EP0807733A2 - Vorrichtung und Verfahren zur Identifikationssignalprüfung - Google Patents

Vorrichtung und Verfahren zur Identifikationssignalprüfung Download PDF

Info

Publication number
EP0807733A2
EP0807733A2 EP97303313A EP97303313A EP0807733A2 EP 0807733 A2 EP0807733 A2 EP 0807733A2 EP 97303313 A EP97303313 A EP 97303313A EP 97303313 A EP97303313 A EP 97303313A EP 0807733 A2 EP0807733 A2 EP 0807733A2
Authority
EP
European Patent Office
Prior art keywords
signal
random number
identification signal
identification
memory unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP97303313A
Other languages
English (en)
French (fr)
Other versions
EP0807733A3 (de
Inventor
Hiroyuki Sony Corp. Intell. Prop. Div. Takamatsu
Yoshio Sony Corp. Intell. Prop. Div. Harada
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Publication of EP0807733A2 publication Critical patent/EP0807733A2/de
Publication of EP0807733A3 publication Critical patent/EP0807733A3/de
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
    • G07C2009/00396Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method starting with prompting the keyless data carrier
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00785Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by light

Definitions

  • the present invention relates to identification signal checking apparatus and methods, such as those suitable for use in a keyless entry system.
  • a keyless entry system has been proposed.
  • infrared rays or radio waves are used to transmit an identification signal from a key apparatus side to a lock apparatus side for the locking or the unlocking thereof.
  • Such keyless entry system employs a one-way communication in which the key apparatus side constantly transmits the same identification signal. Therefore, when this communication is intercepted, the identification signal may disadvantageously be stolen easily.
  • the identification signal is transmitted by using the infrared rays, it is possible to copy the identification signal easily by a so-called learning remote controller, which has already been developed into a social problem.
  • a keyless entry system has been proposed in which a portable apparatus (key apparatus) transmits an encryption value to a main apparatus (lock apparatus) and the main apparatus determines whether or not an encryption value which it obtains by itself by calculation of a value signal coincides with the received encryption value (see Japanese laid-open patent publication No. 7-269196 and Japanese laid-open patent publication No. 7-274258).
  • the main apparatus determines whether or not the encryption value which it obtains by itself by calculation of the value signal coincides with the received encryption value, except when the portable apparatus (key apparatus) and the main apparatus (lock apparatus) are manufactured, it is impossible that, after the portable apparatus and the main apparatus are manufactured, a specific identification signal is registered in both of the key apparatus and the main apparatus by transmitting the same specific identification signal from the portable apparatus to the main apparatus.
  • an identification signal checking apparatus includes an apparatus to be detected having a first wireless transmitting and receiving unit, a first signal processing unit and a first memory unit for storing an identification signal and includes a detecting apparatus having a second wireless transmitting and receiving unit, a second signal processing unit, a second memory unit for storing an identification signal, and a communication permission signal generating means.
  • the detecting apparatus receives a response request signal from the apparatus to be detected, the detecting apparatus transmits a random number signal obtained from the random number generating unit.
  • the apparatus to be detected encrypts said identification signal stored in the first memory unit by using the random number signal and transmits the encrypted identification signal to the detecting apparatus.
  • the detecting apparatus decrypts the encrypted identification signal and checks whether or not the decrypted identification signal coincides with the identification signal stored in the second memory unit.
  • the detecting transmits the random number signal and the apparatus to be detected (key apparatus) encrypts the identification signal by using the random number signal and transmits it to the detecting apparatus. Therefore, since the identification signal transmitted from the apparatus to be detected to the detecting apparatus is the encrypted signal obtained by encryption employing the random number signal and hence is always an unique signal, the security is improved.
  • the detecting apparatus decrypts the encrypted identification signal, even if the apparatus to be detected and the detecting apparatus are separately manufactured and distributed on the market, when the detecting apparatus is built in a door or the like, the detecting apparatus (lock apparatus) decrypts the encrypted signal transmitted from the apparatus to be detected (key apparatus) to obtain the specific identification signal. If the identification signal obtained by decryption is registered in the detecting apparatus, then it is possible to register the same identification signal in both of the apparatus to be detected (key apparatus) and the detecting apparatus (lock apparatus) .
  • an identification signal checking apparatus and an identification signal checking method according to a first embodiment of the present invention will be described with reference to the accompanying drawings.
  • the identification signal checking apparatus and method are applied to a keyless entry system for opening and closing a door.
  • a portable key apparatus 1 (an apparatus to be detected) has a switch unit 2 for issuing commands to open and close a door, a signal processing circuit unit 3, an infrared-ray transmitting and receiving unit 4 for communicating with a lock apparatus 10 described later on, and a memory unit 5 for storing a specific (own) identification signal ID.
  • the signal processing circuit unit 3 is formed of a microcomputer. When the switch unit 2 issues a commend to open or close the door by operating a switch thereof, the signal processing circuit unit 3 generates a response request signal including a lock/unlock command signal and supplies this response request signal to the infrared-ray transmitting and receiving unit 4. The infrared-ray transmitting and receiving unit 4 transmits the response request signal to the lock apparatus 10.
  • the signal processing circuit unit 3 When the key apparatus 1 receives a random number signal X formed of 24 bits, for example, from the lock apparatus 10, the signal processing circuit unit 3 encrypts a specific identification signal ID of 24 bits, for example, stored in the memory unit 5 to convert it into a code signal of 24 bits, for example, in accordance with a predetermined function f(X, ID) by using the 24-bit random number signal X, for example. Then, the signal processing circuit unit 3 transmits the encrypted signal f(X, ID) to the lock apparatus 10.
  • This function f(X, ID) is defined as shown below, for example, such that if respective corresponding bits of the random number signal X and the identification signal ID have the same value of "1" or "0", then the value of a corresponding bit in the function f(X, ID) is set to "1" and if the respective corresponding bits have the values different from each other, then the value thereof in the function f(X, ID) is set to "0".
  • the infrared-ray transmitting and receiving unit 4 is arranged so as to carry out communication in accordance with a known base band system.
  • the base band system permits high-speed communication at a lower consumed power and simplifies a circuit arrangement as compared with other modulation systems such as an amplitude shift keying (ASK), a frequency shift keying (FSK) or the like.
  • ASK amplitude shift keying
  • FSK frequency shift keying
  • the lock apparatus 10 is provided at a predetermined position in association with the door.
  • the lock apparatus 10 has an infrared-ray transmitting and receiving unit 11 for communicating with the key apparatus 1, a signal processing circuit unit 12, a memory unit 13 for storing a specific (own) identification signal ID, a random number generating unit 14 for generating the random number signal X, and a drive unit 15 for controlling a door locking or unlocking operation based on a command signal from the signal processing circuit unit 12.
  • a binary counter for processing 24 bits for example, is employed as the random number generating unit 14.
  • This 24-bit binary counter carries out a count operation in accordance with a predetermined clock signal regardless of the communication.
  • the lock apparatus 10 receives the response request signal from the key apparatus 1, the operation of the 24-bit binary counter is stopped and then a count value of the binary counter at this time is read, thereby the 24-bit random number signal X, for example, being obtained.
  • the signal processing circuit unit 12 is formed of a microcomputer. When the lock apparatus 10 receives the response request signal from the key apparatus 1, the signal processing circuit unit 12 transmits the random number signal X generated by the random number generating unit 14 from the lock apparatus 10 to the key apparatus 1.
  • the signal processing circuit unit 12 decrypts the received encrypted signal f(X, ID) in accordance with a predetermined function f -1 ⁇ f(x, ID), X ⁇ by using the previously transmitted 24-bit random number signal X, for example, and checks whether or not the identification signal ID obtained by this decryption coincides with the specific (own) identification signal ID previously stored (registered) in the memory unit 13.
  • the signal processing circuit unit 12 supplies a locking/unlocking command signal based on a door opening/closing command included in the response request signal to the drive unit 15. Then, under the operation of the drive unit 15, the door is opened or closed.
  • the infrared-ray transmitting and receiving unit 11 is arranged similarly to the above-mentioned infrared-ray transmitting and receiving unit 4, and arranged so as to carry out communication in accordance with the known base band system.
  • batteries 6 and 16 are used for energizing the key apparatus 1 and the lock apparatus 10, respectively.
  • FIG. 2 is a flowchart therefor and with reference to FIGS. 3A to 3D which are timing charts therefor.
  • the same specific (own) identification signals ID e.g., the identification signals ID formed of codes of 24 bits, for example, are previously registered (stored) in the memory units 5 and 13.
  • step S1 of the flowchart shown in FIG. 2 the switch unit 2 of the key apparatus 1 is operated and the switch thereof is set in its on-state, thereby a command to open or close a door being issued.
  • step S2 as shown in FIG. 3A, for example, the key apparatus 1 transmits the response request signal including the door opening/closing command signal to the lock apparatus 10 for a period of 100 ms. Then, the processing proceeds to step S3.
  • step S3 the lock apparatus 10 receives the response request signal as shown in FIG. 3D. Then, the processing proceeds to step S4, wherein the lock apparatus 10 obtains the 24-bit random number signal X, for example, generated by the random number generating unit 14.
  • step S5 as shown in FIG. 3C, the lock apparatus 10 transmits the random number signal X to the key apparatus 1 for a period of 30 ms. Then, the processing proceeds to step S6.
  • step S6 the key apparatus 1 receives the random number signal X as shown in FIG. 3B. Then, the processing proceeds to step S7, wherein the key apparatus 1 encrypts the specific (own) identification signal ID registered in the memory unit 5 to convert it into the 24-bit code signal, in accordance with the predetermined function f(X, ID) by using the 24-bit random number signal X, for example, and obtains the encrypted signal f(X, ID). Then, the processing proceeds to step S8, wherein the key apparatus 1 transmits the encrypted signal f(X, ID) to the lock apparatus 10 during the period of 30 ms, for example, as shown in FIG. 3A. Then, the processing proceeds to step S9.
  • step S9 the lock apparatus 10 receives the encrypted signal f(X, ID) as shown in FIG. 3D. Then, the processing proceeds to step S10, wherein the lock apparatus 10 decrypts the received encrypted signal f(X, ID) in accordance with the predetermined function f -1 ⁇ f(x, ID), X ⁇ by using the previously transmitted random number signal X. Then, the processing proceeds to step S11, wherein the lock apparatus 10 checks whether or not the decrypted identification signal ID coincides with the specific (own) identification signal ID previously registered in the memory unit 13.
  • step S12 as a result of the check processing, if the decrypted identification signal ID coincides with the specific (own) identification signal ID previously registered (stored) in the memory unit 13, then, in accordance with the door opening or closing command signal of the response request signal, the signal processing circuit unit 12 supplies the unlocking or locking command signal to the drive unit 15 for carrying out the unlocking or locking operation of the door. Then, under the control of the drive unit 15, the door is opened or closed.
  • the lock apparatus 10 every time when the operation of opening or closing the door is attempted, the lock apparatus 10 generates the random number signal X and the key apparatus 1 encrypts the identification signal ID by using the random number signal X and transmits the encrypted signal f(X, ID) to the lock apparatus 10. Therefore, since the signals transmitted in this both-way communication are constantly different from each other, even if these communication signals are intercepted, the specific (own) identification signal ID is prevented from being stolen.
  • the possibility that the code signals coincide with each other by accident is constant, e.g., the possibility is constantly about one over 16.7 million in a case of the 24-bit code signal. Therefore, it is advantageously possible to realize the extremely high security with ease.
  • the lock apparatus 10 decrypts the encrypted identification signal f(X, ID), even if the key apparatus 1 and the lock apparatus 10 are separately manufactured and distributed on a market, when the lock apparatus 10 is built in a door or the like, the lock apparatus 10 decrypts the encrypted signal f(X, ID) transmitted from the key apparatus 1 to obtain the specific (own) identification signal ID. Therefore, if the identification signal ID obtained by decryption is registered in the memory unit 13 of the lock apparatus 10, then it is possible to register the same identification signal ID in both of the key apparatus 1 and the lock apparatus 10.
  • FIGS. 4 and 5 An identification signal checking apparatus according to a second embodiment of the present invention will be described with reference to FIGS. 4 and 5.
  • parts corresponding to those in FIG. 1 are marked with the same reference numerals and hence need not be described.
  • a nonvolatile memory unit 5 of a key apparatus 1 stores a plurality of, e.g., sixteen identification signals ID 1 , ID 2 , ..., ID 16 .
  • a signal processing circuit unit 3 of the key apparatus 1 determines which of random number signals X 1 , X 2 , ..., X 16 a random number signal formed of lower 4 bits of the 24 bits of the received random number signal X is, and, if the lower 4-bit random number signal is a random number signal X 1 , selects one of sixteen identification signals ID 1 , ID 2 , ..., ID 16 stored in the memory unit 5, e.g., the identification signal ID 1 in response to the random number signal X 1 .
  • the random number signals X 1 , X 2 ,..., X 16 formed of the lower 4 bits of the above 24-bit random number signal X respectively correspond to sixteen identification signals ID 1 , ID 2 , ..., ID 16 stored in the memory unit 5.
  • Table 2 lower 4-bit random number identification signal encrypted signal X 1 0000 ID 1 f(X, ID 1 )
  • each of the sixteen identification signals ID 1 , ID 2 , ..., ID 16 stored in the memory unit 5 is formed of 24 bits, for example.
  • the signal processing circuit unit 3 encrypts one of the identification signals ID 1 , ID 2 , ..., ID 16 selected as shown in Table 2 in response to the received one of the lower 4-bit random number signal X 1 , X 2 , ..., X 16 of the random number signal X by using the received random number signal X, and obtains one of the encrypted signals f(X, ID 1 ), f(X, ID 2 ), ..., f(X, ID 16 ) shown in Table 2.
  • the key apparatus 1 transmits the obtained one of the encrypted signals f(X, ID 1 ), f(X, ID 2 ), ..., f(X, ID 16 ) to the lock apparatus 10.
  • the same identification signals e.g., the sixteen identification signals ID 1 , ID 2 , ..., ID 16 stored in the memory unit 5 of the key apparatus 1 are also stored in the memory unit 13 of the lock apparatus 10 shown in FIG. 4.
  • the signal processing circuit unit 12 of the lock apparatus 10 stores the 24-bit random number signal X, for example, generated by the random number generating unit 14 and transmitted therefrom in response to the response request signal from the key apparatus 1, and selects one of, for example, the sixteen identification signals ID 1 , ID 2 , ..., ID 16 stored in the memory unit 13 similarly to the key apparatus 1 in response to the selected one of the lower 4-bit random number signals X 1 , X 2 , ..., X 16 of the random number signal X.
  • the identification signal selected by the key apparatus 1 in response to one of the lower 4-bit random number signal X 1 , X 2 , ..., X 16 of the random number signal X is set the same as the identification signal selected by the lock apparatus 10 in response to the same one of the lower 4-bit random number signal X 1 , X 2 , ..., X 16 of the random number signal X.
  • the lock apparatus 10 When the lock apparatus 10 receives from the key apparatus 1 one of the encrypted signals f(X, ID 1 ), f(X, ID 2 ), ..., f(X, ID 16 ) obtained by encrypting the selected one of the identification signals ID 1 , ID 2 , ..., ID 16 , e.g., the encrypted signal f(X, ID1) by using the random number signal X, the signal processing circuit unit 12 decrypts the encrypted signals f(X, ID 1 ) in accordance with a predetermined function f -1 ⁇ f(X, ID 1 ), X ⁇ by using the identification signal ID 1 selected in response to the random number signal X 1 , for example, selected from the lower 4-bit random number signals X 1 , X 2 ,..., X 16 of the random number signal X, and checks whether or not the identification signal ID 1 obtained by the decryption coincides with the one of the identification signals ID 1 , ID 2 ,..., ID 16 previously selected in response to the lower 4-bit random
  • FIG. 5 is a flowchart therefor.
  • the same sixteen identification signals ID 1 , ID 2 , ..., ID 16 formed of codes of 24 bits, for example, are previously stored (registered) in both of the memory units 5 and 13.
  • step S21 of the flowchart shown in FIG. 5 the switch unit 2 of the key apparatus 1 is operated, thereby a command to open or close a door being issued.
  • step S22 as shown in FIG. 3A, for example, the key apparatus 1 transmits the response request signal including the door opening/closing command signal to the lock apparatus 10 for a period of 100 ms. Then the processing proceeds to step S23.
  • step S23 the lock apparatus 10 receives the response request signal as shown in FIG. 3D. Then, the processing proceeds to step S24, wherein the lock apparatus 10 obtains the 24-bit random number signal X, for example, generated by the random number generating unit 14.
  • step S25 as shown in FIG. 3C, the lock apparatus 10 transmits the random number signal X to the key apparatus 1 for the period of 30 ms, for example. Then, the processing proceeds to step S26.
  • step S26 the key apparatus 1 receives the random number signal X as shown in FIG. 3B. Then, the processing proceeds to step S27, wherein the key apparatus 1 selects one of the sixteen identification signals ID 1 , ID 2 , ..., ID 16 registered in the memory unit 5, e.g., the identification signal ID 1 in response to one of the lower 4-bit random number signals X 1 , X 2 , ..., X 16 of the random number signal X. Then, the processing proceeds to step S28.
  • step S28 the key apparatus 1 encrypts the selected identification signal ID 1 to convert it into the 24-bit code signal, in accordance with a predetermined function f(X, ID 1 ) by using the 24-bit random number signal X, for example, and then obtains the encrypted signal f(X, ID 1 ). Then, the processing proceeds to step S29, wherein the key apparatus 1 transmits the encrypted signal f(X, ID 1 ) to the lock apparatus 10 during the period of 30 ms, for example, as shown in FIG. 3A. Then, the processing proceeds to step S30.
  • step S30 the lock apparatus 10 receives the encrypted signal f(X, ID 1 ) as shown in FIG. 3D. Then, the processing proceeds to step S31, wherein the lock apparatus 10 decrypts the received encrypted signal f(X, ID 1 ) in accordance with a predetermined function f -1 ⁇ f(X, ID 1 ), X ⁇ by using the previously transmitted random number signal X. Then, the processing proceeds to step S32.
  • step S32 the lock apparatus 10 checks whether or not the decrypted identification signal ID 1 coincides with the one of the sixteen identification signals ID 1 , ID 2 , ..., ID 16 registered in the memory unit 13, e.g., the identification signal ID 1 selected in response to the selected one of the lower 4-bit random number signals X 1 , X 2 , ..., X 16 of the random number signal X.
  • step S33 as a result of the check processing, if the decrypted identification signal ID 1 coincides with the selected identification signal ID 1 , then, in accordance with the door opening or closing command signal of the response request signal, the signal processing circuit unit 12 supplies the unlocking or locking command signal to the drive unit 15 for carrying out the unlocking or locking operation of the door. Under the control of the drive unit 15, the door is opened or closed.
  • the identification signal checking apparatus according to the second embodiment shown in FIG. 4 is arranged as described above, it can easily be understood that it is possible to achieve the same effect as that of the identification signal checking apparatus according to the embodiment shown in FIG. 1.
  • the second embodiment shown in FIG. 4 since one of the sixteen identification signals ID 1 , ID 2 , ..., ID 16 is selected in response to one of the lower 4-bit random number signals X1, X 2 , ..., X 16 of the random number signal X, it is advantageously possible to improve the security further.
  • FIGS. 6 and 7 The identification signal checking apparatus according to a third embodiment of the present invention will be described with reference to FIGS. 6 and 7.
  • parts and units corresponding to those in FIG. 1 are marked with the same reference numerals and hence need not to be described in detail.
  • a nonvolatile memory unit 5 of a portable key apparatus 1 stores a specific (own) identification signal ID and a plurality of, e.g., sixteen functions f 1 , f 2 ,..., f 16 .
  • a signal processing circuit unit 3 of the key apparatus 1 determines which of random number signals X 1 , X 2 ,..., X 16 a random number signal formed of lower 4 bits of the 24 bits of the received random number signal X is, and, if the lower 4-bit random number signal is a random number signal X 1 , for example, selects one of sixteen functions f 1 , f 2 ,..., F 16 stored in a memory unit 5, e.g., the function f 1 in response to the random number signal X 1 .
  • the random number signals X 1 , X 2 ,..., X 16 formed of the lower 4 bits of the above 24-bit random number signal X respectively correspond to the sixteen functions f 1 , f 2 ,..., F 16 stored in the memory unit 5.
  • the identification signal ID stored in the memory unit 5 is formed of 24 bits, for example.
  • the signal processing circuit unit 3 encrypts the identification signal ID by using the received random number signal X and one of the functions f 1 , f 2 , ..., f 16 selected in response to one of the lower 4-bit random number signal X 1 , X 2 , ..., X 16 of the random number signal X, and obtains one of the encrypted signals f 1 (X, ID), f 2 (X, ID),..., f 16 (X, ID) shown in Table 3.
  • the key apparatus 1 transmits the obtained one of the encrypted signals f 1 (X, ID), f 2 (X, ID), ..., f16(X, ID) to the lock apparatus 10.
  • the same identification signal and the same plurality of, e.g., sixteen functions f 1 , f 2 ,..., f 16 stored in the memory unit 5 of the key apparatus 1 are also stored in the memory unit 13 of the lock apparatus 10 shown in FIG. 6.
  • the signal processing circuit unit 12 of the lock apparatus 10 stores the 24-bit random number signal X, for example, generated by the random number generating unit 14 and transmitted therefrom in response to the response request signal from the key apparatus 1, and selects one of, for example, the sixteen functions f 1 , f 2 , ..., f 16 stored in the memory unit 13 similarly to the key apparatus 1 in response to the received one of the lower 4-bit random number signals X 1 , X 2 , ..., X 16 of the random number signal X.
  • one of the functions f 1 , f 2 ,..., f 16 selected by the key apparatus 1 in response to one of the lower 4-bit random number signal X 1 , X 2 , ..., X 16 of the random number signal X is set the same as one of the functions f 1 , f 2 ,..., f 16 selected by the lock apparatus 10 in response to one of the lower 4-bit random number signals X 1 , X 2 ,..., X 16 of the random number signal X.
  • the lock apparatus 10 When the lock apparatus 10 receives from the key apparatus 1 one of the encrypted signals f 1 (X, ID), f 2 (X, ID, ..., f 16 (X, ID) obtained by encrypting the identification signal ID by using the selected one of the functions f 1 , f 2 ,..., f 16 and the random number signal X, e.g., the encrypted signal f 1 (X, ID), the signal processing circuit unit 12 decrypts the encrypted signals f1(X, ID) in accordance with a predetermined function f 1 -1 ⁇ f 1 (X, ID), X ⁇ by using the previously transmitted 24-bit random number signal X and the function f 1 selected in response to one of the lower 4-bit random number signals X 1 , X 2 , ..., X 16 of the random number signal X, e.g., selected in response to the random number signal X 1 , and checks whether or not the identification signal ID obtained by the decryption coincides with the identification signal ID previously registered in the memory
  • FIG. 7 is a flowchart therefor.
  • the identification signal and the sixteen functions f 1 , f 2 , ..., f 16 are previously registered (stored) in both of the memory units 5 and 13.
  • step S41 of the flowchart shown in FIG. 7 the switch unit 2 of the key apparatus 1 is operated, thereby a command to open or close a door being issued.
  • step S42 as shown in FIG. 3A, for example, the key apparatus 1 transmits the response request signal including the door opening/closing command signal to the lock apparatus 10 for a period of 100 ms. Then, the processing proceeds to step S43.
  • step S43 the lock apparatus 10 receives the response request signal as shown in FIG. 3D. Then, the processing proceeds to step S44, wherein the lock apparatus 10 obtains the 24-bit random number signal X, for example, generated by the random number generating unit 14.
  • step S45 as shown in FIG. 3C, the lock apparatus 10 transmits the random number signal X to the key apparatus 1 for a period of 30 ms, for example. Then, the processing proceeds to step S46.
  • step S46 the key apparatus 1 receives the random number signal X as shown in FIG. 3B. Then, the processing proceeds to step S47, wherein the key apparatus 1 selects one of the sixteen functions f 1 , f 2 ,..., f 16 registered in the memory unit 5, e.g., the function f 1 in response to one of the lower 4-bit random number signals X 1 , X 2 , ..., X 16 of the random number signal X. Then, the processing proceeds to step S48.
  • step S48 the key apparatus 1 encrypts the identification signal ID to convert it into the 24-bit code signal, by using the selected function f1 and the 24-bit random number signal X, for example, and then obtains the encrypted signal f 1 (X, ID). Then, the processing proceeds to step S49, wherein the key apparatus 1 transmits the encrypted signal f 1 (X, ID) to the lock apparatus 10 during the period of 30 ms, for example, as shown in FIG. 3A. Then, the processing proceeds to step S50.
  • step S50 the lock apparatus 10 receives the encrypted signal f 1 (X, ID) as shown in FIG. 3D. Then, the processing proceeds to step S51, wherein the lock apparatus 10 decrypts the received encrypted signal f 1 (X, ID) in accordance with a predetermined function f 1 -1 ⁇ f 1 (X, ID), X ⁇ by using the previously transmitted random number signal X and the corresponding one of the random number signals X 1 , X 2 , ..., X 16 of the random number signal X. Then, the processing proceeds to step S52.
  • step S52 the lock apparatus 10 checks whether or not the decrypted identification signal ID coincides with the identification signal ID registered in the memory unit 13.
  • step S53 as a result of the check processing, if the decrypted identification signal ID coincides with the identification signal ID registered in the memory unit 13, then, in accordance with the door opening or closing command signal of the response request signal, the signal processing circuit unit 12 supplies the unlocking or locking command signal to the drive unit 15 for carrying out the unlocking or locking operation of the door. Under the control of the drive unit 15, the door is opened or closed .
  • the identification signal checking apparatus according to the third embodiment shown in FIG. 6 is arranged as described above, it can easily be understood that it is possible to achieve the same effect as that of the identification signal checking apparatus according to the first embodiment shown in FIG. 1.
  • the third embodiment shown in FIG. 6 since one of the sixteen functions f 1 , f 2 ,..., f 16 is selected in response to one of the lower 4-bit random number signals X 1 , X 2 , ...,X 16 of the random number signal X, it is advantageously possible to improve the security further.
  • the communication between the key apparatus 1 and the lock apparatus 10 is carried out in accordance with the base band system by using the infrared rays
  • the communication may be carried out in accordance with some other modulation systems such as the ASK, the FSK or the like by using the infrared rays. It is needless to say that the communication may be carried out by using a radio wave or a supersonic wave instead of the infrared rays.
  • each of the random number signal, the identification signal and the encrypted signal is formed of 24 bits. It is sufficient to determine the number of bits thereof in response to a required degree of the security.
  • the response request signal includes the locking or unlocking command signal
  • the locking or unlocking command signal may be added to the above encrypted signal or may be transmitted individually.
  • the number of the identification signals ID 1 , ID 2 , ..., ID 16 or the functions f 1 , f 2 ,..., f 16 is set to 16, it is not necessary to set the number to 16, and hence the number may be set to any value depending upon a desired degree of security.
  • one of the identification signals ID 1 , ID 2 , ..., ID 16 or one of the functions f 1 , f 2 , ..., f 16 is selected in response to one of the lower 4-bit random number signals X 1 , X 2 , ..., X 16 of the random number signal X, it is not necessary to use the lower 4 bits of the random number signal X and one of the identification signals ID 1 , ID 2 , ..., ID 16 or one of the functions f 1 , f 2 ,...,f 16 may be selected by using any bits of the random number signal X.
  • the detecting apparatus transmits the random number signal
  • the apparatus to be detected encrypts the identification signal by using the random number signal and transmits the encrypted identification signal to the detecting apparatus (lock apparatus). Therefore, since the identification signal transmitted from the apparatus to be detected (key apparatus) to the detecting apparatus (lock apparatus) is the encrypted signal obtained by encryption using the random number signal and hence is always a unique signal, the security is advantageously improved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)
EP97303313A 1996-05-16 1997-05-15 Vorrichtung und Verfahren zur Identifikationssignalprüfung Withdrawn EP0807733A3 (de)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JP12186996 1996-05-16
JP121869/96 1996-05-16
JP12186996 1996-05-16
JP24355596A JPH1030367A (ja) 1996-05-16 1996-09-13 識別信号照合装置及び識別信号照合方法
JP243555/96 1996-09-13
JP24355596 1996-09-13

Publications (2)

Publication Number Publication Date
EP0807733A2 true EP0807733A2 (de) 1997-11-19
EP0807733A3 EP0807733A3 (de) 2000-12-06

Family

ID=26459127

Family Applications (1)

Application Number Title Priority Date Filing Date
EP97303313A Withdrawn EP0807733A3 (de) 1996-05-16 1997-05-15 Vorrichtung und Verfahren zur Identifikationssignalprüfung

Country Status (3)

Country Link
EP (1) EP0807733A3 (de)
JP (1) JPH1030367A (de)
KR (1) KR970078181A (de)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3386430B2 (ja) * 2000-02-23 2003-03-17 株式会社鷹山 認証開閉機能付鍵及びicカード
FI114062B (fi) 2001-06-08 2004-07-30 Nokia Corp Menetelmä tiedonsiirron turvallisuuden varmistamiseksi, tiedonsiirtojärjestelmä ja tiedonsiirtolaite
JP5379435B2 (ja) * 2008-09-29 2013-12-25 アズビル株式会社 入退室管理システムおよび方法
EP2544153A1 (de) * 2011-07-04 2013-01-09 ZF Friedrichshafen AG Identifizierungstechnik

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4509093A (en) * 1982-07-09 1985-04-02 Hulsbeck & Furst Gmbh & Co. Kg Electronic locking device having key and lock parts interacting via electrical pulses
GB2192665A (en) * 1986-07-18 1988-01-20 Neiman Security Products Limit Control apparatus
US4819267A (en) * 1984-02-22 1989-04-04 Thumbscan, Inc. Solid state key for controlling access to computer systems and to computer software and/or for secure communications
EP0484686A2 (de) * 1990-11-05 1992-05-13 International Business Machines Corporation Geschütztes Übertragungssystem für entfernt angeordneten Rechner
US5321753A (en) * 1991-07-08 1994-06-14 The United States Of America As Represented By The United States Department Of Energy Secure communication of static information by electronic means
US5355413A (en) * 1992-03-06 1994-10-11 Mitsubishi Denki Kabushiki Kaisha Authentication method performed between IC card and terminal unit and system therefor
US5506575A (en) * 1991-09-25 1996-04-09 Ormos; Zoltan S. Key-lock system and method using interchange of system-originated codes

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4509093A (en) * 1982-07-09 1985-04-02 Hulsbeck & Furst Gmbh & Co. Kg Electronic locking device having key and lock parts interacting via electrical pulses
US4819267A (en) * 1984-02-22 1989-04-04 Thumbscan, Inc. Solid state key for controlling access to computer systems and to computer software and/or for secure communications
GB2192665A (en) * 1986-07-18 1988-01-20 Neiman Security Products Limit Control apparatus
EP0484686A2 (de) * 1990-11-05 1992-05-13 International Business Machines Corporation Geschütztes Übertragungssystem für entfernt angeordneten Rechner
US5321753A (en) * 1991-07-08 1994-06-14 The United States Of America As Represented By The United States Department Of Energy Secure communication of static information by electronic means
US5506575A (en) * 1991-09-25 1996-04-09 Ormos; Zoltan S. Key-lock system and method using interchange of system-originated codes
US5355413A (en) * 1992-03-06 1994-10-11 Mitsubishi Denki Kabushiki Kaisha Authentication method performed between IC card and terminal unit and system therefor

Also Published As

Publication number Publication date
EP0807733A3 (de) 2000-12-06
JPH1030367A (ja) 1998-02-03
KR970078181A (ko) 1997-12-12

Similar Documents

Publication Publication Date Title
US6067028A (en) Identification signal registering method and identification signal registering apparatus
US5604488A (en) Remote control security system
US5523746A (en) Identification system with a passive activator
EP1454303B9 (de) Tragbares gerät und verfahren für den zugriff auf per datenschlüssel betätigte vorrichtungen
KR100503492B1 (ko) 차량 도난 방지 시스템용 코드 신호 송신기
EP0492692B1 (de) Fernsteuerbares Zugangssystem
US6658328B1 (en) Passive function control system for a motor vehicle
US6829357B1 (en) Communication system having a transmitter and a receiver that engage in reduced size encrypted data communication
US6980655B2 (en) Rolling code security system
WO1996007133A9 (en) Identification system with a passive activator
US5844990A (en) Transmission-reception system
EP0807733A2 (de) Vorrichtung und Verfahren zur Identifikationssignalprüfung
EP0807732B1 (de) Prüfung von Identifikationssignalen
US5862225A (en) Automatic resynchronization for remote keyless entry systems
KR19980086957A (ko) 식별장치 및 식별방법
US20040054934A1 (en) Method for authenticating a first object to at least one further object, especially the vehicle to at least one key
EP1085481B1 (de) Ein Fernsteuersender
JP4487549B2 (ja) 鍵装置、錠制御装置、及び錠制御システム
JPH1088879A (ja) 識別信号照合装置及び識別信号照合方法
US20050268088A1 (en) Vehicle control system, and in-vehicle control apparatus and mobile device used therefor
JPH09303014A (ja) 識別信号照合装置及び識別信号照合方法
JPH0742428A (ja) リモートコントロール装置
JPH05133150A (ja) ワイヤレス電気錠制御システム
JPH10303887A (ja) 識別信号照合装置および識別信号照合方法

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): DE FR GB

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): DE FR GB

17P Request for examination filed

Effective date: 20010504

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20030213