CN104125562A - Wireless communication encryption method capable of changing passwords - Google Patents

Wireless communication encryption method capable of changing passwords Download PDF

Info

Publication number
CN104125562A
CN104125562A CN201410325697.XA CN201410325697A CN104125562A CN 104125562 A CN104125562 A CN 104125562A CN 201410325697 A CN201410325697 A CN 201410325697A CN 104125562 A CN104125562 A CN 104125562A
Authority
CN
China
Prior art keywords
sequence number
packet
encryption
synchronous pointer
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410325697.XA
Other languages
Chinese (zh)
Inventor
李正文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410325697.XA priority Critical patent/CN104125562A/en
Publication of CN104125562A publication Critical patent/CN104125562A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the communication technical field, in particular to a wireless communication encryption method capable of changing passwords. The wireless communication encryption method capable of changing the passwords includes: attaching a synchronization pointer to a data package at a transmitting terminal firstly, then adding a random encryption serial number on the data package, and adding a verification code on the data package; verifying the received data package verification code through a signal processing unit at a receiving terminal firstly, judging the bit number of the random encryption serial number, then comparing the synchronization pointer in the data package with a synchronization pointer in the receiving terminal, and finally extracting a data package before encryption from the data package, returning the data package before the encryption, and completing wireless communication encryption. The wireless communication encryption method capable of changing the passwords has the advantages of solving the puzzle that wireless communication security is poor, and thereby eliminating the dangerous situations that wireless is illegally intercepted or a wireless control instruction is cracked and the like, and furthermore greatly improving integral reliability of both sides of wireless communication.

Description

A kind of wireless telecommunications encryption method of variable cipher
Technical field
The present invention relates to communication technique field, be specifically related to a kind of wireless telecommunications encryption method of variable cipher.
Background technology
At present, domestic and international application radio communication method very widely almost all adopts simple coding method, as wireless alarm, and many automobiles, motorcycle, battery vehicle remote controller etc.The almost whole simply coding IC that adopt that adopt.As everyone knows, it is also the product being customized by other companies that only a few adopts so-called hopping code, exists in use and is permitted many-sided restriction, can not well bring into play its real wireless data communication encryption effect.While adopting the work of wireless telecommunication system of this simple coding method wireless communication signal very easily by simple interception with copied out, the system that has been replicated radio coding just can arbitraryly be carried out various operations, so be extremely dangerous to the user of vast this type of communication modes of use, fail safe can not get any effective guarantee.For above shortcoming, be badly in need of a kind of new radio secure encryption system of research and development for this reason.
Summary of the invention
Object of the present invention is in order to solve above-mentioned existing technical disadvantages, and the wireless telecommunications encryption method of a kind of good confidentiality, variable cipher that reliability is strong is provided.
For achieving the above object, the invention provides a kind of wireless telecommunications encryption method of variable cipher, comprise transmitting terminal and receiving terminal, described transmitting terminal comprises the following steps:
1 the synchronous pointer of all can adding up during each transmitting of packet affix that steps A, reflector will be launched forms a new packet, described synchronous pointer all can be preserved current synchronous pointer value at every turn after launch, and synchronous pointer is read out afterwards while launching at every turn and adds up 1;
Step B, in reflector transmitting new data packets, random key generator in reflector produces the accidental enciphering sequence number of an any digit, and read in a Data Encryption Scheme according to this accidental enciphering sequence number, utilize this Data Encryption Scheme to be encrypted code to having added the new data packets of synchronous pointer, allowed the new data packets of encryption add the accidental enciphering sequence number of a particular number of bits of this generation, to the additional data check digit of new data packets after having added accidental enciphering sequence number, form a missile new data packets again, this missile new data packets is transmitted to receiving terminal by wireless communication mode,
Data reception module in described receiving terminal is received in the packet that step B launches and sends signal processing unit to, and signal processing unit will carry out following treatment step:
Step C: first judge that whether the data check position of the packet receiving is by verification,
If verification is not passed through, perform step C1: empty this packet and return and continue to wait for and again to receive data;
If verification is passed through, perform step D: data check position by verification after, the accidental enciphering sequence number of signal processing unit reading data bag, and judge that whether accidental enciphering sequence number figure place correct,
If accidental enciphering sequence number figure place is incorrect, forgo data bag return to wait and again receive data;
If accidental enciphering sequence number figure place is correct, perform step E: according to accidental enciphering sequence number, packet is decrypted;
Step F: extract synchronous pointer in the packet after deciphering to completing in step e, and read in the synchronous pointer that current receiving terminal is preserved, whether the synchronous pointer in the packet that then judgement receives is greater than the synchronous pointer that current receiving terminal is preserved;
If synchronous pointer is less than or equal to the synchronous pointer that current receiving terminal is preserved in packet, perform step F1: forgo data bag also returns to wait and again receives data;
If synchronous pointer is greater than the synchronous pointer that current receiving terminal is preserved in packet, perform step G: from the packet receiving, extract the packet before encryption, and return to this data.
Concrete, when each transmitting data, all can there is saltus step in the synchronous pointer in described steps A.
In the present invention, the synchronous pointer in described steps A can be the synchronous pointer of 8,16 or 32 figure places.
Further, the accidental enciphering sequence number that in described step B, reflector produces, this accidental enciphering sequence number can be the accidental enciphering sequence number of 4,8,16 or 32 figure places according to the requirement of Cipher Strength.
Preferably, described 8 figure place accidental enciphering sequence numbers will produce 256 kinds of encryption keys.
Further, the encipherment scheme in described step B in reflector, this encipherment scheme is selected different encryption methods according to the difference of ciphering sequence number.
Preferably, in described step B, data check position is 8 and verification.
The present invention has following beneficial effect: the present invention has adopted the encryption key that constantly converts master-slave communication both sides, make the radio communication agreement of master-slave equipment become completely unordered, there will not be the coding coefficient of safety that nearly all wireless encoding IC produces in the market very poor, the problem that the method copying by radio coding just can copy out wireless encoding instruction, solved the poor difficult problem of wireless telecommunications confidentiality, thereby eliminated illegal intercepting radio or cracked the dangerous situations such as radio control instruction, thereby improved greatly the whole reliability of wireless device communication two party.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the structured flowchart of the wireless telecommunications encryption method of a kind of variable cipher of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Referring to Fig. 1, the invention provides a kind of wireless telecommunications encryption method of variable cipher, comprise transmitting terminal and receiving terminal, described transmitting terminal comprises the following steps:
1 the synchronous pointer of all can adding up during each transmitting of packet affix that steps A, reflector will be launched forms a new packet, described synchronous pointer all can be preserved current synchronous pointer value at every turn after launch, and synchronous pointer is read out afterwards while launching at every turn and adds up 1;
Step B, in reflector transmitting new data packets, random key generator in reflector produces the accidental enciphering sequence number of an any digit, and read in a Data Encryption Scheme according to this accidental enciphering sequence number, utilize this Data Encryption Scheme to be encrypted code to having added the new data packets of synchronous pointer, allowed the new data packets of encryption add the accidental enciphering sequence number of a particular number of bits of this generation, to the additional data check digit of new data packets after having added accidental enciphering sequence number, form a missile new data packets again, this missile new data packets is transmitted to receiving terminal by wireless communication mode,
Data reception module in described receiving terminal is received in the packet that step B launches and sends signal processing unit to, and signal processing unit will carry out following treatment step:
Step C: first judge that whether the data check position of the packet receiving is by verification,
If verification is not passed through, perform step C1: empty this packet and return and continue to wait for and again to receive data;
If verification is passed through, perform step D: data check position by verification after, the accidental enciphering sequence number of signal processing unit reading data bag, and judge that whether accidental enciphering sequence number figure place correct,
If accidental enciphering sequence number figure place is incorrect, forgo data bag return to wait and again receive data;
If accidental enciphering sequence number figure place is correct, perform step E: according to accidental enciphering sequence number, packet is decrypted;
Step F: extract synchronous pointer in the packet after deciphering to completing in step e, and read in the synchronous pointer that current receiving terminal is preserved, whether the synchronous pointer in the packet that then judgement receives is greater than the synchronous pointer that current receiving terminal is preserved;
If synchronous pointer is less than or equal to the synchronous pointer that current receiving terminal is preserved in packet, perform step F1: forgo data bag also returns to wait and again receives data;
If synchronous pointer is greater than the synchronous pointer that current receiving terminal is preserved in packet, perform step G: from the packet receiving, extract the packet before encryption, and return to this data.
As the concrete execution mode of the present invention, concrete, all can there is saltus step in the synchronous pointer in described steps A when each transmitting data.In the present invention, the synchronous pointer in described steps A can be the synchronous pointer of 8,16 or 32 figure places.The accidental enciphering sequence number that in described step B, reflector produces, this accidental enciphering sequence number can be the accidental enciphering sequence number of 4,8,16 or 32 figure places according to the requirement of Cipher Strength.As preferred mode, described 8 figure place accidental enciphering sequence numbers will produce 256 kinds of encryption keys.
Further, the encipherment scheme in described step B in reflector, this encipherment scheme is selected different encryption methods according to the difference of ciphering sequence number, so can accomplish at most to launch ninety-nine times out of a hundred, has different encipherment schemes.As preferred mode, in described step B, data check position is 8 and verification.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (7)

1. a wireless telecommunications encryption method for variable cipher, is characterized in that: comprise transmitting terminal and receiving terminal, described transmitting terminal comprises the following steps:
1 the synchronous pointer of all can adding up during each transmitting of packet affix that steps A, reflector will be launched forms a new packet, described synchronous pointer all can be preserved current synchronous pointer value at every turn after launch, and synchronous pointer is read out afterwards while launching at every turn and adds up 1;
Step B, in reflector transmitting new data packets, random key generator in reflector produces the accidental enciphering sequence number of an any digit, and read in a Data Encryption Scheme according to this accidental enciphering sequence number, utilize this Data Encryption Scheme to be encrypted code to having added the new data packets of synchronous pointer, allowed the new data packets of encryption add the accidental enciphering sequence number of a particular number of bits of this generation, to the additional data check digit of new data packets after having added accidental enciphering sequence number, form a missile new data packets again, this missile new data packets is transmitted to receiving terminal by wireless communication mode,
Data reception module in described receiving terminal is received in the packet that step B launches and sends signal processing unit to, and signal processing unit will carry out following treatment step:
Step C: first judge that whether the data check position of the packet receiving is by verification,
If verification is not passed through, perform step C1: empty this packet and return and continue to wait for and again to receive data;
If verification is passed through, perform step D: data check position by verification after, the accidental enciphering sequence number of signal processing unit reading data bag, and judge that whether accidental enciphering sequence number figure place correct,
If accidental enciphering sequence number figure place is incorrect, forgo data bag return to wait and again receive data;
If accidental enciphering sequence number figure place is correct, perform step E: according to accidental enciphering sequence number, packet is decrypted;
Step F: extract synchronous pointer in the packet after deciphering to completing in step e, and read in the synchronous pointer that current receiving terminal is preserved, whether the synchronous pointer in the packet that then judgement receives is greater than the synchronous pointer that current receiving terminal is preserved;
If synchronous pointer is less than or equal to the synchronous pointer that current receiving terminal is preserved in packet, perform step F1: forgo data bag also returns to wait and again receives data;
If synchronous pointer is greater than the synchronous pointer that current receiving terminal is preserved in packet, perform step G: from the packet receiving, extract the packet before encryption, and return to this data.
2. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that: the synchronous pointer in described steps A all saltus step can occur when each transmitting data.
3. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that: the synchronous pointer in described steps A can be the synchronous pointer of 8,16 or 32 figure places.
4. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that:.
The accidental enciphering sequence number that in described step B, reflector produces, this accidental enciphering sequence number can be the accidental enciphering sequence number of 4,8,16 or 32 figure places according to the requirement of Cipher Strength.
5. the wireless telecommunications encryption method of a kind of variable cipher according to claim 4, is characterized in that: described 8 figure place accidental enciphering sequence numbers will produce 256 kinds of encryption keys.
6. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that: the encipherment scheme in described step B in reflector, this encipherment scheme is selected different encryption methods according to the difference of ciphering sequence number.
7. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that: in described step B, data check position is 8 and verification.
CN201410325697.XA 2014-07-09 2014-07-09 Wireless communication encryption method capable of changing passwords Pending CN104125562A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410325697.XA CN104125562A (en) 2014-07-09 2014-07-09 Wireless communication encryption method capable of changing passwords

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410325697.XA CN104125562A (en) 2014-07-09 2014-07-09 Wireless communication encryption method capable of changing passwords

Publications (1)

Publication Number Publication Date
CN104125562A true CN104125562A (en) 2014-10-29

Family

ID=51770796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410325697.XA Pending CN104125562A (en) 2014-07-09 2014-07-09 Wireless communication encryption method capable of changing passwords

Country Status (1)

Country Link
CN (1) CN104125562A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683976A (en) * 2015-01-30 2015-06-03 航天科工深圳(集团)有限公司 Message sending and receiving methods
CN105262736A (en) * 2015-09-24 2016-01-20 西安电子科技大学 Dynamic address communication method based on host jumping
CN110163320A (en) * 2019-04-16 2019-08-23 中国农业科学院农业资源与农业区划研究所 A kind of crop seeds retrospect identification code method and device
CN110570564A (en) * 2019-09-05 2019-12-13 安恒世通(北京)网络科技有限公司 single-machine lock and control method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645770A (en) * 2008-08-05 2010-02-10 中国科学院物理研究所 Security instant communication system
CN101667912A (en) * 2009-10-14 2010-03-10 中国电信股份有限公司 Network information transmission method and system therefor
CN102655643A (en) * 2011-03-04 2012-09-05 希姆通信息技术(上海)有限公司 Wireless data encryption method and wireless data decryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645770A (en) * 2008-08-05 2010-02-10 中国科学院物理研究所 Security instant communication system
CN101667912A (en) * 2009-10-14 2010-03-10 中国电信股份有限公司 Network information transmission method and system therefor
CN102655643A (en) * 2011-03-04 2012-09-05 希姆通信息技术(上海)有限公司 Wireless data encryption method and wireless data decryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡捷: "KEELOQ技术的改进加密算法在数据库中的应用", 《西南科技大学学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683976A (en) * 2015-01-30 2015-06-03 航天科工深圳(集团)有限公司 Message sending and receiving methods
CN105262736A (en) * 2015-09-24 2016-01-20 西安电子科技大学 Dynamic address communication method based on host jumping
CN105262736B (en) * 2015-09-24 2019-01-18 西安电子科技大学 A kind of dynamic address communication means of Intrusion Detection based on host jump
CN110163320A (en) * 2019-04-16 2019-08-23 中国农业科学院农业资源与农业区划研究所 A kind of crop seeds retrospect identification code method and device
CN110163320B (en) * 2019-04-16 2022-10-18 中国农业科学院农业资源与农业区划研究所 Crop seed tracing identification coding method and device
CN110570564A (en) * 2019-09-05 2019-12-13 安恒世通(北京)网络科技有限公司 single-machine lock and control method thereof

Similar Documents

Publication Publication Date Title
CN107566407B (en) Bidirectional authentication data secure transmission and storage method based on USBKey
CN102299930B (en) Method for ensuring security of client software
CN101917270B (en) Weak authentication and key agreement method based on symmetrical password
CN106227503A (en) Safety chip COS firmware update, service end, terminal and system
CN110955918A (en) Contract text protection method based on RSA encrypted sha-256 digital signature
CN107483192A (en) A kind of data transmission method and device based on quantum communication
CN105897748B (en) A kind of transmission method and equipment of symmetric key
CN105320535A (en) Checking method of installation package, client side, server and system
CN104125562A (en) Wireless communication encryption method capable of changing passwords
CN105989643A (en) Communication encryption method used for electronic lock, electronic lock apparatus and system thereof
CN114430346B (en) Login method and device and electronic equipment
CN112035860A (en) File encryption method, terminal, device, equipment and medium
CN102970676A (en) Method for processing original data, internet of thing system and terminal
CN102255727B (en) Improved anti-attacking intelligent card authentication method based on user defined algorithm environment
CN106453362A (en) Data transmission method and apparatus of vehicle-mounted device
CN109922022A (en) Internet of Things communication means, platform, terminal and system
CN102135944A (en) Method for safe data storage in mobile communication equipment
CN103905197A (en) SIM card and external device binding and verifying method
CN105162592A (en) Method and system for authenticating wearable device
CN101355424B (en) Method for safely migrating handhold equipment data
CN205210986U (en) Light wave encryption and decryption general purpose key system
CN109413644B (en) LoRa encryption authentication communication method, storage medium and electronic terminal
US10200348B2 (en) Method to detect an OTA (over the air) standard message affected by an error
CN107784712A (en) A kind of method of car networking embedded system car telephone control cryptographic check
CN109417469A (en) The safe matching method of mimo system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141029