Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Radio frequency identification system security authentication protocol based on ECC

A radio frequency identification system, security authentication technology, applied in the field of radio frequency identification system security authentication protocol, can solve privacy security threats, limited computing power, cost constraints and other issues

Pending Publication Date: 2022-07-29
YANSHAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while these technologies bring us convenience, the potential safety hazards of the radio frequency identification system are becoming more and more serious, especially when the radio frequency identification system involves property, privacy and other security needs, if the data security and wireless communication in the electronic tag cannot be guaranteed The data security in the channel, the radio frequency identification system will pose a threat to the privacy security in our daily life, and the private data may be leaked at any time
The mainstream radio frequency identification communication technology often uses wireless channels for communication among its electronic tags, readers, and background servers. Authentication protocol has become a mainstream research problem in the field of security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification system security authentication protocol based on ECC
  • Radio frequency identification system security authentication protocol based on ECC
  • Radio frequency identification system security authentication protocol based on ECC

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] The protocol of the present invention performs the authentication process as follows:

[0084] First initialize the radio frequency identification system, using the public elliptic curve Secp256r1 parameters:

[0085] p=11579208921035624876269744694940,

[0086] a=11579208921035624876269744694937,

[0087] b=41058363725152142129326129780047,

[0088] P=(77329208548912624877826144612976, 78546487135463583287471836582647)

[0089] ①The reader generates the private key x D =6481648976871649785487158932158, then the reader calculates and generates the public key:

[0090] X D =x D P=(64532793678598714581687648731269,4871652169628452379122791561234), then assign an identifier to the electronic label

[0091] t id =64532793678598714581687648731269;

[0092] ②The reader generates a random number r D =92147648128924531715864325416972, and calculate R D =r D P=(21354700811932764913702964767183, 93254602933752849366400636085063), and set R D and the communication req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a radio frequency identification system security authentication protocol based on ECC (Error Correction Code), which is characterized in that the protocol authentication process is as follows: step S1, before the protocol is executed, initializing a radio frequency identification system, generating corresponding parameters and storing the corresponding parameters in a reader-writer and an electronic tag; s2, the protocol starts to be executed, and the reader-writer sends an authentication request and authentication information to the electronic tag; s3, the electronic tag receives the request, starts to calculate authentication information and returns the authentication information to the reader-writer; s4, the reader-writer completes the authentication of the legality of the electronic tag through the authentication information sent by the electronic tag; s5, the reader-writer end updates the identifier of the electronic tag, calculates authentication information and sends the authentication information to the electronic tag; and S6, the electronic tag completes legality authentication of the reader-writer through the authentication information, and updates the identifier at the electronic tag end, so that the protocol ends.

Description

technical field [0001] The invention relates to the field of Internet of Things, in particular to an ECC-based radio frequency identification system security authentication protocol. Background technique [0002] The Internet of Things (IOT) was first defined by the Massachusetts Institute of Technology in 1999, that is, through information sensing equipment such as radio frequency identification systems, infrared sensors, and global positioning systems, according to the agreed protocol, items are connected to each other. Internet connection for information exchange and communication to realize intelligent identification, positioning, tracking, monitoring and management of items. The Internet of Things is generally composed of a perception layer, a network layer and an application layer, and the new perception layer used to identify and receive objects is the basis for the normal operation of the entire Internet of Things, and Radio Frequency Identification (RFID) technology...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/10G06F21/60G06F21/44
CPCG06K7/10257G06F21/602G06F21/44
Inventor 侯培国田昊玮
Owner YANSHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products