Movatterモバイル変換


[0]ホーム

URL:


CN100405386C - A security authentication method in a radio frequency identification system - Google Patents

A security authentication method in a radio frequency identification system
Download PDF

Info

Publication number
CN100405386C
CN100405386CCNB2006101246625ACN200610124662ACN100405386CCN 100405386 CCN100405386 CCN 100405386CCN B2006101246625 ACNB2006101246625 ACN B2006101246625ACN 200610124662 ACN200610124662 ACN 200610124662ACN 100405386 CCN100405386 CCN 100405386C
Authority
CN
China
Prior art keywords
data
card reader
electronic tag
key
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006101246625A
Other languages
Chinese (zh)
Other versions
CN1932835A (en
Inventor
邹雪城
刘冬生
刘政林
梁浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and TechnologyfiledCriticalHuazhong University of Science and Technology
Priority to CNB2006101246625ApriorityCriticalpatent/CN100405386C/en
Publication of CN1932835ApublicationCriticalpatent/CN1932835A/en
Application grantedgrantedCritical
Publication of CN100405386CpublicationCriticalpatent/CN100405386C/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Landscapes

Abstract

Translated fromChinese

本发明公开了一种射频识别系统中的安全认证方法,认证过程基于散列运算,并加入随机数掩码和密钥更新等方法。读卡器和电子标签双方均存有相同的密钥对K1、K2。K1和随机数R进行散列运算对电子标签进行认证,K2和唯一标识符C进行散列运算对读卡器进行认证。本发明提供的安全认证方法对于射频识别系统中存在的几种安全和隐私问题的防护能够有效地解决,并能够满足电子标签芯片的低成本、低功耗的需求。本发明具有防止地点隐私泄露、防止标签信息被窃取、防止伪造标签和防止中间人攻击等特点,并且对于电子标签的低成本实现更具意义。

Figure 200610124662

The invention discloses a safety authentication method in a radio frequency identification system. The authentication process is based on hash operation, and methods such as random number mask and key update are added. Both the card reader and the electronic tag store the same key pair K1, K2. K1 performs a hash operation with the random number R to authenticate the electronic tag, and K2 and the unique identifier C performs a hash operation to authenticate the card reader. The safety authentication method provided by the invention can effectively solve the protection of several safety and privacy problems existing in the radio frequency identification system, and can meet the requirements of low cost and low power consumption of the electronic label chip. The invention has the characteristics of preventing leakage of location privacy, preventing label information from being stolen, preventing counterfeit labels, preventing man-in-the-middle attacks, and the like, and is more meaningful for the low-cost realization of electronic labels.

Figure 200610124662

Description

Translated fromChinese
一种射频识别系统中的安全认证方法A security authentication method in a radio frequency identification system

技术领域technical field

本发明属于射频识别技术领域,具体为一种射频识别系统中的安全认证方法,尤其适用于无源电子标签与读卡器之间的认证。The invention belongs to the technical field of radio frequency identification, in particular to a safety authentication method in a radio frequency identification system, and is especially suitable for authentication between a passive electronic tag and a card reader.

背景技术Background technique

射频识别(RFID)这一革命性的技术是20世纪90年代开始兴起的一种利用大规模集成电路与无线通信技术相结合的自动识别技术。但由于读卡器与RFID标签之间是无线通信,因此射频识别系统很容易受到攻击。在实际应用中,各应用领域已经对电子标签的应用安全提出了现实的需求。The revolutionary technology of radio frequency identification (RFID) is an automatic identification technology that combines large-scale integrated circuits and wireless communication technologies that began to emerge in the 1990s. However, due to the wireless communication between the reader and the RFID tag, the RFID system is vulnerable to attack. In practical applications, various application fields have put forward realistic requirements for the application security of electronic tags.

在射频识别系统中,主要是针对信息安全和隐私防护两方面的考虑。由于标签携带有唯一标识符UID,一旦被获得,也就获得了目标对象的数据信息。而且,攻击方也能根据这些特定的信息对特定目标进行地点跟踪。因此,射频识别系统中的安全认证显得意义重大。In the radio frequency identification system, it is mainly for the consideration of two aspects of information security and privacy protection. Since the tag carries a unique identifier UID, once it is obtained, the data information of the target object is also obtained. Moreover, the attacker can also track the location of a specific target based on these specific information. Therefore, the security certification in the radio frequency identification system is of great significance.

目前,国际上还没有将具有交互(标签芯片和读写器及后端系统之间)安全认证协议用于RFID系统中。但相关的研究工作较多,主要是针对信息安全和隐私防护。S.Weis[见S.Weis,S.Sarma,R.Rivest and D.Engels,“Security andPrivacy Aspects of Low-Cost Radio Frequency Identification Systems,″in lst InternConference on Security in Pervasive Computing(SPC),2003.]等提出了一种基于散列函数锁存的认证方法,在这个认证方法中,每个电子标签分配了不同的认证密钥k,电子标签存储密钥k的hash值mentaID(mentaID=hash(k))。当读卡器询问电子标签时,电子标签将mentaID值发送给读写器,读卡器将mentaID值传给后端数据库,同时在后端的数据库中查找相应的认证密钥k。数据库通过读写器将认证密钥k发送给电子标签,标签将得到的认证密钥k通过散列函数运算得到一个散列值,将该值与本身储存的mentaID值进行比较,如果两个值相等的话,电子标签将通过认证并向周围的阅读器提供所有的存储信息。这是一种较直接和经济的方法,但是电子标签对读写器的响应的信息是可预测的,所以地点隐私被泄露。此外,认证密钥k和电子标签的存储信息容易被窃取。S.Weis在这种锁存方法的基础上做了一些改进,改进后的方案虽然可以保护地点隐私,但是无法对抗中间人攻击。Jeongkyu Yang[见Jeongkyu Yang,Jaemin Park,Hyunrok Lee and Kui Ren,“MutualAuthentication Protocol for Low-cost RFID,″ECRYPT Workshop on RFID and LightweightCrypto,Graz University of Technology,Austria,2005]等在此基础上提出了一种交互认证的方案,此方案运用密钥对(k1,k2)来认证读卡器和电子标签,能较好的防止上述攻击,但是存在两个缺点;第一,在每次认证后,密钥(k1,k2)才会更新。在密钥更新之前,攻击方每次用相同的询问指令询问电子标签时,电子标签的响应是相同的。这样,地点隐私也会被泄露,第二,在这种认证方案中,数据库的计算量很大,不适合同时处理大量标签,例如共有N个标签的ID,那么就需要进行N次搜索和N次散列(hash)函数计算。Tassos Dimitriou[见Tassos Dimitriou,“A Lightweight RFID Protocol to protect againstTraceability and Cloning attacks”,ECRYPT Workshop on RFID and Lightweight Crypto,Graz University of Technology,Austria,2005]等给出一种防地点隐私和防伪造的安全认证机制,它的原理是在标签和后端数据库共享的秘密ID被不断刷新,不公布的秘密ID可以防伪造,秘密ID的刷新可以防跟踪。但是这种方案需要标签处理的信息很多,需要产生两个散列函数值发送给读写器,并在接收读写器的散列值的同时,产生相应的值进行比较,使得标签安全认证电路的实现成本较高。At present, there is no security authentication protocol with interaction (between the tag chip and the reader and the back-end system) used in the RFID system in the world. However, there are many related research works, mainly for information security and privacy protection. S. Weis [See S. Weis, S. Sarma, R. Rivest and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," in lst InternConference on Security in Pervasive Computing (SPC), 2003.] proposed an authentication method based on hash function latching. In this authentication method, each electronic tag is assigned a different authentication key k, and the electronic tag stores the hash value mentaID of the key k (mentaID=hash(k )). When the card reader inquires the electronic tag, the electronic tag sends the mentaID value to the reader, and the card reader sends the mentaID value to the back-end database, and at the same time searches the corresponding authentication key k in the back-end database. The database sends the authentication key k to the electronic tag through the reader-writer, and the tag obtains a hash value through the operation of the hash function on the authentication key k, and compares this value with the mentaID value stored in itself. If the two values If it is equal, the electronic tag will pass the authentication and provide all the stored information to the surrounding readers. This is a more direct and economical method, but the response information of the electronic tag to the reader is predictable, so the privacy of the location is leaked. In addition, the stored information of the authentication key k and the electronic tag is easy to be stolen. S. Weis made some improvements on the basis of this locking method. Although the improved scheme can protect the privacy of the location, it cannot resist man-in-the-middle attacks. Jeongkyu Yang [see Jeongkyu Yang, Jaemin Park, Hyunrok Lee and Kui Ren, "MutualAuthentication Protocol for Low-cost RFID," ECRYPT Workshop on RFID and LightweightCrypto, Graz University of Technology, Austria, 2005] et al. This scheme uses a key pair (k1, k2) to authenticate the card reader and the electronic tag, which can better prevent the above attacks, but there are two disadvantages; first, after each authentication, the key The key (k1, k2) will be updated. Before the key is updated, each time the attacker inquires the electronic tag with the same inquiry command, the response of the electronic tag is the same. In this way, the privacy of the location will also be leaked. Second, in this authentication scheme, the calculation of the database is very large, and it is not suitable for processing a large number of tags at the same time. For example, if there are N tag IDs in total, then N searches and N Secondary hash (hash) function calculation. Tassos Dimitriou [see Tassos Dimitriou, "A Lightweight RFID Protocol to protect against Traceability and Cloning attacks", ECRYPT Workshop on RFID and Lightweight Crypto, Graz University of Technology, Austria, 2005] etc. give a security against location privacy and anti-counterfeiting The principle of the authentication mechanism is that the secret ID shared by the tag and the back-end database is constantly refreshed, the unpublished secret ID can prevent forgery, and the refreshing of the secret ID can prevent tracking. However, this scheme requires a lot of information to be processed by the tag, and two hash function values need to be generated and sent to the reader, and while receiving the hash value of the reader, generate a corresponding value for comparison, so that the tag security authentication circuit The implementation cost is higher.

国内相关的研究产品中,只有一些加密产品的推出,对于包含认证机制的系统推出,还没有相关报道。Among the relevant domestic research products, only some encryption products have been launched, and there are no relevant reports on the launch of systems including authentication mechanisms.

发明内容Contents of the invention

本发明的主要目的是实现一种射频识别系统中的安全认证方法,该方法可以保护地点隐私,防止标签信息被窃取,防止伪造标签的攻击以及防止中间人攻击。The main purpose of the present invention is to realize a security authentication method in a radio frequency identification system, which can protect location privacy, prevent label information from being stolen, prevent counterfeit label attacks and prevent man-in-the-middle attacks.

本发明提供的一种射频识别系统中的安全认证方法,其步骤包括:A safety authentication method in a radio frequency identification system provided by the present invention, the steps include:

(1)读卡器向电子标签发送带伪随机数R的询问指令;(1) The card reader sends an inquiry command with a pseudo-random number R to the electronic tag;

(2)电子标签接收到询问指令后,从电子标签芯片内部EEPROM中读取密钥k1,将密钥k1和伪随机数R进行散列运算,将散列运算后的结果S1与唯一标识符C用随机数p进行掩码,再将掩码得到的数据M传送给读卡器;(2) After the electronic tag receives the query command, it reads the key k1 from the EEPROM inside the electronic tag chip, performs a hash operation on the key k1 and the pseudo-random number R, and combines the result S1 after the hash operation with the unique identifier C uses a random number p to mask, and then transmits the masked data M to the card reader;

(3)读卡器正确识别上述掩码后的数据M后,将数据M和伪随机数R一起传送给终端;(3) After the card reader correctly identifies the data M after the above mask, it transmits the data M and the pseudo-random number R to the terminal together;

(4)终端对数据M和伪随机数R按下述步骤进行判断:(4) The terminal judges the data M and the pseudo-random number R according to the following steps:

(4.1)去掉数据M中的掩码,得到散列运算后的结果S1与唯一标识符C;(4.1) Remove the mask in the data M to obtain the result S1 and the unique identifier C after the hash operation;

(4.2)根据唯一标识符C从终端的存储信息中获得对应的密钥k1;(4.2) Obtain the corresponding key k1 from the storage information of the terminal according to the unique identifier C;

(4.3)将密钥k1与伪随机数R按照步骤(2)中相同的算法进行散列运算,得到数据S2;(4.3) Carry out the hash operation with the key k1 and the pseudo-random number R according to the same algorithm in step (2), to obtain the data S2;

(4.4)将数据S2与S1进行比较,如果相等,则认为标签合法,否则认为标签是伪标签,终止通信;(4.4) Compare the data S2 with S1, if they are equal, the label is considered legal, otherwise the label is considered to be a pseudo-label, and the communication is terminated;

(5)如果标签为合法电子标签,终端从数据库中取出另一密钥k2,将密钥k2与唯一标识符C进行散列运算,得到数据N1,并发送给读卡器;(5) If the tag is a legal electronic tag, the terminal takes out another key k2 from the database, performs a hash operation on the key k2 and the unique identifier C, obtains data N1, and sends it to the card reader;

(6)读卡器将数据N1传送给电子标签;(6) The card reader transmits the data N1 to the electronic tag;

(7)电子标签接收到数据N1后,从电子标签芯片内部EEPROM中读取另一密钥k2,然后按照步骤(5)相同的算法将密钥k2与唯一标识符C进行散列运算,得到数据N2;再比较数据N1与N2,如果相等,则通过认证,交互认证完成;否则,认证失败,电子标签不对该读卡器的其他指令进行响应;(7) After the electronic tag receives the data N1, it reads another key k2 from the EEPROM inside the electronic tag chip, and then performs a hash operation on the key k2 and the unique identifier C according to the same algorithm in step (5), to obtain Data N2; then compare the data N1 and N2, if they are equal, the authentication is passed, and the mutual authentication is completed; otherwise, the authentication fails, and the electronic tag does not respond to other instructions of the card reader;

(8)在完成认证后,读卡器和标签双方以相同的方式更新密钥k1,k2。(8) After completing the authentication, both the card reader and the tag update the keys k1 and k2 in the same way.

本发明在理论上是一种安全的认证方案,对于射频识别系统中存在的几种安全隐患和隐私问题都能较好的防护,而且实际中也已经成功实现,特别是针对采用无源标签的射频识别系统,这种认证方式优势更为明显。具体而言,本发明具有以下技术效果:The present invention is a safe authentication scheme in theory, which can better protect several potential safety hazards and privacy problems existing in the radio frequency identification system, and has been successfully implemented in practice, especially for the use of passive tags. RFID system, this authentication method has more obvious advantages. Specifically, the present invention has the following technical effects:

(1)防止地点隐私泄露:即防止攻击方根据标签上所携带的特定信息而得到标签使用者的某些私人信息或者跟踪标签。即使攻击方每次带相同的R询问标签,由于步骤(2)中存在随机数掩码的过程,使标签每次的响应是不同的,能够保障地点隐私,防止跟踪;而且每次通过认证后,k1的更新也能防止地点隐私泄露。(1) Prevent location privacy leakage: prevent the attacker from obtaining some private information of the tag user or tracking the tag based on the specific information carried on the tag. Even if the attacker brings the same R query tag each time, due to the process of random number masking in step (2), the response of the tag is different each time, which can protect the privacy of the location and prevent tracking; and after passing the authentication each time , the update of k1 can also prevent location privacy leakage.

(2)防止标签信息被窃取:即没有通过认证的读卡器(非法读卡器)是不能获得电子标签内部存储的有效信息的。(2) Prevent the tag information from being stolen: that is, the card reader (illegal card reader) that has not passed the authentication cannot obtain the valid information stored in the electronic tag.

(3)防止伪造标签:即没有通过认证的电子标签(非法标签),读卡器是不会读取其内部存储的信息的。(3) Prevention of counterfeit labels: that is, electronic labels (illegal labels) that have not passed the certification, the card reader will not read the information stored in it.

(4)防止中间人攻击:即利用电子标签的认证信息来攻击读卡器或者利用读卡器的认证信息来攻击电子标签。由于每次交互认证完成后,读卡器和电子标签之间都会更新密钥,攻击方监听得到的认证信息不再有效。即使攻击方监听了多次认证过程,获得多组数据,但由于每次传送与密钥k1,k2相关的信息时,都经过了散列运算,攻击方很难分析出k1,k2。(4) Prevent man-in-the-middle attacks: use the authentication information of the electronic tag to attack the card reader or use the authentication information of the card reader to attack the electronic tag. Since the key is updated between the card reader and the electronic tag after each mutual authentication is completed, the authentication information obtained by the attacker is no longer valid. Even if the attacker monitors multiple authentication processes and obtains multiple sets of data, it is difficult for the attacker to analyze k1 and k2 because the information related to keys k1 and k2 is hashed every time.

(5)此安全认证方法的电路实现成本低、功耗小,能够满足标签芯片的低成本、低功耗的需求。(5) The circuit implementation cost of this security authentication method is low, and the power consumption is small, which can meet the requirements of low cost and low power consumption of the tag chip.

附图说明Description of drawings

图1为发明内容示意图。Fig. 1 is a schematic diagram of the content of the invention.

图2为射频识别系统示意图。Figure 2 is a schematic diagram of the radio frequency identification system.

图3为本发明实例的认证过程示意图。Fig. 3 is a schematic diagram of the authentication process of the example of the present invention.

具体实施方式Detailed ways

如图2所示,一个基本的射频识别系统由三部分组成:电子标签102、读卡器101和天线103、104。读卡器101和电子标签102之间通过天线103、104来传输信号,而读卡器101端,因为设计需要来决定是否与以数据处理终端105相连。电子标签102由耦合元件及芯片组成,每个标签具有唯一的电子编码,附着在物体上标识目标对象。读卡器101是读取(或写入)标签信息的设备,可设计为手持式或固定式。天线103、104是用来在标签和读卡器间传递射频信号。读卡器101可以被设计为手持式或固定式,其中,手持式的读卡器应具有相应的存储功能和数据运算功能,以确保能顺利的完成认证功能,而固定式的读卡器则可与终端PC相连,存储功能和数据运算功能可由终端承担。电子标签也被设计成具有相应运算和控制功能。读卡器或者终端存有所有合法电子标签的唯一标识符UID(C)和相应的认证密钥(k1,k2)。电子标签内部的存储器空间被划分为三部分,分别用来存储唯一标识符UID(C),认证密钥(k1,k2)和用户信息。As shown in FIG. 2 , a basic radio frequency identification system consists of three parts: anelectronic tag 102 , acard reader 101 andantennas 103 and 104 . Signals are transmitted between thecard reader 101 and theelectronic tag 102 through theantennas 103 and 104 , and thecard reader 101 end is determined whether to be connected to thedata processing terminal 105 due to design requirements. Theelectronic tag 102 is composed of a coupling element and a chip, each tag has a unique electronic code, and is attached to an object to identify a target object. Thecard reader 101 is a device for reading (or writing) tag information, and can be designed as a hand-held or fixed type. Theantennas 103 and 104 are used to transmit radio frequency signals between the tag and the card reader. Thecard reader 101 can be designed as hand-held or fixed, wherein the hand-held card reader should have corresponding storage functions and data calculation functions to ensure that the authentication function can be successfully completed, while the fixed card reader can It can be connected with the terminal PC, and the storage function and data calculation function can be undertaken by the terminal. Electronic tags are also designed to have corresponding computing and control functions. The card reader or terminal stores the unique identifier UID (C) of all legal electronic tags and the corresponding authentication keys (k1, k2). The internal memory space of the electronic tag is divided into three parts, which are used to store the unique identifier UID (C), authentication keys (k1, k2) and user information respectively.

在认证过程中,伪标签攻击方因为不知道合法的c和k1,计算不出正确的认证码,无法冒充成合法标签。对于标签的攻击,因为k2的存在,也可以避免。而且,标签每次的响应经过了随机数P的掩码以及k1的更新,地点隐私得到了较好的保护。同时,散列函数的使用,也使攻击方企图分析数据以获得密钥变成不可能。During the authentication process, the pseudo-label attacker cannot calculate the correct authentication code because he does not know the legal c and k1, and cannot pretend to be a legal label. For label attacks, because of the existence of k2, it can also be avoided. Moreover, each response of the tag is masked by the random number P and updated by k1, and the privacy of the location is better protected. At the same time, the use of the hash function also makes it impossible for the attacker to analyze the data to obtain the key.

下面举例对本发明方法作进一步详细的说明。The method of the present invention is described in further detail below with examples.

实例:Example:

结合图3来说明本认证方式的具体实施方式:手持式设备中读卡器具备存储功能和数据运算功能,而固定式设备可将读卡器101与终端PC105相连。在本例中,读卡器设定为固定式设备,认证过程如下:The specific implementation of this authentication method is described with reference to FIG. 3 : the card reader in the handheld device has storage function and data calculation function, and thecard reader 101 can be connected with the terminal PC105 in the fixed device. In this example, the card reader is set as a fixed device, and the authentication process is as follows:

(1)首先,读卡器发送带伪随机数R的询问指令。(1) First, the card reader sends an inquiry command with a pseudo-random number R.

(2)电子标签接收到询问指令后,从标签芯片内部EEPROM中读取密钥k1,进行运算S1=hash(R,k1),并返回M=f(s1‖c,p)。其中f=(x,p)表示将x用随机数p进行掩码,符号“‖”表示位串。(2) After the electronic tag receives the query command, it reads the key k1 from the EEPROM inside the tag chip, performs the operation S1=hash(R, k1), and returns M=f(s1∥c,p). Where f=(x, p) means to mask x with a random number p, and the symbol "∥" means a bit string.

(3)读卡器通过防冲突机制正确识别到电子标签响应的信息M后,将M和随机数R一起传送给终端PC。(3) After the card reader correctly recognizes the information M of the electronic tag response through the anti-collision mechanism, it transmits M and the random number R to the terminal PC together.

(4)终端对响应M进行判断,即认证电子标签。认证过程为:首先运行f-1(s1‖c,p),得到响应电子标签的UID信息、C,然后根据C从存储的信息中取得相应的k1,计算S2=hash(R,k1),判断S2是否等于S1。不等,则认为标签是伪标签,终止通信;相等,则认为标签合法,继续下一步操作。(4) The terminal judges the response M, that is, authenticates the electronic tag. The authentication process is as follows: first run f-1 (s1∥c, p) to obtain the UID information and C of the response electronic tag, and then obtain the corresponding k1 from the stored information according to C, and calculate S2=hash(R, k1), Determine whether S2 is equal to S1. If they are not equal, the label is considered to be a pseudo-label, and the communication is terminated; if they are equal, the label is considered legal, and the next operation is continued.

(5)如果电子标签为合法电子标签,终端从数据库取出另一密钥k2,运算N1=hash(k2,c),并发送给读卡器。(5) If the electronic tag is a valid electronic tag, the terminal fetches another key k2 from the database, calculates N1=hash(k2, c), and sends it to the card reader.

(6)读卡器将N1传送给电子标签。(6) The card reader transmits N1 to the electronic tag.

(7)电子标签正确接收到N1后,从电子标签芯片内部EEPROM中读取另一密钥k2,然后进行运算N2=hash(k2,c),再比较N2与N1。相等,则通过认证,此时,交互认证完成,读卡器可以对电子标签进行一系列需要的操作。不等,则认证失败,电子标签不会对读卡器的其他指令进行响应。(7) After the electronic tag receives N1 correctly, it reads another key k2 from the EEPROM inside the electronic tag chip, and then performs the operation N2=hash(k2, c), and then compares N2 and N1. If they are equal, the authentication is passed. At this time, the interactive authentication is completed, and the card reader can perform a series of required operations on the electronic tag. If not, the authentication will fail, and the electronic tag will not respond to other commands of the card reader.

(8)在完成认证后,读卡器和标签双方以相同的方式更新密钥k1,k2。(8) After completing the authentication, both the card reader and the tag update the keys k1 and k2 in the same way.

本实例步骤(2)和步骤(5)均采用相同的散列函数如安全hash算法(SHA)或者hash算法MD5等进行散列运算,这样对于标签的低成本实现更具意义。In this example, steps (2) and (5) both use the same hash function such as secure hash algorithm (SHA) or hash algorithm MD5 to perform hash operations, which is more meaningful for low-cost implementation of tags.

Claims (2)

CNB2006101246625A2006-09-302006-09-30 A security authentication method in a radio frequency identification systemExpired - Fee RelatedCN100405386C (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CNB2006101246625ACN100405386C (en)2006-09-302006-09-30 A security authentication method in a radio frequency identification system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CNB2006101246625ACN100405386C (en)2006-09-302006-09-30 A security authentication method in a radio frequency identification system

Publications (2)

Publication NumberPublication Date
CN1932835A CN1932835A (en)2007-03-21
CN100405386Ctrue CN100405386C (en)2008-07-23

Family

ID=37878665

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CNB2006101246625AExpired - Fee RelatedCN100405386C (en)2006-09-302006-09-30 A security authentication method in a radio frequency identification system

Country Status (1)

CountryLink
CN (1)CN100405386C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2010012210A1 (en)*2008-08-012010-02-04西安西电捷通无线网络通信有限公司Electronic label authenticating method and system

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101374153B (en)*2007-08-232012-02-29中国移动通信集团公司 Method for safely activating third-party applications, third-party server, terminal and system
CN101217362B (en)*2007-12-292010-04-21中山大学 An RFID Communication Security Mechanism Based on Dynamic Randomized DRNTRU Public Key Encryption System
CN101561860B (en)*2008-04-172012-11-28锐迪科微电子(上海)有限公司Card reader and method of mutual authentication of storage card
CN101599829B (en)*2008-06-062012-04-04华为技术有限公司 Authentication Methods, Readers and Tags
CN101625727B (en)*2008-07-082014-03-05晨星软件研发(深圳)有限公司 Radio Frequency Identification Tag and Method of Operation
CN101330387B (en)*2008-07-242010-12-08华为终端有限公司 Method for machine card authentication, communication device and authentication system
CN101667255B (en)*2008-09-042011-12-21华为技术有限公司Security authentication method, device and system for radio frequency identification
CN101676928B (en)*2008-09-162011-12-07华为技术有限公司Method, device and system for radio frequency identification
CN101394411B (en)*2008-11-122011-08-17北京飞天诚信科技有限公司Safe packet transmission system and method
CN101789068B (en)*2009-01-222012-11-07深圳市景丰汇达科技有限公司Card reader safety certification device and method
US20110066853A1 (en)*2009-05-132011-03-17Daniel Wayne EngelsSystem and method for securely identifying and authenticating devices in a symmetric encryption system
JP4856743B2 (en)*2009-08-062012-01-18株式会社バッファロー Wireless communication apparatus, wireless communication system, and network apparatus
CN102081727B (en)*2009-11-302014-04-30中兴通讯股份有限公司Safety certificate method and system for radio frequency identification
CN102236773A (en)*2010-04-302011-11-09航天信息股份有限公司Radio frequency identification (RFID) encryption verification system and method
CN101976365B (en)*2010-11-052012-09-19中国航天科工集团第二研究院七○六所Safe radio frequency identification system
CN103875006B (en)*2011-08-082017-06-06米高公司 Radio Frequency Identification (RFID) Tags and Related Apparatus and Methods
CN102622619A (en)*2012-01-102012-08-01上海交通大学Safety wireless identification system and authentication method thereof
CN102750561B (en)*2012-06-072015-08-12中国科学技术大学A kind of method of efficient active safety radio frequency identification authentication
CN102831457B (en)*2012-08-242015-06-24广州中盈物流科讯有限公司Passive RFID ((Radio Frequency Identification Device) temperature sensor label
CN102932338B (en)*2012-10-242015-01-21中国航天科工集团第二研究院七〇六所System and method for safe network access of radio-frequency identification system
CN103295048A (en)*2013-05-202013-09-11爱康普科技(大连)有限公司 Electronic label information transmission system and method
CN103366103B (en)*2013-06-132016-02-10广东岭南通股份有限公司The application program encryption protecting method of card reader
CN103473592B (en)*2013-09-252016-05-11成都市易恒信科技有限公司A kind of label off-line authenticating method and device based on CPK system
CN103824107B (en)*2013-11-152015-12-02深圳光启智能光子技术有限公司product identification device, terminal, product information verification system and method
CN103929308B (en)*2014-04-012017-07-18嘉兴市辰翔信息科技有限公司Information Authentication method applied to rfid card
CN104200177A (en)*2014-09-122014-12-10罗满清Mobile medical sensitive data encryption method
CN104166823A (en)*2014-09-122014-11-26罗满清Intelligent medical data safety guarantee system
CN104240170B (en)*2014-09-122018-04-06和宇健康科技股份有限公司It is a kind of realizing the high-end electronic medical records system of intelligent medical treatment
CN107067042B (en)*2017-05-172019-12-31江苏本能科技有限公司Automobile electronic identification classification processing method and system
CN109218251B (en)*2017-06-292022-03-22国民技术股份有限公司Anti-replay authentication method and system
WO2019075650A1 (en)*2017-10-182019-04-25深圳大学Paper anti-counterfeiting method and system
CN111523332B (en)*2020-03-252021-05-14西北工业大学RFID malicious reader detection device and reader for detecting malicious reader
CN112469036B (en)*2020-10-232023-10-20百果园技术(新加坡)有限公司Message encryption and decryption method and device, mobile terminal and storage medium
CN112801677B (en)*2021-02-062024-09-10深圳市新时空智能系统有限公司Anti-counterfeiting tracing method based on electronic tag
CN119110288B (en)*2024-09-252025-09-09西安电子科技大学Mutual authentication and switching authentication method between radio frequency source and equipment in backscattering communication

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050058292A1 (en)*2003-09-112005-03-17Impinj, Inc., A Delaware CorporationSecure two-way RFID communications
US20050187882A1 (en)*2004-02-252005-08-25Sampo SovioElectronic payment schemes in a mobile environment for short-range transactions
CN1818923A (en)*2006-03-172006-08-16清华大学Enciphering authentication for radio-frequency recognition system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050058292A1 (en)*2003-09-112005-03-17Impinj, Inc., A Delaware CorporationSecure two-way RFID communications
US20050187882A1 (en)*2004-02-252005-08-25Sampo SovioElectronic payment schemes in a mobile environment for short-range transactions
CN1818923A (en)*2006-03-172006-08-16清华大学Enciphering authentication for radio-frequency recognition system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Mutual authentication protocol for RFID conforming toEPC Class 1 Generation 2 Standards. Hung-Yu Chien,Che-Hao Chen.Computer Standards & Interfaces,Vol.29 . 2006
Mutual authentication protocol for RFID conforming toEPC Class 1 Generation 2 Standards. Hung-Yu Chien,Che-Hao Chen.Computer Standards & Interfaces,Vol.29 . 2006*

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2010012210A1 (en)*2008-08-012010-02-04西安西电捷通无线网络通信有限公司Electronic label authenticating method and system
KR101256284B1 (en)*2008-08-012013-04-18차이나 아이더블유엔콤 씨오., 엘티디Electronic label authenticating method and system
US8466775B2 (en)2008-08-012013-06-18China Iwncomm Co., Ltd.Electronic label authenticating method and system

Also Published As

Publication numberPublication date
CN1932835A (en)2007-03-21

Similar Documents

PublicationPublication DateTitle
CN100405386C (en) A security authentication method in a radio frequency identification system
CN103795543B (en)Safety bidirectional authentication method for RFID system
CN101976363A (en)Hash function based RFID (Radio Frequency Identification Devices) authentication method
CN101980241B (en)Method, system and device for authenticating radio frequency tag
CN102684872A (en)Safety communication method for ultrahigh frequency radio-frequency identification air interface based on symmetrical encryption
CN102594550A (en)RFID internal mutual authentication safety protocol based on secret key array
CN116090489A (en)Bidirectional authentication method of RFID system and RFID system
CN100552691C (en) A binary anti-collision method with security mechanism in RFID
CN104579688B (en)It is a kind of based on Hash function can synchronized update key RFID mutual authentication method
CN106603228A (en)RFID key wireless generation method based on Rabin encryption
Jain et al.Analysis of vulnerabilities in radio frequency identification (RFID) systems
Li et al.Privacy protection for low-cost RFID tags in IoT systems
Huang et al.An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags
Moradi et al.Security analysis and strengthening of an RFID lightweight authentication protocol suitable for VANETs
KR101215155B1 (en)System for and method of protecting communication between reader and tag in rfid system
CN113988103B (en)RFID identification method based on multiple tags
Tian-tian et al.A security RFID authentication protocol based on hash function
KR101053636B1 (en) Authentication method and system between tag and RFID reader using multiple encryption methods
Eghdamian et al.A secure protocol for ultralightweight radio frequency identification (RFID) tags
Ren et al.An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol.
Sadighian et al.FLMAP: A fast lightweight mutual authentication protocol for RFID systems
Maarof et al.Security analysis of low cost RFID systems
Huixian et al.Mutual authentication and ownership transfer scheme conforming to EPC-C1G2 standard
ChienThe study of RFID authentication protocols and security of some popular RFID tags
Wang et al.PGMAP: A privacy guaranteed mutual authentication protocol conforming to EPC class 1 gen 2 standards

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
CF01Termination of patent right due to non-payment of annual fee
CF01Termination of patent right due to non-payment of annual fee

Granted publication date:20080723

Termination date:20160930


[8]ページ先頭

©2009-2025 Movatter.jp