CN107105398A - A kind of method and apparatus of communication - Google Patents
A kind of method and apparatus of communication Download PDFInfo
- Publication number
- CN107105398A CN107105398A CN201710379111.1A CN201710379111A CN107105398A CN 107105398 A CN107105398 A CN 107105398A CN 201710379111 A CN201710379111 A CN 201710379111A CN 107105398 A CN107105398 A CN 107105398A
- Authority
- CN
- China
- Prior art keywords
- key
- broadcast data
- communication
- bluetooth equipment
- byte
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of method and apparatus of communication are provided, it is related to computer realm.One embodiment of this method includes:Receive the broadcast data that bluetooth equipment is sent;The broadcast data is converted to by key according to key schedule;And, set up and be connected with the bluetooth equipment using the key.This embodiment avoids being eavesdropped in connection procedure, the potential safety hazard of communication between devices is reduced, communication security reliability is improved.
Description
Technical field
The present invention relates to computer realm, more particularly to a kind of method and apparatus of communication.
Background technology
Bluetooth low energy consumption (Bluetooth Low Energy, BLE) technology is low cost, short distance, the Shandong of interoperable
Rod wireless technology.In the present of current Internet of Things Industry Quick Development, the Intelligent hardware using BLE technologies is more and more.Together
When, the use of the data of BLE technical transmissions is sensitive data, such as individual health data, account number cipher data etc. a bit, it is necessary to
Ensure information privacy.
Current BLE technologies complete the key distribution of BLE communicating pairs by the way of pairing (pairing)
(distribution).If pairing is completed, BLE communicating pairs carry out symmetrical plus solution using identical secret key pair BLE communications
Close algorithm encryption and decryption, so as to ensure the confidentiality of BLE communications.
Following three kinds of modes are paired with present:
Key connection (Passkey Entry) is side input key (passkey), and side checking other side input in addition is
It is no correct, pairing can be successfully completed if correct, incorrect just to terminate, pairing failure.This mode is applied to a side
There is input medium (such as keyboard), the opposing party there are display means (such as display screen);
Out of band data connection (Out of Band) is to complete security information between BLE communicating pairs using non-BLE channels
Transmission, such as NFC;
Operation connection (Just Works) this mode is to fix TK using identical at the very start in pairing stage both sides
(Temporary Key).This mode at least side suitable for BLE communicating pairs does not possess input or display means.
In process of the present invention is realized, inventor has found that at least there are the following problems in the prior art:
If eavesdropping attack, the company that existing BLE communication connections mode can not communicate in BLE by passive in the pairing stage
Resist and eavesdrop in termination process, in this case, the Bluetooth communication based on this connected mode can be sayed without security, because
This, the security reliability for how improving communication is urgent problem to be solved.
The content of the invention
In view of this, the embodiment of the present invention provides a kind of method and apparatus of communication, can solve the problem that and communicates in the prior art
Security reliability is poor, it is impossible to resist the problem of eavesdropping in the connection procedure that BLE communicates.
To achieve the above object, there is provided a kind of method of communication for one side according to embodiments of the present invention.
A kind of method of communication of the embodiment of the present invention includes receiving the broadcast data that bluetooth equipment is sent;Given birth to according to key
The broadcast data is converted into key into algorithm;And, set up and be connected with the bluetooth equipment using the key.
Alternatively, before the broadcast data is received, executable file is sent to the bluetooth equipment.
Alternatively, the executable file includes the key schedule.
Alternatively, the key schedule comprises the following steps:A) byte of the broadcast data is chosen;B) described
Secrecy element is added in byte;C) bit arithmetic is carried out;And, d) carry out digest algorithm computing.
Alternatively, it is provided with identity field in the broadcast data.
To achieve the above object, there is provided a kind of device of communication for another aspect according to embodiments of the present invention.
A kind of device of communication of the embodiment of the present invention includes:Receiving module, the broadcast for receiving bluetooth equipment transmission
Data;Modular converter, for the broadcast data to be converted into key according to key schedule;Link block, for utilizing
The key is set up with the bluetooth equipment and is connected.
Alternatively, the receiving module is additionally operable to:Before the broadcast data is received, executable file is sent to described
Bluetooth equipment.
Alternatively, the executable file includes the key schedule.
Alternatively, the key schedule comprises the following steps:A) byte of the broadcast data is chosen;B) described
Secrecy element is added in byte;C) bit arithmetic is carried out;And, d) carry out digest algorithm computing.
Alternatively, it is provided with identity field in the broadcast data.
To achieve the above object, there is provided a kind of electronic equipment of communication for another further aspect according to embodiments of the present invention.
A kind of electronic equipment of communication of the embodiment of the present invention includes:One or more processors;Storage device, for depositing
One or more programs are stored up, when one or more of programs are by one or more of computing devices so that one
Or the method that multiple processors realize the communication of the embodiment of the present invention.
To achieve the above object, there is provided a kind of computer-readable medium for another aspect according to embodiments of the present invention.
A kind of computer-readable medium of the embodiment of the present invention, is stored thereon with computer program, and described program is processed
Device realizes the communication of embodiment of the present invention method when performing.
One embodiment in foregoing invention has the following advantages that or beneficial effect:Because setting up communication link using key
Connect, during connection is set up, broadcast data is converted to key by communicating pair using identical key schedule, utilize
The key sets up connection, can solve the problem that communication security poor reliability in the prior art, it is impossible to supported in the connection procedure that BLE communicates
Drive the problem of eavesdropping;Simultaneously as in access phase by the way of encryption, it is to avoid Content of Communication leakage, so that equipment
There is stronger security reliability in connection.
The further effect that above-mentioned non-usual optional mode has adds hereinafter in conjunction with embodiment
With explanation.
Brief description of the drawings
Accompanying drawing is used to more fully understand the present invention, does not constitute inappropriate limitation of the present invention.Wherein:
Fig. 1 is the schematic diagram that mobile phone and terminal are attached in the prior art;
Fig. 2 is the schematic diagram that mobile phone and multiple types of terminals are attached in the prior art;
Fig. 3 is that the embodiment of the present invention can apply to exemplary system architecture figure therein;
Fig. 4 is the schematic diagram of the key step of the method for communication according to embodiments of the present invention;
Fig. 5 is the schematic diagram of the transmission broadcast data of the method for communication according to embodiments of the present invention;
Fig. 6 is that the broadcast data of the method for communication according to embodiments of the present invention is converted to the schematic diagram of key;
The schematic diagram for the step of Fig. 7 is the key schedule of the method for communication according to embodiments of the present invention;
Fig. 8 is the schematic diagram of the cipher key communication of the method for communication according to embodiments of the present invention;
Fig. 9 is the schematic diagram of the main modular of the device of communication according to embodiments of the present invention;
Figure 10 is adapted for for realizing that the terminal device of the embodiment of the present application or the structure of the computer system of server show
It is intended to.
Embodiment
The one exemplary embodiment of the present invention is explained below in conjunction with accompanying drawing, including the various of the embodiment of the present invention
Details should think them only exemplary to help understanding.Therefore, those of ordinary skill in the art should recognize
Arrive, various changes and modifications can be made to the embodiments described herein, without departing from scope and spirit of the present invention.Together
Sample, for clarity and conciseness, eliminates the description to known function and structure in following description.
Just as described in background the invention, prior art no use during pairing connection is carried out to equipment adds
Close processing, the information transmitted between terminal device and bluetooth equipment is all, by plaintext transmission, there is very big potential safety hazard,
Therefore, the method for the communication of the embodiment of the present invention is proposed, during terminal device and bluetooth equipment set up connection, will be broadcasted
Data generate identical key using secret algorithm, passively eavesdrop attack so as to resist, improve the security reliability of communication.Together
When, the method for the communication of the embodiment of the present invention uses no security in protocol layer, does not have particular requirement, Neng Gouying to hardware
It is applied widely for all BLE equipment.
Fig. 1 is the schematic diagram that mobile phone and terminal are attached in the prior art.BLE agreements of the prior art can also be adopted
With unshielded (No Security), i.e., plaintext transmission data are used in stage of communication both sides, so do not do safety in application layer
Design, security pole bottom.Further, as shown in Fig. 2 being the signal that mobile phone and multiple types of terminals are attached in the prior art
Figure, mobile phone is main bluetooth equipment (BLE Master), and various equipment are then that these equipment are simultaneously from bluetooth equipment (BLE Slave)
Non- to carve connection mobile phone at the same time, this figure is intended to indicate that a mobile phone can connect a variety of bluetooth equipments, it is desirable to answering based on BLE
BLE equipment as much as possible is adapted to layer protocol.And it is existing set up in the mode of bluetooth connection, Passkey entry and
Out of Band are required to hardware, are caused part BLE equipment not access, are unfavorable for the marketing of application layer protocol;
And Just Works, because the default initial key TK of Bluetooth protocol is fixed, disclosed, security is extremely low.
Fig. 3 shows the exemplary system architecture of the method for the communication that can apply the embodiment of the present invention or the device of communication
300。
As shown in figure 3, system architecture 300 can include terminal device 301,302,303, network 304 and server 305.
Medium of the network 304 to provide communication link between terminal device 301,302,303 and server 305.Network 304 can be with
Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be interacted with using terminal equipment 301,302,303 by network 304 with server 305, to receive or send out
Send message etc..Various telecommunication customer end applications can be installed, such as Jingdone district is micro-, anti-lost on terminal device 301,302,303
Device etc..
Terminal device 301,302,303 can be the various electronic equipments for supporting Bluetooth communication, include but is not limited to intelligence
Mobile phone, tablet personal computer, pocket computer on knee and desktop computer etc..
Server 305 can be to provide the server of various services, for example, utilize terminal device 301,302,303 to user
The bluetooth equipment connected provides the back-stage management server supported.Back-stage management server can be asked to the transmission of Bluetooth communication
The data such as ask to carry out the processing such as analyzing, and result (such as target push information, product information) is fed back into terminal and set
It is standby.
It should be understood that the number of the terminal device, network and server in Fig. 3 is only schematical.According to realizing need
Will, can have any number of terminal device, network and server.
Fig. 4 is the schematic diagram of the key step of the method for communication according to embodiments of the present invention.
As shown in figure 4, a kind of method of communication of the embodiment of the present invention mainly comprises the following steps:
Step S401:Receive the broadcast data that bluetooth equipment is sent.
No security are used in BLE protocol layers, with widest agreement applicability.Bluetooth equipment is sent extensively at any time
Multicast data, the broadcast data need not take encryption measures, and any equipment can receive, check the broadcast data.
In embodiments of the present invention, before broadcast data is received, executable file is sent to bluetooth equipment.Executable text
Part can be binary figure (image), and bluetooth equipment is based on the executable file and sends broadcast data.
In order to carry out the authentication of primary, special field can be set in the broadcast data of bluetooth equipment, only had
The bluetooth equipment of this standby special Broadcast field, terminal device can just set up connection therewith, so that non-protocol devices be excluded
Outside.In the embodiment of the present invention, identity field is provided with broadcast data.
Step S402:Broadcast data is converted to by key according to key schedule.
Because BLE protocol layers use no security, any equipment can receive, check the broadcast that bluetooth equipment is sent
Data, in order to ensure the communication security of terminal device and bluetooth equipment, terminal device is given birth to bluetooth equipment using identical key
Broadcast data is converted into key into algorithm, terminal device is set up using the key with bluetooth equipment and is connected.
In embodiments of the present invention, executable file includes key schedule.Terminal device passes through indigo plant with bluetooth equipment
Tooth needs to set up before being communicated to be connected, and this process is needed to take encryption measures, and terminal device can be utilized with bluetooth equipment
Broadcast data is converted to key by the key schedule in executable file, is connected so as to be set up using the key, Jin Erbao
Demonstrate,prove the confidentiality of bluetooth connection.
In embodiments of the present invention, key schedule comprises the following steps:A) byte of broadcast data is chosen;B) in word
Secrecy element is added in section;C) bit arithmetic is carried out;And, d) carry out digest algorithm computing.The byte of broadcast data is chosen first,
Then secrecy element is added in byte, bit arithmetic is secondly carried out, digest algorithm computing is finally carried out, so far key is raw
Into terminal device can use the key to set up and be connected with bluetooth equipment.
Step S403:Set up and be connected with bluetooth equipment using key.
Eavesdropped because prior art can not be resisted in the connection procedure of Bluetooth communication, the embodiment of the present invention is proposed using close
Key sets up connection, effectively raises the security of whole communication process.
In addition, can be also used for believing the communication between terminal device and bluetooth equipment by the obtained keys of step S402
Breath is encrypted.
The method of communication according to embodiments of the present invention can be seen that because setting up communication connection using key, set up
During connection, broadcast data is converted to key by communicating pair using identical key schedule, is built using the key
Vertical connection, can solve the problem that communication security poor reliability in the prior art, it is impossible to resist what is eavesdropped in the connection procedure that BLE communicates
Problem;Simultaneously as in access phase by the way of encryption, it is to avoid Content of Communication leakage, so that equipment has in connection
There is stronger security reliability.
Fig. 5 is the schematic diagram of the transmission broadcast data of the method for communication according to embodiments of the present invention.
As shown in figure 5, the bluetooth equipment such as sphygmomanometer, bracelet, electronic scale is sender, the terminal such as mobile phone, tablet personal computer is set
Standby is recipient.
During use, one executable file of terminal device or server just-ahead-of-time compilation is sent to bluetooth equipment,
Bluetooth equipment can perform the executable file, can also use the key schedule in the executable file, but bluetooth is set
It is standby to obtain the details of key schedule.Broadcast data is that bluetooth equipment is sent out based on executable file by the way of broadcast
Send, therefore, bluetooth equipment and terminal device can obtain the content of broadcast data, and earwig can also obtain broadcast data
Content, still, bluetooth equipment and terminal device are carried out to broadcast data using key schedule provided in an embodiment of the present invention
Processing, and earwig can not get the key schedule.
MAC Address | Adv Data |
6Byte | 0~31Byte |
Table 1
It is the example of broadcast data as shown in table 1, broadcast data can include media access control address (MAC
Address) and Broadcast field (AdvData), wherein, MAC Address take 6 bytes (Byte), AdvData take 0~
31Byte, meanwhile, identity field can be set in AdvData.
Fig. 6 is that the broadcast data of the method for communication according to embodiments of the present invention is converted to the schematic diagram of key.
As shown in fig. 6, broadcast data is converted to key by bluetooth equipment and terminal device using key schedule.
Key schedule include choosing the byte of broadcast data, add in byte secrecy element, carry out bit arithmetic and
Digest algorithm computing is carried out, as shown in fig. 7, the step of specific key schedule is as follows:
Step S701:Choose the byte of broadcast data.
Some bytes are chosen from broadcast data as raw material, choosing the method for byte can be set according to actual conditions,
Byte, the byte of even bit, first n byte of odd bits etc. can be for example chosen, if the byte quantity that can be chosen is not
Can be to be supplemented with 0x5A.
Step S702:Secrecy element is added in byte.
Secrecy element is added in the byte selected from broadcast data, the secrecy element is carrying in executable file
Specified byte, it should be noted that the byte number of secrecy element is not fixed, as long as meeting after addition secrecy element
Byte reaches default digit.
Step S703:Carry out bit arithmetic.
The byte chosen and the secrecy element of addition are subjected to bit arithmetic, the rule of bit arithmetic is not limited, but can not be with step
The algorithm used in rapid S704 is identical.
Step S704:Carry out digest algorithm computing.
This step uses classic algorithm master, such as MD5, SHA1, SHA2 etc..
Table 2
Sequence number | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
Content | 02 | 1A | FF | 00 | 06 | 0A | A8 | C9 |
Table 3
Assuming that broadcast data is as shown in table 2, by broadcast data from 1 byte open numbering, 8 serial number odd numbers of selection
Broadcast data, the then byte selected is as shown in table 3.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
02 | 1A | FF | 00 | 06 | 0A | A8 | C9 | 11 | 22 | 33 | 44 | 55 | 66 | 77 | 88 |
Table 4
As shown in table 4, the byte selected is mended using 0x11,0x22,0x33,0x44,0x55,0x66,0x77 and 0x88
16 bytes of foot.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
9 | 5 | 16 | 3 | 2 | 14 | 11 | 8 | 7 | 1 | 13 | 6 | 10 | 12 | 4 | 15 |
Table 5
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
11 | 06 | 88 | FF | 1A | 66 | 33 | C9 | A8 | 02 | 55 | 0A | 22 | 44 | 00 | 77 |
Table 6
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
14 | 09 | 8B | 03 | 1D | 69 | 36 | CC | AB | 05 | 58 | 0D | 25 | 47 | 03 | 7A |
Table 7
It is that byte is subjected to bit arithmetic as shown in table 6 and table 7.Table 6 is to be put the byte after supplement by the rule of table 5
Get in return.Wherein, the replacement rule of table 5 is that the corresponding content of sequence number is entered into line replacement, and sequence is arrived in the content displacement of such as sequence number 1
In numbers 9, the content of sequence number 9 is replaced into sequence number 7.Handled after line replacement is entered, then by byte by Substitution Rules, replace rule
It is then X=(X+3) %0xFF, wherein, % represents complementation, and table 7 is obtained after replacing it.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
8C | 87 | B6 | BB | 5F | 15 | 70 | 69 | 71 | 2A | B4 | E4 | 1E | 5B | C8 | A8 |
Table 8
Finally the byte after bit arithmetic is handled using digest algorithm computing, by taking MD5 algorithms as an example, table 8 is obtained
Shown byte is exactly that the key obtained by key schedule is used according to broadcast data, and the key can be used for the company of foundation
Connect, be also used as follow-up session key and use.
Fig. 8 is the schematic diagram of the cipher key communication of the method for communication according to embodiments of the present invention.
As shown in figure 8, bluetooth equipment and terminal device are setting up company using according to the key obtained by key schedule
After connecing, it is encrypted using the cipher key pair communication data, so as to ensure communication safety.
Meanwhile, in order to ensure the integrality of communication data, data can be carried out using error correction (ECC) checksum algorithm
Integrity verification.
Fig. 9 is the schematic diagram of the main modular of the device of communication according to embodiments of the present invention.
As shown in figure 9, the device 900 of the communication of the embodiment of the present invention mainly includes:Receiving module 901, modular converter
902nd, link block 903.
Wherein:
Receiving module 901, the broadcast data for receiving bluetooth equipment transmission;
Modular converter 902, for the broadcast data to be converted into key according to key schedule;
Link block 903, is connected for being set up using the key with the bluetooth equipment.
In addition, the receiving module is additionally operable to:Before the broadcast data is received, executable file is sent to the indigo plant
Tooth equipment.
In the embodiment of the present invention, the executable file includes the key schedule.
In the embodiment of the present invention, the key schedule comprises the following steps:A) byte of the broadcast data is chosen;
B) secrecy element is added in the byte;C) bit arithmetic is carried out;And, d) carry out digest algorithm computing.
In the embodiment of the present invention, identity field is provided with the broadcast data.
The device of communication according to embodiments of the present invention can be seen that because setting up communication connection using key, set up
During connection, broadcast data is converted to key by communicating pair using identical key schedule, is built using the key
Vertical connection, can solve the problem that communication security poor reliability in the prior art, it is impossible to resist what is eavesdropped in the connection procedure that BLE communicates
Problem;Simultaneously as in access phase by the way of encryption, it is to avoid Content of Communication leakage, so that equipment has in connection
There is stronger security reliability.
Below with reference to Figure 10, it illustrates suitable for for the computer system for the terminal device for realizing the embodiment of the present invention
1000 structural representation.Terminal device shown in Figure 10 is only an example, should not to the function of the embodiment of the present invention and
Carry out any limitation using range band.
As shown in Figure 10, computer system 1000 include CPU (CPU) 1001, its can according to be stored in only
Read the program in memory (ROM) 1002 or be loaded into from storage part 1008 in random access storage device (RAM) 1003
Program and perform various appropriate actions and processing.In RAM 1003, the system that is also stored with 1000 operates required various journeys
Sequence and data.CPU 1001, ROM 1002 and RAM 1003 are connected with each other by bus 1004.Input/output (I/O) interface
1005 are also connected to bus 1004.
I/O interfaces 1005 are connected to lower component:Importation 1006 including keyboard, mouse etc.;Including such as negative electrode
The output par, c 1007 of ray tube (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part including hard disk etc.
1008;And the communications portion 1009 of the NIC including LAN card, modem etc..Communications portion 1009 is passed through
Communication process is performed by the network of such as internet.Driver 1010 is also according to needing to be connected to I/O interfaces 1005.It is detachable to be situated between
Matter 1011, such as disk, CD, magneto-optic disk, semiconductor memory etc., are arranged on driver 1010 as needed, so as to
Storage part 1008 is mounted into as needed in the computer program read from it.
Especially, according to embodiment disclosed by the invention, the process of the flow chart description of key step can be by reality above
It is now computer software programs.For example, embodiment disclosed by the invention includes a kind of computer program product, it includes being carried on
Computer program on computer-readable medium, the computer program, which is included, to be used to perform the method shown in key step flow chart
Program code.In such embodiments, the computer program can be downloaded by communications portion 1009 from network and
Install, and/or be mounted from detachable media 1011.When the computer program is performed by CPU (CPU) 1001,
The above-mentioned functions limited in the system for performing the present invention.
It should be noted that the computer-readable medium shown in the present invention can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer-readable recording medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, system, device or the device of infrared ray or semiconductor, or it is any more than combination.Meter
The more specifically example of calculation machine readable storage medium storing program for executing can include but is not limited to:Electrical connection with one or more wires, just
Take formula computer disk, hard disk, random access storage device (RAM), read-only storage (ROM), erasable type and may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only storage (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the present invention, computer-readable recording medium can any include or store journey
The tangible medium of sequence, the program can be commanded execution system, device or device and use or in connection.And at this
In invention, computer-readable signal media can be included in a base band or as the data-signal of carrier wave part propagation,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limit
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium beyond storage medium is read, the computer-readable medium, which can send, propagates or transmit, to be used for
Used by instruction execution system, device or device or program in connection.Included on computer-readable medium
Program code can be transmitted with any appropriate medium, be included but is not limited to:Wirelessly, electric wire, optical cable, RF etc., or above-mentioned
Any appropriate combination.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of various embodiments of the invention, method and computer journey
Architectural framework in the cards, function and the operation of sequence product.At this point, each square frame in flow chart or block diagram can generation
The part of one module of table, program segment or code, a part for above-mentioned module, program segment or code is comprising one or more
Executable instruction for realizing defined logic function.It should also be noted that in some realizations as replacement, institute in square frame
The function of mark can also be with different from the order marked in accompanying drawing generation.For example, two square frames succeedingly represented are actual
On can perform substantially in parallel, they can also be performed in the opposite order sometimes, depending on this is according to involved function.
It should be noted that the combination of each square frame in block diagram or flow chart and the square frame in block diagram or flow chart, can use execution
Defined function or the special hardware based system of operation realize, or can use specialized hardware and computer instruction
Combine to realize.
Being described in module involved in the embodiment of the present invention can be realized by way of software, can also be by hard
The mode of part is realized.Described module can also be set within a processor, for example, can be described as:A kind of processor bag
Include receiving module, modular converter, link block.Wherein, the title of these modules is not constituted to the module under certain conditions
The restriction of itself.For example, receiving module is also described as " module for receiving the broadcast data that bluetooth equipment is sent ".
As on the other hand, present invention also offers a kind of computer-readable medium, the computer-readable medium can be
Included in equipment described in above-described embodiment;Can also be individualism, and without be incorporated the equipment in.Above-mentioned calculating
Machine computer-readable recording medium carries one or more program, when said one or multiple programs are performed by the equipment, makes
Obtaining the equipment includes:Step S401:Receive the broadcast data that bluetooth equipment is sent;Step S402:Will according to key schedule
Broadcast data is converted to key;Step S403:Set up and be connected with bluetooth equipment using key.
Technical scheme according to embodiments of the present invention, is communicated to connect because being set up using key, is setting up the process of connection
In, broadcast data is converted to key by communicating pair using identical key schedule, is set up and connected using the key, can
Solve communication security poor reliability in the prior art, it is impossible to resist the problem of eavesdropping in the connection procedure that BLE communicates;Meanwhile,
Due in access phase by the way of encryption, it is to avoid Content of Communication leakage so that equipment has stronger peace in connection
Full reliability.
Above-mentioned embodiment, does not constitute limiting the scope of the invention.Those skilled in the art should be bright
It is white, depending on design requirement and other factors, can occur various modifications, combination, sub-portfolio and replacement.It is any
Modifications, equivalent substitutions and improvements made within the spirit and principles in the present invention etc., should be included in the scope of the present invention
Within.
Claims (12)
1. a kind of method of communication, it is characterised in that including:
Receive the broadcast data that bluetooth equipment is sent;
The broadcast data is converted to by key according to key schedule;And
Set up and be connected with the bluetooth equipment using the key.
2. according to the method described in claim 1, it is characterised in that
Before the broadcast data is received, executable file is sent to the bluetooth equipment.
3. method according to claim 2, it is characterised in that
The executable file includes the key schedule.
4. method according to claim 3, it is characterised in that the key schedule comprises the following steps:
A) byte of the broadcast data is chosen;
B) secrecy element is added in the byte;
C) bit arithmetic is carried out;And
D) digest algorithm computing is carried out.
5. according to the method described in claim 1, it is characterised in that
Identity field is provided with the broadcast data.
6. a kind of device of communication, it is characterised in that be arranged in terminal device, the device includes:
Receiving module, the broadcast data for receiving bluetooth equipment transmission;
Modular converter, for the broadcast data to be converted into key according to key schedule;
Link block, is connected for being set up using the key with the bluetooth equipment.
7. device according to claim 6, it is characterised in that the receiving module is additionally operable to:
Before the broadcast data is received, executable file is sent to the bluetooth equipment.
8. device according to claim 7, it is characterised in that
The executable file includes the key schedule.
9. device according to claim 8, it is characterised in that the key schedule comprises the following steps:
A) byte of the broadcast data is chosen;
B) secrecy element is added in the byte;
C) bit arithmetic is carried out;And
D) digest algorithm computing is carried out.
10. device according to claim 6, it is characterised in that
Identity field is provided with the broadcast data.
11. a kind of electronic equipment of communication, it is characterised in that including:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are by one or more of computing devices so that one or more of processors are real
The existing method as any one of claim 1-5.
12. a kind of computer-readable medium, is stored thereon with computer program, it is characterised in that described program is held by processor
The method as any one of claim 1-5 is realized during row.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710379111.1A CN107105398A (en) | 2017-05-25 | 2017-05-25 | A kind of method and apparatus of communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710379111.1A CN107105398A (en) | 2017-05-25 | 2017-05-25 | A kind of method and apparatus of communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107105398A true CN107105398A (en) | 2017-08-29 |
Family
ID=59670494
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710379111.1A Pending CN107105398A (en) | 2017-05-25 | 2017-05-25 | A kind of method and apparatus of communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107105398A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111149378A (en) * | 2019-12-13 | 2020-05-12 | 深圳市伊欧乐科技有限公司 | Data transmission method, device and computer readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537735A (en) * | 2014-12-11 | 2015-04-22 | 应骏 | Electronic lock and unlocking and setting method thereof |
CN104601700A (en) * | 2015-01-15 | 2015-05-06 | 西安乾易企业管理咨询有限公司 | Portable intelligent signing system and method |
CN104918237A (en) * | 2014-03-13 | 2015-09-16 | 阿里巴巴集团控股有限公司 | Method of establishing wireless communication connection, communication master equipment, communication slave equipment, server and system |
CN105307160A (en) * | 2015-09-29 | 2016-02-03 | 北京元心科技有限公司 | Data transmission method and device by use of Wi-Fi network |
CN105430601A (en) * | 2015-11-18 | 2016-03-23 | 腾讯科技(深圳)有限公司 | Method and device for displaying Bluetooth device lists as well as mobile terminal |
CN106028319A (en) * | 2016-07-18 | 2016-10-12 | 北京京东尚科信息技术有限公司 | Method and device for resisting illegal connection attack in slave Bluetooth device |
-
2017
- 2017-05-25 CN CN201710379111.1A patent/CN107105398A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104918237A (en) * | 2014-03-13 | 2015-09-16 | 阿里巴巴集团控股有限公司 | Method of establishing wireless communication connection, communication master equipment, communication slave equipment, server and system |
CN104537735A (en) * | 2014-12-11 | 2015-04-22 | 应骏 | Electronic lock and unlocking and setting method thereof |
CN104601700A (en) * | 2015-01-15 | 2015-05-06 | 西安乾易企业管理咨询有限公司 | Portable intelligent signing system and method |
CN105307160A (en) * | 2015-09-29 | 2016-02-03 | 北京元心科技有限公司 | Data transmission method and device by use of Wi-Fi network |
CN105430601A (en) * | 2015-11-18 | 2016-03-23 | 腾讯科技(深圳)有限公司 | Method and device for displaying Bluetooth device lists as well as mobile terminal |
CN106028319A (en) * | 2016-07-18 | 2016-10-12 | 北京京东尚科信息技术有限公司 | Method and device for resisting illegal connection attack in slave Bluetooth device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111149378A (en) * | 2019-12-13 | 2020-05-12 | 深圳市伊欧乐科技有限公司 | Data transmission method, device and computer readable storage medium |
WO2021114264A1 (en) * | 2019-12-13 | 2021-06-17 | 深圳市伊欧乐科技有限公司 | Data transmission method and device, and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109672539A (en) | SM2 algorithm collaboration signature and decryption method, apparatus and system | |
WO2012148096A2 (en) | Method of sharing a session key between wireless communication terminals using a variable-length authentication code | |
CN110419193A (en) | Certification and communication means and its system for safe and intelligent domestic environment based on KSI | |
CN106788977A (en) | Low-power consumption bluetooth device talk encryption method and system | |
CN106576043A (en) | Virally distributable trusted messaging | |
CN110365662B (en) | Business approval method and device | |
WO2016058259A1 (en) | Encryption transmission and verification method for power communication network field operation and maintenance data | |
Rahmadika et al. | Blockchain-enabled 5G edge networks and beyond: An intelligent cross-silo federated learning approach | |
CN109327338A (en) | A kind of electricity information acquisition system master station method for testing pressure and system based on virtual terminal | |
CN113742709B (en) | Information processing method and device, readable medium and electronic equipment | |
CN115174267B (en) | TLS protocol negotiation method, equipment and medium | |
CN106788991A (en) | A kind of method and device of data transfer | |
CN106060073A (en) | Channel key negotiation method | |
CN107172579A (en) | A kind of method and system by Bluetooth information control bluetooth controlled terminal | |
Milani et al. | Design, analysis, and experimental evaluation of a new secure rejoin mechanism for lorawan using elliptic-curve cryptography | |
CN113660725B (en) | Positioning anti-cheating method, device and system, computer equipment and storage medium | |
CN114338710A (en) | Data synchronization method and device, computer storage medium and related equipment | |
CN107105398A (en) | A kind of method and apparatus of communication | |
Tsai et al. | Automatic key update mechanism for lightweight M2M communication and enhancement of iot security: a case study of CoAP using libcoap library | |
CN106899600A (en) | The data processing method and device of water purifier | |
CN115001720B (en) | Optimization method, device, medium and equipment for safe transmission of federal learning modeling | |
CN115409511B (en) | Personal information protection system based on block chain | |
WO2020165931A1 (en) | Information processing device, secret computation method, and program | |
CN110381011A (en) | A kind of method and apparatus for realizing logistics equipment secure communication | |
CN106060801B (en) | Data communication method, device and system based on Wi-Fi device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170829 |