CN101211401A - Method and system for protecting radio frequency identification tag and reader data safety - Google Patents
Method and system for protecting radio frequency identification tag and reader data safety Download PDFInfo
- Publication number
- CN101211401A CN101211401A CNA2006101702878A CN200610170287A CN101211401A CN 101211401 A CN101211401 A CN 101211401A CN A2006101702878 A CNA2006101702878 A CN A2006101702878A CN 200610170287 A CN200610170287 A CN 200610170287A CN 101211401 A CN101211401 A CN 101211401A
- Authority
- CN
- China
- Prior art keywords
- server
- reader
- rfid
- authentication
- list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a method and system to protect data safety of RF identification (RFID) tags and acquisition devices, so as to fulfill bidirectional authority verification between a network server and RFID tags and acquisition devices; therefore, the invention can effectively prevent illegal access on RFID tags and acquisition devices that have not passed safety certification. When effectively using a matured and simple arithmetic structure, the RFID system has no higher requirement for system hardware, so as to effectively lower composition cost between the RFID system and prior telecom network.
Description
Technical field
Relate generally to RFID of the present invention (radio-frequency (RF) identification) is specifically related to protect the method and system of RFID label and reader data safety.
Background technology
A typical R FID system generally partly is made up of RFID label, reader and computer system etc.Wherein generally preserve the coded data of agreement form in the RFID label, in order to the accompanying object of unique identification label.Compare with traditional bar codes technique, it have noncontact read, need not optical alignment, operating distance long, be suitable for rugged surroundings, can discern clear superiority such as moving target, benefit development of electronic technology again, therefore obtained gradually using widely.The identification, highway that typical application comprises train and freight container charge and traffic administration automatically, warehousing management, gate control system, aspect such as antitheft and false proof.Current RFID technical research mainly concentrates on aspects such as the space orientation of Antenna Design, safety and privacy protection, label and anticollision technology.
Rfid system is when carrying out the data acquisition operation, label and reader adopt radio frequency signal to communicate, this is in that collection provides dirigibility and simultaneously the information of transmission is exposed in public easily to system data, and this is undoubtedly the significant threat of information security.For the rfid system part of data acquisition, the threat of information security mainly comes to illegally the reading and change of label information, to the illegal tracking of label, effectively identity pretends to be and cheat three aspects.At the problem of rfid system data security, the solution of various approach has been proposed now, wherein representational method has following several: physical isolation, the tag service that stops, read access control, two label joint verification.
The rfid system data security solution of above-mentioned approach respectively has its limitation.Wherein, the main thought of this method of physical isolation is: do not wishing to use physical method blocking-up electromagnetic wave bang path when label is read.This method is simple, direct and effective, is applicable to RFID simple application occasion.But its simple and safe mechanism has also limited its range of application: at first, the article volume of posting the RFID label can not be too big, and wireless telecommunications system also is unsuitable for the method for this electromagnetic screen; Secondly, though the RFID label that is in the shielding isolation has been protected information wherein, this moment, label can not provide service.
After stopping tag service and be exactly finishing, partly or completely stop the information service of label in the application cycle of RFID label.This method is simple, but the simplest information protection only is provided, and is can applicable scope very little.What need at present to solve is the problem that how to guarantee to stop the validity problem of label and how label is reused.
Read access control is the scheme of utilizing hash function to encrypt and verify.This method has all carried out encrypting protection to the whole process of reader communication, particularly proof procedure has been added random number.Have anti-eavesdrop, the anti-ability of following the tracks of, preventing deception, and can change legal reader ID safely.Yet it is very high to the requirement of hardware, and especially label will be realized many logical operations and require to have read-write storer.
The main thought of two label joint verification methods is when two corresponding RFID labels are read device and read simultaneously, uses fetch equipment to verify mutually as intermediary.It still requires compute Hash functions and requires label that the storer of 360 bits is arranged, and also will await the progressive of RFID hardware technology could realize for passive label.
Therefore, need such rfid system data security protection method, it can the protection system data security, does not influence rfid system again and uses at any time, lowers the requirement to hardware simultaneously, simplifies and encrypts and verification algorithm.
Summary of the invention
At the above-mentioned problems in the prior art; target of the present invention is the method and system that proposes a kind of RFID of protection label and reader data safety; can be by the bi-directional authentification of network and RFID label and reader; effectively prevent from not pass through the illegal access of the RFID label and the reader of safety certification; make rfid system when effectively utilizing maturation, simple algorithm structure; system hardware is not proposed higher requirement, thereby effectively reduce the fusion cost of rfid system and existing communication network.
According to an aspect of the present invention, a kind of method of protecting radio frequency identification (RFID) labels and reader data safety is provided, may further comprise the steps: server is in the service request of receiving the RFID label or powerup/reset when notice of receiving reader, utilize the local server ID and first list of random numbers of preserving to generate first authentication parameter, and send the authentication order that comprises first authentication parameter to RFID label or reader by secure cryptographic algorithm; RFID label or reader are after receiving described authentication order, utilize the local server ID and second list of random numbers of preserving to generate second authentication parameter by secure cryptographic algorithm, and check second authentication parameter whether to conform to first authentication parameter that comprises in the authentication order of being received,, both verify that described server is legal if conforming to; If authentication server is legal, then local RFID label ID that preserves of RFID label or reader utilization or reader ID and second list of random numbers generate the 3rd authentication parameter by secure cryptographic algorithm, and send the Authentication Response that comprises the 3rd authentication parameter and described RFID label ID or reader ID to server; And server is after receiving described Authentication Response, the RFID label ID or the reader ID that comprise in the Authentication Response that utilizes local first list of random numbers of preserving and received generate the 4th authentication parameter by secure cryptographic algorithm, and check the 4th authentication parameter whether to conform to the 3rd authentication parameter that comprises in the Authentication Response of being received, if conforming to, both verify that described RFID label or reader are legal, wherein, second list of random numbers of preserving in first list of random numbers of preserving in the legal server and legal RFID label or the reader is identical.
According to another aspect of the present invention, provide a kind of system that protects the radio frequency discrimination RFID data security, comprising: server; RFID reader by wired or wireless mode and server communication; And the RFID label by wireless mode and RFID reader communication, wherein, server stores has self networks sign " server ID " and first list of random numbers, and has the logical circuit that can realize secure cryptographic algorithm; The RFID reader stores has network identity " server ID ", self networks sign " reader ID " and second list of random numbers of server, and has the logical circuit that can realize secure cryptographic algorithm; The RFID tag storage has network identity " server ID ", self networks sign " label ID " and second list of random numbers of server, and has the logical circuit that can realize secure cryptographic algorithm; And server and RFID label or RFID reader can be carried out bi-directional authentification according to said method.
The present invention is by bi-directional authentification and adopt the mode of common crypto algorithm that bi-directional authentification and data encryption between RFID label and the reader and the webserver are provided, and has following technological merit:
I. avoided can only guaranteeing in the unidirectional authentication data of server authentication RFID label and reader thereof and terminal can't authentication server whether legal drawback, thereby protected RFID label and reader data safety thereof, avoid RFID terminal and server data in the radio communication link by unauthorized theft;
II. use widely used secure cryptographic algorithm in communication system, MD5 (Message-Digest Algorithm 5) cryptographic algorithm for example, this algorithm has extremely strong security, and the algorithm application maturation, thereby has improved the security of system data in radio propagation path;
III.RFID label and reader thereof only need increase storage tags ID, reader ID, server ID, a random number sequence and increase simple algorithm realizes logical circuit, can provide at existing rfid system under the situation of big storage space and strong data-handling capacity, realize that this demand there is no difficulty.
Description of drawings
Fig. 1 is the overall construction drawing of RFID application system according to an embodiment of the invention;
Fig. 2 is according to the process flow diagram of embodiments of the invention to the authentication process of RFID reader data; And
Fig. 3 is according to the process flow diagram of embodiments of the invention to the authentication process of RFID label data.
Embodiment
Fig. 1 shows network entity and the attribute thereof related according to the general structure of a kind of RFID application system of the embodiment of the invention.Particularly, this RFID application system comprises three network entities: server, RFID reader and RFID label.
This server is the system service management server, and it act as request that response RFID label and reader thereof send or RFID label and reader thereof are given an order.This server can carry out exchanges data by wired or wireless mode and RFID reader.The list of random numbers that this server stores has self networks sign " server ID " and has with RFID label and reader thereof, and have the logical circuit that can realize secure cryptographic algorithm (for example md5 encryption algorithm).
The order that act as response server of this RFID reader or read the information of RFID label.This RFID reader can carry out exchanges data by wired or wireless mode and server, carries out exchanges data by wireless mode and RFID label.This RFID reader stores has network identity " server ID ", self networks sign " reader ID " and the list of random numbers total with server of server, and has the logical circuit that can realize secure cryptographic algorithm (for example md5 encryption algorithm).
This RFID label act as the order of sending service request or response server.This RFID label carries out exchanges data by wireless mode and RFID reader.This RFID tag storage has network identity " server ID ", self networks sign " label ID " and the list of random numbers total with server of server, and has the logical circuit that can realize secure cryptographic algorithm (for example md5 encryption algorithm).
In this RFID application system, label ID, reader ID and server ID are respectively RFID label, reader and the server unique identifications in network.
Describe according to the detailed process of embodiments of the invention below with reference to Fig. 2 the authentication process of RFID reader data.As shown in Figure 2, this authentication process is the bi-directional authentification process between RFID reader and the server, comprises the steps:
(a) after the RFID reader powers on or resets, send to server and to power on or reset notice;
(b) server is being received powering on or the notice or when requiring reader to carry out authentication of resetting of reader, and the server ID of being stored and the random number of a random choose from the list of random numbers of being stored are calculated a M (SR) value through secure cryptographic algorithm (for example md5 encryption algorithm);
(c) server sends an authentication order to reader, in this order above-mentioned M (SR) and the sequence number of random number in the list of random numbers of being stored selected is issued reader as authentication parameter;
(d) reader is after receiving the authentication order, in the list of random numbers that preserve this locality, find corresponding random number according to the random number sequence number of receiving, and the server ID of preserving together with this locality calculates (SR) value of a M ' by secure cryptographic algorithm (for example md5 encryption algorithm), then it is compared with the M (SR) that receives, represent that if both are identical server is legal;
(e) reader is after authentication server is legal, obtains a M (RS) value after earlier the random number of the reader ID that stored and a random choose from the list of random numbers of being stored being encrypted through secure cryptographic algorithm (for example md5 encryption algorithm);
(f) reader sends an Authentication Response to server, in this response above-mentioned M (RS), the reader ID that is stored and the sequence number of random number in the list of random numbers of being stored selected is issued server as authentication parameter;
(g) server is after receiving the Authentication Response of reader, in the list of random numbers that preserve this locality, find corresponding random number according to the random number sequence number of receiving, and calculate a M ' (RS) by secure cryptographic algorithm (for example md5 encryption algorithm) together with the reader ID that receives, then it is compared with the M (RS) that receives, represent that if both are identical this reader is legal, thereby finish the bi-directional authentification of reader and server.
Describe according to the detailed process of embodiments of the invention below with reference to Fig. 3 the authentication process of RFID label data.As shown in Figure 3, this authentication process is the bi-directional authentification process between RFID label and the server when the RFID label sends service request, both sides' data are transmitted in the RFID reader conduct this moment transparent channel of data transmission between the two, and this authentication process comprises the steps:
(a) the RFID label sends service request;
(b) server is after the service request of receiving the RFID label, and the server ID of being stored and the random number of a random choose from the list of random numbers of being stored are calculated a M (ST) value through secure cryptographic algorithm (for example md5 encryption algorithm);
(c) server sends an authentication order to the RFID label, in this order above-mentioned M (ST) and the sequence number of random number in the list of random numbers of being stored selected is issued the RFID label as authentication parameter;
(d) the RFID label is after receiving the authentication order, in the list of random numbers that preserve this locality, find corresponding random number according to the random number sequence number of receiving, and the server ID of preserving together with this locality calculates (ST) value of a M ' by secure cryptographic algorithm (for example md5 encryption algorithm), then it is compared with the M (ST) that receives, represent that if both are identical server is legal;
(e) the RFID label is after authentication server is legal, obtains a M (TS) value after the random number of the label ID that stored and a random choose from the list of random numbers of being stored is encrypted through secure cryptographic algorithm (for example md5 encryption algorithm);
(f) the RFID label sends an Authentication Response to server, in this response above-mentioned M (TS), the label ID that is stored and the sequence number of random number in the list of random numbers of being stored selected is issued server as authentication parameter;
(g) server is behind the Authentication Response of receiving the RFID label, in the list of random numbers that preserve this locality, find corresponding random number according to the random number sequence number of receiving, and calculate a M ' (TS) by secure cryptographic algorithm (for example md5 encryption algorithm) together with the label ID that receives, then it is compared with the M (TS) that receives, represent that if both are identical this RFID label is legal, thereby finish the bi-directional authentification of RFID label and server.
As mentioned above, M (SR), M ' (SR), M (RS), M ' (RS), M (ST), M ' (ST), M (TS), M ' (TS) respectively respective identification by server, RFID reader, RFID label and random number encrypt through secure cryptographic algorithm and obtain, as the authentication parameter of bi-directional authentification between server and RFID reader or the RFID label.Yet the present invention is not limited to above-mentioned specific authentication parameter.According to above description, those of ordinary skills expect that easily the present invention can realize by other various authentication parameters.
Claims (5)
1. method of protecting radio frequency identification (RFID) labels and reader data safety may further comprise the steps:
Server is in the service request of receiving the RFID label or powerup/reset when notice of receiving reader, utilize the local server ID and first list of random numbers of preserving to generate first authentication parameter, and send the authentication order that comprises first authentication parameter to RFID label or reader by secure cryptographic algorithm;
RFID label or reader are after receiving described authentication order, utilize the local server ID and second list of random numbers of preserving to generate second authentication parameter by secure cryptographic algorithm, and check second authentication parameter whether to conform to first authentication parameter that comprises in the authentication order of being received,, both verify that described server is legal if conforming to;
If authentication server is legal, then local RFID label ID that preserves of RFID label or reader utilization or reader ID and second list of random numbers generate the 3rd authentication parameter by secure cryptographic algorithm, and send the Authentication Response that comprises the 3rd authentication parameter and described RFID label ID or reader ID to server; And
Server is after receiving described Authentication Response, the RFID label ID or the reader ID that comprise in the Authentication Response that utilizes local first list of random numbers of preserving and received generate the 4th authentication parameter by secure cryptographic algorithm, and check the 4th authentication parameter whether to conform to the 3rd authentication parameter that comprises in the Authentication Response of being received, if conforming to, both verify that described RFID label or reader are legal
Wherein, second list of random numbers of preserving in first list of random numbers of preserving in the legal server and legal RFID label or the reader is identical.
2. method according to claim 1, wherein, described secure cryptographic algorithm is the md5 encryption algorithm.
3. method according to claim 1 and 2, wherein, described first authentication parameter be utilize server ID that server preserves and from first list of random numbers random number of random choose generate, the sequence number of the random number of being selected in first list of random numbers is included in the described authentication order together with described first authentication parameter, and described second authentication parameter is to utilize the RFID label or the server ID of reader preservation and the corresponding random number that finds from second list of random numbers according to the described sequence number that comprises in the described authentication order to generate.
4. method according to claim 1 and 2, wherein, described the 3rd authentication parameter be utilize RFID label ID that RFID label or reader preserve or reader ID and from second list of random numbers random number of random choose generate, the sequence number of the random number of being selected in second list of random numbers is included in the described Authentication Response together with described the 3rd authentication parameter and RFID label ID or reader ID, and described the 4th authentication parameter is to utilize the RFID label ID that comprises in the described Authentication Response or reader ID and the corresponding random number that finds from first list of random numbers according to the described sequence number that comprises in the described Authentication Response generates.
5. system that protects the radio frequency discrimination RFID data security comprises:
Server;
RFID reader by wired or wireless mode and server communication; And
By the RFID label of wireless mode and RFID reader communication,
Wherein, server stores has self networks sign " server ID " and first list of random numbers, and has the logical circuit that can realize secure cryptographic algorithm;
The RFID reader stores has network identity " server ID ", self networks sign " reader ID " and second list of random numbers of server, and has the logical circuit that can realize secure cryptographic algorithm;
The RFID tag storage has network identity " server ID ", self networks sign " label ID " and second list of random numbers of server, and has the logical circuit that can realize secure cryptographic algorithm; And
Server and RFID label or RFID reader can be carried out bi-directional authentification according to each described method in the claim 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006101702878A CN100504908C (en) | 2006-12-26 | 2006-12-26 | Method and system for protecting radio frequency identification tag and reader data safety |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006101702878A CN100504908C (en) | 2006-12-26 | 2006-12-26 | Method and system for protecting radio frequency identification tag and reader data safety |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101211401A true CN101211401A (en) | 2008-07-02 |
CN100504908C CN100504908C (en) | 2009-06-24 |
Family
ID=39611419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006101702878A Active CN100504908C (en) | 2006-12-26 | 2006-12-26 | Method and system for protecting radio frequency identification tag and reader data safety |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100504908C (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101951371A (en) * | 2010-09-17 | 2011-01-19 | 浙江大学 | Method for authenticating electronic tags in Internet of things |
CN102065423A (en) * | 2010-12-13 | 2011-05-18 | 中国联合网络通信集团有限公司 | Node access authentication method, access authenticated node, access node and communication system |
CN102223597A (en) * | 2010-04-15 | 2011-10-19 | 上海启电信息科技有限公司 | Mobile positioning device |
CN102236939A (en) * | 2010-05-05 | 2011-11-09 | 国民技术股份有限公司 | Access method for radio frequency communication with low-frequency magnetic communication |
CN102402672A (en) * | 2010-09-14 | 2012-04-04 | 公安部第三研究所 | RFID (radio frequency identification) ultra-high-frequency safe air interface protocol applied to vehicle environments |
CN102646203A (en) * | 2012-02-29 | 2012-08-22 | 电子科技大学 | RFID (Radio Frequency Identification Device) data transmission and authentication system and method |
CN103049769A (en) * | 2012-02-24 | 2013-04-17 | 深圳中科讯联科技有限公司 | Communication method for preventing radiofrequency card conflict |
CN103413109A (en) * | 2013-08-13 | 2013-11-27 | 江西理工大学 | Bidirectional authentication method of radio frequency identification system |
CN104270346A (en) * | 2014-09-12 | 2015-01-07 | 北京天行网安信息技术有限责任公司 | Bidirectional authentication method, device and system |
CN104636774A (en) * | 2014-12-19 | 2015-05-20 | 中国印钞造币总公司 | Method and device for implementing automatic locking of electronic seal of note transport bag |
CN104780049A (en) * | 2015-04-15 | 2015-07-15 | 四川量迅科技有限公司 | Method for safely reading and writing data |
CN108573182A (en) * | 2018-04-26 | 2018-09-25 | 深圳市盛路物联通讯技术有限公司 | A kind of radio frequency signal communication method and system |
CN108737449A (en) * | 2018-06-26 | 2018-11-02 | 华立科技股份有限公司 | Soft encryption authentication method, device and electronic equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6532290B1 (en) * | 1999-02-26 | 2003-03-11 | Ericsson Inc. | Authentication methods |
CN1149787C (en) * | 2001-04-29 | 2004-05-12 | 华为技术有限公司 | Method of adding subscriber's security confirmation to simple network management protocol |
CN1467943A (en) * | 2002-07-10 | 2004-01-14 | ����ͨѶ�ɷ�����˾ | CDMA system and method for implementing bi-directional authentification |
CN1588386B (en) * | 2004-08-02 | 2011-08-24 | 上海质尊电子科技有限公司 | System and method for realizing article information detection by radio frequency identification and mobile communication combination |
-
2006
- 2006-12-26 CN CNB2006101702878A patent/CN100504908C/en active Active
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223597A (en) * | 2010-04-15 | 2011-10-19 | 上海启电信息科技有限公司 | Mobile positioning device |
US8615083B2 (en) | 2010-05-05 | 2013-12-24 | Nationz Technologies Inc. | Method for accessing to radio frequency communication with low-frequency electromagnetic communication |
CN102236939A (en) * | 2010-05-05 | 2011-11-09 | 国民技术股份有限公司 | Access method for radio frequency communication with low-frequency magnetic communication |
WO2011137600A1 (en) * | 2010-05-05 | 2011-11-10 | 国民技术股份有限公司 | Method for accessing to radio frequency communication with low-frequency electromagnetic communication |
CN102236939B (en) * | 2010-05-05 | 2012-12-26 | 国民技术股份有限公司 | Access method for radio frequency communication with low-frequency magnetic communication |
CN102402672A (en) * | 2010-09-14 | 2012-04-04 | 公安部第三研究所 | RFID (radio frequency identification) ultra-high-frequency safe air interface protocol applied to vehicle environments |
CN101951371B (en) * | 2010-09-17 | 2012-12-26 | 浙江大学 | Method for authenticating electronic tags in Internet of things |
CN101951371A (en) * | 2010-09-17 | 2011-01-19 | 浙江大学 | Method for authenticating electronic tags in Internet of things |
CN102065423B (en) * | 2010-12-13 | 2013-07-10 | 中国联合网络通信集团有限公司 | Node access authentication method, access authenticated node, access node and communication system |
CN102065423A (en) * | 2010-12-13 | 2011-05-18 | 中国联合网络通信集团有限公司 | Node access authentication method, access authenticated node, access node and communication system |
CN103049769B (en) * | 2012-02-24 | 2015-10-07 | 深圳中科讯联科技有限公司 | The communication means that radio-frequency card conflicts can be prevented |
CN103049769A (en) * | 2012-02-24 | 2013-04-17 | 深圳中科讯联科技有限公司 | Communication method for preventing radiofrequency card conflict |
CN102646203A (en) * | 2012-02-29 | 2012-08-22 | 电子科技大学 | RFID (Radio Frequency Identification Device) data transmission and authentication system and method |
CN102646203B (en) * | 2012-02-29 | 2014-12-03 | 电子科技大学 | RFID (Radio Frequency Identification Device) data transmission and authentication system and method |
CN103413109B (en) * | 2013-08-13 | 2016-04-06 | 江西理工大学 | A kind of mutual authentication method of radio frequency identification system |
CN103413109A (en) * | 2013-08-13 | 2013-11-27 | 江西理工大学 | Bidirectional authentication method of radio frequency identification system |
CN104270346A (en) * | 2014-09-12 | 2015-01-07 | 北京天行网安信息技术有限责任公司 | Bidirectional authentication method, device and system |
CN104270346B (en) * | 2014-09-12 | 2017-10-13 | 北京天行网安信息技术有限责任公司 | The methods, devices and systems of two-way authentication |
CN104636774A (en) * | 2014-12-19 | 2015-05-20 | 中国印钞造币总公司 | Method and device for implementing automatic locking of electronic seal of note transport bag |
CN104636774B (en) * | 2014-12-19 | 2017-10-10 | 中国印钞造币总公司 | A kind of method and device for realizing fortune paper money bag electronic sealing self-locking |
CN104780049A (en) * | 2015-04-15 | 2015-07-15 | 四川量迅科技有限公司 | Method for safely reading and writing data |
CN108573182A (en) * | 2018-04-26 | 2018-09-25 | 深圳市盛路物联通讯技术有限公司 | A kind of radio frequency signal communication method and system |
CN108737449A (en) * | 2018-06-26 | 2018-11-02 | 华立科技股份有限公司 | Soft encryption authentication method, device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN100504908C (en) | 2009-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100504908C (en) | Method and system for protecting radio frequency identification tag and reader data safety | |
CN103020671B (en) | A kind of radio frequency identification mutual authentication method based on hash function | |
Molnar et al. | Privacy and security in library RFID: Issues, practices, and architectures | |
CN101847199B (en) | Security authentication method for radio frequency recognition system | |
CN102882683B (en) | Synchronizable RFID (radio-frequency identification) security authentication method | |
EP3118776A1 (en) | Security authentication method for hiding ultra high frequency electronic tag identifier | |
CN101467157B (en) | Method, RFID reader, RFID tag and RFID system for secure communication | |
CN101882197B (en) | RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key | |
CN102027483A (en) | Method for authenticating an RFID tag | |
CN102855504A (en) | Method and device for ownership transfer of radio frequency identification (RFID) tag | |
CN102081744A (en) | Path identification system and secure interaction method thereof | |
CN101980241B (en) | Method, system and device for authenticating radio frequency tag | |
CN103532718A (en) | Authentication method and authentication system | |
CN102684872B (en) | Safety communication method for ultrahigh frequency radio-frequency identification air interface based on symmetrical encryption | |
CN104579688B (en) | It is a kind of based on Hash function can synchronized update key RFID mutual authentication method | |
Peris-Lopez et al. | Attacking RFID systems | |
Lin et al. | Nonidentifiable RFID privacy protection with ownership transfer | |
CN108694344A (en) | A kind of cryptography electronic label | |
Kim et al. | MARP: Mobile agent for RFID privacy protection | |
CN103793742B (en) | A kind of system of electronic label safety identification and the information encryption of electronic traffic car plate | |
Huang | Secure access control scheme of RFID system application | |
Maleki et al. | SoK: RFID-based clone detection mechanisms for supply chains | |
CN208488752U (en) | A kind of cryptography electronic label | |
Song | RFID authentication protocols using symmetric cryptography | |
KR101053636B1 (en) | Encryption/decryption method and system for rfid tag and reader using multi algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |