Public key code hopping safety system and method

A security system and code-hopping technology, which is applied in the field of encrypted code-hopping security systems, can solve problems such as block cipher code-hopping systems that cannot ensure system security, and achieve the effects of reducing costs and improving security

Inactive Publication Date: 2006-08-09
贾松仁
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Later, the rolling code was invented. The code issued by the electronic key is different each time, and it is fixed in some code words, which improves the security. Later, the code hopping of the block cipher encryption algorithm ( hopping

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key code hopping safety system and method
  • Public key code hopping safety system and method
  • Public key code hopping safety system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] System main parameters:

[0018] Encryption key (CryptKey) 32bit, used in the encryption process;

[0019] Decryption key (DecryKey) 32bit, used in the decryption process;

[0020] Button information (ButtonInfo) 4bit, the information to be transmitted, the receiving end will perform corresponding operations according to the button information;

[0021] Serial number (Serial Numbs) 28bit, the unique sign of each electronic key, the door lock system relies on this sign to identify whether it is its own electronic key;

[0022] Synchronous counting (Counter) 16bit, every time the electronic key is pressed, the number is incremented by one, which is used to generate hopping codes and some security checks after encryption;

[0023] Manufacturer ID (ManufactureID) 32bit, the unique logo of each car manufacturer, which is combined with the serial number to generate the encryption key and decryption key;

[0024] The encrypted data (Encrypted Data) 32bit, that is, the chang...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A public key code hopping safety system and method mainly includes electronic unlocking key transmitting end and receiving end. It features transmitting end received touch-tone signal controlling program to execute ciphering transmit operation, reading out product serial number, encryption key, synchronous counter value, and irreducible polynomial Fm value from memory, then loading these data into ciphering unit, after complete ciphering and loading to shift register to transmit, after receiving end received signal, controlling procedure reading in serial number, deciphering encryption key, irreducible polynomial, synchronizing enumeration data from memory, to make deciphering and verifying, writing back new synchronizing count value to memory, in executing training pattern, writing back new serial number and deciphering encryption key to memory, when serial number is effective but deciphering invalidation, effectively deciphering outputting alarm signal, successfully learning, writing in new serial number, synchronous counter value, and deciphering encryption key for refreshing memory. Said invention has advantage of high system safety and low cost.

Description

Technical field: [0001] The invention relates to a public key code-hopping security system and method, in particular to an encrypted code-hopping security system and method of an electronic key and door lock system controlled by a microprocessor. Background technique: [0002] Door locks are often used in daily life. With the development of electronic technology, electronic keys and electronic door lock systems are widely used. People use electronic keys to send some specific wireless signals. After receiving the information, the door lock system , Automatically perform a series of corresponding operations, such as opening the door, unlocking the lock, turning on the light, preheating the internal air conditioner, and so on. However, most of the remote control door locks that are put into the market such as automobile door lock systems are based on fixed coding technology. The codes issued by the electronic key each time are fixed values. ) and other devices can easily crac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): E05B49/00
Inventor 贾松仁龚厚志刘文江
Owner 贾松仁
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products