[go: up one dir, main page]

CN102404068A - Secondary encryption/decryption method - Google Patents

Secondary encryption/decryption method Download PDF

Info

Publication number
CN102404068A
CN102404068A CN2010102769547A CN201010276954A CN102404068A CN 102404068 A CN102404068 A CN 102404068A CN 2010102769547 A CN2010102769547 A CN 2010102769547A CN 201010276954 A CN201010276954 A CN 201010276954A CN 102404068 A CN102404068 A CN 102404068A
Authority
CN
China
Prior art keywords
signal
decoding
encryption
decryption
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102769547A
Other languages
Chinese (zh)
Inventor
张志吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHANG HUAXUAN
Original Assignee
ZHANG HUAXUAN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHANG HUAXUAN filed Critical ZHANG HUAXUAN
Priority to CN2010102769547A priority Critical patent/CN102404068A/en
Publication of CN102404068A publication Critical patent/CN102404068A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method for secondary encryption/decryption, which respectively carries out secondary encryption coding to correspondingly form a first encryption signal and a second encryption signal, and then receives the first encryption signal and carries out primary decryption decoding to form a first decoding signal, when the first decoding signal is different from the first encryption signal, the first encryption signal is received again and the primary decryption decoding is carried out, otherwise, when the first decoding signal is the same as the first encryption signal, the steps are carried out: and receiving the second encrypted signal and performing a second decryption decoding to form a second decoded signal, and when the second decoded signal is different from the second encrypted signal, re-executing the first decryption decoding, otherwise, when the second decoded signal is the same as the second encrypted signal, completing the decryption operation. By checking the encryption and decryption twice, when the load is driven by remote control, the misoperation caused by single decoding can be avoided, and the safety is improved.

Description

The method of superencipher/deciphering
Technical field
The present invention relates to the encryption/decryption technique of radio signals, relate in particular to the method for a kind of superencipher/deciphering.
Background technology
Press; In the daily life, regular meeting uses wireless remote controller and is driven thing start, for example Electrically operated gate to drive one; Usually can produce a coding signal with a remote control and be wirelessly transmitted to Electrically operated gate; Carry out the comparison of a signal through carrying out a decoding signal in the Electrically operated gate, when the coding signal was identical with the decoding signal, this Electrically operated gate can receive the driving of this remote control and produce an effect of opening the door.
But, produce coding signal and when making this Electrically operated gate produce decoding signal, its coding signal and decoding signal do not have the mechanism of another check by this wireless remote controller; So have the Electrically operated gate of same group of decoding signal, controlled by same group of wireless remote controller, make this Electrically operated gate produce the action of decoding; And the decoding signal that makes same group of Electrically operated gate produces when deciphering; Therefore wireless remote controller can be opened different Electrically operated gate, hurts the people so possibly cause Electrically operated gate to open by mistake to open or close, in addition; Also there are many personages also can carry out the action of coding and decoding with wireless remote controller; And this Electrically operated gate is opened, and then carry out the deathwatch and wait behavior, the space that the action reality of existing coding and decoding remains to be improved.
Summary of the invention
In view of this, main purpose of the present invention is to provide the method for a kind of superencipher/deciphering, sees through the action of checking of twice encrypting and decrypting, when making remote control drive load, can not produce misoperation, to reach improving safety.
For achieving the above object, technical scheme of the present invention is achieved in that
The method of a kind of superencipher/deciphering, this method key step comprises:
The scrambled step respectively through the superencipher coding, forms first with correspondence and encrypts the signal and the second encryption signal;
The first deciphering decoding step; Receive this first encryption signal and do deciphering decoding for the first time; Forming the first decoding signal, and first encrypt signal, then receive this first encryption signal again and carry out the unscrambling decoding first time for not simultaneously when this first decoding signal and this; Otherwise, if, then carry out following step when this first decoding signal and this first encryption signal when being identical; And,
The second deciphering decoding step: receive this second encryption signal and do deciphering decoding for the second time; To form one second decoding signal; And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step again, otherwise; If, then finish decryption acts when this second decoding signal and this second encryption signal when being identical.
Wherein, this scrambled step begins to carry out scrambled after triggered by a trigger signals.
Wherein, receiving this first encrypts signal and this second to encrypt the frequency of signal inequality.
Wherein, after this second deciphering decoding step, can produce one and drive signal.
The method of superencipher provided by the present invention/deciphering has the following advantages:
Adopt the method for superencipher of the present invention/deciphering; See through scrambled step, the first deciphering decoding step and the second unscrambling decoding step, can utilize the action of checking of twice encrypting and decrypting, when making remote control drive load; Do not produce misoperation, thereby reach the purpose of improving safety.
Description of drawings
Fig. 1 is the process block diagram of the method for embodiment of the invention superencipher/deciphering;
Fig. 2 is the flow chart one of the method for embodiment of the invention superencipher/deciphering;
Fig. 3 is the flowchart 2 of the method for embodiment of the invention superencipher/deciphering.
Embodiment
Below in conjunction with accompanying drawing and embodiments of the invention method of the present invention is done further detailed explanation.
Fig. 1, Fig. 2 and Fig. 3 are respectively process block diagram of the present invention and implementing procedure figure, and as shown in Figure 1, it includes:
Scrambled step S1: after triggered by a trigger signals SA1; Begin to carry out the superencipher coding; And correspondingly behind for the first time the scrambled SA2 and the second scrambled SA3 respectively form first and encrypt signal and second and encrypt signal (figure does not show), this trigger signals SA1 system sees through the human body sensing and detects in preferred embodiment of the present invention.
The first deciphering decoding step S2: receive this first encryption signal and be the SB1 of deciphering decoding for the first time; To form the first decoding signal (figure does not show); And first encrypt signal for not simultaneously when this first decoding signal and this, then receive this first encryption signal again and carry out this first time of unscrambling decoding SB1, otherwise; If, then carry out following step when this first decoding signal and this first encryption signal when being identical:
The second deciphering decoding step S3: receive this second encryption signal and be the SB2 of deciphering decoding for the second time; To form the second decoding signal (figure does not show); And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step SB1 again, otherwise; If when this second decoding signal and this second encryption signal when being identical; Then finish decryption acts, first encrypt signal and this second to encrypt the frequency of signal inequality, and behind this second deciphering decoding step S3, can produce one and drive signal (figure does not show) and in preferred embodiment of the present invention, receive this.
Like Fig. 2, shown in Figure 3, when embodiment of the present invention, see through the human body sensing earlier and detect SA1, and if do not have when sensing; Then carry out the human body sensing again and detect SA1, otherwise, if when sensing; Then move through twice scrambled, and form this first encryption signal and the second encryption signal respectively, this first encryption signal, second is encrypted signal and is transmitted respectively; And after this second encryption signal is sent out, can carry out the human body sensing again and detect SA1, in addition; This first is encrypted signal and can be received earlier, and through the SB1 of deciphering decoding for the first time forming this first decoding signal, and when this first decoding signal and this first encryption signal for not simultaneously; Then for wrong and receive this again and first encrypt signal and carry out unscrambling decoding SB1 first time, otherwise, if when this first when to decipher signal be identical with this first encryption signal; Then for correct and receive this and second encrypt signal and carry out unscrambling decoding SB2 second time, forming this second decoding signal, and when this second decoding signal and this second encryption signal for not simultaneously; Then for wrong and receive this again and first encrypt signal and carry out unscrambling decoding SB1 first time, otherwise, if when this second when to decipher signal be identical with this second encryption signal; Be correctly and also can trigger the load start, simultaneously, more trigger speech play.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.

Claims (4)

1.一种二次加密/解密的方法,其特征在于,该方法主要步骤包括:1. A method for secondary encryption/decryption, characterized in that the main steps of the method include: 加密编码步骤,分别经二次加密编码,以对应形成第一加密讯号及第二加密讯号;Encryption and encoding steps, respectively undergoing secondary encryption and encoding to form the first encrypted signal and the second encrypted signal correspondingly; 第一解密解码步骤,接收该第一加密讯号并做第一次解密解码,以形成第一译码讯号,而当该第一译码讯号与该第一加密讯号为不同时,则重新接收该第一加密讯号并进行第一次解密译码;反之,若当该第一译码讯号与该第一加密讯号为相同时,则进行下述步骤;以及,The first decryption and decoding step is to receive the first encrypted signal and perform the first decryption and decoding to form a first decrypted signal, and when the first decoded signal is different from the first encrypted signal, then receive the first encrypted signal again The first encrypted signal is decrypted and decoded for the first time; otherwise, if the first decoded signal is the same as the first encrypted signal, the following steps are performed; and, 第二解密解码步骤:接收该第二加密讯号并做第二次解密解码,以形成一第二译码讯号,而当该第二译码讯号与该第二加密讯号为不同时,则重新执行上述第一解密译码步骤,反之,若当该第二译码讯号与该第二加密讯号为相同时,则结束解密动作。Second decryption and decoding step: receiving the second encrypted signal and performing second decryption and decoding to form a second decoding signal, and when the second decoding signal is different from the second encrypted signal, re-execute In the above first decryption and decoding step, on the contrary, if the second decoding signal is the same as the second encryption signal, then the decryption operation ends. 2.根据权利要求1所述的二次加密/解密的方法,其特征在于,其中,该加密编码步骤受一触发讯号触发后,开始进行加密编码。2 . The method for secondary encryption/decryption according to claim 1 , wherein, the encryption encoding step is triggered by a trigger signal to start encryption encoding. 3 . 3.根据权利要求1所述的二次加密/解密的方法,其特征在于,其中,接收该第一加密讯号及该第二加密讯号的频率不相同。3. The method for secondary encryption/decryption according to claim 1, wherein the frequencies for receiving the first encrypted signal and the second encrypted signal are different. 4.根据权利要求1所述的二次加密/解密的方法,其特征在于,其中,于该第二解密解码步骤后会产生一驱动讯号。4. The method for secondary encryption/decryption according to claim 1, wherein a driving signal is generated after the second decryption and decoding step.
CN2010102769547A 2010-09-09 2010-09-09 Secondary encryption/decryption method Pending CN102404068A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102769547A CN102404068A (en) 2010-09-09 2010-09-09 Secondary encryption/decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102769547A CN102404068A (en) 2010-09-09 2010-09-09 Secondary encryption/decryption method

Publications (1)

Publication Number Publication Date
CN102404068A true CN102404068A (en) 2012-04-04

Family

ID=45885902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102769547A Pending CN102404068A (en) 2010-09-09 2010-09-09 Secondary encryption/decryption method

Country Status (1)

Country Link
CN (1) CN102404068A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270687A (en) * 2014-10-24 2015-01-07 厦门蓝斯通信股份有限公司 Method and device for encrypting digital interphone
CN109598105A (en) * 2018-12-03 2019-04-09 深圳忆联信息系统有限公司 A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050015589A1 (en) * 2003-07-17 2005-01-20 Shmuel Silverman Method for providing point-to-point encryption in a communication system
CN1697374A (en) * 2004-05-13 2005-11-16 华为技术有限公司 Method for sanding and receiving cipher data, device for distributing and receiving cipher data
CN101067358A (en) * 2007-03-20 2007-11-07 姜君凯 Trick lock mechanism

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050015589A1 (en) * 2003-07-17 2005-01-20 Shmuel Silverman Method for providing point-to-point encryption in a communication system
CN1697374A (en) * 2004-05-13 2005-11-16 华为技术有限公司 Method for sanding and receiving cipher data, device for distributing and receiving cipher data
CN101067358A (en) * 2007-03-20 2007-11-07 姜君凯 Trick lock mechanism

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270687A (en) * 2014-10-24 2015-01-07 厦门蓝斯通信股份有限公司 Method and device for encrypting digital interphone
CN109598105A (en) * 2018-12-03 2019-04-09 深圳忆联信息系统有限公司 A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware

Similar Documents

Publication Publication Date Title
CN104112307B (en) Sound wave is utilized to carry out electronic lock and the method for unlocking thereof unblanked
KR102652153B1 (en) Security system for a moveable barrier operator
CN105184929A (en) Intelligent door lock control method and device
CN102568062B (en) Encryption and decryption method for remote controller
CN101806173A (en) Electronic lock system, electronic lock and unlocking method thereof
WO2010040629A3 (en) Data processing system for providing authorization keys
CN111119655B (en) Lock control system, safe and lock control method based on communication module
CN103024158A (en) Mobile phone with fingerprint identification function
CN110086864B (en) Method for offline management and control by using double keys of lock
CN103714299A (en) Method and system for encryption and decryption of file of mobile terminal
WO2007111713A3 (en) Method for device authentication
CN103593892A (en) Challenge response and symmetrical encryption based electronic lock unlocking method
Wetzels Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys
CN106761052A (en) A kind of automobile door control remote-control key radio frequency Replay Attack system of defense based on timestamp
CN103810780A (en) Coded lock based on brain-computer switching technique and encryption and decryption method of coded lock
CN103929308A (en) Information verification method applied to RFID card
CN103761009A (en) Touch device and data transmission method based on touch control
CN102404068A (en) Secondary encryption/decryption method
KR20130068562A (en) Remote control system and method for vehicle using mobile phone
CN105184930A (en) Control method and device of intelligent primary and secondary locks
CN104929443B (en) Smart lock and its method for unlocking and device
CN105303655A (en) Bluetooth lock
WO2020259397A1 (en) Smart lock, security platform and authentication method therefor
KR101874179B1 (en) Door-lock device, user terminal and controlling method of door-lock device
CN109272729B (en) Identification method and device for anti-theft code remote controller

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120404