CN110049480A - A kind of authentication method and relevant apparatus of bluetooth equipment - Google Patents
A kind of authentication method and relevant apparatus of bluetooth equipment Download PDFInfo
- Publication number
- CN110049480A CN110049480A CN201910435058.1A CN201910435058A CN110049480A CN 110049480 A CN110049480 A CN 110049480A CN 201910435058 A CN201910435058 A CN 201910435058A CN 110049480 A CN110049480 A CN 110049480A
- Authority
- CN
- China
- Prior art keywords
- authentication
- bluetooth equipment
- authentication data
- data
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application discloses a kind of authentication methods of bluetooth equipment, comprising: the first bluetooth equipment carries out authentication data generation processing to the first pre-arranged code, obtains the first authentication data;First authentication data is sent to the second bluetooth equipment, so that the second bluetooth equipment executes authentication operation to the first authentication data according to the second pre-arranged code, when authentication operation passes through, sends the second authentication data to the first bluetooth equipment;When receiving the second authentication data, authentication operation is executed to the second authentication data;When authentication operation passes through, carry out data transmission with the second bluetooth equipment.Authentication data is sent to the second bluetooth equipment by the first bluetooth equipment, the second bluetooth equipment improves the accuracy of connection the case where realizing the authentication operation before connecting, avoid the occurrence of mistake even according to authentication data progress authentication operation.Disclosed herein as well is the authentication method of another bluetooth equipment, three kinds of bluetooth equipments and computer readable storage mediums, have the above beneficial effect.
Description
Technical field
This application involves technical field of bluetooth communication, in particular to a kind of authentication method of bluetooth equipment, another bluetooth
The authentication method of equipment, three kinds of bluetooth equipments and computer readable storage medium.
Background technique
With the continuous development of information technology, the more convenient and flexible communication technology is used to provide convenience for life.Especially
It is to propose a kind of electronic label technology based on Bluetooth technology, which is applied in Internet of Things, especially
It is applied in the Intelligent cargo cabinet either environment of smart supermarket, be can be convenient and is recorded to the disengaging of cargo, without
Manually cargo recorded, can be automatically performed, improve the efficiency of item record, reduce cost of labor.
But in the prior art when needing to establish connection between main side equipment and electronic tag, main side equipment and electronics
There is no verification process between label, directly electronic tag is attached.It is attached in the case where not authenticated
Accuracy is extremely low, and main side equipment is easy to cause to connect to the electronic tag transmission data or electronic tag for being not belonging to its compass of competency
The data that the main side of mistake is sent are received, data transmission fault, electronic tag managerial confusion, material handling mistake are caused.
Therefore, the emphasis that the accuracy connected between main side and electronic tag is those skilled in the art's concern how is improved
Problem.
Summary of the invention
The purpose of the application is to provide a kind of authentication method of bluetooth equipment, the authentication method of another bluetooth equipment, three
Kind bluetooth equipment and computer readable storage medium send authentication data to the second bluetooth equipment by the first bluetooth equipment,
Second bluetooth equipment carries out authentication operation according to authentication data, is attached again when certification passes through, that is, to the second bluetooth
Equipment carries out data transmission.Wrong the case where connecting is avoided the occurrence of, the accuracy of connection is improved.
In order to solve the above technical problems, the application provides a kind of authentication method of bluetooth equipment, comprising:
First bluetooth equipment carries out authentication data generation processing to the first pre-arranged code, obtains the first authentication data;
First authentication data is sent to the second bluetooth equipment, so that second bluetooth equipment is default according to second
Coding executes authentication operation to first authentication data, and when authentication operation passes through, the first bluetooth equipment of Xiang Suoshu sends the
Two authentication datas;
When receiving second authentication data, authentication operation is executed to second authentication data;
When authentication operation passes through, carry out data transmission with second bluetooth equipment.
Optionally, the first bluetooth equipment carries out authentication data generation processing to the first pre-arranged code, obtains the first certification number
According to, comprising:
First bluetooth equipment carries out random code generation, obtains random code;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the first check value;
The random code and first check value are integrated, first authentication data is obtained.
Optionally, the random code and first check value are integrated, obtains first authentication data, wrapped
It includes:
The random code and first check value are combined into data group;
The data group is subjected to out-of-order processing according to preset rules, obtains first authentication data.
Optionally, when receiving second authentication data, authentication operation, packet are executed to second authentication data
It includes:
When receiving second authentication data, second authentication data is torn open according to the preset rules
Point, obtain the random code and second check value;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the first check value;
Judge whether first check value and second check value are identical;
If so, determining that authentication operation passes through;
If it is not, then determining that authentication operation fails.
The application also provides a kind of bluetooth equipment, comprising:
First authentication data generation module obtains first for carrying out authentication data generation processing to the first pre-arranged code
Authentication data;
First authentication data sending module, for first authentication data to be sent to the second bluetooth equipment, with toilet
It states the second bluetooth equipment and authentication operation is executed to first authentication data according to the second pre-arranged code, when authentication operation passes through
When, the first bluetooth equipment of Xiang Suoshu sends the second authentication data;
First authentication operation module, for being held to second authentication data when receiving second authentication data
Row authentication operation;
Data transmission module, for carrying out data transmission with second bluetooth equipment when authentication operation passes through.
The application also provides a kind of authentication method of bluetooth equipment, comprising:
When second bluetooth equipment receives the first authentication data of the first bluetooth equipment transmission, according to the second pre-arranged code pair
First authentication data executes authentication operation;
When authentication operation passes through, authentication data generation processing is carried out according to second pre-arranged code, second is obtained and recognizes
Demonstrate,prove data;
Second authentication data is sent to first bluetooth equipment, so as to when first bluetooth equipment is to described
When the authentication operation of second authentication data passes through, carry out data transmission with second bluetooth equipment.
Optionally, it is pre- according to second when the second bluetooth equipment receives the first authentication data of the first bluetooth equipment transmission
If coding executes authentication operation to first authentication data, comprising:
When receiving first authentication data, first authentication data is split according to preset rules, is obtained
To the random code and first check value;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the second check value;
Judge whether first check value and second check value are identical;
If so, determining that authentication operation passes through;
If it is not, then determining that authentication operation fails.
The application also provides a kind of bluetooth equipment, comprising:
Second authentication operation module, when for receiving the first authentication data of the first bluetooth equipment transmission, according to second
Pre-arranged code executes authentication operation to first authentication data;
Second authentication data generation module, for being recognized according to second pre-arranged code when authentication operation passes through
Data generation processing is demonstrate,proved, the second authentication data is obtained;
Second authentication data sending module, for second authentication data to be sent to first bluetooth equipment, with
When box lunch first bluetooth equipment passes through the authentication operation of second authentication data, carried out with second bluetooth equipment
Data transmission.
The application also provides a kind of bluetooth equipment, comprising:
Memory, for storing computer program;
Processor, the step of authentication method as described above is realized when for executing the computer program.
The application also provides a kind of computer readable storage medium, and calculating is stored on the computer readable storage medium
The step of machine program, the computer program realizes authentication method as described above when being executed by processor.
The authentication method of a kind of bluetooth equipment provided herein, comprising: the first bluetooth equipment is to the first pre-arranged code
Authentication data generation processing is carried out, the first authentication data is obtained;First authentication data is sent to the second bluetooth equipment, with
Toilet states the second bluetooth equipment and executes authentication operation to first authentication data according to the second pre-arranged code, when authentication operation is logical
Out-of-date, the first bluetooth equipment of Xiang Suoshu sends the second authentication data;When receiving second authentication data, to described second
Authentication data executes authentication operation;When authentication operation passes through, carry out data transmission with second bluetooth equipment.
The first authentication data is generated to the first pre-arranged code by the first bluetooth equipment, and is sent to the second bluetooth equipment,
So that the second bluetooth equipment judges the first pre-arranged code of the first bluetooth equipment according to first authentication data and this is second default
Whether coding is identical, if the same indicates that certification passes through, the first bluetooth equipment carries out data transmission with the second bluetooth equipment.It can
See, realize mutual authentication operation between two bluetooth equipments, avoids occurring wrong the case where connecting between two bluetooth equipments,
Improve the accuracy of bluetooth equipment connection.
The application also provides authentication method, three kinds of bluetooth equipments and the computer-readable storage medium of another bluetooth equipment
Matter has the above beneficial effect, and this will not be repeated here.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart of the authentication method of the first bluetooth equipment provided by the embodiment of the present application;
Fig. 2 is the flow chart of the authentication method of second of bluetooth equipment provided by the embodiment of the present application;
Fig. 3 is the flow chart of the authentication method of the third bluetooth equipment provided by the embodiment of the present application;
Fig. 4 is the flow chart of the authentication method of the 4th kind of bluetooth equipment provided by the embodiment of the present application;
Fig. 5 is a kind of structural schematic diagram of bluetooth equipment provided by the embodiment of the present application;
Fig. 6 is the structural schematic diagram of another kind bluetooth equipment provided by the embodiment of the present application.
Specific embodiment
The core of the application is to provide a kind of authentication method of bluetooth equipment, the authentication method of another bluetooth equipment, three
Kind bluetooth equipment and computer readable storage medium send authentication data to the second bluetooth equipment by the first bluetooth equipment,
Second bluetooth equipment carries out authentication operation according to authentication data, is attached again when certification passes through, that is, to the second bluetooth
Equipment carries out data transmission.Wrong the case where connecting is avoided the occurrence of, the accuracy of connection is improved.
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
The prior art between main side equipment and electronic tag when needing to establish connection, between main side equipment and electronic tag
There is no verification process, directly electronic tag is attached.The accuracy pole being attached in the case where not authenticated
It is low.It is easy to cause main side equipment to receive mistake to the electronic tag transmission data or electronic tag for being not belonging to its compass of competency
Main side send data, cause data transmission fault, electronic tag managerial confusion, material handling mistake.
This application provides a kind of authentication methods of bluetooth equipment, are generated by the first bluetooth equipment to the first pre-arranged code
First authentication data, and it is sent to the second bluetooth equipment, so that the second bluetooth equipment judges first according to first authentication data
Whether the first pre-arranged code of bluetooth equipment and second pre-arranged code are identical, if the same indicate that certification passes through, and first is blue
Tooth equipment carries out data transmission with the second bluetooth equipment.As it can be seen that mutual authentication operation is realized between two bluetooth equipments,
It avoids occurring wrong the case where connecting between two bluetooth equipments, improves the accuracy of bluetooth equipment connection.
Referring to FIG. 1, Fig. 1 is the flow chart of the authentication method of the first bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, this method may include:
S101, the first bluetooth equipment carry out authentication data generation processing to the first pre-arranged code, obtain the first authentication data;
This step is intended to carry out authentication data generation processing to the first pre-arranged code, obtains the first authentication data.It is,
The process for generating processing by authentication data according to the content of the first pre-arranged code, generates corresponding with the first pre-arranged code first
Authentication data.
Wherein, authentication data generates processing and is mainly encoded arbitrary data content according to the first pre-arranged code, obtains
Data after to coding, and as authentication data.And a side of authentication data is obtained, appointed according to the second pre-arranged code to same
Meaning data content is encoded, compare local coding result and the authentication data that receives in as a result, if coding result
It is identical, it may be said that bright the first pre-arranged code used and the second pre-arranged code are identical.As it can be seen that the certification generated in this step
Data are exactly and to avoid carrying out pre-arranged code for judging whether respective pre-arranged code is identical in the bluetooth equipment of both ends
Plaintext transmission avoids the occurrence of the case where pre-arranged code is trapped, and improves the safety of authentication data.
First authentication data is sent to the second bluetooth equipment by S102, so that the second bluetooth equipment is according to the second default volume
Code executes authentication operation to the first authentication data, when authentication operation passes through, sends the second authentication data to the first bluetooth equipment;
On the basis of S101, this step is intended to the first authentication data being sent to the second bluetooth equipment, so as to the second indigo plant
Tooth equipment executes authentication operation to the first authentication data according to the second pre-arranged code.It is, according to the second pre-arranged code to
Data content in one authentication data carries out coding calculating, obtains coding result.Judge the coding result and the first authentication data
In coding result it is whether identical;If so, the first pre-arranged code of explanation and the second pre-arranged code are identical, i.e. expression certifications
Operation passes through.
In order to further increase the accuracy of authentication method, when authentication operation passes through, the second bluetooth equipment generates second
Authentication data is simultaneously sent to the first bluetooth equipment, i.e. the first bluetooth equipment carries out an authentication operation again, guarantees that the first bluetooth is set
The standby accuracy connected between the second bluetooth equipment, the case where avoiding the occurrence of connection error.
S103 executes authentication operation to the second authentication data when receiving the second authentication data;
On the basis of S102, this step is intended to execute authentication operation to the second authentication data received.Wherein, to
The authentication operation that two authentication datas execute, with the authentication operation that the second bluetooth equipment executes the first bluetooth equipment in previous step
It is similar, it can be not specifically limited herein with reference to the authentication operation in previous step.
S104 carries out data transmission when authentication operation passes through with the second bluetooth equipment.
On the basis of S103, this step is intended to carry out data transmission the second bluetooth equipment when authentication operation passes through,
Connection is established with the second bluetooth equipment.
To sum up, the present embodiment generates the first authentication data to the first pre-arranged code by the first bluetooth equipment, and is sent to
Second bluetooth equipment, so that the second bluetooth equipment judges according to first authentication data the first pre-arranged code of the first bluetooth equipment
It is whether identical with second pre-arranged code, if the same indicate that certification passes through, the first bluetooth equipment and the second bluetooth equipment into
The transmission of row data.As it can be seen that realizing mutual authentication operation between two bluetooth equipments, avoid going out between two bluetooth equipments
Existing wrong the case where connecting, improve the accuracy of bluetooth equipment connection.
A kind of authentication method of bluetooth equipment provided by the present application is further described below by way of one embodiment.
Referring to FIG. 2, Fig. 2 is the flow chart of the authentication method of second of bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, this method may include:
S201, the first bluetooth equipment carry out random code generation, obtain random code;
S202 carries out coding calculating to random code according to the first pre-arranged code, obtains the first check value;
S203 integrates random code and the first check value, obtains the first authentication data;
As it can be seen that step S201 to step S203 mainly to how to be carried out in the application authentication data generation processing say
It is bright.By taking 8 random codes as an example, the first bluetooth equipment firstly generates 8 random codes, then according to the first pre-arranged code to 8 with
Machine code carries out coding calculating, obtains the first check value, that is, the first pre-arranged code and 8 random codeds are carried out coding meter
It calculates, finally is integrated to obtain the first authentication data by 8 random codes and the first check value.Receive setting for the first authentication data
It is standby, so that it may 8 random codes to be encoded using local pre-arranged code, by the in coding result and the first authentication data
One check value is compared, if identical, illustrates that the first pre-arranged code is identical with local pre-arranged code, that is, mutual
Match, illustrates that certification passes through.As it can be seen that can be authenticated in two Bluetooth terminals by the authentication data generated respectively store it is default
Whether whether coding is identical, that is, authenticate and be mutually matched between the two, to there is the case where incorrect link.
Wherein, the method that this step generates random code can be generated using any one random code provided in the prior art
Method is not specifically limited herein as long as obtaining the random code for meeting digit.
Optionally, step S203 may include:
Step 1: random code and the first check value are combined into data group;
Step 2: data group is carried out out-of-order processing according to preset rules, the first authentication data is obtained.
As it can be seen that this step is mainly that the data group that random code and the first check value synthesize is carried out out-of-order processing.For example, raw
At 8 random codes be 12345678, by coding calculate after the first check value be 45812441, the data group being combined into is i.e.
It puts behind for random code is placed on the first check value of front, i.e., 1234567845812441, out-of-order processing finally is carried out to it
Result be 1278434562581441.It is envisioned that carrying out the result of out-of-order processing according to the difference of preset rules
Can be different, but its result is to upset the data in data group, avoids the content of authentication data from carrying out plaintext transmission, reduces number
According to the probability of leakage.
First authentication data is sent to the second bluetooth equipment by S204, so that the second bluetooth equipment is according to the second default volume
Code executes authentication operation to the first authentication data, when authentication operation passes through, sends the second authentication data to the first bluetooth equipment;
S205 executes authentication operation to the second authentication data when receiving the second authentication data;
S206 carries out data transmission when authentication operation passes through with the second bluetooth equipment.
Specific implementation process about above-mentioned steps S204 to S206 can refer to the content of previous embodiment, herein no longer into
Row repeats.
A kind of authentication method of bluetooth equipment provided by the present application is further described below by way of one embodiment.
Referring to FIG. 3, Fig. 3 is the flow chart of the authentication method of the third bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, this method may include:
S301, the first bluetooth equipment carry out authentication data generation processing to the first pre-arranged code, obtain the first authentication data;
First authentication data is sent to the second bluetooth equipment by S302, so that the second bluetooth equipment is according to the second default volume
Code executes authentication operation to the first authentication data, when authentication operation passes through, sends the second authentication data to the first bluetooth equipment;
S303 splits the second authentication data according to preset rules when receiving the second authentication data, obtain with
Machine code and the second check value;
S304 carries out coding calculating to random code according to the first pre-arranged code, obtains the first check value;
S305 judges whether the first check value and the second check value are identical;If so, executing S306;If it is not, then executing
S307;
S306 determines that authentication operation passes through, carries out data transmission with the second bluetooth equipment;
S307 determines authentication operation failure;
As it can be seen that S303 to S307 step mainly in technical scheme when the first bluetooth equipment receive second indigo plant
When the second authentication data that tooth equipment is sent, it is illustrated according to the authentication operation that the second authentication data executes.Wherein, specifically
Step is exactly that random code and the second check value are split out from the second authentication data, then using the first pre-arranged code to random code
Coding calculating is carried out, the result that coding calculates is compared with the second check value, if the same indicates to determine authentication operation
Pass through, that is, the first pre-arranged code of the first bluetooth equipment and the pre-arranged code of the second bluetooth equipment be it is identical, i.e., mutually
Matching.
Wherein, the mode that the mode of coding calculating can be calculated with reference to the coding in above-described embodiment is carried out, is not done herein
It repeats.
Specific implementation process about above-mentioned steps S301, S302 can refer to the content of previous embodiment, herein no longer into
Row repeats.
Above-described embodiment is described using the first bluetooth equipment as executing subject, below by way of one embodiment with
Second bluetooth equipment is that a kind of authentication method of bluetooth equipment of execution theme is further described.
Referring to FIG. 4, Fig. 4 is the flow chart of the authentication method of the 4th kind of bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, this method may include:
S401, it is default according to second when the second bluetooth equipment receives the first authentication data of the first bluetooth equipment transmission
Coding executes authentication operation to the first authentication data;
This step is intended to when the second bluetooth equipment passively receives the first authentication data, is executed according to the second pre-arranged code
Authentication operation.Wherein, performed authentication operation can be with reference to the authentication operation process in above embodiments.
Optionally, the authentication operation in this step may include:
Step 1 splits the first authentication data according to preset rules, obtains when receiving the first authentication data
Random code and the first check value;
Step 2 carries out coding calculating to random code according to the second pre-arranged code, obtains the second check value;
Step 3 judges whether the first check value and the second check value are identical;
Step 4, if so, determining that authentication operation passes through;
Step 5, if it is not, then determining that authentication operation fails.
Wherein, the out-of-order preset rules of processing of the progress in the preset rules with previous embodiment of the present embodiment are identical, protect
The available identical random code of split process and the first check value are demonstrate,proved.
S402 carries out authentication data generation processing according to the second pre-arranged code, obtains second and recognize when authentication operation passes through
Demonstrate,prove data;
Second authentication data is sent to the first bluetooth equipment by S403, so that the first bluetooth equipment is when to the second certification number
According to authentication operation pass through when, carry out data transmission with the second bluetooth equipment.
As it can be seen that a kind of authentication method of bluetooth equipment provided in this embodiment, by the second authentication data received
Authentication operation is executed, whether pre-arranged code and the local terminal pre-arranged code to determine opposite end bluetooth equipment are identical, if so, mark
Certification passes through, and continues to feed back authentication data.After equally authenticating and pass through so as to the first bluetooth equipment, established with the second bluetooth equipment
Data are transmitted in connection.
Certification below by way of a more specific embodiment, to a kind of bluetooth equipment provided in technical scheme
Method is further described.
In the present embodiment, which is applied in main side equipment and ESL (Electronic Shelf Label electronics
Shelf label) communication connection during.
The authentication method may include:
Step 1, verification process of the ESL to main side equipment: main side equipment sends authentication data to ESL according to the rule of agreement
Packet, ESL verify data packet, are confirmed whether that certification passes through;
Step 2, verification process of the main side equipment to ESL: ESL certification passes through and then about establishes rules to the transmission of main side equipment
Authentication data packet then, main side equipment verify data packet, are confirmed whether that certification passes through;
Step 3, when certification passes through, main side equipment and ESL establish connection.
Wherein, each ESL is preset with the KEY value an of initial default, the pre-arranged code in authentication authorization and accounting method.And in goods
Server in frame system records the KEY value for having each ESL.
Therefore, the process for sending authentication data packet includes:
Step 1, the random number N of 8 bytes is obtained;
Step 2,8 byte random numbers of step 1 are calculated with the check value to 8 bytes using preset KEY value coding
MIC;
Step 3, the obtained MIC of the N and step 2 of step 1 is merged into data packet (i.e. preceding 8 byte for obtaining 16 bytes
It is N, rear 8 byte is MIC);
Step 4, byte random ordering is carried out to 16 byte data packets of step 3;
Step 5, the data packet after step 4 random ordering is sent.
Further, process authentication data packet verified, that is, execute authentication operation process include:
Step 1, byte order adjustment is carried out to the data packet that receives, revert to normal data packet (preceding 8 byte is N,
8 bytes are MIC afterwards);
Step 2, coding calculating is carried out to preceding 8 byte random code N using preset KEY value, obtains check value MIC_2;
Step 3, judge MIC and MIC_2, if identical, certification passes through, the authentification failure if different;
In addition, avoiding rogue device from being attached with main side equipment or ESL to improve the safety of commodity shelf system.It can
To carry out dynamic update to KEY value according to predetermined period after connection certification passes through.
As it can be seen that the present embodiment generates the first authentication data to the first pre-arranged code by main side equipment, and it is sent to ESL,
So that ESL judges whether the first pre-arranged code of main side equipment and second pre-arranged code are identical according to first authentication data,
If the same indicate that certification passes through, main side equipment carries out data transmission with ESL.As it can be seen that being realized between two bluetooth equipments
Mutual authentication operation, avoid occurring between two bluetooth equipments it is wrong even the case where, improve the accuracy of bluetooth equipment connection.
A kind of bluetooth equipment provided by the embodiments of the present application is introduced below, a kind of bluetooth equipment described below with
A kind of authentication method of above-described bluetooth equipment can correspond to each other reference.
Referring to FIG. 5, Fig. 5 is a kind of structural schematic diagram of bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, which may include:
First authentication data generation module 110 obtains for carrying out authentication data generation processing to the first pre-arranged code
One authentication data;
First authentication data sending module 120, for the first authentication data to be sent to the second bluetooth equipment, so as to second
Bluetooth equipment executes authentication operation to the first authentication data according to the second pre-arranged code, when authentication operation passes through, to the first indigo plant
Tooth equipment sends the second authentication data;
First authentication operation module 130, for executing certification to the second authentication data when receiving the second authentication data
Operation;
Data transmission module 140, for carrying out data transmission with the second bluetooth equipment when authentication operation passes through.
A kind of bluetooth equipment provided by the embodiments of the present application is introduced below, a kind of bluetooth equipment described below with
A kind of authentication method of above-described bluetooth equipment can correspond to each other reference.
Referring to FIG. 6, Fig. 6 is the structural schematic diagram of another kind bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, which may include:
Second authentication operation module 210, when for receiving the first authentication data of the first bluetooth equipment transmission, according to the
Two pre-arranged codes execute authentication operation to the first authentication data;
Second authentication data generation module 220, for being authenticated according to the second pre-arranged code when authentication operation passes through
Data generation processing, obtains the second authentication data;
Second authentication data sending module 230, for the second authentication data to be sent to the first bluetooth equipment, so as to first
Bluetooth equipment carries out data transmission when the authentication operation to the second authentication data passes through with the second bluetooth equipment.
The embodiment of the present application also provides a kind of bluetooth equipment, comprising:
Memory, for storing computer program;
Processor, when for executing computer program the step of the realization such as authentication method of above embodiments.
The embodiment of the present application also provides a kind of computer readable storage medium, stores on the computer readable storage medium
There is computer program, the computer program realizes the step of authentication method as described above in Example when being executed by processor
Suddenly.
The computer readable storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-OnlyMemory,
ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. are various can store program
The medium of code.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities
The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment
Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration
?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Above to the authentication method of a kind of authentication method of bluetooth equipment provided herein, another bluetooth equipment,
Three kinds of bluetooth equipments and computer readable storage medium are described in detail.Specific case used herein is to the application
Principle and embodiment be expounded, the present processes that the above embodiments are only used to help understand and its core
Thought is thought.It should be pointed out that for those skilled in the art, under the premise of not departing from the application principle,
Can also to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the protection scope of the claim of this application
It is interior.
Claims (10)
1. a kind of authentication method of bluetooth equipment characterized by comprising
First bluetooth equipment carries out authentication data generation processing to the first pre-arranged code, obtains the first authentication data;
First authentication data is sent to the second bluetooth equipment, so that second bluetooth equipment is according to the second pre-arranged code
Authentication operation is executed to first authentication data, when authentication operation passes through, the first bluetooth equipment of Xiang Suoshu, which sends second, to be recognized
Demonstrate,prove data;
When receiving second authentication data, authentication operation is executed to second authentication data;
When authentication operation passes through, carry out data transmission with second bluetooth equipment.
2. authentication method according to claim 1, which is characterized in that the first bluetooth equipment recognizes the first pre-arranged code
Data generation processing is demonstrate,proved, the first authentication data is obtained, comprising:
First bluetooth equipment carries out random code generation, obtains random code;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the first check value;
The random code and first check value are integrated, first authentication data is obtained.
3. authentication method according to claim 2, which is characterized in that carried out to the random code and first check value
Integration, obtains first authentication data, comprising:
The random code and first check value are combined into data group;
The data group is subjected to out-of-order processing according to preset rules, obtains first authentication data.
4. authentication method according to claim 3, which is characterized in that when receiving second authentication data, to institute
It states the second authentication data and executes authentication operation, comprising:
When receiving second authentication data, second authentication data is split according to the preset rules, is obtained
To the random code and second check value;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the first check value;
Judge whether first check value and second check value are identical;
If so, determining that authentication operation passes through;
If it is not, then determining that authentication operation fails.
5. a kind of bluetooth equipment characterized by comprising
First authentication data generation module obtains the first certification for carrying out authentication data generation processing to the first pre-arranged code
Data;
First authentication data sending module, for first authentication data to be sent to the second bluetooth equipment, so as to described
Two bluetooth equipments execute authentication operation to first authentication data according to the second pre-arranged code, when authentication operation passes through, to
First bluetooth equipment sends the second authentication data;
First authentication operation module, for recognizing second authentication data execution when receiving second authentication data
Card operation;
Data transmission module, for carrying out data transmission with second bluetooth equipment when authentication operation passes through.
6. a kind of authentication method of bluetooth equipment characterized by comprising
When second bluetooth equipment receives the first authentication data of the first bluetooth equipment transmission, according to the second pre-arranged code to described
First authentication data executes authentication operation;
When authentication operation passes through, authentication data generation processing is carried out according to second pre-arranged code, obtains the second certification number
According to;
Second authentication data is sent to first bluetooth equipment, so as to when first bluetooth equipment is to described second
When the authentication operation of authentication data passes through, carry out data transmission with second bluetooth equipment.
7. authentication method according to claim 6, which is characterized in that the second bluetooth equipment receives the first bluetooth equipment hair
When the first authentication data sent, authentication operation is executed to first authentication data according to the second pre-arranged code, comprising:
When receiving first authentication data, first authentication data is split according to preset rules, obtains institute
State random code and first check value;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the second check value;
Judge whether first check value and second check value are identical;
If so, determining that authentication operation passes through;
If it is not, then determining that authentication operation fails.
8. a kind of bluetooth equipment characterized by comprising
Second authentication operation module, it is default according to second when for receiving the first authentication data of the first bluetooth equipment transmission
Coding executes authentication operation to first authentication data;
Second authentication data generation module, for carrying out certification number according to second pre-arranged code when authentication operation passes through
It is handled according to generation, obtains the second authentication data;
Second authentication data sending module, for second authentication data to be sent to first bluetooth equipment, to work as
When first bluetooth equipment passes through the authentication operation of second authentication data, data are carried out with second bluetooth equipment
Transmission.
9. a kind of bluetooth equipment characterized by comprising
Memory, for storing computer program;
Processor realizes the step such as the described in any item authentication methods of Claims 1-4 when for executing the computer program
The step of authentication method described in rapid and/or claim 6 or 7.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program is realized when the computer program is executed by processor such as the step of Claims 1-4 described in any item authentication methods
And/or the step of authentication method described in claim 6 or 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910435058.1A CN110049480A (en) | 2019-05-23 | 2019-05-23 | A kind of authentication method and relevant apparatus of bluetooth equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910435058.1A CN110049480A (en) | 2019-05-23 | 2019-05-23 | A kind of authentication method and relevant apparatus of bluetooth equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110049480A true CN110049480A (en) | 2019-07-23 |
Family
ID=67283432
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910435058.1A Pending CN110049480A (en) | 2019-05-23 | 2019-05-23 | A kind of authentication method and relevant apparatus of bluetooth equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110049480A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110944312A (en) * | 2019-11-14 | 2020-03-31 | 合肥星空物联信息科技有限公司 | Method for performing dual-mode Bluetooth pairing by using audio data and Bluetooth device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916852A (en) * | 2012-12-28 | 2014-07-09 | 联想(北京)有限公司 | Data transmission method and mobile terminal |
CN105357769A (en) * | 2015-11-23 | 2016-02-24 | 王家城 | Random access and safety control of wireless SIM card transmission protocol |
CN107969001A (en) * | 2018-01-17 | 2018-04-27 | 飞天诚信科技股份有限公司 | A kind of method and device of Bluetooth pairing two-way authentication |
CN108243481A (en) * | 2018-01-19 | 2018-07-03 | 腾讯科技(深圳)有限公司 | Document transmission method and device |
CN109462846A (en) * | 2018-12-27 | 2019-03-12 | 飞天诚信科技股份有限公司 | A kind of method, system and bluetooth equipment realizing bluetooth equipment and matching safely |
-
2019
- 2019-05-23 CN CN201910435058.1A patent/CN110049480A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916852A (en) * | 2012-12-28 | 2014-07-09 | 联想(北京)有限公司 | Data transmission method and mobile terminal |
CN105357769A (en) * | 2015-11-23 | 2016-02-24 | 王家城 | Random access and safety control of wireless SIM card transmission protocol |
CN107969001A (en) * | 2018-01-17 | 2018-04-27 | 飞天诚信科技股份有限公司 | A kind of method and device of Bluetooth pairing two-way authentication |
CN108243481A (en) * | 2018-01-19 | 2018-07-03 | 腾讯科技(深圳)有限公司 | Document transmission method and device |
CN109462846A (en) * | 2018-12-27 | 2019-03-12 | 飞天诚信科技股份有限公司 | A kind of method, system and bluetooth equipment realizing bluetooth equipment and matching safely |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110944312A (en) * | 2019-11-14 | 2020-03-31 | 合肥星空物联信息科技有限公司 | Method for performing dual-mode Bluetooth pairing by using audio data and Bluetooth device |
CN110944312B (en) * | 2019-11-14 | 2023-08-25 | 合肥星空物联信息科技有限公司 | Method for carrying out dual-mode Bluetooth pairing by utilizing audio data and Bluetooth device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109741056B (en) | Method and device for uploading electronic certificate | |
CN107294738B (en) | The treating method and apparatus of communication charge | |
CN104765999B (en) | Method, terminal and server for processing user resource information | |
CN105306490B (en) | Payment verifying system, method and device | |
CN101252435B (en) | Method for realizing dynamic password generation and judge on smart card | |
US20150207790A1 (en) | Method and system for generating and authorizing dynamic password | |
CN106503589A (en) | The method of calibration of block chain Transaction Information correctness, apparatus and system | |
CN105721149B (en) | A kind of car networking system session key generates and the method for car-mounted terminal and ECU binding | |
CN102523095B (en) | User digital certificate remote update method with intelligent card protection function | |
CN104796257A (en) | Flexible data authentication | |
CN108234385A (en) | A kind of method for authenticating user identity and device | |
CN106411950A (en) | Block-chain transaction ID based authentication method, device and system | |
CN108011719A (en) | A kind of endorsement method, device and digital signature system | |
CN107564175A (en) | One kind moves back chucking method, moves back card terminal, mobile network operating side and reimbursement terminal | |
CN101567073A (en) | Method, device and system for realizing batch electronic transaction | |
CN110445792A (en) | Verification code generation method, verifying code verification method and identifying code login system | |
CN108900311A (en) | A kind of no certificate bluetooth key endorsement method and system | |
CN102883323B (en) | A kind of method and apparatus of protection mobile terminal user's private data | |
CN105320873B (en) | A kind of unlocking method of terminal applies, device, terminal and SIM card | |
Radu et al. | Practical EMV relay protection | |
CN108600184A (en) | A kind of equipment authentication method of embedded chip certificate | |
CN103530768A (en) | Mobile communication payment system and cost payment method thereof | |
CN105635164B (en) | The method and apparatus of safety certification | |
CN107506207A (en) | The safe verification method and terminal of a kind of POS | |
CN102231667B (en) | Method and device for registering serial device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190723 |
|
RJ01 | Rejection of invention patent application after publication |