CN114978429B - Wireless transmitting and receiving method for door and window control - Google Patents

Wireless transmitting and receiving method for door and window control Download PDF

Info

Publication number
CN114978429B
CN114978429B CN202210582066.0A CN202210582066A CN114978429B CN 114978429 B CN114978429 B CN 114978429B CN 202210582066 A CN202210582066 A CN 202210582066A CN 114978429 B CN114978429 B CN 114978429B
Authority
CN
China
Prior art keywords
code
bit
synchronous
calculation
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210582066.0A
Other languages
Chinese (zh)
Other versions
CN114978429A (en
Inventor
彭海勇
李传昌
张海波
武涛
缪雪龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai University of Engineering Science
Original Assignee
Shanghai University of Engineering Science
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai University of Engineering Science filed Critical Shanghai University of Engineering Science
Priority to CN202210582066.0A priority Critical patent/CN114978429B/en
Publication of CN114978429A publication Critical patent/CN114978429A/en
Application granted granted Critical
Publication of CN114978429B publication Critical patent/CN114978429B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A wireless transmitting and receiving method for door and window control in the technical field of wireless communication comprises the following steps: the transmitting terminal generates an address code, a control code and a synchronous code, generates an encrypted synchronous code by synchronous encryption, checks data formed by the synchronous code and a synchronous encryption calculation code to obtain a check code, and transmits the data formed by the address code, the control code, the encrypted synchronous code and the check code outwards; the receiving terminal takes out the address code and the control code from the received data, decrypts the received encrypted synchronous code to obtain the current synchronous code, compares the decrypted current synchronous code with the synchronous code in the previous operation, and compares the current check code with the received check code; and the receiving terminal determines whether the current control operation is effective according to the verification comparison result of the address code, the synchronous code and the check code. The invention realizes compatibility with the original fixed code products in the market, and simultaneously checks the synchronous code and the synchronous encryption calculation code, thereby greatly improving the safety of data transmission.

Description

Wireless transmitting and receiving method for door and window control
Technical Field
The invention relates to a data transmitting and receiving method in the technical field of wireless communication, in particular to a wireless transmitting and receiving method for door and window control, which can check synchronous codes and synchronous encryption calculation codes at the same time.
Background
The 315MHz and 433MHz wireless transceiver systems are widely applied to wireless control systems of electric doors and windows due to long transmission distance, reliable data transmission, good wall penetrating performance, low power consumption and low cost.
Currently, the 315MHz and 433MHz wireless control systems in the market mostly adopt 1527 fixed codes for data transmission. The 1527 code is in a fixed code format, and the number of address codes and control code bits are fixed, which determines that the capacity of the address codes in the code format is limited. Since 1527 fixed codes are standard code formats, transmitters and receivers of different vendors that employ such codes have versatility. Thus, such fixed encoding formats are widely adopted by products currently on the market.
Because the capacity of the address code adopting the fixed coding format is limited, the probability of the occurrence of the repeated code of the address code of the product in a small range is greatly increased along with the increasing of the product quantity in the market. The situation of mutually stringing codes among different users can occur, which can lead to serious safety accidents. In addition, because the number of address codes of the fixed code is limited and the coding standards are unified, the coding mode is easy to be cracked by violence and is easy to be copied by others in a hidden way, and serious safety accidents can be caused.
In order to avoid the above drawbacks of fixed codes, many manufacturers also use rolling code formats. By adopting the rolling code format, the safety of the product is greatly improved, but the prior rolling code cannot be compatible with the prior fixed code product, and the popularity of the product in the market is greatly reduced. In addition, the current rolling codes have the risks that the codes are easy to leak and easy to be copied by others in a hidden way because the codes are encrypted and fixed and are managed manually.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a wireless transmitting and receiving method for door and window control, which is applicable to a 433MHz or 315 MHz-based electric door and window wireless control system consisting of a transmitting terminal and a receiving terminal, and realizes a 1527 fixed code product which is compatible with the market and is universal; meanwhile, by introducing a rolling coding mode adopting a random password, the safety of wireless data receiving and transmitting is greatly improved.
The invention is realized by the following technical scheme, which comprises the following steps: s1, a transmitting terminal generates a 20-bit address code, a 4-bit control code and a 20-bit synchronous code; s2, after adding 1 to the 20-bit synchronous code, the transmitting terminal performs synchronous encryption calculation through the 20-bit synchronous encryption calculation code to generate an encrypted synchronous code; s3, the transmitting terminal performs check calculation on 40-bit data consisting of the 20-bit synchronous code and the 20-bit synchronous encryption calculation code according to the check calculation code to obtain a 4-bit check code; s4, the transmitting terminal transmits 48-bit transmission data consisting of a 20-bit address code, a 4-bit control code, a 20-bit encryption synchronous code and a 4-bit check code outwards through radio; s5, the receiving terminal takes out a 20-bit address code and a 4-bit control code from the received 48-bit transmission data, and verifies and compares the address codes; s6, the receiving terminal decrypts the received 20-bit encryption synchronous code according to the synchronous encryption calculation code to obtain a 20-bit current synchronous code; s7, the receiving terminal compares the current synchronous code obtained by decryption calculation with the synchronous code obtained in the previous control operation; s8, the receiving terminal performs verification calculation on the 20-bit current synchronous code and the 20-bit synchronous encryption calculation code according to the verification calculation code to obtain a current verification code; s9, the receiving terminal compares the current check code obtained by check calculation with the received 4-bit check code; s10, the receiving terminal determines whether the current control operation is effective according to the verification comparison result of the address code, the synchronous code and the check code, if so, the receiving terminal executes the control operation and stores the current synchronous code.
Further, in the step S1, the 20-bit address code and the 4-bit control code adopt 1527 fixed coding formats to form coded low 24 bits of the transmission data; the 20-bit sync code is gradually increased from 0 to 1048576 every time the transmitting terminal performs a control operation.
Further, in the 48-bit transmission data in the step S5, the arrangement sequence from high to low is as follows: a 4-bit check code, a 20-bit encryption synchronous code, a 4-bit control code and a 20-bit address code; the transmission is performed by 433MHz or 315 MHz.
Further, in the step S5, the verification and comparison of the address code is to compare the received 20-bit address code with the address code stored in the receiving terminal, and if the comparison is consistent, it indicates that the received address code is a valid address code; in step S7, when comparing the synchronization codes, the current synchronization code needs to be larger than the synchronization code in the previous control operation, and the current control operation party is valid; in step S9, when comparing the check codes, the current check code is consistent with the comparison result of the received check code, and the current control operator is valid.
Furthermore, the synchronous encryption calculation codes in the steps S2 and S6 and the check calculation codes in the steps S3 and S8 are obtained by matching learning through a transmitting terminal and a receiving terminal, and are randomly generated when the transmitting terminal is powered on for the first time.
The invention also comprises a matching learning method of the transmitting terminal and the receiving terminal, which comprises the following steps: s1, a transmitting terminal generates a 20-bit address code and a 4-bit learning code; s2, the transmitting terminal is electrified for the first time to generate 24-bit random codes; s3, taking the high 20 bits of the random code as a synchronous encryption calculation code and the low 4 bits as a check calculation code; s4, the transmitting terminal transmits 48-bit transmission data consisting of a 20-bit address code, a 4-bit learning code, a 20-bit synchronous encryption calculation code and a 4-bit check calculation code outwards through radio; s5, the receiving terminal is triggered to enter a matching learning state externally; s6, the receiving terminal takes out the 20-bit address code and the 4-bit learning code from the received wireless transmission data and respectively performs verification and comparison; s7, the receiving terminal takes out a 20-bit synchronous encryption calculation code and a 4-bit check calculation code from the received wireless transmission data;
and S8, the receiving terminal stores the received address code, the encryption calculation code and the verification calculation code, and is used for address comparison, synchronous code decryption calculation and verification calculation in normal control operation.
Further, in step S1 of the above-mentioned matching learning method, the specific value of the 4-bit learning code is a specified value agreed for the transmitting terminal to perform matching learning; in step S2, the random code generation is generated and stored only when the transmitting terminal first generates power, and the random code is not changed any more in any control operation later.
Further, in step S4 of the above-mentioned matching learning method, the order of the transmitted 48-bit transmission data from high to low is: a 4-bit check calculation code, a 20-bit synchronous encryption calculation code, a 4-bit learning code and a 20-bit address code; the transmission is performed by 433MHz or 315 MHz.
Further, in step S5 of the above-mentioned matching learning method, the external trigger of the receiving terminal to enter the matching learning is implemented by means of an external trigger button.
Further, in step S6 of the above-mentioned matching learning method, the verification and comparison of the 20-bit address code is to compare the extracted address code with the address code stored in the receiving terminal, if the extracted address code does not exist, it indicates that the current matching learning operation is valid; the verification comparison of the 4-bit learning code is to compare the extracted 4-bit learning code with the designated numerical value representing the matching learning operation, and if the obtained 4-bit learning code is consistent with the designated numerical value representing the matching learning operation, the current matching learning operation is indicated to be effective.
Compared with the prior art, the invention has the following beneficial effects: the invention adopts a combination mode of 24-bit fixed codes and 24-bit rolling codes to form 48-bit data codes, and realizes the wireless control of the electric doors and windows by carrying out data transmission based on a 433MHz or 315MHz wireless receiving and transmitting system. The low 24-bit data of the 48-bit data adopts 1527 fixed coding format to code the address code and the control code, thereby realizing compatibility with the original fixed code product in the market; the high 24-bit data is rolling coded data composed of a 20-bit encryption synchronous code and a 4-bit check code. In the rolling coding, the 20-bit synchronous encryption calculation code and the 4-bit verification calculation code which are randomly generated are introduced to encrypt the 20-bit synchronous code, and the synchronous code and the synchronous encryption calculation code are verified at the same time, so that the safety of data transmission is greatly improved.
Drawings
Fig. 1 is a flowchart of a normal control operation of a wireless transmitting and receiving method for controlling doors and windows according to an embodiment of the present invention;
fig. 2 is a flow chart of matching learning of a transmitting terminal and a receiving terminal in an embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. It should be noted that, for convenience of description, only some, but not all of the structures related to the present invention are shown in the drawings.
The flow of normal control operation of a wireless transmitting and receiving method for controlling doors and windows is shown in fig. 1, the method is executed by an electric door and window wireless control system based on 433MHz or 315MHz wireless transmission, which consists of a transmitting terminal and a receiving terminal, and specifically comprises the following steps:
and S1, the transmitting terminal generates a 20-bit address code, a 4-bit control code and a 20-bit synchronous code.
Wherein, 20 bit address codes and 4 bit control codes adopt 1527 fixed coding format, which is compatible with the market general fixed coding products.
And S2, after adding 1 to the 20-bit synchronous code, the transmitting terminal performs synchronous encryption calculation through the 20-bit synchronous encryption calculation code to generate an encrypted synchronous code.
Wherein the synchronization code is 20 bits in total, and the transmitting terminal performs each control operation on the synchronization code, and gradually increases from 0 to 1048576. And the synchronous encryption calculation code adopted by the synchronous code encryption calculation is 20 bits in total and is randomly generated when the transmitting terminal is electrified for the first time. After the synchronous code is encrypted and calculated, a 20-bit encrypted synchronous code is generated.
And S3, the transmitting terminal performs check calculation on 40-bit data consisting of the 20-bit synchronous code and the 20-bit synchronous encryption calculation code according to the check calculation code to obtain a 4-bit check code.
The 4-bit check calculation code adopted for checking and calculating the synchronous code and the synchronous encryption calculation code is randomly generated when the transmitting terminal is electrified for the first time.
And S4, the transmitting terminal transmits 48-bit transmission data consisting of a 20-bit address code, a 4-bit control code, a 20-bit encryption synchronous code and a 4-bit check code outwards through radio.
Wherein, in the transmitted 48-bit data coding, the arrangement sequence from high to low is as follows: a 4-bit check code, a 20-bit encryption synchronous code, a 4-bit control code and a 20-bit address code.
And S5, the receiving terminal takes out the 20-bit address code and the 4-bit control code from the received 48-bit transmission data, and performs verification and comparison on the address code.
And S6, the receiving terminal decrypts the received 20-bit encryption synchronous code according to the synchronous encryption calculation code to obtain the 20-bit current synchronous code.
The synchronous encryption calculation code adopted by the encryption synchronization code for decryption calculation is obtained by matching learning of a transmitting terminal and a receiving terminal and is randomly generated when the transmitting terminal is electrified for the first time.
And S7, the receiving terminal compares the current synchronous code obtained by decryption calculation with the synchronous code in the previous control operation.
The current synchronization code is larger than the synchronization code in the previous control operation, and the current control operation party is valid. When the receiving terminal is powered on for the first time, the initial value of the stored synchronization code of the previous control operation is taken as 0.
And S8, the receiving terminal performs verification calculation on the 20-bit current synchronous code and the 20-bit synchronous encryption calculation code according to the verification calculation code to obtain the current verification code.
The check calculation code adopted by the check calculation is obtained by matching and learning of the transmitting terminal and the receiving terminal, and is randomly generated when the transmitting terminal is electrified for the first time.
And S9, the receiving terminal compares the current check code obtained by check calculation with the received 4-bit check code.
The comparison result of the current check code and the received check code is consistent, and the current control operator is effective.
And S10, the receiving terminal determines whether the current control operation is effective according to the verification comparison result of the address code, the synchronous code and the check code, if so, the receiving terminal executes the control operation and stores the current synchronous code.
And the verification and comparison operation of the address codes is to compare the received 20-bit address codes with the address codes stored in the receiving terminal, and if the comparison is consistent, the received address codes are valid address codes.
And comparing the verification of the address code, the synchronous code and the check code to indicate that the control operation corresponding to the operation code received by the receiving terminal is effective, and executing the control operation of the pair.
If the current control operation is valid, the current synchronous code is stored into the receiving terminal as the synchronous code of the previous control operation, so that the next time of the control operation, the validity of the synchronous code is verified.
According to the technical scheme of normal control operation of the wireless transmitting and receiving method, the address code and the control code are coded by adopting a 1527 fixed coding format in the low 24 bit data in 48 bit data transmitted by a 433MHz or 315MHz wireless receiving and transmitting system, so that compatibility with the original fixed code product in the market is realized; the high 24-bit data is rolling coded data composed of a 20-bit encryption synchronous code and a 4-bit check code, and the synchronous code and the synchronous encryption calculation code are checked while the 20-bit synchronous code is encrypted, so that the duplication code rate of the system is greatly reduced, and the safety of data transmission of the system is improved.
The flow chart of the matching learning method of the transmitting terminal and the receiving terminal is shown in fig. 2, the method is executed by an electric door and window wireless control system based on 433MHz or 315MHz wireless transmission and composed of one transmitting terminal and one receiving terminal, and the method specifically comprises the following steps:
and S1, the transmitting terminal generates a 20-bit address code and a 4-bit learning code.
The specific numerical value of the 4-bit learning code is a appointed numerical value which is appointed for the transmitting terminal to perform matching learning.
And S2, the transmitting terminal is electrified for the first time to generate 24-bit random codes.
Wherein the random code generation is generated and stored only when the transmitting terminal is first powered on, and the random code is not changed any more in any control operation later.
And S3, taking the upper 20 bits of the random code as a synchronous encryption calculation code and the lower 4 bits as a check calculation code.
The transmitting terminal acquires the synchronous encryption calculation code and the check calculation code, then stores the synchronous encryption calculation code and the check calculation code, and the synchronous encryption calculation code and the check calculation code are not changed any more in any control operation later.
And S4, the transmitting terminal transmits 48-bit transmission data consisting of a 20-bit address code, a 4-bit learning code, a 20-bit synchronous encryption calculation code and a 4-bit check calculation code outwards through radio.
Wherein, in the transmitted 48-bit data coding, the arrangement sequence from high to low is as follows: a 4-bit check calculation code, a 20-bit synchronous encryption calculation code, a 4-bit learning code and a 20-bit address code.
And S5, the receiving terminal is externally triggered to enter a matching learning state.
Before the matching learning operation, the receiving terminal needs to be triggered by an external triggering mode such as a button, and the receiving terminal is triggered to perform the matching learning state.
And S6, the receiving terminal takes out the 20-bit address code and the 4-bit learning code from the received wireless transmission data and respectively performs verification and comparison.
Comparing the extracted address code with the address code stored in the receiving terminal, and if the extracted address code does not exist, indicating that the current matching learning operation is effective; and comparing the extracted 4-bit learning code with a designated numerical value representing the matching learning operation, and if the extracted 4-bit learning code is consistent with the designated numerical value representing the matching learning operation, indicating that the current matching learning operation is effective.
And S7, the receiving terminal takes out the 20-bit synchronous encryption calculation code and the 4-bit check calculation code from the received wireless transmission data.
And S8, the receiving terminal stores the received address code, the encryption calculation code and the verification calculation code and is used for address comparison, synchronous code decryption calculation and verification calculation in normal control operation.
According to the technical scheme of the matched learning of the transmitting terminal and the receiving terminal, the synchronous encryption calculation code and the check calculation code are transmitted from the transmitting terminal to the receiving terminal by utilizing specific matched learning operation, so that the risk of leakage of the synchronous encryption calculation code and the check calculation code in frequent normal control operation is avoided; on the other hand, the 20-bit synchronous encryption calculation code and the 4-bit check calculation code are randomly generated when the transmitting terminal is electrified for the first time, so that the risk of artificial leakage of the synchronous encryption calculation code and the check calculation code is avoided. Therefore, from the perspective of generating and managing the synchronous encryption calculation code and the check calculation code, the security of data transmission is greatly improved.
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described above, and that various obvious modifications, changes, and substitutions can be made therein without departing from the scope of the invention. Therefore, while the invention has been described in connection with the above embodiments, it is to be understood that the invention is not limited to the specific embodiments disclosed and that many other equivalent embodiments may be made without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (9)

1. The wireless transmitting and receiving method for controlling the doors and windows is characterized by comprising the following steps of:
s1, a transmitting terminal generates a 20-bit address code, a 4-bit control code and a 20-bit synchronous code;
s2, after adding 1 to the 20-bit synchronous code, the transmitting terminal performs synchronous encryption calculation through the 20-bit synchronous encryption calculation code to generate an encrypted synchronous code;
s3, the transmitting terminal performs check calculation on 40-bit data consisting of the 20-bit synchronous code and the 20-bit synchronous encryption calculation code according to the check calculation code to obtain a 4-bit check code;
s4, the transmitting terminal transmits 48-bit transmission data consisting of a 20-bit address code, a 4-bit control code, a 20-bit encryption synchronous code and a 4-bit check code outwards through radio;
s5, the receiving terminal takes out a 20-bit address code and a 4-bit control code from the received 48-bit transmission data, and verifies and compares the address codes; the verification and comparison operation of the address codes is to compare the received 20-bit address codes with the address codes stored in the receiving terminal, and if the comparison is consistent, the received address codes are valid address codes;
s6, the receiving terminal decrypts the received 20-bit encryption synchronous code according to the synchronous encryption calculation code to obtain a 20-bit current synchronous code;
s7, the receiving terminal compares the current synchronous code obtained by decryption calculation with the synchronous code obtained in the previous control operation; the current synchronous code is larger than the synchronous code in the previous control operation, and the current control operation party is effective; when the receiving terminal is powered on for the first time, the initial value of the stored synchronization code of the previous control operation is taken as 0;
s8, the receiving terminal performs verification calculation on the 20-bit current synchronous code and the 20-bit synchronous encryption calculation code according to the verification calculation code to obtain a current verification code; the verification computing code adopted by the verification computing is obtained by matching learning of a transmitting terminal and a receiving terminal and is randomly generated when the transmitting terminal is electrified for the first time;
s9, the receiving terminal compares the current check code obtained by check calculation with the received 4-bit check code; the current check code is consistent with the comparison result of the received check code, and the current control operation party is effective;
s10, the receiving terminal determines whether the current control operation is effective according to the verification comparison result of the address code, the synchronous code and the check code, if so, the receiving terminal executes the control operation and stores the current synchronous code.
2. The method for wireless transmitting and receiving door and window control according to claim 1, wherein in step S1, the 20-bit address code and the 4-bit control code adopt 1527 fixed coding format to form encoded low 24 bits of transmitted data; the 20-bit sync code is gradually increased from 0 to 1048576 every time the transmitting terminal performs a control operation.
3. The method for wireless transmitting and receiving door and window control according to claim 1, wherein in the 48-bit transmission data in step S5, the order from high to low is: a 4-bit check code, a 20-bit encryption synchronous code, a 4-bit control code and a 20-bit address code; the transmission is performed by 433MHz or 315 MHz.
4. The method for wireless transmitting and receiving door and window control according to claim 1, wherein the synchronous encryption calculation codes in the steps S2 and S6 and the check calculation codes in the steps S3 and S8 are obtained by matching learning by a transmitting terminal and a receiving terminal, and are randomly generated when the transmitting terminal is powered on for the first time.
5. The door and window control wireless transmitting and receiving method according to claim 4, wherein the matching learning of the transmitting terminal and the receiving terminal comprises the steps of:
s1, a transmitting terminal generates a 20-bit address code and a 4-bit learning code;
s2, the transmitting terminal is electrified for the first time to generate 24-bit random codes;
s3, taking the high 20 bits of the random code as a synchronous encryption calculation code and the low 4 bits as a check calculation code;
s4, the transmitting terminal transmits 48-bit transmission data consisting of a 20-bit address code, a 4-bit learning code, a 20-bit synchronous encryption calculation code and a 4-bit check calculation code outwards through radio;
s5, the receiving terminal is triggered to enter a matching learning state externally;
s6, the receiving terminal takes out the 20-bit address code and the 4-bit learning code from the received wireless transmission data and respectively performs verification and comparison;
s7, the receiving terminal takes out a 20-bit synchronous encryption calculation code and a 4-bit check calculation code from the received wireless transmission data;
and S8, the receiving terminal stores the received address code, the encryption calculation code and the verification calculation code, and is used for address comparison, synchronous code decryption calculation and verification calculation in normal control operation.
6. The door and window control wireless transmitting and receiving method according to claim 5, wherein in the step S1 of the transmitting terminal and the receiving terminal through matching learning, the specific value of the 4-bit learning code is a specified value agreed for the transmitting terminal to perform matching learning; in step S2, the random code generation is generated and stored only when the transmitting terminal first generates power, and the random code is not changed any more in any control operation later.
7. The door and window control wireless transmitting and receiving method according to claim 5, wherein in the step S4 of the transmitting terminal and the receiving terminal through matching learning, the sequence of the transmitted 48-bit transmission data from high to low is: a 4-bit check calculation code, a 20-bit synchronous encryption calculation code, a 4-bit learning code and a 20-bit address code; the transmission is performed by 433MHz or 315 MHz.
8. The door and window control wireless transmitting and receiving method according to claim 5, wherein in the step S5 of the transmitting terminal and the receiving terminal through the matching learning, the receiving terminal is externally triggered to enter the matching learning by means of an external trigger button.
9. The method for controlling wireless transmitting and receiving doors and windows according to claim 5, wherein in step S6 of the transmitting terminal and the receiving terminal through matching learning, the verification and comparison of 20-bit address codes are to compare the extracted address code with the address code stored in the receiving terminal, and if the extracted address code does not exist, the current matching learning operation is indicated to be valid; the verification comparison of the 4-bit learning code is to compare the extracted 4-bit learning code with the designated numerical value representing the matching learning operation, and if the obtained 4-bit learning code is consistent with the designated numerical value representing the matching learning operation, the current matching learning operation is indicated to be effective.
CN202210582066.0A 2022-05-26 2022-05-26 Wireless transmitting and receiving method for door and window control Active CN114978429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210582066.0A CN114978429B (en) 2022-05-26 2022-05-26 Wireless transmitting and receiving method for door and window control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210582066.0A CN114978429B (en) 2022-05-26 2022-05-26 Wireless transmitting and receiving method for door and window control

Publications (2)

Publication Number Publication Date
CN114978429A CN114978429A (en) 2022-08-30
CN114978429B true CN114978429B (en) 2023-06-30

Family

ID=82955576

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210582066.0A Active CN114978429B (en) 2022-05-26 2022-05-26 Wireless transmitting and receiving method for door and window control

Country Status (1)

Country Link
CN (1) CN114978429B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5369706A (en) * 1993-11-05 1994-11-29 United Technologies Automotive, Inc. Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code
CN103366476A (en) * 2013-07-03 2013-10-23 郑玉龙 Wireless remote control 626 alarm
CN107492175A (en) * 2017-08-25 2017-12-19 深圳市光域物联科技有限公司 Visible ray safety door latch, system and method for unlocking

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1258884A (en) * 1985-11-07 1989-08-29 Craig F. Szczutkowski Method and apparatus for transceiving cryptographically encoded digital data
CN101866534B (en) * 2010-01-29 2013-03-13 中南大学 Automobile remote-control key-free door control identity authentication method
CN104464057A (en) * 2014-12-17 2015-03-25 江苏合智同创电子科技有限公司 Hopping encoding method for car entrance guard system
CN105376003A (en) * 2015-10-12 2016-03-02 四川九鼎智远知识产权运营有限公司 Audio communication control code encryption method and encryption system
CN107331142A (en) * 2017-08-07 2017-11-07 普诚创智(成都)科技有限公司 Remote control coding/decoding system
CN107749795B (en) * 2017-10-13 2021-03-30 车展交通器材(台山)有限公司 Automobile remote control method based on rolling code secondary encryption
CN110148292A (en) * 2019-06-28 2019-08-20 湖南纳雷科技有限公司 A kind of wireless remote control decoding method and coding and decoding device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5369706A (en) * 1993-11-05 1994-11-29 United Technologies Automotive, Inc. Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code
CN103366476A (en) * 2013-07-03 2013-10-23 郑玉龙 Wireless remote control 626 alarm
CN107492175A (en) * 2017-08-25 2017-12-19 深圳市光域物联科技有限公司 Visible ray safety door latch, system and method for unlocking

Also Published As

Publication number Publication date
CN114978429A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
CN108737104A (en) Electronic device for Verification System
EP2453606A1 (en) Secured Acknowledge Protocol for Automotive Remote Keyless Entry Systems and for Networked Sensor Devices
CN107914665B (en) Vehicle remote safety remote control system and remote control method
CN109040114B (en) Safe and reliable image transmission method based on narrow-band Internet of things
JPH05336108A (en) Radio communication system
CN107395751A (en) A kind of remote control system of intelligent household electrical appliance and method
CN110310397B (en) Method for realizing authentication of anti-theft key of pure electric vehicle
US20170072875A1 (en) Data communication method for vehicle, electronic control unit and system thereof
CN110190952A (en) It is a kind of based on quantum random number to the encrypted transmission method of Internet of Things safety
US20070286414A1 (en) Baud rate modulation encoding/decoding method and device for remote controller
CN114978429B (en) Wireless transmitting and receiving method for door and window control
AU2010284792B2 (en) Method and apparatus for reducing overhead for integrity check of data in wireless communication system
CN108155996B (en) Smart home safe communication method based on family's channel
JP7410771B2 (en) Authentication system and authentication method
CN109166218B (en) Automobile key communication method based on time encryption
US7774677B2 (en) Method and device for transmitting information with verification of unintentional and intentional transmission errors
CN107749795B (en) Automobile remote control method based on rolling code secondary encryption
CN2938591Y (en) Remote control device of uneasy deciphering cipher
CN109272729B (en) Identification method and device for anti-theft code remote controller
CN107579824B (en) Automobile remote control method based on rolling code
CN113923656B (en) Interception-preventing wireless encryption transmission method and apparatus
CN102185697B (en) Solution of two-factor authentication security system
CN104184591A (en) TTF authentication method
KR101269023B1 (en) Apparatus and method for preventing spoofing attack
CN114040366B (en) Bluetooth connection encryption method with high network communication security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant