CN101625773A - Method for implementing remote-control and passive keyless systems based on Bluetooth technology - Google Patents
Method for implementing remote-control and passive keyless systems based on Bluetooth technology Download PDFInfo
- Publication number
- CN101625773A CN101625773A CN200810069956A CN200810069956A CN101625773A CN 101625773 A CN101625773 A CN 101625773A CN 200810069956 A CN200810069956 A CN 200810069956A CN 200810069956 A CN200810069956 A CN 200810069956A CN 101625773 A CN101625773 A CN 101625773A
- Authority
- CN
- China
- Prior art keywords
- ussd
- bluetooth
- terminal
- time
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a method for implementing remote-control and passive keyless system based on Bluetooth technology, which relates to the field of wireless monitoring and information technology. In order to solve the problem and inconvenience that the prior keyless system is low in security and requires users to carry extra appendages, the invention combines Bluetooth technology, communication technology and wireless monitoring technology, introduces communication hardware encryption, protocol encryption above link layer and other embedded software modes, combines USSD (Unstructured Supplementary Service Data) and ring-back tone control technique, provides users with a method for implementing Bluetooth-based RKE (Remote Keyless Entry) and PKE (Passive Remote Keyless Entry) which is also known as PEG (passive entry go) systems, furthest solves the problem of the security of keyless systems, and reduces added appendages for the users.
Description
Technical field
The present invention relates to Bluetooth technology, NFC (closely noncontact) technology, remote control technology, gate inhibition's technology of new generation, mobile communication technology, (embedded) software engineering, specifically be meant implementation method based on cellphone subscriber's remote keyless gate control system of Bluetooth technology.Belong to areas of information technology.
Background technology
At present, known Keyless door access control system comprises: remote control does not have key gate inhibition RKE (Remote Keyless Entry) and passive keyless door guard system PKE (Passive Remote Keyless Entry) or claims PEG (passive entry go).Do not have in key gate inhibition RKE (the Remote Keyless Entry) system in existing remote control, the automobile driver is by opening/lock door by the button of next one emission wireless signal; For passive keyless door guard system (PKE), promptly more novel automobile connecting system, human pilot only need be carried a transponder just can easily realize aforesaid operations.
The RKE system comprises a wireless launcher in the key chain (or key), and its receiver in being installed in car sends a string short pulse digital signal, and signal by receiver control gear train, opens or closes car door or luggage case through decoding.In the U.S. and day should wireless carrier frequency be 315MHz, and 433.92MHz (ISM band) is then used in Europe.The RKE system of Japan adopts the frequency shift keying fsk modulation, and other most countries then adopt amplitude shift keying ASK modulation, and its carrier amplitude is modulated at two level.In order to reduce power consumption, get low level usually and approach 0, so produced on-off keying (OOK) modulation.RKE system specialization and design object typical R KE system (Fig. 1) are at key chain or a microcontroller are installed on the key.For automobile, press button of control device, will wake microcontroller up.Microcontroller is sent a string 64 or 128 s' data stream to the radiofrequency launcher of key, through carrier modulation, radiate, and implements the switch lock operation.
Obviously, the implementation method of RKE system is initiatively, and the user must be equipped with and carry key specific in the RKE system, and for vehicle user, the car central controlled lock has been equipped with the telepilot of switch door lock usually especially, and this telepilot has much just used the RKE technology.
For PKE (Passive Remote Keyless Entry) system, technique known is the RFID technology at present.RFID the earliest application in automobile is the automotive electronics engine anti-theft technique of beginning in 1993 to 1994.The important application of integrated rfid is " no key enters " in automobile, and " no key enters " requires the driver to get final product near automobile, and will key chain or smart card from pocket or wallet, take out.As long as the door handle of pulling operator seat can activate the awakening mode in the RFID transceiver in the car.This moment, the RFID transceiver can scan the peripheral region, to discern, to seek the specific ID code of the RFID chip that embeds in key or the smart card.In case find, security algorithm can determine whether legal whether the and decision of this chip open car door.
But present keyless systems (comprising RKE and PKE/PEG) exists tangible deficiency or defective:
The first, needing the user to carry the condiment of keyless systems: RKE needs the user to carry gate inhibition's telepilot; PKE/PEG needs the user to carry inductive coil or transponder.Though above condiment all can be by transforming intrinsic key, thereby integrate,, at first can increase the volume of key; Secondly for keyless systems completely, for example the no key of vehicle enters and does not have key startup etc., and condiment can't be integrated, can only independently exist.This is undoubtedly a kind of burden for requiring with light packs, easy user.
The second, keyless systems at first must solve safety issue.Use from the remote keyless gate (RKE) of maturation, to emerging passive non-key gate control (PKE/PEG), owing to reasons such as technical price ratio and availabilities, present keyless systems has been subjected to limitation in the application of security protection and security fields, make and obtain relatively difficulty of enough securities, the cost and the cost of the security of realizing ideal in other words are bigger, and safety cost is than on the low side.
The background technology of another concern of the present invention is a Bluetooth technology, and Bluetooth technology is initiated to propose in 1998 by the special interest of bluetooth group (SIG:Special Interest Group).SIG is made up of companies such as IBM, Intel, Nokia, Ericssion, Toshiba at first.But at present, the enterprise that adds SIG has reached family more than 2,000, and short two years, SIG member has almost covered all large enterprises of crossing the threshold and knowing of industries such as global communication, network, chip, peripheral hardware, software, and its growth momentum is swift and violent unusually.Certainly here since Bluetooth technology following character determined.
(1) there is not linearity
Bluetooth technology is that to connect line between the various electrical equipment with cancellation be target at first.Various data and speech ciphering equipment in the main network-oriented of Bluetooth technology are as PC, Dial-up Network, notebook computer, HFC, PDA, printer, facsimile recorder, digital camera, mobile phone, high-quality earphone etc.Bluetooth is linked to be a network around the individual by wireless mode with them, has saved the worry of terminal block, realizes seamless resource sharing between various portable equipments.
(2) opening of Bluetooth technology
Inherent opening has been given the bluetooth great vitality.From its birth, bluetooth is exactly a technical protocol of being initiated by manufacturers oneself, full disclosure, and be not that a certain family is exclusive and secret.So long as the member of SIG, the new technology of the use without compensation bluetooth of all having the right, and after the Bluetooth technology standard worked out, any manufacturer can gratis bring the production product, as long as product by the SIG tissue test and meet bluetooth standard after, brand can put goods on the market.
(3) interoperability of blue tooth products and compatibility
Blue tooth products is satisfying under the prerequisite of Bluetooth specification, also must have only and pass through authentication procedure by the authentication procedure (qualificationprogram) of SIG, could move towards market.Even this has just guaranteed the blue tooth products of different company, also can realize interoperability and data sharing, reach the purpose of complete compatibility.
(4) difference of Bluetooth protocol and other wireless protocols
Here mainly the have a talk difference of bluetooth and IEEE-802.11.IEEE-802.11 is applied to high-end wireless local area network technology, and its transmission range can reach 50m to hundreds of rice, and transmission speed is-11Mbit/s.The bluetooth that is different from IEEE-802.11 then is mainly used in short-distance transmission (be generally 10m, power amplification can reach 100m) data and voice (1Mbit/s), and power consumption is very low.Although bluetooth is operated in 2.4GHz ISM (i.e. industry, science, the medical science) frequency range of global general-use, IEEE-802.11 and Bluetooth technology can coexist in some cases.This mainly is because bluetooth has designed fast frequency-hopped especially and forward error correction scheme is stablized with the assurance link and transmission is reliable, and very strong antijamming capability is arranged.
(5) little to the human body security implication
Along with being rooted in the hearts of the people of wireless technology, radiation also becomes the problem that the consumer is concerned about very much.The group that is made up of experts such as World Health Organization, IEEE represents, does not find in the detection that the radiation of blue tooth products is influential to human body.The output power of blue tooth products is 1mW only, be micro-wave oven use power 1,000,000/, also only be the sub-fraction of mobile phone power, and, have only sub-fraction to be absorbed by the body in these outputs.
2 Bluetooth protocol architectures
A fundamental purpose of Bluetooth technology is exactly to make the various device that meets this standard can intercommunication, and this just requires local device and remote equipment to use identical agreement.Certainly, different application, the protocol stack of its use may be different.But they all must use Physical layer and data link layer in the bluetooth specification.Certainly, not that any application all must be used all accords, can only adopt the part agreement, for example during voice communication, just only need just, and need not pass through L2CAP through baseband protocol (Baseband).
Except above-mentioned protocol layer, standard has also defined host controller interface (HCI), and it provides command interface for baseband controller, connection controller, hardware state and control register etc.
These agreements can be divided into bluetooth proprietary protocol and non-proprietary protocol again, differentiation mainly is to adopt and use for reference existing various upper-layer protocol (just non-proprietary protocol) on the basis of bluetooth proprietary protocol as much as possible like this, make existing various application can the value of moving on bluetooth, as UDP/TCP/IP etc.The bluetooth core agreement all is the proprietary agreement of bluetooth, and most bluetooth equipments all need these agreements.And being SIG, RFCOMM and TCS_binary agreement Q.931 work out on the basis of agreement at ETSI TS07.10 and ITU-Recommendation respectively.Selecting agreement for use then mainly is various widely used upper-layer protocols.In a word, cable replacement agreement, phone control protocol and select for use agreement on the basis of core protocol, to constitute to the agreement of using.Below, just each agreement is done simple an introduction.
2.1 bluetooth core agreement
2.1.1 baseband protocol (Baseband)
When saying baseband protocol, need the network topology structure of understanding bluetooth earlier.It at first is made of piconet (piconet) one by one.In the piconet, having only a bluetooth equipment is main equipment (master), but 7 slave units (slave) can be arranged, and they are to be distinguished by 3 MAC Address.The clock of main equipment and frequency hop sequences are used for the slave unit of synchronous same piconet.A plurality of independently asynchronous piconets can form distributed network (scatternet) again, master/slave arrangement in piconet can be the master/slave arrangement in the another one piconet, but each piconet is distinguished by using different frequency hop sequences.
Baseband protocol is exactly to guarantee that the physical radio between each bluetooth equipment connects, to form piconet.The radio system of bluetooth is a frequency-hopping system, its arbitrary being grouped on assigned timeslot, the assigned frequency sends, it uses transmission frequency and clock between inquiry (inquiry) and the synchronous distinct device of paging (page) process, can be the base band data grouping two kinds of physical connection modes are provided: synchronously towards connecting (SCO) and asynchronous disconnected (ACL).SCO can transport voice packets (adopting the CVSD coding), also can transmission of data packets; And ACL can only transmission of data packets.All voice-and-data groupings all have the forward error correction (FEC) or the Cyclic Redundancy Check coding of different stage, and can encrypt, and are reliable to guarantee transmission.In addition, all can distribute a special channel, can transmit connection management information and control information etc. for different data types.
2.1.2 connection management agreement (LMP)
The connection management agreement is responsible for each equipment room establishment of connection of bluetooth.At first, its initiation by connecting, exchange, examine, to carry out safety practices such as authentication and encryption; Secondly it is consulted to determine the size of base band data grouping by equipment room; In addition, it can also control the electric source modes and the work period of wireless portion, and the connection status of interior each equipment of piconet.
2.1.3 logical link control and adaptation protocol (L2CAP)
Logical link control and adaptation protocol is the upper-layer protocol of base band, can think it and LMP concurrent working, their difference is when data during without LMP, and then L2CAP will adopt frequency multiplexing technique, cut apart with recombinant technique, group's extractive technique etc. and provide data, services for the upper strata.Though baseband protocol provides SCO and two kinds of connection types of ACL, L2CAP only supports ACL, and allows the speed transceive data grouping of upper-layer protocol with the 64K byte.
2.1.4 service discovery protocol (SDP)
Service discovery protocol is a very important part in the Bluetooth technology framework, and it is the basis of all user models.Use SDP, can inquire facility information and COS, afterwards, the connection between the bluetooth equipment could be set up.
2.2 cable replacement agreement (RFCOMM)
RFCOMM is based on the string line simulation protocol of ETSI 07.10 standard, and its emulation RS-232 on Bluetooth baseband protocol(BBP) control and data signal, for the upper-layer protocol (as OBEX) that uses the string line transfer mechanism provides service.
2.3 phone control protocol
2.3.1 binary phone control protocol (TCS Binary)
Binary phone control protocol is a Bit-Oriented Protocol, and it has defined the control signaling of setting up voice and data call between bluetooth equipment, has defined the mobile management process of handling bluetooth TCS device cluster.
2.3.2AT command set phone control protocol (AT commands)
ITU-T V.250 with the basis of ETS300 916 (GSM 07.07) on, SIG has defined under the control multi-user mode, mobile phone, modulator-demodular unit and can be used for the AT Command Set of facsimile service.
2.4 select agreement for use
2.4.1 PPP(Point-to-Point Protocol)
PPP is that IETF (Internet Engineering Task Force) works out, and in Bluetooth technology, it runs on the RFCOMM, finishes point-to-point connection.
2.4.2UDP/TCP/IP
UDP/TCP/IP is also worked out by IETF, is the basic agreement of internet communication, uses these agreements in bluetooth equipment, is to communicate for the equipment with Internet connection.
2.4.3 Object Exchange (OBEX)
OBEX is that IrOBEX writes a Chinese character in simplified form, and is the session-layer protocol of being worked out by Infrared Data Association (IrDA), adopts simple and spontaneous mode to come exchangeable object.The basic function that it provides is similar to HTTP, on the reliable basis of supposition transport layer, adopts the client-server pattern, and is independent of transmission mechanism and transfer application interface (API).In addition, OBEX provides a Folder List object specially, is used for the file content on the browsing far-end equipment.In 1.0 present agreements of bluetooth, RFCOMM is the unique transport layer of OBEX, in the version afterwards, might also support TCP/IP as transport layer.
Electronic business card Interchange Format (vCard) and electronic calendar Interchange Format (vCal) all are the open standards of the Internet email association (InternetMail Consortium) exploitation.These standards have just defined data transmission format, and do not define transmission mechanism.SIG adopts these standards that has defined, and is in order further to promote the mutual of personal information.
2.4.4 wireless application protocol (wap)
WAP is that WAP Forum (WAP Forum) is worked out, it has merged various wide area wireless network technology, the business with internet content and phone transmission that its objective is is sent to digital cellular telephone or other wireless terminals, select WAP for use, can make full use of wireless higher layer applications software of answering environment (WAE) exploitation.About WAP, please refer to every agreement that WAP Forum is worked out.
By above-mentioned introduction as can be known: though bluetooth is a kind of outstanding short-range data communication technology,, the shortcoming of its transport layer protocol is to be not easy to the user initial link circuit between the equipment is provided with.Simply bluetooth earphone and cell phone are coupled together the time (worst case) that will take 30 seconds, usually need some manual intervention and reconnect over the node of having discerned.
In addition, the Bluetooth technology application security is not good enough at present.By default, most of bluetooth equipments are all with not " non-safety " pattern work of protection.The hacker has created the unnumbered target, particularly mobile phone and the palm PC enforcement attack to using bluetooth earphone that mode is used as bluetooth attack that crack.Many people utilize the programming leak and select to attack with the protocol-dependent bad enforcement of OBEX.For example:
BlueBug allows the assailant make a phone call on another bluetooth cellular phone.
BlueDump cracks the PIN coding by observing the bluetooth equipment pairing.
BlueJack allows the assailant increase the contact person to the telephone directory book of bluetooth equipment.
BlueSmack makes the bluetooth equipment collapse by sending " ping-of-death " information.
BlueSnarf allows the assailant obtain contact person and calendar data from bluetooth equipment.
The bad name of BlueStab using formization makes the equipment collapse when finding bluetooth equipment.
Defend this attack, the present invention will provide a kind of method that multiple means is combined, and guarantee the security and the practicality of bluetooth applications.Universal day by day along with present bluetooth cellular phone, can carry out the affirmation and the monitoring authentication of identity with the Bluetooth function of bluetooth cellular phone in a lot of fields, so that the user provides identify label (ID) easily not increasing under the appendicular situation of identity, and cooperate corresponding bluetooth recognition system to finish identification and authentication.
Summary of the invention
In order to address the above problem, the present invention aims to provide and a kind ofly utilizes this method based on the remote control of Bluetooth technology and the implementation method of passive keyless systems, can be and implements to set up remote control and passive keyless systems, and guarantee the practicality and the security of this system.Simultaneously, the present invention also can implement to set up remote keyless system or passive keyless systems separately.Application of the present invention is extremely extensive, promptly can be applicable to door lock for vehicle, start-up system, also can be applicable to various gate control systems, attendance checking system, patrol system and wireless financal POS system or the like.
To achieve these goals, it is a kind of based on the remote control of Bluetooth technology and the implementation method of passive keyless systems that the present invention solves the technical method that its technical matters adopts, and comprises following feature, step and submethod:
One, the enforcement prerequisite of the inventive method:
Remote control does not have key gate inhibition RKE (Remote Keyless Entry) and passive keyless door guard system PKE (Passive RemoteKeyless Entry) or claims the user of PEG (passive entry go) system must be equipped with the mobile phone of band Bluetooth function, uses the bluetooth transceiver module otherwise should add.
Two, the present invention has provided and has guaranteed method and the step that bluetooth safety connects:
2.1 the safety practice of bluetooth itself:
Be to guarantee the security that Bluetooth communication connects, use two kinds of the bluetooth specification definition other patterns: the third pattern guarantees the safety of whole wireless connections, and second kind of pattern is the safety that guarantees the application program of each mandate.Obtain optimal results, use the third pattern to put teeth in to connect identification and all bluetooth communications are encrypted, do not encourage or forbid that system or user use the equipment of only supporting first kind of pattern.
Connect when safe when enabling, bluetooth equipment must be finished preliminary " joints " and exchange, and produces paired connection identification and key.The user must provide identical PIN code to these two equipment, and the unit key with manufacturer definition mixes then.Destroy the process of this pairing for avoiding using PIN weak or that can expect to encode, thereby reduce risks, equipment should match in the place of secret, and uses PIN long and at random to encode.The PIN coding of avoiding giving tacit consent to, the PIN coding (as " 0000 ") that is easy to guess and avoid using the equipment of not supporting the PIN coding that can be provided with.
Through " joint " afterwards, no matter when paired bluetooth equipment wants the swap data can be interrelated.After each connection was set up, devices exchange password response message had the connection key of creating between joint aging time with displaying.Yet this identification exchange is for guessing that key is valuable.In guessing the process of key, an equipment carries out the trial of identification repeatedly.Can defeat attack initiatively by increasing the interval time of attempting each time.But, the maximum times that bluetooth specification does not have mandatory provision to attempt.Unidirectional identification also is subjected to man-in-the-middle attack easily.Reduce this risk, the present invention recommends: under the situation of using permission, require interconnective two equipment all will carry out identification always.
Encryption mode according to consulting can use 8 data of transmitting to 128 secret key encryptions on link.Obtain optimum efficiency, avoid using first kind of encryption mode (not encrypting), can select second kind (encrypting One-to-All Broadcast rather than broadcast communication) or the third encryption mode (encrypting all communications) arbitrarily.Because use the data of too short secret key encryption to crack the communication of catching after can be by analysis, two equipment of communication all should be configured such that with 128 keys.
Fullest utilizes the further step of the built-in bluetooth measure of these systems to comprise:
● in system when not busy or close obsolete blue tooth interface non-service time automatically and close the discovery feature of bluetooth.This function allows each equipment announce own open near all equipment.These common ways have reduced the chance that bluetooth is attacked, and reduce the power consumption of system simultaneously.
● bluetooth equipment is set uses lowest power to satisfy business demand.Three kind equipment through-put powers are 1mW, and transmission range is no more than 10 meters.One kind equipment through-put power is 100mW, and transmission range is 100 meters.Adjust power and can not eliminate external staff's attack.But, can reduce the possibility of attack.
● be stored in the paired bluetooth equipment or bluetooth cellular phone because connect key, these two equipment of password protection or mobile phone prevent to use the equipment of losing/stealing.If using, the function of system do not have specific demand, can not be in bluetooth equipment pairing PIN coding permanent storage.
2.2 auxiliary bluetooth safety practice:
Auxiliary bluetooth safety practice provided by the invention can cooperate the safety practice of 2.1 bluetooths itself to implement together, also can independently implement, and this will depend on the functional requirement and the cost requirement of practical application.Auxiliary bluetooth safety practice provided by the invention comprises following method and step:
● do not have key gate inhibition RKE (Remote Keyless Entry) and passive keyless door guard system PKE (Passive RemoteKeyless Entry) or claim to increase in PEG (the passive entry go) system host mobile module (can be GSM, CDMA, PHS etc.) in remote control.
● the user sends to system host by authorizing phone number in the mode of note (SMS) with the PIN coding, and for guaranteeing security needs, the PIN coding defines with a short message at least, and a standard short message can provide 140 byte lengths.
● after main frame is received user's note, at first the calling number that sends note is carried out authentication, read dialing number information in the mobile module by the AT instruction, the default authorization number list of contrast carries out authentication then.
● if calling number is the PIN coding by authentication just main frame picks up the short message content of this number transmission, and requires the identical PIN coding of user mobile phone input, finishes to engage exchanging.
● for the safety of system, the mandate calling number can not be too much, and general provision 1-2, determine a master control number simultaneously, be used for change, set the mandate calling number.And when using for the first time, the setting of master control number can by on the main frame or the keyboard that is connected with main frame be provided with; Also can be defaulted as the master control number of the first use of system by a calling number trusty, secret, the user sets required master control number by this number, sets the first use master control number of automatic covering system acquiescence after finishing.
● finish engaging after the exchange, main frame is the short message content that sends of delete authority calling number immediately, prevents that plain code from cracking and influence the safety of system.Simultaneously, wait for that next bar mandate calling number sends the PIN coding of up-to-date note to reset up-to-date, finishes new joint exchange.The security that frequent replacing PIN coding helps to improve system.
● if PIN is set is encoded to the not exclusive purpose of user's calling number, then must define the coded system or the content format of short message content in the methods of the invention, with main frame differentiation identification altogether to main frame transmission note.
2.3 the bluetooth safety practice of embedded software:
One of the fundamental purpose that is embedded in the software of mobile phone terminal is exactly automatically frequent replacing PIN coding, to guarantee the security of Bluetooth system, is satisfying under the prerequisite of security requirement, and the algorithm of identifying code can be taked multiple mode.When the setting of PIN code and modification, must satisfy system host (main equipment) and keep getting final product synchronously with user mobile phone (slave unit).
Three, remote control does not have the implementation method of key gate inhibition RKE (Remote Keyless Entry) system
It is a kind of gate control system of active that remote control does not have key gate inhibition RKE (Remote Keyless Entry) system, promptly before gate inhibition's switch motion, needs the user to carry out active affirmation and enforcement supervisory control action.And the invention provides following approaches and methods in conjunction with the Bluetooth technology supervisory control action:
3.1 caller ring RKE:
In the gate control system of communication module (GSM/CDMA/PHS etc.) is known clearly in introducing, in order to improve the convenience that the user uses, and the cost of use of reduction gate control system, the invention provides a kind of method, comprise following feature, step and submethod by caller ring enforcement or triggering gate inhibition wireless monitor:
3.1.1 the mode that monitored instruction produces
The mode of monitored instruction is whether to realize by caller in the mobile communications network and called communication request link establishment in this method, and the switching value that whether produces ring of the communication terminal by the monitored object side is used as monitored instruction and carries out exercises with the topworks of control monitored object side specifically.
When the user implements policer operation at needs to gate control system, call by certain rule to the communication terminal (called) of gate control system main frame as caller by the user earlier, after this caller communication request link establishment, communication terminal at called gate control system main frame promptly can produce called ring, but do not produce conversation this moment, and the foundation that also is this caller communication request link provides the mobile communication carrier of service not begin to charge at this point.
Subsequently, after the communication terminal of gate control system main frame produces called ring, after gate inhibition's side or the affirmation of related application circuit, allow the communication terminal of gate control system main frame hang up the reception and the transmission of this time calling out immediately to finish signaling.
3.1.2 signaling rule
In order to realize that gate control system is implemented various supervisory control actions, just monitor command must be carried out encoding and decoding in a manner described.Because the mode of monitored instruction is whether to realize by caller in the mobile communications network and called communication request link establishment among the present invention, be switching value therefore, can be understood as 0 and 1.
But because the Time Created of caller communication request link is relevant with several factors, the network condition of several factors and mobile communication carrier is associated, but can not have this method to grasp.Therefore monitor the transmission mode of signaling and be not suitable for real-time or synchronizing capacity requires very high gate control system to use, but enough for general civilian application.The present invention continues the signaling rule that provides concrete:
3.1.2.1 simple rule
For the monitoring that only needs gate inhibition's switch motion, the signaling rule is very simple, can whether be consistent with the foundation (called terminal ringing) of communication request link or opposite, and note the number of times of dialing, carry out switching manipulation by the parity of dialing number of times by monitoring side and monitoring side.For example the n time ring, system definition is " opening " operation, and then the n+1 time ringing system carried out " pass " operation; In like manner the n time ring, system definition is " pass " operation, and then the n+1 time ringing system carried out " opening " operation.
3.1.2.2 complex rule
Must assign the situation of complicated monitor command for the user, at first need to select a tame mobile communication carrier (as China Mobile, CHINAUNICOM, China Telecom etc.), and according to its network condition and switch characteristic, obtain setting up caller link () shortest time Tmin and maximum duration Tmax also promptly: carry out making call to cried the generation ring by terminal from caller, if the communication terminal of monitored object side is t from producing ring to the time span of hanging up this time communication linkage (call request), the communication terminal of establishing the monitored object side again is f to the sample frequency of ringdown, then must satisfy relation: (Tmax-Tmin) f<=1; F<=1/t.
After the condition more than satisfying, encode for the mode that the monitor command of monitoring side just can machine code, coding rule is applicable to all decoding method systems of present main flow.Simultaneously, monitored object side fibrous root carries out decode operation according to identical decoding method system, and carries out the monitor command of monitoring side.
3.1.3 the utilization means of CRBT, CRBT (caller ring-back tone)
For under the state of not setting up conversation, be under the free state, can guarantee that also the user obtains voice service, the invention provides by set the method for special ring-back tone in the network of relation side of mobile communications network, to allow the user obtain the voice service of hommization, the while has significantly been reduced the use cost of mobile communications network.The present invention can adopt multiple Ring Back Tone Technology, comprises multimedia color ring back tone, IP CRBT or the like.
Must feed back to the quantity of state of monitoring side 3.1.3.1 determine the monitored object side
After monitoring side implemented the various operations of monitoring to monitored object, normal conditions monitoring side need obtain the feedback of monitored object.Before the caller ring-back is set, must determine the quantity of state of monitored object side feedback earlier.For example: if need only be " opening " or " pass " to monitoring side's feedback states, then quantity of state be 2; If must feedback " just ", " bearing ", " zero ", then quantity of state be 3, and by that analogy, and to establish quantity of state be n.
3.1.3.2 the segmentation of caller ring-back tone
If the communication terminal of monitored object side is t from producing ring to the time span of hanging up this time communication linkage (call request), and the monitored object side must to feed back to the quantity of state of monitoring side be n, t is divided into t1, t2, t3......tn.
3.1.3.2.1 the cooperation of state
At first, the maximum length of setting this mobile communications network caller ring-back tone is T, must satisfy t<=T.
Secondly, if the monitored object side must allow monitoring side learn quantity of state 1, the then t1 time period active on-hook that the communication terminal of monitored object side must be in t; In like manner, if the monitored object side must allow monitoring side learn quantity of state n, then initiatively on-hook of the tn time period that the communication terminal of monitored object side must be in t.
3.1.3.2.2 the period is cut apart
To cutting apart of t day part, can take 3 master slave modes: the first, all point-score, i.e. t1=t2=......=tn; The second, voice precedence method, promptly when the caller ring-back tone is set, the suggestion voice length of different conditions is not quite similar, for example " shut down " and the voice length of " your second set up defences the phenomenon that the zone has temperature anomaly to raise " is different, for the user hears complete voice, just n condition prompting time must be set according to voice, if the backchannel duration of a sound of n state, the tn of then cutting apart is long; Three, monitored object state time delay precedence method, the quantity of state (all or part of) that the monitoring side must be fed back has time delay under many circumstances, sometimes the caller ring-back tone need be waited for the generation and the execution of this quantity of state, at this moment must be foundation just, be provided with and cut apart the caller ring-back tone with the time delay of monitored object side.
3.1.4 interactive monitoring
If the phrase sound prompt time of each state of monitored object is Tmin, if T/n<=Tmin then can not satisfy the simple requirements of above method for supervising, under requiring cheaply, just must expand above method for supervising.The method that the method for its feedback signaling and monitoring direction monitored object send the monitoring signaling is similar, and just the signaling by the passback of monitored object side is not a monitor command, but the relevant information of feedback states.In this manner, the caller ring-back tone of setting only plays the aid prompting effect, and easily carries out various data processing according to the encoding and decoding that above-mentioned signaling rule is carried out, and implements the various application of various internets.
3.2 the RKE of USSD mode (Unstructured Supplementary Service Data unstructured supplementary data traffic):
3.1 the implementation method of caller ring RKE is based on point-to-point mode, the RKE of USSD mode then is based on the RKE method of network, and its prerequisite is the enforcement zone of RKE system, the network service support USSD business that radio communication operator provides.Comprise following feature, step and submethod:
3.2.1 must make up a network of forming by USSD application server, user mobile phone, keyless systems, the USSD server can, GPRS (General Packet Radio Service) (GPRS) data interaction mutual by the note (SMS) in the GSM network, or 3.1 described caller ring control modes are set up and being connected of keyless systems.
3.2.2 the user need dial a specific USSD Number for access, as the condition of control keyless systems, and initiates and sets up being connected of user mobile phone and USSD application server.
3.2.3 the user is when needs carry out switching manipulation to keyless systems, at first use the specific Number for access of mobile phone dialing, for example: dial * 109*2#, the USSD application server carries out authentication to this calling number of dialing then, if do not belong to the number call in the authorization number list, then this request of dialing is not responded, do not handle.If authorization number, be after authentication is passed through in caller, the USSD application server provides the user automatically with prompting, for example: " welcome to use; open the door and reply 0; close the door and reply 1; status poll replys 2; ... ", the USSD application server is after receiving that the user replys, according to different user instructions, the USSD application server is mutual by the note (SMS) in the GSM network, modes such as GPRS (General Packet Radio Service) (GPRS) data interaction send controls instruction to keyless systems, after its topworks has finished control action, feedback is submitted to the USSD application server, feed back to the user from giving.In like manner finish the control action of remaining or next stage.
3.2.4 because USSD adopts is communication mode mutual, compartment, system must receive that message just can provide response, promptly USSD upstream data and downlink data be one to one, timesharing sends.The inventive method is divided into two time slots, i.e. ascending time slot and descending time slot with a mutual cycle.The USSD mode all has clear and definite requirement (normally 16 to 97 about byte) to the data volume of each communication, thus at each monitor terminal when platform sends information, monitor terminal must carry out flow control.
In order to make good use of the USSD passage comprehensively, efficiently, use this method should understand the correlation parameter of USSD platform before to wireless carriers, comprise response time, time-out time, byte limit, information format.In this regular scope, use following method provided by the invention.
At first define Several Parameters: the maximum fault information Du (byte) of the each up transmission of USSD, the maximum fault information Dd (byte) of the each descending transmission of USSD, terminal is dialled the USSD Number for access and is provided the time T b (second) that responds between the foundation communication to system, terminal produces the numeric code rate Fu (byte per second) of upstream data, the time-out time To of USSD system, system produces the numeric code rate Fd (byte per second) of downlink data, the actual bandwidth Bu (byte per second) that USSD is up, the actual bandwidth Bd (byte per second) that USSD is descending.
In ascending time slot, the time T u (second) of up transmission Du receives that from terminal system message is to the time T t (second) of transmission information to system's (monitor supervision platform side); In descending time slot, the time T d (second) of descending transmission Dd receives that from system's (monitor supervision platform side) terminal message is to the time T s (second) of transmission information to terminal.
USSD for singlehanded machine module connects: Bu=Du/ (Tu+Td); Bd=Dd/ (Tu+Td);
In the methods of the invention, for a mutual cycle, for making the load condition equilibrium of platform side and end side, according to the needs that network system is optimized, the system that is positioned at the upper edge sends stand-by period Ts and must set up corresponding relation with the terminal transmission stand-by period Tt that is positioned at the lower edge.An optimized proportion coefficients R is set, therefore is connected with following relation: R=Ts/Tt, establish the Tt=Δ, the Ts=R Δ is promptly arranged for a USSD.
USSD for singlehanded machine module connects, and guarantee that normal communication must meet the following conditions:
{(R+1)·Δ+Tu+Td}<Min(Du/Fu,Dd/Fd)<To
That is: Δ<{ (Min (Du/Fu, Dd/Fd)-Tu-Td)/(R+1) }<{ (To-Tu-Td)/(R+1) }
{ (To-Tu-Td)/(R+1) } is the normality item, { (Min (Du/Fu, Dd/Fd)-Tu-Td) Fu, Fd may be constants/(R+1) }, it also may be variable, in case { (Min (Du/Fu, Dd/Fd)-Tu-Td)/(R+1) } become to equaling 0, under the prerequisite that keeps communications status, Δ also must become to equaling 0.At this moment, system must trigger monitor terminal immediately and enable new mobile module, after triggering it simultaneously and dialing the time of TB at least of USSD Number for access at previous mobile module, dial the USSD Number for access and set up new USSD and communicate to connect, platform side must increase simultaneously provides one to insert thread and be this terminal use.
Connect for the USSD of two mobile modules after increasing is parallel simultaneously, the rule that proper communication must be satisfied is:
Δ<{(Min(2Du/Fu,2Dd/Fd)-Tu-Td)/(R+1)}<{(To-Tu-Td)/(R+1)}
·
·
·
N parallel simultaneously connection of USSD, rule is:
Δ<{(Min(n·Du/Fu,n·Dd/Fd)-Tu-Td)/(R+1)}<{(To-Tu-Td)/(R+1)};
Bu=n·Du/(Tu+Td);Bd=n·Dd/(Tu+Td)
After having set up new communicating to connect, the data that buffer storage produces may produce data and overflow and be made as DO.Connect by newly-established USSD, DO is passed down in the lump, and data merge when finishing in the opposite end.
Realize that above method must have synchronous clock accurately, insert specified byte in the downlink data of the inventive method system after the terminal phone module is dialed the USSD Number for access and be used for transmission, initialization system clock, the trigger pip that while makes zero as the terminal timer, insert the clock check sign indicating number then in the upstream data of monitor terminal in this reciprocal process, terminal clock and system clock are confirmed by check code all the time.
3.2.5 for the high monitoring field of security requirement, must carry out scrambled to all monitored instructions, the coding mode selection difficulty cracks, takies simultaneously the few scrambled mode of byte number.
3.2.6 for remote signalling, monitoring feedback, monitored instruction the signal of analog quantity parameter is arranged, must advanced row D/A switch, and carry out corresponding encoding and decoding by the standard rule.
3.3 the supplementary means of bluetooth
Passive security measure based on bluetooth all is provided in 3.1 and 3.2 method simultaneously, to improve the security of keyless systems, and give the user selection with the multiple technologies embodiment, for example bluetooth recognition is in conjunction with 3.1 caller ring RKE systems, or bluetooth recognition is in conjunction with the RKE system of 3.2USSD.And allow the user have the right in " security " and " convenience ", to make a choice.
Four, the implementation method of passive no key PKE of system (Passive Remote Keyless Entry) or title PEG (passive entry go) system
According to provided by the invention: " two, guarantee method and step that bluetooth safety connects ", can implement PKE (PEG) keyless systems very easily:
PKE or PEG user in use need to use the mobile phone of band Bluetooth function, or carry bluetooth transceiver therein separately, and Bluetooth function are set to " can find ".Consider for the economize on electricity of security and mobile phone terminal, do not use " startup " and " initiatively " function as far as possible.Connect when safe when enabling, after bluetooth cellular phone and system host were finished preliminary " joints " and exchanged, no matter when paired bluetooth equipment wanted the swap data can be interrelated.After each connection is set up, also be bluetooth cellular phone " appearance " or " disappearance " that in a single day system host finds the user, then carry out corresponding switch motion.
After topworks in system had carried out relevant action, for giving affirmation of user, system must give cue of user.Cue comprises: on-the-spot prompting and long-range prompting.
4.1 on-the-spot prompting
On-the-spot prompting is divided into sound equipment prompting and sight line prompting:
The method of sound equipment prompting is: after the execution action was finished, keyless systems provided the sound equipment prompting, for example adopts correct unlatching of buzzer Door lock with pointing or locking; The also mode of available voice is established required voice recording in keyless systems, after carrying out action and finishing, and voice suggestion: " your car door is locked, please be relieved ", perhaps " your No. 1 warehouse rolling screen door is not correctly put down, and please check " or the like.
The method of sight line prompting is: after the execution action was finished, the pilot lamp of keyless systems glimmered according to predetermined mode.For example in automobile gate inhibition PKE keyless systems, after central controlled lock is carried out switch motion, indicator just flicker down so that the user really with.
4.2 long-range prompting
Long-range prompting promptly is to give the user with feedback information by wireless or network mode, in the keyless systems that method provided by the invention is implemented, can provide SMS confirmation, called clawback to confirm, and the active of foregoing caller ring-back tone is confirmed; The information feedback of multiple network mode also can be provided.For example: the fixation phone line clawback, to the clawback of user mobile phone or send SMS Tip, the compunication that connects based on serial ports, based on the information interaction of the C/S or the B/S of internet.
Description of drawings
Fig. 1 is the bluetooth protocol repertory architectural schematic
Fig. 2 is a USSD system architecture synoptic diagram
Fig. 3 is the monitor terminal structural representation
Fig. 4 is an interactive communication time slot oscillogram
Fig. 5 is a USSD mode operational flowchart
Fig. 1 is the bluetooth protocol repertory architectural schematic.
Fig. 2 is a USSD system architecture synoptic diagram.
Among Fig. 2: 1.HLR (Home Location Register), 2.USSD server, 3. data management terminal, 4. monitoring server, 5.SS7link, 6.100Base-T Ethernet
Shown in Figure 2, USSD (Unstructured Supplementary Service Data) is a unstructured supplementary data traffic, be a kind of novel interactive data service based on the GSM network, it is the new business of releasing on the short-message system technical foundation of GSM.The USSD business mainly comprises supplementary service (as call barring, calling transfer) and non-structure supplementary service (as security exchange, information inquiry, mobile banking service) two classes.
USSD be one in the particular network application portable terminal (MS) and network entity between application protocol between (MSC/VLR and HLR).Wherein, the USSD server has two network interfaces to correspond respectively to HLR (Home Location Register) and LAN (Local Area Network): on the one hand, it links to each other with the HLR of gsm system by the MAP part of SS7link (Signaling System Number 7); On the other hand, it is connected with monitoring server with TCP/IP by 100Base-T.
Monitoring server then provides various application interfaces, links together with LBS platform, GIS server or the like.Gsm system and USSD all play a part transparent channel, and the processing of USSD business is mainly finished on monitoring server, then result are passed to mobile phone (wireless communication terminal).
The data management terminal then provides an easy-to-use system management maintenance interface based on figure to wireless communication network operators, has a series of functions such as application management, user's maintenance, User Activity tracking, fault alarm.
The USSD system adopts this structure, and is less to original system architecture influence, kept the stability of original system; Can also release multiple information increment function service neatly at the concrete condition of local locating and monitoring system, provide all kinds of relevant data services for the cordless communication network user easily.
Fig. 3 is the monitor terminal structural representation.
Among Fig. 3: 15. mobile modules (must support USSD), 16.CPU processor, 17. channel trigger, 18. standard memories, 19. normal data input/output port, 20. transmitting-receiving control port, 21. synchronous clock, 22. timers, 23. power circuits, 24. the standard traffic port constitutes, 25. computer bus.
Channel trigger (17) is formed by hanging up with dial-up circuit, ring control port, note reception and trigger circuit.In vehicle monitoring embodiment, only selected the ring triggering mode for use, promptly channel trigger (17) includes only and hangs up and dial-up circuit, ring control port.
Fig. 4 is an interactive communication time slot oscillogram.
Among Fig. 4: 1. the time that sends uplink information;
2. receive that from system's (monitor supervision platform side) terminal message is to the time T s (second) of transmission information to terminal;
3. send the time of downlink information;
4. receive that from terminal system message is to the time T t (second) of transmission information to system's (monitor supervision platform side).
Among the figure in the oscillogram upper edge be the duration of monitor supervision platform side, the lower edge is the duration of monitored object side.In ascending time slot, the time that sends uplink information can conservatively be thought the time T u (second) that slightly equals up transmission Du; In descending time slot, the time that sends downlink information can conservatively be thought the time T d (second) that slightly equals descending transmission Dd.
Fig. 5 is a USSD monitoring schematic flow sheet.
Among Fig. 5: utilize USSD to the prerequisite that vehicle does not have the key monitoring to be: user's mobile phone terminal must be supported the USSD function, and most on the market at present mobile phones are all supported the USSD function.
Claims (10)
1. the implementation method of a Keyless door access control system, comprise that remote control do not have key gate inhibition RKE (Remote Keyless Entry) and passive keyless door guard system PKE (Passive Remote Keyless Entry) or claim PEG (passive entry go), it is characterized in that: the mobile phone by the band Bluetooth function carries out keyless systems user's identification, when enabling the master, when being dynamically connected, bluetooth equipment must be finished a preliminary joint exchange, produce paired connection identification and key, after the joint exchange, no matter when paired bluetooth equipment wants the swap data can be interrelated, utilizes the foundation of this incidence relation as executable operations such as keyless systems switch doors.
2. the auxiliary implementation method of a method of implementing claim 1, can cooperate the safety practice of bluetooth itself to implement together, also can independently implement, it is characterized in that: do not have key gate inhibition RKE (Remote Keyless Entry) and passive keyless door guard system PKE (Passive Remote Keyless Entry) or claim to increase in PEG (the passive entry go) system host mobile module (can be GSM, CDMA, PHS etc.) in remote control, by on the main frame or the keyboard that is connected with main frame carry out the setting of authorization number and master control number.Communication modes such as the note that system user sends by the master control number, USSD, GPRS are changed, are provided with and authorize calling number and master control number.During first the use, also can be defaulted as the master control number of the first use of system by a calling number trusty, secret, the user sets required master control number by this number, sets the first use master control number of automatic covering system acquiescence after finishing.
3. according to the concrete deep method of bluetooth measure of safety in claim 1, the 2 described Keyless door access control systems, it is characterized in that: the user sends to system host by authorizing phone number in the mode of note (SMS) with the PIN coding, for guaranteeing security needs, the PIN coding defines with a short message at least, and a standard short message can provide 140 byte lengths; After main frame is received user's note, at first the calling number that sends note is carried out authentication, read dialing number information in the mobile module by the AT instruction, the default authorization number list of contrast carries out authentication then; If calling number by authentication, is the PIN coding just main frame picks up the short message content of this number transmission, and require the identical PIN coding of user mobile phone input, finish to engage exchanging; Finish and engage after the exchange, the short message content of main frame delete authority calling number transmission immediately, prevent plain code from cracking and influence the safety of system, simultaneously, wait for that next bar mandate calling number sends the PIN coding of up-to-date note to reset up-to-date, finish new joint exchange, and frequent replacing PIN coding is to improve the security of system.
4. according to the concrete deep method of bluetooth measure of safety in claim 1, the 2 described Keyless door access control systems, it is characterized in that: replace manually finishing automatically the setting and the change of authorization number, master control number with embedded software, and change PIN automatically as required and encode, and can adopt the algorithm of multiple coded system and identifying code to finish setting and modification, and system host (main equipment) and user mobile phone (slave unit) must be kept synchronously PIN code in link layer, data Layer and application layer.
5. one kind based on claim 1, and introduces new technical method, thereby implements the method that remote control does not have key gate inhibition RKE (Remote KeylessEntry) system, it is characterized in that: implement or trigger the operation of Keyless door access control system by the caller ring.
6. the signaling rule based on claim 5 is divided into simple rule, complex rule.It is characterized in that: only need the monitoring of gate inhibition's switch motion to be suitable for simple rule, the signaling rule is very simple, can whether be consistent with the foundation (called terminal ringing) of communication request link or opposite, and note the number of times of dialing by monitoring side and monitoring side, carry out switching manipulation by the parity of dialing number of times; The situation that the user must assign complicated monitor command is suitable for complex rule, at first need to select a tame mobile communication carrier (as China Mobile, CHINAUNICOM, China Telecom etc.), and according to its network condition and switch characteristic, obtain setting up caller link () shortest time Tmin and maximum duration Tmax also promptly: carry out making call to cried the generation ring by terminal from caller, if the communication terminal of monitored object side is t from producing ring to the time span of hanging up this time communication linkage (call request), the communication terminal of establishing the monitored object side again is f to the sample frequency of ringdown, then must satisfy relation: (Tmax-Tmin) f<=1; F<=1/t after the condition more than satisfying, encodes for the mode that user's monitor command just can machine code, and coding rule is applicable to all decoding method systems of present main flow.Simultaneously, no key system main frame fibrous root carries out decode operation according to identical decoding method system, and carries out keyless systems user's monitor command.
7. one kind based on claim 5, under the state that operator does not charge, can guarantee that also the user obtains the method for voice service, it is characterized in that: by the method for specific ring-back tone is set in the network of relation side of mobile communications network, to allow the user obtain the voice service of hommization, simultaneously significantly reduce the use cost of mobile communications network, and can use multiple Ring Back Tone Technology, comprised multimedia color ring back tone, IP CRBT etc.
8. method based on the control ring-back tone of claim 7 is characterized in that: after monitoring side implemented the various operations of monitoring to monitored object, normal conditions monitoring side need obtain the feedback of monitored object.Before the caller ring-back is set, must determine the quantity of state of monitored object side feedback earlier.For example: if need only be " opening " or " pass " to monitoring side's feedback states, then quantity of state be 2; If must feedback " just ", " bearing ", " zero ", then quantity of state be 3, and by that analogy, and to establish quantity of state be n; If the communication terminal of monitored object side is t from producing ring to the time span of hanging up this time communication linkage (call request), and the monitored object side must to feed back to the quantity of state of monitoring side be n, t is divided into t1, t2, t3......tn; At first, the maximum length of setting this mobile communications network caller ring-back tone is T, must satisfy t<=T, secondly, if the monitored object side must allow monitoring side learn quantity of state 1, the then t1 time period active on-hook that the communication terminal of monitored object side must be in t; In like manner, if the monitored object side must allow monitoring side learn quantity of state n, then initiatively on-hook of the tn time period that the communication terminal of monitored object side must be in t; To cutting apart of t day part, can take 3 master slave modes: the first, all point-score, i.e. t1=t2=......=tn; The second, voice precedence method, promptly when the caller ring-back tone is set, the suggestion voice length of different conditions is not quite similar, for example " shut down " and the voice length of " your second set up defences the phenomenon that the zone has temperature anomaly to raise " is different, for the user hears complete voice, just n condition prompting time must be set according to voice, if the backchannel duration of a sound of n state, the tn of then cutting apart is long; Three, monitored object state time delay precedence method, the quantity of state (all or part of) that the monitoring side must be fed back has time delay under many circumstances, sometimes the caller ring-back tone need be waited for the generation and the execution of this quantity of state, at this moment must be foundation just, be provided with and cut apart the caller ring-back tone with the time delay of monitored object side.
9. one kind based on claim 1, and introduce new technical method, thereby implement the method that remote control does not have key gate inhibition RKE (Remote KeylessEntry) system, it is characterized in that: based on the RKE method of cordless communication network, there is being radio communication operator to provide under the prerequisite of USSD (Unstructured Supplementary Service Data unstructured supplementary data traffic) network service support, the user need dial a specific USSD Number for access, as the condition of control keyless systems, and can the USSD mode obtain condition prompting or the operational feedback that keyless systems provides.
One kind based on claim 9 comprehensively, utilize the method for USSD passage efficiently, it is characterized in that: at first define Several Parameters: the maximum fault information Du (byte) of the each up transmission of USSD, the maximum fault information Dd (byte) of the each descending transmission of USSD, terminal is dialled the USSD Number for access and is provided the time T b (second) that responds between the foundation communication to system, terminal produces the numeric code rate Fu (byte per second) of upstream data, the time-out time To of USSD system, system produces the numeric code rate Fd (byte per second) of downlink data, the actual bandwidth Bu (byte per second) that USSD is up, the actual bandwidth Bd (byte per second) that USSD is descending; In ascending time slot, the time T u (second) of up transmission Du receives that from terminal system message is to the time T t (second) of transmission information to system's (monitor supervision platform side); In descending time slot, the time T d (second) of descending transmission Dd receives that from system's (monitor supervision platform side) terminal message is to the time T s (second) of transmission information to terminal; USSD for singlehanded machine module connects: Bu=Du/ (Tu+Td); Bd=Dd/ (Tu+Td); For a mutual cycle, for making the load condition equilibrium of platform side and end side, according to the needs that network system is optimized, the system that is positioned at the upper edge sends stand-by period Ts and must set up corresponding relation with the terminal transmission stand-by period Tt that is positioned at the lower edge.An optimized proportion coefficients R is set, therefore is connected with following relation: R=Ts/Tt, establish the Tt=Δ, the Ts=R Δ is promptly arranged for a USSD.
USSD for singlehanded machine module connects, and guarantee that normal communication must meet the following conditions:
{(R+1)·Δ+Tu+Td}<Min(Du/Fu,Dd/Fd)<To
That is: Δ<{ (Min (Du/Fu, Dd/Fd)-Tu-Td)/(R+1) }<{ (To-Tu-Td)/(R+1) }
{ (To-Tu-Td)/(R+1) } is the normality item, { (Min (Du/Fu, Dd/Fd)-Tu-Td) Fu, Fd may be constants/(R+1) }, it also may be variable, in case { (Min (Du/Fu, Dd/Fd)-Tu-Td)/(R+1) } become to equaling 0, under the prerequisite that keeps communications status, Δ also must become to equaling 0.At this moment, system must trigger monitor terminal immediately and enable new mobile module, after triggering it simultaneously and dialing the time of TB at least of USSD Number for access at previous mobile module, dial the USSD Number for access and set up new USSD and communicate to connect, platform side must increase simultaneously provides one to insert thread and be this terminal use.
Connect for the USSD of two mobile modules after increasing is parallel simultaneously, the rule that proper communication must be satisfied is:
Δ<{(Min(2Du/Fu,2Dd/Fd)-Tu-Td)/(R+1)}<{(To-Tu-Td)/(R+1)}
·
·
·
N parallel simultaneously connection of USSD, rule is:
Δ<{(Min(n·Du/Fu,n·Dd/Fd)-Tu-Td)/(R+1)}<{(To-Tu-Td)/(R+1)};
Bu=n·Du/(Tu+Td);Bd=n·Dd/(Tu+Td)
After having set up new communicating to connect, the data that buffer storage produces may produce data and overflow and be made as DO.Connect by newly-established USSD, DO is passed down in the lump, and data merge when finishing in the opposite end.
Realize that above method must have synchronous clock accurately, insert specified byte in the downlink data of the inventive method system after the terminal phone module is dialed the USSD Number for access and be used for transmission, initialization system clock, the trigger pip that while makes zero as the terminal timer, insert the clock check sign indicating number then in the upstream data of monitor terminal in this reciprocal process, terminal clock and system clock are confirmed by check code all the time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810069956A CN101625773A (en) | 2008-07-10 | 2008-07-10 | Method for implementing remote-control and passive keyless systems based on Bluetooth technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810069956A CN101625773A (en) | 2008-07-10 | 2008-07-10 | Method for implementing remote-control and passive keyless systems based on Bluetooth technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101625773A true CN101625773A (en) | 2010-01-13 |
Family
ID=41521613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810069956A Pending CN101625773A (en) | 2008-07-10 | 2008-07-10 | Method for implementing remote-control and passive keyless systems based on Bluetooth technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101625773A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104331672A (en) * | 2014-11-24 | 2015-02-04 | 小米科技有限责任公司 | Method and device for performing confidential treatment on pictures upon bracelet |
CN104796430A (en) * | 2015-05-05 | 2015-07-22 | 深圳市聚电电子有限公司 | Composite PKE (passive keyless entry) automobile encryption and antitheft system |
CN105960660A (en) * | 2013-09-09 | 2016-09-21 | 法雷奥舒适驾驶助手公司 | Authentication of a user provided with a mobile device by a vehicle |
CN106415674A (en) * | 2014-05-22 | 2017-02-15 | 胡夫·许尔斯贝克和福斯特有限及两合公司 | System and method for controlling access |
CN106548525A (en) * | 2015-09-16 | 2017-03-29 | 英基科技有限公司 | Card punching system |
CN106780879A (en) * | 2016-12-12 | 2017-05-31 | 大陆汽车电子(长春)有限公司 | Data handling system based on keyless entry starter |
CN110728779A (en) * | 2019-09-23 | 2020-01-24 | 中国地质大学(北京) | Wireless intelligent electronic doorplate and control system and method thereof |
CN110738776A (en) * | 2019-10-22 | 2020-01-31 | 飞天诚信科技股份有限公司 | method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof |
CN111313984A (en) * | 2020-02-19 | 2020-06-19 | 北京瑞森新谱科技股份有限公司 | Testing device and method for various audio codes of Bluetooth headset |
CN111667607A (en) * | 2019-03-07 | 2020-09-15 | 物流及供应链多元技术研发中心有限公司 | Locking device for logistics management, control system for locking device and method for controlling locking device |
CN111989718A (en) * | 2018-03-27 | 2020-11-24 | 电装国际美国公司 | Passive entry and passive start systems and methods using temporary keys |
CN112233281A (en) * | 2020-09-29 | 2021-01-15 | 上汽通用五菱汽车股份有限公司 | Bluetooth key vehicle control method and system |
WO2021082915A1 (en) * | 2019-10-30 | 2021-05-06 | 深圳市道通科技股份有限公司 | Automobile key programmer and automobile diagnostic instrument |
-
2008
- 2008-07-10 CN CN200810069956A patent/CN101625773A/en active Pending
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105960660B (en) * | 2013-09-09 | 2019-12-13 | 法雷奥舒适驾驶助手公司 | Authentication of a user provided with a mobile device by a vehicle |
CN105960660A (en) * | 2013-09-09 | 2016-09-21 | 法雷奥舒适驾驶助手公司 | Authentication of a user provided with a mobile device by a vehicle |
US10434988B2 (en) | 2014-05-20 | 2019-10-08 | Huf Huelsbeck & Fuerst Gmbh & Co. Kg | System and method for controlling access |
CN106415674A (en) * | 2014-05-22 | 2017-02-15 | 胡夫·许尔斯贝克和福斯特有限及两合公司 | System and method for controlling access |
US10589718B2 (en) | 2014-05-22 | 2020-03-17 | Huf Huelsbeck & Fuerst Gmbh & Co. Kg | System and method for controlling access |
CN106415674B (en) * | 2014-05-22 | 2019-03-08 | 胡夫·许尔斯贝克和福斯特有限及两合公司 | System and method for access control |
CN104331672A (en) * | 2014-11-24 | 2015-02-04 | 小米科技有限责任公司 | Method and device for performing confidential treatment on pictures upon bracelet |
CN104796430A (en) * | 2015-05-05 | 2015-07-22 | 深圳市聚电电子有限公司 | Composite PKE (passive keyless entry) automobile encryption and antitheft system |
CN106548525A (en) * | 2015-09-16 | 2017-03-29 | 英基科技有限公司 | Card punching system |
CN106780879A (en) * | 2016-12-12 | 2017-05-31 | 大陆汽车电子(长春)有限公司 | Data handling system based on keyless entry starter |
CN111989718A (en) * | 2018-03-27 | 2020-11-24 | 电装国际美国公司 | Passive entry and passive start systems and methods using temporary keys |
CN111667607A (en) * | 2019-03-07 | 2020-09-15 | 物流及供应链多元技术研发中心有限公司 | Locking device for logistics management, control system for locking device and method for controlling locking device |
CN110728779A (en) * | 2019-09-23 | 2020-01-24 | 中国地质大学(北京) | Wireless intelligent electronic doorplate and control system and method thereof |
CN110738776A (en) * | 2019-10-22 | 2020-01-31 | 飞天诚信科技股份有限公司 | method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof |
WO2021082915A1 (en) * | 2019-10-30 | 2021-05-06 | 深圳市道通科技股份有限公司 | Automobile key programmer and automobile diagnostic instrument |
US11935344B2 (en) | 2019-10-30 | 2024-03-19 | Autel Intelligent Technology Corp., Ltd. | Automobile key programmer and automobile diagnostic instrument |
CN111313984A (en) * | 2020-02-19 | 2020-06-19 | 北京瑞森新谱科技股份有限公司 | Testing device and method for various audio codes of Bluetooth headset |
CN112233281A (en) * | 2020-09-29 | 2021-01-15 | 上汽通用五菱汽车股份有限公司 | Bluetooth key vehicle control method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101625773A (en) | Method for implementing remote-control and passive keyless systems based on Bluetooth technology | |
US7809361B2 (en) | Address privacy in short-range wireless communication | |
AU748426B2 (en) | System, method and apparatus for secure transmission of confidential information | |
CN101331721A (en) | Distributed bluetooth system | |
JP5042629B2 (en) | Integrated cellular / PCS-POTS communication system | |
CN100582426C (en) | Mobile phone electronic key for automobile and unlocking method thereof, electronic key for automobile | |
CN112399394A (en) | Intelligent electric energy meter system based on Bluetooth communication and communication method thereof | |
US20040192206A1 (en) | Method and device for identifying and pairing bluetooth devices | |
KR101835863B1 (en) | Method and system for controlling access to wireless apparatuses | |
CN110249608B (en) | Device pairing | |
CN101729340B (en) | Wireless network access device and mating method thereof | |
US8965337B2 (en) | Method and system for discovering communication devices | |
CN105009485A (en) | Methods and apparatus for using visible light communications for controlling access to an area | |
CN104050742A (en) | Intelligent door and control method and system thereof | |
CN101942937A (en) | Intelligent door lock, wireless communication terminal and intelligent door lock system | |
WO2005036794A2 (en) | Call management system and method for servicing multiple wireless communication devices | |
CN112399393A (en) | Intelligent electric energy meter device and communication method thereof | |
CN104955241A (en) | Method and device for pairing lighting equipment and switches without wires in IoT (Internet of Things) | |
CN109887127A (en) | A kind of intelligent door lock and its control method and system | |
CN106576238A (en) | Method and apparatus for establishment of private communication between devices | |
RU2004133028A (en) | METHOD AND DEVICE FOR ACCESS MANAGEMENT | |
US20070287421A1 (en) | Method and system for providing continuity of service with an existing communication network | |
US20130157623A1 (en) | Method and system for delivering messages to one or more handheld communication devices | |
US20070286133A1 (en) | Handheld communication device for communication of information | |
KR20070107386A (en) | Data communication system and data communication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
DD01 | Delivery of document by public notice |
Addressee: Liu Xun Document name: Notification of Patent Invention Entering into Substantive Examination Stage Addressee: Liu Xun Document name: Notification of Decision on Request for Restoration of Right |
|
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20100113 |