CN102404068A - Secondary encryption/decryption method - Google Patents
Secondary encryption/decryption method Download PDFInfo
- Publication number
- CN102404068A CN102404068A CN2010102769547A CN201010276954A CN102404068A CN 102404068 A CN102404068 A CN 102404068A CN 2010102769547 A CN2010102769547 A CN 2010102769547A CN 201010276954 A CN201010276954 A CN 201010276954A CN 102404068 A CN102404068 A CN 102404068A
- Authority
- CN
- China
- Prior art keywords
- signal
- decoding
- encryption
- deciphering
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention discloses a secondary encryption/decryption method, which is respectively processed twice encryption encoding to correspondingly form a first encryption signal and a second encryption signal. The first encryption signal is received and processed by first decryption decoding to form a first decryption signal. When the first decryption signal is different from the first encryption signal, the first encryption signal is received and processed by the first decryption decoding again. If the first decryption signal is identical with the first encryption signal, steps of receiving the second encryption signal and processing second decryption decoding is processed to form a second decryption signal. When the second decryption signal is different from the second encryption signal, the first decryption decoding is processed again. If the second decryption signal is identical with the second encryption signal, decryption action is finished. By means of the check action of the twice encryption decryption, when load is driven in remote control mode, maloperation caused by single decoding is avoided, and safety is improved.
Description
Technical field
The present invention relates to the encryption/decryption technique of radio signals, relate in particular to the method for a kind of superencipher/deciphering.
Background technology
Press; In the daily life, regular meeting uses wireless remote controller and is driven thing start, for example Electrically operated gate to drive one; Usually can produce a coding signal with a remote control and be wirelessly transmitted to Electrically operated gate; Carry out the comparison of a signal through carrying out a decoding signal in the Electrically operated gate, when the coding signal was identical with the decoding signal, this Electrically operated gate can receive the driving of this remote control and produce an effect of opening the door.
But, produce coding signal and when making this Electrically operated gate produce decoding signal, its coding signal and decoding signal do not have the mechanism of another check by this wireless remote controller; So have the Electrically operated gate of same group of decoding signal, controlled by same group of wireless remote controller, make this Electrically operated gate produce the action of decoding; And the decoding signal that makes same group of Electrically operated gate produces when deciphering; Therefore wireless remote controller can be opened different Electrically operated gate, hurts the people so possibly cause Electrically operated gate to open by mistake to open or close, in addition; Also there are many personages also can carry out the action of coding and decoding with wireless remote controller; And this Electrically operated gate is opened, and then carry out the deathwatch and wait behavior, the space that the action reality of existing coding and decoding remains to be improved.
Summary of the invention
In view of this, main purpose of the present invention is to provide the method for a kind of superencipher/deciphering, sees through the action of checking of twice encrypting and decrypting, when making remote control drive load, can not produce misoperation, to reach improving safety.
For achieving the above object, technical scheme of the present invention is achieved in that
The method of a kind of superencipher/deciphering, this method key step comprises:
The scrambled step respectively through the superencipher coding, forms first with correspondence and encrypts the signal and the second encryption signal;
The first deciphering decoding step; Receive this first encryption signal and do deciphering decoding for the first time; Forming the first decoding signal, and first encrypt signal, then receive this first encryption signal again and carry out the unscrambling decoding first time for not simultaneously when this first decoding signal and this; Otherwise, if, then carry out following step when this first decoding signal and this first encryption signal when being identical; And,
The second deciphering decoding step: receive this second encryption signal and do deciphering decoding for the second time; To form one second decoding signal; And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step again, otherwise; If, then finish decryption acts when this second decoding signal and this second encryption signal when being identical.
Wherein, this scrambled step begins to carry out scrambled after triggered by a trigger signals.
Wherein, receiving this first encrypts signal and this second to encrypt the frequency of signal inequality.
Wherein, after this second deciphering decoding step, can produce one and drive signal.
The method of superencipher provided by the present invention/deciphering has the following advantages:
Adopt the method for superencipher of the present invention/deciphering; See through scrambled step, the first deciphering decoding step and the second unscrambling decoding step, can utilize the action of checking of twice encrypting and decrypting, when making remote control drive load; Do not produce misoperation, thereby reach the purpose of improving safety.
Description of drawings
Fig. 1 is the process block diagram of the method for embodiment of the invention superencipher/deciphering;
Fig. 2 is the flow chart one of the method for embodiment of the invention superencipher/deciphering;
Fig. 3 is the flowchart 2 of the method for embodiment of the invention superencipher/deciphering.
Embodiment
Below in conjunction with accompanying drawing and embodiments of the invention method of the present invention is done further detailed explanation.
Fig. 1, Fig. 2 and Fig. 3 are respectively process block diagram of the present invention and implementing procedure figure, and as shown in Figure 1, it includes:
Scrambled step S1: after triggered by a trigger signals SA1; Begin to carry out the superencipher coding; And correspondingly behind for the first time the scrambled SA2 and the second scrambled SA3 respectively form first and encrypt signal and second and encrypt signal (figure does not show), this trigger signals SA1 system sees through the human body sensing and detects in preferred embodiment of the present invention.
The first deciphering decoding step S2: receive this first encryption signal and be the SB1 of deciphering decoding for the first time; To form the first decoding signal (figure does not show); And first encrypt signal for not simultaneously when this first decoding signal and this, then receive this first encryption signal again and carry out this first time of unscrambling decoding SB1, otherwise; If, then carry out following step when this first decoding signal and this first encryption signal when being identical:
The second deciphering decoding step S3: receive this second encryption signal and be the SB2 of deciphering decoding for the second time; To form the second decoding signal (figure does not show); And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step SB1 again, otherwise; If when this second decoding signal and this second encryption signal when being identical; Then finish decryption acts, first encrypt signal and this second to encrypt the frequency of signal inequality, and behind this second deciphering decoding step S3, can produce one and drive signal (figure does not show) and in preferred embodiment of the present invention, receive this.
Like Fig. 2, shown in Figure 3, when embodiment of the present invention, see through the human body sensing earlier and detect SA1, and if do not have when sensing; Then carry out the human body sensing again and detect SA1, otherwise, if when sensing; Then move through twice scrambled, and form this first encryption signal and the second encryption signal respectively, this first encryption signal, second is encrypted signal and is transmitted respectively; And after this second encryption signal is sent out, can carry out the human body sensing again and detect SA1, in addition; This first is encrypted signal and can be received earlier, and through the SB1 of deciphering decoding for the first time forming this first decoding signal, and when this first decoding signal and this first encryption signal for not simultaneously; Then for wrong and receive this again and first encrypt signal and carry out unscrambling decoding SB1 first time, otherwise, if when this first when to decipher signal be identical with this first encryption signal; Then for correct and receive this and second encrypt signal and carry out unscrambling decoding SB2 second time, forming this second decoding signal, and when this second decoding signal and this second encryption signal for not simultaneously; Then for wrong and receive this again and first encrypt signal and carry out unscrambling decoding SB1 first time, otherwise, if when this second when to decipher signal be identical with this second encryption signal; Be correctly and also can trigger the load start, simultaneously, more trigger speech play.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.
Claims (4)
1. the method for superencipher/deciphering is characterized in that, this method key step comprises:
The scrambled step respectively through the superencipher coding, forms first with correspondence and encrypts the signal and the second encryption signal;
The first deciphering decoding step; Receive this first encryption signal and do deciphering decoding for the first time; Forming the first decoding signal, and first encrypt signal, then receive this first encryption signal again and carry out the unscrambling decoding first time for not simultaneously when this first decoding signal and this; Otherwise, if, then carry out following step when this first decoding signal and this first encryption signal when being identical; And,
The second deciphering decoding step: receive this second encryption signal and do deciphering decoding for the second time; To form one second decoding signal; And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step again, otherwise; If, then finish decryption acts when this second decoding signal and this second encryption signal when being identical.
2. the method for superencipher according to claim 1/deciphering is characterized in that, wherein, this scrambled step begins to carry out scrambled after triggered by a trigger signals.
3. the method for superencipher according to claim 1/deciphering is characterized in that, wherein, the frequency that receives this first encryption signal and this second encryption signal is inequality.
4. the method for superencipher according to claim 1/deciphering is characterized in that, wherein, after this second deciphering decoding step, can produce one and drive signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102769547A CN102404068A (en) | 2010-09-09 | 2010-09-09 | Secondary encryption/decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102769547A CN102404068A (en) | 2010-09-09 | 2010-09-09 | Secondary encryption/decryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102404068A true CN102404068A (en) | 2012-04-04 |
Family
ID=45885902
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102769547A Pending CN102404068A (en) | 2010-09-09 | 2010-09-09 | Secondary encryption/decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102404068A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270687A (en) * | 2014-10-24 | 2015-01-07 | 厦门蓝斯通信股份有限公司 | Method and device for encrypting digital interphone |
CN109598105A (en) * | 2018-12-03 | 2019-04-09 | 深圳忆联信息系统有限公司 | A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050015589A1 (en) * | 2003-07-17 | 2005-01-20 | Shmuel Silverman | Method for providing point-to-point encryption in a communication system |
CN1697374A (en) * | 2004-05-13 | 2005-11-16 | 华为技术有限公司 | Method for sanding and receiving cipher data, device for distributing and receiving cipher data |
CN101067358A (en) * | 2007-03-20 | 2007-11-07 | 姜君凯 | Trick lock mechanism |
-
2010
- 2010-09-09 CN CN2010102769547A patent/CN102404068A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050015589A1 (en) * | 2003-07-17 | 2005-01-20 | Shmuel Silverman | Method for providing point-to-point encryption in a communication system |
CN1697374A (en) * | 2004-05-13 | 2005-11-16 | 华为技术有限公司 | Method for sanding and receiving cipher data, device for distributing and receiving cipher data |
CN101067358A (en) * | 2007-03-20 | 2007-11-07 | 姜君凯 | Trick lock mechanism |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270687A (en) * | 2014-10-24 | 2015-01-07 | 厦门蓝斯通信股份有限公司 | Method and device for encrypting digital interphone |
CN109598105A (en) * | 2018-12-03 | 2019-04-09 | 深圳忆联信息系统有限公司 | A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104112307B (en) | Sound wave is utilized to carry out electronic lock and the method for unlocking thereof unblanked | |
CN101806173B (en) | Electronic lock system, electronic lock and unlocking method thereof | |
WO2009075589A3 (en) | Methods and apparatus relating to a security system | |
MY154075A (en) | Vehicle central lock antitheft method and system | |
CN105184929A (en) | Intelligent door lock control method and device | |
WO2004012378A3 (en) | Digital content security system and method | |
AU2002338954A1 (en) | Secure electronic voting method and the cryptographic protocols and computer programs used | |
US20130077641A1 (en) | Systems, Circuits and Methods for Time Stamp Based One-Way Communications | |
WO2008018947A3 (en) | Security system for handheld wireless devices using time-variable encryption keys | |
WO2010040629A3 (en) | Data processing system for providing authorization keys | |
UA100829C2 (en) | Systems, methods, and apparatuses for ciphering error detection and recovery | |
WO2009056463A3 (en) | Method for protection of a chip card from unauthorized use, chip card and chip card terminal | |
WO2007111713A3 (en) | Method for device authentication | |
WO2003077502A3 (en) | Method and system for accelerating the conversion process between encryption schemes | |
CN106097511A (en) | A kind of electronic lock keyless access system of random key | |
KR20130068562A (en) | Remote control system and method for vehicle using mobile phone | |
CN102404068A (en) | Secondary encryption/decryption method | |
CN105184930A (en) | Control method and device of intelligent primary and secondary locks | |
US7293698B2 (en) | Wiegand converter and method of generating a bi-directional data | |
CN102831679A (en) | Two-way transmission expansion method and system compatible with wiegand protocol | |
CN105991819A (en) | Mobile phone remote control door lock system capable of being operated in standby mode | |
CN104992489A (en) | Intelligent switch system | |
CN205140037U (en) | Bluetooth intelligent lock that touching was unblanked | |
CN106559378B (en) | Automobile door lock unlocking device, system and method and intelligent terminal | |
CN104616374A (en) | Car key remote control system radiofrequency signal interception method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120404 |