RFID ownership transfer method

A transfer method and RFID tag technology, applied in the field of radio frequency identification, can solve problems such as difficulty in meeting RFID systems, consuming system execution time and storage space, security loopholes, etc., to improve security and operation efficiency, good application prospects, and key short length effect

Active Publication Date: 2016-06-15
AEROSPACE INFORMATION
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the former has the problem of exhaustive search (when looking for the tag identification code, it needs to search exhaustively in the back-end database); the latter not only requires the server to assign a pair of keys for each tag, but also has an exhaustive search key In addition, storing the key also takes up a lot of space, and the algorithm for maintaining the key synchronization between the server and the tag is extremely complex and difficult to implement. This problem is particularly prominent when the system scale is huge.
It can be seen that the above two solutions need to consume a lot of system resources such as execution time and storage space, so it is difficult to meet the requirements of an RFID system that only has limited resources and requires high real-time response
In addition, most of these methods have some kind of security loopholes and hidden dangers
[0011] Invention patent application 3 adopts an asymmetric cryptographic security scheme, which has two problems: 1. No digital certificate is used, because the identity of the reader and the public key need to be bound in the database, which is more cumbersome to manage; 2. The pairing operation adopted is complex in calculation, large in code size, and time-consuming in operation. It is not suitable for RFID systems that only have limited resources and require high real-time response.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID ownership transfer method
  • RFID ownership transfer method
  • RFID ownership transfer method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to further explain the technical means and effects of the present invention to achieve the intended purpose of the invention, the specific implementation, structure, features and effects of the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments.

[0039] The following embodiments of the present invention provide a secure and lightweight RFID ownership transfer method based on elliptic curve cryptography (ECC). The implementation process involves the following five roles, specifically: (1) Trusted Third Party (TrustedThirdParty, referred to for short) Ttp): Responsible for accessing the certificate management system, providing privacy protection for the system, and providing a fair and arbitration mechanism for RFID tag transfer; (2) Maker (Maker): refers to the manufacturer of RFID readers and RFID tags; (3) Owner (Owner): refers to the person who owns the ownership of the RFID reader; (4) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a RFID ownership transfer method. For example, the RFID ownership transfer method comprises the following steps: a) downloading a digital certificate containing ECC public and private keys from a credible third party to a RFID reader-writer; b) initializing a RFID label, and introducing an ECC public key certificate of the RFID reader-writer into the RFID label to serve as an owner public key certificate, so as to assign the ownership of the RFID label to the RFID reader-writer; c) executing an anonymous authentication protocol by the RFID reader-writer and the RFID label to realize the bidirectional authentication of the RFID reader-writer and the RFID label; and d) executing an ownership transfer protocol by the RFID label, and transferring the ownership of the RFID label from the RFID reader-writer to another RFID reader-writer through a justice and arbitration mechanism provided by the credible third party. Therefore, the method is used for improving the security and the operation efficiency, and thus having a good application prospect.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification, in particular to an RFID ownership transfer method. Background technique [0002] RFID (radio frequency identification: radio frequency identification) is a non-contact automatic identification technology, which automatically identifies the target object and obtains relevant data through radio frequency signals, and the identification work does not require manual intervention. It has the advantages of waterproof, antimagnetic, high temperature resistance, long service life, large reading distance, data on the label can be encrypted, storage data capacity is larger, and storage information is more comfortable. Its application will bring revolutionary changes to industries such as retail and logistics. . [0003] In 1985, Neal Koblitz and Victor Miller respectively proposed Elliptic Curve Cryptography (Elliptic Curve Cryptography, ECC). ECC depends on the difficulty of solv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30G06K17/00
Inventor 张庆胜
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products