CN106209811A - Bluetooth equipment secure log auth method and device - Google Patents

Bluetooth equipment secure log auth method and device Download PDF

Info

Publication number
CN106209811A
CN106209811A CN201610519831.9A CN201610519831A CN106209811A CN 106209811 A CN106209811 A CN 106209811A CN 201610519831 A CN201610519831 A CN 201610519831A CN 106209811 A CN106209811 A CN 106209811A
Authority
CN
China
Prior art keywords
bluetooth
slave devices
random code
encryption key
master
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610519831.9A
Other languages
Chinese (zh)
Inventor
陈太星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Mili Technology Co Ltd
Original Assignee
Fuzhou Mili Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Mili Technology Co Ltd filed Critical Fuzhou Mili Technology Co Ltd
Priority to CN201610519831.9A priority Critical patent/CN106209811A/en
Publication of CN106209811A publication Critical patent/CN106209811A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The present invention relates to a kind of bluetooth equipment secure log auth method and device, comprise the following steps: Bluetooth slave devices generates random code, and uses the encryption key preset that random code is encrypted to ciphertext;Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;Bluetooth master connects Bluetooth slave devices;Described bluetooth master presets the encryption key identical with Bluetooth slave devices;Bluetooth slave devices sends random code ciphertext to bluetooth master;Bluetooth master uses encryption key decryption to go out random code, calculates this login password according to random code, and accesses Bluetooth slave devices with described login password;The login password that bluetooth master is sent by Bluetooth slave devices is verified, if correctly, then sends and logins successfully response, it is allowed to bluetooth master accesses, otherwise sends login failure response and disconnect.Present solution provides a kind of verification process simple, safety is high, takies the bluetooth equipment secure log auth method that resource is low.

Description

Bluetooth equipment secure log auth method and device
Technical field
The invention belongs to technical field of network security, be specifically related to a kind of bluetooth equipment secure log auth method and Device.
Background technology
Bluetooth (Bluetooth): be a kind of wireless technology standard, can realize fixing equipment, mobile device and building individual Short-range data exchange between the net of territory, considers for for security, before two bluetooth equipments set up connection trusty, logical Often needing counterpart device is carried out authentication, after being verified, pairing connects.Traditional matching method between bluetooth equipment PIN code must be inputted for: each equipment, only when two equipment all input identical PIN code can successful matching, due to PIN Code is a string static plaintext, is thus easy to during transmission be intercepted, causes functions of the equipments information leakage or broken Solve, there is the biggest potential safety hazard.
For solving the safety problem of legal identity checking, some schemes use bluetooth equipment mac address inherently to make It is authenticated communication for unique identifier, although the program is simple, but there is mac address and be easy to be acquired and be replicated puppet According to waiting severe safety problem.The scheme also having uses the conventional secrecy provision that Bluetooth technology provides, i.e. at application layer and link layer On all take secrecy provision with ensure communication safety, all bluetooth equipments all use identical certification and cipher mode.? Using the mode of " password-response " in login authentication, authentication requires that applicant differentiates random number and authentication code and returns meter Calculate result, if the result of calculation of both sides is equal, certification success, in application layer and link layer, then all take encryption measures To ensure the safety of communication.Although the method safety is higher, but there is also connection certification password leakage and be cracked or cut Take equivalent risk;During data transmission, information encryption and decryption processes the most complex, needs the processor of relatively multiple resource to realize and real Time response, the problems such as cost is the highest.
Summary of the invention
An object of the present invention is to overcome disadvantage mentioned above, it is provided that a kind of verification process is simple, and safety is high, takies money The bluetooth equipment secure log auth method that source is low.
In order to solve above-mentioned technical problem, the invention provides a kind of bluetooth equipment secure log auth method, bag Include following steps:
Bluetooth slave devices generates random code, and uses the encryption key preset that random code is encrypted to ciphertext;Meanwhile, bluetooth Calculate this login password from equipment according to random code, wait that bluetooth master connects;
Bluetooth master connects Bluetooth slave devices;It is close that described bluetooth master presets the encryption identical with Bluetooth slave devices Key;
Bluetooth slave devices sends random code ciphertext to bluetooth master;
Bluetooth master uses encryption key decryption to go out random code, calculates this login password according to random code, and uses institute State login password and access Bluetooth slave devices;
The login password that bluetooth master is sent by Bluetooth slave devices is verified, if correctly, then sends to login successfully and answers Answer, it is allowed to bluetooth master accesses, otherwise send login failure response and disconnect.
In technical scheme, Bluetooth slave devices generate the equal root of random code, Bluetooth slave devices and bluetooth master Calculate login password according to random code, carry out the checking of identity, owing to system generates unpredictability and the randomness of random code, protect The login password having demonstrate,proved each use will not be identical value, it is not easy to is cracked, improves safety.
Further, described encryption key is made up of common encryption key and user encryption key.
Further, described ciphertext is calculated generated by random code and encryption key.
Further, described login password is generated by described random code and described user encryption cipher key calculation.
Further, described user encryption key can be revised after bluetooth master logins successfully.
In technical scheme, the random code that Bluetooth slave devices generates is to be encrypted to ciphertext to mail to bluetooth master, Owing to random code is by encryption at space propagation, too increase the difficulty cracked, improve safety.
In technical scheme, after user encryption cipher key change, due to encryption key and login password all and user Encryption key is correlated with, so also can change simultaneously, equally increases the difficulty of password cracking, improves safety.
Further, described bluetooth security logs in auth method, further comprising the steps of: if in the time arranged In interval, bluetooth master is not logged in, and Bluetooth slave devices disconnects the connection with bluetooth master.
After bluetooth master time-out is not logged in, new random code can be regenerated, wait that bluetooth master reconnects, By the change of random code, it is ensured that password and last time differ, improve safety.
Correspondingly, present invention also offers a kind of bluetooth equipment secure log authentication means, including:
First processing module, generates random code for Bluetooth slave devices, and uses the encryption key preset random code to be added Close one-tenth ciphertext;Meanwhile, Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;
Second processing module, connects Bluetooth slave devices for bluetooth master;Described bluetooth master preset with bluetooth from The encryption key that equipment is identical;
3rd processing module, sends random code ciphertext to bluetooth master for Bluetooth slave devices;
Fourth processing module, uses encryption key decryption to go out random code for bluetooth master, calculates this according to random code Secondary login password, and access Bluetooth slave devices with described login password;
5th processing module, the login password sent bluetooth master for Bluetooth slave devices is verified, if correctly, Then send and login successfully response, it is allowed to bluetooth master accesses, otherwise send login failure response and disconnect.
Further, described bluetooth security logs in authentication means, also includes:
6th processing module, if being not logged in for bluetooth master in the time interval arranged, Bluetooth slave devices disconnects Connection with bluetooth master.
In sum, the beneficial effect of technical solution of the present invention has:
1. before bluetooth master connects every time, Bluetooth slave devices generate random code, Bluetooth slave devices and bluetooth master Calculate login password all in accordance with random code, carry out the checking of identity, owing to system generates the unpredictability of random code with random Property, it is ensured that the login password every time used will not be identical value, it is not easy to is cracked, improves safety.
2. user encryption key allows amendment, owing to encryption key is all relevant with user encryption key with login password, institute Also can change simultaneously, equally increase the difficulty of password cracking, improve safety.
Accompanying drawing explanation
Fig. 1 is a kind of bluetooth equipment secure log auth method flow chart of steps of the embodiment of the present invention.
Fig. 2 is a kind of bluetooth equipment secure log authentication means structure chart of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
Bluetooth (Bluetooth): be a kind of wireless technology standard, can realize fixing equipment, mobile device and building individual Short-range data exchange between the net of territory.When Bluetooth technology specifies to carry out bluetooth communication between every a pair equipment, it is necessary to one is Main equipment, another is from equipment, just can communicate, during communication, it is necessary to made a look up by main equipment, initiates login authentication, tests After demonstrate,proving successfully, both sides get final product transceiving data.One equipment possessing blue tooth communication function, can switch between two roles, flat In time, be operated in from equipment mode, waits that other main equipment connects, and when needing, is converted to main equipment pattern, sends out to miscellaneous equipment Play calling.When one bluetooth equipment initiates calling with holotype, it is to be appreciated that the Bluetooth address of the other side, the information such as login password, After login authentication completes, both sides can carry out data access or transmission operation.
Such as Fig. 1, it is a kind of bluetooth equipment secure log auth method flow chart of steps of the embodiment of the present invention, including Following steps:
Step 1, Bluetooth slave devices generates random code, and uses the encryption key preset that random code is encrypted to ciphertext;With Time, Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;
The bluetooth equipment secure log auth method of the present invention, when bluetooth master is not connected with Bluetooth slave devices Waiting, Bluetooth slave devices first carries out the relevant preparation of this connectivity verification and processes, and including generating random code, enters the random code generated Row is encrypted and calculates this login password according to random code, in order to carry out follow-up relevant authentication behaviour after bluetooth master connects Make.
First, the random code described in technical scheme is made up of upper and lower case letter digital, English mixing Regular length 8 byte random code (RAND), the producing method of random code be the timer internal that carries of use equipment and date/time Between stamp mixing as the seed of random code, use software function to produce pseudo noise code.Although there is repetition in this pseudo noise code Probability, but produced random code is fixed by intervalometer and date/time stamp, is unpredictable, and it is random Property and safety are also assurable, and this random code is that the generation of bluetooth equipment login password provides operating basis.
Secondly, for ensureing random code safety during being sent to bluetooth master, it is necessary to random code is added Close operation, the computing using AES that plaintext random code and key carry out complexity generates the ciphertext data of a string random code Stream, and the emphasis in AES is exactly encryption key (PRIVATE_KEY), once encryption key is cracked, and will result in bright The leakage of literary composition random code.At present conventional AES mainly have symmetric TEA AES, symmetric DES, IDE or The AESs etc. such as AES.
The bluetooth security of the present invention logs in auth method, and encryption key is just to preset bluetooth equipment dispatches from the factory when In a device, it is made up of common encryption key (PUBLIC_KEY) and user encryption key (USER_KEY) two parts, with Ensure its complexity and safety.Wherein, common encryption key is usually the most revisable fixed value, and user encryption key is can With the on-fixed value of amendment, final encryption key is to be advised through certain algorithm by common encryption key and user encryption key Then calculate and draw.
Such as, in the embodiment using symmetric TEA AES, the length of its encryption key is 16 fixing words Joint (i.e. 128bit) cannot change, and its value is to be calculated by following algorithmic rule by common encryption key and user encryption key Go out: PRIVATE_KEY=(USER_KEY)0-3(PUBLIC_KEY)0-3(USER_KEY)4-7(PUBLIC_KEY)4-7.That is: 16 words The encryption key of joint is by the 0-3 byte of user encryption key, the 0-3 byte of common encryption key, the 4-7 of user encryption key Byte, these four parts of 4-7 byte of common encryption key are spliced successively.In the particular embodiment, if public encryption Key (PUBLIC_KEY)=" E&nMV!78 ", user encryption key (USER_KEY)=" 12345678 ", according to above-mentioned algorithm Encryption key (PRIVATE_KEY)=" 1234E&nM5678V that rule calculates!78”.Certainly, the algorithm of above-mentioned encryption key Rule is the most unique, it is also possible to use more complicated algorithmic rule to generate encryption key according to the requirement of safety.
Again, Bluetooth slave devices needs to calculate and generates this login password, in order to log in bluetooth master requests verification Comparing the when of password, the login password only held at bluetooth master is consistent with the login password of Bluetooth slave devices Time, ability Successful login Bluetooth slave devices, otherwise will can not access and revise the information of Bluetooth slave devices.Technical solution of the present invention In login password be to be calculated by random code (RAND) and user encryption key (USER_KEY) to generate.
Such as, in a specific embodiment, the login password (LOGIN_PWD) of bluetooth is by upper and lower case letter and blockette The character string composition of regular length 8 byte become, its rule generated is:
LOGIN_PWD=(RAND) 1-6+ check value (2 byte)
That is: the login password LOGIN_PWD of a length of 8 bytes is equal to the 1-6 byte of random code (RAND) and 2 byte lengths Check value splicing result.Wherein, check value 2 byte character string, is by the 0-7 byte of user encryption key (USER_KEY) The byte hexadecimal that after merging with the 0-7 byte of random code (RAND), the character string not-carry of 16 bytes adds up and obtains Number, is reconverted into 2 byte characters, and as obtained hexadecimal number 0x3F, then check value is " 3F ".
For example, it is assumed that user encryption key (USER_KEY) is: " 12345678 ", generating random code (RAND) is: " A9V5xb92 ", then the character string after merging is " 12345678A9V5xb92 ", tires out with the character string not-carry after this merging The byte hexadecimal number 0xEE added and obtain, then this hexadecimal is converted to 2 byte characters ' E ' ' E ', i.e. school Testing value is " EE ", and the login password LOGIN_PWD finally obtaining 8 bytes is " A9V5xbEE ".
Wherein not-carry is cumulative and calculating process is:
First, hexadecimal number character string " 12345678A9V5xb92 " being converted to ASCII character is 0x31 0x32 0x33 0x34 0x35 0x36 0x37 0x38 0x41 0x39 0x56 0x35 0x78 0x62 0x39 0x32
Secondly, calculate cumulative and calculate such as: 0x31+0x32+0x33+0x34+0x35+0x36+0x37+0x38+0x41+ 0x39+0x56+0x35+0x78+0x62+0x39+0x32=0x3EE
Finally, the least-significant byte taking cumulative sum obtains a byte hexadecimal number 0xEE, then this hexadecimal is converted to 2 byte characters ' E ' ' E ', are " EE ".
Step 2, bluetooth master connects Bluetooth slave devices;Described bluetooth master presets add identical with Bluetooth slave devices Decryption key;
In technical scheme, in order to ensure the random code ciphertext that bluetooth master can send according to Bluetooth slave devices It is correctly decoded out random code in plain text, is necessary for being preset to the encryption key (PRIVATE_KEY) of bluetooth master when dispatching from the factory Consistent with the encryption key of Bluetooth slave devices, i.e. common encryption key (PUBLIC_KEY) and user encryption key (USER_KEY) All consistent with what Bluetooth slave devices was preset.
Step 3, Bluetooth slave devices sends random code ciphertext to bluetooth master;
Step 4, bluetooth master uses encryption key decryption to go out random code, calculates this login password according to random code, And access Bluetooth slave devices with described login password;
Bluetooth master is after receiving the random code ciphertext that Bluetooth slave devices sends, and first, uses and Bluetooth slave devices Identical computational algorithm, calculates encryption with common encryption key (PUBLIC_KEY) and user encryption key (USER_KEY) close Key (PRIVATE_KEY);Secondly, then with encryption key (PRIVATE_KEY), random code ciphertext is decrypted, obtains random code In plain text;Again, use the computational algorithm identical with Bluetooth slave devices, with random code (RAND) and user encryption key (USER_ KEY), this login password is calculated;Finally, bluetooth master login password request Bluetooth slave devices carries out login authentication.
Step 5, the login password that bluetooth master is sent by Bluetooth slave devices is verified, if correctly, then sends login Successful respond, it is allowed to bluetooth master accesses, otherwise sends login failure response and disconnects.
Bluetooth slave devices after receiving the logging request of bluetooth master, by bluetooth master ask login password with The login password of local computing is compared, if both are consistent, then certification success, transmission is logined successfully by Bluetooth slave devices should Answering to bluetooth master, and allow bluetooth master to access, can carry out data access between the two, transmission etc. operates;If two Person is inconsistent, then authentification failure, and transmission login failure response to bluetooth master, is simultaneously switched off and bluetooth master by Bluetooth slave devices Connection between equipment.After Bluetooth slave devices disconnects the connection with bluetooth master, random code can be regenerated, and add Close obtain new random code ciphertext and recalculate login password, logging in for the connection of bluetooth master next time and prepare.
In a preferred embodiment, after bluetooth master with Bluetooth slave devices authentication success, the present invention's Technical scheme can also user encryption key (USER_KEY) default to both devices be modified simultaneously.Owing to user adds After decryption key (USER_KEY) changes, will affect encryption key (PRIVATE_KEY) and login password (LOGIN_PWD) also Change simultaneously, the difficulty of password cracking can be increased, improve safety.
In an additional preferred embodiment, if bluetooth master is not logged in the time interval arranged, Bluetooth slave devices Will be switched off the connection with bluetooth master, regenerate random code, and be encrypted and obtain random code ciphertext and recalculate Login password, the connection login for bluetooth master next time is prepared.In this way, new random code is produced, it is ensured that The login password that next time uses will not be identical value, it is not easy to is cracked, improves safety.
The bluetooth equipment secure log auth method of the present invention is described below in detail with a specific embodiment.
In the present embodiment, the common encryption key (PUBLIC_ that bluetooth master is identical with Bluetooth slave devices factory preset KEY) be: " ABCDEFGH ", preset identical user encryption key (USER_KEY) be: " 12345678 ", bluetooth master and Bluetooth slave devices be authenticated connect detailed process be:
Step 1, Bluetooth slave devices generates random code (RAND) " A9V5xb92 ";According to default common encryption key (PUBLIC_KEY) and user encryption key (USER_KEY), calculating encryption key is: " 1234ABCD5678EFGH ", then adopts With symmetrical TEA AES random code is encrypted and obtains 8 byte cryptogram (with hexadecimal representation): 0xe0 0x05 0x60 0x21 0x44 0x09 0xbb 0x28;It is calculated according to random code (RAND) and user encryption key (USER_KEY) simultaneously Login password is: " A9V5xbEE ".After completing above-mentioned process, Bluetooth slave devices waits that bluetooth master connects;
Step 2, bluetooth master connects Bluetooth slave devices;
Step 3, Bluetooth slave devices sends random code ciphertext (0xe0 0x05 0x60 0x21 0x44 0x09 0xbb 0x28) give bluetooth master;
Step 4, bluetooth master is according to the common encryption key (PUBLIC_KEY) preset and user encryption key (USER_KEY), calculating encryption key is: " 1234ABCD5678EFGH ", re-uses encryption key and deciphers random code ciphertext Go out random code " A9V5xb92 ", according to random code (RAND) and user encryption key (USER_KEY), use same login close It is " A9V5xbEE " that code computational methods calculate login password, and accesses Bluetooth slave devices with described login password;
Step 5, the login password " A9V5xbEE " that bluetooth master is sent by Bluetooth slave devices is verified, confirms and this The login password that ground calculates is consistent, then send and login successfully response, it is allowed to bluetooth master accesses.
Such as Fig. 2, it is a kind of bluetooth equipment secure log authentication means structure chart of the embodiment of the present invention, including:
First processing module, generates random code for Bluetooth slave devices, and uses the encryption key preset random code to be added Close one-tenth ciphertext;Meanwhile, Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;
The preparation that present treatment module is relevant before being substantially carried out bluetooth master connectivity verification processes, including generating random code, The random code generated is encrypted and calculates this login password according to random code, in order to connects laggard at bluetooth master Row follow-up relevant authentication operation.
Second processing module, connects Bluetooth slave devices for bluetooth master;Described bluetooth master preset with bluetooth from The encryption key that equipment is identical;
3rd processing module, is sent to bluetooth master for Bluetooth slave devices by the random code ciphertext encrypted;
Fourth processing module, uses encryption key decryption to go out random code for bluetooth master, calculates this according to random code Secondary login password, and access Bluetooth slave devices with described login password;
This module is mainly used in the bluetooth master relevant place after receiving the random code ciphertext that Bluetooth slave devices sends Reason, including: one, use the computational algorithm identical with Bluetooth slave devices, add with common encryption key (PUBLIC_KEY) and user Decryption key (USER_KEY) calculates encryption key (PRIVATE_KEY);Two, then with encryption key (PRIVATE_KEY) to Machine code ciphertext is decrypted, and obtains random code in plain text;Three, use the computational algorithm identical with Bluetooth slave devices, use random code (RAND) and user encryption key (USER_KEY), this login password is calculated;Finally, bluetooth master please with login password Bluetooth slave devices is asked to carry out login authentication.
5th processing module, the login password sent bluetooth master for Bluetooth slave devices is verified, if correctly, Then send and login successfully response, it is allowed to bluetooth master accesses, otherwise send login failure response and disconnect.
In a preferred embodiment, a kind of bluetooth equipment secure log authentication means of the embodiment of the present invention, also wrap Including: the 6th processing module, if being not logged in for bluetooth master in the time interval arranged, Bluetooth slave devices disconnects and bluetooth The connection of main equipment.By increasing present treatment module, do not initiate certification request or certification request mistake for a long time at bluetooth master The when of losing, Bluetooth slave devices can generate new random code, thus changes login password next time, to increase the broken of login password Solve difficulty, improve safety.
Technical scheme is simply explained in detail by above-mentioned detailed description of the invention, the present invention the most only office It is limited to above-described embodiment, every any improvement according to the principle of the invention or replacement, all should be within protection scope of the present invention.

Claims (8)

1. a bluetooth equipment secure log auth method, it is characterised in that comprise the following steps:
Bluetooth slave devices generates random code, and uses the encryption key preset that random code is encrypted to ciphertext;Meanwhile, bluetooth is from setting Calculate this login password for according to random code, wait that bluetooth master connects;
Bluetooth master connects Bluetooth slave devices;Described bluetooth master presets the encryption key identical with Bluetooth slave devices;
Bluetooth slave devices sends random code ciphertext to bluetooth master;
Bluetooth master uses encryption key decryption to go out random code, calculates this login password according to random code, and with described in step on Record cryptographic acess Bluetooth slave devices;
The login password that bluetooth master is sent by Bluetooth slave devices is verified, if correctly, then sends and logins successfully response, permit Permitted bluetooth master to access, otherwise send login failure response and disconnect.
2. bluetooth security as claimed in claim 1 logs in auth method, it is characterised in that described encryption key is by public Encryption key and user encryption key composition.
3. bluetooth security as claimed in claim 1 logs in auth method, it is characterised in that described ciphertext by random code and Encryption key calculates and generates.
4. bluetooth security as claimed in claim 1 logs in auth method, it is characterised in that described login password is by described Random code and described user encryption cipher key calculation generate.
5. the bluetooth security as described in claim 1-4 logs in auth method, it is characterised in that described user encryption key Can revise after bluetooth master logins successfully.
6. bluetooth security as claimed in claim 5 logs in auth method, it is characterised in that further comprising the steps of: if In the time interval arranged, bluetooth master is not logged in, and Bluetooth slave devices disconnects the connection with bluetooth master.
7. a bluetooth equipment secure log authentication means, it is characterised in that including:
First processing module, generates random code for Bluetooth slave devices, and uses the encryption key preset random code to be encrypted to Ciphertext;Meanwhile, Bluetooth slave devices calculates this login password according to random code, waits that bluetooth master connects;
Second processing module, connects Bluetooth slave devices for bluetooth master;Described bluetooth master is preset and Bluetooth slave devices Identical encryption key;
3rd processing module, sends random code ciphertext to bluetooth master for Bluetooth slave devices;
Fourth processing module, uses encryption key decryption to go out random code for bluetooth master, calculates this according to random code and step on Record password, and access Bluetooth slave devices with described login password;
5th processing module, the login password sent bluetooth master for Bluetooth slave devices is verified, if correctly, then sends out Send and login successfully response, it is allowed to bluetooth master accesses, otherwise send login failure response and disconnect.
8. bluetooth security as claimed in claim 7 logs in authentication means, it is characterised in that also include:
6th processing module, if being not logged in for bluetooth master in the time interval arranged, Bluetooth slave devices disconnects with blue The connection of tooth main equipment.
CN201610519831.9A 2016-07-04 2016-07-04 Bluetooth equipment secure log auth method and device Pending CN106209811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610519831.9A CN106209811A (en) 2016-07-04 2016-07-04 Bluetooth equipment secure log auth method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610519831.9A CN106209811A (en) 2016-07-04 2016-07-04 Bluetooth equipment secure log auth method and device

Publications (1)

Publication Number Publication Date
CN106209811A true CN106209811A (en) 2016-12-07

Family

ID=57466097

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610519831.9A Pending CN106209811A (en) 2016-07-04 2016-07-04 Bluetooth equipment secure log auth method and device

Country Status (1)

Country Link
CN (1) CN106209811A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197346A (en) * 2017-05-27 2017-09-22 深圳Tcl新技术有限公司 Television terminal and bluetooth equipment return even method and computer-readable recording medium
CN107708098A (en) * 2017-10-12 2018-02-16 重庆云停智连科技有限公司 A kind of personal identification method based on Bluetooth communication
CN108521645A (en) * 2018-03-26 2018-09-11 上海康斐信息技术有限公司 A kind of auth method, system and control system based on identifying code
CN109515353A (en) * 2017-09-18 2019-03-26 上海汽车集团股份有限公司 A kind of cognitive method and system of low-power consumption
CN113038444A (en) * 2021-03-25 2021-06-25 支付宝(杭州)信息技术有限公司 Method and device for generating application layer key
CN113141604A (en) * 2021-04-27 2021-07-20 河北爱其科技有限公司 Bluetooth safety communication system
WO2021259015A1 (en) * 2020-06-24 2021-12-30 广州汽车集团股份有限公司 Method for connecting bluetooth key to vehicle, vehicle bluetooth system, and bluetooth key
CN114697020A (en) * 2022-03-17 2022-07-01 浙江中广电器集团股份有限公司 Encryption control method of electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101067358A (en) * 2007-03-20 2007-11-07 姜君凯 Trick lock mechanism
CN103593899A (en) * 2013-11-01 2014-02-19 华侨大学 Anonymous group voting method based on bluetooth
CN103716794A (en) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 Two-way safety verification method and system based on portable device
CN103826221A (en) * 2013-12-31 2014-05-28 广东岭南通股份有限公司 Bluetooth based encryption communication method, and correlation systems and methods
CN104631961A (en) * 2014-02-17 2015-05-20 袁磊 Dynamic password electronic lock system in which password changes according to random codes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101067358A (en) * 2007-03-20 2007-11-07 姜君凯 Trick lock mechanism
CN103593899A (en) * 2013-11-01 2014-02-19 华侨大学 Anonymous group voting method based on bluetooth
CN103716794A (en) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 Two-way safety verification method and system based on portable device
CN103826221A (en) * 2013-12-31 2014-05-28 广东岭南通股份有限公司 Bluetooth based encryption communication method, and correlation systems and methods
CN104631961A (en) * 2014-02-17 2015-05-20 袁磊 Dynamic password electronic lock system in which password changes according to random codes

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197346A (en) * 2017-05-27 2017-09-22 深圳Tcl新技术有限公司 Television terminal and bluetooth equipment return even method and computer-readable recording medium
CN109515353A (en) * 2017-09-18 2019-03-26 上海汽车集团股份有限公司 A kind of cognitive method and system of low-power consumption
CN109515353B (en) * 2017-09-18 2022-02-25 上海汽车集团股份有限公司 Sensing method and system with low power consumption
CN107708098A (en) * 2017-10-12 2018-02-16 重庆云停智连科技有限公司 A kind of personal identification method based on Bluetooth communication
CN108521645A (en) * 2018-03-26 2018-09-11 上海康斐信息技术有限公司 A kind of auth method, system and control system based on identifying code
WO2021259015A1 (en) * 2020-06-24 2021-12-30 广州汽车集团股份有限公司 Method for connecting bluetooth key to vehicle, vehicle bluetooth system, and bluetooth key
CN113920615A (en) * 2020-06-24 2022-01-11 广州汽车集团股份有限公司 Method for connecting Bluetooth key with vehicle, vehicle Bluetooth system and Bluetooth key
CN113038444A (en) * 2021-03-25 2021-06-25 支付宝(杭州)信息技术有限公司 Method and device for generating application layer key
CN113038444B (en) * 2021-03-25 2022-07-19 支付宝(杭州)信息技术有限公司 Method and device for generating application layer key
CN113141604A (en) * 2021-04-27 2021-07-20 河北爱其科技有限公司 Bluetooth safety communication system
CN114697020A (en) * 2022-03-17 2022-07-01 浙江中广电器集团股份有限公司 Encryption control method of electronic equipment

Similar Documents

Publication Publication Date Title
CN106209811A (en) Bluetooth equipment secure log auth method and device
CN102685749B (en) Wireless safety authentication method orienting to mobile terminal
CN104917741B (en) A kind of plain text document public network secure transmission system based on USBKEY
TW201812630A (en) Block chain identity system
CN111783068B (en) Device authentication method, system, electronic device and storage medium
JP2016502377A (en) How to provide safety using safety calculations
JP2012530311A5 (en)
CN105873031A (en) Authentication and key negotiation method of distributed unmanned aerial vehicle based on trusted platform
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN109756893A (en) A kind of intelligent perception Internet of Things anonymous authentication method based on chaotic maps
CN106060073B (en) Channel key machinery of consultation
CN104202299A (en) System and method of identity authentication based on Bluetooth
CN109951513A (en) Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN108632042A (en) A kind of class AKA identity authorization systems and method based on pool of symmetric keys
WO2023174038A9 (en) Data transmission method and related device
CN106452763B (en) One kind using cipher key method by remote dummy USB device
CN110493162A (en) Identity identifying method and system based on wearable device
CN103916363A (en) Communication security management method and system for encryption machine
CN106792700A (en) The method for building up and system of a kind of secure communication environment of wearable device
CN106712939A (en) Offline key transmission method and device
CN107566114A (en) A kind of method of equipment encryption and transmission encryption in cloud Internet of Things platform
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN105099671B (en) A kind of identity hides and non-extensible safe authentication key agreement method
CN106789845A (en) A kind of method of network data security transmission
CN203859823U (en) Quantum encrypted video conference terminal and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161207

RJ01 Rejection of invention patent application after publication