CN104125562A - Wireless communication encryption method capable of changing passwords - Google Patents
Wireless communication encryption method capable of changing passwords Download PDFInfo
- Publication number
- CN104125562A CN104125562A CN201410325697.XA CN201410325697A CN104125562A CN 104125562 A CN104125562 A CN 104125562A CN 201410325697 A CN201410325697 A CN 201410325697A CN 104125562 A CN104125562 A CN 104125562A
- Authority
- CN
- China
- Prior art keywords
- sequence number
- packet
- encryption
- synchronous pointer
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the communication technical field, in particular to a wireless communication encryption method capable of changing passwords. The wireless communication encryption method capable of changing the passwords includes: attaching a synchronization pointer to a data package at a transmitting terminal firstly, then adding a random encryption serial number on the data package, and adding a verification code on the data package; verifying the received data package verification code through a signal processing unit at a receiving terminal firstly, judging the bit number of the random encryption serial number, then comparing the synchronization pointer in the data package with a synchronization pointer in the receiving terminal, and finally extracting a data package before encryption from the data package, returning the data package before the encryption, and completing wireless communication encryption. The wireless communication encryption method capable of changing the passwords has the advantages of solving the puzzle that wireless communication security is poor, and thereby eliminating the dangerous situations that wireless is illegally intercepted or a wireless control instruction is cracked and the like, and furthermore greatly improving integral reliability of both sides of wireless communication.
Description
Technical field
The present invention relates to communication technique field, be specifically related to a kind of wireless telecommunications encryption method of variable cipher.
Background technology
At present, domestic and international application radio communication method very widely almost all adopts simple coding method, as wireless alarm, and many automobiles, motorcycle, battery vehicle remote controller etc.The almost whole simply coding IC that adopt that adopt.As everyone knows, it is also the product being customized by other companies that only a few adopts so-called hopping code, exists in use and is permitted many-sided restriction, can not well bring into play its real wireless data communication encryption effect.While adopting the work of wireless telecommunication system of this simple coding method wireless communication signal very easily by simple interception with copied out, the system that has been replicated radio coding just can arbitraryly be carried out various operations, so be extremely dangerous to the user of vast this type of communication modes of use, fail safe can not get any effective guarantee.For above shortcoming, be badly in need of a kind of new radio secure encryption system of research and development for this reason.
Summary of the invention
Object of the present invention is in order to solve above-mentioned existing technical disadvantages, and the wireless telecommunications encryption method of a kind of good confidentiality, variable cipher that reliability is strong is provided.
For achieving the above object, the invention provides a kind of wireless telecommunications encryption method of variable cipher, comprise transmitting terminal and receiving terminal, described transmitting terminal comprises the following steps:
1 the synchronous pointer of all can adding up during each transmitting of packet affix that steps A, reflector will be launched forms a new packet, described synchronous pointer all can be preserved current synchronous pointer value at every turn after launch, and synchronous pointer is read out afterwards while launching at every turn and adds up 1;
Step B, in reflector transmitting new data packets, random key generator in reflector produces the accidental enciphering sequence number of an any digit, and read in a Data Encryption Scheme according to this accidental enciphering sequence number, utilize this Data Encryption Scheme to be encrypted code to having added the new data packets of synchronous pointer, allowed the new data packets of encryption add the accidental enciphering sequence number of a particular number of bits of this generation, to the additional data check digit of new data packets after having added accidental enciphering sequence number, form a missile new data packets again, this missile new data packets is transmitted to receiving terminal by wireless communication mode,
Data reception module in described receiving terminal is received in the packet that step B launches and sends signal processing unit to, and signal processing unit will carry out following treatment step:
Step C: first judge that whether the data check position of the packet receiving is by verification,
If verification is not passed through, perform step C1: empty this packet and return and continue to wait for and again to receive data;
If verification is passed through, perform step D: data check position by verification after, the accidental enciphering sequence number of signal processing unit reading data bag, and judge that whether accidental enciphering sequence number figure place correct,
If accidental enciphering sequence number figure place is incorrect, forgo data bag return to wait and again receive data;
If accidental enciphering sequence number figure place is correct, perform step E: according to accidental enciphering sequence number, packet is decrypted;
Step F: extract synchronous pointer in the packet after deciphering to completing in step e, and read in the synchronous pointer that current receiving terminal is preserved, whether the synchronous pointer in the packet that then judgement receives is greater than the synchronous pointer that current receiving terminal is preserved;
If synchronous pointer is less than or equal to the synchronous pointer that current receiving terminal is preserved in packet, perform step F1: forgo data bag also returns to wait and again receives data;
If synchronous pointer is greater than the synchronous pointer that current receiving terminal is preserved in packet, perform step G: from the packet receiving, extract the packet before encryption, and return to this data.
Concrete, when each transmitting data, all can there is saltus step in the synchronous pointer in described steps A.
In the present invention, the synchronous pointer in described steps A can be the synchronous pointer of 8,16 or 32 figure places.
Further, the accidental enciphering sequence number that in described step B, reflector produces, this accidental enciphering sequence number can be the accidental enciphering sequence number of 4,8,16 or 32 figure places according to the requirement of Cipher Strength.
Preferably, described 8 figure place accidental enciphering sequence numbers will produce 256 kinds of encryption keys.
Further, the encipherment scheme in described step B in reflector, this encipherment scheme is selected different encryption methods according to the difference of ciphering sequence number.
Preferably, in described step B, data check position is 8 and verification.
The present invention has following beneficial effect: the present invention has adopted the encryption key that constantly converts master-slave communication both sides, make the radio communication agreement of master-slave equipment become completely unordered, there will not be the coding coefficient of safety that nearly all wireless encoding IC produces in the market very poor, the problem that the method copying by radio coding just can copy out wireless encoding instruction, solved the poor difficult problem of wireless telecommunications confidentiality, thereby eliminated illegal intercepting radio or cracked the dangerous situations such as radio control instruction, thereby improved greatly the whole reliability of wireless device communication two party.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the structured flowchart of the wireless telecommunications encryption method of a kind of variable cipher of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Referring to Fig. 1, the invention provides a kind of wireless telecommunications encryption method of variable cipher, comprise transmitting terminal and receiving terminal, described transmitting terminal comprises the following steps:
1 the synchronous pointer of all can adding up during each transmitting of packet affix that steps A, reflector will be launched forms a new packet, described synchronous pointer all can be preserved current synchronous pointer value at every turn after launch, and synchronous pointer is read out afterwards while launching at every turn and adds up 1;
Step B, in reflector transmitting new data packets, random key generator in reflector produces the accidental enciphering sequence number of an any digit, and read in a Data Encryption Scheme according to this accidental enciphering sequence number, utilize this Data Encryption Scheme to be encrypted code to having added the new data packets of synchronous pointer, allowed the new data packets of encryption add the accidental enciphering sequence number of a particular number of bits of this generation, to the additional data check digit of new data packets after having added accidental enciphering sequence number, form a missile new data packets again, this missile new data packets is transmitted to receiving terminal by wireless communication mode,
Data reception module in described receiving terminal is received in the packet that step B launches and sends signal processing unit to, and signal processing unit will carry out following treatment step:
Step C: first judge that whether the data check position of the packet receiving is by verification,
If verification is not passed through, perform step C1: empty this packet and return and continue to wait for and again to receive data;
If verification is passed through, perform step D: data check position by verification after, the accidental enciphering sequence number of signal processing unit reading data bag, and judge that whether accidental enciphering sequence number figure place correct,
If accidental enciphering sequence number figure place is incorrect, forgo data bag return to wait and again receive data;
If accidental enciphering sequence number figure place is correct, perform step E: according to accidental enciphering sequence number, packet is decrypted;
Step F: extract synchronous pointer in the packet after deciphering to completing in step e, and read in the synchronous pointer that current receiving terminal is preserved, whether the synchronous pointer in the packet that then judgement receives is greater than the synchronous pointer that current receiving terminal is preserved;
If synchronous pointer is less than or equal to the synchronous pointer that current receiving terminal is preserved in packet, perform step F1: forgo data bag also returns to wait and again receives data;
If synchronous pointer is greater than the synchronous pointer that current receiving terminal is preserved in packet, perform step G: from the packet receiving, extract the packet before encryption, and return to this data.
As the concrete execution mode of the present invention, concrete, all can there is saltus step in the synchronous pointer in described steps A when each transmitting data.In the present invention, the synchronous pointer in described steps A can be the synchronous pointer of 8,16 or 32 figure places.The accidental enciphering sequence number that in described step B, reflector produces, this accidental enciphering sequence number can be the accidental enciphering sequence number of 4,8,16 or 32 figure places according to the requirement of Cipher Strength.As preferred mode, described 8 figure place accidental enciphering sequence numbers will produce 256 kinds of encryption keys.
Further, the encipherment scheme in described step B in reflector, this encipherment scheme is selected different encryption methods according to the difference of ciphering sequence number, so can accomplish at most to launch ninety-nine times out of a hundred, has different encipherment schemes.As preferred mode, in described step B, data check position is 8 and verification.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.
Claims (7)
1. a wireless telecommunications encryption method for variable cipher, is characterized in that: comprise transmitting terminal and receiving terminal, described transmitting terminal comprises the following steps:
1 the synchronous pointer of all can adding up during each transmitting of packet affix that steps A, reflector will be launched forms a new packet, described synchronous pointer all can be preserved current synchronous pointer value at every turn after launch, and synchronous pointer is read out afterwards while launching at every turn and adds up 1;
Step B, in reflector transmitting new data packets, random key generator in reflector produces the accidental enciphering sequence number of an any digit, and read in a Data Encryption Scheme according to this accidental enciphering sequence number, utilize this Data Encryption Scheme to be encrypted code to having added the new data packets of synchronous pointer, allowed the new data packets of encryption add the accidental enciphering sequence number of a particular number of bits of this generation, to the additional data check digit of new data packets after having added accidental enciphering sequence number, form a missile new data packets again, this missile new data packets is transmitted to receiving terminal by wireless communication mode,
Data reception module in described receiving terminal is received in the packet that step B launches and sends signal processing unit to, and signal processing unit will carry out following treatment step:
Step C: first judge that whether the data check position of the packet receiving is by verification,
If verification is not passed through, perform step C1: empty this packet and return and continue to wait for and again to receive data;
If verification is passed through, perform step D: data check position by verification after, the accidental enciphering sequence number of signal processing unit reading data bag, and judge that whether accidental enciphering sequence number figure place correct,
If accidental enciphering sequence number figure place is incorrect, forgo data bag return to wait and again receive data;
If accidental enciphering sequence number figure place is correct, perform step E: according to accidental enciphering sequence number, packet is decrypted;
Step F: extract synchronous pointer in the packet after deciphering to completing in step e, and read in the synchronous pointer that current receiving terminal is preserved, whether the synchronous pointer in the packet that then judgement receives is greater than the synchronous pointer that current receiving terminal is preserved;
If synchronous pointer is less than or equal to the synchronous pointer that current receiving terminal is preserved in packet, perform step F1: forgo data bag also returns to wait and again receives data;
If synchronous pointer is greater than the synchronous pointer that current receiving terminal is preserved in packet, perform step G: from the packet receiving, extract the packet before encryption, and return to this data.
2. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that: the synchronous pointer in described steps A all saltus step can occur when each transmitting data.
3. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that: the synchronous pointer in described steps A can be the synchronous pointer of 8,16 or 32 figure places.
4. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that:.
The accidental enciphering sequence number that in described step B, reflector produces, this accidental enciphering sequence number can be the accidental enciphering sequence number of 4,8,16 or 32 figure places according to the requirement of Cipher Strength.
5. the wireless telecommunications encryption method of a kind of variable cipher according to claim 4, is characterized in that: described 8 figure place accidental enciphering sequence numbers will produce 256 kinds of encryption keys.
6. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that: the encipherment scheme in described step B in reflector, this encipherment scheme is selected different encryption methods according to the difference of ciphering sequence number.
7. the wireless telecommunications encryption method of a kind of variable cipher according to claim 1, is characterized in that: in described step B, data check position is 8 and verification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410325697.XA CN104125562A (en) | 2014-07-09 | 2014-07-09 | Wireless communication encryption method capable of changing passwords |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410325697.XA CN104125562A (en) | 2014-07-09 | 2014-07-09 | Wireless communication encryption method capable of changing passwords |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104125562A true CN104125562A (en) | 2014-10-29 |
Family
ID=51770796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410325697.XA Pending CN104125562A (en) | 2014-07-09 | 2014-07-09 | Wireless communication encryption method capable of changing passwords |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104125562A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683976A (en) * | 2015-01-30 | 2015-06-03 | 航天科工深圳(集团)有限公司 | Message sending and receiving methods |
CN105262736A (en) * | 2015-09-24 | 2016-01-20 | 西安电子科技大学 | Dynamic address communication method based on host jumping |
CN110163320A (en) * | 2019-04-16 | 2019-08-23 | 中国农业科学院农业资源与农业区划研究所 | A kind of crop seeds retrospect identification code method and device |
CN110570564A (en) * | 2019-09-05 | 2019-12-13 | 安恒世通(北京)网络科技有限公司 | single-machine lock and control method thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645770A (en) * | 2008-08-05 | 2010-02-10 | 中国科学院物理研究所 | Security instant communication system |
CN101667912A (en) * | 2009-10-14 | 2010-03-10 | 中国电信股份有限公司 | Network information transmission method and system therefor |
CN102655643A (en) * | 2011-03-04 | 2012-09-05 | 希姆通信息技术(上海)有限公司 | Wireless data encryption method and wireless data decryption method |
-
2014
- 2014-07-09 CN CN201410325697.XA patent/CN104125562A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645770A (en) * | 2008-08-05 | 2010-02-10 | 中国科学院物理研究所 | Security instant communication system |
CN101667912A (en) * | 2009-10-14 | 2010-03-10 | 中国电信股份有限公司 | Network information transmission method and system therefor |
CN102655643A (en) * | 2011-03-04 | 2012-09-05 | 希姆通信息技术(上海)有限公司 | Wireless data encryption method and wireless data decryption method |
Non-Patent Citations (1)
Title |
---|
胡捷: "KEELOQ技术的改进加密算法在数据库中的应用", 《西南科技大学学报》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683976A (en) * | 2015-01-30 | 2015-06-03 | 航天科工深圳(集团)有限公司 | Message sending and receiving methods |
CN105262736A (en) * | 2015-09-24 | 2016-01-20 | 西安电子科技大学 | Dynamic address communication method based on host jumping |
CN105262736B (en) * | 2015-09-24 | 2019-01-18 | 西安电子科技大学 | A kind of dynamic address communication means of Intrusion Detection based on host jump |
CN110163320A (en) * | 2019-04-16 | 2019-08-23 | 中国农业科学院农业资源与农业区划研究所 | A kind of crop seeds retrospect identification code method and device |
CN110163320B (en) * | 2019-04-16 | 2022-10-18 | 中国农业科学院农业资源与农业区划研究所 | Crop seed tracing identification coding method and device |
CN110570564A (en) * | 2019-09-05 | 2019-12-13 | 安恒世通(北京)网络科技有限公司 | single-machine lock and control method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107566407B (en) | Bidirectional authentication data secure transmission and storage method based on USBKey | |
CN102299930B (en) | Method for ensuring security of client software | |
CN101917270B (en) | Weak authentication and key agreement method based on symmetrical password | |
CN106227503A (en) | Safety chip COS firmware update, service end, terminal and system | |
CN110955918A (en) | Contract text protection method based on RSA encrypted sha-256 digital signature | |
CN107483192A (en) | A kind of data transmission method and device based on quantum communication | |
CN105897748B (en) | A kind of transmission method and equipment of symmetric key | |
CN105320535A (en) | Checking method of installation package, client side, server and system | |
CN104125562A (en) | Wireless communication encryption method capable of changing passwords | |
CN105989643A (en) | Communication encryption method used for electronic lock, electronic lock apparatus and system thereof | |
CN114430346B (en) | Login method and device and electronic equipment | |
CN112035860A (en) | File encryption method, terminal, device, equipment and medium | |
CN102970676A (en) | Method for processing original data, internet of thing system and terminal | |
CN102255727B (en) | Improved anti-attacking intelligent card authentication method based on user defined algorithm environment | |
CN106453362A (en) | Data transmission method and apparatus of vehicle-mounted device | |
CN109922022A (en) | Internet of Things communication means, platform, terminal and system | |
CN102135944A (en) | Method for safe data storage in mobile communication equipment | |
CN103905197A (en) | SIM card and external device binding and verifying method | |
CN105162592A (en) | Method and system for authenticating wearable device | |
CN101355424B (en) | Method for safely migrating handhold equipment data | |
CN205210986U (en) | Light wave encryption and decryption general purpose key system | |
CN109413644B (en) | LoRa encryption authentication communication method, storage medium and electronic terminal | |
US10200348B2 (en) | Method to detect an OTA (over the air) standard message affected by an error | |
CN107784712A (en) | A kind of method of car networking embedded system car telephone control cryptographic check | |
CN109417469A (en) | The safe matching method of mimo system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141029 |