CN105187369B - A kind of data access method and device - Google Patents
A kind of data access method and device Download PDFInfo
- Publication number
- CN105187369B CN105187369B CN201510305420.5A CN201510305420A CN105187369B CN 105187369 B CN105187369 B CN 105187369B CN 201510305420 A CN201510305420 A CN 201510305420A CN 105187369 B CN105187369 B CN 105187369B
- Authority
- CN
- China
- Prior art keywords
- bluetooth equipment
- password
- information
- verification information
- bluetooth
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
Abstract
The application provides a kind of data access method and device, when the first bluetooth equipment is as server, when second bluetooth equipment is as client, it includes: to receive the first verification information that the second bluetooth equipment is written in the password authentification feature field when needing the data of Certificate Authority on accessing the first bluetooth equipment to the first bluetooth equipment after connecting in plain text with the foundation of the second bluetooth equipment that this method, which is applied in the first bluetooth equipment,;According to the first password of second bluetooth equipment of local current record, the first information is obtained;Whether consistent with the first verification information the first information is judged, if unanimously, notifying second the first verification information of bluetooth equipment to be proved to be successful, allowing to access the data.Two bluetooth equipment both sides increase a secure authentication mechanisms without establishing encrypted link on the basis of plaintext connection type in the present embodiment, that is, can reach the good compatibility of bluetooth equipment and access the higher effect of safety of data.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of data access methods and device.
Background technique
Bluetooth equipment is just widely used in short distance, low data bulk application with features such as its low-power consumption, low costs.
In two the mutually bluetooth equipment of access data, it is accessed side and is known as server, access side is known as client, client and clothes
It is engaged between device through connection interaction data, then, it is general logical in order to guarantee that the access of data can obtain correct Certificate Authority
Password is crossed to access, in the correct situation of password, Certificate Authority is accessed, and the link of both sides is encrypted.
But since bluetooth standard is a kind of loose agreement, be usually directed in encrypted link establishment process it is more multifactor,
Cause both sides to negotiate to encounter difficulties, or even link cannot be established in the unmatched situation of both sides, is brought to compatibility very big
Problem.Therefore, in current application, most bluetooth equipments are generallyd use and are connected in plain text to guarantee maximum compatibility
Mode mutually accesses, but this access mode will lead to access data safety it is lower.
Summary of the invention
In view of this, the present invention provides a kind of data access method and device, to solve phase between existing bluetooth equipment
The problem for mutually causing the safety for accessing data lower in such a way that plaintext connects when access data.
Specifically, the application is achieved by the following technical solution:
According to the first aspect of the invention, a kind of data access method is provided, the method is applied to include the first bluetooth
In equipment and the system of the second bluetooth equipment, when first bluetooth equipment is as server, the second bluetooth equipment conduct
When client, the method is applied on first bluetooth equipment, which comprises
It is established with second bluetooth equipment after connecting in plain text, receives second bluetooth equipment and accessing first indigo plant
Need to be written when the data of Certificate Authority into the password authentification feature field of first bluetooth equipment in tooth equipment first
Verification information;
According to the first password of second bluetooth equipment of local current record, the first information is obtained;
Whether consistent with first verification information first information is judged, if unanimously, notifying second bluetooth
First verification information described in equipment is proved to be successful, and allows to access the data.
According to the second aspect of the invention, a kind of data access method is provided, the method is applied to include the first bluetooth
In equipment and the system of the second bluetooth equipment, when first bluetooth equipment is as server, the second bluetooth equipment conduct
When client, the method is applied on second bluetooth equipment, which comprises
It is established with first bluetooth equipment after connecting in plain text, needs Certificate Authority on accessing first bluetooth equipment
Data when, the first verification information is written in the password authentification feature field of the first bluetooth equipment of Xiang Suoshu, so that described first
Bluetooth equipment judges institute after obtaining the first information in the first password of second bluetooth equipment according to local current record
Whether consistent with first verification information state the first information;
First verification information that first bluetooth equipment is sent is received to be proved to be successful and allow to access the data
The first notice, start to access the data, first notice is that first bluetooth equipment is judging first letter
The notice sent when ceasing consistent with first verification information.
According to the third aspect of the invention we, a kind of data access device is provided, described device is applied to include the first bluetooth
In equipment and the system of the second bluetooth equipment, when first bluetooth equipment is as server, the second bluetooth equipment conduct
When client, described device is applied on first bluetooth equipment, and described device includes:
Receiving unit receives second bluetooth equipment and exists after connecting in plain text with second bluetooth equipment foundation
It accesses when needing the data of Certificate Authority on first bluetooth equipment to the password authentification tagged word of first bluetooth equipment
The first verification information being written in section;
Obtaining unit obtains the first letter for the first password according to second bluetooth equipment of local current record
Breath;
Notification unit, for judging whether the first information is consistent with first verification information, if unanimously, notifying
First verification information described in second bluetooth equipment is proved to be successful, and allows to access the data.
According to the fourth aspect of the invention, a kind of data access device is provided, described device is applied to include the first bluetooth
In equipment and the system of the second bluetooth equipment, when first bluetooth equipment is as server, the second bluetooth equipment conduct
When client, described device is applied on second bluetooth equipment, and described device includes:
Writing unit is accessing first bluetooth equipment after connecting in plain text with first bluetooth equipment foundation
On when needing the data of Certificate Authority, the first verifying of write-in letter in the password authentification feature field of the first bluetooth equipment of Xiang Suoshu
Breath, so that first bluetooth equipment in the first password according to second bluetooth equipment of local current record, obtains the
After one information, judge whether the first information is consistent with first verification information;
Receiving unit, first verification information for receiving the first bluetooth equipment transmission are proved to be successful and allow
The first notice for accessing the data starts to access the data, and first notice is that first bluetooth equipment is judging
The notice sent when the first information is consistent with first verification information out.
The beneficial effects of the present invention are:
For first bluetooth equipment with the second bluetooth equipment after establishing plaintext and connecting, the second bluetooth equipment is accessing the first bluetooth
It, can be by being written in the password authentification feature field that is provided to the first bluetooth equipment when needing the data of Certificate Authority in equipment
First verification information, so that the first bluetooth equipment obtains the first verification information.Later, the first bluetooth equipment can be according to its local
The first password of second bluetooth equipment of current record obtains the first information, and judges whether the first information is verified with first
Information is consistent, if unanimously, first verification information of the second bluetooth equipment is notified to be proved to be successful, access is allowed to need Certificate Authority
Data.It can be seen that two bluetooth equipments in the present embodiment, in mutually access data, both sides are primarily based on to be connected in plain text
Mode accesses, then, when access side accesses the data for needing accessed square Certificate Authority access, by accessed side to visit
After the side of asking executes associated verification operation, then decide whether that access side is allowed to access.Aforementioned this access mode, both sides are without establishing
Encrypted link increases a secure authentication mechanisms on the basis of plaintext connection type, that is, can reach the compatibility of bluetooth equipment
The higher effect of safety that is good and accessing data.
Detailed description of the invention
Fig. 1 is the application scenarios schematic diagram that data access is realized using the embodiment of the present invention;
Fig. 2 is one embodiment flow chart of data access method of the present invention;
Fig. 3 is another embodiment flow chart of data access method of the present invention;
Fig. 4 is a kind of hardware structure diagram of equipment where data access device of the present invention;
Fig. 5 is one embodiment block diagram of data access device of the present invention;
Fig. 6 is one embodiment block diagram of data access device of the present invention.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the application.
It is only to be not intended to be limiting the application merely for for the purpose of describing particular embodiments in term used in this application.
It is also intended in the application and the "an" of singular used in the attached claims, " described " and "the" including majority
Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps
It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application
A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from
In the case where the application range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determination ".
Referring to Fig. 1, the application scenarios schematic diagram of data access is realized for the application embodiment of the present invention.As shown in Figure 1, first
Bluetooth equipment and the second bluetooth equipment can be mobile phone, computer and ipad etc. with Bluetooth function, and the second bluetooth equipment can
With based on the data on the first bluetooth equipment of Bluetooth Low Energy protocol access, i.e., first bluetooth equipment is as server, this
Two bluetooth equipments are as client.
In an embodiment of the present invention, for the first bluetooth equipment with the second bluetooth equipment after establishing plaintext and connecting, second is blue
Tooth equipment, can be close by providing to the first bluetooth equipment when needing the data of Certificate Authority on accessing the first bluetooth equipment
The first verification information is written in code verifying feature field, so that the first bluetooth equipment obtains the first verification information.Later, first is blue
Tooth equipment can obtain the first information according to the first password of the second bluetooth equipment of its local current record, and judge this
Whether one information is consistent with the first verification information, if unanimously, first verification information of the second bluetooth equipment is notified to be proved to be successful,
Allow to access the data for needing Certificate Authority.That is, two bluetooth equipments in the present embodiment are in mutually access data, both sides are first
First accessed based on plaintext connection type, then, when access side accesses the data for needing accessed square Certificate Authority access,
After operating access side's execution associated verification by accessed side, then decide whether that access side is allowed to access.Aforementioned this access side
Formula, both sides increase a secure authentication mechanisms on the basis of plaintext connection type, that is, can reach indigo plant without establishing encrypted link
The good compatibility of tooth equipment and the higher effect of safety for accessing data.
It referring to fig. 2, is one embodiment flow chart of data access method of the present invention, this method can be applied to include the
In the system of one bluetooth equipment and the second bluetooth equipment, when first bluetooth equipment is as server, which makees
When for client, which is described from the first bluetooth equipment side, may comprise steps of:
Step 201 after connecting in plain text with the foundation of the second bluetooth equipment, receives the second bluetooth equipment and sets in the first bluetooth of access
The first verification information for needing to be written when the data of Certificate Authority into the password authentification feature field of the first bluetooth equipment on standby.
In the present embodiment, since two bluetooth equipments of Bluetooth Low Energy protocol communication are typically based on GATT (Generic
Attribute Profile, general-purpose attribute configuration) realize data interaction, the basic structure in the GATT for storing data is
Feature, each feature include operational attribute, data and UUID (Universally Unique Identifier, it is general unique
Identification code) etc. fields, and the operational attribute in feature determine user to data in this feature can be performed operation, it is such as right
Data in this feature are readable, writeable, read-write and can not read and write.Thus, when the first bluetooth equipment is as server,
When two bluetooth equipments are as client, for may be coupled to the second bluetooth equipment of each of first bluetooth equipment, first is blue
Tooth equipment and second bluetooth equipment can be consulted before Certificate Authority in advance, and second bluetooth equipment is to the first bluetooth equipment
The operational attribute of upper each feature, and after Certificate Authority, second bluetooth equipment is to each feature on the first bluetooth equipment
Operational attribute.
When the second bluetooth equipment needs to access the data on the first bluetooth equipment, the second bluetooth equipment can be first with
One bluetooth equipment is established to be connected in plain text, then sends request of data message to the first bluetooth equipment, can in the request of data message
It is set with the address information (MAC Address etc.), the address information of the first bluetooth equipment, the second bluetooth that include the second bluetooth equipment
The behaviour that the data in feature that the UUID and the second bluetooth equipment of the standby feature requested access to request access to it will execute
Make etc..First bluetooth equipment, can be first according to the second bluetooth in request of data message after receiving the request of data message
The UUID for the feature that the address information of equipment and the second bluetooth equipment request access to, determining before Certificate Authority, second indigo plant
Operational attribute of the feature of tooth device request access on the first bluetooth equipment judges the second indigo plant then according to the operational attribute
Whether the operation that the data in feature that tooth equipment requests access to it will execute is legal, if legal, then it represents that the second bluetooth
The data of device request access, which do not need Certificate Authority, may have access to, if it is illegal, then it represents that the second bluetooth equipment requests access to
Data need Certificate Authority after just may have access to, at this time the first bluetooth equipment can to the second bluetooth equipment returned data request lose
Lose message.
In the present embodiment, it is only that writeable password is tested that the first bluetooth equipment, which can provide operational attribute to the second bluetooth equipment,
Characteristics of syndrome field.After needing Certificate Authority on the second bluetooth equipment the first bluetooth equipment of access when just addressable data, the
The first verification information is written in the password authentification feature field that two bluetooth equipments can be provided to the first bluetooth equipment.In order to guarantee
The safety of first verification information transmission, first verification information can be calculated for the second bluetooth equipment according to preset first encryption
Method, using user input first verifying password to the first bluetooth equipment and the second bluetooth equipment both sides negotiation certificate parameter into
After row encryption, the information of generation.Wherein, which can be built in the first bluetooth equipment and the second bluetooth to be prior
Algorithm in equipment.
However, since Encryption Algorithm can be divided into irreversible cryptographic algorithm and irreversible encryption algorithm, and reversible encryption is calculated
Method usually has two reversible processes of encryption and decryption, if according to irreversible cryptographic algorithm, using the first verifying of user's input
The certificate parameter that password negotiates the first bluetooth equipment with the second bluetooth equipment both sides is encrypted, then first generated is tested
Information is demonstrate,proved during password authentification feature field is written, once being trapped, is just easy to parse the first verifying password, from
And password is caused to be revealed.Thus, in order to further increase the safety of the first verification information write-in, which can be with
For irreversible encryption algorithm, such as MD5 (Message Digest Algorithm 5, Message Digest Algorithm 5) algorithm or
SHA1 (Secure Hash Algorithm, Secure Hash Algorithm) algorithm etc..
In addition, the certificate parameter can be using challenge word string.Verifying password is attacked in order to prevent, and challenging can be in word string
Character including variation.For example, challenge word string can be " first the+the second bluetooth equipment of bluetooth equipment MAC Address MAC Address+company
Connect the first bluetooth equipment time when channel number when establishing+this connection AccessCode+ connection is established ", wherein challenging
Latter two character " the Access Code of this connection " and " the first bluetooth equipment time when connection is established " are second in word string
Bluetooth equipment is all different when establishing data connection every time with the first bluetooth equipment.Due in the second bluetooth equipment and the first bluetooth
Equipment is established the challenge word string used when data connection every time and is all different, therefore may further ensure that verifying password transmission
Safety.
Step 202, the first password according to second bluetooth equipment of local current record, obtain the first information.
In the present embodiment, when second bluetooth equipment be written into the password authentification feature field of the first bluetooth equipment
When one verification information is the first verifying password that user inputs to the second bluetooth equipment, accordingly, which is first blue
First password of the tooth equipment in the second bluetooth equipment of local current record.When second bluetooth equipment is to the first bluetooth equipment
The first verification information being written in password authentification feature field is that the second bluetooth equipment uses first Encryption Algorithm, using user
After first verifying password of input encrypts the certificate parameter, when the information of generation, accordingly, which is first
For bluetooth equipment according to first Encryption Algorithm, the first password using the second bluetooth equipment of local current record joins the verifying
After number is encrypted, the information of generation.
Whether step 203, to judge the first information consistent with the first verification information, if unanimously, notifying the second bluetooth equipment
First verification information is proved to be successful, and allows to access the data.
In the present embodiment, the first bluetooth equipment is in addition to that can provide password authentification feature field to each second bluetooth equipment
Outside, password can also being provided to each second bluetooth equipment and modifying feature field, which modifies the first of the operational attribute of feature
Initial value is not writeable.After the first bluetooth equipment judges that the first information is consistent with the first verification information, the first bluetooth equipment is not
It can only notify second the first verification information of bluetooth equipment to be proved to be successful, allow to access the data, but also can be by the first indigo plant
The operational attribute for the password modification feature field that tooth equipment is provided to second bluetooth equipment is revised as writeable.At this point, second is blue
Tooth equipment can modify feature field based on the password, the first verifying password (i.e. first used when accessing the data it
Password) it modifies.
Specifically, the first bluetooth equipment is when judging that the first information is consistent with the first verification information, can determine this
One verifying password is identical as first password, and hereafter, the second bluetooth equipment can be first to the first indigo plant when modifying the first password
Password modification information is written in the password modification feature field that tooth equipment provides, which can set for the second bluetooth
Standby the second Encryption Algorithm negotiated according to the first bluetooth equipment and the second bluetooth equipment both sides, (i.e. using the first verifying password
First password before modification) to user input new password be encrypted after, the information of generation.First bluetooth equipment is connecing
After receiving password modification information, can according to decipherment algorithm corresponding with second Encryption Algorithm, to the password modification information into
Row decryption, if successful decryption, obtains the new password, notifies second bluetooth equipment to be properly received the new password, and incite somebody to action this
Second password of the second bluetooth equipment of ground current record replaces with the new password.The present embodiment by user is inputted it is new
Password is written before password modification feature field, according to the second Encryption Algorithm, is inputted using the first password before modification to user
New password be encrypted, can be improved new password transmission safety.It is to be noted that due to the first bluetooth equipment
It needs that the password modification information is decrypted after receiving password modification information, thus second Encryption Algorithm can be for can
Reverse encryption algorithm.
When the second bluetooth equipment, which receives the first bluetooth equipment, has been properly received the notice of the new password, can press first
According to first Encryption Algorithm, the certificate parameter is encrypted using the new password that user inputs, generates the second verification information, so
Second verification information is written in the password authentification feature field that the first bluetooth equipment provides afterwards.First bluetooth equipment is receiving
To after second verification information, it can judge that the first information and second verification information are inconsistent first, this is second close
When code is not initial value, according to first Encryption Algorithm, the certificate parameter is encrypted using second password, is obtained
Second information;Then when judging that second information is consistent with second verification information, which is replaced with second
Password, and initial value is set by the second password, notify the second bluetooth equipment first password successfully modified.
In addition, the second bluetooth equipment is set to the first bluetooth in the first bluetooth equipment and the second bluetooth equipment interactive process
Its notice for being properly received the new password that the new password and the first bluetooth equipment that preparation is sent are returned to the second bluetooth equipment is all
The case where being likely to occur packet loss.It, certainly will not be to the second bluetooth equipment when the first bluetooth equipment is not successfully received new password
Its notice for being properly received the new password is returned, therefore is successfully connect when the second bluetooth equipment does not receive the first bluetooth equipment
When receiving the notice of new password, the second bluetooth equipment can determine first password modification failure.
When first password modifies failure, if the second bluetooth equipment accesses after needing Certificate Authority on the first bluetooth equipment
Just addressable data, then the second bluetooth equipment can be write into the password authentification feature field of the first bluetooth equipment offer first
Enter first verification information, later, the first bluetooth equipment can be when judging that the first information is consistent with the first verification information, will
Second password is set as initial value, and the second bluetooth equipment first verification information is notified to be proved to be successful, and allows to access the number
According to;Judging that the first information and the first verification information are inconsistent, and second password be initial value when, notify the second bluetooth
Equipment the first verification information authentication failed, does not allow to access the data;Judging the first information and the first verification information
Inconsistent, which is not initial value, and second information and the first verification information it is inconsistent when, notify the second bluetooth to set
The standby first verification information authentication failed, does not allow to access the data;And judging the first information and the first verification information
Inconsistent, the second password is not initial value, and when the second information is consistent with the first verification information, notifies the second bluetooth equipment first
Verification information is proved to be successful, and allows to access the data.
After the first verification information is proved to be successful, the first bluetooth equipment can be according to scheduled rules modification second bluetooth
Equipment on the first bluetooth equipment after Certificate Authority the just operational attribute of addressable feature.It verifies and loses when the first verification information
After losing, the second bluetooth equipment can continue the first verifying of write-in letter into the password authentification feature field that the first bluetooth equipment provides
Breath, hereafter, the first bluetooth equipment can in the above way verify first verification information, and to the number of verifying into
Row statistics.When verifying number more than given threshold, the first bluetooth equipment can actively disconnect the company with second bluetooth equipment
It connects, and second bluetooth equipment is included in dynamic blacklist, it is possible thereby to further increase the safety of data access.
The present embodiment is failed by modifying in first password, and the second bluetooth equipment accesses to be needed to authenticate on the first bluetooth equipment
After authorization when the addressable data of, the first bluetooth equipment is using the first information and the second information successively to first verification information
It is verified, when the first verification information is consistent with any one information in the first information and the second information, that is, when user inputs
First verifying password and the first bluetooth equipment any one password in the first password and the second password of local current record
When identical, so that it may determine that first verification information is proved to be successful, it is possible thereby to avoid user to be proved to be successful, input is modified
Preceding first password and modified first password the two passwords are verified, so as to improve verification efficiency.In addition, this
Embodiment is by judging that the first information and the first verification information are inconsistent in the first bluetooth equipment, and the second password is initial
When value, determine the first verification information authentication failed, can to avoid execute judge the second information whether with the first verification information
Step, it is possible thereby to further increase the efficiency of verifying.
In addition, the present embodiment is by when the first bluetooth equipment judges that the first information is consistent with the first verification information,
Initial value is set by second password, it is ensured that when verifying next time, the first bluetooth equipment is only needed using the first information
First verification information is verified, so as to further increase the efficiency of verifying.Similarly, the present embodiment passes through
One bluetooth equipment judges that the first information and the first verification information are inconsistent, and the second password is not the initial value, and second believes
When ceasing consistent with the first verification information, after the second password is substituted for first password, initial value is set by second password,
Can guaranteeing, the first bluetooth equipment only needs the first verification information to be verified using the first information when verifying next time, from
And it can be further improved the efficiency of verifying.
It is another embodiment flow chart of data access method of the present invention referring to Fig. 3, this method is applied to include first
In the system of bluetooth equipment and the second bluetooth equipment, when the first bluetooth equipment is as server, the second bluetooth equipment is as client
When end, which is described from the second bluetooth equipment side, may comprise steps of:
Step 301 after connecting in plain text with the foundation of the first bluetooth equipment, needs Certificate Authority on accessing the first bluetooth equipment
Data when, the first verification information is written into the password authentification feature field of the first bluetooth equipment, so that the first bluetooth equipment
Judge that the first information is after obtaining the first information in the first password of second bluetooth equipment according to local current record
It is no consistent with the first verification information.
In the present embodiment, which can be the first bluetooth equipment according to preset first Encryption Algorithm, using this
The verifying that the first password of second bluetooth equipment of ground current record negotiates the first bluetooth equipment and the second bluetooth equipment both sides
After parameter is encrypted, the information of generation;First verification information can be the second bluetooth equipment according to the first Encryption Algorithm, adopt
After being encrypted with the first verifying password that user inputs to certificate parameter, the information of generation.
Step 302, the first verification information for receiving the transmission of the first bluetooth equipment are proved to be successful and allow to access the data
The first notice, start to access the data, the first notice is that the first bluetooth equipment is judging the first information and the first verifying letter
The notice sent when ceasing consistent.
In the present embodiment, the second bluetooth equipment receive this first notice after, can determine this first verifying password with
The first password is identical.It, can be first, in accordance with the first bluetooth equipment and when the second bluetooth equipment needs to modify first password
The second Encryption Algorithm that two bluetooth equipment both sides negotiate carries out at encryption the new password that user inputs using the first verifying password
Reason generates password modification information;Then the password modification information is written into the password of the first bluetooth equipment modification feature field.
First bluetooth equipment can be calculated after receiving the password modification information first, in accordance with decryption corresponding with the second Encryption Algorithm
Method, is decrypted password modification information, obtains the new password after successful decryption, and by described the second of local current record
Second password of bluetooth equipment replaces with the new password;Then it is sent to the second bluetooth equipment be properly received the new password
Second notice.
Second bluetooth equipment, can be first, in accordance with first Encryption Algorithm, using user after receiving second notice
The new password of input encrypts the certificate parameter, generates the second verification information;Then to the password authentification tagged word
Second verification information is written in section.First bluetooth equipment can judge first after receiving second verification information
Information and the second verification information are inconsistent, and when the second password is not initial value, according to the first Encryption Algorithm, using the second password
Certificate parameter is encrypted, obtains the second information, and when judging that the second information is consistent with the second verification information,
First password is replaced with into the second password, and sets initial value for the second password.Later, the first bluetooth equipment can be to second
Bluetooth equipment sends the successfully modified third notice of the first password.In addition, the second bluetooth equipment is not receive this second logical
When knowing, first password modification failure can be determined.
Second bluetooth equipment accesses in the case where first password is modified and fails and needs Certificate Authority on the first bluetooth equipment
Data when, the first verification information be written in the password authentification feature field that can provide first to the first bluetooth equipment, this
One verification information can be the second bluetooth equipment according to the first Encryption Algorithm, using the first verifying password of user's input to verifying
After parameter is encrypted, the information of generation.First bluetooth equipment can judge first after receiving the first verification information
Information and the first verification information are inconsistent, and the second password be initial value when;Alternatively, judging the first information and the first verifying
Information is inconsistent, and the second password is not initial value, and when the second information and the first verification information are inconsistent, to the second bluetooth equipment
It sends the first verification information authentication failed and does not allow to access the 4th notice of the data.In addition, the first bluetooth equipment can be with
When judging that the first information is consistent with the first verification information, after setting initial value for the second password, to the second bluetooth equipment
Send the first verification information be proved to be successful and allow to access the data the 5th notice, alternatively, judge the first information with
First verification information is inconsistent, and the second password is not initial value, and when the second information is consistent with the first verification information, to the second indigo plant
Tooth equipment sends the 5th notice that the first verification information is proved to be successful and allows to access the data.
Embodiment illustrated in fig. 3 is consistent with the description of aforementioned embodiment illustrated in fig. 2, and difference is only that executing subject difference,
Details are not described herein.
Corresponding with the embodiment of aforementioned data access method, present invention also provides the embodiments of data access device.
The embodiment of data access device of the present invention can be applied on the first bluetooth equipment and the second bluetooth equipment.Device
Embodiment can also be realized by software realization by way of hardware or software and hardware combining.Taking software implementation as an example,
It is by the processor of equipment where it by calculating corresponding in nonvolatile memory as the device on a logical meaning
Machine program instruction is read into memory what operation was formed.For hardware view, as shown in figure 4, being filled for the application data access
A kind of hardware structure diagram of equipment where setting, in addition to processor shown in Fig. 4, memory, network interface and non-volatile memories
Except device, the equipment in embodiment where device can also include other hardware, to this generally according to the actual functional capability of the equipment
It repeats no more.
It is one embodiment flow chart of data access device of the present invention referring to Fig. 5, described device is applied to include first
In the system of bluetooth equipment and the second bluetooth equipment, when first bluetooth equipment is as server, second bluetooth equipment
When as client, described device is applied on first bluetooth equipment, and described device includes:
Receiving unit 510, for connecing after first bluetooth equipment is connect in plain text with second bluetooth equipment foundation
Second bluetooth equipment is received when needing the data of Certificate Authority on accessing first bluetooth equipment to first bluetooth
The first verification information being written in the password authentification feature field of equipment;
Obtaining unit 520, for according to the first of second bluetooth equipment of the first bluetooth equipment current record
Password obtains the first information;
Notification unit 530, it is whether consistent with first verification information for judging the first information, if unanimously,
It notifies the first verification information described in second bluetooth equipment to be proved to be successful, allows to access the data.
In an optional implementation,
The first information is first bluetooth equipment according to preset first Encryption Algorithm, using local current record
The first password of second bluetooth equipment first bluetooth equipment and the second bluetooth equipment both sides' negotiation are tested
After card parameter is encrypted, the information of generation;
First verification information is second bluetooth equipment according to first Encryption Algorithm, using user's input
After first verifying password encrypts the certificate parameter, the information of generation.
In another optional implementation, described device further include:
Determination unit 540, if consistent with first verification information for the first information, it is determined that described first tests
It is identical as the first password to demonstrate,prove password;
The receiving unit 510 is also used to receive second bluetooth equipment Xiang Suoshu when modifying the first password
The password modification information being written in the password modification feature field of first bluetooth equipment, the password modification information is described second
The second Encryption Algorithm that bluetooth equipment is negotiated according to first bluetooth equipment and the second bluetooth equipment both sides, using described
After the new password that first verifying password inputs user is encrypted, the information of generation;
Decryption unit 550, for modifying the password and believing according to decipherment algorithm corresponding with second Encryption Algorithm
Breath is decrypted;
The notification unit 530 obtains the new password if being also used to successful decryption, and second bluetooth is notified to set
It is standby to be properly received the new password and close by the second of second bluetooth equipment of the first bluetooth equipment current record
Code replaces with the new password;
The receiving unit 510 is also used to receive second bluetooth equipment and writes into the password authentification feature field
The second verification information entered, second verification information are that second bluetooth equipment is receiving first bluetooth equipment
When being properly received the notice of the new password, according to first Encryption Algorithm, using the new password of user's input to institute
It states after certificate parameter encrypted, the information of generation;
The obtaining unit 520 is also used to judging that the first information and second verification information are inconsistent, institute
When to state the second password not be initial value, according to first Encryption Algorithm, using second password to the certificate parameter into
Row encryption obtains the second information;
The notification unit 530 is also used to when judging that second information is consistent with second verification information, will
The first password replaces with second password, and sets the initial value for second password, notifies described second
First password described in bluetooth equipment is successfully modified.
In another optional implementation,
The notification unit 530 is also used to when judging that the first information is consistent with first verification information, will
Second password is set as the initial value, and the first verification information described in second bluetooth equipment is notified to be proved to be successful,
Allow to access the data;
Judging that the first information and first verification information are inconsistent, and second password is described initial
When value, notifies the first verification information authentication failed described in second bluetooth equipment, do not allow to access the data;
Judge that the first information and first verification information are inconsistent, second password is not described initial
Value, and when second information and first verification information are inconsistent, notify described in second bluetooth equipment the first verifying
Information Authentication failure, does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not described initial
Value, and when second information is consistent with first verification information, notify the first verifying described in second bluetooth equipment to believe
Breath is proved to be successful, and allows to access the data.
It is another embodiment flow chart of data access device of the present invention referring to Fig. 6, described device is applied to including the
In the system of one bluetooth equipment and the second bluetooth equipment, when first bluetooth equipment is as server, second bluetooth is set
When for as client, described device is applied on second bluetooth equipment, and described device includes:
Writing unit 610 is used for after second bluetooth equipment is connect in plain text with first bluetooth equipment foundation,
It accesses when needing the data of Certificate Authority on first bluetooth equipment, the password authentification tagged word of the first bluetooth equipment of Xiang Suoshu
The first verification information is written in section, so that first bluetooth equipment is in second bluetooth equipment according to local current record
First password, obtain the first information after, judge whether the first information consistent with first verification information;
Receiving unit 620, for receive first verification information that first bluetooth equipment is sent be proved to be successful and
The first notice for allowing to access the data starts to access the data, and first notice is that first bluetooth equipment exists
Judge the notice sent when the first information is consistent with first verification information.
In an optional implementation,
The first information is first bluetooth equipment according to preset first Encryption Algorithm, using local current record
The first password of second bluetooth equipment first bluetooth equipment and the second bluetooth equipment both sides' negotiation are tested
After card parameter is encrypted, the information of generation;
First verification information is second bluetooth equipment according to first Encryption Algorithm, using user's input
After first verifying password encrypts the certificate parameter, the information of generation.
In another optional implementation, described device further include:
Determination unit 630, for determining the first verifying password and described first after receiving first notice
Password is identical;
Generation unit 640 is used for when modifying the first password, according to first bluetooth equipment and second indigo plant
The second Encryption Algorithm that tooth equipment both sides negotiate carries out at encryption the new password that user inputs using the first verifying password
Reason generates password modification information;
Said write unit 610 is also used to modify in feature field described in write-in to the password of first bluetooth equipment
Password modification information, so that first bluetooth equipment is according to decipherment algorithm corresponding with second Encryption Algorithm, to described
Password modification information is decrypted, and the new password is obtained after successful decryption, and blue by described the second of local current record
Second password of tooth equipment replaces with the new password;
The generation unit 640, first bluetooth equipment ought be received by, which being also used to, has been properly received the new password
When the second notice, according to first Encryption Algorithm, the certificate parameter is added using the new password that user inputs
It is close, generate the second verification information;
Said write unit 610 is also used to that second verification information is written into the password authentification feature field, with
First bluetooth equipment is set to judge that the first information and second verification information are inconsistent, and second password
When not being initial value, according to first Encryption Algorithm, the certificate parameter is encrypted using second password,
The second information is obtained, and when judging that second information is consistent with second verification information, by the first password
Second password is replaced with, and sets the initial value for second password;
The receiving unit 620, be also used to receive first bluetooth equipment the first password is replaced with it is described
Second password and the successfully modified third of the first password sent after the initial value is set by second password lead to
Know;
The determination unit 630 is also used to not receive first bluetooth equipment and has been properly received the new password
The second notice when, determine first password modification failure.
In another optional implementation,
The receiving unit 620 is also used to receive the first verification information authentication failed that first bluetooth equipment is sent
And not allowing to access the 4th notice of the data, the 4th notice is that first bluetooth equipment is judging described first
Information and first verification information are inconsistent, and the notice that issues when second password is the initial value;Alternatively, for institute
It states the first bluetooth equipment and is judging that the first information and first verification information are inconsistent, second password is not institute
State initial value, and the notice that second information issues when inconsistent with first verification information;Alternatively,
The receiving unit 620 is also used to receive the first verification information that first bluetooth equipment is sent and is proved to be successful
And allowing to access the 5th notice of the data, the 5th notice is that first bluetooth equipment is judging first letter
When ceasing consistent with first verification information, the notice sent after the initial value is set by second password, alternatively, being
First bluetooth equipment is judging that the first information and first verification information are inconsistent, and second password is not
The initial value, and the notice that when second information is consistent with first verification information sends.
The function of each unit and the realization process of effect are specifically detailed in the above method and correspond to step in above-mentioned apparatus
Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality
Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit
The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with
It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual
The purpose for needing to select some or all of the modules therein to realize application scheme.Those of ordinary skill in the art are not paying
Out in the case where creative work, it can understand and implement.
As seen from the above-described embodiment, the first bluetooth equipment and the second bluetooth equipment are after establishing and connecting in plain text, the second bluetooth
Equipment, can be by the password that provides to the first bluetooth equipment when needing the data of Certificate Authority on accessing the first bluetooth equipment
The first verification information is written in verifying feature field, so that the first bluetooth equipment obtains the first verification information.Later, the first bluetooth
Equipment can obtain the first information according to the first password of the second bluetooth equipment of its local current record, and judge this first
Whether information is consistent with the first verification information, if unanimously, first verification information of the second bluetooth equipment is notified to be proved to be successful, permits
Perhaps access needs the data of Certificate Authority.That is, two bluetooth equipments in the present embodiment are in mutually access data, both sides are first
It is accessed based on plaintext connection type, then, when access side accesses the data for needing accessed square Certificate Authority access, by
After accessed side executes associated verification operation to access side, then decide whether that access side is allowed to access.Aforementioned this access mode,
Both sides increase a secure authentication mechanisms on the basis of plaintext connection type, that is, can reach bluetooth without establishing encrypted link
The good compatibility of equipment and the higher effect of safety for accessing data.
The foregoing is merely the preferred embodiments of the application, not to limit the application, all essences in the application
Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the application protection.
Claims (12)
1. a kind of data access method, which is characterized in that the method is applied to set including the first bluetooth equipment and the second bluetooth
In standby system, when first bluetooth equipment is as server, when second bluetooth equipment is as client, the method
It applies on first bluetooth equipment, which comprises
It is established with second bluetooth equipment after connecting in plain text, receives second bluetooth equipment and set in access first bluetooth
First be written when the data of Certificate Authority into the password authentification feature field of first bluetooth equipment is needed to verify on standby
Information, first verification information is second bluetooth equipment according to preset first Encryption Algorithm, using user's input
First verifying password, the certificate parameter negotiated to first bluetooth equipment with the second bluetooth equipment both sides encrypt
Afterwards, the information of generation;
According to the first password of second bluetooth equipment of local current record, the first information is obtained, the first information is
First bluetooth equipment is according to preset first Encryption Algorithm, using second bluetooth equipment of local current record
First password, after being encrypted to the certificate parameter, the information of generation;
Whether consistent with first verification information first information is judged, if unanimously, notifying second bluetooth equipment
First verification information is proved to be successful, and allows to access the data.
2. the method as described in claim 1, which is characterized in that the method also includes:
If the first information is consistent with first verification information, it is determined that the first verifying password and the first password
It is identical;
It receives second bluetooth equipment and modifies feature to the password of first bluetooth equipment when modifying the first password
The password modification information being written in field, the password modification information are that second bluetooth equipment is set according to first bluetooth
Standby the second Encryption Algorithm negotiated with the second bluetooth equipment both sides inputs user using the first verifying password new
After password is encrypted, the information of generation;
According to decipherment algorithm corresponding with second Encryption Algorithm, the password modification information is decrypted, if being decrypted into
Function then obtains the new password, notifies that second bluetooth equipment has been properly received the new password, and by local current record
The second password of second bluetooth equipment replace with the new password;
The second verification information that second bluetooth equipment is written into the password authentification feature field is received, described second tests
Card information is second bluetooth equipment when receiving first bluetooth equipment and being properly received the notice of the new password,
According to first Encryption Algorithm, after being encrypted using the new password that user inputs to the certificate parameter, generation
Information;
Judging that the first information and second verification information are inconsistent, when second password is not initial value, is pressing
According to first Encryption Algorithm, the certificate parameter is encrypted using second password, obtains the second information;
When judging that second information is consistent with second verification information, the first password is replaced with described second
Password, and the initial value is set by second password, notify first password described in second bluetooth equipment to be modified as
Function.
3. method according to claim 2, which is characterized in that the method also includes:
When judging that the first information is consistent with first verification information, set described initial for second password
Value, and the first verification information described in second bluetooth equipment is notified to be proved to be successful, allow to access the data;
Judging that the first information and first verification information are inconsistent, and second password is the initial value
When, it notifies the first verification information authentication failed described in second bluetooth equipment, does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not the initial value,
And second information and first verification information it is inconsistent when, notify the first verification information described in second bluetooth equipment
Authentication failed does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not the initial value,
And second information it is consistent with first verification information when, notify the first verification information described in second bluetooth equipment to test
It demonstrate,proves successfully, allows to access the data.
4. a kind of data access method, which is characterized in that the method is applied to set including the first bluetooth equipment and the second bluetooth
In standby system, when first bluetooth equipment is as server, when second bluetooth equipment is as client, the method
It applies on second bluetooth equipment, which comprises
It is established with first bluetooth equipment after connecting in plain text, the number of Certificate Authority is needed on accessing first bluetooth equipment
According to when, the first verification information is written in the password authentification feature field of the first bluetooth equipment of Xiang Suoshu, so that first bluetooth
Equipment is in the first password according to second bluetooth equipment of local current record, after obtaining the first information, judges described the
Whether one information consistent with first verification information, wherein first verification information be second bluetooth equipment according to
Preset first Encryption Algorithm, using the first verifying password of user's input, to first bluetooth equipment and second indigo plant
After the certificate parameter that tooth equipment both sides negotiate encrypts, the information of generation;The first information is first bluetooth equipment
According to preset first Encryption Algorithm, using the first password of second bluetooth equipment of local current record, to institute
It states after certificate parameter encrypted, the information of generation;
Receive first verification information that first bluetooth equipment is sent is proved to be successful and allows to access the data the
One notice, starts to access the data, first notice be first bluetooth equipment judge the first information with
The notice that first verification information is sent when consistent.
5. method as claimed in claim 4, which is characterized in that the method also includes:
After receiving first notice, determine that the first verifying password is identical as the first password;
When modifying the first password, according to first bluetooth equipment and the second of the second bluetooth equipment both sides negotiation
Encryption Algorithm is encrypted using the new password that the first verifying password inputs user, generates password modification information;
The password modification information is written into the password of first bluetooth equipment modification feature field, so that described first is blue
Tooth equipment is decrypted the password modification information, is decrypting according to decipherment algorithm corresponding with second Encryption Algorithm
The new password is obtained after success, and the second password of second bluetooth equipment of local current record is replaced with described new
Password;
When receive first bluetooth equipment be properly received the new password second notice when, according to it is described first encryption
Algorithm encrypts the certificate parameter using the new password that user inputs, and generates the second verification information;
Second verification information is written into the password authentification feature field, so that first bluetooth equipment is being judged
The first information and second verification information are inconsistent, and when second password is not initial value, according to described first
Encryption Algorithm is encrypted the certificate parameter using second password, obtains the second information, and judging
When second information is consistent with second verification information, the first password is replaced with into second password, and by institute
It states the second password and is set as the initial value;
First bluetooth equipment is received the first password is being replaced with second password and is setting second password
It is set to the successfully modified third notice of the first password sent after the initial value;
When do not receive first bluetooth equipment be properly received the new password second notice when, determine that described first is close
Code modification failure.
6. method as claimed in claim 5, which is characterized in that the method also includes:
It receives the first verification information authentication failed that first bluetooth equipment is sent and does not allow to access the 4th of the data
Notice, the 4th notice are that first bluetooth equipment is judging that the first information and first verification information are different
It causes, and the notice that issues when second password is the initial value;Alternatively, for first bluetooth equipment judge it is described
The first information and first verification information are inconsistent, and second password is not the initial value, and second information with
The notice that first verification information issues when inconsistent;Alternatively,
It receives the first verification information that first bluetooth equipment is sent and is proved to be successful and allows to access the 5th of the data and lead to
Know, the 5th notice is that first bluetooth equipment is judging that the first information is consistent with first verification information
When, the notice sent after the initial value is set by second password, alternatively, judging for first bluetooth equipment
The first information and first verification information are inconsistent, and second password is not the initial value, and described second believes
The notice sent when ceasing consistent with first verification information.
7. a kind of data access device, which is characterized in that described device is applied to set including the first bluetooth equipment and the second bluetooth
In standby system, when first bluetooth equipment is as server, when second bluetooth equipment is as client, described device
It applies on first bluetooth equipment, described device includes:
Receiving unit is used for after first bluetooth equipment is connect in plain text with second bluetooth equipment foundation, described in reception
Second bluetooth equipment is when needing the data of Certificate Authority on accessing first bluetooth equipment to first bluetooth equipment
The first verification information being written in password authentification feature field, first verification information are second bluetooth equipment according to pre-
If the first Encryption Algorithm, using user input first verifying password, to first bluetooth equipment and second bluetooth
After the certificate parameter that equipment both sides negotiate encrypts, the information of generation;
Obtaining unit is obtained for the first password according to second bluetooth equipment of the first bluetooth equipment current record
The first information is obtained, the first information is first bluetooth equipment according to preset first Encryption Algorithm, using local
The first password of second bluetooth equipment of current record, after being encrypted to the certificate parameter, the information of generation;
Notification unit, it is whether consistent with first verification information for judging the first information, if unanimously, described in notice
First verification information described in second bluetooth equipment is proved to be successful, and allows to access the data.
8. device as claimed in claim 7, which is characterized in that described device further include:
Determination unit, if consistent with first verification information for the first information, it is determined that the first verifying password
It is identical as the first password;
The receiving unit is also used to receive second bluetooth equipment when modifying the first password to first bluetooth
The password modification information being written in the password modification feature field of equipment, the password modification information is second bluetooth equipment
According to the second Encryption Algorithm that first bluetooth equipment and the second bluetooth equipment both sides negotiate, using first verifying
After the new password that password inputs user is encrypted, the information of generation;
Decryption unit, for being carried out to the password modification information according to decipherment algorithm corresponding with second Encryption Algorithm
Decryption;
The notification unit obtains the new password if being also used to successful decryption, and second bluetooth equipment is notified to succeed
The new password is received, and the second password of second bluetooth equipment of the first bluetooth equipment current record is replaced with
The new password;
The receiving unit is also used to receive second bluetooth equipment is written into the password authentification feature field second
Verification information, second verification information are that second bluetooth equipment has been properly received receiving first bluetooth equipment
When the notice of the new password, according to first Encryption Algorithm, the verifying is joined using the new password that user inputs
After number is encrypted, the information of generation;
The obtaining unit is also used to judging that the first information and second verification information are inconsistent, described second
When password is not initial value, according to first Encryption Algorithm, the certificate parameter is encrypted using second password
Processing, obtains the second information;
The notification unit is also used to when judging that second information is consistent with second verification information, by described
One password replaces with second password, and sets the initial value for second password, and second bluetooth is notified to set
The standby first password is successfully modified.
9. device as claimed in claim 8, which is characterized in that
The notification unit is also used to when judging that the first information is consistent with first verification information, by described
Two passwords are set as the initial value, and the first verification information described in second bluetooth equipment is notified to be proved to be successful, and allow to visit
Ask the data;
Judging that the first information and first verification information are inconsistent, and second password is the initial value
When, it notifies the first verification information authentication failed described in second bluetooth equipment, does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not the initial value,
And second information and first verification information it is inconsistent when, notify the first verification information described in second bluetooth equipment
Authentication failed does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not the initial value,
And second information it is consistent with first verification information when, notify the first verification information described in second bluetooth equipment to test
It demonstrate,proves successfully, allows to access the data.
10. a kind of data access device, which is characterized in that described device is applied to set including the first bluetooth equipment and the second bluetooth
In standby system, when first bluetooth equipment is as server, when second bluetooth equipment is as client, described device
It applies on second bluetooth equipment, described device includes:
Writing unit, for accessing institute after second bluetooth equipment is connect in plain text with first bluetooth equipment foundation
When stating the data for needing Certificate Authority on the first bluetooth equipment, write in the password authentification feature field of the first bluetooth equipment of Xiang Suoshu
Enter the first verification information, so that first bluetooth equipment is according to the first of second bluetooth equipment of local current record
Password judges whether the first information is consistent with first verification information, wherein described first after obtaining the first information
Verification information is second bluetooth equipment according to preset first Encryption Algorithm, verifies password using the first of user's input,
After being encrypted to the certificate parameter that first bluetooth equipment and the second bluetooth equipment both sides are negotiated, the information of generation;
The first information is first bluetooth equipment according to preset first Encryption Algorithm, using the institute of local current record
The first password for stating the second bluetooth equipment, after being encrypted to the certificate parameter, the information of generation;
Receiving unit, first verification information for receiving the first bluetooth equipment transmission are proved to be successful and allow to access
First notice of the data starts to access the data, and first notice is first bluetooth equipment judging
State the first information it is consistent with first verification information when notice that sends.
11. device as claimed in claim 10, which is characterized in that described device further include:
Determination unit, for determining the first verifying password and the first password phase after receiving first notice
Together;
Generation unit is used for when modifying the first password, according to first bluetooth equipment and second bluetooth equipment
The second Encryption Algorithm that both sides negotiate is encrypted using the new password that the first verifying password inputs user, raw
At password modification information;
Said write unit is also used to modify that the password modification being written in feature field to the password of first bluetooth equipment
Information, so that first bluetooth equipment modifies the password according to decipherment algorithm corresponding with second Encryption Algorithm
Information is decrypted, and obtains the new password after successful decryption, and by second bluetooth equipment of local current record
Second password replaces with the new password;
The generation unit is also used to receive the second notice that first bluetooth equipment has been properly received the new password
When, according to first Encryption Algorithm, the certificate parameter is encrypted using the new password that user inputs, generates the
Two verification informations;
Said write unit is also used to that second verification information is written into the password authentification feature field, so that described
First bluetooth equipment is judging that the first information and second verification information are inconsistent, and second password is not just
When initial value, according to first Encryption Algorithm, the certificate parameter is encrypted using second password, obtains
Two information, and when judging that second information is consistent with second verification information, the first password is replaced with
Second password, and the initial value is set by second password;
The receiving unit is also used to receive first bluetooth equipment and the first password is being replaced with second password
And the successfully modified third notice of the first password sent after the initial value is set by second password;
The determination unit is also used to not receive first bluetooth equipment and has been properly received the second logical of the new password
When knowing, the first password modification failure is determined.
12. device as claimed in claim 11, which is characterized in that
The receiving unit is also used to receive the first verification information authentication failed that first bluetooth equipment is sent and does not allow
The 4th notice of the data is accessed, the 4th notice is judging the first information and institute for first bluetooth equipment
State that the first verification information is inconsistent, and the notice that when second password is the initial value issues;Alternatively, blue for described first
Tooth equipment is judging that the first information and first verification information are inconsistent, and second password is not described initial
Value, and the notice that second information issues when inconsistent with first verification information;Alternatively,
The receiving unit is also used to receive the first verification information that first bluetooth equipment is sent and is proved to be successful and allows to visit
Ask the data the 5th notice, it is described 5th notice be first bluetooth equipment judge the first information with it is described
When first verification information is consistent, the notice sent after the initial value is set by second password, alternatively, being described first
Bluetooth equipment is judging that the first information and first verification information are inconsistent, and second password is not described initial
Value, and the notice that when second information is consistent with first verification information sends.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510305420.5A CN105187369B (en) | 2015-06-05 | 2015-06-05 | A kind of data access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510305420.5A CN105187369B (en) | 2015-06-05 | 2015-06-05 | A kind of data access method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105187369A CN105187369A (en) | 2015-12-23 |
CN105187369B true CN105187369B (en) | 2019-03-15 |
Family
ID=54909214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510305420.5A Active CN105187369B (en) | 2015-06-05 | 2015-06-05 | A kind of data access method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105187369B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106028319B (en) * | 2016-07-18 | 2019-06-04 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus for resisting illegal connection attack in slave Bluetooth equipment |
CN107249168A (en) * | 2017-05-18 | 2017-10-13 | 宇龙计算机通信科技(深圳)有限公司 | A kind of data directional transmissions and method of reseptance and device |
CN109525972B (en) * | 2018-11-06 | 2022-11-11 | 深圳市乐创联科技有限公司 | Method, terminal and system for controlling other terminals through Bluetooth information |
CN109740340A (en) * | 2018-12-28 | 2019-05-10 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN111641505B (en) * | 2020-04-20 | 2023-04-25 | 广东乐心医疗电子股份有限公司 | Information processing method, information processing device, electronic equipment and readable storage medium |
CN112469019B (en) * | 2020-11-27 | 2023-02-24 | 苏州维伟思医疗科技有限公司 | Method and device for safely modifying treatment parameters of WCD (WCD) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101022337A (en) * | 2007-03-28 | 2007-08-22 | 胡祥义 | Network identification card realizing method |
CN103632416A (en) * | 2012-08-27 | 2014-03-12 | 青岛联合创新技术服务平台有限公司 | Voice recognition remote-control access and working method thereof |
CN103984904A (en) * | 2014-05-27 | 2014-08-13 | 深圳市欧珀通信软件有限公司 | Method and device for preventing screen locking code of mobile terminal from being cracked |
-
2015
- 2015-06-05 CN CN201510305420.5A patent/CN105187369B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101022337A (en) * | 2007-03-28 | 2007-08-22 | 胡祥义 | Network identification card realizing method |
CN103632416A (en) * | 2012-08-27 | 2014-03-12 | 青岛联合创新技术服务平台有限公司 | Voice recognition remote-control access and working method thereof |
CN103984904A (en) * | 2014-05-27 | 2014-08-13 | 深圳市欧珀通信软件有限公司 | Method and device for preventing screen locking code of mobile terminal from being cracked |
Also Published As
Publication number | Publication date |
---|---|
CN105187369A (en) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105187369B (en) | A kind of data access method and device | |
JP6262278B2 (en) | Method and apparatus for storage and computation of access control client | |
US11258792B2 (en) | Method, device, system for authenticating an accessing terminal by server, server and computer readable storage medium | |
TWI475899B (en) | Apparatus and methods for storing electronic access clients | |
US9094823B2 (en) | Data processing for securing local resources in a mobile device | |
WO2016107319A1 (en) | Method for loading secure key storage hardware, and browser client device | |
CN108064440A (en) | FIDO authentication method, device and system based on block chain | |
CN108462710B (en) | Authentication and authorization method, device, authentication server and machine-readable storage medium | |
CN110380852A (en) | Mutual authentication method and communication system | |
CN103166931A (en) | Method, device and system of transmitting data safely | |
CN113014539B (en) | Internet of things equipment safety protection system and method | |
CN104618108A (en) | Safety communication system | |
CN107743067A (en) | Awarding method, system, terminal and the storage medium of digital certificate | |
CN105872848B (en) | A kind of credible mutual authentication method suitable for asymmetric resource environment | |
CN111245607B (en) | Networking method and system, network distribution equipment, client and server | |
CN107948186A (en) | A kind of safety certifying method and device | |
CN110213247A (en) | A kind of method and system improving pushed information safety | |
CN109690543A (en) | Safety certifying method, integrated circuit and system | |
CN109714769A (en) | Information binding method, device, equipment and storage medium | |
CN109218334A (en) | Data processing method, device, access control equipment, certificate server and system | |
CN105430649B (en) | WIFI cut-in method and equipment | |
CN110166471A (en) | A kind of portal authentication method and device | |
CN107896221B (en) | A kind of account binding method and device | |
CN109361681A (en) | The close certificate authentication method of state, device and equipment | |
CN112733129A (en) | Trusted access method for out-of-band management of server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No. Applicant after: Xinhua three Technology Co., Ltd. Address before: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No. Applicant before: Huasan Communication Technology Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |