CN104751539A - Keyless entry system certification method, device and keyless entry certification system - Google Patents

Keyless entry system certification method, device and keyless entry certification system Download PDF

Info

Publication number
CN104751539A
CN104751539A CN201310741904.5A CN201310741904A CN104751539A CN 104751539 A CN104751539 A CN 104751539A CN 201310741904 A CN201310741904 A CN 201310741904A CN 104751539 A CN104751539 A CN 104751539A
Authority
CN
China
Prior art keywords
synchronization value
theft
terminal
proof
remote terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310741904.5A
Other languages
Chinese (zh)
Inventor
万鸿俊
彭巍
赵军辉
马少飞
丁郁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201310741904.5A priority Critical patent/CN104751539A/en
Publication of CN104751539A publication Critical patent/CN104751539A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention provides a keyless entry system certification method, a device and a keyless entry certification system. A current synchronization value of an antitheft terminal is updated through the same time interval of the antitheft terminal corresponding to a remote control terminal. Therefore, the antitheft terminal and the remote control terminal update the current synchronization value based on the same time interval when the remote control terminal which sends the synchronization value is the remote control terminal corresponding to the antitheft terminal (namely the remote control terminal is a legal remote control terminal). So the synchronization value which is sent from the remote control terminal will be consistent with the current synchronization value of the antitheft terminal, and then the remote control terminal is certificated. However, if the continuously-sent synchronization value is captured when the remote control terminal sends the synchronization value, the remote control terminal cannot be certificated due to different time intervals and inconsistency with the current synchronization value of the antitheft terminal. Thus, the technical problem that keyless entry system certification safety is poor in the prior art is effectively solved, and keyless entry system certification safety is enhanced in the invention.

Description

The method of keyless gate inhibition system certification, device and Keyless door prohibit Verification System
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of method of keyless gate inhibition system certification, device and Keyless door and prohibit Verification System.
Background technology
Along with the development of the communication technology, at anti-theft technique PKE(Passive Keyless Entry of new generation, keyless gate inhibition system) in, one piece of data is sent to remote terminal by theft-proof terminal, remote terminal, after receiving this segment data, is encrypted it, and by the data recovery after encryption to theft-proof terminal, again by theft-proof terminal to encryption after comparing process, to complete certification.But, within the system, because remote terminal needs the data receiving theft-proof terminal transmission, so remote terminal needs to be in wait-receiving mode data mode for a long time.So, if adopt 125K/433M wireless communication technology, although power consumption during wait-receiving mode data is lower, cost can be brought again higher and the shortcoming that communication distance is nearer.And if the 2.4G wireless communication technology of main flow is compared in employing at present, power consumption during remote terminal wait-receiving mode data is higher.
In order to solve the problem, 2.4G wireless communication technology is adopted between remote terminal and theft-proof terminal, and circulate transmission rolling code to theft-proof terminal by remote terminal, theft-proof terminal deciphering rolling code, obtain synchronization value, when theft-proof terminal judges that two or more the synchronization value received successively is continuous print, then remote terminal passes through certification, otherwise, judge that remote terminal is as illegal terminal.
But because remote terminal is constantly sending rolling code to theft-proof terminal, so, just can send in the process of rolling code at remote terminal and comparatively be easy to obtain the rolling code sent continuously, these continuous print rolling codes are sent again to theft-proof terminal, thus pass through system authentication, so, just there is PKE system authentication security poor.
Summary of the invention
The invention provides a kind of method of keyless gate inhibition system certification, device and Keyless door and prohibit Verification System, in order to solve the poor technical matters of the keyless gate inhibition system authentication security that exists in prior art.
Embodiment of the present invention technical scheme is as follows:
The embodiment of the present invention provides a kind of method of keyless gate inhibition system certification, comprising:
Theft-proof terminal receives the synchronization value that remote terminal sends;
Described theft-proof terminal is according to the current sync value of described synchronization value and described theft-proof terminal, certification is carried out to described remote terminal, wherein, described theft-proof terminal upgrades the synchronization value of described theft-proof terminal based on the identical prefixed time interval of the remote terminal corresponding with described theft-proof terminal and identical synchronization value update algorithm.
Therefore, embodiment of the present invention technical scheme to upgrade the current sync value of theft-proof terminal due to theft-proof terminal based on the time interval that the remote terminal corresponding with theft-proof terminal is identical, so, when the remote terminal sending synchronization value is the remote terminal corresponding with theft-proof terminal, namely when this remote terminal is legal remote terminal, theft-proof terminal and remote terminal upgrade current synchronization value at the same time, so, the synchronization value that remote terminal is sent will be consistent with the current sync value of theft-proof terminal, and then remote terminal passes through certification.If but the synchronization value of catching in the process of synchronization value and sending continuously is sent at remote terminal, because the time interval is different, also cannot be consistent with the current sync value of theft-proof terminal, cannot by checking, so, efficiently solve the technical matters that the keyless gate inhibition system authentication security that exists in prior art is poor, improve the security of keyless gate inhibition system certification.
Preferably, described theft-proof terminal upgrades the current sync value of described theft-proof terminal based on the remote terminal corresponding with described theft-proof terminal identical time interval and identical synchronization value update algorithm, specifically comprises:
The synchronization value of described theft-proof terminal, according to described prefixed time interval and a preset increments, increases progressively by described theft-proof terminal.
By the scheme of the present embodiment, when upgrading synchronization value, adopting the mode to increasing progressively preset increments, the complexity of synchronization value update algorithm can be reduced.
Preferably, described theft-proof terminal also comprises after receiving the synchronization value of remote terminal transmission:
Described theft-proof terminal adopts predetermined decipherment algorithm to be decrypted the synchronization value received;
If decipher unsuccessfully, then described remote terminal is confirmed as illegal remote terminal by described theft-proof terminal.
By the scheme of the present embodiment, encrypted by synchronization value, improve the security in synchronization value transmitting procedure.
Preferably, receive the synchronization value of remote terminal transmission at described theft-proof terminal before, described method also comprises:
Described theft-proof terminal at first synchronization value of the first reception from the remote terminal corresponding with described theft-proof terminal, at second synchronization value of the second reception from the remote terminal corresponding with described theft-proof terminal;
Described theft-proof terminal is according to the time interval in the first moment and the second moment, and described synchronization value update algorithm, calculates the synchronization value difference between described first moment and described second moment;
If described first synchronization value is identical with described synchronization value difference with the difference of described second synchronization value, then described second synchronization value is set to the initial synchronisation value of described theft-proof terminal by described theft-proof terminal.
By the scheme of the present embodiment, before the checking carrying out remote terminal, first synchronization value initialization is carried out to theft-proof terminal, guarantee that the remote terminal corresponding with theft-proof terminal can pass through certification.
The embodiment of the present invention provides a kind of device of keyless gate inhibition system certification, comprising:
Synchronization value receiver module, for receiving the synchronization value that remote terminal sends;
Authentication module, for the current sync value according to described synchronization value and described theft-proof terminal, certification is carried out to described remote terminal, wherein, described theft-proof terminal upgrades the synchronization value of described theft-proof terminal based on the identical prefixed time interval of the remote terminal corresponding with described theft-proof terminal and identical synchronization value update algorithm.
Therefore, embodiment of the present invention technical scheme to upgrade the current sync value of theft-proof terminal due to theft-proof terminal based on the time interval that the remote terminal corresponding with theft-proof terminal is identical, so, when the remote terminal sending synchronization value is the remote terminal corresponding with theft-proof terminal, namely when this remote terminal is legal remote terminal, theft-proof terminal and remote terminal upgrade current synchronization value at the same time, so, the synchronization value that remote terminal is sent will be consistent with the current sync value of theft-proof terminal, and then remote terminal passes through certification.If but the synchronization value of catching in the process of synchronization value and sending continuously is sent at remote terminal, because the time interval is different, also cannot be consistent with the current sync value of theft-proof terminal, cannot by checking, so, efficiently solve the technical matters that the keyless gate inhibition system authentication security that exists in prior art is poor, improve the security of keyless gate inhibition system certification.
Preferably, described authentication module, specifically for: according to described prefixed time interval and a preset increments, the synchronization value of described theft-proof terminal is increased progressively.
By the scheme of the present embodiment, when upgrading synchronization value, adopting the mode to increasing progressively preset increments, the complexity of synchronization value update algorithm can be reduced.
Preferably, described device, also comprises:
Deciphering module, is decrypted the synchronization value received for adopting predetermined decipherment algorithm; If decipher unsuccessfully, then described remote terminal is confirmed as illegal remote terminal.
By the scheme of the present embodiment, encrypted by synchronization value, improve the security in synchronization value transmitting procedure.
Preferably, described device also comprises: synchronization value initialization module, for before the synchronization value of described synchronization value receiver module reception remote terminal transmission, at first synchronization value of the first reception from the remote terminal corresponding with described theft-proof terminal, at second synchronization value of the second reception from the remote terminal corresponding with described theft-proof terminal; According to the time interval in the first moment and the second moment, and described synchronization value update algorithm, calculate the synchronization value difference between described first moment and described second moment; If described first synchronization value is identical with described synchronization value difference with the difference of described second synchronization value, then described second synchronization value is set to the initial synchronisation value of described theft-proof terminal.
By the scheme of the present embodiment, before the checking carrying out remote terminal, first synchronization value initialization is carried out to theft-proof terminal, guarantee that the remote terminal corresponding with theft-proof terminal can pass through certification.
The embodiment of the present invention provides a kind of Keyless door to prohibit Verification System, comprising:
Remote terminal, for sending synchronization value to theft-proof terminal;
Described theft-proof terminal, for receiving the synchronization value that described remote terminal sends; Also for the current sync value according to described synchronization value and described theft-proof terminal, certification is carried out to described remote terminal, wherein, described theft-proof terminal upgrades the synchronization value of described theft-proof terminal based on the identical prefixed time interval of the remote terminal corresponding with described theft-proof terminal and identical synchronization value update algorithm.
Therefore, embodiment of the present invention technical scheme to upgrade the current sync value of theft-proof terminal due to theft-proof terminal based on the time interval that the remote terminal corresponding with theft-proof terminal is identical, so, when the remote terminal sending synchronization value is the remote terminal corresponding with theft-proof terminal, namely when this remote terminal is legal remote terminal, theft-proof terminal and remote terminal upgrade current synchronization value at the same time, so, the synchronization value that remote terminal is sent will be consistent with the current sync value of theft-proof terminal, and then remote terminal passes through certification.If but the synchronization value of catching in the process of synchronization value and sending continuously is sent at remote terminal, because the time interval is different, also cannot be consistent with the current sync value of theft-proof terminal, cannot by checking, so, efficiently solve the technical matters that the keyless gate inhibition system authentication security that exists in prior art is poor, improve the security of keyless gate inhibition system certification.
Preferably, described theft-proof terminal, specifically for: according to described prefixed time interval and a preset increments, the synchronization value of described theft-proof terminal is increased progressively.
By the scheme of the present embodiment, when upgrading synchronization value, adopting the mode to increasing progressively preset increments, the complexity of synchronization value update algorithm can be reduced.
Preferably, described theft-proof terminal, specifically for: after the synchronization value receiving remote terminal transmission, adopt predetermined decipherment algorithm to be decrypted the synchronization value received; If decipher unsuccessfully, then described remote terminal is confirmed as illegal remote terminal.
By the scheme of the present embodiment, encrypted by synchronization value, improve the security in synchronization value transmitting procedure.
Preferably, described theft-proof terminal, also for: receive remote terminal send synchronization value before, at first synchronization value of the first reception from the remote terminal corresponding with described theft-proof terminal, at second synchronization value of the second reception from the remote terminal corresponding with described theft-proof terminal; According to the time interval in the first moment and the second moment, and described synchronization value update algorithm, calculate the synchronization value difference between described first moment and described second moment; If described first synchronization value is identical with described synchronization value difference with the difference of described second synchronization value, then described second synchronization value is set to the initial synchronisation value of described theft-proof terminal.
By the scheme of the present embodiment, before the checking carrying out remote terminal, first synchronization value initialization is carried out to theft-proof terminal, guarantee that the remote terminal corresponding with theft-proof terminal can pass through certification.
Accompanying drawing explanation
Fig. 1 is the method flow diagram of the keyless gate inhibition system certification in one embodiment of the invention;
Fig. 2 is the process flow diagram of the initial synchronization value in one embodiment of the invention;
Fig. 3 is the process flow diagram of the renewal synchronization value in one embodiment of the invention;
Fig. 4 is the functional block diagram of the keyless gate inhibition system authenticate device in one embodiment of the invention;
Fig. 5 is the functional block diagram of the Keyless door taboo Verification System in one embodiment of the invention.
Embodiment
The embodiment of the present application prohibits Verification System by providing a kind of method of keyless gate inhibition system certification, device and Keyless door, in order to solve the poor technical matters of the keyless gate inhibition system authentication security that exists in prior art.
Solve the technical matters that the keyless gate inhibition system authentication security that exists in prior art is poor, the application provides following technical scheme:
Theft-proof terminal upgrades the current sync value of theft-proof terminal based on the time interval that the remote terminal corresponding with theft-proof terminal is identical, so, when the remote terminal sending synchronization value is the remote terminal corresponding with theft-proof terminal, namely when this remote terminal is legal remote terminal, theft-proof terminal and remote terminal upgrade current synchronization value at the same time, so, the synchronization value that remote terminal is sent will be consistent with the current sync value of theft-proof terminal, and then remote terminal passes through certification.If but the rolling code obtaining in the process of rolling code and send continuously is sent at remote terminal, due to the time interval, also cannot be consistent with the current sync value of theft-proof terminal, cannot by checking, so, efficiently solve the technical matters that the keyless gate inhibition system authentication security that exists in prior art is poor, improve the security of keyless gate inhibition system certification.
Below by accompanying drawing and specific embodiment, technical solution of the present invention is described in detail, the specific features being to be understood that in the embodiment of the present invention and embodiment is the detailed description to technical solution of the present invention, instead of the restriction to technical solution of the present invention, when not conflicting, the technical characteristic in the embodiment of the present invention and embodiment can combine mutually.
First aspect, the embodiment of the present application provides a kind of method of keyless gate inhibition system certification, and the method is applied to the theft-proof terminal in keyless gate inhibition system.Within the system, remote terminal is in transmission state always, and theft-proof terminal is in accepting state always.
Please refer to Fig. 1, said method comprises:
S101: theft-proof terminal receives the synchronization value that remote terminal sends;
S102: theft-proof terminal is according to the current sync value of synchronization value and theft-proof terminal, certification is carried out to remote terminal, wherein, theft-proof terminal upgrades the synchronization value of theft-proof terminal based on the identical prefixed time interval of the remote terminal corresponding with theft-proof terminal and identical synchronization value update algorithm.
In actual applications, remote terminal may be corresponding with theft-proof terminal, is legal remote terminal, also may not be corresponding, be illegal remote terminal, but only have the remote terminal corresponding with theft-proof terminal can by certification, and if the words of illegal remote terminal cannot by certification.
So, below for the situation that theft-proof terminal is corresponding with remote terminal, said method is described.
First, in order to ensure remote terminal and theft-proof terminal synchronous maintenance synchronization value, before S101, need to carry out synchronization value initialization to theft-proof terminal and remote terminal, now, user by long button, or can restart theft-proof terminal, trigger theft-proof terminal and enter initialize mode, now, the synchronization value that theft-proof terminal just can send according to remote terminal, arranges the initial synchronisation value of oneself, and arranging successfully, automatically exit initialize mode.
Specifically, when user triggers after theft-proof terminal enters initialize mode, the remote terminal corresponding with theft-proof terminal sends the first synchronization value in the first moment to theft-proof terminal, theft-proof terminal receives this first synchronization value from remote terminal, and buffer memory in the memory unit, then, interval one time interval, as 2 seconds, 3 seconds, 5 seconds, remote terminal sends the second synchronization value to theft-proof terminal again in the second moment, theft-proof terminal is after receiving the second synchronization value, according to the time interval in the first moment and the second moment, and synchronization value update algorithm, calculate the synchronization value difference between the first moment and the second moment, first synchronization value and the second synchronization value are compared, if the first synchronization value is identical with synchronization value difference with the difference of the second synchronization value, then the second synchronization value is set to the initial synchronisation value of theft-proof terminal by theft-proof terminal, and automatically exit initialize mode.
In the present embodiment, above-mentioned synchronization value update algorithm is specially remote terminal or theft-proof terminal often through a prefixed time interval, and the synchronization value of this terminal increases by a preset increments, and like this, along with passage of time, synchronization value increases progressively with preset increments.
Such as, please refer to Fig. 2, remote terminal sends the first synchronization value in the first moment to theft-proof terminal, i.e. A, theft-proof terminal is preserved upon receipt, then, through a prefixed time interval Δ t, as 3 seconds, remote terminal sends the second synchronization value in the second moment again to theft-proof terminal, i.e. A+ Δ, then, theft-proof terminal is according to the time interval Δ t between the first moment and the second moment, and above-mentioned synchronization value update algorithm, determine through a Preset Time, synchronization value difference should be a preset increments Δ, then, by the difference of the first synchronization value and the second synchronization value and above-mentioned synchronization value difference comparsion, difference and the above-mentioned synchronization value difference of the first synchronization value and the second synchronization value are identical, so, theft-proof terminal just thinks that the first synchronization value and the second synchronization value are continuous print, second synchronization value is set to its initial synchronisation value.
After remote terminal and theft-proof terminal complete initialization, remote terminal may have left the range of receiving of theft-proof terminal, now, remote terminal still just sends a synchronization value to theft-proof terminal at interval of the above-mentioned time interval, but due to not in the range of receiving of theft-proof terminal, theft-proof terminal cannot receive this synchronization value, simultaneously, theft-proof terminal also upgrades current sync value according to above-mentioned synchronization value update algorithm, namely often through prefixed time interval, theft-proof terminal by current sync value to increase preset increments.
So, when remote terminal enters the range of receiving of theft-proof terminal again, perform S101: theft-proof terminal receives the synchronization value that remote terminal sends, now, the synchronization value that remote terminal sends is the current synchronization value of remote terminal.
S102: theft-proof terminal is according to the current sync value of synchronization value and theft-proof terminal, certification is carried out to remote terminal, wherein, theft-proof terminal upgrades the synchronization value of theft-proof terminal based on the identical prefixed time interval of the remote terminal corresponding with theft-proof terminal and identical synchronization value update algorithm.
Specifically, the synchronization value that remote terminal sends by theft-proof terminal and its current sync value upgraded voluntarily compare, if both are consistent, remote terminal by certification, is just legal remote terminal, and theft-proof terminal is just let pass to it, otherwise, then think that remote terminal is illegal remote terminal.
In the present embodiment, because remote terminal is corresponding with theft-proof terminal, so, remote terminal and theft-proof terminal are through the identical time interval, the synchronization value that both upgrade should be consistent, so, when the synchronization value that remote terminal sends by theft-proof terminal and its current sync value compare, two synchronization values must be consistent, and namely remote terminal necessarily passes through certification.
Such as, please refer to Fig. 3, after remote terminal and theft-proof terminal initial synchronization value are A+ Δ, remote terminal just have left the range of receiving of theft-proof terminal, then, remote terminal and theft-proof terminal are respectively often through a Δ t, synchronization value increases progressively △, so, through you-1 Δ t, when remote terminal enters accepting in scope of theft-proof terminal again, the current sync value of remote terminal is A+n Δ t, the current sync value of theft-proof terminal is also A+n Δ t, remote terminal sends synchronization value A+n Δ t to theft-proof terminal, theft-proof terminal compares two synchronization values, both are consistent, remote terminal passes through certification, be confirmed as legal terminal.
In actual applications, in order to improve security, remote terminal sends to the synchronization value of theft-proof terminal before transmission can be encrypted, adopt the cryptographic algorithm that remote terminal and theft-proof terminal are arranged, theft-proof terminal is sent to after synchronization value is encrypted, theft-proof terminal receives the synchronization value after the encryption of remote terminal transmission, then it is decrypted, adopt the predetermined decipherment algorithm corresponding with above-mentioned cryptographic algorithm, i.e. theft-proof terminal and the remote terminal decipherment algorithm of arranging, the final synchronization value obtaining remote terminal.If successful decryption, perform S102; Unsuccessfully remote terminal is confirmed as illegal remote terminal if decipher.
From the above, because theft-proof terminal to upgrade the current sync value of theft-proof terminal based on the time interval that the remote terminal corresponding with theft-proof terminal is identical, so, when the remote terminal sending synchronization value is the remote terminal corresponding with theft-proof terminal, namely when this remote terminal is legal remote terminal, theft-proof terminal and remote terminal upgrade current synchronization value at the same time, so, the synchronization value that remote terminal is sent will be consistent with the current sync value of theft-proof terminal, and then remote terminal passes through certification.If but the rolling code obtaining in the process of rolling code and send continuously is sent at remote terminal, due to the time interval, also cannot be consistent with the current sync value of theft-proof terminal, cannot by checking, so, efficiently solve the technical matters that the keyless gate inhibition system authentication security that exists in prior art is poor, improve the security of keyless gate inhibition system certification.
Second aspect, based on same inventive concept, the embodiment of the present application also provides a kind of device of keyless gate inhibition system certification, be arranged at the theft-proof terminal in keyless gate inhibition system, as shown in Figure 4, this device comprises: synchronization value receiver module 41, for receiving the synchronization value that remote terminal sends; Authentication module 42, for the current sync value according to synchronization value and theft-proof terminal, carry out certification to remote terminal, wherein, theft-proof terminal upgrades the synchronization value of theft-proof terminal based on the identical prefixed time interval of the remote terminal corresponding with theft-proof terminal and identical synchronization value update algorithm.
Further, authentication module 42, specifically for: according to prefixed time interval and a preset increments, the synchronization value of theft-proof terminal is increased progressively.
Further, this device, also comprises: deciphering module, is decrypted the synchronization value received for adopting predetermined decipherment algorithm; If decipher unsuccessfully, then remote terminal is confirmed as illegal remote terminal.
Further, this device also comprises: synchronization value initialization module, for before the synchronization value of synchronization value receiver module reception remote terminal transmission, at first synchronization value of the first reception from the remote terminal corresponding with theft-proof terminal, at second synchronization value of the second reception from the remote terminal corresponding with theft-proof terminal; According to the time interval in the first moment and the second moment, and synchronization value update algorithm, calculate the synchronization value difference between the first moment and the second moment; If the first synchronization value is identical with synchronization value difference with the difference of the second synchronization value, then the second synchronization value is set to the initial synchronisation value of theft-proof terminal.
Various variation pattern in the method for the keyless gate inhibition system certification in previous embodiment and instantiation are equally applicable to the device of the present embodiment, by the detailed description of the aforementioned method to keyless gate inhibition system certification, those skilled in the art clearly can know the implementation method of device in the present embodiment, so succinct in order to instructions, be not described in detail in this.
The third aspect, based on same inventive concept, the embodiment of the present application also provides a kind of Keyless door to prohibit Verification System, and as shown in Figure 5, this system comprises: remote terminal 51, for sending synchronization value to theft-proof terminal 52; Theft-proof terminal 52, for receiving the synchronization value that remote terminal 51 sends; Also for the current sync value according to synchronization value and theft-proof terminal 52, certification is carried out to remote terminal 51, wherein, theft-proof terminal 52 upgrades the synchronization value of theft-proof terminal 52 based on the identical prefixed time interval of the remote terminal corresponding with theft-proof terminal 52 and identical synchronization value update algorithm.
Further, theft-proof terminal 52, specifically for: according to prefixed time interval and a preset increments, the synchronization value of theft-proof terminal 52 is increased progressively.
Further, theft-proof terminal 52, specifically for: after the synchronization value receiving remote terminal 51 transmission, adopt predetermined decipherment algorithm to be decrypted the synchronization value received; If decipher unsuccessfully, then remote terminal 51 is confirmed as illegal remote terminal
Further, theft-proof terminal 52, also for: receive remote terminal 51 send synchronization value before, at first synchronization value of the first reception from the remote terminal corresponding with theft-proof terminal 52, at second synchronization value of the second reception from the remote terminal corresponding with theft-proof terminal 52; According to the time interval in the first moment and the second moment, and synchronization value update algorithm, calculate the synchronization value difference between the first moment and the second moment; If the first synchronization value is identical with synchronization value difference with the difference of the second synchronization value, then the second synchronization value is set to the initial synchronisation value of theft-proof terminal 52.
Various variation pattern in the method for the keyless gate inhibition system certification in previous embodiment and instantiation are equally applicable to the system of the present embodiment, by the detailed description of the aforementioned method to keyless gate inhibition system certification, those skilled in the art clearly can know the implementation method of system in the present embodiment, so succinct in order to instructions, be not described in detail in this.
Technical scheme in above-mentioned the embodiment of the present application, at least has following technique effect or advantage:
The invention provides a kind of method of keyless gate inhibition system certification, because theft-proof terminal to upgrade the current sync value of theft-proof terminal based on the time interval that the remote terminal corresponding with theft-proof terminal is identical, so, when the remote terminal sending synchronization value is the remote terminal corresponding with theft-proof terminal, namely when this remote terminal is legal remote terminal, theft-proof terminal and remote terminal upgrade current synchronization value at the same time, so, the synchronization value that remote terminal is sent will be consistent with the current sync value of theft-proof terminal, and then remote terminal passes through certification.If but the rolling code obtaining in the process of rolling code and send continuously is sent at remote terminal, due to the time interval, also cannot be consistent with the current sync value of theft-proof terminal, cannot by checking, so, efficiently solve the technical matters that the keyless gate inhibition system authentication security that exists in prior art is poor, improve the security of keyless gate inhibition system certification.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (12)

1. a method for keyless gate inhibition system certification, is characterized in that, comprising:
Theft-proof terminal receives the synchronization value that remote terminal sends;
Described theft-proof terminal is according to the current sync value of described synchronization value and described theft-proof terminal, certification is carried out to described remote terminal, wherein, described theft-proof terminal upgrades the synchronization value of described theft-proof terminal based on the identical prefixed time interval of the remote terminal corresponding with described theft-proof terminal and identical synchronization value update algorithm.
2. the method for claim 1, is characterized in that, described theft-proof terminal upgrades the current sync value of described theft-proof terminal based on the remote terminal corresponding with described theft-proof terminal identical time interval and identical synchronization value update algorithm, specifically comprises:
The synchronization value of described theft-proof terminal, according to described prefixed time interval and a preset increments, increases progressively by described theft-proof terminal.
3. the method for claim 1, is characterized in that, described theft-proof terminal also comprises after receiving the synchronization value of remote terminal transmission:
Described theft-proof terminal adopts predetermined decipherment algorithm to be decrypted the synchronization value received;
If decipher unsuccessfully, then described remote terminal is confirmed as illegal remote terminal by described theft-proof terminal.
4. the method according to any one of claim 1-3, is characterized in that, receive the synchronization value of remote terminal transmission at described theft-proof terminal before, described method also comprises:
Described theft-proof terminal at first synchronization value of the first reception from the remote terminal corresponding with described theft-proof terminal, at second synchronization value of the second reception from the remote terminal corresponding with described theft-proof terminal;
Described theft-proof terminal is according to the time interval in the first moment and the second moment, and described synchronization value update algorithm, calculates the synchronization value difference between described first moment and described second moment;
If described first synchronization value is identical with described synchronization value difference with the difference of described second synchronization value, then described second synchronization value is set to the initial synchronisation value of described theft-proof terminal by described theft-proof terminal.
5. a device for keyless gate inhibition system certification, is characterized in that, comprising:
Synchronization value receiver module, for receiving the synchronization value that remote terminal sends;
Authentication module, for the current sync value according to described synchronization value and described theft-proof terminal, certification is carried out to described remote terminal, wherein, described theft-proof terminal upgrades the synchronization value of described theft-proof terminal based on the identical prefixed time interval of the remote terminal corresponding with described theft-proof terminal and identical synchronization value update algorithm.
6. device as claimed in claim 5, is characterized in that, described authentication module, specifically for: according to described prefixed time interval and a preset increments, the synchronization value of described theft-proof terminal is increased progressively.
7. device as claimed in claim 5, it is characterized in that, described device, also comprises:
Deciphering module, is decrypted the synchronization value received for adopting predetermined decipherment algorithm; If decipher unsuccessfully, then described remote terminal is confirmed as illegal remote terminal.
8. the device according to any one of claim 5-7, it is characterized in that, described device also comprises: synchronization value initialization module, for before the synchronization value of described synchronization value receiver module reception remote terminal transmission, at first synchronization value of the first reception from the remote terminal corresponding with described theft-proof terminal, at second synchronization value of the second reception from the remote terminal corresponding with described theft-proof terminal; According to the time interval in the first moment and the second moment, and described synchronization value update algorithm, calculate the synchronization value difference between described first moment and described second moment; If described first synchronization value is identical with described synchronization value difference with the difference of described second synchronization value, then described second synchronization value is set to the initial synchronisation value of described theft-proof terminal.
9. Keyless door prohibits a Verification System, it is characterized in that, comprising:
Remote terminal, for sending synchronization value to theft-proof terminal;
Described theft-proof terminal, for receiving the synchronization value that described remote terminal sends; Also for the current sync value according to described synchronization value and described theft-proof terminal, certification is carried out to described remote terminal, wherein, described theft-proof terminal upgrades the synchronization value of described theft-proof terminal based on the identical prefixed time interval of the remote terminal corresponding with described theft-proof terminal and identical synchronization value update algorithm.
10. system as claimed in claim 9, is characterized in that, described theft-proof terminal, specifically for: according to described prefixed time interval and a preset increments, the synchronization value of described theft-proof terminal is increased progressively.
11. systems as claimed in claim 9, is characterized in that, described theft-proof terminal, specifically for: after the synchronization value receiving remote terminal transmission, adopt predetermined decipherment algorithm to be decrypted the synchronization value received; If decipher unsuccessfully, then described remote terminal is confirmed as illegal remote terminal.
12. systems according to any one of claim 9-11, it is characterized in that, described theft-proof terminal, also for: receive remote terminal send synchronization value before, at first synchronization value of the first reception from the remote terminal corresponding with described theft-proof terminal, at second synchronization value of the second reception from the remote terminal corresponding with described theft-proof terminal; According to the time interval in the first moment and the second moment, and described synchronization value update algorithm, calculate the synchronization value difference between described first moment and described second moment; If described first synchronization value is identical with described synchronization value difference with the difference of described second synchronization value, then described second synchronization value is set to the initial synchronisation value of described theft-proof terminal.
CN201310741904.5A 2013-12-27 2013-12-27 Keyless entry system certification method, device and keyless entry certification system Pending CN104751539A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310741904.5A CN104751539A (en) 2013-12-27 2013-12-27 Keyless entry system certification method, device and keyless entry certification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310741904.5A CN104751539A (en) 2013-12-27 2013-12-27 Keyless entry system certification method, device and keyless entry certification system

Publications (1)

Publication Number Publication Date
CN104751539A true CN104751539A (en) 2015-07-01

Family

ID=53591154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310741904.5A Pending CN104751539A (en) 2013-12-27 2013-12-27 Keyless entry system certification method, device and keyless entry certification system

Country Status (1)

Country Link
CN (1) CN104751539A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105006051A (en) * 2015-07-31 2015-10-28 深圳广田智能科技有限公司 Wireless communication method and system of intelligent remote control door lock

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5412379A (en) * 1988-05-27 1995-05-02 Lectron Products, Inc. Rolling code for a keyless entry system
CN101150398A (en) * 2007-10-26 2008-03-26 宇龙计算机通信科技(深圳)有限公司 A method, system and communication terminal for updating communication secret key
CN101527706A (en) * 2008-06-13 2009-09-09 珠海市顺生科技实业有限公司 Digital authentication method for improving network security
US20100301999A1 (en) * 2009-05-27 2010-12-02 Overhead Door Corporation Channel-switching remote controlled barrier opening system
CN102110319A (en) * 2009-12-24 2011-06-29 比亚迪股份有限公司 Wireless code hopping system, device and method for remote control door lock
CN102761871A (en) * 2012-08-02 2012-10-31 李凯 Method for preventing fake device during other party identity authentication of wireless communication devices

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5412379A (en) * 1988-05-27 1995-05-02 Lectron Products, Inc. Rolling code for a keyless entry system
CN101150398A (en) * 2007-10-26 2008-03-26 宇龙计算机通信科技(深圳)有限公司 A method, system and communication terminal for updating communication secret key
CN101527706A (en) * 2008-06-13 2009-09-09 珠海市顺生科技实业有限公司 Digital authentication method for improving network security
US20100301999A1 (en) * 2009-05-27 2010-12-02 Overhead Door Corporation Channel-switching remote controlled barrier opening system
CN102110319A (en) * 2009-12-24 2011-06-29 比亚迪股份有限公司 Wireless code hopping system, device and method for remote control door lock
CN102761871A (en) * 2012-08-02 2012-10-31 李凯 Method for preventing fake device during other party identity authentication of wireless communication devices

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105006051A (en) * 2015-07-31 2015-10-28 深圳广田智能科技有限公司 Wireless communication method and system of intelligent remote control door lock

Similar Documents

Publication Publication Date Title
AU2019344067B2 (en) Wireless access credential system
KR102127064B1 (en) Method and architecture for secure ranging
KR102422326B1 (en) Control system and control mehtod for vehicle
JP6438113B2 (en) Wireless key management for authentication
CN105245541B (en) Authentication method, equipment and system
CN111028397B (en) Authentication method and device, and vehicle control method and device
US10567428B2 (en) Secure wireless ranging
CN108122311B (en) Vehicle virtual key implementation method and system
CN105871874A (en) Mobile Internet virtual key authorizing system and hardware door lock control method thereof
CN104751538B (en) The implementation method and gate control system of a kind of opening gate
CN108696476B (en) Security policy configurable automobile key system and implementation method thereof
CN105046796A (en) Unlocking control method, device and system for electronic lock
JP2012244629A (en) Method and device for access verification or verification of start
CN104966015A (en) Control method and system between intelligent equipment
CN113965328B (en) Authority transfer method and system for digital key offline condition of trusted execution environment
KR101617707B1 (en) Electronic key system with function for transffering control right for electronic lock system
KR20120072032A (en) The system and method for performing mutual authentication of mobile terminal
US9948614B1 (en) Remote device initialization using asymmetric cryptography
KR20120070808A (en) Rfid tag device and method of recognizing rfid tag device
CN111444496A (en) Application control method, device, equipment and storage medium
CN114598501A (en) Data processing method and device based on Internet of things
CN109451504A (en) Internet of Things mould group method for authenticating and system
CN105430649A (en) Wifi access method and apparatus
CN104751539A (en) Keyless entry system certification method, device and keyless entry certification system
CN106559378B (en) Automobile door lock unlocking device, system and method and intelligent terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150701