CN102663327A - RFID signcryption method based on ECC - Google Patents

RFID signcryption method based on ECC Download PDF

Info

Publication number
CN102663327A
CN102663327A CN2012100528511A CN201210052851A CN102663327A CN 102663327 A CN102663327 A CN 102663327A CN 2012100528511 A CN2012100528511 A CN 2012100528511A CN 201210052851 A CN201210052851 A CN 201210052851A CN 102663327 A CN102663327 A CN 102663327A
Authority
CN
China
Prior art keywords
label
database
reader
key
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100528511A
Other languages
Chinese (zh)
Inventor
王效灵
张新波
盛辉
王延平
安文六
张涛
柯罗岗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Gongshang University
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN2012100528511A priority Critical patent/CN102663327A/en
Publication of CN102663327A publication Critical patent/CN102663327A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to an RFID signcryption method based on ECC. In a method in the prior art, authentication is just carried out between a label and a reader, and the label does not be updated together with database data such that security vulnerabilities exist. The method in the invention guarantees privacy of the label through updating of a key pair, and every time the reader can only update the key pair which can not be authenticated, and synchronization of data update is guaranteed. The method in the invention assists in solving the safety problem that encryption and authentication can not be carried out simultaneously in the RFID system. Simultaneously, the method in the invention is characterized by short secret keys, high security and strong flexibility by virtue of intractability of the elliptic curve cryptography; with the method, less communication cost and higher safety performance are provided.

Description

A kind of RFID signcryption method based on ECC
Technical field
The invention belongs to technical field of RFID, it is related to a kind of RFID signcryption method based on ECC.
Background technology
Radio frequency identification(Radio frequency identification, abbreviation RFID)Technology is a kind of contactless automatic identification technology, and its principle is to utilize radiofrequency signal, and Space Coupling and transmission characteristic realize the automatic identification to object.RFID technique is the non-contact automatic identification technology risen from the 60 to 70's of last century, it has been widely used in the various fields such as industrial automation, business automation, communications and transportation control management, traffic surveillance and control system, Auto Express-way Toll Collector System, Item Management, production line balance automation, gate control system, financial transaction, warehousing management, livestock management, vehicle anti-theft such as automobile or train etc. at present.RFID technologies are widely used in industrial production and the various aspects of daily life at present.RFID technique shows huge development potentiality and application space, it is considered to be one of most promising information technology of 21 century.
RFID systems are communicated when carrying out front end data acquisition work between label and read write line using radio frequency signal, it is impossible to the data message effectively in protection RFID labels.Information in the label even malice that may be stolen is changed, in addition, the RFID labels without authentic communication security mechanism, is also existed and is easily leaked some sensitive informations to neighbouring recognizer, easily disturbed, the potential safety hazard such as be easily traced.RFID security, which has become, restricts its key factor used on a large scale.RFID system computing resource condition is severely limited, this exactly one of challenge of RFID security design.
The content of the invention
There is provided a kind of RFID signcryption method based on ECC in view of the shortcomings of the prior art by the present invention.
The technical solution adopted for solving the technical problem of the present invention is:
A kind of RFID signcryption method based on ECC comprises the following steps:
(1)Initialization data storehouse
In database, a storage table is initialized,
Figure 2012100528511100002DEST_PATH_IMAGE002
,
Figure 2012100528511100002DEST_PATH_IMAGE004
It is initialization shared key,
Figure 2012100528511100002DEST_PATH_IMAGE006
,
Figure 2012100528511100002DEST_PATH_IMAGE008
It is key after updating, key is sky after the renewal.
(2)Reader interrogates label
Read write line sends inquiry request and random number to label
Figure 2012100528511100002DEST_PATH_IMAGE010
,
Figure 598873DEST_PATH_IMAGE010
Length can be by system self-defining, but need long enough to avoid repeating in a short time.
(3)The request of tag response reader
Plaintext is encoded after inquiry request is received and selects to generate point, then will be generated a little by label first(
Figure 2012100528511100002DEST_PATH_IMAGE012
)It is sent to reader;
(4)Database authenticating tag
When reader receives generation point(
Figure 640648DEST_PATH_IMAGE012
)Afterwards, the random number that it generates oneself
Figure 2012100528511100002DEST_PATH_IMAGE014
Together with generation point(
Figure 981237DEST_PATH_IMAGE012
)Issue database;Database judges
Figure 438763DEST_PATH_IMAGE006
Figure 315452DEST_PATH_IMAGE008
Whether it is empty.
If(
Figure 137915DEST_PATH_IMAGE006
,)For sky, then
Figure 2012100528511100002DEST_PATH_IMAGE016
With label random numberFor:
Figure 2012100528511100002DEST_PATH_IMAGE020
Figure 2012100528511100002DEST_PATH_IMAGE022
Draw
Figure 2012100528511100002DEST_PATH_IMAGE024
With;Then use respectively
Figure 1187DEST_PATH_IMAGE014
With
Figure 670066DEST_PATH_IMAGE026
Calculated with ID all in database:
Figure 2012100528511100002DEST_PATH_IMAGE028
With
Figure 2012100528511100002DEST_PATH_IMAGE030
, wherein
Figure 2012100528511100002DEST_PATH_IMAGE032
A high position for the ID character strings represented for binary form,
Figure 2012100528511100002DEST_PATH_IMAGE034
The ID character string low levels represented for binary form.By result of calculation respectively withWith
Figure 2012100528511100002DEST_PATH_IMAGE038
Compare, if the ID result of calculations of some label with
Figure 601112DEST_PATH_IMAGE036
Figure 355442DEST_PATH_IMAGE038
Equal, then the label passes through certification.
If(
Figure 653306DEST_PATH_IMAGE006
,
Figure 239008DEST_PATH_IMAGE008
)It is not sky, then
Figure 668852DEST_PATH_IMAGE016
It is with label random number:
Figure 2012100528511100002DEST_PATH_IMAGE042
DrawWith
Figure 874017DEST_PATH_IMAGE026
;Then use respectively
Figure 579805DEST_PATH_IMAGE014
With
Figure 914971DEST_PATH_IMAGE026
Calculated with ID all in database:
Figure 2012100528511100002DEST_PATH_IMAGE044
With
Figure 2012100528511100002DEST_PATH_IMAGE046
, by result of calculation respectively with
Figure 768526DEST_PATH_IMAGE036
With
Figure 408193DEST_PATH_IMAGE038
Compare, if the ID result of calculations of some label with
Figure 968487DEST_PATH_IMAGE036
With
Figure 802451DEST_PATH_IMAGE038
Equal, then the label is by certification, and abandons key(
Figure 753089DEST_PATH_IMAGE006
,
Figure 697912DEST_PATH_IMAGE008
), database update inquiry is turned to, if this group of tag ID result of calculation is unequal by above-mentioned comparison, second group of computing is carried out;
Figure 614177DEST_PATH_IMAGE040
Draw
Figure 619043DEST_PATH_IMAGE024
With
Figure 119294DEST_PATH_IMAGE026
;Then use respectively
Figure 539911DEST_PATH_IMAGE014
With
Figure 74798DEST_PATH_IMAGE026
Calculated with ID all in database;With
Figure 674330DEST_PATH_IMAGE046
, by result of calculation respectively with
Figure 2012100528511100002DEST_PATH_IMAGE050
With
Figure 2012100528511100002DEST_PATH_IMAGE052
Compare, if the ID result of calculations of some label with
Figure 85588DEST_PATH_IMAGE050
With
Figure 147085DEST_PATH_IMAGE052
With it is equal, then the label is used in combination by certification(
Figure 995218DEST_PATH_IMAGE006
,
Figure 470062DEST_PATH_IMAGE008
)Instead of(
Figure 498060DEST_PATH_IMAGE002
,
Figure 2012100528511100002DEST_PATH_IMAGE054
), then(
Figure 804277DEST_PATH_IMAGE006
,
Figure 993950DEST_PATH_IMAGE008
)It is set to sky;If this tag ID result of calculation is unequal by above-mentioned comparison, stop authentication operation.
(5)Database initiates to update inquiry
Database generates random number, plaintext is encoded, then sent the ciphertext after coding and key updating inquiry request to reader together.
(6)Certification of the label to reader
Label is received after ciphertext and the key updating inquiry request of reader, and label utilizes itself
Figure 2012100528511100002DEST_PATH_IMAGE058
,
Figure 2012100528511100002DEST_PATH_IMAGE060
,
Figure 579259DEST_PATH_IMAGE018
,
Figure 2012100528511100002DEST_PATH_IMAGE062
,
Figure 207686DEST_PATH_IMAGE002
,
Figure 73136DEST_PATH_IMAGE004
, verify whether itself ciphertext is equal with the ciphertext received, if equal carried out(7), otherwise stop checking.
(7)Tag update shared key is simultaneously responded
After label is to reader authentication, tag update key and being sent to reader is renewed back to should.
(8)Reader completes to update
If database is received to be renewed back to and answered, by key
Figure 2012100528511100002DEST_PATH_IMAGE064
Replace with
Figure 496027DEST_PATH_IMAGE006
, simultaneously will
Figure 945463DEST_PATH_IMAGE004
Replace with
Figure 2012100528511100002DEST_PATH_IMAGE066
, and handle
Figure 2012100528511100002DEST_PATH_IMAGE068
,
Figure 938433DEST_PATH_IMAGE008
It is set to sky;If database is not received to be renewed back to and answered, the group key of database purchase two(
Figure 891346DEST_PATH_IMAGE002
,
Figure 2012100528511100002DEST_PATH_IMAGE070
)With(
Figure 2012100528511100002DEST_PATH_IMAGE072
,
Figure 813034DEST_PATH_IMAGE008
).
Beneficial effects of the present invention:
Compared with prior art, the present invention is on the premise of basic encryption function is ensured, database certification is added verification process by the invention, can complete the synchronization of label and database, system is had higher security.
Key length required for the present invention is short, simplifies hardware circuit, it is adaptable to the severely limited situation of this computing resource condition of RFID system.
Embodiment
Specifically the invention provides a kind of label decryption method suitable for RFID system, methods described includes step:
(1)Initialization data storehouse and reader interrogate label
Initialization:In database, K is initializedp1 、Kp2 、Kpt1、 Kpt2For a storage table.In initialization:
Figure 421870DEST_PATH_IMAGE002
,
Figure 159144DEST_PATH_IMAGE004
It is initialization shared key,
Figure 232143DEST_PATH_IMAGE006
,It is key after updating, key is sky after renewal;
Reader queries label:Reader sends inquiry request Query, and random number
Figure 358548DEST_PATH_IMAGE010
To label, the response of label is waited;
(2)The request of tag response reader
Tag responses reader:Label will carry out four step computings after by inquiry request:
Figure DEST_PATH_IMAGE074
Figure DEST_PATH_IMAGE078
Figure DEST_PATH_IMAGE080
Then will(
Figure DEST_PATH_IMAGE082
)Send reader to;
(3)Database authenticating tag
Reader reply data storehouse:When reader is received(
Figure 817954DEST_PATH_IMAGE082
)Afterwards, the random number that it generates oneself
Figure 745459DEST_PATH_IMAGE014
Together with(
Figure 448098DEST_PATH_IMAGE082
)Issue database.
Database is judged first:(
Figure 31526DEST_PATH_IMAGE006
,
Figure 343559DEST_PATH_IMAGE008
)Whether it is empty, if(
Figure 391149DEST_PATH_IMAGE006
,
Figure 700908DEST_PATH_IMAGE008
)For sky, then A schemes are carried out, otherwise carry out B schemes.
A schemes:Database operation:
Figure DEST_PATH_IMAGE084
Figure DEST_PATH_IMAGE086
Draw
Figure 394801DEST_PATH_IMAGE024
With
Figure 510525DEST_PATH_IMAGE026
;Then use respectivelyWith
Figure 893281DEST_PATH_IMAGE026
Calculated with ID all in database;
Figure 248039DEST_PATH_IMAGE044
With
Figure 668919DEST_PATH_IMAGE046
, by result of calculation respectively with
Figure 363205DEST_PATH_IMAGE036
With
Figure 77083DEST_PATH_IMAGE038
Compare, if to have passed through the above-mentioned rate of exchange equal for the ID result of calculations of some label, the label passes through certification, turns to(4), otherwise stop authentication operation.
B schemes:
First group:Database operation:
Figure 184717DEST_PATH_IMAGE040
Figure 579926DEST_PATH_IMAGE042
DrawWith
Figure 863367DEST_PATH_IMAGE026
;Then use respectively
Figure 130400DEST_PATH_IMAGE014
With
Figure 391617DEST_PATH_IMAGE026
Calculated with ID all in database;
Figure 857234DEST_PATH_IMAGE044
With
Figure 116177DEST_PATH_IMAGE046
, by result of calculation respectively with
Figure 932823DEST_PATH_IMAGE036
With
Figure 233617DEST_PATH_IMAGE038
Compare, if the ID result of calculations of some label have passed through, above-mentioned comparison is equal, and the label abandons key by certification:(
Figure 757002DEST_PATH_IMAGE006
,
Figure 249163DEST_PATH_IMAGE008
)Turn to(4)If this group of tag ID result of calculation is unequal by above-mentioned comparison, second group of computing is carried out;
Second group:Database operation:
Figure 287526DEST_PATH_IMAGE040
Figure 828229DEST_PATH_IMAGE048
Draw
Figure 534017DEST_PATH_IMAGE024
With
Figure 430035DEST_PATH_IMAGE026
;Then use respectively
Figure 158957DEST_PATH_IMAGE014
WithCalculated with ID all in database;
Figure 860382DEST_PATH_IMAGE044
With
Figure 366450DEST_PATH_IMAGE046
, by result of calculation respectively withWith
Figure 91272DEST_PATH_IMAGE052
Compare, if the ID result of calculations of some label have passed through, above-mentioned comparison is equal, and the label is used in combination by certification(
Figure 443756DEST_PATH_IMAGE006
,
Figure 448621DEST_PATH_IMAGE008
)Instead of(
Figure 948872DEST_PATH_IMAGE002
,
Figure 369489DEST_PATH_IMAGE054
), then(
Figure 904376DEST_PATH_IMAGE006
,
Figure 313098DEST_PATH_IMAGE008
)It is set to sky;If this tag ID result of calculation is unequal by above-mentioned comparison, stop authentication operation.
(4)Database initiates to update inquiry
Data base querying reader:Database generates random number
Figure 238329DEST_PATH_IMAGE056
, it is calculated as below:
Figure DEST_PATH_IMAGE088
Figure DEST_PATH_IMAGE090
Then will(
Figure DEST_PATH_IMAGE092
,)Reader is given together with key updating inquiry request Query_new.In order to prevent to store two group keys in asynchronous problem caused by the 6th, 7 step Query_OK information are lost, database(
Figure 213369DEST_PATH_IMAGE002
,
Figure 540446DEST_PATH_IMAGE004
)With(
Figure 887113DEST_PATH_IMAGE006
Figure 361957DEST_PATH_IMAGE008
), wherein,
Figure DEST_PATH_IMAGE098
(5)Certification of the label to reader
Reader reply data storehouse:Label receive reader renewal inquiry request Query_new and(
Figure DEST_PATH_IMAGE100
,)Afterwards, label utilizes itself
Figure 809862DEST_PATH_IMAGE058
,
Figure 53762DEST_PATH_IMAGE060
,,
Figure 471154DEST_PATH_IMAGE014
,
Figure 601046DEST_PATH_IMAGE002
,Calculate:
Figure DEST_PATH_IMAGE104
Verify M3Whether disclosure satisfy that:
Figure 387922DEST_PATH_IMAGE100
Figure DEST_PATH_IMAGE106
If, it is equal to carry out(6), otherwise stop checking.
(6)Tag update shared key is simultaneously responded
Tag responses reader:After label is to reader authentication, label is calculated as below:
Figure DEST_PATH_IMAGE108
Obtain
Figure DEST_PATH_IMAGE110
.More new key:
Figure DEST_PATH_IMAGE112
,And send to be renewed back to reader and answer Query_OK.
(7)Reader completes to update
Reader reply data storehouse:If database, which receives to be renewed back to, answers Query_OK, respectively by key
Figure DEST_PATH_IMAGE116
,Replace with
Figure 253165DEST_PATH_IMAGE006
,
Figure 409340DEST_PATH_IMAGE008
And handle
Figure 268711DEST_PATH_IMAGE068
,
Figure 939864DEST_PATH_IMAGE008
It is set to sky;If database does not receive Query_OK, data can store two group keys(
Figure 175673DEST_PATH_IMAGE002
Figure 186355DEST_PATH_IMAGE054
)With(
Figure 715163DEST_PATH_IMAGE068
,
Figure 873612DEST_PATH_IMAGE008
).

Claims (1)

1. a kind of RFID signcryption method based on ECC, it is characterised in that this method comprises the following steps:
(1)Initialization data storehouse, be specifically:
In database, a storage table is initialized,
Figure 2012100528511100001DEST_PATH_IMAGE002
,
Figure 2012100528511100001DEST_PATH_IMAGE004
It is initialization shared key,
Figure 2012100528511100001DEST_PATH_IMAGE006
,It is key after updating, key is sky after the renewal;
(2)Reader interrogates label, is specifically:
Read write line sends inquiry request and random number to label,
Figure 523067DEST_PATH_IMAGE010
Length can be by system self-defining, but need long enough to avoid repeating in a short time;
(3)The request of tag response reader, be specifically:
Plaintext is encoded after inquiry request is received and selects to generate point, then will be generated a little by label first(
Figure 2012100528511100001DEST_PATH_IMAGE012
)It is sent to reader;
(4)Database authenticating tag, be specifically:
When reader receives generation point(
Figure 279932DEST_PATH_IMAGE012
)Afterwards, the random number that it generates oneself
Figure 2012100528511100001DEST_PATH_IMAGE014
Together with generation point(
Figure 481107DEST_PATH_IMAGE012
)Issue database;Database judges
Figure 126852DEST_PATH_IMAGE006
Figure 376567DEST_PATH_IMAGE008
Whether it is empty;
If(
Figure 424158DEST_PATH_IMAGE006
,
Figure 294768DEST_PATH_IMAGE008
)For sky, then
Figure DEST_PATH_IMAGE016
With label random number
Figure DEST_PATH_IMAGE018
For:
Figure DEST_PATH_IMAGE022
Draw
Figure DEST_PATH_IMAGE024
With
Figure DEST_PATH_IMAGE026
;Then use respectively
Figure 178542DEST_PATH_IMAGE014
With
Figure 231949DEST_PATH_IMAGE026
Calculated with ID all in database:
Figure DEST_PATH_IMAGE028
With
Figure DEST_PATH_IMAGE030
, whereinA high position for the ID character strings represented for binary form,The ID character string low levels represented for binary form;By result of calculation respectively withWith
Figure DEST_PATH_IMAGE038
Compare, if the ID result of calculations of some label with
Figure 881848DEST_PATH_IMAGE036
Figure 424825DEST_PATH_IMAGE038
Equal, then the label passes through certification;
If(
Figure 281048DEST_PATH_IMAGE006
,
Figure 138145DEST_PATH_IMAGE008
)It is not sky, then
Figure 894749DEST_PATH_IMAGE016
It is with label random number:
Figure DEST_PATH_IMAGE040
Figure DEST_PATH_IMAGE042
DrawWith
Figure 277112DEST_PATH_IMAGE026
;Then use respectively
Figure 672322DEST_PATH_IMAGE014
With
Figure 283431DEST_PATH_IMAGE026
Calculated with ID all in database:
Figure DEST_PATH_IMAGE044
With, by result of calculation respectively with
Figure 496107DEST_PATH_IMAGE036
With
Figure 326922DEST_PATH_IMAGE038
Compare, if the ID result of calculations of some label with
Figure 260243DEST_PATH_IMAGE036
With
Figure 991439DEST_PATH_IMAGE038
Equal, then the label is by certification, and abandons key(
Figure 312698DEST_PATH_IMAGE006
,
Figure 801449DEST_PATH_IMAGE008
), database update inquiry is turned to, if this group of tag ID result of calculation is unequal by above-mentioned comparison, second group of computing is carried out;
Figure 866357DEST_PATH_IMAGE040
Figure DEST_PATH_IMAGE048
Draw
Figure 950594DEST_PATH_IMAGE024
With;Then use respectively
Figure 481118DEST_PATH_IMAGE014
With
Figure 84138DEST_PATH_IMAGE026
Calculated with ID all in database;
Figure 462030DEST_PATH_IMAGE044
With
Figure 626557DEST_PATH_IMAGE046
, by result of calculation respectively with
Figure DEST_PATH_IMAGE050
With
Figure DEST_PATH_IMAGE052
Compare, if the ID result of calculations of some label with
Figure 214533DEST_PATH_IMAGE050
WithWith it is equal, then the label is used in combination by certification(
Figure 119221DEST_PATH_IMAGE006
,)Instead of(,
Figure DEST_PATH_IMAGE054
), then(
Figure 409498DEST_PATH_IMAGE006
,
Figure 824299DEST_PATH_IMAGE008
)It is set to sky;If this tag ID result of calculation is unequal by above-mentioned comparison, stop authentication operation;
(5)Database initiates to update inquiry, is specifically:
Database generates random number
Figure DEST_PATH_IMAGE056
, plaintext is encoded, then sent the ciphertext after coding and key updating inquiry request to reader together;
(6)Certification of the label to reader, be specifically:
Label is received after ciphertext and the key updating inquiry request of reader, and label utilizes itself
Figure DEST_PATH_IMAGE058
,
Figure DEST_PATH_IMAGE060
,
Figure 127366DEST_PATH_IMAGE018
,
Figure DEST_PATH_IMAGE062
,,
Figure 22737DEST_PATH_IMAGE004
, verify whether itself ciphertext is equal with the ciphertext received, if equal carried out(7), otherwise stop checking;
(7)Tag update shared key is simultaneously responded, and is specifically:
After label is to reader authentication, tag update key and being sent to reader is renewed back to should;
(8)Reader completes to update, and is specifically:
If database is received to be renewed back to and answered, by key
Figure DEST_PATH_IMAGE064
Replace with
Figure 292045DEST_PATH_IMAGE006
, simultaneously will
Figure 467811DEST_PATH_IMAGE004
Replace with
Figure DEST_PATH_IMAGE066
, and handle
Figure DEST_PATH_IMAGE068
,
Figure 19140DEST_PATH_IMAGE008
It is set to sky;If database is not received to be renewed back to and answered, the group key of database purchase two(
Figure 243448DEST_PATH_IMAGE002
,
Figure DEST_PATH_IMAGE070
)With(,
Figure 695158DEST_PATH_IMAGE008
).
CN2012100528511A 2012-03-02 2012-03-02 RFID signcryption method based on ECC Pending CN102663327A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100528511A CN102663327A (en) 2012-03-02 2012-03-02 RFID signcryption method based on ECC

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100528511A CN102663327A (en) 2012-03-02 2012-03-02 RFID signcryption method based on ECC

Publications (1)

Publication Number Publication Date
CN102663327A true CN102663327A (en) 2012-09-12

Family

ID=46772813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100528511A Pending CN102663327A (en) 2012-03-02 2012-03-02 RFID signcryption method based on ECC

Country Status (1)

Country Link
CN (1) CN102663327A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681041A (en) * 2014-11-18 2016-06-15 航天信息股份有限公司 RFID ownership transfer method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488854A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Wireless RFID system authentication method and apparatus
US8112626B1 (en) * 2006-01-20 2012-02-07 Symantec Corporation Method and apparatus to provide public key authentication with low complexity devices

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8112626B1 (en) * 2006-01-20 2012-02-07 Symantec Corporation Method and apparatus to provide public key authentication with low complexity devices
CN101488854A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Wireless RFID system authentication method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张振宇: "基于ECC的RFID通信协议研究", 《中国优秀硕士学位论文全文数据库信息科技辑》, no. 7, 15 July 2010 (2010-07-15), pages 38 - 41 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681041A (en) * 2014-11-18 2016-06-15 航天信息股份有限公司 RFID ownership transfer method
CN105681041B (en) * 2014-11-18 2019-09-17 航天信息股份有限公司 A kind of RFID ownership transfer method

Similar Documents

Publication Publication Date Title
CN106845304B (en) A kind of method and system for realizing reader and smart-tag authentication in RFID system
CN101847199B (en) Security authentication method for radio frequency recognition system
CN103699920B (en) RF identification mutual authentication method based on elliptic curve
CN102034123B (en) RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division
CN104115442B (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
CN103078744B (en) Public key-based bidirectional radio frequency identification authorization method
CN101645899B (en) Bidirectional authentication method and system based on symmetric encipherment algorithm
JP5260528B2 (en) Authentication method and communication system for authentication
CN103413109A (en) Bidirectional authentication method of radio frequency identification system
CN102880891B (en) The RFID safety communicating method that a kind of extra lightweight RFID bidirectional identification protocol is set up
CN103957186B (en) Method for effectively transferring label ownership in RFID system
CN101882197B (en) RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key
CN103795543A (en) Bidirectional security authentication method for RFIP system
CN102857344B (en) RFID (radio frequency identification) safety authentication method based on elliptic curve and symmetric cryptographic technique
JP2010539519A (en) Method for exchanging encrypted data and communication system
CN103345690A (en) Anti-fake method based on RFID and physical unclonable function
CN103532718A (en) Authentication method and authentication system
CN103281194A (en) Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN103279775A (en) RFID (Radio Frequency Identification) system capable of ensuring confidentiality and data integrity and implementation method thereof
CN104579688B (en) It is a kind of based on Hash function can synchronized update key RFID mutual authentication method
CN101488179A (en) Authentication method and apparatus for wireless radio frequency recognition system
US20100313012A1 (en) light access authentication method and system
CN102594550A (en) RFID internal mutual authentication safety protocol based on secret key array
CN104506533B (en) A kind of RFID tag ownership transfer method based on PUF
CN104424568A (en) Authentication false-proof traceability system employing circuit core chip ID number as identification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120912