CN110139274A - A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium - Google Patents

A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium Download PDF

Info

Publication number
CN110139274A
CN110139274A CN201910152196.9A CN201910152196A CN110139274A CN 110139274 A CN110139274 A CN 110139274A CN 201910152196 A CN201910152196 A CN 201910152196A CN 110139274 A CN110139274 A CN 110139274A
Authority
CN
China
Prior art keywords
bluetooth equipment
authenticating
information
bluetooth
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910152196.9A
Other languages
Chinese (zh)
Inventor
李封翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yujie Technology Co Ltd
Original Assignee
Shanghai Yujie Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yujie Technology Co Ltd filed Critical Shanghai Yujie Technology Co Ltd
Priority to CN201910152196.9A priority Critical patent/CN110139274A/en
Publication of CN110139274A publication Critical patent/CN110139274A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present embodiments relate to the field of wireless connection, the method for authenticating of bluetooth equipment a kind of, electronic equipment and can storage medium are disclosed.In the present invention, the method for authenticating of bluetooth equipment is applied to bluetooth equipment, comprising: prestore at least two sets of facility informations;It is authenticated when needing distribution with gateway, wherein, corresponding facility information is extracted according to built-in identification information, the verification information of bluetooth equipment is obtained by extracted facility information, the verification information of the verification information of bluetooth equipment and gateway is compared, determine whether that the authentication is passed according to comparison result, wherein identification information can be modified;Whether passed through according to authentication, it is determined whether connect with gateway, so that the application scenarios of bluetooth equipment are more extensive.

Description

A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium
Technical field
The present embodiments relate to the fields of wireless connection, the in particular to method for authenticating of bluetooth equipment, electronic equipment and can Storage medium.
Background technique
Wireless network (wireless network) is the network realized using wireless communication technique, is passed through in the prior art Wireless network forms mesh network, and each equipment needs to access by authentication in the mesh network.
Bluetooth technology was released in 1998, and feature is that flow is big, is mainly used for wireless headset, wireless sound box, by 2000 Left and right is proposed Bluetooth Low Energy specification --- point-to-point, such as sport health class of BLE, it now is possible to realize: 1. low-power consumption Products application, 2. one-to-many broadcast types, such as beacon, the mesh technology of 3. multi-to-multis.It is existing to transport above-mentioned Bluetooth technology For Internet of Things, using multiple bluetooth equipments as node network consisting.
At least there are the following problems in the prior art for inventor's discovery: bluetooth equipment built-in can be used for authentication when leaving the factory Information when accessing certain mesh network, is authenticated using these information, but the production firm of bluetooth equipment is different, equipment The scope of application of product can only be greatly limited with the equipment network using same authentication policy, also define that user selects to produce The range of product.
Summary of the invention
A kind of method for authenticating for being designed to provide bluetooth equipment of embodiment of the present invention, electronic equipment and Jie can be stored Matter, so that the application scenarios of bluetooth equipment are more extensive.
In order to solve the above technical problems, embodiments of the present invention provide a kind of method for authenticating of bluetooth equipment, application In bluetooth equipment, comprising: prestore at least two sets of facility informations;It is authenticated when needing distribution with gateway, wherein according to built-in Identification information extract corresponding facility information, the verification information of bluetooth equipment is obtained by extracted facility information, by institute The verification information for stating the verification information and the gateway of bluetooth equipment compares, and determines whether that authentication is logical according to comparison result It crosses, wherein the identification information can be modified;Whether passed through according to authentication, it is determined whether connect with the gateway.
Embodiments of the present invention additionally provide a kind of electronic equipment, comprising: at least one processor;And with it is described The memory of at least one processor communication connection;Wherein, the memory, which is stored with, to be held by least one described processor Capable instruction, described instruction are executed by least one described processor, so that at least one described processor is able to carry out as above The method for authenticating for the bluetooth equipment stated.
Embodiments of the present invention additionally provide a kind of computer readable storage medium, are stored with computer program, described The method for authenticating of above-mentioned bluetooth equipment is realized when computer program is executed by processor.
In terms of existing technologies, the main distinction and its effect are embodiment of the present invention: prestoring in bluetooth equipment More set facility informations, that set facility information needed for being selected when needing to authenticate, and verification information is converted to, by testing after conversion Card information is compared with gateway, so that it is determined that whether authentication passes through.Due to there being more set facility informations in bluetooth equipment, It can be selected according to identification information, it is seen then that verification information that can be different by modified logo information acquisition, to carry out difference The authentication of strategy, widens the application scenarios of bluetooth equipment.
As a further improvement, the facility information is prestored when dispatching from the factory configuration.The source of facility information is specified, factory is matched Facility information is prestored when setting, it is easy to operate.
As a further improvement, the identity information includes: MAC Address and key.
As a further improvement, the verification information passes through life after the MAC Address and key progress Hash operation At cryptographic Hash determine.Hash operation verification information is explicitly used in present embodiment, verification information is for comparing, using Hash It is more preferable to be worth safety.
As a further improvement, the built-in identification information can be modified by mobile terminal.The present embodiment clearly can be with It is modified by mobile terminal, it is user-friendly.
As a further improvement, the built-in identification information can be repaired by receiving the broadcast from mobile terminal Change.The present embodiment can clearly be modified by way of mobile terminal issues broadcast, so that modification process is accurately feasible.
As a further improvement, the identification information includes N kind, every kind of identification information corresponds to a set of equipment information.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is the flow chart of the method for authenticating of bluetooth equipment in first embodiment according to the present invention;
Fig. 2 be according to the present invention in first embodiment in the method for authenticating of bluetooth equipment authentication process flow chart;
Fig. 3 be according to the present invention in first embodiment in the method for authenticating of bluetooth equipment Bluetooth bulb networking signal Figure;
Fig. 4 is the structural schematic diagram of electronic equipment in the 4th embodiment according to the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Each embodiment be explained in detail.However, it will be understood by those skilled in the art that in each embodiment party of the present invention In formula, in order to make the reader understand this application better, many technical details are proposed.But even if without these technical details And various changes and modifications based on the following respective embodiments, the application technical solution claimed also may be implemented.With Under the division of each embodiment be for convenience, any restriction should not to be constituted to specific implementation of the invention, it is each Embodiment can be combined with each other mutual reference under the premise of reconcilable.
The first embodiment of the present invention is related to a kind of method for authenticating of bluetooth equipment.
Present embodiment is applied to a kind of bluetooth equipment, is the electronic equipment of embedded with bluetooth chip, such as Bluetooth bulb, bluetooth Microphone, bluetooth headset, blue Tooth remote controller etc..It is illustrated so that bluetooth equipment is Bluetooth bulb as an example in present embodiment.
The inventors of the present application found that when the same equipment needs to access different platforms, the software of equipment, hardware can be with It is identical, but since the authentication key of different platform quotient is variant, after equipment carries out key adaptation for A platform, B platform can not be just switched to.
The process of the method for authenticating of bluetooth equipment is as shown in Figure 1, specific as follows in present embodiment:
Step 101, two sets of facility informations are prestored.
Specifically, the facility information in present embodiment may include: product identification (such as product IDs), MAC Address and Key can specifically be prestored when dispatching from the factory configuration.
Step 102, it is authenticated when needing distribution with gateway.
Specifically, when Bluetooth bulb one network of quasi- access, need and the network in grid equipment authenticated, it is practical In, may be configured as Bluetooth bulb needs distribution when booting powers on.Authentication process in this step is specific as shown in Fig. 2, packet Include following steps:
Step 1021, corresponding facility information is extracted according to built-in identification information.
Specifically, identification information can be modified.As shown in Figure 3, it is assumed that the Bluetooth bulb in present embodiment can connect Gateway in the first network in left side can be the gateway in the second network of Baffle Box of Bluetooth or right side such as figure, It can be the router such as figure.Gateway connects server by cloud, and the information for verifying can be requested to server.
Furtherly, there are many identification informations, every kind of identification information can correspond to a set of equipment information, as identification information is When " 1 ", corresponding facility information is the authentication for accessing first network, and when identification information is " 2 ", corresponding facility information is For accessing the authentication of the second network.
It continues to explain, identification information can be set in the predetermined position of memory, when needing distribution, can mention from predetermined position It takes out identification information and determines the facility information that need to currently use further according to the corresponding relationship of identification information and facility information.
Step 1022, the verification information of Bluetooth bulb is obtained by extracted facility information.
It is determined specifically, verification information carries out the cryptographic Hash generated after Hash operation by MAC Address and key, it is practical In, hash algorithm can use SHA256 algorithm.
Step 1023, the verification information of the verification information of bluetooth equipment and gateway is compared.
In practical application, gateway is looked by MAC Address from server when the MAC Address of Bluetooth bulb is arrived in scanning The key for asking the equipment generates cryptographic Hash with the data that the MAC Address of the equipment, key form, equally uses SHA256 algorithm. As shown in figure 3, if Baffle Box of Bluetooth scanning is looked by MAC Address from first server to the MAC Address of a certain Bluetooth bulb The key for obtaining the Bluetooth bulb is ask, in conjunction with the MAC Address scanned, using SHA256 hash algorithm, by the cryptographic Hash of acquisition As verification information to be compared.
Step 1024, determine whether that the authentication is passed according to comparison result.
Specifically, comparison result is unanimously determined as, the authentication is passed, and the inconsistent authentication that is determined as of comparison result does not pass through.
Generally speaking, above-mentioned steps 1021 to step 1024 specifically illustrate Bluetooth bulb when needing distribution how with gateway Device authentication.
Step 103, whether passed through according to authentication, it is determined whether connect with gateway.
Specifically, connecting if the authentication is passed with gateway, corresponding network can be also accessed.
As it can be seen that present embodiment is in terms of existing technologies, more set facility informations are prestored in bluetooth equipment, are needing to reflect That required set facility information is temporary selected, and is converted to verification information, by the verification information and gateway progress after conversion It compares, so that it is determined that whether authentication passes through.Due to there being more set facility informations in bluetooth equipment, can be selected according to identification information With, it is seen then that can the verification information different by modified logo information acquisition widen indigo plant to carry out the authentication of Different Strategies The application scenarios of tooth equipment.Hash operation verification information is wherein also explicitly used, verification information is pacified for comparing using cryptographic Hash Full property is more preferable.
In addition, it should be noted that, in present embodiment by taking Bluetooth bulb as an example, in practical application, bluetooth equipment may be used also To be other, such as bluetooth microphone, bluetooth headset.
Second embodiment of the present invention is related to a kind of method for authenticating of bluetooth equipment.Second embodiment is real first It applies and is further improved on the basis of mode, mainly the improvement is that in second embodiment of the invention, built-in mark Knowing information can be modified by mobile terminal, the operation for the user that is more convenient for.
Specifically, when needing modified logo information, the Bluetooth broadcast for carrying switching command is sent using mobile terminal, and Using the MAC Address of bluetooth equipment or identification number as the identification code of broadcast reception side, bluetooth equipment receive carry from The broadcast of body MAC Address or identification number obtains switching command after parsing, if receiving the broadcast that MAC Address or identification number are not inconsistent, Then directly abandon.
As it can be seen that the mobile terminal that present embodiment is not required to user is connected with bluetooth equipment, can be realized in bluetooth equipment The modification of identification information, modification process are simply easily realized.
Third embodiment of the present invention is related to a kind of method for authenticating of bluetooth equipment.Third embodiment is implemented with first Mode is roughly the same, is in place of the main distinction: prestoring two sets of facility informations in the first embodiment, in bluetooth equipment.And Three sets of facility informations are prestored in second embodiment of the invention, in bluetooth equipment, so that bluetooth equipment can be adapted for more Authentication policy network.
Specifically, prestoring three sets of facility informations in present embodiment in bluetooth equipment, accordingly, identification information also has three Kind, by a variety of identification informations in bluetooth equipment, different facility informations is respectively corresponded, according to network to be accessed, setting mark Know information, later, when needing distribution, corresponding facility information is extracted according to identification information.
As it can be seen that the bluetooth equipment in present embodiment prestores more set facility informations, bluetooth equipment is applicable in In the network of more authentication policies.
The step of various methods divide above, be intended merely to describe it is clear, when realization can be merged into a step or Certain steps are split, multiple steps are decomposed into, as long as including identical logical relation, all in the protection scope of this patent It is interior;To adding inessential modification in algorithm or in process or introducing inessential design, but its algorithm is not changed Core design with process is all in the protection scope of the patent.
Four embodiment of the invention is related to a kind of electronic equipment, as shown in Figure 4, comprising:
At least one processor;And the memory being connect at least one processor communication;Wherein, memory stores There is the instruction that can be executed by least one processor, instruction is executed by least one processor, so that at least one processor energy Enough method for authenticating executed such as above-mentioned first embodiment any one bluetooth equipment into third embodiment.
Wherein, memory is connected with processor using bus mode, and bus may include the bus of any number of interconnection And bridge, bus is by one or more processors together with the various circuit connections of memory.Bus can also will be such as peripheral Together with various other circuit connections of management circuit or the like, these are all well known in the art for equipment, voltage-stablizer , therefore, it will not be further described herein.Bus interface provides interface between bus and transceiver.Transceiver Can be an element, be also possible to multiple element, such as multiple receivers and transmitter, provide for over a transmission medium with The unit of various other device communications.The data handled through processor are transmitted on the radio medium by antenna, further, Antenna also receives data and transfers data to processor.Processor is responsible for managing bus and common processing, can also provide Various functions, including timing, peripheral interface, voltage adjusting, power management and other control functions.And memory can by with Used data when storage processor is in execution operation.
Fifth embodiment of the invention is related to a kind of computer readable storage medium, is stored with computer program.Computer Above method embodiment is realized when program is executed by processor.
That is, it will be understood by those skilled in the art that implement the method for the above embodiments be can be with Relevant hardware is instructed to complete by program, which is stored in a storage medium, including some instructions are to make It obtains an equipment (can be single-chip microcontroller, chip etc.) or processor (processor) executes each embodiment method of the application All or part of the steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize specific embodiments of the present invention, And in practical applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.

Claims (9)

1. a kind of method for authenticating of bluetooth equipment, which is characterized in that be applied to bluetooth equipment, comprising:
Prestore at least two sets of facility informations;
It is authenticated when needing distribution with gateway, wherein corresponding facility information is extracted according to built-in identification information, passes through institute The facility information of extraction obtains the verification information of bluetooth equipment, by the verification information of the bluetooth equipment and the gateway Verification information compares, and determines whether that the authentication is passed according to comparison result, wherein the identification information can be modified;
Whether passed through according to authentication, it is determined whether connect with the gateway.
2. the method for authenticating of bluetooth equipment according to claim 1, which is characterized in that the facility information is configured in factory When prestore.
3. the method for authenticating of bluetooth equipment according to claim 1, which is characterized in that the identity information includes: MAC Location and key.
4. the method for authenticating of bluetooth equipment according to claim 3, which is characterized in that the verification information passes through described MAC Address and the key carry out the cryptographic Hash generated after Hash operation and determine.
5. the method for authenticating of bluetooth equipment according to claim 1, which is characterized in that the built-in identification information can lead to Cross mobile terminal modification.
6. the method for authenticating of bluetooth equipment according to claim 5, which is characterized in that the built-in identification information can lead to Broadcast of the reception from mobile terminal is crossed to modify.
7. the method for authenticating of bluetooth equipment according to any one of claim 1 to 6, which is characterized in that the mark letter Breath includes N kind, and every kind of identification information corresponds to a set of equipment information.
8. a kind of electronic equipment characterized by comprising
At least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one It manages device to execute, so that at least one described processor is able to carry out the mirror of the bluetooth equipment as described in any in claim 1 to 7 Power method.
9. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the computer program is processed The method for authenticating of any bluetooth equipment in claim 1 to 7 is realized when device executes.
CN201910152196.9A 2019-02-28 2019-02-28 A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium Pending CN110139274A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910152196.9A CN110139274A (en) 2019-02-28 2019-02-28 A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910152196.9A CN110139274A (en) 2019-02-28 2019-02-28 A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium

Publications (1)

Publication Number Publication Date
CN110139274A true CN110139274A (en) 2019-08-16

Family

ID=67568486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910152196.9A Pending CN110139274A (en) 2019-02-28 2019-02-28 A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium

Country Status (1)

Country Link
CN (1) CN110139274A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333677A (en) * 2019-11-19 2021-02-05 杭州智缤科技有限公司 Safe communication method of low-power-consumption Bluetooth
CN113840266A (en) * 2020-06-24 2021-12-24 华为技术有限公司 Bluetooth pairing method, device, system, electronic equipment and storage medium
WO2022061668A1 (en) * 2020-09-24 2022-03-31 Oppo广东移动通信有限公司 Bluetooth device access authentication method, and electronic device and storage medium
CN114666154A (en) * 2022-04-08 2022-06-24 深圳市欧瑞博科技股份有限公司 Device communication method, apparatus, gateway, device, system, medium and product

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333677A (en) * 2019-11-19 2021-02-05 杭州智缤科技有限公司 Safe communication method of low-power-consumption Bluetooth
CN112333677B (en) * 2019-11-19 2022-08-19 杭州智缤科技有限公司 Safe communication method of low-power-consumption Bluetooth
CN113840266A (en) * 2020-06-24 2021-12-24 华为技术有限公司 Bluetooth pairing method, device, system, electronic equipment and storage medium
CN113840266B (en) * 2020-06-24 2024-05-03 华为技术有限公司 Bluetooth pairing method, device, system, electronic equipment and storage medium
WO2022061668A1 (en) * 2020-09-24 2022-03-31 Oppo广东移动通信有限公司 Bluetooth device access authentication method, and electronic device and storage medium
CN114666154A (en) * 2022-04-08 2022-06-24 深圳市欧瑞博科技股份有限公司 Device communication method, apparatus, gateway, device, system, medium and product
CN114666154B (en) * 2022-04-08 2023-11-24 深圳市欧瑞博科技股份有限公司 Device communication method, device, gateway, device, system, medium and product

Similar Documents

Publication Publication Date Title
CN110139274A (en) A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium
US9756036B2 (en) Mechanisms for certificate revocation status verification on constrained devices
US20140026200A1 (en) Method and apparatus for providing secret delegation
US11989543B2 (en) Method for interoperating between bundle download process and eSIM profile download process by SSP terminal
CN112019503B (en) Method for obtaining equipment identifier, communication entity, communication system and storage medium
US11356841B2 (en) Method and apparatus for handling remote profile management exception
CN107919962A (en) A kind of internet of things equipment registration and authentication method
CN105992306A (en) Binding method of terminal and home gateway
US11246174B2 (en) Methods and systems for connecting a wireless device to a wireless network
CN102420642B (en) Bluetooth device and communication method thereof
CN103957580A (en) Rapid WIFI networking matching method and module for smart hardware
US9703987B2 (en) Identity based connected services
CN112913263A (en) Method and apparatus for handling remote profile management exceptions
US9961074B2 (en) System and method for providing an authentication certificate for a wireless handheld device a data center environment
JP2023544602A (en) Method and apparatus for link operation of multilink devices
US11777742B2 (en) Network device authentication
CN113779516B (en) Equipment control method and device, storage medium and electronic device
CN115767554A (en) Low-power-consumption Bluetooth binding method and system based on signal intensity
CN116918317A (en) Electronic device for establishing network slice and data session and operation method thereof
CN115146320A (en) Certificate query method and device
JP2012533101A (en) How to manage applications embedded in secured electronic tokens
WO2020258099A1 (en) Method for configuring internet of things device, and internet of things device
CN104053153B (en) The method and system of wireless Mesh netword access authentication
CN111953672B (en) Network access method, server and storage medium
US20220377081A1 (en) Mutual device-to-device authentication method and device during device-to-device bundle or profile transfer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190816