CN109547991A - Password providing method and bluetooth equipment between bluetooth equipment - Google Patents
Password providing method and bluetooth equipment between bluetooth equipment Download PDFInfo
- Publication number
- CN109547991A CN109547991A CN201811644551.6A CN201811644551A CN109547991A CN 109547991 A CN109547991 A CN 109547991A CN 201811644551 A CN201811644551 A CN 201811644551A CN 109547991 A CN109547991 A CN 109547991A
- Authority
- CN
- China
- Prior art keywords
- bluetooth
- password
- slave devices
- data
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses the password providing methods and bluetooth equipment between a kind of bluetooth equipment.The method is applied to the Bluetooth slave devices comprising data security module, which comprises receives the order of shaking hands comprising verify data from bluetooth host;After verifying the bluetooth host according to the verify data as bound host equipment, Xiang Suoshu bluetooth host sends response of shaking hands;It receives the cipher inquiry instruction from the bluetooth host and designated pin is searched from the data security module according to cipher inquiry instruction, and show the password found in display screen.By using technical solution provided herein, application layer can be needed to shake hands interaction between bluetooth equipment before obtaining password, password storage does not go out Bluetooth slave devices in special security module, realizes the effect for improving the safety of presentation mode of code data.
Description
Technical field
The present embodiments relate to the password providing methods between technical field of data transmission more particularly to a kind of bluetooth equipment
And bluetooth equipment.
Background technique
With the appearance and fast development of Internet technology, the life style of the mankind has obtained huge change, but big
Simultaneously, data safety is also particularly important for the transmission of amount data.
In the prior art, bluetooth host (including the terminals such as mobile terminal or computer) is in the account for getting user's input
When, it needs to extract password corresponding with input account from password storage end.In addition to this, some program passwords are further related to.And it is close
The password of code storage end output is after entering bluetooth host, if bluetooth host has been monitored or has cracked, just greatly
Reduce cipher safety, it is serious or even huge loss can be caused for user or company.Therefore, a kind of safe password
Presentation mode urgently generates.
Summary of the invention
The embodiment of the present invention provides password providing method and bluetooth equipment between a kind of bluetooth equipment, can obtain password
Application layer is needed to shake hands interaction between bluetooth equipment before, password storage does not go out Bluetooth slave devices in special security module,
Realize the effect for improving the safety of presentation mode of code data.
In a first aspect, the embodiment of the invention provides the password providing method between a kind of bluetooth equipment, the method application
In the Bluetooth slave devices comprising data security module, this method comprises:
Receive the order of shaking hands comprising verify data from bluetooth host;
After verifying the bluetooth host according to the verify data as bound host equipment, Xiang Suoshu bluetooth host hair
Send response of shaking hands;
It receives the cipher inquiry instruction from the bluetooth host and is pacified according to cipher inquiry instruction from the data
Designated pin is searched in full module, and shows the password found in display screen.
It further, include that password storage is numbered in the cipher inquiry instruction;
Designated pin is searched from the data security module according to cipher inquiry instruction, comprising:
Number after being numbered according to the password storage or being converted to password storage number, from the data safety
Designated pin is searched in module.
Further, the password found from the data security module is ciphertext data;
The password found is shown in display screen, comprising: show in display screen to after the ciphertext data deciphering of lookup.
Further, after receiving the order of shaking hands, the method also includes generating data according to preset-key to hand over
Mutual key;
The cipher inquiry instruction is encrypted instruction ciphertext, correspondingly, decrypting institute using the data interaction key
It states instruction ciphertext and obtains cipher inquiry instruction in plain text.
Further, data interaction key is generated according to preset-key, comprising: according to preset-key and the verify data
Some or all of generate data interaction key.
Further, before receiving the order of shaking hands that bluetooth host is sent, the method also includes: it is built with bluetooth host
Vertical binding relationship, in which:
After establishing bluetooth connection with bluetooth host, the pairing request that bluetooth host is sent is received, in the pairing request
Including key parameter;
After the preset-key is calculated according to the key parameter, Xiang Suoshu bluetooth host sends pairing response.
Second aspect, the embodiment of the invention also provides the password providing method between a kind of bluetooth equipment, the method is answered
For bluetooth host, which comprises
The order of shaking hands comprising verify data is sent to Bluetooth slave devices, the verify data judges for Bluetooth slave devices
Whether the bluetooth host is the host equipment bound;
Receive the response of shaking hands that the Bluetooth slave devices return;
Cipher inquiry instruction is sent to the Bluetooth slave devices, so that data of the Bluetooth slave devices included by itself
Designated pin is searched in security module, and the password found is shown in display screen.
It further, include that password storage is numbered in the cipher inquiry instruction, the password storage number or password
Number after storage number conversion has corresponding close with the password number of stored password in Bluetooth slave devices data security module
System.
Further, to the Bluetooth slave devices send cipher inquiry instruction so that the Bluetooth slave devices from itself
Designated pin is searched in included data security module, and before showing the password found in display screen, the method
Further include:
Data interaction key is generated according to preset-key;
It is instructed and is encrypted using cipher inquiry described in the data interaction key pair.
Further, data interaction key is generated according to preset-key, comprising:
Data interaction key is generated according to some or all of preset-key and the verify data.
Further, before sending the order of shaking hands comprising verify data to Bluetooth slave devices, the method also includes:
Binding relationship is established with Bluetooth slave devices;Wherein: after establishing bluetooth connection with Bluetooth slave devices, to bluetooth from
Equipment sends pairing request, includes key parameter in the pairing request;
Receive the pairing response and the preset-key is calculated according to the key parameter that Bluetooth slave devices are sent.
The third aspect, the password between bluetooth equipment provide device, and described device is configured at the indigo plant comprising data security module
Tooth includes: from equipment, described device
Transceiver module, for receiving the order of shaking hands comprising verify data from bluetooth host;
Authentication module is used for after verifying the bluetooth host according to the verify data as bound host equipment, to
The bluetooth host sends response of shaking hands;
Password provisioning module, for receiving the cipher inquiry instruction from the bluetooth host and according to the cipher inquiry
Designated pin is searched in instruction from the data security module, and the password found is shown in display screen.
Fourth aspect, the password between bluetooth equipment provide device, and described device is configured at bluetooth host, described device packet
It includes:
Shake hands command sending module, for sent to Bluetooth slave devices include verify data order of shaking hands, the verifying
Data judge whether the bluetooth host is the host equipment bound for Bluetooth slave devices;
It shakes hands response receiving module, the response of shaking hands returned for receiving the Bluetooth slave devices;
Cipher inquiry instruction sending module, for sending cipher inquiry instruction to the Bluetooth slave devices, so that the indigo plant
Tooth searches designated pin from equipment from the data security module included by itself, and shown in display screen find it is close
Code.
5th aspect, the embodiment of the present application provide a kind of bluetooth equipment, which includes:
Data security module is arranged for carrying out the calculating and storage of key;
Memory is configured to storage executable program;
Processor is configured to realize method and step described in above-mentioned first aspect when executing the executable program.
6th aspect, the embodiment of the present application provide a kind of bluetooth equipment, which includes:
Memory is configured to storage executable program;
Processor is configured to realize method and step described in above-mentioned second aspect when executing the executable program.
7th aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey
Sequence realizes that the bluetooth as described in the above-mentioned first aspect of the embodiment of the present application or second aspect is set when the program is executed by processor
Password providing method between standby.
Technical solution provided by the embodiment of the present application, executes on the Bluetooth slave devices comprising data security module.It is logical
It crosses using technical solution provided herein, application layer can be needed to shake hands friendship between bluetooth equipment before obtaining password
Mutually, password storage does not go out Bluetooth slave devices in special security module, realizes the safety for improving the presentation mode of code data
The effect of property.
Detailed description of the invention
Fig. 1 is the flow chart of the password providing method between the bluetooth equipment that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of the password providing method between bluetooth equipment provided by Embodiment 2 of the present invention;
Fig. 3 is the interaction signaling diagram between the bluetooth equipment that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural schematic diagram for bluetooth equipment that the embodiment of the present invention four provides;
Fig. 5 is the structural schematic diagram for the Bluetooth slave devices that the embodiment of the present invention four provides;
Fig. 6 is a kind of concrete structure schematic diagram for bluetooth equipment that the embodiment of the present invention four provides;
Fig. 7 is the structural schematic diagram for another bluetooth equipment that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just
Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing or method described as flow chart.Although each step is described as the processing of sequence by flow chart, many of these
Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation
The processing can be terminated when completion, it is also possible to have the additional step being not included in attached drawing.The processing can be with
Corresponding to method, function, regulation, subroutine, subprogram etc..
Embodiment one
Fig. 1 is the flow chart of the password providing method between the bluetooth equipment that the embodiment of the present invention one provides, and the present embodiment can
It is applicable in the case where cryptographic service is provided, this method can be executed by the Bluetooth slave devices between bluetooth equipment in interaction, the bluetooth
From the device include processor and the encryption chip as data security module, below will using Bluetooth slave devices as executing subject,
It in particular be using the processor in Bluetooth slave devices is executing subject between bluetooth equipment provided in an embodiment of the present invention
Password providing method is illustrated.
As shown in Figure 1, the password providing method between the bluetooth equipment includes:
S110, the order of shaking hands comprising verify data from bluetooth host is received.
The technical program can be executed by the Bluetooth slave devices configured with security module.In the technical scheme, bluetooth from
Equipment may include the equipment being connect by bluetooth approach with bluetooth host such as Intelligent bracelet, smartwatch.Bluetooth is from setting
It is standby to be configured with display equipment, to be shown to code data.It should be understood that for code data carry out display be for
Can allow bluetooth host is read and is inputted use using user, so if other modes is taken to allow the making of bluetooth host
Known with user, such as the form of voice broadcast, method provided by the technical program can also be applied.Bluetooth slave can be
Low-power consumption bluetooth (Bluetooth Low Energy, BLE) equipment, bluetooth host can be by way of communication connection and blue
The tooth other end opposite from equipment.
In the technical scheme, before obtaining the cipher inquiry request of bluetooth host, Bluetooth slave devices and bluetooth host
Establish bluetooth connection.After establishing bluetooth connection with bluetooth host, Bluetooth slave devices detect whether to receive within a preset time
The order of shaking hands sent to bluetooth host, wherein preset time can be 30 seconds, 45 seconds or 1 minute, if in preset time
It inside detects the order of shaking hands that bluetooth host issues, then feeds back response of shaking hands after verifying to bluetooth host;If default
The order of shaking hands of bluetooth host sending is not detected in time, then disconnects the bluetooth connection between bluetooth host, is arranged in this way
Benefit be can be improved password provide service safety.
Wherein, include verify data in the order of shaking hands that bluetooth host is sent, may include in the verify data for
The data such as data, the used Encryption Algorithm of bluetooth host and version of bluetooth host identity are verified, it is possible thereby to bluetooth master
Machine is verified the identity of bluetooth host before providing password to improve the safety of code data.Specifically, the verify data
It may include firmware version, algorithm information, host MAC and other additional datas.Setting in this way, can be to bluetooth master
The identity and firmware version and algorithm information of machine confirmed, with guarantee subsequently through algorithm encrypted the result is that just
True.
It S120, verifying the bluetooth host according to the verify data is Xiang Suoshu bluetooth after bound host equipment
Host sends response of shaking hands.
In the embodiment of the present invention, Bluetooth slave devices only provide password to its bluetooth host with binding relationship
Data, therefore, after Bluetooth slave devices establish bluetooth connection with bluetooth host every time, progress application layer is shaken hands, and is being shaken hands
Verify whether current Bluetooth host is bound host equipment in journey, only determines that current Bluetooth host is during the handshake process
After bound host, just support to carry out subsequent interaction.Wherein, Bluetooth slave devices are contained in handshake request by what is received
Verify data verifies whether current Bluetooth host is legal bluetooth host, and only after being proved to be successful, feeds back to bluetooth host
Indicate that host verification is successfully shaken hands response.
S130, it receives the cipher inquiry instruction from the bluetooth host and is instructed according to the cipher inquiry from the number
According to searching designated pin in security module, and the password found is shown in display screen.
Wherein, cipher inquiry instruction can be the inquiry request of password required for bluetooth host, and password can store
In the data security module of Bluetooth slave devices, wherein data security module is the specific can be that configuration adding in Bluetooth slave devices
Close chip.When bluetooth host needs password, password can be sent to Bluetooth slave devices after shaking hands successfully with Bluetooth slave devices
Inquiry instruction.After Bluetooth slave devices receive cipher inquiry instruction, it can be responded by the processor in Bluetooth slave devices,
It can be responded by the data security module in Bluetooth slave devices.That is, after Bluetooth slave devices receive cipher inquiry instruction, it can
With by processor parsing cipher inquiry instruction, determine encrypted message to be checked, after determining encrypted message to be checked by
Processor or data security module search specific password according to encrypted message to be checked from data security module;Another
In a kind of feasible mode, after Bluetooth slave devices receive cipher inquiry instruction, cipher inquiry instruction is sent to by processor
Data security module is parsed to obtain encrypted message to be checked, Zhi Hougen by data security module to cipher inquiry instruction
Specific password is searched according to encrypted message to be checked.
It is above-mentioned that display screen is sent to by processor from the password found in data security module and is shown in display screen
The password found, so that user checks and by being manually entered into bluetooth host.The benefit being arranged in this way is password number
According to Bluetooth slave devices ontology can not be gone out, avoid illegal user by way of data interception packet from third party's decryption, from
And it reduces password and the safety of service is provided.
It in the technical scheme, optionally, include that password storage is numbered in the cipher inquiry instruction;According to the password
Inquiry instruction searches designated pin from the data security module, comprising: is numbered according to the password storage or to described
Number after password storage number conversion, searches designated pin from the data security module.Wherein, code data can be with
The mode of data storage corresponding with password storage number itself is stored in data security module.It can wrap in cipher inquiry instruction
Password storage number is included, after Bluetooth slave devices receive cipher inquiry instruction, can be numbered according to password storage therein, really
Determine the position that password is stored in security module, and the code data stored in the position is shown and is made for user's reading
With.In the technical scheme, it can be numbered according to password storage and search designated pin in data security module, it can also basis
Number after password storage number conversion determines code data, and wherein conversion regime, which can be, compiles password storage by bluetooth host
It number is encrypted, is numbered accordingly after it is decrypted in Bluetooth slave devices.The benefit being arranged in this way is can be
The acquisition instruction of code data carries out ciphertext transmission, it is ensured that the data safety during password acquisition and password offer.
Further, the password in data security module is stored with ciphertext, wherein the mode of password encryption is by bluetooth from setting
Standby processor and data security module is arranged, the Encryption Algorithm that can be interacted between bluetooth host and Bluetooth slave devices
It is different.Optionally, cryptographic secret is corresponding with password number, in processor or data security module are instructed according to cipher inquiry
Storage number find corresponding cryptographic secret after, corresponding cryptographic secret is supplied to processor by data security module, processing
Device uses the key pair cryptographic secret decryption arranged with data security module, wherein the decodement after decryption exists only in RAM
The decodement in caching is removed in caching, after the completion of decodement is shown in display screen immediately, thus not only may insure
Password does not go out Bluetooth slave devices, and only cryptographic secret exists only in data security module, does not store in Bluetooth slave devices close
Code in plain text, can make code data not to be monitored and crack, improve the safety of code data.
Technical solution provided by the embodiment of the present application can need application layer between bluetooth equipment before obtaining password
It shakes hands interaction, password storage does not go out Bluetooth slave devices in special data security module, realizes the offer for improving code data
The effect of the safety of mode.
In the embodiment of the present invention, Bluetooth slave devices receive the order and according in order of shaking hands of shaking hands
After verify data verifies bluetooth host as bound host, data interaction key, institute are generated yet further still according to preset-key
State data interaction key for and bluetooth host interaction when progress data encryption and decryption.For example, bluetooth host is to Bluetooth slave devices
The cipher inquiry instruction sent is encrypted instruction ciphertext, is held correspondingly, Bluetooth slave devices can be used receiving
The data interaction key decryption described instruction ciphertext generated after hand order obtains cipher inquiry instruction in plain text.Wherein, above-mentioned pre-
If key can be configured in bluetooth host and Bluetooth slave devices in advance, it can also be and generated simultaneously after bluetooth connection
It saves.Wherein, after generating interactive key according to preset-key, can appoint between bluetooth host and Bluetooth slave devices
In data exchange process of anticipating, all it is encrypted using interactive key.Cipher inquiry instruction is added in the technical program
It is close, so that cipher inquiry instruction is transmitted in the form of ciphertext, and after Bluetooth slave devices receive ciphertext, pass through friendship
Mutual key is decrypted to obtain cipher inquiry instruction in plain text, can to avoid illegal third party using forge by the way of cipher inquiry instructs come
Code data is obtained, the safety of code data is improved.
On the basis of above-mentioned each technical solution, optionally, data interaction key is generated according to preset-key, comprising: root
Data interaction key is generated according to some or all of preset-key and the verify data.Wherein, verify data is in addition to verifying indigo plant
Other than the identity of tooth host, other information can also be carried, in conjunction with above-mentioned example, verify data may include firmware version,
Algorithm information, host MAC and other additional datas, other additional informations therein can be and send in order of shaking hands every time
The parameter generated at random, such as can be initial vector, it can be using initial vector as one of the foundation for generating interactive key.
Not only allow after shaking hands successfully every time obtained interaction data is not identical in this way, can also avoid illegal third party get it is default
After key, interactive key is forged to snatch password.
On the basis of above-mentioned each technical solution, optionally, Bluetooth slave devices are in the life of shaking hands for receiving bluetooth host transmission
Before order binding relationship further can be established with bluetooth host.Wherein Bluetooth slave devices and bluetooth host establish a connection
Process includes: to receive the pairing request that bluetooth host is sent after Bluetooth slave devices establish bluetooth connection with bluetooth host, described to match
To in request include key parameter;Bluetooth slave devices are according to key parameter calculating preset-key and described pre- being calculated
If after key, Xiang Suoshu bluetooth host sends pairing response, correspondingly, bluetooth host side can also be calculated based on identical algorithm
To preset-key, thus Bluetooth slave devices and bluetooth host complete the pairing of application level.
It may include what foundation key encrypted in the pairing request that bluetooth host is sent in a specific implementation
MAGIC (" DDOE "), bluetooth host MAC and random number R 1, wherein foundation key is exactly the encryption key of band when leaving the factory.It is blue
After tooth receives pairing request from equipment, it is necessary to which decryption checks MAGIC therein, it is ensured that the cipher key match of both sides.Later bluetooth from
Equipment generates preset-key (Keyb of AES_OFB) according to the information carried in pairing request, wherein Keyb=MAGIC | host
MAC|R1.The benefit being arranged in this way is not only to have may insure being bound and be shaken hands between the two for bluetooth connection, but also can
Ensure that interactive key generated is accurately to cut uniquely.
Embodiment two
Fig. 2 is the flow chart of the password providing method between bluetooth equipment provided by Embodiment 2 of the present invention, and the present embodiment can
It is applicable in the case where cryptographic service is provided, this method can be executed by the bluetooth host between bluetooth equipment in interaction, bluetooth master
Machine can be realized by the mode of software and/or hardware, will be mentioned below using bluetooth host as executing subject to the embodiment of the present invention
Password providing method between the bluetooth equipment of confession is illustrated.
As shown in Fig. 2, the password providing method between the bluetooth equipment includes:
S210, bluetooth host send the order of shaking hands comprising verify data to Bluetooth slave devices, and the verify data is used for
Bluetooth slave devices judge whether the bluetooth host is the host equipment bound.
Wherein, bluetooth host can be mobile terminal, laptop and with client for needing cryptographic service etc..
It is after Bluetooth slave devices connection, order of shaking hands can be sent to Bluetooth slave devices, wherein order of shaking hands includes verifying number
According to.Illustratively, shake hands order information composition can be firmware version (VER)+algorithm information (ALG)+bluetooth host MAC+
Initial vector.Bluetooth slave devices receive shake hands order after bluetooth host can be tested according to bluetooth host MAC therein
Card.
S220, the response of shaking hands that the Bluetooth slave devices return is received.
Bluetooth slave devices are after verifying bluetooth host according to the verify data as bound host equipment, to bluetooth host
Transmission is shaken hands response, and bluetooth host reception is shaken hands response, wherein may include: state (Status)+firmware in response of shaking hands
Version (VER)+algorithm information (ALG)+Bluetooth slave devices MAC.Firmware version and algorithm information can be used for firmware and algorithm
Synchronous, Bluetooth slave devices MAC is for verifying whether Bluetooth slave devices are binding from equipment, it can be seen that, it handshaking information and holds
Hand response can be used to implement the transmission to initial vector, and consolidating for the two is synchronized between bluetooth host and Bluetooth slave devices
Part version and algorithm information.
S230, Xiang Suoshu Bluetooth slave devices send cipher inquiry instruction, so that the Bluetooth slave devices are included by itself
Data security module in search designated pin, and the password found is shown in display screen.
When bluetooth host is needed using password, cipher inquiry can be sent to Bluetooth slave devices by bluetooth connection and referred to
It enables, so that the Bluetooth slave devices search designated pin from the data security module included by itself, and is shown in display screen
Show the password found.
It in the technical scheme, optionally, include that password storage is numbered in the cipher inquiry instruction, the password storage
The password of stored password is compiled in number and Bluetooth slave devices data security module after number or password storage number conversion
Number have corresponding relationship.Wherein, password storage number can be by encryption, be also possible to not by encryption, bluetooth
It can be numbered from equipment according to obtained password storage and determine that bluetooth host wants the code data obtained, determine code data
Later, it can be shown on the screen of Bluetooth slave devices.It illustratively, can be in the data security module of Bluetooth slave devices
In be stored with code book, when bluetooth host is needed using password, through verifying bluetooth host identity, referred to according to cipher inquiry
Code data required for determining bluetooth host is enabled, and face is shown on a display screen, is read for user and in bluetooth host
It inputs above, so that code data does not go out Bluetooth slave devices during password provides, it is possible to prevente effectively from code data is to indigo plant
The risk being monitored after the transmission of tooth host, improves the safety of code data.
In the technical scheme, optionally, before sending cipher inquiry instruction to the Bluetooth slave devices, the method
Further include: data interaction key is generated according to preset-key;Added using the instruction of cipher inquiry described in the data interaction key pair
It is close.The benefit being arranged in this way is that the cipher inquiry instruction that can be issued to bluetooth host encrypts, and avoids illegal third party pseudo-
It makes cipher inquiry instruction and snatches password, be conducive to the safety of code data.
In the technical scheme, optionally, bluetooth host generates data interaction key according to preset-key, comprising: according to
Some or all of preset-key and the verify data for being sent to Bluetooth slave devices generate data interaction key, for example,
It include initial vector in verify data, bluetooth host generates data interaction key according to preset-key and initial vector.Optionally,
The initial vector be it is random generate, the benefit being arranged in this way is to can be bluetooth host and Bluetooth slave devices are shaken hands success every time
The data interaction key generated afterwards is different from, and can be decrypted to avoid illegal third party by accumulating aerial packet capturing.
In the technical scheme, optionally, before sending the order of shaking hands comprising verify data to Bluetooth slave devices, institute
State method further include: establish binding relationship with Bluetooth slave devices.Wherein bluetooth host and Bluetooth slave devices establish binding relationship
Process may is that bluetooth host is established after Bluetooth system grade connect with Bluetooth slave devices, sends and matches to Bluetooth slave devices
It requests, includes key parameter in the pairing request;Bluetooth slave devices calculate preset-key according to the key parameter and are counting
After calculation obtains the preset-key, Xiang Suoshu bluetooth host sends pairing response;Bluetooth host receives what Bluetooth slave devices were sent
Response is matched, and also the preset-key is calculated according to the key parameter in bluetooth host.It wherein, can in pairing request
With include foundation key encryption MAGIC (" DDOE "), bluetooth host MAC and random number R 1, wherein foundation key be exactly
The encryption key of band when factory.After Bluetooth slave devices receive pairing request, it is necessary to which decryption checks MAGIC therein, it is ensured that both sides
Cipher key match.Preset-key (Keyb of AES_OFB) Keyb=MAGIC is generated according to pairing request information afterwards | host MAC |
R1.The benefit being arranged in this way is not only to have may insure being bound and be shaken hands between the two for bluetooth connection, but also can ensure
Interactive key generated is accurately to cut uniquely.
Technical solution provided by the present embodiment can be executed in bluetooth host.By using skill provided herein
Art scheme can need application layer to shake hands interaction before obtaining password between bluetooth equipment, password storage is in special safety
Do not go out Bluetooth slave devices in module, realizes the effect for improving the safety of presentation mode of code data.
Embodiment three
Fig. 3 is the interaction signaling diagram between the bluetooth equipment that the embodiment of the present invention three provides.As shown in figure 3, Bluetooth slave devices
Connection is established with Bluetooth slave devices when bluetooth host scanning is broadcasted to common work in commonly work broadcast state.It establishes
After connection, bluetooth host sends instruction of shaking hands, and Bluetooth slave devices respond response of shaking hands, wherein instruction of shaking hands includes to bluetooth host
The data of authentication.After shaking hands successfully, bluetooth host send encryption chip read instruction, i.e., cryptographic acess request, bluetooth from
Equipment receive encryption chip read instruction, to encryption chip send display screen display inquiry, encryption chip to password encryption into
The transmission of row ciphertext, decrypt password from equipment and carries out display screen and show, Bluetooth slave devices return to encryption chip reading response.This
The setting of technical solution in this way, code data can not go out Bluetooth slave devices, and show on a display screen, for user
Password is inputted on bluetooth host manually, code data can be made not to be monitored and crack, improves the safety of code data.
Example IV
Fig. 4 is a kind of structural schematic diagram for bluetooth equipment that the embodiment of the present invention four provides.Bluetooth equipment shown in Fig. 4 can
The password for being used to execute in above method embodiment between bluetooth equipment performed by Bluetooth slave devices as Bluetooth slave devices provides
Method.Wherein, described device includes:
Transceiver module 310, for receiving the order of shaking hands comprising verify data from bluetooth host;
Authentication module 320, for verifying whether the bluetooth host is the master itself bound according to the verify data
Machine equipment, and after determining that the bluetooth host is itself to have bound bluetooth equipment, by transceiver module 310 to the bluetooth master
Machine sends response of shaking hands;
Password provisioning module 330, for receiving the cipher inquiry instruction from the bluetooth host and according to the password
Inquiry instruction searches designated pin from the data security module, and the password found is shown in display screen.
It include that password storage is numbered in the cipher inquiry instruction optionally on the basis of above-mentioned each technical solution;
The authentication module 320, is specifically used for: being numbered according to the password storage or is turned to password storage number
Number after changing searches designated pin from the data security module.
On the basis of above-mentioned each technical solution, optionally, the password found from the data security module is ciphertext
Data;The password provisioning module 330, is specifically used for: showing in display screen to after the ciphertext data deciphering of lookup.
It is optionally, further after receiving the order of shaking hands on the basis of above-mentioned each technical solution: according to
Preset-key generates data interaction key;The cipher inquiry instruction is encrypted instruction ciphertext, correspondingly, using the number
Cipher inquiry instruction is obtained in plain text according to interactive key decryption described instruction ciphertext.
On the basis of above-mentioned each technical solution, optionally, data interaction key is generated according to preset-key, comprising: root
Data interaction key is generated according to some or all of preset-key and the verify data.
On the basis of above-mentioned each technical solution, optionally, before receiving the order of shaking hands that bluetooth host is sent, into one
Step: establishing binding relationship with bluetooth host, in which:
After establishing bluetooth connection with bluetooth host, the pairing request that bluetooth host is sent is received, in the pairing request
Including key parameter;
After the preset-key is calculated according to the key parameter, Xiang Suoshu bluetooth host sends pairing response.
Technical solution provided by the embodiment of the present application, executes on the Bluetooth slave devices comprising data security module.It is logical
It crosses using technical solution provided herein, application layer can be needed to shake hands friendship between bluetooth equipment before obtaining password
Mutually, password storage does not go out Bluetooth slave devices in special security module, realizes the safety for improving the presentation mode of code data
The effect of property.
Fig. 4 shown device can execute method performed by Bluetooth slave devices in above method embodiment, and the present embodiment is not
The part of detailed description can refer to the related description to embodiment illustrated in fig. 1.The implementation procedure and technical effect of the technical solution
Description in embodiment shown in Figure 1, details are not described herein.
The foregoing describe the built-in function of Bluetooth slave devices and structures, in a possible design, Bluetooth slave devices
The equipment such as structure can realize as an electronic equipment, which can lock for bluetooth bracelet, bluetooth,
Fig. 5 is the structural schematic diagram for the Bluetooth slave devices that the embodiment of the present invention four provides.As shown in figure 5, the electronic equipment
May include:
Encryption chip 410 is configured to the calculating and storage of key;
Memory 420 is configured to storage executable program;
Processor 430 is configured to realize that method described in above-described embodiment one is walked when executing the executable program
Suddenly.
Specifically, function of the encryption chip for realizing the data security module in Bluetooth slave devices, processor 430
Realize the function of above-mentioned authentication module and password provisioning module.
Fig. 6 is a kind of concrete structure schematic diagram for bluetooth equipment that the embodiment of the present invention four provides.Bluetooth equipment shown in Fig. 6
Can be used as Bluetooth slave devices, structure includes: key, BLE (Bluetooth Low Energy, low-power consumption bluetooth) processor,
Display screen and encryption chip, wherein core processor of the BLE processor as Bluetooth slave devices, with key, display screen and
Encryption chip connection, with the opening and closing of control button, display screen and encryption chip, and receive key, display screen with
And the information that encryption chip sends and receivees.Wherein, encryption chip kind may include code book, and code book is for storing password volume
Number and corresponding code data.Method provided by the embodiment of the present invention one can be performed in the said goods, and it is corresponding to have execution method
Functional module and beneficial effect.
Embodiment five
Fig. 7 is the structural schematic diagram for another bluetooth equipment that the embodiment of the present invention five provides.Bluetooth equipment shown in Fig. 7
Bluetooth host be can be used as executing the password provider in above method embodiment between bluetooth equipment performed by bluetooth host
Method.As shown in fig. 7, described device includes:
Command sending module of shaking hands 610, it is described to test for sending the order of shaking hands comprising verify data to Bluetooth slave devices
Card data judge whether the bluetooth host is the host equipment bound for Bluetooth slave devices;
It shakes hands response receiving module 620, the response of shaking hands returned for receiving the Bluetooth slave devices;
Cipher inquiry instruction sending module 630, for sending cipher inquiry instruction to the Bluetooth slave devices, so that described
Bluetooth slave devices search designated pin from the data security module included by itself, and shown in display screen find it is close
Code.
It is not detailed that Fig. 7 shown device can execute method performed by bluetooth host, the present embodiment in above method embodiment
The part carefully described can refer to the related description to embodiment of the method.The implementation procedure and technical effect of the technical solution referring to
Description in embodiment of the method, details are not described herein.
Fig. 7 describes the built-in function and structure of bluetooth host, and in a possible design, the structure of bluetooth host can
It is embodied as an electronic equipment, which can may include: for equipment, the electronic equipments such as mobile phone, ipad
Memory is configured to storage executable program;
Processor is configured to realize that bluetooth host is executed in above method embodiment when executing the executable program
Method and step.
The embodiment of the present application also provides a kind of storage medium comprising computer executable instructions, computer is executable
Password provides operation between instruction can be used for executing the bluetooth equipment, and the embodiment of the present application one or embodiment two can also be performed
Relevant operation between provided bluetooth equipment in password providing method.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Be described in the embodiment of the present application involved module, unit can be realized by way of software, can also be with
It is realized by way of hardware.Wherein, module, the title of unit are not constituted under certain conditions to the module, unit sheet
The restriction of body.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention
It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also
It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.
Claims (13)
1. the password providing method between a kind of bluetooth equipment, which is characterized in that the method is applied to include data security module
Bluetooth slave devices, which comprises
Receive the order of shaking hands comprising verify data from bluetooth host;
After verifying the bluetooth host according to the verify data as bound host equipment, the transmission of Xiang Suoshu bluetooth host is held
Hand response;
It receives the cipher inquiry instruction from the bluetooth host and is instructed according to the cipher inquiry from the data safety mould
Designated pin is searched in block, and the password found is shown in display screen.
2. the method according to claim 1, wherein including that password storage is numbered in cipher inquiry instruction;
Designated pin is searched from the data security module according to cipher inquiry instruction, comprising:
Number after being numbered according to the password storage or being converted to password storage number, from the data security module
Middle lookup designated pin.
3. the method according to claim 1, wherein the password found from the data security module is ciphertext
Data;
The password found is shown in display screen, comprising: show in display screen to after the ciphertext data deciphering of lookup.
4. the method according to claim 1, wherein the method is also wrapped after receiving the order of shaking hands
It includes: data interaction key is generated according to preset-key;
The cipher inquiry instruction is encrypted instruction ciphertext, correspondingly, decrypting the finger using the data interaction key
Ciphertext is enabled to obtain cipher inquiry instruction in plain text.
5. according to the method described in claim 4, it is characterized in that, generating data interaction key according to preset-key, comprising: root
Data interaction key is generated according to some or all of preset-key and the verify data.
6. according to the method described in claim 4, it is characterized in that, receive bluetooth host send order of shaking hands before, institute
State method further include: establish binding relationship with bluetooth host, in which:
After establishing bluetooth connection with bluetooth host, the pairing request that bluetooth host is sent is received, includes in the pairing request
Key parameter;
After the preset-key is calculated according to the key parameter, Xiang Suoshu bluetooth host sends pairing response.
7. the password providing method between a kind of bluetooth equipment, which is characterized in that the method is applied to bluetooth host, the method
Include:
The order of shaking hands comprising verify data is sent to Bluetooth slave devices, the verify data is for described in Bluetooth slave devices judgement
Whether bluetooth host is the host equipment bound;
Receive the response of shaking hands that the Bluetooth slave devices return;
Cipher inquiry instruction is sent to the Bluetooth slave devices, so that data safety of the Bluetooth slave devices included by itself
Designated pin is searched in module, and the password found is shown in display screen.
8. the method according to the description of claim 7 is characterized in that the cipher inquiry instruction in include password storage number,
It is stored in number and Bluetooth slave devices data security module after the password storage number or password storage number conversion
The password number of password has corresponding relationship.
9. the method according to the description of claim 7 is characterized in that the Bluetooth slave devices send cipher inquiry instruction,
So that the Bluetooth slave devices search designated pin from the data security module included by itself, and shows and look into display screen
Before the password found, the method also includes:
Data interaction key is generated according to preset-key;
It is instructed and is encrypted using cipher inquiry described in the data interaction key pair.
10. according to the method described in claim 9, it is characterized in that, generating data interaction key according to preset-key, comprising:
Data interaction key is generated according to some or all of preset-key and the verify data.
11. the method according to the description of claim 7 is characterized in that sending holding comprising verify data to Bluetooth slave devices
Before hand order, the method also includes:
Binding relationship is established with Bluetooth slave devices;Wherein: after establishing bluetooth connection with Bluetooth slave devices, to Bluetooth slave devices
Pairing request is sent, includes key parameter in the pairing request;
Receive the pairing response and the preset-key is calculated according to the key parameter that Bluetooth slave devices are sent.
12. a kind of bluetooth equipment characterized by comprising
Data security module is arranged for carrying out the calculating and storage of key;
Memory is configured to storage executable program;
Processor is configured to realize method step of any of claims 1-6 when executing the executable program
Suddenly.
13. a kind of bluetooth equipment characterized by comprising
Memory is configured to storage executable program;
Processor is configured to realize method step described in any one of claim 7-11 when executing the executable program
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811644551.6A CN109547991A (en) | 2018-12-30 | 2018-12-30 | Password providing method and bluetooth equipment between bluetooth equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811644551.6A CN109547991A (en) | 2018-12-30 | 2018-12-30 | Password providing method and bluetooth equipment between bluetooth equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109547991A true CN109547991A (en) | 2019-03-29 |
Family
ID=65831572
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811644551.6A Pending CN109547991A (en) | 2018-12-30 | 2018-12-30 | Password providing method and bluetooth equipment between bluetooth equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109547991A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223667A1 (en) * | 2009-02-27 | 2010-09-02 | International Business Machines Corporation | Apparatus, system, and method for start-up authentication |
CN103606047A (en) * | 2013-11-22 | 2014-02-26 | 深圳市亚略特生物识别科技有限公司 | Password management system |
CN104092550A (en) * | 2014-07-23 | 2014-10-08 | 三星电子(中国)研发中心 | Password protection method, system and device |
CN104767624A (en) * | 2015-04-23 | 2015-07-08 | 北京航空航天大学 | Remote protocol authentication method based on biological features |
CN105022941A (en) * | 2015-06-24 | 2015-11-04 | 上海斐讯数据通信技术有限公司 | Management method and system of username password |
WO2016096282A1 (en) * | 2014-12-18 | 2016-06-23 | Gemalto Sa | System for verifying a one-time password |
CN108549808A (en) * | 2018-04-19 | 2018-09-18 | 北京华大智宝电子系统有限公司 | A kind of cipher management method and device |
-
2018
- 2018-12-30 CN CN201811644551.6A patent/CN109547991A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223667A1 (en) * | 2009-02-27 | 2010-09-02 | International Business Machines Corporation | Apparatus, system, and method for start-up authentication |
CN103606047A (en) * | 2013-11-22 | 2014-02-26 | 深圳市亚略特生物识别科技有限公司 | Password management system |
CN104092550A (en) * | 2014-07-23 | 2014-10-08 | 三星电子(中国)研发中心 | Password protection method, system and device |
WO2016096282A1 (en) * | 2014-12-18 | 2016-06-23 | Gemalto Sa | System for verifying a one-time password |
CN104767624A (en) * | 2015-04-23 | 2015-07-08 | 北京航空航天大学 | Remote protocol authentication method based on biological features |
CN105022941A (en) * | 2015-06-24 | 2015-11-04 | 上海斐讯数据通信技术有限公司 | Management method and system of username password |
CN108549808A (en) * | 2018-04-19 | 2018-09-18 | 北京华大智宝电子系统有限公司 | A kind of cipher management method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110177354B (en) | Wireless control method and system for vehicle | |
US10601801B2 (en) | Identity authentication method and apparatus | |
CN107358441B (en) | Payment verification method and system, mobile device and security authentication device | |
CN109688573A (en) | Exchange method and bluetooth equipment between bluetooth equipment | |
JP2020109671A (en) | Method and device for personal authentication | |
US11924635B2 (en) | Security authentication method and apparatus thereof, and electronic device | |
CN105184931A (en) | Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock | |
CN102833253A (en) | Method and server for establishing safe connection between client and server | |
CN108762791A (en) | Firmware upgrade method and device | |
CN113781678A (en) | Vehicle Bluetooth key generation and authentication method and system under network-free environment | |
CN112055019B (en) | Method for establishing communication channel and user terminal | |
CN105142134B (en) | Parameter acquisition and parameter transmission method and device | |
CN111245607B (en) | Networking method and system, network distribution equipment, client and server | |
CN102916869A (en) | Instant messaging method and system | |
CN113347010B (en) | Mutual authentication method and system based on SSL-TLS protocol | |
CN112672342B (en) | Data transmission method, device, equipment, system and storage medium | |
CN112087302A (en) | Device for encrypting and decrypting algorithm of asymmetric dynamic token | |
CN112182624A (en) | Encryption method, encryption device, storage medium and electronic equipment | |
CN103024735B (en) | Method and equipment for service access of card-free terminal | |
CN104065648A (en) | Data processing method of voice communication | |
KR20140058196A (en) | Apparatus and method for protecting mobile message data | |
TW201807614A (en) | System, method, and device for processing sub-account information | |
CN106789000A (en) | A kind of secret phone system and method based on TEE technologies and wearable device | |
CN109547196A (en) | The implementation method and wrist-watch token system and device of a kind of wrist-watch token system | |
CN105554759A (en) | Authentication method and authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190329 |
|
RJ01 | Rejection of invention patent application after publication |