CN109347837A - Blue-teeth data encrypted transmission method, bluetooth equipment and computer readable storage medium - Google Patents

Blue-teeth data encrypted transmission method, bluetooth equipment and computer readable storage medium Download PDF

Info

Publication number
CN109347837A
CN109347837A CN201811250089.1A CN201811250089A CN109347837A CN 109347837 A CN109347837 A CN 109347837A CN 201811250089 A CN201811250089 A CN 201811250089A CN 109347837 A CN109347837 A CN 109347837A
Authority
CN
China
Prior art keywords
blue
data
teeth data
user identifier
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811250089.1A
Other languages
Chinese (zh)
Other versions
CN109347837B (en
Inventor
柴启蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201811250089.1A priority Critical patent/CN109347837B/en
Publication of CN109347837A publication Critical patent/CN109347837A/en
Application granted granted Critical
Publication of CN109347837B publication Critical patent/CN109347837B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

The invention discloses a kind of blue-teeth data encrypted transmission method, bluetooth equipment and computer readable storage mediums, by obtaining user identifier in transmitting terminal, and then user identifier is added in the predetermined position in blue-teeth data to be sent, encrypted Bluetooth data to be sent are obtained, encrypted Bluetooth data to be sent are finally sent;And receiving end correspondence after receiving the encrypted Bluetooth data gets rid of user identifier and can restore to obtain required blue-teeth data.In this way; when carrying out Bluetooth transmission; after data are intercepted in a network; can only recognize one include blue-teeth data and user identifier file; and can not parse to obtain correct information, therefore achieved the purpose that encrypted transmission, improve the safety of data during Bluetooth transmission; privacy of user is protected, the user experience is improved.

Description

Blue-teeth data encrypted transmission method, bluetooth equipment and computer readable storage medium
Technical field
The present invention relates to fields of communication technology, set more specifically to a kind of blue-teeth data encrypted transmission method, bluetooth Standby and computer readable storage medium.
Background technique
With the continuous development of the communication technology, the data interaction of people is also more and more frequent.And Bluetooth technology is a kind of new Emerging wireless network transmission technology, it can provide the wireless data transmission of short-range, while have low cost, versatility High feature is applicable to a series of data transmission applications in extensive range.But Bluetooth transmission is all plaintext transmission, reality at present When transmit, the blue-teeth data of transmission be sudden and violent leakage in a network, safety is low, is unfavorable for protecting privacy of user.
Summary of the invention
The technical problem to be solved in the present invention is that: it is at present to leak cruelly in a network by the data of Bluetooth transmission, peace Full property is low, is unfavorable for protecting privacy of user.For the technical problem, the present invention provide a kind of blue-teeth data encrypted transmission method, Bluetooth equipment and computer readable storage medium.
In order to solve the above technical problems, the present invention provides a kind of blue-teeth data encrypted transmission method, the blue-teeth data adds Close transmission method includes:
Obtain user identifier;
The user identifier is added in predetermined position in blue-teeth data to be sent, obtains encrypted Bluetooth to be sent Data;
Send the encrypted Bluetooth data to be sent.
Optionally, the acquisition user identifier includes:
Obtain preset user identifier;
Or, the identification information of user's input is received, using the identification information as user identifier.
Optionally, the user identifier includes: international mobile equipment identification number.
Optionally, the predetermined position addition user identifier in blue-teeth data to be sent includes:
The user identifier is added in the byte header of the blue-teeth data to be sent;
Or, the blue-teeth data to be sent is divided into n part, institute is added in the byte header of each section blue-teeth data State user identifier;The n is more than or equal to 2.
Optionally, described that the blue-teeth data to be sent is divided into n part, in the byte-header of each section blue-teeth data The user identifier is added in portion
The blue-teeth data to be sent is divided into n part, the byte header difference of blue-teeth data in the n part The user identifier is added;
Or, the blue-teeth data to be sent is divided into n part, while the user identifier is divided into n part, The byte header of n part blue-teeth data is separately added into the user identifier of a part.
Optionally, the user identifier is added in the predetermined position in blue-teeth data to be sent, obtains pending The encrypted Bluetooth data sent include:
After the user identifier is added in the predetermined position in blue-teeth data to be sent, described pending Decryption mark is added in the specified location of the blue-teeth data sent, obtains encrypted Bluetooth data to be sent;The decryption mark is used Which kind of decrypted in informing receiving end using mode.
Optionally, the specified location in the blue-teeth data to be sent, which is added decryption and identifies, includes:
The decryption mark is added in the byte tail portion of the blue-teeth data to be sent.
Further, the present invention also provides a kind of blue-teeth data encrypted transmission method, the blue-teeth data encrypted transmissions Method includes:
Receive encrypted Bluetooth data;
Decryption indication information received from device external input, and/or decryption is extracted from the encrypted Bluetooth data Mark;
The decryption indication information is used to indicate out the user identifier in the encrypted Bluetooth data;The decryption mark is used Which kind of decrypted in informing receiving end using mode;
It is identified according to the decryption indication information and/or the decryption, gets rid of user from the encrypted Bluetooth data Mark, the blue-teeth data decrypted.
Further, the present invention also provides a kind of bluetooth equipment, the bluetooth equipment includes processor, memory and leads to Believe bus;
The communication bus is for realizing the connection communication between processor and memory;
The processor is for executing one or more program stored in memory, to realize that above-mentioned blue-teeth data adds The step of close transmission method.
Further, the present invention also provides a kind of computer readable storage medium, the computer readable storage mediums It is stored with one or more program, one or more of programs can be executed by one or more processor, to realize The step of above-mentioned blue-teeth data encrypted transmission method.
Beneficial effect
Blue-teeth data encrypted transmission method, bluetooth equipment and computer readable storage medium provided by the invention, for mesh The preceding data by Bluetooth transmission are that in a network, safety is low for leakage cruelly, are unfavorable for the technical issues of protecting privacy of user, lead to It crosses and obtains user identifier in transmitting terminal, and then user identifier is added in the predetermined position in blue-teeth data to be sent, obtain To encrypted Bluetooth data to be sent, encrypted Bluetooth data to be sent are finally sent;And receiving end is receiving encryption indigo plant Correspondence, which gets rid of user identifier, after tooth data can restore to obtain required blue-teeth data.In this way, when carrying out Bluetooth transmission, number After being intercepted in a network, one can only be recognized and include the file of blue-teeth data and user identifier, and can not parsed To correct information, therefore encrypted transmission is achieved the purpose that, has improved the safety of data during Bluetooth transmission, protect Privacy of user, the user experience is improved.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware structural diagram of Fig. 1 optional terminal of each embodiment to realize the present invention;
A kind of optional communications network system architecture diagram of Fig. 2 each embodiment to realize the present invention;
Fig. 3 is a kind of basic procedure of the blue-teeth data encrypted transmission method for transmitting terminal that first embodiment of the invention provides Schematic diagram;
Fig. 4 is a kind of user identifier set interface figure that first embodiment of the invention provides;
Fig. 5 is another user identifier set interface figure that first embodiment of the invention provides;
Fig. 6 is another user identifier set interface figure that first embodiment of the invention provides;
Fig. 7 is a kind of basic procedure of the blue-teeth data encrypted transmission method for receiving end that first embodiment of the invention provides Schematic diagram;
Fig. 8 is a kind of structural schematic diagram for bluetooth equipment that third embodiment of the invention provides.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as with bending Mobile phone, tablet computer, laptop, palm PC, personal digital assistant (the Personal Digital of function Assistant, PDA), portable media player (Portable Media Player, PMP), navigation device, wearable set The fixed terminals such as the mobile terminals such as standby, Intelligent bracelet, pedometer, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Dynamic terminal 100 may include: RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage carries out in memory 109 (or other computer readable storage mediums) or via radio frequency unit 101 or WiFi module 102 It sends.Microphone 1042 can be in telephone calling model, logging mode, speech recognition mode etc. operational mode via Mike Wind 1042 receives sound (audio data), and can be audio data by such acoustic processing.Treated audio (language Sound) data can be converted in the case where telephone calling model to be sent to mobile communication base station via radio frequency unit 101 Format output.Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and received with eliminating (or inhibition) With the noise or interference generated during transmission audio signal.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 further includes bluetooth module, and details are not described herein.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber bluetooth equipment) 2032, other MME2033, SGW (Serving Gate Way, gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
First embodiment
It is that in a network, safety is low for leakage cruelly for the current data by Bluetooth transmission, is unfavorable for protecting user hidden Private technical problem, present embodiments provides a kind of blue-teeth data encrypted transmission method.Shown in Figure 3, Fig. 3 is the present embodiment A kind of basic procedure schematic diagram of the blue-teeth data encrypted transmission method provided, comprising:
S301: user identifier is obtained;
In the present embodiment, user identifier can be pre-set, the mark being present in sending ending equipment, such as It can be IMEI (International Mobile Equipment Identity, international mobile equipment identification number) etc., it can also To be mark that other are set in advance in sending ending equipment, such as " ABCSS ", " 125AB ".
In addition, in the present embodiment, user identifier is also possible to input by user when each secondary device needs to obtain.Thing In reality, since Bluetooth transmission is short range transmission, distance is very close between receiving end and the equipment of transmitting terminal, the use of transmitting terminal Family can directly and the user of receiving end is oral consults why user identifier needs setting, and then it is input to transmitting terminal User identifier is used as in equipment.What needs to be explained here is that user can be from the customized mark of primary input, example in the present embodiment As shown in figure 4, user can input customized mark " ABCSS " in the bullet frame that equipment provides, but it also can choose and set Pre-existing mark in standby, such as shown in Fig. 5, user can select an existing mark in the Option Box that equipment provides, Such as have provided in Fig. 5 " MEID (Mobile Equipment Identifier, mobile device identification code) " and " IMEI ", user can choose one of them as user identifier.It should be noted that above two mode can be adopted simultaneously With, such as shown in Fig. 6, user can choose can also be from the customized mark of primary input.
S302: the user identifier is added in the predetermined position in blue-teeth data to be sent, obtains encryption to be sent Blue-teeth data;
In the present embodiment, user identifier is added in the byte header that may be set in blue-teeth data to be sent.In order into One step promotes encryption intensity, in the present embodiment, blue-teeth data to be sent can also be divided into n (n is more than or equal to 2) a portion Point, and then user identifier is added in the byte header of various pieces blue-teeth data.
Specifically, the blue-teeth data to be sent can be divided into n part, in the word of this n part blue-teeth data Section header portion is separately added into user identifier.For example, setting blue-teeth data to be sent as " abcdefgABCDEFG ", if user identifier is " 5874545 " if " abcdefgABCDEFG " is divided into two parts " abcdefg " and " ABCDEFG ", are then distinguished if n is 2 Increase " 5874545 " before " abcdefg " and " ABCDEFG ", obtains encrypted blue-teeth data “5874545abcdefg5874545ABCDEFG”。
Specifically, blue-teeth data to be sent can also be divided into n part, while user identifier is divided into n part, The user identifier of a part is separately added into the byte header of n part blue-teeth data.For example, set user identifier as " 5874545 ", will if " abcdefgABCDEFG " is divided into two parts " abcdefg " and " ABCDEFG " if n is 2 " 5874545 " are divided into " 587 " and " 45454 " two parts, then increase " 587 " before " abcdefg ", increase before " ABCDEFG " Add " 4545 ", obtains encrypted blue-teeth data " 587abcdefg4545ABCDEFG ".
It should be understood that the byte tail portion that also may be set in blue-teeth data to be sent in the present embodiment is added and uses Family mark, user identifier is added in somewhere among the byte of blue-teeth data to be sent, or divides by blue-teeth data to be sent For n part, and then user identifier etc. is added in the byte header of various pieces blue-teeth data and tail portion.Particular user mark The setting of coal addition position can be arranged according to actual needs.
It is flat it should be noted that may be set in the present embodiment when blue-teeth data to be sent is divided into n part It divides, such as " abcdefgABCDEFG " is divided into two parts " abcdefg " and " ABCDEFG " in upper example.But it can also Random division when setting, when random division, that is, the size length of each section can be inconsistent, such as can will " abcdefgABCDEFG " is divided into the two non-uniform parts " abcdefgABC " and " DEFG ".It should be understood that similarly, it is right It can be average division in user identifier, be also possible to random division.
It should also be noted that, in the present embodiment, user is added in the predetermined position in blue-teeth data to be sent After mark, decryption mark can also be added in the specified location of blue-teeth data to be sent, it is blue to obtain encryption to be sent Tooth data.For example, decryption mark can be added in the byte tail portion of blue-teeth data to be sent.And decryption mark can then be used Which kind of decrypted in informing receiving end using mode.For example, setting blue-teeth data to be sent as " abcdefgABCDEFG ", if user " 5874545 " are identified as, if n is 2, if " abcdefgABCDEFG " is divided into two parts " abcdefg " and " ABCDEFG ", " 5874545 " are divided into " 587 " and " 45454 " two parts, and user identifier is added and obtains data later " 587abcdefg4545ABCDEFG ", the corresponding decryption of mode for being located at the head addition user identifier of blue-teeth data are identified as A is identified as b in the corresponding decryption of mode that user identifier is added in the middle of blue-teeth data, if using one altogether completely The corresponding decryption of user identifier be identified as 1, use the corresponding decryption of N number of complete user identifier altogether and be identified as N, then It is " 587abcdefg4545ABCDEFG ab1 " to encrypted Bluetooth data, correspondingly, if obtaining data after user identifier is added For " 5874545abcdefg5874545ABCDEFG ab2 ", such receiving end can be true according to the decryption of tail portion mark after receiving Surely how should decrypt.It should be understood that aforementioned exemplary from a variety of adding manners suitable for can flexibly choose a kind of side In the case that formula encrypts, when the position of addition is necessarily fixed, i.e., it can only be added using fixed position when terminal encrypts every time When access customer identifies, decryption mark does not need the point of addition of identity user mark, when addition quantity is necessarily fixed, then decrypts Mark does not need the addition quantity of identity user mark.It is to be further understood that the decryption mark of precedent is with identity user mark The point of addition of knowledge and addition quantity are identified, but in the present embodiment decryption mark be not be only capable of comprising this two Kind, it substantially can also directly identify user identifier.For example, when setting user identifier using IMEI code, it can be in tail End mark, to inform receiving end user identifier as the IMEI code of sending ending equipment.Receiving end can request to connect in decryption at this time Receiving end obtains its IMEI code, and then realizes automatic decryption.
It should be understood that for receiving end, since Bluetooth transmission is short range transmission, receiving end and transmitting terminal Distance is very close to the user of receiving end can directly and the user of transmitting terminal confirms that user identifier is, in turn between equipment It manipulates receiving device and realizes decryption.It is especially noted that for acquisition be preset user identifier when, can be with The user identifier that will acquire is shown to the user of transmitting terminal, so that the user of receiving end can obtain from the user of transmitting terminal User identifier.In addition it is also possible to above-mentioned in such a way that tail end identifies user identifier receiving end can be known automatically What the user identifier of use is.
S303: the encrypted Bluetooth data to be sent are sent.
In the present embodiment, the encrypted Bluetooth data to be sent can be sent to reception according to existing Bluetooth protocol End.It should be noted that, when transmitting data, essence can also carry out data primary simple in existing Bluetooth protocol Encryption and in the present embodiment, still can be with when sending the encrypted Bluetooth data to be sent according to existing Bluetooth protocol Single treatment is carried out to the encrypted Bluetooth data to be sent according to the cipher mode in existing Bluetooth protocol, that is, uses this reality Double-encryption may be implemented in the data for applying the scheme transmission of example.
For receiving end, since Bluetooth transmission is short range transmission, distance between receiving end and the equipment of transmitting terminal Can directly very close to the user of, receiving end and what the user of transmitting terminal confirmation user identifier is, and then to sending ending equipment Input decryption indication information to allow sending ending equipment to get rid of user identifier from encrypted Bluetooth data, is decrypted Blue-teeth data.In addition, transmitting terminal encryption when be added have decryption identify when, receiving end can in conjunction with the decryption identify or according only to Decryption mark is decrypted to realize.
Specifically, shown in Figure 7, comprising:
S701: encrypted Bluetooth data are received;
In the present embodiment, receiving end still can receive the data that transmitting terminal is sent based on existing Bluetooth protocol, and to this Data are decrypted based on the cipher mode of existing Bluetooth protocol, obtain the encrypted Bluetooth encrypted based on this embodiment scheme Data.
S702: the decryption indication information received from device external input, and/or solution is extracted from the encrypted Bluetooth data Secret mark is known;
At this point, receiving end subscriber to directly input and send end subscriber inquiry user identifier is what, and then input solution Close instruction information is into equipment.It should be noted that decryption indication information is used to indicate out the use in the encrypted Bluetooth data Family mark, specifically, the decryption indication information can be specific user identifier, but it is also possible to be instruction, it is specifically wherefrom obtained User identifier is taken, such as sets user identifier as the IMEI code of transmitting terminal, then decryption indication information can be instruction receiving device IMEI code acquisition request is sent to the information of sending ending equipment.
S703: identifying according to the decryption indication information and/or the decryption, and user's mark is got rid of from encrypted Bluetooth data Know, the blue-teeth data decrypted.
It should be understood that such as user can only be added by the byte header in blue-teeth data when cipher mode is fixed When the mode of mark encrypts, it can directly parse to obtain blue-teeth data according to the decryption indication information that user inputs at this time.But When cipher mode is not fixed, need that decryption mark is combined just to be able to achieve decryption at this time.For example, setting the encrypted Bluetooth received Data are " 587abcdefg4545ABCDEFG ab1 ", and the decryption indication information of user's input is " 5874545 ", then when decrypting Receiving device from the head of " 587abcdefg4545ABCDEFG ab1 " and intermediate position extract respectively " 587 " and " 45454 ", after both confirmations constitute one complete " 5874545 ", the decryption mark ab1 for removing tail portion obtains blue-teeth data “abcdefgABCDEFG”。
It should also be understood that be, if identify user identifier in decryption mark, receiving device can directly decrypt without User is needed to input.For example, such as user identifier can only be added by the byte header in blue-teeth data when cipher mode is fixed Mode when encrypting, if the user identifier used (sets the occurrence of this yard as X), if blue-teeth data is for IMEI code " abcdefgABCDEFG ", then the encrypted Bluetooth data received are " blue-teeth data " XabcdefgABCDEFG IMEI ", it receives End equipment is that can request the IMEI code of sending ending equipment that can remove head when obtaining IMEI code is X to sending ending equipment " X ", while removing " IMEI " of tail portion, obtain blue-teeth data " abcdefgABCDEFG ".When cipher mode is not fixed, if adopting User identifier is that IMEI code (sets the occurrence of this yard as X), the encrypted Bluetooth data received are " XabcdefgXABCDEFG ab2IMEI ", receiving device are the IMEI code that sending ending equipment can be requested to sending ending equipment, When obtaining IMEI code is X, receiving device is distinguished from the head of " XabcdefgXABCDEFG ab2IMEI " and intermediate position " X " and " X " are extracted, and removes " ab2IMEI " of tail portion to get blue-teeth data " abcdefgABCDEFG " is arrived.
It should be understood that each step of above-mentioned blue-teeth data encrypted transmission method can be by terminal as shown in Figure 1 100 independently realize.Specifically, can realize one or more journeys of above-mentioned each step by storing in memory 109 Sequence executes the program by processor 110, to realize each step of above-mentioned blue-teeth data encrypted transmission method.Furthermore, it is necessary to It is noted that the request and data interaction of the IMEI code between transmitting terminal and receiving end, can pass through the short-range communications such as bluetooth Means are realized, but can also be realized by communications network system as shown in Figure 2.
Blue-teeth data encrypted transmission method provided in this embodiment, by obtaining user identifier in transmitting terminal, and then will be User identifier is added in predetermined position in blue-teeth data to be sent, obtains encrypted Bluetooth data to be sent, finally sends Encrypted Bluetooth data to be sent;And corresponding user identifier of getting rid of can be also after receiving the encrypted Bluetooth data for receiving end Original obtains required blue-teeth data.In this way, after data are intercepted in a network, one can only be recognized when carrying out Bluetooth transmission It is a to include the file of blue-teeth data and user identifier, and can not parse to obtain correct information, therefore reached encrypted transmission Purpose, improve the safety of data during Bluetooth transmission, protect privacy of user, the user experience is improved.
Second embodiment
The present embodiment provides a kind of encrypted transmission methods of blue-teeth data, specific:
Because bluetooth is short-distance transmission, it is well suited for user and adds user identifier, convenient for directly negotiating between user User identifier is obtained, encryption and anti-encryption are carried out.
Byte stream can all be become since file transmits in a network, user spy can be added when file is converted Fixed mark, such as mobile phone IMEI code, IMEI have uniqueness, IMEI are packaged, and then become file as byte-header A part, entire file is re-started into encryption, and using encryption method as byte tail;
Receiving end first identifies the byte-header when receiving, and the encryption method of byte tail is then identified according to byte-header, carries out Decryption.
In this way, when anyone intercepts the information in a network, because " IMEI+ file+end-of-file " is all uniformly sealed It filled, and so network can only identify that this is a unified file, and correct information can not be resolved to, therefore, reach encryption The purpose of transmission improves the safety of data during Bluetooth transmission, protects privacy of user, and the user experience is improved.
3rd embodiment
Present embodiments provide a kind of bluetooth equipment, it is shown in Figure 8 comprising processor 801, memory 802 and Communication bus 803.Wherein:
Communication bus 803 is for realizing the connection communication between processor 801 and memory 802.
Processor 801 is for executing the one or more programs stored in memory 802, to realize above-mentioned first embodiment And/or in second embodiment the blue-teeth data encrypted transmission process of transmitting terminal each step, or realize above-mentioned first embodiment and/ Or in second embodiment the blue-teeth data encrypted transmission process of receiving end each step.
The present embodiment provides a kind of computer readable storage mediums, such as floppy disk, CD, hard disk, flash memory, USB flash disk, CF card, SD Card, mmc card etc. are stored with one or more program for realizing above-mentioned each step in the computer readable storage medium, This one or more program can be executed by one or more processor, to realize above-mentioned first embodiment and/or second in fact Each step of the blue-teeth data encrypted transmission process of transmitting terminal in example is applied, or realizes above-mentioned first embodiment and/or the second implementation Each step of the blue-teeth data encrypted transmission process of receiving end in example.Details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, the computer software product be stored in one it is computer-readable In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, calculate Machine, bluetooth equipment, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of blue-teeth data encrypted transmission method, which is characterized in that the blue-teeth data encrypted transmission method includes:
Obtain user identifier;
The user identifier is added in predetermined position in blue-teeth data to be sent, obtains encrypted Bluetooth number to be sent According to;
Send the encrypted Bluetooth data to be sent.
2. blue-teeth data encrypted transmission method as described in claim 1, which is characterized in that the acquisition user identifier includes:
Obtain preset user identifier;
Or, the identification information of user's input is received, using the identification information as user identifier.
3. blue-teeth data encrypted transmission method as claimed in claim 2, which is characterized in that the user identifier includes: the world Mobile device identification code.
4. blue-teeth data encrypted transmission method as described in claim 1, which is characterized in that described in blue-teeth data to be sent In predetermined position the user identifier be added include:
The user identifier is added in the byte header of the blue-teeth data to be sent;
Or, the blue-teeth data to be sent is divided into n part, the use is added in the byte header of each section blue-teeth data Family mark;The n is more than or equal to 2.
5. blue-teeth data encrypted transmission method as claimed in claim 4, which is characterized in that described by the bluetooth to be sent Data are divided into n part, and the user identifier is added in the byte header of each section blue-teeth data and includes:
The blue-teeth data to be sent is divided into n part, the byte header of blue-teeth data is separately added into the n part The user identifier;
Or, the blue-teeth data to be sent is divided into n part, while the user identifier is divided into n part, described The byte header of n part blue-teeth data is separately added into the user identifier of a part.
6. blue-teeth data encrypted transmission method as described in any one in claim 1-5, which is characterized in that described to be sent The user identifier is added in predetermined position in blue-teeth data, and obtaining encrypted Bluetooth data to be sent includes:
After the user identifier is added in the predetermined position in blue-teeth data to be sent, described to be sent Decryption mark is added in the specified location of blue-teeth data, obtains encrypted Bluetooth data to be sent;The decryption mark is for accusing Know that receiving end is decrypted using which kind of mode.
7. blue-teeth data encrypted transmission method as claimed in claim 6, which is characterized in that described in the bluetooth to be sent Decryption mark is added in the specified location of data
The decryption mark is added in the byte tail portion of the blue-teeth data to be sent.
8. a kind of blue-teeth data encrypted transmission method, which is characterized in that the blue-teeth data encrypted transmission method includes:
Receive encrypted Bluetooth data;
Decryption indication information received from device external input, and/or decryption mark is extracted from the encrypted Bluetooth data;
The decryption indication information is used to indicate out the user identifier in the encrypted Bluetooth data;The decryption mark is for accusing Know that receiving end is decrypted using which kind of mode;
It is identified according to the decryption indication information and/or the decryption, gets rid of user identifier from the encrypted Bluetooth data, The blue-teeth data decrypted.
9. a kind of bluetooth equipment, which is characterized in that the bluetooth equipment includes processor, memory and communication bus;
The communication bus is for realizing the connection communication between processor and memory;
The processor is for executing one or more program stored in memory, to realize as appointed in claim 1 to 7 The step of blue-teeth data encrypted transmission method described in one, or realize blue-teeth data encrypted transmission as claimed in claim 8 The step of method.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be executed by one or more processor, to realize such as claim 1 to 7 Any one of described in blue-teeth data encrypted transmission method the step of, or realize blue-teeth data as claimed in claim 8 encryption The step of transmission method.
CN201811250089.1A 2018-10-25 2018-10-25 Bluetooth data encryption transmission method, Bluetooth device and computer readable storage medium Active CN109347837B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811250089.1A CN109347837B (en) 2018-10-25 2018-10-25 Bluetooth data encryption transmission method, Bluetooth device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811250089.1A CN109347837B (en) 2018-10-25 2018-10-25 Bluetooth data encryption transmission method, Bluetooth device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109347837A true CN109347837A (en) 2019-02-15
CN109347837B CN109347837B (en) 2021-07-06

Family

ID=65311813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811250089.1A Active CN109347837B (en) 2018-10-25 2018-10-25 Bluetooth data encryption transmission method, Bluetooth device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109347837B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111783110A (en) * 2019-04-04 2020-10-16 邓铮 Data protection method, computer device and computer-readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1067796A1 (en) * 1999-04-23 2001-01-10 Pace Micro Technology PLC Memory database creation system for encrypted programme material
CN102377974A (en) * 2010-08-04 2012-03-14 中国电信股份有限公司 Mobile terminal, receiving end and video acquiring method and system
CN102761563A (en) * 2011-04-25 2012-10-31 中国移动通信集团山东有限公司 Data transmission method, device and system
CN111050321A (en) * 2018-10-12 2020-04-21 中兴通讯股份有限公司 Data processing method, device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1067796A1 (en) * 1999-04-23 2001-01-10 Pace Micro Technology PLC Memory database creation system for encrypted programme material
CN102377974A (en) * 2010-08-04 2012-03-14 中国电信股份有限公司 Mobile terminal, receiving end and video acquiring method and system
CN102761563A (en) * 2011-04-25 2012-10-31 中国移动通信集团山东有限公司 Data transmission method, device and system
CN111050321A (en) * 2018-10-12 2020-04-21 中兴通讯股份有限公司 Data processing method, device and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111783110A (en) * 2019-04-04 2020-10-16 邓铮 Data protection method, computer device and computer-readable storage medium

Also Published As

Publication number Publication date
CN109347837B (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN109257740B (en) Profile downloading method, mobile terminal and readable storage medium
CN108616499B (en) Authentication method of application program, terminal and computer readable storage medium
CN109033801B (en) Method for verifying user identity by application program, mobile terminal and storage medium
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
CN109618316A (en) Network share method, mobile terminal and storage medium
CN107317680B (en) Method and system for marking safety account and computer readable storage medium
CN110069229A (en) Screen sharing method, mobile terminal and computer readable storage medium
CN109743696A (en) Identifying code encryption method, system and readable storage medium storing program for executing
CN110213765A (en) APN information acquisition methods, terminal, server and storage medium
CN107506039A (en) Mobile terminal, data transmission method and computer-readable storage medium
CN108616878A (en) A kind of encrypting and decrypting method, equipment and computer storage media
CN108961489A (en) A kind of equipment wearing control method, terminal and computer readable storage medium
CN109803249A (en) A kind of WIFI network sharing method, terminal and computer readable storage medium
CN107302526B (en) System interface calling method, device and computer readable storage medium
CN108601062A (en) WiFi connections sharing method, terminal and computer storage media
CN110190947B (en) Information encryption and decryption method, terminal and computer readable storage medium
CN109347837A (en) Blue-teeth data encrypted transmission method, bluetooth equipment and computer readable storage medium
CN107204977B (en) Interface security verification method and device and computer readable storage medium
CN109068317A (en) Communication means, communication processing apparatus and computer readable storage medium
CN108876387A (en) A kind of payment verification method, equipment and computer readable storage medium
CN108616873A (en) Data transmission, method for sending information, device, mobile device and storage medium
CN107256360A (en) File encrypting method, mobile terminal and computer-readable recording medium
CN110602708B (en) Pseudo base station identification method, terminal and computer readable storage medium
CN108197490B (en) Method and terminal for preventing malicious acquisition of user authorization information
CN108243417B (en) WIFI connection-based user permission determination method, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant