Radio frequency identification (RFID) privacy authenticating method

An authentication method and radio frequency identification technology, applied in the security technology field related to radio frequency identification tag authentication, can solve problems such as inability to meet forward security, affect tag privacy, lack of update mechanism, etc. Security, the effect of ensuring forward security

Inactive Publication Date: 2010-02-10
XI AN JIAOTONG UNIV
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

1) Lack of update mechanism, cannot satisfy forward security
2) At least one key is shared between any two tags, and if some tags are deciphered, it will affect the privacy of other tags in the key tree

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification (RFID) privacy authenticating method
  • Radio frequency identification (RFID) privacy authenticating method
  • Radio frequency identification (RFID) privacy authenticating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical scheme and advantages of the present invention clearer, the following will be combined with the attached image 3 , 4 The present invention is further described in detail.

[0026] Let h(·), F(·) be the digest function {0, 1} in the sense of cryptography * → {0, 1} l , where l is the security parameter of the RFID system, here is the security strength of the tag. Suppose there are n tags T in the system i , 1≤i≤n, and reader R. Reader R organizes the keys of all tags according to the tags' indexes.

[0027] When the RFID system is initialized, select the security parameters of the system and the index length b. Reader for each tag T i Randomly specify a key key i and index index i . And use the summary function h( ) to calculate the index i The digest value {h(s)} corresponding to all elements s in the domain S of . The tuple (h(s), s) is stored at physical address F(h(s)). The function F(·) is a processing of the out...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a radio frequency identification (RFID) privacy authenticating method which comprises the following steps: system initialization: a reader-writer stores secret keys and indexesof all labels and a summary value of an index space; label recognition: the reader-writer transmits an authenticating request to the labels, the labels calculate and transmit authenticating information to the reader-writer, and reader-writer recognizes the labels after receiving the authenticating information; updating: after the labels are authenticated, the reader-writer updates the secret keysand the indexes of the labels and transmits updated information to the labels, and the labels update the stored secret keys and the indexes; and system maintenance: when the labels enter or depart from an RFID system, the reader-writer maintains the secret keys and the indexes of the labels. The invention can effectively resist various prior passive and active attacks; compared with an RFID authenticating method based on a balanced tree structure, the invention greatly reduces the storage and calculation cost at the label ends.

Description

technical field [0001] The invention relates to radio frequency identification technology, in particular to safety technology related to radio frequency identification label authentication. Background technique [0002] Radio Frequency Identification (Radio Frequency Identification, referred to as "RFID") is the use of radio frequency technology for non-contact identification of objects. A significant advantage of this technique is that no physical or actual contact is required. RFID has a wide range of application prospects, and has been widely used in retail, electronic passports, personal ID cards, logistics, food storage, drug monitoring and other fields. [0003] The main components of the RFID system include a tag (Tag), a reader (Reader) and a back-end database (Back-end database, referred to as "DB"). The tags contain an antenna and an integrated circuit, usually without a processor. Some information and a unique identification (ID) of the item to which it is atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K17/00
Inventor 齐勇姚青松韩劲松赵季中李向阳刘云浩
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products