CN104883681A - Mobile RFID mutual authentication method based on dynamic shared secret key - Google Patents

Mobile RFID mutual authentication method based on dynamic shared secret key Download PDF

Info

Publication number
CN104883681A
CN104883681A CN201510222060.2A CN201510222060A CN104883681A CN 104883681 A CN104883681 A CN 104883681A CN 201510222060 A CN201510222060 A CN 201510222060A CN 104883681 A CN104883681 A CN 104883681A
Authority
CN
China
Prior art keywords
reader
label
tag
tables
data base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510222060.2A
Other languages
Chinese (zh)
Other versions
CN104883681B (en
Inventor
王国伟
张敏
郭海儒
薛曼君
彭维平
贾宗璞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University of Technology
Original Assignee
Henan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Technology filed Critical Henan University of Technology
Priority to CN201510222060.2A priority Critical patent/CN104883681B/en
Publication of CN104883681A publication Critical patent/CN104883681A/en
Application granted granted Critical
Publication of CN104883681B publication Critical patent/CN104883681B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a mobile RFID mutual authentication method based on a dynamic shared secret key to solve the problem that synchronous security updating of a dynamic shared secret key and a synchronous mechanism once the dynamic shared secret key has been attacked cannot be realized as well as the problem about other security threats that may exist in terms of a wireless radio frequency identification authentication method. The technical scheme improves a conventional method that only utilizes randomized numbers to carry out identity authentication, therefore, a randomized number generated by a label can serve as parameters for mutual authentication between the label and a background database, and also serves as a seed of a dynamic updated shared secret key for the background database, a reader and the label. In this way, shared secret key security and random dynamic updating are achieved. According to the scheme, a background database stores the historical shared secret key by a list, and a dynamic adding and deleting method is carried out, thus guaranteeing synchronization of the shared secret key for the reader, the label and the background database after an attack. Multiple security attacks for a mobile RFID system can be prevented, and the quite high efficiency in terms of the performance of key labels is exhibited.

Description

A kind of mobile RFID mutual authentication method based on Dynamic-shared key
Technical field
The present invention relates to radio RF recognition technology, particularly relate to the safety certifying method based on stochastic and dynamic shared key that mobile wireless radio-frequency (RF) identification is relevant.
Background technology
Radio frequency identification (Radio Frequency Identification, RFID) is one of Key Implementation Technology of Internet of Things.RFID is at the serious security threat of the simultaneous promoting Internet of Things fast development, and wherein most important two aspects are authentication and secret protection.In mobile RFID system, removable reader all communicates at unsafe open channel in wireless signal mode with between label with background data base, removable reader.Therefore the security risk that faces of mobile RFID system is also more serious and diversified.
In the authentication method that at home and abroad scholar proposes, great majority design for traditional rfid system, these methods are by fixed reader wired connection background data base and premised on securely communicating, and therefore can not be applicable to reader and background data base carries out the mobile RFID system of insecure communication in wireless signal mode.In mobile RFID authentication method, adopt the mechanism dynamically updating shared key effectively can solve the problem of cipher key management difficult, but there is a very important data synchronization problems: the label key preserved in background data base must upgrade with the key synchronization stored in the label.But in rfid system, the label of low cost relies on external electromagnetic induction supply energy, once there is power down or communication blocking, the shared key between background data base and label will be caused inconsistent, make legitimate tag in upper once verification process cannot by certification and identification.In addition, if upgrade the parameter of shared key not there is confidentiality, make by intercepting and capturing the data transmitted in dangerous passage and then calculating the key after renewal, then can bring the risk of key exposure.Therefore, the secure synchronization renewal of key and the synchronization mechanism after being attacked become a difficult problem for this type of mobile RFID authentication protocol.
Current authentication method can only be taken precautions against desynchronization to a certain extent and attack, and can not take precautions against the desynchronization attack recurred more than more than 2 times; The authentication method also had is when forgery label and corresponding legitimate tag are in reader wireless signal coverage, opponent forges label by the third party forged and cheats legal reader and unlock and the information showing legitimate tag, therefore can not take precautions against label forge and there is man-in-the-middle attack and Replay Attack leak, label can not be taken precautions against and forge and Replay Attack.
Summary of the invention
For solve adopt Dynamic-shared key mobile RFID authentication method in thoroughly can not take precautions against that desynchronization is attacked, Dynamic-shared key cannot security update problem, and subject to various security attack problem, the present invention proposes a kind of mobile RFID mutual authentication method based on Dynamic-shared key, while taking precautions against the security attack for mobile RFID, there is higher tag performance.
For reaching above object, the technical solution used in the present invention is as follows:
One, initial phase: back-end data lab setting four tables of data are used for shared key and the identification information of storage tags and reader and background data base, storage tags ID in the current information table Tag_c_au of wherein label, current shared key, label ID take current key as the Hash code of parameter; The Hash code that in the history information table Tag_h_au of label, storage tags ID, label history shared key, label ID are parameter with history shared key; Reader identify label and current key is stored in reader current information table Reader_c_au; Reader identify label and history key is stored in reader history information table Reader_h_au; Store the shared key with background data base in each label, and comprise an One-way Hash function and Pseudo-random number generator; The shared key of reader storage and background data base, and comprise same Hash function and Pseudo-random number generator;
Two, authentication phase:
The first step: reader sends authentication request Query to label;
Second step: label produces random number S tand calculate one-way Hash function and pseudo random number then will with send to reader, wherein ID tfor the ID of label identifies, for the current shared key of label and background data base, for label and background data base upgrade after shared key, for the current shared key of reader and background data base;
3rd step: reader generates random number S r, calculate then will and S rand send to background data base, wherein ID rfor the ID of reader identifies;
4th step: background data base carries out certification to reader and label respectively;
1) reader authentication: background data base traversal Reader_c_au tables of data is also according to the S received rcalculate each and to receive then compare, if exist consistent, then reader passes through certification; If do not exist consistent, then travel through Reader_h_au tables of data and calculate each and and to receive compare, if exist consistent, then reader passes through certification; If twice traversal does not all exist consistent situation, then reader is illegal, authentification failure;
2) smart-tag authentication: when reader authentication passes through, background data base according to inquiry Tag_c_au tables of data: (1) if inquire result at Tag_c_au table, then takes out and to receive then carry out XOR, can obtain then carry out computing, and and to receive compare, if unanimously, then label is by certification, if inconsistent, then label is illegal, and certification terminates; (2) if in the inquiry of Tag_c_au tables of data less than result, then travel through Tag_h_au tables of data and inquire about, if the result of inquiring, take out then carry out with computing, and and to receive compare, if unanimously, then label is by certification, if inconsistent, then label is illegal, and certification terminates; 3) if all inquire about less than result at Tag_c_au table and Tag_c_au table, care label is illegal, authentification failure;
3) when reader and label are all by certification:
(1) background data base calculates and by ID in Reader_c_au rcorresponding current shared key is updated to background data base carries out judging and operating according to the derived data table carrying out comparison of coherence in the 4th step reader authentication process: if Reader_c_au tables of data, then background data base deletes the data that in Reader_h_au tables of data, this reader is corresponding, then will and ID radd in Reader_h_au tables of data; If Reader_h_au tables of data, then any operation is not carried out to Reader_h_au tables of data;
(2) background data base calculates and by ID in Tag_c_au tcorresponding current shared key is updated to the Hash code of label ID is updated to then ID is inquired according in the 4th step smart-tag authentication process tderived data table carry out judging and calculating: if Tag_c_au tables of data, background data base deletes the data that in Tag_h_au tables of data, this label is corresponding, then will iD twith add in Tag_h_au tables of data; If Tag_h_au tables of data, then any operation is not carried out to Tag_h_au tables of data;
4) background data base uses the shared key with reader computations symmetric encipherment algorithm then will with be transmitted to reader;
5th step: reader uses to decipher with the shared key of background data base and receives calculate then according to the S obtained rwith original random number S rcompare, if unanimously, then background data base is by certification, and reader uses the S obtained tupgrade shared key then send to label; If more inconsistent, then authentification failure.
6th step: after label receives data, calculates and and to receive compare, if more inconsistent, authentification failure; If consistent, then reader is legal, tag update shared key beneficial effect of the present invention:
After adopting the present invention, when certification, the multinomial security threat such as location tracking, Replay Attack, desynchronization attack, man-in-the-middle attack for rfid system can be taken precautions against, make up the safety defect that similar RFID authentication method exists.
In addition, the present invention can also realize the security update of shared key stochastic and dynamic, and does not derive by the data in verification process, and label efficiency performance is better.
Accompanying drawing explanation
Fig. 1 is certification basic flow sheet of the present invention.
Embodiment
Symbol description
Table 1 symbol description
Below in conjunction with accompanying drawing, the present invention is described in further detail.
Initial phase: during system initialization, back-end data lab setting four tables of data are used for shared key and the identification information of storage tags and reader and background data base.Storage tags ID in the current information table Tag_c_au of wherein label, current shared key, label ID take current key as the Hash code of parameter; The Hash code that in the history information table Tag_h_au of label, storage tags ID, label history shared key, label ID are parameter with history shared key; Reader identify label and current key is stored in reader current information table Reader_c_au; Reader identify label and history key is stored in reader history information table Reader_h_au.Store the shared key with background data base in each label, and comprise an One-way Hash function and Pseudo-random number generator; The shared key of reader storage and background data base, and comprise same Hash function and Pseudo-random number generator.
Authentication phase:
The first step: reader sends authentication request Query to label.
Second step: label produces random number S tand calculate with then will with send to reader.
3rd step: reader generates random number S r, calculate then will and S rand send to background data base.
4th step: background data base carries out certification to reader and label respectively.
1) reader authentication: background data base traversal Reader_c_au tables of data is also according to the S received rcalculate each and to receive then compare, if exist consistent, then reader passes through certification; If do not exist consistent, then travel through Reader_h_au tables of data and calculate each and and to receive compare, if exist consistent, then reader passes through certification; If twice traversal does not all exist consistent situation, then reader is illegal, authentification failure.
2) smart-tag authentication: when reader authentication passes through, background data base according to traversal Tag_c_au tables of data is inquired about: (1), if inquire result at Tag_c_au table, takes out and to receive then carry out XOR, can obtain then carry out computing, and and to receive compare, if unanimously, then label is by certification, if inconsistent, then label is illegal, and certification terminates.(2) if in the inquiry of Tag_c_au tables of data less than result, then travel through Tag_h_au tables of data and inquire about, if the result of inquiring, take out then carry out with computing, and and to receive compare, if unanimously, then label is by certification, if inconsistent, then label is illegal, and certification terminates.3) if all inquire about less than result at Tag_c_au table and Tag_c_au table, care label is illegal, authentification failure.
3) when reader and label are all by certification:
(1) background data base calculates and by ID in Reader_c_au rcorresponding current shared key is updated to then, background data base carries out judging and operating according to the derived data table carrying out comparison of coherence in the 4th step reader authentication process: if Reader_c_au tables of data, then background data base deletes the data that in Reader_h_au tables of data, this reader is corresponding, then will and ID radd in Reader_h_au tables of data; If Reader_h_au tables of data, then any operation is not carried out to Reader_h_au tables of data.
(2) background data base calculates and by ID in Tag_c_au tcorresponding current shared key is updated to the Hash code of label ID is updated to then ID is inquired according in the 4th step smart-tag authentication process tderived data table carry out judging and calculating: if Tag_c_au tables of data, background data base deletes the data that in Tag_h_au tables of data, this label is corresponding, then will iD twith add in Tag_h_au tables of data; If Tag_h_au tables of data, then any operation is not carried out to Tag_h_au tables of data.
4) background data base uses the shared key with reader computations then will with be transmitted to reader.
5th step: reader uses to decipher with the shared key of background data base and receives calculate then according to the S obtained rwith original random number S rcompare, if unanimously, then background data base is by certification, and reader uses the S obtained tupgrade shared key then send to label; If more inconsistent, then authentification failure.
After label receives data, calculate and and to receive compare, if more inconsistent, authentification failure; If consistent, then reader is legal, tag update shared key so far certification terminates.

Claims (1)

1., based on a mobile RFID authentication method for stochastic and dynamic shared key, wherein mobile RFID system is made up of background data base, mobile reading device and label, it is characterized in that comprising the following steps:
One, initial phase: back-end data lab setting four tables of data are used for shared key and the identification information of storage tags and reader and background data base, storage tags ID in the current information table Tag_c_au of wherein label, current shared key, label ID take current key as the Hash code of parameter; The Hash code that in the history information table Tag_h_au of label, storage tags ID, label history shared key, label ID are parameter with history shared key; Reader identify label and current key is stored in reader current information table Reader_c_au; Reader identify label and history key is stored in reader history information table Reader_h_au; Store the shared key with background data base in each label, and comprise an One-way Hash function and Pseudo-random number generator; The shared key of reader storage and background data base, and comprise same Hash function and Pseudo-random number generator;
Two, authentication phase:
The first step: reader sends authentication request Query to label;
Second step: label produces random number S tand calculate one-way Hash function and pseudo random number then will with send to reader, wherein ID tfor the ID of label identifies, for the current shared key of label and background data base, for label and background data base upgrade after shared key, for the current shared key of reader and background data base;
3rd step: reader generates random number S r, calculate then will and S rand send to background data base, wherein ID rfor the ID of reader identifies;
4th step: background data base carries out certification to reader and label respectively;
1) reader authentication: background data base traversal Reader_c_au tables of data is also according to the S received rcalculate each and to receive then compare, if exist consistent, then reader passes through certification; If do not exist consistent, then travel through Reader_h_au tables of data and calculate each and and to receive compare, if exist consistent, then reader passes through certification; If twice traversal does not all exist consistent situation, then reader is illegal, authentification failure;
2) smart-tag authentication: when reader authentication passes through, background data base according to inquiry Tag_c_au tables of data: (1) if inquire result at Tag_c_au table, then takes out and to receive then carry out XOR, can obtain then carry out computing, and and to receive compare, if unanimously, then label is by certification, if inconsistent, then label is illegal, and certification terminates; (2) if in the inquiry of Tag_c_au tables of data less than result, then travel through Tag_h_au tables of data and inquire about, if the result of inquiring, take out then carry out with computing, and and to receive compare, if unanimously, then label is by certification, if inconsistent, then label is illegal, and certification terminates; 3) if all inquire about less than result at Tag_c_au table and Tag_c_au table, care label is illegal, authentification failure;
3) when reader and label are all by certification:
(1) background data base calculates and by ID in Reader_c_au rcorresponding current shared key is updated to background data base carries out judging and operating according to the derived data table carrying out comparison of coherence in the 4th step reader authentication process: if Reader_c_au tables of data, then background data base deletes the data that in Reader_h_au tables of data, this reader is corresponding, then will and ID radd in Reader_h_au tables of data; If Reader_h_au tables of data, then any operation is not carried out to Reader_h_au tables of data;
(2) background data base calculates and by ID in Tag_c_au tcorresponding current shared key is updated to the Hash code of label ID is updated to then ID is inquired according in the 4th step smart-tag authentication process tderived data table carry out judging and calculating: if Tag_c_au tables of data, background data base deletes the data that in Tag_h_au tables of data, this label is corresponding, then will iD twith add in Tag_h_au tables of data; If Tag_h_au tables of data, then any operation is not carried out to Tag_h_au tables of data;
4) background data base uses the shared key with reader computations symmetric encipherment algorithm then will with be transmitted to reader;
5th step: reader uses to decipher with the shared key of background data base and receives calculate then according to the S obtained rwith original random number S rcompare, if unanimously, then background data base is by certification, and reader uses the S obtained tupgrade shared key then send to label; If more inconsistent, then authentification failure.
6th step: after label receives data, calculates and and to receive compare, if more inconsistent, authentification failure; If consistent, then reader is legal, tag update shared key K t i + 1 = PRNG S t ( K t i ) .
CN201510222060.2A 2015-05-04 2015-05-04 A kind of mobile RFID mutual authentication method based on Dynamic-shared key Expired - Fee Related CN104883681B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510222060.2A CN104883681B (en) 2015-05-04 2015-05-04 A kind of mobile RFID mutual authentication method based on Dynamic-shared key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510222060.2A CN104883681B (en) 2015-05-04 2015-05-04 A kind of mobile RFID mutual authentication method based on Dynamic-shared key

Publications (2)

Publication Number Publication Date
CN104883681A true CN104883681A (en) 2015-09-02
CN104883681B CN104883681B (en) 2018-05-01

Family

ID=53950981

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510222060.2A Expired - Fee Related CN104883681B (en) 2015-05-04 2015-05-04 A kind of mobile RFID mutual authentication method based on Dynamic-shared key

Country Status (1)

Country Link
CN (1) CN104883681B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138937A (en) * 2015-09-24 2015-12-09 北京芯联创展电子技术有限公司 Method and device of radio-frequency identification and security demonstration
CN106446663A (en) * 2016-08-30 2017-02-22 德阳市闪通思动科技有限责任公司 Tag reader and database three-way authentication system and method
CN106712962A (en) * 2016-12-23 2017-05-24 西安电子科技大学 Mobile RFID system bidirectional authentication method and system
CN107147498A (en) * 2017-05-15 2017-09-08 吉林大学 A kind of strong anonymous RFID authentication protocols based on Hash functions and Dynamic-shared key
CN107403211A (en) * 2017-08-03 2017-11-28 广东工业大学 A kind of method and system of mobile RFID certification
CN107480564A (en) * 2017-07-11 2017-12-15 天津大学 A kind of improved RFID groups authentication method
CN108259485A (en) * 2018-01-09 2018-07-06 殷周平 Security protocol verification method based on mobile RFID system
CN109155732A (en) * 2016-04-11 2019-01-04 菲尼克斯电气公司 For establishing the method and arrangement of secure communication between first network equipment (initiator) and second network equipment (transponder)
CN110190965A (en) * 2019-05-17 2019-08-30 西安电子科技大学 A kind of RFID cluster label authentication protocol based on hash function

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100045442A1 (en) * 2008-08-22 2010-02-25 Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies Limited RFID Privacy-Preserving Authentication System and Method
CN103177273A (en) * 2013-02-08 2013-06-26 西北工业大学 Low-cost tag based mobile radio frequency identification authentication method
CN103795543A (en) * 2014-02-12 2014-05-14 中国石油大学(华东) Bidirectional security authentication method for RFIP system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100045442A1 (en) * 2008-08-22 2010-02-25 Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies Limited RFID Privacy-Preserving Authentication System and Method
CN103177273A (en) * 2013-02-08 2013-06-26 西北工业大学 Low-cost tag based mobile radio frequency identification authentication method
CN103795543A (en) * 2014-02-12 2014-05-14 中国石油大学(华东) Bidirectional security authentication method for RFIP system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张士庚等: "大规模RFID***中一种能量有效的丢失标签快速检测算法", 《计算机学报》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105138937A (en) * 2015-09-24 2015-12-09 北京芯联创展电子技术有限公司 Method and device of radio-frequency identification and security demonstration
US10938555B2 (en) 2016-04-11 2021-03-02 Phoenix Contact Gmbh & Co. Kg Method and assembly for establishing a secure communication between a first network device (initiator) and a second network device (responder)
CN109155732A (en) * 2016-04-11 2019-01-04 菲尼克斯电气公司 For establishing the method and arrangement of secure communication between first network equipment (initiator) and second network equipment (transponder)
CN109155732B (en) * 2016-04-11 2021-05-25 菲尼克斯电气公司 Method and apparatus for establishing secure communications between network devices
CN106446663A (en) * 2016-08-30 2017-02-22 德阳市闪通思动科技有限责任公司 Tag reader and database three-way authentication system and method
CN106446663B (en) * 2016-08-30 2019-07-16 德阳市闪通思动科技有限责任公司 A kind of label reader and database three-dimensional Verification System and method
CN106712962A (en) * 2016-12-23 2017-05-24 西安电子科技大学 Mobile RFID system bidirectional authentication method and system
CN107147498A (en) * 2017-05-15 2017-09-08 吉林大学 A kind of strong anonymous RFID authentication protocols based on Hash functions and Dynamic-shared key
CN107147498B (en) * 2017-05-15 2020-06-02 吉林大学 Authentication method and encryption method for transmitting information in RFID authentication process
CN107480564A (en) * 2017-07-11 2017-12-15 天津大学 A kind of improved RFID groups authentication method
CN107480564B (en) * 2017-07-11 2020-07-17 天津大学 Improved RFID group authentication method
CN107403211A (en) * 2017-08-03 2017-11-28 广东工业大学 A kind of method and system of mobile RFID certification
CN108259485A (en) * 2018-01-09 2018-07-06 殷周平 Security protocol verification method based on mobile RFID system
CN110190965A (en) * 2019-05-17 2019-08-30 西安电子科技大学 A kind of RFID cluster label authentication protocol based on hash function

Also Published As

Publication number Publication date
CN104883681B (en) 2018-05-01

Similar Documents

Publication Publication Date Title
CN104883681A (en) Mobile RFID mutual authentication method based on dynamic shared secret key
CN104184733B (en) A kind of RFID lightweight mutual authentication methods encoded based on CRC
CN103413109B (en) A kind of mutual authentication method of radio frequency identification system
CN101847199B (en) Security authentication method for radio frequency recognition system
CN106712962A (en) Mobile RFID system bidirectional authentication method and system
CN108304902B (en) Ultra-lightweight mobile RFID system bidirectional authentication method
CN104115442B (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
CN103020671A (en) Radio frequency identification bidirectional authentication method based on hash function
CN101271534A (en) RFID label and reading device thereof, reading system and safety authentication method
Jung et al. HRP: A HMAC-based RFID mutual authentication protocol using PUF
CN103795543A (en) Bidirectional security authentication method for RFIP system
Cheng et al. Authenticated RFID security mechanism based on chaotic maps
CN110190965A (en) A kind of RFID cluster label authentication protocol based on hash function
CN103532718A (en) Authentication method and authentication system
CN110381055A (en) RFID system privacy-protection certification protocol method in healthcare supply chain
CN104333539A (en) RFID security authentication method based on Chebyshev mapping
CN102684872B (en) Safety communication method for ultrahigh frequency radio-frequency identification air interface based on symmetrical encryption
Lee et al. Mutual authentication protocol for enhanced RFID security and anti-counterfeiting
CN104579688B (en) It is a kind of based on Hash function can synchronized update key RFID mutual authentication method
Risalat et al. Advanced real time RFID mutual authentication protocol using dynamically updated secret value through encryption and decryption process
CN103152181B (en) A kind of RFID data encryption method
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
CN110650019B (en) RFID authentication method and system based on PUF and security sketch
CN109766966B (en) RFID tag random number synchronous updating method
Xiaohong et al. RFID mutual-authentication protocol with synchronous updated-keys based on Hash function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180501

Termination date: 20210504