CN103177273B - Based on the mobile wireless radio frequency identification authentication method of low cost label - Google Patents

Based on the mobile wireless radio frequency identification authentication method of low cost label Download PDF

Info

Publication number
CN103177273B
CN103177273B CN201310050622.0A CN201310050622A CN103177273B CN 103177273 B CN103177273 B CN 103177273B CN 201310050622 A CN201310050622 A CN 201310050622A CN 103177273 B CN103177273 B CN 103177273B
Authority
CN
China
Prior art keywords
reading device
label
mobile reading
server
mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310050622.0A
Other languages
Chinese (zh)
Other versions
CN103177273A (en
Inventor
李慧贤
胡金顺
庞辽军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwestern Polytechnical University
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN201310050622.0A priority Critical patent/CN103177273B/en
Publication of CN103177273A publication Critical patent/CN103177273A/en
Application granted granted Critical
Publication of CN103177273B publication Critical patent/CN103177273B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of mobile wireless radio frequency identification authentication method based on low cost label, for solving the inefficient technical matters of existing mobile wireless radio frequency identification authentication method.Technical scheme mobile wireless radio frequency identification authentication is divided into registration, normal certification and rapid authentication three phases, reduce information interaction times, simplify server, interaction flow between mobile reading device and label three, realize mobile reading device and label, and the certification mutually between two of mobile reading device and background server.Meet in actual demand the requirement needing to complete fast when repeatedly reading same label, not only increase authentication efficiency, also assures that the security of system.

Description

Based on the mobile wireless radio frequency identification authentication method of low cost label
Technical field
The present invention relates to a kind of mobile wireless radio frequency identification authentication method, particularly relate to a kind of mobile wireless radio frequency identification authentication method based on low cost label.
Background technology
Mobile wireless radio-frequency (RF) identification (radio frequency identification, hereinafter referred to as RFID) label and mobile reading device in system, mobile reading device and server are all pass through wireless connections, reader is no longer an entity of being trusted, mobile reading device read-write scope is no longer restricted, mobile reading device infinitely can collect the information of label, and this more easily exposes the privacy of mobile reading device owner.This makes mobile RFID system face more complicated wireless communications environment compared to traditional rfid system, more easily suffers the security threats such as eavesdropping, personation, playback.Therefore, need to design the new safety certifying method being suitable for mobile RFID system, meet the new safety of system and privacy requirements.
At document " C L Chen, J K Jan, and C F Chien.Based on mobile RFID device to design asecure mutual authentication scheme for market application.2010International Conferenceon Broadband, Wireless Computing, Communication and Applications (BWCCA2010), LosAlamitos (USA): IEEE, 2010:423-428 " in, a kind of RFID authentication protocol of lightweight of author designed, achieve the reading identification of mobile reading device to label.The program meets EPC Class-1Generation-2 standard, is namely the simple operations such as cyclic redundancy check (CRC) code (CRC), XOR (XOR) operation at the arithmetic operation that tab end is main, meets the standard of the RFID authentication protocol of low cost label.The program has certain advantage in tab end calculated performance, but program message exchange number of times too much (mobile reading device respectively needs mutual 4 times with label and server respectively), information flowrate is not very high.Meanwhile, also there is safety issue in the program, when label response mobile reading device, and one of them value T 1(Y 2=R 2+ EPC i) change only depend on server produce random number R 2, the same message that mobile reading device sends so if we reset, then T in the response of same label 1can be always constant, so assailant can carry out pursuit attack to label accordingly.
Summary of the invention
In order to overcome the inefficient deficiency of existing mobile wireless radio frequency identification authentication method, the invention provides a kind of mobile wireless radio frequency identification authentication method based on low cost label.Mobile wireless radio frequency identification authentication is divided into registration, normal certification and rapid authentication three phases by the method, reduce information interaction times, simplify server, interaction flow between mobile reading device and label three, realize mobile reading device and label, and the certification mutually between two of mobile reading device and background server, the requirement completed fast when same label is repeatedly read can be needed in practical requirement, improve authentication efficiency, the security of system can be ensured simultaneously.
The technical solution adopted for the present invention to solve the technical problems is: a kind of mobile wireless radio frequency identification authentication method based on low cost label, is characterized in comprising the following steps:
Step one, authentication protocol run before registration phase, executive system carries out initialization;
(1) information (Rid is stored j, K i, Sy j, Pk, △ T jwherein △ T j=1) to mobile reading device.
(2) information (K is stored i, Tid i) to label.
(3) information (Rid is stored j, K i, Sy j, △ T j, Tid i, T info, Sk is △ T wherein j=0) to server.
Step 2, normal authentication phase;
(1) mobile reading device sends authentication query request.Mobile reading device produces random number N r j, then calculate and M 2=h (Nr j).Mobile reading device is by m 1and M 2send to label.
(2) the label shared key K that utilizes oneself to store i, calculate and judge whether set up.If set up, prove that mobile reading device is legal, otherwise label does not respond.After label checking mobile reading device is legal, produce random number N t i.Then calculate: M 3 = Nt i ⊕ K i , M 4 = h ( Nt i ⊕ Nr j ) , M 5 = h ( Tid i ⊕ Nt i ) . Label is by information (M 3, M 4, M 5) send to mobile reading device.
(3), after mobile reading device receives message, shared key K is utilized icalculate Nt i, then verify whether set up.If set up, prove that label is legal, continue next step process.If be false, prove that label is illegal, abandon certification.After proving that label is legal, first mobile reading device searches whether there is Tid in self i, and verify whether set up.If set up, then authentication success, otherwise mobile reading device counter increases by 1, i.e. △ T j=△ T j+ 1.Then mobile reading device utilizes server public key Pk enciphered message (Rid j, △ T j, Nr j, M 5, Nt i), obtain M 6=E pk(Rid j|| △ T j|| Nr j|| M 5|| Nt i).Mobile reading device is by information M 6send to server.
(4) server receives message M 6after, be decrypted with the private key Sk of oneself, namely calculate D sk(M 6), obtain information (Rid j, △ T j, Nr j, M 5, Nt i).First whether whois lookup exists a mobile reading device ID (identity number) and equals Rid jif exist and prove that this mobile reading device is legal, continue authentication processing.If there is no prove that this mobile reading device is illegal, abandon certification.If mobile reading device is legal, to the mobile reading device Rid of server stores jcorresponding △ T jthe △ T obtained is deciphered with private key j' compare.If private key deciphers the △ T obtained j' be not more than the △ T of server stores j, illustrate that this message is message playback, abandon certification.Otherwise, search label information in the server, calculate and judge whether set up, if establishment care label is legal, the △ T that server update stores jfor private key deciphers the △ T obtained j', utilize the symmetric key Sy of mobile reading device jenciphered message (Tid i, T info, Nr j), obtain M 7=E syj(Tid i|| T info|| Nr j).Server is by information N 7send to mobile reading device.
Step 3, rapid authentication stage;
(1) mobile reading device sends authentication query request.Mobile reading device produces random number N r j, then calculate and M 2=h (Nr j).Mobile reading device is by M 1and M 2send to label.
(2) the label shared key K that utilizes oneself to store i, calculate and judge whether set up.If set up, prove that mobile reading device is legal, otherwise label does not respond.If after label checking mobile reading device is legal, produce random number N t i.Then calculate: M 3 = Nt i ⊕ K i , M 4 = h ( Nt i ⊕ Nr j ) , M 5 = h ( Tid i ⊕ Nt i ) . Label is by information (M 3, M 4, M 5) send to mobile reading device.
(3), after mobile reading device receives message, shared key K is utilized icalculate Nt i, then verify whether set up, if set up and prove that label is legal.First mobile reading device searches whether there is Tid in self i, and verify whether set up.If set up, authentication success.
The invention has the beneficial effects as follows: because mobile wireless radio frequency identification authentication is divided into registration, normal certification and rapid authentication three phases by the method, reduce information interaction times, simplify server, interaction flow between mobile reading device and label three, realize mobile reading device and label, and the certification mutually between two of mobile reading device and background server, meet in actual demand the requirement needing to complete fast when repeatedly reading same label, not only increase authentication efficiency, also assures that the security of system.
Below in conjunction with drawings and Examples, the present invention is elaborated.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the mobile wireless radio frequency identification authentication method that the present invention is based on low cost label.
Fig. 2 is the process flow diagram of the mobile wireless radio frequency identification authentication method registration phase that the present invention is based on low cost label.
Fig. 3 is the process flow diagram of the normal authentication phase of mobile wireless radio frequency identification authentication method that the present invention is based on low cost label.
Fig. 4 is the process flow diagram in the mobile wireless radio frequency identification authentication method rapid authentication stage that the present invention is based on low cost label.
Embodiment
With reference to Fig. 1 ~ 4.This example is for actual mobile RFID system.The detailed process of the inventive method will be described in detail below.Detailed process is divided into three phases: registration phase, normal authentication phase and rapid authentication stage.Implement according to following steps:
The symbol description of variable and computing in embodiment.
(1) registration phase.
First label T and mobile reading device R must register in server S, and after succeeding in registration, mobile reading device R could realize the certification to label T.The inventive method can, by the mandate of server, make mobile reading device can only identify specific label.Such as, if set the shared key of the label of category-A product all as X in the methods of the invention, and the shared key of the label of category-B product is Y.Like this, if the shared key of server to mobile reading device R and label T is set to X during registration, then this mobile reading device can only identify category-A product, and can not identify category-B product.Thus realize the control of mobile reading device authority.Can certainly allow the shared key K of all labels iall identical.Thus legal mobile reading device can to all product identification certifications.
Before authentication protocol runs, registration phase executive system (as production firm, application system etc.) carries out initialization altogether in three steps by escape way to mobile reading device, label and server.
Step 1: store information (Rid j, K i, Sy j, Pk, △ T jwherein △ T j=1) to mobile reading device.
Step 2: store information (K i, Tid i) to label.
Step 3: store information (Rid j, K i, Sy j, △ T j, Tid i, T info, Sk is △ T wherein j=0) to server.
(2) normal authentication phase.
Normal authentication phase is divided into four steps.
Step 1: mobile reading device sends authentication query request.Mobile reading device produces random number N r j, then calculate and M 2=h (Nr j).Mobile reading device is by m 1and M 2send to label.
Step 2: the shared key K that label utilizes oneself to store i, calculate and judge whether set up.If set up, prove that mobile reading device is legal, otherwise label does not respond.After label checking mobile reading device is legal, produce random number N t i.Then calculate: M 3 = Nt i ⊕ K i , M 4 = h ( Nt i ⊕ Nr j ) , M 5 = h ( Tid i ⊕ Nt i ) . Label is by information (M 3, M 4, M 5) send to mobile reading device.
Step 3: after mobile reading device receives message, utilize shared key K icalculate Nt i, then verify whether set up.If set up, prove that label is legal, continue next step process.If be false, prove that label is illegal, abandon certification.After proving that label is legal, first mobile reading device searches whether there is Tid in self i, and verify whether set up.If set up, then authentication success, otherwise mobile reading device counter increases by 1, i.e. △ T j=△ T j+ 1.Then mobile reading device utilizes server public key Pk enciphered message (Rid j, △ T j, Nr j, M 5, Nt i), obtain M 6=E pk(Rid j|| △ T j|| Nr j|| M 5|| Nt i).Mobile reading device is by information M 6send to server.
Step 4: server receives message M 6after, be decrypted with the private key Sk of oneself, namely calculate D sk(M 6), obtain information (Rid j, △ T j, Nr j, M 5, Nt i).First whether whois lookup exists a mobile reading device ID (identity number) and equals Rid jif exist and prove that this mobile reading device is legal, continue authentication processing.If there is no prove that this mobile reading device is illegal, abandon certification.If mobile reading device is legal, to the mobile reading device Rid of server stores jcorresponding △ T jthe △ T obtained is deciphered with private key j' compare.If private key deciphers the △ T obtained j' be not more than the △ T of server stores j, illustrate that this message is message playback, abandon certification.Otherwise, search label information in the server, calculate and judge whether set up, if establishment care label is legal, the △ T that server update stores jfor private key deciphers the △ T obtained j', utilize the symmetric key Sy of mobile reading device jenciphered message (Tid i, T info, Nr j), obtain M 7=E syj(Tid i|| T info|| Nr j).Server is by information M 7send to mobile reading device.
(3) the rapid authentication stage.
The rapid authentication stage is divided into three steps.
Step 1: mobile reading device sends authentication query request.Mobile reading device produces random number N r j, then calculate and M 2=h (Nr j).Mobile reading device is by M 1and M 2send to label.
Step 2: the shared key K that label utilizes oneself to store i, calculate and judge whether set up.If set up, prove that mobile reading device is legal, otherwise label does not respond.If after label checking mobile reading device is legal, produce random number N t i.Then calculate: M 3 = Nt i ⊕ K i , M 4 = h ( Nt i ⊕ Nr j ) , M 5 = h ( Tid i ⊕ Nt i ) . Label is by information (M 3, M 4, M 5) send to mobile reading device.
Step 3: after mobile reading device receives message, utilize shared key K icalculate Nt i, then verify whether set up, if set up and prove that label is legal.First mobile reading device searches whether there is Tid in self i, and verify whether set up.If set up, authentication success, mobile reading device no longer needs to carry out alternately with server, thus realizes rapid authentication, decreases the stand-by period.

Claims (1)

1., based on a mobile wireless radio frequency identification authentication method for low cost label, it is characterized in that comprising the following steps:
Step one, authentication protocol run before registration phase, executive system carries out initialization;
(1) information Rid is stored j, K i, Sy j, Pk, △ T jto mobile reading device, wherein △ T j=1;
(2) information K is stored i, Tid ito label;
(3) information Rid is stored j, K i, Sy j, △ T j, Tid i, T info, Sk to server, wherein △ T j=0;
Wherein, Rid jthe ID (identity number) of a jth mobile reading device, K ithe shared key between mobile reading device and i-th label, Sy jbe the symmetric cryptographic key of jth between mobile reading device and server, Pk is the PKI of server, △ T jthe counter of a jth mobile reading device, Tid ithe ID (identity number) of i-th label, T infobe the details of the commodity of label representative, Sk is the private key of server;
Step 2, normal authentication phase;
(1) mobile reading device sends authentication query request; Mobile reading device produces random number N r j, then calculate M 1=Nr j⊕ K iand M 2=h (Nr j); Mobile reading device is by M 1and M 2send to label;
(2) the label shared key K that utilizes oneself to store i, calculate and judge whether set up; If set up, prove that mobile reading device is legal, otherwise label does not respond; After label checking mobile reading device is legal, produce random number N t i; Then calculate: M 3=Nt i⊕ K i, M 4=h (Nt i⊕ Nr j), M 5=h (Tid i⊕ Nt i); Label is by information M 3, M 4, M 5send to mobile reading device;
(3), after mobile reading device receives message, shared key K is utilized icalculate Nt i, then verify whether set up; If set up, prove that label is legal, continue next step process; If be false, prove that label is illegal, abandon certification; After proving that label is legal, first mobile reading device searches whether there is Tid in self i, and verify whether set up; If set up, then authentication success, otherwise mobile reading device counter increases by 1, i.e. △ T j=△ T j+ 1; Then mobile reading device utilizes server public key Pk enciphered message Rid j, △ T j, Nr j, M 5, Nt i, obtain M 6=E pk(Rid j|| △ T j|| Nr j|| M 5|| Nt i); Mobile reading device is by information M 6send to server;
(4) server receives message M 6after, be decrypted with the private key Sk of oneself, namely calculate D sk(M 6), obtain information Rid j, △ T j, Nr j, M 5, Nt i; First whether whois lookup exists a mobile reading device ID (identity number) and equals Rid jif exist and prove that this mobile reading device is legal, continue authentication processing; If there is no prove that this mobile reading device is illegal, abandon certification; If mobile reading device is legal, to the mobile reading device Rid of server stores jcorresponding △ T jthe △ T obtained is deciphered with private key j' compare; If private key deciphers the △ T obtained j' be not more than the △ T of server stores j, illustrate that this message is message playback, abandon certification; Otherwise, search label information in the server, calculate and judge whether set up, if establishment care label is legal, the △ T that server update stores jfor private key deciphers the △ T obtained j', utilize the symmetric key Sy of mobile reading device jenciphered message Tid i, T info, Nr j, obtain M 7=E syj(Tid i|| T info|| Nr j); Server is by information M 7send to mobile reading device;
Wherein, Nr jthe random number that a jth mobile reading device produces, Nt ibe the random number that i-th label produces, h (.) is one-way Hash function, E pkc () is the public key encryption information c with server, D skc () is the private key decryption information c with server, E syjc () uses symmetric key Sy jenciphered message c;
Step 3, rapid authentication stage;
(1) mobile reading device sends authentication query request; Mobile reading device produces random number N r j, then calculate M 1=Nr j⊕ K iand M 2=h (Nr j); Mobile reading device is by M 1and M 2send to label;
(2) the label shared key K that utilizes oneself to store i, calculate and judge whether set up; If set up, prove that mobile reading device is legal, otherwise label does not respond; If after label checking mobile reading device is legal, produce random number N t i; Then calculate: M 3=Nt i⊕ K i, M 4=h (Nt i⊕ Nr j), M 5=h (Tid i⊕ Nt i); Label is by information M 3, M 4, M 5send to mobile reading device;
(3), after mobile reading device receives message, shared key K is utilized icalculate Nt i, then verify whether set up, if set up and prove that label is legal; First mobile reading device searches whether there is Tid in self i, and verify whether set up; If set up, authentication success.
CN201310050622.0A 2013-02-08 2013-02-08 Based on the mobile wireless radio frequency identification authentication method of low cost label Expired - Fee Related CN103177273B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310050622.0A CN103177273B (en) 2013-02-08 2013-02-08 Based on the mobile wireless radio frequency identification authentication method of low cost label

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310050622.0A CN103177273B (en) 2013-02-08 2013-02-08 Based on the mobile wireless radio frequency identification authentication method of low cost label

Publications (2)

Publication Number Publication Date
CN103177273A CN103177273A (en) 2013-06-26
CN103177273B true CN103177273B (en) 2015-10-21

Family

ID=48637114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310050622.0A Expired - Fee Related CN103177273B (en) 2013-02-08 2013-02-08 Based on the mobile wireless radio frequency identification authentication method of low cost label

Country Status (1)

Country Link
CN (1) CN103177273B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI627551B (en) * 2013-08-29 2018-06-21 Xu yi hong System and method for verifying non-contact sensing tags
CN104883681B (en) * 2015-05-04 2018-05-01 河南理工大学 A kind of mobile RFID mutual authentication method based on Dynamic-shared key
CN105046300B (en) * 2015-07-23 2018-01-09 北京锐安科技有限公司 radio frequency identification authentication method and system
CN106712962B (en) * 2016-12-23 2019-12-24 西安电子科技大学 Bidirectional authentication method and system for mobile RFID system
CN106998252B (en) * 2017-05-18 2019-10-25 西安电子科技大学 Lightweight RFID cluster label authentication method based on cloud database
CN108563969A (en) * 2018-04-26 2018-09-21 深圳市盛路物联通讯技术有限公司 A kind of radio frequency identification authentication method and system
CN109388991B (en) * 2018-09-21 2021-06-18 昆明理工大学 Method for identifying RFID (radio frequency identification) tag by single reader by taking tail code continuous identification quantity as index
CN109714763B (en) * 2018-12-18 2021-08-10 江南大学 Radio frequency identification security authentication method and system
CN111641657B (en) * 2020-06-05 2022-02-11 南京信息工程大学 RFID-based information anonymous retrieval method and system in intelligent medical environment
CN115866586A (en) * 2022-11-02 2023-03-28 周礼真 Intelligent security authentication and identification system based on big data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488854A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Wireless RFID system authentication method and apparatus
CN102497264A (en) * 2011-11-10 2012-06-13 西安电子科技大学 RFID security authentication method based on EPC C-1G-2 standard
CN102868534A (en) * 2012-09-17 2013-01-09 西安电子科技大学 RFID (Radio Frequency Identification) safety certification method based on two-deck searching

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070133807A1 (en) * 2005-12-12 2007-06-14 Electronics And Telecommunications Research Institute Tag authentication apparatus and method for radio frequency identification system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101488854A (en) * 2008-01-18 2009-07-22 华为技术有限公司 Wireless RFID system authentication method and apparatus
CN102497264A (en) * 2011-11-10 2012-06-13 西安电子科技大学 RFID security authentication method based on EPC C-1G-2 standard
CN102868534A (en) * 2012-09-17 2013-01-09 西安电子科技大学 RFID (Radio Frequency Identification) safety certification method based on two-deck searching

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
余恬恬,等.基于Hash函数的RFID挑战-应答认证协议.《计算机工程》.2009,第35卷(第24期),156-161. *
李慧贤.轻量级RFID双向认证协议涉及与分析.《西安电子科技大学学报(自然科学版)》.2012,第39卷(第1期),172-178. *
谌绍巍,等.一种改进的Hash函数RFID双向安全认证协议.《计算机系统应用》.2010,第19卷(第3期),67-70. *

Also Published As

Publication number Publication date
CN103177273A (en) 2013-06-26

Similar Documents

Publication Publication Date Title
CN103177273B (en) Based on the mobile wireless radio frequency identification authentication method of low cost label
He et al. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol
Qingling et al. A minimalist mutual authentication protocol for RFID system & BAN logic analysis
Choi et al. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Jung et al. HRP: A HMAC-based RFID mutual authentication protocol using PUF
CN102510335A (en) RFID (Radio Frequency Identification Device) mutual authentication method based on Hash
Chen et al. An ownership transfer scheme using mobile RFIDs
CN102880891A (en) Radio frequency identification (RFID) safety communication method established according to ultra-lightweight RFID bidirectional authentication protocol
CN103279775A (en) RFID (Radio Frequency Identification) system capable of ensuring confidentiality and data integrity and implementation method thereof
CN104115442A (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
CN104883681A (en) Mobile RFID mutual authentication method based on dynamic shared secret key
Chen et al. A secure ownership transfer protocol using EPCglobal Gen-2 RFID
Picazo-Sanchez et al. Two RFID Standard-based Security protocols for healthcare environments
Jannati et al. Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags
Shariq et al. URASP: An ultralightweight RFID authentication scheme using permutation operation
CN103152181B (en) A kind of RFID data encryption method
CN106027237A (en) Group based key array security authentication protocol in RFID (Radio Frequency Identification) system
CN109766966B (en) RFID tag random number synchronous updating method
Huang et al. An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags
Yang et al. A student information management system based on fingerprint identification and data security transmission
CN104980280A (en) RFID safe authentication method based on Chua's multiscroll chaos sequence
Shi et al. The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security
Chen et al. A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards
Safkhani et al. Cryptanalysis of Chen\textit {et al.}'s RFID Access Control Protocol
He et al. Research on RFID technology security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151021

Termination date: 20160208