CN106066975A - A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic - Google Patents

A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic Download PDF

Info

Publication number
CN106066975A
CN106066975A CN201610374536.9A CN201610374536A CN106066975A CN 106066975 A CN106066975 A CN 106066975A CN 201610374536 A CN201610374536 A CN 201610374536A CN 106066975 A CN106066975 A CN 106066975A
Authority
CN
China
Prior art keywords
label
new
owner
value
old
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610374536.9A
Other languages
Chinese (zh)
Inventor
柳毅
凌捷
刘竹松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610374536.9A priority Critical patent/CN106066975A/en
Publication of CN106066975A publication Critical patent/CN106066975A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Radio RF recognition technology (radio frequency identification, RFID) is the transmission of a kind of contactless information utilizing radiofrequency signal to realize, and passes through the purpose that transmitted information reaches to identify.Have the advantages such as volume little, portable, low cost, life-span length because of it, RFID technique is widely used in the every field such as production, logistics, national defence, traffic.Rfid system generally comprises label, read write line, background data base three part.RFID label tag is in its life cycle, and its owner can change often, and during ownership transfer, the safety of RFID label tag and privacy concern are especially aobvious prominent.The present invention proposes a kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic, is solved the problem that there is safety defect in rfid system during RFID label tag ownership transfer by the method.

Description

A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic
Technical field
The present invention relates to technical field of RFID, particularly to RFID label tag ownership transfer side in a kind of rfid system Method.
Background technology
Radio RF recognition technology (radio frequency identification, RFID) is that one utilizes radio frequency to believe Number realize contactless information transmission, and pass through transmitted information reach identify purpose.Because of it, to have volume little, easy Carry, the advantage such as low cost, life-span length, RFID technique is widely used in the every field such as production, logistics, national defence, traffic.
Rfid system generally comprises label, read write line, background data base three part.RFID label tag in its life cycle, Its owner can change often, and during ownership transfer, the safety of RFID label tag and privacy concern are especially aobvious prominent Go out.RFID label tag is pasted onto on certain part commodity by initial production person, and now the ownership issue of label is in Producer;Work as Producer The when of by this part commodity selling to whole seller, the proprietary rights of label occurs to change for the first time, and now ownership issue is in wholesale Business;When these commodity are sold retailer by whole seller again when, the proprietary rights of label changes again, and now proprietary rights is returned Belong to retailer;Ultimate consumer buys this commodity from retailer's hands, and the proprietary rights of label changes again, now institute Having the right to belong to consumer, in this process, the proprietary rights of label there occurs and repeatedly shifts.Said process relates to label Ownership transfer problem, i.e. label a upper owner need to inform under label complete for the information security of label One user, so that the new owner of label can obtain the information content of label and the follow-up right to use of information;With Time this label former message for new owner, shield completely, after ownership transfer success, label former all Person just loses the control authority to label.
The ownership transfer agreement that Saito et al. proposes needs to introduce trusted third party, adds whole protocol authentication mistake The complexity of journey, little (Saito J, Imamoto K, the Sakurai K.Reassignment scheme of an of practicality RFID tags key for owner transfer[G]//LNCS 3823:Proc of Embedded and Ubiquitous Computing-EUC 2005Workshops.Berlin:Springer,2005:1303–1312.);Osaka Et al. the ownership transfer agreement that proposes can not resist Denial of Service attack, assailant is by using identical random number to ask simultaneously Asking read write line, read write line will return identical response message, thus RFID label tag just can be tracked attacking by assailant (Osaka K,Takagi T,Yamazaki K,et al.An efficient and secure RFID security method with ownership transfer[G]//LNCS 4456:Proc of Computational Intelligence and Security-CIS 2006.Berlin:Springer,2006:778–787.);Fouladgar etc. The ownership transfer agreement that people proposes can not resist impersonation attack, simultaneously as private key Kp and Ku used in label is not every Secondary all can update, so that label is easily tracked (Fouladgar S, Afifi H.An efficient delegation and transfer of ownership protocol for RFID tags[C]//Proc of the 1st Int EURASIP Work shop an RFID Technology.Piscataway,NJ:IEEE,2007:10-14.);Gold Yongming etc. The ownership transfer agreement that people proposes can not resist Denial of Service attack, message of simultaneously resetting, and tab end can be made to repeat to update, Make agreement also cannot resist the defects such as tab end Replay Attack existence (gold Yongming, Wu's chess is crystal-clear. RFID based on PRF is light Magnitude authentication protocol research [J]. Journal of Computer Research and Development, 2014,51 (7): 1506-1514.);Hair is refined handsome et al. to be proposed Ownership transfer agreement can not be resisted Brute Force and be attacked, and random number r1, r2 are plaintext transmission, and assailant is easy to obtain to be somebody's turn to do Information, then carry out a series of enforceable crack just can exhaustive go out key (hair is refined handsome, Sun Dazhi. a kind of new RFID mark Sign ownership transfer agreement [J]. computer engineering, 2015,41 (3): 147-150,166.).Based on narration above, therefore, The RFID label tag ownership transfer agreement of one safety of design has great practical value meaning.
Summary of the invention
The present invention proposes a kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic, passes through the method Solve the problem that there is safety defect in rfid system during RFID label tag ownership transfer.
For solving above-mentioned technical problem, the technical solution used in the present invention is divided into following nine steps:
(1) the former owner of label sends certification request command to label;
(2) current mark bit Status=0, show label ownership issue in the former owner of label, label is to label The former owner send ID_L as response;
(3) the former owner of label verifies the true and false of label, then produces random number r1, calculates the value of A and B the most again, And the value of A and B is passed to label;
(4) the former possessory true and false of label Verification label, then produces random number r2, calculates the value of D, E, F the most again, Finally the value of D, E, F is passed to the former owner of label;
(5) the former owner of label verifies the true and false of label again, and then r2, IDi_L pass to the new owner of label;
(6) new owner of label verifies the true and false of label, then produces random number r3, calculates the value of H, G, P the most again, Finally the value of H, G, P is passed to label;
(7) true and false of the new owner of label Verification label, calculates the value of Q the most again, finally the value of Q is passed to label New owner;
(8) new owner of label verifies the true and false of label again, calculates the value of M the most again, finally the value of M is passed to mark Sign;
(9) true and false of new owner of label verified again by label, is true, then puts flag bit Status=1, show label Ownership issue is in the new owner of label, the success of label ownership transfer.
The present invention compared with prior art, has the advantage that and beneficial effect:
There is certain safety defect problem in existing RFID label tag ownership transfer agreement or tag computation amount is excessive etc. Problem, the RFID label tag ownership transfer agreement of the present invention has the advantage that
(1) method of the Hash computing encrypted transmission discarded tradition, uses bit arithmetic method and modular arithmetic method to biography Transmission information is encrypted, thus reduces the operand of tab end, makes the agreement in the present invention can reach the rank of lightweight;
(2) abandon tab end more new key or the way of false ID, utilize produce in each verification process of label different Random number keeps the freshness of information, thus reduces memory space and the amount of calculation of label;
(3) information of the unique identifier ID of label shared between label and label former (newly) owner is made full use of, The introducing of minimizing information and depositing, is encrypted transmission by the identifier ID of label, as the authority of two-way authentication, thus reduces The carrying cost of tab end;
(4) transmit again after the information simple cryptographic calculation to transmission, it is to avoid assailant directly obtains situation in plain text, Solve the safety defect problem that Brute Force is attacked, improve the safety of agreement.
Accompanying drawing explanation
Fig. 1 is ownership transfer agreement flow chart
Fig. 2 is ownership transfer agreement schematic diagram
Detailed description of the invention
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention do not limit In this.
First the implication of each symbol in this agreement is given:
The former owner of S_old: label;
The new owner of S_new: label;
T: label;
Ti: i-th label;
The left-half (a length of L position) of IDi_L: the identifier ID of i-th label;
The right half part (a length of L position) of IDi_R: the identifier ID of i-th label;
The left-half (a length of L position) of ID_L: label identifier ID;
The right half part (a length of L position) of ID_R: label identifier ID;
The key (a length of L position) shared between Ki_old: i-th label and the former owner S_old of label;
The key (a length of L position) shared between the new owner S_new of Ki_new: i-th label and label;
The key (a length of L position) shared between K_old: label and the former owner S_old of label;
The key (a length of L position) shared between the new owner S_new of K_new: label and label;
Status: label current ownership ownership flag bit, a length of 1Bit.Status=0, represents that label belongs to S_ old;Status=1, represents that label belongs to S_new;
The random number (a length of L position) that the former owner of r1: label generates;
The random number (a length of L position) that r2: label generates;
The random number (a length of L position) that the new owner of r3: label generates;
N: Mersenne number, value is here: n=2L-1;
A, B, D, E, F, H, G, P, Q, M: the communication data (length is L position) in agreement;
[X]L: take the front L position of operation result;
: XOR;
&: with computing.
As other authentication protocols, also make hypothesis below: label former owner S_old and label new owner S_ Transmission channel between new is safe, and the transmission channel between label former owner S_old and label is unsafe, mark The transmission channel signed between new owner S_new and label is unsafe;Share between label former owner S_old and label Key Ki_old be safe, between label new owner S_new and label share key Ki_new be safe, label The IDi_R shared between former owner S_old and label is safe, shares between label new owner S_new and label IDi_R is safe.RFID label tag ownership transfer agreement detailed process is as shown in Figure 2:
To in Fig. 1 occur A, the explanation of B, D, E, F, H, G, P, Q, M:
A=r1 Ki_old;
B=r1 IDi_R;
D=[(r1&r2&K_old&ID_R)2mod n]L, represent the front L position taking [] operation result;
E=r2 K_old;
F=r2 ID_R;
H=r3 Ki_new;
G=r3 IDi_R;
P=[(r3&Ki_new&IDi_R)2mod n]L, represent the front L position taking [] operation result;
Q=[(r2&r3&K_new)2mod n]L, represent the front L position taking [] operation result;
M=[(r2 r3&IDi_R)2mod n]L, represent the front L position taking [] operation result.
Whole ownership transfer agreement implementation step is described as follows:
1. the former owner S_old of label sends transfer label proprietary rights request command Request to label T, opens institute Have the right to shift session;
2. current label T returns S_old to own, i.e. Status=0.Label T receive S_old send come information it After, it is sent to S_old using the ID_L self deposited as response message;
The most former owner S_old, after receiving label T and sending the information come, first searches whether to deposit in data base Equal at IDi_L with ID_L, if not existing, care label is to forge, and agreement terminates at once;If existing, then S_old generates The random number r1 of one a length of L position, then utilizes IDi_R and Ki_old corresponding for r1 with IDi_L to calculate A=r1 The value of Ki_old and B=r1 IDi_R, is finally sent to label T by the value of A and B;
4. label T is after receiving S_old and sending A and the B information come, K_old that first label is deposited with self, ID_R calculates A K_old and B ID_R, and judges that A K_old is the most equal with B ID_R.If unequal, S_ is described Old is to forge, and agreement terminates at once;If equal, then label generates the random number r2 of an a length of L position, then utilizes Calculated random number r1, the random number r2 self generated, K_old and ID_R that self deposit to calculate the value of D, E, F, Finally the value of D, E, F is issued S_old in the lump;
The most former owner S_old is after receiving the information of D, E, F that label transmission comes, and first S_old deposits with self Ki_old, the IDi_R put is to calculate E Ki_old and F IDi_R, and judges that E Ki_old and F IDi_R is the most equal. If unequal, care label T is to forge, and agreement terminates at once;If equal, S_old is with being calculated random number r2, self life The random number r1 become, Ki_old, IDi_R of self depositing are to verify the correctness of D, it may be assumed that
D`=[(r1& (E Ki_old) &Ki_old&IDi_R)2mod n]L
If D` with D is unequal, care label T is to forge, and agreement terminates at once;If D` with D is equal, former owner S_ R2, ID_L are sent to new owner S_new by safe lane by old;
6. new owner S_new is after receiving former owner S_old and sending the information come, and first S_new is in data Searching whether to there is IDi_L with ID_L in storehouse equal, if not existing, illustrating that S_old is to forge, agreement terminates at once;If phase Deng, then S_new generate an a length of L position random number r3, then with self generate random number r3, self deposit with The value of IDi_R and Ki_new that IDi_L is corresponding calculates H, G, P, finally the value of H, G, P is sent to label T in the lump;
7. label T is after receiving S_new and sending H, G, P information come, ID_R, K_ that first label is deposited with self New calculates the value of H K_new, G ID_R, and judges that H K_new and G ID_R is the most equal.If unequal, S_ is described New is to forge, and agreement terminates at once;If equal, label recycle calculated random number r3, the ID_R self deposited, K_new verifies the correctness of P, it may be assumed that
P`=[((H K_new) &K_new&ID_R)2mod n]L
If P` with P is unequal, illustrating that S_new is to forge, agreement terminates at once;If P` with P is equal, then label is used tricks The value of Q, to calculate the value of Q, is finally sent out by the random number r3 that obtains, the random number r2 self generated, the K_new that self deposits Give S_new;
8. new owner S_new receive label T send come Q information after, first S_new generate with self with Machine number r3, Ki_new, the r2 self deposited are to verify the correctness of Q, it may be assumed that
Q`=[(r2&r3&Ki_new)2mod n]L
If Q` with Q is unequal, care label T is to forge, and agreement terminates at once;If Q` with Q` is equal, then S_new exists The value of M, to calculate the value of M, is finally sent to label T by IDi_R, the r2 utilize the random number r3 self generated, self depositing;
9. label T receive S_new send come M information after, first label utilize self generate random number r2, Calculated random number r3, the ID_R self deposited are to verify the correctness of M, it may be assumed that
M`=[(r2 (H K_new) &ID_R)2mod n]L
If M` with M is unequal, illustrating that S_new is to forge, agreement terminates at once;If M` with M is equal, then put Status= 1, label proprietary rights returns S_new to own, and ownership transfer completes.If simultaneously through Status flag bit after a while still without sending out Changing, agreement at once from the 1. step re-execute.
The ultimate principle of the present invention and principal character and advantages of the present invention have more than been shown and described.The technology of the industry Personnel, it should be appreciated that the present invention is not restricted to the described embodiments, simply illustrating this described in above-described embodiment and description The principle of invention, without departing from the spirit and scope of the present invention, the present invention also has various changes and modifications, and these become Change and improvement both falls within scope of the claimed invention.Claimed scope by appending claims and Equivalent defines.

Claims (1)

1. a RFID label tag ownership transfer method based on tag ID and bit arithmetic, the method comprises the steps:
(1) the former owner of label sends certification request command to label;
(2) current mark bit Status=0, show label ownership issue in the former owner of label, former to label of label The owner sends ID_L as response;
(3) the former owner of label verifies the true and false of label, then produces random number r1, calculates the value of A and B the most again, and by A Label is passed to the value of B;A=r1 Ki_old;B=r1 IDi_R;
The key shared between Ki_old: i-th label and the former owner S_old of label;
IDi_R: the right half part of the identifier ID of i-th label;
(4) the former possessory true and false of label Verification label, then produces random number r2, calculates the value of D, E, F the most again, finally The value of D, E, F is passed to the former owner of label;
D=[(r1&r2&K_old&ID_R)2mod n]L
E=r2 K_old;
F=r2 ID_R;
The right half part of ID_R: label identifier ID;
The key shared between K_old: label and the former owner S_old of label;
[X]L: take the front L position of operation result;
(5) the former owner of label verifies the true and false of label again, and then r2, IDi_L pass to the new owner of label;IDi_ L: the left-half of the identifier ID of i-th label;
(6) new owner of label verifies the true and false of label, then produces random number r3, calculates the value of H, G, P the most again, finally The value of H, G, P is passed to label;
H=r3 Ki_new;
G=r3 IDi_R;
P=[(r3&Ki_new&IDi_R)2mod n]L
The key shared between the new owner S_new of Ki_new: i-th label and label;
N: Mersenne number, value is here: n=2L-1;
(7) true and false of the new owner of label Verification label, calculates the value of Q the most again, the value of Q is finally passed to the new institute of label The person of having;
Q=[(r2&r3&K_new)2mod n]L
The key shared between the new owner S_new of K_new: label and label;
(8) new owner of label verifies the true and false of label again, calculates the value of M the most again, finally the value of M is passed to label;
M=[(r2 r3&IDi_R)2mod n]L
(9) true and false of new owner of label verified again by label, is true, then puts flag bit Status=1, shows that label owns Power belongs to the new owner of label, the success of label ownership transfer.
CN201610374536.9A 2016-05-30 2016-05-30 A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic Pending CN106066975A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610374536.9A CN106066975A (en) 2016-05-30 2016-05-30 A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610374536.9A CN106066975A (en) 2016-05-30 2016-05-30 A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic

Publications (1)

Publication Number Publication Date
CN106066975A true CN106066975A (en) 2016-11-02

Family

ID=57421417

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610374536.9A Pending CN106066975A (en) 2016-05-30 2016-05-30 A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic

Country Status (1)

Country Link
CN (1) CN106066975A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106712927A (en) * 2016-11-30 2017-05-24 广东工业大学 Super lightweight group RFID label ownership transfer method based on word synthesis operation
CN107067058A (en) * 2017-03-20 2017-08-18 广东工业大学 A kind of radio frequency identification system label ownership transfer method
CN107086905A (en) * 2017-02-27 2017-08-22 广东工业大学 A kind of RFID tag group ownership transfer method based on quadratic residue theorem
CN107094073A (en) * 2017-02-27 2017-08-25 广东工业大学 A kind of group's RFID tag ownership transfer method based on Chinese remainder theorem
CN108599958A (en) * 2018-04-20 2018-09-28 西安电子科技大学 Extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud
CN109302290A (en) * 2018-08-30 2019-02-01 仲恺农业工程学院 It is a kind of to be mutually authenticated protocol method with ownership transfer
CN111131157A (en) * 2019-11-20 2020-05-08 重庆邮电大学 Multi-party authentication method for radio frequency identification system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855504A (en) * 2011-08-02 2013-01-02 深联致远(北京)科技有限公司 Method and device for ownership transfer of radio frequency identification (RFID) tag
CN103281194A (en) * 2013-06-15 2013-09-04 杨涛 Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN104618340A (en) * 2014-12-31 2015-05-13 蓝盾信息安全技术股份有限公司 Radio Frequency Identification (RFID) ownership transfer method
CN105530263A (en) * 2016-01-08 2016-04-27 广东工业大学 Ultra-lightweight RFID bidirectional authentication method based on label ID

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855504A (en) * 2011-08-02 2013-01-02 深联致远(北京)科技有限公司 Method and device for ownership transfer of radio frequency identification (RFID) tag
CN103281194A (en) * 2013-06-15 2013-09-04 杨涛 Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN104618340A (en) * 2014-12-31 2015-05-13 蓝盾信息安全技术股份有限公司 Radio Frequency Identification (RFID) ownership transfer method
CN105530263A (en) * 2016-01-08 2016-04-27 广东工业大学 Ultra-lightweight RFID bidirectional authentication method based on label ID

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
金永明等: "RFID标签所有权转移协议研究", 《计算机研究与发展》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106712927A (en) * 2016-11-30 2017-05-24 广东工业大学 Super lightweight group RFID label ownership transfer method based on word synthesis operation
CN106712927B (en) * 2016-11-30 2020-07-28 广东工业大学 Ultra-lightweight group RFID label ownership transfer method based on word synthesis operation
CN107086905A (en) * 2017-02-27 2017-08-22 广东工业大学 A kind of RFID tag group ownership transfer method based on quadratic residue theorem
CN107094073A (en) * 2017-02-27 2017-08-25 广东工业大学 A kind of group's RFID tag ownership transfer method based on Chinese remainder theorem
CN107067058A (en) * 2017-03-20 2017-08-18 广东工业大学 A kind of radio frequency identification system label ownership transfer method
CN108599958A (en) * 2018-04-20 2018-09-28 西安电子科技大学 Extra lightweight wireless radio frequency identification mark ownership transfer method based on cloud
CN109302290A (en) * 2018-08-30 2019-02-01 仲恺农业工程学院 It is a kind of to be mutually authenticated protocol method with ownership transfer
CN111131157A (en) * 2019-11-20 2020-05-08 重庆邮电大学 Multi-party authentication method for radio frequency identification system

Similar Documents

Publication Publication Date Title
CN106066975A (en) A kind of RFID label tag ownership transfer method based on tag ID and bit arithmetic
Jangirala et al. Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment
CN105530263B (en) A kind of extra lightweight RFID mutual authentication methods based on tag ID
CN102034123B (en) RFID (Radio Frequency Identification) triple safety certification method based on label ID (Identification) random division
CN103957186B (en) Method for effectively transferring label ownership in RFID system
CN104115442B (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
Fan et al. ULMAP: Ultralightweight NFC mutual authentication protocol with pseudonyms in the tag for IoT in 5G
CN103281194A (en) Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN105721142B (en) RFID system key generation method based on tag ID and device
CN101847199A (en) Security authentication method for radio frequency recognition system
Niu et al. EPC Gen2v2 RFID standard authentication and ownership management protocol
CN102880891A (en) Radio frequency identification (RFID) safety communication method established according to ultra-lightweight RFID bidirectional authentication protocol
CN106228100B (en) A kind of system of RFID tag ownership transfer
CN106998252A (en) Lightweight RFID cluster label authentication methods based on cloud database
CN107147498A (en) A kind of strong anonymous RFID authentication protocols based on Hash functions and Dynamic-shared key
CN104579688B (en) It is a kind of based on Hash function can synchronized update key RFID mutual authentication method
CN101976365A (en) Safe radio frequency identification system
CN103218633A (en) Radio frequency identification (RFID) safety authentication method
CN106936571A (en) Synthesize computing using word to realize the method that single label key is wirelessly generated
CN107040363B (en) Lightweight RFID ownership transfer method and system based on chaotic encryption
CN103560881A (en) Radio frequency identification system safety certification and key agreement method
CN109766966B (en) RFID tag random number synchronous updating method
CN105406971B (en) RFID (radio frequency identification) safety authentication method for intelligent power consumption information acquisition system terminal
CN102622621A (en) Communication method for improving security of radio frequency identification system
Yang et al. An improved hash-based RFID two-way security authentication protocol and application in remote education

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161102

RJ01 Rejection of invention patent application after publication