CN112910652A - Remote controller identification method and remote controller identification device - Google Patents

Remote controller identification method and remote controller identification device Download PDF

Info

Publication number
CN112910652A
CN112910652A CN202110063590.2A CN202110063590A CN112910652A CN 112910652 A CN112910652 A CN 112910652A CN 202110063590 A CN202110063590 A CN 202110063590A CN 112910652 A CN112910652 A CN 112910652A
Authority
CN
China
Prior art keywords
remote controller
binding
random number
controller
main controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110063590.2A
Other languages
Chinese (zh)
Other versions
CN112910652B (en
Inventor
李四中
李仁玉
胡健锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Haige Lishi Intelligent Technology Co ltd
Original Assignee
Hunan Haige Lishi Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Haige Lishi Intelligent Technology Co ltd filed Critical Hunan Haige Lishi Intelligent Technology Co ltd
Priority to CN202110063590.2A priority Critical patent/CN112910652B/en
Publication of CN112910652A publication Critical patent/CN112910652A/en
Application granted granted Critical
Publication of CN112910652B publication Critical patent/CN112910652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention discloses a remote controller identification method and a remote controller identification device, wherein the remote controller identification method comprises the following steps: a main controller of the equipment sends a binding random number; the remote controller receives and stores the binding random number; the main controller periodically sends verification random numbers and algorithm information to the remote controller; the remote controller receives the verification random number and the algorithm information, and calculates according to the verification random number and the algorithm information to obtain a feedback result; and the main controller compares the feedback result with a standard result in the main controller, if the feedback result is consistent with the standard result, the identity of the remote controller is legal, otherwise, the identity of the remote controller is illegal. In the remote controller identification method and the remote controller identification device, the binding random number is sent to the remote controller through the main controller, and the verification is carried out through the verification random number and the algorithm information in the subsequent identity identification, so that on one hand, the construction of an integral system of production parts of different manufacturers can be realized, on the other hand, the identity identification method is prevented from being cracked by other people through monitoring and other means, and the safety is greatly improved.

Description

Remote controller identification method and remote controller identification device
Technical Field
The present invention relates to the field of remote control devices, and in particular, to a remote control identification method and a remote control identification device.
Background
With the development of science and technology, various modern mechanical devices are commonly controlled by a remote controller, so that the convenience of control is improved. In order to ensure the security of the devices, it is usually necessary to pair the remote controllers with the devices, and only one remote controller can control a corresponding device. At present, a fixed key is generally stored in a remote controller and a controller of a device, when the device is used, the controller of the device judges whether the key in the remote controller is correct, and if the key is correct, the remote controller is considered to be a legal remote controller, and the control operation of the remote controller is allowed. However, this method is easy to be broken by illegal devices, and the security is low. Moreover, in modern devices, it often happens that a plurality of manufacturers develop different components and then build an integrated system, and at this time, the components are independent from each other, for example, there is no connection between the remote controller and the device, and it is difficult to pre-store the secret key in the remote controller.
The foregoing description is provided for general background information and is not admitted to be prior art.
Disclosure of Invention
The invention aims to provide a remote controller identification method and a remote controller identification device which have high safety and are convenient for building an integral system.
The invention provides a remote controller identification method, which comprises the following steps:
a main controller of the equipment sends a binding random number;
the remote controller receives and stores the binding random number to finish the binding of the remote controller and the main controller;
the main controller periodically sends verification random numbers and algorithm information to the remote controller;
the remote controller receives the verification random number and the algorithm information, calculates according to the verification random number, the algorithm information and the binding random number, obtains a feedback result and sends the feedback result to the main controller of the equipment;
and the main controller compares the feedback result sent by the remote controller with a standard result in the main controller, if the feedback result is consistent with the standard result, the identity of the remote controller is legal, otherwise, the identity of the remote controller is illegal.
In one embodiment, the remote controller includes a transmitter and a receiver, the receiver is connected to the main controller, the bound random number is received and stored by the receiver, the transmitter is communicatively connected to the receiver, and the transmitter and the receiver are communicatively connected.
In one embodiment, the step of periodically sending, by the master controller, the authentication random number and the algorithm information to the remote controller includes: and the main controller sends the verification random number and the algorithm information to the remote controller at intervals of preset time.
In one embodiment, the algorithm information is an encryption algorithm code, an encryption algorithm code table is preset in the remote controller, and the remote controller determines a specific verification algorithm according to the encryption algorithm code and the encryption algorithm code table; or, the algorithm information is a specific verification algorithm.
In one embodiment, before the master controller sends the binding random number, the remote controller identification method further includes: triggering remote controller binding.
In one embodiment, triggering the remote controller binding specifically includes: triggering remote controller binding specifically comprises: operating a human-computer interaction interface to enter a binding interface; or, operating a human-computer interaction interface to enter a binding interface, inputting a binding password on the human-computer interaction interface after entering the binding interface, and sending the binding random number by the main controller when the binding password is correct.
In one embodiment, the remote controller identification method includes the following steps: and clearing the binding random number in the main controller of the equipment, and removing the binding of the remote controller and the main controller.
The invention also discloses a remote controller identification device, which comprises a main controller and a remote controller, wherein the remote controller is connected with the main controller, the main controller is arranged on equipment and is used for sending the binding random number, the verification random number and the algorithm information to the remote controller, acquiring a standard result according to the binding random number, the verification random number and the algorithm information, the remote controller is used for receiving and storing the binding random number, binding the remote controller with the main controller, calculating a feedback result according to the binding random number, the verification random number and the algorithm information, sending the feedback result to the main controller, comparing the feedback result with the standard result by the main controller, and when the feedback result is consistent with the standard result, indicating that the identity of the remote controller is legal, otherwise, the remote controller identity is illegal.
In one embodiment, the main controller is further configured to send the verification random number and the algorithm information to the remote controller periodically after the remote controller stores the binding random number, so as to determine whether the identity of the remote controller is legal; or, the algorithm information is an encryption algorithm code, an encryption algorithm code table is preset in the remote controller, and the remote controller determines a specific verification algorithm according to the encryption algorithm code and the encryption algorithm code table; or, the algorithm information is a specific verification algorithm.
In one embodiment, the remote controller identification device further comprises a human-computer interaction interface, the human-computer interaction interface is connected to the main controller, the human-computer interaction interface is used for receiving remote controller binding trigger information and sending the remote controller binding trigger information to the main controller, and the main controller is further used for sending the binding random number to the remote controller after receiving the remote controller binding trigger information; or, the remote controller identification device further comprises a human-computer interaction interface, the human-computer interaction interface is connected to the main controller, the human-computer interaction interface is used for receiving the binding password and sending the binding password to the main controller after receiving the remote controller binding trigger information, and the main controller sends the binding random number when the binding password sent by the human-computer interaction interface is correct.
In the remote controller identification method and the remote controller identification device, the binding random number is sent to the remote controller through the main controller, and the verification is carried out through the verification random number and the algorithm information in the subsequent identity identification, so that on one hand, the construction of an integral system of production parts of different manufacturers can be realized, on the other hand, the identity identification method is prevented from being cracked by other people through monitoring and other means, and the safety is greatly improved.
Drawings
Fig. 1 is a flowchart illustrating a remote controller identification method according to an embodiment of the present invention.
Fig. 2 is a block diagram of a remote controller identification device according to an embodiment of the invention.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
Referring to fig. 1, a method for identifying a remote controller according to an embodiment of the present invention includes the following steps:
and S11, triggering remote controller binding.
Specifically, a human-computer interaction interface connected with a main controller of the device is provided. Triggering remote controller binding specifically comprises: and clicking a binding key or a binding virtual button on the human-computer interaction interface to enter the binding interface. The human-computer interaction interface can be a keyboard, a touch screen, a voice recognition device and the like.
Further, in order to improve the security, after entering the binding interface, the step S13 may be performed after entering the binding password on the human-computer interface. The binding password is a dynamic password which is different every time and is usually provided by an equipment manufacturer, so that the remote controller can be bound only under the authorization of the equipment manufacturer, and a user is prevented from binding the remote controller privately.
S13, the main controller of the device sends a binding random number.
Specifically, the main controller of the device generates random binding random numbers and sends the random binding random numbers to the remote controller, the binding random numbers bound each time are generally different, and certainly, the same binding random number may be generated twice, but the probability is very low, so that the main controller of the device can only bind one remote controller generally.
And S15, the remote controller receives and stores the binding random number to complete the binding of the remote controller and the main controller of the equipment.
Specifically, the remote controller comprises a transmitter and a receiver, the receiver is connected to a main controller of the equipment, the bound random number is received and stored by the receiver, and the transmitter is in communication connection with the receiver. Usually, the transmitter and the receiver can be connected through wireless transmission methods such as bluetooth, infrared, wifi, and the like. When the remote controller is operated, a user holds the transmitter by hand, presses a button of the transmitter to send a control instruction to the receiver, and the receiver receives the control instruction and then sends the control instruction to the main controller of the equipment to control the actions of the equipment, such as the lifting, amplitude variation and other actions of the engineering machinery.
S17, the main controller of the device periodically sends the authentication random number and algorithm information to the remote controller.
Specifically, after the remote controller is bound with the main controller of the device, the main controller of the device sends a verification random number and an algorithm to a receiver of the remote controller at preset time intervals to continuously verify the identity of the remote controller, that is, whether the remote controller is a legal remote controller. When the main controller of the equipment is not bound with the remote controller, the main controller of the equipment cannot send the verification random number and the algorithm information to carry out identity verification. The algorithm information can be a specific verification algorithm or an encryption algorithm code, and the algorithm information is set as the encryption algorithm code, so that the safety can be further improved. The specific verification algorithm may be an addition, subtraction, multiplication, division, or other specific algorithm. The authentication random number is a random unpredictable number. The preset time is preset in a main controller of the equipment, the length of the preset time can be set according to needs, and the time length of each interval can be the same or different, for example, the time length of the interval between the first time and the second time for sending the verification random number and the algorithm information is 1 hour, the time length of the interval between the second time and the third time is 2 hours, and the time length of the interval between the third time and the fourth time is 3 hours; alternatively, the time interval of every two adjacent times is 1 hour, and the like. In another embodiment, the authentication random number and algorithm information may also be sent once each time the device is started, and not sent again until the next time the device is started. In short, the remote controller can be identified regularly.
And S19, the remote controller receives the verification random number and the algorithm information, and calculates according to the verification random number, the algorithm information and the binding random number to obtain a feedback result and send the feedback result to the main controller of the equipment.
Specifically, when the algorithm information is an encryption algorithm, an encryption algorithm code table is prestored in the remote controller, and the remote controller determines a specific verification algorithm according to the algorithm information and the encryption algorithm code table sent by the main controller of the device, for example, the encryption algorithm code table prestored in the remote controller is shown in table 1 below, when the algorithm information sent by the main controller of the device is a, the binding random number and the verification random number are added to obtain a feedback structure, and when the algorithm information sent by the main controller of the device is B, the binding random number and the verification random number are multiplied to obtain a feedback result. When the verification algorithm is a specific verification algorithm, the remote controller can be used for calculating according to the algorithm information, the binding random number and the verification random number directly to obtain a feedback result without pre-storing an encryption algorithm code table. It will be appreciated that the verification algorithm may be other more complex algorithms, such as a complex function, etc.
More specifically, when the binding random number is 4, the algorithm information is a, and the verification random number is 5, the feedback result calculated by the remote controller is 20.
Table 1 encryption algorithm code table
Encryption algorithm code Verification algorithm
A +
B ×
C -
D ÷
And S21, comparing the feedback result sent by the remote controller with the standard result in the main controller of the equipment by the main controller of the equipment, if the feedback result is consistent with the standard result, indicating that the identity of the remote controller is legal, allowing the remote controller to carry out remote control on the equipment, otherwise, indicating that the identity of the remote controller is illegal, forbidding the remote controller to carry out remote control on the equipment by the main controller of the equipment, and giving an alarm.
In particular, the standard result is obtained from the authentication random number, the authentication algorithm and the binding random number within the main controller of the device.
In this embodiment, the method for identifying a remote controller further includes the following steps:
and S23, clearing the binding random number in the main controller of the equipment, and removing the binding between the remote controller and the main controller of the equipment. Generally, when a bound remote controller needs to be replaced, the main controller will clear the original bound random number while sending a new bound random number. It is understood that step S23 may be any step after step S15.
In the remote controller identification method, the binding random number is sent to the remote controller through the main controller, and the verification is carried out through the verification random number and the algorithm information in the subsequent identity identification, so that on one hand, the construction of an integral system of production parts of different manufacturers can be realized, on the other hand, the identity identification method is prevented from being cracked by other people through monitoring and other means, and the safety is greatly improved.
Referring to fig. 2, the remote controller identification apparatus of an embodiment of the present invention includes a main controller 11 and a remote controller 31, where the remote controller 31 is connected to the main controller 11, and the main controller 11 is disposed on a device. The main controller 11 is configured to send the binding random number, the verification random number, and the algorithm information to the remote controller 31, and obtain a standard result according to the binding random number, the verification random number, and the algorithm information. The remote controller 31 is configured to receive and store the binding random number, bind the remote controller 31 with the main controller 11, calculate a feedback result according to the binding random number, the verification random number, and the algorithm information, and send the feedback result to the main controller 11. The main controller 11 also compares the feedback result with the standard result, when the feedback result is consistent with the standard result, it indicates that the identity of the remote controller 31 is legal, the main controller 11 allows the remote controller 31 to perform remote control on the equipment, otherwise, it indicates that the identity of the remote controller 31 is illegal, and the main controller 11 prohibits the remote controller 31 from performing remote control on the equipment and gives an alarm.
In this embodiment, the remote controller 31 includes a transmitter 312 and a receiver 314, the receiver 314 is connected to the main controller 11 of the device, and the transmitter 312 and the receiver 314 can be connected in communication through wireless transmission methods such as bluetooth, infrared, wifi, and the like. Specifically, the receiver 314 is configured to receive and store the binding random number, bind the remote controller 31 with the main controller 11, calculate a feedback result according to the binding random number, the verification random number, and the algorithm information, and send the feedback result to the main controller 11, the transmitter 312 is configured to send a control instruction to the receiver 314, and the receiver 312 is configured to receive the control instruction and send to the main controller 11 to control an action of the device.
In this embodiment, the main controller 11 is further configured to send a verification random number and algorithm information to the remote controller 31 periodically after the remote controller 31 stores the binding random number, so as to verify the identity of the remote controller 31, that is, determine whether the remote controller is a legal remote controller. Specifically, the algorithm information may be a specific verification algorithm or an encryption algorithm code, and the algorithm information is set as the encryption algorithm code, so that the security can be further improved. The specific verification algorithm may be an addition, subtraction, multiplication, division, or other specific algorithm. The authentication random number is a random unpredictable number. The main controller 11 may send the verification random number and the algorithm information to the remote controller 31 in advance at intervals of preset time, the preset time may be preset in the main controller 11 of the device, the length of the preset time may be set as required, and the time duration of each interval may be the same or different, for example, the time duration of the interval between the first time and the second time for sending the verification random number and the algorithm information is 1 hour, the time duration of the interval between the second time and the third time is 2 hours, and the time duration of the interval between the third time and the fourth time is 3 hours; alternatively, the time interval of every two adjacent times is 1 hour, and the like. In another embodiment, the authentication random number and algorithm information may also be sent once each time the device is started, and not sent again until the next time the device is started. In short, the remote controller 31 may be identified periodically. Specifically, when the algorithm information is an encryption algorithm code, an encryption algorithm code table is prestored in the remote controller 31, and for example, the encryption algorithm code table may be shown in table 1.
In this embodiment, the remote controller identification apparatus further includes a human-computer interaction interface 51, the human-computer interaction interface 51 is connected to the main controller 11, the human-computer interaction interface 51 is configured to receive remote controller binding trigger information and send the remote controller binding trigger information to the main controller 11, and the main controller 11 is further configured to send a binding random number to the remote controller 31 after receiving the controller binding trigger information. In another embodiment, the human-computer interaction interface 51 is configured to receive a binding password after receiving the remote controller binding trigger information and send the binding password to the main controller 11, and the main controller 11 sends the binding random number when the binding password sent by the human-computer interaction interface 51 is correct.
In the remote controller identification device, the binding random number is sent to the remote controller through the main controller, and the verification is carried out through the verification random number and the algorithm information in the subsequent identity recognition, so that on one hand, the construction of an integral system of production parts of different manufacturers can be realized, on the other hand, the identity recognition method is prevented from being cracked by other people through monitoring and other means, and the safety is greatly improved.
In the drawings, the size and relative sizes of layers and regions may be exaggerated for clarity. It will be understood that when an element such as a layer, region or substrate is referred to as being "formed on," "disposed on" or "located on" another element, it can be directly on the other element or intervening elements may also be present. In contrast, when an element is referred to as being "directly formed on" or "directly disposed on" another element, there are no intervening elements present.
In this document, unless expressly stated or limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms can be understood in a specific case to those of ordinary skill in the art.
In this document, the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer", "vertical", "horizontal", etc., indicate the orientation or weight relationship based on the orientation or weight relationship shown in the drawings, only for the sake of clarity and descriptive convenience of the technical solution, and thus should not be construed as limiting the present invention.
As used herein, the ordinal adjectives "first", "second", etc., used to describe an element are merely to distinguish between similar elements and do not imply that the elements so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
As used herein, the meaning of "a plurality" or "a plurality" is two or more unless otherwise specified.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
As used herein, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, including not only those elements listed, but also other elements not expressly listed.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. A remote controller identification method is characterized by comprising the following steps:
a main controller of the equipment sends a binding random number;
the remote controller receives and stores the binding random number to finish the binding of the remote controller and the main controller;
the main controller periodically sends verification random numbers and algorithm information to the remote controller;
the remote controller receives the verification random number and the algorithm information, calculates according to the verification random number, the algorithm information and the binding random number, obtains a feedback result and sends the feedback result to the main controller of the equipment;
and the main controller compares the feedback result sent by the remote controller with a standard result in the main controller, and if the feedback result is consistent with the standard result, the identity of the remote controller is legal, and the identity of the remote controller is illegal.
2. The remote control identification method of claim 1, wherein the remote control includes a transmitter and a receiver, the receiver is connected to the master controller, the bound random number is received and stored by the receiver, the transmitter is communicatively connected to the receiver, and the transmitter and the receiver are communicatively connected.
3. The method for identifying a remote controller according to claim 1, wherein the step of the master controller periodically sending the authentication random number and the algorithm information to the remote controller includes: and the main controller sends the verification random number and the algorithm information to the remote controller at intervals of preset time.
4. The method for identifying a remote controller according to claim 1, wherein the algorithm information is an encryption algorithm code, an encryption algorithm code table is preset in the remote controller, and the remote controller determines a specific verification algorithm according to the encryption algorithm code and the encryption algorithm code table; or, the algorithm information is a specific verification algorithm.
5. The remote controller identifying method of claim 1, wherein before the master controller transmits the binding random number, the remote controller identifying method further comprises: triggering remote controller binding.
6. The remote control identification method of claim 5, wherein triggering remote control binding specifically comprises: operating a human-computer interaction interface to enter a binding interface; or, triggering the remote controller binding specifically includes: and operating a human-computer interaction interface to enter a binding interface, inputting a binding password on the human-computer interaction interface after entering the binding interface, and sending the binding random number by the main controller when the binding password is correct.
7. The remote controller identification method as claimed in claim 1, wherein the remote controller identification method comprises the steps of: and clearing the binding random number in the main controller of the equipment, and removing the binding of the remote controller and the main controller.
8. The remote controller identification device is characterized by comprising a main controller (11) and a remote controller (31), wherein the remote controller (31) is connected with the main controller (11), the main controller (11) is arranged on equipment, the main controller (11) is used for sending a binding random number, a verification random number and algorithm information to the remote controller (31), acquiring a standard result according to the binding random number, the verification random number and the algorithm information, the remote controller (31) is used for receiving and storing the binding random number, binding the remote controller (31) with the main controller (11), calculating a feedback result according to the binding random number, the verification random number and the algorithm information, sending the feedback result to the main controller (11), and comparing the feedback result with the standard result by the main controller (11), and when the feedback result is consistent with the standard result, the identity of the remote controller (31) is legal, otherwise, the identity of the remote controller (31) is illegal.
9. The remote controller identification device according to claim 8, wherein the main controller (11) is further configured to periodically send the authentication nonce and the algorithm information to the remote controller (31) after the remote controller (31) stores the binding nonce, so as to determine whether the identity of the remote controller (31) is legitimate; or the algorithm information is an encryption algorithm code, an encryption algorithm code table is preset in the remote controller (31), and the remote controller (31) determines a specific verification algorithm according to the encryption algorithm code and the encryption algorithm code table; or, the algorithm information is a specific verification algorithm.
10. The remote controller identification device according to claim 8, further comprising a human-machine interface (51), wherein the human-machine interface (51) is connected to the main controller (11), the human-machine interface (51) is configured to receive a remote controller binding trigger message and send the remote controller binding trigger message to the main controller (11), and the main controller (11) is further configured to send the binding random number to the remote controller (31) after receiving the remote controller binding trigger message; or, the remote controller recognition device further comprises a human-computer interaction interface (51), the human-computer interaction interface (51) is connected to the main controller (11), the human-computer interaction interface (51) is used for receiving the binding password and sending the binding password to the main controller (11) after receiving the remote controller binding trigger information, and the main controller (11) sends the binding random number when the binding password sent by the human-computer interaction interface (51) is correct.
CN202110063590.2A 2021-01-18 2021-01-18 Remote controller identification method and remote controller identification device Active CN112910652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110063590.2A CN112910652B (en) 2021-01-18 2021-01-18 Remote controller identification method and remote controller identification device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110063590.2A CN112910652B (en) 2021-01-18 2021-01-18 Remote controller identification method and remote controller identification device

Publications (2)

Publication Number Publication Date
CN112910652A true CN112910652A (en) 2021-06-04
CN112910652B CN112910652B (en) 2022-11-08

Family

ID=76115374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110063590.2A Active CN112910652B (en) 2021-01-18 2021-01-18 Remote controller identification method and remote controller identification device

Country Status (1)

Country Link
CN (1) CN112910652B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006010343A1 (en) * 2004-07-30 2006-02-02 Huawei Technologies Co., Ltd. A method and system for authenticating digital cluster service
CN101286997A (en) * 2008-06-05 2008-10-15 北京中星微电子有限公司 Data reliability verifying method, system, transmitting device and receiving device
US20090150670A1 (en) * 2006-06-01 2009-06-11 Nec Corporation Communication node authentication system and method, and communication node authentication program
CN101841812A (en) * 2009-03-18 2010-09-22 华为终端有限公司 Terminal legality verifying method and device and communication system
CN103176468A (en) * 2013-04-07 2013-06-26 深圳市闪联信息技术有限公司 Intelligent household appliance authentication method based on timed binding mechanism
CN103916840A (en) * 2012-12-30 2014-07-09 北京握奇数据系统有限公司 Method for binding and verification of mobile device and external device
CN106898064A (en) * 2017-01-09 2017-06-27 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
JP2017169147A (en) * 2016-03-17 2017-09-21 株式会社東芝 Verification device, electronic apparatus, program, and verification system
CN109147307A (en) * 2018-09-07 2019-01-04 横店集团得邦照明股份有限公司 A kind of encryption method of infrared remote-controlled signal
CN109263651A (en) * 2018-09-28 2019-01-25 上汽通用五菱汽车股份有限公司 Safe checking method, autonomous driving vehicle and the storage medium of autonomous driving vehicle
CN109714298A (en) * 2017-10-25 2019-05-03 腾讯科技(深圳)有限公司 Verification method, device and storage medium
CN111415506A (en) * 2020-04-28 2020-07-14 成都新潮传媒集团有限公司 Safety encryption method of multimedia control system and multimedia terminal
CN111586688A (en) * 2020-04-24 2020-08-25 深圳市塔洛思技术有限公司 Identity identification generation and verification method based on environment perception
US20200336318A1 (en) * 2019-04-16 2020-10-22 Mastercard International Incorporated Method and system for using dynamic private keys to secure data file retrieval

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006010343A1 (en) * 2004-07-30 2006-02-02 Huawei Technologies Co., Ltd. A method and system for authenticating digital cluster service
US20090150670A1 (en) * 2006-06-01 2009-06-11 Nec Corporation Communication node authentication system and method, and communication node authentication program
CN101286997A (en) * 2008-06-05 2008-10-15 北京中星微电子有限公司 Data reliability verifying method, system, transmitting device and receiving device
CN101841812A (en) * 2009-03-18 2010-09-22 华为终端有限公司 Terminal legality verifying method and device and communication system
CN103916840A (en) * 2012-12-30 2014-07-09 北京握奇数据系统有限公司 Method for binding and verification of mobile device and external device
CN103176468A (en) * 2013-04-07 2013-06-26 深圳市闪联信息技术有限公司 Intelligent household appliance authentication method based on timed binding mechanism
JP2017169147A (en) * 2016-03-17 2017-09-21 株式会社東芝 Verification device, electronic apparatus, program, and verification system
CN106898064A (en) * 2017-01-09 2017-06-27 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
CN109714298A (en) * 2017-10-25 2019-05-03 腾讯科技(深圳)有限公司 Verification method, device and storage medium
CN109147307A (en) * 2018-09-07 2019-01-04 横店集团得邦照明股份有限公司 A kind of encryption method of infrared remote-controlled signal
CN109263651A (en) * 2018-09-28 2019-01-25 上汽通用五菱汽车股份有限公司 Safe checking method, autonomous driving vehicle and the storage medium of autonomous driving vehicle
US20200336318A1 (en) * 2019-04-16 2020-10-22 Mastercard International Incorporated Method and system for using dynamic private keys to secure data file retrieval
CN111586688A (en) * 2020-04-24 2020-08-25 深圳市塔洛思技术有限公司 Identity identification generation and verification method based on environment perception
CN111415506A (en) * 2020-04-28 2020-07-14 成都新潮传媒集团有限公司 Safety encryption method of multimedia control system and multimedia terminal

Also Published As

Publication number Publication date
CN112910652B (en) 2022-11-08

Similar Documents

Publication Publication Date Title
US9848288B2 (en) Bluetooth pairing system, method, and apparatus
JP6496603B2 (en) Vehicle communication system
US20210070252A1 (en) Method and device for authenticating a user to a transportation vehicle
JP6130877B2 (en) Lock control method
US20190066415A1 (en) Mobile-based access control system
US10075576B1 (en) Starting a machine through a mobile device
EP3105699B1 (en) Method and apparatus for authenticating security system users and unlocking selected feature sets
EP3501195B1 (en) Secure authentication of devices without server assistance or pre-shared credentials
JP6092529B2 (en) Charging system for electric mobile body and server device included therein
CN104995628B (en) Cipher authentication device and cipher authentication method
CN105704114B (en) Hearing device with service mode and related method
JP2016035133A (en) Keyless entry device and control method thereof
US10169940B1 (en) Electric lock and control method thereof
JP6342718B2 (en) Vehicle communication system
CN112910652B (en) Remote controller identification method and remote controller identification device
CN104782154B (en) A kind of method and apparatus for disabling algorithm in a device
JP7057944B2 (en) Authentication system and authentication method
JP2012170296A (en) Power system protection control system and protection controller
US20180268630A1 (en) Systems and methods for secure authentication for access control, home control, and alarm systems
US11444937B2 (en) Deployment of a device
KR101674125B1 (en) Method and apparatus for connecting multi-terminal by using authentication
JP2017103719A (en) Security system
JP6365219B2 (en) Measurement equipment, terminal authentication method
CN114499964B (en) Equipment control method and device, storage medium and electronic device
JP5432735B2 (en) Information processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant