CN107094036A - A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication - Google Patents
A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication Download PDFInfo
- Publication number
- CN107094036A CN107094036A CN201710272390.1A CN201710272390A CN107094036A CN 107094036 A CN107094036 A CN 107094036A CN 201710272390 A CN201710272390 A CN 201710272390A CN 107094036 A CN107094036 A CN 107094036A
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- key
- bluetooth terminal
- bluetooth
- cipher key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 18
- 238000003672 processing method Methods 0.000 title claims abstract description 18
- 238000000034 method Methods 0.000 claims abstract description 18
- 238000004519 manufacturing process Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 6
- 230000005540 biological transmission Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 241001062009 Indigofera Species 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/70—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of cipher key processing method and Bluetooth terminal based on bluetooth communication, it is related to Bluetooth technology field, the problem of security for solving prior art Bluetooth data transfer is low.Present invention method includes:Target cipher key is encrypted using first key for first Bluetooth terminal, is obtained the first ciphertext and is sent to the second Bluetooth terminal;The ciphertext of ciphertext first is encrypted using the second key for the Bluetooth terminal of ciphertext second, obtains the second ciphertext, and send to the Bluetooth terminal of ciphertext first;The ciphertext of ciphertext second is decrypted using ciphertext first key for the Bluetooth terminal of ciphertext first, obtains the 3rd ciphertext, and send to the Bluetooth terminal of ciphertext second;The ciphertext of ciphertext the 3rd is decrypted using the key of ciphertext second for the Bluetooth terminal of ciphertext second, obtains ciphertext target cipher key.
Description
Technical field
The present invention relates to Bluetooth technology field, and in particular to a kind of cipher key processing method and bluetooth based on bluetooth communication are whole
End.
Background technology
Bluetooth technology is a kind of wireless transmission method by carrier frequency of 2.4GHz, and the application of Bluetooth technology is increasingly wide
It is general, such as bluetooth earphone, bluetooth keyboard, bluetooth mouse and bluetooth cellular phone.Bluetooth equipment have small volume, it is low in energy consumption, to hardware
Less demanding, transmission speed is fast and many advantages such as wide coverage because be widely used in point-to-point transmission mode and
Network topology pattern.
Because Bluetooth communication belongs to wireless transmission method, the packet transmitted every time can be exposed, and easily be intercepted, no
Possesses more preferable confidentiality as cable transmission.In order to ensure the security of bluetooth data transmission, host device and bluetooth equipment
Before carrying out data transmission, key agreement can be carried out first, that is to say, that main frame first can send close to the bluetooth equipment chosen
The data for needing to transmit can be encrypted by key using key afterwards, and the ciphertext after encryption is sent to the bluetooth equipment chosen, blue
Ciphertext is decrypted according to the key got for tooth equipment, obtains in plain text.
But, if key is intercepted, then the ciphertext that attacker just can be subsequently truncated to using secret key decryption, threaten
The security of Bluetooth data transfer.
The content of the invention
The present invention provides a kind of cipher key processing method and Bluetooth terminal based on bluetooth communication, blue for solving prior art
The problem of security of tooth data transfer is relatively low.
The one side of the embodiment of the present invention provides a kind of cipher key processing method based on bluetooth communication, including:
Target cipher key is encrypted using first key for first Bluetooth terminal, is obtained the first ciphertext and is sent to the second indigo plant
Tooth terminal;
First ciphertext is encrypted using the second key for second Bluetooth terminal, obtains the second ciphertext, concurrently
Deliver to first Bluetooth terminal;
Second ciphertext is decrypted using the first key for first Bluetooth terminal, obtains the 3rd ciphertext,
And send to second Bluetooth terminal;
The 3rd ciphertext is decrypted using second key for second Bluetooth terminal, obtains the target close
Key.
With reference in a first aspect, in the first possible implementation of first aspect, the first Bluetooth terminal utilizes first
Key target cipher key is encrypted including:
First Bluetooth terminal is segmented to the target cipher key, obtains cipher key sections;
Cipher key sections each described are encrypted respectively using the first key for first Bluetooth terminal, obtain institute
State the first ciphertext.
With reference to the first possible implementation of first aspect or first aspect, second in first aspect is possible
In implementation, the AES and the decipherment algorithm include XOR algorithm.
With reference to second of possible reality of the first possible implementation and first aspect of first aspect, first aspect
Any one possible implementation in existing mode, in the third possible implementation of first aspect, in the first bluetooth
Before target cipher key is encrypted using first key for terminal, methods described also includes:
First Bluetooth terminal generates the target cipher key using random algorithm.
The second aspect of the embodiment of the present invention provides a kind of Bluetooth terminal, including:
Encrypting module, for target cipher key to be encrypted using first key, obtains the first ciphertext;
First sending module, for first ciphertext to be sent to the second Bluetooth terminal;
Receiving module, for receiving the second ciphertext that second Bluetooth terminal is returned, second ciphertext is described the
Two Bluetooth terminals are encrypted what is obtained using the second key to first ciphertext;
Deciphering module, for being decrypted using the described first close second ciphertext of stating, obtains the 3rd ciphertext;
Second sending module, for the 3rd ciphertext to be sent to second Bluetooth terminal, to cause described second
The 3rd ciphertext is decrypted using second key for Bluetooth terminal, obtains the target cipher key.
With reference to second aspect, in the first possible implementation of second aspect, the encrypting module includes:
Segmenting unit, for being segmented to the target cipher key, obtains cipher key sections;
Ciphering unit, for cipher key sections each described to be encrypted respectively using the first key, obtains described
First ciphertext.
With reference to the first possible implementation of second aspect or second aspect, second in second aspect may
Implementation in, the AES and the decipherment algorithm include XOR algorithm.
With reference to second of possible reality of the first possible implementation and second aspect of second aspect, second aspect
Any one possible implementation in existing mode, in the third possible implementation of second aspect, the bluetooth is whole
End also includes:
Key production module, for generating the target cipher key using random algorithm.
The third aspect of the embodiment of the present invention provides a kind of Bluetooth terminal, including:
First receiving module, for receiving the first ciphertext that the first Bluetooth terminal is sent, first ciphertext is described the
One Bluetooth terminal is encrypted what is obtained using first key to target cipher key;
Encrypting module, for first ciphertext to be encrypted using the second key, obtains the second ciphertext;
Sending module, for second ciphertext to be sent to first Bluetooth terminal;
Second receiving module, for receiving the 3rd ciphertext that first Bluetooth terminal is returned, the 3rd ciphertext is institute
State the first Bluetooth terminal and what is obtained is decrypted to second ciphertext using the first key;
Deciphering module, for the 3rd ciphertext to be decrypted using second key, obtains the target cipher key.
With reference to the third aspect, in the first possible implementation of the third aspect, the AES and the solution
Close algorithm includes XOR algorithm.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
In the cipher key processing method that the present invention is provided, the first Bluetooth terminal is carried out first with first key to target cipher key
Encryption, obtains the first ciphertext and sends to the second Bluetooth terminal, second Bluetooth terminal is using the second key to described first
Ciphertext is encrypted, and obtains the second ciphertext, and sends to first Bluetooth terminal, and first Bluetooth terminal utilizes described the
Second ciphertext is decrypted one key, obtains the 3rd ciphertext, and sends to second Bluetooth terminal, and described afterwards the
The 3rd ciphertext is decrypted using second key for two Bluetooth terminals, finally gives the target cipher key, and existing
Technology is compared, and target cipher key keeps ciphertext to transmit between the first Bluetooth terminal and the second Bluetooth terminal, therefore improves target
The security of key, and then the security of Bluetooth data transfer can be improved.
Brief description of the drawings
Fig. 1 is cipher key processing method one embodiment schematic diagram of the invention based on bluetooth communication;
Fig. 2 is another embodiment schematic diagram of the cipher key processing method of the invention based on bluetooth communication;
Fig. 3 is Bluetooth terminal one embodiment schematic diagram of the present invention;
Fig. 4 is another embodiment schematic diagram of Bluetooth terminal of the present invention;
Fig. 5 is another embodiment schematic diagram of Bluetooth terminal of the present invention.
Embodiment
The embodiments of the invention provide a kind of cipher key processing method and Bluetooth terminal based on bluetooth communication, for improving indigo plant
The security of tooth data transfer.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people
The every other embodiment that member is obtained under the premise of creative work is not made, should all belong to the model that the present invention is protected
Enclose.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing, "
The (if present)s such as four " are for distinguishing similar object, without for describing specific order or precedence.It should manage
The data that solution is so used can be exchanged in the appropriate case, so that the embodiments described herein can be with except illustrating herein
Or the order beyond the content of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that
Covering is non-exclusive to be included, for example, containing process, method, system, product or the equipment of series of steps or unit need not limit
In those steps or unit for clearly listing, but may include not list clearly or for these processes, method, production
Product or the intrinsic other steps of equipment or unit.
For ease of understanding, the idiographic flow in the embodiment of the present invention is described below, referring to Fig. 1, the present invention is real
Applying cipher key processing method one embodiment based on bluetooth communication in example includes:
101st, target cipher key is encrypted using first key for the first Bluetooth terminal, obtains the first ciphertext;
First Bluetooth terminal produces first key Ka and target cipher key Km, the first Bluetooth terminal and the second Bluetooth terminal in advance
When carrying out bluetooth communication, target cipher key Km is encrypted first with first key Ka for the first Bluetooth terminal, obtains first close
Literary C1=Eka(Km)。
102nd, the first Bluetooth terminal sends the first ciphertext to the second Bluetooth terminal;
First Bluetooth terminal is obtained after the first ciphertext C1, can according to bluetooth communication agreement by the first ciphertext C1 send to
Second Bluetooth terminal.
103rd, the first ciphertext is encrypted using the second key for the second Bluetooth terminal, obtains the second ciphertext;
Second Bluetooth terminal can produce the second key Kb in advance, and the second Bluetooth terminal is received after the first ciphertext C1,
The first ciphertext C1 can be encrypted using the second key Kb, obtain the second ciphertext C2=Ekb(C1)=Ekb (Eka (Km)).
104th, the second Bluetooth terminal sends the second ciphertext to the first Bluetooth terminal;
Second Bluetooth terminal is obtained after the second ciphertext C2, can be sent the second ciphertext C2 to the first Bluetooth terminal.
105th, the second ciphertext is decrypted using first key for the first Bluetooth terminal, obtains the 3rd ciphertext;
First Bluetooth terminal can receive the second ciphertext C2, and the second ciphertext C2 is solved using first key Ka
It is close, obtain the 3rd ciphertext C3=Dka(C2)=Dka (Ekb (C1))=Dka (Ekb (Eka (Km))).
106th, the first Bluetooth terminal sends the 3rd ciphertext to the second Bluetooth terminal;
First Bluetooth terminal is obtained after the 3rd ciphertext C3, can be sent the 3rd ciphertext C3 to the second Bluetooth terminal.
107th, the 3rd ciphertext is decrypted using the second key for the second Bluetooth terminal, obtains target cipher key.
Second Bluetooth terminal can receive the 3rd ciphertext C3, the 3rd ciphertext C3 can be entered using the second key Kb afterwards
Row decryption, Km'=Dkb (C3)=Dkb (Dka (C2))=Dkb (Dka (Ekb (C1)))=Dkb (Dka (Ekb (Eka (Km))))
Now Km'=Km, also just obtains target cipher key Km.
In cipher key processing method provided in an embodiment of the present invention, the first Bluetooth terminal is close to target first with first key
Key is encrypted, and obtains the first ciphertext and sends to the second Bluetooth terminal, the second Bluetooth terminal is close to first using the second key
Text is encrypted, and obtains the second ciphertext, and sends to the first Bluetooth terminal, and the first Bluetooth terminal is close to second using first key
Text is decrypted, and obtains the 3rd ciphertext, and sends to the second Bluetooth terminal, afterwards the second Bluetooth terminal using the second key to the
Three ciphertexts are decrypted, and finally give target cipher key, compared to the prior art, and target cipher key is blue in the first Bluetooth terminal and second
Ciphertext transmission is kept between tooth terminal, therefore improves the security of target cipher key, and then Bluetooth data transfer can be improved
Security.
Referring to Fig. 2, another embodiment of the cipher key processing method based on bluetooth communication includes in the embodiment of the present invention:
201st, the first Bluetooth terminal generates target cipher key using random algorithm;
Before the first Bluetooth terminal and the second Bluetooth terminal carry out data transmission, the first Bluetooth terminal can be using at random
Algorithm generates target cipher key Km, is compared with using fixed target cipher key, can be improved using random algorithm generation target cipher key
The security of cipher key agreement process.By way of example it is assumed that the target cipher key Km of generation is 8 bytes.
202nd, the first Bluetooth terminal is segmented to target cipher key, obtains cipher key sections;
After first Bluetooth terminal generation target cipher key Km, target cipher key Km can be segmented, obtain cipher key sections, made
For citing, target cipher key Km can be divided into two sections, every section of 4 bytes.
203rd, each cipher key sections is encrypted respectively using first key for the first Bluetooth terminal, obtains the first ciphertext;
First Bluetooth terminal can generate first key Ka using random algorithm, be compared with using fixed first key,
The security in cipher key transmitting process can be improved using random algorithm generation first key.Using first key Ka respectively to every
One cipher key sections is encrypted, and can obtain the first ciphertext.The embodiment of the present invention can be carried out using XOR algorithm to cipher key sections
Encryption, is encrypted to first key section using first key Ka and obtains the first ciphertext section C.It can obtain another according to the method described above
The first ciphertext section of a part, the first complete ciphertext of composition.
204th, the first Bluetooth terminal sends the first ciphertext to the second Bluetooth terminal;
First Bluetooth terminal is obtained after the first ciphertext, can be sent the first ciphertext to the second Bluetooth terminal.
205th, the first ciphertext is encrypted using the second key for the second Bluetooth terminal, obtains the second ciphertext;
Second Bluetooth terminal can generate the second key using random algorithm, be compared with using the second fixed key, profit
The security in cipher key transmitting process can be improved by generating the second key with random algorithm.It is close that second Bluetooth terminal receives first
After text, it is possible to use two ciphertexts section of the first ciphertext is encrypted the second key respectively, obtains the second ciphertext.
206th, the second Bluetooth terminal sends the second ciphertext to the first Bluetooth terminal;
Second Bluetooth terminal is obtained after the second ciphertext, can be sent the second ciphertext to the first Bluetooth terminal.
207th, the second ciphertext is decrypted using first key for the first Bluetooth terminal, obtains the 3rd ciphertext;
First Bluetooth terminal is received after the second ciphertext, it is possible to use two ciphertexts section of the first key to the second ciphertext
It is decrypted respectively, obtains the 3rd ciphertext.
208th, the first Bluetooth terminal sends the 3rd ciphertext to the second Bluetooth terminal;
First Bluetooth terminal is obtained after the 3rd ciphertext, can be sent the 3rd ciphertext to the second Bluetooth terminal.
209th, the 3rd ciphertext is decrypted using the second key for the second Bluetooth terminal, obtains target cipher key.
Second Bluetooth terminal is received after the 3rd ciphertext, it is possible to use the second key is close to two of the 3rd ciphertext respectively
Literary section is decrypted, and obtains target cipher key.
The algorithms for encryption and decryption used in embodiments of the present invention can include XOR algorithm, specifically, as an example,
AES can be:
Wherein M [i] and K [i] refer to M i-th of byte and Ka i-th of byte.
Assuming that M is first key section, and M=[0x00,0x10,0x20,0x30], K are first key, and K=[0x00,
0x02,0x01,0x03,0x73,0x59,0x42,0x3A], then the first ciphertext section C=[0x73,0x52,0x79,0x0A].
Accordingly, decipherment algorithm can be:
Due to K=[0x00,0x02,0x01,0x03,0x73,0x59,0x42,0x3A], the first ciphertext section C=[0x73,
0x52,0x79,0x0A], then M '=[0x00,0x10,0x20,0x30]=M.
In actual use, other algorithms for encryption and decryption can also be used, the algorithm that the present invention is provided is only as one kind
Simple and effective algorithm embodiment, rather than the restriction to algorithm.
The cipher key processing method based on bluetooth communication in the embodiment of the present invention is described above, below to the present invention
Bluetooth terminal in embodiment is described.
Referring to Fig. 3, one embodiment of Bluetooth terminal 3 includes in the embodiment of the present invention:
Encrypting module 301, for target cipher key to be encrypted using first key, obtains the first ciphertext;
First sending module 302, for the first ciphertext to be sent to the second Bluetooth terminal;
Receiving module 303, for receiving the second ciphertext that the second Bluetooth terminal is returned, the second ciphertext is the second Bluetooth terminal
What is obtained is encrypted to the first ciphertext using the second key;
Deciphering module 304, for being decrypted using the first close second ciphertext of stating, obtains the 3rd ciphertext;
Second sending module 305, for the 3rd ciphertext to be sent to the second Bluetooth terminal, to cause the second Bluetooth terminal profit
The 3rd ciphertext is decrypted with the second key, target cipher key is obtained.
It is preferred that, referring to Fig. 4, another embodiment of Bluetooth terminal includes in the embodiment of the present invention:
Encrypting module 401, for target cipher key to be encrypted using first key, obtains the first ciphertext;
First sending module 402, for the first ciphertext to be sent to the second Bluetooth terminal;
Receiving module 403, for receiving the second ciphertext that the second Bluetooth terminal is returned, the second ciphertext is the second Bluetooth terminal
What is obtained is encrypted to the first ciphertext using the second key;
Deciphering module 404, for being decrypted using the first close second ciphertext of stating, obtains the 3rd ciphertext;
Second sending module 405, for the 3rd ciphertext to be sent to the second Bluetooth terminal, to cause the second Bluetooth terminal profit
The 3rd ciphertext is decrypted with the second key, target cipher key is obtained.
Bluetooth terminal also includes:
Key production module 406, for generating target cipher key using random algorithm.
Encrypting module 401 includes:
Segmenting unit 4011, for being segmented to target cipher key, obtains cipher key sections;
Ciphering unit 4012, for each cipher key sections to be encrypted respectively using first key, obtains the first ciphertext.
Referring to Fig. 5, another embodiment of Bluetooth terminal includes in the embodiment of the present invention:
First receiving module 501, for receiving the first ciphertext that the first Bluetooth terminal is sent, the first ciphertext is the first bluetooth
Terminal is encrypted what is obtained using first key to target cipher key;
Encrypting module 502, for the first ciphertext to be encrypted using the second key, obtains the second ciphertext;
Sending module 503, for the second ciphertext to be sent to the first Bluetooth terminal;
Second receiving module 504, for receiving the 3rd ciphertext that the first Bluetooth terminal is returned, the 3rd ciphertext is the first bluetooth
Terminal is decrypted what is obtained using first key to the second ciphertext;
Deciphering module 505, for the 3rd ciphertext to be decrypted using the second key, obtains target cipher key.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In described several embodiments, it should be understood that disclosed system, apparatus and method can pass through others
Mode is realized.For example, device embodiment described above is only schematical, for example, the division of unit, is only one kind
Division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can combine or can
To be integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or discussed each other
Coupling direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit,
Can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be physically separate, be shown as unit
Part can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple networks
On unit.Some or all of unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If integrated unit is realized using in the form of SFU software functional unit and is used as independent production marketing or in use, can
To be stored in a computer read/write memory medium.Based on it is such understand, technical scheme substantially or
Saying all or part of the part contributed to prior art or the technical scheme can be embodied in the form of software product
Out, the computer software product is stored in a storage medium, including some instructions are to cause a computer equipment
(can be personal computer, server, or network equipment etc.) performs all or part of each embodiment method of the invention
Step.And foregoing storage medium includes:It is USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random
Access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with Jie of store program codes
Matter.
More than, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to foregoing reality
Example is applied the present invention is described in detail, it will be understood by those within the art that:It still can be to foregoing each
Technical scheme described in embodiment is modified, or carries out equivalent substitution to which part technical characteristic;And these are changed
Or replace, the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (10)
1. a kind of cipher key processing method based on bluetooth communication, it is characterised in that including:
Target cipher key is encrypted using first key for first Bluetooth terminal, is obtained the first ciphertext and is sent whole to the second bluetooth
End;
First ciphertext is encrypted using the second key for second Bluetooth terminal, obtains the second ciphertext, and send extremely
First Bluetooth terminal;
Second ciphertext is decrypted using the first key for first Bluetooth terminal, obtains the 3rd ciphertext, concurrently
Deliver to second Bluetooth terminal;
The 3rd ciphertext is decrypted using second key for second Bluetooth terminal, obtains the target cipher key.
2. cipher key processing method according to claim 1, it is characterised in that the first Bluetooth terminal is using first key to mesh
Mark key be encrypted including:
First Bluetooth terminal is segmented to the target cipher key, obtains cipher key sections;
Cipher key sections each described are encrypted respectively using the first key for first Bluetooth terminal, obtain described
One ciphertext.
3. cipher key processing method according to claim 1, it is characterised in that the AES and the decipherment algorithm bag
Include XOR algorithm.
4. cipher key processing method according to any one of claim 1 to 3, it is characterised in that in the first Bluetooth terminal profit
Before target cipher key is encrypted with first key, methods described also includes:
First Bluetooth terminal generates the target cipher key using random algorithm.
5. a kind of Bluetooth terminal, it is characterised in that including:
Encrypting module, for target cipher key to be encrypted using first key, obtains the first ciphertext;
First sending module, for first ciphertext to be sent to the second Bluetooth terminal;
Receiving module, for receiving the second ciphertext that second Bluetooth terminal is returned, second ciphertext is described second blue
Tooth terminal is encrypted what is obtained using the second key to first ciphertext;
Deciphering module, for being decrypted using the described first close second ciphertext of stating, obtains the 3rd ciphertext;
Second sending module, for the 3rd ciphertext to be sent to second Bluetooth terminal, to cause second bluetooth
The 3rd ciphertext is decrypted using second key for terminal, obtains the target cipher key.
6. Bluetooth terminal according to claim 5, it is characterised in that the encrypting module includes:
Segmenting unit, for being segmented to the target cipher key, obtains cipher key sections;
Ciphering unit, for cipher key sections each described to be encrypted respectively using the first key, obtains described first
Ciphertext.
7. Bluetooth terminal according to claim 5, it is characterised in that the AES and the decipherment algorithm include different
Or algorithm.
8. the Bluetooth terminal according to any one of claim 5 to 7, it is characterised in that the Bluetooth terminal also includes:
Key production module, for generating the target cipher key using random algorithm.
9. a kind of Bluetooth terminal, it is characterised in that including:
First receiving module, for receiving the first ciphertext that the first Bluetooth terminal is sent, first ciphertext is described first blue
Tooth terminal is encrypted what is obtained using first key to target cipher key;
Encrypting module, for first ciphertext to be encrypted using the second key, obtains the second ciphertext;
Sending module, for second ciphertext to be sent to first Bluetooth terminal;
Second receiving module, for receiving the 3rd ciphertext that first Bluetooth terminal is returned, the 3rd ciphertext is described the
One Bluetooth terminal is decrypted what is obtained using the first key to second ciphertext;
Deciphering module, for the 3rd ciphertext to be decrypted using second key, obtains the target cipher key.
10. Bluetooth terminal according to claim 9, it is characterised in that the AES and the decipherment algorithm include
XOR algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710272390.1A CN107094036A (en) | 2017-04-24 | 2017-04-24 | A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710272390.1A CN107094036A (en) | 2017-04-24 | 2017-04-24 | A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107094036A true CN107094036A (en) | 2017-08-25 |
Family
ID=59638333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710272390.1A Pending CN107094036A (en) | 2017-04-24 | 2017-04-24 | A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107094036A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115065943A (en) * | 2022-08-16 | 2022-09-16 | 中航信移动科技有限公司 | Image position determination method, medium, and device in weak network scene based on bluetooth |
CN115079226A (en) * | 2022-08-16 | 2022-09-20 | 中航信移动科技有限公司 | Display data determination method, medium and device based on multi-source position data |
CN116074826A (en) * | 2023-03-07 | 2023-05-05 | 深圳市好盈科技股份有限公司 | Communication data encryption and decryption method and device applied to electric scooter |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070159330A1 (en) * | 2005-12-30 | 2007-07-12 | Skyetek, Inc. | System and method for implementing virtual RFID tags |
CN101807995A (en) * | 2010-01-18 | 2010-08-18 | 北京天地融科技有限公司 | Electronic signature tool supporting wireless communication and processing method thereof for communicating with terminal |
CN101997678A (en) * | 2010-11-18 | 2011-03-30 | 东莞宇龙通信科技有限公司 | Password acquisition method and terminal |
CN103457724A (en) * | 2012-06-05 | 2013-12-18 | 中兴通讯股份有限公司 | Method and system for point-to-point data safe transmission |
CN104158567A (en) * | 2014-07-25 | 2014-11-19 | 天地融科技股份有限公司 | Pairing method and system and data interaction method and system for Bluetooth equipment |
CN105635144A (en) * | 2015-12-29 | 2016-06-01 | 普奥云信息科技(北京)有限公司 | Cloud-platform-server-based data processing method and system |
-
2017
- 2017-04-24 CN CN201710272390.1A patent/CN107094036A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070159330A1 (en) * | 2005-12-30 | 2007-07-12 | Skyetek, Inc. | System and method for implementing virtual RFID tags |
CN101807995A (en) * | 2010-01-18 | 2010-08-18 | 北京天地融科技有限公司 | Electronic signature tool supporting wireless communication and processing method thereof for communicating with terminal |
CN101997678A (en) * | 2010-11-18 | 2011-03-30 | 东莞宇龙通信科技有限公司 | Password acquisition method and terminal |
CN103457724A (en) * | 2012-06-05 | 2013-12-18 | 中兴通讯股份有限公司 | Method and system for point-to-point data safe transmission |
CN104158567A (en) * | 2014-07-25 | 2014-11-19 | 天地融科技股份有限公司 | Pairing method and system and data interaction method and system for Bluetooth equipment |
CN105635144A (en) * | 2015-12-29 | 2016-06-01 | 普奥云信息科技(北京)有限公司 | Cloud-platform-server-based data processing method and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115065943A (en) * | 2022-08-16 | 2022-09-16 | 中航信移动科技有限公司 | Image position determination method, medium, and device in weak network scene based on bluetooth |
CN115079226A (en) * | 2022-08-16 | 2022-09-20 | 中航信移动科技有限公司 | Display data determination method, medium and device based on multi-source position data |
CN116074826A (en) * | 2023-03-07 | 2023-05-05 | 深圳市好盈科技股份有限公司 | Communication data encryption and decryption method and device applied to electric scooter |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6931132B2 (en) | Secure wireless local or metropolitan area network and related methods | |
CN109412794B (en) | Quantum key automatic charging method and system suitable for power business | |
US7817802B2 (en) | Cryptographic key management in a communication network | |
CN105262772A (en) | Data transmission method, data transmission system and related apparatus for data transmission method and system | |
CN101707767B (en) | Data transmission method and devices | |
CN105357218A (en) | Router with hardware encryption and decryption function and encryption and decryption method of router | |
CN109194701B (en) | Data processing method and device | |
CN107094036A (en) | A kind of cipher key processing method and Bluetooth terminal based on bluetooth communication | |
CN110401527A (en) | Data encryption, decryption method, device and storage medium | |
CN104602208B (en) | A kind of SMS encryption communication means based on mobile network | |
CN103458401B (en) | A kind of voice encryption communication system and communication means | |
Diallo et al. | A secure authentication scheme for bluetooth connection | |
CN103384233B (en) | A kind of methods, devices and systems for acting on behalf of conversion | |
KR101760376B1 (en) | Terminal and method for providing secure messenger service | |
CN106416120A (en) | Management of cryptographic keys | |
CN105827601A (en) | Data encryption application method and system of mobile device | |
CN103249035A (en) | Wireless sensor network data encryption transmission method | |
Seo et al. | Network and data link layer security for DASH7 | |
CN105450597A (en) | Information transmission method and device | |
CN109474429B (en) | Key configuration strategy method facing FC storage encryption gateway | |
Abbood et al. | Intelligent hybrid technique to secure bluetooth communications | |
CN103780377B (en) | A kind of method and system that data are carried out with secrecy processing | |
US20020144112A1 (en) | Method and arrangement for data communication in a cryptographic system containing a plurality of entities | |
CN215734303U (en) | Internet of things system and internet of things safety box | |
CN108322303A (en) | A kind of data transmission method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170825 |