RFID (radio frequency identification device) authentication method and system based on PUFs (physical unclonable functions)
An authentication method and reader technology, applied in the field of Internet of Things and information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The invention will be described in further detail below in conjunction with the accompanying drawings.
[0031] The authentication method of the present invention mainly has two stages, namely: initialization stage and authentication stage, and its specific implementation mode is:
[0032] 1. Initialization stage: background database, reader and all tags are pre-installed with some information in a safe environment.
[0033] (1), the server calculates the public key H and the private key pair (F, F p ), then (ID t , H) as a record stored in the label, where ID t is the ID of the tag, and the reader IDr is stored in the reader.
[0034] (2), built-in PUF module in the reader and tag (expressed by P function), calculate G=P(ID r ), Q=P(ID t ) will G, Q, (F, F p ) into the background database.
[0035] 2. Authentication stage: To realize the authentication process of Reader and Tag, it is divided into the following five steps.
[0036] Step 1: Reader sends a reques...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com