ADAPTATION IN TRANSMITTER DEVICES AND RADIO FREQUENCY RECEIVER AND METHOD OF TEMPORARY DATA CRYPTOGRAPHY FOR SYNCHRONY COMPARISON
20200055488 ยท 2020-02-20
Inventors
Cpc classification
International classification
B60R25/24
PERFORMING OPERATIONS; TRANSPORTING
B60R25/20
PERFORMING OPERATIONS; TRANSPORTING
H04W12/00
ELECTRICITY
Abstract
In order to achieve a secure and inviolable encryption method of data to be transmitted via RF. To this end, a transmitting device (TD) and a receiving device (RD) each receive a high-precision real-time clock (RTC). The receiving device (RD) receives the registration of the transmitting devices (TD) through specific commands, opening a recording window in its firmware for the registration of a transmitting device (TD), performing automatic comparison of the difference between the received datadate, time, etc.of this transmitting device (TD) with the data of its own RTC, storing it in the memory of the microprocessor (M) together with the serial number of the transmitting device (TD) compared. When the transmitting device (TD) is triggered to perform an action, the microprocessor (M) reads its RTC and encrypts the date and time data (D) (year, month, day, hour, minute, second) in single binary code, this being transmitted to the receiving device (RD), which microprocessor M performs the decoding of data D and compares it with the date and time (D data) of its own RTC by performing or canceling the action of the transmitting device (TD).
Claims
1- Adaptation on transmitters and receivers of radiofrequencies, consisting of a transmitting device (TD) equipped with a RF transmitter (T) and a receiver (RD) provided with an RF receiver (R), both (TD and RD) containing a microprocessor (M) with firmware and logic programming (P) of 84 bits with coding chosen by a control center, characterized by the devices (TD and RD) receive a high precision real time clock (RTC) each.
2- Time data encryption method for synchronisation comparison, according to the adapted devices (TD and RD) described in claim 1, after installed in their respective devices characterized by the receiving device (RD) receive registration of new transmitter controlstransmitting devices (TD)manually by specific buttons and/or controls, opening a recording window in its firmware for the registration of a transmitting device (TD), automatically comparing the difference between the received datadate, time, etc.of this transmitting device (TD) with their own RTC data, this time difference between both (TD and RD) stored in the microprocessor memory (M) of the receiving device (RD) together with the serial number of the transmitting device (TD) compared.
3- Method of time data encryption for synchronization comparison, according to claim 1, when the transmitting device (TD) is enabled to execute a command, characterized by its microprocessor (M) perform the reading of its RTC and, from the logical programming (P), encrypt the data (D) of the time and date of the action for its transmission together with its serial number through the RF transmitter (T) to the RF receiver (R) of the receiving device (RD), which microprocessor (M) recognizes the serial number and decodes the encrypted data (D) for comparison with the data (D) of its own RTC.
4- Method of time data encryption for synchronization comparison, according to claim 1, when employed the method in devices with PKES system for vehicles, characterized by the receiving device (RD) installed in the vehicle emits an alarm signal together with the vehicle ID via LF radiofrequency, initiating an internal oscillator timed count waiting for a response from the transmitting (TD) device that awakens and verifies the ID, by querying your RTC and sending this data along with your serial number via UHF so that the receiving device (RD) of the vehicle pauses the count and compare the data received with its own RTC, allowing to perform the action in case of agreement of the data.
Description
DESCRIPTION OF THE DRAWINGS
[0015]
[0016]
DETAILED DESCRIPTION OF THE INVENTION
[0017] In conforming to the drawings presented, the adaptation in transmitter and receptor devices for radio frequency and method of cryptography of temporary data for comparison by synchrony, calls for an 84-bit encryption method in the transmission and reception of data in logical connection, especially via radiofrequency in simplex, directional, or half-duplex transmission, to be applied in diverse devices. The code passed by this method changes over time (date and time it is triggered) rather than binary logic, as with other technologies.
[0018] To that end, a transmitting device (TD) having an RF transmitter (T) and a receiving device (RD) having an RF receiver (R) having, in both (DT and RD), a microprocessor (M) with firmware and programming coding logic (P) of 84 bits with coding chosen by a control center, and a high-precision real-time clock (RTC).
[0019] Thus, after being manufactured and already properly installed in the respective device, the receiving device (RD)which can be a receiver for electronic gates, automobiles, alarms, etc.allows the registration of new transmitter controlsof transmitting devices (TD)by manual procedure. Thus, through specific buttons and/or commands performed on the receiving device (RD) (predefined during its manufacture and depending on the device) a recording window is opened in its firmware for the registration of a transmitting device (TD), whereby the difference between the received data is automatically comparedsuch as date, time, etc.of this transmitting device (TD) with the data of its own RTC. This time difference between both (TD and RD) is stored in the microprocessor memory (M) of the receiving device (RD), as well as the serial number of the transmitting device (TD) compared, as validation to accept commands from the respective transmitting device (TD) that has this particular serial number.
[0020] Its use will therefore be defined in this descriptive report as the control system for automatic gates, only as a practical example, and may vary widely depending on the purpose of the devices (TD and RD) receiving the described technology. In this example, the control receives the technology integrated into an RF transmitter (T), whereby the transmitting device (TD) and gate automator receives the same technology integrated into an FR (R) receiver, and therefore the receiving device (RD).
[0021] That said, when triggered the control (TD) in the direction of executing its command to open or close the gate, the microprocessor (M) reads its RTC and, from its logical programming (P), transforms the data (D) of date and time (year, month, day, hour, minute, second) in a single binary code, which will be transmitted through the RF transmitter (T). The emitted signal is then picked up by the automation (RD) RF receiver and transmitted to its microprocessor (M), which recognizes the serial number of the transmitting device (TD) and makes use of the code key in its logic programming (P) to perform the decoding of the binary code, i.e., the encrypted data (D). What then occurs is that the binary decoded code (the data (D)) is analyzed by the microprocessor (M) in order to compare it with the date and time (data (D)) of your own RTC, calculating the data difference (time) according to the serial number of the transmitting device (TD), as previously said.
[0022] As a result, if the RTC information of the receiving device (RD) is identical to that of the decrypted binary code of the received data (D) the action imposed by the transmitting device (DT) is accepted by the receiving device (DR), opening or closing the gate as in the previous example, as well as turning on or off a light bulb in the case of home automation lighting, activating or deactivating alarms in case of alarm systems, locking and unlocking a car door when applied in the control of its keys, finally, performing the due action of the type of device used.
[0023] If the data (D) of the received and decrypted code is not in accordance with the data (D) emitted by the RTC of the receiving device (RD), its action is canceled.
[0024] In the method described, the data (D) sent by the transmitting device (TD) alternates every second, because it is based on the date and time set by the RTC, resulting in a secure encryption that is difficult to breach, since even if an interceptor interferes and collects the data (D), the code will have no validity from the next second. The firmware of the receiving device (RD), because it allows a window for comparing the time difference between its RTC and the RTC of the transmitting device (TD), is able to validate its action, updating this difference, even in cases of controlsTransmitting Devices (TD)which has been stored, i.e., inactive, for months or years.
[0025] In this way, the innovation and the breadth of possibilities of using this new method of data transmission (D) is obvious, via encrypted signals in a non-linear time logic, where such data (D) is updated in time synchronization in both transmitter (TD) and receiver (RD) devices, thus being inviolable, standing out in quality and simplicity of application when compared with the other commonly used methods.
[0026] That said, this method can also be used in devices with PKES system for vehicles. To this end, the receiving device (RD) is installed in the vehicle, emitting a constant wake-up signal together with the vehicle ID via LF radio frequency (low frequencypreferably between the frequencies of 100 and 130 KHz. Shortly after the last data is transmitted, the timed count starts by an internal oscillator waiting for a response from the transmitting device (TD), in this case the key. Thus, the key (TD) awakens and verifies that the ID is correct and, if yes, it queries your RTC and sends this data via UHFat 433 mHz, 915 MHz or other frequencies. The receiving device (RD) of the vehicle, after receiving the last data, pauses the count, recognizes the serial number, decrypts the information and compares the data received with its own RTC, as described in the previous cases. If the data is correct and the count is within a stipulated time limit, it allows the activation of the alarm, the opening of the doors, the start of the vehicle or another command.