CN109168162A - Bluetooth communication encryption method, device and intelligent security guard equipment - Google Patents

Bluetooth communication encryption method, device and intelligent security guard equipment Download PDF

Info

Publication number
CN109168162A
CN109168162A CN201811385947.3A CN201811385947A CN109168162A CN 109168162 A CN109168162 A CN 109168162A CN 201811385947 A CN201811385947 A CN 201811385947A CN 109168162 A CN109168162 A CN 109168162A
Authority
CN
China
Prior art keywords
key
ciphertext
user terminal
bluetooth communication
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811385947.3A
Other languages
Chinese (zh)
Other versions
CN109168162B (en
Inventor
钟桂鑫
许小阳
孟宪军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING QIANDING INTERNET TECHNOLOGY Co Ltd
Original Assignee
BEIJING QIANDING INTERNET TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING QIANDING INTERNET TECHNOLOGY Co Ltd filed Critical BEIJING QIANDING INTERNET TECHNOLOGY Co Ltd
Priority to CN201811385947.3A priority Critical patent/CN109168162B/en
Publication of CN109168162A publication Critical patent/CN109168162A/en
Application granted granted Critical
Publication of CN109168162B publication Critical patent/CN109168162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of Bluetooth communication encryption method, device and intelligent security guard equipment, the Bluetooth communication decryption method includes: to generate the time in preset key, use random number generator to generate random code to broadcast as initial key, and by initial key to user terminal;It is encrypted using current key to sent ciphertext in user terminal, encrypted ciphertext is then sent by Blue-tooth communication method;Receive the ciphertext sent by user terminal and the actual key encrypted to ciphertext;Judge whether actual key is consistent with initial key;When actual key is consistent with initial key, the ciphertext is decrypted using initial key, obtains plaintext corresponding with the ciphertext.Bluetooth communication encryption method of the invention, generate new key at preset time intervals by decryption end equipment, make key that will fail after the regular hour, so that the ciphertext and key that prevent user terminal from sending utilize again after maliciously being intercepted, improves the safety of Bluetooth communication.

Description

Bluetooth communication encryption method, device and intelligent security guard equipment
Technical field
The present invention relates to technical field of bluetooth communication, in particular to a kind of Bluetooth communication encryption method, device, intelligence It can security device and computer storage medium.
Background technique
With the continuous development of the communication technology and smart machine, the communication mode between smart machine is also increasing, Under different scenes, different smart machines will use the optimal communication mode of communication efficiency.Low coverage is carried out in smart machine When from communication, Bluetooth communication can be generally used, to guarantee the efficiency of communication.
Bluetooth communication between existing smart machine all can first carry out encryption of plaintext when transmitting various plaintexts, then By encrypted ciphertext and the cipher key delivery used is encrypted to receiving end by bluetooth.For example, when transmitting instruction, transmitting terminal Encrypted instruction and key can be sent to receiving end, during transmission, once instruction and the key quilt of encryption It intercepts and captures, when the instruction of encryption and key are sent to receiving end again by intercepting and capturing side, which, which can be decrypted correctly out, is instructed simultaneously It executes.Therefore, its safety of the mode of existing Bluetooth communication encryption is very low.
Summary of the invention
In view of the above problems, the present invention provides a kind of Bluetooth communication encryption method, device, intelligent security guard equipment and calculating Machine storage medium, to improve the safety of Bluetooth communication.
To achieve the goals above, the present invention adopts the following technical scheme that:
A kind of Bluetooth communication encryption method, comprising:
The time is generated in preset key, random number generator is used to generate random code as initial key, and will be described Initial key is broadcasted to user terminal;
It is encrypted using current key to sent ciphertext in user terminal, is then sent by Blue-tooth communication method Encrypted ciphertext;
Receive the ciphertext sent by user terminal and the actual key encrypted to the ciphertext;
Judge whether the actual key is consistent with the initial key;
When the actual key is consistent with the initial key, the ciphertext is solved using the initial key It is close, obtain plaintext corresponding with the ciphertext.
In above-mentioned Bluetooth communication encryption method, the algorithm that the ciphertext is encrypted and decrypted includes that AES is calculated Method.
Preferably, the Bluetooth communication encryption method, further includes:
After the ciphertext is decrypted using the actual key, random code is generated using random number generator immediately To update the initial key, and the initial key of update is broadcasted to user terminal.
Preferably, the Bluetooth communication encryption method, further includes:
The random key that the user terminal is generated and broadcasted using random number generator is received, the random key is utilized The plaintext being sent to the user terminal to needs encrypts, and generates ciphertext to be transmitted;
The ciphertext to be transmitted and the random key are sent to the user terminal.
The present invention also provides a kind of Bluetooth communication encryption devices, comprising:
Key production module, for preset key generate the time, use random number generator generate random code as Initial key, and the initial key is broadcasted to user terminal;
Then ciphertext encrypting module is led to for being encrypted using current key to sent ciphertext in user terminal It crosses Blue-tooth communication method and sends encrypted ciphertext;
Ciphertext receiving module, for receiving the ciphertext sent by user terminal and the reality encrypted to the ciphertext Key;
Key judgment module, for judging whether the actual key is consistent with the initial key;
Ciphertext deciphering module, for utilizing the initial key when the actual key is consistent with the initial key The ciphertext is decrypted, plaintext corresponding with the ciphertext is obtained.
In above-mentioned Bluetooth communication encryption device, the algorithm that the ciphertext is encrypted and decrypted includes aes algorithm.
Preferably, the Bluetooth communication encryption device, further includes:
Key updating module, for utilizing immediately random after the ciphertext is decrypted using the actual key Code generator generates random code to update the initial key, and the initial key of update is broadcasted to user terminal.
Preferably, the Bluetooth communication encryption device, further includes:
Ciphertext encrypting module, for receiving that the user terminal generates and broadcasted using random number generator with secret Key is encrypted using the plaintext that the random key is sent to the user terminal needs, generates ciphertext to be transmitted;
Ciphertext sending module, for the ciphertext to be transmitted and the random key to be sent to the user terminal.
The present invention also provides a kind of intelligent security guard equipment, including memory and processor, the memory is for storing Computer program, the processor runs the computer program so that the intelligent security guard equipment executes the Bluetooth communication Encryption method.
The present invention also provides a kind of computer storage medium, it is stored with meter used in the intelligent security guard equipment Calculation machine program.
The present invention provides a kind of Bluetooth communication encryption method, which includes: raw in preset key At the time, uses random number generator to generate random code and broadcast as initial key, and by the initial key to user terminal; It is encrypted, is then sent by Blue-tooth communication method encrypted to sent ciphertext using current key in user terminal Ciphertext;Receive the ciphertext sent by user terminal and the actual key encrypted to the ciphertext;Judge that the reality is close Whether key is consistent with the initial key;When the actual key is consistent with the initial key, the initial key is utilized The ciphertext is decrypted, plaintext corresponding with the ciphertext is obtained.Bluetooth communication encryption method of the invention, by decrypting end Equipment generates new key at preset time intervals, makes key that will fail after the regular hour, to prevent user whole It is utilized again after holding the ciphertext sent and key maliciously to be intercepted, improves the safety of Bluetooth communication.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of the scope of the invention.
Fig. 1 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 1 provides;
Fig. 2 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 2 provides;
Fig. 3 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 3 provides;
Fig. 4 is a kind of structural schematic diagram for Bluetooth communication encryption device that the embodiment of the present invention 4 provides;
Fig. 5 is the structural schematic diagram for another Bluetooth communication encryption device that the embodiment of the present invention 4 provides;
Fig. 6 is the structural schematic diagram for the third Bluetooth communication encryption device that the embodiment of the present invention 4 provides.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
Embodiment 1
Fig. 1 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 1 provides, and this method includes following step It is rapid:
Step S11: generating the time in preset key, and random number generator is used to generate random code as initial key, And initial key is broadcasted to user terminal.
In the embodiment of the present invention, it is provided with random number generator in the decryption end equipment for needing to carry out Bluetooth communication, and The random number generator is opened in preset time interval and generates random code, using the random code of generation as initial key. Wherein, the decryption end equipment, such as can be the intelligent security guards equipment such as access control equipment or intelligent door lock, it is connected using Bluetooth communication User terminal receives user terminal and utilizes the operational order of key encryption, and carries out the decryption of the encrypted instruction and run this referring to It enables.
In the embodiment of the present invention, which can generate program for a random code, which is stored in solution It in the memory of close end equipment, activates according to the preset time interval, and activates one random code of generation every time, and should The key that random code is encrypted and decrypted as Bluetooth communication.Wherein, which passes through bluetooth after generating initial key It broadcasts to the user terminal for needing to carry out Bluetooth communication.The prefixed time interval, such as can be for every generation one in one minute New random code or five minutes etc., here without limitation, can be set by staff.
Step S12: it is encrypted using current key to sent ciphertext in user terminal, then passes through Bluetooth communication Mode sends encrypted ciphertext.
Step S13: the ciphertext sent by user terminal and the actual key encrypted to ciphertext are received.
In the embodiment of the present invention, which receives the ciphertext for needing to carry out the user terminal of Bluetooth communication, and User terminal carries out the actual key that encryption uses.Wherein, it is the solution which, which carries out the actual key that encryption uses, The key that close terminal generates, which should can automatically update after the preset period with random code, therefore the key meeting It fails because of overlong time.
Step S14: judge whether actual key is consistent with initial key.
In the embodiment of the present invention, the decryption end equipment is in the ciphertext and corresponding actual key for receiving user terminal transmission Afterwards, it can use the corresponding actual key to be compared with initial key in decryption terminal, judge whether two keys are consistent, Namely judge whether the actual key that user terminal uses is no longer valid.Wherein, which can use algorithm or application Program is realized, such as can be provided with comparison algorithm in decryption end equipment, in the actual key for receiving user terminal and sending Afterwards, it carries out algorithm using the key of initial key and the user terminal to compare, character is compared one by one, judges all of key Whether character is consistent.
Step S15: when actual key is consistent with initial key, being decrypted ciphertext using initial key, obtain with The corresponding plaintext of ciphertext.
In the embodiment of the present invention, when decrypting end determines that initial key is consistent with the actual key that user terminal is sent, That is it when the actual key of user terminal transmission is also effective, is then decrypted using the ciphertext that initial key sends user terminal, Obtain corresponding plaintext in ciphertext.Wherein, this can be sent to the operational order etc. of decrypting end in plain text for user terminal, here not It limits, which carries out plaintext processing accordingly after obtaining plaintext.
In the embodiment of the present invention, which includes aes algorithm (AES, Advanced Encryption Standard, Advanced Encryption Standard).
Embodiment 2
Fig. 2 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 2 provides, and this method includes following step It is rapid:
Step S21: generating the time in preset key, and random number generator is used to generate random code as initial key, And initial key is broadcasted to user terminal.
This step is consistent with above-mentioned steps S11, and details are not described herein.
Step S22: it is encrypted using current key to sent ciphertext in user terminal, then passes through Bluetooth communication Mode sends encrypted ciphertext.
This step is consistent with above-mentioned steps S12, and details are not described herein.
Step S23: the ciphertext sent by user terminal and the actual key encrypted to ciphertext are received.
This step is consistent with above-mentioned steps S13, and details are not described herein.
Step S24: judge whether actual key is consistent with initial key.
This step is consistent with above-mentioned steps S14, and details are not described herein.
Step S25: when actual key is consistent with initial key, being decrypted ciphertext using initial key, obtain with The corresponding plaintext of ciphertext.
This step is consistent with above-mentioned steps S15, and details are not described herein.
Step S26: after ciphertext is decrypted using actual key, random code is generated using random number generator immediately To update initial key, and the initial key of update is broadcasted to user terminal.
In the embodiment of the present invention, the decryption end equipment after being decrypted using ciphertext of the initial key to user terminal, It can use random number generator to be immediately generated new random code as new initial key and broadcasted, without waiting for down New initial key is being generated when one time interval.Wherein, which can not also be according to prefixed time interval Mode carries out the generation of random code and the update of initial key, can generate new random code progress after the decryption of each ciphertext The update of initial key, to save the calculation resources of decryption end equipment.
Embodiment 3
Fig. 3 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 3 provides, and this method includes following step It is rapid:
Step S31: generating the time in preset key, and random number generator is used to generate random code as initial key, And initial key is broadcasted to user terminal.
This step is consistent with above-mentioned steps S11, and details are not described herein.
Step S32: it is encrypted using current key to sent ciphertext in user terminal, then passes through Bluetooth communication Mode sends encrypted ciphertext.
This step is consistent with above-mentioned steps S12, and details are not described herein.
Step S33: the ciphertext sent by user terminal and the actual key encrypted to ciphertext are received.
This step is consistent with above-mentioned steps S13, and details are not described herein.
Step S34: judge whether actual key is consistent with initial key.
This step is consistent with above-mentioned steps S14, and details are not described herein.
Step S35: when actual key is consistent with initial key, being decrypted ciphertext using initial key, obtain with The corresponding plaintext of ciphertext.
This step is consistent with above-mentioned steps S15, and details are not described herein.
Step S36: the random key that user terminal is generated and broadcasted using random number generator is received, random key is utilized The plaintext being sent to the user terminal to needs encrypts, and generates ciphertext to be transmitted.
In the embodiment of the present invention, need when transmitting information to decrypting end using Bluetooth communication in addition to user terminal using key It is encrypted, key also can be used when decrypting end transmits information to user terminal and encrypted.Wherein, the decryption end equipment Can also receive user terminal broadcast random key, the random key by user terminal random number generator at preset timed intervals Interval updates, then is broadcasted by the Bluetooth communication of user terminal.Decryption terminal is after the random key for receiving user terminal, benefit The plaintext for needing to be sent to the user terminal with random key encryption, generates ciphertext to be transmitted, and be sent to using Bluetooth communication User terminal.
Step S37: ciphertext to be transmitted and random key are sent to the user terminal.
In the embodiment of the present invention, the decrypting end while sending ciphertext, extremely use by the also corresponding key of transmission encrypted cipher text Family terminal, so that whether user terminal is effective using the key of current random key verifying decrypting end.
Embodiment 4
Fig. 4 is a kind of structural schematic diagram for Bluetooth communication encryption device that the embodiment of the present invention 4 provides.
The Bluetooth communication encryption device 400 includes:
Key production module 410 generates random code using random number generator and makees for generating the time in preset key For initial key, and the initial key is broadcasted to user terminal.
Ciphertext encrypting module 420, for being encrypted using current key to sent ciphertext in user terminal, then Encrypted ciphertext is sent by Blue-tooth communication method.
Ciphertext receiving module 430, for receiving the ciphertext sent by user terminal and being encrypted to the ciphertext Actual key.
Key judgment module 440, for judging whether the actual key is consistent with the initial key.
Ciphertext deciphering module 450, for when the actual key is consistent with the initial key, using described initially close The ciphertext is decrypted in key, obtains plaintext corresponding with the ciphertext.
In the embodiment of the present invention, the algorithm that the ciphertext is encrypted and decrypted includes aes algorithm.
As shown in figure 5, the Bluetooth communication encryption device 400 further include:
Key updating module 460, for after the ciphertext is decrypted using the actual key, utilize immediately with Machine code generator generates random code to update the initial key, and the initial key of update is broadcasted to user terminal.
As shown in fig. 6, the Bluetooth communication encryption device 400 further include:
Ciphertext encrypting module 470, for receive the user terminal generate and broadcast using random number generator it is random Key is encrypted using the plaintext that the random key is sent to the user terminal needs, generates ciphertext to be transmitted.
Ciphertext sending module 480, it is whole for the ciphertext to be transmitted and the random key to be sent to the user End.
In addition, the present invention also provides a kind of intelligent security guard equipment, which includes memory and processor, Memory can be used for storing computer program, and processor is by running the computer program, so that intelligent security guard equipment be made to hold The function of the row above method or the modules in above-mentioned Bluetooth communication encryption device.
Memory may include storing program area and storage data area, wherein storing program area can storage program area, at least Application program needed for one function (such as sound-playing function, image player function etc.) etc.;Storage data area can store root Created data (such as audio data, phone directory etc.) etc. are used according to intelligent security guard equipment.In addition, memory may include High-speed random access memory can also include nonvolatile memory, for example, at least disk memory, a flash memories Part or other volatile solid-state parts.
The present embodiment additionally provides a kind of computer storage medium, by storing based on used in above-mentioned intelligent security guard equipment Calculation machine program.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and structure in attached drawing Figure shows the system frame in the cards of the device of multiple embodiments according to the present invention, method and computer program product Structure, function and operation.In this regard, each box in flowchart or block diagram can represent a module, section or code A part, a part of the module, section or code includes one or more for implementing the specified logical function Executable instruction.It should also be noted that function marked in the box can also be to be different from the implementation as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that in structure chart and/or flow chart The combination of each box and the box in structure chart and/or flow chart, can function or movement as defined in executing it is dedicated Hardware based system realize, or can realize using a combination of dedicated hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention can integrate one independence of formation together Part, be also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be intelligence Can mobile phone, personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), Random access memory (RAM, Random Access Memory), magnetic or disk etc. be various to can store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of Bluetooth communication encryption method characterized by comprising
The time is generated in preset key, random number generator is used to generate random code as initial key, and will be described initial Cipher key broadcasting is to user terminal;
It is encrypted using current key to sent ciphertext in user terminal, is then sent and encrypted by Blue-tooth communication method Ciphertext afterwards;
Receive the ciphertext sent by user terminal and the actual key encrypted to the ciphertext;
Judge whether the actual key is consistent with the initial key;
When the actual key is consistent with the initial key, the ciphertext is decrypted using the initial key, is obtained Obtain plaintext corresponding with the ciphertext.
2. Bluetooth communication encryption method according to claim 1, which is characterized in that the ciphertext is encrypted and solved Close algorithm includes aes algorithm.
3. Bluetooth communication encryption method according to claim 1, which is characterized in that further include:
After the ciphertext is decrypted using the actual key, random code is generated come more using random number generator immediately The new initial key, and the initial key of update is broadcasted to user terminal.
4. Bluetooth communication encryption method according to claim 1, which is characterized in that further include:
The random key that the user terminal is generated and broadcasted using random number generator is received, using the random key to need The plaintext to be sent to the user terminal is encrypted, and ciphertext to be transmitted is generated;
The ciphertext to be transmitted and the random key are sent to the user terminal.
5. a kind of Bluetooth communication encryption device characterized by comprising
Key production module uses random number generator to generate random code as initially for generating the time in preset key Key, and the initial key is broadcasted to user terminal;
Then ciphertext encrypting module passes through indigo plant for being encrypted using current key to sent ciphertext in user terminal Tooth communication mode sends encrypted ciphertext;
Ciphertext receiving module, it is close for receiving the ciphertext sent by user terminal and the reality encrypted to the ciphertext Key;
Key judgment module, for judging whether the actual key is consistent with the initial key;
Ciphertext deciphering module is used for when the actual key is consistent with the initial key, using the initial key to institute It states ciphertext to be decrypted, obtains plaintext corresponding with the ciphertext.
6. Bluetooth communication encryption device according to claim 5, which is characterized in that the ciphertext is encrypted and decrypted Algorithm include aes algorithm.
7. Bluetooth communication encryption device according to claim 5, which is characterized in that further include:
Key updating module, for utilizing random code life immediately after the ciphertext is decrypted using the actual key It grows up to be a useful person and generates random code to update the initial key, and the initial key of update is broadcasted to user terminal.
8. Bluetooth communication encryption device according to claim 5, which is characterized in that further include:
Ciphertext encrypting module, the random key for generating and broadcasting using random number generator for receiving the user terminal, benefit It is encrypted with the plaintext that the random key is sent to the user terminal needs, generates ciphertext to be transmitted;
Ciphertext sending module, for the ciphertext to be transmitted and the random key to be sent to the user terminal.
9. a kind of intelligent security guard equipment, which is characterized in that including memory and processor, the memory is calculated for storing Machine program, the processor runs the computer program so that the intelligent security guard equipment executes according to claim 1 in 4 Described in any item Bluetooth communication encryption methods.
10. a kind of computer storage medium, which is characterized in that it is stored with institute in intelligent security guard equipment as claimed in claim 9 The computer program used.
CN201811385947.3A 2018-11-20 2018-11-20 Bluetooth communication encryption method and device and intelligent security equipment Active CN109168162B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811385947.3A CN109168162B (en) 2018-11-20 2018-11-20 Bluetooth communication encryption method and device and intelligent security equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811385947.3A CN109168162B (en) 2018-11-20 2018-11-20 Bluetooth communication encryption method and device and intelligent security equipment

Publications (2)

Publication Number Publication Date
CN109168162A true CN109168162A (en) 2019-01-08
CN109168162B CN109168162B (en) 2021-09-21

Family

ID=64875076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811385947.3A Active CN109168162B (en) 2018-11-20 2018-11-20 Bluetooth communication encryption method and device and intelligent security equipment

Country Status (1)

Country Link
CN (1) CN109168162B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351929A (en) * 2019-07-17 2019-10-18 苏州佩林网络科技有限公司 A kind of wireless lamp control system based on Bluetooth technology
CN111200807A (en) * 2019-12-30 2020-05-26 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN111601293A (en) * 2020-05-12 2020-08-28 北京三快在线科技有限公司 Positioning method and device based on Bluetooth beacon equipment
CN111787514A (en) * 2020-06-28 2020-10-16 海尔优家智能科技(北京)有限公司 Method and device for acquiring equipment control data, storage medium and electronic device
CN112291060A (en) * 2020-08-08 2021-01-29 北京天润海图科技有限公司 Secure communication method, sending end and receiving end
CN113141604A (en) * 2021-04-27 2021-07-20 河北爱其科技有限公司 Bluetooth safety communication system
CN113630772A (en) * 2021-08-17 2021-11-09 深圳市智莱科技股份有限公司 Bluetooth data transmission method and device, Bluetooth equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989643A (en) * 2015-02-03 2016-10-05 吉林省施泰信息技术股份有限公司 Communication encryption method used for electronic lock, electronic lock apparatus and system thereof
CN106447863A (en) * 2016-10-12 2017-02-22 北京三快在线科技有限公司 Unlocking password processing method, door lock and foreground server
CN106504391A (en) * 2016-11-24 2017-03-15 北京爱接力科技发展有限公司 A kind of control method of intelligent entrance guard, apparatus and system
CN108111308A (en) * 2017-12-25 2018-06-01 北京康拓科技有限公司 One kind is based on the encrypted industry internet communication encryption method of dynamic random
CN108447154A (en) * 2018-03-02 2018-08-24 中国水利水电科学研究院 Safe unlocking method and device, encryption and decryption method and device, lock and server
WO2018182818A1 (en) * 2017-01-09 2018-10-04 Arris Enterprises Llc Homomorphic white box system and method for using same

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989643A (en) * 2015-02-03 2016-10-05 吉林省施泰信息技术股份有限公司 Communication encryption method used for electronic lock, electronic lock apparatus and system thereof
CN106447863A (en) * 2016-10-12 2017-02-22 北京三快在线科技有限公司 Unlocking password processing method, door lock and foreground server
CN106504391A (en) * 2016-11-24 2017-03-15 北京爱接力科技发展有限公司 A kind of control method of intelligent entrance guard, apparatus and system
WO2018182818A1 (en) * 2017-01-09 2018-10-04 Arris Enterprises Llc Homomorphic white box system and method for using same
CN108111308A (en) * 2017-12-25 2018-06-01 北京康拓科技有限公司 One kind is based on the encrypted industry internet communication encryption method of dynamic random
CN108447154A (en) * 2018-03-02 2018-08-24 中国水利水电科学研究院 Safe unlocking method and device, encryption and decryption method and device, lock and server

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351929A (en) * 2019-07-17 2019-10-18 苏州佩林网络科技有限公司 A kind of wireless lamp control system based on Bluetooth technology
CN111200807A (en) * 2019-12-30 2020-05-26 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN111200807B (en) * 2019-12-30 2024-03-29 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN111601293A (en) * 2020-05-12 2020-08-28 北京三快在线科技有限公司 Positioning method and device based on Bluetooth beacon equipment
CN111601293B (en) * 2020-05-12 2022-09-30 北京三快在线科技有限公司 Positioning method and device based on Bluetooth beacon equipment
CN111787514A (en) * 2020-06-28 2020-10-16 海尔优家智能科技(北京)有限公司 Method and device for acquiring equipment control data, storage medium and electronic device
CN111787514B (en) * 2020-06-28 2024-03-22 海尔优家智能科技(北京)有限公司 Method and device for acquiring equipment control data, storage medium and electronic device
CN112291060A (en) * 2020-08-08 2021-01-29 北京天润海图科技有限公司 Secure communication method, sending end and receiving end
CN113141604A (en) * 2021-04-27 2021-07-20 河北爱其科技有限公司 Bluetooth safety communication system
CN113630772A (en) * 2021-08-17 2021-11-09 深圳市智莱科技股份有限公司 Bluetooth data transmission method and device, Bluetooth equipment and storage medium

Also Published As

Publication number Publication date
CN109168162B (en) 2021-09-21

Similar Documents

Publication Publication Date Title
CN109168162A (en) Bluetooth communication encryption method, device and intelligent security guard equipment
US8712041B2 (en) Content protection apparatus and content encryption and decryption apparatus using white-box encryption table
CN105162772B (en) A kind of internet of things equipment certifiede-mail protocol method and apparatus
CN106504391B (en) Control method, device and system of intelligent access control
CN107579817A (en) User ID authentication method, apparatus and system based on block chain
CN105553951A (en) Data transmission method and data transmission device
CN109150519A (en) Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond
CA2548229A1 (en) Enabling stateless server-based pre-shared secrets
CN108848495B (en) User identity updating method using preset key
CN104735484B (en) A kind of method and device for playing video
CN109544747A (en) Encryption key update method, system and the computer storage medium of intelligent door lock
CN105119891B (en) A kind of data interactive method, set-top box and server
CN105071927A (en) Mobile device data local storage method
CN105847005A (en) Encryption device and method
CN103236934A (en) Method for cloud storage security control
EP4344266A3 (en) Updating a subscriber identity module
CN108768628A (en) Equipment end encryption method, device, system and gateway
CN104579680A (en) Method for safe distribution of seed
CN109756325A (en) A method of mobile office system safety is promoted using quantum key
CN201336704Y (en) Remote video monitoring system
CN103324971B (en) A kind of smart card system and dynamic key thereof upgrade authentication method
CN104618380A (en) Secret key update method suitable for internet of things
CN113722741A (en) Data encryption method and device and data decryption method and device
CN109787747A (en) Anti- quantum calculation multi-enciphering cloud storage method and system based on multiple unsymmetrical key ponds
CN105577650A (en) Remote time synchronization method and system of one-time password (OTP)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant