TWI242347B - Encoding/decoding method of remote control for baud rate modulation and device thereof - Google Patents

Encoding/decoding method of remote control for baud rate modulation and device thereof Download PDF

Info

Publication number
TWI242347B
TWI242347B TW91132541A TW91132541A TWI242347B TW I242347 B TWI242347 B TW I242347B TW 91132541 A TW91132541 A TW 91132541A TW 91132541 A TW91132541 A TW 91132541A TW I242347 B TWI242347 B TW I242347B
Authority
TW
Taiwan
Prior art keywords
code
password
signal
patent application
scope
Prior art date
Application number
TW91132541A
Other languages
Chinese (zh)
Other versions
TW200408250A (en
Inventor
Lan Hsieh
Chien-Hsien Tsai
Original Assignee
Holtek Semiconductor Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Holtek Semiconductor Inc filed Critical Holtek Semiconductor Inc
Priority to TW91132541A priority Critical patent/TWI242347B/en
Publication of TW200408250A publication Critical patent/TW200408250A/en
Application granted granted Critical
Publication of TWI242347B publication Critical patent/TWI242347B/en

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention relates to an encoding/decoding method of remote control for baud rate modulation and device thereof, in which the method employs baud rate modulation to encrypt the forwarding information. The encoding system comprises an encoder encoding an identification signal as a secret code, a translator that translates uncoded part and the secret code of the identification signal to a transmission signal. When the secret code is on the first level, the uncoded part of the corresponding identification signal of the secret code uses first baud rate to transmit and when the secret code is on the second level, the uncoded part of the corresponding identification signal of the secret code uses second baud rate to transmit. The decoder comprises a receiver receiving the transmission signal, a translator in connection with the receiver translating the transmission signal to a reception signal, an encoder generating a comparison code based on the coding rules of the encoder just like the transmitting side and a processor comparing the reception signal with the comparison code to control flow process.

Description

1242347 五、發明說明α) 發明領域: 本發明是關於一種無線傳輸資料編碼的方法與裝置, 尤指一種利用邏輯運算法則,將資料加密的編碼方法與裝 置。 發明背景: 遙控器已成為日常生活常經常使用的用品之一,應用 的領域相當廣泛諸如汽車、住家門禁、視聽器材、家電用 品等,均以透過無線遙控來增進使用的方便性。雖然許多 遙控對象如家電用品不需考慮防止他人誤用、竊用等安全 性的問題,但在如汽車遙控器、住家門禁等的應用上,就 需以防止非法者侵入,保持安全為首要考量,以避免居家 或汽車失竊。甚至為了避免幼童觀看不適宜之節目,視聽 器材亦需有若干安全之設計。 一般而言,遙控系統可分為單向操作與雙向操作等方 式。在單向操作系統中,控制訊號全由發射端發射,以遙 控接收端之設備;而雙向操作系統之控制訊號係經由發射 端與接收端交互運作,以確定控制之目的。雙向操作系統 雖然可達到雙方確認性(mutual authentication),且 可獲得較佳之控制效果,但因設備複雜與價格昂貴,故除 若干重要場合外甚少使用。 最簡單之遙控系統,係將控制訊號直接將明文 (p 1 a i n t e X t)以無線方式傳送至接收器。若每次傳送之 明文均相同,則有心的駭客截獲(eavesdrop)訊號,因1242347 V. Description of the invention α) Field of the invention: The present invention relates to a method and device for wirelessly transmitting data encoding, especially an encoding method and device for encrypting data using logical algorithms. Background of the Invention: The remote control has become one of the frequently used items in daily life, and the application fields are quite wide, such as automobiles, home access control, audio-visual equipment, and home appliances. All of them use wireless remote control to improve the convenience of use. Although many remote control objects such as home appliances do not need to consider security issues such as preventing misuse and theft by others, in applications such as car remote controls and home access control, it is necessary to take the prevention of illegal intrusion and maintain security as the primary consideration. To avoid home or car theft. Even in order to prevent young children from watching inappropriate programs, audiovisual equipment needs to have some safe designs. Generally speaking, the remote control system can be divided into unidirectional operation and bidirectional operation. In a one-way operating system, the control signal is transmitted by the transmitting end to remotely control the equipment of the receiving end; while the control signal of the two-way operating system operates through the transmitting end and the receiving end to determine the purpose of control. Although two-way operating system can achieve mutual authentication and better control effect, it is rarely used except for some important occasions due to the complicated equipment and expensive equipment. The simplest remote control system is to send the control signal directly to the receiver wirelessly in plain text (p 1 a i n t e X t). If the clear text is the same each time, the intentional hacker drops the signal, because

第4頁 025G3 : 1242347 五、發明說明(2) 為資料内容固定,只要將訊號重送(replay)即可攻擊成 功,接收器會執行該動作,因此系統極不安全。生活上, 也偶有使用自己的遙控器,打開連別人家的門或車子的案 例,這些都是使用者所不願意看到的。Page 4 025G3: 1242347 V. Description of the invention (2) The data content is fixed. As long as the signal is replayed, the attack will be successful. The receiver will perform this action, so the system is extremely insecure. In life, there are occasions when you use your own remote control to open the door or car of other people's homes. These are things that users do not want to see.

因此,隨著時間與技術的演進,漸漸開始有遙控器使 用暗碼的方式傳送資料。也就是在傳送料時,遙控器會區 分為明碼與暗碼兩部分。明碼為通用碼,内含資料的結構 不變。暗碼則是有加密的法則運用在其中,使外人不易得 到其資料所代表的意義。雖然這種方式有較高的保密性及 安全性,但是目前所能看到的仍嫌複雜,設備成本也相對 較高。因此本案發明人能以同一傳送方式,將明碼和暗碼 同時存在一個信號中。舉例來說,在門禁的運用上,在社 區大門或是共同車庫入口 ,只需檢驗明碼;而在使用者自 家大門,則需同時檢驗明碼與暗碼以確認身份,如此在應 用層面上,可以大大減少系統的複雜性,降低成本,也可 讓系統在市場上有其競爭優勢及更多的運用領域。 發明概述:Therefore, with the evolution of time and technology, there are gradually starting to use remote codes to transmit data by remote control. That is, when transmitting material, the remote control will be divided into two parts: clear code and password. The plain code is a universal code, and the structure of the contained data remains unchanged. The secret code uses the law of encryption to make it difficult for outsiders to obtain the meaning of their data. Although this method has high confidentiality and security, what can be seen at present is still complicated and the equipment cost is relatively high. Therefore, the inventor of the present case can store the clear code and the secret code in one signal at the same time by the same transmission method. For example, in the use of access control, it is only necessary to check the clear code at the gate of the community or the entrance of the common garage; but at the user's own door, the clear code and the secret code must be checked at the same time to confirm the identity, so at the application level, it can greatly Reducing the complexity and cost of the system can also allow the system to have its competitive advantage and more application areas in the market. Summary of the invention:

本發明的主要目的是提供一種無線傳輸資料編碼的裝 置與方法,尤指一種利用邏輯電路運算法則,將部分資料 加密的編碼裝置與方法。 本發明的次要目的是一種簡單有效、成本低廉的編碼 裝置與方法。 本發明係利用鮑率調變之方式將發送資料加密,並隱藏於The main object of the present invention is to provide a device and method for wirelessly transmitting data encoding, particularly an encoding device and method for encrypting a part of data by using a logic circuit algorithm. A secondary object of the present invention is a simple, effective, and low-cost encoding device and method. The present invention uses the modulation of the baud rate to encrypt the transmitted data and hides it in

第5頁 1242347 五、發明說明(3) 發送信號中後發送,該方法步驟為: a、 利用一識別信號產生一暗碼及一明碼; b、 以該暗碼控制該明碼的傳送鮑率:當該暗碼為第一準 位時,則該暗碼所對應之該明碼以第一鮑率傳送;當 該暗碼為第二準位時,則該暗碼所對應之該明碼以第 二鮑率傳送。 本發明之編碼裝置係利用鮑率調變之方式將發送資料 加密,該裝置包括有: 一編碼器,接收一識別信號,並將該識別信號之一部 分經編碼後取得一暗碼; 一編譯器,與該編碼器連接,將該識別信號之未編碼 部分和由編碼器所得之該密碼編譯成一傳輸信號; 其中該編譯器在編譯時將該識別信號未編碼部分之單 位波形長度依以下規則改變·· (1)當該暗碼為第一準位時,則該暗碼所對應之該識別信 號未編碼部分以第一鮑率傳送 (2 )當該暗碼為第二準位時,則該暗碼所對應之該識別信 號未編碼部分以第二鮑率傳送。 本發明之遙控器之解碼裝置,包括有: 一接收器,接收一傳輸信號; 一解譯器,與接收器連接,利用已知之一鮑率將該傳 輸信號解譯成一收受信號; 一編碼器,利用邏輯運算規則產生一比對碼;以及 一處理器,與該解譯器及該編碼器連接,將該收受信Page 5 1242347 V. Description of the invention (3) After sending the signal, the method steps are: a. Generate a secret code and a clear code using an identification signal; b. Use the secret code to control the transmission rate of the clear code: when the When the password is at the first level, the clear code corresponding to the password is transmitted at the first baud rate; when the password is at the second level, the clear code corresponding to the password is transmitted at the second baud rate. The encoding device of the present invention encrypts the transmitted data by means of Baud Rate Modulation. The device includes: an encoder that receives an identification signal and obtains a secret code after encoding a part of the identification signal; a compiler, Connect with the encoder to compile the uncoded part of the identification signal and the password obtained from the encoder into a transmission signal; where the compiler changes the unit waveform length of the uncoded part of the identification signal according to the following rules when compiling · (1) When the password is at the first level, the uncoded part of the identification signal corresponding to the password is transmitted at the first baud rate (2) When the password is at the second level, the password is corresponding The uncoded portion of the identification signal is transmitted at the second baud rate. The decoding device of the remote controller of the present invention includes: a receiver that receives a transmission signal; an interpreter that is connected to the receiver and uses a known baud rate to interpret the transmission signal into a reception signal; an encoder , Using a logic operation rule to generate a comparison code; and a processor, connected to the interpreter and the encoder, and receiving the received signal

第6頁Page 6

025GGG 1242347025GGG 1242347

得本發明比一般的方法更加安全。 清參照圖三,此為本實施例之編碼器丨5之方塊圖。使 用者碼1 0 2在編碼器1 5最重要的是要產生一暗碼丨5 〇。該暗 碼150是經由一暗碼產生器ι51,該暗碼產生器ι51除了將 使用者碼1 〇 2運用數學模式重新編碼外,還需要將暗碼i 5 〇 的長度作一長度正規化的動作。所謂的長度正規化是指將 暗碼150的長度調整到與明碼u的長度一致。長度正規化 動作可以在編碼前或編碼後執行,甚至亦可在編碼本身中 同時完成。對本實施例而言,明碼丨丨長度為廠商碼1 〇 〇八 位元加上顧客碼1 0 1十六位元共計廿四位元,而使用者碼 1 0 2/、有十/、位元,故需調整成廿四位元,才能符合明碼 11長度’以利編譯器1 6運作。本實施例長度正規化的動作 疋在密碼產生器1 5 1之前完成,使用者碼1 〇 2之高位元組 l〇20(high byte)與低位元組1021(1〇w byte)長度各為八 位元進入長度正規化器152後,得一廿四位元的過渡碼 1 5 2 0。長度正規化器152的作法有許多種,本實施例是採 用使用者碼之高位元組1 〇 2 〇與低位元組i 〇 2丨進行互斥或 Uxclusive OR, x〇R)的動作取得第三個位元組,再將這 二個位元組合併成一廿四位元的過渡碼1 5 2 〇。 取得過渡碼1 5 2 0後,就是執行暗碼i 5 〇產生的步驟。 可以運用在暗碼產生器151的方法报多,如多項式法或是 有名的RS A法。本實施例是利用前一次產生的暗碼i 5 〇和過 度碼1 5 2 0執行互斥或來取得新的暗螞丨5 〇。使用互斥或最 大的好處就是簡單,硬體設計時所需的成本低,以及編碼The result is that the present invention is more secure than ordinary methods. Refer to FIG. 3, which is a block diagram of the encoder 5 of this embodiment. The user code 10 2 is most important in the encoder 15 to generate a secret code 5 0. The password 150 is passed through a password generator ι51. In addition to re-encoding the user code 102 using a mathematical mode, it is necessary to normalize the length of the password i50. The so-called length normalization refers to adjusting the length of the password 150 to be the same as the length of the password u. The length normalization action can be performed before or after encoding, or even in the encoding itself. For this embodiment, the length of the plain code 丨 丨 is the manufacturer's code of 100 octets plus the customer code of 10 16 digits and a total of 24 digits. Yuan, so it needs to be adjusted to 24 bits, in order to comply with the length of the plain code 11 to facilitate the operation of the compiler 16. The length normalization operation in this embodiment is completed before the password generator 1 51. The length of the high byte 1020 (high byte) and the low byte 1021 (10w byte) of the user code 1 are each After the eight bits enter the length normalizer 152, a four-bit transition code of 1520 is obtained. There are many ways for the length normalizer 152. In this embodiment, the upper byte 1 〇 2 of the user code and the lower byte i 〇 2 丨 are used to perform a mutually exclusive or Uxclusive OR (x〇R) operation to obtain the first Three bytes, and then combine these two bits into a one-to-four-bit transition code of 1520. After the transition code 1520 is obtained, the step of generating the secret code i50 is performed. There are many methods that can be used in the code generator 151, such as the polynomial method or the famous RS A method. This embodiment uses the previously generated code i 5 0 and the excessive code 15 20 to perform mutual exclusion or to obtain a new code 5. The benefits of using mutex or maximum are simplicity, low cost of hardware design, and coding

第8頁 025〇C8 !242347 、---〜 五、發明說明(7) 1〇〇時表示邏輯上的「 11 n. ^ 做的好處是減低接仏0」,no表不邏輯上的「1」。這麼 有〜次的電懕進办欠端7的辨認錯誤,以及每一位元内只 本實施例並定義睥變化,、使接收端7易於計算位元長度。 譯器1 6不動作;^螞1 5 Ο為「〇」時,鮑率不變,也就是編 率減半,也3 0二螞1 5 0為「丨」時編譯器1 6將明碼1 1之鮑 碼U為ooi/o^# j皮形拉長兩倍。如圖四A所示,此為明 ⑽〇〇〇〇〇時的波幵信號波形,(也同時是暗碼150為 時,明螞1〗的坌^ 。如圖四A所示’當暗碼150為0101011 缚來f 、 4、6及7位元需要將波形拉長兩倍。 t 此為發射端1編碼流程圖: feP1:壓按鍵產生該識別信號10; tep 2.檢驗是否為一重置信號154?若為是,執行 Step56’若為否,執行Step53; = 將該識別信號1〇編碼運算取得一暗碼I” ; eP 4·所,暗碼15〇是否與代表該重置信號的 特疋目同?若為是,執行Step53,若為否, 執行 SteP55 ; S t e p 5 5 :將該暗碼1 5 (μ士人兮Μ成Ί , μ成a兮,由上 發送後結Γ ^ 輸信號^Page 8 025〇C8! 242347, --- ~ V. Description of the invention (7) At 100, it means logically "11 n. ^ The advantage of doing is to reduce the connection 0", no means "logically" 1". - so much time into electrical Ye do less recognizable wrong end 7, and only the present embodiment and variation defined within each bit pi ,, easy to calculate the reception terminal 7 bit length. The translator 16 does not operate; ^ Ma 1 5 〇 is "〇", the baud rate does not change, that is, the editing rate is halved, and when 30 2 Ma 1 50 is "丨", the compiler 16 will clear the code 1 The abalone code U of 1 is twice as long as ooi / o ^ # j. As shown in FIG. 4A, this is a wave signal waveform at the time of ⑽00,00,00 (also at the same time, when the code 150 is 150, 蚂 1). As shown in FIG. 4A, 'When the code 150 For 0101011, f, 4, 6, and 7 bits need to be doubled. T This is the flow chart of the transmitter 1 encoding: feP1: Press the button to generate the identification signal 10; tep 2. Check whether it is a reset Signal 154? If yes, execute Step56 '; if not, execute Step53; = encode the identification signal 10 to obtain a password I "; eP 4 · So, is the password 15 and the characteristic representing the reset signal? Is it the same? If yes, execute Step53, if not, execute SteP55; Step 5 5: the password 15 (μ 士人 ΜΜΊ, μ 成 a 兮, sent from the top and then Γ ^ input signal ^

Step56:將該暗碼15〇設為代表該重置信號154的 執行Step55 ; 值’ η样Ϊ參見圖六,係為本實施例之接收端編螞6架構圖。 "、,接收端6在接收到傳輪信號1 8後,需要將复插 回識別信號1 0,以資辨別身份及執行命令。接收端、、Step 56: Set the secret code 15 to perform Step 55 on behalf of the reset signal 154; the value ′ η is as shown in FIG. 6, which is an architecture diagram of the receiver 6 in this embodiment. ". After receiving the transmission signal 18, the receiving end 6 needs to insert the signal back into the identification signal 10 to identify the identity and execute the command. Receiving end,,

第ίο頁 〇25ϋ?0 1242347 五 發明說明(8) 收器6 1、~解釋写 接 發 與 信 制 。接收器6〗接收傳輪;;:編碼器65及一處理器67所構 ,負責將傳輸信H遽18。解譯器63與接收器61連 射端1編碼器丨孑成收文信號6 8。編碼器6 5如同 解繹β 0 ,、規則產生一比對碼6 0。處理5| 6 7 鮮#裔63及編碼器65連接处理裔口 號6 8及編碼5| 6 5產& 接收解澤裔6 3所產生的收受 流程。當收工二=該比對碼6°,將兩者比較,並控 作;如果:=:0與:對碼60完全符合時,就執行該 4唬外,很有可能是合法 :有得送錯誤 發送鍵,使得發射端^ ~吏者不小心在其他地方碰觸 用?,卻不能啟動的情況…解決這個問題 ::許錯誤次數66’也就是當比較不合時,接收 =算下-次比對碼6。再行與收受信號:收=自動 ,執行命令’不符合就重複執行推算下一次比對石如:符合 :對㈣:在直:執行次數到達容許次數66時就動行 束。迫裡存在一個問題,就是使用者不小心按作、、、》 很多次,或是接收端6遭受非法使用者攻擊後,發射端1 已經領先合法使用者之暗碼丨5卜解決的方法是對碼6 〇 號1 5 4使發射端1的暗碼1 5 〇及接收端6的比對竭用重置 始狀態,使兩邊可以同步而正常運作。 0回到初 請參見圖七,此為本實施例之接收端6流程圖·Page ίο 〇25ϋ? 0 1242347 V. Description of the invention (8) Receiver 6 1. Interpretation, writing, sending and receiving. The receiver 6〗 receives the transmission wheel ;;: constituted by the encoder 65 and a processor 67, which is responsible for transmitting the transmission signal H 遽 18. The interpreter 63 is connected to the receiver 61 and the transmitter 1 encoder generates a received signal 68. The encoder 6 5 is like interpreting β 0, and the rule generates a comparison code 6 0. Process 5 | 6 7 Fresh ## 63 and the encoder 65 are connected to the process of receiving the slogan 6 8 and the code 5 | 6 5 & receive the receiving process generated by the solution # 63. When the second job = the comparison code 6 °, the two are compared and controlled; if: =: 0 and: the match code 60 is exactly the same, then the 4 bluff is executed, it is likely to be legal: there is something to send The wrong sending key made the transmitting end ^ ~ the official accidentally touched in other places? , But can't start ... Solve the problem :: The number of allowed errors 66 ', that is, when the comparison is not correct, receive = count the number of-times comparison code 6. Retry and receive signals: Receive = Automatic, execute the command ’if it does not match, and repeat the calculation of the next comparison. For example, if it meets: Confrontation: When the number of executions reaches 66, it will be terminated. There is a problem in that the user accidentally clicks, ..., many times, or after the receiving end 6 is attacked by an illegal user, the transmitting end 1 has been ahead of the legal user ’s password. The solution is to correct the problem. Code 6 〇 No. 15 4 resets the start code of the secret code 150 at the transmitting end 1 and the receiving end 6 to reset the initial state, so that both sides can synchronize and operate normally. 0 Back to the beginning Please refer to FIG. 7. This is a flowchart of the receiving end 6 of this embodiment.

Step70 :接收該傳輸信號18並解譯成收受信號6 ·Step70: Receive the transmission signal 18 and interpret it into a reception signal 6

Step71 ; ’執行Step71 ’Execute

Step71 :該收受信號68是否為代表該重置信號】^ 现154的特定 第11頁 025G71 1242347 五、發明說明(9) 值?若為是,執行Step72,若為不 Step74; ”、、古 接收下一個傳輸信號18,執行St 記錄該暗碼1 5 0資料,並依此推一 ’ & 60 ;執行Step70 ; 一次比3 S t e p 7 4 ··該收受#號6 8是否與所推算的μ 為是,執行Step75,若為:的相同 執行該傳輸信號18所代表動作,J tep7\ 結束,錯誤次數=〇; 執订SteP76 tipU次該比對碼6〇,錯誤次數小執行 否等於一容許錯誤次數66?若為 執盯Step76,若為否,執行St g. SteP79:該收受信號68是否與所推 巧 為是,執行Step75,若為否,執同 综上所述,本發明為一簡單有效之編J满二P二乙 計上又右#屛的付祕 方双之編解碼的方法 需耗費的成本亦低,使得運用太 並且因為間早: 競爭價值。 使侍運用本發明之產品在市面上才』 唯以上所述者,僅為本發 之限制本發明的^阁^个赞乃之較佳貫施例,當不食ί 之均等變化及佟:。卩大凡依本發明申請專利範圍戶/ 離本發明之精神和笳圚 月之要義所在,亦7 狀況。 範圍,故都應現為本發明的進一步負 S t ep 7 2 Step73Step71: Is the receiving signal 68 the reset signal? ^ The specificity of the present 154 page 11 025G71 1242347 V. Explanation of the invention (9) value? If yes, go to Step 72, if not, go to Step 74; ”, Gu receives the next transmission signal 18, executes St to record the password 150 data, and then pushes one '&60; executes Step 70; once compared to 3 S tep 7 4 ·· Whether the acceptance ## 6 8 is the same as the estimated μ, execute Step 75, if it is: execute the action represented by the transmission signal 18, J tep7 \ end, the number of errors = 0; order SteP76 TipU: The comparison code is 60. If the number of errors is small, is the execution equal to an allowable number of errors: 66? If it is Step76, if not, execute St g. SteP79: Does the acceptance signal 68 coincide with the result of the push, execute? Step75, if not, as described above, the present invention is a simple and effective method for encoding and decoding the method of paying for secret recipes, which can be used at a low cost. Too early because of the early: competitive value. Only use the products of the present invention in the market. ”Only the above is only a good example of the implementation of the present invention. Equal changes and inequalities without food: 卩 Dafan who applies for a patent in accordance with the present invention / From the spirit of the present invention and the essence of the month, there are also 7 conditions. The scope should therefore be a further negative of the present invention. S t ep 7 2 Step73

Step75 Step76 Step77 Step78: 執行 '碼 ?若 若 δ又 所 以 做 脫 施 1242347 圖式簡單說明 圖式之簡要說明: 圖一係為本實施例之發射端編碼架構圖 圖二係為本實施例識別信號之圖示 圖三係為本實施例之編碼之方塊圖 圖四A及圖四B係為本實施例之編譯說明圖 圖五係為發射端編碼流程圖 圖六係為本實施例之接收端碼架構圖 圖七係為接收端解碼流程圖 圖號說明: 1 -發射端 1 0 -識別信號 1 0 0 顧:商碼 1 0 1 -顧客碼 1 0 2 _使用者碼 1 0 2 0 -使用者碼高位元組 1 0 2 1 -使用者碼低位元組 1 1 _明碼 1 5 -編碼器 1 5 0 -暗碼 1 5 2 0 -過渡碼 1 5 1 -暗碼產生器 1 5 2 -長度正規化器 1 5 3 -控制器Step75 Step76 Step77 Step78: Execute the "code? If δ is not applied 1242347 The diagram is a brief explanation of the diagram: Fig. 1 is a diagram of the encoding structure of the transmitting end of this embodiment. Fig. 2 is the identification signal of this embodiment. Figure 3 is a block diagram of the encoding of this embodiment. Figures 4A and 4B are the compilation instructions of this embodiment. Figure 5 is the coding flowchart of the transmitting end. Figure 6 is the receiving end of this embodiment. Code structure diagram Figure 7 is the decoding flowchart of the receiving end. Figure No. Description: 1-Transmitting end 1 0-Identification signal 1 0 0 Gu: Commercial code 1 0 1-Customer code 1 0 2 _User code 1 0 2 0- User code high byte 1 0 2 1-User code low byte 1 1 _clear code 1 5-encoder 1 5 0-password 1 5 2 0-transition code 1 5 1-password generator 1 5 2-length Normalizer 1 5 3-Controller

第13頁Page 13

025G 1242347 圖式簡單說明 154-重置信號 1 6 -編譯器 1 8 -傳輸信號 5 1 - 5 6 -發射端編碼步驟 6 -接收端 6 0 -比對碼 6 1 -接收器 6 3 -解譯器 6 5 -編碼器 6 6 -容許錯誤次數 6 7 -處理器 6 8 -收受信號 7 0 - 7 9 -接收端解石馬步驟025G 1242347 Schematic description 154-Reset signal 1 6 -Compiler 1 8 -Transmit signal 5 1-5 6 -Transmitter encoding step 6 -Receiver 6 0 -Comparison code 6 1 -Receiver 6 3 -Solution Translator 6 5-Encoder 6 6-Number of allowable errors 6 7-Processor 6 8-Receive signal 7 0-7 9-Step of calculus at receiver

Claims (1)

六、申請專利範圍 i · 一種遙控器之編碼方 心利用一識別信號產生,」暗方法包一括以下步驟: b、以該暗碼控制該 明碼, 準位時,則該二碼的傳送鮑率:當該暗碼為第一 送;當該暗“第所ί應之該明w銘率傳 明碼以第二趣ίί:準位時,則該暗瑪所對應之該 2.如_請專利範圍第1 ' 可區分為-廠商碼、、—顧述客二法,其中該識別信號甘 中該廠商碼為廠商之統顧::及-使用者碼三部分;其 碼、該使用者π ϋ 編唬、該顧客碼為使用者群代 其中該廠商碼及該 其中該步驟a包括以 3·如申請專利範圍第2項所述之方\ 顧客碼為明碼。 / 4·如申請專利範圍第1項所述之方法, 下步驟: / a 1 δ周整該識別信號之兮由 使該過渡g I b Μ 者碼長度,得一過渡碼; 便汲、及馬長度與明碼長 a 該過渡碼與前次使用 相同, a3 生一暗碼;使用之暗碼—同執行編碼動作,產 輸出該暗碼。 5. !:Π:ί圍第4項所述之方法,其中該一為 6. 如申請專利範圍帛4項所述之方法 一次執行編碼動作時,所輸入前a 步驟a2在第 1242347 _案號9113254ll 、…曰I 修正_ 六、申請專利範圍 7 . —種遙控器之編碼裝置,係利用鮑率調變之方式將發送 資料加密,該裝置包括有: 一編碼器,接收一識別信號,並將該識別信號之一 部分經編碼後取得一暗碼; 一編譯器,與該編碼器連接,將該識別信號之未編 碼部分和由編碼器所得之該密碼編譯成一傳輸信號; 該編譯器在編譯時將該識別信號未編碼部分之單位 波形長度依以下規則改變··6. Scope of patent application i · The encoding center of a remote control is generated using an identification signal. The "dark method" includes the following steps: b. Control the clear code with the secret code. When the level is in place, the transmission rate of the two codes is: When the secret code is the first delivery; when the secret "first" should be the Ming Ming Ming Chuan Ming code with the second interest: the level, then the dark horse corresponds to the 2. 1 'can be divided into-manufacturer code, and-Gu Shuke two methods, where the identification signal is the manufacturer's unified consideration: and-user code three parts; its code, the user π 编 edit, The customer code is the user group, where the manufacturer code and the step a include the party's customer code as described in item 2 of the scope of patent application. 3. The customer code is the clear code. The method described below, the following steps: / a 1 δ round the identification signal by making the transition g I b Μ the length of the code to obtain a transition code; then sum the horse length and the length of the clear code a the transition code and the previous Use the same time, a3 generates a password; the password used is the same as the encoding operation 5.!: Π: ί The method described in item 4, wherein the one is 6. When the method described in item 4 of the patent application is applied to perform the encoding operation once, the previous a is entered. Step a2 is No. 1242347 _ Case No. 9113254ll,… I amended_ VI. Patent Application Scope 7. A remote control encoding device that encrypts the transmitted data by means of baud rate modulation. The device includes: a code An encoder that receives an identification signal and obtains a password after encoding a part of the identification signal; a compiler connected to the encoder to compile the unencoded part of the identification signal and the password obtained by the encoder into a transmission Signal; the compiler changes the unit waveform length of the uncoded part of the identification signal according to the following rules when compiling ... (i )當該暗碼為第一準位時,則該暗碼所對應之該識別 信號未編碼部分以第一鮑率傳送 (i i )當該暗碼為第二準位時,則該暗碼所對應之該識別 信號未編碼部分以第二鮑率傳送。 8 .如申請專利範圍第7項所述之裝置,其中該識別信號, 可區分為一廠商碼、一顧客碼及一使用者碼三部分;其 中該廠商碼為廠商之統一編號、該顧客碼為使用者群代 碼、該使用者碼為使用者個體代碼。 9 .如申請專利範圍第8項所述之裝置,其中該廠商碼及該 顧客碼為明碼。(i) When the password is at the first level, the uncoded part of the identification signal corresponding to the password is transmitted at the first baud rate. (ii) When the password is at the second level, the password corresponds to the The uncoded portion of the identification signal is transmitted at the second baud rate. 8. The device according to item 7 of the scope of patent application, wherein the identification signal can be divided into three parts: a manufacturer code, a customer code, and a user code; wherein the manufacturer code is a uniform number of the manufacturer and the customer code Is a user group code, and the user code is an individual user code. 9. The device described in item 8 of the scope of patent application, wherein the manufacturer code and the customer code are clear codes. 1 0 .如申請專利範圍第7項所述之裝置,其中該編碼器包 括: 一暗碼產生器,接收識別信號以一邏輯電路運算 法則將該識別信號加密,產生一暗碼; 一長度正規化器,將識別信號調整成適當長度; 以及10. The device according to item 7 of the scope of patent application, wherein the encoder comprises: a password generator that receives the identification signal and encrypts the identification signal with a logic circuit algorithm to generate a password; a length normalizer , Adjusting the identification signal to an appropriate length; and 第16頁 1242347 x _案號91132知_年\月 日 修正_ 六、申請專利範圍 一控制器,與該密碼產生器連接,根據狀況,輸 出暗碼或及重置信號。 1 1.如申請專利範圍第1 0項所述之裝置,其中該密碼產生 器,產生該暗碼之方法包括以下步驟: a、 調整該識別信號之該使用者碼長度,得一過渡碼; 使該過渡碼長度與明碼長度相同; b、 該過渡碼與前次使用之暗碼一同執行編碼動作,產 生一暗碼; c、 輸出該暗碼。Page 16 1242347 x _Case No. 91132 Know_Year \ Month Day Amendment_ VI. Scope of Patent Application A controller is connected to the password generator and outputs a password or reset signal according to the situation. 1 1. The device as described in item 10 of the scope of patent application, wherein the password generator and the method for generating the password include the following steps: a. Adjusting the length of the user code of the identification signal to obtain a transition code; The length of the transition code is the same as the length of the plain code; b. The transition code performs a coding operation together with the previously used password to generate a password; c. The password is output. 1 2 .如申請專利範圍第1 1項所述之裝置,其中該步驟 b可 為一互斥或運算。 1 3 .如申請專利範圍第11項所述之裝置,其中該步驟 b在 第一次執行編碼動作時,所輸入前次使用之暗碼為一 事先設定之特定值。 1 4. 一種遙控器之解碼裝置,可以將利用鮑率調變方式之 傳輸信號解碼,該裝置包括有: 一接收器,接收一傳輸信號; 一解譯器,與接收器連接,利用已知之一鮑率將 該傳輸信號解譯成一收受信號;12. The device as described in item 11 of the scope of patent application, wherein step b may be a mutually exclusive OR operation. 13. The device according to item 11 of the scope of patent application, wherein in step b, when the coding operation is performed for the first time, the previously used password input is a specific value set in advance. 1 4. A decoding device for a remote controller that can decode a transmission signal using a baud rate modulation method. The device includes: a receiver that receives a transmission signal; an interpreter that is connected to the receiver and uses a known A baud rate interprets the transmission signal into a reception signal; 一編碼器,利用邏輯運算規則產生一比對碼;以 及一處理器,與該解譯器及該編碼器連接,將該收受 信號及該比對碼作一比較,決定是否接受該傳輸信號 所帶之指令,並控制流程。 1 5 .如申請專利範圍第1 4項所述之裝置,其中該編碼器之An encoder generates a comparison code by using a logic operation rule; and a processor is connected with the interpreter and the encoder, and compares the received signal with the comparison code to determine whether to accept the transmission signal. Take instructions and control the process. 15. The device according to item 14 of the scope of patent application, wherein the encoder 第17頁 1242347 ΜΓ8: 1 ^ ‘ 年月日修(兔)正替換頁 案號 9113 ^54‘, 一口咖^i 修正_ 六、申請專利範圍 編碼方法應與產生該傳輸信號之編碼方法相同。 1 6 .如申請專利範圍第1 4項所述之裝置,其中該處理器有 一容錯機制,該機制可自動修正因使用者誤觸發射開 關,所造成之比對碼不同步現象。 1 7 .如申請專利範圍第1 6項所述之裝置,其中若不同步現 象超出該容錯機制的修正範圍,該裝置可以接收一重 置信號來強制執行比該對碼同步動作。 1 8. —種遙控器之解碼裝置,可以將利用鮑率調變方式之 傳輸信號解碼,該裝置包括有:Page 17 1242347 ΜΓ8: 1 ^ 『Year Month Day Repair (Rabbit) is replacing page Case No. 9113 ^ 54’, Yikou Ka ^ i Amendment_ VI. Patent Application Scope The encoding method shall be the same as the encoding method used to generate the transmission signal. 16. The device according to item 14 of the scope of patent application, wherein the processor has a fault-tolerant mechanism, which can automatically correct the asynchronism of the comparison code caused by the user accidentally touching the emission switch. 17. The device according to item 16 of the scope of patent application, wherein if the out-of-sync phenomenon exceeds the correction range of the fault-tolerant mechanism, the device can receive a reset signal to forcibly perform a synchronization action relative to the pair of codes. 1 8. A decoding device for a remote controller that can decode a transmission signal using the baud rate modulation method. The device includes: 一接收器,接收一傳輸信號; 一編碼器,利用邏輯運算規則產生一比對碼; 一編譯器,與編碼器連接,利用已知之一鮑率將 比對碼編譯成比對信號;以及 一處理器,與該接收器及該編譯器連接,將該收 受信號及該比對信號作一比較,決定是否接受該傳輸 信號所帶之指令,並控制流程。 1 9 .如申請專利範圍第1 8項所述之裝置,其中該編碼器之 編碼方法應與產生該傳輸信號之編碼方法相同。 2 0 .如申請專利範圍第1 8項所述之裝置,其中該處理器有 一容錯機制,該機制可自動修正因使用者誤觸發射開 關,所造成之比對碼不同步現象。 2 1.如申請專利範圍第2 0項所述之裝置,其中若不同步現 象超出該容錯機制的修正範圍,該裝置可以接收一重 置信號來強制執行比該對碼同步動作。A receiver to receive a transmission signal; an encoder to generate a comparison code using a logic operation rule; a compiler connected to the encoder to compile the comparison code into a comparison signal using a known baud rate; and The processor is connected with the receiver and the compiler, compares the received signal with the comparison signal, decides whether to accept the instruction carried by the transmitted signal, and controls the flow. 19. The device described in item 18 of the scope of patent application, wherein the encoding method of the encoder should be the same as the encoding method of generating the transmission signal. 20. The device described in item 18 of the scope of patent application, wherein the processor has a fault-tolerant mechanism that can automatically correct the synchronization of the comparison code caused by the user accidentally touching the emission switch. 2 1. The device described in item 20 of the scope of patent application, wherein if the out-of-sync phenomenon exceeds the correction range of the fault-tolerant mechanism, the device can receive a reset signal to forcibly perform a synchronization action relative to the pair of codes. 第18頁 1242347Page 18 1242347 1515 使用者碼102 16-bitUser code 102 16-bit 1242347 既 年…月喊氣)正替換頁1242347 Both year ... month exhale) is replacing the page
TW91132541A 2002-11-05 2002-11-05 Encoding/decoding method of remote control for baud rate modulation and device thereof TWI242347B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW91132541A TWI242347B (en) 2002-11-05 2002-11-05 Encoding/decoding method of remote control for baud rate modulation and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW91132541A TWI242347B (en) 2002-11-05 2002-11-05 Encoding/decoding method of remote control for baud rate modulation and device thereof

Publications (2)

Publication Number Publication Date
TW200408250A TW200408250A (en) 2004-05-16
TWI242347B true TWI242347B (en) 2005-10-21

Family

ID=37021536

Family Applications (1)

Application Number Title Priority Date Filing Date
TW91132541A TWI242347B (en) 2002-11-05 2002-11-05 Encoding/decoding method of remote control for baud rate modulation and device thereof

Country Status (1)

Country Link
TW (1) TWI242347B (en)

Also Published As

Publication number Publication date
TW200408250A (en) 2004-05-16

Similar Documents

Publication Publication Date Title
US11778464B2 (en) Security system for a moveable barrier operator
RU2604422C1 (en) Method and apparatus for transmitting infrared signal and remote control panel
CN204965434U (en) A strong authentication token for generating safe value of developments
EP2678799A1 (en) Method and apparatus for encoding and decoding data transmitted to an authentication token
CN106850664B (en) Internet of things terminal security control method and system based on intelligent mobile terminal
CN107395751A (en) A kind of remote control system of intelligent household electrical appliance and method
US20070286414A1 (en) Baud rate modulation encoding/decoding method and device for remote controller
JP6279765B2 (en) Encryption method for communication between bank POS and mobile terminal and bank POS
CN110278083A (en) ID authentication request treating method and apparatus, equipment replacement method and apparatus
CN113595744A (en) Network access method, device, electronic equipment and storage medium
TW201737029A (en) A mouse module and a transmission method of a signal of a mouse
CN111211894B (en) Data transmission method, device and system
TWI242347B (en) Encoding/decoding method of remote control for baud rate modulation and device thereof
CN110875901A (en) Information processing method and device and clothes processing device
TW202145756A (en) Wireless input device and data transmission method thereof
CN110267264B (en) System for binding non-networked intelligent terminal and user mobile terminal
CN104702613A (en) Method and system for verifying information of persons who pick up children but are not parents of children
JP2017211850A (en) Data transmission/reception method and sensing system
US20240005713A1 (en) Security System for a Moveable Barrier Operator
US20220368522A1 (en) Bluetooth peripheral and central apparatuses and verification method
CN103929743B (en) A kind of encryption method to mobile intelligent terminal transmission data
US20240141714A1 (en) Security system for a moveable barrier operator
KR101495034B1 (en) Method and system for remote authentication based on security token
CN112583604B (en) Information transmission method and device, electronic equipment and storage medium
Zhang et al. FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees