Nothing Special   »   [go: up one dir, main page]

CN105262586B - The method for distributing key and device of automobile burglar equipment - Google Patents

The method for distributing key and device of automobile burglar equipment Download PDF

Info

Publication number
CN105262586B
CN105262586B CN201510718955.5A CN201510718955A CN105262586B CN 105262586 B CN105262586 B CN 105262586B CN 201510718955 A CN201510718955 A CN 201510718955A CN 105262586 B CN105262586 B CN 105262586B
Authority
CN
China
Prior art keywords
key
encryption
interface
algorithm
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510718955.5A
Other languages
Chinese (zh)
Other versions
CN105262586A (en
Inventor
李安培
李珠
刘振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rail Car Electronic Ltd By Share Ltd
Original Assignee
Rail Car Electronic Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rail Car Electronic Ltd By Share Ltd filed Critical Rail Car Electronic Ltd By Share Ltd
Priority to CN201510718955.5A priority Critical patent/CN105262586B/en
Publication of CN105262586A publication Critical patent/CN105262586A/en
Application granted granted Critical
Publication of CN105262586B publication Critical patent/CN105262586B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to technical field of automobile theft prevention, and in particular to a kind of method for distributing key and its corresponding device of automobile burglar equipment.The distribution method includes:Generate the encryption key and its corresponding decruption key with uniqueness characteristic;By sending first key to first interface and encrypting the first ciphertext data packet to be formed to the first key using the encryption key, by the remote controler of the first key and the first ciphertext data packet write-in automobile burglar equipment;By sending the second key to second interface and carrying out the second ciphertext data packet of encryption formation using decruption key described in second key pair, by second key and the host of the second ciphertext data packet write-in automobile burglar equipment.First key is encrypted in the first ciphertext data packet when sending host to from remote controler end, and the decruption key for decrypting the first ciphertext data packet is also encrypted in the second ciphertext data packet and is assigned to host side, prevent first key is obtained from illegally being intercepted and captured.

Description

The method for distributing key and device of automobile burglar equipment
【Technical field】
The present invention relates to technical field of automobile theft prevention, and in particular to a kind of method for distributing key of automobile burglar equipment and its Corresponding device.
【Background technique】
With the rapid development of society, automobile becomes the main vehicles of people's daily trip, with the number of private car Amount increases, and automobile is stolen also to have evolved into the social concern got worse.
Automobile burglar mainly uses electronic type anti-theft technique at present, generallys use transmission terminal such as remote controler and has to send The ciphertext of control instruction controls the modes such as car door, engine start and oil supply system to the receiving host being set on automobile Realize security.General application scenarios are to store fixed key in remote controler in advance, and remote controler sends the fixed key It is stored to host side, host receives the fixed key to realize the pairing with remote controler end;It is solid that this can be used in remote controler end later Determine key control extension instruction generation ciphertext data packet and be sent to host side, the host being set on automobile receives and uses fixation Key decryption ciphertext data packet simultaneously reads control instruction, executes the operations such as corresponding unlock or locking according to control instruction.
Encryption key distribution in the prior art is that the fixed key of unencryption is directly stored in remote controler end, through remote controler end Host is sent to realize pairing, can be captured in the air by the signal issued to remote controler and scan tracing and intercepts and captures the unencryption Fixed key, safety is low;And same fixed key is used in the remote controler and host of same producer's production in the prior art, Automobile burglar equipment is easily led to be cracked in batches.
Therefore, how the method for distributing key in a kind of automobile burglar equipment and its corresponding terminal are provided, key is increased Confidentiality, improve the safety of vehicle, be those skilled in the art's technical issues that need to address.
【Summary of the invention】
One object of the present invention aims to solve the problem that at least one above-mentioned problem, provides a kind of key of automobile burglar equipment Distribution method and its corresponding device.
To realize that the purpose, the present invention adopt the following technical scheme that:
The present invention provides a kind of method for distributing key of automobile burglar equipment, include the following steps:
Generate the encryption key and its corresponding decruption key with uniqueness characteristic;
By sending first key to first interface and encrypting to be formed the to the first key using the encryption key One ciphertext data packet, by the remote controler of the first key and the first ciphertext data packet write-in automobile burglar equipment;
By sending the second key to second interface and carrying out encryption formation using decruption key described in second key pair The second ciphertext data packet, by second key and the second ciphertext data packet write-in automobile burglar equipment host.
Disclosed according to an embodiment of the present invention, the encryption key and its decruption key are advised by symmetric encipherment algorithm The key with identical content of model.
Disclosed according to still another embodiment of the invention, the encryption key and its decruption key are respectively asymmetric add The mathematically relevant public key and private key that close algorithm is standardized.
It is executed specifically, the transmission operation of the first interface and second interface is synchronous.
Optionally, the first key and/or second key are generated at random and/or are pre-stored in storage medium.
Optionally, the first interface and second interface are wireline interface or wireless interface.
Specifically, the first key and/or the second key turn tableaux algorithm or aes algorithm generation by non-linear dissipate.
Further, the step of sending to first interface is executed in response to the request of the remote controler;Or in response to this The instruction of machine and execute to first interface send the step of.
Further, the step of sending to second interface is executed in response to the request of the host;Or in response to the machine Instruction and execute to second interface send the step of.
Further, this method is repeated, keeps the encryption key generated every time and its decruption key different from the past To act on different automobile burglar equipment.
The present invention also provides a kind of encryption key distribution devices of automobile burglar equipment, include:
Key production module, for generating encryption key and its corresponding decruption key with uniqueness characteristic;
First sending module, for by first interface send first key and using the encryption key to this first Key encrypts the first ciphertext data packet to be formed, and automobile burglar equipment is written in the first key and the first ciphertext data packet Remote controler;
Second sending module, for by sending the second key to second interface and being decrypted using described in second key pair Key carries out the second ciphertext data packet of encryption formation, and second key and the second ciphertext data packet write-in automobile burglar are set Standby host.
It is disclosed according to an embodiment of the present invention, encryption key that the key production module is configurable to generate and its The key with identical content that decruption key is standardized by symmetric encipherment algorithm.
According to the present invention again with encryption key that disclosed in a embodiment, the key production module is configurable to generate and Its decruption key is respectively the mathematically relevant public key and private key that rivest, shamir, adelman is standardized.
It is executed specifically, the transmission operation of first sending module and the second sending module is synchronous.
Optionally, the first key and/or second key are generated at random and/or are pre-stored in storage medium.
Optionally, the first interface and second interface are wireline interface or wireless interface.
Specifically, the key production module is configured as being turned tableaux algorithm or aes algorithm using non-linear dissipate and being generated the One key and/or the second key.
Specifically, first sending module in response to the remote controler request and execute to first interface send step Suddenly;Or in response to the machine instruction and execute to first interface send the step of.
Specifically, second sending module in response to the host request and execute to second interface send step Suddenly;Or in response to the machine instruction and execute to second interface send the step of.
Specifically, repeating each module of the calling present apparatus, keep the encryption key generated every time and its decruption key different In in the past to act on different automobile burglar equipment.
Compared with prior art, the present invention has following advantage:
1, first key sent to remote controler end by first interface in the present invention, had using the encryption keys of generation First ciphertext data packet of first key;And the second key is sent, using second key to host side by second interface Encryption has the second ciphertext data packet of decruption key, wherein encryption key and decruption key are that mathematically relevant correspondence adds solution Key.So that remote controler end, which sends the first ciphertext data packet request to host, matches clock synchronization, the solution that host side is obtained using decryption Key decrypts the first ciphertext data packet and obtains first key completion pairing.First key is sending master to from remote controler end Be encrypted in during machine in the first ciphertext data packet, even if by it is illegal intercept and capture because without be unable to get decruption key this One key, and the decruption key for decrypting the first ciphertext data packet is also encrypted in the second ciphertext data packet and is assigned to Host side cannot be obtained by illegally intercepting and capturing.Improve the safety of entire automobile burglar equipment.
2, due to encryption key distribution device generates every time in the present invention first key, the second key, encryption key and decryption Key is that uniquely, even if above-mentioned 4 keys are revealed, can only also crack the automobile burglar that one is assigned above-mentioned key and set It is standby, it is avoided that car alarm is cracked in batches, further improves the safety of automobile burglar equipment.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
【Detailed description of the invention】
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, wherein:
Fig. 1 is the flow diagram of automobile burglar device keys distribution method in one embodiment of the invention;
Fig. 2 is the structural schematic diagram of automobile burglar device keys distributor in one embodiment of the invention.
【Specific embodiment】
The present invention is further described with exemplary embodiment with reference to the accompanying drawing, wherein identical label in attached drawing All refer to identical component.In addition, if the detailed description of known technology is for showing the invention is characterized in that unnecessary , then it omits it.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
It is necessary to first carry out following guiding explanation to application scenarios of the invention and its principle.
Method of the invention and corresponding device are used to distribute key for automobile burglar equipment, and the present invention is to have processor Third party's encryption key distribution device independently of automobile burglar equipment with coffret is hardware foundation to describe.By to remote control Encryption key is distributed in device, which can be generated using Symmetric key generation algorithm or unsymmetrical key generating algorithm, phase The encryption key answered is used to encrypt to obtain the first ciphertext using symmetric encipherment algorithm or rivest, shamir, adelman to first key Data packet;It is corresponding to be assigned decruption key corresponding with encryption key to host side, for decrypting the of the transmission of remote controler end One ciphertext data packet obtains first key, but the decruption key is encrypted in the second ciphertext data packet and distributes to host.At this Symmetric encipherment algorithm and rivest, shamir, adelman have flexibly been used in invention, illustrate both Encryption Algorithm briefly below.
Symmetric cryptography is also private key encryption, refers to that encryption and decryption use the Encryption Algorithm of same key.Sometimes it is called tradition Cryptographic algorithm is exactly that encryption key can be calculated from decruption key, while decruption key can also be from encryption key It calculates.And in most of symmetry algorithm, encryption key and decruption key are identical, so also referred to as this encryption is calculated Method is secret-key algorithm or single key algorithm.It requires sender and recipient before secure communication, decides through consultation a key. The safety of symmetry algorithm depends on key, and leakage key means that anyone can be to the message that they send or receive Decryption, so the confidentiality of key is most important to communicating.The advantages of symmetric encipherment algorithm, is the high speed of encryption and decryption and makes Difficult cracking when with long key.Symmetric encipherment algorithm commonly used in the prior art mainly have DES, TripleDES, RC2, RC4, RC5 and Blowfish etc..Those skilled in the art should be enough to understand the spirit of this widely applied technology and its various algorithms It is living to use.The key point of symmetric cryptography is secure storage or transmission symmetric key, and flexibly anti-using automobile in the present invention Equipment distributor is stolen to solve the problems, such as this.
Asymmetric encryption is also public key encryption, in encryption and decryption using different keys, what when encryption used The key used when key and decryption forms a key pair, can only be close with another with the ciphertext that one of key encrypts Key decryption, and cannot be decrypted by other keys (key including encryption).A usual key is appointed as " public key ", another It is then appointed as " private key ", can only be taken care of by key holder.Public key encryption technology solves the publication and management of key Problem, the both sides for carrying out data communication can safely confirm other side's identity and public-key cryptography, provide the identifiability of communication.It is non- Symmetric key encryption algorithm mainly has RSA, DSA, DiffieHellman, PKCS and PGP etc..
It will be detailed below several skills of the invention proposed to realize above-mentioned scene with above-mentioned principle The specific embodiment of art scheme.
It should be noted that a kind of method for distributing key of automobile burglar equipment provided by the invention, can pass through programming The method for distributing key is embodied as computer program to set in PC machine or the other similar programmable, intelligent with microprocessor Standby middle operation.
Referring to Fig. 1, an a kind of exemplary embodiments of the method for distributing key of automobile burglar equipment of the invention, specifically Include the following steps:
S11 generates the encryption key and its corresponding decruption key with uniqueness characteristic.
Encryption key in the present invention and decryption code key can be that symmetric encipherment algorithm standardized with identical content Key;It is also possible to the mathematically relevant public key and private key that rivest, shamir, adelman is standardized.According to the above-mentioned key of generation Algorithm is different, and two embodiments used below illustrate the generating process of encryption key and decruption key.Program for ease of understanding, The step is illustrated for generating this in PC machine to key using Java programming language, but can not be constituted to the present invention Limitation;On the realization theory of the present embodiment with the programming language of use and based on hardware it is not related, technology in the art Personnel can also realize the step using other implementation methods.
1, in one embodiment of the invention, the encryption key and its decruption key are standardized by symmetric encipherment algorithm The key with identical content.
It can be appreciated that the method for creation symmetric key is provided in Java in key generator KeyGenerator class, and A static method getInstance () is predefined in KeyGenerator class, is obtained by the static method The object of KeyGenerator class.For example, defined function KeyGenerator kg=can be passed through KeyGenerator.getInstance (" DESede ") obtains key generator.The wherein ginseng of method getInstance () Number be character string type, may specify the title of Encryption Algorithm, for example, can be common symmetric encipherment algorithm " Blowfish ", " DES ", " DESede ", " HmacMD5 " etc.." DESede " algorithm, more common " DES " peace of the algorithm are used in above-mentioned function Full property is higher.Then the length that function kg.init (168) limit the key generated can be used.Certainly, which can also save Slightly, key length generated can be defaulted according to algorithm when obtaining key generator.For example, the corresponding key of " DES " algorithm Length is 56;The corresponding key length of " DESede " algorithm is 112 or 168.
Above-mentioned steps, which obtain a pair in the object of the KeyGenerator class of acquisition, can be used for DESede symmetric cryptography The encryption key and decruption key of algorithm.Further, customized key is written into the key of the generation in a manner of byte In file, then in the storage device by this document storage.
It is understood that the file where the encryption key and decruption key should be stored in the encryption key distribution In the storage device of device.The storage device can be used to store the program or data of the encryption key distribution device simultaneously, can also To be the specific storage device of file where being specifically used to store the encryption key and decruption key, such as special key Storage chip, to improve the safety of the file storage where encryption key and decruption key.It is understood that in the present invention Storage device can use high-speed random access memory, can also include nonvolatile memory, a for example, at least magnetic Disk storage device, flush memory device or other volatile solid-state parts.
In a preferred embodiment, encryption key and the file storage where decruption key in order to further increase Safety reduces the risk that memory is obtained encryption key and decruption key by illegal user using chip reverse engineering, this reality It applies storage device described in example and is all made of ferroelectric RAM FRAM (Ferroelectric Random Access Memory)。
It is well known that Differential Power Analysis technology is often used to extract key information, the technology in chip reverse engineering The main different power consumption by measurement memory when reading and writing logic state data " 0 " and " 1 ", is divided by statistical method Information related with key is extracted in analysis.And FRAM is nonvolatile memory in the present invention, is ferroelectric memory, but because should Iron-based material is free of in memory chip, influences it by magnetic field.The FRAM and common electrically erasable are only It reads memory EEPROM memory technology to compare, FRAM has stronger anti-corrupted data ability in the environment such as electric field, radiation.Its Ultrafast access time and low-power consumption (it reads power consumption and write-in power consumption is practically identical) are more difficult to attacker using difference function Rate analytical technology carries out attack to it and obtains key.
2, in yet another embodiment of the present invention, the encryption key and its decruption key are respectively that asymmetric encryption is calculated The mathematically relevant public key and private key that method is standardized.
It can be appreciated that generating public key and private key pair using KeyPairGenerator class in Java in the embodiment.And A static method getInstance () is predefined in KeyPairGenerator class, is obtained by the static method The object of KeyPaairGenerator class.For example, defined function KeyPairGenerator kg=can be passed through KeyPairGenerator.getInstance (" RSA ") obtains the key generator based on RSA Algorithm.Wherein method The parameter of getInstance () is character string type, may specify the title of Encryption Algorithm, such as can also be common non-right Claim Encryption Algorithm " RSA ", " DSA ", " DiffieHellman ", " PKCS " and " PGP " etc..
Above-mentioned steps obtain a pair in the object of the KeyPairGenerator type of acquisition, and to can be used for RSA asymmetric The encryption key and decruption key of Encryption Algorithm.Further, by calling function KeyPair.getPublic () close from this Key centering obtains public key, by calling function KeyPair.getPrivate () to obtain private key from the cipher key pair;Then should The public key and private key of generation are respectively written into customized public key file and private key file in a manner of byte, then by public key file In the storage device with private key file storage.
It is understood that the public key file and private key file should be stored in the storage of the encryption key distribution device In device.The storage device can be used to store the program or data of the encryption key distribution device simultaneously, be also possible to specially use The specific storage device of the public key file and private key file, such as special key storage chip are stored, to improve public key The safety of file and private key file storage.It is understood that the storage device in the present invention can be deposited at random using high speed Access to memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other easily The property lost solid-state memory.
In a preferred embodiment, encryption key and the file storage where decruption key in order to further increase Safety reduces the risk that memory is obtained encryption key and decruption key by illegal user using chip reverse engineering, this reality It applies storage device described in example and is all made of ferroelectric RAM FRAM (Ferroelectric Random Access Memory)。
Further, in the method for the invention, further comprising the steps of:
S12 to be formed by sending first key to first interface and being encrypted using the encryption key to the first key The first ciphertext data packet, by the first key and the first ciphertext data packet write-in automobile burglar equipment remote controler;
And step S13, by sending the second key to second interface and using decruption key described in second key pair Automobile burglar equipment is written in second key and the second ciphertext data packet by the second ciphertext data packet for carrying out encryption formation Host.
Due to needing through interface to remote controler and host assignment key and data packet, so that remote controler and host can pass through The mode of study is matched.In one embodiment, described to first interface and second interface in order to improve the efficiency of encryption key distribution Sending data is synchronous carry out.Step S12 and S13 are hereafter combined together to the realization for describing the embodiment.
In abovementioned steps, the encryption key of the uniqueness generated immediately is stored in the storage device of encryption key distribution device And decruption key.The remote controler for needing to be assigned key sends a request or encryption key distribution dress to the encryption key distribution device It sets and is instructed in response to a transmission, executed to first interface and send operation;Similarly, need the host of assigned key to the key Distributor sends a request or encryption key distribution device is instructed in response to a transmission, executes to second interface and sends behaviour Make.It can be appreciated that sending data to remote controler and host by above-mentioned interface can be wire transmission, it is also possible to wirelessly pass Defeated, which is not limited by the present invention.
In encryption key distribution device, before sending data to first interface and second interface, pre-generated first key is needed With the second key, the first key and the second key can be request or encryption key distribution in response to remote controler end and host side It is random to generate after the transmission instruction of device;It is also possible to pre-generate and be stored in encryption key distribution device that Jie is locally stored In matter, after the transmission instruction of request or encryption key distribution device in response to remote controler end and host side, read from storage medium It retransmits.
In order to guarantee the randomness and uniqueness of first key and the second key, i.e., in each remote controler and host first Key and the second key are different.It can be appreciated that can not have to the presence of association between the first key and the second key.Generate the The algorithm of one key and the second key can be the same or different, the algorithm can be operation it is customized be stored in it is close Special algorithm program in key distributor is realized, any existing algorithm is also possible to.For example, in an example of the present invention Property embodiment in, can turn tableaux algorithm or aes algorithm using non-linear dissipate and generate first key and the second key, can also To generate first key and the second key using rolling code algorithm KEELOQ.KEELOQ technology be it is a kind of complicated non-linear plus Close algorithm, through its encrypted code be rolling code, its coding mode be not it is fixed, make data transmission have high secrecy Property, the rolling code exported every time is all unique, irregular and unduplicated.
In order to guarantee that first key is transferred to host side from remote controler safety, first key key to be encrypted is encrypted to First data packet, the ciphering process are completed in encryption key distribution device.Used Encryption Algorithm can be symmetric encipherment algorithm Or rivest, shamir, adelman, the symmetric encipherment algorithm and rivest, shamir, adelman can be using customized or improved encryptions Algorithm.For example, by using existing symmetric encipherment algorithm, common symmetric encipherment algorithm mainly have DES, TripleDES, RC2, RC4, RC5 and Blowfish etc.;Or use rivest, shamir, adelman RSA, DSA commonly used in the prior art, No matter DiffieHellman, PKCS and PGP will be guaranteed the corresponding decryption of the encryption key is close using which kind of cipher mode Key is assigned to host side to implement to decrypt.Likewise, the decruption key for being assigned to host side in the present invention is needed in encryption key distribution The second ciphertext data packet is encrypted to based on certain Encryption Algorithm in device, it is customized that used Encryption Algorithm can be operation The special algorithm program being stored in encryption key distribution device realized, be also possible to any existing algorithm.
1, in one embodiment of the invention, the first key is encrypted key using symmetric encipherment algorithm encryption. The present embodiment illustrates the realization process of the embodiment by taking symmetric encipherment algorithm DESede as an example, and the present invention can also use certainly Other symmetric encipherment algorithms, the embodiment can not be construed as limiting the invention.It is read from key file storage device first It is used for the encryption key and decruption key of DESede Encryption Algorithm out.DESede pairs of symmetric encipherment algorithm is based on using encryption key The first key of generation carries out encryption and generates the first ciphertext data packet, then first key and the first ciphertext data packet is passed through wired Or wireless communication mode is transferred to the remote controler end of burglary-resisting installation by first interface.Added using the second key based on certain Close algorithm carries out encryption to decruption key and generates the second ciphertext data packet, then by the second key and the second ciphertext data packet by having Line or wireless communication mode are transferred to the host side of burglary-resisting installation by second interface.In the present embodiment, the encryption Algorithm, which can be, generates the second ciphertext data packet according to a set algorithm, and the set algorithm can be any The algorithm being suitble in the algorithm that existing algorithm or the present invention develop later.But need to guarantee the host side of the recipient simultaneously Configured with decipherment algorithm corresponding to the Encryption Algorithm.
2, in yet another embodiment of the present invention, the encrypted key of the first key is added using rivest, shamir, adelman It is close.The present embodiment illustrates the realization process of the embodiment by taking rivest, shamir, adelman RSA as an example, and the present invention can also adopt certainly With other rivest, shamir, adelmans, which can not be construed as limiting the invention.First from public key file storage device It is middle to read the encrypted public key for being used for RSA cryptographic algorithms, corresponding decrypted private key is read from private key file storage device.Using adding Migong key carries out encryption based on first key of the rivest, shamir, adelman RSA to generation and generates the first ciphertext data packet, then by the One key and the first ciphertext data packet are transferred to the distant of burglary-resisting installation by first interface by wired or wireless communication mode Control device end.Encryption is carried out to decrypted private key based on certain Encryption Algorithm using the second key and generates the second ciphertext data packet, then Second key and the second ciphertext data packet are transferred to burglary-resisting installation by second interface by wired or wireless communication mode Host side.In the present embodiment, the Encryption Algorithm can be close according to described in a set algorithm generation second Literary data packet, the set algorithm can be the calculation being suitble in the algorithm developed after any existing algorithm or the present invention Method.But it needs to guarantee the host side of the recipient while being configured with decipherment algorithm corresponding to the Encryption Algorithm.
After encryption key distribution device of the invention completes the wherein encryption key distribution of a set of automobile burglar equipment, it can repeat Executing above each step is that more automobile burglar equipment distribute key, can be applied in batch production.What the present invention used Different encryption keys, decruption key, first key and the second key can be generated in each key schedule, so that different vapour Each key being assigned in vehicle burglary-resisting installation is different, prevents automobile burglar equipment from being cracked in batches.
Further, according to the function modoularization thinking of computer software, the present invention also provides a kind of automobile burglar equipment Encryption key distribution device.Referring to Fig. 2, it includes key production module 11, the first sending module 12 and the second sending module 13.
The key production module 11, it is close for generating the encryption key with uniqueness characteristic and its corresponding decryption Key.
Encryption key in the present invention and decryption code key can be that symmetric encipherment algorithm standardized with identical content Key;It is also possible to the mathematically relevant public key and private key that rivest, shamir, adelman is standardized.According to the above-mentioned key of generation Algorithm is different, and two embodiments used below illustrate that key production module 11 generates the process of encryption key and decruption key. The realization of the module for ease of understanding is illustrated, still for generating this in PC machine to key using Java programming language It can not be construed as limiting the invention;On the realization theory of the present embodiment with the programming language of use and based on hardware do not have Relationship, those skilled in that art can also realize the module using other embodiments.
1, encryption key that in one embodiment of the invention, the key production module 11 is configurable to generate and its The key with identical content that decruption key is standardized by symmetric encipherment algorithm.
It can be appreciated that the method for creation symmetric key is provided in Java in key generator KeyGenerator class, and A static method getInstance () is predefined in KeyGenerator class, is obtained by the static method The object of KeyGenerator class.For example, defined function KeyGenerator kg=can be passed through KeyGenerator.getInstance (" DESede ") obtains key generator.The wherein ginseng of method getInstance () Number be character string type, may specify the title of Encryption Algorithm, for example, can be common symmetric encipherment algorithm " Blowfish ", " DES ", " DESede ", " HmacMD5 " etc.." DESede " algorithm, more common " DES " peace of the algorithm are used in above-mentioned function Full property is higher.Then the length that function kg.init (168) limit the key generated can be used.Certainly, which can also save Slightly, key length generated can be defaulted according to algorithm when obtaining key generator.For example, the corresponding key of " DES " algorithm Length is 56;The corresponding key length of " DESede " algorithm is 112 or 168.
Above-mentioned key production module 11, which obtains a pair in the object of the KeyGenerator class of acquisition, can be used for The encryption key and decruption key of DESede symmetric encipherment algorithm.Further, the key of the generation is write in a manner of byte Enter in customized key file, then in the storage device by this document storage.
It is understood that the file where the encryption key and decruption key should be stored in the encryption key distribution In the storage device of device.The storage device can be used to store the program or data of the encryption key distribution device simultaneously, can also To be the specific storage device of file where being specifically used to store the encryption key and decruption key, such as special key Storage chip, to improve the safety of the file storage where encryption key and decruption key.It is understood that in the present invention Storage device can use high-speed random access memory, can also include nonvolatile memory, a for example, at least magnetic Disk storage device, flush memory device or other volatile solid-state parts.
In a preferred embodiment, encryption key and the file storage where decruption key in order to further increase Safety reduces the risk that memory is obtained encryption key and decruption key by illegal user using chip reverse engineering, this reality It applies storage device described in example and is all made of ferroelectric RAM FRAM (Ferroelectric Random Access Memory)。
It is well known that Differential Power Analysis technology is often used to extract key information, the technology in chip reverse engineering The main different power consumption by measurement memory when reading and writing logic state data " 0 " and " 1 ", is divided by statistical method Information related with key is extracted in analysis.And FRAM is nonvolatile memory in the present invention, is ferroelectric memory, but because should Iron-based material is free of in memory chip, influences it by magnetic field.The FRAM and common electrically erasable are only It reads memory EEPROM memory technology to compare, FRAM has stronger anti-corrupted data ability in the environment such as electric field, radiation.Its Ultrafast access time and low-power consumption (it reads power consumption and write-in power consumption is practically identical) are more difficult to attacker using difference function Rate analytical technology carries out attack to it and obtains key.
2, encryption key that in yet another embodiment of the present invention, the key production module 11 is configurable to generate and Its decruption key is respectively the mathematically relevant public key and key that rivest, shamir, adelman is standardized.
It can be appreciated that generating public key and private key pair using KeyPairGenerator class in Java in the embodiment.And A static method getInstance () is predefined in KeyPairGenerator class, is obtained by the static method The object of KeyPaairGenerator class.For example, defined function KeyPairGenerator kg=can be passed through KeyPairGenerator.getInstance (" RSA ") obtains the key generator based on RSA Algorithm.Wherein method The parameter of getInstance () is character string type, may specify the title of Encryption Algorithm, such as be can be common asymmetric Encryption Algorithm " RSA ", " DSA ", " DiffieHellman ", " PKCS " and " PGP " etc..
Key production module 11, which obtains a pair in the object of the KeyPairGenerator type of acquisition, can be used for RSA The encryption key and decruption key of rivest, shamir, adelman.Further, by calling function KeyPair.getPublic () Public key is obtained from the cipher key pair, by calling function KeyPair.getPrivate () to obtain private key from the cipher key pair;So The public key of the generation and private key are respectively written into customized public key file and private key file in a manner of byte afterwards, then will be public Key file and private key file storage are in the storage device.
It is understood that the public key file and private key file should be stored in the storage of the encryption key distribution device In device.The storage device can be used to store the program or data of the encryption key distribution device simultaneously, be also possible to specially use The specific storage device of the public key file and private key file, such as special key storage chip are stored, to improve public key The safety of file and private key file storage.It is understood that the storage device in the present invention can be deposited at random using high speed Access to memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other easily The property lost solid-state memory.
In a preferred embodiment, encryption key and the file storage where decruption key in order to further increase Safety reduces the risk that memory is obtained encryption key and decruption key by illegal user using chip reverse engineering, this reality It applies storage device described in example and is all made of ferroelectric RAM FRAM (Ferroelectric Random Access Memory)。
Further, the key production module 11 is additionally configured to generate first key and the second key.In key point With in device, before sending data to first interface and second interface, need close using key production module 11 pre-generated first Key and the second key, the first key and the second key can be request or key point in response to remote controler end and host side It is random to generate after transmission instruction with device;It is also possible to be pre-generated in encryption key distribution device by key production module 11 And it is stored in local storage medium, the transmission instruction of request or encryption key distribution device in response to remote controler end and host side Afterwards, it reads and retransmits from storage medium.
In order to guarantee the randomness and uniqueness of first key and the second key, i.e., in each remote controler and host first Key and the second key are different, it can be appreciated that can not have to the presence of association between the first key and the second key.Using close Key generation module 11 generates first key and the algorithm of the second key can be the same or different, and the algorithm can be fortune The customized special algorithm program being stored in encryption key distribution device of row is realized, any existing algorithm is also possible to.Example Such as, in an illustrative embodiment of the invention, key production module 11 can turn tableaux algorithm or AES calculation using linear dissipate Method generates first key and the second key, and first key and second close can also be generated using rolling code algorithm KEELOQ Key.KEELOQ technology is a kind of non-linear Encryption Algorithm of complexity, is rolling code through its encrypted code, its coding mode is not Be it is fixed, make data transmission that there is high confidentiality, the rolling code exported every time is all unique, irregular and does not repeat 's.
Further, first sending module 12, for by being sent described in first key and use to first interface Encryption key encrypts the first ciphertext data packet to be formed to the first key, and the first key and the first ciphertext data packet are write Enter the remote controler of automobile burglar equipment.
Second sending module 13, for by sending the second key to second interface and using the second key pair institute The second ciphertext data packet that decruption key carries out encryption formation is stated, automobile is written into second key and the second ciphertext data packet The host of burglary-resisting installation.
In order to guarantee that first key is transferred to host side from remote controler safety, first key key to be encrypted is encrypted to First data packet, the ciphering process are implemented to complete by the first sending module 12 in encryption key distribution device.First sending module Encryption Algorithm used by 12 can be symmetric encipherment algorithm or rivest, shamir, adelman, the symmetric encipherment algorithm and it is asymmetric plus Close algorithm can be using customized or improved Encryption Algorithm.It is common right for example, by using existing symmetric encipherment algorithm Encryption Algorithm is claimed mainly to have DES, TripleDES, RC2, RC4, RC5 and Blowfish etc.;Or use is commonly used in the prior art Rivest, shamir, adelman RSA, DSA, DiffieHellman, PKCS and PGP, no matter will be guaranteed using which kind of cipher mode The corresponding decruption key of the encryption key is assigned to host side to implement to decrypt.Likewise, being assigned to host side in the present invention Decruption key need the second sending module 12 to be encrypted to the second ciphertext data packet based on certain Encryption Algorithm, it is used plus Close algorithm can be the customized special algorithm program being stored in encryption key distribution device of operation and be realized, be also possible to any Existing algorithm.
In aforementioned key generation module 11, the encryption key and decryption key storage generated immediately is in encryption key distribution device Storage device in.The remote controler for needing to be assigned key sends a request or encryption key distribution to the encryption key distribution device Device is instructed in response to a transmission, is executed from first sending module 12 to first interface and is sent operation;Similarly, need by The host for distributing key sends a request or encryption key distribution device to the encryption key distribution device and refers in response to a transmission It enables, is executed from second sending module 13 to second interface and send operation.It can be appreciated that by above-mentioned interface to remote controler and Host, which sends data, can be wire transmission, be also possible to be wirelessly transferred, which is not limited by the present invention.
Due to needing the first sending module 12 and the second sending module 13 by interface respectively to remote controler and host assignment Key and data packet enable remote controler and host to match by way of study.In one embodiment, in order to improve key The efficiency of distribution, first sending module 12 is synchronous with the transmission of the second sending module 13 operation to be executed.
The Encryption Algorithm that the first sending module 12 uses according to the present invention is different, and the present invention is by two embodiments come real It is existing, as described below.
1, in one embodiment of the invention, the first key is encrypted key using symmetric encipherment algorithm encryption. The present embodiment illustrates the realization process of the embodiment by taking symmetric encipherment algorithm DESede as an example, and the present invention can also use certainly Other symmetric encipherment algorithms, the embodiment can not be construed as limiting the invention.First sending module 12 first is literary from key The encryption key and decruption key for being used for DESede Encryption Algorithm are read in part storage device.First sending module 12, which uses, to be added Key carries out encryption based on first key of the symmetric encipherment algorithm DESede to generation and generates the first ciphertext data packet, then passes through First key and the first ciphertext data packet are passed through first interface by wired or wireless communication mode by the first sending module 12 It is transferred to the remote controler end of burglary-resisting installation.
Second sending module 13 carries out encryption to decruption key based on certain Encryption Algorithm using the second key and generates the Two ciphertext data packets, then second key and the second ciphertext data packet are passed through into wired or wireless communication by the second sending module 13 Mode is transferred to the host side of burglary-resisting installation by second interface.In the present embodiment, the Encryption Algorithm can be according to One set algorithm generates the second ciphertext data packet, and the set algorithm can be any existing algorithm or sheet The algorithm being suitble in the algorithm developed after invention.But it needs to guarantee the host side of the recipient while being configured with encryption calculation Decipherment algorithm corresponding to method.
2, in yet another embodiment of the present invention, the encrypted key of the first key is added using rivest, shamir, adelman It is close.The present embodiment illustrates the realization process of the embodiment by taking rivest, shamir, adelman RSA as an example, and the present invention can also adopt certainly With other rivest, shamir, adelmans, which can not be construed as limiting the invention.First sending module 12 first is from public affairs The encrypted public key for being used for RSA cryptographic algorithms is read in key file storage device, is read from private key file storage device corresponding Decrypted private key.First sending module 12 is using encrypted public key based on rivest, shamir, adelman RSA to the first key of generation It carries out encryption and generates the first ciphertext data packet, then first key and the first ciphertext data packet are passed through into wired or wireless communication party Formula is transferred to the remote controler end of burglary-resisting installation by first interface.
Second sending module 13 is additionally configured to carry out decrypted private key based on certain Encryption Algorithm using the second key Encryption generates the second ciphertext data packet, then the second key and the second ciphertext data packet are led to by wired or wireless communication mode Cross the host side that second interface is transferred to burglary-resisting installation.In the present embodiment, the Encryption Algorithm can be according to one both Fixed algorithm generates the second ciphertext data packet, and the set algorithm can be any existing algorithm or the present invention The algorithm being suitble in the algorithm developed afterwards.But need to guarantee the host side of the recipient at the same be configured with the Encryption Algorithm institute it is right The decipherment algorithm answered.
After encryption key distribution device of the invention completes the wherein encryption key distribution of a set of automobile burglar equipment, it can repeat Calling above-mentioned each module is that more automobile burglar equipment distribute key, can be applied in batch production.What the present invention used Different encryption keys, decruption key, first key and the second key can be generated in key production module 11, so that different vapour Each key being assigned in vehicle burglary-resisting installation is different, prevents automobile burglar equipment from being cracked in batches.
In an application scenarios of the invention, the pre-generated encryption of the encryption key distribution device of the automobile burglar equipment is close Key, decruption key, first key and the second key simultaneously store, and certainly, above-mentioned each key is also possible to receive in encryption key distribution device It is random again after instruction on to the request of automobile burglar equipment or encryption key distribution device to generate.In response to the encryption key distribution of remote controler Instruction in request or encryption key distribution device, the encryption key distribution device is by sending first key to first interface and uses institute It states encryption key and encrypts the first ciphertext data packet to be formed to the first key, by the first key and the first ciphertext data packet The remote controler of automobile burglar equipment is written;In response to the instruction on the encryption key distribution request of host or encryption key distribution device, this is close Key distributor by sending the second key to second interface and carries out encryption shape using decruption key described in second key pair At the second ciphertext data packet, by second key and the second ciphertext data packet write-in automobile burglar equipment host.It repeats Aforesaid operations are executed, keep the encryption key generated every time and its decruption key different from the past anti-to act on different automobiles Steal equipment.
In conclusion sending first key, close using the encryption of generation to remote controler end by first interface in the present invention Key encrypts the first ciphertext data packet for having first key;And the second key is sent, using this to host side by second interface Second key, which encrypts, the second ciphertext data packet of decruption key, wherein encryption key and decruption key are mathematically relevant Corresponding encryption and decryption key.So that remote controler end, which sends the first ciphertext data packet request to host, matches clock synchronization, host side is using decryption The decryption key decryption obtained the first ciphertext data packet obtains the first key and completes pairing.First key is from remote controler end It is encrypted in during sending host in the first ciphertext data packet, it can not by illegal intercept and capture because not having decruption key yet The first key is obtained, and the decruption key for decrypting the first ciphertext data packet is also encrypted in the second ciphertext data packet It is assigned to host side, cannot be obtained by illegally intercepting and capturing.Improve the safety of entire automobile burglar equipment.
Further, due to encryption key distribution device generates every time in the present invention first key, the second key, encryption key It is that uniquely, even if above-mentioned 4 keys are revealed, can only also crack the automobile for being assigned above-mentioned key with decruption key Burglary-resisting installation is avoided that car alarm is cracked in batches, further improves the safety of automobile burglar equipment.
In the instructions provided here, although the description of a large amount of detail.It is to be appreciated, however, that of the invention Embodiment can practice without these specific details.In some embodiments, it is not been shown in detail well known Methods, structures and technologies, so as not to obscure the understanding of this specification.
Although having been illustrated with some exemplary embodiments of the invention above, those skilled in the art will be managed Solution, in the case where not departing from the principle of the present invention or spirit, can make a change these exemplary embodiments, of the invention Range is defined by the claims and their equivalents.

Claims (18)

1. a kind of method for distributing key of automobile burglar equipment, which is characterized in that include the following steps:
Generate the encryption key and its corresponding decruption key with uniqueness characteristic;
It is close by sending first key to first interface and encrypting to be formed first to the first key using the encryption key Literary data packet, by the remote controler of the first key and the first ciphertext data packet write-in automobile burglar equipment;
By sending the second key to second interface and carrying out the of encryption formation using decruption key described in second key pair Two ciphertext data packets, by second key and the host of the second ciphertext data packet write-in automobile burglar equipment;
The transmission operation of the first interface and second interface is synchronous to be executed.
2. according to the method described in claim 1, it is characterized in that:The encryption key and its decruption key are symmetric cryptography calculation The key with identical content that method is standardized.
3. according to the method described in claim 1, it is characterized in that:The encryption key and its decruption key are respectively asymmetric The mathematically relevant public key and private key that Encryption Algorithm is standardized.
4. according to the method described in claim 1, it is characterized in that:The first key and/or second key are given birth at random At and/or be pre-stored in storage medium.
5. according to the method described in claim 1, it is characterized in that:The first interface and second interface be wireline interface or Wireless interface.
6. according to the method described in claim 1, it is characterized in that:The first key and/or the second key are dissipated by non-linear Turn tableaux algorithm or aes algorithm generates.
7. according to the method described in claim 1, it is characterized in that:In response to the remote controler request and execute to first and connect The step of mouth is sent;Or in response to the machine instruction and execute to first interface send the step of.
8. according to the method described in claim 1, it is characterized in that:In response to the host request and execute to second interface The step of transmission;Or in response to the machine instruction and execute to second interface send the step of.
9. according to the method described in claim 1, it is characterized in that:This method is repeated, the encryption key generated every time is made And its decruption key is different from the past to act on different automobile burglar equipment.
10. a kind of encryption key distribution device of automobile burglar equipment, which is characterized in that include:
Key production module, for generating encryption key and its corresponding decruption key with uniqueness characteristic;
First sending module, for by sending first key and using the encryption key to the first key to first interface The the first ciphertext data packet formed is encrypted, by the remote control of the first key and the first ciphertext data packet write-in automobile burglar equipment Device;
Second sending module, for by sending the second key to second interface and using decruption key described in second key pair Automobile burglar equipment is written in second key and the second ciphertext data packet by the second ciphertext data packet for carrying out encryption formation Host;
The transmission operation of first sending module and the second sending module is synchronous to be executed.
11. device according to claim 10, it is characterised in that:The encryption that the key production module is configurable to generate The key with identical content that key and its decruption key are standardized by symmetric encipherment algorithm.
12. device according to claim 10, it is characterised in that:The encryption that the key production module is configurable to generate Key and its decruption key are respectively the mathematically relevant public key and private key that rivest, shamir, adelman is standardized.
13. device according to claim 10, it is characterised in that:The first key and/or second key are random It generates and/or is pre-stored in storage medium.
14. device according to claim 10, it is characterised in that:The first interface and second interface are wireline interface Or wireless interface.
15. device according to claim 10, it is characterised in that:The key production module is configured as using non-linear It dissipates and turns tableaux algorithm or aes algorithm generation first key and/or the second key.
16. device according to claim 10, it is characterised in that:First sending module is in response to the remote controler It requests and executes the step of sending to first interface;Or in response to the machine instruction and execute to first interface send the step of.
17. device according to claim 10, it is characterised in that:Second sending module the asking in response to the host It asks and executes the step of sending to second interface;Or in response to the machine instruction and execute to second interface send the step of.
18. device according to claim 10, it is characterised in that:Each module for repeating the calling present apparatus, makes to generate every time Encryption key and its decruption key it is different from the past to act on different automobile burglar equipment.
CN201510718955.5A 2015-10-28 2015-10-28 The method for distributing key and device of automobile burglar equipment Expired - Fee Related CN105262586B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510718955.5A CN105262586B (en) 2015-10-28 2015-10-28 The method for distributing key and device of automobile burglar equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510718955.5A CN105262586B (en) 2015-10-28 2015-10-28 The method for distributing key and device of automobile burglar equipment

Publications (2)

Publication Number Publication Date
CN105262586A CN105262586A (en) 2016-01-20
CN105262586B true CN105262586B (en) 2018-11-20

Family

ID=55102108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510718955.5A Expired - Fee Related CN105262586B (en) 2015-10-28 2015-10-28 The method for distributing key and device of automobile burglar equipment

Country Status (1)

Country Link
CN (1) CN105262586B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110581876B (en) * 2018-06-11 2023-05-26 阿尔派株式会社 Vehicle-mounted device, shared vehicle management system and shared vehicle management method
CN109272729B (en) * 2018-09-05 2024-02-13 吴贤忠 Identification method and device for anti-theft code remote controller
CN113783687B (en) * 2021-09-07 2023-08-29 浙江吉利控股集团有限公司 Method and system for generating, encrypting and decrypting automobile electronic anti-theft code
CN113830024A (en) * 2021-09-22 2021-12-24 中国第一汽车股份有限公司 Anti-theft control method and device for engine
CN115174645B (en) * 2022-06-30 2024-03-26 北京新能源汽车股份有限公司 Automobile OTA cloud interaction method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101117936A (en) * 2007-09-03 2008-02-06 成都方程式电子有限公司 Method and system for controlling car engine ignition by finger print
CN101436342A (en) * 2007-11-13 2009-05-20 郑州安和指纹识别技术有限公司 Automobile fingerprint encipher remote controller
CN101793114A (en) * 2010-01-14 2010-08-04 杭州六易科技有限公司 Signal encryption type safety remote control lock for automobiles
CN102110319A (en) * 2009-12-24 2011-06-29 比亚迪股份有限公司 Wireless code hopping system, device and method for remote control door lock
CN103010158A (en) * 2013-01-04 2013-04-03 北京汽车股份有限公司 Safety certification system for automobile theft prevention
CN103456056A (en) * 2012-05-31 2013-12-18 比亚迪股份有限公司 Vehicle anti-theft system and vehicle anti-theft system working method
EP2743868A1 (en) * 2012-12-14 2014-06-18 Seven Principles AG Virtual vehicle key
CN104029654A (en) * 2014-05-30 2014-09-10 江苏大学 Car anti-theft method and system based on fingerprint secret key encryption technology

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009027491A (en) * 2007-07-20 2009-02-05 Seiko Epson Corp Vehicle security system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101117936A (en) * 2007-09-03 2008-02-06 成都方程式电子有限公司 Method and system for controlling car engine ignition by finger print
CN101436342A (en) * 2007-11-13 2009-05-20 郑州安和指纹识别技术有限公司 Automobile fingerprint encipher remote controller
CN102110319A (en) * 2009-12-24 2011-06-29 比亚迪股份有限公司 Wireless code hopping system, device and method for remote control door lock
CN101793114A (en) * 2010-01-14 2010-08-04 杭州六易科技有限公司 Signal encryption type safety remote control lock for automobiles
CN103456056A (en) * 2012-05-31 2013-12-18 比亚迪股份有限公司 Vehicle anti-theft system and vehicle anti-theft system working method
EP2743868A1 (en) * 2012-12-14 2014-06-18 Seven Principles AG Virtual vehicle key
CN103010158A (en) * 2013-01-04 2013-04-03 北京汽车股份有限公司 Safety certification system for automobile theft prevention
CN104029654A (en) * 2014-05-30 2014-09-10 江苏大学 Car anti-theft method and system based on fingerprint secret key encryption technology

Also Published As

Publication number Publication date
CN105262586A (en) 2016-01-20

Similar Documents

Publication Publication Date Title
US11615411B2 (en) POS system with white box encryption key sharing
CN1939028B (en) Accessing protected data on network storage from multiple devices
CN102624522B (en) A kind of key encryption method based on file attribute
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
CN105553951A (en) Data transmission method and data transmission device
CN107005577B (en) Fingerprint data processing method and processing device
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN103634266B (en) A bidirectional authentication method for a server and a terminal
CN106209916A (en) Industrial automation produces business data transmission encryption and decryption method and system
US11870904B2 (en) Method for encrypting and decrypting data across domains based on privacy computing
CN108965279A (en) Data processing method, device, terminal device and computer readable storage medium
US10764260B2 (en) Distributed processing of a product on the basis of centrally encrypted stored data
KR101262844B1 (en) Apparatus for relaying remote meter data for controlling network access and method thereof
KR101602803B1 (en) The encryption and decryption Method of using to polarization
CN111081338A (en) Safe human health parameter acquisition method
KR101929355B1 (en) Encryption and decryption system using unique serial number and symmetric cryptography
CN105071934A (en) Data effective transmission method
KR101793528B1 (en) Certificateless public key encryption system and receiving terminal
CN115801232A (en) Private key protection method, device, equipment and storage medium
JP2009065226A (en) Authenticated key exchange system, authenticated key exchange method and program
CN110047181B (en) Intelligent door lock safety control method based on Zigbee
CN113556355A (en) Key processing system and method for intelligent equipment of power distribution network
CN111162901A (en) Application shared key obtaining method of non-SIM terminal
KR20190067316A (en) One-Way Encryption Storage Method for Password Protection of Guard-on Solution

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Peace Avenue steelmate Industrial Park 528425 Guangdong city of Zhongshan province Dong Feng Zhen Dong Fu Lu

Applicant after: Rail car electronic Limited by Share Ltd

Address before: Peace Avenue steelmate Industrial Park 528425 Guangdong city of Zhongshan province Dong Feng Zhen Dong Fu Lu

Applicant before: STEELMATE CO., LTD.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181120

Termination date: 20191028

CF01 Termination of patent right due to non-payment of annual fee