CN105187369A - Data access method and data access device - Google Patents

Data access method and data access device Download PDF

Info

Publication number
CN105187369A
CN105187369A CN201510305420.5A CN201510305420A CN105187369A CN 105187369 A CN105187369 A CN 105187369A CN 201510305420 A CN201510305420 A CN 201510305420A CN 105187369 A CN105187369 A CN 105187369A
Authority
CN
China
Prior art keywords
bluetooth equipment
password
information
authorization information
notice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510305420.5A
Other languages
Chinese (zh)
Other versions
CN105187369B (en
Inventor
徐国祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201510305420.5A priority Critical patent/CN105187369B/en
Publication of CN105187369A publication Critical patent/CN105187369A/en
Application granted granted Critical
Publication of CN105187369B publication Critical patent/CN105187369B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a data access method and a data access device. When first bluetooth equipment acts as a server, second bluetooth equipment acts as a client, and the method is applied to the first bluetooth equipment, the method comprises the steps of establishing plaintext connection with the second bluetooth equipment, and receiving first verification information written into a password verification feature field of the first bluetooth equipment by the second bluetooth equipment when accessing to data requiring authentication authorization on the first bluetooth equipment; acquiring first information according to a first password locally recorded at present of the second bluetooth equipment; judging whether the first information is consistent with the first verification information or not, if so, notifying the second bluetooth equipment of success verification of the first verification information, and allowing to access to the data. In the embodiment, the first bluetooth equipment and the second bluetooth equipment need not to establish an encrypted link, and effects that the compatibility of the bluetooth equipment is good and that the safety of data access is high can be achieved by increasing a safety verification mechanism on the basis of the plaintext connection mode.

Description

A kind of data access method and device
Technical field
The present invention relates to communication technical field, particularly relate to a kind of data access method and device.
Background technology
Bluetooth equipment, with its feature such as low-power consumption, low cost, is just widely used in short distance, low data bulk application.In the bluetooth equipment of two mutual visit datas, accessed side is called server, access side is called client, by being connected interaction data, so, in order to ensure that the access of data can obtain correct Certificate Authority between client with server, generally visited by password, when password is correct, Certificate Authority is accessed, and the link of both sides is encrypted.
But, because bluetooth standard is a kind of loose agreement, be usually directed to more multifactor in encrypted link process of establishing, cause both sides to consult to encounter difficulties, even can not set up link in the unmatched situation of both sides, bring very large problem to compatibility.Therefore, in application at present, most bluetooth equipment, in order to ensure maximum compatibility, usually adopt expressly connected mode mutually to access, but this access mode can cause the fail safe of visit data lower.
Summary of the invention
In view of this, the invention provides a kind of data access method and device, the problem adopting the mode expressly connected to cause the fail safe of visit data lower during in order to solve mutual visit data between existing bluetooth equipment.
Particularly, the application is achieved by the following technical solution:
According to a first aspect of the invention, a kind of data access method is provided, described method is applied in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described method is applied on described first bluetooth equipment, and described method comprises:
After described second bluetooth equipment is set up and is expressly connected, receive described second bluetooth equipment accessing the first authorization information described first bluetooth equipment needing write in the password authentification feature field of described first bluetooth equipment during the data of Certificate Authority;
According to the first password of described second bluetooth equipment of local current record, obtain the first information;
Judge that whether the described first information is consistent with described first authorization information, if unanimously, then notify that described in described second bluetooth equipment, the first authorization information is proved to be successful, allow the described data of access.
According to a second aspect of the invention, a kind of data access method is provided, described method is applied in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described method is applied on described second bluetooth equipment, and described method comprises:
After described first bluetooth equipment is set up and is expressly connected, when described first bluetooth equipment of access needs the data of Certificate Authority, the first authorization information is write in the password authentification feature field of described first bluetooth equipment, to make described first bluetooth equipment at the first password of described second bluetooth equipment according to local current record, after obtaining the first information, judge that whether the described first information is consistent with described first authorization information;
Described first authorization information receiving described first bluetooth equipment transmission is proved to be successful and allows to access the first notice of described data, start to access described data, described first notice is for described first bluetooth equipment is judging the notice that the described first information sends time consistent with described first authorization information.
According to a third aspect of the invention we, a kind of DAA is provided, described application of installation is in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described application of installation is on described first bluetooth equipment, and described device comprises:
Receiving element, for with after described second bluetooth equipment is set up and is expressly connected, receive described second bluetooth equipment accessing the first authorization information described first bluetooth equipment needing write in the password authentification feature field of described first bluetooth equipment during the data of Certificate Authority;
Obtain unit, for the first password of described second bluetooth equipment according to local current record, obtain the first information;
Notification unit, for judging that whether the described first information is consistent with described first authorization information, if unanimously, then notifies that described in described second bluetooth equipment, the first authorization information is proved to be successful, and allows the described data of access.
According to a forth aspect of the invention, a kind of DAA is provided, described application of installation is in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described application of installation is on described second bluetooth equipment, and described device comprises:
Writing unit, for with after described first bluetooth equipment is set up and is expressly connected, when described first bluetooth equipment of access needs the data of Certificate Authority, the first authorization information is write in the password authentification feature field of described first bluetooth equipment, to make described first bluetooth equipment at the first password of described second bluetooth equipment according to local current record, after obtaining the first information, judge that whether the described first information is consistent with described first authorization information;
Receiving element, described first authorization information sent for receiving described first bluetooth equipment is proved to be successful and allows to access the first notice of described data, start to access described data, described first notice is for described first bluetooth equipment is judging the notice that the described first information sends time consistent with described first authorization information.
The invention has the beneficial effects as follows:
First bluetooth equipment and the second bluetooth equipment are after setting up and being expressly connected, when second bluetooth equipment needs the data of Certificate Authority on access first bluetooth equipment, the first authorization information can be write by the password authentification feature field that provides to the first bluetooth equipment, obtain the first authorization information to make the first bluetooth equipment.Afterwards, first bluetooth equipment can according to the first password of the second bluetooth equipment of its local current record, obtain the first information, and judge that whether this first information is consistent with the first authorization information, if consistent, then notify that this second bluetooth equipment first authorization information is proved to be successful, allow access to need the data of Certificate Authority.As can be seen here, two bluetooth equipments in the present embodiment are when mutual visit data, first both sides conduct interviews based on plaintext connected mode, then, when access side accesses the data needing the access of accessed side's Certificate Authority, perform after associated verification operates by accessed side to access side, then determine whether allow access side to access.Aforementioned this access mode, both sides, without the need to setting up encrypted link, the basis of plaintext connected mode increase a secure authentication mechanisms, the good and effect that the fail safe of visit data is higher of the compatibility that can reach bluetooth equipment.
Accompanying drawing explanation
Fig. 1 is the application scenarios schematic diagram that the application embodiment of the present invention realizes data access;
Fig. 2 is an embodiment flow chart of data access method of the present invention;
Fig. 3 is another embodiment flow chart of data access method of the present invention;
Fig. 4 is a kind of hardware structure diagram of DAA place of the present invention equipment;
Fig. 5 is an embodiment block diagram of DAA of the present invention;
Fig. 6 is an embodiment block diagram of DAA of the present invention.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the application.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that some aspects of the application are consistent.
Only for describing the object of specific embodiment at term used in this application, and not intended to be limiting the application." one ", " described " and " being somebody's turn to do " of the singulative used in the application and appended claims is also intended to comprise most form, unless context clearly represents other implications.It is also understood that term "and/or" used herein refer to and comprise one or more project of listing be associated any or all may combine.
Term first, second, third, etc. may be adopted although should be appreciated that to describe various information in the application, these information should not be limited to these terms.These terms are only used for the information of same type to be distinguished from each other out.Such as, when not departing from the application's scope, the first information also can be called as the second information, and similarly, the second information also can be called as the first information.Depend on linguistic context, word as used in this " if " can be construed as into " ... time " or " when ... time " or " in response to determining ".
See Fig. 1, for the application embodiment of the present invention realizes the application scenarios schematic diagram of data access.As shown in Figure 1, first bluetooth equipment and the second bluetooth equipment can be with the mobile phone of Bluetooth function, computer and ipad etc., second bluetooth equipment can based on the data on Bluetooth Low Energy protocol access first bluetooth equipment, namely this first bluetooth equipment is as server, and this second bluetooth equipment is as client.
In an embodiment of the present invention, first bluetooth equipment and the second bluetooth equipment are after setting up and being expressly connected, when second bluetooth equipment needs the data of Certificate Authority on access first bluetooth equipment, the first authorization information can be write by the password authentification feature field that provides to the first bluetooth equipment, obtain the first authorization information to make the first bluetooth equipment.Afterwards, first bluetooth equipment can according to the first password of the second bluetooth equipment of its local current record, obtain the first information, and judge that whether this first information is consistent with the first authorization information, if consistent, then notify that this second bluetooth equipment first authorization information is proved to be successful, allow access to need the data of Certificate Authority.Namely, two bluetooth equipments in the present embodiment are when mutual visit data, first both sides conduct interviews based on plaintext connected mode, then, when access side accesses the data needing the access of accessed side's Certificate Authority, perform after associated verification operates by accessed side to access side, then determine whether allow access side to access.Aforementioned this access mode, both sides, without the need to setting up encrypted link, the basis of plaintext connected mode increase a secure authentication mechanisms, the good and effect that the fail safe of visit data is higher of the compatibility that can reach bluetooth equipment.
See Fig. 2, for an embodiment flow chart of data access method of the present invention, the method can be applied in the system comprising the first bluetooth equipment and the second bluetooth equipment, when this first bluetooth equipment is as server, when this second bluetooth equipment is as client, this embodiment is described from the first bluetooth equipment side, can comprise the following steps:
Step 201, with after the second bluetooth equipment is set up and is expressly connected, receive the first authorization information that the second bluetooth equipment needs to write in the password authentification feature field of the first bluetooth equipment during the data of Certificate Authority on access first bluetooth equipment.
In the present embodiment, because two bluetooth equipments of Bluetooth Low Energy protocol communication are usually based on GATT (GenericAttributeProfile, general-purpose attribute configures) realize data interaction, be feature for storing the basic structure of data in this GATT, each feature comprises operational attribute, data and UUID (UniversallyUniqueIdentifier, general exclusive identification code) etc. field, and the operational attribute in feature determines user to the executable operation of data in this feature, such as readable to the data in this feature, can write, read-write and not read-write etc.Thus, when the first bluetooth equipment is as server, when second bluetooth equipment is as client, for each second bluetooth equipment that can be connected to this first bluetooth equipment, first bluetooth equipment and this second bluetooth equipment can consult before Certificate Authority in advance, this second bluetooth equipment is to the operational attribute of each feature on the first bluetooth equipment, and after Certificate Authority, this second bluetooth equipment is to the operational attribute of each feature on the first bluetooth equipment.
When the second bluetooth equipment needs the data on access first bluetooth equipment, first second bluetooth equipment can be set up with the first bluetooth equipment and expressly be connected, then send request of data message to the first bluetooth equipment, the operation etc. that the address information (such as MAC Address etc.) of the second bluetooth equipment, the address information of the first bluetooth equipment, the UUID of the feature of the second bluetooth equipment request access and the second bluetooth equipment are about to the data in the feature of its request access perform in this request of data message, can be comprised.First bluetooth equipment is after receiving this request of data message, can first according to the UUID of the address information of the second bluetooth equipment in request of data message and the feature of the second bluetooth equipment request access, determine before Certificate Authority, the operational attribute of feature on the first bluetooth equipment of this second bluetooth equipment request access, then according to this operational attribute, judge that whether the operation that the second bluetooth equipment is about to perform to the data in the feature of its request access is legal, if legal, then represent that the data of the second bluetooth equipment request access do not need Certificate Authority namely to may have access to, if illegal, then represent that the data of the second bluetooth equipment request access just may have access to after needing Certificate Authority, now the first bluetooth equipment can to the second bluetooth equipment return data request failure message.
In the present embodiment, the password authentification feature field that the first bluetooth equipment can provide operational attribute to be only can to write to the second bluetooth equipment.When the second bluetooth equipment access the first bluetooth equipment to need after Certificate Authority just addressable data time, write the first authorization information in the password authentification feature field that the second bluetooth equipment can provide to the first bluetooth equipment.In order to ensure the fail safe of the first authorization information transmission, this first authorization information can be that the second bluetooth equipment is according to the first cryptographic algorithm preset, after adopting the first authentication password of user's input to be encrypted the certificate parameter that the first bluetooth equipment and the second bluetooth equipment both sides are consulted, the information of generation.Wherein, this first cryptographic algorithm can for being built in the algorithm in the first bluetooth equipment and the second bluetooth equipment in advance.
But, because cryptographic algorithm can be divided into irreversible cryptographic algorithm and irreversible encryption algorithm, and irreversible cryptographic algorithm has encryption and decryption two reversible processes usually, if according to irreversible cryptographic algorithm, the first authentication password of user's input is adopted to be encrypted the certificate parameter that the first bluetooth equipment and the second bluetooth equipment both sides are consulted, the first authorization information then generated is in the process of write password authentification feature field, once be intercepted and captured, just be easy to parse the first authentication password, thus cause password to be revealed.Thus, in order to improve the fail safe of the first authorization information write further, this first cryptographic algorithm can be irreversible encryption algorithm, such as MD5 (MessageDigestAlgorithm5, Message Digest Algorithm 5) algorithm or SHA1 (SecureHashAlgorithm, Secure Hash Algorithm) algorithm etc.
In addition, this certificate parameter can adopt challenge word string.In order to prevent authentication password from being attacked, the character of change in challenge word string, can be comprised.Such as, challenge word string can be " channel number during first bluetooth equipment MAC Address+the second bluetooth equipment MAC Address+connection establishment+this connect AccessCode+ connection establishment time the first bluetooth equipment time ", wherein challenge latter two character in word string " AccessCode of this connection " all not identical when the second bluetooth equipment sets up data cube computation with the first bluetooth equipment at every turn with " the first bluetooth equipment time during connection establishment ".Because the challenge word string adopted when the second bluetooth equipment sets up data cube computation with the first bluetooth equipment is at every turn all not identical, therefore the fail safe that authentication password is transmitted can be ensured further.
Step 202, first password according to this second bluetooth equipment of local current record, obtain the first information.
In the present embodiment, when the first authorization information that this second bluetooth equipment writes in the password authentification feature field of the first bluetooth equipment be user input to the second bluetooth equipment the first authentication password time, accordingly, this first information is the first password of the first bluetooth equipment at the second bluetooth equipment of local current record.The first authorization information write in the password authentification feature field of the first bluetooth equipment when this second bluetooth equipment is that the second bluetooth equipment adopts this first cryptographic algorithm, after adopting the first authentication password of user's input to be encrypted this certificate parameter, during the information generated, accordingly, this first information is that the first bluetooth equipment is according to this first cryptographic algorithm, after adopting the first password of the second bluetooth equipment of local current record to be encrypted this certificate parameter, the information of generation.
Step 203, judge that whether the first information is consistent with the first authorization information, if unanimously, then notify that the second bluetooth equipment first authorization information is proved to be successful, allow these data of access.
In the present embodiment, the first bluetooth equipment, except can providing password authentification feature field to each second bluetooth equipment, can also provide password to revise feature field to each second bluetooth equipment, and the initial value of the operational attribute of this password amendment feature is for writing.After the first bluetooth equipment judges that the first information is consistent with the first authorization information, first bluetooth equipment not only can notify that the second bluetooth equipment first authorization information is proved to be successful, allow these data of access, but also the operational attribute of the password amendment feature field that the first bluetooth equipment can be provided to this second bluetooth equipment is revised as and can writes.Now, the second bluetooth equipment based on this password amendment feature field, can be modified to the first authentication password (first password) that it uses when accessing these data.
Particularly, first bluetooth equipment is when judging that the first information is consistent with the first authorization information, can determine that this first authentication password is identical with first password, after this, password amendment information is write in the password amendment feature field that first second bluetooth equipment can provide to the first bluetooth equipment when revising this first password, this password amendment information can be the second cryptographic algorithm that the second bluetooth equipment is consulted according to the first bluetooth equipment and the second bluetooth equipment both sides, after adopting this first authentication password (first password namely before the amendment) new password to user's input to be encrypted, the information generated.First bluetooth equipment is after receiving password amendment information, can according to the decipherment algorithm corresponding with this second cryptographic algorithm, this password amendment information is decrypted, if successful decryption, then obtain this new password, notify that this second bluetooth equipment successfully receives this new password, and the second password of the second bluetooth equipment of local current record is replaced with this new password.The present embodiment, by before new password write password amendment feature field user inputted, according to the second cryptographic algorithm, adopts the first password before amendment to be encrypted the new password that user inputs, can improve the fail safe of new password transmission.It is to be noted that be decrypted because the first bluetooth equipment needs to revise information to this password after receiving password amendment information, thus this second cryptographic algorithm can be irreversible cryptographic algorithm.
When the second bluetooth equipment receive the first bluetooth equipment successfully receive the notice of this new password time, can first according to this first cryptographic algorithm, the new password of user's input is adopted to be encrypted this certificate parameter, generate the second authorization information, then this second authorization information is write in the password authentification feature field that the first bluetooth equipment provides.First bluetooth equipment is after receiving this second authorization information, can first judge this first information and this second authorization information inconsistent, when this second password is not initial value, according to this first cryptographic algorithm, adopt this this certificate parameter of the second codon pair to be encrypted, obtain the second information; Then when judging that this second information is consistent with this second authorization information, this first password is replaced with the second password, and the second password is set to initial value, notify that the second bluetooth equipment first password is successfully modified.
In addition, in the first bluetooth equipment and the second bluetooth equipment reciprocal process, all may there is the situation of packet loss to its notice successfully receiving this new password that the second bluetooth equipment returns in the new password that the second bluetooth equipment sends to the first bluetooth equipment and the first bluetooth equipment.When the first unsuccessful reception new password of bluetooth equipment, certainly also can not return to the second bluetooth equipment the notice that it successfully receives this new password, therefore when the second bluetooth equipment do not receive the first bluetooth equipment successfully receive the notice of new password time, the second bluetooth equipment can determine that first password is revised unsuccessfully.
When first password is revised unsuccessfully, if the second bluetooth equipment is accessed the first bluetooth equipment to need after Certificate Authority just addressable data, this the first authorization information is write in the password authentification feature field that then first the second bluetooth equipment can provide to the first bluetooth equipment, afterwards, first bluetooth equipment can when judging that this first information is consistent with the first authorization information, this second password is set to initial value, and notify that this first authorization information of the second bluetooth equipment is proved to be successful, allow these data of access; Judge this first information and the first authorization information inconsistent, and when this second password is initial value, notifies this first authorization information authentication failed of the second bluetooth equipment, do not allow to access this data; Judge this first information and the first authorization information inconsistent, this second password is not initial value, and this second information and the first authorization information inconsistent time, notify this first authorization information authentication failed of the second bluetooth equipment, do not allow to access this data; And judge the first information and the first authorization information inconsistent, the second password is not initial value, and when the second information is consistent with the first authorization information, notifies that the second bluetooth equipment first authorization information is proved to be successful, allow access these data.
After the first authorization information is proved to be successful, the first bluetooth equipment can according to this second bluetooth equipment of predetermined rules modification on the first bluetooth equipment after Certificate Authority the operational attribute of just addressable feature.When after the first authorization information authentication failed, second bluetooth equipment can continue to write the first authorization information in the password authentification feature field provided to the first bluetooth equipment, after this, first bluetooth equipment can said method, this first authorization information is verified, and the number of times of checking is added up.When verifying that number of times exceedes setting threshold, the first bluetooth equipment initiatively can disconnect the connection with this second bluetooth equipment, and lists in dynamic blacklist by this second bluetooth equipment, can improve the fail safe of data access thus further.
The present embodiment is by revising unsuccessfully at first password, second bluetooth equipment access the first bluetooth equipment to need after Certificate Authority just addressable data time, first bluetooth equipment adopts the first information and the second information to verify this first authorization information successively, when the first authorization information is consistent with any one information in the first information and the second information, namely, when user input the first authentication password with the first bluetooth equipment when the first password of local current record is identical with any one password in the second password, just can determine that this first authorization information is proved to be successful, user can be avoided thus in order to be proved to be successful, first password before input amendment and these two passwords of amended first password are verified, thus can verification efficiency be improved.In addition, the present embodiment by judge at the first bluetooth equipment this first information and the first authorization information inconsistent, and the second password is when being initial value, determine this first authorization information authentication failed, can avoid performing judge the second information whether with the step of the first authorization information, the efficiency of checking can be improved thus further.
In addition, the present embodiment is by when the first bluetooth equipment judges that this first information is consistent with the first authorization information, this second password is set to initial value, can ensure upper once verify time the first bluetooth equipment only need to adopt the first information to verify this first authorization information, thus the efficiency of checking can be improved further.Similarly, the present embodiment by judge at the first bluetooth equipment the first information and the first authorization information inconsistent, second password is not described initial value, and the second information consistent with the first authorization information time, after the second password is replaced to first password, this second password is set to initial value, can ensure upper once verify time the first bluetooth equipment only need to adopt the first information to verify the first authorization information, thus the efficiency of checking can be improved further.
See Fig. 3, for another embodiment flow chart of data access method of the present invention, the method is applied in the system comprising the first bluetooth equipment and the second bluetooth equipment, when the first bluetooth equipment is as server, when second bluetooth equipment is as client, this embodiment is described from the second bluetooth equipment side, can comprise the following steps:
Step 301, with after the first bluetooth equipment is set up and is expressly connected, when access first bluetooth equipment needs the data of Certificate Authority, the first authorization information is write in the password authentification feature field of the first bluetooth equipment, to make the first bluetooth equipment at the first password of described second bluetooth equipment according to local current record, after obtaining the first information, judge that whether the first information is consistent with the first authorization information.
In the present embodiment, this first information can be that the first bluetooth equipment is according to the first cryptographic algorithm preset, after adopting the first password of the second bluetooth equipment of local current record to be encrypted the certificate parameter that the first bluetooth equipment and the second bluetooth equipment both sides are consulted, the information of generation; This first authorization information can be the second bluetooth equipment according to the first cryptographic algorithm, adopt user input the first authentication password certificate parameter is encrypted after, the information of generation.
Step 302, receive first bluetooth equipment send the first authorization information be proved to be successful and allows access described data first notify, start to access this data, the first notice is the notice that the first bluetooth equipment sends when judging that the first information is consistent with the first authorization information.
In the present embodiment, the second bluetooth equipment, after receiving this first notice, can determine that this first authentication password is identical with this first password.When the second bluetooth equipment needs amendment first password, can, first according to the second cryptographic algorithm that the first bluetooth equipment and the second bluetooth equipment both sides consult, the first authentication password be adopted to be encrypted the new password that user inputs, generating cipher amendment information; Then in the password amendment feature field of the first bluetooth equipment, this password amendment information is write.First bluetooth equipment is after receiving this password amendment information, can first according to the decipherment algorithm corresponding with the second cryptographic algorithm, password amendment information is decrypted, after successful decryption, obtain this new password, and the second password of described second bluetooth equipment of local current record is replaced with this new password; Then send to the second bluetooth equipment the second notice that it successfully receives this new password.
Second bluetooth equipment, after receiving this second notice, first according to this first cryptographic algorithm, can adopt the described new password of user's input to be encrypted this certificate parameter, generates the second authorization information; Then in this password authentification feature field, this second authorization information is write.First bluetooth equipment is after receiving this second authorization information, can judge the first information and the second authorization information inconsistent, and the second password is not when being initial value, according to the first cryptographic algorithm, adopt the second codon pair certificate parameter to be encrypted, obtain the second information, and when judging that the second information is consistent with the second authorization information, first password is replaced with the second password, and the second password is set to initial value.Afterwards, the first bluetooth equipment can send the successfully modified third notice of this first password to the second bluetooth equipment.In addition, the second bluetooth equipment, when not receiving this second notice, can determine that first password is revised unsuccessfully.
Second bluetooth equipment is when first password is revised unsuccessfully, when accessing the data the first bluetooth equipment needing Certificate Authority, the first authorization information is write in the password authentification feature field that can first provide to the first bluetooth equipment, this first authorization information can be that the second bluetooth equipment is according to the first cryptographic algorithm, after adopting the first authentication password of user's input to be encrypted certificate parameter, the information of generation.First bluetooth equipment after receiving the first authorization information, can judge the first information and the first authorization information inconsistent, and when the second password is initial value; Or, judge the first information and the first authorization information inconsistent, second password is not initial value, and the second information and the first authorization information inconsistent time, send the first authorization information authentication failed to the second bluetooth equipment and do not allow to access the 4th notice of described data.In addition, first bluetooth equipment can when judging that the first information is consistent with the first authorization information, after second password is set to initial value, send the first authorization information to the second bluetooth equipment be proved to be successful and allow the five-way of accessing described data to know, or, judge the first information and the first authorization information inconsistent, second password is not initial value, and the second information consistent with the first authorization information time, send the first authorization information to the second bluetooth equipment and be proved to be successful and allow the five-way of accessing described data to know.
Embodiment illustrated in fig. 3 and aforementioned description embodiment illustrated in fig. 2 is consistent, and its difference is only that executive agent is different, does not repeat them here.
Corresponding with the embodiment of aforementioned data access method, present invention also provides the embodiment of DAA.
The embodiment of DAA of the present invention can be applied on the first bluetooth equipment and the second bluetooth equipment.Device embodiment can pass through software simulating, also can be realized by the mode of hardware or software and hardware combining.For software simulating, as the device on a logical meaning, be by the processor of its place equipment, computer program instructions corresponding in nonvolatile memory is read operation in internal memory to be formed.Say from hardware view, as shown in Figure 4, for a kind of hardware structure diagram of the application's DAA place equipment, except the processor shown in Fig. 4, internal memory, network interface and nonvolatile memory, in embodiment, the equipment at device place is usually according to the actual functional capability of this equipment, other hardware can also be comprised, this is repeated no more.
See Fig. 5, for an embodiment flow chart of DAA of the present invention, described application of installation is in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described application of installation is on described first bluetooth equipment, and described device comprises:
Receiving element 510, after setting up at described first bluetooth equipment and described second bluetooth equipment and being expressly connected, receive described second bluetooth equipment accessing the first authorization information described first bluetooth equipment needing write in the password authentification feature field of described first bluetooth equipment during the data of Certificate Authority;
Obtain unit 520, for the first password of described second bluetooth equipment according to described first bluetooth equipment current record, obtain the first information;
Notification unit 530, for judging that whether the described first information is consistent with described first authorization information, if unanimously, then notifies that described in described second bluetooth equipment, the first authorization information is proved to be successful, and allows the described data of access.
In an optional implementation,
The described first information is that described first bluetooth equipment is according to the first cryptographic algorithm preset, after adopting the first password of described second bluetooth equipment of local current record to be encrypted the certificate parameter that described first bluetooth equipment and described second bluetooth equipment both sides are consulted, the information of generation;
Described first authorization information be described second bluetooth equipment according to described first cryptographic algorithm, adopt user input the first authentication password described certificate parameter is encrypted after, the information of generation.
In another optional implementation, described device also comprises:
Determining unit 540, if consistent with described first authorization information for the described first information, then determines that described first authentication password is identical with described first password;
Described receiving element 510, also for receiving the password amendment information that described second bluetooth equipment writes in the password of described first bluetooth equipment amendment feature field when revising described first password, described password amendment information is the second cryptographic algorithm that described second bluetooth equipment is consulted according to described first bluetooth equipment and described second bluetooth equipment both sides, after adopting described first authentication password to be encrypted the new password that user inputs, the information of generation;
Decryption unit 550, for according to the decipherment algorithm corresponding with described second cryptographic algorithm, is decrypted described password amendment information;
Described notification unit 530, if also for successful decryption, then obtain described new password, notify that described second bluetooth equipment successfully receives described new password, and the second password of described second bluetooth equipment of described first bluetooth equipment current record is replaced with described new password;
Described receiving element 510, also for receiving the second authorization information that described second bluetooth equipment writes in described password authentification feature field, described second authorization information is that described second bluetooth equipment is when receiving described first bluetooth equipment and successfully receiving the notice of described new password, according to described first cryptographic algorithm, after adopting the described new password of user's input to be encrypted described certificate parameter, the information of generation;
Described acquisition unit 520, also for judge the described first information and described second authorization information inconsistent, when described second password is not initial value, according to described first cryptographic algorithm, adopt certificate parameter described in described second codon pair to be encrypted, obtain the second information;
Described notification unit 530, also for when judging that described second information is consistent with described second authorization information, described first password is replaced with described second password, and described second password is set to described initial value, notify that described in described second bluetooth equipment, first password is successfully modified.
In another optional implementation,
Described notification unit 530, also for when judging that the described first information is consistent with described first authorization information, described second password is set to described initial value, and notifies that described in described second bluetooth equipment, the first authorization information is proved to be successful, allow the described data of access;
Judge the described first information and described first authorization information inconsistent, and when described second password is described initial value, notifies the first authorization information authentication failed described in described second bluetooth equipment, do not allow to access described data;
Judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information and described first authorization information inconsistent time, notify the first authorization information authentication failed described in described second bluetooth equipment, do not allow to access described data;
Judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information consistent with described first authorization information time, notify that described in described second bluetooth equipment, the first authorization information is proved to be successful, allow access described data.
See Fig. 6, for another embodiment flow chart of DAA of the present invention, described application of installation is in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described application of installation is on described second bluetooth equipment, and described device comprises:
Writing unit 610, after setting up at described second bluetooth equipment and described first bluetooth equipment and being expressly connected, when described first bluetooth equipment of access needs the data of Certificate Authority, the first authorization information is write in the password authentification feature field of described first bluetooth equipment, to make described first bluetooth equipment at the first password of described second bluetooth equipment according to local current record, after obtaining the first information, judge that whether the described first information is consistent with described first authorization information;
Receiving element 620, described first authorization information sent for receiving described first bluetooth equipment is proved to be successful and allows to access the first notice of described data, start to access described data, described first notice is for described first bluetooth equipment is judging the notice that the described first information sends time consistent with described first authorization information.
In an optional implementation,
The described first information is that described first bluetooth equipment is according to the first cryptographic algorithm preset, after adopting the first password of described second bluetooth equipment of local current record to be encrypted the certificate parameter that described first bluetooth equipment and described second bluetooth equipment both sides are consulted, the information of generation;
Described first authorization information be described second bluetooth equipment according to described first cryptographic algorithm, adopt user input the first authentication password described certificate parameter is encrypted after, the information of generation.
In another optional implementation, described device also comprises:
Determining unit 630, for after receiving described first notice, determines that described first authentication password is identical with described first password;
Generation unit 640, for when revising described first password, according to the second cryptographic algorithm that described first bluetooth equipment and described second bluetooth equipment both sides consult, described first authentication password is adopted to be encrypted the new password that user inputs, generating cipher amendment information;
Said write unit 610, also for writing described password amendment information in the password amendment feature field of described first bluetooth equipment, to make described first bluetooth equipment according to the decipherment algorithm corresponding with described second cryptographic algorithm, described password amendment information is decrypted, after successful decryption, obtain described new password, and the second password of described second bluetooth equipment of local current record is replaced with described new password;
Described generation unit 640, also for when receiving described first bluetooth equipment and successfully receiving the second notice of described new password, according to described first cryptographic algorithm, adopt the described new password of user's input to be encrypted described certificate parameter, generate the second authorization information;
Said write unit 610, also for writing described second authorization information in described password authentification feature field, with make described first bluetooth equipment judge the described first information and described second authorization information inconsistent, and described second password is not when being initial value, according to described first cryptographic algorithm, certificate parameter described in described second codon pair is adopted to be encrypted, obtain the second information, and when judging that described second information is consistent with described second authorization information, described first password is replaced with described second password, and described second password is set to described initial value,
Described receiving element 620, is also replacing with described second password by described first password and the successfully modified third notice of the described first password sent after described second password is set to described initial value for receiving described first bluetooth equipment;
Described determining unit 630, also for when not receiving described first bluetooth equipment and successfully receiving the second notice of described new password, determines that described first password is revised unsuccessfully.
In another optional implementation,
Described receiving element 620, also for receiving the first authorization information authentication failed that described first bluetooth equipment sends and not allowing to access the 4th notice of described data, described 4th notice for described first bluetooth equipment judge the described first information and described first authorization information inconsistent, and the notice sent when described second password is described initial value; Or, for described first bluetooth equipment judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information and described first authorization information inconsistent time the notice that sends; Or,
Described receiving element 620, the first authorization information also sent for receiving described first bluetooth equipment is proved to be successful and allows the five-way of accessing described data to know, described five-way is known for described first bluetooth equipment is when judging that the described first information is consistent with described first authorization information, the notice sent after described second password is set to described initial value, or, for described first bluetooth equipment judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information consistent with described first authorization information time the notice that sends.
In said apparatus, the implementation procedure of the function and efficacy of unit specifically refers to the implementation procedure of corresponding step in said method, does not repeat them here.
For device embodiment, because it corresponds essentially to embodiment of the method, so relevant part illustrates see the part of embodiment of the method.Device embodiment described above is only schematic, the wherein said unit illustrated as separating component or can may not be and physically separates, parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of module wherein can be selected according to the actual needs to realize the object of the application's scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
As seen from the above-described embodiment, first bluetooth equipment and the second bluetooth equipment are after setting up and being expressly connected, when second bluetooth equipment needs the data of Certificate Authority on access first bluetooth equipment, the first authorization information can be write by the password authentification feature field that provides to the first bluetooth equipment, obtain the first authorization information to make the first bluetooth equipment.Afterwards, first bluetooth equipment can according to the first password of the second bluetooth equipment of its local current record, obtain the first information, and judge that whether this first information is consistent with the first authorization information, if consistent, then notify that this second bluetooth equipment first authorization information is proved to be successful, allow access to need the data of Certificate Authority.Namely, two bluetooth equipments in the present embodiment are when mutual visit data, first both sides conduct interviews based on plaintext connected mode, then, when access side accesses the data needing the access of accessed side's Certificate Authority, perform after associated verification operates by accessed side to access side, then determine whether allow access side to access.Aforementioned this access mode, both sides, without the need to setting up encrypted link, the basis of plaintext connected mode increase a secure authentication mechanisms, the good and effect that the fail safe of visit data is higher of the compatibility that can reach bluetooth equipment.
The foregoing is only the preferred embodiment of the application, not in order to limit the application, within all spirit in the application and principle, any amendment made, equivalent replacements, improvement etc., all should be included within scope that the application protects.

Claims (16)

1. a data access method, it is characterized in that, described method is applied in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described method is applied on described first bluetooth equipment, and described method comprises:
After described second bluetooth equipment is set up and is expressly connected, receive described second bluetooth equipment accessing the first authorization information described first bluetooth equipment needing write in the password authentification feature field of described first bluetooth equipment during the data of Certificate Authority;
According to the first password of described second bluetooth equipment of local current record, obtain the first information;
Judge that whether the described first information is consistent with described first authorization information, if unanimously, then notify that described in described second bluetooth equipment, the first authorization information is proved to be successful, allow the described data of access.
2. the method for claim 1, it is characterized in that, the described first information is that described first bluetooth equipment is according to the first cryptographic algorithm preset, after adopting the first password of described second bluetooth equipment of local current record to be encrypted the certificate parameter that described first bluetooth equipment and described second bluetooth equipment both sides are consulted, the information of generation;
Described first authorization information be described second bluetooth equipment according to described first cryptographic algorithm, adopt user input the first authentication password described certificate parameter is encrypted after, the information of generation.
3. method as claimed in claim 2, it is characterized in that, described method also comprises:
If the described first information is consistent with described first authorization information, then determine that described first authentication password is identical with described first password;
Receive the password amendment information that described second bluetooth equipment writes in the password of described first bluetooth equipment amendment feature field when revising described first password, described password amendment information is the second cryptographic algorithm that described second bluetooth equipment is consulted according to described first bluetooth equipment and described second bluetooth equipment both sides, after adopting described first authentication password to be encrypted the new password that user inputs, the information of generation;
According to the decipherment algorithm corresponding with described second cryptographic algorithm, described password amendment information is decrypted, if successful decryption, then obtain described new password, notify that described second bluetooth equipment successfully receives described new password, and the second password of described second bluetooth equipment of local current record is replaced with described new password;
Receive the second authorization information that described second bluetooth equipment writes in described password authentification feature field, described second authorization information is that described second bluetooth equipment is when receiving described first bluetooth equipment and successfully receiving the notice of described new password, according to described first cryptographic algorithm, after adopting the described new password of user's input to be encrypted described certificate parameter, the information of generation;
Judge the described first information and described second authorization information inconsistent, when described second password is not initial value, according to described first cryptographic algorithm, adopt certificate parameter described in described second codon pair to be encrypted, obtain the second information;
When judging that described second information is consistent with described second authorization information, described first password is replaced with described second password, and described second password is set to described initial value, notify that described in described second bluetooth equipment, first password is successfully modified.
4. method as claimed in claim 3, it is characterized in that, described method also comprises:
When judging that the described first information is consistent with described first authorization information, described second password is set to described initial value, and notifies that described in described second bluetooth equipment, the first authorization information is proved to be successful, allow the described data of access;
Judge the described first information and described first authorization information inconsistent, and when described second password is described initial value, notifies the first authorization information authentication failed described in described second bluetooth equipment, do not allow to access described data;
Judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information and described first authorization information inconsistent time, notify the first authorization information authentication failed described in described second bluetooth equipment, do not allow to access described data;
Judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information consistent with described first authorization information time, notify that described in described second bluetooth equipment, the first authorization information is proved to be successful, allow access described data.
5. a data access method, it is characterized in that, described method is applied in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described method is applied on described second bluetooth equipment, and described method comprises:
After described first bluetooth equipment is set up and is expressly connected, when described first bluetooth equipment of access needs the data of Certificate Authority, the first authorization information is write in the password authentification feature field of described first bluetooth equipment, to make described first bluetooth equipment at the first password of described second bluetooth equipment according to local current record, after obtaining the first information, judge that whether the described first information is consistent with described first authorization information;
Described first authorization information receiving described first bluetooth equipment transmission is proved to be successful and allows to access the first notice of described data, start to access described data, described first notice is for described first bluetooth equipment is judging the notice that the described first information sends time consistent with described first authorization information.
6. method as claimed in claim 5, it is characterized in that, the described first information is that described first bluetooth equipment is according to the first cryptographic algorithm preset, after adopting the first password of described second bluetooth equipment of local current record to be encrypted the certificate parameter that described first bluetooth equipment and described second bluetooth equipment both sides are consulted, the information of generation;
Described first authorization information be described second bluetooth equipment according to described first cryptographic algorithm, adopt user input the first authentication password described certificate parameter is encrypted after, the information of generation.
7. method as claimed in claim 6, it is characterized in that, described method also comprises:
After receiving described first notice, determine that described first authentication password is identical with described first password;
When revising described first password, second cryptographic algorithm of consulting according to described first bluetooth equipment and described second bluetooth equipment both sides, adopts described first authentication password to be encrypted the new password that user inputs, generating cipher amendment information;
Described password amendment information is write in the password amendment feature field of described first bluetooth equipment, to make described first bluetooth equipment according to the decipherment algorithm corresponding with described second cryptographic algorithm, described password amendment information is decrypted, after successful decryption, obtain described new password, and the second password of described second bluetooth equipment of local current record is replaced with described new password;
When receiving described first bluetooth equipment and successfully receiving the second notice of described new password, according to described first cryptographic algorithm, adopt the described new password of user's input to be encrypted described certificate parameter, generate the second authorization information;
Described second authorization information is write in described password authentification feature field, with make described first bluetooth equipment judge the described first information and described second authorization information inconsistent, and described second password is not when being initial value, according to described first cryptographic algorithm, certificate parameter described in described second codon pair is adopted to be encrypted, obtain the second information, and when judging that described second information is consistent with described second authorization information, described first password is replaced with described second password, and described second password is set to described initial value;
Receive described first bluetooth equipment and described first password is replaced with described second password and the successfully modified third notice of the described first password sent after described second password is set to described initial value;
When not receiving described first bluetooth equipment and successfully receiving the second notice of described new password, determine that described first password is revised unsuccessfully.
8. method as claimed in claim 7, it is characterized in that, described method also comprises:
Receive the first authorization information authentication failed that described first bluetooth equipment sends and do not allow to access the 4th notice of described data, described 4th notice for described first bluetooth equipment judge the described first information and described first authorization information inconsistent, and the notice sent when described second password is described initial value; Or, for described first bluetooth equipment judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information and described first authorization information inconsistent time the notice that sends; Or,
The first authorization information receiving described first bluetooth equipment transmission is proved to be successful and allows the five-way of accessing described data to know, described five-way is known for described first bluetooth equipment is when judging that the described first information is consistent with described first authorization information, the notice sent after described second password is set to described initial value, or, for described first bluetooth equipment judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and the notice sent when described second information is consistent with described first authorization information.
9. a DAA, it is characterized in that, described application of installation is in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described application of installation is on described first bluetooth equipment, and described device comprises:
Receiving element, after setting up at described first bluetooth equipment and described second bluetooth equipment and being expressly connected, receive described second bluetooth equipment accessing the first authorization information described first bluetooth equipment needing write in the password authentification feature field of described first bluetooth equipment during the data of Certificate Authority;
Obtain unit, for the first password of described second bluetooth equipment according to described first bluetooth equipment current record, obtain the first information;
Notification unit, for judging that whether the described first information is consistent with described first authorization information, if unanimously, then notifies that described in described second bluetooth equipment, the first authorization information is proved to be successful, and allows the described data of access.
10. device as claimed in claim 9, it is characterized in that, the described first information is that described first bluetooth equipment is according to the first cryptographic algorithm preset, after adopting the first password of described second bluetooth equipment of local current record to be encrypted the certificate parameter that described first bluetooth equipment and described second bluetooth equipment both sides are consulted, the information of generation;
Described first authorization information be described second bluetooth equipment according to described first cryptographic algorithm, adopt user input the first authentication password described certificate parameter is encrypted after, the information of generation.
11. devices as claimed in claim 10, it is characterized in that, described device also comprises:
Determining unit, if consistent with described first authorization information for the described first information, then determines that described first authentication password is identical with described first password;
Described receiving element, also for receiving the password amendment information that described second bluetooth equipment writes in the password of described first bluetooth equipment amendment feature field when revising described first password, described password amendment information is the second cryptographic algorithm that described second bluetooth equipment is consulted according to described first bluetooth equipment and described second bluetooth equipment both sides, after adopting described first authentication password to be encrypted the new password that user inputs, the information of generation;
Decryption unit, for according to the decipherment algorithm corresponding with described second cryptographic algorithm, is decrypted described password amendment information;
Described notification unit, if also for successful decryption, then obtain described new password, notify that described second bluetooth equipment successfully receives described new password, and the second password of described second bluetooth equipment of described first bluetooth equipment current record is replaced with described new password;
Described receiving element, also for receiving the second authorization information that described second bluetooth equipment writes in described password authentification feature field, described second authorization information is that described second bluetooth equipment is when receiving described first bluetooth equipment and successfully receiving the notice of described new password, according to described first cryptographic algorithm, after adopting the described new password of user's input to be encrypted described certificate parameter, the information of generation;
Described acquisition unit, also for judge the described first information and described second authorization information inconsistent, when described second password is not initial value, according to described first cryptographic algorithm, adopt certificate parameter described in described second codon pair to be encrypted, obtain the second information;
Described notification unit, also for when judging that described second information is consistent with described second authorization information, described first password is replaced with described second password, and described second password is set to described initial value, notify that described in described second bluetooth equipment, first password is successfully modified.
12. devices as claimed in claim 11, is characterized in that,
Described notification unit, also for when judging that the described first information is consistent with described first authorization information, described second password is set to described initial value, and notifies that described in described second bluetooth equipment, the first authorization information is proved to be successful, allow the described data of access;
Judge the described first information and described first authorization information inconsistent, and when described second password is described initial value, notifies the first authorization information authentication failed described in described second bluetooth equipment, do not allow to access described data;
Judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information and described first authorization information inconsistent time, notify the first authorization information authentication failed described in described second bluetooth equipment, do not allow to access described data;
Judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information consistent with described first authorization information time, notify that described in described second bluetooth equipment, the first authorization information is proved to be successful, allow access described data.
13. 1 kinds of DAAs, it is characterized in that, described application of installation is in the system comprising the first bluetooth equipment and the second bluetooth equipment, when described first bluetooth equipment is as server, when described second bluetooth equipment is as client, described application of installation is on described second bluetooth equipment, and described device comprises:
Writing unit, after setting up at described second bluetooth equipment and described first bluetooth equipment and being expressly connected, when described first bluetooth equipment of access needs the data of Certificate Authority, the first authorization information is write in the password authentification feature field of described first bluetooth equipment, to make described first bluetooth equipment at the first password of described second bluetooth equipment according to local current record, after obtaining the first information, judge that whether the described first information is consistent with described first authorization information;
Receiving element, described first authorization information sent for receiving described first bluetooth equipment is proved to be successful and allows to access the first notice of described data, start to access described data, described first notice is for described first bluetooth equipment is judging the notice that the described first information sends time consistent with described first authorization information.
14. devices as claimed in claim 13, it is characterized in that, the described first information is that described first bluetooth equipment is according to the first cryptographic algorithm preset, after adopting the first password of described second bluetooth equipment of local current record to be encrypted the certificate parameter that described first bluetooth equipment and described second bluetooth equipment both sides are consulted, the information of generation;
Described first authorization information be described second bluetooth equipment according to described first cryptographic algorithm, adopt user input the first authentication password described certificate parameter is encrypted after, the information of generation.
15. devices as claimed in claim 14, it is characterized in that, described device also comprises:
Determining unit, for after receiving described first notice, determines that described first authentication password is identical with described first password;
Generation unit, for when revising described first password, according to the second cryptographic algorithm that described first bluetooth equipment and described second bluetooth equipment both sides consult, described first authentication password is adopted to be encrypted the new password that user inputs, generating cipher amendment information;
Said write unit, also for writing described password amendment information in the password amendment feature field of described first bluetooth equipment, to make described first bluetooth equipment according to the decipherment algorithm corresponding with described second cryptographic algorithm, described password amendment information is decrypted, after successful decryption, obtain described new password, and the second password of described second bluetooth equipment of local current record is replaced with described new password;
Described generation unit, also for when receiving described first bluetooth equipment and successfully receiving the second notice of described new password, according to described first cryptographic algorithm, adopt the described new password of user's input to be encrypted described certificate parameter, generate the second authorization information;
Said write unit, also for writing described second authorization information in described password authentification feature field, with make described first bluetooth equipment judge the described first information and described second authorization information inconsistent, and described second password is not when being initial value, according to described first cryptographic algorithm, certificate parameter described in described second codon pair is adopted to be encrypted, obtain the second information, and when judging that described second information is consistent with described second authorization information, described first password is replaced with described second password, and described second password is set to described initial value,
Described receiving element, is also replacing with described second password by described first password and the successfully modified third notice of the described first password sent after described second password is set to described initial value for receiving described first bluetooth equipment;
Described determining unit, also for when not receiving described first bluetooth equipment and successfully receiving the second notice of described new password, determines that described first password is revised unsuccessfully.
16. devices as claimed in claim 15, is characterized in that,
Described receiving element, also for receiving the first authorization information authentication failed that described first bluetooth equipment sends and not allowing to access the 4th notice of described data, described 4th notice for described first bluetooth equipment judge the described first information and described first authorization information inconsistent, and the notice sent when described second password is described initial value; Or, for described first bluetooth equipment judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information and described first authorization information inconsistent time the notice that sends; Or,
Described receiving element, the first authorization information also sent for receiving described first bluetooth equipment is proved to be successful and allows the five-way of accessing described data to know, described five-way is known for described first bluetooth equipment is when judging that the described first information is consistent with described first authorization information, the notice sent after described second password is set to described initial value, or, for described first bluetooth equipment judge the described first information and described first authorization information inconsistent, described second password is not described initial value, and described second information consistent with described first authorization information time the notice that sends.
CN201510305420.5A 2015-06-05 2015-06-05 A kind of data access method and device Active CN105187369B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510305420.5A CN105187369B (en) 2015-06-05 2015-06-05 A kind of data access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510305420.5A CN105187369B (en) 2015-06-05 2015-06-05 A kind of data access method and device

Publications (2)

Publication Number Publication Date
CN105187369A true CN105187369A (en) 2015-12-23
CN105187369B CN105187369B (en) 2019-03-15

Family

ID=54909214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510305420.5A Active CN105187369B (en) 2015-06-05 2015-06-05 A kind of data access method and device

Country Status (1)

Country Link
CN (1) CN105187369B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106028319A (en) * 2016-07-18 2016-10-12 北京京东尚科信息技术有限公司 Method and device for resisting illegal connection attack in slave Bluetooth device
CN107249168A (en) * 2017-05-18 2017-10-13 宇龙计算机通信科技(深圳)有限公司 A kind of data directional transmissions and method of reseptance and device
CN109525972A (en) * 2018-11-06 2019-03-26 深圳市乐创联科技有限公司 A kind of method, terminal and system controlling other terminals by Bluetooth information
CN109740340A (en) * 2018-12-28 2019-05-10 联想(北京)有限公司 Information processing method and electronic equipment
CN111641505A (en) * 2020-04-20 2020-09-08 广东乐心医疗电子股份有限公司 Information processing method and device, electronic equipment and readable storage medium
CN112469019A (en) * 2020-11-27 2021-03-09 苏州维伟思医疗科技有限公司 Method and device for safely modifying treatment parameters of WCD (WCD)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022337A (en) * 2007-03-28 2007-08-22 胡祥义 Network identification card realizing method
CN103632416A (en) * 2012-08-27 2014-03-12 青岛联合创新技术服务平台有限公司 Voice recognition remote-control access and working method thereof
CN103984904A (en) * 2014-05-27 2014-08-13 深圳市欧珀通信软件有限公司 Method and device for preventing screen locking code of mobile terminal from being cracked

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022337A (en) * 2007-03-28 2007-08-22 胡祥义 Network identification card realizing method
CN103632416A (en) * 2012-08-27 2014-03-12 青岛联合创新技术服务平台有限公司 Voice recognition remote-control access and working method thereof
CN103984904A (en) * 2014-05-27 2014-08-13 深圳市欧珀通信软件有限公司 Method and device for preventing screen locking code of mobile terminal from being cracked

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106028319A (en) * 2016-07-18 2016-10-12 北京京东尚科信息技术有限公司 Method and device for resisting illegal connection attack in slave Bluetooth device
CN107249168A (en) * 2017-05-18 2017-10-13 宇龙计算机通信科技(深圳)有限公司 A kind of data directional transmissions and method of reseptance and device
CN109525972A (en) * 2018-11-06 2019-03-26 深圳市乐创联科技有限公司 A kind of method, terminal and system controlling other terminals by Bluetooth information
CN109525972B (en) * 2018-11-06 2022-11-11 深圳市乐创联科技有限公司 Method, terminal and system for controlling other terminals through Bluetooth information
CN109740340A (en) * 2018-12-28 2019-05-10 联想(北京)有限公司 Information processing method and electronic equipment
CN111641505A (en) * 2020-04-20 2020-09-08 广东乐心医疗电子股份有限公司 Information processing method and device, electronic equipment and readable storage medium
CN111641505B (en) * 2020-04-20 2023-04-25 广东乐心医疗电子股份有限公司 Information processing method, information processing device, electronic equipment and readable storage medium
CN112469019A (en) * 2020-11-27 2021-03-09 苏州维伟思医疗科技有限公司 Method and device for safely modifying treatment parameters of WCD (WCD)
CN112469019B (en) * 2020-11-27 2023-02-24 苏州维伟思医疗科技有限公司 Method and device for safely modifying treatment parameters of WCD (WCD)

Also Published As

Publication number Publication date
CN105187369B (en) 2019-03-15

Similar Documents

Publication Publication Date Title
CN105187369A (en) Data access method and data access device
US20170208049A1 (en) Key agreement method and device for verification information
KR101744747B1 (en) Mobile terminal, terminal and method for authentication using security cookie
CN105450406A (en) Data processing method and device
CN111355684B (en) Internet of things data transmission method, device and system, electronic equipment and medium
US20160241536A1 (en) System and methods for user authentication across multiple domains
CN101241528A (en) Terminal access trusted PDA method and access system
WO2015003503A1 (en) Network device, terminal device and information security improving method
CN110401640B (en) Trusted connection method based on trusted computing dual-system architecture
CN103974248A (en) Terminal security protection method, device and system in ability open system
CN104243452B (en) A kind of cloud computing access control method and system
CN104935435A (en) Login methods, terminal and application server
CN105975867A (en) Data processing method
CN105490997A (en) Safety verification method and device, terminal and server
CN108156169A (en) Account login validation method, system and computer readable storage medium
CN104104650A (en) Data file visit method and terminal equipment
CN104994498B (en) The method and system that a kind of terminal applies are interacted with mobile phone card application
CN110166471A (en) A kind of portal authentication method and device
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN111611620B (en) Access request processing method and related device of access platform
CN115473655B (en) Terminal authentication method, device and storage medium for access network
JP2023535474A (en) ASSOCIATION CONTROL METHOD AND RELATED DEVICE
CN109474431A (en) Client certificate method and computer readable storage medium
CN108123917A (en) A kind of newer method and apparatus of the Service Ticket of internet-of-things terminal
CN114338091B (en) Data transmission method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant after: Xinhua three Technology Co., Ltd.

Address before: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant before: Huasan Communication Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant