CN114697879B - Bluetooth pairing method, electronic device, chip and storage medium - Google Patents

Bluetooth pairing method, electronic device, chip and storage medium Download PDF

Info

Publication number
CN114697879B
CN114697879B CN202011630687.9A CN202011630687A CN114697879B CN 114697879 B CN114697879 B CN 114697879B CN 202011630687 A CN202011630687 A CN 202011630687A CN 114697879 B CN114697879 B CN 114697879B
Authority
CN
China
Prior art keywords
electronic device
irk
electronic
rpa
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011630687.9A
Other languages
Chinese (zh)
Other versions
CN114697879A (en
Inventor
李�荣
蒋钟寅
赵丽美
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202011630687.9A priority Critical patent/CN114697879B/en
Publication of CN114697879A publication Critical patent/CN114697879A/en
Application granted granted Critical
Publication of CN114697879B publication Critical patent/CN114697879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application is applicable to the technical field of communication and provides a Bluetooth pairing method, electronic equipment, a chip and a storage medium. The Bluetooth pairing method comprises the following steps: the first electronic equipment generates a first IRK according to the sharing identification information, the sharing identification information is information which is possessed by a plurality of electronic equipment, the plurality of electronic equipment comprises the first electronic equipment, the first electronic equipment generates a first RPA according to the first IRK, and the first electronic equipment sends a first BLE broadcast message carrying the first RPA. Since the shared identification information is the same, a plurality of electronic devices can generate the same IRK according to the shared identification information. And generating RPA according to the IRK at the broadcasting party, and sending out the RPA carried in the broadcasting message. Correspondingly, after receiving the broadcast message, other electronic devices can successfully analyze the RPA according to the same IRK, and determine whether the identity of the device is credible or not at the device discovery stage, thereby shortening the pairing time.

Description

Bluetooth pairing method, electronic device, chip and storage medium
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to a Bluetooth pairing method, electronic equipment, a chip and a storage medium.
Background
Bluetooth is a wireless technology supporting short-range communication of devices, with a small communication range, typically within 10 m. Bluetooth has evolved to include several versions. Generally, the base rate and enhanced rate (BR/EDR) bluetooth preceding the bluetooth version 3.0 is referred to as conventional bluetooth, and bluetooth low energy (bluetoothlow energy, BLE) is introduced at the bluetooth version 4.0.
At present, after a BLE broadcast scan is started, all peripheral devices including trusted devices and untrusted devices can be found, and an appropriate device needs to be manually selected to establish a Low Energy (LE) connection, and then the next pairing authentication can be performed. The Bluetooth pairing process has more steps and takes longer time.
Disclosure of Invention
The embodiment of the application provides a Bluetooth pairing method, electronic equipment, a chip and a storage medium, and whether equipment identity is credible or not can be determined in the equipment discovery stage, so that pairing time is shortened.
In a first aspect, a bluetooth pairing method is provided, applied to a first electronic device, and the method includes: generating a first IRK according to the sharing identification information, wherein the sharing identification information is information of a plurality of electronic devices, the plurality of electronic devices comprise the first electronic device, generating a first RPA according to the first IRK, and sending a first BLE broadcast message, and the first BLE broadcast message comprises the first RPA.
According to the Bluetooth pairing method provided by the first aspect, a plurality of electronic devices can have the same shared identification information. Since the shared identification information is the same, IRKs generated by each electronic device according to the shared identification information are the same. When a first electronic device in the plurality of electronic devices serves as a broadcasting party, the first electronic device generates RPA according to the IRK, and the RPA is carried in the sent broadcasting message. Accordingly, if other electronic devices in the plurality of electronic devices receive the broadcast message, the RPA may be parsed according to the IRK. If the parsing is successful, the broadcasted electronic device is indicated as one of a plurality of electronic devices, and can be determined as a trusted device. Therefore, in the stage of discovering the equipment, whether the identity of the equipment is credible can be determined, the message flow of Bluetooth pairing is simplified, the pairing time is shortened, and the time delay is shortened for subsequent service transmission. In addition, the autonomous pairing can be completed without manual participation in the pairing process, so that the user experience is improved, and the realization of the non-perception networking is supported.
In a possible implementation manner, the method further includes: data is transmitted with the second electronic device based on the BLE broadcast message.
In the implementation manner, after the trusted device is determined in the device discovery stage, communication can be performed based on the BLE broadcast message, so that the data transmission delay is shortened.
In a possible implementation manner, the method further includes: and establishing LE connection with the second electronic equipment, and transmitting data with the second electronic equipment based on the LE connection.
In the implementation mode, after the trusted device is determined in the device discovery stage, the LE connection is established, communication is performed based on the LE connection, and the reliability of the communication is improved.
In a possible implementation manner, the method further includes: and receiving a second BLE broadcast message, when the second BLE broadcast message comprises a second RPA, analyzing the second RPA according to the IRK stored by the first electronic device, and if the second RPA is successfully analyzed according to the IRK stored by the first electronic device, storing the electronic device corresponding to the second RPA in a trusted device list, wherein the trusted device list is stored in the first chip.
In this implementation, the trusted device list may be provided for the upper layer application by storing the trusted device list in the first chip. And the non-trusted equipment can be filtered out in the equipment discovery stage, so that the time delay is shortened, and the safety and the efficiency of the system are improved.
In a possible implementation manner, the method further includes: receiving operation of a user, wherein the operation is used for checking the trusted devices in the trusted device list; in response to the operation, a target interface is displayed, the target interface comprising a trusted device.
In one possible implementation, the target interface includes at least one device group including at least one trusted device, the trusted devices in the device group having the same shared identification information.
In the implementation mode, the trusted devices can be displayed for the users in groups, so that the users can know networking conditions, and user experience is improved.
In one possible implementation, the first electronic device is in a sleep state.
In the implementation mode, the broadcast scanning can be started when the electronic equipment is in the dormant state, the equipment identity can be found a priori at the equipment stage under the condition that the OS is not awakened, and the equipment power consumption is reduced.
In a second aspect, a bluetooth pairing method is provided, applied to a second electronic device, and the method includes: generating a first IRK according to the shared identification information, wherein the shared identification information is information of a plurality of electronic devices, the plurality of electronic devices comprise a second electronic device, receiving a BLE broadcast message sent by the first electronic device, analyzing the RPA according to the first IRK when the BLE broadcast message comprises the RPA, and determining the first electronic device as a trusted device if the RPA is successfully analyzed according to the first IRK.
In a possible implementation manner, the method further includes: the first electronic device is stored in a list of trusted devices, which is stored in the first chip.
In a possible implementation manner, the method further includes: receiving operation of a user, wherein the operation is used for checking the trusted devices in the trusted device list; in response to the operation, a target interface is displayed, the target interface comprising a trusted device.
In one possible implementation, the target interface includes at least one device group including at least one trusted device, the trusted devices in the device group having the same shared identification information.
In a possible implementation manner, the method further includes: data is transmitted with the first electronic device based on the BLE broadcast message.
In a possible implementation manner, the method further includes: and establishing LE connection with the first electronic equipment, and transmitting data with the first electronic equipment based on the LE connection.
In one possible implementation, the second electronic device is in a dormant state.
In a third aspect, there is provided an apparatus comprising: units or means (means) for performing the steps of any of the above aspects.
In a fourth aspect, there is provided an electronic device comprising a processor, a memory and a transceiver for communicating with other devices, the processor for invoking a program stored in the memory to perform the method provided in any of the above aspects.
In a fifth aspect, there is provided a chip comprising a processor coupled to a memory, the processor executing a computer program stored in the memory to perform the method provided in any of the above aspects.
In a sixth aspect, there is provided a computer readable storage medium having instructions stored therein which, when executed on a computer or processor, implement the method provided in any of the above aspects.
In a seventh aspect, a program product is provided, the program product comprising a computer program stored in a readable storage medium, the computer program being readable from the readable storage medium by at least one processor of a device, the at least one processor executing the computer program causing the device to carry out the method provided in any one of the above aspects.
In any of the above aspects, in one possible implementation manner, the shared identification information includes any one of the following: user account number, group identification, or identification of an application.
In one possible implementation manner, the method may further include: and storing the first IRKs in the first chip, wherein the maximum number of the IRKs stored in the first chip is more than 16.
In the implementation mode, the first chip is added in the electronic equipment, so that the IRK capacity is enlarged, the capability of the electronic equipment for storing and processing the IRK is improved, and the communication performance is improved in a scene of coexistence of multiple groups or multiple services.
In one possible implementation, the first chip is an MCU or a sensor hub.
Drawings
FIG. 1 is a diagram of a system architecture suitable for use in embodiments of the present application;
FIG. 2 is a schematic diagram of an RPA;
fig. 3 is a schematic diagram of a structure of a BLE protocol stack;
fig. 4 is another schematic structural diagram of a BLE protocol stack according to an embodiment of the present application;
FIG. 5 is a message interaction diagram of one implementation of a Bluetooth pairing method;
FIG. 6 is a schematic diagram of the IRK generation of FIG. 5;
FIG. 7 is a schematic diagram of an interface after scanning by a first electronic device and a second electronic device;
FIG. 8 is a schematic diagram of an interface in which a first electronic device and a second electronic device request pairing;
FIG. 9 is a schematic diagram of an interface after pairing a first electronic device and a second electronic device;
FIG. 10 is a message interaction diagram of another implementation of a Bluetooth pairing method;
FIG. 11 is a schematic diagram of IRK generation provided in an embodiment of the present application;
Fig. 12 is a networking topology diagram provided in an embodiment of the present application;
fig. 13 is a message interaction diagram of a bluetooth pairing method according to an embodiment of the present application;
fig. 14 is a schematic diagram of an interface after scanning by the second electronic device according to the embodiment of the present application;
fig. 15 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of another electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below with reference to the accompanying drawings.
The Bluetooth pairing method provided by the embodiment of the application is suitable for electronic equipment for Bluetooth communication. Fig. 1 is an exemplary system architecture diagram applicable to the embodiments of the present application. As shown in fig. 1, the system may include a handset a, a handset B, a handset C, a smart band D, and a television E. Each device supports bluetooth communications. For example, handset B may be in bluetooth communication with handset a, handset C, smart band D, and television E. The number of the electronic devices in the application scene is not limited.
The name and type of the electronic device are not limited in the embodiments of the present application. For example, the electronic device may also be called a User Equipment (UE), a terminal device, a terminal or a Mobile Terminal (MT), and some examples of the electronic device are: a mobile phone, a tablet, a notebook, a palm, a wearable device, a bluetooth speaker, a third party car, a third party large screen, an internet of things (internet of things, IOT) device, a teaching device, a mobile internet device (mobile internet device, MID), a Virtual Reality (VR) device, an augmented reality (augmented reality, AR) device, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned (self-driving), a wireless terminal in teleoperation (remote medical surgery), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation security (transportation safety), a wireless terminal in smart city (smart city), or a wireless terminal in smart home (smart home), and the like.
It should be noted that in the embodiment of the present application, BLE communication and bluetooth communication have the same meaning.
First, concepts related to the embodiments of the present application will be described.
1. Authentication, pairing and binding
In bluetooth communication, in order to ensure the security of communication, an electronic device performs data interaction in an authentication manner. Wherein a first authentication between two electronic devices may be referred to as a pairing procedure. After the pairing process, the two electronic devices have stored keys in the devices, and if the stored keys are not manually emptied, the subsequent connection will not be subjected to the pairing process.
Alternatively, the pairing process may include pairing and binding. Pairing refers to the process between selecting and determining a device that needs to communicate, i.e., identity determination, and generally refers to the request pairing and the acquisition of a Short Term Key (STK). Binding refers to the process of exchanging one or a combination of at least 2 of a Long Term Key (LTK), an identity resolution key (identity resolving key, IRK) and a connection signature resolution key (connection signature resolving key, CSRK), storing the exchanged keys in a local database.
2. IRK, resolvable private Address (resolvable private address, RPA)
IRK is associated with RPA. RPA can be generated by using IRK, and IRK is needed as input when the RPA is analyzed correspondingly. If the electronic device a knows the IRK of the electronic device B, when an RPA is received, it can be determined whether the RPA corresponds to the electronic device B according to the IRK of the electronic device B, thereby determining the identity of the electronic device to which the RPA corresponds.
Illustratively, FIG. 2 is a schematic diagram of an RPA. As shown in fig. 2, RPA is 48bits. Wherein the upper 24bits are the random number portion, the highest two bits are "10" for identifying the address type, and the remaining bits represent the random number. The low order 24bits are hash values (hash values) obtained by hash operation of the random number and the IRK, and the embodiment of the application does not limit the calculation method of the hash operation. Illustratively, in fig. 2, the least significant bit (least significant bit, LSB) is located to the left of the binary number and the most significant bit (most significant bit, MSB) is located to the right of the binary number.
3. Broadcasters and sponsors
Bluetooth communication involves two communication parties, which in the embodiments of the present application are referred to as a first electronic device and a second electronic device, respectively. Among them, a device that transmits a broadcast packet is called a broadcaster (advertisement), a device that receives a broadcast packet in a broadcast channel but is not connected to the broadcaster is called a scanner (scanner), and a device that receives a broadcast packet in a broadcast channel and is connected to the broadcaster is called an initiator (initiator).
The names of broadcasters, scanners, and initiators are not limited in this embodiment of the present application. For example, broadcasters are also referred to as broadcasters, and originators are also referred to as originators.
For convenience of explanation, the embodiment of the application will be described with the first electronic device as a broadcaster and the second electronic device as an initiator.
Next, a BLE protocol stack will be described.
Alternatively, in one implementation, fig. 3 is a schematic diagram of a structure of a BLE protocol stack. The initiator is similar to the BLE protocol stack structure of the broadcaster. As shown in fig. 3, the BLE protocol stack includes a host (host), a host controller interface (host controller interface, HCI), and a controller (controller). The controller includes a Link Layer (LL) and a physical layer (PHY). Alternatively, the controller may include a main controller and an auxiliary controller.
Higher layer protocols in the host may include generic attribute profiles (generic attribute profile, GATT), generic access profiles (generic access profile, GAP), attribute protocols (attribute protocol, ATT), security management protocols (secure manager protocol, SMP), and logical link control and adaptation protocols (logic link control and adaptation protocol, L2 CAP), see in particular the description related to the bluetooth protocol. Wherein SMP is used to manage encryption and security of BLE connection, L2CAP can be used to distinguish whether it is an encrypted channel or a normal channel. In embodiments of the present application, the host may generate an IRK.
The HCI is used for realizing the scene of a BLE protocol stack by adopting 2 chips and is used for standardizing a communication protocol, a communication command and the like between the host and the controller.
The link layer in the controller is used for managing and controlling the link, determining the sending time of the data packet, selecting a radio frequency channel, realizing the feedback and retransmission of the data packet, and the like. The link layer stores an resolution list (resolution list), which is provided by the host to the controller through the HCI command, and includes entries such as a local IRK (local IRK), peer IRK (peer IRK), or identity address (identity address), and the number of the resolution list is maximally supported by 16. It is understood that the link layer supports a maximum of 16 IRKs.
The physical layer in the controller is used to select a radio band, a modulation and demodulation scheme, and the like used for BLE communication.
Alternatively, in another implementation manner, fig. 4 is another schematic structural diagram of a BLE protocol stack provided in an embodiment of the present application. In fig. 4, compared to fig. 3, the BLE protocol stack may further include a micro control unit (microcontroller unit, MCU) connected to the HCI, as shown in fig. 4. The MCU can be provided with a Bluetooth system, and the Bluetooth system can interact with the Bluetooth chip to realize broadcasting and scanning. Optionally, when the electronic device is in the sleep state, broadcasting and scanning can still be started through the bluetooth system on the MCU, so that the non-perception networking of the electronic device is realized, and the user experience is improved.
The MCU may have stored thereon a resolution list (resolution list) which is similar in principle to the resolution list in fig. 3, except that: the parsing list on the MCU supports more than 16 IRKs, and the numerical values of the supported IRKs are not limited in the embodiment of the application. Therefore, by adding the MCU, the storage capacity of the IRK is greatly improved, and the capability of the electronic equipment for analyzing the RPA is improved.
The MCU may also have a list of trusted devices stored thereon. The trusted device list comprises relevant information of the trusted devices determined by the Bluetooth pairing method.
It should be noted that fig. 4 is only an example, and the MCU in fig. 4 may be replaced by other devices having similar functions, for example, a sensor hub (sensor rhub).
One implementation of the bluetooth pairing method is described below with reference to fig. 5 to 10. As shown in fig. 5, the bluetooth pairing method may include:
s501, after the first electronic equipment starts Bluetooth, a first IRK is generated.
S502, after the second electronic equipment starts Bluetooth, generating a second IRK.
The present embodiment does not limit the execution order of S501 and S502.
Illustratively, fig. 6 is a schematic diagram of the IRK generation of fig. 5. As shown in fig. 6, the first IRK is related to the identification information of the first electronic device, and the second IRK is related to the identification information of the second electronic device. The identification information is used to uniquely distinguish different electronic devices, e.g. device identification codes. The initiator BLE protocol stack generates a second IRK according to the identification information of the second electronic equipment, and the broadcaster BLE protocol stack generates a first IRK according to the identification information of the first electronic equipment.
S503, the first electronic device sends a broadcast message.
S504, the second electronic device discovers the device through scanning.
The second electronic device may find all surrounding devices including trusted devices and untrusted devices through scanning, and needs to be further manually judged by a user and select a suitable device to establish LE connection, so as to perform a subsequent pairing process.
Fig. 7 is a schematic diagram of an interface after scanning by the first electronic device and the second electronic device. Fig. 7 (a) shows the scan result of the second electronic device, and fig. 7 (b) shows the scan result of the first electronic device. As shown in fig. 7 (a), the bluetooth main interface 70 includes a bluetooth-enabled switch control 71, an open-detected switch control 72, a "device name" tab, a "received file" tab, paired devices, and available devices. The paired device comprises a device successfully paired before the second electronic device. The available devices include devices that the second electronic device scans for and that have not been paired, requiring manual judgment and selection of the appropriate device for pairing by the user a of the second electronic device. For example, as shown in (a) of fig. 7, the user a may click on the first electronic device to pair, and accordingly, the second electronic device initiates the pairing procedure in response to the click operation of the user a.
The bluetooth main interface 76 displayed by the first electronic device is similar to the principle of the bluetooth main interface 70, and will not be described herein.
S505, the first electronic device establishes LE connection with the second electronic device.
S506, the second electronic device sends a Pairing Request (Pairing Request) to the first electronic device. Correspondingly, the first electronic device receives a transmission pairing request sent by the second electronic device.
S507, the first electronic device sends a Pairing Response (Pairing Response) to the second electronic device. Correspondingly, the second electronic device receives the transmission pairing response sent by the first electronic device.
Specifically, S506 and S507 are phase 1 of the pairing process for exchanging configuration information through a pairing request and a pairing response. The configuration information is used to determine the pairing scheme and to assign keys in a later stage 3. Alternatively, the configuration information may include input-output capabilities of the electronic device. Different electronic devices are different in type, different in hardware configuration and different in input and output capabilities. For example, whether the electronic device can input, the manner of the input, whether it can be displayed, etc. Alternatively, the input-output capabilities of the electronic device may include any one of the following: no input and no output, only display, with display and selectable "yes/no", only keyboard, with keyboard and display.
It should be noted that, in this embodiment, other content included in the configuration information is not limited, for example, a type or a pairing code of the electronic device.
Exemplary, fig. 8 is a schematic diagram of an interface in which a first electronic device and a second electronic device request pairing. In this example, the first electronic device and the second electronic device each have a display screen and can select "yes/no". After the user a of the second electronic device clicks the first electronic device, the pairing popup window 80 is popped up in the bluetooth main interface 70, as shown in fig. 8 (a). User a may operate by looking at the prompt of the pairing pop-up 80. For example, the hint information includes: "to pair with: a first electronic device. Pairing code: 502239". Pairing pop-up window 80 also includes a cancel key and a pairing key. The user a may click a pairing key, and correspondingly, the second electronic device responds to the operation of the user a and sends a pairing request to the first electronic device, where the pairing request may include input and output capabilities of the second electronic device and a pairing code. Similarly, continuing with fig. 7 (b), as shown in fig. 8 (b), a pairing pop-up window 86 is popped up in the bluetooth main interface 76. The user B of the first electronic device may operate by looking at the prompt of the pairing pop-up 86. For example, the hint information includes: the "" second electronic device "wants to pair with your" first electronic device ". Please confirm that the code "502239" is displayed on the "second electronic device". Pairing pop-up window 86 also includes a cancel key and a pairing key. The user B can click a pairing key, and correspondingly, the first electronic device responds to the operation of the user B and sends a pairing response to the second electronic device.
The user a and the user B may be the same user or different users.
It can be seen that in this embodiment, the pairing request and pairing response require manual confirmation by the user on the interface.
S508, the first electronic device and the second electronic device pair based on the SMP.
Specifically, S508 is a stage 2 of the pairing process, configured to determine a pairing algorithm of the first electronic device and the second electronic device by using information carried in the pairing request and the pairing response, generate a STK, and establish an encrypted link.
S509, the first electronic device sends a Key Distribution message (Key Distribution) to the second electronic device. Correspondingly, the second electronic device receives the key distribution message sent by the first electronic device.
S510, the second electronic device sends a Key Distribution message (Key Distribution) to the first electronic device. Correspondingly, the first electronic device receives the key distribution message sent by the second electronic device.
Specifically, S509 and S510 are phase 3 of the pairing procedure for transmitting a key after establishing a link using the STK encryption in phase 2. Wherein the key may be one or a combination of at least two of LTK, IRK or CSRK. And the stage 3 is the binding process, after the stage 3, the first electronic device and the second electronic device store the secret key of the other party into a local database, and can directly establish connection when the communication is needed next time, thereby omitting the pairing process.
S511, the first electronic device and the second electronic device complete pairing and disconnect the LE.
Fig. 9 is a schematic diagram of an interface after the first electronic device and the second electronic device are paired. Fig. 9 (a) shows a bluetooth main interface 70 of a second electronic device, and in fig. 9 (a), paired devices include a first electronic device, as compared to fig. 7 (a). Similarly, as shown in fig. 9 (b), after the first electronic device is paired with the second electronic device, the paired device includes the second electronic device in the bluetooth main interface 76 displayed by the first electronic device.
Therefore, in the bluetooth pairing method provided in this embodiment, the LE connection is first established in the pairing process, and then paired, so that the pairing process has more steps, longer time consumption and longer subsequent service communication delay. In the pairing process, user intervention is needed, proper equipment is selected manually to initiate pairing, and user operation steps are more. In addition, the pairing process requires an Operating System (OS) to be in a working state.
Further, after the first electronic device and the second electronic device are paired, bluetooth communication can be performed according to requirements. Optionally, as shown in fig. 10, the bluetooth pairing method provided in this embodiment may further include:
S1001, the first electronic device generates RPA according to the first IRK.
Specifically, the first electronic device generates an RPA according to the first IRK and a random number. The RPA comprises the random number and a hash value obtained by hash operation on the random number and the first IRK.
S1002, the first electronic device sends a broadcast message, wherein the broadcast message comprises RPA.
S1003, the second electronic device acquires the RPA through scanning.
Specifically, the second electronic device receives the broadcast message sent by the first electronic device, and determines whether the address is an RPA according to the type of the carried address.
S1004, the second electronic device analyzes the RPA by using the first IRK stored locally, and determines whether the device corresponding to the RPA is a trusted device.
Specifically, after the pairing process, the second electronic device stores the first IRK of the first electronic device. The second electronic device may obtain the hash value to be compared through the same hash operation as the first electronic device by using the first IRK and the random number in the RPA carried in the broadcast message. If the hash value to be compared is the same as the hash value in the RPA carried in the broadcast message, the RPA is successfully parsed, it can be determined that the RPA corresponds to the first electronic device, S1005 can be executed, and bluetooth communication is continued.
S1005, the first electronic device establishes LE connection with the second electronic device.
The embodiment of the application provides a Bluetooth pairing method, and a plurality of electronic devices can have the same shared identification information. Each of the plurality of electronic devices may generate an IRK from the shared identification information. Because the sharing identification information is the same, the IRK generated by each electronic device is the same, and each electronic device locally stores the IRK. When a first electronic device in the plurality of electronic devices serves as a broadcasting party, the first electronic device can generate RPA according to the IRK, and the RPA is carried in the sent broadcasting message. Correspondingly, if other electronic devices in the plurality of electronic devices receive the broadcast message, the RPA in the broadcast message is obtained, and the RPA can be analyzed according to the locally stored IRK. If the analysis is successful, the broadcasted electronic equipment is indicated as the first electronic equipment, and the equipment identity is determined to be credible. Therefore, in the broadcasting scanning stage or the device discovery stage, whether the broadcasting party is a trusted device can be determined, so that the message flow of Bluetooth pairing is simplified, the pairing time is shortened, and the time delay is shortened for subsequent service transmission. In addition, the automatic pairing can be completed without manual participation in the pairing process, so that the user experience is improved, and technical support is provided for the non-perception networking of the equipment.
The embodiment of the application does not limit the name and the content of the shared identification information, and can be different in different scenes. Alternatively, the shared identification information may be any one of the following: user account number, group identification, or identification of an application. Alternatively, the group identifier may be a bar code or a two-dimensional code. In practical applications, the group types may be various, such as chat groups, conference groups, work groups, and so on. The names and uses of the application programs in the embodiments of the present application are not limited. Fig. 11 is a schematic diagram of IRK generation according to an embodiment of the present application. As shown in fig. 11, the identification of the application may include APP1 and APP2, the group identification may include group 1 and group 2, and the user account may include account 1. The first electronic device and the second electronic device can generate IRK1 according to APP1, IRK2 according to APP2, IRK3 according to group 1, IRK4 according to group 2 and IRK5 according to account number 1.
In the embodiment of the present application, the number of shared identification information of each electronic device is not limited, and it may be understood that the number of IRKs generated according to the shared identification information is not limited.
The application scenario of the embodiments of the present application is illustrated below, but the application scenario is not limited thereto.
Optionally, in an application scenario, as shown in fig. 1, the user logs in to the mobile phone a, the mobile phone B, the mobile phone C, the smart band D and the television E using the same account number. Then, handset a, handset B, handset C, smart band D and television E can all generate the same IRK from the account. By broadcasting scanning between devices, the devices can mutually confirm as trusted devices in the device discovery stage, and a trusted home network can be built.
Optionally, in another application scenario, for example, a conference scenario, a conference participant may establish a temporary group, and the identifier of the temporary group may be a two-dimensional code. After users use the respective devices to start the same service, the devices can generate the same IRK according to the two-dimension code. By means of the broadcast scanning between the devices, the devices can mutually confirm as trusted devices in the device discovery phase, and a trusted conference group network can be built.
Alternatively, in yet another application scenario, as shown in fig. 12, 16 electronic devices are included. The electronic devices 1 to 6 have the same group identifier, specifically, the group 1, and the electronic devices 1 to 6 may generate the same IRK according to the group 1. Any two devices of the electronic devices 1-6 can be paired according to the same IRK, and the trusted network 1 is built without perception. Similarly, the electronic devices 7-11 and 2 have the same application program identifier, specifically APP1, and the electronic devices 7-11 and 2 can generate the same IRK according to APP1, so that the trusted network 2 is built without perception. The electronic devices 12 to 16 and 6 have the same account number, specifically account number 1, and the electronic devices 12 to 16 and 6 can generate the same IRK according to the account number 1, so that the trusted network 3 can be built without perception.
It should be noted that, the bluetooth pairing method provided in the embodiment of the present application and the embodiments shown in fig. 5 to 10 may be combined with each other. For example, as shown in fig. 12, the electronic apparatus 1 and the electronic apparatus 7 do not have shared identification information. The electronic device 1 and the electronic device 7 may be paired by using the bluetooth pairing method provided in the embodiments shown in fig. 5 to 10, where the IRK generated by the electronic device 1 is different from the IRK generated by the electronic device 7. Similarly, the bluetooth pairing method provided in the embodiments shown in fig. 5 to 10 may be used between the electronic device 1 and the electronic device 12, and between the electronic device 12 and the electronic device 7.
The technical scheme of the present application is described in detail below through specific examples. The following embodiments may be combined with each other and may not be described in detail in some embodiments for the same or similar concepts or processes.
The terms "first," "second," "third," "fourth," and the like in embodiments of the present application, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order.
Fig. 13 is a message interaction diagram of a bluetooth pairing method according to an embodiment of the present application. The execution body related to the embodiment includes a first electronic device and a second electronic device. As shown in fig. 13, the bluetooth pairing method provided in this embodiment may include:
S1301, the first electronic device generates a first IRK according to the sharing identification information.
S1302, the second electronic device generates a first IRK according to the sharing identification information.
The present embodiment does not limit the execution order of S1301 and S1302.
The sharing identification information is information of a plurality of electronic devices, and the plurality of electronic devices comprise a first electronic device and a second electronic device. The shared identification information may be referred to in the related description of the present application, and will not be described herein.
In this embodiment, the first IRK is related to shared identification information that a plurality of electronic devices have. Since the shared identification information is the same, the first IRK generated by each of the plurality of electronic devices is the same.
In this embodiment, the number of groups to which the first electronic device and the second electronic device belong is not limited, and the number of electronic devices included in each group is not limited, and may be different according to different application scenarios. For example, as shown in fig. 12, it is assumed that the first electronic device is the electronic device 2, and the first electronic device has 2 groups, which are a group of the electronic devices 1 to 6 and a group of the electronic devices 7 to 11, 2, respectively. Wherein each group has shared identification information.
And S1303, the first electronic equipment generates RPA according to the first IRK.
The structure of the first RPA may be referred to in fig. 2, and will not be described herein.
S1304, the first electronic device sends a first BLE broadcast message, the first BLE broadcast message including a first RPA.
S1305, the second electronic device obtains the first RPA in the first BLE broadcast message through scanning.
S1306, the second electronic device analyzes the first RPA according to the first IRK.
Specifically, after the second electronic device receives the first BLE broadcast message, it may determine what type of address is carried in the first BLE broadcast message. When the address carried in the first BLE broadcast message is determined to be RPA, the first RPA in the first BLE broadcast message is analyzed according to the first IRK. If the analysis is successful, S1307 is executed.
If the number of the first IRKs is plural, the first RPA in the first BLE broadcast message is analyzed sequentially according to each first IRK until the analysis is successful or the analysis fails.
S1307, if the second electronic device successfully analyzes the first RPA according to the first IRK, determining that the first electronic device is a trusted device.
Therefore, in the bluetooth pairing method provided in this embodiment, a plurality of electronic devices may have the same shared identification information. Each of the plurality of electronic devices may generate an IRK from the shared identification information. Since the shared identification information is the same, the IRK generated by each electronic device is the same. When a first electronic device in the plurality of electronic devices serves as a broadcasting party, the first electronic device can generate RPA according to the IRK, and the RPA is carried in the sent broadcasting message. Correspondingly, a second electronic device in the plurality of electronic devices serves as an initiator, and RPA in the broadcast message is acquired after the broadcast message is received, so that the RPA can be analyzed according to the locally stored IRK. And if the analysis is successful, the first electronic device is a trusted device. According to the Bluetooth pairing method provided by the embodiment, whether the broadcasting party is the trusted device can be determined at the device discovery stage, so that the pairing message flow is simplified, the pairing time is shortened, and the time delay is shortened for subsequent service transmission. In addition, the automatic pairing can be completed without manual participation in the pairing process, so that the user experience is improved, and technical support is provided for the non-perception networking.
Optionally, the bluetooth pairing method provided in this embodiment may further include:
s1308, the first electronic device stores the first IRK in a first chip of the first electronic device.
S1309, the second electronic device stores the first IRK in the first chip of the second electronic device.
The present embodiment does not limit the execution order of S1308 and S1309.
The maximum number of IRKs stored in the first chip is greater than 16. See figure 4 for a structure of a BLE protocol stack. Alternatively, the first chip may be an MCU or a sensor hub. Alternatively, the first IRK may be stored in a resolution list (resolution list) in the first chip.
Typically, chip hardware resources for short-range communications are limited and processing power is limited, e.g., in the BLE protocol stack shown in fig. 3, the link layer of the chip supports a maximum of 16 IRKs. In the embodiment, the first chip is added, so that IRK capacity is enlarged, the capability of the electronic equipment for storing and processing IRK is improved, and communication performance is improved in a scene of coexistence of multiple groups or multiple services.
Alternatively, the first chip may be loaded with a bluetooth system, and the first electronic device and the second electronic device are in a sleep state. Therefore, when the electronic equipment is in the dormant state, broadcast scanning can be started through the Bluetooth system on the first chip, the identity of the equipment can be found in the equipment stage prior under the condition that the OS is not awakened, and the power consumption of the equipment is reduced.
Optionally, the first electronic device and the second electronic device may be provided with a switch without sensing function, and the user may turn on the non-sensing function of the electronic device or turn off the non-sensing function of the electronic device according to the requirement. The no-sense function refers to the ability of the electronic device to turn on a broadcast scan in a dormant state. The mode of setting the non-perception function by the user is not limited in this embodiment. For example, control may be by voice control, by touch operation in a related interface, etc.
Optionally, after S1307, the bluetooth pairing method provided in this embodiment may further include:
s1310, the second electronic device stores the first electronic device in a trusted device list in the first chip.
The list of trusted devices may be provided for the upper layer application by storing the list of trusted devices in the first chip. And the non-trusted equipment can be filtered out in the equipment discovery stage, so that the time delay is shortened, and the safety and the efficiency of the system are improved.
Optionally, the bluetooth pairing method provided in this embodiment may further include:
the second electronic device receives an operation of a user, the operation being for viewing trusted devices in the list of trusted devices.
The second electronic device displays a target interface in response to the operation, the target interface including a trusted device.
The operation of the user is not limited in this embodiment. For example, the user may input a voice command, or perform a touch operation in the relevant interface.
Fig. 14 is a schematic diagram of an interface after scanning by the second electronic device according to the embodiment of the present application. Alternatively, in one implementation, the target interface may include at least one device group including at least one trusted device, the trusted devices in the device group having the same shared identification information. Illustratively, as shown in fig. 14 (a), the target interface 1401 includes two device groups, device group 1 and device group 2, respectively. The device group 1 may include a mobile phone a, a mobile phone B, a smart bracelet, and a sound box. The shared identification information of the device group 1 may be a user account. The device group 2 may include tablet computers 1-5, and the shared identification information of the device group 2 may be a conference group identification. By displaying the trusted devices for the user group, the user can learn the networking condition, and the user experience is improved. Alternatively, in another implementation, the target interface directly includes a plurality of trusted devices therein. Illustratively, as shown in (b) of fig. 14, the present embodiment does not limit the arrangement order of the plurality of trusted devices in the target interface 1401. Optionally, to enhance the user experience, multiple trusted devices may be displayed sequentially according to different device groups.
Optionally, after S1307, the bluetooth pairing method provided in this embodiment may further include:
s1311, the first electronic device and the second electronic device transmit data based on the BLE broadcast message.
In the implementation manner, after the trusted device is determined in the device discovery stage, communication can be performed based on the BLE broadcast message, so that the data transmission delay is shortened. Alternatively, the first electronic device and the second electronic device may be in a sleep state.
Optionally, after S1307, the bluetooth pairing method provided in this embodiment may further include:
s1312, the first electronic device and the second electronic device establish LE connection and transmit data based on the LE connection.
In the implementation mode, after the trusted device is determined in the device discovery stage, the LE connection is established, communication is performed based on the LE connection, and the reliability of the communication is improved.
In this embodiment, the first electronic device is used as a broadcasting party, and the second electronic device is used as an initiating party. In the actual communication process, the second electronic device may also broadcast, and correspondingly, the first electronic device may scan. At this time, the second electronic device may perform the related operation of the first electronic device in this embodiment, and the first electronic device may perform the related operation of the second electronic device in this embodiment.
Optionally, the first electronic device may further perform the steps of:
a second BLE broadcast message is received.
And when the second BLE broadcast message comprises the second RPA, analyzing the second RPA according to the IRK stored by the first electronic equipment.
And if the second RPA is successfully analyzed according to the IRK stored by the first electronic equipment, storing the electronic equipment corresponding to the second RPA in a trusted equipment list. A list of trusted devices is stored in the first chip.
Optionally, the first electronic device may further perform the steps of:
and receiving operation of a user, wherein the operation is used for viewing the trusted devices in the trusted device list.
In response to the operation, a target interface is displayed, the target interface comprising a trusted device.
Fig. 15 is a schematic structural diagram of an electronic device provided in the embodiment of the present application in a case where respective functional modules are divided by corresponding respective functions. The electronic device provided in this embodiment may perform the operation performed by the first electronic device or the second electronic device in the method embodiment of the present application. As shown in fig. 15, the electronic device may include: a transmitting module 1501, a processing module 1502 and a receiving module 1503.
A sending module 1501 for sending data to other devices. For example, at the broadcaster, a BLE broadcast message, a pairing response, a key allocation message, etc. may be sent. At the initiator, a pairing request, key assignment message, etc. may be sent.
A receiving module 1503, configured to receive data from other devices. For example, at the initiator, a BLE broadcast message, a pairing response, a key allocation message, etc. may be received. At the broadcaster, a pairing request, key assignment message, etc. may be sent.
The processing module 1502 is configured to generate an RPA according to the IRK, store the IRK, parse the RPA according to the IRK, store a trusted device, and so on.
It should be noted that, all relevant contents of each step related to the above method embodiment may be cited to the functional description of the corresponding functional module, which is not described herein.
Referring to fig. 16, another structure of an electronic device provided in an embodiment of the present application is shown, where the electronic device includes: a processor 1601, a receiver 1602, a transmitter 1603, a memory 1604, and a bus 1605. The processor 1601 includes one or more processing cores, and the processor 1601 executes software programs and modules to perform various functional applications and information processing. The receiver 1602 and the transmitter 1603 may be implemented as a communication component, which may be a baseband chip. The memory 1604 is connected to the processor 1601 by way of a bus 1605. The memory 1604 may be used for storing at least one program instruction, and the processor 1601 is configured to execute the at least one program instruction to implement the technical solution of the above embodiment. The implementation principle and technical effects are similar to those of the related embodiments of the method, and are not repeated here.
When the terminal is started, the processor can read the software program in the memory, interpret and execute the instructions of the software program, and process the data of the software program. When data is required to be transmitted through the antenna, the processor carries out baseband processing on the data to be transmitted and then outputs a baseband signal to a control circuit in the control circuit, and the control circuit carries out radio frequency processing on the baseband signal and then transmits the radio frequency signal outwards in the form of electromagnetic waves through the antenna. When data is sent to the terminal, the control circuit receives a radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
Those skilled in the art will appreciate that for ease of illustration, only one memory and processor is shown in fig. 16. In an actual terminal, there may be multiple processors and memories. The memory may also be referred to as a storage medium or storage device, etc., and embodiments of the present application are not limited in this regard.
As an alternative implementation, the processor may include a baseband processor, which is mainly used to process the communication data, and a central processor, which is mainly used to execute a software program and process the data of the software program. It will be appreciated by those skilled in the art that the baseband processor and the central processing unit may be integrated into one processor or may be separate processors interconnected by bus technology or the like. Those skilled in the art will appreciate that a terminal may include multiple baseband processors to accommodate different network formats, and that a terminal may include multiple central processors to enhance its processing capabilities, with various components of the terminal being connectable via various buses. The baseband processor may also be referred to as a baseband processing circuit or baseband processing chip. The central processing unit may also be expressed as a central processing circuit or a central processing chip. The function of processing the communication protocol and the communication data may be built in the processor, or may be stored in a memory in the form of a software program, which is executed by the processor to realize the baseband processing function. The memory may be integrated within the processor or separate from the processor. The memory includes a Cache memory that can hold frequently accessed data/instructions.
In the embodiments of the present application, the processor may be a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the methods, steps, and logic blocks disclosed in the embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in the processor for execution.
In the embodiment of the present application, the memory may be a nonvolatile memory, such as a hard disk (HDD) or a solid state drive (SS), or may be a volatile memory (volatile memory), for example, a random-access memory (RAM). The memory is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, and is not limited thereto.
The memory in the embodiments of the present application may also be circuitry or any other device capable of implementing a memory function for storing program instructions and/or data. The methods provided in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a network device, a user device, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g., from one website, computer, server, or data center, by wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL), or wireless (e.g., infrared, wireless, microwave, etc.) means, the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc., that contains an integration of one or more available media, the available media may be magnetic media (e.g., floppy disk, hard disk, tape), optical media (e.g., digital video disc (digital video disc, DWD), or semiconductor media (e.g., SSD), etc.
An embodiment of the present application provides a chip, including a processor, where the processor is coupled to a memory, and the processor executes a computer program stored in the memory to perform the technical solution in the foregoing embodiment.
An embodiment of the present application provides a computer program product, which when executed on a terminal, causes the terminal to execute the technical solution in the foregoing embodiment. The principle and technical effects of the present invention are similar to those of the above-described related embodiments, and will not be described in detail herein.
An embodiment of the present application provides a computer readable storage medium, on which program instructions are stored, which when executed by a terminal, cause the terminal to execute the technical solution of the above embodiment. The principle and technical effects of the present invention are similar to those of the above-described related embodiments, and will not be described in detail herein. In summary, the above embodiments are only for illustrating the technical solution of the present application, and are not limited thereto; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (23)

1. A bluetooth pairing method, applied to a first electronic device, the method comprising:
generating a first identity analysis key IRK according to the shared identification information; the sharing identification information is information of a plurality of electronic devices, the plurality of electronic devices comprise the first electronic device, and IRKs generated by the plurality of electronic devices according to the sharing identification information are the same;
generating a first resolvable private address RPA according to the first IRK;
transmitting a first bluetooth low energy BLE broadcast message, the first BLE broadcast message comprising the first RPA; the first BLE broadcast message is for other electronic devices of the plurality of electronic devices to determine whether the first electronic device is a trusted device.
2. The method of claim 1, wherein the shared identification information comprises any one of: user account number, group identification, or identification of an application.
3. The method according to claim 1, wherein the method further comprises:
and storing the first IRKs in a first chip, wherein the maximum number of the IRKs stored in the first chip is more than 16.
4. A method according to any one of claims 1-3, characterized in that the method further comprises:
And transmitting data with a second electronic device based on the BLE broadcast message, wherein the second electronic device is a device except the first electronic device in the plurality of electronic devices.
5. A method according to any one of claims 1-3, characterized in that the method further comprises:
establishing low-energy LE connection with a second electronic device, wherein the second electronic device is a device except the first electronic device in the plurality of electronic devices;
and transmitting data with the second electronic device based on the LE connection.
6. A method according to any one of claims 1-3, characterized in that the method further comprises:
receiving a second BLE broadcast message;
when the second BLE broadcast message comprises a second RPA, analyzing the second RPA according to the IRK stored by the first electronic equipment;
if the second RPA is successfully analyzed according to the IRK stored by the first electronic device, the electronic device corresponding to the second RPA is stored in a trusted device list; the list of trusted devices is stored in the first chip.
7. A method according to claim 3, wherein the first chip is a micro control unit MCU or a sensor hub.
8. The method of claim 6, wherein the method further comprises:
receiving an operation of a user, wherein the operation is used for viewing the trusted devices in the trusted device list;
and in response to the operation, displaying a target interface, wherein the target interface comprises the trusted device.
9. The method of claim 8, wherein the target interface comprises at least one device group comprising at least one trusted device, the trusted devices in the device group having the same shared identification information.
10. The method of any of claims 1-3, 7, wherein the first electronic device is in a dormant state.
11. A bluetooth pairing method, applied to a second electronic device, the method comprising:
generating a first identity analysis key IRK according to the shared identification information; the sharing identification information is information of a plurality of electronic devices, the plurality of electronic devices comprise the second electronic device, and IRKs generated by the plurality of electronic devices according to the sharing identification information are the same;
receiving a Bluetooth low energy BLE broadcast message sent by a first electronic device;
When the BLE broadcast message comprises a Resolvable Private Address (RPA), resolving the RPA according to the first IRK;
and if the RPA is successfully analyzed according to the first IRK, determining that the first electronic equipment is a trusted equipment.
12. The method of claim 11, wherein the shared identification information comprises any one of: user account number, group identification, or identification of an application.
13. The method of claim 11, wherein the method further comprises:
and storing the first IRKs in a second chip, wherein the maximum number of the IRKs stored in the second chip is more than 16.
14. The method according to any one of claims 11-13, further comprising:
the first electronic device is stored in a list of trusted devices, which is stored in a second chip.
15. The method of claim 13, wherein the second chip is a micro control unit MCU or a sensor hub.
16. The method of claim 14, wherein the method further comprises:
receiving an operation of a user, wherein the operation is used for viewing the trusted devices in the trusted device list;
And in response to the operation, displaying a target interface, wherein the target interface comprises the trusted device.
17. The method of claim 16, wherein the target interface comprises at least one device group comprising at least one trusted device, the trusted devices in the device group having the same shared identification information.
18. The method according to any one of claims 11-13, 15, further comprising:
transmitting data with the first electronic device based on a BLE broadcast message.
19. The method according to any one of claims 11-13, 15-17, wherein the method further comprises:
establishing low-energy LE connection with the first electronic equipment;
data is transmitted with the first electronic device based on the LE connection.
20. The method of any of claims 11-13, 15, wherein the second electronic device is in a dormant state.
21. An electronic device comprising a processor, a memory, and a transceiver for communicating with other devices, the processor for invoking a program stored in the memory to perform the method of any of claims 1-20.
22. A chip comprising a processor coupled to a memory, the processor executing a computer program stored in the memory to perform the method of any of claims 1-20.
23. A computer readable storage medium storing computer instructions which, when run on an electronic device, cause the electronic device to perform the method of any one of claims 1-20.
CN202011630687.9A 2020-12-30 2020-12-30 Bluetooth pairing method, electronic device, chip and storage medium Active CN114697879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011630687.9A CN114697879B (en) 2020-12-30 2020-12-30 Bluetooth pairing method, electronic device, chip and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011630687.9A CN114697879B (en) 2020-12-30 2020-12-30 Bluetooth pairing method, electronic device, chip and storage medium

Publications (2)

Publication Number Publication Date
CN114697879A CN114697879A (en) 2022-07-01
CN114697879B true CN114697879B (en) 2023-06-02

Family

ID=82134413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011630687.9A Active CN114697879B (en) 2020-12-30 2020-12-30 Bluetooth pairing method, electronic device, chip and storage medium

Country Status (1)

Country Link
CN (1) CN114697879B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115278624A (en) * 2022-07-21 2022-11-01 Oppo广东移动通信有限公司 Information updating method and device, audio sharing method and system and electronic equipment
WO2024040406A1 (en) * 2022-08-22 2024-02-29 华为技术有限公司 Communication method, apparatus and system
WO2024049004A1 (en) * 2022-09-01 2024-03-07 삼성전자주식회사 Electronic device, method, and non-transitory computer-readable storage medium for processing advertising packet broadcasted from external electronic device in wireless environment
WO2024087072A1 (en) * 2022-10-26 2024-05-02 华为技术有限公司 Communication method, apparatus and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130111165A (en) * 2012-03-29 2013-10-10 브로드콤 코포레이션 Bluetooth low energy privacy
EP2720404A1 (en) * 2012-10-11 2014-04-16 Nordic Semiconductor ASA Addressable radio device
CN108769973A (en) * 2018-07-19 2018-11-06 深圳芯之联科技有限公司 A kind of method for secret protection of bluetooth equipment
CN110213759A (en) * 2019-06-11 2019-09-06 桃芯科技(苏州)有限公司 Anti-lost detection method, storage medium and electronic equipment based on broadcast

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10637651B2 (en) * 2018-05-17 2020-04-28 Bose Corporation Secure systems and methods for resolving audio device identity using remote application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130111165A (en) * 2012-03-29 2013-10-10 브로드콤 코포레이션 Bluetooth low energy privacy
EP2720404A1 (en) * 2012-10-11 2014-04-16 Nordic Semiconductor ASA Addressable radio device
CN108769973A (en) * 2018-07-19 2018-11-06 深圳芯之联科技有限公司 A kind of method for secret protection of bluetooth equipment
CN110213759A (en) * 2019-06-11 2019-09-06 桃芯科技(苏州)有限公司 Anti-lost detection method, storage medium and electronic equipment based on broadcast

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
可穿戴设备的人机交互信息系统的研究;贾丽云;《中国优秀硕士学位论文全文数据库(电子期刊)》;20190531;全文 *

Also Published As

Publication number Publication date
CN114697879A (en) 2022-07-01

Similar Documents

Publication Publication Date Title
CN114697879B (en) Bluetooth pairing method, electronic device, chip and storage medium
CN111459433B (en) Screen transmission method, device and storage medium
US9813466B2 (en) Direct connection with side channel control
US11611863B2 (en) Method and apparatus for low energy discovery
US8589991B2 (en) Direct connection with side channel control
CN112312586B (en) WiFi direct connection establishing method, device, equipment and storage medium
US10863559B2 (en) Method and apparatus for communicating in a wireless communication network
US9503893B2 (en) Communication management system, relay device, communication control system, communication system, communication method, and recording medium storing communication control program
KR102060434B1 (en) Apparatus and method for providing a wireless communication in a portable terminal
CN109905358B (en) Managing data communications based on telephone calls between mobile computing devices
WO2021135593A1 (en) Device sharing method and electronic device
WO2022143071A1 (en) Connection establishment method and electronic device
CN112291364A (en) Message pushing processing method and device
US9537832B2 (en) Method, system and device for establishing link
CN104919863B (en) Subchannel for wireless data communication detects
CN116325664A (en) Method and device for intelligent equipment network distribution
CN109104774B (en) Data transmission method and system
US20220122515A1 (en) Display apparatus, electronic apparatus and methods thereof
CN115835336B (en) Set top box networking method, device, equipment and readable storage medium
EP4075835A1 (en) Connection method and apparatus
CN113099445A (en) Network configuration method, equipment connection method, device, equipment and system
CN117992414A (en) Resource sharing method and electronic equipment
CN116015698A (en) Methods, devices and computer program products for peripheral authentication
CN116437328A (en) Equipment communication method and electronic equipment
CN116264678A (en) Bluetooth connection establishment method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant