CN109272729A - Thief-proof code remote controler recognition methods and device - Google Patents

Thief-proof code remote controler recognition methods and device Download PDF

Info

Publication number
CN109272729A
CN109272729A CN201811032361.9A CN201811032361A CN109272729A CN 109272729 A CN109272729 A CN 109272729A CN 201811032361 A CN201811032361 A CN 201811032361A CN 109272729 A CN109272729 A CN 109272729A
Authority
CN
China
Prior art keywords
information
remote controler
host
key
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811032361.9A
Other languages
Chinese (zh)
Other versions
CN109272729B (en
Inventor
吴煜行
竺子乔
吴贤忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811032361.9A priority Critical patent/CN109272729B/en
Publication of CN109272729A publication Critical patent/CN109272729A/en
Application granted granted Critical
Publication of CN109272729B publication Critical patent/CN109272729B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C23/00Non-electrical signal transmission systems, e.g. optical systems
    • G08C23/04Non-electrical signal transmission systems, e.g. optical systems using light waves, e.g. infrared
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/60Security, fault tolerance
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/60Security, fault tolerance
    • G08C2201/62Rolling code

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention discloses a kind of thief-proof code remote controler recognition methods and its device, it specifically can comprise the following steps that (1) remote controller response in its key command, sends information A;(2) host identifies remote controler;(3) host sends information B;(4) remote controler receives information B, identifies host;(5) remote controler sends the information C based on information B;(6) after host identification remote controler, control instruction corresponding to key command is executed.The present invention solves and key is directly stored in advance in remote controler in the prior art, and is easy the problem of cracking out key after causing signal illegally to be captured in transmission process.The present invention can enhance the attack tolerant of signal by " date+clock " information that the information C that host is sent to remote controler may include that host is randomly generated, and reduce the probability that key is illegally cracked, improve the safety of garage.

Description

Thief-proof code remote controler recognition methods and device
Technical field
The present invention relates to remote control device technical fields, more specifically, be a kind of thief-proof code remote controler recognition methods and its Device.
Background technique
With the rapid development of society, automobile becomes the main vehicles of people's daily trip.With the number of private car Amount increases, and automobile is stolen also to have evolved into the social concern got worse.
The electronic type anti-theft technique of garage at present generallys use and sends terminal such as remote controler to send with identification code Information controls garage door to the receiving host for being set to garage.General application scenarios are, in advance in remote controler and host Fixed key and identification code are stored, the identification code that remote controler sends by fixed key encryption is formed by information, is set to vapour The host in garage receives and uses fixed key solution confidential information, reads identification code, by the identification code and pre-stored identification code It compares, corresponding operation is then executed according to comparison result.But the encryption method list that current electronic type anti-theft technique uses One, the anti-interference for transmitting instruction is poor, makes information easily by illegality equipment using the fixed key without any encryption It intercepts and captures and cracks by the methods of aerial signal acquisition and scan tracing, safety is low.
Therefore, how a kind of thief-proof code remote controler recognition methods and device are provided, the attack tolerant of signal is enhanced, improves vehicle Safety, be those skilled in the art's technical issues that need to address.
Summary of the invention
Present invention seek to address that the above problem, a kind of thief-proof code remote controler recognition methods and device are provided, guarantees remote control It can accurately be matched between device and host, to guarantee that control instruction is safely transmitted.
To achieve the above object, the present invention adopts the following technical scheme:
The present invention provides a kind of thief-proof code remote controler recognition methods, the remote control switch suitable for garage burglary-resisting installation is filled It sets, comprising the following steps:
(1) remote controller response sends information A in its key command;
(2) host identifies remote controler;
(3) host sends information B;
(4) remote controler receives information B, identifies host;
(5) remote controler sends the information C based on information B;
(6) after host identification remote controler, control instruction corresponding to key command is executed.
Further, in the step (1), information A is the knowledge comprising pre-stored first key and to the remote controler The information that other code A is encrypted;
In the step (2), after host receives the information A, the information A is decrypted by first key, is obtained described The identification code A of remote controler identifies that the remote controler is matched with this;
In the step (3), information B is comprising pre-stored the second key and to the identification code B of the host and random The information that information P is encrypted;
In the step (4), after remote controler receives the information B, the information B is decrypted by the second key, obtains institute The identification code B of host is stated, identifies that the host is matched with this;
In the step (5), information C include the identification code A to the remote controler and information Q based on random information P into Row encryption, and the information that need to be decrypted with the first, second key;
In the step (6), after host receives the information C, by the first, second key decryption information C, by described The identification code A of remote controler identifies that the remote controler is matched, passes through the random letter of information Q identification and host transmission Breath P matches, and then executes control instruction corresponding to key command.
Preferably, the random information P in the step (3) is the date in conjunction with host and the obtained information of clock.
Optionally, the information Q in the step (5) is the algorithm process based on random information P, and algorithm general formula is stored in In the host and remote controler.
Optionally, the first key, the second key are third-party institution's generation, in process of production or put it into operation It is preceding to be respectively stored in corresponding remote controler or host.
Optionally, the first key and second key are composite algorisms.
Optionally, described sender formula is Blue-tooth communication method, infrared communication mode, radio communication mode, Zigbee At least one of communication mode, wireless LAN traffic mode.
Further, after the remote controler sends the information A, if be not received by within the preset period The information B that the host is sent, then the remote controler issues alarm.Specifically, the preset period is very short The temporary period, such as: 0.1 second, 0.2 second etc..
Optionally, the key command can be sent to host with information A or information C, can also be with information A, information B and information C is travelled to and fro between the remote controler and host.
The present invention also provides a kind of thief-proof code remote controler identification devices, including remote controler and host, are remotely controlled machine and master Machine respectively include: have the first encrypting module, the first sending module, the first receiving module, input module and control in the remote controler Molding block;There are the second encrypting module, the second sending module, the second receiving module and processing module in the host;
First encrypting module generates the information A and information C for encrypting;
Second encrypting module generates the information B for encrypting;
First sending module, for sending the information A and the information C;
Second sending module, for sending the information B;
First receiving module, for receiving the information B;
Second receiving module, for receiving the information A and the information C;
The input module, for inputting the key command of the remote controler;
The control module, for identification host;
The processing module, the remote controler, executes control instruction corresponding to key command for identification.
It specifically, further include the first memory module in the remote controler.
It specifically, further include the second memory module in the host.
Specifically, further include random information module in the host, obtained in conjunction with the date information and clock information of host Random information P.
Specifically, the information A is encrypted comprising pre-stored first key and to the identification code A of the remote controler Information;The information C includes that the identification code A to the remote controler and information Q based on random information P is encrypted, and is needed The information decrypted with the first, second key;The information B is the identification code comprising the second pre-stored key and to the host The information that B and random information P are encrypted.
Specifically, first memory module is configured as in remote controler production process or before putting into operation, by The identification code A that tripartite mechanism generates at random is stored into the remote controler.
Specifically, first memory module is configured as in remote controler production process or before putting into operation, by The first key and identification code A that tripartite mechanism generates at random are stored into the remote controler.
Specifically, first memory module is configured as in remote controler production process or before putting into operation, by The Encryption Algorithm that tripartite mechanism generates information A is stored into the remote controler.
Specifically, first memory module is also stored with the algorithm general formula that information Q is converted to based on random information P.
Specifically, second memory module is configured as in host production process or before putting into operation, by third The identification code B that square mechanism generates at random is stored into the host.
Specifically, second memory module is configured as in host production process or before putting into operation, by third The second key and identification code B that square mechanism generates at random are stored into the host.Specifically, second memory module is configured For in host production process or before putting into operation, the host is arrived in the Encryption Algorithm storage that the third-party institution generates information B In.
Specifically, second memory module is also stored with the algorithm general formula that information Q is converted to based on random information P.
Optionally, the first key and second key are composite algorisms.
Specifically, the control module identifies the host by identification code B.
Specifically, the processing module identifies the remote controler by identification code A, by information Q identification with it is described The random information P of host transmission matches, and then executes control instruction corresponding to key command.
Optionally, first sending module and the second sending module are bluetooth communications, infrared rays communication module, penetrate At least one of frequency communication module, Zigbee communication module, wireless LAN communication module.
Specifically, the remote controler further includes alarm module, after the remote controler sends the information A, if preparatory The information B that the host is sent is not received by the period of setting, then the remote controler issues alarm.
Specifically, the preset period is the very of short duration period, such as: 0.1 second, 0.2 second etc..
Optionally, the key command on the input module can be sent to host with information A or information C, can also be with information A, information B and information C are travelled to and fro between the remote controler and host.
Compared with prior art, the present invention has following advantage:
1, in the present invention, remote controller response sends information A in key command, to host;After host receives information A, through sentencing Disconnected is to send information B to remote controler with itself matched remote controler, host;Remote controler receive information B after, through judgement be and itself Matched host, remote controler send the information C being converted to based on information B to host;After host receives information C, identify its it The information B of preceding transmission is transmitted between each other according to the rule of agreement, after judging that remote controler is matched with itself again, with Execute control instruction corresponding to key command.Judged twice in transmission process, between host and remote controler each other whether Matching, then by verifying whether remote controller matches to the information C of host with the information B that host transmits, to remote controler and master The matching of machine is verified, so that the risk that remote controler is stolen code substantially reduces, is solved and is directly being remotely controlled in the prior art Key is stored in advance in device, and is easy the problem of cracking out key after causing signal illegally to be captured in transmission process.This hair The bright attack tolerant that can enhance signal reduces the probability that key is illegally cracked, improves the safety of garage.
It 2, is the encrypted biography of information for verifying whether matching and sending mutually in the present invention, between remote control machine and host It is defeated;Random information P is converted to information Q by algorithm to the information Q of host transmission Intrusion Detection based on host random information P by remote controler After send;The attack tolerant of signal is enhanced, the probability that encryption information is illegally cracked is reduced, improves the safety of garage Property.
3, in the present invention, first key, the second key, identification code A, identification code B, the encryption calculation for generating information A and information B Method, the algorithm general formula that information Q is converted to based on random information P are generated by the third-party institution, and first key, second close Key, identification code A and identification code B are that the third-party institution generates and unique at random, are avoided that remote controler is cracked in batches, improve The safety of information transmission, solves the fixed key being stored in advance in remote controler in the prior art and is easy to be transmitted and know The problem of dawn.
It 4, include the random information P of host by the information C that host is sent to remote controler, and as sent in the present invention It is " date+clock " information that host is randomly generated, the data are unique and can not repeat, so that a possibility that stolen code significantly It reduces.
5, in the present invention, after remote controler sends information A, if being not received by host hair within the preset period The information B sent, then remote controler alarm module starts.In this way, causing between remote controler and host when encountering same frequency electromagnetic interference When cannot normally receive and send information, this abnormal conditions can be found at once, are avoided the occurrence of people and are thought that remote controler has been ordered Host is enabled to perform certain instruction, and the serious consequence being actually not carried out.
6, the present invention is also widely applied in addition to garage, needs other scenes controlled with remote controler, example The remote control device of such as central air-conditioning.Related computer program can be loaded in intelligentized wireless control apparatus to realize This recognition methods.
7, the additional characteristics and advantages of the present invention, will be set forth in part in the description, or practice through the invention Recognize.
Detailed description of the invention
Fig. 1 is the information transferring method flow diagram in the specific embodiment of the invention;
Fig. 1 (a) is the information transmission process figure of remote controler in Fig. 1;
Fig. 1 (b) is the information transmission process figure of host in Fig. 1;
Fig. 2 is the structural schematic diagram of remote controler and host system in the present invention.
Attached drawing described herein is used to provide to further understand the embodiment of the present invention, constitutes one of the application Point, do not constitute the restriction to the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below with reference to embodiment and attached drawing, to this Invention is described in further detail.Exemplary embodiment and its explanation of the invention for explaining only the invention, is not made For limitation of the invention.
It should be noted that a kind of thief-proof code remote controler recognition methods provided by the invention, except the remote control for garage Outside device, the present invention is also widely applied to other scenes for needing to be controlled with remote controler, such as the remote control of central air-conditioning Device etc..Related computer program can be loaded in intelligentized wireless control apparatus to realize this recognition methods.
Fig. 1 and Fig. 1 (a), Fig. 1 (b) are please referred to, is remote controler (can be automobile remote controllers) and host (can be carbarn Host) between a kind of exemplary embodiments of thief-proof code remote controler recognition methods, specifically includes the following steps:
S11 sends information A in response to key command.
According to one embodiment of present invention, information A is the knowledge comprising pre-stored first key and to the remote controler The information that other code A is encrypted;
Specifically, in remote controler production process or before putting into operation, identification code A that the third-party institution will generate at random It stores in the remote controler.
Specifically, in remote controler production process or before putting into operation, the third-party institution is close by generate at random first Key and identification code A storage are into the remote controler.
Specifically, in remote controler production process or before putting into operation, the encryption for generating information A is calculated by the third-party institution Method is stored into the remote controler.
Specifically, in remote controler production process or before putting into operation, the third-party institution will be converted based on random information P It stores for the algorithm general formula of information Q into the remote controler.
Specifically, the third-party institution generates identification code A and first key at random, and preferably identification code A is set as being directed to Different remote controlers is different, and to improve safety, first key can be rolling code, generates the calculation of identification code A and first key Method can be the customized special algorithm program being stored in the third-party institution of operation and be realized, be also possible to any existing Algorithm.
Specifically, the information that the third-party institution will need to store to remote controler, is stored by wired or wireless mode In the storage device of remote controler, specific sending method is in the present embodiment without limitation.The storage device can simultaneously by with Store the program or data of the remote controler, be also possible to be specifically used to store identification code A, first key, generate information A's plus Close algorithm, be converted to based on random information P information Q algorithm general formula specific storage device, such as special storage chip, To improve the safety of information storage.Since first key, identification code A are randomly generated and uniquely, it is avoided that remote controler quilt Batch cracks, and improves the safety of information transmission.
It is understood that the storage device of remote controler can use high-speed random access memory in the present invention, may be used also To include nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.
In a preferred embodiment, the safety of first key in order to further increase reduces memory and is illegally used Family obtains the risk of key using chip reverse engineering, and the storage device is all made of ferroelectric RAM.
S21 after host receives information A, is and itself matched remote controler, sends information B through judgement.
According to one embodiment of present invention, after host receives the information A, the information A is decrypted by first key, Obtain the identification code A of the remote controler;After identifying that A judges that the remote controler is matched with itself, host sends information B, letter Breath B is comprising the second pre-stored key and the information encrypted to the identification code B and random information P of the host.
Specifically, in host production process or before putting into operation, the third-party institution deposits the identification code B generated at random It stores up in the host.
Specifically, in host production process or before putting into operation, the second key that the third-party institution will generate at random With identification code B storage into the host.
Specifically, in host production process or before putting into operation, the third-party institution will generate the Encryption Algorithm of information B It stores in the host.
Specifically, in host production process or before putting into operation, the third-party institution will be converted to based on random information P The algorithm general formula of information Q is stored into the host.
Specifically, the third-party institution generates identification code B and the second key at random, i.e. identification code B is directed to different hosts It is different, but matches with the identification code A in the remote controler above-mentioned to match.Further, to improve safety, the Two keys can be rolling code, and the algorithm for generating identification code B and the second key can be that operation is customized to be stored in third party Special algorithm program in mechanism is realized, any existing algorithm is also possible to.Since identification code B is randomly generated and uniquely , so that host can only communicate between the remote controler to match, moreover it is possible to avoid host from being cracked in batches, improve information transmission Safety.Certainly, in actual production application, for convenience of mass production, applied on all remote controler and host Identification code also can be set as it is same.When being immobilized in the present invention by the identification code that the third-party institution generates, i.e. institute Identification code of some remote controlers in host all when, remote controler and host can by random by study in a manner of realize and match It is right, so that remote controler and host can not have to bind together in sale, it is also convenient for after-sale service and batch production.
The information that the third-party institution will need to store to host, the storage of host is stored by wired or wireless mode In device, specific sending method is in the present embodiment without limitation.The storage device can be used to store the host simultaneously Program or data, be also possible to be specifically used to store identification code B, the second key, the Encryption Algorithm for generating information B, based on Machine information P is converted to the specific storage device of the algorithm general formula of information Q, such as special storage chip, is deposited with improving information The safety of storage.Since the second key, identification code B are randomly generated and uniquely, it is avoided that and is cracked in batches, improve information The safety of transmission.
It is understood that the storage device of host can use high-speed random access memory in the present invention, it can be with Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.
In a preferred embodiment, the safety of the second key in order to further increase reduces memory and is illegally used Family obtains the risk of the second key using chip reverse engineering, and the storage device is all made of ferroelectric RAM.
Specifically, its information being randomly generated that host is sent in the present embodiment has uncertainty, greatly reduces non- A possibility that method is intercepted and captured and is cracked.
Preferably, what host sent in the present embodiment is " date+clock " information that it is randomly generated, and every information is all Uniquely, it will not repeat, further reduce a possibility that illegally intercepting and capturing and crack.
S12, remote controler receive information B after, through judgement be with itself matched host, then send the information based on information B C。
According to one embodiment of present invention, after remote controler receives the information B, the information is decrypted by the second key B obtains the identification code B of the host;After identifying that the host is matched, remote controler sends the information C based on information B, letter Breath C is encrypted comprising the identification code A to the remote controler and information Q based on random information P, and need to be close with first, second The information of key decryption.
Specifically, general formula at the algorithm of information Q is converted to based on random information P to be stored in remote controler.
Optionally, the first key and second key are composite algorisms.
Preferably, in embodiment, after remote controler sends information A, if within the preset period, such as 0.1 In second, it is not received by the information B of host transmission, then remote controler is alarmed.If encountering same frequency electromagnetic interference, lead to remote controler When cannot normally receive between host and send information, this abnormal conditions can be found at once.
S22, host receive information C, through judgement be with itself matched remote controler, immediately execute key command corresponding to Control instruction.
According to one embodiment of present invention, after host receives the information C, pass through the first, second key decryption information C judges that the remote controler is matched with itself by identification code A, passes through the random letter of information Q judgement and host transmission Breath P matches, and then executes control instruction corresponding to key command.
Preferably, random information P can be " date+clock " information that host is randomly generated.Since what host transmitted is The impossible duplicate information being randomly generated, after receiving, decrypt, handle through remote controler and being transferred to host, as host acknowledgement is sent out The information Q returned is matched with the random information P of sending, then highly demonstrates the matching degree of remote controler and host, reduce stolen A possibility that code.For verifying remote controler with after host matching, host executes control instruction corresponding to key command again.
Specifically, described sender formula can be Blue-tooth communication method, infrared communication mode, radio communication mode, One of Zigbee communication mode, wireless LAN traffic mode or any combination thereof.
Control instruction corresponding to the key command that host executes, optionally, in one embodiment, the key command Carry out self-information A;In another embodiment, the key command carrys out self-information C;In other embodiments, key command can also It travels to and fro between the remote controler and the host with the information A, information B and information C encryption, and is finally executed by host.
Fig. 2 shows the specific block diagrams of thief-proof code remote controler identification device remote controler and host of the invention.Referring to figure 2, remote controler 100 includes control unit 101, and the first transmitting unit 102, first being electrically connected with control unit 101 adds Close unit 103, display unit 104, the first receiving unit 105, input unit 106, the first power supply 107 and the first storage unit 108, the first decryption unit 109 and alarm unit 10A.Corresponding, the host 200 includes processing unit 201, with processing The second receiving unit 202 that unit 201 is electrically connected, the second decryption unit 203, comparing unit 204, the second transmitting unit 205, the second storage unit 206, second source 207, the second encryption unit 208 and random information unit 209.Those skilled in the art Member is it is to be understood that the remote controler 100 of the thief-proof code remote controler identification device of garage shown in Figure 2 and the knot of host 200 Structure does not constitute the restriction to it, may include perhaps combining certain components or difference than illustrating more or fewer components Component layout.
Below with reference to Fig. 2 to the remote controler 100 and host 200 of the thief-proof code remote controler identification device of garage in the present embodiment Each component specifically introduce.
First transmitting unit 102 and the second receiving unit 202, the second transmitting unit 205 and the first receiving unit 105 Homogeneous communication agreement should be used, and communications band should be consistent, and be preferably, but not limited to be bluetooth communication, infrared ray One of communication module, radio-frequency communication module, Zigbee communication module, wireless LAN communication module or any combination thereof.It is described First power supply 107 and second source 207 to remote controler 100 and host 200 for powering respectively.
First by the third-party institution by pre-generated identification code A, first key, the Encryption Algorithm for generating information A, be based on Random information P is converted to the algorithm general formula of information Q, is stored in first in 100 production process of remote controler or before putting into operation In storage unit 108;By pre-generated identification code B, the second key, the Encryption Algorithm for generating information B, it is based on random information P The algorithm general formula for being converted to information Q stores in 200 production process of host or before putting into operation to the second storage unit 206 In.It is understood that first storage unit 108 and the second storage unit 206 may include high random access storage Device can also include nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Memory device.In a preferred embodiment, the safety of key in order to further increase reduces memory by illegal user The risk of key is obtained using chip reverse engineering, the storage unit is all made of ferroelectric RAM.
The input unit 106 being arranged on remote controler 100 can be physical button, is also possible to touch panel or other are defeated Enter equipment.Wherein touch panel, also referred to as touch screen, collecting the touch operation of user on it or nearby, (for example user makes With the operation of any suitable object or attachment such as finger, stylus on touch panel or near touch panel), and according to pre- The formula first set drives corresponding attachment device.Optionally, touch panel can use resistance-type, condenser type, infrared ray with And the multiple types such as surface acoustic wave realize the touch panel.In addition to touch panel, input unit can also include function key (ratio Such as switch key), trace ball, mouse, one of operating stick etc. or a variety of.
In one embodiment, it is provided with the key for sending study identification code in the input unit 106 of remote controler, presses this Key after control unit 101 receives control instruction corresponding to the key, reads from the first storage unit 108 and deposits in advance The first key and identification code A of storage, the first encryption unit 103 encrypt first key and identification code A to obtain information A, the One transmitting unit 102 sends information A to host 200.After second receiving unit 202 receives information A in host 200, pass through Processing unit 201 is sent to the second decryption unit 203.In the second decryption unit 203, by first key solution confidential information A, obtain To the identification code A of remote controler;Then 201 from the second storage unit 206 to read pre-stored second close through the processing unit Key and identification code B, the second encryption unit 208 encrypt the second key and identification code B to obtain information B, the second transmitting unit 205 send information B to remote controler 100.After 100 first receiving unit 105 of remote controler receives information B, pass through control unit 101 are sent to the first decryption unit 109.In the first decryption unit 109, by the second key decryption information B, host is obtained Identification code B.Thus between achievable remote controler 100 and host 200 identification code learning process.Of course for convenient for operation and increasing Add user perceptibility, a display unit 104 can be set in remote controler 100, for showing characterization " data are sent successfully " etc. Printed words;Similarly, in host 200, display unit can be set also to show the information of characterization " identification code learning success ".It is more simple Just one is achieved in that, by being mounted on the LED light of remote controler 100 or host 200 or the alarm list of buzzer etc Member carries out the alarm signal confirmation of light and/or sound, improves user perceptibility.
After the study that remote controler 100 and host 200 complete identification code, can transmission response pressed in input unit 106 Key instruction.In remote controler 100, user presses the button on input unit 106, after control unit 101 receives the key, refers to The first encryption unit 103 is enabled to encrypt to form information A to the first key and identification code A that are pre-stored in the first storage unit 108, and Emitted by the first transmitting unit 102.
In host 200, after the second receiving unit 202 receives information A, processing unit 201 instructs the second decryption unit 203, by first key solution confidential information A, obtain identification code A.Processing unit 201 according to identification code A judge the remote controler 100 with Host 200 matches, and then 201 pre-stored second key and knowledge is read from the second storage unit 206 through the processing unit Other code B, by random information unit 209 read random information P, the second encryption unit 208 to the second key, identification code B and with Machine information P is encrypted to obtain information B, and the second transmitting unit 205 sends information B to remote controler 100.
In remote controler 100, after the first receiving unit 105 receives information B, first decryption of the instruction of control unit 101 is single Member 109 obtains identification code B and random information by the second key decryption information B.Control unit 101 should according to identification code B judgement Host 200 is matched with remote controler 100, is then read from the first storage unit 108 and is converted to information Q's based on random information P Algorithm general formula, instruction the first encryption unit 103 by random information P, algorithmically general formula is converted to information Q, and to identification code A, be based on The information Q of random information P is encrypted, and obtains the information C that need to be decrypted with the first, second key, and pass through the first transmitting unit 102 transmittings.
Preferably, in remote controler 100, if the first receiving unit 105 does not receive within the preset period The information B sent to host, then alarm unit 10A starts.
In host 200, after the second receiving unit 202 receives information C, processing unit 201 instructs the second decryption unit 203, by the first, second key decryption information C, obtain identification code A and information Q.Processing unit 201 should according to identification code A judgement Remote controler 100 is matched with host 200, and the random information P that verification information Q is transmitted with the host matches, and then processing is single Member 201 executes control instruction corresponding to key command.
Host 200 executes control instruction corresponding to key command, and optionally, in one embodiment, the key refers to It enables and carrys out self-information A;In another embodiment, the key command carrys out self-information C;In other embodiments, key command It can encrypt and be travelled to and fro between the remote controler 100 and the host 200 with the information A, information B and information C, and finally be led Machine 200 executes.
Specifically, the communication mode between the remote controler 100 and host 200 can be Blue-tooth communication method, infrared ray One of communication mode, radio communication mode, Zigbee communication mode, wireless LAN traffic mode or any combination thereof.
In conclusion remote controller response sends information A in key command, to host, and information A includes to prestore in the present invention The first key of storage and the information that the identification code A of remote controler is encrypted;After host receives information A, identified code A judgement is With itself matched remote controler, then host sends information B to remote controler, and information B is comprising pre-stored the second key and right The information that the identification code B of host and the random information P of host are encrypted;Remote controler receives information B, and identified code B judgement is With itself matched host, then remote controler sends the information C being converted to based on information B to host, and information C includes to described The letter that the identification code A of remote controler, the information Q based on random information P are encrypted, and need to be decrypted with the first, second key Breath;After host receives information C, judge that remote controler and host match, and after identification information Q and random information P match, immediately Execute control instruction corresponding to key command.As it can be seen that only matched remote controler and host can be just in communication with each other, and further By the first, second key decryption information C, verifies the random information P that the information Q of remote controller is transmitted with host and match Afterwards, control instruction is just executed.During entire transmission instruction, multiple authentication is carried out between remote controler and host, really The safety of matching and the instruction transmission of remote controler and host is protected.The present invention can enhance the attack tolerant of signal, reduce letter Number probability illegally cracked, improves the safety of garage.
Further, the identification code A of remote controler in the present invention, first key, the Encryption Algorithm for generating information A, based on Machine information P be converted to the algorithm general formula of information Q and the identification code B of host, the second key, the Encryption Algorithm for generating information B, Be based on the random information P algorithm general formula for being converted to information Q generated by the third-party institution, and first key, the second key, know Other code A and identification code B is that the third-party institution generates and unique at random, is avoided that the batch of remote controler and host cracks, mentions The high safety of information transmission, solves the fixed key being stored in advance in remote controler and host in the prior art and is easy quilt The problem propagated and known.Especially, the information that host is sent is to be randomly generated, and further increases the difficulty cracked, increases vapour The safety in garage.
Further, after remote controler sends information A in the present invention, if do not received within the preset period The information B sent to host, then remote controler is alarmed.If encountering same frequency electromagnetic interference, cause between remote controler and host not When can normally receive and send information, this abnormal conditions can be found at once.
In the instructions provided here, although the description of a large amount of detail, however, it is to be understood that of the invention Embodiment can be practiced without these specific details.
It will be apparent to one skilled in the art that in the case where not departing from the principle of the present invention or spirit, it can be to implementation Example makes a change.

Claims (9)

1. a kind of thief-proof code remote controler recognition methods is suitable for remote-controlled switchgear, it is characterised in that the following steps are included:
(1) remote controller response sends information A in its key command;
(2) host identifies remote controler;
(3) host sends information B;
(4) remote controler receives information B, identifies host;
(5) remote controler sends the information C based on information B;
(6) after host identification remote controler, control instruction corresponding to key command is executed.
2. thief-proof code remote controler recognition methods according to claim 1, it is characterised in that:
In the step (1), information A is encrypted comprising pre-stored first key and to the identification code A of the remote controler Information;
In the step (2), after host receives the information A, the information A is decrypted by first key, obtains the remote control The identification code A of device identifies that the remote controler is matched with this;
In the step (3), information B is the identification code B and random information P comprising the second pre-stored key and to the host The information encrypted;
In the step (4), after remote controler receives the information B, the information B is decrypted by the second key, obtains the master The identification code B of machine identifies that the host is matched with this;
In the step (5), information C includes that the identification code A to the remote controler and information Q based on random information P adds Information that is close, and need to being decrypted with the first, second key;
In the step (6), after host receives the information C, by the first, second key decryption information C, pass through the remote control The identification code A of device identifies that the remote controler is matched, passes through the random information P of information Q identification and host transmission Match, then executes control instruction corresponding to key command.
3. thief-proof code remote controler recognition methods according to claim 2, it is characterised in that: random in the step (3) Information P is the date and the obtained information of clock in conjunction with host.
4. thief-proof code remote controler recognition methods according to claim 2, it is characterised in that: the information Q in the step (5) It is the algorithm process based on random information P, algorithm general formula is stored in the host and remote controler.
5. thief-proof code remote controler recognition methods according to claim 2, it is characterised in that: the first key, second close Key is third-party institution's generation, has been respectively stored in corresponding remote controler or host in process of production or before putting into operation In.
6. thief-proof code remote controler recognition methods according to claim 2, it is characterised in that: the first key and described the Two keys are composite algorisms.
7. thief-proof code remote controler recognition methods according to claim 2, which is characterized in that described sender formula is that bluetooth is logical Letter mode, infrared communication mode, radio communication mode, Zigbee communication mode, at least one in wireless LAN traffic mode Kind.
8. thief-proof code remote controler recognition methods according to any one of claim 1 to 7, it is characterised in that: the remote control After device sends the information A, if being not received by the information B that the host is sent within the preset period, Then the remote controler issues alarm.
9. a kind of thief-proof code remote controler identification device for running claim 1, including remote controler and host, which is characterized in that institute Stating in remote controler has the first encrypting module, the first sending module, the first receiving module, input module and control module;The master There are the second encrypting module, the second sending module, the second receiving module and processing module in machine;
First encrypting module generates the information A and information C for encrypting;
Second encrypting module generates the information B for encrypting;
First sending module, for sending the information A and the information C;
Second sending module, for sending the information B;
First receiving module, for receiving the information B;
Second receiving module, for receiving the information A and the information C;
The input module, for inputting the key command of the remote controler;
The control module, for identification host;
The processing module, the remote controler, executes control instruction corresponding to key command for identification.
CN201811032361.9A 2018-09-05 2018-09-05 Identification method and device for anti-theft code remote controller Active CN109272729B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811032361.9A CN109272729B (en) 2018-09-05 2018-09-05 Identification method and device for anti-theft code remote controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811032361.9A CN109272729B (en) 2018-09-05 2018-09-05 Identification method and device for anti-theft code remote controller

Publications (2)

Publication Number Publication Date
CN109272729A true CN109272729A (en) 2019-01-25
CN109272729B CN109272729B (en) 2024-02-13

Family

ID=65187203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811032361.9A Active CN109272729B (en) 2018-09-05 2018-09-05 Identification method and device for anti-theft code remote controller

Country Status (1)

Country Link
CN (1) CN109272729B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113819587A (en) * 2021-09-09 2021-12-21 青岛海尔空调器有限总公司 Method and device for controlling air conditioner and air conditioner

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR19990055729A (en) * 1997-12-27 1999-07-15 김영환 Automobile anti-theft device using variable encryption code method
KR20010048952A (en) * 1999-11-30 2001-06-15 구자홍 remote control system and method of the same
CN101964032A (en) * 2010-09-03 2011-02-02 深圳创维数字技术股份有限公司 System and method for control permission of fingerprint identification
CN103096165A (en) * 2013-01-05 2013-05-08 中国传媒大学 Method for certification between digital television set-top box and remote control unit
CN105006051A (en) * 2015-07-31 2015-10-28 深圳广田智能科技有限公司 Wireless communication method and system of intelligent remote control door lock
CN105235642A (en) * 2015-10-28 2016-01-13 铁将军汽车电子有限公司 Control order safety execution method and vehicle alarm host
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
CN105416234A (en) * 2015-10-28 2016-03-23 铁将军汽车电子有限公司 Control instruction secure transmission method and automobile anti-theft remote controller
CN106487517A (en) * 2016-09-30 2017-03-08 北京瑞卓喜投科技发展有限公司 data encryption and decryption method and device
CN208834479U (en) * 2018-09-05 2019-05-07 吴贤忠 Thief-proof code remote controler identification device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR19990055729A (en) * 1997-12-27 1999-07-15 김영환 Automobile anti-theft device using variable encryption code method
KR20010048952A (en) * 1999-11-30 2001-06-15 구자홍 remote control system and method of the same
CN101964032A (en) * 2010-09-03 2011-02-02 深圳创维数字技术股份有限公司 System and method for control permission of fingerprint identification
CN103096165A (en) * 2013-01-05 2013-05-08 中国传媒大学 Method for certification between digital television set-top box and remote control unit
CN105006051A (en) * 2015-07-31 2015-10-28 深圳广田智能科技有限公司 Wireless communication method and system of intelligent remote control door lock
CN105235642A (en) * 2015-10-28 2016-01-13 铁将军汽车电子有限公司 Control order safety execution method and vehicle alarm host
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
CN105416234A (en) * 2015-10-28 2016-03-23 铁将军汽车电子有限公司 Control instruction secure transmission method and automobile anti-theft remote controller
CN106487517A (en) * 2016-09-30 2017-03-08 北京瑞卓喜投科技发展有限公司 data encryption and decryption method and device
CN208834479U (en) * 2018-09-05 2019-05-07 吴贤忠 Thief-proof code remote controler identification device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张袁志;张延练;: "高速遥测PCM数据加密方法研究与实现", 科技创新导报, no. 15 *
淡海英;杨梵;: "基于活体指纹传感器MBF310的防盗遥控器的设计", 广西轻工业, no. 12 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113819587A (en) * 2021-09-09 2021-12-21 青岛海尔空调器有限总公司 Method and device for controlling air conditioner and air conditioner
WO2023035690A1 (en) * 2021-09-09 2023-03-16 青岛海尔空调器有限总公司 Method and apparatus for controlling air conditioner, and air conditioner

Also Published As

Publication number Publication date
CN109272729B (en) 2024-02-13

Similar Documents

Publication Publication Date Title
CN105141584B (en) A kind of equipment authentication method and device of smart home system
CN105118127B (en) A kind of guest system and control method thereof
CN108122311B (en) Vehicle virtual key implementation method and system
CN106034028A (en) Terminal equipment authentication method, apparatus and system thereof
WO2018127081A1 (en) Method and system for obtaining encryption key
CN103929307A (en) Password input method, intelligent secret key device and client device
CN109618334B (en) Control method and related equipment
WO2019203306A1 (en) Sharing system
CN105472192A (en) Intelligent equipment capable of realizing control safety authorization and sharing, terminal equipment and method
CN106850664B (en) Internet of things terminal security control method and system based on intelligent mobile terminal
CN105245552A (en) Intelligent equipment, terminal equipment and method for implementing safe control authorization
CN108712246B (en) Intelligent household equipment and system and visitor password acquisition method
CN107989514A (en) There is the safety box of dynamic password
WO2018133675A1 (en) Key update method, device and system
CN106850540A (en) A kind of terminal control method, terminal and system
CN105235642B (en) Control instruction executes safely method and main machine for car theft-proof device
CN105636037A (en) Authentication method and apparatus and electronic device
CN108288315A (en) A kind of smart lock control system, open method and storage medium
EP3752940A1 (en) Updating biometric template protection keys
CN103152326A (en) Distributed authentication method and authentication system
CN109922022A (en) Internet of Things communication means, platform, terminal and system
CN208834479U (en) Thief-proof code remote controler identification device
CN104702566A (en) Use authorization method and use authorization device for virtual equipment
KR101197213B1 (en) Authentication system and method based by positioning information
CN109272729A (en) Thief-proof code remote controler recognition methods and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant