CN109272729A - Thief-proof code remote controler recognition methods and device - Google Patents
Thief-proof code remote controler recognition methods and device Download PDFInfo
- Publication number
- CN109272729A CN109272729A CN201811032361.9A CN201811032361A CN109272729A CN 109272729 A CN109272729 A CN 109272729A CN 201811032361 A CN201811032361 A CN 201811032361A CN 109272729 A CN109272729 A CN 109272729A
- Authority
- CN
- China
- Prior art keywords
- information
- remote controler
- host
- key
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000005540 biological transmission Effects 0.000 claims abstract description 20
- 230000004044 response Effects 0.000 claims abstract description 7
- 238000004422 calculation algorithm Methods 0.000 claims description 30
- 238000004891 communication Methods 0.000 claims description 29
- 238000004519 manufacturing process Methods 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 5
- 239000002131 composite material Substances 0.000 claims description 4
- 238000005336 cracking Methods 0.000 abstract description 2
- 238000003860 storage Methods 0.000 description 32
- 230000007246 mechanism Effects 0.000 description 6
- 230000002159 abnormal effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000004378 air conditioning Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000012512 characterization method Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000005096 rolling process Methods 0.000 description 2
- 238000010923 batch production Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000000465 moulding Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C23/00—Non-electrical signal transmission systems, e.g. optical systems
- G08C23/04—Non-electrical signal transmission systems, e.g. optical systems using light waves, e.g. infrared
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/60—Security, fault tolerance
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C2201/00—Transmission systems of control signals via wireless link
- G08C2201/60—Security, fault tolerance
- G08C2201/62—Rolling code
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Selective Calling Equipment (AREA)
Abstract
The invention discloses a kind of thief-proof code remote controler recognition methods and its device, it specifically can comprise the following steps that (1) remote controller response in its key command, sends information A;(2) host identifies remote controler;(3) host sends information B;(4) remote controler receives information B, identifies host;(5) remote controler sends the information C based on information B;(6) after host identification remote controler, control instruction corresponding to key command is executed.The present invention solves and key is directly stored in advance in remote controler in the prior art, and is easy the problem of cracking out key after causing signal illegally to be captured in transmission process.The present invention can enhance the attack tolerant of signal by " date+clock " information that the information C that host is sent to remote controler may include that host is randomly generated, and reduce the probability that key is illegally cracked, improve the safety of garage.
Description
Technical field
The present invention relates to remote control device technical fields, more specifically, be a kind of thief-proof code remote controler recognition methods and its
Device.
Background technique
With the rapid development of society, automobile becomes the main vehicles of people's daily trip.With the number of private car
Amount increases, and automobile is stolen also to have evolved into the social concern got worse.
The electronic type anti-theft technique of garage at present generallys use and sends terminal such as remote controler to send with identification code
Information controls garage door to the receiving host for being set to garage.General application scenarios are, in advance in remote controler and host
Fixed key and identification code are stored, the identification code that remote controler sends by fixed key encryption is formed by information, is set to vapour
The host in garage receives and uses fixed key solution confidential information, reads identification code, by the identification code and pre-stored identification code
It compares, corresponding operation is then executed according to comparison result.But the encryption method list that current electronic type anti-theft technique uses
One, the anti-interference for transmitting instruction is poor, makes information easily by illegality equipment using the fixed key without any encryption
It intercepts and captures and cracks by the methods of aerial signal acquisition and scan tracing, safety is low.
Therefore, how a kind of thief-proof code remote controler recognition methods and device are provided, the attack tolerant of signal is enhanced, improves vehicle
Safety, be those skilled in the art's technical issues that need to address.
Summary of the invention
Present invention seek to address that the above problem, a kind of thief-proof code remote controler recognition methods and device are provided, guarantees remote control
It can accurately be matched between device and host, to guarantee that control instruction is safely transmitted.
To achieve the above object, the present invention adopts the following technical scheme:
The present invention provides a kind of thief-proof code remote controler recognition methods, the remote control switch suitable for garage burglary-resisting installation is filled
It sets, comprising the following steps:
(1) remote controller response sends information A in its key command;
(2) host identifies remote controler;
(3) host sends information B;
(4) remote controler receives information B, identifies host;
(5) remote controler sends the information C based on information B;
(6) after host identification remote controler, control instruction corresponding to key command is executed.
Further, in the step (1), information A is the knowledge comprising pre-stored first key and to the remote controler
The information that other code A is encrypted;
In the step (2), after host receives the information A, the information A is decrypted by first key, is obtained described
The identification code A of remote controler identifies that the remote controler is matched with this;
In the step (3), information B is comprising pre-stored the second key and to the identification code B of the host and random
The information that information P is encrypted;
In the step (4), after remote controler receives the information B, the information B is decrypted by the second key, obtains institute
The identification code B of host is stated, identifies that the host is matched with this;
In the step (5), information C include the identification code A to the remote controler and information Q based on random information P into
Row encryption, and the information that need to be decrypted with the first, second key;
In the step (6), after host receives the information C, by the first, second key decryption information C, by described
The identification code A of remote controler identifies that the remote controler is matched, passes through the random letter of information Q identification and host transmission
Breath P matches, and then executes control instruction corresponding to key command.
Preferably, the random information P in the step (3) is the date in conjunction with host and the obtained information of clock.
Optionally, the information Q in the step (5) is the algorithm process based on random information P, and algorithm general formula is stored in
In the host and remote controler.
Optionally, the first key, the second key are third-party institution's generation, in process of production or put it into operation
It is preceding to be respectively stored in corresponding remote controler or host.
Optionally, the first key and second key are composite algorisms.
Optionally, described sender formula is Blue-tooth communication method, infrared communication mode, radio communication mode, Zigbee
At least one of communication mode, wireless LAN traffic mode.
Further, after the remote controler sends the information A, if be not received by within the preset period
The information B that the host is sent, then the remote controler issues alarm.Specifically, the preset period is very short
The temporary period, such as: 0.1 second, 0.2 second etc..
Optionally, the key command can be sent to host with information A or information C, can also be with information A, information B and information
C is travelled to and fro between the remote controler and host.
The present invention also provides a kind of thief-proof code remote controler identification devices, including remote controler and host, are remotely controlled machine and master
Machine respectively include: have the first encrypting module, the first sending module, the first receiving module, input module and control in the remote controler
Molding block;There are the second encrypting module, the second sending module, the second receiving module and processing module in the host;
First encrypting module generates the information A and information C for encrypting;
Second encrypting module generates the information B for encrypting;
First sending module, for sending the information A and the information C;
Second sending module, for sending the information B;
First receiving module, for receiving the information B;
Second receiving module, for receiving the information A and the information C;
The input module, for inputting the key command of the remote controler;
The control module, for identification host;
The processing module, the remote controler, executes control instruction corresponding to key command for identification.
It specifically, further include the first memory module in the remote controler.
It specifically, further include the second memory module in the host.
Specifically, further include random information module in the host, obtained in conjunction with the date information and clock information of host
Random information P.
Specifically, the information A is encrypted comprising pre-stored first key and to the identification code A of the remote controler
Information;The information C includes that the identification code A to the remote controler and information Q based on random information P is encrypted, and is needed
The information decrypted with the first, second key;The information B is the identification code comprising the second pre-stored key and to the host
The information that B and random information P are encrypted.
Specifically, first memory module is configured as in remote controler production process or before putting into operation, by
The identification code A that tripartite mechanism generates at random is stored into the remote controler.
Specifically, first memory module is configured as in remote controler production process or before putting into operation, by
The first key and identification code A that tripartite mechanism generates at random are stored into the remote controler.
Specifically, first memory module is configured as in remote controler production process or before putting into operation, by
The Encryption Algorithm that tripartite mechanism generates information A is stored into the remote controler.
Specifically, first memory module is also stored with the algorithm general formula that information Q is converted to based on random information P.
Specifically, second memory module is configured as in host production process or before putting into operation, by third
The identification code B that square mechanism generates at random is stored into the host.
Specifically, second memory module is configured as in host production process or before putting into operation, by third
The second key and identification code B that square mechanism generates at random are stored into the host.Specifically, second memory module is configured
For in host production process or before putting into operation, the host is arrived in the Encryption Algorithm storage that the third-party institution generates information B
In.
Specifically, second memory module is also stored with the algorithm general formula that information Q is converted to based on random information P.
Optionally, the first key and second key are composite algorisms.
Specifically, the control module identifies the host by identification code B.
Specifically, the processing module identifies the remote controler by identification code A, by information Q identification with it is described
The random information P of host transmission matches, and then executes control instruction corresponding to key command.
Optionally, first sending module and the second sending module are bluetooth communications, infrared rays communication module, penetrate
At least one of frequency communication module, Zigbee communication module, wireless LAN communication module.
Specifically, the remote controler further includes alarm module, after the remote controler sends the information A, if preparatory
The information B that the host is sent is not received by the period of setting, then the remote controler issues alarm.
Specifically, the preset period is the very of short duration period, such as: 0.1 second, 0.2 second etc..
Optionally, the key command on the input module can be sent to host with information A or information C, can also be with information
A, information B and information C are travelled to and fro between the remote controler and host.
Compared with prior art, the present invention has following advantage:
1, in the present invention, remote controller response sends information A in key command, to host;After host receives information A, through sentencing
Disconnected is to send information B to remote controler with itself matched remote controler, host;Remote controler receive information B after, through judgement be and itself
Matched host, remote controler send the information C being converted to based on information B to host;After host receives information C, identify its it
The information B of preceding transmission is transmitted between each other according to the rule of agreement, after judging that remote controler is matched with itself again, with
Execute control instruction corresponding to key command.Judged twice in transmission process, between host and remote controler each other whether
Matching, then by verifying whether remote controller matches to the information C of host with the information B that host transmits, to remote controler and master
The matching of machine is verified, so that the risk that remote controler is stolen code substantially reduces, is solved and is directly being remotely controlled in the prior art
Key is stored in advance in device, and is easy the problem of cracking out key after causing signal illegally to be captured in transmission process.This hair
The bright attack tolerant that can enhance signal reduces the probability that key is illegally cracked, improves the safety of garage.
It 2, is the encrypted biography of information for verifying whether matching and sending mutually in the present invention, between remote control machine and host
It is defeated;Random information P is converted to information Q by algorithm to the information Q of host transmission Intrusion Detection based on host random information P by remote controler
After send;The attack tolerant of signal is enhanced, the probability that encryption information is illegally cracked is reduced, improves the safety of garage
Property.
3, in the present invention, first key, the second key, identification code A, identification code B, the encryption calculation for generating information A and information B
Method, the algorithm general formula that information Q is converted to based on random information P are generated by the third-party institution, and first key, second close
Key, identification code A and identification code B are that the third-party institution generates and unique at random, are avoided that remote controler is cracked in batches, improve
The safety of information transmission, solves the fixed key being stored in advance in remote controler in the prior art and is easy to be transmitted and know
The problem of dawn.
It 4, include the random information P of host by the information C that host is sent to remote controler, and as sent in the present invention
It is " date+clock " information that host is randomly generated, the data are unique and can not repeat, so that a possibility that stolen code significantly
It reduces.
5, in the present invention, after remote controler sends information A, if being not received by host hair within the preset period
The information B sent, then remote controler alarm module starts.In this way, causing between remote controler and host when encountering same frequency electromagnetic interference
When cannot normally receive and send information, this abnormal conditions can be found at once, are avoided the occurrence of people and are thought that remote controler has been ordered
Host is enabled to perform certain instruction, and the serious consequence being actually not carried out.
6, the present invention is also widely applied in addition to garage, needs other scenes controlled with remote controler, example
The remote control device of such as central air-conditioning.Related computer program can be loaded in intelligentized wireless control apparatus to realize
This recognition methods.
7, the additional characteristics and advantages of the present invention, will be set forth in part in the description, or practice through the invention
Recognize.
Detailed description of the invention
Fig. 1 is the information transferring method flow diagram in the specific embodiment of the invention;
Fig. 1 (a) is the information transmission process figure of remote controler in Fig. 1;
Fig. 1 (b) is the information transmission process figure of host in Fig. 1;
Fig. 2 is the structural schematic diagram of remote controler and host system in the present invention.
Attached drawing described herein is used to provide to further understand the embodiment of the present invention, constitutes one of the application
Point, do not constitute the restriction to the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below with reference to embodiment and attached drawing, to this
Invention is described in further detail.Exemplary embodiment and its explanation of the invention for explaining only the invention, is not made
For limitation of the invention.
It should be noted that a kind of thief-proof code remote controler recognition methods provided by the invention, except the remote control for garage
Outside device, the present invention is also widely applied to other scenes for needing to be controlled with remote controler, such as the remote control of central air-conditioning
Device etc..Related computer program can be loaded in intelligentized wireless control apparatus to realize this recognition methods.
Fig. 1 and Fig. 1 (a), Fig. 1 (b) are please referred to, is remote controler (can be automobile remote controllers) and host (can be carbarn
Host) between a kind of exemplary embodiments of thief-proof code remote controler recognition methods, specifically includes the following steps:
S11 sends information A in response to key command.
According to one embodiment of present invention, information A is the knowledge comprising pre-stored first key and to the remote controler
The information that other code A is encrypted;
Specifically, in remote controler production process or before putting into operation, identification code A that the third-party institution will generate at random
It stores in the remote controler.
Specifically, in remote controler production process or before putting into operation, the third-party institution is close by generate at random first
Key and identification code A storage are into the remote controler.
Specifically, in remote controler production process or before putting into operation, the encryption for generating information A is calculated by the third-party institution
Method is stored into the remote controler.
Specifically, in remote controler production process or before putting into operation, the third-party institution will be converted based on random information P
It stores for the algorithm general formula of information Q into the remote controler.
Specifically, the third-party institution generates identification code A and first key at random, and preferably identification code A is set as being directed to
Different remote controlers is different, and to improve safety, first key can be rolling code, generates the calculation of identification code A and first key
Method can be the customized special algorithm program being stored in the third-party institution of operation and be realized, be also possible to any existing
Algorithm.
Specifically, the information that the third-party institution will need to store to remote controler, is stored by wired or wireless mode
In the storage device of remote controler, specific sending method is in the present embodiment without limitation.The storage device can simultaneously by with
Store the program or data of the remote controler, be also possible to be specifically used to store identification code A, first key, generate information A's plus
Close algorithm, be converted to based on random information P information Q algorithm general formula specific storage device, such as special storage chip,
To improve the safety of information storage.Since first key, identification code A are randomly generated and uniquely, it is avoided that remote controler quilt
Batch cracks, and improves the safety of information transmission.
It is understood that the storage device of remote controler can use high-speed random access memory in the present invention, may be used also
To include nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.
In a preferred embodiment, the safety of first key in order to further increase reduces memory and is illegally used
Family obtains the risk of key using chip reverse engineering, and the storage device is all made of ferroelectric RAM.
S21 after host receives information A, is and itself matched remote controler, sends information B through judgement.
According to one embodiment of present invention, after host receives the information A, the information A is decrypted by first key,
Obtain the identification code A of the remote controler;After identifying that A judges that the remote controler is matched with itself, host sends information B, letter
Breath B is comprising the second pre-stored key and the information encrypted to the identification code B and random information P of the host.
Specifically, in host production process or before putting into operation, the third-party institution deposits the identification code B generated at random
It stores up in the host.
Specifically, in host production process or before putting into operation, the second key that the third-party institution will generate at random
With identification code B storage into the host.
Specifically, in host production process or before putting into operation, the third-party institution will generate the Encryption Algorithm of information B
It stores in the host.
Specifically, in host production process or before putting into operation, the third-party institution will be converted to based on random information P
The algorithm general formula of information Q is stored into the host.
Specifically, the third-party institution generates identification code B and the second key at random, i.e. identification code B is directed to different hosts
It is different, but matches with the identification code A in the remote controler above-mentioned to match.Further, to improve safety, the
Two keys can be rolling code, and the algorithm for generating identification code B and the second key can be that operation is customized to be stored in third party
Special algorithm program in mechanism is realized, any existing algorithm is also possible to.Since identification code B is randomly generated and uniquely
, so that host can only communicate between the remote controler to match, moreover it is possible to avoid host from being cracked in batches, improve information transmission
Safety.Certainly, in actual production application, for convenience of mass production, applied on all remote controler and host
Identification code also can be set as it is same.When being immobilized in the present invention by the identification code that the third-party institution generates, i.e. institute
Identification code of some remote controlers in host all when, remote controler and host can by random by study in a manner of realize and match
It is right, so that remote controler and host can not have to bind together in sale, it is also convenient for after-sale service and batch production.
The information that the third-party institution will need to store to host, the storage of host is stored by wired or wireless mode
In device, specific sending method is in the present embodiment without limitation.The storage device can be used to store the host simultaneously
Program or data, be also possible to be specifically used to store identification code B, the second key, the Encryption Algorithm for generating information B, based on
Machine information P is converted to the specific storage device of the algorithm general formula of information Q, such as special storage chip, is deposited with improving information
The safety of storage.Since the second key, identification code B are randomly generated and uniquely, it is avoided that and is cracked in batches, improve information
The safety of transmission.
It is understood that the storage device of host can use high-speed random access memory in the present invention, it can be with
Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.
In a preferred embodiment, the safety of the second key in order to further increase reduces memory and is illegally used
Family obtains the risk of the second key using chip reverse engineering, and the storage device is all made of ferroelectric RAM.
Specifically, its information being randomly generated that host is sent in the present embodiment has uncertainty, greatly reduces non-
A possibility that method is intercepted and captured and is cracked.
Preferably, what host sent in the present embodiment is " date+clock " information that it is randomly generated, and every information is all
Uniquely, it will not repeat, further reduce a possibility that illegally intercepting and capturing and crack.
S12, remote controler receive information B after, through judgement be with itself matched host, then send the information based on information B
C。
According to one embodiment of present invention, after remote controler receives the information B, the information is decrypted by the second key
B obtains the identification code B of the host;After identifying that the host is matched, remote controler sends the information C based on information B, letter
Breath C is encrypted comprising the identification code A to the remote controler and information Q based on random information P, and need to be close with first, second
The information of key decryption.
Specifically, general formula at the algorithm of information Q is converted to based on random information P to be stored in remote controler.
Optionally, the first key and second key are composite algorisms.
Preferably, in embodiment, after remote controler sends information A, if within the preset period, such as 0.1
In second, it is not received by the information B of host transmission, then remote controler is alarmed.If encountering same frequency electromagnetic interference, lead to remote controler
When cannot normally receive between host and send information, this abnormal conditions can be found at once.
S22, host receive information C, through judgement be with itself matched remote controler, immediately execute key command corresponding to
Control instruction.
According to one embodiment of present invention, after host receives the information C, pass through the first, second key decryption information
C judges that the remote controler is matched with itself by identification code A, passes through the random letter of information Q judgement and host transmission
Breath P matches, and then executes control instruction corresponding to key command.
Preferably, random information P can be " date+clock " information that host is randomly generated.Since what host transmitted is
The impossible duplicate information being randomly generated, after receiving, decrypt, handle through remote controler and being transferred to host, as host acknowledgement is sent out
The information Q returned is matched with the random information P of sending, then highly demonstrates the matching degree of remote controler and host, reduce stolen
A possibility that code.For verifying remote controler with after host matching, host executes control instruction corresponding to key command again.
Specifically, described sender formula can be Blue-tooth communication method, infrared communication mode, radio communication mode,
One of Zigbee communication mode, wireless LAN traffic mode or any combination thereof.
Control instruction corresponding to the key command that host executes, optionally, in one embodiment, the key command
Carry out self-information A;In another embodiment, the key command carrys out self-information C;In other embodiments, key command can also
It travels to and fro between the remote controler and the host with the information A, information B and information C encryption, and is finally executed by host.
Fig. 2 shows the specific block diagrams of thief-proof code remote controler identification device remote controler and host of the invention.Referring to figure
2, remote controler 100 includes control unit 101, and the first transmitting unit 102, first being electrically connected with control unit 101 adds
Close unit 103, display unit 104, the first receiving unit 105, input unit 106, the first power supply 107 and the first storage unit
108, the first decryption unit 109 and alarm unit 10A.Corresponding, the host 200 includes processing unit 201, with processing
The second receiving unit 202 that unit 201 is electrically connected, the second decryption unit 203, comparing unit 204, the second transmitting unit
205, the second storage unit 206, second source 207, the second encryption unit 208 and random information unit 209.Those skilled in the art
Member is it is to be understood that the remote controler 100 of the thief-proof code remote controler identification device of garage shown in Figure 2 and the knot of host 200
Structure does not constitute the restriction to it, may include perhaps combining certain components or difference than illustrating more or fewer components
Component layout.
Below with reference to Fig. 2 to the remote controler 100 and host 200 of the thief-proof code remote controler identification device of garage in the present embodiment
Each component specifically introduce.
First transmitting unit 102 and the second receiving unit 202, the second transmitting unit 205 and the first receiving unit 105
Homogeneous communication agreement should be used, and communications band should be consistent, and be preferably, but not limited to be bluetooth communication, infrared ray
One of communication module, radio-frequency communication module, Zigbee communication module, wireless LAN communication module or any combination thereof.It is described
First power supply 107 and second source 207 to remote controler 100 and host 200 for powering respectively.
First by the third-party institution by pre-generated identification code A, first key, the Encryption Algorithm for generating information A, be based on
Random information P is converted to the algorithm general formula of information Q, is stored in first in 100 production process of remote controler or before putting into operation
In storage unit 108;By pre-generated identification code B, the second key, the Encryption Algorithm for generating information B, it is based on random information P
The algorithm general formula for being converted to information Q stores in 200 production process of host or before putting into operation to the second storage unit 206
In.It is understood that first storage unit 108 and the second storage unit 206 may include high random access storage
Device can also include nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Memory device.In a preferred embodiment, the safety of key in order to further increase reduces memory by illegal user
The risk of key is obtained using chip reverse engineering, the storage unit is all made of ferroelectric RAM.
The input unit 106 being arranged on remote controler 100 can be physical button, is also possible to touch panel or other are defeated
Enter equipment.Wherein touch panel, also referred to as touch screen, collecting the touch operation of user on it or nearby, (for example user makes
With the operation of any suitable object or attachment such as finger, stylus on touch panel or near touch panel), and according to pre-
The formula first set drives corresponding attachment device.Optionally, touch panel can use resistance-type, condenser type, infrared ray with
And the multiple types such as surface acoustic wave realize the touch panel.In addition to touch panel, input unit can also include function key (ratio
Such as switch key), trace ball, mouse, one of operating stick etc. or a variety of.
In one embodiment, it is provided with the key for sending study identification code in the input unit 106 of remote controler, presses this
Key after control unit 101 receives control instruction corresponding to the key, reads from the first storage unit 108 and deposits in advance
The first key and identification code A of storage, the first encryption unit 103 encrypt first key and identification code A to obtain information A, the
One transmitting unit 102 sends information A to host 200.After second receiving unit 202 receives information A in host 200, pass through
Processing unit 201 is sent to the second decryption unit 203.In the second decryption unit 203, by first key solution confidential information A, obtain
To the identification code A of remote controler;Then 201 from the second storage unit 206 to read pre-stored second close through the processing unit
Key and identification code B, the second encryption unit 208 encrypt the second key and identification code B to obtain information B, the second transmitting unit
205 send information B to remote controler 100.After 100 first receiving unit 105 of remote controler receives information B, pass through control unit
101 are sent to the first decryption unit 109.In the first decryption unit 109, by the second key decryption information B, host is obtained
Identification code B.Thus between achievable remote controler 100 and host 200 identification code learning process.Of course for convenient for operation and increasing
Add user perceptibility, a display unit 104 can be set in remote controler 100, for showing characterization " data are sent successfully " etc.
Printed words;Similarly, in host 200, display unit can be set also to show the information of characterization " identification code learning success ".It is more simple
Just one is achieved in that, by being mounted on the LED light of remote controler 100 or host 200 or the alarm list of buzzer etc
Member carries out the alarm signal confirmation of light and/or sound, improves user perceptibility.
After the study that remote controler 100 and host 200 complete identification code, can transmission response pressed in input unit 106
Key instruction.In remote controler 100, user presses the button on input unit 106, after control unit 101 receives the key, refers to
The first encryption unit 103 is enabled to encrypt to form information A to the first key and identification code A that are pre-stored in the first storage unit 108, and
Emitted by the first transmitting unit 102.
In host 200, after the second receiving unit 202 receives information A, processing unit 201 instructs the second decryption unit
203, by first key solution confidential information A, obtain identification code A.Processing unit 201 according to identification code A judge the remote controler 100 with
Host 200 matches, and then 201 pre-stored second key and knowledge is read from the second storage unit 206 through the processing unit
Other code B, by random information unit 209 read random information P, the second encryption unit 208 to the second key, identification code B and with
Machine information P is encrypted to obtain information B, and the second transmitting unit 205 sends information B to remote controler 100.
In remote controler 100, after the first receiving unit 105 receives information B, first decryption of the instruction of control unit 101 is single
Member 109 obtains identification code B and random information by the second key decryption information B.Control unit 101 should according to identification code B judgement
Host 200 is matched with remote controler 100, is then read from the first storage unit 108 and is converted to information Q's based on random information P
Algorithm general formula, instruction the first encryption unit 103 by random information P, algorithmically general formula is converted to information Q, and to identification code A, be based on
The information Q of random information P is encrypted, and obtains the information C that need to be decrypted with the first, second key, and pass through the first transmitting unit
102 transmittings.
Preferably, in remote controler 100, if the first receiving unit 105 does not receive within the preset period
The information B sent to host, then alarm unit 10A starts.
In host 200, after the second receiving unit 202 receives information C, processing unit 201 instructs the second decryption unit
203, by the first, second key decryption information C, obtain identification code A and information Q.Processing unit 201 should according to identification code A judgement
Remote controler 100 is matched with host 200, and the random information P that verification information Q is transmitted with the host matches, and then processing is single
Member 201 executes control instruction corresponding to key command.
Host 200 executes control instruction corresponding to key command, and optionally, in one embodiment, the key refers to
It enables and carrys out self-information A;In another embodiment, the key command carrys out self-information C;In other embodiments, key command
It can encrypt and be travelled to and fro between the remote controler 100 and the host 200 with the information A, information B and information C, and finally be led
Machine 200 executes.
Specifically, the communication mode between the remote controler 100 and host 200 can be Blue-tooth communication method, infrared ray
One of communication mode, radio communication mode, Zigbee communication mode, wireless LAN traffic mode or any combination thereof.
In conclusion remote controller response sends information A in key command, to host, and information A includes to prestore in the present invention
The first key of storage and the information that the identification code A of remote controler is encrypted;After host receives information A, identified code A judgement is
With itself matched remote controler, then host sends information B to remote controler, and information B is comprising pre-stored the second key and right
The information that the identification code B of host and the random information P of host are encrypted;Remote controler receives information B, and identified code B judgement is
With itself matched host, then remote controler sends the information C being converted to based on information B to host, and information C includes to described
The letter that the identification code A of remote controler, the information Q based on random information P are encrypted, and need to be decrypted with the first, second key
Breath;After host receives information C, judge that remote controler and host match, and after identification information Q and random information P match, immediately
Execute control instruction corresponding to key command.As it can be seen that only matched remote controler and host can be just in communication with each other, and further
By the first, second key decryption information C, verifies the random information P that the information Q of remote controller is transmitted with host and match
Afterwards, control instruction is just executed.During entire transmission instruction, multiple authentication is carried out between remote controler and host, really
The safety of matching and the instruction transmission of remote controler and host is protected.The present invention can enhance the attack tolerant of signal, reduce letter
Number probability illegally cracked, improves the safety of garage.
Further, the identification code A of remote controler in the present invention, first key, the Encryption Algorithm for generating information A, based on
Machine information P be converted to the algorithm general formula of information Q and the identification code B of host, the second key, the Encryption Algorithm for generating information B,
Be based on the random information P algorithm general formula for being converted to information Q generated by the third-party institution, and first key, the second key, know
Other code A and identification code B is that the third-party institution generates and unique at random, is avoided that the batch of remote controler and host cracks, mentions
The high safety of information transmission, solves the fixed key being stored in advance in remote controler and host in the prior art and is easy quilt
The problem propagated and known.Especially, the information that host is sent is to be randomly generated, and further increases the difficulty cracked, increases vapour
The safety in garage.
Further, after remote controler sends information A in the present invention, if do not received within the preset period
The information B sent to host, then remote controler is alarmed.If encountering same frequency electromagnetic interference, cause between remote controler and host not
When can normally receive and send information, this abnormal conditions can be found at once.
In the instructions provided here, although the description of a large amount of detail, however, it is to be understood that of the invention
Embodiment can be practiced without these specific details.
It will be apparent to one skilled in the art that in the case where not departing from the principle of the present invention or spirit, it can be to implementation
Example makes a change.
Claims (9)
1. a kind of thief-proof code remote controler recognition methods is suitable for remote-controlled switchgear, it is characterised in that the following steps are included:
(1) remote controller response sends information A in its key command;
(2) host identifies remote controler;
(3) host sends information B;
(4) remote controler receives information B, identifies host;
(5) remote controler sends the information C based on information B;
(6) after host identification remote controler, control instruction corresponding to key command is executed.
2. thief-proof code remote controler recognition methods according to claim 1, it is characterised in that:
In the step (1), information A is encrypted comprising pre-stored first key and to the identification code A of the remote controler
Information;
In the step (2), after host receives the information A, the information A is decrypted by first key, obtains the remote control
The identification code A of device identifies that the remote controler is matched with this;
In the step (3), information B is the identification code B and random information P comprising the second pre-stored key and to the host
The information encrypted;
In the step (4), after remote controler receives the information B, the information B is decrypted by the second key, obtains the master
The identification code B of machine identifies that the host is matched with this;
In the step (5), information C includes that the identification code A to the remote controler and information Q based on random information P adds
Information that is close, and need to being decrypted with the first, second key;
In the step (6), after host receives the information C, by the first, second key decryption information C, pass through the remote control
The identification code A of device identifies that the remote controler is matched, passes through the random information P of information Q identification and host transmission
Match, then executes control instruction corresponding to key command.
3. thief-proof code remote controler recognition methods according to claim 2, it is characterised in that: random in the step (3)
Information P is the date and the obtained information of clock in conjunction with host.
4. thief-proof code remote controler recognition methods according to claim 2, it is characterised in that: the information Q in the step (5)
It is the algorithm process based on random information P, algorithm general formula is stored in the host and remote controler.
5. thief-proof code remote controler recognition methods according to claim 2, it is characterised in that: the first key, second close
Key is third-party institution's generation, has been respectively stored in corresponding remote controler or host in process of production or before putting into operation
In.
6. thief-proof code remote controler recognition methods according to claim 2, it is characterised in that: the first key and described the
Two keys are composite algorisms.
7. thief-proof code remote controler recognition methods according to claim 2, which is characterized in that described sender formula is that bluetooth is logical
Letter mode, infrared communication mode, radio communication mode, Zigbee communication mode, at least one in wireless LAN traffic mode
Kind.
8. thief-proof code remote controler recognition methods according to any one of claim 1 to 7, it is characterised in that: the remote control
After device sends the information A, if being not received by the information B that the host is sent within the preset period,
Then the remote controler issues alarm.
9. a kind of thief-proof code remote controler identification device for running claim 1, including remote controler and host, which is characterized in that institute
Stating in remote controler has the first encrypting module, the first sending module, the first receiving module, input module and control module;The master
There are the second encrypting module, the second sending module, the second receiving module and processing module in machine;
First encrypting module generates the information A and information C for encrypting;
Second encrypting module generates the information B for encrypting;
First sending module, for sending the information A and the information C;
Second sending module, for sending the information B;
First receiving module, for receiving the information B;
Second receiving module, for receiving the information A and the information C;
The input module, for inputting the key command of the remote controler;
The control module, for identification host;
The processing module, the remote controler, executes control instruction corresponding to key command for identification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811032361.9A CN109272729B (en) | 2018-09-05 | 2018-09-05 | Identification method and device for anti-theft code remote controller |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811032361.9A CN109272729B (en) | 2018-09-05 | 2018-09-05 | Identification method and device for anti-theft code remote controller |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109272729A true CN109272729A (en) | 2019-01-25 |
CN109272729B CN109272729B (en) | 2024-02-13 |
Family
ID=65187203
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811032361.9A Active CN109272729B (en) | 2018-09-05 | 2018-09-05 | Identification method and device for anti-theft code remote controller |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109272729B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113819587A (en) * | 2021-09-09 | 2021-12-21 | 青岛海尔空调器有限总公司 | Method and device for controlling air conditioner and air conditioner |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR19990055729A (en) * | 1997-12-27 | 1999-07-15 | 김영환 | Automobile anti-theft device using variable encryption code method |
KR20010048952A (en) * | 1999-11-30 | 2001-06-15 | 구자홍 | remote control system and method of the same |
CN101964032A (en) * | 2010-09-03 | 2011-02-02 | 深圳创维数字技术股份有限公司 | System and method for control permission of fingerprint identification |
CN103096165A (en) * | 2013-01-05 | 2013-05-08 | 中国传媒大学 | Method for certification between digital television set-top box and remote control unit |
CN105006051A (en) * | 2015-07-31 | 2015-10-28 | 深圳广田智能科技有限公司 | Wireless communication method and system of intelligent remote control door lock |
CN105235642A (en) * | 2015-10-28 | 2016-01-13 | 铁将军汽车电子有限公司 | Control order safety execution method and vehicle alarm host |
CN105262586A (en) * | 2015-10-28 | 2016-01-20 | 铁将军汽车电子有限公司 | Key distribution method and apparatus for automobile theftproof equipment |
CN105416234A (en) * | 2015-10-28 | 2016-03-23 | 铁将军汽车电子有限公司 | Control instruction secure transmission method and automobile anti-theft remote controller |
CN106487517A (en) * | 2016-09-30 | 2017-03-08 | 北京瑞卓喜投科技发展有限公司 | data encryption and decryption method and device |
CN208834479U (en) * | 2018-09-05 | 2019-05-07 | 吴贤忠 | Thief-proof code remote controler identification device |
-
2018
- 2018-09-05 CN CN201811032361.9A patent/CN109272729B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR19990055729A (en) * | 1997-12-27 | 1999-07-15 | 김영환 | Automobile anti-theft device using variable encryption code method |
KR20010048952A (en) * | 1999-11-30 | 2001-06-15 | 구자홍 | remote control system and method of the same |
CN101964032A (en) * | 2010-09-03 | 2011-02-02 | 深圳创维数字技术股份有限公司 | System and method for control permission of fingerprint identification |
CN103096165A (en) * | 2013-01-05 | 2013-05-08 | 中国传媒大学 | Method for certification between digital television set-top box and remote control unit |
CN105006051A (en) * | 2015-07-31 | 2015-10-28 | 深圳广田智能科技有限公司 | Wireless communication method and system of intelligent remote control door lock |
CN105235642A (en) * | 2015-10-28 | 2016-01-13 | 铁将军汽车电子有限公司 | Control order safety execution method and vehicle alarm host |
CN105262586A (en) * | 2015-10-28 | 2016-01-20 | 铁将军汽车电子有限公司 | Key distribution method and apparatus for automobile theftproof equipment |
CN105416234A (en) * | 2015-10-28 | 2016-03-23 | 铁将军汽车电子有限公司 | Control instruction secure transmission method and automobile anti-theft remote controller |
CN106487517A (en) * | 2016-09-30 | 2017-03-08 | 北京瑞卓喜投科技发展有限公司 | data encryption and decryption method and device |
CN208834479U (en) * | 2018-09-05 | 2019-05-07 | 吴贤忠 | Thief-proof code remote controler identification device |
Non-Patent Citations (2)
Title |
---|
张袁志;张延练;: "高速遥测PCM数据加密方法研究与实现", 科技创新导报, no. 15 * |
淡海英;杨梵;: "基于活体指纹传感器MBF310的防盗遥控器的设计", 广西轻工业, no. 12 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113819587A (en) * | 2021-09-09 | 2021-12-21 | 青岛海尔空调器有限总公司 | Method and device for controlling air conditioner and air conditioner |
WO2023035690A1 (en) * | 2021-09-09 | 2023-03-16 | 青岛海尔空调器有限总公司 | Method and apparatus for controlling air conditioner, and air conditioner |
Also Published As
Publication number | Publication date |
---|---|
CN109272729B (en) | 2024-02-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105141584B (en) | A kind of equipment authentication method and device of smart home system | |
CN105118127B (en) | A kind of guest system and control method thereof | |
CN108122311B (en) | Vehicle virtual key implementation method and system | |
CN106034028A (en) | Terminal equipment authentication method, apparatus and system thereof | |
WO2018127081A1 (en) | Method and system for obtaining encryption key | |
CN103929307A (en) | Password input method, intelligent secret key device and client device | |
CN109618334B (en) | Control method and related equipment | |
WO2019203306A1 (en) | Sharing system | |
CN105472192A (en) | Intelligent equipment capable of realizing control safety authorization and sharing, terminal equipment and method | |
CN106850664B (en) | Internet of things terminal security control method and system based on intelligent mobile terminal | |
CN105245552A (en) | Intelligent equipment, terminal equipment and method for implementing safe control authorization | |
CN108712246B (en) | Intelligent household equipment and system and visitor password acquisition method | |
CN107989514A (en) | There is the safety box of dynamic password | |
WO2018133675A1 (en) | Key update method, device and system | |
CN106850540A (en) | A kind of terminal control method, terminal and system | |
CN105235642B (en) | Control instruction executes safely method and main machine for car theft-proof device | |
CN105636037A (en) | Authentication method and apparatus and electronic device | |
CN108288315A (en) | A kind of smart lock control system, open method and storage medium | |
EP3752940A1 (en) | Updating biometric template protection keys | |
CN103152326A (en) | Distributed authentication method and authentication system | |
CN109922022A (en) | Internet of Things communication means, platform, terminal and system | |
CN208834479U (en) | Thief-proof code remote controler identification device | |
CN104702566A (en) | Use authorization method and use authorization device for virtual equipment | |
KR101197213B1 (en) | Authentication system and method based by positioning information | |
CN109272729A (en) | Thief-proof code remote controler recognition methods and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |