CN102404068A - Secondary encryption/decryption method - Google Patents

Secondary encryption/decryption method Download PDF

Info

Publication number
CN102404068A
CN102404068A CN2010102769547A CN201010276954A CN102404068A CN 102404068 A CN102404068 A CN 102404068A CN 2010102769547 A CN2010102769547 A CN 2010102769547A CN 201010276954 A CN201010276954 A CN 201010276954A CN 102404068 A CN102404068 A CN 102404068A
Authority
CN
China
Prior art keywords
signal
decoding
encryption
deciphering
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102769547A
Other languages
Chinese (zh)
Inventor
张志吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHANG HUAXUAN
Original Assignee
ZHANG HUAXUAN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHANG HUAXUAN filed Critical ZHANG HUAXUAN
Priority to CN2010102769547A priority Critical patent/CN102404068A/en
Publication of CN102404068A publication Critical patent/CN102404068A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a secondary encryption/decryption method, which is respectively processed twice encryption encoding to correspondingly form a first encryption signal and a second encryption signal. The first encryption signal is received and processed by first decryption decoding to form a first decryption signal. When the first decryption signal is different from the first encryption signal, the first encryption signal is received and processed by the first decryption decoding again. If the first decryption signal is identical with the first encryption signal, steps of receiving the second encryption signal and processing second decryption decoding is processed to form a second decryption signal. When the second decryption signal is different from the second encryption signal, the first decryption decoding is processed again. If the second decryption signal is identical with the second encryption signal, decryption action is finished. By means of the check action of the twice encryption decryption, when load is driven in remote control mode, maloperation caused by single decoding is avoided, and safety is improved.

Description

The method of superencipher/deciphering
Technical field
The present invention relates to the encryption/decryption technique of radio signals, relate in particular to the method for a kind of superencipher/deciphering.
Background technology
Press; In the daily life, regular meeting uses wireless remote controller and is driven thing start, for example Electrically operated gate to drive one; Usually can produce a coding signal with a remote control and be wirelessly transmitted to Electrically operated gate; Carry out the comparison of a signal through carrying out a decoding signal in the Electrically operated gate, when the coding signal was identical with the decoding signal, this Electrically operated gate can receive the driving of this remote control and produce an effect of opening the door.
But, produce coding signal and when making this Electrically operated gate produce decoding signal, its coding signal and decoding signal do not have the mechanism of another check by this wireless remote controller; So have the Electrically operated gate of same group of decoding signal, controlled by same group of wireless remote controller, make this Electrically operated gate produce the action of decoding; And the decoding signal that makes same group of Electrically operated gate produces when deciphering; Therefore wireless remote controller can be opened different Electrically operated gate, hurts the people so possibly cause Electrically operated gate to open by mistake to open or close, in addition; Also there are many personages also can carry out the action of coding and decoding with wireless remote controller; And this Electrically operated gate is opened, and then carry out the deathwatch and wait behavior, the space that the action reality of existing coding and decoding remains to be improved.
Summary of the invention
In view of this, main purpose of the present invention is to provide the method for a kind of superencipher/deciphering, sees through the action of checking of twice encrypting and decrypting, when making remote control drive load, can not produce misoperation, to reach improving safety.
For achieving the above object, technical scheme of the present invention is achieved in that
The method of a kind of superencipher/deciphering, this method key step comprises:
The scrambled step respectively through the superencipher coding, forms first with correspondence and encrypts the signal and the second encryption signal;
The first deciphering decoding step; Receive this first encryption signal and do deciphering decoding for the first time; Forming the first decoding signal, and first encrypt signal, then receive this first encryption signal again and carry out the unscrambling decoding first time for not simultaneously when this first decoding signal and this; Otherwise, if, then carry out following step when this first decoding signal and this first encryption signal when being identical; And,
The second deciphering decoding step: receive this second encryption signal and do deciphering decoding for the second time; To form one second decoding signal; And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step again, otherwise; If, then finish decryption acts when this second decoding signal and this second encryption signal when being identical.
Wherein, this scrambled step begins to carry out scrambled after triggered by a trigger signals.
Wherein, receiving this first encrypts signal and this second to encrypt the frequency of signal inequality.
Wherein, after this second deciphering decoding step, can produce one and drive signal.
The method of superencipher provided by the present invention/deciphering has the following advantages:
Adopt the method for superencipher of the present invention/deciphering; See through scrambled step, the first deciphering decoding step and the second unscrambling decoding step, can utilize the action of checking of twice encrypting and decrypting, when making remote control drive load; Do not produce misoperation, thereby reach the purpose of improving safety.
Description of drawings
Fig. 1 is the process block diagram of the method for embodiment of the invention superencipher/deciphering;
Fig. 2 is the flow chart one of the method for embodiment of the invention superencipher/deciphering;
Fig. 3 is the flowchart 2 of the method for embodiment of the invention superencipher/deciphering.
Embodiment
Below in conjunction with accompanying drawing and embodiments of the invention method of the present invention is done further detailed explanation.
Fig. 1, Fig. 2 and Fig. 3 are respectively process block diagram of the present invention and implementing procedure figure, and as shown in Figure 1, it includes:
Scrambled step S1: after triggered by a trigger signals SA1; Begin to carry out the superencipher coding; And correspondingly behind for the first time the scrambled SA2 and the second scrambled SA3 respectively form first and encrypt signal and second and encrypt signal (figure does not show), this trigger signals SA1 system sees through the human body sensing and detects in preferred embodiment of the present invention.
The first deciphering decoding step S2: receive this first encryption signal and be the SB1 of deciphering decoding for the first time; To form the first decoding signal (figure does not show); And first encrypt signal for not simultaneously when this first decoding signal and this, then receive this first encryption signal again and carry out this first time of unscrambling decoding SB1, otherwise; If, then carry out following step when this first decoding signal and this first encryption signal when being identical:
The second deciphering decoding step S3: receive this second encryption signal and be the SB2 of deciphering decoding for the second time; To form the second decoding signal (figure does not show); And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step SB1 again, otherwise; If when this second decoding signal and this second encryption signal when being identical; Then finish decryption acts, first encrypt signal and this second to encrypt the frequency of signal inequality, and behind this second deciphering decoding step S3, can produce one and drive signal (figure does not show) and in preferred embodiment of the present invention, receive this.
Like Fig. 2, shown in Figure 3, when embodiment of the present invention, see through the human body sensing earlier and detect SA1, and if do not have when sensing; Then carry out the human body sensing again and detect SA1, otherwise, if when sensing; Then move through twice scrambled, and form this first encryption signal and the second encryption signal respectively, this first encryption signal, second is encrypted signal and is transmitted respectively; And after this second encryption signal is sent out, can carry out the human body sensing again and detect SA1, in addition; This first is encrypted signal and can be received earlier, and through the SB1 of deciphering decoding for the first time forming this first decoding signal, and when this first decoding signal and this first encryption signal for not simultaneously; Then for wrong and receive this again and first encrypt signal and carry out unscrambling decoding SB1 first time, otherwise, if when this first when to decipher signal be identical with this first encryption signal; Then for correct and receive this and second encrypt signal and carry out unscrambling decoding SB2 second time, forming this second decoding signal, and when this second decoding signal and this second encryption signal for not simultaneously; Then for wrong and receive this again and first encrypt signal and carry out unscrambling decoding SB1 first time, otherwise, if when this second when to decipher signal be identical with this second encryption signal; Be correctly and also can trigger the load start, simultaneously, more trigger speech play.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.

Claims (4)

1. the method for superencipher/deciphering is characterized in that, this method key step comprises:
The scrambled step respectively through the superencipher coding, forms first with correspondence and encrypts the signal and the second encryption signal;
The first deciphering decoding step; Receive this first encryption signal and do deciphering decoding for the first time; Forming the first decoding signal, and first encrypt signal, then receive this first encryption signal again and carry out the unscrambling decoding first time for not simultaneously when this first decoding signal and this; Otherwise, if, then carry out following step when this first decoding signal and this first encryption signal when being identical; And,
The second deciphering decoding step: receive this second encryption signal and do deciphering decoding for the second time; To form one second decoding signal; And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step again, otherwise; If, then finish decryption acts when this second decoding signal and this second encryption signal when being identical.
2. the method for superencipher according to claim 1/deciphering is characterized in that, wherein, this scrambled step begins to carry out scrambled after triggered by a trigger signals.
3. the method for superencipher according to claim 1/deciphering is characterized in that, wherein, the frequency that receives this first encryption signal and this second encryption signal is inequality.
4. the method for superencipher according to claim 1/deciphering is characterized in that, wherein, after this second deciphering decoding step, can produce one and drive signal.
CN2010102769547A 2010-09-09 2010-09-09 Secondary encryption/decryption method Pending CN102404068A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102769547A CN102404068A (en) 2010-09-09 2010-09-09 Secondary encryption/decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102769547A CN102404068A (en) 2010-09-09 2010-09-09 Secondary encryption/decryption method

Publications (1)

Publication Number Publication Date
CN102404068A true CN102404068A (en) 2012-04-04

Family

ID=45885902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102769547A Pending CN102404068A (en) 2010-09-09 2010-09-09 Secondary encryption/decryption method

Country Status (1)

Country Link
CN (1) CN102404068A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270687A (en) * 2014-10-24 2015-01-07 厦门蓝斯通信股份有限公司 Method and device for encrypting digital interphone
CN109598105A (en) * 2018-12-03 2019-04-09 深圳忆联信息系统有限公司 A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050015589A1 (en) * 2003-07-17 2005-01-20 Shmuel Silverman Method for providing point-to-point encryption in a communication system
CN1697374A (en) * 2004-05-13 2005-11-16 华为技术有限公司 Method for sanding and receiving cipher data, device for distributing and receiving cipher data
CN101067358A (en) * 2007-03-20 2007-11-07 姜君凯 Trick lock mechanism

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050015589A1 (en) * 2003-07-17 2005-01-20 Shmuel Silverman Method for providing point-to-point encryption in a communication system
CN1697374A (en) * 2004-05-13 2005-11-16 华为技术有限公司 Method for sanding and receiving cipher data, device for distributing and receiving cipher data
CN101067358A (en) * 2007-03-20 2007-11-07 姜君凯 Trick lock mechanism

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270687A (en) * 2014-10-24 2015-01-07 厦门蓝斯通信股份有限公司 Method and device for encrypting digital interphone
CN109598105A (en) * 2018-12-03 2019-04-09 深圳忆联信息系统有限公司 A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware

Similar Documents

Publication Publication Date Title
CN104112307B (en) Sound wave is utilized to carry out electronic lock and the method for unlocking thereof unblanked
CN101806173B (en) Electronic lock system, electronic lock and unlocking method thereof
WO2009075589A3 (en) Methods and apparatus relating to a security system
MY154075A (en) Vehicle central lock antitheft method and system
CN105184929A (en) Intelligent door lock control method and device
WO2004012378A3 (en) Digital content security system and method
AU2002338954A1 (en) Secure electronic voting method and the cryptographic protocols and computer programs used
US20130077641A1 (en) Systems, Circuits and Methods for Time Stamp Based One-Way Communications
WO2008018947A3 (en) Security system for handheld wireless devices using time-variable encryption keys
WO2010040629A3 (en) Data processing system for providing authorization keys
UA100829C2 (en) Systems, methods, and apparatuses for ciphering error detection and recovery
WO2009056463A3 (en) Method for protection of a chip card from unauthorized use, chip card and chip card terminal
WO2007111713A3 (en) Method for device authentication
WO2003077502A3 (en) Method and system for accelerating the conversion process between encryption schemes
CN106097511A (en) A kind of electronic lock keyless access system of random key
KR20130068562A (en) Remote control system and method for vehicle using mobile phone
CN102404068A (en) Secondary encryption/decryption method
CN105184930A (en) Control method and device of intelligent primary and secondary locks
US7293698B2 (en) Wiegand converter and method of generating a bi-directional data
CN102831679A (en) Two-way transmission expansion method and system compatible with wiegand protocol
CN105991819A (en) Mobile phone remote control door lock system capable of being operated in standby mode
CN104992489A (en) Intelligent switch system
CN205140037U (en) Bluetooth intelligent lock that touching was unblanked
CN106559378B (en) Automobile door lock unlocking device, system and method and intelligent terminal
CN104616374A (en) Car key remote control system radiofrequency signal interception method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120404