CN105187369B - A kind of data access method and device - Google Patents

A kind of data access method and device Download PDF

Info

Publication number
CN105187369B
CN105187369B CN201510305420.5A CN201510305420A CN105187369B CN 105187369 B CN105187369 B CN 105187369B CN 201510305420 A CN201510305420 A CN 201510305420A CN 105187369 B CN105187369 B CN 105187369B
Authority
CN
China
Prior art keywords
bluetooth equipment
password
information
verification information
bluetooth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510305420.5A
Other languages
Chinese (zh)
Other versions
CN105187369A (en
Inventor
徐国祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN201510305420.5A priority Critical patent/CN105187369B/en
Publication of CN105187369A publication Critical patent/CN105187369A/en
Application granted granted Critical
Publication of CN105187369B publication Critical patent/CN105187369B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals

Abstract

The application provides a kind of data access method and device, when the first bluetooth equipment is as server, when second bluetooth equipment is as client, it includes: to receive the first verification information that the second bluetooth equipment is written in the password authentification feature field when needing the data of Certificate Authority on accessing the first bluetooth equipment to the first bluetooth equipment after connecting in plain text with the foundation of the second bluetooth equipment that this method, which is applied in the first bluetooth equipment,;According to the first password of second bluetooth equipment of local current record, the first information is obtained;Whether consistent with the first verification information the first information is judged, if unanimously, notifying second the first verification information of bluetooth equipment to be proved to be successful, allowing to access the data.Two bluetooth equipment both sides increase a secure authentication mechanisms without establishing encrypted link on the basis of plaintext connection type in the present embodiment, that is, can reach the good compatibility of bluetooth equipment and access the higher effect of safety of data.

Description

A kind of data access method and device
Technical field
The present invention relates to field of communication technology more particularly to a kind of data access methods and device.
Background technique
Bluetooth equipment is just widely used in short distance, low data bulk application with features such as its low-power consumption, low costs. In two the mutually bluetooth equipment of access data, it is accessed side and is known as server, access side is known as client, client and clothes It is engaged between device through connection interaction data, then, it is general logical in order to guarantee that the access of data can obtain correct Certificate Authority Password is crossed to access, in the correct situation of password, Certificate Authority is accessed, and the link of both sides is encrypted.
But since bluetooth standard is a kind of loose agreement, be usually directed in encrypted link establishment process it is more multifactor, Cause both sides to negotiate to encounter difficulties, or even link cannot be established in the unmatched situation of both sides, is brought to compatibility very big Problem.Therefore, in current application, most bluetooth equipments are generallyd use and are connected in plain text to guarantee maximum compatibility Mode mutually accesses, but this access mode will lead to access data safety it is lower.
Summary of the invention
In view of this, the present invention provides a kind of data access method and device, to solve phase between existing bluetooth equipment The problem for mutually causing the safety for accessing data lower in such a way that plaintext connects when access data.
Specifically, the application is achieved by the following technical solution:
According to the first aspect of the invention, a kind of data access method is provided, the method is applied to include the first bluetooth In equipment and the system of the second bluetooth equipment, when first bluetooth equipment is as server, the second bluetooth equipment conduct When client, the method is applied on first bluetooth equipment, which comprises
It is established with second bluetooth equipment after connecting in plain text, receives second bluetooth equipment and accessing first indigo plant Need to be written when the data of Certificate Authority into the password authentification feature field of first bluetooth equipment in tooth equipment first Verification information;
According to the first password of second bluetooth equipment of local current record, the first information is obtained;
Whether consistent with first verification information first information is judged, if unanimously, notifying second bluetooth First verification information described in equipment is proved to be successful, and allows to access the data.
According to the second aspect of the invention, a kind of data access method is provided, the method is applied to include the first bluetooth In equipment and the system of the second bluetooth equipment, when first bluetooth equipment is as server, the second bluetooth equipment conduct When client, the method is applied on second bluetooth equipment, which comprises
It is established with first bluetooth equipment after connecting in plain text, needs Certificate Authority on accessing first bluetooth equipment Data when, the first verification information is written in the password authentification feature field of the first bluetooth equipment of Xiang Suoshu, so that described first Bluetooth equipment judges institute after obtaining the first information in the first password of second bluetooth equipment according to local current record Whether consistent with first verification information state the first information;
First verification information that first bluetooth equipment is sent is received to be proved to be successful and allow to access the data The first notice, start to access the data, first notice is that first bluetooth equipment is judging first letter The notice sent when ceasing consistent with first verification information.
According to the third aspect of the invention we, a kind of data access device is provided, described device is applied to include the first bluetooth In equipment and the system of the second bluetooth equipment, when first bluetooth equipment is as server, the second bluetooth equipment conduct When client, described device is applied on first bluetooth equipment, and described device includes:
Receiving unit receives second bluetooth equipment and exists after connecting in plain text with second bluetooth equipment foundation It accesses when needing the data of Certificate Authority on first bluetooth equipment to the password authentification tagged word of first bluetooth equipment The first verification information being written in section;
Obtaining unit obtains the first letter for the first password according to second bluetooth equipment of local current record Breath;
Notification unit, for judging whether the first information is consistent with first verification information, if unanimously, notifying First verification information described in second bluetooth equipment is proved to be successful, and allows to access the data.
According to the fourth aspect of the invention, a kind of data access device is provided, described device is applied to include the first bluetooth In equipment and the system of the second bluetooth equipment, when first bluetooth equipment is as server, the second bluetooth equipment conduct When client, described device is applied on second bluetooth equipment, and described device includes:
Writing unit is accessing first bluetooth equipment after connecting in plain text with first bluetooth equipment foundation On when needing the data of Certificate Authority, the first verifying of write-in letter in the password authentification feature field of the first bluetooth equipment of Xiang Suoshu Breath, so that first bluetooth equipment in the first password according to second bluetooth equipment of local current record, obtains the After one information, judge whether the first information is consistent with first verification information;
Receiving unit, first verification information for receiving the first bluetooth equipment transmission are proved to be successful and allow The first notice for accessing the data starts to access the data, and first notice is that first bluetooth equipment is judging The notice sent when the first information is consistent with first verification information out.
The beneficial effects of the present invention are:
For first bluetooth equipment with the second bluetooth equipment after establishing plaintext and connecting, the second bluetooth equipment is accessing the first bluetooth It, can be by being written in the password authentification feature field that is provided to the first bluetooth equipment when needing the data of Certificate Authority in equipment First verification information, so that the first bluetooth equipment obtains the first verification information.Later, the first bluetooth equipment can be according to its local The first password of second bluetooth equipment of current record obtains the first information, and judges whether the first information is verified with first Information is consistent, if unanimously, first verification information of the second bluetooth equipment is notified to be proved to be successful, access is allowed to need Certificate Authority Data.It can be seen that two bluetooth equipments in the present embodiment, in mutually access data, both sides are primarily based on to be connected in plain text Mode accesses, then, when access side accesses the data for needing accessed square Certificate Authority access, by accessed side to visit After the side of asking executes associated verification operation, then decide whether that access side is allowed to access.Aforementioned this access mode, both sides are without establishing Encrypted link increases a secure authentication mechanisms on the basis of plaintext connection type, that is, can reach the compatibility of bluetooth equipment The higher effect of safety that is good and accessing data.
Detailed description of the invention
Fig. 1 is the application scenarios schematic diagram that data access is realized using the embodiment of the present invention;
Fig. 2 is one embodiment flow chart of data access method of the present invention;
Fig. 3 is another embodiment flow chart of data access method of the present invention;
Fig. 4 is a kind of hardware structure diagram of equipment where data access device of the present invention;
Fig. 5 is one embodiment block diagram of data access device of the present invention;
Fig. 6 is one embodiment block diagram of data access device of the present invention.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the application.
It is only to be not intended to be limiting the application merely for for the purpose of describing particular embodiments in term used in this application. It is also intended in the application and the "an" of singular used in the attached claims, " described " and "the" including majority Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where the application range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
Referring to Fig. 1, the application scenarios schematic diagram of data access is realized for the application embodiment of the present invention.As shown in Figure 1, first Bluetooth equipment and the second bluetooth equipment can be mobile phone, computer and ipad etc. with Bluetooth function, and the second bluetooth equipment can With based on the data on the first bluetooth equipment of Bluetooth Low Energy protocol access, i.e., first bluetooth equipment is as server, this Two bluetooth equipments are as client.
In an embodiment of the present invention, for the first bluetooth equipment with the second bluetooth equipment after establishing plaintext and connecting, second is blue Tooth equipment, can be close by providing to the first bluetooth equipment when needing the data of Certificate Authority on accessing the first bluetooth equipment The first verification information is written in code verifying feature field, so that the first bluetooth equipment obtains the first verification information.Later, first is blue Tooth equipment can obtain the first information according to the first password of the second bluetooth equipment of its local current record, and judge this Whether one information is consistent with the first verification information, if unanimously, first verification information of the second bluetooth equipment is notified to be proved to be successful, Allow to access the data for needing Certificate Authority.That is, two bluetooth equipments in the present embodiment are in mutually access data, both sides are first First accessed based on plaintext connection type, then, when access side accesses the data for needing accessed square Certificate Authority access, After operating access side's execution associated verification by accessed side, then decide whether that access side is allowed to access.Aforementioned this access side Formula, both sides increase a secure authentication mechanisms on the basis of plaintext connection type, that is, can reach indigo plant without establishing encrypted link The good compatibility of tooth equipment and the higher effect of safety for accessing data.
It referring to fig. 2, is one embodiment flow chart of data access method of the present invention, this method can be applied to include the In the system of one bluetooth equipment and the second bluetooth equipment, when first bluetooth equipment is as server, which makees When for client, which is described from the first bluetooth equipment side, may comprise steps of:
Step 201 after connecting in plain text with the foundation of the second bluetooth equipment, receives the second bluetooth equipment and sets in the first bluetooth of access The first verification information for needing to be written when the data of Certificate Authority into the password authentification feature field of the first bluetooth equipment on standby.
In the present embodiment, since two bluetooth equipments of Bluetooth Low Energy protocol communication are typically based on GATT (Generic Attribute Profile, general-purpose attribute configuration) realize data interaction, the basic structure in the GATT for storing data is Feature, each feature include operational attribute, data and UUID (Universally Unique Identifier, it is general unique Identification code) etc. fields, and the operational attribute in feature determine user to data in this feature can be performed operation, it is such as right Data in this feature are readable, writeable, read-write and can not read and write.Thus, when the first bluetooth equipment is as server, When two bluetooth equipments are as client, for may be coupled to the second bluetooth equipment of each of first bluetooth equipment, first is blue Tooth equipment and second bluetooth equipment can be consulted before Certificate Authority in advance, and second bluetooth equipment is to the first bluetooth equipment The operational attribute of upper each feature, and after Certificate Authority, second bluetooth equipment is to each feature on the first bluetooth equipment Operational attribute.
When the second bluetooth equipment needs to access the data on the first bluetooth equipment, the second bluetooth equipment can be first with One bluetooth equipment is established to be connected in plain text, then sends request of data message to the first bluetooth equipment, can in the request of data message It is set with the address information (MAC Address etc.), the address information of the first bluetooth equipment, the second bluetooth that include the second bluetooth equipment The behaviour that the data in feature that the UUID and the second bluetooth equipment of the standby feature requested access to request access to it will execute Make etc..First bluetooth equipment, can be first according to the second bluetooth in request of data message after receiving the request of data message The UUID for the feature that the address information of equipment and the second bluetooth equipment request access to, determining before Certificate Authority, second indigo plant Operational attribute of the feature of tooth device request access on the first bluetooth equipment judges the second indigo plant then according to the operational attribute Whether the operation that the data in feature that tooth equipment requests access to it will execute is legal, if legal, then it represents that the second bluetooth The data of device request access, which do not need Certificate Authority, may have access to, if it is illegal, then it represents that the second bluetooth equipment requests access to Data need Certificate Authority after just may have access to, at this time the first bluetooth equipment can to the second bluetooth equipment returned data request lose Lose message.
In the present embodiment, it is only that writeable password is tested that the first bluetooth equipment, which can provide operational attribute to the second bluetooth equipment, Characteristics of syndrome field.After needing Certificate Authority on the second bluetooth equipment the first bluetooth equipment of access when just addressable data, the The first verification information is written in the password authentification feature field that two bluetooth equipments can be provided to the first bluetooth equipment.In order to guarantee The safety of first verification information transmission, first verification information can be calculated for the second bluetooth equipment according to preset first encryption Method, using user input first verifying password to the first bluetooth equipment and the second bluetooth equipment both sides negotiation certificate parameter into After row encryption, the information of generation.Wherein, which can be built in the first bluetooth equipment and the second bluetooth to be prior Algorithm in equipment.
However, since Encryption Algorithm can be divided into irreversible cryptographic algorithm and irreversible encryption algorithm, and reversible encryption is calculated Method usually has two reversible processes of encryption and decryption, if according to irreversible cryptographic algorithm, using the first verifying of user's input The certificate parameter that password negotiates the first bluetooth equipment with the second bluetooth equipment both sides is encrypted, then first generated is tested Information is demonstrate,proved during password authentification feature field is written, once being trapped, is just easy to parse the first verifying password, from And password is caused to be revealed.Thus, in order to further increase the safety of the first verification information write-in, which can be with For irreversible encryption algorithm, such as MD5 (Message Digest Algorithm 5, Message Digest Algorithm 5) algorithm or SHA1 (Secure Hash Algorithm, Secure Hash Algorithm) algorithm etc..
In addition, the certificate parameter can be using challenge word string.Verifying password is attacked in order to prevent, and challenging can be in word string Character including variation.For example, challenge word string can be " first the+the second bluetooth equipment of bluetooth equipment MAC Address MAC Address+company Connect the first bluetooth equipment time when channel number when establishing+this connection AccessCode+ connection is established ", wherein challenging Latter two character " the Access Code of this connection " and " the first bluetooth equipment time when connection is established " are second in word string Bluetooth equipment is all different when establishing data connection every time with the first bluetooth equipment.Due in the second bluetooth equipment and the first bluetooth Equipment is established the challenge word string used when data connection every time and is all different, therefore may further ensure that verifying password transmission Safety.
Step 202, the first password according to second bluetooth equipment of local current record, obtain the first information.
In the present embodiment, when second bluetooth equipment be written into the password authentification feature field of the first bluetooth equipment When one verification information is the first verifying password that user inputs to the second bluetooth equipment, accordingly, which is first blue First password of the tooth equipment in the second bluetooth equipment of local current record.When second bluetooth equipment is to the first bluetooth equipment The first verification information being written in password authentification feature field is that the second bluetooth equipment uses first Encryption Algorithm, using user After first verifying password of input encrypts the certificate parameter, when the information of generation, accordingly, which is first For bluetooth equipment according to first Encryption Algorithm, the first password using the second bluetooth equipment of local current record joins the verifying After number is encrypted, the information of generation.
Whether step 203, to judge the first information consistent with the first verification information, if unanimously, notifying the second bluetooth equipment First verification information is proved to be successful, and allows to access the data.
In the present embodiment, the first bluetooth equipment is in addition to that can provide password authentification feature field to each second bluetooth equipment Outside, password can also being provided to each second bluetooth equipment and modifying feature field, which modifies the first of the operational attribute of feature Initial value is not writeable.After the first bluetooth equipment judges that the first information is consistent with the first verification information, the first bluetooth equipment is not It can only notify second the first verification information of bluetooth equipment to be proved to be successful, allow to access the data, but also can be by the first indigo plant The operational attribute for the password modification feature field that tooth equipment is provided to second bluetooth equipment is revised as writeable.At this point, second is blue Tooth equipment can modify feature field based on the password, the first verifying password (i.e. first used when accessing the data it Password) it modifies.
Specifically, the first bluetooth equipment is when judging that the first information is consistent with the first verification information, can determine this One verifying password is identical as first password, and hereafter, the second bluetooth equipment can be first to the first indigo plant when modifying the first password Password modification information is written in the password modification feature field that tooth equipment provides, which can set for the second bluetooth Standby the second Encryption Algorithm negotiated according to the first bluetooth equipment and the second bluetooth equipment both sides, (i.e. using the first verifying password First password before modification) to user input new password be encrypted after, the information of generation.First bluetooth equipment is connecing After receiving password modification information, can according to decipherment algorithm corresponding with second Encryption Algorithm, to the password modification information into Row decryption, if successful decryption, obtains the new password, notifies second bluetooth equipment to be properly received the new password, and incite somebody to action this Second password of the second bluetooth equipment of ground current record replaces with the new password.The present embodiment by user is inputted it is new Password is written before password modification feature field, according to the second Encryption Algorithm, is inputted using the first password before modification to user New password be encrypted, can be improved new password transmission safety.It is to be noted that due to the first bluetooth equipment It needs that the password modification information is decrypted after receiving password modification information, thus second Encryption Algorithm can be for can Reverse encryption algorithm.
When the second bluetooth equipment, which receives the first bluetooth equipment, has been properly received the notice of the new password, can press first According to first Encryption Algorithm, the certificate parameter is encrypted using the new password that user inputs, generates the second verification information, so Second verification information is written in the password authentification feature field that the first bluetooth equipment provides afterwards.First bluetooth equipment is receiving To after second verification information, it can judge that the first information and second verification information are inconsistent first, this is second close When code is not initial value, according to first Encryption Algorithm, the certificate parameter is encrypted using second password, is obtained Second information;Then when judging that second information is consistent with second verification information, which is replaced with second Password, and initial value is set by the second password, notify the second bluetooth equipment first password successfully modified.
In addition, the second bluetooth equipment is set to the first bluetooth in the first bluetooth equipment and the second bluetooth equipment interactive process Its notice for being properly received the new password that the new password and the first bluetooth equipment that preparation is sent are returned to the second bluetooth equipment is all The case where being likely to occur packet loss.It, certainly will not be to the second bluetooth equipment when the first bluetooth equipment is not successfully received new password Its notice for being properly received the new password is returned, therefore is successfully connect when the second bluetooth equipment does not receive the first bluetooth equipment When receiving the notice of new password, the second bluetooth equipment can determine first password modification failure.
When first password modifies failure, if the second bluetooth equipment accesses after needing Certificate Authority on the first bluetooth equipment Just addressable data, then the second bluetooth equipment can be write into the password authentification feature field of the first bluetooth equipment offer first Enter first verification information, later, the first bluetooth equipment can be when judging that the first information is consistent with the first verification information, will Second password is set as initial value, and the second bluetooth equipment first verification information is notified to be proved to be successful, and allows to access the number According to;Judging that the first information and the first verification information are inconsistent, and second password be initial value when, notify the second bluetooth Equipment the first verification information authentication failed, does not allow to access the data;Judging the first information and the first verification information Inconsistent, which is not initial value, and second information and the first verification information it is inconsistent when, notify the second bluetooth to set The standby first verification information authentication failed, does not allow to access the data;And judging the first information and the first verification information Inconsistent, the second password is not initial value, and when the second information is consistent with the first verification information, notifies the second bluetooth equipment first Verification information is proved to be successful, and allows to access the data.
After the first verification information is proved to be successful, the first bluetooth equipment can be according to scheduled rules modification second bluetooth Equipment on the first bluetooth equipment after Certificate Authority the just operational attribute of addressable feature.It verifies and loses when the first verification information After losing, the second bluetooth equipment can continue the first verifying of write-in letter into the password authentification feature field that the first bluetooth equipment provides Breath, hereafter, the first bluetooth equipment can in the above way verify first verification information, and to the number of verifying into Row statistics.When verifying number more than given threshold, the first bluetooth equipment can actively disconnect the company with second bluetooth equipment It connects, and second bluetooth equipment is included in dynamic blacklist, it is possible thereby to further increase the safety of data access.
The present embodiment is failed by modifying in first password, and the second bluetooth equipment accesses to be needed to authenticate on the first bluetooth equipment After authorization when the addressable data of, the first bluetooth equipment is using the first information and the second information successively to first verification information It is verified, when the first verification information is consistent with any one information in the first information and the second information, that is, when user inputs First verifying password and the first bluetooth equipment any one password in the first password and the second password of local current record When identical, so that it may determine that first verification information is proved to be successful, it is possible thereby to avoid user to be proved to be successful, input is modified Preceding first password and modified first password the two passwords are verified, so as to improve verification efficiency.In addition, this Embodiment is by judging that the first information and the first verification information are inconsistent in the first bluetooth equipment, and the second password is initial When value, determine the first verification information authentication failed, can to avoid execute judge the second information whether with the first verification information Step, it is possible thereby to further increase the efficiency of verifying.
In addition, the present embodiment is by when the first bluetooth equipment judges that the first information is consistent with the first verification information, Initial value is set by second password, it is ensured that when verifying next time, the first bluetooth equipment is only needed using the first information First verification information is verified, so as to further increase the efficiency of verifying.Similarly, the present embodiment passes through One bluetooth equipment judges that the first information and the first verification information are inconsistent, and the second password is not the initial value, and second believes When ceasing consistent with the first verification information, after the second password is substituted for first password, initial value is set by second password, Can guaranteeing, the first bluetooth equipment only needs the first verification information to be verified using the first information when verifying next time, from And it can be further improved the efficiency of verifying.
It is another embodiment flow chart of data access method of the present invention referring to Fig. 3, this method is applied to include first In the system of bluetooth equipment and the second bluetooth equipment, when the first bluetooth equipment is as server, the second bluetooth equipment is as client When end, which is described from the second bluetooth equipment side, may comprise steps of:
Step 301 after connecting in plain text with the foundation of the first bluetooth equipment, needs Certificate Authority on accessing the first bluetooth equipment Data when, the first verification information is written into the password authentification feature field of the first bluetooth equipment, so that the first bluetooth equipment Judge that the first information is after obtaining the first information in the first password of second bluetooth equipment according to local current record It is no consistent with the first verification information.
In the present embodiment, which can be the first bluetooth equipment according to preset first Encryption Algorithm, using this The verifying that the first password of second bluetooth equipment of ground current record negotiates the first bluetooth equipment and the second bluetooth equipment both sides After parameter is encrypted, the information of generation;First verification information can be the second bluetooth equipment according to the first Encryption Algorithm, adopt After being encrypted with the first verifying password that user inputs to certificate parameter, the information of generation.
Step 302, the first verification information for receiving the transmission of the first bluetooth equipment are proved to be successful and allow to access the data The first notice, start to access the data, the first notice is that the first bluetooth equipment is judging the first information and the first verifying letter The notice sent when ceasing consistent.
In the present embodiment, the second bluetooth equipment receive this first notice after, can determine this first verifying password with The first password is identical.It, can be first, in accordance with the first bluetooth equipment and when the second bluetooth equipment needs to modify first password The second Encryption Algorithm that two bluetooth equipment both sides negotiate carries out at encryption the new password that user inputs using the first verifying password Reason generates password modification information;Then the password modification information is written into the password of the first bluetooth equipment modification feature field. First bluetooth equipment can be calculated after receiving the password modification information first, in accordance with decryption corresponding with the second Encryption Algorithm Method, is decrypted password modification information, obtains the new password after successful decryption, and by described the second of local current record Second password of bluetooth equipment replaces with the new password;Then it is sent to the second bluetooth equipment be properly received the new password Second notice.
Second bluetooth equipment, can be first, in accordance with first Encryption Algorithm, using user after receiving second notice The new password of input encrypts the certificate parameter, generates the second verification information;Then to the password authentification tagged word Second verification information is written in section.First bluetooth equipment can judge first after receiving second verification information Information and the second verification information are inconsistent, and when the second password is not initial value, according to the first Encryption Algorithm, using the second password Certificate parameter is encrypted, obtains the second information, and when judging that the second information is consistent with the second verification information, First password is replaced with into the second password, and sets initial value for the second password.Later, the first bluetooth equipment can be to second Bluetooth equipment sends the successfully modified third notice of the first password.In addition, the second bluetooth equipment is not receive this second logical When knowing, first password modification failure can be determined.
Second bluetooth equipment accesses in the case where first password is modified and fails and needs Certificate Authority on the first bluetooth equipment Data when, the first verification information be written in the password authentification feature field that can provide first to the first bluetooth equipment, this One verification information can be the second bluetooth equipment according to the first Encryption Algorithm, using the first verifying password of user's input to verifying After parameter is encrypted, the information of generation.First bluetooth equipment can judge first after receiving the first verification information Information and the first verification information are inconsistent, and the second password be initial value when;Alternatively, judging the first information and the first verifying Information is inconsistent, and the second password is not initial value, and when the second information and the first verification information are inconsistent, to the second bluetooth equipment It sends the first verification information authentication failed and does not allow to access the 4th notice of the data.In addition, the first bluetooth equipment can be with When judging that the first information is consistent with the first verification information, after setting initial value for the second password, to the second bluetooth equipment Send the first verification information be proved to be successful and allow to access the data the 5th notice, alternatively, judge the first information with First verification information is inconsistent, and the second password is not initial value, and when the second information is consistent with the first verification information, to the second indigo plant Tooth equipment sends the 5th notice that the first verification information is proved to be successful and allows to access the data.
Embodiment illustrated in fig. 3 is consistent with the description of aforementioned embodiment illustrated in fig. 2, and difference is only that executing subject difference, Details are not described herein.
Corresponding with the embodiment of aforementioned data access method, present invention also provides the embodiments of data access device.
The embodiment of data access device of the present invention can be applied on the first bluetooth equipment and the second bluetooth equipment.Device Embodiment can also be realized by software realization by way of hardware or software and hardware combining.Taking software implementation as an example, It is by the processor of equipment where it by calculating corresponding in nonvolatile memory as the device on a logical meaning Machine program instruction is read into memory what operation was formed.For hardware view, as shown in figure 4, being filled for the application data access A kind of hardware structure diagram of equipment where setting, in addition to processor shown in Fig. 4, memory, network interface and non-volatile memories Except device, the equipment in embodiment where device can also include other hardware, to this generally according to the actual functional capability of the equipment It repeats no more.
It is one embodiment flow chart of data access device of the present invention referring to Fig. 5, described device is applied to include first In the system of bluetooth equipment and the second bluetooth equipment, when first bluetooth equipment is as server, second bluetooth equipment When as client, described device is applied on first bluetooth equipment, and described device includes:
Receiving unit 510, for connecing after first bluetooth equipment is connect in plain text with second bluetooth equipment foundation Second bluetooth equipment is received when needing the data of Certificate Authority on accessing first bluetooth equipment to first bluetooth The first verification information being written in the password authentification feature field of equipment;
Obtaining unit 520, for according to the first of second bluetooth equipment of the first bluetooth equipment current record Password obtains the first information;
Notification unit 530, it is whether consistent with first verification information for judging the first information, if unanimously, It notifies the first verification information described in second bluetooth equipment to be proved to be successful, allows to access the data.
In an optional implementation,
The first information is first bluetooth equipment according to preset first Encryption Algorithm, using local current record The first password of second bluetooth equipment first bluetooth equipment and the second bluetooth equipment both sides' negotiation are tested After card parameter is encrypted, the information of generation;
First verification information is second bluetooth equipment according to first Encryption Algorithm, using user's input After first verifying password encrypts the certificate parameter, the information of generation.
In another optional implementation, described device further include:
Determination unit 540, if consistent with first verification information for the first information, it is determined that described first tests It is identical as the first password to demonstrate,prove password;
The receiving unit 510 is also used to receive second bluetooth equipment Xiang Suoshu when modifying the first password The password modification information being written in the password modification feature field of first bluetooth equipment, the password modification information is described second The second Encryption Algorithm that bluetooth equipment is negotiated according to first bluetooth equipment and the second bluetooth equipment both sides, using described After the new password that first verifying password inputs user is encrypted, the information of generation;
Decryption unit 550, for modifying the password and believing according to decipherment algorithm corresponding with second Encryption Algorithm Breath is decrypted;
The notification unit 530 obtains the new password if being also used to successful decryption, and second bluetooth is notified to set It is standby to be properly received the new password and close by the second of second bluetooth equipment of the first bluetooth equipment current record Code replaces with the new password;
The receiving unit 510 is also used to receive second bluetooth equipment and writes into the password authentification feature field The second verification information entered, second verification information are that second bluetooth equipment is receiving first bluetooth equipment When being properly received the notice of the new password, according to first Encryption Algorithm, using the new password of user's input to institute It states after certificate parameter encrypted, the information of generation;
The obtaining unit 520 is also used to judging that the first information and second verification information are inconsistent, institute When to state the second password not be initial value, according to first Encryption Algorithm, using second password to the certificate parameter into Row encryption obtains the second information;
The notification unit 530 is also used to when judging that second information is consistent with second verification information, will The first password replaces with second password, and sets the initial value for second password, notifies described second First password described in bluetooth equipment is successfully modified.
In another optional implementation,
The notification unit 530 is also used to when judging that the first information is consistent with first verification information, will Second password is set as the initial value, and the first verification information described in second bluetooth equipment is notified to be proved to be successful, Allow to access the data;
Judging that the first information and first verification information are inconsistent, and second password is described initial When value, notifies the first verification information authentication failed described in second bluetooth equipment, do not allow to access the data;
Judge that the first information and first verification information are inconsistent, second password is not described initial Value, and when second information and first verification information are inconsistent, notify described in second bluetooth equipment the first verifying Information Authentication failure, does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not described initial Value, and when second information is consistent with first verification information, notify the first verifying described in second bluetooth equipment to believe Breath is proved to be successful, and allows to access the data.
It is another embodiment flow chart of data access device of the present invention referring to Fig. 6, described device is applied to including the In the system of one bluetooth equipment and the second bluetooth equipment, when first bluetooth equipment is as server, second bluetooth is set When for as client, described device is applied on second bluetooth equipment, and described device includes:
Writing unit 610 is used for after second bluetooth equipment is connect in plain text with first bluetooth equipment foundation, It accesses when needing the data of Certificate Authority on first bluetooth equipment, the password authentification tagged word of the first bluetooth equipment of Xiang Suoshu The first verification information is written in section, so that first bluetooth equipment is in second bluetooth equipment according to local current record First password, obtain the first information after, judge whether the first information consistent with first verification information;
Receiving unit 620, for receive first verification information that first bluetooth equipment is sent be proved to be successful and The first notice for allowing to access the data starts to access the data, and first notice is that first bluetooth equipment exists Judge the notice sent when the first information is consistent with first verification information.
In an optional implementation,
The first information is first bluetooth equipment according to preset first Encryption Algorithm, using local current record The first password of second bluetooth equipment first bluetooth equipment and the second bluetooth equipment both sides' negotiation are tested After card parameter is encrypted, the information of generation;
First verification information is second bluetooth equipment according to first Encryption Algorithm, using user's input After first verifying password encrypts the certificate parameter, the information of generation.
In another optional implementation, described device further include:
Determination unit 630, for determining the first verifying password and described first after receiving first notice Password is identical;
Generation unit 640 is used for when modifying the first password, according to first bluetooth equipment and second indigo plant The second Encryption Algorithm that tooth equipment both sides negotiate carries out at encryption the new password that user inputs using the first verifying password Reason generates password modification information;
Said write unit 610 is also used to modify in feature field described in write-in to the password of first bluetooth equipment Password modification information, so that first bluetooth equipment is according to decipherment algorithm corresponding with second Encryption Algorithm, to described Password modification information is decrypted, and the new password is obtained after successful decryption, and blue by described the second of local current record Second password of tooth equipment replaces with the new password;
The generation unit 640, first bluetooth equipment ought be received by, which being also used to, has been properly received the new password When the second notice, according to first Encryption Algorithm, the certificate parameter is added using the new password that user inputs It is close, generate the second verification information;
Said write unit 610 is also used to that second verification information is written into the password authentification feature field, with First bluetooth equipment is set to judge that the first information and second verification information are inconsistent, and second password When not being initial value, according to first Encryption Algorithm, the certificate parameter is encrypted using second password, The second information is obtained, and when judging that second information is consistent with second verification information, by the first password Second password is replaced with, and sets the initial value for second password;
The receiving unit 620, be also used to receive first bluetooth equipment the first password is replaced with it is described Second password and the successfully modified third of the first password sent after the initial value is set by second password lead to Know;
The determination unit 630 is also used to not receive first bluetooth equipment and has been properly received the new password The second notice when, determine first password modification failure.
In another optional implementation,
The receiving unit 620 is also used to receive the first verification information authentication failed that first bluetooth equipment is sent And not allowing to access the 4th notice of the data, the 4th notice is that first bluetooth equipment is judging described first Information and first verification information are inconsistent, and the notice that issues when second password is the initial value;Alternatively, for institute It states the first bluetooth equipment and is judging that the first information and first verification information are inconsistent, second password is not institute State initial value, and the notice that second information issues when inconsistent with first verification information;Alternatively,
The receiving unit 620 is also used to receive the first verification information that first bluetooth equipment is sent and is proved to be successful And allowing to access the 5th notice of the data, the 5th notice is that first bluetooth equipment is judging first letter When ceasing consistent with first verification information, the notice sent after the initial value is set by second password, alternatively, being First bluetooth equipment is judging that the first information and first verification information are inconsistent, and second password is not The initial value, and the notice that when second information is consistent with first verification information sends.
The function of each unit and the realization process of effect are specifically detailed in the above method and correspond to step in above-mentioned apparatus Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize application scheme.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
As seen from the above-described embodiment, the first bluetooth equipment and the second bluetooth equipment are after establishing and connecting in plain text, the second bluetooth Equipment, can be by the password that provides to the first bluetooth equipment when needing the data of Certificate Authority on accessing the first bluetooth equipment The first verification information is written in verifying feature field, so that the first bluetooth equipment obtains the first verification information.Later, the first bluetooth Equipment can obtain the first information according to the first password of the second bluetooth equipment of its local current record, and judge this first Whether information is consistent with the first verification information, if unanimously, first verification information of the second bluetooth equipment is notified to be proved to be successful, permits Perhaps access needs the data of Certificate Authority.That is, two bluetooth equipments in the present embodiment are in mutually access data, both sides are first It is accessed based on plaintext connection type, then, when access side accesses the data for needing accessed square Certificate Authority access, by After accessed side executes associated verification operation to access side, then decide whether that access side is allowed to access.Aforementioned this access mode, Both sides increase a secure authentication mechanisms on the basis of plaintext connection type, that is, can reach bluetooth without establishing encrypted link The good compatibility of equipment and the higher effect of safety for accessing data.
The foregoing is merely the preferred embodiments of the application, not to limit the application, all essences in the application Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the application protection.

Claims (12)

1. a kind of data access method, which is characterized in that the method is applied to set including the first bluetooth equipment and the second bluetooth In standby system, when first bluetooth equipment is as server, when second bluetooth equipment is as client, the method It applies on first bluetooth equipment, which comprises
It is established with second bluetooth equipment after connecting in plain text, receives second bluetooth equipment and set in access first bluetooth First be written when the data of Certificate Authority into the password authentification feature field of first bluetooth equipment is needed to verify on standby Information, first verification information is second bluetooth equipment according to preset first Encryption Algorithm, using user's input First verifying password, the certificate parameter negotiated to first bluetooth equipment with the second bluetooth equipment both sides encrypt Afterwards, the information of generation;
According to the first password of second bluetooth equipment of local current record, the first information is obtained, the first information is First bluetooth equipment is according to preset first Encryption Algorithm, using second bluetooth equipment of local current record First password, after being encrypted to the certificate parameter, the information of generation;
Whether consistent with first verification information first information is judged, if unanimously, notifying second bluetooth equipment First verification information is proved to be successful, and allows to access the data.
2. the method as described in claim 1, which is characterized in that the method also includes:
If the first information is consistent with first verification information, it is determined that the first verifying password and the first password It is identical;
It receives second bluetooth equipment and modifies feature to the password of first bluetooth equipment when modifying the first password The password modification information being written in field, the password modification information are that second bluetooth equipment is set according to first bluetooth Standby the second Encryption Algorithm negotiated with the second bluetooth equipment both sides inputs user using the first verifying password new After password is encrypted, the information of generation;
According to decipherment algorithm corresponding with second Encryption Algorithm, the password modification information is decrypted, if being decrypted into Function then obtains the new password, notifies that second bluetooth equipment has been properly received the new password, and by local current record The second password of second bluetooth equipment replace with the new password;
The second verification information that second bluetooth equipment is written into the password authentification feature field is received, described second tests Card information is second bluetooth equipment when receiving first bluetooth equipment and being properly received the notice of the new password, According to first Encryption Algorithm, after being encrypted using the new password that user inputs to the certificate parameter, generation Information;
Judging that the first information and second verification information are inconsistent, when second password is not initial value, is pressing According to first Encryption Algorithm, the certificate parameter is encrypted using second password, obtains the second information;
When judging that second information is consistent with second verification information, the first password is replaced with described second Password, and the initial value is set by second password, notify first password described in second bluetooth equipment to be modified as Function.
3. method according to claim 2, which is characterized in that the method also includes:
When judging that the first information is consistent with first verification information, set described initial for second password Value, and the first verification information described in second bluetooth equipment is notified to be proved to be successful, allow to access the data;
Judging that the first information and first verification information are inconsistent, and second password is the initial value When, it notifies the first verification information authentication failed described in second bluetooth equipment, does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not the initial value, And second information and first verification information it is inconsistent when, notify the first verification information described in second bluetooth equipment Authentication failed does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not the initial value, And second information it is consistent with first verification information when, notify the first verification information described in second bluetooth equipment to test It demonstrate,proves successfully, allows to access the data.
4. a kind of data access method, which is characterized in that the method is applied to set including the first bluetooth equipment and the second bluetooth In standby system, when first bluetooth equipment is as server, when second bluetooth equipment is as client, the method It applies on second bluetooth equipment, which comprises
It is established with first bluetooth equipment after connecting in plain text, the number of Certificate Authority is needed on accessing first bluetooth equipment According to when, the first verification information is written in the password authentification feature field of the first bluetooth equipment of Xiang Suoshu, so that first bluetooth Equipment is in the first password according to second bluetooth equipment of local current record, after obtaining the first information, judges described the Whether one information consistent with first verification information, wherein first verification information be second bluetooth equipment according to Preset first Encryption Algorithm, using the first verifying password of user's input, to first bluetooth equipment and second indigo plant After the certificate parameter that tooth equipment both sides negotiate encrypts, the information of generation;The first information is first bluetooth equipment According to preset first Encryption Algorithm, using the first password of second bluetooth equipment of local current record, to institute It states after certificate parameter encrypted, the information of generation;
Receive first verification information that first bluetooth equipment is sent is proved to be successful and allows to access the data the One notice, starts to access the data, first notice be first bluetooth equipment judge the first information with The notice that first verification information is sent when consistent.
5. method as claimed in claim 4, which is characterized in that the method also includes:
After receiving first notice, determine that the first verifying password is identical as the first password;
When modifying the first password, according to first bluetooth equipment and the second of the second bluetooth equipment both sides negotiation Encryption Algorithm is encrypted using the new password that the first verifying password inputs user, generates password modification information;
The password modification information is written into the password of first bluetooth equipment modification feature field, so that described first is blue Tooth equipment is decrypted the password modification information, is decrypting according to decipherment algorithm corresponding with second Encryption Algorithm The new password is obtained after success, and the second password of second bluetooth equipment of local current record is replaced with described new Password;
When receive first bluetooth equipment be properly received the new password second notice when, according to it is described first encryption Algorithm encrypts the certificate parameter using the new password that user inputs, and generates the second verification information;
Second verification information is written into the password authentification feature field, so that first bluetooth equipment is being judged The first information and second verification information are inconsistent, and when second password is not initial value, according to described first Encryption Algorithm is encrypted the certificate parameter using second password, obtains the second information, and judging When second information is consistent with second verification information, the first password is replaced with into second password, and by institute It states the second password and is set as the initial value;
First bluetooth equipment is received the first password is being replaced with second password and is setting second password It is set to the successfully modified third notice of the first password sent after the initial value;
When do not receive first bluetooth equipment be properly received the new password second notice when, determine that described first is close Code modification failure.
6. method as claimed in claim 5, which is characterized in that the method also includes:
It receives the first verification information authentication failed that first bluetooth equipment is sent and does not allow to access the 4th of the data Notice, the 4th notice are that first bluetooth equipment is judging that the first information and first verification information are different It causes, and the notice that issues when second password is the initial value;Alternatively, for first bluetooth equipment judge it is described The first information and first verification information are inconsistent, and second password is not the initial value, and second information with The notice that first verification information issues when inconsistent;Alternatively,
It receives the first verification information that first bluetooth equipment is sent and is proved to be successful and allows to access the 5th of the data and lead to Know, the 5th notice is that first bluetooth equipment is judging that the first information is consistent with first verification information When, the notice sent after the initial value is set by second password, alternatively, judging for first bluetooth equipment The first information and first verification information are inconsistent, and second password is not the initial value, and described second believes The notice sent when ceasing consistent with first verification information.
7. a kind of data access device, which is characterized in that described device is applied to set including the first bluetooth equipment and the second bluetooth In standby system, when first bluetooth equipment is as server, when second bluetooth equipment is as client, described device It applies on first bluetooth equipment, described device includes:
Receiving unit is used for after first bluetooth equipment is connect in plain text with second bluetooth equipment foundation, described in reception Second bluetooth equipment is when needing the data of Certificate Authority on accessing first bluetooth equipment to first bluetooth equipment The first verification information being written in password authentification feature field, first verification information are second bluetooth equipment according to pre- If the first Encryption Algorithm, using user input first verifying password, to first bluetooth equipment and second bluetooth After the certificate parameter that equipment both sides negotiate encrypts, the information of generation;
Obtaining unit is obtained for the first password according to second bluetooth equipment of the first bluetooth equipment current record The first information is obtained, the first information is first bluetooth equipment according to preset first Encryption Algorithm, using local The first password of second bluetooth equipment of current record, after being encrypted to the certificate parameter, the information of generation;
Notification unit, it is whether consistent with first verification information for judging the first information, if unanimously, described in notice First verification information described in second bluetooth equipment is proved to be successful, and allows to access the data.
8. device as claimed in claim 7, which is characterized in that described device further include:
Determination unit, if consistent with first verification information for the first information, it is determined that the first verifying password It is identical as the first password;
The receiving unit is also used to receive second bluetooth equipment when modifying the first password to first bluetooth The password modification information being written in the password modification feature field of equipment, the password modification information is second bluetooth equipment According to the second Encryption Algorithm that first bluetooth equipment and the second bluetooth equipment both sides negotiate, using first verifying After the new password that password inputs user is encrypted, the information of generation;
Decryption unit, for being carried out to the password modification information according to decipherment algorithm corresponding with second Encryption Algorithm Decryption;
The notification unit obtains the new password if being also used to successful decryption, and second bluetooth equipment is notified to succeed The new password is received, and the second password of second bluetooth equipment of the first bluetooth equipment current record is replaced with The new password;
The receiving unit is also used to receive second bluetooth equipment is written into the password authentification feature field second Verification information, second verification information are that second bluetooth equipment has been properly received receiving first bluetooth equipment When the notice of the new password, according to first Encryption Algorithm, the verifying is joined using the new password that user inputs After number is encrypted, the information of generation;
The obtaining unit is also used to judging that the first information and second verification information are inconsistent, described second When password is not initial value, according to first Encryption Algorithm, the certificate parameter is encrypted using second password Processing, obtains the second information;
The notification unit is also used to when judging that second information is consistent with second verification information, by described One password replaces with second password, and sets the initial value for second password, and second bluetooth is notified to set The standby first password is successfully modified.
9. device as claimed in claim 8, which is characterized in that
The notification unit is also used to when judging that the first information is consistent with first verification information, by described Two passwords are set as the initial value, and the first verification information described in second bluetooth equipment is notified to be proved to be successful, and allow to visit Ask the data;
Judging that the first information and first verification information are inconsistent, and second password is the initial value When, it notifies the first verification information authentication failed described in second bluetooth equipment, does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not the initial value, And second information and first verification information it is inconsistent when, notify the first verification information described in second bluetooth equipment Authentication failed does not allow to access the data;
Judging that the first information and first verification information are inconsistent, second password is not the initial value, And second information it is consistent with first verification information when, notify the first verification information described in second bluetooth equipment to test It demonstrate,proves successfully, allows to access the data.
10. a kind of data access device, which is characterized in that described device is applied to set including the first bluetooth equipment and the second bluetooth In standby system, when first bluetooth equipment is as server, when second bluetooth equipment is as client, described device It applies on second bluetooth equipment, described device includes:
Writing unit, for accessing institute after second bluetooth equipment is connect in plain text with first bluetooth equipment foundation When stating the data for needing Certificate Authority on the first bluetooth equipment, write in the password authentification feature field of the first bluetooth equipment of Xiang Suoshu Enter the first verification information, so that first bluetooth equipment is according to the first of second bluetooth equipment of local current record Password judges whether the first information is consistent with first verification information, wherein described first after obtaining the first information Verification information is second bluetooth equipment according to preset first Encryption Algorithm, verifies password using the first of user's input, After being encrypted to the certificate parameter that first bluetooth equipment and the second bluetooth equipment both sides are negotiated, the information of generation; The first information is first bluetooth equipment according to preset first Encryption Algorithm, using the institute of local current record The first password for stating the second bluetooth equipment, after being encrypted to the certificate parameter, the information of generation;
Receiving unit, first verification information for receiving the first bluetooth equipment transmission are proved to be successful and allow to access First notice of the data starts to access the data, and first notice is first bluetooth equipment judging State the first information it is consistent with first verification information when notice that sends.
11. device as claimed in claim 10, which is characterized in that described device further include:
Determination unit, for determining the first verifying password and the first password phase after receiving first notice Together;
Generation unit is used for when modifying the first password, according to first bluetooth equipment and second bluetooth equipment The second Encryption Algorithm that both sides negotiate is encrypted using the new password that the first verifying password inputs user, raw At password modification information;
Said write unit is also used to modify that the password modification being written in feature field to the password of first bluetooth equipment Information, so that first bluetooth equipment modifies the password according to decipherment algorithm corresponding with second Encryption Algorithm Information is decrypted, and obtains the new password after successful decryption, and by second bluetooth equipment of local current record Second password replaces with the new password;
The generation unit is also used to receive the second notice that first bluetooth equipment has been properly received the new password When, according to first Encryption Algorithm, the certificate parameter is encrypted using the new password that user inputs, generates the Two verification informations;
Said write unit is also used to that second verification information is written into the password authentification feature field, so that described First bluetooth equipment is judging that the first information and second verification information are inconsistent, and second password is not just When initial value, according to first Encryption Algorithm, the certificate parameter is encrypted using second password, obtains Two information, and when judging that second information is consistent with second verification information, the first password is replaced with Second password, and the initial value is set by second password;
The receiving unit is also used to receive first bluetooth equipment and the first password is being replaced with second password And the successfully modified third notice of the first password sent after the initial value is set by second password;
The determination unit is also used to not receive first bluetooth equipment and has been properly received the second logical of the new password When knowing, the first password modification failure is determined.
12. device as claimed in claim 11, which is characterized in that
The receiving unit is also used to receive the first verification information authentication failed that first bluetooth equipment is sent and does not allow The 4th notice of the data is accessed, the 4th notice is judging the first information and institute for first bluetooth equipment State that the first verification information is inconsistent, and the notice that when second password is the initial value issues;Alternatively, blue for described first Tooth equipment is judging that the first information and first verification information are inconsistent, and second password is not described initial Value, and the notice that second information issues when inconsistent with first verification information;Alternatively,
The receiving unit is also used to receive the first verification information that first bluetooth equipment is sent and is proved to be successful and allows to visit Ask the data the 5th notice, it is described 5th notice be first bluetooth equipment judge the first information with it is described When first verification information is consistent, the notice sent after the initial value is set by second password, alternatively, being described first Bluetooth equipment is judging that the first information and first verification information are inconsistent, and second password is not described initial Value, and the notice that when second information is consistent with first verification information sends.
CN201510305420.5A 2015-06-05 2015-06-05 A kind of data access method and device Active CN105187369B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510305420.5A CN105187369B (en) 2015-06-05 2015-06-05 A kind of data access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510305420.5A CN105187369B (en) 2015-06-05 2015-06-05 A kind of data access method and device

Publications (2)

Publication Number Publication Date
CN105187369A CN105187369A (en) 2015-12-23
CN105187369B true CN105187369B (en) 2019-03-15

Family

ID=54909214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510305420.5A Active CN105187369B (en) 2015-06-05 2015-06-05 A kind of data access method and device

Country Status (1)

Country Link
CN (1) CN105187369B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106028319B (en) * 2016-07-18 2019-06-04 北京京东尚科信息技术有限公司 A kind of method and apparatus for resisting illegal connection attack in slave Bluetooth equipment
CN107249168A (en) * 2017-05-18 2017-10-13 宇龙计算机通信科技(深圳)有限公司 A kind of data directional transmissions and method of reseptance and device
CN109525972B (en) * 2018-11-06 2022-11-11 深圳市乐创联科技有限公司 Method, terminal and system for controlling other terminals through Bluetooth information
CN109740340A (en) * 2018-12-28 2019-05-10 联想(北京)有限公司 Information processing method and electronic equipment
CN111641505B (en) * 2020-04-20 2023-04-25 广东乐心医疗电子股份有限公司 Information processing method, information processing device, electronic equipment and readable storage medium
CN112469019B (en) * 2020-11-27 2023-02-24 苏州维伟思医疗科技有限公司 Method and device for safely modifying treatment parameters of WCD (WCD)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022337A (en) * 2007-03-28 2007-08-22 胡祥义 Network identification card realizing method
CN103632416A (en) * 2012-08-27 2014-03-12 青岛联合创新技术服务平台有限公司 Voice recognition remote-control access and working method thereof
CN103984904A (en) * 2014-05-27 2014-08-13 深圳市欧珀通信软件有限公司 Method and device for preventing screen locking code of mobile terminal from being cracked

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022337A (en) * 2007-03-28 2007-08-22 胡祥义 Network identification card realizing method
CN103632416A (en) * 2012-08-27 2014-03-12 青岛联合创新技术服务平台有限公司 Voice recognition remote-control access and working method thereof
CN103984904A (en) * 2014-05-27 2014-08-13 深圳市欧珀通信软件有限公司 Method and device for preventing screen locking code of mobile terminal from being cracked

Also Published As

Publication number Publication date
CN105187369A (en) 2015-12-23

Similar Documents

Publication Publication Date Title
CN105187369B (en) A kind of data access method and device
JP6262278B2 (en) Method and apparatus for storage and computation of access control client
US11258792B2 (en) Method, device, system for authenticating an accessing terminal by server, server and computer readable storage medium
TWI475899B (en) Apparatus and methods for storing electronic access clients
US9094823B2 (en) Data processing for securing local resources in a mobile device
WO2016107319A1 (en) Method for loading secure key storage hardware, and browser client device
CN108064440A (en) FIDO authentication method, device and system based on block chain
CN108462710B (en) Authentication and authorization method, device, authentication server and machine-readable storage medium
CN110380852A (en) Mutual authentication method and communication system
CN103166931A (en) Method, device and system of transmitting data safely
CN113014539B (en) Internet of things equipment safety protection system and method
CN104618108A (en) Safety communication system
CN107743067A (en) Awarding method, system, terminal and the storage medium of digital certificate
CN105872848B (en) A kind of credible mutual authentication method suitable for asymmetric resource environment
CN111245607B (en) Networking method and system, network distribution equipment, client and server
CN107948186A (en) A kind of safety certifying method and device
CN110213247A (en) A kind of method and system improving pushed information safety
CN109690543A (en) Safety certifying method, integrated circuit and system
CN109714769A (en) Information binding method, device, equipment and storage medium
CN109218334A (en) Data processing method, device, access control equipment, certificate server and system
CN105430649B (en) WIFI cut-in method and equipment
CN110166471A (en) A kind of portal authentication method and device
CN107896221B (en) A kind of account binding method and device
CN109361681A (en) The close certificate authentication method of state, device and equipment
CN112733129A (en) Trusted access method for out-of-band management of server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant after: Xinhua three Technology Co., Ltd.

Address before: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Applicant before: Huasan Communication Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant