CN102404068A - Secondary encryption/decryption method - Google Patents
Secondary encryption/decryption method Download PDFInfo
- Publication number
- CN102404068A CN102404068A CN2010102769547A CN201010276954A CN102404068A CN 102404068 A CN102404068 A CN 102404068A CN 2010102769547 A CN2010102769547 A CN 2010102769547A CN 201010276954 A CN201010276954 A CN 201010276954A CN 102404068 A CN102404068 A CN 102404068A
- Authority
- CN
- China
- Prior art keywords
- signal
- decoding
- encryption
- decryption
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000001960 triggered effect Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 2
- 241001203089 Trogium pulsatorium Species 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method for secondary encryption/decryption, which respectively carries out secondary encryption coding to correspondingly form a first encryption signal and a second encryption signal, and then receives the first encryption signal and carries out primary decryption decoding to form a first decoding signal, when the first decoding signal is different from the first encryption signal, the first encryption signal is received again and the primary decryption decoding is carried out, otherwise, when the first decoding signal is the same as the first encryption signal, the steps are carried out: and receiving the second encrypted signal and performing a second decryption decoding to form a second decoded signal, and when the second decoded signal is different from the second encrypted signal, re-executing the first decryption decoding, otherwise, when the second decoded signal is the same as the second encrypted signal, completing the decryption operation. By checking the encryption and decryption twice, when the load is driven by remote control, the misoperation caused by single decoding can be avoided, and the safety is improved.
Description
Technical field
The present invention relates to the encryption/decryption technique of radio signals, relate in particular to the method for a kind of superencipher/deciphering.
Background technology
Press; In the daily life, regular meeting uses wireless remote controller and is driven thing start, for example Electrically operated gate to drive one; Usually can produce a coding signal with a remote control and be wirelessly transmitted to Electrically operated gate; Carry out the comparison of a signal through carrying out a decoding signal in the Electrically operated gate, when the coding signal was identical with the decoding signal, this Electrically operated gate can receive the driving of this remote control and produce an effect of opening the door.
But, produce coding signal and when making this Electrically operated gate produce decoding signal, its coding signal and decoding signal do not have the mechanism of another check by this wireless remote controller; So have the Electrically operated gate of same group of decoding signal, controlled by same group of wireless remote controller, make this Electrically operated gate produce the action of decoding; And the decoding signal that makes same group of Electrically operated gate produces when deciphering; Therefore wireless remote controller can be opened different Electrically operated gate, hurts the people so possibly cause Electrically operated gate to open by mistake to open or close, in addition; Also there are many personages also can carry out the action of coding and decoding with wireless remote controller; And this Electrically operated gate is opened, and then carry out the deathwatch and wait behavior, the space that the action reality of existing coding and decoding remains to be improved.
Summary of the invention
In view of this, main purpose of the present invention is to provide the method for a kind of superencipher/deciphering, sees through the action of checking of twice encrypting and decrypting, when making remote control drive load, can not produce misoperation, to reach improving safety.
For achieving the above object, technical scheme of the present invention is achieved in that
The method of a kind of superencipher/deciphering, this method key step comprises:
The scrambled step respectively through the superencipher coding, forms first with correspondence and encrypts the signal and the second encryption signal;
The first deciphering decoding step; Receive this first encryption signal and do deciphering decoding for the first time; Forming the first decoding signal, and first encrypt signal, then receive this first encryption signal again and carry out the unscrambling decoding first time for not simultaneously when this first decoding signal and this; Otherwise, if, then carry out following step when this first decoding signal and this first encryption signal when being identical; And,
The second deciphering decoding step: receive this second encryption signal and do deciphering decoding for the second time; To form one second decoding signal; And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step again, otherwise; If, then finish decryption acts when this second decoding signal and this second encryption signal when being identical.
Wherein, this scrambled step begins to carry out scrambled after triggered by a trigger signals.
Wherein, receiving this first encrypts signal and this second to encrypt the frequency of signal inequality.
Wherein, after this second deciphering decoding step, can produce one and drive signal.
The method of superencipher provided by the present invention/deciphering has the following advantages:
Adopt the method for superencipher of the present invention/deciphering; See through scrambled step, the first deciphering decoding step and the second unscrambling decoding step, can utilize the action of checking of twice encrypting and decrypting, when making remote control drive load; Do not produce misoperation, thereby reach the purpose of improving safety.
Description of drawings
Fig. 1 is the process block diagram of the method for embodiment of the invention superencipher/deciphering;
Fig. 2 is the flow chart one of the method for embodiment of the invention superencipher/deciphering;
Fig. 3 is the flowchart 2 of the method for embodiment of the invention superencipher/deciphering.
Embodiment
Below in conjunction with accompanying drawing and embodiments of the invention method of the present invention is done further detailed explanation.
Fig. 1, Fig. 2 and Fig. 3 are respectively process block diagram of the present invention and implementing procedure figure, and as shown in Figure 1, it includes:
Scrambled step S1: after triggered by a trigger signals SA1; Begin to carry out the superencipher coding; And correspondingly behind for the first time the scrambled SA2 and the second scrambled SA3 respectively form first and encrypt signal and second and encrypt signal (figure does not show), this trigger signals SA1 system sees through the human body sensing and detects in preferred embodiment of the present invention.
The first deciphering decoding step S2: receive this first encryption signal and be the SB1 of deciphering decoding for the first time; To form the first decoding signal (figure does not show); And first encrypt signal for not simultaneously when this first decoding signal and this, then receive this first encryption signal again and carry out this first time of unscrambling decoding SB1, otherwise; If, then carry out following step when this first decoding signal and this first encryption signal when being identical:
The second deciphering decoding step S3: receive this second encryption signal and be the SB2 of deciphering decoding for the second time; To form the second decoding signal (figure does not show); And when this second decoding signal with this second the encryption signal for not simultaneously, then carry out the above-mentioned first unscrambling decoding step SB1 again, otherwise; If when this second decoding signal and this second encryption signal when being identical; Then finish decryption acts, first encrypt signal and this second to encrypt the frequency of signal inequality, and behind this second deciphering decoding step S3, can produce one and drive signal (figure does not show) and in preferred embodiment of the present invention, receive this.
Like Fig. 2, shown in Figure 3, when embodiment of the present invention, see through the human body sensing earlier and detect SA1, and if do not have when sensing; Then carry out the human body sensing again and detect SA1, otherwise, if when sensing; Then move through twice scrambled, and form this first encryption signal and the second encryption signal respectively, this first encryption signal, second is encrypted signal and is transmitted respectively; And after this second encryption signal is sent out, can carry out the human body sensing again and detect SA1, in addition; This first is encrypted signal and can be received earlier, and through the SB1 of deciphering decoding for the first time forming this first decoding signal, and when this first decoding signal and this first encryption signal for not simultaneously; Then for wrong and receive this again and first encrypt signal and carry out unscrambling decoding SB1 first time, otherwise, if when this first when to decipher signal be identical with this first encryption signal; Then for correct and receive this and second encrypt signal and carry out unscrambling decoding SB2 second time, forming this second decoding signal, and when this second decoding signal and this second encryption signal for not simultaneously; Then for wrong and receive this again and first encrypt signal and carry out unscrambling decoding SB1 first time, otherwise, if when this second when to decipher signal be identical with this second encryption signal; Be correctly and also can trigger the load start, simultaneously, more trigger speech play.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102769547A CN102404068A (en) | 2010-09-09 | 2010-09-09 | Secondary encryption/decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102769547A CN102404068A (en) | 2010-09-09 | 2010-09-09 | Secondary encryption/decryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102404068A true CN102404068A (en) | 2012-04-04 |
Family
ID=45885902
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102769547A Pending CN102404068A (en) | 2010-09-09 | 2010-09-09 | Secondary encryption/decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102404068A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270687A (en) * | 2014-10-24 | 2015-01-07 | 厦门蓝斯通信股份有限公司 | Method and device for encrypting digital interphone |
CN109598105A (en) * | 2018-12-03 | 2019-04-09 | 深圳忆联信息系统有限公司 | A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050015589A1 (en) * | 2003-07-17 | 2005-01-20 | Shmuel Silverman | Method for providing point-to-point encryption in a communication system |
CN1697374A (en) * | 2004-05-13 | 2005-11-16 | 华为技术有限公司 | Method for sanding and receiving cipher data, device for distributing and receiving cipher data |
CN101067358A (en) * | 2007-03-20 | 2007-11-07 | 姜君凯 | Trick lock mechanism |
-
2010
- 2010-09-09 CN CN2010102769547A patent/CN102404068A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050015589A1 (en) * | 2003-07-17 | 2005-01-20 | Shmuel Silverman | Method for providing point-to-point encryption in a communication system |
CN1697374A (en) * | 2004-05-13 | 2005-11-16 | 华为技术有限公司 | Method for sanding and receiving cipher data, device for distributing and receiving cipher data |
CN101067358A (en) * | 2007-03-20 | 2007-11-07 | 姜君凯 | Trick lock mechanism |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104270687A (en) * | 2014-10-24 | 2015-01-07 | 厦门蓝斯通信股份有限公司 | Method and device for encrypting digital interphone |
CN109598105A (en) * | 2018-12-03 | 2019-04-09 | 深圳忆联信息系统有限公司 | A kind of microcontroller is safely loaded with the method, apparatus, computer equipment and storage medium of firmware |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104112307B (en) | Sound wave is utilized to carry out electronic lock and the method for unlocking thereof unblanked | |
KR102652153B1 (en) | Security system for a moveable barrier operator | |
CN105184929A (en) | Intelligent door lock control method and device | |
CN102568062B (en) | Encryption and decryption method for remote controller | |
CN101806173A (en) | Electronic lock system, electronic lock and unlocking method thereof | |
WO2010040629A3 (en) | Data processing system for providing authorization keys | |
CN111119655B (en) | Lock control system, safe and lock control method based on communication module | |
CN103024158A (en) | Mobile phone with fingerprint identification function | |
CN110086864B (en) | Method for offline management and control by using double keys of lock | |
CN103714299A (en) | Method and system for encryption and decryption of file of mobile terminal | |
WO2007111713A3 (en) | Method for device authentication | |
CN103593892A (en) | Challenge response and symmetrical encryption based electronic lock unlocking method | |
Wetzels | Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys | |
CN106761052A (en) | A kind of automobile door control remote-control key radio frequency Replay Attack system of defense based on timestamp | |
CN103810780A (en) | Coded lock based on brain-computer switching technique and encryption and decryption method of coded lock | |
CN103929308A (en) | Information verification method applied to RFID card | |
CN103761009A (en) | Touch device and data transmission method based on touch control | |
CN102404068A (en) | Secondary encryption/decryption method | |
KR20130068562A (en) | Remote control system and method for vehicle using mobile phone | |
CN105184930A (en) | Control method and device of intelligent primary and secondary locks | |
CN104929443B (en) | Smart lock and its method for unlocking and device | |
CN105303655A (en) | Bluetooth lock | |
WO2020259397A1 (en) | Smart lock, security platform and authentication method therefor | |
KR101874179B1 (en) | Door-lock device, user terminal and controlling method of door-lock device | |
CN109272729B (en) | Identification method and device for anti-theft code remote controller |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120404 |