CN107094036A - A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication - Google Patents

A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication Download PDF

Info

Publication number
CN107094036A
CN107094036A CN201710272390.1A CN201710272390A CN107094036A CN 107094036 A CN107094036 A CN 107094036A CN 201710272390 A CN201710272390 A CN 201710272390A CN 107094036 A CN107094036 A CN 107094036A
Authority
CN
China
Prior art keywords
ciphertext
key
bluetooth terminal
bluetooth
cipher key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710272390.1A
Other languages
Chinese (zh)
Inventor
唐健
陈毅林
黄忠明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kemanda Intelligent Management Science & Technology Co Ltd
Original Assignee
Shenzhen Kemanda Intelligent Management Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kemanda Intelligent Management Science & Technology Co Ltd filed Critical Shenzhen Kemanda Intelligent Management Science & Technology Co Ltd
Priority to CN201710272390.1A priority Critical patent/CN107094036A/en
Publication of CN107094036A publication Critical patent/CN107094036A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/70Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of cipher key processing method and Bluetooth terminal based on bluetooth communication, it is related to Bluetooth technology field, the problem of security for solving prior art Bluetooth data transfer is low.Present invention method includes:Target cipher key is encrypted using first key for first Bluetooth terminal, is obtained the first ciphertext and is sent to the second Bluetooth terminal;The ciphertext of ciphertext first is encrypted using the second key for the Bluetooth terminal of ciphertext second, obtains the second ciphertext, and send to the Bluetooth terminal of ciphertext first;The ciphertext of ciphertext second is decrypted using ciphertext first key for the Bluetooth terminal of ciphertext first, obtains the 3rd ciphertext, and send to the Bluetooth terminal of ciphertext second;The ciphertext of ciphertext the 3rd is decrypted using the key of ciphertext second for the Bluetooth terminal of ciphertext second, obtains ciphertext target cipher key.

Description

A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication
Technical field
The present invention relates to Bluetooth technology field, and in particular to a kind of cipher key processing method and bluetooth based on bluetooth communication are whole End.
Background technology
Bluetooth technology is a kind of wireless transmission method by carrier frequency of 2.4GHz, and the application of Bluetooth technology is increasingly wide It is general, such as bluetooth earphone, bluetooth keyboard, bluetooth mouse and bluetooth cellular phone.Bluetooth equipment have small volume, it is low in energy consumption, to hardware Less demanding, transmission speed is fast and many advantages such as wide coverage because be widely used in point-to-point transmission mode and Network topology pattern.
Because Bluetooth communication belongs to wireless transmission method, the packet transmitted every time can be exposed, and easily be intercepted, no Possesses more preferable confidentiality as cable transmission.In order to ensure the security of bluetooth data transmission, host device and bluetooth equipment Before carrying out data transmission, key agreement can be carried out first, that is to say, that main frame first can send close to the bluetooth equipment chosen The data for needing to transmit can be encrypted by key using key afterwards, and the ciphertext after encryption is sent to the bluetooth equipment chosen, blue Ciphertext is decrypted according to the key got for tooth equipment, obtains in plain text.
But, if key is intercepted, then the ciphertext that attacker just can be subsequently truncated to using secret key decryption, threaten The security of Bluetooth data transfer.
The content of the invention
The present invention provides a kind of cipher key processing method and Bluetooth terminal based on bluetooth communication, blue for solving prior art The problem of security of tooth data transfer is relatively low.
The one side of the embodiment of the present invention provides a kind of cipher key processing method based on bluetooth communication, including:
Target cipher key is encrypted using first key for first Bluetooth terminal, is obtained the first ciphertext and is sent to the second indigo plant Tooth terminal;
First ciphertext is encrypted using the second key for second Bluetooth terminal, obtains the second ciphertext, concurrently Deliver to first Bluetooth terminal;
Second ciphertext is decrypted using the first key for first Bluetooth terminal, obtains the 3rd ciphertext, And send to second Bluetooth terminal;
The 3rd ciphertext is decrypted using second key for second Bluetooth terminal, obtains the target close Key.
With reference in a first aspect, in the first possible implementation of first aspect, the first Bluetooth terminal utilizes first Key target cipher key is encrypted including:
First Bluetooth terminal is segmented to the target cipher key, obtains cipher key sections;
Cipher key sections each described are encrypted respectively using the first key for first Bluetooth terminal, obtain institute State the first ciphertext.
With reference to the first possible implementation of first aspect or first aspect, second in first aspect is possible In implementation, the AES and the decipherment algorithm include XOR algorithm.
With reference to second of possible reality of the first possible implementation and first aspect of first aspect, first aspect Any one possible implementation in existing mode, in the third possible implementation of first aspect, in the first bluetooth Before target cipher key is encrypted using first key for terminal, methods described also includes:
First Bluetooth terminal generates the target cipher key using random algorithm.
The second aspect of the embodiment of the present invention provides a kind of Bluetooth terminal, including:
Encrypting module, for target cipher key to be encrypted using first key, obtains the first ciphertext;
First sending module, for first ciphertext to be sent to the second Bluetooth terminal;
Receiving module, for receiving the second ciphertext that second Bluetooth terminal is returned, second ciphertext is described the Two Bluetooth terminals are encrypted what is obtained using the second key to first ciphertext;
Deciphering module, for being decrypted using the described first close second ciphertext of stating, obtains the 3rd ciphertext;
Second sending module, for the 3rd ciphertext to be sent to second Bluetooth terminal, to cause described second The 3rd ciphertext is decrypted using second key for Bluetooth terminal, obtains the target cipher key.
With reference to second aspect, in the first possible implementation of second aspect, the encrypting module includes:
Segmenting unit, for being segmented to the target cipher key, obtains cipher key sections;
Ciphering unit, for cipher key sections each described to be encrypted respectively using the first key, obtains described First ciphertext.
With reference to the first possible implementation of second aspect or second aspect, second in second aspect may Implementation in, the AES and the decipherment algorithm include XOR algorithm.
With reference to second of possible reality of the first possible implementation and second aspect of second aspect, second aspect Any one possible implementation in existing mode, in the third possible implementation of second aspect, the bluetooth is whole End also includes:
Key production module, for generating the target cipher key using random algorithm.
The third aspect of the embodiment of the present invention provides a kind of Bluetooth terminal, including:
First receiving module, for receiving the first ciphertext that the first Bluetooth terminal is sent, first ciphertext is described the One Bluetooth terminal is encrypted what is obtained using first key to target cipher key;
Encrypting module, for first ciphertext to be encrypted using the second key, obtains the second ciphertext;
Sending module, for second ciphertext to be sent to first Bluetooth terminal;
Second receiving module, for receiving the 3rd ciphertext that first Bluetooth terminal is returned, the 3rd ciphertext is institute State the first Bluetooth terminal and what is obtained is decrypted to second ciphertext using the first key;
Deciphering module, for the 3rd ciphertext to be decrypted using second key, obtains the target cipher key.
With reference to the third aspect, in the first possible implementation of the third aspect, the AES and the solution Close algorithm includes XOR algorithm.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
In the cipher key processing method that the present invention is provided, the first Bluetooth terminal is carried out first with first key to target cipher key Encryption, obtains the first ciphertext and sends to the second Bluetooth terminal, second Bluetooth terminal is using the second key to described first Ciphertext is encrypted, and obtains the second ciphertext, and sends to first Bluetooth terminal, and first Bluetooth terminal utilizes described the Second ciphertext is decrypted one key, obtains the 3rd ciphertext, and sends to second Bluetooth terminal, and described afterwards the The 3rd ciphertext is decrypted using second key for two Bluetooth terminals, finally gives the target cipher key, and existing Technology is compared, and target cipher key keeps ciphertext to transmit between the first Bluetooth terminal and the second Bluetooth terminal, therefore improves target The security of key, and then the security of Bluetooth data transfer can be improved.
Brief description of the drawings
Fig. 1 is cipher key processing method one embodiment schematic diagram of the invention based on bluetooth communication;
Fig. 2 is another embodiment schematic diagram of the cipher key processing method of the invention based on bluetooth communication;
Fig. 3 is Bluetooth terminal one embodiment schematic diagram of the present invention;
Fig. 4 is another embodiment schematic diagram of Bluetooth terminal of the present invention;
Fig. 5 is another embodiment schematic diagram of Bluetooth terminal of the present invention.
Embodiment
The embodiments of the invention provide a kind of cipher key processing method and Bluetooth terminal based on bluetooth communication, for improving indigo plant The security of tooth data transfer.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people The every other embodiment that member is obtained under the premise of creative work is not made, should all belong to the model that the present invention is protected Enclose.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing, " The (if present)s such as four " are for distinguishing similar object, without for describing specific order or precedence.It should manage The data that solution is so used can be exchanged in the appropriate case, so that the embodiments described herein can be with except illustrating herein Or the order beyond the content of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that Covering is non-exclusive to be included, for example, containing process, method, system, product or the equipment of series of steps or unit need not limit In those steps or unit for clearly listing, but may include not list clearly or for these processes, method, production Product or the intrinsic other steps of equipment or unit.
For ease of understanding, the idiographic flow in the embodiment of the present invention is described below, referring to Fig. 1, the present invention is real Applying cipher key processing method one embodiment based on bluetooth communication in example includes:
101st, target cipher key is encrypted using first key for the first Bluetooth terminal, obtains the first ciphertext;
First Bluetooth terminal produces first key Ka and target cipher key Km, the first Bluetooth terminal and the second Bluetooth terminal in advance When carrying out bluetooth communication, target cipher key Km is encrypted first with first key Ka for the first Bluetooth terminal, obtains first close Literary C1=Eka(Km)。
102nd, the first Bluetooth terminal sends the first ciphertext to the second Bluetooth terminal;
First Bluetooth terminal is obtained after the first ciphertext C1, can according to bluetooth communication agreement by the first ciphertext C1 send to Second Bluetooth terminal.
103rd, the first ciphertext is encrypted using the second key for the second Bluetooth terminal, obtains the second ciphertext;
Second Bluetooth terminal can produce the second key Kb in advance, and the second Bluetooth terminal is received after the first ciphertext C1, The first ciphertext C1 can be encrypted using the second key Kb, obtain the second ciphertext C2=Ekb(C1)=Ekb (Eka (Km)).
104th, the second Bluetooth terminal sends the second ciphertext to the first Bluetooth terminal;
Second Bluetooth terminal is obtained after the second ciphertext C2, can be sent the second ciphertext C2 to the first Bluetooth terminal.
105th, the second ciphertext is decrypted using first key for the first Bluetooth terminal, obtains the 3rd ciphertext;
First Bluetooth terminal can receive the second ciphertext C2, and the second ciphertext C2 is solved using first key Ka It is close, obtain the 3rd ciphertext C3=Dka(C2)=Dka (Ekb (C1))=Dka (Ekb (Eka (Km))).
106th, the first Bluetooth terminal sends the 3rd ciphertext to the second Bluetooth terminal;
First Bluetooth terminal is obtained after the 3rd ciphertext C3, can be sent the 3rd ciphertext C3 to the second Bluetooth terminal.
107th, the 3rd ciphertext is decrypted using the second key for the second Bluetooth terminal, obtains target cipher key.
Second Bluetooth terminal can receive the 3rd ciphertext C3, the 3rd ciphertext C3 can be entered using the second key Kb afterwards Row decryption, Km'=Dkb (C3)=Dkb (Dka (C2))=Dkb (Dka (Ekb (C1)))=Dkb (Dka (Ekb (Eka (Km)))) Now Km'=Km, also just obtains target cipher key Km.
In cipher key processing method provided in an embodiment of the present invention, the first Bluetooth terminal is close to target first with first key Key is encrypted, and obtains the first ciphertext and sends to the second Bluetooth terminal, the second Bluetooth terminal is close to first using the second key Text is encrypted, and obtains the second ciphertext, and sends to the first Bluetooth terminal, and the first Bluetooth terminal is close to second using first key Text is decrypted, and obtains the 3rd ciphertext, and sends to the second Bluetooth terminal, afterwards the second Bluetooth terminal using the second key to the Three ciphertexts are decrypted, and finally give target cipher key, compared to the prior art, and target cipher key is blue in the first Bluetooth terminal and second Ciphertext transmission is kept between tooth terminal, therefore improves the security of target cipher key, and then Bluetooth data transfer can be improved Security.
Referring to Fig. 2, another embodiment of the cipher key processing method based on bluetooth communication includes in the embodiment of the present invention:
201st, the first Bluetooth terminal generates target cipher key using random algorithm;
Before the first Bluetooth terminal and the second Bluetooth terminal carry out data transmission, the first Bluetooth terminal can be using at random Algorithm generates target cipher key Km, is compared with using fixed target cipher key, can be improved using random algorithm generation target cipher key The security of cipher key agreement process.By way of example it is assumed that the target cipher key Km of generation is 8 bytes.
202nd, the first Bluetooth terminal is segmented to target cipher key, obtains cipher key sections;
After first Bluetooth terminal generation target cipher key Km, target cipher key Km can be segmented, obtain cipher key sections, made For citing, target cipher key Km can be divided into two sections, every section of 4 bytes.
203rd, each cipher key sections is encrypted respectively using first key for the first Bluetooth terminal, obtains the first ciphertext;
First Bluetooth terminal can generate first key Ka using random algorithm, be compared with using fixed first key, The security in cipher key transmitting process can be improved using random algorithm generation first key.Using first key Ka respectively to every One cipher key sections is encrypted, and can obtain the first ciphertext.The embodiment of the present invention can be carried out using XOR algorithm to cipher key sections Encryption, is encrypted to first key section using first key Ka and obtains the first ciphertext section C.It can obtain another according to the method described above The first ciphertext section of a part, the first complete ciphertext of composition.
204th, the first Bluetooth terminal sends the first ciphertext to the second Bluetooth terminal;
First Bluetooth terminal is obtained after the first ciphertext, can be sent the first ciphertext to the second Bluetooth terminal.
205th, the first ciphertext is encrypted using the second key for the second Bluetooth terminal, obtains the second ciphertext;
Second Bluetooth terminal can generate the second key using random algorithm, be compared with using the second fixed key, profit The security in cipher key transmitting process can be improved by generating the second key with random algorithm.It is close that second Bluetooth terminal receives first After text, it is possible to use two ciphertexts section of the first ciphertext is encrypted the second key respectively, obtains the second ciphertext.
206th, the second Bluetooth terminal sends the second ciphertext to the first Bluetooth terminal;
Second Bluetooth terminal is obtained after the second ciphertext, can be sent the second ciphertext to the first Bluetooth terminal.
207th, the second ciphertext is decrypted using first key for the first Bluetooth terminal, obtains the 3rd ciphertext;
First Bluetooth terminal is received after the second ciphertext, it is possible to use two ciphertexts section of the first key to the second ciphertext It is decrypted respectively, obtains the 3rd ciphertext.
208th, the first Bluetooth terminal sends the 3rd ciphertext to the second Bluetooth terminal;
First Bluetooth terminal is obtained after the 3rd ciphertext, can be sent the 3rd ciphertext to the second Bluetooth terminal.
209th, the 3rd ciphertext is decrypted using the second key for the second Bluetooth terminal, obtains target cipher key.
Second Bluetooth terminal is received after the 3rd ciphertext, it is possible to use the second key is close to two of the 3rd ciphertext respectively Literary section is decrypted, and obtains target cipher key.
The algorithms for encryption and decryption used in embodiments of the present invention can include XOR algorithm, specifically, as an example, AES can be:
Wherein M [i] and K [i] refer to M i-th of byte and Ka i-th of byte.
Assuming that M is first key section, and M=[0x00,0x10,0x20,0x30], K are first key, and K=[0x00, 0x02,0x01,0x03,0x73,0x59,0x42,0x3A], then the first ciphertext section C=[0x73,0x52,0x79,0x0A].
Accordingly, decipherment algorithm can be:
Due to K=[0x00,0x02,0x01,0x03,0x73,0x59,0x42,0x3A], the first ciphertext section C=[0x73, 0x52,0x79,0x0A], then M '=[0x00,0x10,0x20,0x30]=M.
In actual use, other algorithms for encryption and decryption can also be used, the algorithm that the present invention is provided is only as one kind Simple and effective algorithm embodiment, rather than the restriction to algorithm.
The cipher key processing method based on bluetooth communication in the embodiment of the present invention is described above, below to the present invention Bluetooth terminal in embodiment is described.
Referring to Fig. 3, one embodiment of Bluetooth terminal 3 includes in the embodiment of the present invention:
Encrypting module 301, for target cipher key to be encrypted using first key, obtains the first ciphertext;
First sending module 302, for the first ciphertext to be sent to the second Bluetooth terminal;
Receiving module 303, for receiving the second ciphertext that the second Bluetooth terminal is returned, the second ciphertext is the second Bluetooth terminal What is obtained is encrypted to the first ciphertext using the second key;
Deciphering module 304, for being decrypted using the first close second ciphertext of stating, obtains the 3rd ciphertext;
Second sending module 305, for the 3rd ciphertext to be sent to the second Bluetooth terminal, to cause the second Bluetooth terminal profit The 3rd ciphertext is decrypted with the second key, target cipher key is obtained.
It is preferred that, referring to Fig. 4, another embodiment of Bluetooth terminal includes in the embodiment of the present invention:
Encrypting module 401, for target cipher key to be encrypted using first key, obtains the first ciphertext;
First sending module 402, for the first ciphertext to be sent to the second Bluetooth terminal;
Receiving module 403, for receiving the second ciphertext that the second Bluetooth terminal is returned, the second ciphertext is the second Bluetooth terminal What is obtained is encrypted to the first ciphertext using the second key;
Deciphering module 404, for being decrypted using the first close second ciphertext of stating, obtains the 3rd ciphertext;
Second sending module 405, for the 3rd ciphertext to be sent to the second Bluetooth terminal, to cause the second Bluetooth terminal profit The 3rd ciphertext is decrypted with the second key, target cipher key is obtained.
Bluetooth terminal also includes:
Key production module 406, for generating target cipher key using random algorithm.
Encrypting module 401 includes:
Segmenting unit 4011, for being segmented to target cipher key, obtains cipher key sections;
Ciphering unit 4012, for each cipher key sections to be encrypted respectively using first key, obtains the first ciphertext.
Referring to Fig. 5, another embodiment of Bluetooth terminal includes in the embodiment of the present invention:
First receiving module 501, for receiving the first ciphertext that the first Bluetooth terminal is sent, the first ciphertext is the first bluetooth Terminal is encrypted what is obtained using first key to target cipher key;
Encrypting module 502, for the first ciphertext to be encrypted using the second key, obtains the second ciphertext;
Sending module 503, for the second ciphertext to be sent to the first Bluetooth terminal;
Second receiving module 504, for receiving the 3rd ciphertext that the first Bluetooth terminal is returned, the 3rd ciphertext is the first bluetooth Terminal is decrypted what is obtained using first key to the second ciphertext;
Deciphering module 505, for the 3rd ciphertext to be decrypted using the second key, obtains target cipher key.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In described several embodiments, it should be understood that disclosed system, apparatus and method can pass through others Mode is realized.For example, device embodiment described above is only schematical, for example, the division of unit, is only one kind Division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can combine or can To be integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or discussed each other Coupling direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit, Can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be physically separate, be shown as unit Part can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple networks On unit.Some or all of unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If integrated unit is realized using in the form of SFU software functional unit and is used as independent production marketing or in use, can To be stored in a computer read/write memory medium.Based on it is such understand, technical scheme substantially or Saying all or part of the part contributed to prior art or the technical scheme can be embodied in the form of software product Out, the computer software product is stored in a storage medium, including some instructions are to cause a computer equipment (can be personal computer, server, or network equipment etc.) performs all or part of each embodiment method of the invention Step.And foregoing storage medium includes:It is USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random Access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with Jie of store program codes Matter.
More than, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to foregoing reality Example is applied the present invention is described in detail, it will be understood by those within the art that:It still can be to foregoing each Technical scheme described in embodiment is modified, or carries out equivalent substitution to which part technical characteristic;And these are changed Or replace, the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a kind of cipher key processing method based on bluetooth communication, it is characterised in that including:
Target cipher key is encrypted using first key for first Bluetooth terminal, is obtained the first ciphertext and is sent whole to the second bluetooth End;
First ciphertext is encrypted using the second key for second Bluetooth terminal, obtains the second ciphertext, and send extremely First Bluetooth terminal;
Second ciphertext is decrypted using the first key for first Bluetooth terminal, obtains the 3rd ciphertext, concurrently Deliver to second Bluetooth terminal;
The 3rd ciphertext is decrypted using second key for second Bluetooth terminal, obtains the target cipher key.
2. cipher key processing method according to claim 1, it is characterised in that the first Bluetooth terminal is using first key to mesh Mark key be encrypted including:
First Bluetooth terminal is segmented to the target cipher key, obtains cipher key sections;
Cipher key sections each described are encrypted respectively using the first key for first Bluetooth terminal, obtain described One ciphertext.
3. cipher key processing method according to claim 1, it is characterised in that the AES and the decipherment algorithm bag Include XOR algorithm.
4. cipher key processing method according to any one of claim 1 to 3, it is characterised in that in the first Bluetooth terminal profit Before target cipher key is encrypted with first key, methods described also includes:
First Bluetooth terminal generates the target cipher key using random algorithm.
5. a kind of Bluetooth terminal, it is characterised in that including:
Encrypting module, for target cipher key to be encrypted using first key, obtains the first ciphertext;
First sending module, for first ciphertext to be sent to the second Bluetooth terminal;
Receiving module, for receiving the second ciphertext that second Bluetooth terminal is returned, second ciphertext is described second blue Tooth terminal is encrypted what is obtained using the second key to first ciphertext;
Deciphering module, for being decrypted using the described first close second ciphertext of stating, obtains the 3rd ciphertext;
Second sending module, for the 3rd ciphertext to be sent to second Bluetooth terminal, to cause second bluetooth The 3rd ciphertext is decrypted using second key for terminal, obtains the target cipher key.
6. Bluetooth terminal according to claim 5, it is characterised in that the encrypting module includes:
Segmenting unit, for being segmented to the target cipher key, obtains cipher key sections;
Ciphering unit, for cipher key sections each described to be encrypted respectively using the first key, obtains described first Ciphertext.
7. Bluetooth terminal according to claim 5, it is characterised in that the AES and the decipherment algorithm include different Or algorithm.
8. the Bluetooth terminal according to any one of claim 5 to 7, it is characterised in that the Bluetooth terminal also includes:
Key production module, for generating the target cipher key using random algorithm.
9. a kind of Bluetooth terminal, it is characterised in that including:
First receiving module, for receiving the first ciphertext that the first Bluetooth terminal is sent, first ciphertext is described first blue Tooth terminal is encrypted what is obtained using first key to target cipher key;
Encrypting module, for first ciphertext to be encrypted using the second key, obtains the second ciphertext;
Sending module, for second ciphertext to be sent to first Bluetooth terminal;
Second receiving module, for receiving the 3rd ciphertext that first Bluetooth terminal is returned, the 3rd ciphertext is described the One Bluetooth terminal is decrypted what is obtained using the first key to second ciphertext;
Deciphering module, for the 3rd ciphertext to be decrypted using second key, obtains the target cipher key.
10. Bluetooth terminal according to claim 9, it is characterised in that the AES and the decipherment algorithm include XOR algorithm.
CN201710272390.1A 2017-04-24 2017-04-24 A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication Pending CN107094036A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710272390.1A CN107094036A (en) 2017-04-24 2017-04-24 A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710272390.1A CN107094036A (en) 2017-04-24 2017-04-24 A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication

Publications (1)

Publication Number Publication Date
CN107094036A true CN107094036A (en) 2017-08-25

Family

ID=59638333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710272390.1A Pending CN107094036A (en) 2017-04-24 2017-04-24 A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication

Country Status (1)

Country Link
CN (1) CN107094036A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065943A (en) * 2022-08-16 2022-09-16 中航信移动科技有限公司 Image position determination method, medium, and device in weak network scene based on bluetooth
CN115079226A (en) * 2022-08-16 2022-09-20 中航信移动科技有限公司 Display data determination method, medium and device based on multi-source position data
CN116074826A (en) * 2023-03-07 2023-05-05 深圳市好盈科技股份有限公司 Communication data encryption and decryption method and device applied to electric scooter

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070159330A1 (en) * 2005-12-30 2007-07-12 Skyetek, Inc. System and method for implementing virtual RFID tags
CN101807995A (en) * 2010-01-18 2010-08-18 北京天地融科技有限公司 Electronic signature tool supporting wireless communication and processing method thereof for communicating with terminal
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN103457724A (en) * 2012-06-05 2013-12-18 中兴通讯股份有限公司 Method and system for point-to-point data safe transmission
CN104158567A (en) * 2014-07-25 2014-11-19 天地融科技股份有限公司 Pairing method and system and data interaction method and system for Bluetooth equipment
CN105635144A (en) * 2015-12-29 2016-06-01 普奥云信息科技(北京)有限公司 Cloud-platform-server-based data processing method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070159330A1 (en) * 2005-12-30 2007-07-12 Skyetek, Inc. System and method for implementing virtual RFID tags
CN101807995A (en) * 2010-01-18 2010-08-18 北京天地融科技有限公司 Electronic signature tool supporting wireless communication and processing method thereof for communicating with terminal
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN103457724A (en) * 2012-06-05 2013-12-18 中兴通讯股份有限公司 Method and system for point-to-point data safe transmission
CN104158567A (en) * 2014-07-25 2014-11-19 天地融科技股份有限公司 Pairing method and system and data interaction method and system for Bluetooth equipment
CN105635144A (en) * 2015-12-29 2016-06-01 普奥云信息科技(北京)有限公司 Cloud-platform-server-based data processing method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065943A (en) * 2022-08-16 2022-09-16 中航信移动科技有限公司 Image position determination method, medium, and device in weak network scene based on bluetooth
CN115079226A (en) * 2022-08-16 2022-09-20 中航信移动科技有限公司 Display data determination method, medium and device based on multi-source position data
CN116074826A (en) * 2023-03-07 2023-05-05 深圳市好盈科技股份有限公司 Communication data encryption and decryption method and device applied to electric scooter

Similar Documents

Publication Publication Date Title
US6931132B2 (en) Secure wireless local or metropolitan area network and related methods
CN109412794B (en) Quantum key automatic charging method and system suitable for power business
US7817802B2 (en) Cryptographic key management in a communication network
CN105262772A (en) Data transmission method, data transmission system and related apparatus for data transmission method and system
CN101707767B (en) Data transmission method and devices
CN105357218A (en) Router with hardware encryption and decryption function and encryption and decryption method of router
CN109194701B (en) Data processing method and device
CN107094036A (en) A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication
CN110401527A (en) Data encryption, decryption method, device and storage medium
CN104602208B (en) A kind of SMS encryption communication means based on mobile network
CN103458401B (en) A kind of voice encryption communication system and communication means
Diallo et al. A secure authentication scheme for bluetooth connection
CN103384233B (en) A kind of methods, devices and systems for acting on behalf of conversion
KR101760376B1 (en) Terminal and method for providing secure messenger service
CN106416120A (en) Management of cryptographic keys
CN105827601A (en) Data encryption application method and system of mobile device
CN103249035A (en) Wireless sensor network data encryption transmission method
Seo et al. Network and data link layer security for DASH7
CN105450597A (en) Information transmission method and device
CN109474429B (en) Key configuration strategy method facing FC storage encryption gateway
Abbood et al. Intelligent hybrid technique to secure bluetooth communications
CN103780377B (en) A kind of method and system that data are carried out with secrecy processing
US20020144112A1 (en) Method and arrangement for data communication in a cryptographic system containing a plurality of entities
CN215734303U (en) Internet of things system and internet of things safety box
CN108322303A (en) A kind of data transmission method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170825