Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

RFID system secret-key wireless generation method

A system key and key generation technology, applied in the field of radio frequency identification, which can solve problems such as security defects, hidden dangers, and inability to perform large-scale calculations.

Active Publication Date: 2016-07-20
GUANGDONG UNIV OF TECH +1
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing RFID system, it is generally composed of three parts: the reader, the label, and the back-end database. The reader and the back-end database are wired data transmission through the network cable, so the connection between the two Communication is generally considered to be safe and reliable, so the two can be regarded as a whole; while the transmission between the reader and the tag is to exchange data information in a wireless way, which has certain security defects, among which the reader The security of the shared key between the writer and the tag will directly affect whether the data transmitted between the two is safe and reliable, so the security of the shared key is the key object to ensure security during the communication process
[0003] In the existing RFID system, due to the low-cost requirements of the tag, the storage space, computing power, and data exchange methods of the tag side are severely restricted. The computing power of the tag side is particularly limited, and traditional large-scale calculations cannot be performed. Therefore, in the existing RFID system, the shared key between the tag and the reader is mostly set with the initial key value in advance.
Although this reduces the amount of calculation on the tag side to a certain extent, it also has certain security risks. Attackers can use some attack methods to obtain the initial key value, thereby further obtaining other private information. The key has certain security flaws

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID system secret-key wireless generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0043] like figure 1 As shown, a method for wirelessly generating an RFID system key, the RFID system includes a label, a display screen, and a reader-writer, the display screen is connected to the reader-writer, and the reader-writer includes a background database for storing tags. The corresponding tag identifier ID.

[0044] Specifically include:

[0045] The reader / writer determines the key generation type; specifically, the key generation type button is displayed on the display screen, and the key generation type includes single label key generation, batch key generation and group key generation, the user selects the type, reads and writes The device determines the type of key generation;

[0046] According to different key generation types, a shared key is generated between the reader and tag.

[0047] The single tag key generation type specifically generates a shared key for a tag, and the specific process is as follows:

[0048] S1.1 The reader sends a key generati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an RFID system secret-key wireless generation method. The an RFID system comprises a label and a reader and writer. The reader and writer determines a secret key generation type. The secret key generation type comprises single label secret key generation, batch secret key generation and group secret key generation. According to the different secret key generation types, the reader and writer and the label generate a sharing secret key. Through a safety analysis, by using the method, active attack and passive attack can be resisted, disadvantages in the prior art can be overcome and a brute force attack can be completely resisted.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification, in particular to a method for wirelessly generating an RFID system key. Background technique [0002] With the continuous advancement of science and technology, radio frequency identification technology is more and more widely used in daily life. In the existing RFID system, it is generally composed of three parts: the reader, the label, and the back-end database. The reader and the back-end database are wired data transmission through the network cable, so the connection between the two Communication is generally considered to be safe and reliable, so the two can be regarded as a whole; while the transmission between the reader and the tag is to exchange data information in a wireless way, which has certain security defects, among which the reader The security of the shared key between the writer and the tag will directly affect whether the data transmitted between them i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W4/00H04W12/04H04W12/06H04W12/041
CPCH04L63/06H04L63/0807H04L63/1441H04W4/80H04W12/04H04W12/06
Inventor 凌捷刘道微王进宏谢锐汪疆平
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products