CN109547991A - Password providing method and bluetooth equipment between bluetooth equipment - Google Patents

Password providing method and bluetooth equipment between bluetooth equipment Download PDF

Info

Publication number
CN109547991A
CN109547991A CN201811644551.6A CN201811644551A CN109547991A CN 109547991 A CN109547991 A CN 109547991A CN 201811644551 A CN201811644551 A CN 201811644551A CN 109547991 A CN109547991 A CN 109547991A
Authority
CN
China
Prior art keywords
bluetooth
password
slave devices
data
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811644551.6A
Other languages
Chinese (zh)
Inventor
孙吉平
练美英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201811644551.6A priority Critical patent/CN109547991A/en
Publication of CN109547991A publication Critical patent/CN109547991A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses the password providing methods and bluetooth equipment between a kind of bluetooth equipment.The method is applied to the Bluetooth slave devices comprising data security module, which comprises receives the order of shaking hands comprising verify data from bluetooth host;After verifying the bluetooth host according to the verify data as bound host equipment, Xiang Suoshu bluetooth host sends response of shaking hands;It receives the cipher inquiry instruction from the bluetooth host and designated pin is searched from the data security module according to cipher inquiry instruction, and show the password found in display screen.By using technical solution provided herein, application layer can be needed to shake hands interaction between bluetooth equipment before obtaining password, password storage does not go out Bluetooth slave devices in special security module, realizes the effect for improving the safety of presentation mode of code data.

Description

Password providing method and bluetooth equipment between bluetooth equipment
Technical field
The present embodiments relate to the password providing methods between technical field of data transmission more particularly to a kind of bluetooth equipment And bluetooth equipment.
Background technique
With the appearance and fast development of Internet technology, the life style of the mankind has obtained huge change, but big Simultaneously, data safety is also particularly important for the transmission of amount data.
In the prior art, bluetooth host (including the terminals such as mobile terminal or computer) is in the account for getting user's input When, it needs to extract password corresponding with input account from password storage end.In addition to this, some program passwords are further related to.And it is close The password of code storage end output is after entering bluetooth host, if bluetooth host has been monitored or has cracked, just greatly Reduce cipher safety, it is serious or even huge loss can be caused for user or company.Therefore, a kind of safe password Presentation mode urgently generates.
Summary of the invention
The embodiment of the present invention provides password providing method and bluetooth equipment between a kind of bluetooth equipment, can obtain password Application layer is needed to shake hands interaction between bluetooth equipment before, password storage does not go out Bluetooth slave devices in special security module, Realize the effect for improving the safety of presentation mode of code data.
In a first aspect, the embodiment of the invention provides the password providing method between a kind of bluetooth equipment, the method application In the Bluetooth slave devices comprising data security module, this method comprises:
Receive the order of shaking hands comprising verify data from bluetooth host;
After verifying the bluetooth host according to the verify data as bound host equipment, Xiang Suoshu bluetooth host hair Send response of shaking hands;
It receives the cipher inquiry instruction from the bluetooth host and is pacified according to cipher inquiry instruction from the data Designated pin is searched in full module, and shows the password found in display screen.
It further, include that password storage is numbered in the cipher inquiry instruction;
Designated pin is searched from the data security module according to cipher inquiry instruction, comprising:
Number after being numbered according to the password storage or being converted to password storage number, from the data safety Designated pin is searched in module.
Further, the password found from the data security module is ciphertext data;
The password found is shown in display screen, comprising: show in display screen to after the ciphertext data deciphering of lookup.
Further, after receiving the order of shaking hands, the method also includes generating data according to preset-key to hand over Mutual key;
The cipher inquiry instruction is encrypted instruction ciphertext, correspondingly, decrypting institute using the data interaction key It states instruction ciphertext and obtains cipher inquiry instruction in plain text.
Further, data interaction key is generated according to preset-key, comprising: according to preset-key and the verify data Some or all of generate data interaction key.
Further, before receiving the order of shaking hands that bluetooth host is sent, the method also includes: it is built with bluetooth host Vertical binding relationship, in which:
After establishing bluetooth connection with bluetooth host, the pairing request that bluetooth host is sent is received, in the pairing request Including key parameter;
After the preset-key is calculated according to the key parameter, Xiang Suoshu bluetooth host sends pairing response.
Second aspect, the embodiment of the invention also provides the password providing method between a kind of bluetooth equipment, the method is answered For bluetooth host, which comprises
The order of shaking hands comprising verify data is sent to Bluetooth slave devices, the verify data judges for Bluetooth slave devices Whether the bluetooth host is the host equipment bound;
Receive the response of shaking hands that the Bluetooth slave devices return;
Cipher inquiry instruction is sent to the Bluetooth slave devices, so that data of the Bluetooth slave devices included by itself Designated pin is searched in security module, and the password found is shown in display screen.
It further, include that password storage is numbered in the cipher inquiry instruction, the password storage number or password Number after storage number conversion has corresponding close with the password number of stored password in Bluetooth slave devices data security module System.
Further, to the Bluetooth slave devices send cipher inquiry instruction so that the Bluetooth slave devices from itself Designated pin is searched in included data security module, and before showing the password found in display screen, the method Further include:
Data interaction key is generated according to preset-key;
It is instructed and is encrypted using cipher inquiry described in the data interaction key pair.
Further, data interaction key is generated according to preset-key, comprising:
Data interaction key is generated according to some or all of preset-key and the verify data.
Further, before sending the order of shaking hands comprising verify data to Bluetooth slave devices, the method also includes:
Binding relationship is established with Bluetooth slave devices;Wherein: after establishing bluetooth connection with Bluetooth slave devices, to bluetooth from Equipment sends pairing request, includes key parameter in the pairing request;
Receive the pairing response and the preset-key is calculated according to the key parameter that Bluetooth slave devices are sent.
The third aspect, the password between bluetooth equipment provide device, and described device is configured at the indigo plant comprising data security module Tooth includes: from equipment, described device
Transceiver module, for receiving the order of shaking hands comprising verify data from bluetooth host;
Authentication module is used for after verifying the bluetooth host according to the verify data as bound host equipment, to The bluetooth host sends response of shaking hands;
Password provisioning module, for receiving the cipher inquiry instruction from the bluetooth host and according to the cipher inquiry Designated pin is searched in instruction from the data security module, and the password found is shown in display screen.
Fourth aspect, the password between bluetooth equipment provide device, and described device is configured at bluetooth host, described device packet It includes:
Shake hands command sending module, for sent to Bluetooth slave devices include verify data order of shaking hands, the verifying Data judge whether the bluetooth host is the host equipment bound for Bluetooth slave devices;
It shakes hands response receiving module, the response of shaking hands returned for receiving the Bluetooth slave devices;
Cipher inquiry instruction sending module, for sending cipher inquiry instruction to the Bluetooth slave devices, so that the indigo plant Tooth searches designated pin from equipment from the data security module included by itself, and shown in display screen find it is close Code.
5th aspect, the embodiment of the present application provide a kind of bluetooth equipment, which includes:
Data security module is arranged for carrying out the calculating and storage of key;
Memory is configured to storage executable program;
Processor is configured to realize method and step described in above-mentioned first aspect when executing the executable program.
6th aspect, the embodiment of the present application provide a kind of bluetooth equipment, which includes:
Memory is configured to storage executable program;
Processor is configured to realize method and step described in above-mentioned second aspect when executing the executable program.
7th aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey Sequence realizes that the bluetooth as described in the above-mentioned first aspect of the embodiment of the present application or second aspect is set when the program is executed by processor Password providing method between standby.
Technical solution provided by the embodiment of the present application, executes on the Bluetooth slave devices comprising data security module.It is logical It crosses using technical solution provided herein, application layer can be needed to shake hands friendship between bluetooth equipment before obtaining password Mutually, password storage does not go out Bluetooth slave devices in special security module, realizes the safety for improving the presentation mode of code data The effect of property.
Detailed description of the invention
Fig. 1 is the flow chart of the password providing method between the bluetooth equipment that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of the password providing method between bluetooth equipment provided by Embodiment 2 of the present invention;
Fig. 3 is the interaction signaling diagram between the bluetooth equipment that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural schematic diagram for bluetooth equipment that the embodiment of the present invention four provides;
Fig. 5 is the structural schematic diagram for the Bluetooth slave devices that the embodiment of the present invention four provides;
Fig. 6 is a kind of concrete structure schematic diagram for bluetooth equipment that the embodiment of the present invention four provides;
Fig. 7 is the structural schematic diagram for another bluetooth equipment that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing or method described as flow chart.Although each step is described as the processing of sequence by flow chart, many of these Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation The processing can be terminated when completion, it is also possible to have the additional step being not included in attached drawing.The processing can be with Corresponding to method, function, regulation, subroutine, subprogram etc..
Embodiment one
Fig. 1 is the flow chart of the password providing method between the bluetooth equipment that the embodiment of the present invention one provides, and the present embodiment can It is applicable in the case where cryptographic service is provided, this method can be executed by the Bluetooth slave devices between bluetooth equipment in interaction, the bluetooth From the device include processor and the encryption chip as data security module, below will using Bluetooth slave devices as executing subject, It in particular be using the processor in Bluetooth slave devices is executing subject between bluetooth equipment provided in an embodiment of the present invention Password providing method is illustrated.
As shown in Figure 1, the password providing method between the bluetooth equipment includes:
S110, the order of shaking hands comprising verify data from bluetooth host is received.
The technical program can be executed by the Bluetooth slave devices configured with security module.In the technical scheme, bluetooth from Equipment may include the equipment being connect by bluetooth approach with bluetooth host such as Intelligent bracelet, smartwatch.Bluetooth is from setting It is standby to be configured with display equipment, to be shown to code data.It should be understood that for code data carry out display be for Can allow bluetooth host is read and is inputted use using user, so if other modes is taken to allow the making of bluetooth host Known with user, such as the form of voice broadcast, method provided by the technical program can also be applied.Bluetooth slave can be Low-power consumption bluetooth (Bluetooth Low Energy, BLE) equipment, bluetooth host can be by way of communication connection and blue The tooth other end opposite from equipment.
In the technical scheme, before obtaining the cipher inquiry request of bluetooth host, Bluetooth slave devices and bluetooth host Establish bluetooth connection.After establishing bluetooth connection with bluetooth host, Bluetooth slave devices detect whether to receive within a preset time The order of shaking hands sent to bluetooth host, wherein preset time can be 30 seconds, 45 seconds or 1 minute, if in preset time It inside detects the order of shaking hands that bluetooth host issues, then feeds back response of shaking hands after verifying to bluetooth host;If default The order of shaking hands of bluetooth host sending is not detected in time, then disconnects the bluetooth connection between bluetooth host, is arranged in this way Benefit be can be improved password provide service safety.
Wherein, include verify data in the order of shaking hands that bluetooth host is sent, may include in the verify data for The data such as data, the used Encryption Algorithm of bluetooth host and version of bluetooth host identity are verified, it is possible thereby to bluetooth master Machine is verified the identity of bluetooth host before providing password to improve the safety of code data.Specifically, the verify data It may include firmware version, algorithm information, host MAC and other additional datas.Setting in this way, can be to bluetooth master The identity and firmware version and algorithm information of machine confirmed, with guarantee subsequently through algorithm encrypted the result is that just True.
It S120, verifying the bluetooth host according to the verify data is Xiang Suoshu bluetooth after bound host equipment Host sends response of shaking hands.
In the embodiment of the present invention, Bluetooth slave devices only provide password to its bluetooth host with binding relationship Data, therefore, after Bluetooth slave devices establish bluetooth connection with bluetooth host every time, progress application layer is shaken hands, and is being shaken hands Verify whether current Bluetooth host is bound host equipment in journey, only determines that current Bluetooth host is during the handshake process After bound host, just support to carry out subsequent interaction.Wherein, Bluetooth slave devices are contained in handshake request by what is received Verify data verifies whether current Bluetooth host is legal bluetooth host, and only after being proved to be successful, feeds back to bluetooth host Indicate that host verification is successfully shaken hands response.
S130, it receives the cipher inquiry instruction from the bluetooth host and is instructed according to the cipher inquiry from the number According to searching designated pin in security module, and the password found is shown in display screen.
Wherein, cipher inquiry instruction can be the inquiry request of password required for bluetooth host, and password can store In the data security module of Bluetooth slave devices, wherein data security module is the specific can be that configuration adding in Bluetooth slave devices Close chip.When bluetooth host needs password, password can be sent to Bluetooth slave devices after shaking hands successfully with Bluetooth slave devices Inquiry instruction.After Bluetooth slave devices receive cipher inquiry instruction, it can be responded by the processor in Bluetooth slave devices, It can be responded by the data security module in Bluetooth slave devices.That is, after Bluetooth slave devices receive cipher inquiry instruction, it can With by processor parsing cipher inquiry instruction, determine encrypted message to be checked, after determining encrypted message to be checked by Processor or data security module search specific password according to encrypted message to be checked from data security module;Another In a kind of feasible mode, after Bluetooth slave devices receive cipher inquiry instruction, cipher inquiry instruction is sent to by processor Data security module is parsed to obtain encrypted message to be checked, Zhi Hougen by data security module to cipher inquiry instruction Specific password is searched according to encrypted message to be checked.
It is above-mentioned that display screen is sent to by processor from the password found in data security module and is shown in display screen The password found, so that user checks and by being manually entered into bluetooth host.The benefit being arranged in this way is password number According to Bluetooth slave devices ontology can not be gone out, avoid illegal user by way of data interception packet from third party's decryption, from And it reduces password and the safety of service is provided.
It in the technical scheme, optionally, include that password storage is numbered in the cipher inquiry instruction;According to the password Inquiry instruction searches designated pin from the data security module, comprising: is numbered according to the password storage or to described Number after password storage number conversion, searches designated pin from the data security module.Wherein, code data can be with The mode of data storage corresponding with password storage number itself is stored in data security module.It can wrap in cipher inquiry instruction Password storage number is included, after Bluetooth slave devices receive cipher inquiry instruction, can be numbered according to password storage therein, really Determine the position that password is stored in security module, and the code data stored in the position is shown and is made for user's reading With.In the technical scheme, it can be numbered according to password storage and search designated pin in data security module, it can also basis Number after password storage number conversion determines code data, and wherein conversion regime, which can be, compiles password storage by bluetooth host It number is encrypted, is numbered accordingly after it is decrypted in Bluetooth slave devices.The benefit being arranged in this way is can be The acquisition instruction of code data carries out ciphertext transmission, it is ensured that the data safety during password acquisition and password offer.
Further, the password in data security module is stored with ciphertext, wherein the mode of password encryption is by bluetooth from setting Standby processor and data security module is arranged, the Encryption Algorithm that can be interacted between bluetooth host and Bluetooth slave devices It is different.Optionally, cryptographic secret is corresponding with password number, in processor or data security module are instructed according to cipher inquiry Storage number find corresponding cryptographic secret after, corresponding cryptographic secret is supplied to processor by data security module, processing Device uses the key pair cryptographic secret decryption arranged with data security module, wherein the decodement after decryption exists only in RAM The decodement in caching is removed in caching, after the completion of decodement is shown in display screen immediately, thus not only may insure Password does not go out Bluetooth slave devices, and only cryptographic secret exists only in data security module, does not store in Bluetooth slave devices close Code in plain text, can make code data not to be monitored and crack, improve the safety of code data.
Technical solution provided by the embodiment of the present application can need application layer between bluetooth equipment before obtaining password It shakes hands interaction, password storage does not go out Bluetooth slave devices in special data security module, realizes the offer for improving code data The effect of the safety of mode.
In the embodiment of the present invention, Bluetooth slave devices receive the order and according in order of shaking hands of shaking hands After verify data verifies bluetooth host as bound host, data interaction key, institute are generated yet further still according to preset-key State data interaction key for and bluetooth host interaction when progress data encryption and decryption.For example, bluetooth host is to Bluetooth slave devices The cipher inquiry instruction sent is encrypted instruction ciphertext, is held correspondingly, Bluetooth slave devices can be used receiving The data interaction key decryption described instruction ciphertext generated after hand order obtains cipher inquiry instruction in plain text.Wherein, above-mentioned pre- If key can be configured in bluetooth host and Bluetooth slave devices in advance, it can also be and generated simultaneously after bluetooth connection It saves.Wherein, after generating interactive key according to preset-key, can appoint between bluetooth host and Bluetooth slave devices In data exchange process of anticipating, all it is encrypted using interactive key.Cipher inquiry instruction is added in the technical program It is close, so that cipher inquiry instruction is transmitted in the form of ciphertext, and after Bluetooth slave devices receive ciphertext, pass through friendship Mutual key is decrypted to obtain cipher inquiry instruction in plain text, can to avoid illegal third party using forge by the way of cipher inquiry instructs come Code data is obtained, the safety of code data is improved.
On the basis of above-mentioned each technical solution, optionally, data interaction key is generated according to preset-key, comprising: root Data interaction key is generated according to some or all of preset-key and the verify data.Wherein, verify data is in addition to verifying indigo plant Other than the identity of tooth host, other information can also be carried, in conjunction with above-mentioned example, verify data may include firmware version, Algorithm information, host MAC and other additional datas, other additional informations therein can be and send in order of shaking hands every time The parameter generated at random, such as can be initial vector, it can be using initial vector as one of the foundation for generating interactive key. Not only allow after shaking hands successfully every time obtained interaction data is not identical in this way, can also avoid illegal third party get it is default After key, interactive key is forged to snatch password.
On the basis of above-mentioned each technical solution, optionally, Bluetooth slave devices are in the life of shaking hands for receiving bluetooth host transmission Before order binding relationship further can be established with bluetooth host.Wherein Bluetooth slave devices and bluetooth host establish a connection Process includes: to receive the pairing request that bluetooth host is sent after Bluetooth slave devices establish bluetooth connection with bluetooth host, described to match To in request include key parameter;Bluetooth slave devices are according to key parameter calculating preset-key and described pre- being calculated If after key, Xiang Suoshu bluetooth host sends pairing response, correspondingly, bluetooth host side can also be calculated based on identical algorithm To preset-key, thus Bluetooth slave devices and bluetooth host complete the pairing of application level.
It may include what foundation key encrypted in the pairing request that bluetooth host is sent in a specific implementation MAGIC (" DDOE "), bluetooth host MAC and random number R 1, wherein foundation key is exactly the encryption key of band when leaving the factory.It is blue After tooth receives pairing request from equipment, it is necessary to which decryption checks MAGIC therein, it is ensured that the cipher key match of both sides.Later bluetooth from Equipment generates preset-key (Keyb of AES_OFB) according to the information carried in pairing request, wherein Keyb=MAGIC | host MAC|R1.The benefit being arranged in this way is not only to have may insure being bound and be shaken hands between the two for bluetooth connection, but also can Ensure that interactive key generated is accurately to cut uniquely.
Embodiment two
Fig. 2 is the flow chart of the password providing method between bluetooth equipment provided by Embodiment 2 of the present invention, and the present embodiment can It is applicable in the case where cryptographic service is provided, this method can be executed by the bluetooth host between bluetooth equipment in interaction, bluetooth master Machine can be realized by the mode of software and/or hardware, will be mentioned below using bluetooth host as executing subject to the embodiment of the present invention Password providing method between the bluetooth equipment of confession is illustrated.
As shown in Fig. 2, the password providing method between the bluetooth equipment includes:
S210, bluetooth host send the order of shaking hands comprising verify data to Bluetooth slave devices, and the verify data is used for Bluetooth slave devices judge whether the bluetooth host is the host equipment bound.
Wherein, bluetooth host can be mobile terminal, laptop and with client for needing cryptographic service etc.. It is after Bluetooth slave devices connection, order of shaking hands can be sent to Bluetooth slave devices, wherein order of shaking hands includes verifying number According to.Illustratively, shake hands order information composition can be firmware version (VER)+algorithm information (ALG)+bluetooth host MAC+ Initial vector.Bluetooth slave devices receive shake hands order after bluetooth host can be tested according to bluetooth host MAC therein Card.
S220, the response of shaking hands that the Bluetooth slave devices return is received.
Bluetooth slave devices are after verifying bluetooth host according to the verify data as bound host equipment, to bluetooth host Transmission is shaken hands response, and bluetooth host reception is shaken hands response, wherein may include: state (Status)+firmware in response of shaking hands Version (VER)+algorithm information (ALG)+Bluetooth slave devices MAC.Firmware version and algorithm information can be used for firmware and algorithm Synchronous, Bluetooth slave devices MAC is for verifying whether Bluetooth slave devices are binding from equipment, it can be seen that, it handshaking information and holds Hand response can be used to implement the transmission to initial vector, and consolidating for the two is synchronized between bluetooth host and Bluetooth slave devices Part version and algorithm information.
S230, Xiang Suoshu Bluetooth slave devices send cipher inquiry instruction, so that the Bluetooth slave devices are included by itself Data security module in search designated pin, and the password found is shown in display screen.
When bluetooth host is needed using password, cipher inquiry can be sent to Bluetooth slave devices by bluetooth connection and referred to It enables, so that the Bluetooth slave devices search designated pin from the data security module included by itself, and is shown in display screen Show the password found.
It in the technical scheme, optionally, include that password storage is numbered in the cipher inquiry instruction, the password storage The password of stored password is compiled in number and Bluetooth slave devices data security module after number or password storage number conversion Number have corresponding relationship.Wherein, password storage number can be by encryption, be also possible to not by encryption, bluetooth It can be numbered from equipment according to obtained password storage and determine that bluetooth host wants the code data obtained, determine code data Later, it can be shown on the screen of Bluetooth slave devices.It illustratively, can be in the data security module of Bluetooth slave devices In be stored with code book, when bluetooth host is needed using password, through verifying bluetooth host identity, referred to according to cipher inquiry Code data required for determining bluetooth host is enabled, and face is shown on a display screen, is read for user and in bluetooth host It inputs above, so that code data does not go out Bluetooth slave devices during password provides, it is possible to prevente effectively from code data is to indigo plant The risk being monitored after the transmission of tooth host, improves the safety of code data.
In the technical scheme, optionally, before sending cipher inquiry instruction to the Bluetooth slave devices, the method Further include: data interaction key is generated according to preset-key;Added using the instruction of cipher inquiry described in the data interaction key pair It is close.The benefit being arranged in this way is that the cipher inquiry instruction that can be issued to bluetooth host encrypts, and avoids illegal third party pseudo- It makes cipher inquiry instruction and snatches password, be conducive to the safety of code data.
In the technical scheme, optionally, bluetooth host generates data interaction key according to preset-key, comprising: according to Some or all of preset-key and the verify data for being sent to Bluetooth slave devices generate data interaction key, for example, It include initial vector in verify data, bluetooth host generates data interaction key according to preset-key and initial vector.Optionally, The initial vector be it is random generate, the benefit being arranged in this way is to can be bluetooth host and Bluetooth slave devices are shaken hands success every time The data interaction key generated afterwards is different from, and can be decrypted to avoid illegal third party by accumulating aerial packet capturing.
In the technical scheme, optionally, before sending the order of shaking hands comprising verify data to Bluetooth slave devices, institute State method further include: establish binding relationship with Bluetooth slave devices.Wherein bluetooth host and Bluetooth slave devices establish binding relationship Process may is that bluetooth host is established after Bluetooth system grade connect with Bluetooth slave devices, sends and matches to Bluetooth slave devices It requests, includes key parameter in the pairing request;Bluetooth slave devices calculate preset-key according to the key parameter and are counting After calculation obtains the preset-key, Xiang Suoshu bluetooth host sends pairing response;Bluetooth host receives what Bluetooth slave devices were sent Response is matched, and also the preset-key is calculated according to the key parameter in bluetooth host.It wherein, can in pairing request With include foundation key encryption MAGIC (" DDOE "), bluetooth host MAC and random number R 1, wherein foundation key be exactly The encryption key of band when factory.After Bluetooth slave devices receive pairing request, it is necessary to which decryption checks MAGIC therein, it is ensured that both sides Cipher key match.Preset-key (Keyb of AES_OFB) Keyb=MAGIC is generated according to pairing request information afterwards | host MAC | R1.The benefit being arranged in this way is not only to have may insure being bound and be shaken hands between the two for bluetooth connection, but also can ensure Interactive key generated is accurately to cut uniquely.
Technical solution provided by the present embodiment can be executed in bluetooth host.By using skill provided herein Art scheme can need application layer to shake hands interaction before obtaining password between bluetooth equipment, password storage is in special safety Do not go out Bluetooth slave devices in module, realizes the effect for improving the safety of presentation mode of code data.
Embodiment three
Fig. 3 is the interaction signaling diagram between the bluetooth equipment that the embodiment of the present invention three provides.As shown in figure 3, Bluetooth slave devices Connection is established with Bluetooth slave devices when bluetooth host scanning is broadcasted to common work in commonly work broadcast state.It establishes After connection, bluetooth host sends instruction of shaking hands, and Bluetooth slave devices respond response of shaking hands, wherein instruction of shaking hands includes to bluetooth host The data of authentication.After shaking hands successfully, bluetooth host send encryption chip read instruction, i.e., cryptographic acess request, bluetooth from Equipment receive encryption chip read instruction, to encryption chip send display screen display inquiry, encryption chip to password encryption into The transmission of row ciphertext, decrypt password from equipment and carries out display screen and show, Bluetooth slave devices return to encryption chip reading response.This The setting of technical solution in this way, code data can not go out Bluetooth slave devices, and show on a display screen, for user Password is inputted on bluetooth host manually, code data can be made not to be monitored and crack, improves the safety of code data.
Example IV
Fig. 4 is a kind of structural schematic diagram for bluetooth equipment that the embodiment of the present invention four provides.Bluetooth equipment shown in Fig. 4 can The password for being used to execute in above method embodiment between bluetooth equipment performed by Bluetooth slave devices as Bluetooth slave devices provides Method.Wherein, described device includes:
Transceiver module 310, for receiving the order of shaking hands comprising verify data from bluetooth host;
Authentication module 320, for verifying whether the bluetooth host is the master itself bound according to the verify data Machine equipment, and after determining that the bluetooth host is itself to have bound bluetooth equipment, by transceiver module 310 to the bluetooth master Machine sends response of shaking hands;
Password provisioning module 330, for receiving the cipher inquiry instruction from the bluetooth host and according to the password Inquiry instruction searches designated pin from the data security module, and the password found is shown in display screen.
It include that password storage is numbered in the cipher inquiry instruction optionally on the basis of above-mentioned each technical solution;
The authentication module 320, is specifically used for: being numbered according to the password storage or is turned to password storage number Number after changing searches designated pin from the data security module.
On the basis of above-mentioned each technical solution, optionally, the password found from the data security module is ciphertext Data;The password provisioning module 330, is specifically used for: showing in display screen to after the ciphertext data deciphering of lookup.
It is optionally, further after receiving the order of shaking hands on the basis of above-mentioned each technical solution: according to Preset-key generates data interaction key;The cipher inquiry instruction is encrypted instruction ciphertext, correspondingly, using the number Cipher inquiry instruction is obtained in plain text according to interactive key decryption described instruction ciphertext.
On the basis of above-mentioned each technical solution, optionally, data interaction key is generated according to preset-key, comprising: root Data interaction key is generated according to some or all of preset-key and the verify data.
On the basis of above-mentioned each technical solution, optionally, before receiving the order of shaking hands that bluetooth host is sent, into one Step: establishing binding relationship with bluetooth host, in which:
After establishing bluetooth connection with bluetooth host, the pairing request that bluetooth host is sent is received, in the pairing request Including key parameter;
After the preset-key is calculated according to the key parameter, Xiang Suoshu bluetooth host sends pairing response.
Technical solution provided by the embodiment of the present application, executes on the Bluetooth slave devices comprising data security module.It is logical It crosses using technical solution provided herein, application layer can be needed to shake hands friendship between bluetooth equipment before obtaining password Mutually, password storage does not go out Bluetooth slave devices in special security module, realizes the safety for improving the presentation mode of code data The effect of property.
Fig. 4 shown device can execute method performed by Bluetooth slave devices in above method embodiment, and the present embodiment is not The part of detailed description can refer to the related description to embodiment illustrated in fig. 1.The implementation procedure and technical effect of the technical solution Description in embodiment shown in Figure 1, details are not described herein.
The foregoing describe the built-in function of Bluetooth slave devices and structures, in a possible design, Bluetooth slave devices The equipment such as structure can realize as an electronic equipment, which can lock for bluetooth bracelet, bluetooth,
Fig. 5 is the structural schematic diagram for the Bluetooth slave devices that the embodiment of the present invention four provides.As shown in figure 5, the electronic equipment May include:
Encryption chip 410 is configured to the calculating and storage of key;
Memory 420 is configured to storage executable program;
Processor 430 is configured to realize that method described in above-described embodiment one is walked when executing the executable program Suddenly.
Specifically, function of the encryption chip for realizing the data security module in Bluetooth slave devices, processor 430 Realize the function of above-mentioned authentication module and password provisioning module.
Fig. 6 is a kind of concrete structure schematic diagram for bluetooth equipment that the embodiment of the present invention four provides.Bluetooth equipment shown in Fig. 6 Can be used as Bluetooth slave devices, structure includes: key, BLE (Bluetooth Low Energy, low-power consumption bluetooth) processor, Display screen and encryption chip, wherein core processor of the BLE processor as Bluetooth slave devices, with key, display screen and Encryption chip connection, with the opening and closing of control button, display screen and encryption chip, and receive key, display screen with And the information that encryption chip sends and receivees.Wherein, encryption chip kind may include code book, and code book is for storing password volume Number and corresponding code data.Method provided by the embodiment of the present invention one can be performed in the said goods, and it is corresponding to have execution method Functional module and beneficial effect.
Embodiment five
Fig. 7 is the structural schematic diagram for another bluetooth equipment that the embodiment of the present invention five provides.Bluetooth equipment shown in Fig. 7 Bluetooth host be can be used as executing the password provider in above method embodiment between bluetooth equipment performed by bluetooth host Method.As shown in fig. 7, described device includes:
Command sending module of shaking hands 610, it is described to test for sending the order of shaking hands comprising verify data to Bluetooth slave devices Card data judge whether the bluetooth host is the host equipment bound for Bluetooth slave devices;
It shakes hands response receiving module 620, the response of shaking hands returned for receiving the Bluetooth slave devices;
Cipher inquiry instruction sending module 630, for sending cipher inquiry instruction to the Bluetooth slave devices, so that described Bluetooth slave devices search designated pin from the data security module included by itself, and shown in display screen find it is close Code.
It is not detailed that Fig. 7 shown device can execute method performed by bluetooth host, the present embodiment in above method embodiment The part carefully described can refer to the related description to embodiment of the method.The implementation procedure and technical effect of the technical solution referring to Description in embodiment of the method, details are not described herein.
Fig. 7 describes the built-in function and structure of bluetooth host, and in a possible design, the structure of bluetooth host can It is embodied as an electronic equipment, which can may include: for equipment, the electronic equipments such as mobile phone, ipad
Memory is configured to storage executable program;
Processor is configured to realize that bluetooth host is executed in above method embodiment when executing the executable program Method and step.
The embodiment of the present application also provides a kind of storage medium comprising computer executable instructions, computer is executable Password provides operation between instruction can be used for executing the bluetooth equipment, and the embodiment of the present application one or embodiment two can also be performed Relevant operation between provided bluetooth equipment in password providing method.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Be described in the embodiment of the present application involved module, unit can be realized by way of software, can also be with It is realized by way of hardware.Wherein, module, the title of unit are not constituted under certain conditions to the module, unit sheet The restriction of body.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (13)

1. the password providing method between a kind of bluetooth equipment, which is characterized in that the method is applied to include data security module Bluetooth slave devices, which comprises
Receive the order of shaking hands comprising verify data from bluetooth host;
After verifying the bluetooth host according to the verify data as bound host equipment, the transmission of Xiang Suoshu bluetooth host is held Hand response;
It receives the cipher inquiry instruction from the bluetooth host and is instructed according to the cipher inquiry from the data safety mould Designated pin is searched in block, and the password found is shown in display screen.
2. the method according to claim 1, wherein including that password storage is numbered in cipher inquiry instruction;
Designated pin is searched from the data security module according to cipher inquiry instruction, comprising:
Number after being numbered according to the password storage or being converted to password storage number, from the data security module Middle lookup designated pin.
3. the method according to claim 1, wherein the password found from the data security module is ciphertext Data;
The password found is shown in display screen, comprising: show in display screen to after the ciphertext data deciphering of lookup.
4. the method according to claim 1, wherein the method is also wrapped after receiving the order of shaking hands It includes: data interaction key is generated according to preset-key;
The cipher inquiry instruction is encrypted instruction ciphertext, correspondingly, decrypting the finger using the data interaction key Ciphertext is enabled to obtain cipher inquiry instruction in plain text.
5. according to the method described in claim 4, it is characterized in that, generating data interaction key according to preset-key, comprising: root Data interaction key is generated according to some or all of preset-key and the verify data.
6. according to the method described in claim 4, it is characterized in that, receive bluetooth host send order of shaking hands before, institute State method further include: establish binding relationship with bluetooth host, in which:
After establishing bluetooth connection with bluetooth host, the pairing request that bluetooth host is sent is received, includes in the pairing request Key parameter;
After the preset-key is calculated according to the key parameter, Xiang Suoshu bluetooth host sends pairing response.
7. the password providing method between a kind of bluetooth equipment, which is characterized in that the method is applied to bluetooth host, the method Include:
The order of shaking hands comprising verify data is sent to Bluetooth slave devices, the verify data is for described in Bluetooth slave devices judgement Whether bluetooth host is the host equipment bound;
Receive the response of shaking hands that the Bluetooth slave devices return;
Cipher inquiry instruction is sent to the Bluetooth slave devices, so that data safety of the Bluetooth slave devices included by itself Designated pin is searched in module, and the password found is shown in display screen.
8. the method according to the description of claim 7 is characterized in that the cipher inquiry instruction in include password storage number, It is stored in number and Bluetooth slave devices data security module after the password storage number or password storage number conversion The password number of password has corresponding relationship.
9. the method according to the description of claim 7 is characterized in that the Bluetooth slave devices send cipher inquiry instruction, So that the Bluetooth slave devices search designated pin from the data security module included by itself, and shows and look into display screen Before the password found, the method also includes:
Data interaction key is generated according to preset-key;
It is instructed and is encrypted using cipher inquiry described in the data interaction key pair.
10. according to the method described in claim 9, it is characterized in that, generating data interaction key according to preset-key, comprising:
Data interaction key is generated according to some or all of preset-key and the verify data.
11. the method according to the description of claim 7 is characterized in that sending holding comprising verify data to Bluetooth slave devices Before hand order, the method also includes:
Binding relationship is established with Bluetooth slave devices;Wherein: after establishing bluetooth connection with Bluetooth slave devices, to Bluetooth slave devices Pairing request is sent, includes key parameter in the pairing request;
Receive the pairing response and the preset-key is calculated according to the key parameter that Bluetooth slave devices are sent.
12. a kind of bluetooth equipment characterized by comprising
Data security module is arranged for carrying out the calculating and storage of key;
Memory is configured to storage executable program;
Processor is configured to realize method step of any of claims 1-6 when executing the executable program Suddenly.
13. a kind of bluetooth equipment characterized by comprising
Memory is configured to storage executable program;
Processor is configured to realize method step described in any one of claim 7-11 when executing the executable program Suddenly.
CN201811644551.6A 2018-12-30 2018-12-30 Password providing method and bluetooth equipment between bluetooth equipment Pending CN109547991A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811644551.6A CN109547991A (en) 2018-12-30 2018-12-30 Password providing method and bluetooth equipment between bluetooth equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811644551.6A CN109547991A (en) 2018-12-30 2018-12-30 Password providing method and bluetooth equipment between bluetooth equipment

Publications (1)

Publication Number Publication Date
CN109547991A true CN109547991A (en) 2019-03-29

Family

ID=65831572

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811644551.6A Pending CN109547991A (en) 2018-12-30 2018-12-30 Password providing method and bluetooth equipment between bluetooth equipment

Country Status (1)

Country Link
CN (1) CN109547991A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100223667A1 (en) * 2009-02-27 2010-09-02 International Business Machines Corporation Apparatus, system, and method for start-up authentication
CN103606047A (en) * 2013-11-22 2014-02-26 深圳市亚略特生物识别科技有限公司 Password management system
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device
CN104767624A (en) * 2015-04-23 2015-07-08 北京航空航天大学 Remote protocol authentication method based on biological features
CN105022941A (en) * 2015-06-24 2015-11-04 上海斐讯数据通信技术有限公司 Management method and system of username password
WO2016096282A1 (en) * 2014-12-18 2016-06-23 Gemalto Sa System for verifying a one-time password
CN108549808A (en) * 2018-04-19 2018-09-18 北京华大智宝电子系统有限公司 A kind of cipher management method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100223667A1 (en) * 2009-02-27 2010-09-02 International Business Machines Corporation Apparatus, system, and method for start-up authentication
CN103606047A (en) * 2013-11-22 2014-02-26 深圳市亚略特生物识别科技有限公司 Password management system
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device
WO2016096282A1 (en) * 2014-12-18 2016-06-23 Gemalto Sa System for verifying a one-time password
CN104767624A (en) * 2015-04-23 2015-07-08 北京航空航天大学 Remote protocol authentication method based on biological features
CN105022941A (en) * 2015-06-24 2015-11-04 上海斐讯数据通信技术有限公司 Management method and system of username password
CN108549808A (en) * 2018-04-19 2018-09-18 北京华大智宝电子系统有限公司 A kind of cipher management method and device

Similar Documents

Publication Publication Date Title
CN110177354B (en) Wireless control method and system for vehicle
US10601801B2 (en) Identity authentication method and apparatus
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN109688573A (en) Exchange method and bluetooth equipment between bluetooth equipment
JP2020109671A (en) Method and device for personal authentication
US11924635B2 (en) Security authentication method and apparatus thereof, and electronic device
CN105184931A (en) Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN102833253A (en) Method and server for establishing safe connection between client and server
CN108762791A (en) Firmware upgrade method and device
CN113781678A (en) Vehicle Bluetooth key generation and authentication method and system under network-free environment
CN112055019B (en) Method for establishing communication channel and user terminal
CN105142134B (en) Parameter acquisition and parameter transmission method and device
CN111245607B (en) Networking method and system, network distribution equipment, client and server
CN102916869A (en) Instant messaging method and system
CN113347010B (en) Mutual authentication method and system based on SSL-TLS protocol
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN112087302A (en) Device for encrypting and decrypting algorithm of asymmetric dynamic token
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
CN103024735B (en) Method and equipment for service access of card-free terminal
CN104065648A (en) Data processing method of voice communication
KR20140058196A (en) Apparatus and method for protecting mobile message data
TW201807614A (en) System, method, and device for processing sub-account information
CN106789000A (en) A kind of secret phone system and method based on TEE technologies and wearable device
CN109547196A (en) The implementation method and wrist-watch token system and device of a kind of wrist-watch token system
CN105554759A (en) Authentication method and authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190329

RJ01 Rejection of invention patent application after publication