CN108282768B - Bluetooth device sharing control and request method and device, and computer storage medium - Google Patents

Bluetooth device sharing control and request method and device, and computer storage medium Download PDF

Info

Publication number
CN108282768B
CN108282768B CN201810067999.XA CN201810067999A CN108282768B CN 108282768 B CN108282768 B CN 108282768B CN 201810067999 A CN201810067999 A CN 201810067999A CN 108282768 B CN108282768 B CN 108282768B
Authority
CN
China
Prior art keywords
bluetooth
authentication
shared
request
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810067999.XA
Other languages
Chinese (zh)
Other versions
CN108282768A (en
Inventor
李文田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Horizon Robotics Technology Research and Development Co Ltd
Original Assignee
Beijing Horizon Robotics Technology Research and Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Horizon Robotics Technology Research and Development Co Ltd filed Critical Beijing Horizon Robotics Technology Research and Development Co Ltd
Priority to CN201810067999.XA priority Critical patent/CN108282768B/en
Publication of CN108282768A publication Critical patent/CN108282768A/en
Application granted granted Critical
Publication of CN108282768B publication Critical patent/CN108282768B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention relates to a sharing control and request method of Bluetooth equipment and electronic equipment. According to one embodiment, a method of controlling a sharing bluetooth device may include: receiving a Bluetooth sharing authentication request from a request device, wherein the authentication request comprises information of Bluetooth devices to be shared; establishing Bluetooth connection with the Bluetooth device to be shared; authenticating the request equipment; and responding to the authentication passing, applying for a temporary token for the request device from the Bluetooth device to be shared, and forwarding the temporary token to the request device.

Description

Bluetooth device sharing control and request method and device, and computer storage medium
Technical Field
The present application relates generally to the field of communications, and more particularly, to a method and apparatus for controlling and requesting sharing of bluetooth devices, and a computer storage medium.
Background
Bluetooth has the advantages of low cost, low power consumption, convenience, rapidness and the like as a short-distance wireless communication technical scheme, so that the Bluetooth is widely applied to various occasions and fields all the time. For example, in portable electronic devices, smart homes, or smart wearable devices, bluetooth connections have been used to establish connections between multiple devices to share data and/or various functions to enable convenient information sharing among, for example, family, friends.
Security is a very important consideration when establishing a bluetooth connection between devices. As more and more bluetooth devices become available, security issues become more and more important. For example, for bluetooth travel cases, bluetooth safes, bluetooth door locks, etc., or health related bluetooth devices (where personal health data relates to privacy), without a secure communication mechanism, personal data leakage or personal property loss may result. In order to ensure convenient sharing of bluetooth devices under the most secure possible right control, the conventional bluetooth sharing scheme requires the use of tokens (tokens). The Bluetooth device to be shared shares the token of the Bluetooth device to be shared to the sharing request device through the cloud, the sharing request device synchronously downloads the token of the Bluetooth device to be shared to the local, for example, a portable mobile terminal such as a smart phone from the cloud, and then the token and the Bluetooth device to be shared establish Bluetooth connection to directly establish a communication channel. When the connection is established with the Bluetooth device to be shared, the tokens of the requesting device end (such as a mobile phone) and the Bluetooth device end to be shared are compared, and if the tokens are not consistent, the connection is disconnected.
However, such a conventional bluetooth sharing method relies on a single token and cloud, which brings security risks and application limitations.
Disclosure of Invention
In view of the above prior art, the present application provides a bluetooth sharing scheme, where authentication of a bluetooth device to be shared is delegated to a bluetooth gateway, and if the request device passes the authentication, a sub-token is returned, and the request device communicates with the bluetooth device to be shared through the sub-token, without distributing the token of the bluetooth device to be shared to a sharing request device, and furthermore, a bluetooth sharing process does not need to be participated in by a cloud.
According to an example embodiment, a method of controlling a sharing bluetooth device may include: receiving a Bluetooth sharing authentication request from a request device, wherein the authentication request comprises information of Bluetooth devices to be shared; establishing Bluetooth connection with the Bluetooth device to be shared; authenticating the request equipment; and responding to the authentication passing, applying for a temporary token for the request device from the Bluetooth device to be shared, and forwarding the temporary token to the request device.
In some examples, authenticating the requesting device includes: returning the authentication mode supported by the Bluetooth device to be shared to the request device; receiving authentication information from the requesting device; and comparing the authentication information from the requesting device with pre-stored authentication information.
In some examples, authenticating the requesting device includes: returning the authentication mode supported by the Bluetooth device to be shared to the request device; receiving authentication information from the requesting device; and forwarding the authentication information from the requesting device to the cloud, so that the cloud compares the authentication information from the requesting device with pre-stored authentication information.
In some examples, authenticating the requesting device includes: returning the authentication mode supported by the Bluetooth device to be shared to the request device; receiving authentication information from the requesting device; and forwarding the authentication information from the requesting device to the user's personal electronic device for real-time authentication by the user.
In some examples, the authentication means includes at least one of facial recognition, fingerprint recognition, voice recognition, password verification, and security issues.
In some examples, the method further comprises: when the Bluetooth device to be shared is powered on for the first time, establishing Bluetooth connection with the Bluetooth device to be shared; and generating a root token and storing the root token in the Bluetooth device to be shared.
In some examples, the temporary token includes device information of the requesting device.
In some examples, the communication with the requesting device includes bluetooth communication or non-bluetooth communication.
According to another exemplary embodiment, a method of requesting sharing of a bluetooth device may include: sending an authentication request to a gateway, wherein the authentication request comprises information of Bluetooth equipment to be shared; receiving an authentication mode supported by the Bluetooth device to be shared from the gateway; acquiring authentication information in the authentication mode and sending the authentication information to the gateway; receiving a temporary token for the Bluetooth device to be shared from the gateway; and establishing Bluetooth connection with the Bluetooth device to be shared by using the temporary token and carrying out Bluetooth communication.
In some examples, collecting authentication information includes: selecting one of the received authentication modes and calling a corresponding authentication interface; and acquiring authentication information under the called authentication interface.
In some examples, the method further comprises: before sending an authentication request to a gateway, initiating a Bluetooth connection request to the Bluetooth device to be shared; and receiving a connection failure message from the Bluetooth device to be shared, wherein the connection failure message comprises an authentication indication.
In some examples, the authentication indication includes information of the gateway.
According to another exemplary embodiment, an electronic device may include: the Bluetooth module is used for carrying out communication by using a Bluetooth communication protocol; and a processor configured to execute the computer program instructions in the memory to perform the above-described method.
In some examples, the electronic device further comprises: and the other communication module is used for carrying out communication by using a communication protocol other than the Bluetooth communication protocol.
In some examples, the electronic device comprises a cell phone, a tablet, a personal digital assistant, or a gateway.
According to another exemplary embodiment, a computer-readable storage medium is provided, on which computer program instructions are stored, which, when executed by a processor, cause the processor to carry out the above-mentioned method.
The Bluetooth sharing scheme does not depend on a token, and delegates the authentication of the Bluetooth equipment to be shared to the Bluetooth gateway, so that the authentication mode is various and flexible; the token is split into a root token and a sub-token, the gateway holds the root token, the sub-token (temporary token) is returned if the request device passes the authentication, the request device communicates with the Bluetooth device to be shared through the sub-token, the token of the Bluetooth device to be shared does not need to be distributed to the sharing request device, the Bluetooth sharing process does not need to be participated in by a cloud, the whole authentication process can be monitored in real time, and the Bluetooth sharing safety is enhanced.
The foregoing and other features and advantages of the present application will become apparent from the following description of exemplary embodiments.
Drawings
The above and other objects, features and advantages of the present application will become more apparent by describing in more detail embodiments of the present application with reference to the attached drawings. The accompanying drawings are included to provide a further understanding of the embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application. In the drawings, like reference numbers generally represent like parts or steps.
Fig. 1 illustrates a system topology diagram of bluetooth device sharing according to an exemplary embodiment of the present application.
Fig. 2 illustrates a flowchart of a bluetooth device sharing method according to an exemplary embodiment of the present application.
FIG. 3 illustrates a block diagram of an electronic device according to an exemplary embodiment of the present application.
Detailed Description
Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be understood that the described embodiments are only some embodiments of the present application and not all embodiments of the present application, and that the present application is not limited by the example embodiments described herein.
As described above, the conventional bluetooth sharing scheme has the following problems:
1. the traditional Bluetooth authentication needs to use a token, an encryption string is generated at a mobile phone or a cloud end to serve as the token, and the token is written into a device, and after Bluetooth connection is established each time, whether the token is matched or not needs to be compared. This authentication approach is too application dependent and may no longer be able to communicate with the bluetooth device if the token is revealed or lost. The application end is easy to crack, the encryption algorithm can be cracked through decompiling codes, and then a real token is obtained through packet capture and reverse direction; in addition, the application terminal can be counterfeited to communicate with the Bluetooth device, although the application terminal certificate can be verified to prevent counterfeiting, the participation of a cloud terminal is required, and the cloud terminal cannot be connected to perform verification communication when a network fails;
2. the Bluetooth device to be shared can be used without limit as long as the token is taken by relying on a single token;
3. a rich authentication mechanism is lacking.
In view of the above-mentioned drawbacks in the prior art, the basic concept of the present application is to provide a method for controlling a sharing bluetooth device, a method for requesting to share a bluetooth device, an electronic device, a computer program product, and a computer-readable storage medium, where authentication of a bluetooth device to be shared is delegated to a bluetooth gateway, the authentication modes are various and flexible, the gateway holds a root token, and if the authentication of the requesting device passes, a sub-token (temporary token) is returned, and the requesting device communicates with the bluetooth device to be shared through the sub-token without distributing the token of the bluetooth device to be shared to the requesting device.
It should be noted that the basic concept of the present application can be applied to smart home or smart wearable scenes, and can also be applied to other system applications as long as the related devices participating in communication have a bluetooth communication function. For example, the present application is equally applicable to bluetooth device sharing applications in industrial environments, such as sharing bluetooth devices in scenarios involving bluetooth communication in internet of things applications.
Having described the general principles of the present application, various non-limiting embodiments of the present application will now be described with reference to the accompanying drawings.
Fig. 1 illustrates a system topology diagram of bluetooth device sharing according to an exemplary embodiment of the present application, which shows a typical bluetooth sharing application scenario. As shown in fig. 1, to connect to and use the device to be shared E, the sharing requesting device B is authenticated by the bluetooth gateway a. Taking a home environment as an example, the intelligent household appliances to be shared, such as a sound box, a television, a floor cleaning robot, an air purifier, etc., are registered on the bluetooth gateway a. The guest's mobile phone or tablet may serve as a sharing request device B that requests sharing to use smart home appliances such as a speaker, a television, a floor sweeping robot, an air purifier, and the like. The gateway a, the sharing requesting device B, and the device to be shared E each have a bluetooth communication module so as to be able to perform various bluetooth operations described in detail below. In the illustrated bluetooth sharing application scenario, the sharing requesting device B performs authentication at the gateway a, and then establishes bluetooth connection with the device E to be shared, which is described in detail below. In addition, the gateway a and the sharing request device B may also have a second communication module different from the bluetooth communication module, for example, a WIFI communication module, an internet communication module, or a mobile communication module such as 3G, 4G, and 5G, so that the gateway a and the sharing request device B may also communicate with each other through other communication means other than bluetooth. The cloud represents a background server, and generally provides necessary auxiliary background services through various wireless communication modes, which will be described in detail later.
It should be noted that the above application scenarios are only shown for the convenience of understanding the spirit and principles of the present application, and the embodiments of the present application are not limited thereto. Rather, embodiments of the present application may be applied to any scenario where it may be applicable. For example, in any application environment such as home, industry, and the like, two or more sharing request devices may be included, the device to be shared and the gateway may also be one or more pairs, and one gateway may also control two or more devices to be shared.
In the following, with reference to fig. 2, a bluetooth device sharing method according to an exemplary embodiment of the present application is described with reference to an application scenario of fig. 1. Fig. 2 illustrates a flowchart of a bluetooth device sharing method 100 according to an exemplary embodiment of the present application. As shown in fig. 2, the bluetooth device sharing method 100 includes a method step of requesting to share a bluetooth device and a method step executed by a gateway to control sharing of the bluetooth device to be shared.
When a newly purchased device E to be shared, such as a smart home device, is used at the initial power-on, a bluetooth broadcast may be sent and indicate that it is currently in an initial state. At this time, as shown in step S110, the gateway a listens to the bluetooth broadcast of the device to be shared E, and establishes a bluetooth connection with the device to be shared E. After establishing the bluetooth connection, in step S120, the bluetooth gateway a may generate and write a root token into the bluetooth device E, which is also stored locally by the gateway a. Preferably, the root token may be stored encrypted. In some embodiments, the root token may be stored in a suitable location such that the root token is not cleared even if bluetooth device E is reset. Furthermore, only the gateway holding the root token can initiate a request to the bluetooth device E to change the root token. Once the root token is altered, all of the original child tokens are invalidated. The device E may also have information of the gateway a stored therein, and the device E regards the gateway a as a management device. In other embodiments, bluetooth device E may also clear the root token stored therein upon reset, at which time gateway a may reconfigure the root token.
Although not shown here, the user may configure information at gateway a that the authentication needs to use, such as a password, a photograph of the user and his family, a fingerprint, a voiceprint, etc., for use by the authentication process described later. The authentication information may be stored at gateway a, so that the authentication step is performed directly at gateway a; in other embodiments, the authentication information may be stored in the cloud, such that the authentication step is performed at the cloud. It should also be understood that the authentication information may be for a plurality of bluetooth devices E connected to the gateway a, or separate authentication information may be configured for each bluetooth device E.
Then, when the sharing request device B is to use the bluetooth device E, it may issue a connection request to the bluetooth device E, as shown in step S130. At this time, if the requesting device B has the token of the bluetooth device E, i.e., the token is determined to be valid in step S140, the method 100 proceeds to step S150, and the requesting device B successfully establishes a connection with the bluetooth device E, and starts communication. On the other hand, if the requesting device B does not have the token of the bluetooth device E, or the existing token has expired, it cannot successfully establish a connection with the bluetooth device E. At this point, the method 100 proceeds to step S160, where the bluetooth device E sends a connection failure message to the requesting device B, where the message may include an authentication indication, that is, the requesting device B is instructed to go to the gateway a for the authentication step. Upon receiving the authentication indication, requesting device B may proceed to the gateway a for authentication based on the indication, as described in detail below.
In other embodiments, for example for a user familiar with the system of the present invention, steps S130-S160 may be skipped and authentication may be performed directly at gateway a. The gateway device typically has its specific device name and/or device type, and the user of requesting device B can click directly on gateway a in the scanned device list to perform the authentication process described below.
With reference to fig. 2, in step S170, the sharing requesting device B sends a bluetooth sharing authentication request for the bluetooth device E to be shared to the gateway a. For example, the user of the requesting device B may click on the gateway a in the device list and select the bluetooth device E to be authenticated, so that the authentication request sent to the gateway a may include information of the bluetooth device E to be shared. In some embodiments, the information of the bluetooth device E to be shared may include one or more of a MAC address, a device unique identification dID, a device name, a device userid (user ID), and the like. Preferably, at least the MAC address is included so that the gateway a can easily determine the bluetooth device E that needs authentication.
In step S180, after receiving the bluetooth sharing authentication request, the gateway a establishes a bluetooth connection with the bluetooth device E to be shared. For example, the gateway a may first inquire whether the bluetooth device E is the device it manages, i.e., whether the root token of the bluetooth device E exists locally. If not, a failure message is sent to the requesting device B indicating the reason for the failure. If the Bluetooth device E exists, the gateway A establishes Bluetooth connection with the Bluetooth device E to be shared by using the root token. If a connection cannot be established with the bluetooth device E, a failure message is also sent to the requesting device B indicating the reason for the failure. The failure message may be, for example, "no such device", "no connection can be established with device E", "device E is occupied, please try again later", etc. After receiving the failure message, the user of the requesting device B may determine the failure reason, for example, check whether the correct gateway is selected, whether the bluetooth device E is powered on and operating normally, and take corresponding measures, for example, reselect the correct gateway a for authentication, or power on the bluetooth device E, or determine whether the bluetooth device E is in a connectable state again through bluetooth scanning, and the like.
When the gateway a successfully establishes a connection with the bluetooth device E to be shared, in step S190, the gateway a returns the authentication mode supported by the bluetooth device E to the requesting device B. For example, examples of authentication means may include, but are not limited to, facial recognition, fingerprint recognition, voice recognition, password verification, or the like. Other suitable authentication means may be used, such as answering security questions, etc. It will be appreciated that when the authentication mode is to answer a security question, the gateway a also sends the question to the requesting device B.
Next, in step S200, the requesting device B may select one of the received authentication manners that is supported by the requesting device B, invoke an authentication interface matched with the authentication manner, collect and initiate authentication information to the gateway a. For example, if the authentication mode is facial recognition, the requesting device B may invoke a camera; if the authentication mode is fingerprint identification, a fingerprint recognizer can be called. Alternatively, a microphone may also be invoked for speech recognition, an input box may be invoked for password or security issue authentication, and so forth. The authentication information collected by the requesting device B is sent to the gateway a to perform authentication.
In step S210, authentication is performed based on the authentication information transmitted by the requesting device B. In some embodiments, authentication may be performed directly at gateway a. For example, the authentication information sent by the requesting device B may be compared with the authentication information stored locally by the gateway a, and if the two are consistent, the authentication is passed; if not, authentication fails. In other embodiments, the authentication may also be performed in the cloud, and the gateway a forwards the authentication information sent by the requesting device B to the cloud. Gateway a may send information about the authentication process to the personal device of its user, e.g. a mobile phone, so that the user of gateway a may monitor the authentication process in real time. In still other embodiments, gateway a may also forward the authentication information from requesting device B to the personal device, e.g., a cell phone, of the user of gateway a, who performs the authentication in real time. When authentication is performed, the use authority of the requesting device B to the bluetooth device E can also be set, which can be preset or set by the user of the gateway a in real time.
If the authentication fails, the gateway a sends a message of the authentication failure to the requesting device B in step S220, and the method 100 ends. The requesting device B may re-perform some of the steps of the method 100 to perform authentication.
If the authentication is successful, the gateway a applies for a temporary token to the bluetooth device E and returns to the requesting device B in step S230. The temporary token may contain device information of the requesting device B and usage right information given thereto, and the like. The device information may include, for example, one or more of the MAC address of the requesting device B, the device unique identification dID, the device name, the device userid (user ID), and the like. The usage right information includes, for example, a usage time, an operation right, and the like. After receiving the temporary token, the requesting device B may go to step S130 to initiate a bluetooth connection request with the bluetooth device E. With the temporary token, the requesting device B can successfully establish a bluetooth connection with the bluetooth device E, perform bluetooth communication, and thereby complete the sharing process.
In the above embodiment, the gateway authenticates the requesting device, the authentication mode can be diversified and flexible, the authentication process is transplanted from the requesting device application layer of the mobile phone to the gateway system layer, the gateway can be equipped with a secure encryption chip, and a standard authentication mechanism is configured in the system layer, for example, the authentication mechanism can include voice images, and the security is greatly enhanced. The requesting device generally has limited computing capability, cannot perform a complicated and higher-security authentication mechanism, and the gateway can not perform the authentication process by replacing the requesting device with the gateway, so that a complicated authentication mode can be supported, and only the requesting device needs to be informed of which authentication mechanism is selected. Furthermore, the gateway can be connected to a background server to realize cloud authentication. Furthermore, the real token is not distributed to the request device, but the token is divided into a root token and a sub-token, the root token is used for authentication, the Bluetooth device generates a temporary token (sub-token) after the authentication is finished, and the number limit and the expiration time limit are carried out on the Bluetooth connection, so that the safety can be improved. In addition, the authentication process can be monitored in real time. Therefore, the security of Bluetooth sharing is ensured.
FIG. 3 illustrates a block diagram of an electronic device according to an exemplary embodiment of the present application. It should be understood that the electronic device 200 according to an exemplary embodiment of the present application may be any one of the gateway a, the sharing requesting device B, and the bluetooth device to be shared E. As shown in fig. 3, the electronic device 200 may include a processor 210 and a bluetooth module 220, which are connected to each other through a bus 280.
The processor 210 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device to perform desired functions. Bluetooth module 220 may communicate using the bluetooth protocol. Processor 210 is coupled to bluetooth module 220 via bus 280 to control their operation.
With continued reference to fig. 3, in an example, the electronic device 200 can also include a communication module 230. The communication module 230 may communicate using a protocol different from the bluetooth protocol. For example, the communication module 230 may be a WIFI communication module, an internet communication module, or a mobile communication network communication module, etc.
In another example, the electronic device 200 may also include a camera 240 for taking a picture of the user of the requesting device B, for example, to implement a facial recognition authentication approach. In another example, the electronic device 200 may further include a memory 250, an input unit 260, and an output unit 270. Memory 250 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. Volatile memory can include, for example, Random Access Memory (RAM), cache memory (or the like). The non-volatile memory may include, for example, Read Only Memory (ROM), a hard disk, flash memory, and the like. One or more computer program instructions may be stored on a computer-readable storage medium and executed by a processor to implement the bluetooth device sharing methods of the embodiments of the present application above and/or other desired functionality. The input unit 260 and the output unit 270 may perform various input and output functions. Examples of the input unit 260 include, but are not limited to, a microphone, a fingerprint recognizer, a keyboard, a touch pad, and the like, and examples of the output unit 270 include, but are not limited to, a display, a speaker, an indicator light, and the like. In one embodiment, the input unit 260 and the output unit 270 may be integrated into a single device, such as a touch screen display. The processor 210 and the above-described communication module 230, camera 240, memory 250, input unit 260, and output unit 270 may be connected through a bus 280 to control their operations.
As a specific and preferred embodiment, the electronic device 200 shown in fig. 3 may comprise a portable electronic device such as a cell phone, tablet, personal digital assistant, or gateway.
In addition to the above methods and devices, embodiments of the present application may also be a computer program product comprising computer program instructions that, when executed by a processor, cause the processor to perform the steps in the bluetooth device sharing method according to embodiments of the present application described above.
The computer program product may be written with program code for performing the operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium having stored thereon computer program instructions, which, when executed by a processor, cause the processor to perform the steps in the bluetooth device sharing method according to the embodiments of the present application described above.
The computer-readable storage medium may take any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing describes the general principles of the present application in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present application are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present application. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the foregoing disclosure is not intended to be exhaustive or to limit the disclosure to the precise details disclosed.
The block diagrams of devices, apparatuses, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the components or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit embodiments of the application to the form disclosed herein. While a number of example aspects and embodiments have been discussed above, those of skill in the art will recognize certain variations, modifications, alterations, additions and sub-combinations thereof.

Claims (16)

1. A method performed by a gateway to control sharing bluetooth devices, comprising:
receiving a Bluetooth sharing authentication request from a request device, wherein the authentication request comprises information of Bluetooth devices to be shared;
establishing Bluetooth connection with the Bluetooth device to be shared;
authenticating the request equipment; and
and responding to the authentication passing, applying for a temporary token for the request device from the Bluetooth device to be shared, and forwarding the temporary token to the request device.
2. The method of claim 1, wherein authenticating the requesting device comprises:
returning the authentication mode supported by the Bluetooth device to be shared to the request device;
receiving authentication information from the requesting device; and
comparing authentication information from the requesting device with pre-stored authentication information.
3. The method of claim 1, wherein authenticating the requesting device comprises:
returning the authentication mode supported by the Bluetooth device to be shared to the request device;
receiving authentication information from the requesting device; and
and forwarding the authentication information from the request equipment to the cloud end so as to compare the authentication information from the request equipment with the prestored authentication information by the cloud end.
4. The method of claim 1, wherein authenticating the requesting device comprises:
returning the authentication mode supported by the Bluetooth device to be shared to the request device;
receiving authentication information from the requesting device; and
the authentication information from the requesting device is forwarded to the user's personal electronic device for real-time authentication by the user.
5. The method of any of claims 2 to 4, wherein the authentication means comprises at least one of facial recognition, fingerprint recognition, voice recognition, password verification, and security issues.
6. The method of claim 1, further comprising:
when the Bluetooth device to be shared is powered on for the first time, establishing Bluetooth connection with the Bluetooth device to be shared; and
generating a root token and storing the root token in the Bluetooth device to be shared.
7. The method of claim 1, wherein the temporary token includes device information of the requesting device.
8. The method of claim 1, wherein the communication with the requesting device comprises bluetooth communication or non-bluetooth communication.
9. A method performed by a requesting device to request sharing of bluetooth devices, comprising:
sending an authentication request to a gateway, wherein the authentication request comprises information of Bluetooth equipment to be shared;
receiving an authentication mode supported by the Bluetooth device to be shared from the gateway;
acquiring authentication information in the authentication mode and sending the authentication information to the gateway;
receiving a temporary token for the Bluetooth device to be shared from the gateway; and
and establishing Bluetooth connection with the Bluetooth device to be shared by using the temporary token and carrying out Bluetooth communication.
10. The method of claim 9, wherein collecting authentication information comprises:
selecting one of the received authentication modes and calling a corresponding authentication interface; and
and acquiring authentication information under the called authentication interface.
11. The method of claim 9, further comprising:
before sending an authentication request to a gateway, initiating a Bluetooth connection request to the Bluetooth device to be shared; and
and receiving a connection failure message from the Bluetooth device to be shared, wherein the connection failure message comprises an authentication indication.
12. The method of claim 11, wherein the authentication indication includes information of the gateway.
13. An electronic device, comprising:
the Bluetooth module is used for carrying out communication by using a Bluetooth communication protocol; and
a processor configured to execute a computer program in a memory to perform the method of any of claims 1-12.
14. The electronic device of claim 13, further comprising: and the other communication module is used for carrying out communication by using a communication protocol other than the Bluetooth communication protocol.
15. The electronic device of claim 14, wherein the electronic device comprises a cell phone, a tablet, a personal digital assistant, or a gateway.
16. A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, causes the processor to carry out the method according to any one of claims 1-12.
CN201810067999.XA 2018-01-24 2018-01-24 Bluetooth device sharing control and request method and device, and computer storage medium Active CN108282768B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810067999.XA CN108282768B (en) 2018-01-24 2018-01-24 Bluetooth device sharing control and request method and device, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810067999.XA CN108282768B (en) 2018-01-24 2018-01-24 Bluetooth device sharing control and request method and device, and computer storage medium

Publications (2)

Publication Number Publication Date
CN108282768A CN108282768A (en) 2018-07-13
CN108282768B true CN108282768B (en) 2019-12-31

Family

ID=62804852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810067999.XA Active CN108282768B (en) 2018-01-24 2018-01-24 Bluetooth device sharing control and request method and device, and computer storage medium

Country Status (1)

Country Link
CN (1) CN108282768B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218994B (en) * 2018-09-05 2021-09-17 北京字节跳动网络技术有限公司 Equivalent equipment Bluetooth communication method and device based on gateway
CN109219028B (en) * 2018-09-05 2021-09-17 北京字节跳动网络技术有限公司 Equivalent device Bluetooth communication method and device based on cloud
CN110234073B (en) * 2019-07-26 2022-01-04 腾讯科技(深圳)有限公司 Positioning method, device and storage medium based on Bluetooth positioning
CN110401924A (en) * 2019-07-31 2019-11-01 东莞市云茂智能科技有限公司 A kind of method and system resetting bluetooth equipment by NFC mode

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022292A (en) * 2006-02-14 2007-08-22 南京大学 Portable bluetooth help-seeking device
CN104202299A (en) * 2014-08-06 2014-12-10 北京中金国信科技有限公司 System and method of identity authentication based on Bluetooth
CN104994073A (en) * 2015-05-29 2015-10-21 北京奇虎科技有限公司 Cell phone terminal, server and account-device linking control and executing method
CN105391715A (en) * 2015-11-12 2016-03-09 吴迪 Expansion method and apparatus for wearable equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022292A (en) * 2006-02-14 2007-08-22 南京大学 Portable bluetooth help-seeking device
CN104202299A (en) * 2014-08-06 2014-12-10 北京中金国信科技有限公司 System and method of identity authentication based on Bluetooth
CN104994073A (en) * 2015-05-29 2015-10-21 北京奇虎科技有限公司 Cell phone terminal, server and account-device linking control and executing method
CN105391715A (en) * 2015-11-12 2016-03-09 吴迪 Expansion method and apparatus for wearable equipment

Also Published As

Publication number Publication date
CN108282768A (en) 2018-07-13

Similar Documents

Publication Publication Date Title
US8272038B2 (en) Method and apparatus for secure authorization
CN108282768B (en) Bluetooth device sharing control and request method and device, and computer storage medium
JP4301997B2 (en) Authentication method for information appliances using mobile phones
US10116448B2 (en) Transaction authorization method and system
CN107567009B (en) Bluetooth device sharing request and control method and device, and computer storage medium
WO2016197934A1 (en) Barcode security authentication method
CN107708099B (en) Bluetooth device sharing request and control method and device, and readable storage medium
CN105656850B (en) Data processing method, related device and system
KR20090022425A (en) Multiple authentication access system and the method thereof
TWI636632B (en) Electric vehicle charging method and charging station
WO2017206524A1 (en) Electronic device control method, terminal and control system
US20200196143A1 (en) Public key-based service authentication method and system
JP3927142B2 (en) Remote control system and relay device
US7590842B2 (en) Service providing system and authentication system, as well as signature generating apparatus, service utilizing apparatus and verification apparatus
KR102308859B1 (en) Surrogate authentication service system and method based on biometric information
KR20220167366A (en) Cross authentication method and system between online service server and client
JP6385100B2 (en) Information processing apparatus, information processing system, information processing apparatus control method, and computer program
JP2017102842A (en) Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program
KR20230138502A (en) Code-based two-factor authentication
KR20190011595A (en) Authentication method and apparatus for sharing login ID
JP6467609B2 (en) Identification system
CN107979468B (en) A kind of identity identifying method and equipment based on SIM card
KR101879842B1 (en) User authentication method and system using one time password
WO2017210977A1 (en) Method and apparatus for management terminal to access wi-fi
WO2023141864A1 (en) Conference data transmission method, apparatus and system, electronic device and readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant