CN110139274A - A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium - Google Patents
A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium Download PDFInfo
- Publication number
- CN110139274A CN110139274A CN201910152196.9A CN201910152196A CN110139274A CN 110139274 A CN110139274 A CN 110139274A CN 201910152196 A CN201910152196 A CN 201910152196A CN 110139274 A CN110139274 A CN 110139274A
- Authority
- CN
- China
- Prior art keywords
- bluetooth equipment
- authenticating
- information
- bluetooth
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present embodiments relate to the field of wireless connection, the method for authenticating of bluetooth equipment a kind of, electronic equipment and can storage medium are disclosed.In the present invention, the method for authenticating of bluetooth equipment is applied to bluetooth equipment, comprising: prestore at least two sets of facility informations;It is authenticated when needing distribution with gateway, wherein, corresponding facility information is extracted according to built-in identification information, the verification information of bluetooth equipment is obtained by extracted facility information, the verification information of the verification information of bluetooth equipment and gateway is compared, determine whether that the authentication is passed according to comparison result, wherein identification information can be modified;Whether passed through according to authentication, it is determined whether connect with gateway, so that the application scenarios of bluetooth equipment are more extensive.
Description
Technical field
The present embodiments relate to the fields of wireless connection, the in particular to method for authenticating of bluetooth equipment, electronic equipment and can
Storage medium.
Background technique
Wireless network (wireless network) is the network realized using wireless communication technique, is passed through in the prior art
Wireless network forms mesh network, and each equipment needs to access by authentication in the mesh network.
Bluetooth technology was released in 1998, and feature is that flow is big, is mainly used for wireless headset, wireless sound box, by 2000
Left and right is proposed Bluetooth Low Energy specification --- point-to-point, such as sport health class of BLE, it now is possible to realize: 1. low-power consumption
Products application, 2. one-to-many broadcast types, such as beacon, the mesh technology of 3. multi-to-multis.It is existing to transport above-mentioned Bluetooth technology
For Internet of Things, using multiple bluetooth equipments as node network consisting.
At least there are the following problems in the prior art for inventor's discovery: bluetooth equipment built-in can be used for authentication when leaving the factory
Information when accessing certain mesh network, is authenticated using these information, but the production firm of bluetooth equipment is different, equipment
The scope of application of product can only be greatly limited with the equipment network using same authentication policy, also define that user selects to produce
The range of product.
Summary of the invention
A kind of method for authenticating for being designed to provide bluetooth equipment of embodiment of the present invention, electronic equipment and Jie can be stored
Matter, so that the application scenarios of bluetooth equipment are more extensive.
In order to solve the above technical problems, embodiments of the present invention provide a kind of method for authenticating of bluetooth equipment, application
In bluetooth equipment, comprising: prestore at least two sets of facility informations;It is authenticated when needing distribution with gateway, wherein according to built-in
Identification information extract corresponding facility information, the verification information of bluetooth equipment is obtained by extracted facility information, by institute
The verification information for stating the verification information and the gateway of bluetooth equipment compares, and determines whether that authentication is logical according to comparison result
It crosses, wherein the identification information can be modified;Whether passed through according to authentication, it is determined whether connect with the gateway.
Embodiments of the present invention additionally provide a kind of electronic equipment, comprising: at least one processor;And with it is described
The memory of at least one processor communication connection;Wherein, the memory, which is stored with, to be held by least one described processor
Capable instruction, described instruction are executed by least one described processor, so that at least one described processor is able to carry out as above
The method for authenticating for the bluetooth equipment stated.
Embodiments of the present invention additionally provide a kind of computer readable storage medium, are stored with computer program, described
The method for authenticating of above-mentioned bluetooth equipment is realized when computer program is executed by processor.
In terms of existing technologies, the main distinction and its effect are embodiment of the present invention: prestoring in bluetooth equipment
More set facility informations, that set facility information needed for being selected when needing to authenticate, and verification information is converted to, by testing after conversion
Card information is compared with gateway, so that it is determined that whether authentication passes through.Due to there being more set facility informations in bluetooth equipment,
It can be selected according to identification information, it is seen then that verification information that can be different by modified logo information acquisition, to carry out difference
The authentication of strategy, widens the application scenarios of bluetooth equipment.
As a further improvement, the facility information is prestored when dispatching from the factory configuration.The source of facility information is specified, factory is matched
Facility information is prestored when setting, it is easy to operate.
As a further improvement, the identity information includes: MAC Address and key.
As a further improvement, the verification information passes through life after the MAC Address and key progress Hash operation
At cryptographic Hash determine.Hash operation verification information is explicitly used in present embodiment, verification information is for comparing, using Hash
It is more preferable to be worth safety.
As a further improvement, the built-in identification information can be modified by mobile terminal.The present embodiment clearly can be with
It is modified by mobile terminal, it is user-friendly.
As a further improvement, the built-in identification information can be repaired by receiving the broadcast from mobile terminal
Change.The present embodiment can clearly be modified by way of mobile terminal issues broadcast, so that modification process is accurately feasible.
As a further improvement, the identification information includes N kind, every kind of identification information corresponds to a set of equipment information.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys
The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove
Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is the flow chart of the method for authenticating of bluetooth equipment in first embodiment according to the present invention;
Fig. 2 be according to the present invention in first embodiment in the method for authenticating of bluetooth equipment authentication process flow chart;
Fig. 3 be according to the present invention in first embodiment in the method for authenticating of bluetooth equipment Bluetooth bulb networking signal
Figure;
Fig. 4 is the structural schematic diagram of electronic equipment in the 4th embodiment according to the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention
Each embodiment be explained in detail.However, it will be understood by those skilled in the art that in each embodiment party of the present invention
In formula, in order to make the reader understand this application better, many technical details are proposed.But even if without these technical details
And various changes and modifications based on the following respective embodiments, the application technical solution claimed also may be implemented.With
Under the division of each embodiment be for convenience, any restriction should not to be constituted to specific implementation of the invention, it is each
Embodiment can be combined with each other mutual reference under the premise of reconcilable.
The first embodiment of the present invention is related to a kind of method for authenticating of bluetooth equipment.
Present embodiment is applied to a kind of bluetooth equipment, is the electronic equipment of embedded with bluetooth chip, such as Bluetooth bulb, bluetooth
Microphone, bluetooth headset, blue Tooth remote controller etc..It is illustrated so that bluetooth equipment is Bluetooth bulb as an example in present embodiment.
The inventors of the present application found that when the same equipment needs to access different platforms, the software of equipment, hardware can be with
It is identical, but since the authentication key of different platform quotient is variant, after equipment carries out key adaptation for A platform,
B platform can not be just switched to.
The process of the method for authenticating of bluetooth equipment is as shown in Figure 1, specific as follows in present embodiment:
Step 101, two sets of facility informations are prestored.
Specifically, the facility information in present embodiment may include: product identification (such as product IDs), MAC Address and
Key can specifically be prestored when dispatching from the factory configuration.
Step 102, it is authenticated when needing distribution with gateway.
Specifically, when Bluetooth bulb one network of quasi- access, need and the network in grid equipment authenticated, it is practical
In, may be configured as Bluetooth bulb needs distribution when booting powers on.Authentication process in this step is specific as shown in Fig. 2, packet
Include following steps:
Step 1021, corresponding facility information is extracted according to built-in identification information.
Specifically, identification information can be modified.As shown in Figure 3, it is assumed that the Bluetooth bulb in present embodiment can connect
Gateway in the first network in left side can be the gateway in the second network of Baffle Box of Bluetooth or right side such as figure,
It can be the router such as figure.Gateway connects server by cloud, and the information for verifying can be requested to server.
Furtherly, there are many identification informations, every kind of identification information can correspond to a set of equipment information, as identification information is
When " 1 ", corresponding facility information is the authentication for accessing first network, and when identification information is " 2 ", corresponding facility information is
For accessing the authentication of the second network.
It continues to explain, identification information can be set in the predetermined position of memory, when needing distribution, can mention from predetermined position
It takes out identification information and determines the facility information that need to currently use further according to the corresponding relationship of identification information and facility information.
Step 1022, the verification information of Bluetooth bulb is obtained by extracted facility information.
It is determined specifically, verification information carries out the cryptographic Hash generated after Hash operation by MAC Address and key, it is practical
In, hash algorithm can use SHA256 algorithm.
Step 1023, the verification information of the verification information of bluetooth equipment and gateway is compared.
In practical application, gateway is looked by MAC Address from server when the MAC Address of Bluetooth bulb is arrived in scanning
The key for asking the equipment generates cryptographic Hash with the data that the MAC Address of the equipment, key form, equally uses SHA256 algorithm.
As shown in figure 3, if Baffle Box of Bluetooth scanning is looked by MAC Address from first server to the MAC Address of a certain Bluetooth bulb
The key for obtaining the Bluetooth bulb is ask, in conjunction with the MAC Address scanned, using SHA256 hash algorithm, by the cryptographic Hash of acquisition
As verification information to be compared.
Step 1024, determine whether that the authentication is passed according to comparison result.
Specifically, comparison result is unanimously determined as, the authentication is passed, and the inconsistent authentication that is determined as of comparison result does not pass through.
Generally speaking, above-mentioned steps 1021 to step 1024 specifically illustrate Bluetooth bulb when needing distribution how with gateway
Device authentication.
Step 103, whether passed through according to authentication, it is determined whether connect with gateway.
Specifically, connecting if the authentication is passed with gateway, corresponding network can be also accessed.
As it can be seen that present embodiment is in terms of existing technologies, more set facility informations are prestored in bluetooth equipment, are needing to reflect
That required set facility information is temporary selected, and is converted to verification information, by the verification information and gateway progress after conversion
It compares, so that it is determined that whether authentication passes through.Due to there being more set facility informations in bluetooth equipment, can be selected according to identification information
With, it is seen then that can the verification information different by modified logo information acquisition widen indigo plant to carry out the authentication of Different Strategies
The application scenarios of tooth equipment.Hash operation verification information is wherein also explicitly used, verification information is pacified for comparing using cryptographic Hash
Full property is more preferable.
In addition, it should be noted that, in present embodiment by taking Bluetooth bulb as an example, in practical application, bluetooth equipment may be used also
To be other, such as bluetooth microphone, bluetooth headset.
Second embodiment of the present invention is related to a kind of method for authenticating of bluetooth equipment.Second embodiment is real first
It applies and is further improved on the basis of mode, mainly the improvement is that in second embodiment of the invention, built-in mark
Knowing information can be modified by mobile terminal, the operation for the user that is more convenient for.
Specifically, when needing modified logo information, the Bluetooth broadcast for carrying switching command is sent using mobile terminal, and
Using the MAC Address of bluetooth equipment or identification number as the identification code of broadcast reception side, bluetooth equipment receive carry from
The broadcast of body MAC Address or identification number obtains switching command after parsing, if receiving the broadcast that MAC Address or identification number are not inconsistent,
Then directly abandon.
As it can be seen that the mobile terminal that present embodiment is not required to user is connected with bluetooth equipment, can be realized in bluetooth equipment
The modification of identification information, modification process are simply easily realized.
Third embodiment of the present invention is related to a kind of method for authenticating of bluetooth equipment.Third embodiment is implemented with first
Mode is roughly the same, is in place of the main distinction: prestoring two sets of facility informations in the first embodiment, in bluetooth equipment.And
Three sets of facility informations are prestored in second embodiment of the invention, in bluetooth equipment, so that bluetooth equipment can be adapted for more
Authentication policy network.
Specifically, prestoring three sets of facility informations in present embodiment in bluetooth equipment, accordingly, identification information also has three
Kind, by a variety of identification informations in bluetooth equipment, different facility informations is respectively corresponded, according to network to be accessed, setting mark
Know information, later, when needing distribution, corresponding facility information is extracted according to identification information.
As it can be seen that the bluetooth equipment in present embodiment prestores more set facility informations, bluetooth equipment is applicable in
In the network of more authentication policies.
The step of various methods divide above, be intended merely to describe it is clear, when realization can be merged into a step or
Certain steps are split, multiple steps are decomposed into, as long as including identical logical relation, all in the protection scope of this patent
It is interior;To adding inessential modification in algorithm or in process or introducing inessential design, but its algorithm is not changed
Core design with process is all in the protection scope of the patent.
Four embodiment of the invention is related to a kind of electronic equipment, as shown in Figure 4, comprising:
At least one processor;And the memory being connect at least one processor communication;Wherein, memory stores
There is the instruction that can be executed by least one processor, instruction is executed by least one processor, so that at least one processor energy
Enough method for authenticating executed such as above-mentioned first embodiment any one bluetooth equipment into third embodiment.
Wherein, memory is connected with processor using bus mode, and bus may include the bus of any number of interconnection
And bridge, bus is by one or more processors together with the various circuit connections of memory.Bus can also will be such as peripheral
Together with various other circuit connections of management circuit or the like, these are all well known in the art for equipment, voltage-stablizer
, therefore, it will not be further described herein.Bus interface provides interface between bus and transceiver.Transceiver
Can be an element, be also possible to multiple element, such as multiple receivers and transmitter, provide for over a transmission medium with
The unit of various other device communications.The data handled through processor are transmitted on the radio medium by antenna, further,
Antenna also receives data and transfers data to processor.Processor is responsible for managing bus and common processing, can also provide
Various functions, including timing, peripheral interface, voltage adjusting, power management and other control functions.And memory can by with
Used data when storage processor is in execution operation.
Fifth embodiment of the invention is related to a kind of computer readable storage medium, is stored with computer program.Computer
Above method embodiment is realized when program is executed by processor.
That is, it will be understood by those skilled in the art that implement the method for the above embodiments be can be with
Relevant hardware is instructed to complete by program, which is stored in a storage medium, including some instructions are to make
It obtains an equipment (can be single-chip microcontroller, chip etc.) or processor (processor) executes each embodiment method of the application
All or part of the steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize specific embodiments of the present invention,
And in practical applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.
Claims (9)
1. a kind of method for authenticating of bluetooth equipment, which is characterized in that be applied to bluetooth equipment, comprising:
Prestore at least two sets of facility informations;
It is authenticated when needing distribution with gateway, wherein corresponding facility information is extracted according to built-in identification information, passes through institute
The facility information of extraction obtains the verification information of bluetooth equipment, by the verification information of the bluetooth equipment and the gateway
Verification information compares, and determines whether that the authentication is passed according to comparison result, wherein the identification information can be modified;
Whether passed through according to authentication, it is determined whether connect with the gateway.
2. the method for authenticating of bluetooth equipment according to claim 1, which is characterized in that the facility information is configured in factory
When prestore.
3. the method for authenticating of bluetooth equipment according to claim 1, which is characterized in that the identity information includes: MAC
Location and key.
4. the method for authenticating of bluetooth equipment according to claim 3, which is characterized in that the verification information passes through described
MAC Address and the key carry out the cryptographic Hash generated after Hash operation and determine.
5. the method for authenticating of bluetooth equipment according to claim 1, which is characterized in that the built-in identification information can lead to
Cross mobile terminal modification.
6. the method for authenticating of bluetooth equipment according to claim 5, which is characterized in that the built-in identification information can lead to
Broadcast of the reception from mobile terminal is crossed to modify.
7. the method for authenticating of bluetooth equipment according to any one of claim 1 to 6, which is characterized in that the mark letter
Breath includes N kind, and every kind of identification information corresponds to a set of equipment information.
8. a kind of electronic equipment characterized by comprising
At least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
It manages device to execute, so that at least one described processor is able to carry out the mirror of the bluetooth equipment as described in any in claim 1 to 7
Power method.
9. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the computer program is processed
The method for authenticating of any bluetooth equipment in claim 1 to 7 is realized when device executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910152196.9A CN110139274A (en) | 2019-02-28 | 2019-02-28 | A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910152196.9A CN110139274A (en) | 2019-02-28 | 2019-02-28 | A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110139274A true CN110139274A (en) | 2019-08-16 |
Family
ID=67568486
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910152196.9A Pending CN110139274A (en) | 2019-02-28 | 2019-02-28 | A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110139274A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333677A (en) * | 2019-11-19 | 2021-02-05 | 杭州智缤科技有限公司 | Safe communication method of low-power-consumption Bluetooth |
CN113840266A (en) * | 2020-06-24 | 2021-12-24 | 华为技术有限公司 | Bluetooth pairing method, device, system, electronic equipment and storage medium |
WO2022061668A1 (en) * | 2020-09-24 | 2022-03-31 | Oppo广东移动通信有限公司 | Bluetooth device access authentication method, and electronic device and storage medium |
CN114666154A (en) * | 2022-04-08 | 2022-06-24 | 深圳市欧瑞博科技股份有限公司 | Device communication method, apparatus, gateway, device, system, medium and product |
-
2019
- 2019-02-28 CN CN201910152196.9A patent/CN110139274A/en active Pending
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333677A (en) * | 2019-11-19 | 2021-02-05 | 杭州智缤科技有限公司 | Safe communication method of low-power-consumption Bluetooth |
CN112333677B (en) * | 2019-11-19 | 2022-08-19 | 杭州智缤科技有限公司 | Safe communication method of low-power-consumption Bluetooth |
CN113840266A (en) * | 2020-06-24 | 2021-12-24 | 华为技术有限公司 | Bluetooth pairing method, device, system, electronic equipment and storage medium |
CN113840266B (en) * | 2020-06-24 | 2024-05-03 | 华为技术有限公司 | Bluetooth pairing method, device, system, electronic equipment and storage medium |
WO2022061668A1 (en) * | 2020-09-24 | 2022-03-31 | Oppo广东移动通信有限公司 | Bluetooth device access authentication method, and electronic device and storage medium |
CN114666154A (en) * | 2022-04-08 | 2022-06-24 | 深圳市欧瑞博科技股份有限公司 | Device communication method, apparatus, gateway, device, system, medium and product |
CN114666154B (en) * | 2022-04-08 | 2023-11-24 | 深圳市欧瑞博科技股份有限公司 | Device communication method, device, gateway, device, system, medium and product |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110139274A (en) | A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium | |
US9756036B2 (en) | Mechanisms for certificate revocation status verification on constrained devices | |
US20140026200A1 (en) | Method and apparatus for providing secret delegation | |
US11989543B2 (en) | Method for interoperating between bundle download process and eSIM profile download process by SSP terminal | |
CN112019503B (en) | Method for obtaining equipment identifier, communication entity, communication system and storage medium | |
US11356841B2 (en) | Method and apparatus for handling remote profile management exception | |
CN107919962A (en) | A kind of internet of things equipment registration and authentication method | |
CN105992306A (en) | Binding method of terminal and home gateway | |
US11246174B2 (en) | Methods and systems for connecting a wireless device to a wireless network | |
CN102420642B (en) | Bluetooth device and communication method thereof | |
CN103957580A (en) | Rapid WIFI networking matching method and module for smart hardware | |
US9703987B2 (en) | Identity based connected services | |
CN112913263A (en) | Method and apparatus for handling remote profile management exceptions | |
US9961074B2 (en) | System and method for providing an authentication certificate for a wireless handheld device a data center environment | |
JP2023544602A (en) | Method and apparatus for link operation of multilink devices | |
US11777742B2 (en) | Network device authentication | |
CN113779516B (en) | Equipment control method and device, storage medium and electronic device | |
CN115767554A (en) | Low-power-consumption Bluetooth binding method and system based on signal intensity | |
CN116918317A (en) | Electronic device for establishing network slice and data session and operation method thereof | |
CN115146320A (en) | Certificate query method and device | |
JP2012533101A (en) | How to manage applications embedded in secured electronic tokens | |
WO2020258099A1 (en) | Method for configuring internet of things device, and internet of things device | |
CN104053153B (en) | The method and system of wireless Mesh netword access authentication | |
CN111953672B (en) | Network access method, server and storage medium | |
US20220377081A1 (en) | Mutual device-to-device authentication method and device during device-to-device bundle or profile transfer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190816 |