Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A RFID security authentication method based on superprime

A technology of security authentication and super prime numbers, applied in secure communication devices and key distribution, to achieve the effects of long cycle, freshness assurance and security improvement

Active Publication Date: 2019-02-05
HEFEI UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no RFID security authentication method based on superprime generation pseudo-random sequence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A RFID security authentication method based on superprime
  • A RFID security authentication method based on superprime

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Such as figure 1 Shown, a kind of RFID security authentication method based on superprime number, this method comprises following sequence

[0034] A step of:

[0035] (1) The reader sends a query message Query authentication request and a random sequence R to the tag 0 ;

[0036] (2) Initialize the key iteratively generated value Z of the reader and electronic tag 1 (R) and Z 1 (T) :Z 1 (R) =K p (R) , in with Taken from the master control keys in the reader-writer and the electronic tag security module respectively, the superscripts (R) and (T) represent the attributes of the reader-writer and the electronic tag respectively, and the subscript P represents the master control attribute;

[0037] (3) Utilize the superprime iteration method to update the real-time key code K of the reader (R) ={Z 1 (R) Z 2 (R) …Z I (R)} and label real-time key K (T) ={Z 1 (T) Z 2 (T) …Z I (T)}, where the superscripts (R) and (T) respectively represent the att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to an RFID security authentication method based on super-prime number. The method comprises the following steps: a reader sends an authentication request and a random sequence to a tag; initialize a key iteration generation value between the reader and a radio frequency tag; update the key code between the reader and the radio frequency tag according to a super-prime number iterative method; the reader authenticates the radio frequency tag; update the key iteration generation value between the reader and the radio frequency tag according to the last digit of the key code; update the key code between the reader and the radio frequency tag again according to the super-prime number iterative method; the radio frequency tag authenticates the reader; and the reader and the tag normally interact the information once. The method provided by the invention utilizes the super-prime number method to generate and update a pseudo random sequence so as to achieve many times of security authentication between the reader and the radio frequency tag, ensures that only legal reader and legal radio frequency tag can read the data mutually, and solves the security authentication problem of the RFID reader and radio frequency tag.

Description

technical field [0001] The invention relates to the technical field of radio frequency identification technology security authentication, in particular to a super prime number-based RFID security authentication method. Background technique [0002] As an automatic identification technology, RFID is also an application technology with great development potential in the field of public safety. If this technology is to be widely used, the cost of RFID tags must be strictly controlled. The resources of low-cost electronic tags are very limited, and it cannot cooperate with the reader to complete complex calculations. Therefore, the realization of the system security mechanism is affected to some extent. Studying the security mechanism and implementation technology of low-cost RFID systems has become the basic task of RFID security technology research, and has also become a key issue in the promotion and application of RFID technology. [0003] When the communication between t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0869H04L9/0891H04L9/3273H04L2209/805
Inventor 袁莉芬朱国栋何怡刚尹柏强李兵佐磊
Owner HEFEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products