Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Radio frequency identification authentication system and method based on quantum cryptography network

A radio frequency identification and quantum cryptography technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as security risks, keys are easily cracked, and authentication processes exist, so as to prevent counterfeit identity attacks and improve security strength. , the effect of eliminating security risks

Pending Publication Date: 2022-06-24
QUANTUMCTEK +1
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The current radio frequency identification authentication method has the following problems: 1) In the classic server-based authentication protocol, due to the limitation of the computing power and storage space of the tag, the tag can only realize the authentication process through the hash or MAC operation of a single key; The authentication code calculation
Because the radio frequency identification system works in an open network environment, anyone may monitor the content of the communication, so the reused key used to calculate the authentication code is easy to be cracked, jeopardizing the security of the authentication protocol, thus threatening the entire Security of RFID communications
2) In the communication process between the reader and the server, the authentication key cannot be updated in time, which makes the authentication process between the reader and the server a potential safety hazard

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification authentication system and method based on quantum cryptography network
  • Radio frequency identification authentication system and method based on quantum cryptography network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present disclosure will be further described below with reference to the accompanying drawings and embodiments.

[0044] It should be noted that the following detailed description is exemplary and intended to provide further explanation of the present disclosure. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.

[0045]It should be noted that the terminology used herein is for the purpose of describing specific embodiments only, and is not intended to limit the exemplary embodiments according to the present disclosure. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural as well, furthermore, it is to be understood that when the terms "comprising" and / or "including" are used in this specification, it indicates that There are features, steps, operations, devices, components...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of encryption communication of a quantum cryptography network, and provides a radio frequency identification authentication system and method based on the quantum cryptography network. The radio frequency identification authentication system based on the quantum cryptography network comprises a server, a reader, a quantum key card and a label, the ID of the reader and the corresponding authentication key thereof, and the ID of the tag and the corresponding authentication key thereof are stored in a database of the server; the server and the reader are respectively and correspondingly connected with the quantum key card, so that the server and the reader are subjected to identity bidirectional authentication through a quantum encryption channel; the reader and the tag communicate with each other through a radio frequency field, the server and the tag also adopt a bidirectional authentication mode to authenticate the identity, and when the bidirectional authentication of the identity between the reader and the server and the identity between the server and the tag succeeds, the radio frequency identification authentication succeeds.

Description

technical field [0001] The present disclosure belongs to the field of encrypted communication of quantum cryptographic networks, and in particular relates to a radio frequency identification authentication system and method based on quantum cryptographic networks. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and do not necessarily constitute prior art. [0003] The Internet of Things is a physical Internet that covers everything in the world based on the computer Internet, using radio frequency identification (Radio Frequency Identification, RFID), sensing and other technologies to construct a physical Internet that covers everything in the world. next wave. With the wide application of the Internet of Things in various fields of social life, its security problems are particularly prominent, and the security authentication of readers and tags in the RFID system has become the most import...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/40
CPCH04L9/0852H04L63/0853
Inventor 不公告发明人
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products