CN106209811A - Bluetooth equipment secure log auth method and device - Google Patents
Bluetooth equipment secure log auth method and device Download PDFInfo
- Publication number
- CN106209811A CN106209811A CN201610519831.9A CN201610519831A CN106209811A CN 106209811 A CN106209811 A CN 106209811A CN 201610519831 A CN201610519831 A CN 201610519831A CN 106209811 A CN106209811 A CN 106209811A
- Authority
- CN
- China
- Prior art keywords
- bluetooth
- slave devices
- random code
- encryption key
- master
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
The present invention relates to a kind of bluetooth equipment secure log auth method and device, comprise the following steps: Bluetooth slave devices generates random code, and uses the encryption key preset that random code is encrypted to ciphertext;Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;Bluetooth master connects Bluetooth slave devices;Described bluetooth master presets the encryption key identical with Bluetooth slave devices;Bluetooth slave devices sends random code ciphertext to bluetooth master;Bluetooth master uses encryption key decryption to go out random code, calculates this login password according to random code, and accesses Bluetooth slave devices with described login password;The login password that bluetooth master is sent by Bluetooth slave devices is verified, if correctly, then sends and logins successfully response, it is allowed to bluetooth master accesses, otherwise sends login failure response and disconnect.Present solution provides a kind of verification process simple, safety is high, takies the bluetooth equipment secure log auth method that resource is low.
Description
Technical field
The invention belongs to technical field of network security, be specifically related to a kind of bluetooth equipment secure log auth method and
Device.
Background technology
Bluetooth (Bluetooth): be a kind of wireless technology standard, can realize fixing equipment, mobile device and building individual
Short-range data exchange between the net of territory, considers for for security, before two bluetooth equipments set up connection trusty, logical
Often needing counterpart device is carried out authentication, after being verified, pairing connects.Traditional matching method between bluetooth equipment
PIN code must be inputted for: each equipment, only when two equipment all input identical PIN code can successful matching, due to PIN
Code is a string static plaintext, is thus easy to during transmission be intercepted, causes functions of the equipments information leakage or broken
Solve, there is the biggest potential safety hazard.
For solving the safety problem of legal identity checking, some schemes use bluetooth equipment mac address inherently to make
It is authenticated communication for unique identifier, although the program is simple, but there is mac address and be easy to be acquired and be replicated puppet
According to waiting severe safety problem.The scheme also having uses the conventional secrecy provision that Bluetooth technology provides, i.e. at application layer and link layer
On all take secrecy provision with ensure communication safety, all bluetooth equipments all use identical certification and cipher mode.?
Using the mode of " password-response " in login authentication, authentication requires that applicant differentiates random number and authentication code and returns meter
Calculate result, if the result of calculation of both sides is equal, certification success, in application layer and link layer, then all take encryption measures
To ensure the safety of communication.Although the method safety is higher, but there is also connection certification password leakage and be cracked or cut
Take equivalent risk;During data transmission, information encryption and decryption processes the most complex, needs the processor of relatively multiple resource to realize and real
Time response, the problems such as cost is the highest.
Summary of the invention
An object of the present invention is to overcome disadvantage mentioned above, it is provided that a kind of verification process is simple, and safety is high, takies money
The bluetooth equipment secure log auth method that source is low.
In order to solve above-mentioned technical problem, the invention provides a kind of bluetooth equipment secure log auth method, bag
Include following steps:
Bluetooth slave devices generates random code, and uses the encryption key preset that random code is encrypted to ciphertext;Meanwhile, bluetooth
Calculate this login password from equipment according to random code, wait that bluetooth master connects;
Bluetooth master connects Bluetooth slave devices;It is close that described bluetooth master presets the encryption identical with Bluetooth slave devices
Key;
Bluetooth slave devices sends random code ciphertext to bluetooth master;
Bluetooth master uses encryption key decryption to go out random code, calculates this login password according to random code, and uses institute
State login password and access Bluetooth slave devices;
The login password that bluetooth master is sent by Bluetooth slave devices is verified, if correctly, then sends to login successfully and answers
Answer, it is allowed to bluetooth master accesses, otherwise send login failure response and disconnect.
In technical scheme, Bluetooth slave devices generate the equal root of random code, Bluetooth slave devices and bluetooth master
Calculate login password according to random code, carry out the checking of identity, owing to system generates unpredictability and the randomness of random code, protect
The login password having demonstrate,proved each use will not be identical value, it is not easy to is cracked, improves safety.
Further, described encryption key is made up of common encryption key and user encryption key.
Further, described ciphertext is calculated generated by random code and encryption key.
Further, described login password is generated by described random code and described user encryption cipher key calculation.
Further, described user encryption key can be revised after bluetooth master logins successfully.
In technical scheme, the random code that Bluetooth slave devices generates is to be encrypted to ciphertext to mail to bluetooth master,
Owing to random code is by encryption at space propagation, too increase the difficulty cracked, improve safety.
In technical scheme, after user encryption cipher key change, due to encryption key and login password all and user
Encryption key is correlated with, so also can change simultaneously, equally increases the difficulty of password cracking, improves safety.
Further, described bluetooth security logs in auth method, further comprising the steps of: if in the time arranged
In interval, bluetooth master is not logged in, and Bluetooth slave devices disconnects the connection with bluetooth master.
After bluetooth master time-out is not logged in, new random code can be regenerated, wait that bluetooth master reconnects,
By the change of random code, it is ensured that password and last time differ, improve safety.
Correspondingly, present invention also offers a kind of bluetooth equipment secure log authentication means, including:
First processing module, generates random code for Bluetooth slave devices, and uses the encryption key preset random code to be added
Close one-tenth ciphertext;Meanwhile, Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;
Second processing module, connects Bluetooth slave devices for bluetooth master;Described bluetooth master preset with bluetooth from
The encryption key that equipment is identical;
3rd processing module, sends random code ciphertext to bluetooth master for Bluetooth slave devices;
Fourth processing module, uses encryption key decryption to go out random code for bluetooth master, calculates this according to random code
Secondary login password, and access Bluetooth slave devices with described login password;
5th processing module, the login password sent bluetooth master for Bluetooth slave devices is verified, if correctly,
Then send and login successfully response, it is allowed to bluetooth master accesses, otherwise send login failure response and disconnect.
Further, described bluetooth security logs in authentication means, also includes:
6th processing module, if being not logged in for bluetooth master in the time interval arranged, Bluetooth slave devices disconnects
Connection with bluetooth master.
In sum, the beneficial effect of technical solution of the present invention has:
1. before bluetooth master connects every time, Bluetooth slave devices generate random code, Bluetooth slave devices and bluetooth master
Calculate login password all in accordance with random code, carry out the checking of identity, owing to system generates the unpredictability of random code with random
Property, it is ensured that the login password every time used will not be identical value, it is not easy to is cracked, improves safety.
2. user encryption key allows amendment, owing to encryption key is all relevant with user encryption key with login password, institute
Also can change simultaneously, equally increase the difficulty of password cracking, improve safety.
Accompanying drawing explanation
Fig. 1 is a kind of bluetooth equipment secure log auth method flow chart of steps of the embodiment of the present invention.
Fig. 2 is a kind of bluetooth equipment secure log authentication means structure chart of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
Bluetooth (Bluetooth): be a kind of wireless technology standard, can realize fixing equipment, mobile device and building individual
Short-range data exchange between the net of territory.When Bluetooth technology specifies to carry out bluetooth communication between every a pair equipment, it is necessary to one is
Main equipment, another is from equipment, just can communicate, during communication, it is necessary to made a look up by main equipment, initiates login authentication, tests
After demonstrate,proving successfully, both sides get final product transceiving data.One equipment possessing blue tooth communication function, can switch between two roles, flat
In time, be operated in from equipment mode, waits that other main equipment connects, and when needing, is converted to main equipment pattern, sends out to miscellaneous equipment
Play calling.When one bluetooth equipment initiates calling with holotype, it is to be appreciated that the Bluetooth address of the other side, the information such as login password,
After login authentication completes, both sides can carry out data access or transmission operation.
Such as Fig. 1, it is a kind of bluetooth equipment secure log auth method flow chart of steps of the embodiment of the present invention, including
Following steps:
Step 1, Bluetooth slave devices generates random code, and uses the encryption key preset that random code is encrypted to ciphertext;With
Time, Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;
The bluetooth equipment secure log auth method of the present invention, when bluetooth master is not connected with Bluetooth slave devices
Waiting, Bluetooth slave devices first carries out the relevant preparation of this connectivity verification and processes, and including generating random code, enters the random code generated
Row is encrypted and calculates this login password according to random code, in order to carry out follow-up relevant authentication behaviour after bluetooth master connects
Make.
First, the random code described in technical scheme is made up of upper and lower case letter digital, English mixing
Regular length 8 byte random code (RAND), the producing method of random code be the timer internal that carries of use equipment and date/time
Between stamp mixing as the seed of random code, use software function to produce pseudo noise code.Although there is repetition in this pseudo noise code
Probability, but produced random code is fixed by intervalometer and date/time stamp, is unpredictable, and it is random
Property and safety are also assurable, and this random code is that the generation of bluetooth equipment login password provides operating basis.
Secondly, for ensureing random code safety during being sent to bluetooth master, it is necessary to random code is added
Close operation, the computing using AES that plaintext random code and key carry out complexity generates the ciphertext data of a string random code
Stream, and the emphasis in AES is exactly encryption key (PRIVATE_KEY), once encryption key is cracked, and will result in bright
The leakage of literary composition random code.At present conventional AES mainly have symmetric TEA AES, symmetric DES, IDE or
The AESs etc. such as AES.
The bluetooth security of the present invention logs in auth method, and encryption key is just to preset bluetooth equipment dispatches from the factory when
In a device, it is made up of common encryption key (PUBLIC_KEY) and user encryption key (USER_KEY) two parts, with
Ensure its complexity and safety.Wherein, common encryption key is usually the most revisable fixed value, and user encryption key is can
With the on-fixed value of amendment, final encryption key is to be advised through certain algorithm by common encryption key and user encryption key
Then calculate and draw.
Such as, in the embodiment using symmetric TEA AES, the length of its encryption key is 16 fixing words
Joint (i.e. 128bit) cannot change, and its value is to be calculated by following algorithmic rule by common encryption key and user encryption key
Go out: PRIVATE_KEY=(USER_KEY)0-3(PUBLIC_KEY)0-3(USER_KEY)4-7(PUBLIC_KEY)4-7.That is: 16 words
The encryption key of joint is by the 0-3 byte of user encryption key, the 0-3 byte of common encryption key, the 4-7 of user encryption key
Byte, these four parts of 4-7 byte of common encryption key are spliced successively.In the particular embodiment, if public encryption
Key (PUBLIC_KEY)=" E&nMV!78 ", user encryption key (USER_KEY)=" 12345678 ", according to above-mentioned algorithm
Encryption key (PRIVATE_KEY)=" 1234E&nM5678V that rule calculates!78”.Certainly, the algorithm of above-mentioned encryption key
Rule is the most unique, it is also possible to use more complicated algorithmic rule to generate encryption key according to the requirement of safety.
Again, Bluetooth slave devices needs to calculate and generates this login password, in order to log in bluetooth master requests verification
Comparing the when of password, the login password only held at bluetooth master is consistent with the login password of Bluetooth slave devices
Time, ability Successful login Bluetooth slave devices, otherwise will can not access and revise the information of Bluetooth slave devices.Technical solution of the present invention
In login password be to be calculated by random code (RAND) and user encryption key (USER_KEY) to generate.
Such as, in a specific embodiment, the login password (LOGIN_PWD) of bluetooth is by upper and lower case letter and blockette
The character string composition of regular length 8 byte become, its rule generated is:
LOGIN_PWD=(RAND) 1-6+ check value (2 byte)
That is: the login password LOGIN_PWD of a length of 8 bytes is equal to the 1-6 byte of random code (RAND) and 2 byte lengths
Check value splicing result.Wherein, check value 2 byte character string, is by the 0-7 byte of user encryption key (USER_KEY)
The byte hexadecimal that after merging with the 0-7 byte of random code (RAND), the character string not-carry of 16 bytes adds up and obtains
Number, is reconverted into 2 byte characters, and as obtained hexadecimal number 0x3F, then check value is " 3F ".
For example, it is assumed that user encryption key (USER_KEY) is: " 12345678 ", generating random code (RAND) is:
" A9V5xb92 ", then the character string after merging is " 12345678A9V5xb92 ", tires out with the character string not-carry after this merging
The byte hexadecimal number 0xEE added and obtain, then this hexadecimal is converted to 2 byte characters ' E ' ' E ', i.e. school
Testing value is " EE ", and the login password LOGIN_PWD finally obtaining 8 bytes is " A9V5xbEE ".
Wherein not-carry is cumulative and calculating process is:
First, hexadecimal number character string " 12345678A9V5xb92 " being converted to ASCII character is 0x31 0x32
0x33 0x34 0x35 0x36 0x37 0x38 0x41 0x39 0x56 0x35 0x78 0x62 0x39 0x32
Secondly, calculate cumulative and calculate such as: 0x31+0x32+0x33+0x34+0x35+0x36+0x37+0x38+0x41+
0x39+0x56+0x35+0x78+0x62+0x39+0x32=0x3EE
Finally, the least-significant byte taking cumulative sum obtains a byte hexadecimal number 0xEE, then this hexadecimal is converted to
2 byte characters ' E ' ' E ', are " EE ".
Step 2, bluetooth master connects Bluetooth slave devices;Described bluetooth master presets add identical with Bluetooth slave devices
Decryption key;
In technical scheme, in order to ensure the random code ciphertext that bluetooth master can send according to Bluetooth slave devices
It is correctly decoded out random code in plain text, is necessary for being preset to the encryption key (PRIVATE_KEY) of bluetooth master when dispatching from the factory
Consistent with the encryption key of Bluetooth slave devices, i.e. common encryption key (PUBLIC_KEY) and user encryption key (USER_KEY)
All consistent with what Bluetooth slave devices was preset.
Step 3, Bluetooth slave devices sends random code ciphertext to bluetooth master;
Step 4, bluetooth master uses encryption key decryption to go out random code, calculates this login password according to random code,
And access Bluetooth slave devices with described login password;
Bluetooth master is after receiving the random code ciphertext that Bluetooth slave devices sends, and first, uses and Bluetooth slave devices
Identical computational algorithm, calculates encryption with common encryption key (PUBLIC_KEY) and user encryption key (USER_KEY) close
Key (PRIVATE_KEY);Secondly, then with encryption key (PRIVATE_KEY), random code ciphertext is decrypted, obtains random code
In plain text;Again, use the computational algorithm identical with Bluetooth slave devices, with random code (RAND) and user encryption key (USER_
KEY), this login password is calculated;Finally, bluetooth master login password request Bluetooth slave devices carries out login authentication.
Step 5, the login password that bluetooth master is sent by Bluetooth slave devices is verified, if correctly, then sends login
Successful respond, it is allowed to bluetooth master accesses, otherwise sends login failure response and disconnects.
Bluetooth slave devices after receiving the logging request of bluetooth master, by bluetooth master ask login password with
The login password of local computing is compared, if both are consistent, then certification success, transmission is logined successfully by Bluetooth slave devices should
Answering to bluetooth master, and allow bluetooth master to access, can carry out data access between the two, transmission etc. operates;If two
Person is inconsistent, then authentification failure, and transmission login failure response to bluetooth master, is simultaneously switched off and bluetooth master by Bluetooth slave devices
Connection between equipment.After Bluetooth slave devices disconnects the connection with bluetooth master, random code can be regenerated, and add
Close obtain new random code ciphertext and recalculate login password, logging in for the connection of bluetooth master next time and prepare.
In a preferred embodiment, after bluetooth master with Bluetooth slave devices authentication success, the present invention's
Technical scheme can also user encryption key (USER_KEY) default to both devices be modified simultaneously.Owing to user adds
After decryption key (USER_KEY) changes, will affect encryption key (PRIVATE_KEY) and login password (LOGIN_PWD) also
Change simultaneously, the difficulty of password cracking can be increased, improve safety.
In an additional preferred embodiment, if bluetooth master is not logged in the time interval arranged, Bluetooth slave devices
Will be switched off the connection with bluetooth master, regenerate random code, and be encrypted and obtain random code ciphertext and recalculate
Login password, the connection login for bluetooth master next time is prepared.In this way, new random code is produced, it is ensured that
The login password that next time uses will not be identical value, it is not easy to is cracked, improves safety.
The bluetooth equipment secure log auth method of the present invention is described below in detail with a specific embodiment.
In the present embodiment, the common encryption key (PUBLIC_ that bluetooth master is identical with Bluetooth slave devices factory preset
KEY) be: " ABCDEFGH ", preset identical user encryption key (USER_KEY) be: " 12345678 ", bluetooth master and
Bluetooth slave devices be authenticated connect detailed process be:
Step 1, Bluetooth slave devices generates random code (RAND) " A9V5xb92 ";According to default common encryption key
(PUBLIC_KEY) and user encryption key (USER_KEY), calculating encryption key is: " 1234ABCD5678EFGH ", then adopts
With symmetrical TEA AES random code is encrypted and obtains 8 byte cryptogram (with hexadecimal representation): 0xe0 0x05 0x60
0x21 0x44 0x09 0xbb 0x28;It is calculated according to random code (RAND) and user encryption key (USER_KEY) simultaneously
Login password is: " A9V5xbEE ".After completing above-mentioned process, Bluetooth slave devices waits that bluetooth master connects;
Step 2, bluetooth master connects Bluetooth slave devices;
Step 3, Bluetooth slave devices sends random code ciphertext (0xe0 0x05 0x60 0x21 0x44 0x09 0xbb
0x28) give bluetooth master;
Step 4, bluetooth master is according to the common encryption key (PUBLIC_KEY) preset and user encryption key
(USER_KEY), calculating encryption key is: " 1234ABCD5678EFGH ", re-uses encryption key and deciphers random code ciphertext
Go out random code " A9V5xb92 ", according to random code (RAND) and user encryption key (USER_KEY), use same login close
It is " A9V5xbEE " that code computational methods calculate login password, and accesses Bluetooth slave devices with described login password;
Step 5, the login password " A9V5xbEE " that bluetooth master is sent by Bluetooth slave devices is verified, confirms and this
The login password that ground calculates is consistent, then send and login successfully response, it is allowed to bluetooth master accesses.
Such as Fig. 2, it is a kind of bluetooth equipment secure log authentication means structure chart of the embodiment of the present invention, including:
First processing module, generates random code for Bluetooth slave devices, and uses the encryption key preset random code to be added
Close one-tenth ciphertext;Meanwhile, Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;
The preparation that present treatment module is relevant before being substantially carried out bluetooth master connectivity verification processes, including generating random code,
The random code generated is encrypted and calculates this login password according to random code, in order to connects laggard at bluetooth master
Row follow-up relevant authentication operation.
Second processing module, connects Bluetooth slave devices for bluetooth master;Described bluetooth master preset with bluetooth from
The encryption key that equipment is identical;
3rd processing module, is sent to bluetooth master for Bluetooth slave devices by the random code ciphertext encrypted;
Fourth processing module, uses encryption key decryption to go out random code for bluetooth master, calculates this according to random code
Secondary login password, and access Bluetooth slave devices with described login password;
This module is mainly used in the bluetooth master relevant place after receiving the random code ciphertext that Bluetooth slave devices sends
Reason, including: one, use the computational algorithm identical with Bluetooth slave devices, add with common encryption key (PUBLIC_KEY) and user
Decryption key (USER_KEY) calculates encryption key (PRIVATE_KEY);Two, then with encryption key (PRIVATE_KEY) to
Machine code ciphertext is decrypted, and obtains random code in plain text;Three, use the computational algorithm identical with Bluetooth slave devices, use random code
(RAND) and user encryption key (USER_KEY), this login password is calculated;Finally, bluetooth master please with login password
Bluetooth slave devices is asked to carry out login authentication.
5th processing module, the login password sent bluetooth master for Bluetooth slave devices is verified, if correctly,
Then send and login successfully response, it is allowed to bluetooth master accesses, otherwise send login failure response and disconnect.
In a preferred embodiment, a kind of bluetooth equipment secure log authentication means of the embodiment of the present invention, also wrap
Including: the 6th processing module, if being not logged in for bluetooth master in the time interval arranged, Bluetooth slave devices disconnects and bluetooth
The connection of main equipment.By increasing present treatment module, do not initiate certification request or certification request mistake for a long time at bluetooth master
The when of losing, Bluetooth slave devices can generate new random code, thus changes login password next time, to increase the broken of login password
Solve difficulty, improve safety.
Technical scheme is simply explained in detail by above-mentioned detailed description of the invention, the present invention the most only office
It is limited to above-described embodiment, every any improvement according to the principle of the invention or replacement, all should be within protection scope of the present invention.
Claims (8)
1. a bluetooth equipment secure log auth method, it is characterised in that comprise the following steps:
Bluetooth slave devices generates random code, and uses the encryption key preset that random code is encrypted to ciphertext;Meanwhile, bluetooth is from setting
Calculate this login password for according to random code, wait that bluetooth master connects;
Bluetooth master connects Bluetooth slave devices;Described bluetooth master presets the encryption key identical with Bluetooth slave devices;
Bluetooth slave devices sends random code ciphertext to bluetooth master;
Bluetooth master uses encryption key decryption to go out random code, calculates this login password according to random code, and with described in step on
Record cryptographic acess Bluetooth slave devices;
The login password that bluetooth master is sent by Bluetooth slave devices is verified, if correctly, then sends and logins successfully response, permit
Permitted bluetooth master to access, otherwise send login failure response and disconnect.
2. bluetooth security as claimed in claim 1 logs in auth method, it is characterised in that described encryption key is by public
Encryption key and user encryption key composition.
3. bluetooth security as claimed in claim 1 logs in auth method, it is characterised in that described ciphertext by random code and
Encryption key calculates and generates.
4. bluetooth security as claimed in claim 1 logs in auth method, it is characterised in that described login password is by described
Random code and described user encryption cipher key calculation generate.
5. the bluetooth security as described in claim 1-4 logs in auth method, it is characterised in that described user encryption key
Can revise after bluetooth master logins successfully.
6. bluetooth security as claimed in claim 5 logs in auth method, it is characterised in that further comprising the steps of: if
In the time interval arranged, bluetooth master is not logged in, and Bluetooth slave devices disconnects the connection with bluetooth master.
7. a bluetooth equipment secure log authentication means, it is characterised in that including:
First processing module, generates random code for Bluetooth slave devices, and uses the encryption key preset random code to be encrypted to
Ciphertext;Meanwhile, Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;
Second processing module, connects Bluetooth slave devices for bluetooth master;Described bluetooth master is preset and Bluetooth slave devices
Identical encryption key;
3rd processing module, sends random code ciphertext to bluetooth master for Bluetooth slave devices;
Fourth processing module, uses encryption key decryption to go out random code for bluetooth master, calculates this according to random code and step on
Record password, and access Bluetooth slave devices with described login password;
5th processing module, the login password sent bluetooth master for Bluetooth slave devices is verified, if correctly, then sends out
Send and login successfully response, it is allowed to bluetooth master accesses, otherwise send login failure response and disconnect.
8. bluetooth security as claimed in claim 7 logs in authentication means, it is characterised in that also include:
6th processing module, if being not logged in for bluetooth master in the time interval arranged, Bluetooth slave devices disconnects with blue
The connection of tooth main equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610519831.9A CN106209811A (en) | 2016-07-04 | 2016-07-04 | Bluetooth equipment secure log auth method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610519831.9A CN106209811A (en) | 2016-07-04 | 2016-07-04 | Bluetooth equipment secure log auth method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106209811A true CN106209811A (en) | 2016-12-07 |
Family
ID=57466097
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610519831.9A Pending CN106209811A (en) | 2016-07-04 | 2016-07-04 | Bluetooth equipment secure log auth method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209811A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107197346A (en) * | 2017-05-27 | 2017-09-22 | 深圳Tcl新技术有限公司 | Television terminal and bluetooth equipment return even method and computer-readable recording medium |
CN107708098A (en) * | 2017-10-12 | 2018-02-16 | 重庆云停智连科技有限公司 | A kind of personal identification method based on Bluetooth communication |
CN108521645A (en) * | 2018-03-26 | 2018-09-11 | 上海康斐信息技术有限公司 | A kind of auth method, system and control system based on identifying code |
CN109515353A (en) * | 2017-09-18 | 2019-03-26 | 上海汽车集团股份有限公司 | A kind of cognitive method and system of low-power consumption |
CN113038444A (en) * | 2021-03-25 | 2021-06-25 | 支付宝(杭州)信息技术有限公司 | Method and device for generating application layer key |
CN113141604A (en) * | 2021-04-27 | 2021-07-20 | 河北爱其科技有限公司 | Bluetooth safety communication system |
WO2021259015A1 (en) * | 2020-06-24 | 2021-12-30 | 广州汽车集团股份有限公司 | Method for connecting bluetooth key to vehicle, vehicle bluetooth system, and bluetooth key |
CN114697020A (en) * | 2022-03-17 | 2022-07-01 | 浙江中广电器集团股份有限公司 | Encryption control method of electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101067358A (en) * | 2007-03-20 | 2007-11-07 | 姜君凯 | Trick lock mechanism |
CN103593899A (en) * | 2013-11-01 | 2014-02-19 | 华侨大学 | Anonymous group voting method based on bluetooth |
CN103716794A (en) * | 2013-12-25 | 2014-04-09 | 北京握奇数据系统有限公司 | Two-way safety verification method and system based on portable device |
CN103826221A (en) * | 2013-12-31 | 2014-05-28 | 广东岭南通股份有限公司 | Bluetooth based encryption communication method, and correlation systems and methods |
CN104631961A (en) * | 2014-02-17 | 2015-05-20 | 袁磊 | Dynamic password electronic lock system in which password changes according to random codes |
-
2016
- 2016-07-04 CN CN201610519831.9A patent/CN106209811A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101067358A (en) * | 2007-03-20 | 2007-11-07 | 姜君凯 | Trick lock mechanism |
CN103593899A (en) * | 2013-11-01 | 2014-02-19 | 华侨大学 | Anonymous group voting method based on bluetooth |
CN103716794A (en) * | 2013-12-25 | 2014-04-09 | 北京握奇数据系统有限公司 | Two-way safety verification method and system based on portable device |
CN103826221A (en) * | 2013-12-31 | 2014-05-28 | 广东岭南通股份有限公司 | Bluetooth based encryption communication method, and correlation systems and methods |
CN104631961A (en) * | 2014-02-17 | 2015-05-20 | 袁磊 | Dynamic password electronic lock system in which password changes according to random codes |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107197346A (en) * | 2017-05-27 | 2017-09-22 | 深圳Tcl新技术有限公司 | Television terminal and bluetooth equipment return even method and computer-readable recording medium |
CN109515353A (en) * | 2017-09-18 | 2019-03-26 | 上海汽车集团股份有限公司 | A kind of cognitive method and system of low-power consumption |
CN109515353B (en) * | 2017-09-18 | 2022-02-25 | 上海汽车集团股份有限公司 | Sensing method and system with low power consumption |
CN107708098A (en) * | 2017-10-12 | 2018-02-16 | 重庆云停智连科技有限公司 | A kind of personal identification method based on Bluetooth communication |
CN108521645A (en) * | 2018-03-26 | 2018-09-11 | 上海康斐信息技术有限公司 | A kind of auth method, system and control system based on identifying code |
WO2021259015A1 (en) * | 2020-06-24 | 2021-12-30 | 广州汽车集团股份有限公司 | Method for connecting bluetooth key to vehicle, vehicle bluetooth system, and bluetooth key |
CN113920615A (en) * | 2020-06-24 | 2022-01-11 | 广州汽车集团股份有限公司 | Method for connecting Bluetooth key with vehicle, vehicle Bluetooth system and Bluetooth key |
CN113038444A (en) * | 2021-03-25 | 2021-06-25 | 支付宝(杭州)信息技术有限公司 | Method and device for generating application layer key |
CN113038444B (en) * | 2021-03-25 | 2022-07-19 | 支付宝(杭州)信息技术有限公司 | Method and device for generating application layer key |
CN113141604A (en) * | 2021-04-27 | 2021-07-20 | 河北爱其科技有限公司 | Bluetooth safety communication system |
CN114697020A (en) * | 2022-03-17 | 2022-07-01 | 浙江中广电器集团股份有限公司 | Encryption control method of electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106209811A (en) | Bluetooth equipment secure log auth method and device | |
CN102685749B (en) | Wireless safety authentication method orienting to mobile terminal | |
CN104917741B (en) | A kind of plain text document public network secure transmission system based on USBKEY | |
TW201812630A (en) | Block chain identity system | |
CN111783068B (en) | Device authentication method, system, electronic device and storage medium | |
JP2016502377A (en) | How to provide safety using safety calculations | |
JP2012530311A5 (en) | ||
CN105873031A (en) | Authentication and key negotiation method of distributed unmanned aerial vehicle based on trusted platform | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN109756893A (en) | A kind of intelligent perception Internet of Things anonymous authentication method based on chaotic maps | |
CN106060073B (en) | Channel key machinery of consultation | |
CN104202299A (en) | System and method of identity authentication based on Bluetooth | |
CN109951513A (en) | Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card | |
CN108632042A (en) | A kind of class AKA identity authorization systems and method based on pool of symmetric keys | |
WO2023174038A9 (en) | Data transmission method and related device | |
CN106452763B (en) | One kind using cipher key method by remote dummy USB device | |
CN110493162A (en) | Identity identifying method and system based on wearable device | |
CN103916363A (en) | Communication security management method and system for encryption machine | |
CN106792700A (en) | The method for building up and system of a kind of secure communication environment of wearable device | |
CN106712939A (en) | Offline key transmission method and device | |
CN107566114A (en) | A kind of method of equipment encryption and transmission encryption in cloud Internet of Things platform | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN105099671B (en) | A kind of identity hides and non-extensible safe authentication key agreement method | |
CN106789845A (en) | A kind of method of network data security transmission | |
CN203859823U (en) | Quantum encrypted video conference terminal and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |
|
RJ01 | Rejection of invention patent application after publication |