CN113988103B - RFID identification method based on multiple tags - Google Patents

RFID identification method based on multiple tags Download PDF

Info

Publication number
CN113988103B
CN113988103B CN202111352478.7A CN202111352478A CN113988103B CN 113988103 B CN113988103 B CN 113988103B CN 202111352478 A CN202111352478 A CN 202111352478A CN 113988103 B CN113988103 B CN 113988103B
Authority
CN
China
Prior art keywords
rfid
token
reader
database
active module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111352478.7A
Other languages
Chinese (zh)
Other versions
CN113988103A (en
Inventor
王彬
徐凯
赵佳佳
张永生
程晨
陆会会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuzhou Daoyuan Longxin Electronic Technology Co ltd
Original Assignee
Xuzhou Daoyuan Longxin Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuzhou Daoyuan Longxin Electronic Technology Co ltd filed Critical Xuzhou Daoyuan Longxin Electronic Technology Co ltd
Priority to CN202111352478.7A priority Critical patent/CN113988103B/en
Publication of CN113988103A publication Critical patent/CN113988103A/en
Application granted granted Critical
Publication of CN113988103B publication Critical patent/CN113988103B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10118Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the sensing being preceded by at least one preliminary step
    • G06K7/10128Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the sensing being preceded by at least one preliminary step the step consisting of detection of the presence of one or more record carriers in the vicinity of the interrogation device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Toxicology (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Electromagnetism (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a multi-label RFID (radio frequency identification device) identification method.A user applies for n RFID labels, and different symmetric keys are shared between each RFID label and a database; and when the user identifies the identity, the k RFID tags are taken out randomly, the IDs of the RFID tags are read sequentially through the mobile active module according to a random sequence, and then the corresponding virtual IDs are generated and sent to the reader through long-distance communication. The database stores the IDs of the n RFID tags of the user, all ID permutations, and corresponding virtual IDs. And after the reader receives the virtual ID, the database verifies that the subsequent bidirectional authentication process is carried out if the virtual ID exists in the database. In the bidirectional authentication process, the reader and each RFID tag respectively use the symmetric key to encrypt and decrypt the random number for verification. The invention realizes the effect of multiple identities by using the random arrangement of the plurality of RFID labels, thereby improving the safety of RFID identification.

Description

RFID identification method based on multiple tags
Technical Field
The invention relates to an RFID identification method.
Background
With the rapid development of the RFID technology and the continuous reduction of the production cost of the RFID electronic tag, the application of the RFID tag anti-counterfeiting technology has also been greatly popularized and gradually appears in various industries, such as transportation, ticket security, commodity anti-counterfeiting and other fields.
The basic components of the radio frequency identification technology are a reader-writer, an antenna and an RFID tag, wherein the reader-writer is also called a reader, is equipment for performing read/write operation on the RFID tag and mainly comprises the antenna, a radio frequency front end and a read-write control unit. The antenna is a device for realizing radio frequency signal space transmission and establishing wireless communication connection between the RFID tag and the reader-writer. RFID tags are commonly called electronic tags and can be classified into two categories, active (active) and passive (passive), according to their operation modes. A chip and an antenna are packaged in the passive RFID tag, when the tag antenna receives an RFID wireless radio frequency signal sent by an external reader-writer, and when the RFID wireless radio frequency signal reaches a certain degree, the capacitance in the internal circuit of the chip can provide the capacity required by the circuit, so that the internal circuit of the chip is activated to start working.
The existing defects are as follows:
1. in the existing RFID identification method, a user has a one-to-one corresponding identity binding relationship with an RFID thereof, and an enemy can estimate the identity and the user behavior of the user according to the RFID;
2. in the existing RFID identification method, if a user uses the same RFID for a long time, the RFID security is continuously reduced, namely the possibility that an RFID key is cracked is continuously increased, and the user needs to replace the RFID key, so that the user is inconvenient to use;
3. in the existing RFID identification method, if a user loses an RFID tag, the user is at risk of being cracked, and once the situation happens, the historical information encrypted by the user through an RFID key can be illegally cracked;
4. the random number for authentication generated by the existing RFID is generally a pseudo random number, which may cause the RFID to be cracked.
Disclosure of Invention
The invention aims to: aiming at the prior art, the RFID identification method based on the multiple tags is provided, and the safety of RFID identification is improved.
The technical scheme is as follows: a RFID identification method based on multiple labels, a user applies for n RFID labels, and each RFID label shares different symmetric keys with a database; when a user identifies the identity, randomly taking out k RFID tags from the user, sequentially reading the ID of each RFID tag through a mobile active module according to a random sequence, calculating a hash value of an ID set as a virtual ID corresponding to the ID arrangement after the mobile active module obtains the ID arrangement, and sending the virtual ID to a reader through remote communication;
the database connected with the reader stores IDs of n RFID tags of a user and generates all ID arrangements and corresponding virtual IDs; and after the reader receives the virtual ID sent by the mobile active module, the database verifies that the subsequent bidirectional authentication process is carried out if the virtual ID exists in the database.
Further, in the bidirectional authentication process, the reader and each RFID tag respectively use the symmetric key to encrypt and decrypt the random number for verification; the mobile active module is used for data transmission between the reader and each RFID tag, and after the encrypted data sent by the reader is analyzed to obtain encrypted subdata according to the ID arrangement sequence, each encrypted subdata is sent to the corresponding RFID tag according to the ID arrangement sequence.
Further, the bidirectional authentication process specifically includes the following steps:
step 2.1: the reader initiates an authentication instruction to the mobile active module;
step 2.2: after the mobile active module receives the authentication instruction, a random number R is generated B And sending to the reader;
step 2.3: the reader receives the random number R B Thereafter, the database generates a random number R A Finding out corresponding ID arrangement and K symmetric keys corresponding to the ID arrangement according to the virtual ID, and recording the K symmetric keys as K according to the ID arrangement sequence i
Using the symmetric key pairs R in sequence in ID arrangement order A And R B Encrypting to obtain TOKEN Ai ={R A ||R B }K i Form a set TOKEN A ={TOKEN Ai ,i∈[1,k]Will TOKEN A Sending the data to a mobile active module;
step 2.4: the mobile active module receives TOKEN A Then, TOKEN in ID arrangement order is obtained by analysis Ai (ii) a According to the ID arrangement sequence, corresponding TOKEN is added Ai Together with a random number R B The data are sent to corresponding RFID labels respectively;
step 2.5: each RFID label respectively uses a symmetric key K between each RFID label and the database i For each received { R A ||R B }K i Decrypting to obtain R A ||R B Verifying the received R B And R obtained by decryption B Whether or not toIf the verification is correct, each RFID label uses the symmetric key K between the RFID label and the database respectively i To R is A Encrypting to obtain TOKEN B1 ={R A }K i And make TOKEN Bi Respectively sending the signals to the mobile active modules;
step 2.6: the mobile active module receives all the TOKEN Bi Then, arranging according to the ID to obtain a set TOKEN B ={TOKEN Bi ,i∈[1,k]Will TOKEN B Sending the data to a reader;
step 2.7: the reader receives TOKEN B The database then uses the symmetric key K i Sequentially decrypting TOKEN Bi Verifying each decrypted R A With the emitted R A And if the two-way authentication is consistent, finishing the two-way authentication if the two-way authentication is verified to be correct.
Further, the random number R B Generated by a physical random number generator carried by the mobile active module.
Has the advantages that: in the invention, a user applies for n RFID labels, and each RFID label shares different symmetric keys with a database; when the user identifies the identity, the k RFID tags are randomly taken out from the mobile active module and are close to or directly plugged into the mobile active module according to a random sequence. According to an arrangement formula
Figure BDA0003356332910000031
The extracted k RFID tags are arranged to obtain
Figure BDA0003356332910000032
Arranging seed IDs, wherein the hash value of each ID arrangement is unique, and obtaining the seed ID
Figure BDA0003356332910000033
A kind of virtual ID. By using a technique of arranging a plurality of RFID tags, an effect of realizing multiple identities using a small number of entity RFID tags can be achieved. Suppose a user has 10 RFID tags, the number of corresponding RFID tags is
Figure BDA0003356332910000034
Figure BDA0003356332910000035
Figure BDA0003356332910000036
I.e. the user is represented in the database as 9864100 identities. In the prior art, if a user has 10 RFID tags corresponding to 10 RFIDs, the user only represents 10 identities in the database.
Compared with the prior art, the invention has the following advantages:
1. in the invention, the user has identity binding relations with more virtual RFID tags besides the one-to-one corresponding identity binding relations with the entity RFID tags, the difficulty of the enemy for estimating the user identity is greatly increased, and the enemy can completely estimate the user identity only under the condition of recording all the identity binding relations, so that the invention realizes the effect of multiple identities by using a small number of entity RFID tags.
2. In the invention, the user can form a new virtual RFID through various combinations of the RFID labels, and the RFID labels do not need to be frequently replaced, thereby avoiding the problem of inconvenient use of the user to a certain extent.
3. In the invention, even if individual RFID tags of users are stolen or lost, as long as other RFID tags are not stolen or lost, the history information encrypted by the RFID key of the users cannot be cracked illegally.
4. In the invention, the random number for authentication is generated by the true random number generator in the mobile active module, the random number quality is high, and the problem that the RFID is cracked possibly due to the use of the pseudo random number is solved.
Drawings
FIG. 1 is a block diagram of a system in which the method of the present invention is practiced;
FIG. 2 is a flow chart of the method of the present invention.
Detailed Description
The invention is further explained below with reference to the drawings.
A RFID identification method based on multiple tags is implemented in an RFID tag, a mobile active module and a reader, wherein the reader is connected with a database through a secure channel, as shown in figure 1.
The mobile active module is an RFID reader, and is provided with a mobile power supply besides the functions of a common RFID reader so as to be convenient for a user to carry; it can read n or more than n RFID at the same time; the reader has the capability of communicating with the reader, and particularly has the capability of remote communication; the mobile active module is a reliable device controlled by the user, and the actual ID of the RFID cannot be revealed.
The user applies for n RFID tags, and each RFID tag shares different symmetric keys with the database.
Step 1: the reader is activated.
When a user identifies the identity, the user randomly takes out k RFID tags from the RFID tags and approaches or directly plugs the RFID tags to the mobile active module according to a random sequence, and after the mobile active module powers on the RFID tags, the RFID tags safely send the ID of the tags to the mobile active module through NFC or other close-range communication modes; since the process is near field communication and the mobile active module is a reliable device, the actual ID of this step is not revealed. And after the mobile active module acquires the ID arrangement, calculating a hash value of the ID set as a virtual ID corresponding to the ID arrangement, and sending the virtual ID to the reader through remote communication.
The database connected with the reader stores the IDs of n RFID tags of the user, and generates all ID arrays and corresponding virtual IDs. After the reader receives the virtual ID sent by the mobile active module, the database verifies that if the virtual ID exists in the database, the subsequent bidirectional authentication process is carried out.
Step 2: and (4) performing two-way authentication, as shown in figure 2.
Step 2.1: the reader initiates an authentication instruction to the mobile active module.
Step 2.2: after the mobile active module receives the authentication instruction, the mobile active module generates a random number R B And sending to the reader; the random number R B Generated by a physical random number generator carried by the mobile active module.
Step 2.3: readingThe random number R is received by the device B Thereafter, the database generates a random number R A Finding out the corresponding ID arrangement and K symmetric keys corresponding to the ID arrangement according to the virtual ID, and recording the K symmetric keys as K according to the ID arrangement sequence i
Using symmetric key pairs R in turn in ID order A And R B Encrypting to obtain TOKEN Ai ={R A ||R B }K i E.g. using K 1 To R A And R B Encrypting to obtain TOKEN A1 ={R A ||R B }K 1 Using K 2 To R is A And R B Encrypting to obtain TOKEN A2 ={R A ||R B }K 2 … …, using K k To R is A And R B Encrypting to obtain TOKEN Ak ={R A ||R B }K k Form a set TOKEN A ={TOKEN Ai ,i∈[1,k]Get TOKEN again A And sending the data to the mobile active module.
Step 2.4: the mobile active module receives TOKEN A Then, TOKEN in ID arrangement order is obtained through analysis Ai . According to the ID arrangement sequence, corresponding TOKEN is added Ai And the random numbers RB and the corresponding RFID labels are respectively sent to the corresponding RFID labels.
Step 2.5: each RFID label respectively uses a symmetric key K between each RFID label and the database i For each received { R A ||R B }K i Decrypting to obtain R A ||R B Verifying the received R B And R obtained by decryption B If the two RFID tags are in accordance with each other, if the two RFID tags are verified correctly, each RFID tag uses a symmetric key K between the RFID tag and the database respectively i To R A Encrypting to obtain TOKEN B1 ={R A }K i And make TOKEN Bi Respectively sent to the mobile active modules.
Specifically, the RFID tags are arranged in the ID order:
TOKEN received by No. 1 RFID tag A1 Then, a symmetric key K between the database and the user is used 1 To { R A ||R B }K 1 Decryption to obtain R A ||R B Verifying the received R B And R obtained by decryption B Whether they are consistent. If the verification is correct, K is used 1 To R A Encrypting to obtain TOKEN B1 ={R A }K 1 To make TOKEN B1 Sending to the mobile active module;
TOKEN received by 2 nd RFID tag A2 Then, a symmetric key K between the database and the user is used 2 To { R A ||R B }K 2 Decryption to obtain R A ||R B Verifying the received R B And R obtained by decryption B Whether they are consistent. If the verification is correct, K is used 2 To R A Encrypting to obtain TOKEN B2 ={R A }K 2 To make TOKEN B2 Sending to the mobile active module;
……;
TOKEN received by kth RFID tag Ak Then, a symmetric key K between the database and the user is used k To { R A ||R B }K k Decrypting to obtain R A ||R B Verifying the received R B And R obtained by decryption B Whether they are consistent. If the verification is correct, K is used k To R is A Encrypting to obtain TOKEN Bk ={R A }K k Will TOKEN Bk And sending the data to the mobile active module.
Step 2.6: the mobile active module receives all the TOKEN Bi Then, arranging according to ID to obtain a set TOKEN B ={TOKEN Bi ,i∈[1,k]H and TOKEN B And sending the data to the reader.
Step 2.7: the reader receives TOKEN B The database then uses the symmetric key K i Sequentially decrypting TOKEN Bi Verifying each decrypted R A And the emitted R A And if the two-way authentication is consistent, finishing the two-way authentication if the two-way authentication is verified to be correct.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and amendments can be made without departing from the principle of the present invention, and these modifications and amendments should also be considered as the protection scope of the present invention.

Claims (3)

1. A RFID identification method based on multiple labels is characterized in that a user applies for n RFID labels, and each RFID label shares different symmetric keys with a database; when a user identifies the identity, randomly taking out k RFID tags from the user, sequentially reading the ID of each RFID tag through a mobile active module according to a random sequence, calculating a hash value of the ID arrangement as a virtual ID corresponding to the ID arrangement after the mobile active module obtains the ID arrangement, and sending the virtual ID to a reader through remote communication;
the database connected with the reader stores the IDs of n RFID tags of a user and generates all ID arrangements and corresponding virtual IDs; after the reader receives the virtual ID sent by the mobile active module, the database verifies that a subsequent bidirectional authentication process is carried out if the virtual ID exists in the database;
the bidirectional authentication process specifically comprises the following steps:
step 2.1: the reader initiates an authentication instruction to the mobile active module;
step 2.2: after the mobile active module receives the authentication instruction, a random number R is generated B And sending to the reader;
step 2.3: the reader receives the random number R B Thereafter, the database generates a random number R A Finding out corresponding ID arrangement and K symmetric keys corresponding to the ID arrangement according to the virtual ID, and recording the K symmetric keys as symmetric keys K according to the ID arrangement sequence i
Using symmetric key pairs R in turn in ID order A And R B Encrypting to obtain TOKEN Ai ={R A ||R B }K i Form a set TOKEN A ={TOKEN Ai ,i∈[1,k]Will TOKEN A Sending the data to a mobile active module;
step 2.4: the mobile active module receives TOKEN A Then, TOKEN in ID arrangement order is obtained through analysis Ai (ii) a According to the ID arrangement sequence, corresponding TOKEN is added Ai Together with a random number R B The data are sent to corresponding RFID labels respectively;
step 2.5: each RFID label respectively uses a symmetric key K between each RFID label and the database i For each received { R A ||R B }K i Decrypting to obtain R A ||R B Verifying the received R B And R obtained by decryption B If the two RFID tags are in accordance with each other, if the two RFID tags are verified correctly, each RFID tag uses a symmetric key K between the RFID tag and the database respectively i To R A Encrypting to obtain TOKEN Bi ={R A }K i And make TOKEN Bi Respectively sending the signals to the mobile active modules;
step 2.6: the mobile active module receives all the TOKEN Bi Then, arranging according to the ID to obtain a set TOKEN B ={TOKEN Bi ,i∈[1,k]Will TOKEN B Sending to a reader;
step 2.7: the reader receives TOKEN B The database then uses the symmetric key K i Sequentially decrypting TOKEN Bi Verifying each decrypted R A And the emitted R A And if the two-way authentication is consistent, finishing the two-way authentication if the two-way authentication is verified to be correct.
2. The multi-tag-based RFID identification method according to claim 1, wherein in the mutual authentication process, the reader and each RFID tag respectively use the symmetric key to encrypt and decrypt a random number for verification; the mobile active module is used for data transmission between the reader and each RFID tag, and after encrypted data sent by the reader are analyzed to obtain encrypted subdata according to an ID arrangement sequence, each encrypted subdata is sent to the corresponding RFID tag according to the ID arrangement sequence.
3. The multi-tag based RFID identification method of claim 1, wherein the random number R B Generated by a physical random number generator carried by the mobile active module.
CN202111352478.7A 2021-11-16 2021-11-16 RFID identification method based on multiple tags Active CN113988103B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111352478.7A CN113988103B (en) 2021-11-16 2021-11-16 RFID identification method based on multiple tags

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111352478.7A CN113988103B (en) 2021-11-16 2021-11-16 RFID identification method based on multiple tags

Publications (2)

Publication Number Publication Date
CN113988103A CN113988103A (en) 2022-01-28
CN113988103B true CN113988103B (en) 2022-08-19

Family

ID=79748693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111352478.7A Active CN113988103B (en) 2021-11-16 2021-11-16 RFID identification method based on multiple tags

Country Status (1)

Country Link
CN (1) CN113988103B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117688957B (en) * 2024-02-04 2024-04-16 国网江苏省电力有限公司电力科学研究院 Cable data interaction method and device for multi-object and multi-scene

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853369A (en) * 2010-04-01 2010-10-06 西北工业大学 Random Harsh based two-way authentication method
CN102983979A (en) * 2012-12-12 2013-03-20 南京三宝科技股份有限公司 Quick RFID authentication method based on secret information shared among tags
EP2590357A1 (en) * 2011-11-07 2013-05-08 Giesecke & Devrient GmbH Method and system for identifying an RFID tag by means of a reader
CN111753937A (en) * 2020-06-22 2020-10-09 北京理工大学 RFID (radio frequency identification) label rapid detection method and system based on multi-label
CN111931531A (en) * 2020-07-03 2020-11-13 安徽工业大学 RFID label information sampling method
CN112867008A (en) * 2021-01-14 2021-05-28 浙江大学 Anti-replay method of radio frequency identification system based on slotted ALOHA protocol of frame
CN113365270A (en) * 2021-06-15 2021-09-07 王云森 RFID multi-label joint authentication system and method based on application of Internet of things

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7367496B2 (en) * 2005-06-06 2008-05-06 International Business Machines Corporation Detecting wear through use of information-transmitting devices
CN100345149C (en) * 2006-03-17 2007-10-24 清华大学 Enciphering authentication for radio-frequency recognition system
CN106603240B (en) * 2016-12-07 2019-07-16 西安电子科技大学 The authentication method of low cost radio frequency identification NTRU based on cloud
CN113595725B (en) * 2021-07-29 2023-08-11 如般量子科技有限公司 Communication system and communication method based on quantum key card arrangement

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853369A (en) * 2010-04-01 2010-10-06 西北工业大学 Random Harsh based two-way authentication method
EP2590357A1 (en) * 2011-11-07 2013-05-08 Giesecke & Devrient GmbH Method and system for identifying an RFID tag by means of a reader
CN102983979A (en) * 2012-12-12 2013-03-20 南京三宝科技股份有限公司 Quick RFID authentication method based on secret information shared among tags
CN111753937A (en) * 2020-06-22 2020-10-09 北京理工大学 RFID (radio frequency identification) label rapid detection method and system based on multi-label
CN111931531A (en) * 2020-07-03 2020-11-13 安徽工业大学 RFID label information sampling method
CN112867008A (en) * 2021-01-14 2021-05-28 浙江大学 Anti-replay method of radio frequency identification system based on slotted ALOHA protocol of frame
CN113365270A (en) * 2021-06-15 2021-09-07 王云森 RFID multi-label joint authentication system and method based on application of Internet of things

Also Published As

Publication number Publication date
CN113988103A (en) 2022-01-28

Similar Documents

Publication Publication Date Title
US10341341B2 (en) RFID authentication architecture and methods for RFID authentication
EP3118776B1 (en) Security authentication method for hiding ultra high frequency electronic tag identifier
US10084597B1 (en) RFID tags with dynamic key replacement
US8368516B2 (en) Secure data exchange with a transponder
US9773133B2 (en) RFID tag and reader characteristic determination using group keys
CN101847199B (en) Security authentication method for radio frequency recognition system
US20090153290A1 (en) Secure interface for access control systems
KR101813658B1 (en) RFID based genuine product certification service system and method using cipher update algorithm for forgery prevention
US20100155475A1 (en) Method of authenticating rfid tag for reducing load of server and rfid reader using the same
JP2007066316A5 (en)
MX2010011809A (en) System of providing a fixed identification of a transponder while keeping privacy and avoiding tracking.
Khor et al. Security problems in an RFID system
KR102293888B1 (en) RFID based genuine product certification service system using cipher update algorithm of certification key for forgery prevention to use distributed ledger stored in RFID key storage
KR100723868B1 (en) Method for verifying RFID tag and reader each other in EPC C1G2 RFID system
KR100728629B1 (en) System and Method for Preventing Forgery of RFID Tag
CN102594550A (en) RFID internal mutual authentication safety protocol based on secret key array
CN102684872A (en) Safety communication method for ultrahigh frequency radio-frequency identification air interface based on symmetrical encryption
CN113988103B (en) RFID identification method based on multiple tags
CN101883357A (en) Method, device and system for mutual authentication between terminal and intelligent card
KR20090072840A (en) Security system of tag data with rfid middleware and method for processing the same
Jain et al. Analysis of vulnerabilities in radio frequency identification (RFID) systems
KR101053636B1 (en) Encryption/decryption method and system for rfid tag and reader using multi algorithm
KR100951527B1 (en) Encrypting method for id of rfid tag, authenticating method of rfid tag and rfid authenticating system using the same
CN113988249B (en) RFID (radio frequency identification) method based on arrangement
KR101215155B1 (en) System for and method of protecting communication between reader and tag in rfid system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant