CN106209768A - A kind of extendible RFID mutual authentication method - Google Patents
A kind of extendible RFID mutual authentication method Download PDFInfo
- Publication number
- CN106209768A CN106209768A CN201610457703.6A CN201610457703A CN106209768A CN 106209768 A CN106209768 A CN 106209768A CN 201610457703 A CN201610457703 A CN 201610457703A CN 106209768 A CN106209768 A CN 106209768A
- Authority
- CN
- China
- Prior art keywords
- reader
- label
- key
- data base
- equal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
Abstract
The invention discloses a kind of extendible RFID mutual authentication method, reader produces the random number r of length L, calculates A in conjunction with identifier UID, and A and request Query is sent to label;Label calculates random number r by A, with r and self storage (K, ID) calculate two authenticity verification values B, C passes to reader, reader sends jointly to background data base together with r after receiving B, C, and background data base first calculates odd bits B of BnMating with the value in the even bit storehouse of shared key, quick-searching is to corresponding (K, ID), and calculates B`, C`, the authenticating tag true and false.As label is legal, background data base current key K and random number r calculates authenticity verification value D, and D is sent to reader, simultaneously more new key K.Reader is sent to label after receiving D, label upon receipt, calculates the true and false of D` certification reader.If reader is legal, then tag update key K.
Description
Technical field
The present invention relates to radio frequency identification (RFID) research field, be specifically related in rfid system a kind of extendible
RFID mutual authentication method.
Background technology
Radio frequency identification (radio frequency identification, RFID) is a crucial skill of Internet of Things
Art, is generally made up of background data base, reader and label 3 part.Reader is sent by sky alignment label and receives letter
Number, automatically identify destination object and obtain relevant information data, information data transmission is further processed to background data base.
RFID provides the function of identification contactless, instant for object and object.Collect quickly and accurately as one and process information
New and high technology, and there is the advantages such as noncontact, wearability, low cost, little, the life-span length of volume, be widely used in supply
In the every field such as chain management, stock's monitoring, transportation, E-Passport, payment system and medical control.
In rfid system, reader and background data base are to be transmitted by the wire message way of safety, it is considered that it
Channel between is safe lane.Read write line is referred to as forward channel to the channel of label, and the channel of label to read write line is referred to as
Backward channel, both channels are all transmitted by wireless signal, are insecure channels, are easily subject to tracking, eavesdropping, vacation
Emit, retransmit and refuse service etc. to attack;Simultaneously as low cost label has, storage is little, running space is limited, computing capability is low
Etc. feature so that complicated AES is very difficult to apply in rfid system.These factors have become and have seriously restricted RFID technique
The key issue of solution is needed in development badly further.
For overcoming the problems referred to above, between 10 years of past, emerge in large numbers substantial amounts of RFID personal secrets protection scheme, as physics is pacified
The proposition in succession of full mechanism and software safety mechanism based on cryptographic technique etc..The former is to use non-cryptography mode such as Kill life
Make, the mechanism protection RFID tag data privacy such as faraday cup, active interference and label jams.Due to the thing employed in RFID
There is many disadvantages in reason security mechanism, then there has been proposed many security mechanisms based on cryptographic technique.It mainly by
The cryptography scheme of various relative maturity and mechanism design and realize meeting the cipher protocol of RFID demand.According to label cost and
The difference of security requirement, can be divided into two classes by RFID security authentication protocol: public key encryp scheme PKC (public
Key crypto) and non-public key encryption system scheme NPKC (non-public key crypto).Based on public key encryp side
What most of safety certifying method of case used is ECC (elliptic curve crypto) algorithm, has the highest safety strong
Degree, but calculate spend bigger so that the cost of label be difficult to reduce, as Godor et al. propose certificate scheme (GODOR,
NORBERT G.Elliptic curve cryptography based mutual authentication protocol
for low computation RFID systems performance analysis by imulations[A]
.2010IEEE International Conference on[C].2010.25-27).Based on non-public key encryption system scheme
What safety authentication protocol mainly used is the hash function computing with certain security intensity, because it is relatively small to calculate cost,
Safety is the highest, uses ratio wide at present, but major part scheme does not all account for the expansible of RFID Verification System
Property.In order to ensure anonymity, labeling requirement sends after being encrypted by the identity information of oneself.Reader must first confirm label simultaneously
Identity just can utilize the private information of label to verify the legitimacy of message, this need background data base attempt all labels
Key information be decrypted, say, that confirm that the cost of label and number of tags are linear, when number of tags is too much
Time determine that label cost is excessive.Scheme (Sarma S E, Weis S A, the Engels D W.RFID that Sarma S E et al. proposes
systems and security and privacy implications[G]//LNCS 2523:Proc of the 4th
Int Workshop on Cryptographic Hardware and Embedded Systems(CHES2002).Berlin:
Springer, 2003:454-469) do not use dynamic refresh mechanism due to ID, metalID keeps constant, label easily by with
Track positions, and (key, ID) sends with plaintext version, and easy stolen hearer obtains;The scheme that Ohkubo M et al. proposes
(Ohkubo M,Suzuki K,Kinoshita S.Hash-chain based forward-secure privacy
protection scheme for low-cost RFID[C]//Proc of the Symp on Cryptography and
Informantion Security.Los Alamitors, CA:IEEE Computer Society, 2004:719-724) only
It is one-way authentication protocol, and this agreement is highly susceptible to retransmit and impersonation attack;Scheme (the LEE S that Lee S M et al. proposes
M,HWANG Y J,LEE D H,et al.Efficient authentication for low-cost RFID systems
[A].Proceedings of International Conference on Com-putational Science and Its
Applications [C] .2005.619-627) owing to solicited message being processed every time, it is impossible to prevent Denial of Service attack;
Wang Shaohui et al. propose scheme (Wang Shaohui, Liu Sujuan, Chen Danwei. meet the expansible RFID two-way authentication side of backward privacy
Case [J]. Journal of Computer Research and Development, 2013,06:1276-1284.) in label and reader the random number r1, r2 that produce be all
Plaintext transmission, and hash function algorithm is all disclosed, assailant can be by exhaustive method breaking cryptographic keys Key value;Jin Yong
Bright et al. propose scheme (gold Yongming, Wu's chess is crystal-clear, Shi Zhiqiang, Lu Xiang, Sun Limin. RFI D light-weight authentication based on PRF is assisted
View research [J]. Journal of Computer Research and Development, 2014,07:1506-1514) safety is higher, but in the program, label produces
Having given birth to random number and improve the cost of label, additionally this agreement needs traversal confirmation tag identity to make background data base amount of calculation
Relatively big, extensibility is the strongest;Scheme (Alomair B, the Cuellar J, Poovendran that Alomair B et al. proposes
R..Scalable RFID systems:A privacy-preserving protocol with constant time
identification[J].IEEE Trans on Parallel and Distributed Systems,2012,23(8):
1-10) scheme (Godor G, the Imre S.Hash-based mutual authentication proposed with Godor G et al.
protocol for low-cost RFID systems[C]//Proc of the 18th EUNICE Conf on
Information and Communications Technologies.Berlin:Springer, 2012:76-87.) although
The mode using assumed name solves expansible problem, but the scheme that Alomair B et al. proposes is not provided that backward personal secrets
Property, and Godor G et al. propose scheme can not resisting asynchronous attack, assailant by reset, forge message so that label and
In reader, the key data of storage is inconsistent, thus destroys the follow-up certification of label and reader.On this basis, Wo Menshe
Counting an expansible safety certifying method based on Rabin algorithm, the method is avoided the defect of such scheme, is made the cost of label
It is substantially reduced, and the query cost of background data base is greatly reduced, there is important Research Significance and use value..
Summary of the invention
The present invention is directed to existing many RFID security certificate schemes Shortcomings and scheme on cost and safety
The aspects such as extensibility is bad, the one of design has good confidentiality, integrity, availability, high efficiency and low cost can
The RFID mutual authentication method of extension.
The purpose of the present invention is realized by following technical scheme: a kind of distensible RFID mutual authentication method, including
Step:
1) reader generates the random number r of an a length of L, is then obtained with shared identifier UID computing by random number r
A, finally that calculated A is sent along to label together with request certification Query order;
2), after label receives request certification Query order and A, first take out the UID self stored, then calculate and extract r,
Finally utilize (K, ID) that label self stores and calculated r to be encrypted calculating, generate two authenticity verification values B, C,
And result of calculation is sent to reader;
3), after reader receives B and C, the data base on backstage is sent in the lump to together with the random number r self produced;
4) background data base is after receiving the information that reader is sent, and first calculates Bn, BnFor the odd bits of B, then with
Element Rapid matching in shared key even bit storehouse, obtains corresponding (K, ID), calculates and generates B`, C`, and whether checking B`, C`
Equal with B, C, if equal, background data base calculates reader authenticity verification value D, and the value of D is sent to reader, simultaneously
More new key K;
5), after reader receives information D that background data base transmission comes, forward that information to label, tag computation at once
Going out D`, D` is the most equal with D in checking, if equal, the most more new key is K, certification success;Otherwise explanation reader is to forge,
Authentification failure.
Preferably, step 1) in the identifier UID that shares of this random number r and all labels and reader carry out XOR
Obtain
Preferably, step 4) the process that realizes be: background data base, after receiving the information that reader is sent, first calculates
Bn(odd bits of B), then in the even bit storehouse of epicycle shared keyIn look for whether exist and BnConsistent value, if existing,
Then find out withCorresponding (Knew, ID), calculate B`=Cro (r, Knew) and
B`, C` are the most equal with B, C in checking, if equal, then carry out step 5, otherwise termination protocol;If not existing, then last round of
The even bit storehouse of shared keyIn look for whether exist and BnConsistent value, if not existing, then termination protocol;No person finds out
WithCorresponding (Kold, ID), calculate B`=Cro (r, Kold) andChecking B
`, C` are the most equal with B, C, if equal, background data base calculates reader authenticity verification value D, and is sent to read by the value of D
Read device, simultaneously more new key K, otherwise termination protocol.
Preferably, step 4) in more new key carry out by following rule:
(1) if. BnWithValue in storehouse is consistent, then background data base more new key is as follows:
Kold=Knew;Knew=[Knew 2mod N]L;
(2) if. BnWithValue in storehouse is consistent, then back-end data library key need not update.
Preferably, step 5) the process that realizes be: reader receives after background data base sends information D come, and will at once
This information is transmitted to label, and tag computation goes out D`=Cro (r, [K2mod N]L), D` is the most equal with D in checking, if equal, the most more
New key is K=[K2mod N]L, certification success;Otherwise explanation reader is to forge, authentification failure.
The present invention compared with prior art, has the advantage that and beneficial effect:
On the basis of this method is the research work in terms of using for reference recent domestic RFID security certificate scheme, design
A kind of based on Rabin algorithm expansible mutual authentication method.The random number of the method is produced by reader rather than label,
The cost of label is greatly reduced;The all of information that in the method, between label and read write line, mutual authentication process is transmitted
All transmit again after encryption, safer compared with traditional transmission means, simultaneously the information in of transmitting procedure all
The most plural variable is unknown for assailant, thus thoroughly avoids assailant and use the method for exhaustion to crack
The potential safety hazard of key;Introduce and intersect bit arithmetic algorithm, assumed name key K and random number r is carried out intersecting bit arithmetic, and general's calculating
Result, as response message, is greatly reduced the query cost of background data base, has ensured certification the most to a certain extent simultaneously
The confidentiality of communication;Introducing the Rabin AES after optimizing replaces the one-way hash function of major part agreement use to encrypt,
In hgher efficiency with in communication capacity calculating.
Accompanying drawing explanation
Fig. 1 is the distensible RFID mutual authentication process flow chart of the present invention.
Fig. 2 is each parameter transmittance process schematic diagram in mutual authentication process of the present invention.
Fig. 3 is that in mutual authentication method of the present invention, intersection bit arithmetic calculates process flow diagram flow chart.
Detailed description of the invention
The present invention is described in further detail below in conjunction with the accompanying drawings, but embodiments of the present invention are not limited to this.
First the implication of each symbol related in method described in the present embodiment is given:
R: reader;
T: label;
DB: background data base;
The identifier that UID: all labels and reader are shared;
ID: tags unique identifier accords with;
Knew: the shared key of epicycle;
The even bit of epicycle shared key;
Kold: last round of shared key;
The even bit of last round of shared key;
The length of L: key;
The Mersenne number of N: selection, N=2L-1;
The random number that r: reader produces;
XOR;
[]L: take the front L position of operation result
Cro (X, Y): intersection bit arithmetic, specifically, if X, Y are the binary system arrays (s is even number) of two s positions, X=
x1x2x3…xs, Y=y1y2y3…ys。xi, yi∈ 0.1}, i=1,2 ... s, the bit arithmetic Cro (X, Y) that intersects is by the odd bits of X
The new array in s position intersected with the even bit of Y and formed, i.e. Cro (X, Y)=y2x1y4x3y6x5…ysxs-1.Cro's (X, Y)
Calculating process in detail is as it is shown on figure 3, take length s=16 here, if X=1010011100101100, Y=
01100101100111, then Cro (X, Y)=1101101100111110.
In the scheme that this method proposes, parameters in the concrete verification process of label, reader and background data base
Transmission sees Fig. 2, wherein A, B, Bn, the explanation of C, D:
B=Cro (r, K);
Bn: the odd bits of B;
Knew=[K2mod N]L;
D=Cro (r, Knew);
Below in conjunction with Fig. 1, the verification process of the present embodiment is described as follows:
1, first reader generates random number r, the identifier then shared by this random number r with all labels and reader
UID carries out XOR and obtainsFinally calculated A is together sent out together with request certification Query order
Give label.
2, after label receives request certification Query order and A, first calculate extractionAnd calculate B, C,
Result of calculation is sent to reader.
3, after reader receives B and C, send the data base on backstage in the lump to together with the random number r self produced.
4, background data base, after receiving the information that reader is sent, first calculates Bn(odd bits of B), then at this
The even bit storehouse of wheel shared keyIn look for whether exist and BnConsistent value, if exist, then find out withCorresponding
(Knew, ID), calculate B`=Cro (r, Knew) and Checking B`, C` whether with B, C phase
Deng, if equal, then carry out step 5, otherwise termination protocol.If not existing, then in the even bit storehouse of last round of shared key
In look for whether exist and BnConsistent value, if not existing, then termination protocol;No person find out withCorresponding (Kold, ID),
Calculate B`=Cro (r, Kold) andB`, C` are the most equal with B, C in checking, if
Equal, then carry out step 5, otherwise termination protocol.
5, background data base calculates reader authentication information D=Cro (r, [K2mod N]L) value, and the value of D is sent to
Reader, and the most more new key:
(1) if. BnWithValue in storehouse is consistent, then background data base more new key is as follows:
Kold=Knew;Knew=[Knew 2mod N]L。
(2) if. BnWithValue in storehouse is consistent, then back-end data library key need not update.
6, after reader receives information D that background data base transmission comes, forward that information to label at once.Tag computation
Go out D`=Cro (r, [K2mod N]L), D` is the most equal with D in checking, if equal, the most more new key is K=[K2mod N]L, recognize
Demonstrate,prove successfully;Otherwise explanation reader is to forge, authentification failure.
The BAN logical form fractional analysis of authentication protocol is given below, and BAN logic is by Burrows, Abadi and Needham
In nineteen ninety propose the logic of modality based on conviction, mainly include three kinds process objects: main body, key, formula.This method is adopted
By BAN logical form fractional analysis method, scheme is carried out Security Proof.It is below the part rule of inference of BAN logic:
(1) message implication rule:It is meant that if P believes that K is the shared key between P and Q, and
P receives the message { X} with K encryption XK, then P believes that Q is transmitted across message X;
(2) message freshness rule:It is meant that if a part for a formula is fresh, then this formula
Be entirely the freshest;
(3) nonce proof rule:It is meant that if message X is fresh, and P believes that Q once sent
Cross X, then P believes that Q believes X;
(4) administration rule:It is meant that if P believes that message X is had jurisdiction by Q, and P believes that Q believes
X, then P believes X;
First the idealized model of scheme is given:
Message 1. R → T:{Query, A}, A are the ciphertexts comprising random number r encryption;
Message 2. T → R:B, C;
Message 3. R → T:D;
The original hypothesis of scheme:
P1:(R believes R and T shared key value K).
P2:(T-phase letter R and T shared key value K).
P3:(R believes that R and T shares identifier ID).
P4:(T-phase letter R and T shares identifier ID).
P5:(R believes the identifier UID that R and T shares).
P6:(the identifier UID that T-phase letter R and T shares).
P7: T | ≡ # (r) (freshness of T-phase letter random number r).
P8: R | ≡ # (r) freshness of random number r (R believe).
P9:(R believes that T is to M2Jurisdiction).
P10:(R believes that T is to M3Jurisdiction).
P11:(T-phase letter R is to M4Jurisdiction).
Security Target:
G1: R | ≡ B, R believe B;G2: R | ≡ C, R believe C;
G3: T | ≡ D, T-phase letter D.
Analysis ratiocination:
2. obtained by message(R once received the B that disappears), and by original hypothesis P1And message implication rule(R believes that T is transmitted across message M for | the ≡ T |~B that obtains R2)。
By assuming P7 and message freshness ruleObtain R | ≡ # (B).
| ≡ T |~B, R by the R derived | ≡ # (B) and nonce proof ruleObtain R |
≡ T | ≡ B (R believes that T-phase believes B).
| ≡ T | ≡ B, initial state assumption P by R9And administration ruleR can be obtained | ≡ B.Therefore, target G1
Must demonstrate,prove.
Using above-mentioned condition and rule, proving by the same methods obtains G2And G3.Here is omitted.
Above-described embodiment is the present invention preferably embodiment, but embodiments of the present invention are not by above-described embodiment
Limit, the change made under other any spirit without departing from the present invention and principle, modify, substitute, combine, simplify,
All should be the substitute mode of equivalence, within being included in protection scope of the present invention.
Claims (5)
1. an extendible RFID mutual authentication method, it is characterised in that include step:
1) reader generates the random number r of an a length of L, then with shared identifier UID computing, random number r is obtained A,
After by calculated A together with request certification Query order sent along to label;
2), after label receives request certification Query order and A, first take out the UID self stored, then calculate and extract r, finally
Utilize (K, ID) that label self stores and calculated r to be encrypted calculating, generate two authenticity verification values B, C, and will
Result of calculation is sent to reader;
3), after reader receives B and C, the data base on backstage is sent in the lump to together with the random number r self produced;
4) background data base is after receiving the information that reader is sent, and first calculates Bn, BnFor the odd bits of B, then with share
Element Rapid matching in key even bit storehouse, obtains corresponding (K, ID), calculates and generates B`, C`, checking B`, C` whether with B,
C is equal, if equal, background data base calculates reader authenticity verification value D, and the value of D is sent to reader, updates simultaneously
Key K;
5) after reader receives information D that background data base transmission comes, forwarding that information to label, tag computation goes out D at once
`, D` is the most equal with D in checking, if equal, the most more new key is K, certification success;Otherwise explanation reader is to forge, certification
Failure.
Method the most according to claim 1, it is characterised in that: step 1) in this random number r and all labels and reader
The identifier UID shared carries out XOR and obtains
Method the most according to claim 1, it is characterised in that: step 4) the process that realizes be: background data base receive
After the information that reader is sent, first calculate Bn(odd bits of B), then in the even bit storehouse of epicycle shared keyIn
Look for whether to exist and BnConsistent value, if exist, then find out withCorresponding (Knew, ID), calculating B`=Cro (r,
Knew) andB`, C` are the most equal with B, C in checking, if equal, then carry out step 5, no
Then termination protocol;If not existing, then in the even bit storehouse of last round of shared keyIn look for whether exist and BnConsistent value,
If not existing, then termination protocol;No person find out withCorresponding (Kold, ID), calculate B`=Cro (r, Kold) and B`, C` are the most equal with B, C in checking, if equal, background data base calculates the reader true and false and tests
Card value D, and the value of D is sent to reader, more new key K, otherwise termination protocol simultaneously.
Method the most according to claim 1, it is characterised in that: step 4) in more new key carry out by following rule:
(1) if. BnWithValue in storehouse is consistent, then background data base more new key is as follows:
Kold=Knew;
(2) if. BnWithValue in storehouse is consistent, then back-end data library key need not update.
Method the most according to claim 1, it is characterised in that: step 5) the process that realizes be: reader receives rear number of units
After sending, according to storehouse, information D come, forwarding that information to label, tag computation goes out D`=Cro (r, [K at once2 mod N]L), test
D` is the most equal with D for card, if equal, the most more new key is K=[K2 mod N]L, certification success;Otherwise explanation reader is pseudo-
Make, authentification failure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610457703.6A CN106209768B (en) | 2016-06-20 | 2016-06-20 | A kind of expansible RFID mutual authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610457703.6A CN106209768B (en) | 2016-06-20 | 2016-06-20 | A kind of expansible RFID mutual authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106209768A true CN106209768A (en) | 2016-12-07 |
CN106209768B CN106209768B (en) | 2019-08-02 |
Family
ID=57461529
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610457703.6A Expired - Fee Related CN106209768B (en) | 2016-06-20 | 2016-06-20 | A kind of expansible RFID mutual authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209768B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603228A (en) * | 2016-12-21 | 2017-04-26 | 广东工业大学 | RFID key wireless generation method based on Rabin encryption |
CN107395354A (en) * | 2017-06-02 | 2017-11-24 | 广东工业大学 | A kind of mobile RFID system authentication method of lightweight |
CN107403211A (en) * | 2017-08-03 | 2017-11-28 | 广东工业大学 | A kind of method and system of mobile RFID certification |
CN108229602A (en) * | 2016-12-22 | 2018-06-29 | 蓝盾信息安全技术有限公司 | A kind of RFID bidirectional identity authentication system and methods based on ECC |
CN110348860A (en) * | 2019-06-18 | 2019-10-18 | 佛山市第一人民医院(中山大学附属佛山医院) | Anti-counterfeiting authentication method and device for two-dimensional code of ephedrine drugs |
CN110598811A (en) * | 2019-08-23 | 2019-12-20 | 吴彬 | Off-line anti-counterfeiting identification method for vehicle filter element |
CN110677401A (en) * | 2019-09-24 | 2020-01-10 | 桂林电子科技大学 | RFID system group label authentication method based on Chinese remainder theorem |
CN112291190A (en) * | 2020-07-28 | 2021-01-29 | 国网思极网安科技(北京)有限公司 | Identity authentication method, terminal and server |
CN112364339A (en) * | 2020-08-21 | 2021-02-12 | 中国科学院信息工程研究所 | Improved safe lightweight RFID authentication method |
CN112487839A (en) * | 2020-12-15 | 2021-03-12 | 重庆西南集成电路设计有限责任公司 | Anti-copy RFID safety system |
TWI723422B (en) * | 2019-06-13 | 2021-04-01 | 永豐泰科技企業有限公司 | RFID electronic label anti-counterfeiting encryption method and electronic label |
CN112636919A (en) * | 2020-12-08 | 2021-04-09 | 上海师范大学 | Safety analysis and verification method for NLSR (non-line-scanning) safety model of BAN-n logic |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100834714B1 (en) * | 2007-04-12 | 2008-06-02 | 경북대학교 산학협력단 | Authentication method in radio frequency identification system, and system thereof |
US20100161999A1 (en) * | 2008-12-19 | 2010-06-24 | University Of Washington | Scalable RFID systems: a privacy preserving protocol with constant-time identification |
CN103338110A (en) * | 2013-06-19 | 2013-10-02 | 广东工业大学 | Dynamic ID based RFID safety authentication method with search secret key |
CN104885404A (en) * | 2012-11-12 | 2015-09-02 | 奥林奇公司 | Method of mutual authentication between a radio tag and a reader |
CN105530263A (en) * | 2016-01-08 | 2016-04-27 | 广东工业大学 | Ultra-lightweight RFID bidirectional authentication method based on label ID |
-
2016
- 2016-06-20 CN CN201610457703.6A patent/CN106209768B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100834714B1 (en) * | 2007-04-12 | 2008-06-02 | 경북대학교 산학협력단 | Authentication method in radio frequency identification system, and system thereof |
US20100161999A1 (en) * | 2008-12-19 | 2010-06-24 | University Of Washington | Scalable RFID systems: a privacy preserving protocol with constant-time identification |
CN104885404A (en) * | 2012-11-12 | 2015-09-02 | 奥林奇公司 | Method of mutual authentication between a radio tag and a reader |
CN103338110A (en) * | 2013-06-19 | 2013-10-02 | 广东工业大学 | Dynamic ID based RFID safety authentication method with search secret key |
CN105530263A (en) * | 2016-01-08 | 2016-04-27 | 广东工业大学 | Ultra-lightweight RFID bidirectional authentication method based on label ID |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603228A (en) * | 2016-12-21 | 2017-04-26 | 广东工业大学 | RFID key wireless generation method based on Rabin encryption |
CN108229602A (en) * | 2016-12-22 | 2018-06-29 | 蓝盾信息安全技术有限公司 | A kind of RFID bidirectional identity authentication system and methods based on ECC |
CN107395354A (en) * | 2017-06-02 | 2017-11-24 | 广东工业大学 | A kind of mobile RFID system authentication method of lightweight |
CN107395354B (en) * | 2017-06-02 | 2020-07-28 | 广东工业大学 | Lightweight mobile RFID system authentication method |
CN107403211A (en) * | 2017-08-03 | 2017-11-28 | 广东工业大学 | A kind of method and system of mobile RFID certification |
TWI723422B (en) * | 2019-06-13 | 2021-04-01 | 永豐泰科技企業有限公司 | RFID electronic label anti-counterfeiting encryption method and electronic label |
CN110348860A (en) * | 2019-06-18 | 2019-10-18 | 佛山市第一人民医院(中山大学附属佛山医院) | Anti-counterfeiting authentication method and device for two-dimensional code of ephedrine drugs |
CN110598811A (en) * | 2019-08-23 | 2019-12-20 | 吴彬 | Off-line anti-counterfeiting identification method for vehicle filter element |
CN110677401A (en) * | 2019-09-24 | 2020-01-10 | 桂林电子科技大学 | RFID system group label authentication method based on Chinese remainder theorem |
CN110677401B (en) * | 2019-09-24 | 2021-07-30 | 桂林电子科技大学 | RFID system group label authentication method based on Chinese remainder theorem |
CN112291190A (en) * | 2020-07-28 | 2021-01-29 | 国网思极网安科技(北京)有限公司 | Identity authentication method, terminal and server |
CN112291190B (en) * | 2020-07-28 | 2022-10-14 | 国网思极网安科技(北京)有限公司 | Identity authentication method, terminal and server |
CN112364339A (en) * | 2020-08-21 | 2021-02-12 | 中国科学院信息工程研究所 | Improved safe lightweight RFID authentication method |
CN112364339B (en) * | 2020-08-21 | 2022-07-12 | 中国科学院信息工程研究所 | Improved safe lightweight RFID authentication method |
CN112636919A (en) * | 2020-12-08 | 2021-04-09 | 上海师范大学 | Safety analysis and verification method for NLSR (non-line-scanning) safety model of BAN-n logic |
CN112636919B (en) * | 2020-12-08 | 2022-10-18 | 上海师范大学 | Safety analysis and verification method for NLSR (non-line-scanning) safety model of BAN-n logic |
CN112487839A (en) * | 2020-12-15 | 2021-03-12 | 重庆西南集成电路设计有限责任公司 | Anti-copy RFID safety system |
CN112487839B (en) * | 2020-12-15 | 2022-09-20 | 重庆西南集成电路设计有限责任公司 | Anti-copy RFID safety system |
Also Published As
Publication number | Publication date |
---|---|
CN106209768B (en) | 2019-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106209768B (en) | A kind of expansible RFID mutual authentication method | |
CN100559393C (en) | RFID label and reader thereof, reading system and safety certifying method | |
Song et al. | RFID authentication protocol for low-cost tags | |
Zhou et al. | A lightweight anti-desynchronization RFID authentication protocol | |
CN110381055B (en) | RFID system privacy protection authentication protocol method in medical supply chain | |
CN101529791A (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
CN110737915B (en) | Anti-quantum-computation anonymous identity recognition method and system based on implicit certificate | |
CN103532718A (en) | Authentication method and authentication system | |
CN104333539A (en) | RFID security authentication method based on Chebyshev mapping | |
CN108566385B (en) | Bidirectional authentication method based on cloud efficient privacy protection | |
Gódor et al. | Hash-based mutual authentication protocol for low-cost RFID systems | |
CN106027237A (en) | Group based key array security authentication protocol in RFID (Radio Frequency Identification) system | |
Cui et al. | Lightweight asymmetric privacy-preserving authentication protocols secure against active attack | |
CN109766966B (en) | RFID tag random number synchronous updating method | |
Liu | An efficient RFID authentication protocol for low-cost tags | |
Peris-Lopez et al. | Lightweight cryptography for low-cost RFID tags | |
Huang et al. | An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags | |
Xiaohong et al. | RFID mutual-authentication protocol with synchronous updated-keys based on Hash function | |
Xiaoqin et al. | Time-stamp based mutual authentication protocol for mobile RFID system | |
Eghdamian et al. | A secure protocol for ultralightweight radio frequency identification (RFID) tags | |
Habibi et al. | Cryptanalysis of two mutual authentication protocols for low-cost RFID | |
Niu et al. | An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems | |
Ren et al. | A mutual authentication protocol for low-cost RFID system | |
Cui et al. | Design and analysis of secure mechanisms based on tripartite credibility for RFID systems | |
Zhang | An enhanced lightweight authentication protocol for low-cost RFID systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190802 Termination date: 20200620 |
|
CF01 | Termination of patent right due to non-payment of annual fee |