Communication-free hopping code generation method of access control system

An access control system and code-hopping technology, applied in the password generation field of the access control system

Inactive Publication Date: 2013-06-05
国网江苏省电力有限公司金湖县供电分公司 +3
View PDF9 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, in the power system, the distribution of substations is often relatively scattered, and the door locks of the gates, control rooms, and switch control rooms usually use mechanical locks. All kinds of personnel need t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication-free hopping code generation method of access control system
  • Communication-free hopping code generation method of access control system
  • Communication-free hopping code generation method of access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be further described in conjunction with accompanying drawings.

[0014] Such as Figure 1-3 As shown, the code hopping generation method of the access control system includes a code hopping terminal and an access controller. The code hopping terminal is an ordinary PC, a tablet computer or a smart phone. A number of access control terminals; among them, the code-hopping terminal is installed with a code-hopping generation program. In the program, there is a set of non-linear algorithms for generating code-hopping and an encryption algorithm calling rule table corresponding to the access control controller. Each time period corresponds to each access control controller. The algorithms are different; the decryption program of the access controller has a decryption algorithm call rule table corresponding to the code-hopping terminal and a set of non-linear algorithms for password decryption, and the algorithm for each period is consistent with t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a communication-free hopping code generation method of an access control system. A hopping code generation system comprises a hopping code terminal and access controllers, one hopping code terminal corresponds to a plurality of access controllers, each access controller controls one access terminal or a plurality of access terminals, wherein a hopping code generating program is mounted in the hopping code terminal, the hopping code generating program is provided with a set of nonlinear algorithms for generating hopping codes and an encryption algorithm calling rule list corresponding to the access controllers, and the algorithms of each access controller at different time intervals are different. A decryption program of the access controllers is provided with a decryption algorithm calling rule list corresponding to the hopping code terminal and a set of decryption nonlinear algorithms, wherein an algorithm at each time interval is the same as the algorithm of the hopping code terminal. According to the communication-free hopping code generation method of the access control system, a corresponding access control terminal is authorized according to a comparison result, no communication link is arranged between the hopping code terminal and the access controllers, and thus non-repeating codes in different time of the access controllers are achieved.

Description

technical field [0001] The invention relates to a method for generating a code for an access control system, in particular to a method for generating a hopping code for an access control system without communication. Background technique [0002] Code hopping technology, also known as rolling code technology, is an encryption technology that uses complex nonlinear encryption algorithms to realize encoding. It is characterized by multiple changes in encoding, anti-interception, safety and reliability, and strong ability to prevent attacks and illegal intrusions. At present, the code-hopping technology is mainly used in the remote control keyless entry control system of the automobile industry, and the code-hopping technology is used to open and close the car door by transmitting wireless signals. The code hopping technology uses hardware technology to make the password sent by the key unique and random each time. The intruder cannot predict it. Even if the original unlock pas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00
Inventor 刘建戈邵加武邵青松秦玥居上冯安金
Owner 国网江苏省电力有限公司金湖县供电分公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products