Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

71 results about "Rfid authentication" patented technology

RFID Authentication. Radio-frequency identification (RFID) utilizes radio waves to communicate a unique identifier between a tag embedded in an RFID card and an RFID reader to verify a user’s identity and grant access.

Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree

The invention relates to a radio frequency identification technology and discloses a method for privacy authentication of radio frequency identification based on dynamic key update of sparse tree, which comprises the following steps that: system initialization step, a read-write machine generates the key of each label stored by the sparse key tree; label identification step, the read-write machine sends an authentication request to the label, the label computes and sends the authentication information to the read-write machine, and the read-write machine identifies the label after receiving the authentication information; key updating step, after the label identification is finished, the read-write machine updates the key tree and sends the synchronous updating authentication information to the label which updates the stored keys; system maintenance step, once the label joins in or level RFID system, the read-write machine maintains the system sparse key tress. The invention is able to efficiently resist various passive and active attacks at present, and in contrast with the RFID authentication method based on the balance tree structure, greatly reduces the storage expense at the label end.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

RFID authentication system and authentication method based on position privacy cloud

The invention discloses an RFID authentication system and an authentication method based on position privacy cloud, and aims to solve the problems that the position privacy of a reader is revealed, and the tag calculation complexity degree is too high. The authentication method mainly comprises the following steps: transmitting an authentication request to a tag through the reader; responding to the request of the reader through the tag; forwarding the response of the tag to a cloud database server to check and match through the reader through position privacy cloud; feeding back succeeded matching to the reader through the cloud database server; decrypting messages through the reader, completing authentication on the tag, and calculating records required to be updated; after the cloud database server is updated, transmitting verification information to the reader; transmitting privacy values to the tag through the reader in an encryption manner; verifying through the tag, completing authentication on the reader, and updating the privacy value. Due to adoption of the position privacy cloud, the position privacy of the reader is effectively protected, the privacy security problem in the radio frequency recognition and authentication process is successfully solved, the application requirements of RFID are met, and the RFID authentication system and the authentication method are wide in application prospect.
Owner:XIDIAN UNIV

Highly anonymous RFID authentication protocol based on Hash function and dynamic shared key

The invention discloses an encryption method of information transmission in an RFID authentication process. A label can be in communication connection with a reader-writer, and the encryption method comprises the following steps: after the label receives an inquiry instruction of the reader-writer, generating a first random number, and performing xor operation on the first random number and a public key to obtain a first output; providing a label identifier, the first random number and a dynamic sequence value for a one-way Hash function as inputs so as to generate a second output; providing the second output, the public key, the first output and a reader-writer identifier for the one-way Hash function as inputs so as to generate a third output; providing the reader-writer identifier, the label identifier and the public key for the one-way Hash function so as to generate a filtering identifier; and sending a first message to the reader-writer by the label, wherein the first message comprises the second output, the third output, the filtering identifier and the dynamic sequence value. The invention further discloses a highly anonymous RFID authentication protocol based on a Hash function and a dynamic shared key.
Owner:JILIN UNIV

Bicycle garage access system

The invention discloses a bicycle garage access system. The bicycle garage access system comprises a garage, a parking space circulation mechanism and an access control system. The parking space circulation mechanism comprises an annular guide rail, a base, a parking space telescopic platform and a bicycle fixing device. The parking space telescopic platform is provided with a sliding mechanism. The side wall of the garage is provided with an access door. A starting and stopping device is arranged in the position close to the access door. A pushing and pulling mechanism is arranged on the other side, corresponding to the access door, of the guide rail. The access control system comprises a control unit, an access request device and a parking detector. According to the bicycle garage access system, by adopting the parking space circulation mechanism, storage of a bicycle is more convenient, the access efficiency is improved, and the implementation cost is low; by adopting RFID verification for an access user, access for the bicycle of the user can be managed better; by placing the bicycle garage access system in a container, mobility of the garage is achieved, the cost can be reduced, and the access using rate of the garage is improved; and by arranging a rear panel and a concave pit on the bicycle fixing device, fixing is simple, convenient, stable and firm, and the fact that the bicycle is separated from the fixing device is prevented.
Owner:成都市五度空间立体车库科技有限公司

Highly encrypted RFID authentication system for chip fingerprints

The invention discloses a highly encrypted RFID authentication system for chip fingerprints. The highly encrypted RFID authentication system comprises a server, a terminal server, a popularization and application module, communication equipment, a client and a database, wherein the server is in control connection with the terminal server; the server is in control connection with the communication equipment and used for achieving information exchange, modification and verification; the server is in control connection with the database, the client and the communication equipment in sequence; and the server and the database are used for controlling information uploading and downloading. In this way, the highly encrypted RFID authentication system for chip fingerprints utilizes the internal physical structure of the physical entity to uniquely identify a single physical entity to realize an effective authentication thought, fully utilizes the RFID of the PUF (Physical Unclonable Function), and utilizes the characteristics of robustness, unclonability and unpredictability of the PUF at the same time, so that the highly encrypted RFID authentication system for the chip fingerprint is widely applied to the field of authentication.
Owner:苏州因缇格电子科技有限公司

RFID authentication method for elliptic hyperbola-based public key encryption mechanism

The invention discloses an RFID authentication method for an elliptic hyperbola-based public key encryption mechanism. According to the method, key distribution is carried out by using an elliptic hyperbola DH theory, a generation system of fresh keys is constructed, communication data between encryption entities of the fresh keys is used for ensuring the randomness and unpredictability of a datastream, and a secure communication channel between a label and a reader is established; communication entities store a public key and private key pair generated by the elliptic hyperbola theory, and identity authentication between the entities is realized in a digital signature mode, so that the effectiveness of the authentication is ensured; and after the security authentication is realized, a session key used for encrypting the data is generated, so that sensitive data interaction between the entities is facilitated. Common security threats such as mutual authentication, anonymity, reliability, forward privacy, location privacy, man-in-the-middle attack, counterfeit attack and the like can be prevented, and a distribution function of the session key is provided, so that the security andprivacy of the channel between the label and the reader are ensured.
Owner:WUXI FANTAI TECH

Building microgrid power consumption data security transmission technology based on RFID authentication and hybrid encryption

The invention relates to a technology for transmitting and visualizing building microgrid power consumption data, and provides a building microgrid power consumption data security transmission technology based on RFID legal authentication and hybrid encryption in order to prevent an information eavesdropper from eavesdropping, tampering and forwarding the building power consumption data. Transmission system hardware applying the technology is composed of an intelligent acquisition terminal, a routing node, a protocol conversion gateway and a cloud server. The intelligent acquisition terminal acquires related power utilization data and self-organizes the data to form a ZigBee wireless transmission network. the legality of each node in the ZigBee network is ensured by integrating the RFID technology and the hybrid encryption algorithm, and the security of power utilization data transmission is improved; the encrypted data is packaged into a data frame by a user-defined communication protocol; the encrypted data is transmitted to the protocol conversion gateway through the routing node to realize protocol conversion, finally, the data message is sent through the gateway and stored inthe database of the cloud server, and the client can visualize the power consumption data and remotely control the intelligent acquisition terminal, so that the safety and convenience of building microgrid power consumption data transmission are improved.
Owner:XIANGTAN UNIV

Anti-quantum computing RFID authentication method and system based on symmetric key pool and online and offline signatures

The invention relates to an anti-quantum computing RFID authentication method and system based on a symmetric key pool and online and offline signatures. The parties comprise an authentication party and a request party which interact with each other in an RFID mode, wherein each party is configured with a key fob; algorithm parameters are stored in the key fob; an identity label and a public key of the request party, a private key corresponding to the public key, a temporary public key, a temporary private key corresponding to the temporary public key and a symmetric key unit are stored in a key fob of the request party; a symmetric key pair is stored in the symmetric key unit, and the symmetric key pair comprises a first symmetric key, a second symmetric key and a key pointer address; andthe key pointer address is used for extracting a related symmetric key unit from a symmetric key pool. By adopting the anti-quantum computing RFID authentication method, the storage cost in the key fob of the request party can be reduced, and the security in the authentication interaction process of the request party and the request party can be improved.
Owner:RUBAN QUANTUM TECH CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products