Wireless authentication system and wireless authentication method
First Claim
1. A wireless authentication system for a protected device with memory, comprising:
- an execution end device, which is arranged for connecting to the protected device for unlocking the protected device, comprising;
a first wireless module for receiving an activation signal; and
a first control unit coupled to the first wireless module, wherein the first control unit comprises means for generating a time related random code when the first wireless module receives the activation signal; and
a control end device comprising;
a second wireless module wirelessly linked to the first wireless module; and
a second control unit coupled to the second wireless module, wherein the first control unit transmits the time related random code to the second wireless module via the first wireless module;
wherein when the second wireless module receives the activation signal and the time related random code, the second control unit generates a comparison authentication code according to the time related random code, a fixed password and a variable password, and wherein the second control unit transmits the comparison authentication code to the first wireless module via the second wireless module; and
wherein when the comparison authentication code corresponds to a set of data stored in the execution end device, the first control unit is arranged for performing a predetermined operation to unlock the protected device, and the variable password is changed,wherein the set of data comprises the time related random code, the fixed password and the variable password stored in the execution end device, the first control unit is further configured to decrypt the comparison authentication code in order to obtain a decrypted time related random code, a decrypted fixed password and a decrypted variable password, and when the first control unit determines that the decrypted time related random code, the decrypted fixed password and the decrypted variable password respectively correspond to the time related random code, the fixed password and the variable password stored in the execution end device, the first control unit is arranged for performing the predetermined operation to unlock the protected device.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless authentication system includes an execution end device and a control end device. When the execution end device and the control end device receive an activation signal, the execution end device generates a time related random code, and transmits the time related random code to the control end device; and the control end device generates a comparison authentication code according to the time related random code, a fixed password and a variable password. When the execution end device determines that the comparison authentication code corresponds to a set of data stored in the execution end device, the execution end device performs a predetermined operation, and the variable password is changed.
15 Citations
9 Claims
-
1. A wireless authentication system for a protected device with memory, comprising:
-
an execution end device, which is arranged for connecting to the protected device for unlocking the protected device, comprising; a first wireless module for receiving an activation signal; and a first control unit coupled to the first wireless module, wherein the first control unit comprises means for generating a time related random code when the first wireless module receives the activation signal; and a control end device comprising; a second wireless module wirelessly linked to the first wireless module; and a second control unit coupled to the second wireless module, wherein the first control unit transmits the time related random code to the second wireless module via the first wireless module; wherein when the second wireless module receives the activation signal and the time related random code, the second control unit generates a comparison authentication code according to the time related random code, a fixed password and a variable password, and wherein the second control unit transmits the comparison authentication code to the first wireless module via the second wireless module; and wherein when the comparison authentication code corresponds to a set of data stored in the execution end device, the first control unit is arranged for performing a predetermined operation to unlock the protected device, and the variable password is changed, wherein the set of data comprises the time related random code, the fixed password and the variable password stored in the execution end device, the first control unit is further configured to decrypt the comparison authentication code in order to obtain a decrypted time related random code, a decrypted fixed password and a decrypted variable password, and when the first control unit determines that the decrypted time related random code, the decrypted fixed password and the decrypted variable password respectively correspond to the time related random code, the fixed password and the variable password stored in the execution end device, the first control unit is arranged for performing the predetermined operation to unlock the protected device. - View Dependent Claims (2, 3, 4)
-
-
5. A wireless authentication method for a protected device with memory, comprising the steps of:
-
providing an execution end device, which is connected to the protected device for unlocking the protected device, comprising a first wireless module and a first control unit coupled to the first wireless module; providing a control end device comprising a second wireless module and a second control unit coupled to the second wireless module; transmitting an activation signal to the first wireless module and the second wireless module; when the first wireless module receives the activation signal, the first control unit generating a time related random code, and transmitting the time related random code to the second wireless module via the first wireless module; when the second wireless module receives the activation signal and the time related random code, the second control unit generating a comparison authentication code according to the time related random code, a fixed password and a variable password, and transmitting the comparison authentication code to the first wireless module via the second wireless module;
the first control unit determining whether the comparison authentication code corresponds to a set of data stored in the execution end device;and when the first control unit determines that the comparison authentication code corresponds to the set of data stored in the execution end device, the first control unit executing a predetermined operation to unlock the protected device, and the variable password being changed;
wherein the set of comprises the time related random code, the fixed password and the variable password stored in the execution end device, wherein the wireless authentication method further comprising;the first control unit decrypting the comparison authentication code in order to obtain a decrypted time related random code, a decrypted fixed password and a decrypted variable password, wherein when the first control unit determines that the decrypted time related random code, the decrypted fixed password and the decrypted variable password respectively correspond to the time related random code, the fixed password and the variable password stored in the execution end device, the first control unit is arranged for performing the predetermined operation to unlock the protected device. - View Dependent Claims (6, 7, 8, 9)
-
Specification