CN107105398A - A kind of method and apparatus of communication - Google Patents

A kind of method and apparatus of communication Download PDF

Info

Publication number
CN107105398A
CN107105398A CN201710379111.1A CN201710379111A CN107105398A CN 107105398 A CN107105398 A CN 107105398A CN 201710379111 A CN201710379111 A CN 201710379111A CN 107105398 A CN107105398 A CN 107105398A
Authority
CN
China
Prior art keywords
key
broadcast data
communication
bluetooth equipment
byte
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710379111.1A
Other languages
Chinese (zh)
Inventor
张华�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201710379111.1A priority Critical patent/CN107105398A/en
Publication of CN107105398A publication Critical patent/CN107105398A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method and apparatus of communication are provided, it is related to computer realm.One embodiment of this method includes:Receive the broadcast data that bluetooth equipment is sent;The broadcast data is converted to by key according to key schedule;And, set up and be connected with the bluetooth equipment using the key.This embodiment avoids being eavesdropped in connection procedure, the potential safety hazard of communication between devices is reduced, communication security reliability is improved.

Description

A kind of method and apparatus of communication
Technical field
The present invention relates to computer realm, more particularly to a kind of method and apparatus of communication.
Background technology
Bluetooth low energy consumption (Bluetooth Low Energy, BLE) technology is low cost, short distance, the Shandong of interoperable Rod wireless technology.In the present of current Internet of Things Industry Quick Development, the Intelligent hardware using BLE technologies is more and more.Together When, the use of the data of BLE technical transmissions is sensitive data, such as individual health data, account number cipher data etc. a bit, it is necessary to Ensure information privacy.
Current BLE technologies complete the key distribution of BLE communicating pairs by the way of pairing (pairing) (distribution).If pairing is completed, BLE communicating pairs carry out symmetrical plus solution using identical secret key pair BLE communications Close algorithm encryption and decryption, so as to ensure the confidentiality of BLE communications.
Following three kinds of modes are paired with present:
Key connection (Passkey Entry) is side input key (passkey), and side checking other side input in addition is It is no correct, pairing can be successfully completed if correct, incorrect just to terminate, pairing failure.This mode is applied to a side There is input medium (such as keyboard), the opposing party there are display means (such as display screen);
Out of band data connection (Out of Band) is to complete security information between BLE communicating pairs using non-BLE channels Transmission, such as NFC;
Operation connection (Just Works) this mode is to fix TK using identical at the very start in pairing stage both sides (Temporary Key).This mode at least side suitable for BLE communicating pairs does not possess input or display means.
In process of the present invention is realized, inventor has found that at least there are the following problems in the prior art:
If eavesdropping attack, the company that existing BLE communication connections mode can not communicate in BLE by passive in the pairing stage Resist and eavesdrop in termination process, in this case, the Bluetooth communication based on this connected mode can be sayed without security, because This, the security reliability for how improving communication is urgent problem to be solved.
The content of the invention
In view of this, the embodiment of the present invention provides a kind of method and apparatus of communication, can solve the problem that and communicates in the prior art Security reliability is poor, it is impossible to resist the problem of eavesdropping in the connection procedure that BLE communicates.
To achieve the above object, there is provided a kind of method of communication for one side according to embodiments of the present invention.
A kind of method of communication of the embodiment of the present invention includes receiving the broadcast data that bluetooth equipment is sent;Given birth to according to key The broadcast data is converted into key into algorithm;And, set up and be connected with the bluetooth equipment using the key.
Alternatively, before the broadcast data is received, executable file is sent to the bluetooth equipment.
Alternatively, the executable file includes the key schedule.
Alternatively, the key schedule comprises the following steps:A) byte of the broadcast data is chosen;B) described Secrecy element is added in byte;C) bit arithmetic is carried out;And, d) carry out digest algorithm computing.
Alternatively, it is provided with identity field in the broadcast data.
To achieve the above object, there is provided a kind of device of communication for another aspect according to embodiments of the present invention.
A kind of device of communication of the embodiment of the present invention includes:Receiving module, the broadcast for receiving bluetooth equipment transmission Data;Modular converter, for the broadcast data to be converted into key according to key schedule;Link block, for utilizing The key is set up with the bluetooth equipment and is connected.
Alternatively, the receiving module is additionally operable to:Before the broadcast data is received, executable file is sent to described Bluetooth equipment.
Alternatively, the executable file includes the key schedule.
Alternatively, the key schedule comprises the following steps:A) byte of the broadcast data is chosen;B) described Secrecy element is added in byte;C) bit arithmetic is carried out;And, d) carry out digest algorithm computing.
Alternatively, it is provided with identity field in the broadcast data.
To achieve the above object, there is provided a kind of electronic equipment of communication for another further aspect according to embodiments of the present invention.
A kind of electronic equipment of communication of the embodiment of the present invention includes:One or more processors;Storage device, for depositing One or more programs are stored up, when one or more of programs are by one or more of computing devices so that one Or the method that multiple processors realize the communication of the embodiment of the present invention.
To achieve the above object, there is provided a kind of computer-readable medium for another aspect according to embodiments of the present invention.
A kind of computer-readable medium of the embodiment of the present invention, is stored thereon with computer program, and described program is processed Device realizes the communication of embodiment of the present invention method when performing.
One embodiment in foregoing invention has the following advantages that or beneficial effect:Because setting up communication link using key Connect, during connection is set up, broadcast data is converted to key by communicating pair using identical key schedule, utilize The key sets up connection, can solve the problem that communication security poor reliability in the prior art, it is impossible to supported in the connection procedure that BLE communicates Drive the problem of eavesdropping;Simultaneously as in access phase by the way of encryption, it is to avoid Content of Communication leakage, so that equipment There is stronger security reliability in connection.
The further effect that above-mentioned non-usual optional mode has adds hereinafter in conjunction with embodiment With explanation.
Brief description of the drawings
Accompanying drawing is used to more fully understand the present invention, does not constitute inappropriate limitation of the present invention.Wherein:
Fig. 1 is the schematic diagram that mobile phone and terminal are attached in the prior art;
Fig. 2 is the schematic diagram that mobile phone and multiple types of terminals are attached in the prior art;
Fig. 3 is that the embodiment of the present invention can apply to exemplary system architecture figure therein;
Fig. 4 is the schematic diagram of the key step of the method for communication according to embodiments of the present invention;
Fig. 5 is the schematic diagram of the transmission broadcast data of the method for communication according to embodiments of the present invention;
Fig. 6 is that the broadcast data of the method for communication according to embodiments of the present invention is converted to the schematic diagram of key;
The schematic diagram for the step of Fig. 7 is the key schedule of the method for communication according to embodiments of the present invention;
Fig. 8 is the schematic diagram of the cipher key communication of the method for communication according to embodiments of the present invention;
Fig. 9 is the schematic diagram of the main modular of the device of communication according to embodiments of the present invention;
Figure 10 is adapted for for realizing that the terminal device of the embodiment of the present application or the structure of the computer system of server show It is intended to.
Embodiment
The one exemplary embodiment of the present invention is explained below in conjunction with accompanying drawing, including the various of the embodiment of the present invention Details should think them only exemplary to help understanding.Therefore, those of ordinary skill in the art should recognize Arrive, various changes and modifications can be made to the embodiments described herein, without departing from scope and spirit of the present invention.Together Sample, for clarity and conciseness, eliminates the description to known function and structure in following description.
Just as described in background the invention, prior art no use during pairing connection is carried out to equipment adds Close processing, the information transmitted between terminal device and bluetooth equipment is all, by plaintext transmission, there is very big potential safety hazard, Therefore, the method for the communication of the embodiment of the present invention is proposed, during terminal device and bluetooth equipment set up connection, will be broadcasted Data generate identical key using secret algorithm, passively eavesdrop attack so as to resist, improve the security reliability of communication.Together When, the method for the communication of the embodiment of the present invention uses no security in protocol layer, does not have particular requirement, Neng Gouying to hardware It is applied widely for all BLE equipment.
Fig. 1 is the schematic diagram that mobile phone and terminal are attached in the prior art.BLE agreements of the prior art can also be adopted With unshielded (No Security), i.e., plaintext transmission data are used in stage of communication both sides, so do not do safety in application layer Design, security pole bottom.Further, as shown in Fig. 2 being the signal that mobile phone and multiple types of terminals are attached in the prior art Figure, mobile phone is main bluetooth equipment (BLE Master), and various equipment are then that these equipment are simultaneously from bluetooth equipment (BLE Slave) Non- to carve connection mobile phone at the same time, this figure is intended to indicate that a mobile phone can connect a variety of bluetooth equipments, it is desirable to answering based on BLE BLE equipment as much as possible is adapted to layer protocol.And it is existing set up in the mode of bluetooth connection, Passkey entry and Out of Band are required to hardware, are caused part BLE equipment not access, are unfavorable for the marketing of application layer protocol; And Just Works, because the default initial key TK of Bluetooth protocol is fixed, disclosed, security is extremely low.
Fig. 3 shows the exemplary system architecture of the method for the communication that can apply the embodiment of the present invention or the device of communication 300。
As shown in figure 3, system architecture 300 can include terminal device 301,302,303, network 304 and server 305. Medium of the network 304 to provide communication link between terminal device 301,302,303 and server 305.Network 304 can be with Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be interacted with using terminal equipment 301,302,303 by network 304 with server 305, to receive or send out Send message etc..Various telecommunication customer end applications can be installed, such as Jingdone district is micro-, anti-lost on terminal device 301,302,303 Device etc..
Terminal device 301,302,303 can be the various electronic equipments for supporting Bluetooth communication, include but is not limited to intelligence Mobile phone, tablet personal computer, pocket computer on knee and desktop computer etc..
Server 305 can be to provide the server of various services, for example, utilize terminal device 301,302,303 to user The bluetooth equipment connected provides the back-stage management server supported.Back-stage management server can be asked to the transmission of Bluetooth communication The data such as ask to carry out the processing such as analyzing, and result (such as target push information, product information) is fed back into terminal and set It is standby.
It should be understood that the number of the terminal device, network and server in Fig. 3 is only schematical.According to realizing need Will, can have any number of terminal device, network and server.
Fig. 4 is the schematic diagram of the key step of the method for communication according to embodiments of the present invention.
As shown in figure 4, a kind of method of communication of the embodiment of the present invention mainly comprises the following steps:
Step S401:Receive the broadcast data that bluetooth equipment is sent.
No security are used in BLE protocol layers, with widest agreement applicability.Bluetooth equipment is sent extensively at any time Multicast data, the broadcast data need not take encryption measures, and any equipment can receive, check the broadcast data.
In embodiments of the present invention, before broadcast data is received, executable file is sent to bluetooth equipment.Executable text Part can be binary figure (image), and bluetooth equipment is based on the executable file and sends broadcast data.
In order to carry out the authentication of primary, special field can be set in the broadcast data of bluetooth equipment, only had The bluetooth equipment of this standby special Broadcast field, terminal device can just set up connection therewith, so that non-protocol devices be excluded Outside.In the embodiment of the present invention, identity field is provided with broadcast data.
Step S402:Broadcast data is converted to by key according to key schedule.
Because BLE protocol layers use no security, any equipment can receive, check the broadcast that bluetooth equipment is sent Data, in order to ensure the communication security of terminal device and bluetooth equipment, terminal device is given birth to bluetooth equipment using identical key Broadcast data is converted into key into algorithm, terminal device is set up using the key with bluetooth equipment and is connected.
In embodiments of the present invention, executable file includes key schedule.Terminal device passes through indigo plant with bluetooth equipment Tooth needs to set up before being communicated to be connected, and this process is needed to take encryption measures, and terminal device can be utilized with bluetooth equipment Broadcast data is converted to key by the key schedule in executable file, is connected so as to be set up using the key, Jin Erbao Demonstrate,prove the confidentiality of bluetooth connection.
In embodiments of the present invention, key schedule comprises the following steps:A) byte of broadcast data is chosen;B) in word Secrecy element is added in section;C) bit arithmetic is carried out;And, d) carry out digest algorithm computing.The byte of broadcast data is chosen first, Then secrecy element is added in byte, bit arithmetic is secondly carried out, digest algorithm computing is finally carried out, so far key is raw Into terminal device can use the key to set up and be connected with bluetooth equipment.
Step S403:Set up and be connected with bluetooth equipment using key.
Eavesdropped because prior art can not be resisted in the connection procedure of Bluetooth communication, the embodiment of the present invention is proposed using close Key sets up connection, effectively raises the security of whole communication process.
In addition, can be also used for believing the communication between terminal device and bluetooth equipment by the obtained keys of step S402 Breath is encrypted.
The method of communication according to embodiments of the present invention can be seen that because setting up communication connection using key, set up During connection, broadcast data is converted to key by communicating pair using identical key schedule, is built using the key Vertical connection, can solve the problem that communication security poor reliability in the prior art, it is impossible to resist what is eavesdropped in the connection procedure that BLE communicates Problem;Simultaneously as in access phase by the way of encryption, it is to avoid Content of Communication leakage, so that equipment has in connection There is stronger security reliability.
Fig. 5 is the schematic diagram of the transmission broadcast data of the method for communication according to embodiments of the present invention.
As shown in figure 5, the bluetooth equipment such as sphygmomanometer, bracelet, electronic scale is sender, the terminal such as mobile phone, tablet personal computer is set Standby is recipient.
During use, one executable file of terminal device or server just-ahead-of-time compilation is sent to bluetooth equipment, Bluetooth equipment can perform the executable file, can also use the key schedule in the executable file, but bluetooth is set It is standby to obtain the details of key schedule.Broadcast data is that bluetooth equipment is sent out based on executable file by the way of broadcast Send, therefore, bluetooth equipment and terminal device can obtain the content of broadcast data, and earwig can also obtain broadcast data Content, still, bluetooth equipment and terminal device are carried out to broadcast data using key schedule provided in an embodiment of the present invention Processing, and earwig can not get the key schedule.
MAC Address Adv Data
6Byte 0~31Byte
Table 1
It is the example of broadcast data as shown in table 1, broadcast data can include media access control address (MAC Address) and Broadcast field (AdvData), wherein, MAC Address take 6 bytes (Byte), AdvData take 0~ 31Byte, meanwhile, identity field can be set in AdvData.
Fig. 6 is that the broadcast data of the method for communication according to embodiments of the present invention is converted to the schematic diagram of key.
As shown in fig. 6, broadcast data is converted to key by bluetooth equipment and terminal device using key schedule.
Key schedule include choosing the byte of broadcast data, add in byte secrecy element, carry out bit arithmetic and Digest algorithm computing is carried out, as shown in fig. 7, the step of specific key schedule is as follows:
Step S701:Choose the byte of broadcast data.
Some bytes are chosen from broadcast data as raw material, choosing the method for byte can be set according to actual conditions, Byte, the byte of even bit, first n byte of odd bits etc. can be for example chosen, if the byte quantity that can be chosen is not Can be to be supplemented with 0x5A.
Step S702:Secrecy element is added in byte.
Secrecy element is added in the byte selected from broadcast data, the secrecy element is carrying in executable file Specified byte, it should be noted that the byte number of secrecy element is not fixed, as long as meeting after addition secrecy element Byte reaches default digit.
Step S703:Carry out bit arithmetic.
The byte chosen and the secrecy element of addition are subjected to bit arithmetic, the rule of bit arithmetic is not limited, but can not be with step The algorithm used in rapid S704 is identical.
Step S704:Carry out digest algorithm computing.
This step uses classic algorithm master, such as MD5, SHA1, SHA2 etc..
Table 2
Sequence number 1 2 3 4 5 6 7 8
Content 02 1A FF 00 06 0A A8 C9
Table 3
Assuming that broadcast data is as shown in table 2, by broadcast data from 1 byte open numbering, 8 serial number odd numbers of selection Broadcast data, the then byte selected is as shown in table 3.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
02 1A FF 00 06 0A A8 C9 11 22 33 44 55 66 77 88
Table 4
As shown in table 4, the byte selected is mended using 0x11,0x22,0x33,0x44,0x55,0x66,0x77 and 0x88 16 bytes of foot.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
9 5 16 3 2 14 11 8 7 1 13 6 10 12 4 15
Table 5
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
11 06 88 FF 1A 66 33 C9 A8 02 55 0A 22 44 00 77
Table 6
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
14 09 8B 03 1D 69 36 CC AB 05 58 0D 25 47 03 7A
Table 7
It is that byte is subjected to bit arithmetic as shown in table 6 and table 7.Table 6 is to be put the byte after supplement by the rule of table 5 Get in return.Wherein, the replacement rule of table 5 is that the corresponding content of sequence number is entered into line replacement, and sequence is arrived in the content displacement of such as sequence number 1 In numbers 9, the content of sequence number 9 is replaced into sequence number 7.Handled after line replacement is entered, then by byte by Substitution Rules, replace rule It is then X=(X+3) %0xFF, wherein, % represents complementation, and table 7 is obtained after replacing it.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
8C 87 B6 BB 5F 15 70 69 71 2A B4 E4 1E 5B C8 A8
Table 8
Finally the byte after bit arithmetic is handled using digest algorithm computing, by taking MD5 algorithms as an example, table 8 is obtained Shown byte is exactly that the key obtained by key schedule is used according to broadcast data, and the key can be used for the company of foundation Connect, be also used as follow-up session key and use.
Fig. 8 is the schematic diagram of the cipher key communication of the method for communication according to embodiments of the present invention.
As shown in figure 8, bluetooth equipment and terminal device are setting up company using according to the key obtained by key schedule After connecing, it is encrypted using the cipher key pair communication data, so as to ensure communication safety.
Meanwhile, in order to ensure the integrality of communication data, data can be carried out using error correction (ECC) checksum algorithm Integrity verification.
Fig. 9 is the schematic diagram of the main modular of the device of communication according to embodiments of the present invention.
As shown in figure 9, the device 900 of the communication of the embodiment of the present invention mainly includes:Receiving module 901, modular converter 902nd, link block 903.
Wherein:
Receiving module 901, the broadcast data for receiving bluetooth equipment transmission;
Modular converter 902, for the broadcast data to be converted into key according to key schedule;
Link block 903, is connected for being set up using the key with the bluetooth equipment.
In addition, the receiving module is additionally operable to:Before the broadcast data is received, executable file is sent to the indigo plant Tooth equipment.
In the embodiment of the present invention, the executable file includes the key schedule.
In the embodiment of the present invention, the key schedule comprises the following steps:A) byte of the broadcast data is chosen; B) secrecy element is added in the byte;C) bit arithmetic is carried out;And, d) carry out digest algorithm computing.
In the embodiment of the present invention, identity field is provided with the broadcast data.
The device of communication according to embodiments of the present invention can be seen that because setting up communication connection using key, set up During connection, broadcast data is converted to key by communicating pair using identical key schedule, is built using the key Vertical connection, can solve the problem that communication security poor reliability in the prior art, it is impossible to resist what is eavesdropped in the connection procedure that BLE communicates Problem;Simultaneously as in access phase by the way of encryption, it is to avoid Content of Communication leakage, so that equipment has in connection There is stronger security reliability.
Below with reference to Figure 10, it illustrates suitable for for the computer system for the terminal device for realizing the embodiment of the present invention 1000 structural representation.Terminal device shown in Figure 10 is only an example, should not to the function of the embodiment of the present invention and Carry out any limitation using range band.
As shown in Figure 10, computer system 1000 include CPU (CPU) 1001, its can according to be stored in only Read the program in memory (ROM) 1002 or be loaded into from storage part 1008 in random access storage device (RAM) 1003 Program and perform various appropriate actions and processing.In RAM 1003, the system that is also stored with 1000 operates required various journeys Sequence and data.CPU 1001, ROM 1002 and RAM 1003 are connected with each other by bus 1004.Input/output (I/O) interface 1005 are also connected to bus 1004.
I/O interfaces 1005 are connected to lower component:Importation 1006 including keyboard, mouse etc.;Including such as negative electrode The output par, c 1007 of ray tube (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part including hard disk etc. 1008;And the communications portion 1009 of the NIC including LAN card, modem etc..Communications portion 1009 is passed through Communication process is performed by the network of such as internet.Driver 1010 is also according to needing to be connected to I/O interfaces 1005.It is detachable to be situated between Matter 1011, such as disk, CD, magneto-optic disk, semiconductor memory etc., are arranged on driver 1010 as needed, so as to Storage part 1008 is mounted into as needed in the computer program read from it.
Especially, according to embodiment disclosed by the invention, the process of the flow chart description of key step can be by reality above It is now computer software programs.For example, embodiment disclosed by the invention includes a kind of computer program product, it includes being carried on Computer program on computer-readable medium, the computer program, which is included, to be used to perform the method shown in key step flow chart Program code.In such embodiments, the computer program can be downloaded by communications portion 1009 from network and Install, and/or be mounted from detachable media 1011.When the computer program is performed by CPU (CPU) 1001, The above-mentioned functions limited in the system for performing the present invention.
It should be noted that the computer-readable medium shown in the present invention can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer-readable recording medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, system, device or the device of infrared ray or semiconductor, or it is any more than combination.Meter The more specifically example of calculation machine readable storage medium storing program for executing can include but is not limited to:Electrical connection with one or more wires, just Take formula computer disk, hard disk, random access storage device (RAM), read-only storage (ROM), erasable type and may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only storage (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the present invention, computer-readable recording medium can any include or store journey The tangible medium of sequence, the program can be commanded execution system, device or device and use or in connection.And at this In invention, computer-readable signal media can be included in a base band or as the data-signal of carrier wave part propagation, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limit In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium beyond storage medium is read, the computer-readable medium, which can send, propagates or transmit, to be used for Used by instruction execution system, device or device or program in connection.Included on computer-readable medium Program code can be transmitted with any appropriate medium, be included but is not limited to:Wirelessly, electric wire, optical cable, RF etc., or above-mentioned Any appropriate combination.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of various embodiments of the invention, method and computer journey Architectural framework in the cards, function and the operation of sequence product.At this point, each square frame in flow chart or block diagram can generation The part of one module of table, program segment or code, a part for above-mentioned module, program segment or code is comprising one or more Executable instruction for realizing defined logic function.It should also be noted that in some realizations as replacement, institute in square frame The function of mark can also be with different from the order marked in accompanying drawing generation.For example, two square frames succeedingly represented are actual On can perform substantially in parallel, they can also be performed in the opposite order sometimes, depending on this is according to involved function. It should be noted that the combination of each square frame in block diagram or flow chart and the square frame in block diagram or flow chart, can use execution Defined function or the special hardware based system of operation realize, or can use specialized hardware and computer instruction Combine to realize.
Being described in module involved in the embodiment of the present invention can be realized by way of software, can also be by hard The mode of part is realized.Described module can also be set within a processor, for example, can be described as:A kind of processor bag Include receiving module, modular converter, link block.Wherein, the title of these modules is not constituted to the module under certain conditions The restriction of itself.For example, receiving module is also described as " module for receiving the broadcast data that bluetooth equipment is sent ".
As on the other hand, present invention also offers a kind of computer-readable medium, the computer-readable medium can be Included in equipment described in above-described embodiment;Can also be individualism, and without be incorporated the equipment in.Above-mentioned calculating Machine computer-readable recording medium carries one or more program, when said one or multiple programs are performed by the equipment, makes Obtaining the equipment includes:Step S401:Receive the broadcast data that bluetooth equipment is sent;Step S402:Will according to key schedule Broadcast data is converted to key;Step S403:Set up and be connected with bluetooth equipment using key.
Technical scheme according to embodiments of the present invention, is communicated to connect because being set up using key, is setting up the process of connection In, broadcast data is converted to key by communicating pair using identical key schedule, is set up and connected using the key, can Solve communication security poor reliability in the prior art, it is impossible to resist the problem of eavesdropping in the connection procedure that BLE communicates;Meanwhile, Due in access phase by the way of encryption, it is to avoid Content of Communication leakage so that equipment has stronger peace in connection Full reliability.
Above-mentioned embodiment, does not constitute limiting the scope of the invention.Those skilled in the art should be bright It is white, depending on design requirement and other factors, can occur various modifications, combination, sub-portfolio and replacement.It is any Modifications, equivalent substitutions and improvements made within the spirit and principles in the present invention etc., should be included in the scope of the present invention Within.

Claims (12)

1. a kind of method of communication, it is characterised in that including:
Receive the broadcast data that bluetooth equipment is sent;
The broadcast data is converted to by key according to key schedule;And
Set up and be connected with the bluetooth equipment using the key.
2. according to the method described in claim 1, it is characterised in that
Before the broadcast data is received, executable file is sent to the bluetooth equipment.
3. method according to claim 2, it is characterised in that
The executable file includes the key schedule.
4. method according to claim 3, it is characterised in that the key schedule comprises the following steps:
A) byte of the broadcast data is chosen;
B) secrecy element is added in the byte;
C) bit arithmetic is carried out;And
D) digest algorithm computing is carried out.
5. according to the method described in claim 1, it is characterised in that
Identity field is provided with the broadcast data.
6. a kind of device of communication, it is characterised in that be arranged in terminal device, the device includes:
Receiving module, the broadcast data for receiving bluetooth equipment transmission;
Modular converter, for the broadcast data to be converted into key according to key schedule;
Link block, is connected for being set up using the key with the bluetooth equipment.
7. device according to claim 6, it is characterised in that the receiving module is additionally operable to:
Before the broadcast data is received, executable file is sent to the bluetooth equipment.
8. device according to claim 7, it is characterised in that
The executable file includes the key schedule.
9. device according to claim 8, it is characterised in that the key schedule comprises the following steps:
A) byte of the broadcast data is chosen;
B) secrecy element is added in the byte;
C) bit arithmetic is carried out;And
D) digest algorithm computing is carried out.
10. device according to claim 6, it is characterised in that
Identity field is provided with the broadcast data.
11. a kind of electronic equipment of communication, it is characterised in that including:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are by one or more of computing devices so that one or more of processors are real The existing method as any one of claim 1-5.
12. a kind of computer-readable medium, is stored thereon with computer program, it is characterised in that described program is held by processor The method as any one of claim 1-5 is realized during row.
CN201710379111.1A 2017-05-25 2017-05-25 A kind of method and apparatus of communication Pending CN107105398A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710379111.1A CN107105398A (en) 2017-05-25 2017-05-25 A kind of method and apparatus of communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710379111.1A CN107105398A (en) 2017-05-25 2017-05-25 A kind of method and apparatus of communication

Publications (1)

Publication Number Publication Date
CN107105398A true CN107105398A (en) 2017-08-29

Family

ID=59670494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710379111.1A Pending CN107105398A (en) 2017-05-25 2017-05-25 A kind of method and apparatus of communication

Country Status (1)

Country Link
CN (1) CN107105398A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111149378A (en) * 2019-12-13 2020-05-12 深圳市伊欧乐科技有限公司 Data transmission method, device and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537735A (en) * 2014-12-11 2015-04-22 应骏 Electronic lock and unlocking and setting method thereof
CN104601700A (en) * 2015-01-15 2015-05-06 西安乾易企业管理咨询有限公司 Portable intelligent signing system and method
CN104918237A (en) * 2014-03-13 2015-09-16 阿里巴巴集团控股有限公司 Method of establishing wireless communication connection, communication master equipment, communication slave equipment, server and system
CN105307160A (en) * 2015-09-29 2016-02-03 北京元心科技有限公司 Data transmission method and device by use of Wi-Fi network
CN105430601A (en) * 2015-11-18 2016-03-23 腾讯科技(深圳)有限公司 Method and device for displaying Bluetooth device lists as well as mobile terminal
CN106028319A (en) * 2016-07-18 2016-10-12 北京京东尚科信息技术有限公司 Method and device for resisting illegal connection attack in slave Bluetooth device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104918237A (en) * 2014-03-13 2015-09-16 阿里巴巴集团控股有限公司 Method of establishing wireless communication connection, communication master equipment, communication slave equipment, server and system
CN104537735A (en) * 2014-12-11 2015-04-22 应骏 Electronic lock and unlocking and setting method thereof
CN104601700A (en) * 2015-01-15 2015-05-06 西安乾易企业管理咨询有限公司 Portable intelligent signing system and method
CN105307160A (en) * 2015-09-29 2016-02-03 北京元心科技有限公司 Data transmission method and device by use of Wi-Fi network
CN105430601A (en) * 2015-11-18 2016-03-23 腾讯科技(深圳)有限公司 Method and device for displaying Bluetooth device lists as well as mobile terminal
CN106028319A (en) * 2016-07-18 2016-10-12 北京京东尚科信息技术有限公司 Method and device for resisting illegal connection attack in slave Bluetooth device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111149378A (en) * 2019-12-13 2020-05-12 深圳市伊欧乐科技有限公司 Data transmission method, device and computer readable storage medium
WO2021114264A1 (en) * 2019-12-13 2021-06-17 深圳市伊欧乐科技有限公司 Data transmission method and device, and computer-readable storage medium

Similar Documents

Publication Publication Date Title
CN109672539A (en) SM2 algorithm collaboration signature and decryption method, apparatus and system
WO2012148096A2 (en) Method of sharing a session key between wireless communication terminals using a variable-length authentication code
CN110419193A (en) Certification and communication means and its system for safe and intelligent domestic environment based on KSI
CN106788977A (en) Low-power consumption bluetooth device talk encryption method and system
CN106576043A (en) Virally distributable trusted messaging
CN110365662B (en) Business approval method and device
WO2016058259A1 (en) Encryption transmission and verification method for power communication network field operation and maintenance data
Rahmadika et al. Blockchain-enabled 5G edge networks and beyond: An intelligent cross-silo federated learning approach
CN109327338A (en) A kind of electricity information acquisition system master station method for testing pressure and system based on virtual terminal
CN113742709B (en) Information processing method and device, readable medium and electronic equipment
CN115174267B (en) TLS protocol negotiation method, equipment and medium
CN106788991A (en) A kind of method and device of data transfer
CN106060073A (en) Channel key negotiation method
CN107172579A (en) A kind of method and system by Bluetooth information control bluetooth controlled terminal
Milani et al. Design, analysis, and experimental evaluation of a new secure rejoin mechanism for lorawan using elliptic-curve cryptography
CN113660725B (en) Positioning anti-cheating method, device and system, computer equipment and storage medium
CN114338710A (en) Data synchronization method and device, computer storage medium and related equipment
CN107105398A (en) A kind of method and apparatus of communication
Tsai et al. Automatic key update mechanism for lightweight M2M communication and enhancement of iot security: a case study of CoAP using libcoap library
CN106899600A (en) The data processing method and device of water purifier
CN115001720B (en) Optimization method, device, medium and equipment for safe transmission of federal learning modeling
CN115409511B (en) Personal information protection system based on block chain
WO2020165931A1 (en) Information processing device, secret computation method, and program
CN110381011A (en) A kind of method and apparatus for realizing logistics equipment secure communication
CN106060801B (en) Data communication method, device and system based on Wi-Fi device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170829