Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Group RFID tag identity authentication method

An RFID tag and identity authentication technology, applied in user identity/authority verification, induction record carrier, transmission system, etc., can solve the problem of unsafe wireless channels between readers and tags, and RFID identity authentication protocols that are difficult to meet safety, efficiency, and low cost requirements , safety hazards and other issues

Inactive Publication Date: 2016-06-08
BLUEDON INFORMATION SECURITY TECH CO LTD
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The RFID system is mainly composed of three parts: tags, readers, and back-end servers. The back-end server communicates with the reader through a secure wired channel, and the reader communicates with the tag through an unsafe wireless channel, so there are many security risks; At the same time, due to the limitations of various factors such as terminal computing power and storage capacity, the existing RFID identity authentication protocols are difficult to meet the requirements of security, efficiency, and low cost; and in practical applications, RFID tags often generate identity in groups. authentication process, so the traditional RFID identity authentication protocol can no longer meet the actual application requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group RFID tag identity authentication method
  • Group RFID tag identity authentication method
  • Group RFID tag identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0064] A group RFID identity authentication method is used to realize the function of passing system identity authentication in a group manner before RFID tags and RFID readers perform business communication in an RFID automatic identification system. Described RFID automatic identification system comprises RFID label group, RFID reader and background server, wherein the label in the RFID label group has no power supply, the internal EEPROM storage data in the label...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a group RFID tag identity authentication method, capable of meeting the actual application requirement of an RFID system. The method provided by the invention is low in requirement on hardware of a tag side, meets the requirement of an ultra lightweight protocol, can achieve the identity authentication process of a group RFID tag, and is applicable to solving the group RFID tag identity authentication problem of the RFID system with low cost.

Description

technical field [0001] The invention belongs to the technical field of radio frequency identification and identity authentication, in particular to a group RFID tag identity authentication method. Background technique [0002] The RFID system is mainly composed of three parts: tags, readers, and back-end servers. The back-end server communicates with the reader through a secure wired channel, and the reader communicates with the tag through an unsafe wireless channel, so there are many security risks; At the same time, due to the limitations of various factors such as terminal computing power and storage capacity, the existing RFID identity authentication protocols are difficult to meet the requirements of security, efficiency, and low cost; and in practical applications, RFID tags often generate identity in groups. The authentication process, so the traditional RFID identity authentication protocol has been unable to meet the actual application requirements. Contents of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04B5/00G06K7/00
CPCH04L9/3273H04L63/0869G06K7/0008H04B5/77
Inventor 杨育斌沈金伟柯宗贵
Owner BLUEDON INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products