CN1814974A - Public key code hopping safety system and method - Google Patents

Public key code hopping safety system and method Download PDF

Info

Publication number
CN1814974A
CN1814974A CN 200510023810 CN200510023810A CN1814974A CN 1814974 A CN1814974 A CN 1814974A CN 200510023810 CN200510023810 CN 200510023810 CN 200510023810 A CN200510023810 A CN 200510023810A CN 1814974 A CN1814974 A CN 1814974A
Authority
CN
China
Prior art keywords
key
sequence number
information
random number
eeprom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510023810
Other languages
Chinese (zh)
Other versions
CN100461669C (en
Inventor
贾松仁
龚厚志
刘文江
Original Assignee
CHANGSANJIAO SCIENCE-TECHNOLOGY DEVELOPMENT Co Ltd SHANGHAI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHANGSANJIAO SCIENCE-TECHNOLOGY DEVELOPMENT Co Ltd SHANGHAI filed Critical CHANGSANJIAO SCIENCE-TECHNOLOGY DEVELOPMENT Co Ltd SHANGHAI
Priority to CNB200510023810XA priority Critical patent/CN100461669C/en
Publication of CN1814974A publication Critical patent/CN1814974A/en
Application granted granted Critical
Publication of CN100461669C publication Critical patent/CN100461669C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A public key code hopping safety system and method mainly includes electronic unlocking key transmitting end and receiving end. It features transmitting end received touch-tone signal controlling program to execute ciphering transmit operation, reading out product serial number, encryption key, synchronous counter value, and irreducible polynomial Fm value from memory, then loading these data into ciphering unit, after complete ciphering and loading to shift register to transmit, after receiving end received signal, controlling procedure reading in serial number, deciphering encryption key, irreducible polynomial, synchronizing enumeration data from memory, to make deciphering and verifying, writing back new synchronizing count value to memory, in executing training pattern, writing back new serial number and deciphering encryption key to memory, when serial number is effective but deciphering invalidation, effectively deciphering outputting alarm signal, successfully learning, writing in new serial number, synchronous counter value, and deciphering encryption key for refreshing memory. Said invention has advantage of high system safety and low cost.

Description

Public key code hopping safety system and method
Technical field:
The present invention relates to a kind of public key code hopping safety system and method, particularly a kind of electron key, the encrypted frame hopping security system and the method for door-locking system with microprocessor control.
Background technology:
In daily life, often use door lock, along with development of electronic technology electron key, electronic door lock system are used widely, people are by using electron key, send some specific wireless signals, door-locking system is after receiving these information, automatically perform a series of corresponding operations, as open the door, unblank, turn on light, the inner air-conditioning of preheating or the like.But the door-locking system major part of put goods on the market at first remote control gate lock such as automobile all is based on fixing coding techniques, the sign indicating number that electron key sends at every turn all is the value of fixing, and some lawless persons use scanner (Scanner) and intercept and capture device equipment such as (grabber) and can crack and enter this type of door-locking system easily.Invented rolling code (rolling code) afterwards again, the sign indicating number that electron key is sent out at every turn is all different, be fixed in some code words and circulate, this makes safety improve some, invented frame hopping (hoping code) security system of block cipher AES afterwards again, but along with the development of technology, cracker's technology and equipment is also more and more advanced, and the safety of block cipher frame hopping system still can not be guaranteed the safety of system.
Summary of the invention:
The object of the present invention is to provide a kind of public key code hopping safety system and method, the present invention mainly comprises: the transmitting terminal of electron key and receiving terminal two parts constitute, transmitting terminal is by button, scratch pad memory (EEPROM), randomizer, ciphering unit, shift register, oscillator, LED drives, power consumption control, control module is formed, receiving terminal is by the radio frequency command receiver module, scratch pad memory (EEPROM) and a single-chip microcomputer are formed, it is characterized in that: control program was carried out following step after transmitting terminal was received push button signalling: carry out and encrypt transmit operation, at first be the power consumption control that various piece is opened in the power consumption control unit, for each unit provides clock signal; Generate random number by randomizer then, and from scratch pad memory (EEPROM), read sequence number, encryption key, synchronized counter value, the irreducible function (F of product m) value; With random number, encryption key, irreducible function (F m) value, sequence number send into ciphering unit together, to need information transmitted to send into shift register after finishing ciphering process, launch then, the each information that transmits of transmitting terminal is 64bit, comprise three parts, first is the 16bit plain code information that is made of 12bit before 4bit key information and the product ID, second portion by 16bit random number and sequence number after 16bit carry out XOR and generate, and third part is the 32bit frame hopping that obtains through AES, after the random number combination, carry out following step:
Encrypted Data=(Serial Number^Random Number|Counter^Random Number) * CryptKey (mod Fm) is promptly: data encrypted equals, sequence number XOR random number and the synchronous data formed of counting XOR random number, with encryption key finite field multiply each other long-pending.The encrypted frame hopping information that is 32bit that obtains.
The mode of encryption key is: Cryptkey*DecryKey=l (mod Fm) promptly: encryption key and decruption key confinement multiply each other long-pending be 1.
Control program was carried out following step after receiving terminal was received signal: after single-chip microcomputer receives command information, from scratch pad memory (EEPROM), read in sequence number, decruption key, irreducible function, synchronometer logarithmic data, be decrypted and verify whether instruction is effective, if effectively then with corresponding button operation order output, and with new synchronometer numerical value write-back scratch pad memory (EEPROM), when carrying out mode of learning (Learning mode), also will be with new sequence number and decruption key write-back scratch pad memory (EEPROM).When receiving terminal receives that continuously some these sequence numbers are effective, but when deciphering invalid information, single-chip microcomputer is scanned attack with output alarm signal (Alarm) with caution.The receiving code separated into two parts, the sequence number of the 32bit of first, the frame hopping information of second portion 32bit, wherein frame hopping is corresponding expressly is made up of two parts again, the XOR value of 16bit random number and 16bit random number and 16bit coincidence counter, when carrying out mode of learning (Learning mode) by following step: the information of receiving 64bit; From scratch pad memory (EEPROM), read trading company of factory and irreducible function (F m), calculate the decruption key that makes new advances by new sequence number and algorithm decruption key, and temporary this sequence number and decruption key; Obtain expressly corresponding with new decruption key deciphering frame hopping information; Carry out xor operation with correspondence plaintext first and second portion, calculate synchronized counter value, and it is temporary; Receive the code word of a 64bit once more; With its sequence number and primary comparing, identical execution next step, otherwise think study failure, do not do any operation, finish to withdraw from; Obtain expressly with decruption key deciphering frame hopping information; Plaintext first and second portion are carried out the synchronized counter value that XOR obtains this time; With itself and comparing last time, if than last time just big 1 carry out next step, otherwise think the study failure, do not do any operation, finish to withdraw from; Learning success writes new sequence number, synchronized counter value, decruption key to refresh EEPROM, finishes.
The mode of decruption key is: DecryKey=SerialNumber*Manufacture ID (mod F m) promptly: decruption key equals unique sign of sequence number and manufacturer amassing that finite field multiplies each other.
Advantage of the present invention is: system adopts technology, encryption/decryption element, the design of randomizer and the design of transmitting terminal chip total system of public key algorithm frame hopping, the design of utilization coincidence counter, mode of learning (Learning mode), thereby improve the safety of system, because receiving terminal only need use and have the decoding program single-chip microcomputer and do not need special decoding chip, has reduced cost.
Description of drawings:
The structure chart of Fig. 1 transmitting terminal circuit of the present invention
Fig. 2 the present invention sends chip design overall plan figure
The ciphering process block diagram of Fig. 3 transmitting terminal of the present invention
The structure chart of Fig. 4 receiving terminal circuit of the present invention
The decipherment algorithm block diagram of Fig. 5 receiving terminal of the present invention
Fig. 6 decrypted program FB(flow block) of the present invention
Fig. 7 mode of learning program flow chart of the present invention
1 transmitting terminal chip, the input of B0 button, the input of B1 button, the input of B2 button, the input of B3 button, 3 light emitting diodes, 4 scratch pad memories (EEPROM), 5 randomizers, 6 ciphering units, 7 shift registers, 8 oscillators, 9LED driving, 10 power consumption control, 11 control modules, 12 reset circuits, 13 radio frequency command receiver modules, 14 scratch pad memories (EEPROM), 15 single-chip microcomputers
The specific embodiment:
System's major parameter:
Encryption key (CryptKey) 32bit is applied to ciphering process;
Decruption key (DecryKey) 32bit is applied to decrypting process;
Key information (ButtonInfo) 4bit needs information transmitted, and receiving terminal will be operated accordingly according to key information;
Whether sequence number (Serial Numbs) 28bit, unique sign of each electron key, door-locking system rely on this sign to distinguish is the electron key of oneself;
Count (Counter) 16bit synchronously, electron key is whenever pressed once, and this numeral adds one, is used for generating frame hopping and some security inspections through encrypting;
Vendor id (ManufactureID) 32bit, unique sign of each automobile vendor, this sign and sequence number join together to be used to generate encryption key and decruption key;
Encrypt back data (Encrypted Data) 32bit, promptly the changing unit of the each data that send of electron key by synchronous counting and serial number encryption gained, is used to realize frame hopping (hoping code);
Random number (Random Number) 16bit improves the key parameter of frame hopping rate of change and safety, is used for ciphering process;
Irreducible function (F m) 32bit, the key parameter of cryptographic calculation and decrypt operation also is the key that generates encryption key and decruption key; (referring to Fig. 1), the transmitting terminal of system (promptly encrypting end) is made of transmitting terminal chip 1, button input B0, B1, B2, B3, light emitting diode 3.The work that transmitting terminal chip 1 is mainly encrypted and sent has eight valid interfaces, comprises that keying input information, VDD, VSS, the LED of 4bit drives output and pwm signal output.Button is input as four, links 4 button inputs B0, B1 of transmitting terminal chip 1, the interface of B2, B3 respectively, and the user imports the order that controlled end need be carried out by it.Light emitting diode 3 drives output by LED and drives, and whether display button information is effectively encrypted and exported.VDD is the input of power supply high level, and VSS is a ground connection.
At transmitting terminal, after user's action button, key information input transmitting terminal chip 1, chip is through behind the cryptographic calculation, and the information with after encrypting comprises plain code, pseudo-frame hopping and frame hopping part, sends by the PWM mouth, thereby has finished the once command transmit operation.(referring to Fig. 2) partly is made of button input, scratch pad memory (EEPROM) 4, randomizer 5, ciphering unit 6, shift register 7, oscillator 8, LED driving 9, power consumption control 10, control module 11 etc.The button input is the input information that receives from button; Scratch pad memory (EEPROM) 4 is used to deposit product ID, encryption key, irreducible function Fm, synchronous counting etc.; Randomizer 5 is used to produce random number, and this random number will be used for ciphering process; Ciphering unit is mainly carried out cryptographic operation, and the 32bit frame hopping information after the output encryption; Shift register is used for temporary information to be sent, and the information of transmission sends a position; Oscillator 8 is clock sources of entire circuit, for circuit provides clock; LED drives a laser-emitting diode of 9 outsides; Reset circuit 12 is used to produce reset signal; Power consumption control 10 is used to reduce power consumption, after receiving key information, just provides clock signal to other each several parts of circuit, is executing encryption and transmit operation, promptly disconnects the clock signal of other parts; The control of whole system, working in coordination with of each module all finished by control module.
Transmitting terminal chip 1 begins to carry out the encryption transmit operation after receiving the key information that is come out by button.At first be the power consumption control that various piece is opened in power consumption control unit 10, for each unit provides clock supply; Generate random numbers by randomizer 5 then, and from scratch pad memory (EEPROM) 4 with sequence number, encryption key, synchronized counter value, the irreducible function (F of product m) value etc. reads; With random number, encryption key, irreducible function (F m) value, sequence number etc. send into ciphering unit 6 together, will need information transmitted to send into shift register 7 after finishing ciphering process, launch then.Thereby ciphering process and transmit operation have been finished.
The ciphering process of transmitting terminal (referring to Fig. 3): the each information that transmits of order transmitting terminal is 64bit, comprise three parts: first is the 16bit plain code information that is made of 12bit before 4bit key information and the product ID, second portion by 16bit random number and sequence number after 16bit carry out XOR and generate, and third part is the 32bit frame hopping that obtains through AES, 32bit before encrypting expressly is made up of two parts again, and promptly 16bit carries out the 16bit sign indicating number that 16bit sign indicating number that XOR generates and 16bit random number and 16bit coincidence counter carry out the XOR generation behind 16bit random number and the sequence number.
The data that need in the encryption to use have: encryption key 32bit, irreducible function 32bit, the low 16bit of sequence number, random number 16bit and synchronous counting 16bit.Low 16bit and synchronous counting by sequence number are formed data to be encrypted together, after the use random number confusion, carry out following operation:
Encrypted Data=(Serial Number^Random Number|Counter^Random Number) * CryptKey (mod Fm) is promptly: data encrypted equals, sequence number XOR random number and the synchronous data formed of counting XOR random number, with encryption key finite field multiply each other long-pending.The encrypted frame hopping information that is 32bit that obtains.
Receiving terminal circuit mainly is made up of radio frequency command receiver module 13,14 and single-chip microcomputers 15 of (referring to Fig. 4) scratch pad memory (EEPROM).Radio frequency command receiver module 13 is used for the wireless remote control instruction that the serial received transmitting terminal sends, and will instruct and be transferred to single-chip microcomputer 15 with digital signal form; Scratch pad memory (EEPROM) 14 is deposited sequence number that deciphering will use, decruption key, irreducible function (Fm), counting etc. synchronously; After single-chip microcomputer 15 receives command information, from scratch pad memory (EEPROM) 14, read in sequence number, decruption key, irreducible function, synchronous counting etc., be decrypted and verify whether instruction is effective, if effectively then with corresponding button operation order output, and new synchronometer numerical value is written back to scratch pad memory (EEPROM) 14, when carrying out mode of learning (Learning mode), also will be with new sequence number and decruption key write-back scratch pad memory (EEPROM) 14.When receiving terminal receives that continuously some these sequence numbers are effective, but when deciphering invalid information, single-chip microcomputer 15 is scanned attack with output alarm signal (Alarm) with caution.
The receiving terminal manner of decryption is as follows:
(Serial Number^Random Number|Counter^Random Number)=Encrypted Data*DecryKey (mod Fm) is promptly: sequence number XOR random number and synchronously the data formed of counting XOR random number equal, the data that receive and decruption key are amassing that finite field multiplies each other.
Receiving terminal decrypted program operating process of the present invention is: (referring to Fig. 6)
1) will receive preceding 12bit sequence number and comparing of reading in the code word first, if identical execution 2), otherwise carry out 8); 2) utilize decipherment algorithm that frame hopping information is decrypted, and compare the corresponding first expressly of second portion, if identical execution 3 with frame hopping), otherwise carry out 8); 3) the corresponding first's (perhaps whole codeword second portion) expressly with frame hopping of back 16bit with the sequence number read carries out XOR, calculates the random number of transmitting terminal; 4) carry out xor operation by the corresponding second portion expressly of this random number, calculate synchronized counter value with frame hopping; 5) itself and readout are compared, if it carries out 7 greater than readout and difference in specified scope), otherwise carry out 6); 6) will be by 4) synchronized counter value that calculates is temporary, once receive again, promptly since 1) to 5), if new value carries out 7 than temporary value big 1), otherwise carry out 8); 7) think and receive successfully, new synchronized counter value is write to refresh EEPROM, carry out the desired operation of key information in the code word first simultaneously, finish.8) think and take defeat, judge whether to have passed through the several times sequence number relatively effectively and the deciphering failure,, otherwise directly carry out alarm signal if then judge and receive that scanning attack, output alarm signal also return.
Mode of learning: (referring to Fig. 7),
Mode of learning is primarily aimed at new electron key, and the information of automotive interior is upgraded, and comprising: product ID, decruption key and coincidence counter etc.In mode of learning, we consider its receiving code separated into two parts: the 16bit of first random number, second portion 16bit random number XOR coincidence counter.Under the mode of learning, concrete decoding step is: 1) receive, obtain the 64bit code word; 2) from EEPROM, read trading company of factory and F m, calculate the decruption key that makes new advances by new sequence number and algorithm decruption key, and temporary this sequence number and decruption key; 3) obtain expressly corresponding with new decruption key deciphering frame hopping information; 4) carry out xor operation with corresponding expressly first and second portion, calculate synchronized counter value, and it is temporary; 5) receive the code word of a 64bit once more; 6) with its sequence number and primary comparing, identical execution 7), otherwise carry out 10); 7) obtain expressly with decruption key deciphering frame hopping information; 8) expressly first and second portion carry out the synchronized counter value that XOR obtains this time; 9) with itself and comparing last time, if than last time just big 1 carry out 10), otherwise carry out 11); 10) think learning success, new sequence number, synchronized counter value, decruption key are write to refresh EEPROM, finish.11) think study failure, do not do any operation, finish.
The generation method of key:
The generating mode of encryption key and decruption key is as follows.
Generate encryption key: Cryptkey*DecryKey=l (mod Fm) promptly: encryption key and decruption key finite field multiply each other long-pending be 1.
Generating solution decryption key: DecryKey=SerialNumber*ManufactureID (mod Fm) is promptly: unique sign that decruption key equals sequence number and manufacturer finite field multiply each other long-pending.

Claims (5)

1. public key code hopping safety system and method, mainly comprise: the transmitting terminal of electron key and receiving terminal two parts constitute, transmitting terminal is made up of button, scratch pad memory (EEPROM), randomizer, ciphering unit, shift register, oscillator, LED driving, power consumption control, control module, receiving terminal is made up of radio frequency command receiver module, scratch pad memory (EEPROM) and a single-chip microcomputer, it is characterized in that: control program was carried out following step after described transmitting terminal was received push button signalling:
A) carry out the encryption transmit operation, the power consumption control of various piece is opened in the power consumption control unit, for each unit provides clock signal; B) generate random number by randomizer then, and from scratch pad memory (EEPROM), read sequence number, encryption key, synchronized counter value, the irreducible function (F of product m) value; C) with random number, encryption key, irreducible function (F m) value, sequence number send into ciphering unit together, and need information transmitted to send into shift register after will finishing encryption, launch then;
Control program was carried out following step after described receiving terminal was received signal:
After single-chip microcomputer receives command information, from scratch pad memory (EEPROM), read in sequence number, decruption key, irreducible function, the synchronometer logarithmic data, be decrypted and verify whether instruction is effective, if effectively then with corresponding button operation order output, and with new synchronometer numerical value write-back scratch pad memory (EEPROM), when carrying out mode of learning (Learning mode), also will be with new sequence number and decruption key write-back scratch pad memory (EEPROM), when receiving terminal receives that continuously some these sequence numbers are effective, but when deciphering invalid information, single-chip microcomputer is scanned attack with output alarm signal (Alarm) with caution.
2. a kind of public key code hopping safety system according to claim 1 and method, the each information that transmits of wherein said transmitting terminal is 64bit, comprise three parts, first is the 16bit plain code information that is made of 12bit before 4bit key information and the product ID, second portion by 16bit random number and sequence number after 16bit carry out XOR and generate, and third part is the 32bit frame hopping that obtains through AES, after the random number combination, carries out following step:
Encrypted Data=(Serial Number ^Random Number|Counter ^Random Number) * CryptKey (mod Fm) is promptly: data encrypted equals, sequence number XOR random number and the synchronous data formed of counting XOR random number, with encryption key finite field multiply each other long-pending.The encrypted frame hopping information that is 32bit that obtains.
3. a kind of public key code hopping safety system according to claim 1 and method, wherein said receiving code separated into two parts, the sequence number of the 32bit of first, the frame hopping information of second portion 32bit, wherein frame hopping is corresponding expressly is made up of two parts again, the XOR value of 16bit random number and 16bit random number and 16bit coincidence counter, when carrying out mode of learning (Learning mode) by following step: the information of receiving 64bit; From scratch pad memory (EEPROM), read trading company of factory and F m, calculate the decruption key that makes new advances by new sequence number and algorithm decruption key, and temporary this sequence number and decruption key; Obtain expressly corresponding with new decruption key deciphering frame hopping information; Carry out xor operation with correspondence plaintext first and second portion, calculate synchronized counter value, and it is temporary; Receive the code word of a 64bit once more; With its sequence number and primary comparing, identical execution next step, otherwise think study failure, do not do any operation, finish to withdraw from; Obtain expressly with decruption key deciphering frame hopping information; Plaintext first and second portion are carried out the synchronized counter value that XOR obtains this time; With itself and comparing last time, if than last time just big 1 carry out next step, otherwise think the study failure, do not do any operation, finish to withdraw from; Learning success writes new sequence number, synchronized counter value, decruption key to refresh scratch pad memory (EEPROM), finishes.
4. a kind of public key code hopping safety system according to claim 1 and method, the mode of wherein said generation encryption key is: Cryptkey*DecryKey=1 (mod Fm) promptly: encryption key and decruption key finite field multiply each other long-pending be 1.
5. a kind of public key code hopping safety system according to claim 1 and method, the mode of wherein said generating solution decryption key is: DecryKey=SerialNumber*ManufactureID (mod Fm) promptly: unique sign that decruption key equals sequence number and manufacturer finite field multiply each other long-pending.
CNB200510023810XA 2005-02-03 2005-02-03 Public key code hopping safety system and method Expired - Fee Related CN100461669C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200510023810XA CN100461669C (en) 2005-02-03 2005-02-03 Public key code hopping safety system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200510023810XA CN100461669C (en) 2005-02-03 2005-02-03 Public key code hopping safety system and method

Publications (2)

Publication Number Publication Date
CN1814974A true CN1814974A (en) 2006-08-09
CN100461669C CN100461669C (en) 2009-02-11

Family

ID=36907317

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200510023810XA Expired - Fee Related CN100461669C (en) 2005-02-03 2005-02-03 Public key code hopping safety system and method

Country Status (1)

Country Link
CN (1) CN100461669C (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010149041A1 (en) * 2009-06-23 2010-12-29 北京易恒信认证科技有限公司 Radio frequency system, radio frequency device and security processing method
CN101149768B (en) * 2006-09-20 2011-04-27 展讯通信(上海)有限公司 Special processor software encryption and decryption method
CN103051869A (en) * 2012-11-15 2013-04-17 山东中孚信息产业股份有限公司 System and method for encrypting camera video in real time
CN103763104A (en) * 2014-01-02 2014-04-30 中国移动(深圳)有限公司 Method and system for dynamic verification
CN104504795A (en) * 2014-12-20 2015-04-08 江门市联创发展有限公司 Encryption, decryption and authentication method for intelligent door lock under open system
CN103326851B (en) * 2013-07-03 2016-03-23 西京学院 SCM Based a kind of compass encrypting and decrypting method
US9512659B2 (en) 2011-05-24 2016-12-06 Microchip Technology Incorporated Code hopping based system with increased security
TWI573427B (en) * 2011-09-12 2017-03-01 微晶片科技公司 Code hopping based system with increase security
CN110690965A (en) * 2019-10-10 2020-01-14 山东浪潮人工智能研究院有限公司 Wireless communication safety system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2376519Y (en) * 1999-06-18 2000-05-03 昆明电机有限责任公司 Electronic permulation lock
US6502160B1 (en) * 1999-09-10 2002-12-31 Lg Information & Communications Ltd. Apparatus and method for establishing construction information of a non-management ethernet switch
CN1193538C (en) * 2001-12-17 2005-03-16 北京兆日科技有限责任公司 Electronic cipher formation and checking method
US6816918B2 (en) * 2002-04-10 2004-11-09 Broadcom Corporation Flexible apparatus for setting configurations using an EEPROM

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101149768B (en) * 2006-09-20 2011-04-27 展讯通信(上海)有限公司 Special processor software encryption and decryption method
WO2010149041A1 (en) * 2009-06-23 2010-12-29 北京易恒信认证科技有限公司 Radio frequency system, radio frequency device and security processing method
US9512659B2 (en) 2011-05-24 2016-12-06 Microchip Technology Incorporated Code hopping based system with increased security
TWI573427B (en) * 2011-09-12 2017-03-01 微晶片科技公司 Code hopping based system with increase security
CN103051869A (en) * 2012-11-15 2013-04-17 山东中孚信息产业股份有限公司 System and method for encrypting camera video in real time
CN103326851B (en) * 2013-07-03 2016-03-23 西京学院 SCM Based a kind of compass encrypting and decrypting method
CN103763104A (en) * 2014-01-02 2014-04-30 中国移动(深圳)有限公司 Method and system for dynamic verification
CN103763104B (en) * 2014-01-02 2018-05-22 中移信息技术有限公司 A kind of method and system of dynamic authentication
CN104504795A (en) * 2014-12-20 2015-04-08 江门市联创发展有限公司 Encryption, decryption and authentication method for intelligent door lock under open system
CN110690965A (en) * 2019-10-10 2020-01-14 山东浪潮人工智能研究院有限公司 Wireless communication safety system
CN110690965B (en) * 2019-10-10 2022-09-13 山东浪潮科学研究院有限公司 Wireless communication safety system

Also Published As

Publication number Publication date
CN100461669C (en) 2009-02-11

Similar Documents

Publication Publication Date Title
CN100461669C (en) Public key code hopping safety system and method
US20100208894A1 (en) Encoder and decoder apparatus and methods
CN102110319B (en) Wireless code hopping system, device and method for remote control door lock
KR950001729B1 (en) Method of secure remote access
US9512659B2 (en) Code hopping based system with increased security
JP3406157B2 (en) Remote control device
JPH0242840A (en) Method and apparatus for confidental data transmission
US10375252B2 (en) Method and apparatus for wirelessly activating a remote mechanism
CN1801700A (en) Encryption communication system for generating passwords on the basis of start information on both parties of communication
CN102236773A (en) Radio frequency identification (RFID) encryption verification system and method
CN111722831B (en) Encryption system and implementation method thereof
CN101067358A (en) Trick lock mechanism
CN101833798A (en) Infrared ray remote control electronic coded lock device based on singlechip and control method thereof
CN104464057A (en) Hopping encoding method for car entrance guard system
CN106504377A (en) A kind of electronic lock keyless access system of random key
CN102568062A (en) Encryption and decryption method for remote controller
CN103903047A (en) Elliptic curve encryption coprocessor suitable for RFID security communication
CN102957513A (en) Error correction method and device based on visible light communication
CN105235642A (en) Control order safety execution method and vehicle alarm host
CN105416234B (en) Control instruction safe transmission method and automobile anti-theft remote controller
TW201623762A (en) Multiple regulation electronic lock control system and method of wirelessly transmitting keys
CN101174947A (en) Security system combining biological characteristic recognition module and intelligent password system
CN110047181B (en) Intelligent door lock safety control method based on Zigbee
AU732908B2 (en) Method for protecting devices, especially car radios, against theft
CN202023428U (en) Wireless encryption remote control system for automobile door lock

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: JIA SONGREN

Free format text: FORMER OWNER: CHANGSANJIAO SCIENCE-TECHNOLOGY DEVELOPMENT CO., LTD., SHANGHAI

Effective date: 20070810

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20070810

Address after: 200032 7A room, No. 777, Lane 1, two South Road, Shanghai, Zhongshan

Applicant after: Jia Songren

Address before: 200032 7A room, No. 777, Lane 1, two South Road, Shanghai, Zhongshan

Applicant before: Changsanjiao Science-Technology Development Co., Ltd., Shanghai

C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Assignee: Kunshan trillion core technology Co., Ltd.

Assignor: Jia Songren

Contract record no.: 2012320010027

Denomination of invention: Public key code hopping safety system and method

Granted publication date: 20090211

License type: Exclusive License

Open date: 20060809

Record date: 20120306

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090211

Termination date: 20170203