CN107977696A - A kind of label ownership transfer method - Google Patents
A kind of label ownership transfer method Download PDFInfo
- Publication number
- CN107977696A CN107977696A CN201711328185.9A CN201711328185A CN107977696A CN 107977696 A CN107977696 A CN 107977696A CN 201711328185 A CN201711328185 A CN 201711328185A CN 107977696 A CN107977696 A CN 107977696A
- Authority
- CN
- China
- Prior art keywords
- label
- rfid system
- key
- owner
- new
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
- H04L1/1607—Details of the supervisory signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of label ownership transfer method, the authentication between the label original owner and RFID system label is completed by quadratic residue theorem, the authentication between label new owner and RFID system label is completed by quadratic residue theorem, is realized by quadratic residue theorem to complete transfer of the label ownership between the label original owner and label new owner.Solves the technical problem how a kind of safe label ownership transfer method is provided to a certain extent.
Description
Technical field
The present invention relates to technical field of RFID, more specifically to a kind of label ownership transfer method.
Background technology
With the development of radio frequency identification (Radio Frequency Identification, RFID) technology, RFID
Technology is widely used to the fields such as logistics management, identification, tracing, access control, in such applications, RFID skills
The safety problem of label ownership transfer is increasingly paid attention in art.
In the transfer process of label ownership, the identity information and key information of label can be from the owners of current label
New label owner is transferred to, so after ensureing label ownership transfer, label information that former label owner possesses
To fail immediately, it is impossible to carry out legitimate authentication with label again, ensure unique validity of new label owner;And for new label
Owner, it cannot be traceable to the related data of former owner after obtaining ownership according to existing label information, ensure that original possesses
The secret privacy of person.
In conclusion how to provide a kind of safe label ownership transfer method be current those skilled in the art urgently
Solve the problems, such as.
The content of the invention
The object of the present invention is to provide a kind of label ownership transfer method, it can solve how to provide to a certain extent
A kind of technical problem of safe label ownership transfer method.
To achieve these goals, the present invention provides following technical solution:
A kind of label ownership transfer method, including:
The label original owner generates random number r1, sends authentication command and r1 to RFID system label;
The RFID system label generates random number r2, and based on quadratic residue theorem generate M1 corresponding with r1, r2,
M2, M3 and M4, send M2, M3, M4 to the label original owner;
The label original owner verifies the true and false of the RFID system label based on M2, M3, M4, if vacation, then terminates
Agreement;If true, then continue subsequent step;
M5, more new key key_old is calculated in the label original owner, sends M5 to the RFID system label;
The RFID system label verifies the true and false of the label original owner based on M5, if vacation, then termination protocol;If
It is true, then continues subsequent step;
The RFID system tag update key key, and send ACK1 to the label original owner and determine message;
The label original owner initiates the request of label ownership transfer to label new owner;
The label new owner generates random number r3, based on the generation of quadratic residue theorem M6, M7 corresponding with r3, and to
The RFID system label sends M6, M7;
The RFID system label verifies the true and false of the label new owner based on M6, M7, if vacation, then terminates association
View, if true, then continues subsequent step;
R3, more new key t is calculated based on M6, M7 in the RFID system label, and is sent out to the label new owner
ACK2 is sent to determine message;
The label new owner receives the ACK2 and determines message, to represent the success of label ownership transfer;
Wherein, M1, M2, M3, M4, M5, M6, M7 are the communication data in label ownership transfer.
Preferably, the RFID system label generation random number r2, and it is corresponding with r1, r2 based on the generation of quadratic residue theorem
M1, M2, M3 and M4, including:
The RFID system label generation random number r2;
Key key between the RFID system label and the label original owner is decomposed into left and right two parts<key_
L、key_R>, M1 and M2 is calculated;
M1 and M2 are encrypted respectively based on quadratic residue theorem, obtain M3 and M4;
Wherein,M3=(M1 | | r1)2mod m;
M4=(r2)2mod m。
Preferably, the label original owner verifies the true and false of the RFID system label based on M2, M3, M4, including:
The label original owner is decrypted M2, M3 and M4 that itself is received based on quadratic residue theorem, obtains
Four roots of M1 and r2, the value of r2 is determined according to M1 and r1, wherein,
Judge whether Random is equal with M2, if equal, termination protocol, if unequal, the value of Random is determined
For the value of M2, continue subsequent step;
Search the combination of legitimate tag, including tag identity mark ID, key, the RFID system label and the label
Last round of key key_old between the former owner;
M2 is calculated in the combination of legitimate tag based on lookup, judge the M2 that itself is calculated whether with the RFID
The M2 that system label is sent is equal, if unequal, then it represents that the RFID system label is to forge, if equal, shows institute
It is legal to state RFID system label.
Preferably, M5, more new key key_old is calculated in the label original owner, including:
M5, more new key key_old is calculated based on ID, r2 and key_L that itself is stored in the label original owner;
Wherein,Key_old=key,
Preferably, the RFID system label verifies the true and false of the label original owner based on M5, including:
M5 is calculated based on ID, r2 and key_L that itself is stored in the RFID system label, judges that itself is calculated
M5 whether with the label original owner send M5 it is identical, if identical, judge that the label original owner is legal, if
Differ, then judge that the label original owner is illegal.
Preferably, the label new owner generates random number r3, based on quadratic residue theorem generate M6 corresponding with r3,
M7, including:
The label new owner generates random number r3, and M6, M7 corresponding with ID, r3 are generated based on quadratic residue theorem;
Wherein,T=(r3)2Mod m,
Preferably, the RFID system label verifies the true and false of the label new owner based on M6, M7, including:
The RFID system label decrypts r3 based on M6, M7, and M6 is calculated based on r3, judges what itself was calculated
Whether M6 and the M6 that the label new owner sends are identical, if differing, it is illegal to verify the label new owner,
If identical, it is legal to verify the label new owner.
Preferably, r3, more new key t is calculated based on M6, M7 in the RFID system label, including:
R3 is calculated based on M6 and ID in the RFID system label, based on r3 and M7 more new key t;
Wherein,
A kind of label ownership transfer method provided by the invention, the label original owner is completed by quadratic residue theorem
With the authentication between RFID system label, completed by quadratic residue theorem between label new owner and RFID system label
Authentication, realize by quadratic residue theorem to complete label ownership in the label original owner and label new owner
Between transfer.Solves the technical problem how a kind of safe label ownership transfer method is provided to a certain extent.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of label ownership transfer method provided in an embodiment of the present invention;
Fig. 2 is a kind of transfer flow figure of label ownership transfer method provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work
Embodiment, belongs to the scope of protection of the invention.
First the symbol applied during a kind of label ownership transfer provided in an embodiment of the present invention is illustrated:
T_old represents the label original owner;T_new represents label new owner;T represents RFID system label;ID is represented
RFID system tag identity identifies;Key represents current shared key between RFID system label and the label original owner;key_old
Represent last round of key between RFID system label and the label original owner;Key_L, key_R represent the left and right two of key key
Point;T represents the shared key between RFID system label and label new owner;RFID system label is taken turns in Random expressions to produce
Random number;R1 represents the random number of label original owner generation;R2 represents the random number of RFID system label generation;R3 is represented
The random number of label new owner generation;M represents the product of two Big primes;M1、M2、M3、M4、M5、M6、M7、ACK1、ACK2
It is the communication data during label ownership transfer;⊕ represents XOR operation;& is represented and computing.
The symbol occurred in Fig. 2 is illustrated:
M3=(M1 | | r1)2mod m;
M4=(r2)2mod m;
T=(r3)2mod m。
Please refer to Fig.1 and Fig. 2, Fig. 1 are a kind of flow chart of label ownership transfer method provided in an embodiment of the present invention;
Fig. 2 is a kind of transfer flow figure of label ownership transfer method provided in an embodiment of the present invention.
A kind of label ownership transfer method provided in an embodiment of the present invention, may comprise steps of:
Step S101:The label original owner generates random number r1, sends authentication command and r1 to RFID system label.
The label original owner mentioned here refers to the former owner of label ownership;Random number r1 mentioned here can
To be that the label original owner generates by randomizer.The label original owner sends authentication command to RFID system label
It is to prompt RFID system label to start to verify the true or false of the label original owner.
Step S102:RFID system label generates random number r2, and corresponding with r1, r2 based on the generation of quadratic residue theorem
M1, M2, M3 and M4, send M2, M3, M4 to the label original owner.
Quadratic residue theorem brief introduction:If m is a very big composite number, x is remembered2≡ a (modm) divide exactly x for m2- a has solution, then
A is referred to as the quadratic residue of mould m.Because m is very big, attacker is difficult to the explicit value for obtaining m, therefore can ensure that quadratic residue is encrypted
The security of data;And for legitimate correspondence both sides, the factorization of m is the result is that mutually know, therefore can pass through solution
Equation obtains the value of k b, ciphertext data.
Encryption based on quadratic residue theorem, decryption principle are as follows:
Public, private key generation:Two Big primes p, q are randomly selected, form 4k+3, i.e. p ≡ q ≡ 3mod4, calculate m=p*
q.Wherein using m as public key, p, q are as private key;
Encryption:a≡x2(modm), a is returned;
Decryption:According to p, q, a decryption b, wherein C () represent Chinese remainder theorem:
b1=a(p+1)/4modp;b2=-(a(p+1)/4)modp;b3=a(q+1)/4modq;b4=-(a(q+1)/4)modq;
x1=C (b1,b3,p,q);x2=C (b1,b4,p,q);x3=C (b2,b3,p,q);x4=C (b2,b4,p,q);
X1, x2, x3, x4 are returned, it is different as a result, therefore in the application because can obtain four after decryption, it is also necessary to follow-up
Calculate, so that it is determined that unique solution.In the present invention, quadratic residue theorem is combined with random number, can causes label ownership
Tag identity mark ID redundancies in transfer process, so as to fast and effectively extract ciphertext, and are not easy by attacker
Attack.
Step S103:The true and false of the label original owner based on M2, M3, M4 verification RFID system label, if vacation, then terminates
Agreement;If true, then continue subsequent step.
During label ownership transfer, attacker's possible spoofing is into RFID system label, and from label, the original owner obtains
Label information is taken, so the label original owner needs to verify the true and false of RFID system label, if true, then continues subsequent step,
If vacation, then termination protocol.
Step S104:M5, more new key key_old is calculated in the label original owner, sends M5 to RFID system label.
The label original owner can calculate after verification RFID system label is very according to the label information that itself is preserved
To M5, more new key key_old, and M5 is sent to RFID system label, so as to the RFID system label Verification label original owner
The identity true and false.Here more new key key_old is that the identity between next secondary label original owner and RFID system label is tested
Card is prepared.
Step S105:The true and false of the RFID system label based on the M5 verification label original owners, if vacation, then termination protocol;
If true, then continue subsequent step.
In the transfer process of label ownership, attacker's possible spoofing is into the label original owner, from RFID system label
Label information is obtained, so the true and false of the RFID system labeling requirement verification label original owner, if true, then continues follow-up step
Suddenly, if vacation, then termination protocol.
Step S106:RFID system tag update key key, and send ACK1 to the label original owner and determine message.
RFID system label after the identity of the verification label original owner is very, can more new key key, it is and former to label
The owner sends ACK1 and determines message.RFID system tag update key key be in order to prevent the label original owner in label institute
Have the right after the completion of transfer, obtain label information from RFID system label again, namely in order to ensure the uniqueness of label ownership.
RFID system label sends ACK1 to the label original owner and determines that message is to inform that the label original owner can be by label ownership
It is transferred to label new owner.
Step S107:The label original owner initiates the request of label ownership transfer to label new owner.
The label original owner, can be to the new institute of label after the ACK1 confirmation messages of RFID system label transmission are received
The person of having initiates the request of label ownership transfer.
Step S108:Label new owner generates random number r3, based on quadratic residue theorem generate M6 corresponding with r3,
M7, and send M6, M7 to RFID system label.
Label new owner is after the label ownership transfer request of label original owner transmission is received, and just generation is random
Number r3, and M6, M7 corresponding with r3 are generated based on quadratic residue theorem, and M6, M7 are sent to RFID system label, so as to RFID
System label verifies the true or false of label new owner according to M6, M7.
Step S109:The true and false of the RFID system label based on M6, M7 verification label new owner, if vacation, then terminates association
View, if true, then continues subsequent step.
During label ownership transfer, attacker's possible spoofing obtains label information into label new owner, so
The true or false of label new owner is verified in RFID system labeling requirement, and if vacation, then termination protocol, if true, then continues follow-up
Step.
Step S110:R3, more new key t is calculated based on M6, M7 in RFID system label, and is sent out to label new owner
ACK2 is sent to determine message.
RFID system label, can be according to r3 more new key t, to ensure after the identity of verification label new owner is very
Label ownership only returns label new owner, and sends ACK2 to label new owner and determine message.
Step S111:Label new owner receives ACK2 and determines message, to represent the success of label ownership transfer;
Wherein, M1, M2, M3, M4, M5, M6, M7 are the communication data in label ownership transfer.
Label new owner receive RFID system label transmission ACK2 determine message after, just represent label ownership into
Work(is transferred to label new owner by the label original owner.
A kind of label ownership transfer method provided by the invention, the label original owner is completed by quadratic residue theorem
With the authentication between RFID system label, completed by quadratic residue theorem between label new owner and RFID system label
Authentication, realize by quadratic residue theorem to complete label ownership in the label original owner and label new owner
Between transfer.Solves the technical problem how a kind of safe label ownership transfer method is provided to a certain extent.
In a kind of label ownership transfer method provided in an embodiment of the present invention, RFID system label generates in step S102
Random number r2, and M1, M2, M3 and M4 corresponding with r1, r2 are generated based on quadratic residue theorem, it is specifically as follows:
RFID system label generation random number r2;
Key key between RFID system label and the label original owner is decomposed into left and right two parts<key_L、key_R>,
M1 and M2 is calculated;
M1 and M2 are encrypted respectively based on quadratic residue theorem, obtain M3 and M4;
Wherein,M3=(M1 | | r1)2mod m;
M4=(r2)2mod m。
The label original owner verifies the true or false of RFID system label, namely ID, key that verification RFID system label possesses
Deng whether consistent with ID, key of itself preservation etc.;So RFID can combine quadratic residue theorem to owned ID,
Key etc. is encrypted, and encrypted communication data is sent to the label original owner.
In a kind of label ownership transfer method provided in an embodiment of the present invention, the step S103 label original owners are based on
M2, M3, M4 verify the true and false of RFID system label, are specifically as follows:
The label original owner is decrypted M2, M3 and M4 that itself is received based on quadratic residue theorem, obtain M1 and
Four roots of r2, the value of r2 is determined according to M1 and r1, wherein, r2=ID ⊕ M1 ⊕ r1;
Judge whether Random is equal with M2, if equal, termination protocol, if unequal, the value of Random is determined
For the value of M2, continue subsequent step;
Search the combination of legitimate tag, including tag identity mark ID, key, RFID system label and the label original owner
Between last round of key key_old;
M2 is calculated in the combination of legitimate tag based on lookup, judge the M2 that itself is calculated whether with RFID system
The M2 that label is sent is equal, if unequal, then it represents that RFID system label is to forge, if equal, shows RFID system mark
Label are legal.
Here it is to assign the value of M2 to Random the value of Random to be determined as the value of M2, is next secondary label original owner
The true or false of verification RFID system label is prepared.
In a kind of label ownership transfer method provided in an embodiment of the present invention, the step S104 label original owners calculate
To M5, more new key key_old, it is specifically as follows:
M5, more new key key_old is calculated based on ID, r2 and key_L that itself is stored in the label original owner;
Wherein,Key_old=key,
The true and false of the RFID system label Verification label original owner, namely ID, key of the owner's preservation of verification label original etc.
Whether information is consistent with the information such as ID, key that itself is preserved;So the label original owner can encrypt ID, key_L and r2
After be sent to RFID system label, and with new key key_old, prepare for verification next time.
In a kind of label ownership transfer method provided in an embodiment of the present invention, RFID system label is based in step S105
M5 verifies the true and false of the label original owner, is specifically as follows:
M5 is calculated based on ID, r2 and key_L that itself is stored in RFID system label, judges the M5 itself being calculated
It is whether identical with the M5 that the label original owner sends, if identical, judge that the outgoing label original owner is legal, if differing, sentence
The disconnected outgoing label original owner is illegal.
M5 can be calculated according to ID, r2 and key_old that itself is stored in verification process for simplicity, RFID system,
Then judge whether the M5 itself being calculated is consistent with the M5 that the label original owner sends, if unanimously, the label original owner
Legal, if inconsistent, the label original owner is illegal.
In a kind of label ownership transfer method provided in an embodiment of the present invention, step S108 labels new owner generation with
Machine number r3, generates M6, M7 corresponding with r3 based on quadratic residue theorem, is specifically as follows:
Label new owner generates random number r3, and M6, M7 corresponding with ID, r3 are generated based on quadratic residue theorem;
Wherein,T=(r3)2Mod m,
During label ownership transfer, ID can be transferred to label new owner by the label original owner, so label
New owner can allow the RFID system label Verification true or false of itself by ID.
In a kind of label ownership transfer method provided in an embodiment of the present invention, RFID system label is based in step S109
M6, M7 verify the true and false of label new owner, are specifically as follows:
RFID system label decrypts r3 based on M6, M7, and M6 is calculated based on r3, judge the M6 that itself is calculated with
Whether the M6 that label new owner sends is identical, if differing, verification outgoing label new owner is illegal, if identical, tests
It is legal to demonstrate,prove outgoing label new owner.
In order to facilitate verification, RFID system label first can decrypt r3 according to M6, M7, then further according to r3 and itself deposit
M6 is calculated in the ID of storage, judges whether the M6 itself being calculated is consistent with the M6 that label new owner sends, if unanimously,
Label new owner is legal, if inconsistent, label new owner is illegal.
In a kind of label ownership transfer method provided in an embodiment of the present invention, RFID system label is based in step S110
R3, more new key t is calculated in M6, M7, is specifically as follows:
R3 is calculated based on M6 and ID in RFID system label, based on r3 and M7 more new key t;
Wherein,
In order to ensure that label new owner possesses the uniqueness of label ownership, RFID system label is in the new institute of verification label
, it is necessary to update label new owner and the key t between itself after the person of having is legal.
In above-mentioned technical proposal provided in an embodiment of the present invention with to correspond to technical solution realization principle in the prior art consistent
Part and unspecified, in order to avoid excessively repeat.The foregoing description of the disclosed embodiments, enables those skilled in the art
Enough realize or use the present invention.A variety of modifications to these embodiments will be apparent for a person skilled in the art,
The general principles defined herein can be real in other embodiments without departing from the spirit or scope of the present invention
It is existing.Therefore, the present invention is not intended to be limited to the embodiments shown herein, and is to fit to and principles disclosed herein
The most wide scope consistent with features of novelty.
Claims (8)
- A kind of 1. label ownership transfer method, it is characterised in that including:The label original owner generates random number r1, sends authentication command and r1 to RFID system label;The RFID system label generates random number r2, and generates M1, M2, M3 corresponding with r1, r2 based on quadratic residue theorem And M4, M2, M3, M4 are sent to the label original owner;The label original owner verifies the true and false of the RFID system label based on M2, M3, M4, if vacation, then termination protocol; If true, then continue subsequent step;M5, more new key key_old is calculated in the label original owner, sends M5 to the RFID system label;The RFID system label verifies the true and false of the label original owner based on M5, if vacation, then termination protocol;If Very, then subsequent step is continued;The RFID system tag update key key, and send ACK1 to the label original owner and determine message;The label original owner initiates the request of label ownership transfer to label new owner;The label new owner generates random number r3, and M6, M7 corresponding with r3 are generated based on quadratic residue theorem, and to described RFID system label sends M6, M7;The RFID system label verifies the true and false of the label new owner based on M6, M7, if vacation, then termination protocol, if It is true, then continues subsequent step;R3, more new key t is calculated based on M6, M7 in the RFID system label, and is sent to the label new owner ACK2 determines message;The label new owner receives the ACK2 and determines message, to represent the success of label ownership transfer;Wherein, M1, M2, M3, M4, M5, M6, M7, ACK1, ACK2 are the communication data in label ownership transfer.
- 2. according to the method described in claim 1, it is characterized in that, the RFID system label generates random number r2, and it is based on Quadratic residue theorem generates M1, M2, M3 and M4 corresponding with r1, r2, including:The RFID system label generation random number r2;Key key between the RFID system label and the label original owner is decomposed into left and right two parts<key_L、 key_R>, M1 and M2 is calculated;M1 and M2 are encrypted respectively based on quadratic residue theorem, obtain M3 and M4;Wherein,M3=(M1 | | r1)2mod m;M4= (r2)2mod m。
- 3. according to the method described in claim 2, it is characterized in that, the label original owner is based on described in M2, M3, M4 verification The true and false of RFID system label, including:The label original owner is decrypted M2, M3 and M4 that itself is received based on quadratic residue theorem, obtain M1 and Four roots of r2, the value of r2 is determined according to M1 and r1, wherein,Judge whether Random is equal with M2, if equal, termination protocol, if unequal, is determined as M2 by the value of Random Value, continue subsequent step;Search the combination of legitimate tag, including tag identity mark ID, key, the RFID system label and the label original institute Last round of key key_old between the person of having;M2 is calculated in the combination of legitimate tag based on lookup, judge the M2 that itself is calculated whether with the RFID system The M2 that label is sent is equal, if unequal, then it represents that the RFID system label is to forge, if equal, is shown described RFID system label is legal.
- 4. according to the method described in claim 3, it is characterized in that, M5, more new key is calculated in the label original owner Key_old, including:M5, more new key key_old is calculated based on ID, r2 and key_L that itself is stored in the label original owner;Wherein,Key_old=key,
- 5. according to the method described in claim 4, it is characterized in that, the RFID system label, which is based on M5, verifies that the label is former The true and false of the owner, including:M5 is calculated based on ID, r2 and key_L that itself is stored in the RFID system label, judges the M5 itself being calculated It is whether identical with the M5 that the label original owner sends, if identical, judge that the label original owner is legal, if not phase Together, then judge that the label original owner is illegal.
- 6. according to the method described in claim 5, it is characterized in that, the label new owner generates random number r3, based on two Secondary remainder theorem generates M6, M7 corresponding with r3, including:The label new owner generates random number r3, and M6, M7 corresponding with ID, r3 are generated based on quadratic residue theorem;Wherein,T=(r3)2Mod m,
- 7. according to the method described in claim 6, it is characterized in that, the RFID system label, which is based on M6, M7, verifies the mark The true and false of new owner is signed, including:The RFID system label decrypts r3 based on M6, M7, and M6 is calculated based on r3, judge the M6 that itself is calculated with Whether the M6 that the label new owner sends is identical, if differing, it is illegal to verify the label new owner, if phase Together, then it is legal to verify the label new owner.
- 8. the method according to the description of claim 7 is characterized in that r3 is calculated based on M6, M7 in the RFID system label, More new key t, including:R3 is calculated based on M6 and ID in the RFID system label, based on r3 and M7 more new key t;Wherein,
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711328185.9A CN107977696A (en) | 2017-12-13 | 2017-12-13 | A kind of label ownership transfer method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711328185.9A CN107977696A (en) | 2017-12-13 | 2017-12-13 | A kind of label ownership transfer method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107977696A true CN107977696A (en) | 2018-05-01 |
Family
ID=62010142
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711328185.9A Pending CN107977696A (en) | 2017-12-13 | 2017-12-13 | A kind of label ownership transfer method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107977696A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109302290A (en) * | 2018-08-30 | 2019-02-01 | 仲恺农业工程学院 | It is a kind of to be mutually authenticated protocol method with ownership transfer |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106330457A (en) * | 2016-08-19 | 2017-01-11 | 西安电子科技大学 | Method for transferring ownership of radio frequency identification label based on quadratic residue |
CN107086905A (en) * | 2017-02-27 | 2017-08-22 | 广东工业大学 | A kind of RFID tag group ownership transfer method based on quadratic residue theorem |
CN107094073A (en) * | 2017-02-27 | 2017-08-25 | 广东工业大学 | A kind of group's RFID tag ownership transfer method based on Chinese remainder theorem |
-
2017
- 2017-12-13 CN CN201711328185.9A patent/CN107977696A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106330457A (en) * | 2016-08-19 | 2017-01-11 | 西安电子科技大学 | Method for transferring ownership of radio frequency identification label based on quadratic residue |
CN107086905A (en) * | 2017-02-27 | 2017-08-22 | 广东工业大学 | A kind of RFID tag group ownership transfer method based on quadratic residue theorem |
CN107094073A (en) * | 2017-02-27 | 2017-08-25 | 广东工业大学 | A kind of group's RFID tag ownership transfer method based on Chinese remainder theorem |
Non-Patent Citations (1)
Title |
---|
李晓东,徐金成: "基于二次剩余的RFID标签所有权动态转移协议", 《计算机应用研究》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109302290A (en) * | 2018-08-30 | 2019-02-01 | 仲恺农业工程学院 | It is a kind of to be mutually authenticated protocol method with ownership transfer |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2652084C (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
CN108683501B (en) | Multiple identity authentication system and method with timestamp as random number based on quantum communication network | |
Tan et al. | Comments on “dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks” | |
JP6417036B2 (en) | Entity authentication method and apparatus based on pre-shared key | |
CN110971415A (en) | Space-ground integrated space information network anonymous access authentication method and system | |
CN110381055B (en) | RFID system privacy protection authentication protocol method in medical supply chain | |
CN106209768B (en) | A kind of expansible RFID mutual authentication method | |
CN108650028B (en) | Multiple identity authentication system and method based on quantum communication network and true random number | |
CN109391468A (en) | A kind of authentication method and system | |
CN105049401A (en) | Secure communication method based on intelligent vehicle | |
CN113365270B (en) | RFID multi-label joint authentication system and method based on application of Internet of things | |
JP2012527190A (en) | System and method for securely identifying and authenticating a device in a symmetric encryption system | |
CN112351037B (en) | Information processing method and device for secure communication | |
CN115348076B (en) | Equipment security authentication method and system based on attribute encryption and related devices thereof | |
CN111277412A (en) | Data security sharing system and method based on block chain key distribution | |
CN104868998A (en) | System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices | |
CN102884756A (en) | Communication device and communication method | |
Jannati et al. | Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags | |
US20060253577A1 (en) | Method, system and computer program for the secured management of network devices | |
EP1964303B1 (en) | Verfahren und system zur authentifizierung eines beweisers mit geringen ressourcen | |
CN109766966B (en) | RFID tag random number synchronous updating method | |
Pourpouneh et al. | An improvement over a server-less rfid authentication protocol | |
CN107977696A (en) | A kind of label ownership transfer method | |
CN108965266B (en) | User-to-User identity authentication system and method based on group key pool and Kerberos | |
Shen et al. | An Anti-counterfeit Complete RFID Tag Grouping Proof Generation Protocol. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180501 |
|
RJ01 | Rejection of invention patent application after publication |