Bidirectional authentication method of radio frequency identification system
An identification system and two-way authentication technology, applied in the field of information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0079] The invention will be further illustrated by the following examples.
[0080] Specific simulation standard data selection.
[0081] (1) The tag TID is 1000100010001000; the corresponding tent mapping initial value:
[0082] x 0 =(1000100010001000) 2 '1.5259'10 -5 =0.5348.
[0083] (2) The RID of the reader is 0010001000100010; the corresponding Tent mapping parameters:
[0084] α= (0010001000100010) 2 '1.5259'10 -5 =0.1337.
[0085] (3) The random number R generated by the reader during the authentication process is 0000000000111010; according to the "set interval sampling key" introduced in the encrypted technical solution S4 in the summary of the invention k ( n , m , w )", the key can be obtained:
[0086] k ( n , m , w )=(0000000000111010) 2 ⊕(2 16 -1)=(1111111111000101) 2 = k (512,3,10).
[0087] (4) Suppose the confidential information text stored in the RFID tag is "one world one dream", and the ASCII code corresponding to the information...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com