CN107454558B - Method for achieving Bluetooth automatic connection of master device and slave device through shared information - Google Patents

Method for achieving Bluetooth automatic connection of master device and slave device through shared information Download PDF

Info

Publication number
CN107454558B
CN107454558B CN201710664350.1A CN201710664350A CN107454558B CN 107454558 B CN107454558 B CN 107454558B CN 201710664350 A CN201710664350 A CN 201710664350A CN 107454558 B CN107454558 B CN 107454558B
Authority
CN
China
Prior art keywords
information
master device
slave
slave device
master
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710664350.1A
Other languages
Chinese (zh)
Other versions
CN107454558A (en
Inventor
李登峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhou Rongan Technology Beijing Co ltd
Original Assignee
Shenzhou Rongan Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhou Rongan Technology Beijing Co ltd filed Critical Shenzhou Rongan Technology Beijing Co ltd
Priority to CN201710664350.1A priority Critical patent/CN107454558B/en
Publication of CN107454558A publication Critical patent/CN107454558A/en
Application granted granted Critical
Publication of CN107454558B publication Critical patent/CN107454558B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Abstract

The invention discloses a method for realizing Bluetooth automatic connection of a master device and a slave device through shared information, which comprises the following steps: the master device acquires the shared information of the slave devices; the master device obtains the Bluetooth connection information of the slave device through the shared information; the master device initiates a connection request to the slave device; the master device and the slave device perform mutual identity authentication, and if the authentication is passed, the automatic Bluetooth connection is realized, so that the following effects are achieved: (1) before information sharing, irreversible preprocessing is carried out, so that information leakage is avoided; (2) the equipment cannot be directly connected in a non-contact mode, so that the reality of information is ensured; (3) the mutual interference among a plurality of slave devices does not exist; (4) the method is simple and intuitive, and the operation is convenient and fast; (5) the process complexity in repeated use is reduced; (6) authentication between the master and slave devices is done based on shared information, without using a secret key; (7) setting retrieval information and protecting shared information; (8) the method is completed in a process or software mode, and the cost is not increased.

Description

Method for achieving Bluetooth automatic connection of master device and slave device through shared information
Technical Field
The invention relates to the field of Bluetooth communication, in particular to a method for realizing Bluetooth automatic connection of a master device and a slave device by sharing information.
Background
In the prior art, some Bluetooth connection schemes adopt a one-by-one connection mode after the validity of the device name is verified, the connection is automatic, matching codes and the like are generated by software, the security is only reflected in the secrecy of a user-defined algorithm, and effective verification means is not provided for the master device and the slave device. In addition, when the device is used for the first time, the slave device needs to be screened on the main device and then connected, and the device cannot be visually matched with the entity slave device; in addition, when the master device is replaced for application operation, the slave devices need to be connected repeatedly.
In other schemes, hardware storage is added, and automatic connection is realized through an NFC or other communication channel, which increases hardware cost.
Therefore, how to develop a method for a master device and a slave device to achieve bluetooth automatic connection by sharing information becomes a technical problem to be solved urgently.
Disclosure of Invention
The invention provides a method for realizing Bluetooth automatic connection of a master device and a slave device by sharing information, which solves the technical problem that safe, simple and visual Bluetooth connection between the master device and the slave device cannot be realized.
In order to solve the technical problem, the invention discloses a method for realizing Bluetooth automatic connection of a master device and a slave device by sharing information, which comprises the following steps:
the master device acquires the shared information of the slave devices;
the master device obtains the Bluetooth connection information of the slave device through the shared information;
the master device initiates a connection request to the slave device;
the master device and the slave device perform mutual identity authentication, and if the authentication is passed, the Bluetooth automatic connection is realized.
Further, the acquiring, by the master device, the shared information of the slave device includes:
the master device obtains shared information preset on the slave device through scanning; or
And the master device acquires the sharing information prestored in the master device prestored list or the server through inquiry.
Further, the bluetooth connection information includes: bluetooth name, MAC address, or pairing code.
Further, the master device obtains the bluetooth connection information of the slave device through the shared information, and further includes:
and the master equipment performs irreversible operation on the shared information, wherein the irreversible operation is the abstract operation of SHA and SM3 or CRC operation.
Further, still include:
and the master equipment acquires the user information of the slave equipment, sets the user information as retrieval information matched with the slave equipment, and sends the retrieval information and the sharing information to a master equipment pre-stored list or a server for storage, wherein the retrieval information is used for being matched with the sharing information of the slave equipment in the master equipment pre-stored list or the server.
Further, still include: and encrypting the shared information, and protecting a symmetric key by using a private key of the certificate.
Further, the mutual identity authentication includes: the legality authentication of the slave device by the master device, and the legality authentication of the master device by the slave device, wherein,
the method for the master device to authenticate the legality of the slave device comprises the following steps:
step A: the master device sends a random number r1 to the slave device;
and B: the slave device organizes the shared information UD and r1 into data (UD | r1) and performs summary operation to obtain H1;
and C: the slave device sends H1 to the master device;
step D: the master device receives H1, and if the data is verified to be correct, the slave device is legal;
the method for the slave device to authenticate the validity of the master device comprises the following steps:
step a: the slave device generates a random number r2 and sends r2 to the master device;
step b: the master device receives r2, organizes data (UD | r2) of shared information UD and r2, and performs summary operation to obtain H2;
step c: the master device returns H2 to the slave device;
step d: the slave device receives H2, verifies that the data is correct, and the master device is legal.
Further, the retrieval information is the user name, the mobile phone number, or the account information of the slave device.
Further, the shared information is displayed on the slave device by means of a two-dimensional code, a barcode, or image information.
Further, the shared information is a serial number of the slave device, user information, or an issuing unit.
Compared with the prior art, the method for realizing the automatic Bluetooth connection of the master device and the slave device by sharing the information achieves the following effects:
1. the invention carries out irreversible preprocessing such as SHA, SM3 or CRC before sharing the equipment information, thereby avoiding information leakage;
2. the technical scheme of the invention ensures that the equipment cannot be directly connected in a non-contact manner, and the equipment is operated under the condition of judgment of the server and operators, so that the truth of information is ensured, and the slave equipment is effective;
3. the master equipment and the slave equipment of the coherent system are automatically connected, and mutual interference among a plurality of slave equipment does not exist;
4. the highlighted shared information acquisition mode (by scanning bar codes, two-dimensional codes, images and the like) is simple and intuitive, is convenient and fast to operate, and reduces the complexity of connection of the Bluetooth equipment;
5. the invention reduces the complexity of the flow when the device is repeatedly used;
6. the verification between the master device and the slave device is completed based on the sharing constraint of the shared information without using a secret key;
7. the shared information is protected by setting the retrieval information, because the shared information is usually private information and is not suitable for disclosure, more visual user information is obtained by retrieval and is replaced by setting the retrieval information, so that the user can judge whether the information is accurate, the information is not only visual, but also the shared information is disguised for one time;
8. the invention can be completed in a process or software mode without adding extra cost.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart of a method for a master device and a slave device to achieve bluetooth automatic connection by sharing information according to embodiment 1 of the present invention;
fig. 2 is a flowchart of a method for a master device and a slave device to achieve bluetooth automatic connection by sharing information according to embodiment 2 of the present invention;
fig. 3 is a flowchart of a method for a master device and a slave device to achieve bluetooth automatic connection by sharing information according to embodiment 3 of the present invention;
fig. 4 is a flowchart of a method for a master device and a slave device to achieve bluetooth automatic connection by sharing information according to embodiment 4 of the present invention;
fig. 5 is a flowchart of a method for a master device and a slave device to achieve bluetooth automatic connection by sharing information according to embodiment 5 of the present invention.
Detailed Description
As used in the specification and in the claims, certain terms are used to refer to particular components. As one skilled in the art will appreciate, manufacturers may refer to a component by different names. This specification and claims do not intend to distinguish between components that differ in name but not function. In the following description and in the claims, the terms "include" and "comprise" are used in an open-ended fashion, and thus should be interpreted to mean "include, but not limited to. "substantially" means within an acceptable error range, and a person skilled in the art can solve the technical problem within a certain error range to substantially achieve the technical effect. The following description is of the preferred embodiment for carrying out the invention, and is made for the purpose of illustrating the general principles of the invention and not for the purpose of limiting the scope of the invention. The scope of the present invention is defined by the appended claims.
The present invention will be described in further detail below with reference to the accompanying drawings, but the present invention is not limited thereto.
Example 1
As shown in fig. 1, this embodiment provides a method for a master device and a slave device to achieve bluetooth automatic connection through sharing information, which includes the following steps:
the master device acquires the shared information of the slave devices;
the master device obtains the Bluetooth connection information of the slave device through the shared information;
the master device initiates a connection request to the slave device;
the master device and the slave device perform mutual identity authentication, and if the authentication is passed, the Bluetooth automatic connection is realized.
Preferably, the acquiring, by the master device, the shared information of the slave device includes: the master device obtains shared information preset on the slave device through scanning; or the main device acquires the sharing information prestored in the main device prestored list or the server through inquiry.
Specifically, the master device obtains the shared information of the slave device, and may also obtain the shared information preset on the slave device through scanning or the like. The shared information preset on the slave device can be set on the shared information on the slave device in the forms of printing, drawing, posting and the like, and the display forms of the shared information include but are not limited to: two-dimensional codes, bar codes, images, and the like; of course, the shared information preset on the slave device may also be displayed on the slave device through the display screen. In addition, the master device obtains the shared information of the slave device, and can also obtain the shared information prestored in the master device prestored list or the server through inquiry.
Preferably, the bluetooth connection information includes: bluetooth name, MAC address, or pairing code. Specifically, the pairing code is obtained by the master device and the slave device through respective calculation of shared information, the master device polls to obtain the pairing code broadcasted by the slave device, and only the slave device matched with the pairing code obtained by the master device through calculation can be initiated by the master device to connect.
Preferably, the master device obtains the bluetooth connection information of the slave device through the shared information, further comprising: the master device performs irreversible operation on the shared information, wherein the irreversible operation is the digest operation of SHA (SHAxxx) and SM3, CRC operation or custom algorithm. Specifically, SHA (secure Hash algorithm) is established by the National Institute of Standards and Technology (NIST), a standard organization for cryptographic algorithms specially established in the united states, and the digest lengths of SHA series algorithms are respectively: SHA is 20 bytes (160 bits), SHA256 is 32 bytes (256 bits), SHA384 is 48 bytes (384 bits), SHA512 is 64 bytes (512 bits). The digest length of the SM3 algorithm is 32 bytes (256 bits). The algorithm is released as the cipher industry standard (GM/T0004-. The longer the length of the generated data summary, the more difficult it is for collisions to occur. The Cyclic Redundancy Check (CRC) is derived from a branch of block linear codes, and the main application is binary code blocks. The code is simple, the misjudgment probability is low, and the CRC-32 CRC-CCIT CRC-32 CRC-CCIT-32 CRC. The self-defining algorithm is obtained by replacing part of data with 'X', and combining the part of data with shared data SHA, SM3 and CRC operation results.
Preferably, the bluetooth connection method further includes: and the master equipment acquires the user information of the slave equipment, sets the user information as retrieval information matched with the slave equipment, and sends the retrieval information and the sharing information to a master equipment pre-stored list or a server for storage, wherein the retrieval information is used for being matched with the sharing information of the slave equipment in the master equipment pre-stored list or the server. Specifically, the shared information is usually private information and is not suitable for disclosure, and through setting the retrieval information, the more intuitive user information is obtained through retrieval and is replaced, so that the user can judge whether the information is accurate, the information is not only intuitive, but also disguised once on the shared information. In practical application, the retrieval information can be preferentially retrieved in a local pre-stored list so as to obtain matched shared information, and if the retrieval fails, the server is connected again to retrieve the corresponding shared information.
Preferably, the retrieval information is a user name, a mobile phone number, or account information of the slave device. In actual use, the retrieval information may be consistent with the user information. The setting of the retrieval information can protect the shared information and prevent the shared information from leaking; on the other hand, the information can be visually distinguished conveniently by a user or an operator, and the convenience of information confirmation is improved.
Specifically, when the master device acquires the shared information of the slave devices, the master device simultaneously acquires the user names and other retrieval information of the slave devices, and sends the retrieval information and the shared information to the server for storage, so as to be used in the next login. For example: in practical application, when a user logs in a server on a master device, the server may obtain retrieval information of a slave device, such as a user name or a mobile phone number, and then obtain shared information of the slave device through the retrieval information retrieval, so as to send the shared information to the master device.
Preferably, the bluetooth connection method further includes: and encrypting the shared information, and protecting a symmetric key by using a private key of the certificate.
Specifically, the slave device shares shared information to the master device, the shared information including information such as, but not limited to, a serial number, user information, a distribution unit, and the like; sensitive information in the shared information can be encrypted, and a symmetric key is protected by a private key of the certificate to ensure the integrity of data. For example: original data in the two-dimensional code is SN: 3031323334353637383930; encrypt 12345678901234567890 the data segment 3031323334353637383930, resulting in a new data segment: UD: 12345678901234567890; KD: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, SIG: xxxxxxxxxxxxxxxxxxxxxx. KD is a symmetric key protected by the certificate, and is obtained by signing a plaintext through a private key, SIG is obtained by signing a summary result obtained by SN | KD through the private key, and the integrity of data is ensured.
In application, the main device verifies the validity of data by acquiring information such as a certificate public key and shared information from a server, so as to obtain key information during connection: bluetooth device name or MAC.
Preferably, the mutual identity authentication includes: the legality authentication of the slave device by the master device, and the legality authentication of the master device by the slave device, wherein,
the method for the master device to authenticate the legality of the slave device comprises the following steps:
step A: the master device sends a random number r1 to the slave device;
and B: the slave device organizes the shared information UD and r1 into data (UD | r1) and performs summary operation (SHA and SM3) to obtain H1;
and C: the slave device sends H1 to the master device;
step D: the master device receives H1, and if the data is verified to be correct, the slave device is legal;
the method for the slave device to authenticate the validity of the master device comprises the following steps:
step a: the slave device generates a random number r2 and sends r2 to the master device;
step b: the master device receives r2, organizes the shared information UD and r2 into data (UD | r2), and performs summary operation (SHA, SM3) to obtain H2;
step c: the master device returns H2 to the slave device;
step d: the slave device receives H2, verifies that the data is correct, and the master device is legal.
Preferably, the shared information is displayed on the slave device by means of a two-dimensional code, a barcode, or image information. Specifically, the shared information may be disposed on the slave device in a form of printing, drawing, posting, or the like, and the form of presentation includes, but is not limited to: two-dimensional codes, bar codes, images, and the like; of course, the shared information may also be displayed on the slave device through a display screen, that is, the slave device is provided with a display screen for displaying the shared information.
Preferably, the shared information is a serial number of the slave device, user information, or an issuing unit, and the shared information is ensured to be a unique identifier.
Example 2
As shown in fig. 2, this embodiment provides a method for a master device and a slave device to achieve bluetooth automatic connection through sharing information, which includes the following steps:
step 1: a user logs in a server on main equipment;
step 2: the server obtains retrieval information such as a user name, a mobile phone number and the like, and obtains shared information of the slave equipment through retrieval;
and step 3: the server sends the shared information to the main equipment;
and 4, step 4: the master device calculates the Bluetooth name, the MAC address or the pairing code of the slave device through the shared information;
and 5: the master device initiates a connection request to the slave device;
step 6: the master device and the slave device perform mutual identity authentication, and if the authentication is passed, the Bluetooth automatic connection is realized.
Example 3
As shown in fig. 3, this embodiment provides another method for the master device and the slave device to achieve bluetooth automatic connection through shared information, which is applied when the master device and the slave device are connected for the first time, and binds the shared information and the user information.
Specifically, the method comprises the following steps:
step 1: scanning the two-dimensional code or the bar code of the slave equipment through an application program of the master equipment to obtain shared information;
step 2: the master device uploads the sharing information and the user information (retrieval information) of the slave device to the server;
and step 3: the server stores the shared information and the user information (retrieval information) to form a one-to-one correspondence relationship so as to facilitate retrieval when the connection is not performed for the first time;
and 4, step 4: the master device calculates the Bluetooth name, the MAC address or the pairing code of the slave device through the shared information;
and 5: the master device initiates a connection request to the slave device;
step 6: and the slave equipment judges that the information is correct and then completes automatic connection, and the user can execute application operation on the master equipment.
Example 4
As shown in fig. 4, this embodiment provides another method for the master device and the slave device to achieve bluetooth automatic connection by sharing information, in which case, after the first connection is successful, each subsequent connection may be more convenient.
Specifically, the method comprises the following steps:
step 1: the master device retrieves the shared information by acquiring the user information (i.e. the input information such as the mobile phone number and the account number) of the slave device; the retrieved shared information can be retrieved through a server or a main equipment cache list;
step 2: the master device calculates the Bluetooth name, the MAC address or the pairing code of the slave device through the shared information;
and step 3: the master device initiates a connection request to the slave device;
and 4, step 4: and the slave equipment judges that the information is correct and then completes automatic connection, and the user can execute application operation on the master equipment.
Example 5
As shown in fig. 5, the main embodiment provides another method for the master device and the slave device to achieve bluetooth automatic connection by sharing information, which includes the following steps:
step 1: scanning the two-dimensional code or the bar code of the slave equipment through an application program of the master equipment to obtain shared information;
step 2: the master device calculates the Bluetooth name, the MAC address or the pairing code of the slave device through the shared information;
and step 3: the master device initiates a connection request to the slave device;
and 4, step 4: and the slave equipment judges that the information is correct and then completes automatic connection, and the user can execute application operation on the master equipment.
Compared with the prior art, the method for realizing the automatic Bluetooth connection of the master device and the slave device by sharing the information achieves the following effects:
1. the invention carries out irreversible preprocessing such as SHA, SM3 or CRCxX before sharing the equipment information, and avoids information leakage;
2. the technical scheme of the invention ensures that the equipment cannot be directly connected in a non-contact manner, and the equipment is operated under the condition of judgment of the server and operators, so that the truth of information is ensured, and the slave equipment is effective;
3. the master equipment and the slave equipment of the coherent system are automatically connected, and mutual interference among a plurality of slave equipment does not exist;
4. the highlighted shared information acquisition mode (by scanning bar codes, two-dimensional codes, images and the like) is simple and intuitive, is convenient and fast to operate, and reduces the complexity of connection of the Bluetooth equipment;
5. the invention reduces the complexity of the flow when the device is repeatedly used;
6. the verification between the master device and the slave device is completed based on the sharing constraint of the shared information without using a secret key;
7. the shared information is protected by setting the retrieval information, because the shared information is usually private information and is not suitable for disclosure, more visual user information is obtained by retrieval and is replaced by setting the retrieval information, so that the user can judge whether the information is accurate, the information is not only visual, but also the shared information is disguised for one time;
8. the invention can be completed in a process or software mode without adding extra cost.
The foregoing description shows and describes several preferred embodiments of the invention, but as aforementioned, it is to be understood that the invention is not limited to the forms disclosed herein, but is not to be construed as excluding other embodiments and is capable of use in various other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as expressed herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (9)

1. A method for realizing Bluetooth automatic connection of a master device and a slave device through shared information is characterized by comprising the following steps:
the master device acquires the shared information of the slave devices;
the master device obtains the Bluetooth connection information of the slave device through the shared information; the Bluetooth connection information comprises a pairing code; the pairing code is obtained by respectively calculating the sharing information of the master equipment and the slave equipment;
the master device initiates a connection request to the slave device matched with the calculated pairing code;
the master device and the slave device perform mutual identity authentication, and the mutual identity authentication comprises the following steps: the method comprises the following steps that the master device authenticates the slave device, and the slave device authenticates the master device; the method for the master device to authenticate the legality of the slave device comprises the following steps:
step A: the master device sends a random number r1 to the slave device; and B: the slave device organizes the shared information UD and r1 into data UD | r1, and performs summary operation to obtain H1; and C: the slave device sends H1 to the master device; step D: the master device receives H1, and if the data is verified to be correct, the slave device is legal; the method for the slave device to authenticate the validity of the master device comprises the following steps: step a: the slave device generates a random number r2 and sends r2 to the master device; step b: the master device receives r2, organizes shared information UD and r2 into data UD | r2, and performs summary operation to obtain H2; step c: the master device returns H2 to the slave device; step d: h2 is received by the slave device, and if the data is verified to be correct, the master device is legal;
if the authentication is passed, the Bluetooth automatic connection is realized.
2. The method of claim 1, wherein the master device obtaining the shared information of the slave devices comprises:
the master device obtains shared information preset on the slave device through scanning; or
And the master device acquires the sharing information prestored in the master device prestored list or the server through inquiry.
3. The method of claim 1, wherein the bluetooth connection information comprises: bluetooth name, MAC address.
4. The method of claim 3, wherein the master device obtains the Bluetooth connection information of the slave device through the shared information, further comprising:
and the master equipment performs irreversible operation on the shared information, wherein the irreversible operation is the abstract operation of SHA and SM 3.
5. The method of claim 1, further comprising:
and the master equipment acquires the user information of the slave equipment, sets the user information as retrieval information matched with the slave equipment, and sends the retrieval information and the sharing information to a master equipment pre-stored list or a server for storage, wherein the retrieval information is used for being matched with the sharing information of the slave equipment in the master equipment pre-stored list or the server.
6. The method of claim 1, further comprising: and encrypting the shared information, and protecting a symmetric key by using a private key of the certificate.
7. The method of claim 5, wherein the retrieved information is a user name and a mobile phone number of the slave device.
8. The method of claim 1, wherein the shared information is displayed on the slave device by means of a two-dimensional code, a barcode, or image information.
9. The method of claim 1, wherein the shared information is a serial number of the slave device and user information.
CN201710664350.1A 2017-08-02 2017-08-02 Method for achieving Bluetooth automatic connection of master device and slave device through shared information Active CN107454558B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710664350.1A CN107454558B (en) 2017-08-02 2017-08-02 Method for achieving Bluetooth automatic connection of master device and slave device through shared information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710664350.1A CN107454558B (en) 2017-08-02 2017-08-02 Method for achieving Bluetooth automatic connection of master device and slave device through shared information

Publications (2)

Publication Number Publication Date
CN107454558A CN107454558A (en) 2017-12-08
CN107454558B true CN107454558B (en) 2020-11-24

Family

ID=60490836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710664350.1A Active CN107454558B (en) 2017-08-02 2017-08-02 Method for achieving Bluetooth automatic connection of master device and slave device through shared information

Country Status (1)

Country Link
CN (1) CN107454558B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108305068A (en) * 2018-01-17 2018-07-20 深圳喆行科技有限公司 A kind of recharge method and system of stored value card
CN109544877A (en) * 2018-12-28 2019-03-29 江苏惠通集团有限责任公司 Find method and device, storage medium, intelligent terminal, server, the remote control system of remote control equipment
CN112351390A (en) * 2019-08-09 2021-02-09 华为技术有限公司 Method for mutual identification or mutual communication of Bluetooth devices
CN111147602B (en) * 2019-12-31 2022-06-14 湖南中联重科智能技术有限公司 Networking method and networking device for master vehicle and slave vehicle
CN113676879A (en) * 2020-05-14 2021-11-19 华为技术有限公司 Method, electronic device and system for sharing information
CN111901122B (en) * 2020-07-14 2024-03-08 万通智控科技股份有限公司 Method for automatically matching head trailer and receiver
CN112351414B (en) * 2020-10-26 2021-11-02 北京达佳互联信息技术有限公司 Equipment control method, device, system and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113362A (en) * 2013-04-17 2014-10-22 深圳中兴网信科技有限公司 Bluetooth pairing method and device
CN104378145A (en) * 2014-11-27 2015-02-25 北京深思数盾科技有限公司 Pairing method and system of Bluetooth device
CN104954050A (en) * 2015-05-08 2015-09-30 深圳君正时代集成电路有限公司 Method and system for establishing connection between Bluetooth devices and device
CN105025433A (en) * 2015-07-09 2015-11-04 广东欧珀移动通信有限公司 Bluetooth pairing method and terminal
CN105554908A (en) * 2015-12-31 2016-05-04 福建联迪商用设备有限公司 Method, master device, slave device and system for achieving code scanning automatic bluetooth connection

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9686637B2 (en) * 2013-12-13 2017-06-20 Symbol Technologies, Llc Method of and system for pairing a Bluetooth master device with a Bluetooth slave device that is selected from a group of Bluetooth slave devices that are in Bluetooth-discoverable range with the Bluetooth master device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113362A (en) * 2013-04-17 2014-10-22 深圳中兴网信科技有限公司 Bluetooth pairing method and device
CN104378145A (en) * 2014-11-27 2015-02-25 北京深思数盾科技有限公司 Pairing method and system of Bluetooth device
CN104954050A (en) * 2015-05-08 2015-09-30 深圳君正时代集成电路有限公司 Method and system for establishing connection between Bluetooth devices and device
CN105025433A (en) * 2015-07-09 2015-11-04 广东欧珀移动通信有限公司 Bluetooth pairing method and terminal
CN105554908A (en) * 2015-12-31 2016-05-04 福建联迪商用设备有限公司 Method, master device, slave device and system for achieving code scanning automatic bluetooth connection

Also Published As

Publication number Publication date
CN107454558A (en) 2017-12-08

Similar Documents

Publication Publication Date Title
CN107454558B (en) Method for achieving Bluetooth automatic connection of master device and slave device through shared information
CN106603485B (en) Key agreement method and device
US7284127B2 (en) Secure communications
US9300474B2 (en) Enhanced authentication and/or enhanced identification of a secure element of a communication device
CN106304074B (en) Auth method and system towards mobile subscriber
EP2076995B1 (en) Method and system for a secure pki (public key infrastructure) key registration process on mobile environment
US9445269B2 (en) Terminal identity verification and service authentication method, system and terminal
CN103297403A (en) Method and system for achieving dynamic password authentication
CN110690956B (en) Bidirectional authentication method and system, server and terminal
CN108762791A (en) Firmware upgrade method and device
KR101706117B1 (en) Apparatus and method for other portable terminal authentication in portable terminal
CN108667791B (en) Identity authentication method
JP5380583B1 (en) Device authentication method and system
CN112953707A (en) Key encryption method, decryption method, data encryption method and decryption method
CN107733652B (en) Unlocking method and system for shared vehicle and vehicle lock
CN103888938A (en) PKI private key protection method of dynamically generated key based on parameters
CN115348076B (en) Equipment security authentication method and system based on attribute encryption and related devices thereof
CN112087302A (en) Device for encrypting and decrypting algorithm of asymmetric dynamic token
CN106605419A (en) Method and system for secure SMS communications
CN105141629A (en) Method for improving network security of public Wi-Fi based on WPA/WPA2 PSK multiple passwords
KR101358375B1 (en) Prevention security system and method for smishing
CN113392418B (en) Data deployment method and device, computer readable storage medium, deployment device and user side
CN111740995A (en) Authorization authentication method and related device
CN111064577A (en) Security authentication method and device and electronic equipment
US10200348B2 (en) Method to detect an OTA (over the air) standard message affected by an error

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Yue Yunlong

Inventor after: Li Dengfeng

Inventor before: Li Dengfeng