Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree

An authentication method and dynamic key technology, applied in the field of radio frequency identification, can solve the problems of affecting the privacy and security of labels, difficult label maintenance work, lack of key update system, etc., to increase hardware overhead, strong security, Effects of dynamic key update

Inactive Publication Date: 2008-09-03
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this system, there are two issues that must be considered, namely search efficiency and key security
First, the search key process must be efficient enough to support large-scale systems
Second, for key security considerations, the shared key must be dynamically updated over time
1) Due to the lack of a key update mechanism, it is not safe under the active attack of the opponent
2) Storing the key groups of tags in a balanced tree structure will cause high correlation between some key groups (that is, in two key groups, many keys are the same in the same order), and in a certain key group When some tags are deciphered, it will affect the privacy and security of tags adjacent to them in the key tree (such as leaves that are brothers to each other)
4) Due to the integrity required by the balanced tree itself, it is difficult to effectively adapt to the maintenance work of tags in the RFID system, such as the work of deleting and adding tags

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree
  • Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree
  • Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical scheme and advantages of the present invention clearer, the following will be combined with the attached Figures 6 to 10 The present invention is further described in detail.

[0041] Let h be a cryptographic hash function { 0,1 } * → { 0,1 } l r , where l r is the security parameter of the RFID system. Suppose there are n tags T in the system i , 1≤i≤n, and reader R. Reader R stores and organizes keys of all tags according to a sparse tree called key tree s. α represents the branching factor of the key tree, and d represents the depth of the key tree. To illustrate this scheme clearly, we only describe this strategy in terms of binary sparse trees, but there is no restriction on binary sparse trees for this schem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a radio frequency identification technology and discloses a method for privacy authentication of radio frequency identification based on dynamic key update of sparse tree, which comprises the following steps that: system initialization step, a read-write machine generates the key of each label stored by the sparse key tree; label identification step, the read-write machine sends an authentication request to the label, the label computes and sends the authentication information to the read-write machine, and the read-write machine identifies the label after receiving the authentication information; key updating step, after the label identification is finished, the read-write machine updates the key tree and sends the synchronous updating authentication information to the label which updates the stored keys; system maintenance step, once the label joins in or level RFID system, the read-write machine maintains the system sparse key tress. The invention is able to efficiently resist various passive and active attacks at present, and in contrast with the RFID authentication method based on the balance tree structure, greatly reduces the storage expense at the label end.

Description

technical field [0001] The invention relates to radio frequency identification technology, in particular to safety technology related to radio frequency identification label authentication. Background technique [0002] Radio Frequency Identification ("RFID") is the use of radio frequency technology for object identification in an open system environment. One of the advantages of this technique is that no physical or any other visible contact is required. It is the link between computer systems and the real world, and provides an efficient and cheap way for computers to perceive and recognize the real world. [0003] RFID has a wide range of application prospects, and can be used for retail, electronic passports, electronic banknotes, personal ID cards, digital library management, and even for building intelligent self-organizing network environments, etc. Retail giant Wal-Mart, the U.S. Department of Defense and other institutions have adopted RFID technology to identify ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00G06K19/073G06F21/00G06F21/44
Inventor 胡磊汪维家李勇鲁力
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products