CN1379343A - Entrance guard method and system using blue tooth technique in wireless authentication and data transmitting/receiving - Google Patents

Entrance guard method and system using blue tooth technique in wireless authentication and data transmitting/receiving Download PDF

Info

Publication number
CN1379343A
CN1379343A CN 02116736 CN02116736A CN1379343A CN 1379343 A CN1379343 A CN 1379343A CN 02116736 CN02116736 CN 02116736 CN 02116736 A CN02116736 A CN 02116736A CN 1379343 A CN1379343 A CN 1379343A
Authority
CN
China
Prior art keywords
bluetooth
authentication
data
mainboard
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 02116736
Other languages
Chinese (zh)
Other versions
CN1148683C (en
Inventor
刘志春
孙兵
肖爱平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XINYUAN CONSULTIVE INFORMATION TECHNOLOGY CO LTD BEIJING
Original Assignee
XINYUAN CONSULTIVE INFORMATION TECHNOLOGY CO LTD BEIJING
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XINYUAN CONSULTIVE INFORMATION TECHNOLOGY CO LTD BEIJING filed Critical XINYUAN CONSULTIVE INFORMATION TECHNOLOGY CO LTD BEIJING
Priority to CNB021167362A priority Critical patent/CN1148683C/en
Publication of CN1379343A publication Critical patent/CN1379343A/en
Application granted granted Critical
Publication of CN1148683C publication Critical patent/CN1148683C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

An entrance guard method and system using the blue tooth technique in radio authentication and data transmissing and receiving are disclosed. The said method incldues inquiry, authentication, encryption and data exchange. The said system is composed of a PC connected to a server over the network, a base station equipment BS connected with the PC over the network or directly, and the slave station MS connected to the BS according to the blue tooth protocol. It features that the wireless authentication is integrated with the wireless bidirection data and speech transmission, so that the transmission is performed as soon as the authentication is finished.

Description

Use the wireless authentication of Bluetooth technology and the guard method and the gate control system thereof of data transmit-receive
Technical field
The present invention relates to the gate inhibition field of radio data communication mode, particularly use the wireless authentication of Bluetooth technology and the guard method and the wireless blue tooth gate control system of data transmit-receive.
Background technology
At present, traditional gate control system mostly adopts the recognition method of checking card, and this mode requires personnel's operation that closely holds; There are modes such as rfid card and image recognition in the wireless entrance guard system.Than higher, image identification system then constitutes complexity to the RFID mode, costs an arm and a leg to the requirement of directivity.And all these modes all have a common shortcoming, and promptly their information of transmitting has one-way, lacks interactive function.Needing the occasion of data interaction, can only outside gate control system, increase man-machine interactively or other mechanism, making that the time of whole process is longer.
Summary of the invention
One of the technical problem to be solved in the present invention is to provide for the user guard method of a kind of wireless authentication and wireless two-way data transmission.This method can realize bi-directional data and voice transfer quickly and easily, and does not have the restriction of direction.
Two of the technical problem to be solved in the present invention, being provides a kind of gate control system for the user, it utilizes Bluetooth technology that wireless authentication and wireless two-way data transmit-receive are integrated, make authenticating party and certified side after authentication is correct, in certain distance, carry out the transmission of high-speed data and voice immediately, in short residence time even finish whole reciprocal process at the volley.
The guard method of wireless authentication of the present invention and data transmit-receive comprises following process:
1. query script
In this guard method, will authentic target (people, vehicle or other objects) carry one be equipped with the wireless blue tooth module from station arrangement (hereinafter referred to as MS); Authenticating party is equipped with the base station apparatus (hereinafter referred to as BS) that includes the wireless blue tooth module.BS (or MS, be example below with BS) default setting be in continuous query State promptly constantly to around the wireless transmission query messages, MS (or BS, be example below with MS) default setting is in the continuous scanning mode that can be inquired about.Bluetooth is in certain operating distance scope, and in the time of in target enters this distance range, MS just scans the query messages of BS, and MS will produce and send response message then.This respond packet is used the conventional FHS grouping of stipulating in Bluetooth protocol, the parameter of carrying MS, and comprising the device address of bluetooth module among the MS, local clock or the like, this address is globally unique.The response that BS monitors and reads MS, BS finishes query script when collecting the MS response of setting number or arriving time-out time.MS is as the ISSUER, and BS is as identical by the inquiry mode process.If there is not legitimate targets to enter in the bluetooth working range in the certain hour, the ISSUER will return default query State again because of overtime, move in circles.
2. authentication process
In this process, when BS and PC are integrated (Fig. 2) thereby---BS directly is connected on the PC whole during as BS, and following all operations of being finished by BS and PC cooperation are all finished by BS.
(1) authentication feature of the present invention: BS reads the device address in the MS response and all addresses is sent to PC.PC is differentiated authentication to them after receiving these addresses, and verification process is that these addresses are contrasted with leaving on the PC legal address in advance in, just represents legally if coincide, and can watch the own feature of target with this device address binding; When having a plurality of targets legal in the certain distance, PC will be selected the current target that should connect according to certain algorithm, and the device address with this selected target sends to BS then.
(2) BS receives behind the address that PC returns according to the regulation of Bluetooth protocol to MS authentication, the encryption of this address be connected.This subprocess has detailed description in Bluetooth protocol, KI is released by the algorithm of agreement regulation by bluetooth device address, PIN code and random number, and random number obtains from the pseudo-random process of bluetooth equipment.In order to support authentication process, must between BS and MS, generate and distribute KI.Because KI is maintained secrecy, so it can not be by the query script acquisition as Bluetooth address, and the exchange of key is finished at initial phase, and initialization procedure comprises following 5 parts:
● the generation of initialization key Kinit; All preserve a common PIN code value among BS and the MS, propose the authentication requirement when BS connects MS, the PIN code value be used to by some algorithms release Kinit,
● the generation of KI,
● the exchange of KI,
● authentication,
● reach at BS and MS and generate 5 parts of encryption key by KI;
The invention is characterized in when each authentication process completes successfully that authenticating party dynamically generates the PIN code value of new PIN code value replace old, will use new PIN code during next authentication.In addition detailed elaboration during the dynamic change of PIN code and distribute will realize in the system of back.
3. ciphering process
This process is also deferred to the method for Bluetooth protocol, can protect user's information by the payload of encrypting grouping.Access code and packets headers are never encrypted.Ciphering process uses the close system E0 of stream to finish.Flowing close system is proposed by Massey and Rueppel.This encryption method is analyzed extensively and profoundly, just has not been further elaborated at this.
4. data exchange process
After the successful connection of HCI layer, then set up the upper strata and connect, BS sends a link setup success frame to PC then, and the report PC connects has set up success.Preserve in the PC and concrete use relevant valid data, after PC is received the data relevant with target are sent to BS by the form packing of appointing in advance, voice connect foundation simultaneously, BS can with the direct switched voice signal of MS.BS receives that resolving into agreement predetermined data bag from the data that behind the packet of PC needs sent to MS at the L2CAP layer passes to lower-layer protocols.Send to MS by transmitting chip at last.After MS receives the packet that BS sends,, judge whether to show, whether preserve or the like and afterwards handle respectively according to prior agreement.MS also can need pass to oneself the information of a booth by arranging to send to BS after the form packing, sends PC to by BS again and handles.When the process that sends data to BS when PC is all finished, PC will send a data sign off frame to BS; BS is when the process of PC transmission data is all finished conversely, and BS also sends a data sign off frame to PC.Similarly, when BS all finishes to the process of MS transmission data, also will send the sign off frame to MS, when MS was all over to the process of BS transmission data, MS sent the sign off frame to BS.When BS has received the sign off frame that PC and MS send, confirm oneself simultaneously after MS has sent the sign off frame, cut off automatically and being connected of MS, get back to default continuous query State; MS also will cut off connection after receiving the chain rupture incident of BS, get back to default continuous scanning mode.
Configuration and upgrading
So-called configuration is exactly the configuration and the modification of some changeable systematic parameters of native system, physical features and PIN code value comprising the IP address of the bluetooth device address of BS and MS, BS and socket port, MS itself are revisable, configuration parameter is deposited with document form, be written in the device memory, to in program, be called, and they can be changed by configurator.So-called upgrading is exactly that very fast product just has the process of a update along with the follow-up R﹠D work of company is constantly carried out, and what we here will talk about is exactly the upgrading renewal of software.In existing systems, the configuration of system and upgrading are undertaken by wired mode often, and wired mode is developed simply, uses reliable; But execute-in-place is but wasted time and energy.
The present invention is characterised in that also provides radio configuration upgrading mode except wired mode is provided, accelerate and simplified configuration upgrade procedure greatly.
(1) wireless mode
Wireless mode is developed at MS.Its operation is based upon wireless blue tooth and connects on the basis set up, and the transmission of all information and file all adopts wireless transmission method to send MS to from the BS end, and MS can concentrate very easily and be configured and upgrade like this.
(2) wired mode
Serial ports or cable network upgrading mode are adopted in the configuration of wired mode and upgrading.System manager and general user's configuration authority is different, and upgrading must have system manager's authority.Mainly on communication mode, other processes are similar in the difference that it and radio configuration are upgraded.
The described gate control system of enforcement of the present invention comprise database, server, PC, fixedly authenticating party gate inhibition's base station apparatus BS and by the identification moving target load from station arrangement MS, PC is connected by cable network with server; PC and BS pass through wired connection; BS and MS are by wireless connections; BS and MS overall system are constructed as follows:
Hardware: whether (1), base station apparatus BS are with CPU to be divided into two kinds according to mainboard.The base station of band CPU and PC wired connections such as netting twine, serial ports or USB, bluetooth protocol repertory operates on the base station; If mainboard is not with CPU, interface board directly is connected with PC socket or slot so, and bluetooth protocol repertory operates on the PC.
(2), from station arrangement MS, mainboard has CPU, offline operation, CPU both can be 8, also can be 16,32 or 64.Actual performance by application demand requires decision.
Software: comprise operating system, bluetooth protocol repertory and application program etc.
Base station apparatus with finish inquiry, checking jointly from station arrangement, be connected, transceive data, voice transfer and listen to and cut off connection procedure.BS and MS general structure are Bluetooth embedded equipment.
1, being loaded in from station arrangement MS will be by on the moving target of identification, MS comprises that the bluetooth module, LCD of mainboard and connection thereof show, two serial ports, button or keypad, FLASH or DOC storeies and backup network module, and mainboard is connected with bluetooth module selection RS232, UART, one of PIO, USB.
The MS default setting is in query State (or the scanning mode that can be inquired about), with wireless mode through inquiry and authentication process search and identification base station target, authentication by after be connected also transmitting data information or transmission, listen to voice messaging; Chain rupture is inquired about again then; Authentication is not by then inquiry again.Slave station comprises Host controller that has Bluetooth chip and the Host that controls Host controller, and the hardware description of bluetooth mainboard is as follows:
Functional module
12V is to the change-over circuit (every road 500mA) of 5V and 3V;
The TTL of COM1 is to the change-over circuit of RS232;
COM2 UART mouth (5V TTL) level is to the interface of bluetooth module (3V UART);
The joint of Ethernet RJ45;
LCD produces;
Keypad and button;
Input and output are arranged
The CN1:10Base-T Ethernet interface comprises the led state lamp and drives
CN2: programmable parallel IO16 line
CN3:RS232/RS485
CN4: fixedly I 10 lines are exported the input of 8 lines
The CN5:DC+5V power supply
Three, interface:
The input of 12V/24V voltage
Require: automobile storage battery voltage is convenient to be inserted or other 12 volts/24 volts power supplys.
RS232 serial ports COM1 exports (9 pin);
The explanation of pin name
1 CD←Carrier?Detect
2 RXD?←Receive?Data
3 TXD?→Transmit?Data
4 DTR?→Data?Terminal?Ready
5 GND?--System?Ground
6 DSR?←Data?Set?Ready
7 RTS?→Request?to?Send
8 CTS?←Clear?to?Send
9 RI←Ring?Indicator
The 20 pin parallel ports output of LCD
Ethernet RJ45 output
CN1 is that Ethernet 10BASET interface user can directly allow CN1 link to each other with other system unit or when selecting the design of our supporting RJ45 switching band line for use, introduces Ethernet transmitting-receiving lamp.
Keypad and button mainly are reset key and roll screen key up and down.Keypad comprises digital input function.
Link to each other with bluetooth module behind the Transistor-Transistor Logic level conversion 3V of the introducing COM2 of mainboard COM2.
The interface definition bluetooth module of bluetooth module is available by the product of many companies, and the mode of the access of bluetooth module is different separately.
The interface signal line of using has:
TXD
RXD
RTS
CTS
VDD
GND
ANT (optional) bluetooth mainboard principle is as follows:
Figure A0211673600091
2, the BS of mainboard band CPU comprises bluetooth module, the mixed-media network modules mixed-media of mainboard and connection thereof, two serial ports and FLASH or DOC storer, and mainboard selects RS232, UART, one of PIO, USB to be connected with bluetooth module.
The BS of mainboard band CPU links to each other with PC by network or serial ports, and the hardware design and the slave station of base station bluetooth mainboard are basic identical, have just removed button and LCD (being LCD).
The feature of base station apparatus BS of the present invention is a double-network card hot backup scheme.BS is connected with netting twine with PC and when equipment dependability had very high the requirement, in order to prevent to cause system to work because of the hardware fault of network interface card and netting twine, adopted the scheme of double-network card hot backup: this scheme is used for the very high application of reliability requirement, and general occasion can.It is composed as follows:
Hardware comprises technical grade mainboard (X86, ARM, POWERPC machine or the like) and network interface card; Software has operating system such as Windows, vxWorks, PSOS, Linux etc., and two network interface card drives bluetooth protocol repertory, TCP/IP etc.
Hardware is formed:
The technical grade mainboard cooperates two technical grade network interface cards;
Software is formed:
Windows, vxWorks, PSOS, Linux etc.;
Bluetooth protocol repertory, TCP/IP etc.;
Two network interface cards drive;
Double-network card hot alternate device driver characteristics:
Based on the device driver under the embedded OS;
Can support general pair of network interface card;
Based on standard ethernet standard IEEE 802.3;
Two network interface cards have warm standby function;
Two network interface cards have same IP address, have only one can work simultaneously;
Network interface card switching time can call by api function and control in the microsecond level by concrete switching time;
Detect netting twine, when the netting twine of work network interface card was obstructed, Millisecond switched on another network interface card that can be communicated to switch.
3, mainboard does not comprise PC, bluetooth module, blue tooth interface plate with the BS of CPU, and bluetooth module is connected by serial ports, parallel port or USB through interface chip in the system wherein of the present invention; For MS: mainboard is connected with LCD through the LCD steering logic by its parallel port or bus interface; Button is connected with the parallel port or the bus interface of mainboard through the button steering logic.
The present invention can realize the transmission of the bi-directional data and the voice of non-directional restriction quickly and easily, because it utilizes Bluetooth technology that wireless authentication and wireless two-way data transmit-receive are integrated, make authenticating party and certified side after authentication is correct, in certain distance, carry out the transmission of high-speed data and voice immediately, in short residence time even finish whole reciprocal process at the volley.
Description of drawings
Fig. 1 is the formation synoptic diagram of gate control system of the present invention (mainboard band CPU).
Fig. 2 is the formation synoptic diagram of gate control system of the present invention (mainboard is not with CPU).
Fig. 3 is a wireless blue tooth configurator synoptic diagram.
Fig. 4 is a wireless blue tooth ROMPaq synoptic diagram.
Fig. 5 is a MS device systems block diagram.
Fig. 6 is the BS system chart of mainboard band CPU.
Fig. 7 is a control of bluetooth access system works flow process sketch.
Fig. 8 is the workflow sketch of BS as Master.
Fig. 9 is the workflow diagram of MS as Slave.
Figure 10 is the workflow diagram of BS as Slave.
Figure 11 is the workflow diagram of MS as Master.
Figure 12 is the Bluetooth protocol model.
Figure 13 is customs of a control of bluetooth access system example sketch.
Embodiment
Below in conjunction with accompanying drawing implementation procedure of the present invention is elaborated.
As shown in Figure 1, MS carries the having from station arrangement of moving target to be certified, and BS is the base station that is fixed on the door.PC and BS are one-to-one relationship, connect by network or serial ports.The information interaction of BS and MS adopts wireless mode.All PCs are connected with far-end server by network.Server regularly sends to PC with the effective information in the certain hour, and when MS moves to distance with BS when being less than or equal to the Bluetooth communication coverage, PC and BS finish authentication and data exchange process to MS jointly.As shown in Figure 2, when PC and BS were integrated, all operations of being finished by BS and PC cooperation were all finished by BS; Following process is an example with mainboard band CPU all.
As shown in Figure 3, the configurator major function is as follows:
1) user inputs user name and corresponding password, if three inputs of user name or password are incorrect, then quit a program and can not continue to carry out again, if username and password is correct, then switches to corresponding interface of main menu.
2) user has two kinds: keeper and general user, keeper can see and revise all menu items except that upgrading, and the user can only see and revise wired menu item.For upgrade information, the keeper can only see and can not revise.
3) user's cuit numbering below the menu, if below submenu arranged then switch to corresponding submenu, if the final stage menu, then show the old value of this project, the value of this parameter is modified after new value of input and the new value affirmation.
4) user can select to preserve or do not preserve amended parameter, if preserve then will be saved in the boot.cfg file.
As shown in Figure 4, ROMPaq can only be moved by the keeper.MS number sends to BS with communication with current system version, sends PC to by BS again, and up-to-date system file is left concentratedly on server.ROMPaq on the PC at first number is compared with latest edition this shop by the current system version of value function call, if system version is number older than latest edition this shop, then carries out updating operation automatically.ROMPaq will be transferred the version list file of a * .O file in the system, compare with * .O file on the server, if version is older, then download the redaction file and new file is sent to BS, send to MS by BS by wireless blue tooth and cover original * .o file then with fileversion number modification preservation from server.After upgrading is all finished, with number renewal of the system version in the configuration file.
As shown in Figure 5, comprise that the bluetooth module, LCD of mainboard and connection thereof shows, two serial ports, button or keypad, FLASH or DOC storeies and backup network module, mainboard is connected with RS232, UART, PIO or USB with bluetooth module.
As shown in Figure 6, comprise bluetooth module, the mixed-media network modules mixed-media of mainboard and connection thereof, two serial ports and FLASH or DOC storer, wherein mainboard is connected with RS232, UART, PIO or USB with bluetooth module.
As shown in Figure 7, control of bluetooth access system works flow process is finished by the common cooperation of MS, BS, PC and server.Can be divided into query script, authentication and ciphering process, connection communication process.
Query script is finished by BS and MS fellowship, and active inquiry side is called master, is called slave by the ISSUER, and BS and MS both can work as master, also can work as slave.
After finishing, query script enters authentication and ciphering process, in fact comprise three subprocess in this process, first subprocess feature of the present invention is the authentication of PC end, the verification process main body is finished on PC, preserve authentication informations such as the bluetooth device address of the target that sends over from server, feature own on the PC, the device address information in the MS inquiry response bag will authenticate on PC;
Second subprocess is authentication process, and the process main body is finished jointly by server, PC, BS and MS.Authentication process of the present invention is characterised in that the dynamic change and the distribution of PIN code.At server end a randomizer is arranged, can produce the random number from 00000000 to 99999999; Server regularly produces and changes the PIN code value of all MS with randomizer.The server PIN code regularly sends to PC with other scheduling and security information etc.After BS and MS used the last PIN code value authentication that generates to pass through at every turn, PC sent up-to-date PIN code value to MS by BS, and MS receives the PIN code value of replace old after the new PIN code value.Thereby the authentication process of each BS and MS all uses the PIN value of variation, the security that has improved system greatly.
Be the encryption subprocess that under the prerequisite that preceding two processes are finished, carries out at last.Connect communication process and finish upper strata connection and data interaction, last chain rupture is returned.Detailed process is as follows:
As shown in Figure 8, after the power-up initializing process was finished, the base station was during as master, and default setting is in continuous query State; When the distance of MS and BS arrived in the Bluetooth chip operating distance scope, BS saw the respond packet of whether receiving that MS sends over, had comprised the information such as device address, local clock of MS in the respond packet.As receive that one or more bluetooth physical addresss that BS will receive send to PC by network or serial ports, have in the PC bluetooth physical address that allows the target passed through in current a period of time and with the tabulation of the feature binding of target own.One or morely on table, when existing, select one of them current legal when the address that transmits has through selection algorithm, then current legal prompting is sent to BS and on the PC display this physical address of demonstration the feature of corresponding target own; If the address does not exist on table, then send and illegally be prompted to BS and demonstration.BS receives that illegal prompting then changes query manipulation again over to, will illegally point out simultaneously to send to MS; BS just enters the authentication attended operation after receiving current legal prompting, when the PIN code input of MS is correct, finishes HCI after the authentication success and connects, and simultaneously data transmission is encrypted; Authentication is unsuccessful then to be sent the target invalid information and changes query manipulation again over to PC.
BS sent out a link setup to PC and finishes frame after the HCI connection was finished, and PC is issued BS with the data that needs send MS to.When the L2CAP layer connects, MS holds register requirement from the L2CAP layer to the BS as SERVER that send as CLIENT, and BS responds as SERVER, and the back CLIENT that succeeds in registration sends connection request, the SERVER response, the connection of L2CAP layer set up the back and just can be transmitted data and converse.BS delivers PC with the information of the MS that receives and handles and show; BS sends information from PC to MS.Data transmit-receive and conversation are finished and are confirmed back BS and MS chain rupture and change default setting over to.
As shown in Figure 9, after the power-up initializing process was finished, slave station was as slave, and the MS default setting is in the continuous scan for inquiries state that can be inquired about.When the distance of MS and BS arrived in the Bluetooth chip operating distance scope, MS scanned the inquiry of BS, and produced respond packet oneself information such as physical address are sent to BS.After the address checking is passed through, enter authentication process, MS carries out authentication with the initialization link word that the PIN code of carrying, device address and random number generate.Authentication by after carry out being connected of HCI and L2CAP layer.MS sends self-contained information to BS after the successful connection, and accepts the message that BS sends.Default setting is got back in chain rupture behind the sign off.
Otherwise as BS during as slave, the BS default setting is in the continuous scanning mode that can be inquired about as shown in figure 10; When the distance of MS and BS arrived in the Bluetooth chip operating distance scope, BS scanned the query requests of MS, and produced respond packet oneself information such as physical address are sent to MS.Select a wherein suitable current connection after MS authentication and the authentication, and oneself bluetooth physical address and channel number sent to BS; If authentication or authentication are not passed through, then show illegal prompting and interrupt connecting and get back to default setting.BS receives that sending to PC behind the physical address of MS authenticates.As previously mentioned, have in the PC bluetooth physical address that allows the target passed through in current a period of time and with the tabulation of the feature binding of target own.As by then setting up the connection of L2CAP layer as previously mentioned and begin communication, data transmit-receive and conversation are finished and are confirmed back MS and BS chain rupture and change separately default setting over to respectively.
As shown in figure 11, MS is during as master, and the MS default setting is in continuous query State.After MS receives the respond packet of BS in the operating distance scope, take out the address of BS in the respond packet.There are the bluetooth physical address of some BS target of current a period of time and the tabulation of binding thereof in the MS with the feature of target own.The address of taking out has one or more when existing on table, select a wherein suitable authentication through selection algorithm, the current connection in authentication back, and oneself device address and local clock sent to BS promptly can connect also transceive data at the L2CAP layer after the BS authentication is passed through.Data transmit-receive and conversation are finished and are confirmed back MS and BS chain rupture and change separately default setting over to respectively.
As everyone knows, Bluetooth protocol is a disclosed technical manual, and with reference to Bluetooth protocol, Bluetooth technology of the present invention is achieved as follows (for simplicity, if hereinafter do not make specified otherwise, BS will be as master, MS will as slave);
Bluetooth is operated in the ISM band of the unauthorized 2.4GHz of global general-use, used frequency hopping, promptly frequency band is divided into several frequency hopping channels, in once connecting, wireless transceiver constantly jumps to one other channel from a channel by certain sign indicating number sequence, have only receiving-transmitting sides by this rule communication, disturb and decline thereby overcome.Bluetooth technology is independent of outside the different operating system and communication protocol, is applicable to the short haul connection occasion of any data, image, sound.
As shown in figure 12, the Bluetooth protocol model mainly comprises: Physical layer, i.e. bluetooth wireless interface layer; Core protocol, base band (Baseband) agreement, LMP, L2CAP, SDP etc.; Cable replaces agreement, RFCOMM; Phone transmits control protocol, TCS scale-of-two, AT Command Set etc.Optional agreement, PPP, UDP/TCP/IP, OBEX, WAP, vCard, vCal, IrMC, WAE.
Except that above-mentioned protocol layer, standard has also defined host controller interface (HCI), and it provides command interface for baseband controller, link controller, link manager, hardware state and control register.
Can use various user models to transmit voice between BS and MS, the speech packet that face is connected only need be passed through base band transmission, need not to arrive L2CAP.Voice mode is simple relatively in Bluetooth system, only need open speech and connect, and just can transmit speech.The characteristic of channel that bluetooth connects is determined by master that fully the bluetooth physical address (BD_ADDR) of master is determined frequency hop sequences and channel identification code.The system clock of Master is determined the state of frequency hop sequences and regularly is provided with.The bluetooth unit that initialization connects is defined as master, sets up in case connect, and MS master-slave role can exchange fully.
In order to set up new connection, should use inquiry and call process.Query script makes a unit can find those unit within scope, and their device address and clock.By the call process, can determine actual connection.
A feature in Bluetooth system of the present invention is that master is in the state that can not be inquired about forever.The query messages of master broadcasting does not comprise the information of any relevant master, and master transmits query messages with different frequency hoppings continuously, and the inquiry frequency hop sequences is always taken from the LAP of GIAC.It will point out the type of answering equipment, use general polling EIC equipment identification code (GIAC) can inquire about any bluetooth equipment, use some Devoted Inquiry Access Codes (DIAC) can inquire about specified type equipment.The present invention determines the time length of one query overall process by two parameters are set: T overall process=N * 1.28 second (1<=N<=8) Num=a (1<=a<=255) T overall process---the expression one query overall process time, if do not reply at this moment correspondingly, then reentering inquiry sub-state Num---the expression ISSUER determines to abandon inquiry sub-state when collecting Num target.
Slave is default to be in constantly clocklike that the sub-state of inquiry scan, should return a FHS grouping that contains slave device address, local clock and other slave information and response when receiving query messages so that reply query messages.
When the master poll-final and when collecting one or more replying, BS sends the address that obtains to the PC checking, gets suitable legitimate targets and enters the call process, thereby the characteristic of channel is decided, and connects.Begin authentication then.
Authentication process is created initialization word Kinit based on PIN and random number.Create initialization word Kinit and carry out when LMP_in_rand PDU of checker transmission divides into groups to the requestor, the requestor replys with LMP_accepted, and two calculation of equipments go out the Kinit word, carry out authentication based on this word then.After checker is checked the authentication responses value,, just create the link word and be used for encrypting as correctly.
The connection MS and the BS of L2CAP layer can be Server or Client, and process is identical.BS sends out a link setup to PC and finishes frame, and PC sends needs to the data of MS and issues BS by network or serial ports.When the L2CAP layer connects, MS holds register requirement from the L2CAP layer to the BS as SERVER that send as CLIENT, and BS responds as SERVER, and the back CLIENT that succeeds in registration sends connection request, the SERVER response, the connection of L2CAP layer set up the back and just can be transmitted data and converse.MS sends self-contained information to BS, and BS delivers the PC processing with the information of receiving and shows; BS sends information from PC to MS.Data transmit-receive and conversation are finished and are confirmed back MS chain rupture and change separately default setting over to.
Example: control of bluetooth access system of customs
Customs is the door of country, and personnel and the goods turnover gateway of a country all must be through customs, along with China's opening and accession to WTO, and the further developing of foreign trade, the cargo movement amount of customs sharply rises.Cargo clearance has a series of necessary formality, and the lorry long queue on customs doorway is nothing to be surprised at, and the overlong time of being open to the custom has become a bottleneck, how to improve customs clearance efficiency and has become extremely urgent problem.An important example of the present invention is exactly a specific product of being open to the custom and developing at customs.
As shown in figure 13, the passage among the figure 1, passage 2, passage 3 ... passage n represents the passage of being open to the custom of customs or harbour, and the square of the passage end is represented the sentry box, and BS is that base station apparatus just is placed in the exterior angle, sentry box, is connected with PC in the sentry box by netting twine or serial ports.All PCs all use the server of network and far-end and database to couple together, be open to the custom operation plan and all vehicle registrations that allow to be open to the custom of customs every day all are kept in server and the database, and vehicle registration comprises the binding of on-vehicle Bluetooth device address, vehicle characteristics and driver's feature.Server regularly sends to PC with operation plan and vehicle registration, which vehicle will be arranged in the current certain hour, transports what goods, where where will transport to, be deposited in, should submit a series of information of which documentation or the like to thereby just have in the PC.
The characteristics that customs uses: a plurality of arrangements of a booth of being open to the custom; Need bi-directional transfer of data on the business; Working time is long, requires non-stop run in 24 hours, the reliability requirement height; Or the like.
Corresponding with these characteristics, when the present invention is applied to customs, following feature is arranged: all inquire the BS that is fixed on the adjacent doors for fear of the BS that is fixed on the door, all BS are set to respond the state (promptly closing Inquire Scan Enable) of inquiry in the overall process of work at every turn.Adopt the double-network card hot backup on the hardware, avoid causing system to work because of network interface card and netting twine fault, specific practice as previously mentioned.Program is in the Automatic Cycle state all the time, as shown in Figure 7.Idiographic flow is as follows:
Default setting is in continuous query State all the time behind the BS power-up initializing, and closes by inquiry scan.General polling EIC equipment identification code (GIAC) is used in inquiry, uses general polling EIC equipment identification code (GIAC) can inquire about any bluetooth equipment; The inquiry frequency hop sequences is taken from the LAP of GIAC.The time length that the setting of two parameters is determined the one query overall process as getting off: get N=4; Num=4; Thereby obtain: T overall process=N * 1.28 second=4 * 1.28=5.12 T second overall process---the expression one query overall process time,, then reenter inquiry sub-state if do not reply correspondingly at this moment; Num---inquiry sub-state was abandoned in decision when the expression ISSUER collected Num target.
Vehicle cab is equipped with MS promptly from station arrangement, and the default setting of MS is in the continuous scanning mode that can be inquired about all the time.BS and MS have definite good PIN code value respectively.Under the information that need submit to when management organization of relevant department just will be open to the custom in the departure place by Bluetooth communication when setting out sends to and preserves in the MS.When vehicle enters the passage of being open to the custom, with the distance in sentry box be less than or equal to Bluetooth communication apart from the time, MS scans the inquiry of BS, produces inquiry response and also sends to BS, comprises the device address of MS and local clock etc. in replying; After BS receives one or more replying, the bluetooth device address in the response message is sent to PC, PC is compared the address of receiving with the vehicle registration of preservation, judges whether vehicle is legal.As not, then send invalid message to BS, BS will forbid vehicle by and invalid message sent to MS, BS comes back to query State then; As legal, then from record, access the pairing vehicle in this address and driver's feature is presented on the display of PC, also can consult the relevant informations such as goods that vehicle should load, when the response of returning simultaneously have a plurality of legal, when just having a plurality of legal MS to exist in the bluetooth working range, PC is judged the current target that should connect with selection algorithm.PC sends to BS with the legal information of the current goal of selection, and BS connects and authentication MS; When if MS receives the connection event of a plurality of BS simultaneously, by selection algorithm select current over against the BS operation and send error message to other BS.BS and MS encrypt channel information after authentication is finished.The information that connects the needs submission that MS carries itself after finishing sends to BS, and BS sends a link setup to PC and finishes frame, and the information that MS submits to is submitted to PC.PC receives that the relevant schedule information that link setup is finished behind the frame this vehicle sends to BS, and information is by the packing of agreement form, divides difference such as numeric type/character type, demonstration/do not show are arranged, preserve/do not preserve, respectively at each bit representation in packet header.Send to MS by BS again, MS handles the packet of receiving by agreement, and will show on the display screen that carries needs content displayed, and other message are made some necessary processing.If intercommunication finishes, then send out the sign off frame mutually, PC sends and receives that switch is let pass after the end frame.All these processes will in seconds be finished.BS and MS chain rupture and get back to default setting separately then.PC is preserved the information receive and after processing the information of necessity is sent to server.

Claims (10)

1. the guard method of wireless authentication and data transmit-receive, it comprises query script, authentication process, ciphering process and data exchange process, it is characterized in that:
Query script, will authentic target carry one be equipped with the wireless blue tooth module from station arrangement MS; At authenticating party the base station apparatus BS that includes the wireless blue tooth module is installed, wherein BS or MS default setting are in continuous scanning mode; Bluetooth is operated in certain distance range, and in the time of in target enters this distance range, MS or BS scan the query messages of BS or MS, and MS or BS will produce and send response message then.This respond packet is used the conventional FHS grouping of stipulating in the Bluetooth protocol, carry the parameter of MS or BS, device address, local clock comprising bluetooth module among MS or the BS, the response that BS or MS monitor and read MS or BS, BS or MS finish query script when collecting MS or the BS response of setting number or arriving time-out time; If there is not target to enter in the bluetooth working range in the certain hour, the ISSUER will return default query State again because of overtime, move in circles;
The authentication process, at first BS reads the device address of MS and all addresses is sent to PC.PC is differentiated authentication to them after receiving these addresses, and verification process is that these addresses and the legal address that leaves on the PC are in advance contrasted, and just represents legally if coincide, and can watch the own feature of target with this device address binding; When having a plurality of targets legal in the certain distance, PC will be selected the current target that should connect according to user's selection algorithm, device address with this selected target sends to BS then, BS receives behind the address that PC returns according to the regulation of Bluetooth protocol and the MS authentication of this address, encrypt and be connected, KI is by bluetooth device address, PIN code and random number are released by the algorithm of agreement regulation, random number obtains from the pseudo-random process of bluetooth equipment, the exchange of key is finished at initial phase, divides the generation of initialization key Kinit, the generation of KI, the exchange of KI, authentication, generate five parts of encryption key at BS and MS by KI; Wherein the generative process of initialization key Kinit is as follows: all preserve a common PIN code value among BS and the MS, propose the authentication requirement when BS connects MS, the PIN code value participates in releasing the Kinit process; PIN code is revised by authenticating party after the authentication success and is deposited new password in MS and authenticating party;
Ciphering process, this process is deferred to the method for Bluetooth protocol, uses the close system E0 of stream to finish;
Data exchange process, after the successful connection, BS sends a link setup success frame to PC, the report PC connects has set up success, preserve in the PC and the relevant valid data of concrete application, after PC is received the data relevant with target are sent to BS by the form packing of appointing in advance, voice connect foundation simultaneously, allow BS and the direct switched voice signal of MS; After BS received packet from PC, the data decomposition that needs is sent to MS became agreement predetermined data bag to pass to bluetooth protocol repertory, sends to MS by transmitting chip at last; After MS receives the packet that BS sends, according to prior agreement, handle respectively after judging whether to show, whether preserving, MS also need pass to oneself the other side's information by arranging to send to BS after the form packing, sending PC to by BS again handles, when the transmission of data was all finished, the automatic cut-out of BS was connected with MS's, gets back to default continuous query State; MS also will cut off connection after receiving the chain rupture incident of BS, get back to default continuous scanning mode.
2. guard method according to claim 1 is characterized in that: BS is connected on directly that BS and PC are integrated is whole during as BS, above-mentioned all operations of being finished by BS and PC cooperation are all finished by BS.
3. guard method according to claim 1 and 2 is characterized in that: described PIN code dynamically generates new PIN code value when each authentication, ciphering process are finished, in order to the PIN code value of replace old, uses new PIN code in next authentication, when encrypting.
4. guard method according to claim 1 and 2, it is characterized in that: the physical features of the IP address of the bluetooth device address of described BS and MS, BS and socket port, MS itself and these parameters of PIN code value are deposited with document form, are written in the device memory; By configurator they are changed.
5. guard method according to claim 4 is characterized in that: the wherein all wired mode of system configuration, software upgrading and two kinds of methods of wireless mode.
6. guard method according to claim 5 is characterized in that: wherein serial ports or cable network mode are adopted in the configuration of wired mode and upgrading; The operation of wireless mode connects based on bluetooth has set up on the successful basis, and Bluetooth wireless transmission is all adopted in the transmission of all data.
7. gate control system of implementing above-mentioned guard method, it comprise database, server, PC, fixedly gate inhibition's base station apparatus BS of authenticating party and certified target from station arrangement MS, it is characterized in that: PC is connected by cable network with server; PC and BS pass through wired connection; BS is connected by blue teeth wireless with MS; BS and MS general structure are Bluetooth embedded equipment, MS comprises that the bluetooth module, LCD of mainboard and connection thereof show, two serial ports, button or keypad, FLASH or DOC storeies and backup network module, and wherein mainboard is connected through RS232, UART, PIO or USB with bluetooth module; BS comprises bluetooth module, the mixed-media network modules mixed-media of mainboard and connection thereof, two serial ports and FLASH or DOC storer, and wherein mainboard is connected through RS232, UART, PIO or USB with bluetooth module.
8. gate control system according to claim 8 is characterized in that: under high reliability request, BS adopts has two network interface card redundancy schemes of finishing the network boom backup functionality, and this scheme is made up of hardware and software, and wherein hardware comprises two network drives; Software comprises that two network interface cards drive.
9. gate control system of implementing above-mentioned guard method, it comprises database, server, PC, fixing gate inhibition's base station apparatus BS of authenticating party and certified target from station arrangement MS, it is characterized in that: wherein BS directly is connected on the PC and constitutes the whole BS that BS and PC are integrated, and BS passes through cable network and directly connects with server; BS is connected by blue teeth wireless with MS; BS and MS general structure are Bluetooth embedded equipment, MS comprises that the bluetooth module, LCD of mainboard and connection thereof show, two serial ports, button or keypad, FLASH or DOC storeies and backup network module, and wherein mainboard is connected through RS232, UART, PIO or USB_ with bluetooth module; BS comprises PC, bluetooth module and blue tooth interface plate, and bluetooth module is connected with PC serial ports, parallel port or USB mouth.
10. according to Claim 8,9 or 10 described gate control systems, it is characterized in that: wherein bluetooth module is introduced by PIO, UART or USB; The MS mainboard is connected with LCD through the LCD steering logic by its parallel port or bus interface; Button is connected with the parallel port or the bus interface of mainboard through the button steering logic.
CNB021167362A 2002-04-30 2002-04-30 Entrance guard method and system using blue tooth technique in wireless authentication and data transmitting/receiving Expired - Fee Related CN1148683C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021167362A CN1148683C (en) 2002-04-30 2002-04-30 Entrance guard method and system using blue tooth technique in wireless authentication and data transmitting/receiving

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021167362A CN1148683C (en) 2002-04-30 2002-04-30 Entrance guard method and system using blue tooth technique in wireless authentication and data transmitting/receiving

Publications (2)

Publication Number Publication Date
CN1379343A true CN1379343A (en) 2002-11-13
CN1148683C CN1148683C (en) 2004-05-05

Family

ID=4744213

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021167362A Expired - Fee Related CN1148683C (en) 2002-04-30 2002-04-30 Entrance guard method and system using blue tooth technique in wireless authentication and data transmitting/receiving

Country Status (1)

Country Link
CN (1) CN1148683C (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005046119A1 (en) * 2003-11-11 2005-05-19 Huawei Technologies Co., Ltd. A method of setting up the association between the session transaction identification and the network application entity
CN101114901B (en) * 2006-07-26 2010-08-25 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN101582177B (en) * 2009-06-08 2010-08-25 杭州电子科技大学 Method for remote control of bluetooth access control
CN1747370B (en) * 2004-09-09 2011-01-12 中国电子科技集团公司第三十研究所 Apparatus and method for realizing end-to-end enciphering telecommunication based on bluetooth wireless connection
CN102074057A (en) * 2010-05-11 2011-05-25 严志宏 Method for setting permissions of entrance guard of machine room monitoring system and monitoring system thereof
CN1747382B (en) * 2005-09-06 2011-06-08 湖南泓达科技有限公司 Random encryption and identity authentication
CN102360516A (en) * 2005-07-28 2012-02-22 因温特奥股份公司 Method of controlling access to an area accessible by persons, particularly to a space closed by a door
CN101036339B (en) * 2003-07-18 2012-05-16 科尔街有限公司 Disseminating additional data used for controlling access
US8191161B2 (en) 2005-12-13 2012-05-29 Microsoft Corporation Wireless authentication
CN102737428A (en) * 2012-06-18 2012-10-17 南京物联传感技术有限公司 Wireless switching device and system
CN102868568A (en) * 2011-07-06 2013-01-09 瑞昱半导体股份有限公司 Network unit replacing system and embedded system device
CN102917305A (en) * 2011-10-31 2013-02-06 广州盛华信息技术有限公司 System and implementation method for providing related information of user position
CN103945373A (en) * 2014-04-25 2014-07-23 上海大众汽车有限公司 Safety encryption scheme for Bluetooth transmission data
CN104507034A (en) * 2014-11-24 2015-04-08 小米科技有限责任公司 Equipment connecting method, device and terminal equipment
CN101409863B (en) * 2007-10-12 2015-11-25 广州市飞思计算机软件有限公司 A kind of system that local interaction application and information are provided
CN108337668A (en) * 2018-03-13 2018-07-27 华中科技大学 A kind of Bluetooth label configurator
CN109712282A (en) * 2018-12-18 2019-05-03 中国电子科技集团公司第十五研究所 A kind of electronic lock configuration management hand-held set and its application method
CN110418345A (en) * 2019-07-25 2019-11-05 世纪龙信息网络有限责任公司 Identity identifying method, device and computer equipment
CN111667611A (en) * 2020-05-08 2020-09-15 掌门物联科技(杭州)股份有限公司 Intelligent frequency hopping anti-interference door lock control system and control method thereof
CN113784344A (en) * 2021-08-19 2021-12-10 杭州宇链科技有限公司 Trusted address binding device
CN113840266A (en) * 2020-06-24 2021-12-24 华为技术有限公司 Bluetooth pairing method, device, system, electronic equipment and storage medium
CN113784344B (en) * 2021-08-19 2024-05-24 杭州宇链科技有限公司 Trusted address binding device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359423B (en) * 2007-08-03 2011-08-24 中兴通讯股份有限公司 Remote control method for permanent magnet operating mechanism

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101036339B (en) * 2003-07-18 2012-05-16 科尔街有限公司 Disseminating additional data used for controlling access
CN100466515C (en) * 2003-11-11 2009-03-04 华为技术有限公司 Method for establishing interaction between conversation business mark and network application entity
WO2005046119A1 (en) * 2003-11-11 2005-05-19 Huawei Technologies Co., Ltd. A method of setting up the association between the session transaction identification and the network application entity
CN1747370B (en) * 2004-09-09 2011-01-12 中国电子科技集团公司第三十研究所 Apparatus and method for realizing end-to-end enciphering telecommunication based on bluetooth wireless connection
US8446249B2 (en) 2005-07-28 2013-05-21 Inventio Ag Method of controlling access to an area
CN102360516A (en) * 2005-07-28 2012-02-22 因温特奥股份公司 Method of controlling access to an area accessible by persons, particularly to a space closed by a door
US9064403B2 (en) 2005-07-28 2015-06-23 Inventio Ag Method of controlling access to an area accessible by persons, particularly to a space closed by a door
CN1747382B (en) * 2005-09-06 2011-06-08 湖南泓达科技有限公司 Random encryption and identity authentication
CN101933286B (en) * 2005-12-13 2013-05-01 微软公司 Wireless authentication
US8191161B2 (en) 2005-12-13 2012-05-29 Microsoft Corporation Wireless authentication
CN101114901B (en) * 2006-07-26 2010-08-25 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN101409863B (en) * 2007-10-12 2015-11-25 广州市飞思计算机软件有限公司 A kind of system that local interaction application and information are provided
CN101582177B (en) * 2009-06-08 2010-08-25 杭州电子科技大学 Method for remote control of bluetooth access control
CN102074057B (en) * 2010-05-11 2013-07-10 严志宏 Method for setting permissions of entrance guard of machine room monitoring system and monitoring system thereof
CN102074057A (en) * 2010-05-11 2011-05-25 严志宏 Method for setting permissions of entrance guard of machine room monitoring system and monitoring system thereof
CN102868568A (en) * 2011-07-06 2013-01-09 瑞昱半导体股份有限公司 Network unit replacing system and embedded system device
CN102917305A (en) * 2011-10-31 2013-02-06 广州盛华信息技术有限公司 System and implementation method for providing related information of user position
CN102737428A (en) * 2012-06-18 2012-10-17 南京物联传感技术有限公司 Wireless switching device and system
CN103945373A (en) * 2014-04-25 2014-07-23 上海大众汽车有限公司 Safety encryption scheme for Bluetooth transmission data
CN103945373B (en) * 2014-04-25 2018-05-01 上汽大众汽车有限公司 The safe encryption method of bluetooth data transmission
CN104507034A (en) * 2014-11-24 2015-04-08 小米科技有限责任公司 Equipment connecting method, device and terminal equipment
CN104507034B (en) * 2014-11-24 2018-09-18 小米科技有限责任公司 Equipment connection method, device and terminal device
CN108337668A (en) * 2018-03-13 2018-07-27 华中科技大学 A kind of Bluetooth label configurator
CN108337668B (en) * 2018-03-13 2019-11-12 华中科技大学 A kind of Bluetooth label configurator
CN109712282A (en) * 2018-12-18 2019-05-03 中国电子科技集团公司第十五研究所 A kind of electronic lock configuration management hand-held set and its application method
CN110418345A (en) * 2019-07-25 2019-11-05 世纪龙信息网络有限责任公司 Identity identifying method, device and computer equipment
CN111667611A (en) * 2020-05-08 2020-09-15 掌门物联科技(杭州)股份有限公司 Intelligent frequency hopping anti-interference door lock control system and control method thereof
CN113840266A (en) * 2020-06-24 2021-12-24 华为技术有限公司 Bluetooth pairing method, device, system, electronic equipment and storage medium
CN113840266B (en) * 2020-06-24 2024-05-03 华为技术有限公司 Bluetooth pairing method, device, system, electronic equipment and storage medium
CN113784344A (en) * 2021-08-19 2021-12-10 杭州宇链科技有限公司 Trusted address binding device
CN113784344B (en) * 2021-08-19 2024-05-24 杭州宇链科技有限公司 Trusted address binding device

Also Published As

Publication number Publication date
CN1148683C (en) 2004-05-05

Similar Documents

Publication Publication Date Title
CN1148683C (en) Entrance guard method and system using blue tooth technique in wireless authentication and data transmitting/receiving
CN1189002C (en) Security architecture
US9007174B2 (en) Service identification authentication
CN102427457B (en) Safety protocol for peer-to-peer network
CN103369171B (en) Image-data processing apparatus and management equipment
CN1178442C (en) Authentication system using network
CN1241368C (en) Virtual private network
CN107564145B (en) Automobile dual-mode automatic door opening and closing system with built-in safety chip and method thereof
CN105680912A (en) Wireless system package and communication method of wireless system package and communication device
CN1518235A (en) Identification system of electronic busness and its implementing method
CN102144359A (en) Software-defined radio configuration
CN1225226A (en) A method and a device for identifying a user of a mobile telephone
CN109243012A (en) Access control system
CN1409236A (en) Method for keeping software connection between applied program during working of mobile computer terminal communication in radio network
CN1638332A (en) Information processing system
RU2009126606A (en) METHOD AND DEVICE FOR CREATING LICENSES IN MOBILE DIGITAL RIGHTS MANAGEMENT NETWORK
CN1599389A (en) System and method for storing and managing personal information
CN1860818A (en) Method and system for controlling resources via a mobile terminal, related network and its computer program product
CN1848140A (en) Authentication system, authentication method and entrance/exit management system
CN1411291A (en) Wireless equipment network managing method using multiple verification servers, verification server equipment and computer program product
CN1496626A (en) Information processing apparatus and method, and storage medium
CN101009565A (en) Secure update system of the robot data and its method
CN101765179B (en) Router with on-line waking function and working method thereof
KR101617707B1 (en) Electronic key system with function for transffering control right for electronic lock system
CN101815264A (en) Mobile phone sharing service management system and method thereof

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee