CN105262586B - The method for distributing key and device of automobile burglar equipment - Google Patents
The method for distributing key and device of automobile burglar equipment Download PDFInfo
- Publication number
- CN105262586B CN105262586B CN201510718955.5A CN201510718955A CN105262586B CN 105262586 B CN105262586 B CN 105262586B CN 201510718955 A CN201510718955 A CN 201510718955A CN 105262586 B CN105262586 B CN 105262586B
- Authority
- CN
- China
- Prior art keywords
- key
- encryption
- interface
- algorithm
- data packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to technical field of automobile theft prevention, and in particular to a kind of method for distributing key and its corresponding device of automobile burglar equipment.The distribution method includes:Generate the encryption key and its corresponding decruption key with uniqueness characteristic;By sending first key to first interface and encrypting the first ciphertext data packet to be formed to the first key using the encryption key, by the remote controler of the first key and the first ciphertext data packet write-in automobile burglar equipment;By sending the second key to second interface and carrying out the second ciphertext data packet of encryption formation using decruption key described in second key pair, by second key and the host of the second ciphertext data packet write-in automobile burglar equipment.First key is encrypted in the first ciphertext data packet when sending host to from remote controler end, and the decruption key for decrypting the first ciphertext data packet is also encrypted in the second ciphertext data packet and is assigned to host side, prevent first key is obtained from illegally being intercepted and captured.
Description
【Technical field】
The present invention relates to technical field of automobile theft prevention, and in particular to a kind of method for distributing key of automobile burglar equipment and its
Corresponding device.
【Background technique】
With the rapid development of society, automobile becomes the main vehicles of people's daily trip, with the number of private car
Amount increases, and automobile is stolen also to have evolved into the social concern got worse.
Automobile burglar mainly uses electronic type anti-theft technique at present, generallys use transmission terminal such as remote controler and has to send
The ciphertext of control instruction controls the modes such as car door, engine start and oil supply system to the receiving host being set on automobile
Realize security.General application scenarios are to store fixed key in remote controler in advance, and remote controler sends the fixed key
It is stored to host side, host receives the fixed key to realize the pairing with remote controler end;It is solid that this can be used in remote controler end later
Determine key control extension instruction generation ciphertext data packet and be sent to host side, the host being set on automobile receives and uses fixation
Key decryption ciphertext data packet simultaneously reads control instruction, executes the operations such as corresponding unlock or locking according to control instruction.
Encryption key distribution in the prior art is that the fixed key of unencryption is directly stored in remote controler end, through remote controler end
Host is sent to realize pairing, can be captured in the air by the signal issued to remote controler and scan tracing and intercepts and captures the unencryption
Fixed key, safety is low;And same fixed key is used in the remote controler and host of same producer's production in the prior art,
Automobile burglar equipment is easily led to be cracked in batches.
Therefore, how the method for distributing key in a kind of automobile burglar equipment and its corresponding terminal are provided, key is increased
Confidentiality, improve the safety of vehicle, be those skilled in the art's technical issues that need to address.
【Summary of the invention】
One object of the present invention aims to solve the problem that at least one above-mentioned problem, provides a kind of key of automobile burglar equipment
Distribution method and its corresponding device.
To realize that the purpose, the present invention adopt the following technical scheme that:
The present invention provides a kind of method for distributing key of automobile burglar equipment, include the following steps:
Generate the encryption key and its corresponding decruption key with uniqueness characteristic;
By sending first key to first interface and encrypting to be formed the to the first key using the encryption key
One ciphertext data packet, by the remote controler of the first key and the first ciphertext data packet write-in automobile burglar equipment;
By sending the second key to second interface and carrying out encryption formation using decruption key described in second key pair
The second ciphertext data packet, by second key and the second ciphertext data packet write-in automobile burglar equipment host.
Disclosed according to an embodiment of the present invention, the encryption key and its decruption key are advised by symmetric encipherment algorithm
The key with identical content of model.
Disclosed according to still another embodiment of the invention, the encryption key and its decruption key are respectively asymmetric add
The mathematically relevant public key and private key that close algorithm is standardized.
It is executed specifically, the transmission operation of the first interface and second interface is synchronous.
Optionally, the first key and/or second key are generated at random and/or are pre-stored in storage medium.
Optionally, the first interface and second interface are wireline interface or wireless interface.
Specifically, the first key and/or the second key turn tableaux algorithm or aes algorithm generation by non-linear dissipate.
Further, the step of sending to first interface is executed in response to the request of the remote controler;Or in response to this
The instruction of machine and execute to first interface send the step of.
Further, the step of sending to second interface is executed in response to the request of the host;Or in response to the machine
Instruction and execute to second interface send the step of.
Further, this method is repeated, keeps the encryption key generated every time and its decruption key different from the past
To act on different automobile burglar equipment.
The present invention also provides a kind of encryption key distribution devices of automobile burglar equipment, include:
Key production module, for generating encryption key and its corresponding decruption key with uniqueness characteristic;
First sending module, for by first interface send first key and using the encryption key to this first
Key encrypts the first ciphertext data packet to be formed, and automobile burglar equipment is written in the first key and the first ciphertext data packet
Remote controler;
Second sending module, for by sending the second key to second interface and being decrypted using described in second key pair
Key carries out the second ciphertext data packet of encryption formation, and second key and the second ciphertext data packet write-in automobile burglar are set
Standby host.
It is disclosed according to an embodiment of the present invention, encryption key that the key production module is configurable to generate and its
The key with identical content that decruption key is standardized by symmetric encipherment algorithm.
According to the present invention again with encryption key that disclosed in a embodiment, the key production module is configurable to generate and
Its decruption key is respectively the mathematically relevant public key and private key that rivest, shamir, adelman is standardized.
It is executed specifically, the transmission operation of first sending module and the second sending module is synchronous.
Optionally, the first key and/or second key are generated at random and/or are pre-stored in storage medium.
Optionally, the first interface and second interface are wireline interface or wireless interface.
Specifically, the key production module is configured as being turned tableaux algorithm or aes algorithm using non-linear dissipate and being generated the
One key and/or the second key.
Specifically, first sending module in response to the remote controler request and execute to first interface send step
Suddenly;Or in response to the machine instruction and execute to first interface send the step of.
Specifically, second sending module in response to the host request and execute to second interface send step
Suddenly;Or in response to the machine instruction and execute to second interface send the step of.
Specifically, repeating each module of the calling present apparatus, keep the encryption key generated every time and its decruption key different
In in the past to act on different automobile burglar equipment.
Compared with prior art, the present invention has following advantage:
1, first key sent to remote controler end by first interface in the present invention, had using the encryption keys of generation
First ciphertext data packet of first key;And the second key is sent, using second key to host side by second interface
Encryption has the second ciphertext data packet of decruption key, wherein encryption key and decruption key are that mathematically relevant correspondence adds solution
Key.So that remote controler end, which sends the first ciphertext data packet request to host, matches clock synchronization, the solution that host side is obtained using decryption
Key decrypts the first ciphertext data packet and obtains first key completion pairing.First key is sending master to from remote controler end
Be encrypted in during machine in the first ciphertext data packet, even if by it is illegal intercept and capture because without be unable to get decruption key this
One key, and the decruption key for decrypting the first ciphertext data packet is also encrypted in the second ciphertext data packet and is assigned to
Host side cannot be obtained by illegally intercepting and capturing.Improve the safety of entire automobile burglar equipment.
2, due to encryption key distribution device generates every time in the present invention first key, the second key, encryption key and decryption
Key is that uniquely, even if above-mentioned 4 keys are revealed, can only also crack the automobile burglar that one is assigned above-mentioned key and set
It is standby, it is avoided that car alarm is cracked in batches, further improves the safety of automobile burglar equipment.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
【Detailed description of the invention】
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, wherein:
Fig. 1 is the flow diagram of automobile burglar device keys distribution method in one embodiment of the invention;
Fig. 2 is the structural schematic diagram of automobile burglar device keys distributor in one embodiment of the invention.
【Specific embodiment】
The present invention is further described with exemplary embodiment with reference to the accompanying drawing, wherein identical label in attached drawing
All refer to identical component.In addition, if the detailed description of known technology is for showing the invention is characterized in that unnecessary
, then it omits it.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
It is necessary to first carry out following guiding explanation to application scenarios of the invention and its principle.
Method of the invention and corresponding device are used to distribute key for automobile burglar equipment, and the present invention is to have processor
Third party's encryption key distribution device independently of automobile burglar equipment with coffret is hardware foundation to describe.By to remote control
Encryption key is distributed in device, which can be generated using Symmetric key generation algorithm or unsymmetrical key generating algorithm, phase
The encryption key answered is used to encrypt to obtain the first ciphertext using symmetric encipherment algorithm or rivest, shamir, adelman to first key
Data packet;It is corresponding to be assigned decruption key corresponding with encryption key to host side, for decrypting the of the transmission of remote controler end
One ciphertext data packet obtains first key, but the decruption key is encrypted in the second ciphertext data packet and distributes to host.At this
Symmetric encipherment algorithm and rivest, shamir, adelman have flexibly been used in invention, illustrate both Encryption Algorithm briefly below.
Symmetric cryptography is also private key encryption, refers to that encryption and decryption use the Encryption Algorithm of same key.Sometimes it is called tradition
Cryptographic algorithm is exactly that encryption key can be calculated from decruption key, while decruption key can also be from encryption key
It calculates.And in most of symmetry algorithm, encryption key and decruption key are identical, so also referred to as this encryption is calculated
Method is secret-key algorithm or single key algorithm.It requires sender and recipient before secure communication, decides through consultation a key.
The safety of symmetry algorithm depends on key, and leakage key means that anyone can be to the message that they send or receive
Decryption, so the confidentiality of key is most important to communicating.The advantages of symmetric encipherment algorithm, is the high speed of encryption and decryption and makes
Difficult cracking when with long key.Symmetric encipherment algorithm commonly used in the prior art mainly have DES, TripleDES, RC2, RC4,
RC5 and Blowfish etc..Those skilled in the art should be enough to understand the spirit of this widely applied technology and its various algorithms
It is living to use.The key point of symmetric cryptography is secure storage or transmission symmetric key, and flexibly anti-using automobile in the present invention
Equipment distributor is stolen to solve the problems, such as this.
Asymmetric encryption is also public key encryption, in encryption and decryption using different keys, what when encryption used
The key used when key and decryption forms a key pair, can only be close with another with the ciphertext that one of key encrypts
Key decryption, and cannot be decrypted by other keys (key including encryption).A usual key is appointed as " public key ", another
It is then appointed as " private key ", can only be taken care of by key holder.Public key encryption technology solves the publication and management of key
Problem, the both sides for carrying out data communication can safely confirm other side's identity and public-key cryptography, provide the identifiability of communication.It is non-
Symmetric key encryption algorithm mainly has RSA, DSA, DiffieHellman, PKCS and PGP etc..
It will be detailed below several skills of the invention proposed to realize above-mentioned scene with above-mentioned principle
The specific embodiment of art scheme.
It should be noted that a kind of method for distributing key of automobile burglar equipment provided by the invention, can pass through programming
The method for distributing key is embodied as computer program to set in PC machine or the other similar programmable, intelligent with microprocessor
Standby middle operation.
Referring to Fig. 1, an a kind of exemplary embodiments of the method for distributing key of automobile burglar equipment of the invention, specifically
Include the following steps:
S11 generates the encryption key and its corresponding decruption key with uniqueness characteristic.
Encryption key in the present invention and decryption code key can be that symmetric encipherment algorithm standardized with identical content
Key;It is also possible to the mathematically relevant public key and private key that rivest, shamir, adelman is standardized.According to the above-mentioned key of generation
Algorithm is different, and two embodiments used below illustrate the generating process of encryption key and decruption key.Program for ease of understanding,
The step is illustrated for generating this in PC machine to key using Java programming language, but can not be constituted to the present invention
Limitation;On the realization theory of the present embodiment with the programming language of use and based on hardware it is not related, technology in the art
Personnel can also realize the step using other implementation methods.
1, in one embodiment of the invention, the encryption key and its decruption key are standardized by symmetric encipherment algorithm
The key with identical content.
It can be appreciated that the method for creation symmetric key is provided in Java in key generator KeyGenerator class, and
A static method getInstance () is predefined in KeyGenerator class, is obtained by the static method
The object of KeyGenerator class.For example, defined function KeyGenerator kg=can be passed through
KeyGenerator.getInstance (" DESede ") obtains key generator.The wherein ginseng of method getInstance ()
Number be character string type, may specify the title of Encryption Algorithm, for example, can be common symmetric encipherment algorithm " Blowfish ",
" DES ", " DESede ", " HmacMD5 " etc.." DESede " algorithm, more common " DES " peace of the algorithm are used in above-mentioned function
Full property is higher.Then the length that function kg.init (168) limit the key generated can be used.Certainly, which can also save
Slightly, key length generated can be defaulted according to algorithm when obtaining key generator.For example, the corresponding key of " DES " algorithm
Length is 56;The corresponding key length of " DESede " algorithm is 112 or 168.
Above-mentioned steps, which obtain a pair in the object of the KeyGenerator class of acquisition, can be used for DESede symmetric cryptography
The encryption key and decruption key of algorithm.Further, customized key is written into the key of the generation in a manner of byte
In file, then in the storage device by this document storage.
It is understood that the file where the encryption key and decruption key should be stored in the encryption key distribution
In the storage device of device.The storage device can be used to store the program or data of the encryption key distribution device simultaneously, can also
To be the specific storage device of file where being specifically used to store the encryption key and decruption key, such as special key
Storage chip, to improve the safety of the file storage where encryption key and decruption key.It is understood that in the present invention
Storage device can use high-speed random access memory, can also include nonvolatile memory, a for example, at least magnetic
Disk storage device, flush memory device or other volatile solid-state parts.
In a preferred embodiment, encryption key and the file storage where decruption key in order to further increase
Safety reduces the risk that memory is obtained encryption key and decruption key by illegal user using chip reverse engineering, this reality
It applies storage device described in example and is all made of ferroelectric RAM FRAM (Ferroelectric Random Access
Memory)。
It is well known that Differential Power Analysis technology is often used to extract key information, the technology in chip reverse engineering
The main different power consumption by measurement memory when reading and writing logic state data " 0 " and " 1 ", is divided by statistical method
Information related with key is extracted in analysis.And FRAM is nonvolatile memory in the present invention, is ferroelectric memory, but because should
Iron-based material is free of in memory chip, influences it by magnetic field.The FRAM and common electrically erasable are only
It reads memory EEPROM memory technology to compare, FRAM has stronger anti-corrupted data ability in the environment such as electric field, radiation.Its
Ultrafast access time and low-power consumption (it reads power consumption and write-in power consumption is practically identical) are more difficult to attacker using difference function
Rate analytical technology carries out attack to it and obtains key.
2, in yet another embodiment of the present invention, the encryption key and its decruption key are respectively that asymmetric encryption is calculated
The mathematically relevant public key and private key that method is standardized.
It can be appreciated that generating public key and private key pair using KeyPairGenerator class in Java in the embodiment.And
A static method getInstance () is predefined in KeyPairGenerator class, is obtained by the static method
The object of KeyPaairGenerator class.For example, defined function KeyPairGenerator kg=can be passed through
KeyPairGenerator.getInstance (" RSA ") obtains the key generator based on RSA Algorithm.Wherein method
The parameter of getInstance () is character string type, may specify the title of Encryption Algorithm, such as can also be common non-right
Claim Encryption Algorithm " RSA ", " DSA ", " DiffieHellman ", " PKCS " and " PGP " etc..
Above-mentioned steps obtain a pair in the object of the KeyPairGenerator type of acquisition, and to can be used for RSA asymmetric
The encryption key and decruption key of Encryption Algorithm.Further, by calling function KeyPair.getPublic () close from this
Key centering obtains public key, by calling function KeyPair.getPrivate () to obtain private key from the cipher key pair;Then should
The public key and private key of generation are respectively written into customized public key file and private key file in a manner of byte, then by public key file
In the storage device with private key file storage.
It is understood that the public key file and private key file should be stored in the storage of the encryption key distribution device
In device.The storage device can be used to store the program or data of the encryption key distribution device simultaneously, be also possible to specially use
The specific storage device of the public key file and private key file, such as special key storage chip are stored, to improve public key
The safety of file and private key file storage.It is understood that the storage device in the present invention can be deposited at random using high speed
Access to memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other easily
The property lost solid-state memory.
In a preferred embodiment, encryption key and the file storage where decruption key in order to further increase
Safety reduces the risk that memory is obtained encryption key and decruption key by illegal user using chip reverse engineering, this reality
It applies storage device described in example and is all made of ferroelectric RAM FRAM (Ferroelectric Random Access
Memory)。
Further, in the method for the invention, further comprising the steps of:
S12 to be formed by sending first key to first interface and being encrypted using the encryption key to the first key
The first ciphertext data packet, by the first key and the first ciphertext data packet write-in automobile burglar equipment remote controler;
And step S13, by sending the second key to second interface and using decruption key described in second key pair
Automobile burglar equipment is written in second key and the second ciphertext data packet by the second ciphertext data packet for carrying out encryption formation
Host.
Due to needing through interface to remote controler and host assignment key and data packet, so that remote controler and host can pass through
The mode of study is matched.In one embodiment, described to first interface and second interface in order to improve the efficiency of encryption key distribution
Sending data is synchronous carry out.Step S12 and S13 are hereafter combined together to the realization for describing the embodiment.
In abovementioned steps, the encryption key of the uniqueness generated immediately is stored in the storage device of encryption key distribution device
And decruption key.The remote controler for needing to be assigned key sends a request or encryption key distribution dress to the encryption key distribution device
It sets and is instructed in response to a transmission, executed to first interface and send operation;Similarly, need the host of assigned key to the key
Distributor sends a request or encryption key distribution device is instructed in response to a transmission, executes to second interface and sends behaviour
Make.It can be appreciated that sending data to remote controler and host by above-mentioned interface can be wire transmission, it is also possible to wirelessly pass
Defeated, which is not limited by the present invention.
In encryption key distribution device, before sending data to first interface and second interface, pre-generated first key is needed
With the second key, the first key and the second key can be request or encryption key distribution in response to remote controler end and host side
It is random to generate after the transmission instruction of device;It is also possible to pre-generate and be stored in encryption key distribution device that Jie is locally stored
In matter, after the transmission instruction of request or encryption key distribution device in response to remote controler end and host side, read from storage medium
It retransmits.
In order to guarantee the randomness and uniqueness of first key and the second key, i.e., in each remote controler and host first
Key and the second key are different.It can be appreciated that can not have to the presence of association between the first key and the second key.Generate the
The algorithm of one key and the second key can be the same or different, the algorithm can be operation it is customized be stored in it is close
Special algorithm program in key distributor is realized, any existing algorithm is also possible to.For example, in an example of the present invention
Property embodiment in, can turn tableaux algorithm or aes algorithm using non-linear dissipate and generate first key and the second key, can also
To generate first key and the second key using rolling code algorithm KEELOQ.KEELOQ technology be it is a kind of complicated non-linear plus
Close algorithm, through its encrypted code be rolling code, its coding mode be not it is fixed, make data transmission have high secrecy
Property, the rolling code exported every time is all unique, irregular and unduplicated.
In order to guarantee that first key is transferred to host side from remote controler safety, first key key to be encrypted is encrypted to
First data packet, the ciphering process are completed in encryption key distribution device.Used Encryption Algorithm can be symmetric encipherment algorithm
Or rivest, shamir, adelman, the symmetric encipherment algorithm and rivest, shamir, adelman can be using customized or improved encryptions
Algorithm.For example, by using existing symmetric encipherment algorithm, common symmetric encipherment algorithm mainly have DES, TripleDES, RC2,
RC4, RC5 and Blowfish etc.;Or use rivest, shamir, adelman RSA, DSA commonly used in the prior art,
No matter DiffieHellman, PKCS and PGP will be guaranteed the corresponding decryption of the encryption key is close using which kind of cipher mode
Key is assigned to host side to implement to decrypt.Likewise, the decruption key for being assigned to host side in the present invention is needed in encryption key distribution
The second ciphertext data packet is encrypted to based on certain Encryption Algorithm in device, it is customized that used Encryption Algorithm can be operation
The special algorithm program being stored in encryption key distribution device realized, be also possible to any existing algorithm.
1, in one embodiment of the invention, the first key is encrypted key using symmetric encipherment algorithm encryption.
The present embodiment illustrates the realization process of the embodiment by taking symmetric encipherment algorithm DESede as an example, and the present invention can also use certainly
Other symmetric encipherment algorithms, the embodiment can not be construed as limiting the invention.It is read from key file storage device first
It is used for the encryption key and decruption key of DESede Encryption Algorithm out.DESede pairs of symmetric encipherment algorithm is based on using encryption key
The first key of generation carries out encryption and generates the first ciphertext data packet, then first key and the first ciphertext data packet is passed through wired
Or wireless communication mode is transferred to the remote controler end of burglary-resisting installation by first interface.Added using the second key based on certain
Close algorithm carries out encryption to decruption key and generates the second ciphertext data packet, then by the second key and the second ciphertext data packet by having
Line or wireless communication mode are transferred to the host side of burglary-resisting installation by second interface.In the present embodiment, the encryption
Algorithm, which can be, generates the second ciphertext data packet according to a set algorithm, and the set algorithm can be any
The algorithm being suitble in the algorithm that existing algorithm or the present invention develop later.But need to guarantee the host side of the recipient simultaneously
Configured with decipherment algorithm corresponding to the Encryption Algorithm.
2, in yet another embodiment of the present invention, the encrypted key of the first key is added using rivest, shamir, adelman
It is close.The present embodiment illustrates the realization process of the embodiment by taking rivest, shamir, adelman RSA as an example, and the present invention can also adopt certainly
With other rivest, shamir, adelmans, which can not be construed as limiting the invention.First from public key file storage device
It is middle to read the encrypted public key for being used for RSA cryptographic algorithms, corresponding decrypted private key is read from private key file storage device.Using adding
Migong key carries out encryption based on first key of the rivest, shamir, adelman RSA to generation and generates the first ciphertext data packet, then by the
One key and the first ciphertext data packet are transferred to the distant of burglary-resisting installation by first interface by wired or wireless communication mode
Control device end.Encryption is carried out to decrypted private key based on certain Encryption Algorithm using the second key and generates the second ciphertext data packet, then
Second key and the second ciphertext data packet are transferred to burglary-resisting installation by second interface by wired or wireless communication mode
Host side.In the present embodiment, the Encryption Algorithm can be close according to described in a set algorithm generation second
Literary data packet, the set algorithm can be the calculation being suitble in the algorithm developed after any existing algorithm or the present invention
Method.But it needs to guarantee the host side of the recipient while being configured with decipherment algorithm corresponding to the Encryption Algorithm.
After encryption key distribution device of the invention completes the wherein encryption key distribution of a set of automobile burglar equipment, it can repeat
Executing above each step is that more automobile burglar equipment distribute key, can be applied in batch production.What the present invention used
Different encryption keys, decruption key, first key and the second key can be generated in each key schedule, so that different vapour
Each key being assigned in vehicle burglary-resisting installation is different, prevents automobile burglar equipment from being cracked in batches.
Further, according to the function modoularization thinking of computer software, the present invention also provides a kind of automobile burglar equipment
Encryption key distribution device.Referring to Fig. 2, it includes key production module 11, the first sending module 12 and the second sending module 13.
The key production module 11, it is close for generating the encryption key with uniqueness characteristic and its corresponding decryption
Key.
Encryption key in the present invention and decryption code key can be that symmetric encipherment algorithm standardized with identical content
Key;It is also possible to the mathematically relevant public key and private key that rivest, shamir, adelman is standardized.According to the above-mentioned key of generation
Algorithm is different, and two embodiments used below illustrate that key production module 11 generates the process of encryption key and decruption key.
The realization of the module for ease of understanding is illustrated, still for generating this in PC machine to key using Java programming language
It can not be construed as limiting the invention;On the realization theory of the present embodiment with the programming language of use and based on hardware do not have
Relationship, those skilled in that art can also realize the module using other embodiments.
1, encryption key that in one embodiment of the invention, the key production module 11 is configurable to generate and its
The key with identical content that decruption key is standardized by symmetric encipherment algorithm.
It can be appreciated that the method for creation symmetric key is provided in Java in key generator KeyGenerator class, and
A static method getInstance () is predefined in KeyGenerator class, is obtained by the static method
The object of KeyGenerator class.For example, defined function KeyGenerator kg=can be passed through
KeyGenerator.getInstance (" DESede ") obtains key generator.The wherein ginseng of method getInstance ()
Number be character string type, may specify the title of Encryption Algorithm, for example, can be common symmetric encipherment algorithm " Blowfish ",
" DES ", " DESede ", " HmacMD5 " etc.." DESede " algorithm, more common " DES " peace of the algorithm are used in above-mentioned function
Full property is higher.Then the length that function kg.init (168) limit the key generated can be used.Certainly, which can also save
Slightly, key length generated can be defaulted according to algorithm when obtaining key generator.For example, the corresponding key of " DES " algorithm
Length is 56;The corresponding key length of " DESede " algorithm is 112 or 168.
Above-mentioned key production module 11, which obtains a pair in the object of the KeyGenerator class of acquisition, can be used for
The encryption key and decruption key of DESede symmetric encipherment algorithm.Further, the key of the generation is write in a manner of byte
Enter in customized key file, then in the storage device by this document storage.
It is understood that the file where the encryption key and decruption key should be stored in the encryption key distribution
In the storage device of device.The storage device can be used to store the program or data of the encryption key distribution device simultaneously, can also
To be the specific storage device of file where being specifically used to store the encryption key and decruption key, such as special key
Storage chip, to improve the safety of the file storage where encryption key and decruption key.It is understood that in the present invention
Storage device can use high-speed random access memory, can also include nonvolatile memory, a for example, at least magnetic
Disk storage device, flush memory device or other volatile solid-state parts.
In a preferred embodiment, encryption key and the file storage where decruption key in order to further increase
Safety reduces the risk that memory is obtained encryption key and decruption key by illegal user using chip reverse engineering, this reality
It applies storage device described in example and is all made of ferroelectric RAM FRAM (Ferroelectric Random Access
Memory)。
It is well known that Differential Power Analysis technology is often used to extract key information, the technology in chip reverse engineering
The main different power consumption by measurement memory when reading and writing logic state data " 0 " and " 1 ", is divided by statistical method
Information related with key is extracted in analysis.And FRAM is nonvolatile memory in the present invention, is ferroelectric memory, but because should
Iron-based material is free of in memory chip, influences it by magnetic field.The FRAM and common electrically erasable are only
It reads memory EEPROM memory technology to compare, FRAM has stronger anti-corrupted data ability in the environment such as electric field, radiation.Its
Ultrafast access time and low-power consumption (it reads power consumption and write-in power consumption is practically identical) are more difficult to attacker using difference function
Rate analytical technology carries out attack to it and obtains key.
2, encryption key that in yet another embodiment of the present invention, the key production module 11 is configurable to generate and
Its decruption key is respectively the mathematically relevant public key and key that rivest, shamir, adelman is standardized.
It can be appreciated that generating public key and private key pair using KeyPairGenerator class in Java in the embodiment.And
A static method getInstance () is predefined in KeyPairGenerator class, is obtained by the static method
The object of KeyPaairGenerator class.For example, defined function KeyPairGenerator kg=can be passed through
KeyPairGenerator.getInstance (" RSA ") obtains the key generator based on RSA Algorithm.Wherein method
The parameter of getInstance () is character string type, may specify the title of Encryption Algorithm, such as be can be common asymmetric
Encryption Algorithm " RSA ", " DSA ", " DiffieHellman ", " PKCS " and " PGP " etc..
Key production module 11, which obtains a pair in the object of the KeyPairGenerator type of acquisition, can be used for RSA
The encryption key and decruption key of rivest, shamir, adelman.Further, by calling function KeyPair.getPublic ()
Public key is obtained from the cipher key pair, by calling function KeyPair.getPrivate () to obtain private key from the cipher key pair;So
The public key of the generation and private key are respectively written into customized public key file and private key file in a manner of byte afterwards, then will be public
Key file and private key file storage are in the storage device.
It is understood that the public key file and private key file should be stored in the storage of the encryption key distribution device
In device.The storage device can be used to store the program or data of the encryption key distribution device simultaneously, be also possible to specially use
The specific storage device of the public key file and private key file, such as special key storage chip are stored, to improve public key
The safety of file and private key file storage.It is understood that the storage device in the present invention can be deposited at random using high speed
Access to memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other easily
The property lost solid-state memory.
In a preferred embodiment, encryption key and the file storage where decruption key in order to further increase
Safety reduces the risk that memory is obtained encryption key and decruption key by illegal user using chip reverse engineering, this reality
It applies storage device described in example and is all made of ferroelectric RAM FRAM (Ferroelectric Random Access
Memory)。
Further, the key production module 11 is additionally configured to generate first key and the second key.In key point
With in device, before sending data to first interface and second interface, need close using key production module 11 pre-generated first
Key and the second key, the first key and the second key can be request or key point in response to remote controler end and host side
It is random to generate after transmission instruction with device;It is also possible to be pre-generated in encryption key distribution device by key production module 11
And it is stored in local storage medium, the transmission instruction of request or encryption key distribution device in response to remote controler end and host side
Afterwards, it reads and retransmits from storage medium.
In order to guarantee the randomness and uniqueness of first key and the second key, i.e., in each remote controler and host first
Key and the second key are different, it can be appreciated that can not have to the presence of association between the first key and the second key.Using close
Key generation module 11 generates first key and the algorithm of the second key can be the same or different, and the algorithm can be fortune
The customized special algorithm program being stored in encryption key distribution device of row is realized, any existing algorithm is also possible to.Example
Such as, in an illustrative embodiment of the invention, key production module 11 can turn tableaux algorithm or AES calculation using linear dissipate
Method generates first key and the second key, and first key and second close can also be generated using rolling code algorithm KEELOQ
Key.KEELOQ technology is a kind of non-linear Encryption Algorithm of complexity, is rolling code through its encrypted code, its coding mode is not
Be it is fixed, make data transmission that there is high confidentiality, the rolling code exported every time is all unique, irregular and does not repeat
's.
Further, first sending module 12, for by being sent described in first key and use to first interface
Encryption key encrypts the first ciphertext data packet to be formed to the first key, and the first key and the first ciphertext data packet are write
Enter the remote controler of automobile burglar equipment.
Second sending module 13, for by sending the second key to second interface and using the second key pair institute
The second ciphertext data packet that decruption key carries out encryption formation is stated, automobile is written into second key and the second ciphertext data packet
The host of burglary-resisting installation.
In order to guarantee that first key is transferred to host side from remote controler safety, first key key to be encrypted is encrypted to
First data packet, the ciphering process are implemented to complete by the first sending module 12 in encryption key distribution device.First sending module
Encryption Algorithm used by 12 can be symmetric encipherment algorithm or rivest, shamir, adelman, the symmetric encipherment algorithm and it is asymmetric plus
Close algorithm can be using customized or improved Encryption Algorithm.It is common right for example, by using existing symmetric encipherment algorithm
Encryption Algorithm is claimed mainly to have DES, TripleDES, RC2, RC4, RC5 and Blowfish etc.;Or use is commonly used in the prior art
Rivest, shamir, adelman RSA, DSA, DiffieHellman, PKCS and PGP, no matter will be guaranteed using which kind of cipher mode
The corresponding decruption key of the encryption key is assigned to host side to implement to decrypt.Likewise, being assigned to host side in the present invention
Decruption key need the second sending module 12 to be encrypted to the second ciphertext data packet based on certain Encryption Algorithm, it is used plus
Close algorithm can be the customized special algorithm program being stored in encryption key distribution device of operation and be realized, be also possible to any
Existing algorithm.
In aforementioned key generation module 11, the encryption key and decryption key storage generated immediately is in encryption key distribution device
Storage device in.The remote controler for needing to be assigned key sends a request or encryption key distribution to the encryption key distribution device
Device is instructed in response to a transmission, is executed from first sending module 12 to first interface and is sent operation;Similarly, need by
The host for distributing key sends a request or encryption key distribution device to the encryption key distribution device and refers in response to a transmission
It enables, is executed from second sending module 13 to second interface and send operation.It can be appreciated that by above-mentioned interface to remote controler and
Host, which sends data, can be wire transmission, be also possible to be wirelessly transferred, which is not limited by the present invention.
Due to needing the first sending module 12 and the second sending module 13 by interface respectively to remote controler and host assignment
Key and data packet enable remote controler and host to match by way of study.In one embodiment, in order to improve key
The efficiency of distribution, first sending module 12 is synchronous with the transmission of the second sending module 13 operation to be executed.
The Encryption Algorithm that the first sending module 12 uses according to the present invention is different, and the present invention is by two embodiments come real
It is existing, as described below.
1, in one embodiment of the invention, the first key is encrypted key using symmetric encipherment algorithm encryption.
The present embodiment illustrates the realization process of the embodiment by taking symmetric encipherment algorithm DESede as an example, and the present invention can also use certainly
Other symmetric encipherment algorithms, the embodiment can not be construed as limiting the invention.First sending module 12 first is literary from key
The encryption key and decruption key for being used for DESede Encryption Algorithm are read in part storage device.First sending module 12, which uses, to be added
Key carries out encryption based on first key of the symmetric encipherment algorithm DESede to generation and generates the first ciphertext data packet, then passes through
First key and the first ciphertext data packet are passed through first interface by wired or wireless communication mode by the first sending module 12
It is transferred to the remote controler end of burglary-resisting installation.
Second sending module 13 carries out encryption to decruption key based on certain Encryption Algorithm using the second key and generates the
Two ciphertext data packets, then second key and the second ciphertext data packet are passed through into wired or wireless communication by the second sending module 13
Mode is transferred to the host side of burglary-resisting installation by second interface.In the present embodiment, the Encryption Algorithm can be according to
One set algorithm generates the second ciphertext data packet, and the set algorithm can be any existing algorithm or sheet
The algorithm being suitble in the algorithm developed after invention.But it needs to guarantee the host side of the recipient while being configured with encryption calculation
Decipherment algorithm corresponding to method.
2, in yet another embodiment of the present invention, the encrypted key of the first key is added using rivest, shamir, adelman
It is close.The present embodiment illustrates the realization process of the embodiment by taking rivest, shamir, adelman RSA as an example, and the present invention can also adopt certainly
With other rivest, shamir, adelmans, which can not be construed as limiting the invention.First sending module 12 first is from public affairs
The encrypted public key for being used for RSA cryptographic algorithms is read in key file storage device, is read from private key file storage device corresponding
Decrypted private key.First sending module 12 is using encrypted public key based on rivest, shamir, adelman RSA to the first key of generation
It carries out encryption and generates the first ciphertext data packet, then first key and the first ciphertext data packet are passed through into wired or wireless communication party
Formula is transferred to the remote controler end of burglary-resisting installation by first interface.
Second sending module 13 is additionally configured to carry out decrypted private key based on certain Encryption Algorithm using the second key
Encryption generates the second ciphertext data packet, then the second key and the second ciphertext data packet are led to by wired or wireless communication mode
Cross the host side that second interface is transferred to burglary-resisting installation.In the present embodiment, the Encryption Algorithm can be according to one both
Fixed algorithm generates the second ciphertext data packet, and the set algorithm can be any existing algorithm or the present invention
The algorithm being suitble in the algorithm developed afterwards.But need to guarantee the host side of the recipient at the same be configured with the Encryption Algorithm institute it is right
The decipherment algorithm answered.
After encryption key distribution device of the invention completes the wherein encryption key distribution of a set of automobile burglar equipment, it can repeat
Calling above-mentioned each module is that more automobile burglar equipment distribute key, can be applied in batch production.What the present invention used
Different encryption keys, decruption key, first key and the second key can be generated in key production module 11, so that different vapour
Each key being assigned in vehicle burglary-resisting installation is different, prevents automobile burglar equipment from being cracked in batches.
In an application scenarios of the invention, the pre-generated encryption of the encryption key distribution device of the automobile burglar equipment is close
Key, decruption key, first key and the second key simultaneously store, and certainly, above-mentioned each key is also possible to receive in encryption key distribution device
It is random again after instruction on to the request of automobile burglar equipment or encryption key distribution device to generate.In response to the encryption key distribution of remote controler
Instruction in request or encryption key distribution device, the encryption key distribution device is by sending first key to first interface and uses institute
It states encryption key and encrypts the first ciphertext data packet to be formed to the first key, by the first key and the first ciphertext data packet
The remote controler of automobile burglar equipment is written;In response to the instruction on the encryption key distribution request of host or encryption key distribution device, this is close
Key distributor by sending the second key to second interface and carries out encryption shape using decruption key described in second key pair
At the second ciphertext data packet, by second key and the second ciphertext data packet write-in automobile burglar equipment host.It repeats
Aforesaid operations are executed, keep the encryption key generated every time and its decruption key different from the past anti-to act on different automobiles
Steal equipment.
In conclusion sending first key, close using the encryption of generation to remote controler end by first interface in the present invention
Key encrypts the first ciphertext data packet for having first key;And the second key is sent, using this to host side by second interface
Second key, which encrypts, the second ciphertext data packet of decruption key, wherein encryption key and decruption key are mathematically relevant
Corresponding encryption and decryption key.So that remote controler end, which sends the first ciphertext data packet request to host, matches clock synchronization, host side is using decryption
The decryption key decryption obtained the first ciphertext data packet obtains the first key and completes pairing.First key is from remote controler end
It is encrypted in during sending host in the first ciphertext data packet, it can not by illegal intercept and capture because not having decruption key yet
The first key is obtained, and the decruption key for decrypting the first ciphertext data packet is also encrypted in the second ciphertext data packet
It is assigned to host side, cannot be obtained by illegally intercepting and capturing.Improve the safety of entire automobile burglar equipment.
Further, due to encryption key distribution device generates every time in the present invention first key, the second key, encryption key
It is that uniquely, even if above-mentioned 4 keys are revealed, can only also crack the automobile for being assigned above-mentioned key with decruption key
Burglary-resisting installation is avoided that car alarm is cracked in batches, further improves the safety of automobile burglar equipment.
In the instructions provided here, although the description of a large amount of detail.It is to be appreciated, however, that of the invention
Embodiment can practice without these specific details.In some embodiments, it is not been shown in detail well known
Methods, structures and technologies, so as not to obscure the understanding of this specification.
Although having been illustrated with some exemplary embodiments of the invention above, those skilled in the art will be managed
Solution, in the case where not departing from the principle of the present invention or spirit, can make a change these exemplary embodiments, of the invention
Range is defined by the claims and their equivalents.
Claims (18)
1. a kind of method for distributing key of automobile burglar equipment, which is characterized in that include the following steps:
Generate the encryption key and its corresponding decruption key with uniqueness characteristic;
It is close by sending first key to first interface and encrypting to be formed first to the first key using the encryption key
Literary data packet, by the remote controler of the first key and the first ciphertext data packet write-in automobile burglar equipment;
By sending the second key to second interface and carrying out the of encryption formation using decruption key described in second key pair
Two ciphertext data packets, by second key and the host of the second ciphertext data packet write-in automobile burglar equipment;
The transmission operation of the first interface and second interface is synchronous to be executed.
2. according to the method described in claim 1, it is characterized in that:The encryption key and its decruption key are symmetric cryptography calculation
The key with identical content that method is standardized.
3. according to the method described in claim 1, it is characterized in that:The encryption key and its decruption key are respectively asymmetric
The mathematically relevant public key and private key that Encryption Algorithm is standardized.
4. according to the method described in claim 1, it is characterized in that:The first key and/or second key are given birth at random
At and/or be pre-stored in storage medium.
5. according to the method described in claim 1, it is characterized in that:The first interface and second interface be wireline interface or
Wireless interface.
6. according to the method described in claim 1, it is characterized in that:The first key and/or the second key are dissipated by non-linear
Turn tableaux algorithm or aes algorithm generates.
7. according to the method described in claim 1, it is characterized in that:In response to the remote controler request and execute to first and connect
The step of mouth is sent;Or in response to the machine instruction and execute to first interface send the step of.
8. according to the method described in claim 1, it is characterized in that:In response to the host request and execute to second interface
The step of transmission;Or in response to the machine instruction and execute to second interface send the step of.
9. according to the method described in claim 1, it is characterized in that:This method is repeated, the encryption key generated every time is made
And its decruption key is different from the past to act on different automobile burglar equipment.
10. a kind of encryption key distribution device of automobile burglar equipment, which is characterized in that include:
Key production module, for generating encryption key and its corresponding decruption key with uniqueness characteristic;
First sending module, for by sending first key and using the encryption key to the first key to first interface
The the first ciphertext data packet formed is encrypted, by the remote control of the first key and the first ciphertext data packet write-in automobile burglar equipment
Device;
Second sending module, for by sending the second key to second interface and using decruption key described in second key pair
Automobile burglar equipment is written in second key and the second ciphertext data packet by the second ciphertext data packet for carrying out encryption formation
Host;
The transmission operation of first sending module and the second sending module is synchronous to be executed.
11. device according to claim 10, it is characterised in that:The encryption that the key production module is configurable to generate
The key with identical content that key and its decruption key are standardized by symmetric encipherment algorithm.
12. device according to claim 10, it is characterised in that:The encryption that the key production module is configurable to generate
Key and its decruption key are respectively the mathematically relevant public key and private key that rivest, shamir, adelman is standardized.
13. device according to claim 10, it is characterised in that:The first key and/or second key are random
It generates and/or is pre-stored in storage medium.
14. device according to claim 10, it is characterised in that:The first interface and second interface are wireline interface
Or wireless interface.
15. device according to claim 10, it is characterised in that:The key production module is configured as using non-linear
It dissipates and turns tableaux algorithm or aes algorithm generation first key and/or the second key.
16. device according to claim 10, it is characterised in that:First sending module is in response to the remote controler
It requests and executes the step of sending to first interface;Or in response to the machine instruction and execute to first interface send the step of.
17. device according to claim 10, it is characterised in that:Second sending module the asking in response to the host
It asks and executes the step of sending to second interface;Or in response to the machine instruction and execute to second interface send the step of.
18. device according to claim 10, it is characterised in that:Each module for repeating the calling present apparatus, makes to generate every time
Encryption key and its decruption key it is different from the past to act on different automobile burglar equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510718955.5A CN105262586B (en) | 2015-10-28 | 2015-10-28 | The method for distributing key and device of automobile burglar equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510718955.5A CN105262586B (en) | 2015-10-28 | 2015-10-28 | The method for distributing key and device of automobile burglar equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105262586A CN105262586A (en) | 2016-01-20 |
CN105262586B true CN105262586B (en) | 2018-11-20 |
Family
ID=55102108
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510718955.5A Expired - Fee Related CN105262586B (en) | 2015-10-28 | 2015-10-28 | The method for distributing key and device of automobile burglar equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105262586B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110581876B (en) * | 2018-06-11 | 2023-05-26 | 阿尔派株式会社 | Vehicle-mounted device, shared vehicle management system and shared vehicle management method |
CN109272729B (en) * | 2018-09-05 | 2024-02-13 | 吴贤忠 | Identification method and device for anti-theft code remote controller |
CN113783687B (en) * | 2021-09-07 | 2023-08-29 | 浙江吉利控股集团有限公司 | Method and system for generating, encrypting and decrypting automobile electronic anti-theft code |
CN113830024A (en) * | 2021-09-22 | 2021-12-24 | 中国第一汽车股份有限公司 | Anti-theft control method and device for engine |
CN115174645B (en) * | 2022-06-30 | 2024-03-26 | 北京新能源汽车股份有限公司 | Automobile OTA cloud interaction method and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101117936A (en) * | 2007-09-03 | 2008-02-06 | 成都方程式电子有限公司 | Method and system for controlling car engine ignition by finger print |
CN101436342A (en) * | 2007-11-13 | 2009-05-20 | 郑州安和指纹识别技术有限公司 | Automobile fingerprint encipher remote controller |
CN101793114A (en) * | 2010-01-14 | 2010-08-04 | 杭州六易科技有限公司 | Signal encryption type safety remote control lock for automobiles |
CN102110319A (en) * | 2009-12-24 | 2011-06-29 | 比亚迪股份有限公司 | Wireless code hopping system, device and method for remote control door lock |
CN103010158A (en) * | 2013-01-04 | 2013-04-03 | 北京汽车股份有限公司 | Safety certification system for automobile theft prevention |
CN103456056A (en) * | 2012-05-31 | 2013-12-18 | 比亚迪股份有限公司 | Vehicle anti-theft system and vehicle anti-theft system working method |
EP2743868A1 (en) * | 2012-12-14 | 2014-06-18 | Seven Principles AG | Virtual vehicle key |
CN104029654A (en) * | 2014-05-30 | 2014-09-10 | 江苏大学 | Car anti-theft method and system based on fingerprint secret key encryption technology |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009027491A (en) * | 2007-07-20 | 2009-02-05 | Seiko Epson Corp | Vehicle security system |
-
2015
- 2015-10-28 CN CN201510718955.5A patent/CN105262586B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101117936A (en) * | 2007-09-03 | 2008-02-06 | 成都方程式电子有限公司 | Method and system for controlling car engine ignition by finger print |
CN101436342A (en) * | 2007-11-13 | 2009-05-20 | 郑州安和指纹识别技术有限公司 | Automobile fingerprint encipher remote controller |
CN102110319A (en) * | 2009-12-24 | 2011-06-29 | 比亚迪股份有限公司 | Wireless code hopping system, device and method for remote control door lock |
CN101793114A (en) * | 2010-01-14 | 2010-08-04 | 杭州六易科技有限公司 | Signal encryption type safety remote control lock for automobiles |
CN103456056A (en) * | 2012-05-31 | 2013-12-18 | 比亚迪股份有限公司 | Vehicle anti-theft system and vehicle anti-theft system working method |
EP2743868A1 (en) * | 2012-12-14 | 2014-06-18 | Seven Principles AG | Virtual vehicle key |
CN103010158A (en) * | 2013-01-04 | 2013-04-03 | 北京汽车股份有限公司 | Safety certification system for automobile theft prevention |
CN104029654A (en) * | 2014-05-30 | 2014-09-10 | 江苏大学 | Car anti-theft method and system based on fingerprint secret key encryption technology |
Also Published As
Publication number | Publication date |
---|---|
CN105262586A (en) | 2016-01-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11615411B2 (en) | POS system with white box encryption key sharing | |
CN1939028B (en) | Accessing protected data on network storage from multiple devices | |
CN102624522B (en) | A kind of key encryption method based on file attribute | |
EP3476078B1 (en) | Systems and methods for authenticating communications using a single message exchange and symmetric key | |
CN105262586B (en) | The method for distributing key and device of automobile burglar equipment | |
CN105553951A (en) | Data transmission method and data transmission device | |
CN107005577B (en) | Fingerprint data processing method and processing device | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
CN103634266B (en) | A bidirectional authentication method for a server and a terminal | |
CN106209916A (en) | Industrial automation produces business data transmission encryption and decryption method and system | |
US11870904B2 (en) | Method for encrypting and decrypting data across domains based on privacy computing | |
CN108965279A (en) | Data processing method, device, terminal device and computer readable storage medium | |
US10764260B2 (en) | Distributed processing of a product on the basis of centrally encrypted stored data | |
KR101262844B1 (en) | Apparatus for relaying remote meter data for controlling network access and method thereof | |
KR101602803B1 (en) | The encryption and decryption Method of using to polarization | |
CN111081338A (en) | Safe human health parameter acquisition method | |
KR101929355B1 (en) | Encryption and decryption system using unique serial number and symmetric cryptography | |
CN105071934A (en) | Data effective transmission method | |
KR101793528B1 (en) | Certificateless public key encryption system and receiving terminal | |
CN115801232A (en) | Private key protection method, device, equipment and storage medium | |
JP2009065226A (en) | Authenticated key exchange system, authenticated key exchange method and program | |
CN110047181B (en) | Intelligent door lock safety control method based on Zigbee | |
CN113556355A (en) | Key processing system and method for intelligent equipment of power distribution network | |
CN111162901A (en) | Application shared key obtaining method of non-SIM terminal | |
KR20190067316A (en) | One-Way Encryption Storage Method for Password Protection of Guard-on Solution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Peace Avenue steelmate Industrial Park 528425 Guangdong city of Zhongshan province Dong Feng Zhen Dong Fu Lu Applicant after: Rail car electronic Limited by Share Ltd Address before: Peace Avenue steelmate Industrial Park 528425 Guangdong city of Zhongshan province Dong Feng Zhen Dong Fu Lu Applicant before: STEELMATE CO., LTD. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20181120 Termination date: 20191028 |
|
CF01 | Termination of patent right due to non-payment of annual fee |