID tag and the server use the elliptic curve-based key exchange protocol and the SM3 cryptographic hash algorithm to generate the same RFID tag unique identification code ID respectively. A , the server realizes its own unique identification code ID through the registered label serial number i B Calculate, intercept and send the hash value of the SM3 password of the RFID tag to realize the unique identification code ID of the RFID tag to the server B Storag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the industrial RFID security communication method provided by the invention, the whole-process encryption of tag registration, identity authentication and communication interaction is realized, and the problems that the password technology is immature and the autonomous controllable degree is low in industrial application of the RFID technology are solved. In the registration stage, the RFID tag and the server generate a symmetric key by adopting an SM2 key exchange protocol and generate a tag ID based on the key, the server ID is transmitted to the tag through a variable hash value, and the IDs of the two parties can be shared without direct transmission, so that tracking attacks are avoided; in the authentication stage, real ID transmission is replaced by bidirectional authentication and a variable hash value to avoid impersonation attack and man-in-the-middle attack; aiming at the characteristics of frequent authentication and less information amount in industrial application, an efficient SM4 symmetric encryption and decryption algorithm is used, and information to be encrypted is processed in registration and authentication stages to enable the length of the information to be encrypted not to exceed 128 bits, so that SM4 can be grouped in one time to complete work, and the encryption and decryption efficiency is improved; the symmetric key is updated in each authentication, so that the cracking difficulty is improved.

Description

technical field [0001] The invention relates to the field of industrial information security, in particular to a method for industrial RFID security communication. Background technique [0002] Radio Frequency Identification (RFID) is an important technology for implementing perception. RFID adopts a non-contact communication method, which has the advantages of waterproof, anti-magnetic, high temperature resistance, long service life, large reading distance, and no manual participation. The RFID system can integrate information with the existing network system in modern industrial enterprises, and can optimize The internal material supply and circulation process can effectively improve the production efficiency and product quality of industrial enterprises. [0003] At present, the commonly used RFID system is mainly composed of three parts: RFID tag, reader and server. Its working principle is: after the RFID tag enters the reader, it receives the radio frequency signal se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/32H04L9/08H04L9/06H04L9/40G06K17/00
CPCH04L9/3066H04L9/3239H04L9/0643H04L9/0891H04L63/0435G06K17/0029
Inventor 李常峰刘洋张苏楠任梦羽万震
Owner JINAN VOCATIONAL COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products