CN109272729B - Identification method and device for anti-theft code remote controller - Google Patents

Identification method and device for anti-theft code remote controller Download PDF

Info

Publication number
CN109272729B
CN109272729B CN201811032361.9A CN201811032361A CN109272729B CN 109272729 B CN109272729 B CN 109272729B CN 201811032361 A CN201811032361 A CN 201811032361A CN 109272729 B CN109272729 B CN 109272729B
Authority
CN
China
Prior art keywords
information
remote controller
host
key
identification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811032361.9A
Other languages
Chinese (zh)
Other versions
CN109272729A (en
Inventor
吴煜行
竺子乔
吴贤忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811032361.9A priority Critical patent/CN109272729B/en
Publication of CN109272729A publication Critical patent/CN109272729A/en
Application granted granted Critical
Publication of CN109272729B publication Critical patent/CN109272729B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C23/00Non-electrical signal transmission systems, e.g. optical systems
    • G08C23/04Non-electrical signal transmission systems, e.g. optical systems using light waves, e.g. infrared
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/60Security, fault tolerance
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/60Security, fault tolerance
    • G08C2201/62Rolling code

Abstract

The invention discloses a method and a device for identifying a remote controller with anti-theft codes, which specifically can comprise the following steps: (1) the remote controller responds to the key instruction and sends information A; (2) the host computer recognizes the remote controller; (3) the host sends information B; (4) the remote controller receives the information B and identifies the host; (5) the remote controller transmits information C based on the information B; (6) After the host identifies the remote controller, executing the control instruction corresponding to the key instruction. The invention solves the problem that in the prior art, the key is directly stored in the remote controller in advance, so that the key is easy to crack after the signal is illegally captured in the transmission process. The information C sent to the remote controller by the host can contain the information of date and clock randomly generated by the host, so that the anti-attack property of the signal can be enhanced, the probability of illegal cracking of the secret key is reduced, and the safety of the garage is improved.

Description

Identification method and device for anti-theft code remote controller
Technical Field
The invention relates to the technical field of remote control devices, in particular to a method and a device for identifying a remote control device with an anti-theft code.
Background
With the rapid development of society, automobiles become a main transportation means for people to travel daily. As the number of private cars increases, car theft has also evolved into an increasingly serious social problem.
In the current electronic anti-theft technology of garage, a transmitting terminal such as a remote controller is generally adopted to transmit information with identification code to a receiving host arranged in garage to control garage door. The general application scenario is that a fixed key and an identification code are stored in a remote controller and a host in advance, the remote controller sends information formed by the identification code encrypted by the fixed key, the host arranged in a garage receives and decrypts the information by the fixed key, reads the identification code, compares the identification code with the prestored identification code, and then executes corresponding operation according to the comparison result. However, the current electronic anti-theft technology adopts a single encryption method, has poor anti-interference performance of transmitting instructions, adopts a fixed key which does not undergo any encryption treatment, so that information is easy to intercept and crack by illegal equipment through methods such as signal capturing in the air, scanning and tracking, and the like, and has low safety.
Therefore, how to provide a method and a device for identifying a code theft prevention remote controller, which enhance the attack resistance of signals and improve the safety of vehicles, is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The invention aims to solve the problems, and provides a method and a device for identifying a remote controller with anti-theft codes, which ensure that the remote controller and a host can be accurately matched, thereby ensuring that control instructions are safely transmitted.
In order to achieve the above purpose, the invention adopts the following technical scheme:
the invention provides a method for identifying a remote controller of an anti-theft code, which is suitable for a remote switch device of garage anti-theft equipment and comprises the following steps:
(1) The remote controller responds to the key instruction and sends information A;
(2) The host computer identifies the remote controller;
(3) The host sends information B;
(4) The remote controller receives the information B and identifies the host;
(5) The remote controller sends information C based on the information B;
(6) After the host identifies the remote controller, executing the control instruction corresponding to the key instruction.
Further, in the step (1), the information a is information including a pre-stored first key and an identification code a of the remote controller;
in the step (2), after receiving the information A, the host decrypts the information A through a first key to obtain an identification code A of the remote controller so as to identify that the remote controller is matched with the identification code A;
in the step (3), the information B is information including a second key stored in advance and encrypting the identification code B and the random information P of the host;
in the step (4), after receiving the information B, the remote controller decrypts the information B through a second key to obtain an identification code B of the host, so as to identify that the host is matched with the host;
in the step (5), the information C includes information which encrypts the identification code A of the remote controller and the information Q based on the random information P and needs to be decrypted by the first key and the second key;
in the step (6), after the host receives the information C, the host decrypts the information C through the first and second keys, recognizes that the remote controller is matched with the information C through the identification code a of the remote controller, recognizes that the remote controller is matched with the random information P transmitted by the host through the information Q, and then executes the control instruction corresponding to the key instruction.
Preferably, the random information P in the step (3) is information obtained by combining a date and a clock of the host.
Optionally, the information Q in the step (5) is an algorithmic process based on random information P, and the algorithmic formula is stored in the host and remote controller.
Optionally, the first key and the second key are generated by a third party mechanism, and are stored in a corresponding remote controller or host respectively in the production process or before being put into operation.
Optionally, the first key and the second key are a compound algorithm.
Optionally, the transmission mode is at least one of a bluetooth communication mode, an infrared communication mode, a radio frequency communication mode, a Zigbee communication mode, and a wireless LAN communication mode.
Further, after the remote controller sends the information A, if the information B sent by the host is not received within a preset time period, the remote controller sends an alarm. Specifically, the preset period of time is a very short period of time, for example: 0.1 seconds, 0.2 seconds, etc.
Alternatively, the key command may be sent to the host along with information a or information C, or may be sent to and from the remote controller and the host along with information a, information B, and information C.
The invention also provides a device for identifying the anti-theft code remote controller, which comprises a remote controller and a host, wherein the remote controller and the host respectively comprise: the remote controller is provided with a first encryption module, a first sending module, a first receiving module, an input module and a control module; the host is internally provided with a second encryption module, a second sending module, a second receiving module and a processing module;
the first encryption module is used for encrypting and generating the information A and the information C;
the second encryption module is used for encrypting and generating the information B;
the first sending module is used for sending the information A and the information C;
the second sending module is used for sending the information B;
the first receiving module is used for receiving the information B;
the second receiving module is used for receiving the information A and the information C;
the input module is used for inputting a key instruction of the remote controller;
the control module is used for identifying the host;
the processing module is used for identifying the remote controller and executing the control instruction corresponding to the key instruction.
Specifically, the remote controller further comprises a first storage module.
Specifically, the host also comprises a second storage module.
Specifically, the host also comprises a random information module, and the random information P is obtained by combining the date information and the clock information of the host.
Specifically, the information A is information containing a prestored first key and encrypting an identification code A of the remote controller; the information C comprises information which encrypts an identification code A of the remote controller and information Q based on random information P and needs to be decrypted by a first key and a second key; the information B is information containing a pre-stored second key and encrypting the identification code B and the random information P of the host.
Specifically, the first storage module is configured to store the identification code a randomly generated by the third party mechanism into the remote controller during the production process of the remote controller or before the remote controller is put into operation.
Specifically, the first storage module is configured to store the first key and the identification code a randomly generated by the third party authority into the remote controller during the production process of the remote controller or before the remote controller is put into operation.
Specifically, the first storage module is configured to store an encryption algorithm of the third party authority generated information a into the remote control during production or before being put into operation.
Specifically, the first storage module further stores an algorithm formula for converting the random information P into the information Q.
Specifically, the second storage module is configured to store the identification code B randomly generated by the third party authority into the host during production or before being put into operation.
Specifically, the second storage module is configured to store the second key and the identification code B randomly generated by the third party authority into the host during production or before being put into operation. In particular, the second storage module is configured to store the encryption algorithm of the third party authority generated information B into the host during production or before being put into operation.
Specifically, the second storage module further stores an algorithm formula for converting the random information P into the information Q.
Optionally, the first key and the second key are a compound algorithm.
Specifically, the control module identifies the host through the identification code B.
Specifically, the processing module recognizes the remote controller through the identification code A, recognizes the random information P transmitted by the host through the information Q, and then executes the control instruction corresponding to the key instruction.
Optionally, the first transmitting module and the second transmitting module are at least one of a bluetooth communication module, an infrared communication module, a radio frequency communication module, a Zigbee communication module, and a wireless LAN communication module.
Specifically, the remote controller further comprises an alarm module, and after the remote controller sends the information A, if the information B sent by the host is not received within a preset time period, the remote controller sends an alarm.
Specifically, the preset period of time is a very short period of time, for example: 0.1 seconds, 0.2 seconds, etc.
Optionally, the key instruction on the input module may be sent to the host along with the information a or the information C, or may be sent to and from the remote controller and the host along with the information a, the information B and the information C.
Compared with the prior art, the invention has the following advantages:
1. in the invention, a remote controller responds to a key instruction and sends information A to a host; after the host receives the information A, the host judges that the information A is a remote controller matched with the host, and the host sends the information B to the remote controller; after receiving the information B, the remote controller judges that the host is matched with the remote controller, and the remote controller sends information C obtained based on the conversion of the information B to the host; after receiving the information C, the host recognizes that the information B sent before the information C is transmitted among the information B according to the agreed rule, and immediately executes the control instruction corresponding to the key instruction after judging that the remote controller is matched with the host again. In the transmission process, whether the host and the remote controller are matched with each other is judged twice, and whether the information C transmitted to the host by the remote controller is matched with the information B transmitted by the host is verified, so that the risk of the remote controller being stolen is greatly reduced, and the problem that the key is easily cracked after signals are illegally captured in the transmission process due to the fact that the key is directly stored in the remote controller in advance in the prior art is solved. The invention can enhance the signal anti-attack property, reduce the probability of illegal cracking of the secret key and improve the safety of the garage.
2. In the invention, the information sent by the remote control machine and the host machine for verifying whether the information is matched is transmitted through encryption; the remote controller transmits information Q based on host random information P to the host, and the random information P is converted by an algorithm to obtain information Q and then transmitted; the anti-attack property of the signal is enhanced, the probability of illegal cracking of the encrypted information is reduced, and the safety of the garage is improved.
3. In the invention, the first secret key, the second secret key, the identification code A, the identification code B, the encryption algorithm for generating the information A and the information B and the algorithm general formula for converting the random information P into the information Q are all generated by a third party mechanism, and the first secret key, the second secret key, the identification code A and the identification code B are randomly generated and unique by the third party mechanism, so that the remote controller can be prevented from being broken in batches, the safety of information transmission is improved, and the problem that the fixed secret key prestored in the remote controller in the prior art is easy to propagate and know is solved.
4. In the invention, the information C sent to the remote controller by the host contains random information P of the host, and if the information C is sent, the information C is sent as 'date+clock' information randomly generated by the host, the data is unique and impossible to repeat, so that the possibility of being stolen is greatly reduced.
5. In the invention, after the remote controller sends the information A, if the information B sent by the host is not received in a preset time period, the remote controller alarm module is started. Therefore, when the electromagnetic interference with the same frequency is encountered, and the information can not be normally received and transmitted between the remote controller and the host, the abnormal situation can be immediately found, and the serious consequences that people command the host to execute a certain instruction for the remote controller and do not actually execute the instruction are avoided.
6. The invention can be widely applied to other scenes needing to be controlled by a remote controller besides garage, such as remote control devices of central air conditioner and the like. The identification method can be implemented by loading relevant computer programs in the intelligent wireless control equipment.
7. Additional features and advantages of the invention will be set forth in part in the description which follows, or may be learned by practice of the invention.
Drawings
Fig. 1 is a schematic flow chart of an information transmission method in an embodiment of the invention;
FIG. 1 (a) is a flow chart of information transmission of the remote controller in FIG. 1;
FIG. 1 (b) is a flow chart of information transmission of the host in FIG. 1;
fig. 2 is a schematic structural diagram of a remote controller and a host system according to the present invention.
The accompanying drawings, which are included to provide a further understanding of embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiments of the invention.
Detailed Description
The present invention will be described in further detail with reference to the following examples and drawings, in order to make the objects, technical solutions and advantages of the present invention more apparent. The exemplary embodiments of the present invention and the descriptions thereof are only for explaining the present invention and are not limiting the present invention.
It should be noted that, the identification method of the remote controller with the anti-theft code provided by the invention can be widely applied to other scenes needing to be controlled by the remote controller, such as remote control devices of central air conditioners, and the like, besides the remote control devices used for garage. The identification method can be implemented by loading relevant computer programs in the intelligent wireless control equipment.
Referring to fig. 1 and fig. 1 (a), fig. 1 (b), which are an exemplary embodiment of a method for identifying a code theft preventing remote controller between a remote controller (which may be an automobile remote controller) and a host (which may be an automobile garage host), specifically include the following steps:
s11, in response to the key instruction, information A is sent.
According to one embodiment of the invention, the information a is information containing a pre-stored first key and encrypting the identification code a of the remote control;
specifically, the third party authority stores the randomly generated identification code a into the remote control during production or before being put into operation.
Specifically, the third party authority stores the randomly generated first key and identification code a into the remote control during production or before being put into operation.
Specifically, the third party authority stores the encryption algorithm that generated the information a into the remote control during production or before being put into operation.
Specifically, the third party authority stores the algorithm formula based on the random information P converted into the information Q in the remote controller during the production process of the remote controller or before the remote controller is put into operation.
Specifically, the third party mechanism randomly generates the identification code a and the first key, preferably, the identification code a is set to be different for different remote controllers, and for improving the security, the first key can be a rolling code, and the algorithm for generating the identification code a and the first key can be implemented by running a customized specific algorithm program stored in the third party mechanism or any existing algorithm.
Specifically, the third party mechanism stores the information required to be stored in the remote controller into the storage device of the remote controller in a wired or wireless manner, and the specific transmission manner is not limited in this embodiment. The storage device can be used for storing programs or data of the remote controller at the same time, or can be a specific storage device, such as a specific storage chip, which is specially used for storing the identification code A, the first secret key, the encryption algorithm for generating the information A and the algorithm general formula for converting the random information P into the information Q so as to improve the security of information storage. Because the first secret key and the identification code A are randomly generated and unique, the remote controller can be prevented from being cracked in batches, and the safety of information transmission is improved.
It will be appreciated that the memory means of the remote control of the present invention may employ high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk memory device, flash memory device, or other volatile solid state memory device.
In a preferred embodiment, to further increase the security of the first key, the risk of the memory being obtained by an illegal user using a chip reversal technique is reduced, said memory means each being a ferroelectric random access memory.
S21, after receiving the information A, the host computer judges that the information A is a remote controller matched with the host computer and sends the information B.
According to one embodiment of the invention, after receiving the information A, the host decrypts the information A through a first key to obtain the identification code A of the remote controller; after the remote controller is judged to be matched with the remote controller through the identification A, the host sends information B, wherein the information B comprises a prestored second secret key and information for encrypting the identification code B and the random information P of the host.
Specifically, the third party authority stores the randomly generated identification code B into the host during production or prior to being put into operation.
Specifically, the third party authority stores the randomly generated second key and identification code B into the host during production or prior to being put into operation.
Specifically, the third party authority stores the encryption algorithm that generated the information B into the host during production or before being put into operation.
Specifically, the third party authority stores the algorithmic formula based on the conversion of the random information P to the information Q into the host during production or before being put into operation.
Specifically, the third party authority randomly generates an identification code B and a second key, i.e. the identification code B is different for different hosts, but matches the identification code a in the aforementioned matched remote control. Further, to improve security, the second key may be a rolling code, and the algorithm for generating the identification code B and the second key may be implemented by running a specific algorithm program stored in a third party authority in a customized manner, or may be any existing algorithm. Because the identification code B is randomly generated and unique, the host can only communicate with the matched remote controllers, the host can be prevented from being cracked in batches, and the safety of information transmission is improved. Of course, in practical production applications, the identification codes applied to all remote controllers and hosts may be set to be the same for mass production. When the identification codes generated by the third party mechanism are fixed, namely, the identification codes in all the remote controllers and the host are the same, the remote controllers and the host can be matched randomly in a learning mode, so that the remote controllers and the host can be not bound together during sales, and after-sales service and mass production are facilitated.
The third party mechanism stores the information to be stored in the host in a wired or wireless manner in the storage device of the host, and the specific transmission manner is not limited in this embodiment. The storage device may be used to store the program or data of the host at the same time, or may be a specific storage device, such as a specific storage chip, specifically used to store the identification code B, the second key, the encryption algorithm for generating the information B, and the algorithm general formula for converting the random information P into the information Q, so as to improve the security of information storage. The second secret key and the identification code B are randomly generated and unique, so that the second secret key and the identification code B can be prevented from being cracked in batches, and the safety of information transmission is improved.
It is understood that the storage means of the host of the present invention may employ high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state memory device.
In a preferred embodiment, in order to further increase the security of the second key, the risk of the memory being obtained by an illegal user using a chip inversion technique is reduced, said memory means each being a ferroelectric random access memory.
Specifically, the information randomly generated by the host computer transmitted by the host computer in the embodiment has uncertainty, so that the possibility of illegal interception and cracking is greatly reduced.
Preferably, in this embodiment, the host sends "date+clock" information that is randomly generated, and each piece of information is unique and not repeated, so that the possibility of illegal interception and cracking is further reduced.
And S12, after receiving the information B, the remote controller judges that the host is matched with the remote controller, and then sends information C based on the information B.
According to one embodiment of the invention, after the remote controller receives the information B, the information B is decrypted through a second key to obtain the identification code B of the host; after the host is identified to be matched with the host, the remote controller sends information C based on information B, wherein the information C comprises information which is used for encrypting an identification code A of the remote controller and information Q based on random information P and is required to be decrypted by a first key and a second key.
Specifically, the algorithm based on the conversion of the random information P into the information Q is stored in the remote control.
Optionally, the first key and the second key are a compound algorithm.
Preferably, in an embodiment, after the remote controller sends the information a, if the information B sent by the host is not received within a preset period of time, for example, 0.1 seconds, the remote controller alarms. If the same frequency electromagnetic interference is encountered, the abnormal situation can be found immediately when the information can not be normally received and transmitted between the remote controller and the host.
S22, the host receives the information C, and immediately executes the control instruction corresponding to the key instruction after judging that the information C is the remote controller matched with the host.
According to one embodiment of the invention, after the host receives the information C, the host decrypts the information C through the first key and the second key, judges that the remote controller is matched with the host through the identification code A, judges that the remote controller is matched with the random information P transmitted by the host through the information Q, and then executes the control instruction corresponding to the key instruction.
Preferably, the random information P may be "date+clock" information randomly generated by the host. Because the host transmits the information which is generated randomly and cannot be repeated, after the information is received, decrypted, processed and transmitted to the host by the remote controller, if the host confirms that the transmitted information Q is matched with the transmitted random information P, the matching degree of the remote controller and the host is extremely high, and the possibility of being stolen is reduced. After the remote controller is verified to be matched with the host again, the host executes the control instruction corresponding to the key instruction.
Specifically, the transmission mode may be one or any combination of a bluetooth communication mode, an infrared communication mode, a radio frequency communication mode, a Zigbee communication mode, and a wireless LAN communication mode.
Optionally, in an embodiment, the key instruction is from information a; in another embodiment, the key instruction is from information C; in other embodiments, the key command may also be encrypted with the information a, information B, and information C to and from the remote control and the host, and finally executed by the host.
Fig. 2 shows a specific block diagram of the remote control and the host of the identification device of the anti-theft code remote control according to the present invention. Referring to fig. 2, the remote controller 100 includes a control unit 101, a first transmitting unit 102, a first encrypting unit 103, a display unit 104, a first receiving unit 105, an input unit 106, a first power source 107, a first storing unit 108, a first decrypting unit 109, and an alarm unit 10A, which are electrically connected to the control unit 101, respectively. Correspondingly, the host 200 includes a processing unit 201, a second receiving unit 202, a second decrypting unit 203, a comparing unit 204, a second transmitting unit 205, a second storing unit 206, a second power supply 207, a second encrypting unit 208 and a random information unit 209, which are electrically connected to the processing unit 201. It should be understood by those skilled in the art that the construction of the remote control 100 and the host 200 of the garage door theft protection remote control identification device shown in fig. 2 is not limited thereto, and may include more or less components than those illustrated, or may combine certain components, or may have different arrangements of components.
The respective components of the remote controller 100 and the host 200 of the garage anti-theft code remote controller identification device of the present embodiment will be specifically described with reference to fig. 2.
The first transmitting unit 102 and the second receiving unit 202, the second transmitting unit 205 and the first receiving unit 105 should use the same communication protocol, and the communication frequency band should be consistent, preferably but not limited to one of a bluetooth communication module, an infrared communication module, a radio frequency communication module, a Zigbee communication module, a wireless LAN communication module, or any combination thereof. The first power supply 107 and the second power supply 207 are used to supply power to the remote control 100 and the host 200, respectively.
Firstly, a third party organization stores a pre-generated identification code A, a first secret key, an encryption algorithm for generating information A and an algorithm formula for converting random information P into information Q in a first storage unit 108 during the production process or before the remote controller 100 is put into operation; the pre-generated identification code B, the second key, the encryption algorithm for generating the information B, and the algorithm formula for converting the random information P into the information Q are stored in the second storage unit 206 during the production process of the host 200 or before being put into operation. It is appreciated that the first storage unit 108 and the second storage unit 206 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. In a preferred embodiment, to further increase the security of the key, the risk of the memory being obtained by an illegal user using a chip reversal technique is reduced, said memory cells each being ferroelectric random access memory.
The input unit 106 provided on the remote control 100 may be a physical key, a touch panel, or other input device. The touch panel, also referred to as a touch screen, may collect touch operations on or near the touch panel by a user (such as operations of the user on or near the touch panel using any suitable object or accessory such as a finger, a stylus, etc.), and drive the corresponding connection device according to a preset program. Alternatively, the touch panel may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. The input unit may include one or more of function keys (such as switch keys, etc.), a track ball, a mouse, a joystick, etc., in addition to the touch panel.
In one embodiment, a key for transmitting a learning identification code is provided in the input unit 106 of the remote controller, after the control unit 101 receives a control instruction corresponding to the key by pressing the key, the first key and the identification code a stored in advance are read from the first storage unit 108, the first encryption unit 103 encrypts the first key and the identification code a to obtain information a, and the first transmission unit 102 transmits the information a to the host 200. After receiving the information a, the second receiving unit 202 in the host 200 sends the information a to the second decrypting unit 203 through the processing unit 201. In the second decryption unit 203, the information a is decrypted by the first key, obtaining the identification code a of the remote control; then, the processing unit 201 reads the second key and the identification code B stored in advance from the second storage unit 206, the second encryption unit 208 encrypts the second key and the identification code B to obtain information B, and the second transmitting unit 205 transmits the information B to the remote controller 100. After receiving the information B, the first receiving unit 105 of the remote controller 100 sends the information B to the first decrypting unit 109 through the control unit 101. In the first decryption unit 109, the information B is decrypted by the second key, resulting in the identification code B of the host. The learning process of the identification code between the remote controller 100 and the host 200 can be completed. Of course, in order to facilitate operation and increase user perception, a display unit 104 may be disposed on the remote control 100, for displaying words such as "data transmission success" and the like; similarly, in the host 200, a display unit may be provided to display information indicating "recognition code learning success". In a simpler implementation, the user perception is improved by confirming the light and/or sound alarm signal by an alarm unit such as an LED lamp or a buzzer mounted on the remote controller 100 or the host 200.
After the remote controller 100 and the host 200 complete learning of the identification code, a response to a key instruction in the input unit 106 may be transmitted. In the remote controller 100, the user presses a key on the input unit 106, and after receiving the key, the control unit 101 instructs the first encryption unit 103 to encrypt the first key and the identification code a prestored in the first storage unit 108 to form information a, and transmit it through the first transmission unit 102.
In the host 200, after the second receiving unit 202 receives the information a, the processing unit 201 instructs the second decrypting unit 203 to decrypt the information a by the first key, and obtains the identification code a. The processing unit 201 determines that the remote controller 100 matches with the host 200 according to the identification code a, then reads the second key and the identification code B stored in advance from the second storage unit 206 through the processing unit 201, reads the random information P through the random information unit 209, encrypts the second key, the identification code B and the random information P by the second encryption unit 208 to obtain information B, and the second transmitting unit 205 transmits the information B to the remote controller 100.
In the remote controller 100, after the first receiving unit 105 receives the information B, the control unit 101 instructs the first decrypting unit 109 to decrypt the information B by the second key, obtaining the identification code B and the random information. The control unit 101 determines that the host 200 is matched with the remote controller 100 according to the identification code B, reads the algorithm formula based on the random information P and converted into the information Q from the first storage unit 108, instructs the first encryption unit 103 to convert the random information P into the information Q according to the algorithm formula, encrypts the identification code a and the information Q based on the random information P, obtains the information C to be decrypted by the first and second keys, and transmits the information C through the first transmission unit 102.
Preferably, in the remote controller 100, the first receiving unit 105 starts the alarm unit 10A if the information B transmitted by the host is not received within a preset period of time.
In the host 200, after the second receiving unit 202 receives the information C, the processing unit 201 instructs the second decrypting unit 203 to decrypt the information C by the first and second keys, and obtains the identification code a and the information Q. The processing unit 201 determines that the remote controller 100 is matched with the host 200 according to the identification code a, verifies that the information Q is matched with the random information P transmitted by the host, and then the processing unit 201 executes a control instruction corresponding to the key instruction.
The host 200 executes control instructions corresponding to key instructions, optionally, in one embodiment, the key instructions are from information a; in another embodiment, the key instruction is from information C; in other embodiments, key instructions may also be encrypted with the information a, information B, and information C to and from the remote control 100 and the host 200, and ultimately executed by the host 200.
Specifically, the communication mode between the remote controller 100 and the host 200 may be one of a bluetooth communication mode, an infrared communication mode, a radio frequency communication mode, a Zigbee communication mode, a wireless LAN communication mode, or any combination thereof.
In summary, in the present invention, the remote controller responds to the key instruction to send information a to the host, where the information a includes a prestored first key and information for encrypting the identification code a of the remote controller; after the host receives the information A, the host judges that the information A is a remote controller matched with the host through the identification code A, then the host sends information B to the remote controller, and the information B comprises a prestored second secret key and information for encrypting the identification code B of the host and the random information P of the host; the remote controller receives information B, judges the information B to be a host matched with the remote controller through the identification code B, and then sends information C obtained by conversion based on the information B to the host, wherein the information C comprises information for encrypting the identification code A of the remote controller and the information Q based on the random information P and decrypting through a first key and a second key; after the host receives the information C, the remote controller is judged to be matched with the host, and after the identification information Q is matched with the random information P, the control instruction corresponding to the key instruction is executed immediately. It can be seen that only the matched remote controller and host can communicate with each other, and further, the control instruction is executed after the information Q transmitted by the remote controller is verified to be matched with the random information P transmitted by the host through the first and second secret key decryption information C. In the whole instruction sending process, multiple times of verification are carried out between the remote controller and the host, and the matching of the remote controller and the host and the safety of instruction transmission are ensured. The invention can enhance the anti-attack property of the signal, reduce the probability of illegal cracking of the signal and improve the safety of the garage.
Furthermore, the identification code A, the first secret key, the encryption algorithm for generating the information A, the algorithm general formula for converting the random information P into the information Q, the identification code B and the second secret key of the host, the encryption algorithm for generating the information B and the algorithm general formula for converting the random information P into the information Q of the remote controller are all generated by a third party mechanism, the first secret key, the second secret key, the identification code A and the identification code B are randomly generated and unique by the third party mechanism, the batch cracking of the remote controller and the host can be avoided, the safety of information transmission is improved, and the problem that the fixed secret key prestored in the remote controller and the host in the prior art is easy to propagate and know is solved. In particular, the information sent by the host computer is randomly generated, so that the difficulty of cracking is increased, and the safety of the garage is increased.
Further, after the remote controller sends the information A, if the information B sent by the host is not received in a preset time period, the remote controller alarms. If the same frequency electromagnetic interference is encountered, the abnormal situation can be found immediately when the information can not be normally received and transmitted between the remote controller and the host.
In the description provided herein, numerous specific details are set forth, however, it is to be understood that embodiments of the invention may be practiced without these specific details.
Those skilled in the art will appreciate that changes can be made to the embodiments without departing from the principles or spirit of the invention.

Claims (6)

1. A recognition method of a remote controller with anti-theft codes is suitable for a remote switch device and is characterized by comprising the following steps:
(1) The remote controller responds to the key instruction and sends information A;
(2) The host computer identifies the remote controller;
(3) The host sends information B;
(4) The remote controller receives the information B and identifies the host;
(5) The remote controller sends information C based on the information B;
(6) After the host identifies the remote controller, executing a control instruction corresponding to the key instruction;
in the step (1), the information A is information containing a prestored first key and encrypting the identification code A of the remote controller;
in the step (2), after receiving the information A, the host decrypts the information A through a first key to obtain an identification code A of the remote controller so as to identify that the remote controller is matched with the identification code A;
in the step (3), the information B is information including a second key stored in advance and encrypting the identification code B and the random information P of the host;
in the step (4), after receiving the information B, the remote controller decrypts the information B through a second key to obtain an identification code B of the host, so as to identify that the host is matched with the host;
in the step (5), the information C includes information which encrypts the identification code A of the remote controller and the information Q based on the random information P and needs to be decrypted by the first key and the second key;
in the step (6), after the host receives the information C, the host decrypts the information C through the first and second keys, recognizes that the remote controller is matched with the information C through the identification code a of the remote controller, recognizes that the remote controller is matched with the random information P transmitted by the host through the information Q, and then executes the control instruction corresponding to the key instruction.
2. The method for identifying a code theft prevention remote control according to claim 1, wherein: the random information P in the step (3) is information obtained by combining the date and clock of the host.
3. The method for identifying a code theft prevention remote control according to claim 1, wherein: the information Q in the step (5) is an algorithm processing based on the random information P, and the algorithm general formula of the information Q is stored in the host and the remote controller.
4. The method for identifying a code theft prevention remote control according to claim 1, wherein: the first secret key and the second secret key are generated by a third party mechanism and are respectively stored in a corresponding remote controller or a host computer in the production process or before being put into operation.
5. The method for identifying a code theft prevention remote control according to claim 1, wherein: the first key and the second key are a composite algorithm.
6. The method of claim 1, wherein the transmission mode is at least one of a bluetooth communication mode, an infrared communication mode, a radio frequency communication mode, a Zigbee communication mode, and a wireless LAN communication mode.
CN201811032361.9A 2018-09-05 2018-09-05 Identification method and device for anti-theft code remote controller Active CN109272729B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811032361.9A CN109272729B (en) 2018-09-05 2018-09-05 Identification method and device for anti-theft code remote controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811032361.9A CN109272729B (en) 2018-09-05 2018-09-05 Identification method and device for anti-theft code remote controller

Publications (2)

Publication Number Publication Date
CN109272729A CN109272729A (en) 2019-01-25
CN109272729B true CN109272729B (en) 2024-02-13

Family

ID=65187203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811032361.9A Active CN109272729B (en) 2018-09-05 2018-09-05 Identification method and device for anti-theft code remote controller

Country Status (1)

Country Link
CN (1) CN109272729B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113819587B (en) * 2021-09-09 2023-07-18 青岛海尔空调器有限总公司 Air conditioner control method and device and air conditioner

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR19990055729A (en) * 1997-12-27 1999-07-15 김영환 Automobile anti-theft device using variable encryption code method
KR20010048952A (en) * 1999-11-30 2001-06-15 구자홍 remote control system and method of the same
CN101964032A (en) * 2010-09-03 2011-02-02 深圳创维数字技术股份有限公司 System and method for control permission of fingerprint identification
CN103096165A (en) * 2013-01-05 2013-05-08 中国传媒大学 Method for certification between digital television set-top box and remote control unit
CN105006051A (en) * 2015-07-31 2015-10-28 深圳广田智能科技有限公司 Wireless communication method and system of intelligent remote control door lock
CN105235642A (en) * 2015-10-28 2016-01-13 铁将军汽车电子有限公司 Control order safety execution method and vehicle alarm host
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
CN105416234A (en) * 2015-10-28 2016-03-23 铁将军汽车电子有限公司 Control instruction secure transmission method and automobile anti-theft remote controller
CN106487517A (en) * 2016-09-30 2017-03-08 北京瑞卓喜投科技发展有限公司 data encryption and decryption method and device
CN208834479U (en) * 2018-09-05 2019-05-07 吴贤忠 Thief-proof code remote controler identification device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR19990055729A (en) * 1997-12-27 1999-07-15 김영환 Automobile anti-theft device using variable encryption code method
KR20010048952A (en) * 1999-11-30 2001-06-15 구자홍 remote control system and method of the same
CN101964032A (en) * 2010-09-03 2011-02-02 深圳创维数字技术股份有限公司 System and method for control permission of fingerprint identification
CN103096165A (en) * 2013-01-05 2013-05-08 中国传媒大学 Method for certification between digital television set-top box and remote control unit
CN105006051A (en) * 2015-07-31 2015-10-28 深圳广田智能科技有限公司 Wireless communication method and system of intelligent remote control door lock
CN105235642A (en) * 2015-10-28 2016-01-13 铁将军汽车电子有限公司 Control order safety execution method and vehicle alarm host
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
CN105416234A (en) * 2015-10-28 2016-03-23 铁将军汽车电子有限公司 Control instruction secure transmission method and automobile anti-theft remote controller
CN106487517A (en) * 2016-09-30 2017-03-08 北京瑞卓喜投科技发展有限公司 data encryption and decryption method and device
CN208834479U (en) * 2018-09-05 2019-05-07 吴贤忠 Thief-proof code remote controler identification device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于活体指纹传感器MBF310的防盗遥控器的设计;淡海英;杨梵;;广西轻工业(第12期);全文 *
高速遥测PCM数据加密方法研究与实现;张袁志;张延练;;科技创新导报(第15期);全文 *

Also Published As

Publication number Publication date
CN109272729A (en) 2019-01-25

Similar Documents

Publication Publication Date Title
CN111194028B (en) Safety control method based on vehicle
CN108122311B (en) Vehicle virtual key implementation method and system
US9143320B2 (en) Electronic key registration system
JPH086520B2 (en) Remote access system
JP2005512204A (en) Portable device and method for accessing a data key activated device
WO2019203306A1 (en) Sharing system
CN109035519B (en) Biological feature recognition device and method
CN111845624B (en) Method for starting vehicle without key
CN110322600B (en) Control method of electronic lock and electronic lock
US20120239926A1 (en) Obfuscated authentication systems, devices, and methods
US10759385B2 (en) Electronic lock and key for performing an unlock operation
CN104618422A (en) Bluetooth type automobile starting control method and mobile terminal
CN105235642B (en) Control instruction executes safely method and main machine for car theft-proof device
CN105636037A (en) Authentication method and apparatus and electronic device
CN112398894A (en) Safety verification method and device for vehicle
CN104527576A (en) WIFI (Wireless Fidelity) type automobile starting control method and mobile terminal
CN110138736B (en) Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things
CN109272729B (en) Identification method and device for anti-theft code remote controller
CN104554143A (en) Car starting control method and mobile terminal
CN109639418A (en) A kind of authentication method of configuration information, device and rent-a-car
JP2009218942A (en) Key authentication system
CN112735005A (en) Access control card, authorization and verification method thereof, terminal subsystem and access control system
CN105416234B (en) Control instruction safe transmission method and automobile anti-theft remote controller
CN208834479U (en) Thief-proof code remote controler identification device
WO2019202929A1 (en) Sharing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant