Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

RFID mobile phone and combination key technology-based authenticity identification method

A technology of combining keys and RFID tags, applied in the field of information security, can solve problems such as security risks, and achieve the effect of ensuring non-reuse, saving key update and management, and saving tedious work

Inactive Publication Date: 2011-01-12
刘彤
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this type of anti-counterfeiting method is to compare "static" anti-counterfeiting codes, that is, there are anti-counterfeiting codes in the WEB server of the manufacturer's network, and they are compared with the anti-counterfeiting codes input by users to realize authenticity identification. This method has been proved to have many advantages. security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID mobile phone and combination key technology-based authenticity identification method
  • RFID mobile phone and combination key technology-based authenticity identification method
  • RFID mobile phone and combination key technology-based authenticity identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following describes the implementation steps of the method for authenticating items based on RFID mobile phone and combined key technology with the accompanying drawings:

[0020] figure 1 : Explain that the user wants to distinguish the authenticity of the item, (1) Use an RFID mobile phone to approach the item and read the authentication information from the tag. The authentication information consists of the following: the special service number of the information service platform (8 bytes), the factory number of the item (8 bytes), the hexadecimal random code (16 bytes), and the date of manufacture (8 words) Section). (2) The mobile phone software extracts and separates each piece of data, and then uses a combined key generation algorithm to generate a combined key CK1 that changes once and after using the combination of the query date, the date of manufacture and the random code. (3) Use the factory serial number as the plaintext, use CK1 as the key, and obtain t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a RFID mobile phone and combination key technology-based method for anti-counterfeiting commodities and certificates through a wireless communication network, and belongs to the field of information safety. The method comprises that: a user makes a mobile phone integrated with a RFID reader approach an object attached with a RFID label to read authentication information which consists of a special service number of an information service platform, and a factory number, a hexadecimal random code and a production date of the object; the software of the mobile phone extracts and separates segments of data, and generates a combination key CK1 changed each time by adopting a combination key generation algorithm; the factory number is taken as a plaintext, the CK1 is taken as the key, and an authentication code L1 is obtained by a DES encryption algorithm; the software of the mobile phone sends the authentication code L1 and the factory number information to the information service platform through the GPRS or the 3G network according to the special service number so as to request an authentication result; and the information service platform regenerates a combination key CK2 and an authentication code L2 by adopting a protocol same as that at the mobile phone end, and compares the L1 and the L2 so as to identify the authenticity of the object.

Description

Technical field: [0001] The invention relates to a method for realizing the authenticity of commodities and certificates through a wireless communication network based on RFID mobile phones and combined key technology, and belongs to the field of information security. Background technique: [0002] RFID, or Radio Frequency Identification, refers to radio frequency identification. RFID is a non-contact automatic identification technology, which uses radio frequency signals to automatically identify target objects and obtain relevant data. In recent years, RFID has been widely used in various fields due to its fast and accurate reading characteristics, and is gradually replacing contact reading technology (bar code technology). Especially the Internet of Things with product electronic codes (EPC codes) and RFID as the core will affect all aspects of production and life on a global scale. [0003] The most basic RFID system consists of three parts: [0004] ◆Tag: Composed of coupling...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L9/32
Inventor 刘彤李瑛蒋继娅
Owner 刘彤
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products