Synchronous code encryption device and method for access control system

An access control system and synchronous code technology, applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve the problems of security performance, security damage of access control system, data easy to be intercepted, cracked and counterfeited, etc. problems, to achieve the effect of improving safety and reliability

Inactive Publication Date: 2017-09-15
广州盛炬智能科技有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

IC card technology is developing rapidly. From ID card to IC card to CPU card, the security performance has reached the financial level. The controller has changed from traditional single-chip microcomputer to ARM with more advanced process architecture and even industrial computer. The data processing capability and security performance have also increased. Greatly improved, but the data transmission from the terminal device to the access control has been using the traditional method, and the security performance is worrying
[0003] The existing data transmission and communication methods between terminal equipment such as access control card readers and fingerprint readers in the field of security access control and controllers mainly include: Wiegand communication, RS-485 communication, Ethernet communication, wireless communication, existing data transmission methods Most of the data transmission of the same effective data in the network is transmitted in plain text and fixed. The data is easy to be intercepted, cracked and counterfeited. If a series of complete data is illegally intercepted during data transmission, it is only necessary to simulate this series of data and resend it. It can cause damage to the security of the entire access control system, thus affecting the security of the access control system
[0004] In the field of security, the data transmission from the access control card reader to the access control controller mostly adopts Wiegand communication. Wiegand communication has the characteristics of simple protocol, convenient implementation, and compatibility of Wiegand data from various manufacturers, so it is widely used, but At the same time, Wiegand communication on most occasions adopts a one-way, plain text, and fixed format method, which also makes Wiegand communication have various security risks
For example: an access control card reader reads the data of a card is 0x11223344, and transmits this data to the access control controller through the Wiegand interface, and then the access control controller identifies the data of 0x11223344 as valid data, and controls to open the electric lock , this card with the card number 0x11223344 has the same Wiegand data output waveform every time the card is swiped on the card reader. If you use an oscilloscope or other equipment to detect the Wiegand data line and obtain the waveform corresponding to the data 0x11223344, then use The third-party device simulates the same signal waveform and sends the waveform to the Wiegand data line, then the access controller will also receive the data 0x11223344, and then execute the correct unlocking method in the same way, but at this time the unlocking data It does not come from a real and effective card swiping operation, but from a counterfeit data generated by illegal simulation, but realizes an illegal unlocking operation. This situation has very serious security risks
[0005] Wiegand data transmission in the access control field is mostly one-way transmission, so it is impossible to use two-way random number dynamic encryption to prevent data from being counterfeited and cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Synchronous code encryption device and method for access control system
  • Synchronous code encryption device and method for access control system
  • Synchronous code encryption device and method for access control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] like figure 1 As shown, a synchronous code encryption device for an access control system is applied to an access control system including a door card and a door lock, including an access control device and a terminal device;

[0070] The terminal equipment includes a terminal power supply module, a terminal central processing module, a Wiegand output module, and a terminal radio frequency communication module, which are used to read the card number data of the door card and perform dynamic encryption of the synchronization code, and transmit the encrypted data to the access control device;

[0071] The terminal power supply module is respectively electrically connected to the terminal central processing module, the Wiegand output module, and the terminal radio frequency communication module, and is used to provide DC power to the connected modules;

[0072] The terminal central processing module communicates with the Wiegand output module and the terminal radio frequen...

Embodiment 2

[0123] A synchronous code encryption method for access control system can realize that the signal waveform of the same valid data transmitted on the Wiegand data line is different every time, and the access control controller will automatically synchronize the communication and receive the data correctly and then parse out the correct data, and then perform subsequent operations. For example: access control card reader (that is, the terminal device swipes the card, the card number is 0x11223344, the access control card reader will add the dynamic synchronization code to the card number data and encrypt the data and then convert it into Wiegand data output, so after the first card swiping, the Weigan The actual output data of the root output module will be processed as 0x8564127845986534, the actual output data of the Wiegand output module will be processed as 0x7468534145687526 after the second card swiping, and the actual output data of the Wiegand output module will be proces...

Embodiment 3

[0125] A kind of concrete implementation process of the synchronous code encryption method that is used for access control system comprises the following steps:

[0126] S1, the terminal device is powered on, and a random number is internally generated as the most original synchronization code, for example, this data is 0x11223344;

[0127] S2, the terminal device reads the card number data, and the card number is 0xAABBCCDD;

[0128] S3, the terminal device combines the two data into 0x11223344AABBCCDDEE;

[0129] S4, the terminal device encrypts the combined data to generate a piece of ciphertext, the encryption algorithm is RC5 (you can also use a custom encryption algorithm or other public algorithms), for example, the ciphertext data is 0x18584A4C51E22C8A;

[0130] S5, the terminal device updates the internal synchronization code, for example: the update rule is the synchronization code +1, then the new synchronization code is 0x11223345 (the synchronization code change ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of electronic information encryption and discloses a synchronous code encryption device for an access control system. The synchronous code encryption device comprises access control equipment and terminal equipment. The invention further discloses a synchronous code encryption method for the access control system, which comprises the following steps: step 1, judging whether to punch a card for the first time or not; step 2, performing initial debugging; step 3, reading card number data and performing data combination, encryption and conversion; step 4, transmitting Wiegand data and performing incremental update on synchronous codes inside the access control equipment; step 5, decrypting the Wiegand data; step 6, storing the synchronous codes inside the terminal equipment in the access control equipment and setting a synchronous code contrast interval; step 7, judging whether the synchronous codes inside the access control equipment fall into the synchronous code contrast interval or not; step 8, judging as effective data; step 9, judging as ineffective data. The synchronous code encryption device and method provided by the invention favorably prevent security attack in a manner of counterfeiting the effective data, so that the safety and the reliability of a door lock system are improved.

Description

technical field [0001] The invention relates to the technical field of electronic information encryption, in particular to a synchronization code encryption device and method for an access control system. Background technique [0002] With the development of the times, people's lives are becoming more and more automated and intelligent, and modern security access control systems are gradually replacing traditional door lock devices. The access control system involves personal and property safety, so safety performance is particularly important. IC card technology is developing rapidly. From ID card to IC card to CPU card, the security performance has reached the financial level. The controller has changed from traditional single-chip microcomputer to ARM with more advanced process architecture and even industrial computer. The data processing capability and security performance have also increased. However, the data transmission from the terminal device to the access contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00
CPCG07C9/00182G07C9/00571G07C2009/00238
Inventor 梁伯福宁坤
Owner 广州盛炬智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products