Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety identification method in radio frequency distinguishing system

A radio frequency identification system and security authentication technology, which is applied in the authentication field between passive electronic tags and card readers, can solve the problem of high implementation cost of tag security authentication circuits, and achieve the effects of low power consumption, tracking prevention and low cost.

Inactive Publication Date: 2007-03-21
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology prevents unauthorized access by providing an improved way to verify who they were before accessing their sensitive data. It uses special hardware devices called radios with unique codes attached thereto instead of traditional passwords. These codes only change when someone tries them up at certain times during the transaction but don't affect anyone else except themselves. By doing these things, it ensures accurate detection even where there may be other individuals involved.

Problems solved by technology

Technological Problem: Current Radiofrequency Interval Tag Based Authentication System has limitations such as weaknesses or potential threats from malicious agents. These issues limit their effectiveness because they allow hackers access to sensitive areas without being detected. Additionally, current methods require significant computational resources during calculations when generating new keys for securely attaching tokens onto devices like smart cards.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety identification method in radio frequency distinguishing system
  • Safety identification method in radio frequency distinguishing system
  • Safety identification method in radio frequency distinguishing system

Examples

Experimental program
Comparison scheme
Effect test

example

[0033] The specific implementation of this authentication method is described with reference to FIG. 3 : the card reader in the handheld device has storage function and data calculation function, and the card reader 101 can be connected with the terminal PC105 in the fixed device. In this example, the card reader is set as a fixed device, and the authentication process is as follows:

[0034] (1) First, the card reader sends an inquiry command with a pseudo-random number R.

[0035] (2) After the electronic tag receives the query command, it reads the key k1 from the EEPROM inside the tag chip, performs the operation S1=hash(R, k1), and returns M=f(s1∥c,p). Where f=(x, p) means to mask x with a random number p, and the symbol "∥" means a bit string.

[0036] (3) After the card reader correctly recognizes the information M of the electronic tag response through the anti-collision mechanism, it transmits M and the random number R to the terminal PC together.

[0037] (4) The t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

One safety authentication method uses for ultra wideband identify system. The identification process bases on Hash operation and adds stochastic number mask and secret key renew method. The reader of card and electric label both has same secret key pair K1, K2. K1 and stochastic number R carry out the Hash operation about electric label, while K2 and the only identifier C carry out the Hash operation to authenticate the reader. It offers the safety attestation method to effectively realize the safeguard of several safety and privacy problem and satisfy the low cost and consume for the electric label CMOS chip. This can prevent the leak of place privacy, the stolen of label information, fabricating label and attacking by intermediary. And it is significance to realize low cost for electric label.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products