CN100461669C - Public key code hopping safety system and method - Google Patents

Public key code hopping safety system and method Download PDF

Info

Publication number
CN100461669C
CN100461669C CNB200510023810XA CN200510023810A CN100461669C CN 100461669 C CN100461669 C CN 100461669C CN B200510023810X A CNB200510023810X A CN B200510023810XA CN 200510023810 A CN200510023810 A CN 200510023810A CN 100461669 C CN100461669 C CN 100461669C
Authority
CN
China
Prior art keywords
key
sequence number
information
random number
eerom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB200510023810XA
Other languages
Chinese (zh)
Other versions
CN1814974A (en
Inventor
贾松仁
龚厚志
刘文江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jia Songren
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB200510023810XA priority Critical patent/CN100461669C/en
Publication of CN1814974A publication Critical patent/CN1814974A/en
Application granted granted Critical
Publication of CN100461669C publication Critical patent/CN100461669C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

A public key code hopping safety system and method mainly includes electronic unlocking key transmitting end and receiving end. It features transmitting end received touch-tone signal controlling program to execute ciphering transmit operation, reading out product serial number, encryption key, synchronous counter value, and irreducible polynomial Fm value from memory, then loading these data into ciphering unit, after complete ciphering and loading to shift register to transmit, after receiving end received signal, controlling procedure reading in serial number, deciphering encryption key, irreducible polynomial, synchronizing enumeration data from memory, to make deciphering and verifying, writing back new synchronizing count value to memory, in executing training pattern, writing back new serial number and deciphering encryption key to memory, when serial number is effective but deciphering invalidation, effectively deciphering outputting alarm signal, successfully learning, writing in new serial number, synchronous counter value, and deciphering encryption key for refreshing memory. Said invention has advantage of high system safety and low cost.

Description

Public key code hopping safety system
Technical field:
The present invention relates to a kind of public key code hopping safety system and method, particularly a kind of electron key, the encrypted frame hopping safety system and the method for door-locking system with microprocessor control.
Background technology:
In daily life, often use door lock, along with development of electronic technology electron key, electronic door lock system are used widely, people are by using electron key, send some specific wireless signals, door-locking system is after receiving these information, automatically perform a series of corresponding operations, as open the door, unblank, turn on light, the inner air-conditioning of preheating or the like.But the door-locking system major part of put goods on the market at first remote control gate lock such as automobile all is based on fixing coding techniques, the sign indicating number that electron key sends at every turn all is the value of fixing, and some lawless persons use scanner (Scanner) and intercept and capture device equipment such as (grabber) and can crack and enter this type of door-locking system easily.Invented rolling code (rolling code) afterwards again, the sign indicating number that electron key is sent out at every turn is all different, be fixed in some code words and circulate, this makes fail safe improve some, invented frame hopping (hoping code) safety system of block cipher cryptographic algorithm afterwards again, but along with the development of technology, cracker's technology and equipment is also more and more advanced, and the fail safe of block cipher frame hopping system still can not be guaranteed the safety of system.
Summary of the invention:
The object of the present invention is to provide a kind of public key code hopping safety system and method, the present invention mainly comprises: the transmitting terminal of electron key and receiving terminal two parts constitute, transmitting terminal is by button, electricallyerasable ROM (EEROM) (EEPROM), randomizer, ciphering unit, shift register, oscillator, LED drives, power consumption control, control unit is formed, receiving terminal is by the radio frequency command receiver module, electricallyerasable ROM (EEROM) (EEPROM) and a single-chip microcomputer are formed, it is characterized in that: control program was carried out following step after transmitting terminal was received push button signalling: carry out and encrypt transmit operation, at first be the power consumption control that various piece is opened in the power consumption control unit, for each unit provides clock signal; Generate random number by randomizer then, and from electricallyerasable ROM (EEROM) (EEPROM), read sequence number, encryption key, synchronized counter value, the irreducible function (F of product m) value; With random number, encryption key, irreducible function (F m) value, sequence number send into ciphering unit together, to need information transmitted to send into shift register after finishing ciphering process, launch then, the each information that transmits of transmitting terminal is 64bit, comprise three parts, first is the 16bit plain code information that is made of 12bit before 4bit key information and the product ID, second portion by 16bit random number and sequence number after 16bit carry out XOR and generate, and third part is the 32bit frame hopping that obtains through cryptographic algorithm, after the random number combination, carry out following step:
Encrypted Data=(Serial Number^Random Number|Counter^Random Number) * CryptKey (mod Fm) is promptly: data encrypted equals, sequence number XOR random number and the synchronous data formed of counting XOR random number, with encryption key finite field multiply each other long-pending.The encrypted frame hopping information that is 32bit that obtains.
The mode of encryption key is: Cryptkey*DecryKey=1 (mod Fm) promptly: encryption key and decruption key confinement multiply each other long-pending be 1.
Control program was carried out following step after receiving terminal was received signal: after single-chip microcomputer receives command information, from electricallyerasable ROM (EEROM) (EEPROM), read in sequence number, decruption key, irreducible function, the synchronometer logarithmic data, be decrypted and verify whether instruction is effective, if effectively then with corresponding button operation order output, and with new synchronometer numerical value write-back electricallyerasable ROM (EEROM) (EEPROM), when carrying out mode of learning (Learning mode), also will be with new sequence number and decruption key write-back electricallyerasable ROM (EEROM) (EEPROM).When receiving terminal receives that continuously some these sequence numbers are effective, but when deciphering invalid information, single-chip microcomputer is scanned attack with output alarm signal (Alarm) with caution.The receiving code separated into two parts, the sequence number of the 32bit of first, the frame hopping information of second portion 32bit, wherein frame hopping is corresponding expressly is made up of two parts again, the XOR value of 16bit random number and 16bit random number and 16bit coincidence counter, when carrying out mode of learning (Learningmode) by following step: the information of receiving 64bit; From electricallyerasable ROM (EEROM) (EEPROM), read trading company of factory and irreducible function (F m), calculate the decruption key that makes new advances by new sequence number and algorithm decruption key, and temporary this sequence number and decruption key; Obtain expressly corresponding with new decruption key deciphering frame hopping information; Carry out xor operation with correspondence plaintext first and second portion, calculate synchronized counter value, and it is temporary; Receive the code word of a 64bit once more; With its sequence number and primary comparing, identical execution next step, otherwise think study failure, do not do any operation, finish to withdraw from; Obtain expressly with decruption key deciphering frame hopping information; Plaintext first and second portion are carried out the synchronized counter value that XOR obtains this time; With itself and comparing last time, if than last time just big 1 carry out next step, otherwise think the study failure, do not do any operation, finish to withdraw from; Learning success writes new sequence number, synchronized counter value, decruption key to refresh EEPROM, finishes.
The mode of decruption key is: DecryKey=SerialNumber*ManufactureID (mod Fm) promptly: unique sign that decruption key equals sequence number and manufacturer finite field multiply each other long-pending.
Advantage of the present invention is: system adopts technology, encryption/decryption element, the design of randomizer and the design of transmitting terminal chip total system of public key algorithm frame hopping, the design of utilization coincidence counter, mode of learning (Learningmode), thereby improve the fail safe of system, because receiving terminal only need use and have the decoding program single-chip microcomputer and do not need special decoding chip, has reduced cost.
Description of drawings:
The structure chart of Fig. 1 transmitting terminal circuit of the present invention
Fig. 2 the present invention sends chip design overall plan figure
The ciphering process block diagram of Fig. 3 transmitting terminal of the present invention
The structure chart of Fig. 4 receiving terminal circuit of the present invention
The decipherment algorithm block diagram of Fig. 5 receiving terminal of the present invention
Fig. 6 decrypted program FB(flow block) of the present invention
Fig. 7 mode of learning program flow chart of the present invention
1 transmitting terminal chip, the input of B0 button, the input of B1 button, B2 button are imported, the B3 button is imported,
3 light-emitting diodes, 4 electricallyerasable ROM (EEROM)s (EEPROM), 5 randomizers, 6 ciphering units,
7 shift registers, 8 oscillators, 9 LED driving, 10 power consumption control, 11 control units,
12 reset circuits, 13 radio frequency command receiver modules, 14 electricallyerasable ROM (EEROM)s (EEPROM), 15 single-chip microcomputers
Embodiment:
System's major parameter:
Encryption key (CryptKey) 32bit is applied to ciphering process;
Decruption key (DecryKey) 32bit is applied to decrypting process;
Key information (ButtonInfo) 4bit needs information transmitted, and receiving terminal will be operated accordingly according to key information;
Whether sequence number (Serial Number) 28bit, unique sign of each electron key, door-locking system rely on this sign to distinguish is the electron key of oneself;
Count (Counter) 16bit synchronously, electron key is whenever pressed once, and this numeral adds one, is used for generating frame hopping and some security inspections through encrypting;
Vendor id (ManufactureID) 32bit, unique sign of each automobile vendor, this sign and sequence number join together to be used to generate encryption key and decruption key;
Encrypt back data (Encrypted Data) 32bit, promptly the changing unit of the each data that send of electron key by synchronous counting and serial number encryption gained, is used to realize frame hopping (hoping code);
Random number (Random Number) 16bit improves the key parameter of frame hopping rate of change and fail safe, is used for ciphering process;
Irreducible function (Fm) 32bit, the key parameter of cryptographic calculation and decrypt operation also is the key that generates encryption key and decruption key; (referring to Fig. 1), the transmitting terminal of system (promptly encrypting end) is made of transmitting terminal chip 1, button input B0, B1, B2, B3, light-emitting diode 3.The work that transmitting terminal chip 1 is mainly encrypted and sent has eight valid interfaces, comprises that keying input information, VDD, VSS, the LED of 4bit drives output and pwm signal output.Button is input as four, links 4 button inputs B0, B1 of transmitting terminal chip 1, the interface of B2, B3 respectively, and the user imports the order that controlled end need be carried out by it.Light-emitting diode 3 drives output by LED and drives, and whether display button information is effectively encrypted and exported.VDD is the input of power supply high level, and VSS is a ground connection.
At transmitting terminal, after user's action button, key information input transmitting terminal chip 1, chip is through behind the cryptographic calculation, and the information with after encrypting comprises plain code, pseudo-frame hopping and frame hopping part, sends by the PWM mouth, thereby has finished the once command transmit operation.(referring to Fig. 2) partly is made of button input, electricallyerasable ROM (EEROM) (EEPROM) 4, randomizer 5, ciphering unit 6, shift register 7, oscillator 8, LED driving 9, power consumption control 10, control unit 11 etc.The button input is the input information that receives from button; Electricallyerasable ROM (EEROM) (EEPROM) 4 is used to deposit product ID, encryption key, irreducible function Fm, synchronous counting etc.; Randomizer 5 is used to produce random number, and this random number will be used for ciphering process; Ciphering unit is mainly carried out cryptographic operation, and the 32bit frame hopping information after the output encryption; Shift register is used for temporary information to be sent, and the information of transmission sends a position; Oscillator 8 is clock sources of entire circuit, for circuit provides clock; LED drives a laser-emitting diode of 9 outsides; Reset circuit 12 is used to produce reset signal; Power consumption control 10 is used to reduce power consumption, after receiving key information, just provides clock signal to other each several parts of circuit, is executing encryption and transmit operation, promptly disconnects the clock signal of other parts; The control of whole system, working in coordination with of each module all finished by control unit.
Transmitting terminal chip 1 begins to carry out the encryption transmit operation after receiving the key information that is come out by button.At first be the power consumption control that power consumption control 10 is opened various piece, for each unit provides clock supply; Generate random numbers by randomizer 5 then, and from electricallyerasable ROM (EEROM) (EEPROM) 4 with sequence number, encryption key, synchronized counter value, the irreducible function (F of product m) value etc. reads; With random number, encryption key, irreducible function (F m) value, sequence number etc. send into ciphering unit 6 together, will need information transmitted to send into shift register 7 after finishing ciphering process, launch then.Thereby ciphering process and transmit operation have been finished.
The ciphering process of transmitting terminal (referring to Fig. 3): the each information that transmits of order transmitting terminal is 64bit, comprise three parts: first is the 16bit plain code information that is made of 12bit before 4bit key information and the product ID, second portion by 16bit random number and sequence number after 16bit carry out XOR and generate, and third part is the 32bit frame hopping that obtains through cryptographic algorithm, 32bit before encrypting expressly is made up of two parts again, and promptly 16bit carries out the 16bit sign indicating number that 16bit sign indicating number that XOR generates and 16bit random number and 16bit coincidence counter carry out the XOR generation behind 16bit random number and the sequence number.
The data that need in the encryption to use have: encryption key 32bit, irreducible function 32bit, the low 16bit of sequence number, random number 16bit and synchronous counting 16bit.Low 16bit and synchronous counting by sequence number are formed data to be encrypted together, after the use random number confusion, carry out following operation:
Encrypted Data=(Serial Number^Random Number|Counter^Random Number) * CryptKey (mod Fm) is promptly: data encrypted equals, sequence number XOR random number and the synchronous data formed of counting XOR random number, with encryption key finite field multiply each other long-pending.The encrypted frame hopping information that is 32bit that obtains.
Receiving terminal circuit mainly is made up of radio frequency command receiver module 13,14 and single-chip microcomputers 15 of (referring to Fig. 4) electricallyerasable ROM (EEROM) (EEPROM).Radio frequency command receiver module 13 is used for the wireless remote control instruction that the serial received transmitting terminal sends, and will instruct and be transferred to single-chip microcomputer 15 with digital signal form; Electricallyerasable ROM (EEROM) (EEPROM) 14 is deposited sequence number that deciphering will use, decruption key, irreducible function (Fm), counting etc. synchronously; After single-chip microcomputer 15 receives command information, from electricallyerasable ROM (EEROM) (EEPROM) 14, read in sequence number, decruption key, irreducible function, synchronous counting etc., be decrypted and verify whether instruction is effective, if effectively then with corresponding button operation order output, and new synchronometer numerical value is written back to electricallyerasable ROM (EEROM) (EEPROM) 14, when carrying out mode of learning (Learning mode), also will be with new sequence number and decruption key write-back electricallyerasable ROM (EEROM) 14.When receiving terminal receives that continuously some these sequence numbers are effective, but when deciphering invalid information, single-chip microcomputer 15 is scanned attack with output alarm signal (Alarm) with caution.
The receiving terminal manner of decryption is as follows:
(Serial Number^Random Number|Counter^Random Number)=Encrypted Data*DecryKey (mod Fm) is promptly: sequence number XOR random number and synchronously the data formed of counting XOR random number equal, the data that receive and decruption key are amassing that finite field multiplies each other.
Receiving terminal decrypted program operating process of the present invention is: (referring to Fig. 6)
1) will receive preceding 12bit sequence number and comparing of reading in the code word first, if identical execution 2), otherwise carry out 8); 2) utilize decipherment algorithm that frame hopping information is decrypted, and compare the corresponding first expressly of second portion, if identical execution 3 with frame hopping), otherwise carry out 8); 3) the corresponding first's (perhaps whole codeword second portion) expressly with frame hopping of back 16bit with the sequence number read carries out XOR, calculates the random number of transmitting terminal; 4) carry out xor operation by the corresponding second portion expressly of this random number, calculate synchronized counter value with frame hopping; 5) itself and readout are compared, if it carries out 7 greater than readout and difference in specified scope), otherwise carry out 6); 6) will be by 4) synchronized counter value that calculates is temporary, once receive again, promptly since 1) to 5), if new value carries out 7 than temporary value big 1), otherwise carry out 8); 7) think and receive successfully, new synchronized counter value is write to refresh EEPROM, carry out the desired operation of key information in the code word first simultaneously, finish.8) think and take defeat, judge whether to have passed through the several times sequence number relatively effectively and the deciphering failure,, otherwise directly carry out alarm signal if then judge and receive that scanning attack, output alarm signal also return.
Mode of learning: (referring to Fig. 7),
Mode of learning is primarily aimed at new electron key, and the information of automotive interior is upgraded, and comprising: product ID, decruption key and coincidence counter etc.In mode of learning, we consider its receiving code separated into two parts: the 16bit of first random number, second portion 16bit random number XOR coincidence counter.Under the mode of learning, concrete decoding step is: 1) receive, obtain the 64bit code word; 2) from EEPROM, read trading company of factory and F m, calculate the decruption key that makes new advances by new sequence number and algorithm decruption key, and temporary this sequence number and decruption key; 3) obtain expressly corresponding with new decruption key deciphering frame hopping information; 4) carry out xor operation with corresponding expressly first and second portion, calculate synchronized counter value, and it is temporary; 5) receive the code word of a 64bit once more; 6) with its sequence number and primary comparing, identical execution 7), otherwise carry out 10); 7) obtain expressly with decruption key deciphering frame hopping information; 8) expressly first and second portion carry out the synchronized counter value that XOR obtains this time; 9) with itself and comparing last time, if than last time just big 1 carry out 10), otherwise carry out 11); 10) think learning success, new sequence number, synchronized counter value, decruption key are write to refresh EEPROM, finish.11) think study failure, do not do any operation, finish.
The generation method of key:
The generating mode of encryption key and decruption key is as follows.
Generate encryption key: Cryptkey*DecryKey=1 (mod Fm) promptly: encryption key and decruption key finite field multiply each other long-pending be 1.
Generating solution decryption key: DecryKey=SerialNumber*ManufactureID (mod Fm) is promptly: unique sign that decruption key equals sequence number and manufacturer finite field multiply each other long-pending.

Claims (5)

1. public key code hopping safety system, transmitting terminal and receiving terminal two parts by electron key constitute, transmitting terminal is made up of button, electricallyerasable ROM (EEROM), randomizer, ciphering unit, shift register, oscillator, LED driving, power consumption control, control unit, receiving terminal is made up of radio frequency command receiver module, electricallyerasable ROM (EEROM) and a single-chip microcomputer, it is characterized in that: control program was carried out following step after described transmitting terminal was received push button signalling:
A) carry out the encryption transmit operation, power consumption control is opened the power consumption control of various piece, for each unit provides clock signal; B) generate random number by randomizer then, and from electricallyerasable ROM (EEROM), read sequence number, encryption key, synchronized counter value, the irreducible function (F of product m) value; C) with random number, encryption key, irreducible function (F m) value, sequence number send into ciphering unit together, and need information transmitted to send into shift register after will finishing encryption, launch then;
Control program was carried out following step after described receiving terminal was received signal:
After single-chip microcomputer receives command information, from electricallyerasable ROM (EEROM), read in sequence number, decruption key, irreducible function, the synchronometer logarithmic data, be decrypted and verify whether instruction is effective, if effectively then with corresponding button operation order output, and with new synchronometer numerical value write-back electricallyerasable ROM (EEROM), when carrying out mode of learning, also will be with new sequence number and decruption key write-back electricallyerasable ROM (EEROM), when receiving terminal receives that continuously some these sequence numbers are effective, but when deciphering invalid information, single-chip microcomputer is scanned attack with output alarm signal with caution.
2. a kind of public key code hopping safety system according to claim 1, the each information that transmits of wherein said transmitting terminal is 64bit, comprise three parts, first is the 16bit plain code information that is made of 12bit before 4bit key information and the product ID, second portion by 16bit random number and sequence number after 16bit carry out XOR and generate, and third part is the 32bit frame hopping that obtains through cryptographic algorithm, after the random number combination, carries out following step:
Encrypted Data=(Serial Number^Random Number|Counter^Random Number) * CryptKey (mod Fm) is promptly: data encrypted equals, the data that sequence number XOR random number and synchronous counting XOR random number are formed, amass the encrypted frame hopping information that is 32bit that obtains with encryption key what finite field multiplied each other.
3. a kind of public key code hopping safety system according to claim 1, the signal separated into two parts that wherein said receiving terminal is received, the sequence number of the 32bit of first, the frame hopping information of second portion 32bit, wherein frame hopping is corresponding expressly is made up of two parts again, the XOR value of 16bit random number and 16bit random number and 16bit coincidence counter, when carrying out mode of learning by following step: the information of receiving 64bit; From electricallyerasable ROM (EEROM), read trading company of factory and F m, calculate the decruption key that makes new advances by new sequence number and algorithm decruption key, and temporary this sequence number and decruption key; Obtain expressly corresponding with new decruption key deciphering frame hopping information; Carry out xor operation with correspondence plaintext first and second portion, calculate synchronized counter value, and it is temporary; Receive the code word of a 64bit once more; With its sequence number and primary comparing, identical execution next step, otherwise think study failure, do not do any operation, finish to withdraw from; Obtain expressly with decruption key deciphering frame hopping information; Plaintext first and second portion are carried out the synchronized counter value that XOR obtains this time; With itself and comparing last time, if than last time just big 1 carry out next step, otherwise think the study failure, do not do any operation, finish to withdraw from; Learning success writes new sequence number, synchronized counter value, decruption key to refresh electricallyerasable ROM (EEROM), finishes.
4. a kind of public key code hopping safety system according to claim 1, the mode of wherein said generation encryption key is: Cryptkey*DecryKey=1 (mod Fm) promptly: encryption key and decruption key finite field multiply each other long-pending be 1.
5. a kind of public key code hopping safety system according to claim 1, the mode of wherein said generating solution decryption key is: DecryKey=SerialNumber*ManufactureID promptly: unique sign that decruption key equals sequence number and manufacturer finite field multiply each other long-pending.
CNB200510023810XA 2005-02-03 2005-02-03 Public key code hopping safety system and method Expired - Fee Related CN100461669C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200510023810XA CN100461669C (en) 2005-02-03 2005-02-03 Public key code hopping safety system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200510023810XA CN100461669C (en) 2005-02-03 2005-02-03 Public key code hopping safety system and method

Publications (2)

Publication Number Publication Date
CN1814974A CN1814974A (en) 2006-08-09
CN100461669C true CN100461669C (en) 2009-02-11

Family

ID=36907317

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200510023810XA Expired - Fee Related CN100461669C (en) 2005-02-03 2005-02-03 Public key code hopping safety system and method

Country Status (1)

Country Link
CN (1) CN100461669C (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101149768B (en) * 2006-09-20 2011-04-27 展讯通信(上海)有限公司 Special processor software encryption and decryption method
CN101582123B (en) * 2009-06-23 2012-08-15 北京易恒信认证科技有限公司 Radio frequency system, device and safe processing method
US9388621B2 (en) 2011-05-24 2016-07-12 Overhead Door Corporation Decryption of access codes of diverse protocols in barrier operator systems
CN103842212B (en) * 2011-09-12 2017-05-31 密克罗奇普技术公司 The system based on frame hopping with increased security
CN103051869A (en) * 2012-11-15 2013-04-17 山东中孚信息产业股份有限公司 System and method for encrypting camera video in real time
CN103326851B (en) * 2013-07-03 2016-03-23 西京学院 SCM Based a kind of compass encrypting and decrypting method
CN103763104B (en) * 2014-01-02 2018-05-22 中移信息技术有限公司 A kind of method and system of dynamic authentication
CN104504795A (en) * 2014-12-20 2015-04-08 江门市联创发展有限公司 Encryption, decryption and authentication method for intelligent door lock under open system
CN110690965B (en) * 2019-10-10 2022-09-13 山东浪潮科学研究院有限公司 Wireless communication safety system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2376519Y (en) * 1999-06-18 2000-05-03 昆明电机有限责任公司 Electronic permulation lock
US6502160B1 (en) * 1999-09-10 2002-12-31 Lg Information & Communications Ltd. Apparatus and method for establishing construction information of a non-management ethernet switch
CN1427575A (en) * 2001-12-17 2003-07-02 北京兆日科技有限责任公司 Electronic cipher formation and checking method
US20030196005A1 (en) * 2002-04-10 2003-10-16 Broadcom Corporation Flexible apparatus for setting configurations using an EEPROM

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2376519Y (en) * 1999-06-18 2000-05-03 昆明电机有限责任公司 Electronic permulation lock
US6502160B1 (en) * 1999-09-10 2002-12-31 Lg Information & Communications Ltd. Apparatus and method for establishing construction information of a non-management ethernet switch
CN1427575A (en) * 2001-12-17 2003-07-02 北京兆日科技有限责任公司 Electronic cipher formation and checking method
US20030196005A1 (en) * 2002-04-10 2003-10-16 Broadcom Corporation Flexible apparatus for setting configurations using an EEPROM

Also Published As

Publication number Publication date
CN1814974A (en) 2006-08-09

Similar Documents

Publication Publication Date Title
CN100461669C (en) Public key code hopping safety system and method
US20100208894A1 (en) Encoder and decoder apparatus and methods
KR950001729B1 (en) Method of secure remote access
CN102110319B (en) Wireless code hopping system, device and method for remote control door lock
EP0872976B1 (en) Method for quickly generating successive pseudorandom numbers
JP3406157B2 (en) Remote control device
CN100592687C (en) Encryption communication system for generating passwords on the basis of start information on both parties of communication
JPH0242840A (en) Method and apparatus for confidental data transmission
CN102568062B (en) Encryption and decryption method for remote controller
CN102236773A (en) Radio frequency identification (RFID) encryption verification system and method
CN103548298A (en) System and method for remote biometric operations
CN111722831B (en) Encryption system and implementation method thereof
CN101807994A (en) Method and system for application data transmission of IC card
CN101624884A (en) Control method of wireless remote-control lock system
CN106504377A (en) A kind of electronic lock keyless access system of random key
CN101488179A (en) Authentication method and apparatus for wireless radio frequency recognition system
CN105235642A (en) Control order safety execution method and vehicle alarm host
CN101867471A (en) Irrational number based DES authentication encryption algorithm
CN104618380A (en) Secret key update method suitable for internet of things
CN109961545A (en) Intelligent door lock and its wireless telecommunications plaintext data encryption and decryption approaches
CN102644419B (en) Dynamic password remote control lock based on chaos technology
CN105416234B (en) Control instruction safe transmission method and automobile anti-theft remote controller
CN107749795B (en) Automobile remote control method based on rolling code secondary encryption
CN110047181B (en) Intelligent door lock safety control method based on Zigbee
CN202023428U (en) Wireless encryption remote control system for automobile door lock

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: JIA SONGREN

Free format text: FORMER OWNER: CHANGSANJIAO SCIENCE-TECHNOLOGY DEVELOPMENT CO., LTD., SHANGHAI

Effective date: 20070810

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20070810

Address after: 200032 7A room, No. 777, Lane 1, two South Road, Shanghai, Zhongshan

Applicant after: Jia Songren

Address before: 200032 7A room, No. 777, Lane 1, two South Road, Shanghai, Zhongshan

Applicant before: Changsanjiao Science-Technology Development Co., Ltd., Shanghai

C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Kunshan trillion core technology Co., Ltd.

Assignor: Jia Songren

Contract record no.: 2012320010027

Denomination of invention: Public key code hopping safety system and method

Granted publication date: 20090211

License type: Exclusive License

Open date: 20060809

Record date: 20120306

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090211

Termination date: 20170203

CF01 Termination of patent right due to non-payment of annual fee