CN102644419B - Dynamic password remote control lock based on chaos technology - Google Patents

Dynamic password remote control lock based on chaos technology Download PDF

Info

Publication number
CN102644419B
CN102644419B CN201210042293.0A CN201210042293A CN102644419B CN 102644419 B CN102644419 B CN 102644419B CN 201210042293 A CN201210042293 A CN 201210042293A CN 102644419 B CN102644419 B CN 102644419B
Authority
CN
China
Prior art keywords
chaos
key
wireless
wireless receiver
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210042293.0A
Other languages
Chinese (zh)
Other versions
CN102644419A (en
Inventor
刘公致
王光义
袁方
孙永强
高文飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN201210042293.0A priority Critical patent/CN102644419B/en
Publication of CN102644419A publication Critical patent/CN102644419A/en
Application granted granted Critical
Publication of CN102644419B publication Critical patent/CN102644419B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention relates to a dynamic password remote control lock based on the chaos technology. The password of the existing remote control lock has certain risk. The dynamic password remote control lock comprises a wireless transmitter, a wireless receiver and an electronic lock, wherein the wireless transmitter transmits a chaos rolling code which is received by the wireless receiver and subjected to algorithm comparison; and if the chaos rolling code is correct, the wireless receiver controls to unlock the electronic lock. According to the invention, the chaos technology is combined with the rolling code technology, the system is also provided with a fixed code, and the same chaos function is implanted into the transmitting and receiving modules; the pseudorandom sequence generated by the chaos function and the fixed code are used as keys; the function in the transmitting and receiving modules is iterated once for each remote control, and the value after the iteration is used for generating a new password; thus a different password is used each time, and the password used previously becomes invalid immediately, thereby realizing 'unique password each time'; after receiving the key, the receiver performs algorithm comparison; and the lock cannot be normally unlocked unless the algorithm comparison indicates that the key is correct, and thus the system safety is higher.

Description

Dynamic password remote-controlled lock based on chaos technology
Technical field
The invention belongs to wireless communication technology field, relate to a kind of dynamic password remote-controlled lock based on chaos technology.
Background technology
Along with the raising of people's life and the reinforcement of awareness of safety, the remote control password lock product that various vehicles or door and window are used is constantly released.The password of initial remote-controlled lock is fixed, and improves its confidentiality by the length that increases password.But because the fixing defect of password, so easily stolen password by special receiver, the theft of then unblanking.For addressing this problem, researchist has invented hopping code, in telechirics except regular coding, also increase synchronous counter, when each straighforward operation, synchronous numeration adds 1, forms encrypt data, and send with data such as key assignments together with regular coding after cryptographic algorithm is encrypted.Send all differences because synchronometer numerical value is each, no exception even same button is repeatedly pressed.Synchronous counting rolls forward automatically, and the code word of transmission can not occur again.After receiving end receives ciphertext, be decrypted by the decipherment algorithm of producer, after judgement is consistent, notice topworks carries out user command, because the hopping code numerical value change of falling into a trap is regular, encrypts together with regular coding, also has the risk being necessarily cracked.
Summary of the invention
The present invention is directed to the deficiencies in the prior art, a kind of dynamic password remote-controlled lock based on chaos technology is provided.
The technical scheme that technical solution problem of the present invention is taked:
Dynamic password remote-controlled lock based on chaos technology, comprises wireless launcher, wireless receiver, electronic lock, wireless launcher transmitting chaos rolling code, received by wireless receiver, the line algorithm of going forward side by side comparison, if correct, is opened by wireless receiver control electronic lock;
Described wireless launcher is made up of the one 51 minimum system, a nrf905 wireless transmitter module, a 24C02 chip, the button of unblanking; After wireless launcher powers on, carry out initial work, the chaos system in 51 single-chip microcomputers in the one 51 minimum system can produce a chaotic key , this chaos sequence key
Figure 236152DEST_PATH_IMAGE002
entered a 24C02 chip by programming, when the button of unblanking is pressed, wireless launcher can read a chaos sequence key from 24C02 chip, and is transmitted to wireless receiver via a NRF905 wireless transmitter module;
Described wireless receiver is made up of the 2 51 minimum system, the 2nd nrf905 wireless receiving module, the 2nd 24C02 chip, electronic lock control module; After wireless receiver powers on, carry out initial work, the chaos system in 51 single-chip microcomputers in the 2 51 minimum system can produce 16 chaotic keys
Figure 2012100422930100002DEST_PATH_IMAGE004
; These 16 chaotic keys and its iterations n can be burned in the 2nd 24C02 chip.When the 2nd nrf905 wireless receiving module receives key time, can with the 2nd 24C02 chip in 16 chaotic keys
Figure 249107DEST_PATH_IMAGE004
, there are following two kinds of situations in comparison successively:
(1) if
Figure 662771DEST_PATH_IMAGE006
with
Figure 546413DEST_PATH_IMAGE004
any one is identical, and the success of chaotic key sequence alignment is described, wireless receiver can be controlled electronic lock control interface, opens electronic lock.Now, comparison successful situation under, wireless receiver with
Figure 20120DEST_PATH_IMAGE006
for iterative initial value, substitution chaos equation:
Figure 2012100422930100002DEST_PATH_IMAGE008
Upgrading these 16 chaotic keys is
Figure 2012100422930100002DEST_PATH_IMAGE010
, for receiving key match next time.
(2) if
Figure 520371DEST_PATH_IMAGE006
with
Figure 472147DEST_PATH_IMAGE004
not identical, illustrate that chaotic key sequence alignment is unsuccessful.
Consider actual user situation, what possible situation was wireless launcher unblank, and button is repeatedly pressed in the situation that wireless interface receiver does not receive, and the chaotic key sequence of wireless launcher is repeatedly upgraded, and causes
Figure 475875DEST_PATH_IMAGE006
numerical value exceeded 16 chaotic keys of wireless interface receiver storage
Figure 589324DEST_PATH_IMAGE004
scope so that can not normally match.
Wireless receiver can be with
Figure 48643DEST_PATH_IMAGE002
for initial value carries out the interative computation 2000 times of chaos equation, chaos equation is:
Figure 804110DEST_PATH_IMAGE008
Get each iterative value
Figure 396765DEST_PATH_IMAGE002
with
Figure 681116DEST_PATH_IMAGE006
compare, if in 2000 interative computations, have
Figure 2012100422930100002DEST_PATH_IMAGE012
, to think and compare successfully, wireless receiver carries out the key updating in above-mentioned (1) and unblanks.If in 2000 interative computations, do not have
Figure 155959DEST_PATH_IMAGE012
, think that comparison is unsuccessful, do not carry out key updating.
Beneficial effect of the present invention:
The present invention combines chaos technology with hopping code, this system is also provided with regular coding (sequence number), simultaneously in module, implant identical chaotic function transmitting and receiving, utilize chaotic function produce pseudo-random sequence and regular coding as key, every remote control once transmits and receives function iteration in module once, with the value generation new password after iteration, the password of so each use is all different, and front nonrecoverable password lost efficacy immediately, accomplish " one-time pad ", receiver is receiving the laggard line algorithm comparison of key, only have algorithm comparison correctly could normally unblank, make security of system higher.
Accompanying drawing explanation
Fig. 1 structural representation of the present invention;
Fig. 2 wireless launcher schematic diagram;
Fig. 3 wireless receiver schematic diagram;
Fig. 4 NRF905 wireless transmit and receiver module circuit theory diagrams;
Fig. 5 24C02 memory module schematic diagram.
Embodiment
Below in conjunction with accompanying drawing, the present invention is further illustrated.
As shown in Figure 1, chaos rolling code wireless remote control locking device, whole system is divided into three ingredients, wireless launcher, wireless receiver, electronic lock.
As shown in Figure 2, wireless launcher is made up of the one 51 minimum system, a nrf905 wireless transmitter module, a 24C02 chip, the button of unblanking; After wireless launcher powers on, carry out initial work, the chaos system in 51 single-chip microcomputers in the one 51 minimum system can produce a chaotic key
Figure 270415DEST_PATH_IMAGE002
, this chaotic key
Figure 103242DEST_PATH_IMAGE002
entered a 24C02 chip by programming, when the button of unblanking is pressed, wireless launcher can read a chaotic key from 24C02 chip, and is transmitted to wireless interface receiver via a NRF905 wireless transmitter module;
Each chaos sequence key for the data of 32bit, and be brought into chaos equation as previous iteration value
In produce next chaotic key
Figure 2012100422930100002DEST_PATH_IMAGE024
.By that analogy, press beginning button at every turn, no matter whether receiver receives, the chaotic key that the chaos system of transmitter all can read by a 24C02 chip
Figure 283053DEST_PATH_IMAGE002
, produce new chaotic key
Figure 701878DEST_PATH_IMAGE024
, and by the chaotic key reading
Figure 30091DEST_PATH_IMAGE002
launch by NRF905 chip, by new chaos sequence key
Figure 170085DEST_PATH_IMAGE024
in burned 24C02 chip, substitute original
Figure 343577DEST_PATH_IMAGE002
, so repeatedly, each chaotic key is only used once, no longer reuses.
As shown in Figure 3, described wireless receiver is made up of the 2 51 minimum system, the 2nd nrf905 wireless receiving module, the 2nd 24C02 chip, electronic lock control module;
After wireless receiver powers on, carry out initial work, the chaos system in 51 single-chip microcomputers in the 2 51 minimum system can produce 16 chaotic keys
Figure 885417DEST_PATH_IMAGE004
; These 16 chaotic keys and its iterations n can be burned in the 2nd 24C02 chip.When the 2nd nrf905 wireless receiving module receives key
Figure 384532DEST_PATH_IMAGE006
time, can with the 2nd 24C02 chip in 16 chaotic keys , there are following two kinds of situations in comparison successively:
(1) if
Figure 723426DEST_PATH_IMAGE006
with
Figure 119772DEST_PATH_IMAGE004
any one is identical, and the success of chaotic key sequence alignment is described, wireless receiver can be controlled electronic lock control interface, opens electronic lock.Now, comparison successful situation under, wireless receiver with
Figure 789788DEST_PATH_IMAGE006
for iterative initial value, substitution chaos equation:
Upgrading these 16 chaotic keys is
Figure 154090DEST_PATH_IMAGE010
, for receiving key match next time.
(2) if
Figure 201681DEST_PATH_IMAGE006
with
Figure 42598DEST_PATH_IMAGE004
not identical, illustrate that chaotic key sequence alignment is unsuccessful.
Consider actual user situation, what possible situation was wireless launcher unblank, and button is repeatedly pressed in the situation that wireless interface receiver does not receive, and the chaotic key sequence of wireless launcher is repeatedly upgraded, and causes
Figure 113322DEST_PATH_IMAGE006
numerical value exceeded 16 chaotic keys of wireless interface receiver storage
Figure 697887DEST_PATH_IMAGE004
scope so that can not normally match.
Wireless receiver can be with
Figure 68826DEST_PATH_IMAGE002
for initial value carries out the interative computation 2000 times of chaos equation, chaos equation is:
Figure 80644DEST_PATH_IMAGE008
Get each iterative value
Figure 373085DEST_PATH_IMAGE002
with
Figure 761341DEST_PATH_IMAGE006
compare, if in 2000 interative computations, have
Figure 989716DEST_PATH_IMAGE012
, to think and compare successfully, wireless receiver carries out the key updating in above-mentioned (1) and unblanks.If in 2000 interative computations, do not have
Figure 172435DEST_PATH_IMAGE012
, think that comparison is unsuccessful, do not carry out key updating.
Fig. 4 is the same for transmitting and receiving wireless module physical circuit figure, transmitting and receiving hardware circuit, it is set for sending mode or receiving mode by software.
Adopt nRF905 monolithic radio frequency emitter chip, its operating voltage is 1.9-3.6V, and 32 pin QFN encapsulation (5mm × 5mm), work in 433/868/915MHz3 ISM channel (can freely use).
NRF905 can automatically complete and process prefix and CRC(CRC) work, can automatically complete Manchester's cde/decoding by hardware in sheet, use SPI interface and micro-controller communications, configure very convenient, its power consumption is very low, during with the output power transmitting of-10dBm, electric current only has 11mA, and in the time of receiving mode, electric current is 12.5mA.The work of nRF905 monolithic wireless transceiver is by a fully-integrated frequency modulator, a receiver with detuner, a power amplifier, a crystal oscillator and a regulator composition.The feature of ShockBurst mode of operation is automatically to produce lead code and CRC, can be easy to carry out programmed configurations by SPI interface.
Be characterized in, have the matching addresses position of 32 four bytes, two nRF905, in communication process, only have the matching addresses position of these four bytes identical, could normal swap data, this in the Software for Design of this telechirics as the ground floor authentication information of Remote control electronic lock.
Fig. 5 is for transmitting and receiving device memory circuit
Adopt 24c02 chip, it is the memory device of Serial E 2PROM based on I2C-BUS, follows two-wire system agreement, and due to it, to have interface convenient, and volume is little, and data power down such as does not lose at the feature, in instrument and meter and industrial automatic control, gets a lot of applications.Its inner institutional framework that adopts 256*8bit; capacity is 2k bit; adopt two-wire serial interface; and the Low Voltage Technique using; the minimum voltage that can move is 1.8v, and its erasing and writing life is 1,000,000 times, and the data holding time is 100 years; and there is data hardware write-protection function, can well be applied in removable handheld device.
Below produce formula and the explanation of algorithm for chaotic key
Chaos is the peculiar a kind of forms of motion of Kind of Nonlinear Dynamical System, and chaotic signal has abundant Nonlinear Dynamical Characteristics.Pertinent literature also conducts in-depth research for chaotic characteristic both at home and abroad at present.The variation extreme sensitivity of chaos system to initial value, the class signal of generation, like noise, has pseudo-randomness, thereby is specially adapted to field of encryption.Utilize just the good pseudo-randomness of chaos system to produce key rolling code, due to " one-time pad " technology of employing, be that each key rolling code is only used once, and chaos system itself has high susceptibility for key, the security of the chaos rolling code electronic lock of design is greatly improved, can effectively resists to intercept and capture to attack with Brute Force and attack.
The present invention adopts novel C ubic chaotic maps as chaos system in sheet, and its expression formula is:
Figure 217752DEST_PATH_IMAGE008
In formula: a, b is control parameter, when
Figure 2012100422930100002DEST_PATH_IMAGE026
time system in chaos state, now
Figure 675278DEST_PATH_IMAGE002
span double along with the increase of a, meet , and there is extremely complicated dynamic behavior.
The major impetus characteristic of system can be analyzed by its Lyapunov exponential sum bifurcation graphs, positive Lyapunov index shows tracks local instability, on adjacent track, velocity of separation is fast, but is stable on the whole, and athletic meeting forms chaotic attractor repeatedly.Negative Lyapunov index shows phase volume contraction, and track is stable in part, insensitive to starting condition, corresponding periodic orbit motion.When fixing
Figure DEST_PATH_RE-DEST_PATH_IMAGE010
,
Figure DEST_PATH_DEST_PATH_IMAGE011
, obtain variable x with not
Figure DEST_PATH_RE-DEST_PATH_IMAGE012
change bifurcation graphs and Lyapunov index with the index spectrogram changing.
According to Lyapunov index spectrogram and system bifurcation diagram, system exists
Figure DEST_PATH_DEST_PATH_IMAGE013
in,
Figure DEST_PATH_RE-DEST_PATH_IMAGE014
; ? in, be the cycle 1; ? in, be the cycle 2; With
Figure DEST_PATH_678150DEST_PATH_IMAGE012
increase, occur doubling time;
Figure DEST_PATH_475205DEST_PATH_IMAGE008
time there is chaos phenomenon, and work as time Lyapunov index obtain maximal value, now chaos system is full mapping.
Chaos system is got
Figure DEST_PATH_RE-DEST_PATH_IMAGE018
,
Figure DEST_PATH_395625DEST_PATH_IMAGE017
,
Figure DEST_PATH_569118DEST_PATH_IMAGE011
obtain its time-domain diagram.
Can be obtained by time-domain diagram, when
Figure 234807DEST_PATH_IMAGE022
time, can be by adjusting parameter
Figure DEST_PATH_IMAGE038
control
Figure DEST_PATH_IMAGE040
variation range, be between, can improve greatly the scope of each iterative value.
Improved Cubic mapping is carried out to initial value sensitivity tests, get
Figure DEST_PATH_955471DEST_PATH_IMAGE017
,
Figure DEST_PATH_DEST_PATH_IMAGE021
, get respectively initial value
Figure DEST_PATH_RE-DEST_PATH_IMAGE022
be 20.0000001 and 20.0000002, carry out the result after interative computation 100 times, represent the number of times of iteration with transverse axis, the longitudinal axis represents the value result after iteration, solid line represents that initial value is 20.0000001 iteration track, and dotted line represents that initial value is 20.0000002 iteration track.Both initial values only differ
Figure DEST_PATH_DEST_PATH_IMAGE023
, but by after 100 iteration, two results have this explanation chaos sequence of very large difference very responsive to initial value.By preset initial value, can produce different chaos sequences, its sequence quantity is considerable.

Claims (1)

1. the dynamic password remote-controlled lock based on chaos technology, comprises wireless launcher, wireless receiver, electronic lock, it is characterized in that: wireless launcher transmitting chaos sequence key, received by wireless receiver, the line algorithm of going forward side by side comparison, if correct, is opened by wireless receiver control electronic lock;
Described wireless launcher is made up of the one 51 minimum system, a nrf905 wireless transmitter module, a 24C02 chip, the button of unblanking; After wireless launcher powers on, carry out initial work, the chaos system in 51 single-chip microcomputers in the one 51 minimum system can produce a chaos sequence key x n, this chaos sequence key x nentered a 24C02 chip by programming, when the button of unblanking is pressed, wireless launcher can read a chaos sequence key from a 24C02 chip, and is transmitted to wireless receiver via a nrf905 wireless transmitter module;
Described wireless receiver is made up of the 2 51 minimum system, the 2nd nrf905 wireless receiving module, the 2nd 24C02 chip, electronic lock control module; After wireless receiver powers on, carry out initial work, the chaos system in 51 single-chip microcomputers in the 2 51 minimum system can produce 16 chaotic key x ' n, x ' n+1, x ' n+2... x ' n+13, x ' n+14, x ' n+15; These 16 chaotic keys and its iterations n can be burned in the 2nd 24C02 chip; When the 2nd nrf905 wireless receiving module receives chaos sequence key x ptime, can with the 2nd 24C02 chip in 16 chaotic key x ' n, x ' n+1, x ' n+2... x ' n+13, x ' n+14, x ' n+15, there are following two kinds of situations in comparison successively:
(1) if x pwith x ' n, x ' n+1, x ' n+2... x ' n+13, x ' n+14, x ' n+15any one is identical, illustrates that chaos sequence key compares successfully, and wireless receiver can be controlled electronic lock control module, opens electronic lock; Now, in the successful situation of comparison, wireless receiver is with x pfor iterative initial value, substitution chaos equation:
x n + 1 = | x n 3 a 2 - b x n |
Upgrading these 16 chaotic keys is x p, x p+1, x p+2... x p+14, x p+15, for receiving key match next time; Wherein a, b is for controlling parameter, and system is in chaos state when b ∈ (2.4,3);
(2) if x pwith x ' n, x ' n+1, x ' n+2... x ' n+13, x ' n+14, x ' n+15not identical, illustrate that chaotic key sequence alignment is unsuccessful;
Consider actual user situation, what possible situation was wireless launcher unblank, and button is repeatedly pressed in the situation that wireless receiver does not receive, and the chaotic key sequence of wireless launcher is repeatedly upgraded, and causes x pnumerical value exceeded 16 chaotic key x ' of wireless receiver storage n, x ' n+1, x ' n+2... x ' n+13, x ' n+14, x ' n+15scope so that can not normally match;
Wireless receiver can be with x nfor initial value carries out the interative computation 2000 times of chaos equation, chaos equation is:
x n + 1 = | x n 3 a 2 - b x n |
Get each iterative value x nwith x pcompare, if in 2000 interative computations, have x n=x p, to think and compare successfully, wireless receiver carries out the key updating in above-mentioned (1) and unblanks; If in 2000 interative computations, there is no x n=x p, think that comparison is unsuccessful, do not carry out key updating.
CN201210042293.0A 2012-02-23 2012-02-23 Dynamic password remote control lock based on chaos technology Expired - Fee Related CN102644419B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210042293.0A CN102644419B (en) 2012-02-23 2012-02-23 Dynamic password remote control lock based on chaos technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210042293.0A CN102644419B (en) 2012-02-23 2012-02-23 Dynamic password remote control lock based on chaos technology

Publications (2)

Publication Number Publication Date
CN102644419A CN102644419A (en) 2012-08-22
CN102644419B true CN102644419B (en) 2014-07-09

Family

ID=46657476

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210042293.0A Expired - Fee Related CN102644419B (en) 2012-02-23 2012-02-23 Dynamic password remote control lock based on chaos technology

Country Status (1)

Country Link
CN (1) CN102644419B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104453456B (en) * 2014-09-29 2017-02-22 江苏农林职业技术学院 Automobile lock unlocking method
CN106530470A (en) * 2016-12-14 2017-03-22 余仁植 Vehicle unlocking method, lock unlocking device, vehicle and vehicle system
CN109166269A (en) * 2018-08-30 2019-01-08 中国建筑科学研究院有限公司 Fire early warning device and system based on wireless communication
CN109754503A (en) * 2018-12-12 2019-05-14 胡渐佳 Intelligent door lock method for unlocking
CN111682933B (en) * 2020-06-17 2023-05-09 湖南科技大学 Dynamic password electronic lock based on multi-parameter five-dimensional hyper-chaotic system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1078835A (en) * 1992-05-12 1993-11-24 浙江大学 Based on " chaos " theoretical signal encryption method and system
WO2002025038A2 (en) * 2000-09-22 2002-03-28 Kim, Won-Chol Electronic locking apparatus and control method thereof
CN101662636A (en) * 2009-09-10 2010-03-03 中国科学院声学研究所 Safe high-speed differential serial interface
CN101706946A (en) * 2009-11-26 2010-05-12 大连大学 Digital image encryption method based on DNA sequence and multi-chaotic mapping
TWI343443B (en) * 2008-06-23 2011-06-11 Univ Shu Te
CN102184506A (en) * 2011-05-10 2011-09-14 南通大学 Digital anti-counterfeiting method based on chaos password encryption

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7937427B2 (en) * 2007-04-19 2011-05-03 Harris Corporation Digital generation of a chaotic numerical sequence

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1078835A (en) * 1992-05-12 1993-11-24 浙江大学 Based on " chaos " theoretical signal encryption method and system
WO2002025038A2 (en) * 2000-09-22 2002-03-28 Kim, Won-Chol Electronic locking apparatus and control method thereof
TWI343443B (en) * 2008-06-23 2011-06-11 Univ Shu Te
CN101662636A (en) * 2009-09-10 2010-03-03 中国科学院声学研究所 Safe high-speed differential serial interface
CN101706946A (en) * 2009-11-26 2010-05-12 大连大学 Digital image encryption method based on DNA sequence and multi-chaotic mapping
CN102184506A (en) * 2011-05-10 2011-09-14 南通大学 Digital anti-counterfeiting method based on chaos password encryption

Also Published As

Publication number Publication date
CN102644419A (en) 2012-08-22

Similar Documents

Publication Publication Date Title
CN102644419B (en) Dynamic password remote control lock based on chaos technology
CN102110319B (en) Wireless code hopping system, device and method for remote control door lock
US8631254B2 (en) Secure wake-up method, wake-up authentication code generation and updating method of a network device and a network control device in a wireless body area network
CN104952135B (en) A kind of intelligent terminal Light-control door lock system and application method
CN105139196A (en) Infrared payment terminal, infrared adaptive terminal, infrared payment system and payment method
US20110200189A1 (en) Encoder and decoder apparatus and methods with key generation
CN205140035U (en) Mobile terminal and intelligent communication system who locks
CN101833798A (en) Infrared ray remote control electronic coded lock device based on singlechip and control method thereof
KR101350615B1 (en) Data transmission method and apparatus, and data communication method and apparatus
CN100461669C (en) Public key code hopping safety system and method
US11714986B2 (en) Key fob
CN106097511A (en) A kind of electronic lock keyless access system of random key
CN205068524U (en) Intelligent gate inhibition system
CN202970173U (en) Intelligent lock system supporting multiple authentication methods
CN102817500B (en) A kind of fingerprint remote-control key for car door
CN202467379U (en) Dynamic password remote control lock based on chaotic technology
CN203769461U (en) Wireless intelligent lock based on encryption IC cards
CN205140037U (en) Bluetooth intelligent lock that touching was unblanked
CN109741494A (en) A kind of wireless transmission unit and its control method applied to intelligent door lock system
CN211287048U (en) Intelligent door lock
CN102817499A (en) Remote-control key for car door
CN216161140U (en) PKE system and host and key thereof
CN105298250A (en) Door lock remote control system
CN101945385B (en) Credible wireless sensor network node and control method thereof
CN101174947A (en) Security system combining biological characteristic recognition module and intelligent password system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140709

Termination date: 20150223

EXPY Termination of patent right or utility model