Method for combining encryption to lower computer based on schoolyard card entrance guard system

A technology of access control system and lower computer, which is applied in the direction of instruments, single input/output registers, time registers, etc., can solve the problems that products are easy to be copied by others, endanger the intellectual property rights of original creators and design enthusiasm, etc., to achieve The effect of protecting independent intellectual property rights, simple and effective independent intellectual property rights, and strong anti-cracking ability

Inactive Publication Date: 2008-10-15
SHANDONG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the circuits and programs originally designed by one's own wisdom and technology are stolen by others, and the designed products are easily copied by others, which greatly endangers the original creator's intellectual property rights and design enthusiasm.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for combining encryption to lower computer based on schoolyard card entrance guard system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] First determine to set up 3 encryption points, each encryption point location is provided by the previous encryption point, the first encryption point location is address 1, and the number of people who open the door is 4, then each encryption point performs a layer of encryption. The house number controlled by the lower computer is 1356, and the encryption point is a 16-bit sequence of 6 and 0. After all these are determined, the upper computer sends encrypted information according to this regulation during work, so that the lower computer can work normally after detecting the encrypted information.

example 2

[0042] First determine that this is an encryption point, and the location of this encryption point is dynamic. The house number of the door controlled by this lower computer is 1234, then The result is address 98. If the number of people who open the door is 9, each encryption point will be encrypted with three layers. The year of opening the door for the first person to issue the card is 2008, and the encryption number at this encryption point is a 16-bit number alternating between 4 and 8. After all these are determined, the upper computer sends encrypted information according to this regulation during work, so that the lower computer can work normally after detecting the encrypted information.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a combined encryption method based on a lower computer of a campus card door-access system. The method is the combined encryption method that makes use of an upper computer of the campus card door-access system to encrypt the lower computer so as to realize that even though a circuit board and program of the lower computer are decoded by a stranger, the lower computer still cannot work normally. The method includes the steps: 1. the lower computer of the door-access system is charged to work by the first time; the upper computer dose not sent the encryption information and the lower computer detect whether the encryption information is contained in the FLASH used for storing the personnel information and door-opening records of personnel using cards, and if without the encryption information, the FLASH is fully formatted to lead the information of the FLASH to be lost completely so as not to lead the lower computer to work normally; 2. after charged, the upper computer sends a list of personnel which are allowed to open the door to the FLSAH of the lower computer, and the sent information contains the combined encryption information which is sent each time when the list of personnel allowed to open the door is sent; 3. once the encryption information in the FLASH is detected to be right by the lower computer, the lower computer works normally; if not, the lower computer cannot work as usual.

Description

Technical field: [0001] The invention relates to a method for joint encryption in the field of access control security systems, in particular to a method for using a host computer to jointly encrypt a lower computer based on a campus card access control system. Background technique: [0002] With the development of electronic technology, the cracking technology of the program in the electronic chip has also been greatly improved. Like this, the intellectual property rights of the program written in the chip have been greatly threatened. At present, in the access control system, the system lower computer (access control controller) generally adopts a double-layer PCB board and an architecture based on 80C51 core chips on the circuit. In terms of circuit design, the double-layer circuit board is extremely easy to be imitated by others. In terms of computer programs, the program in the CPU is also easily cracked by others to obtain the HEX file of the program. In this way, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 王洪君杨华张栋樊姗
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products