Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for secure communication between radio frequency identification tags and reading devices

A reading device and secure communication technology, applied in the field of RFID tags and corresponding reading devices, can solve the problems of slow verification process and achieve the effect of saving processing time

Active Publication Date: 2018-07-17
捷德移动安全有限责任公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] However, the advantage of avoiding long division in the WIPR method is obtained by the fact that the ciphertext C' is usually Very long, which makes the authentication process between the RFID tag and the reading device slow, because a greater amount of data has to be transferred from the RFID tag to the reading device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for secure communication between radio frequency identification tags and reading devices
  • Method and system for secure communication between radio frequency identification tags and reading devices
  • Method and system for secure communication between radio frequency identification tags and reading devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] figure 1 A schematic diagram of a system 10 for secure communication between RFID tags and reading devices according to a preferred embodiment of the present invention is shown. System 10 may be, for example, an electronic ticketing system in which the RFID tag is an electronic ticket carried by a person.

[0040] For example, the system 10 includes two RFID tags, namely, RFID tag 20a and RFID tag 20b, which can communicate with the reading device 30a and the reading device 30b through the air interface respectively, and the respective RFID tags 20a, 20b are located in their communication range or reading range. Take the range. Preferably, the RFID tags 20a, 20b are RFID tags according to standard ISO / IEC 18000-63 or EPC Class-1 Generation-2, also referred to herein as EPC tags.

[0041] The reading devices 30a, 30b are connected via a suitable communication network 40 to a background or backend system 50 in which data associated with the RFID tags 20a, 20b are stored...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for secure communication between an RFID tag and a reading device via an air interface, as well as a corresponding RFID tag and a corresponding reading device. The invention proceeds from the basic idea that, for secure communication between an RFID tag and a reading device, a modification of the Rabin method is used, in which the identification element of the plaintext M (of the RFID tag or of the object associated with it enters all In the scope of the plaintext) encryption, the RFID tag does not calculate the square modulo n of the plaintext M, that is, M2 mod n, but calculates the Montgomery reduction ("Montgomery reduction") of the square of the plaintext M with respect to the Montgomery base R modulo n, namely , C*=M2 R‑1 mod n, and the resulting ciphertext C* is used to verify the RFID tag. The modulus n=p·q is here the public key of the reader, wherein the prime numbers p, q are the private keys of the reader and the Montgomery base R is an integer greater than the modulus n.

Description

technical field [0001] The invention relates to a method and a system for secure communication between an RFID tag and a reading device via an air interface, as well as a corresponding RFID tag and a corresponding reading device. Background technique [0002] RFID technology ("radio frequency identification, radio frequency identification") in particular enables the automatic identification of people and objects and is widely used in many applications, such as in supply chain management, access control systems, systems for goods theft prevention, electronic Tickets are waiting. RFID usually consists of a portable data carrier (also known as a transceiver) in the form of an RFID tag, which is carried by a person or on an object, and a reading device for contactless reading of the identification code of the RFID tag. An identification code (also referred to by professionals as Unique ID (UID), Tag ID (TID) or "Item Unique Identifier (UII) )”). In this case, the reading devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/302H04L9/3271H04L2209/08H04L2209/805H04W12/069G06K7/10257H04L9/0618H04L9/0869H04L9/3247H04L2209/24H04L2209/72H04L2209/80
Inventor W.欣茨K.芬肯泽勒M·赛森
Owner 捷德移动安全有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products