CN109246581A - A kind of method and apparatus of communication - Google Patents

A kind of method and apparatus of communication Download PDF

Info

Publication number
CN109246581A
CN109246581A CN201710346665.1A CN201710346665A CN109246581A CN 109246581 A CN109246581 A CN 109246581A CN 201710346665 A CN201710346665 A CN 201710346665A CN 109246581 A CN109246581 A CN 109246581A
Authority
CN
China
Prior art keywords
bluetooth equipment
terminal device
communication
public key
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710346665.1A
Other languages
Chinese (zh)
Inventor
张华�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201710346665.1A priority Critical patent/CN109246581A/en
Publication of CN109246581A publication Critical patent/CN109246581A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method and apparatus of communication are provided, it is related to computer field.One specific embodiment of this method includes: that terminal device and bluetooth equipment establish connection;Terminal device is encrypted using the secret key pair Content of Communication of pre-selection algorithm, and encrypted Content of Communication is sent to bluetooth equipment, so that bluetooth equipment is decrypted using the Content of Communication that the secret key pair of pre-selection algorithm receives.The embodiment reduces the security risk communicated between terminal, improves security reliability.

Description

A kind of method and apparatus of communication
Technical field
The present invention relates to computer field more particularly to a kind of method and apparatus of communication.
Background technique
Bluetooth low energy consumption (Bluetooth Low Energy, BLE) technology be low cost, short distance, interoperable Shandong Stick wireless technology.In the present of current Internet of Things Industry Quick Development, the Intelligent hardware using BLE technology is more and more.Together When, it the use of the data that BLE is transmitted is sensitive data, such as individual health data, account number cipher data etc. a bit, it is necessary to assure Information privacy.
The mode that current BLE agreement is all made of pairing (pairing) completes the code key distribution of communicating pair (distribution).If pairing is completed, communicating pair carries out symmetrical enciphering and deciphering algorithm using the communication of identical secret key pair Encryption and decryption, to guarantee the confidentiality of communication.
It is paired with following three kinds of modes at present:
Passkey Entry is that a side inputs passkey, and in addition whether side verifying other side input is correct, if correctly Pairing can be successfully completed, incorrect just to terminate, pairing failure.This mode be suitable for a side have input medium (such as Keyboard), another party has display means (such as display screen);
Out of Band is that security information is completed transmission, such as NFC using non-BLE channel between communicating pair;
This mode of Just Works is to use identical fixed TK (Temporary at the very start in pairing stage both sides Key).This mode at least side suitable for communicating pair does not have input or display means.
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery:
If existing three kinds of modes can not all be resisted in communication process in the pairing stage by passively attack is eavesdropped It eavesdrops, in this case, the Bluetooth communication based on these three matching methods is that no safety can be sayed, therefore, how to be improved The security reliability of communication is a problem to be solved.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method and apparatus of communication, it is able to solve and communicates in the prior art The problem of security reliability difference.
To achieve the above object, according to an aspect of an embodiment of the present invention, a kind of method of communication is provided.
A kind of method of communication of the embodiment of the present invention includes that terminal device and bluetooth equipment establish connection;Terminal device benefit It is encrypted with the secret key pair Content of Communication of pre-selection algorithm, encrypted Content of Communication is sent to bluetooth equipment, so that bluetooth The Content of Communication that the secret key pair of equipment utilization pre-selection algorithm receives is decrypted.
Optionally, the terminal device Yu bluetooth equipment of the embodiment of the present invention are established before connection, further includes: terminal device and Bluetooth equipment saves code key.
Optionally, the embodiment of the present invention terminal device carries out encrypting it using the secret key pair Content of Communication of pre-selection algorithm Before, further includes: terminal device generates terminal device public key using ECC algorithm, and terminal device public key is sent to bluetooth equipment; Receive the bluetooth equipment public key for utilizing ECC algorithm to generate by bluetooth equipment;Based on terminal device public key and bluetooth equipment public key, Shared secret is determined using ECDH algorithm;The preceding 128bit of shared secret is saved as code key by terminal device and bluetooth equipment.
Optionally, the embodiment of the present invention is before terminal device and bluetooth equipment establish connection, further includes: confirmation is blue It include preset field in the data of tooth device broadcasts.
To achieve the above object, according to another aspect of an embodiment of the present invention, a kind of device of communication is provided.
A kind of device of communication of the embodiment of the present invention includes: link block, is established for terminal device and bluetooth equipment Connection;Processing module is sent encrypted Content of Communication for being encrypted using the secret key pair Content of Communication of pre-selection algorithm To bluetooth equipment, so that bluetooth equipment is decrypted using the Content of Communication that the secret key pair of pre-selection algorithm receives.
Optionally, the embodiment of the invention also includes preserving modules, are used for: terminal device and bluetooth equipment save code key.
Optionally, the preserving module of the embodiment of the present invention is also used to: generating terminal device public key using ECC algorithm, and will Terminal device public key is sent to bluetooth equipment;Receive the bluetooth equipment public key for utilizing ECC algorithm to generate by bluetooth equipment;It is based on Terminal device public key and bluetooth equipment public key, determine shared secret using ECDH algorithm;Terminal device and bluetooth equipment will be total to It enjoys secret preceding 128bit and saves as code key.
Optionally, the embodiment of the present invention also further includes determining module, is used for: being wrapped in the data of confirmation bluetooth equipment broadcast Containing preset field.
To achieve the above object, according to an embodiment of the present invention in another aspect, providing the electronics of a kind of method of communication Equipment.
The a kind of electronic equipment of the embodiment of the present invention includes: one or more processors;Storage device, for storing one Or multiple programs, when one or more of programs are executed by one or more of processors, so that one or more of The method that processor realizes the communication of the embodiment of the present invention.
To achieve the above object, another aspect according to an embodiment of the present invention, provides a kind of computer-readable medium.
A kind of computer-readable medium of the embodiment of the present invention, is stored thereon with computer program, and described program is processed The method of the communication of the embodiment of the present invention is realized when device executes.
One embodiment in foregoing invention has the following advantages that or the utility model has the advantages that because carries out using for Content of Communication The technological means of encryption so overcoming the technical issues of Content of Communication is easy leakage, and then reaches and improves communication process The technical effect of security reliability;By being encrypted in communication process to Content of Communication, Content of Communication is effectively overcome The problem of leakage, to make equipment that all there is stronger security reliability in connection and stage of communication.
Further effect possessed by above-mentioned non-usual optional way adds hereinafter in conjunction with specific embodiment With explanation.
Detailed description of the invention
Attached drawing for a better understanding of the present invention, does not constitute an undue limitation on the present invention.Wherein:
Fig. 1 is the schematic diagram of the key step of the method for communication according to an embodiment of the present invention;
Fig. 2 is the schematic diagram that mobile phone and terminal are attached in the prior art;
Fig. 3 is the schematic diagram that mobile phone and multiple types of terminals are attached in the prior art;
Fig. 4 is the schematic diagram of the main modular of the device of communication according to an embodiment of the present invention;
Fig. 5 is adapted for the structural representation of the computer system for the terminal device or server of realizing the embodiment of the present application Figure.
Specific embodiment
Below in conjunction with attached drawing, an exemplary embodiment of the present invention will be described, including the various of the embodiment of the present invention Details should think them only exemplary to help understanding.Therefore, those of ordinary skill in the art should recognize It arrives, it can be with various changes and modifications are made to the embodiments described herein, without departing from scope and spirit of the present invention.Together Sample, for clarity and conciseness, descriptions of well-known functions and structures are omitted from the following description.
Just as described in the background of the present invention, the prior art is not add when carrying out pairing connection to equipment Close processing, as long as the information transmitted between terminal is all there is very big peace by plaintext transmission after being successfully connected Full hidden danger, therefore, the present invention increase the security reliability of communication by encrypting to the content of communication.
Fig. 1 is the schematic diagram of the key step of the method for communication according to an embodiment of the present invention.
As shown in Figure 1, a kind of method of communication of the embodiment of the present invention mainly includes the following steps:
Step S101: terminal device and bluetooth equipment establish connection.In the specific implementation process, it needs to judge bluetooth equipment It whether include preset field in the data of broadcast;If so, terminal device and terminal establish connection;If it is not, terminating current operation. By that could establish connection after judgement, then in the determining code key that communication is encrypted and decrypted, (code key is this hair The code key of bright proposed pre-selection algorithm), specific encryption process will be described in detail in subsequent discussion, herein no longer It repeats.
Step S102: terminal device is encrypted using the secret key pair Content of Communication of pre-selection algorithm, by encrypted communication Content is sent to bluetooth equipment, so that bluetooth equipment is decrypted using the Content of Communication that the secret key pair of pre-selection algorithm receives. This step is intended to encrypt the content of communication, with achieve the purpose that can high safety reliability, then again to encrypted logical Believe that content accordingly decrypt.The specific process for determining code key is divided into following two situation:
Situation one: code key is saved in terminal device and bluetooth equipment;
Situation two: terminal device generates terminal device public key using ECC algorithm, and terminal device public key is sent to bluetooth Equipment;Receive the bluetooth equipment public key for utilizing ECC algorithm to generate by bluetooth equipment;Based on terminal device public key and bluetooth equipment Public key determines shared secret using ECDH algorithm;Terminal device and bluetooth equipment save as the preceding 128bit of shared secret Code key.
Above-mentioned two situations are only the involved implementations of the embodiment of the present invention, will not influence protection model of the invention It encloses, and has respective advantage and disadvantage, selection use can be carried out according to different usage scenarios.
It can be seen that the Content of Communication for the secret key pair encryption determined through the invention is encrypted and decrypted, effectively Improve the safety of entire communication process.
Below in conjunction with the attached drawing in the present invention, clear, complete description is carried out to the technical solution in the present invention, is shown So, described embodiment is a part of the embodiments of the present invention, instead of all the embodiments.Based on the implementation in the present invention Example, those of ordinary skill in the art's every other embodiment obtained without making creative work, all belongs to In the scope of protection of the invention.
Fig. 2 is the schematic diagram that mobile phone and terminal are attached in the prior art.BLE agreement in the prior art can also make With No Security, i.e., plaintext transmission data are used in stage of communication both sides.In this way if not application layer does not do safe design More having no safety can say.Further, as shown in figure 3, mobile phone and multiple types of terminals are attached in the prior art Schematic diagram, mobile phone are BLE Master, and various equipment are then BLE Slave.These equipment not carve connection mobile phone at the same time, this A figure is intended to indicate that an app of a mobile phone can connect a variety of bluetooth equipments.It is required that the application layer protocol based on BLE will fit With BLE equipment as much as possible.And in above-mentioned three kinds of matching methods, Passkey entry and Out of Band has hardware It is required that causing the BLE equipment having that can not access, it is unfavorable for the marketing of application layer protocol.And Just Works safety pole It is low, because the default initial code key TK of Bluetooth protocol is fixed, disclosed.The present invention is because use no in protocol layer Security does not have particular requirement to hardware, therefore can be suitable for all BLE equipment, conducive to this kind of application layer protocol Marketing.
The extensive suitability problem of this programme one side resolution protocol;On the other hand it solves the problems, such as passively to eavesdrop, that is, not Pipe criminal attacks Bluetooth communication using the passive mode of eavesdropping in what stage, is all the confidentiality that can not destroy this programme, Know the content of communication.
Specifically, technical solution of the present invention is divided into two ways:
Mode one uses preset value code key PSK (Pre Shared Key).
That is broadcast discovery is completed, and master and slave are established after connection, normal communication, and Content of Communication uses aes algorithm Encryption and decryption, code key are exactly that communicating pair writes dead code key psk, code key length 128bit in advance.
Mode two generates aes algorithm code key session_key using ECDH algorithm.
Encryption intensity: ECC public key is 168bit, and ECC private key is 160bit, and AES symmetric key length is 128bit.
After broadcast discovery phase is completed, Master and Slave establish connection, then start to communicate, detailed process are as follows:
(1) Master generates ECC algorithm public key ecc_master_puk_key, the private key ecc_master_priv_ of oneself key。
(2) Master tells the ECC algorithm public key ecc_ of Slave oneself by write characteristic in plain text master_puk_key。
(3) Slave generates ECC algorithm public key ecc_slave_puk_key, the private key ecc_slave_priv_ of oneself key。
(4) Slave passes through indication characteristic or notification characteristic The ECC algorithm public key ecc_slave_puk_key of Master oneself is told in plain text.
(5) Master and Slave calculate separately shared secret.128bit is as session_key before taking out.
Finally, all communications use aes algorithm encryption and decryption, are decrypted using code key for session_key.
It should be noted that special word can be arranged in the broadcast data of slave in order to carry out primary authentication Section, only has the slave of this special Broadcast field, master can just establish connection therewith, can set non-agreement in this way It is standby to foreclose.Meanwhile the completion in order to guarantee communication data, data can be carried out using ECC check and algorithm complete Property verifying.
The method of communication according to an embodiment of the present invention can be seen that because having carried out encryption using for Content of Communication Technological means so overcoming the technical issues of Content of Communication is easy leakage, and then reaches and improves the safe and reliable of communication process The technical effect of property;By being encrypted in communication process to Content of Communication, asking for Content of Communication leakage is effectively overcome Topic, to make equipment that all there is stronger security reliability in connection and stage of communication.
Fig. 4 is the schematic diagram of the main modular of the device of communication according to an embodiment of the present invention.
As shown in figure 4, the device 400 of the communication of the embodiment of the present invention is mutual in mobile phone or other movements as software setting In the terminal device of networking, the device mainly includes: link block 401 and processing module 402.Wherein:
Link block 401 establishes connection for terminal device and bluetooth equipment;Processing module 42, for being calculated using pre-selection The secret key pair Content of Communication of method is encrypted, and encrypted Content of Communication is sent to bluetooth equipment, so that bluetooth equipment utilizes The Content of Communication that the secret key pair of pre-selection algorithm receives is decrypted.
Optionally, the embodiment of the invention also includes preserving module 403, be used for: terminal device and bluetooth equipment save code key.
Optionally, the preserving module 403 of the embodiment of the present invention is also used to: terminal device public key is generated using ECC algorithm, and Terminal device public key is sent to bluetooth equipment;Receive the bluetooth equipment public key for utilizing ECC algorithm to generate by bluetooth equipment;Base In terminal device public key and bluetooth equipment public key, shared secret is determined using ECDH algorithm;Terminal device and bluetooth equipment will The preceding 128bit of shared secret saves as code key.
Optionally, the embodiment of the present invention also further includes determining module 404, is used for: the data of confirmation bluetooth equipment broadcast In include preset field.
From the above, it can be seen that because being overcome using the technological means encrypted for Content of Communication Content of Communication is easy the technical issues of leakage, and then reaches the technical effect for improving the security reliability of communication process;Pass through The problem of in communication process, Content of Communication is encrypted, effectively overcomes Content of Communication leakage, to make equipment even It connects and stage of communication all has stronger security reliability.
Below with reference to Fig. 5, it illustrates the computer systems 500 for the terminal device for being suitable for being used to realize the embodiment of the present application Structural schematic diagram.Terminal device shown in Fig. 5 is only an example, function to the embodiment of the present application and should not use model Shroud carrys out any restrictions.
As shown in figure 5, computer system 500 includes central processing unit (CPU) 501, it can be read-only according to being stored in Program in memory (ROM) 502 or be loaded into the program in random access storage device (RAM) 503 from storage section 508 and Execute various movements appropriate and processing.In RAM 503, also it is stored with system 500 and operates required various programs and data. CPU 501, ROM 502 and RAM 503 are connected with each other by bus 504.Input/output (I/O) interface 505 is also connected to always Line 504.
I/O interface 505 is connected to lower component: the importation 506 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 507 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 508 including hard disk etc.; And the communications portion 509 of the network interface card including LAN card, modem etc..Communications portion 509 via such as because The network of spy's net executes communication process.Driver 510 is also connected to I/O interface 505 as needed.Detachable media 511, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 510, in order to read from thereon Computer program be mounted into storage section 508 as needed.
Particularly, the process of disclosed embodiment according to the present invention, the flow chart description of key step above can be by reality It is now computer software programs.For example, embodiment disclosed by the invention includes a kind of computer program product comprising be carried on Computer program on computer-readable medium, the computer program include for executing method shown in key step flow chart Program code.In such embodiments, which can be downloaded and be pacified from network by communications portion 509 Dress, and/or be mounted from detachable media 511.When the computer program is executed by central processing unit (CPU) 501, execute The above-mentioned function of being limited in the system of the application.
It should be noted that computer-readable medium shown in the application can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In this application, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In application, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned Any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the application, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, depending on this is according to related function.? It should be noted that the combination of block diagram or each box in flow chart and the box in block diagram or flow chart, can use execution The dedicated hardware based systems of defined functions or operations realizes, or can use specialized hardware and computer instruction Combination is to realize.
Being described in module involved in the embodiment of the present application can be realized by way of software, can also be by hard The mode of part is realized.Described module also can be set in the processor, for example, can be described as: a kind of processor packet Include determining module, encrypting module and deciphering module.Wherein, the title of these modules is not constituted under certain conditions to the mould The restriction of block itself.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be Included in equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying equipment.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the equipment, makes Obtaining the equipment includes: that terminal device and bluetooth equipment establish connection;Terminal device utilizes the secret key pair Content of Communication for preselecting algorithm It is encrypted, encrypted Content of Communication is sent to bluetooth equipment, so that bluetooth equipment is docked using the code key of pre-selection algorithm The Content of Communication received is decrypted.
Technical solution according to an embodiment of the present invention, because using the technological means encrypted for Content of Communication, So overcoming the technical issues of Content of Communication is easy leakage, and then reach the technology effect for the security reliability for improving communication process Fruit;By being encrypted in communication process to Content of Communication, the problem of Content of Communication is revealed effectively is overcome, to make Equipment all has stronger security reliability in connection and stage of communication.
Above-mentioned specific embodiment, does not constitute a limitation on the scope of protection of the present invention.Those skilled in the art should be bright It is white, design requirement and other factors are depended on, various modifications, combination, sub-portfolio and substitution can occur.It is any Made modifications, equivalent substitutions and improvements etc. within the spirit and principles in the present invention, should be included in the scope of the present invention Within.

Claims (10)

1. a kind of method of communication characterized by comprising
Terminal device and bluetooth equipment establish connection;
The terminal device is encrypted using the secret key pair Content of Communication of pre-selection algorithm, and encrypted Content of Communication is sent to The bluetooth equipment, so that the bluetooth equipment is solved using the Content of Communication that the secret key pair of the pre-selection algorithm receives It is close.
2. the method according to claim 1, wherein the terminal device and bluetooth equipment are established before connection, Further include:
The terminal device and the bluetooth equipment save the code key.
3. the method according to claim 1, wherein the terminal device is communicated using the secret key pair of pre-selection algorithm Before content is encrypted, further includes:
The terminal device generates terminal device public key using ECC algorithm, and the terminal device public key is sent to the indigo plant Tooth equipment;
Receive the bluetooth equipment public key for utilizing ECC algorithm to generate by the bluetooth equipment;
Based on the terminal device public key and the bluetooth equipment public key, shared secret is determined using ECDH algorithm;
The preceding 128bit of the shared secret is saved as the code key by the terminal device and the bluetooth equipment.
4. the method according to claim 1, wherein establishing connection in the terminal device and the bluetooth equipment Before, further includes: confirm in the data of the bluetooth equipment broadcast comprising preset field.
5. a kind of device of communication, which is characterized in that be arranged in terminal device, which includes:
Link block establishes connection for terminal device and bluetooth equipment;
Processing module is sent encrypted Content of Communication for being encrypted using the secret key pair Content of Communication of pre-selection algorithm To the bluetooth equipment, so that the bluetooth equipment is solved using the Content of Communication that the secret key pair of the pre-selection algorithm receives It is close.
6. device according to claim 5, which is characterized in that further include preserving module, be used for:
The terminal device and the bluetooth equipment save the code key.
7. device according to claim 5, which is characterized in that the preserving module is also used to:
Terminal device public key is generated using ECC algorithm, and the terminal device public key is sent to the bluetooth equipment;
Receive the bluetooth equipment public key for utilizing ECC algorithm to generate by the bluetooth equipment;
Based on the terminal device public key and the bluetooth equipment public key, shared secret is determined using ECDH algorithm;
The preceding 128bit of the shared secret is saved as the code key by the terminal device and the bluetooth equipment.
8. device according to claim 5, which is characterized in that further include determining module, be used for: confirming the bluetooth equipment It include preset field in the data of broadcast.
9. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real Now such as method of any of claims 1-4.
10. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that described program is held by processor Such as method of any of claims 1-4 is realized when row.
CN201710346665.1A 2017-05-17 2017-05-17 A kind of method and apparatus of communication Pending CN109246581A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710346665.1A CN109246581A (en) 2017-05-17 2017-05-17 A kind of method and apparatus of communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710346665.1A CN109246581A (en) 2017-05-17 2017-05-17 A kind of method and apparatus of communication

Publications (1)

Publication Number Publication Date
CN109246581A true CN109246581A (en) 2019-01-18

Family

ID=65082906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710346665.1A Pending CN109246581A (en) 2017-05-17 2017-05-17 A kind of method and apparatus of communication

Country Status (1)

Country Link
CN (1) CN109246581A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404584A (en) * 2020-03-12 2020-07-10 苏州浪潮智能科技有限公司 Server running state monitoring method, device and system and readable storage medium
CN112672335A (en) * 2021-03-08 2021-04-16 上海逐鲨智能科技有限公司 Bluetooth broadcast encryption communication method
CN113596827A (en) * 2021-07-29 2021-11-02 Oppo广东移动通信有限公司 Key generation method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1079565A2 (en) * 1999-08-25 2001-02-28 Dew Engineering and Development Limited Method of securely establishing a secure communication link via an unsecured communication network
CN105553951A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Data transmission method and data transmission device
CN105723648A (en) * 2013-10-30 2016-06-29 华为终端有限公司 Key configuration method, system and apparatus
CN106533662A (en) * 2016-11-03 2017-03-22 北京奇虎科技有限公司 Methods and devices for transmitting network safety secret key

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1079565A2 (en) * 1999-08-25 2001-02-28 Dew Engineering and Development Limited Method of securely establishing a secure communication link via an unsecured communication network
CN105723648A (en) * 2013-10-30 2016-06-29 华为终端有限公司 Key configuration method, system and apparatus
CN105553951A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Data transmission method and data transmission device
CN106533662A (en) * 2016-11-03 2017-03-22 北京奇虎科技有限公司 Methods and devices for transmitting network safety secret key

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404584A (en) * 2020-03-12 2020-07-10 苏州浪潮智能科技有限公司 Server running state monitoring method, device and system and readable storage medium
CN112672335A (en) * 2021-03-08 2021-04-16 上海逐鲨智能科技有限公司 Bluetooth broadcast encryption communication method
CN113596827A (en) * 2021-07-29 2021-11-02 Oppo广东移动通信有限公司 Key generation method and device, electronic equipment and storage medium
CN113596827B (en) * 2021-07-29 2024-02-13 Oppo广东移动通信有限公司 Key generation method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
CN103093341B (en) A kind of safe payment method based on RFID intelligence payment system
CN105530241B (en) The authentication method of mobile intelligent terminal and POS terminal
CN108270554B (en) Terminal pairing method and system
CN108418845A (en) Bluetooth pairing code matches Preparation Method, system, terminal, server and mobile unit
CN104579679A (en) Wireless public network data forwarding method for rural power distribution network communication equipment
CN108683665A (en) Data ciphering method, system in fiber optic communication and data transmitting equipment
CN109246581A (en) A kind of method and apparatus of communication
CN109922022A (en) Internet of Things communication means, platform, terminal and system
US9325670B2 (en) Communication information transmitting process and system
CN114139176A (en) Industrial internet core data protection method and system based on state secret
CN102724205A (en) Method for encrypting communication process in industrial field and data collection device
CN102594564B (en) Equipment for traffic guidance information security management
CN107274283A (en) A kind of aerial hair fastener method and device
CN114173328A (en) Key exchange method and device and electronic equipment
CN103281324A (en) Safety communication method for Android client side
TW202123051A (en) Security authentication method, apparatus, and electronic device
CN208707655U (en) A kind of power distribution automation key agreement system
CN111246407A (en) Data encryption and decryption method and device for short message transmission
CN114584355B (en) Security authentication method, device and system for digital currency transaction
CN114793178B (en) Network distribution method, device, equipment and storage medium
CN110381011A (en) A kind of method and apparatus for realizing logistics equipment secure communication
CN106487761A (en) A kind of method for message transmission and the network equipment
CN111786955B (en) Method and apparatus for protecting a model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118

RJ01 Rejection of invention patent application after publication