CN110049480A - A kind of authentication method and relevant apparatus of bluetooth equipment - Google Patents

A kind of authentication method and relevant apparatus of bluetooth equipment Download PDF

Info

Publication number
CN110049480A
CN110049480A CN201910435058.1A CN201910435058A CN110049480A CN 110049480 A CN110049480 A CN 110049480A CN 201910435058 A CN201910435058 A CN 201910435058A CN 110049480 A CN110049480 A CN 110049480A
Authority
CN
China
Prior art keywords
authentication
bluetooth equipment
authentication data
data
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910435058.1A
Other languages
Chinese (zh)
Inventor
郭己
庄严
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Polytron Technologies Inc In Shenzhen
Original Assignee
Polytron Technologies Inc In Shenzhen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Polytron Technologies Inc In Shenzhen filed Critical Polytron Technologies Inc In Shenzhen
Priority to CN201910435058.1A priority Critical patent/CN110049480A/en
Publication of CN110049480A publication Critical patent/CN110049480A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of authentication methods of bluetooth equipment, comprising: the first bluetooth equipment carries out authentication data generation processing to the first pre-arranged code, obtains the first authentication data;First authentication data is sent to the second bluetooth equipment, so that the second bluetooth equipment executes authentication operation to the first authentication data according to the second pre-arranged code, when authentication operation passes through, sends the second authentication data to the first bluetooth equipment;When receiving the second authentication data, authentication operation is executed to the second authentication data;When authentication operation passes through, carry out data transmission with the second bluetooth equipment.Authentication data is sent to the second bluetooth equipment by the first bluetooth equipment, the second bluetooth equipment improves the accuracy of connection the case where realizing the authentication operation before connecting, avoid the occurrence of mistake even according to authentication data progress authentication operation.Disclosed herein as well is the authentication method of another bluetooth equipment, three kinds of bluetooth equipments and computer readable storage mediums, have the above beneficial effect.

Description

A kind of authentication method and relevant apparatus of bluetooth equipment
Technical field
This application involves technical field of bluetooth communication, in particular to a kind of authentication method of bluetooth equipment, another bluetooth The authentication method of equipment, three kinds of bluetooth equipments and computer readable storage medium.
Background technique
With the continuous development of information technology, the more convenient and flexible communication technology is used to provide convenience for life.Especially It is to propose a kind of electronic label technology based on Bluetooth technology, which is applied in Internet of Things, especially It is applied in the Intelligent cargo cabinet either environment of smart supermarket, be can be convenient and is recorded to the disengaging of cargo, without Manually cargo recorded, can be automatically performed, improve the efficiency of item record, reduce cost of labor.
But in the prior art when needing to establish connection between main side equipment and electronic tag, main side equipment and electronics There is no verification process between label, directly electronic tag is attached.It is attached in the case where not authenticated Accuracy is extremely low, and main side equipment is easy to cause to connect to the electronic tag transmission data or electronic tag for being not belonging to its compass of competency The data that the main side of mistake is sent are received, data transmission fault, electronic tag managerial confusion, material handling mistake are caused.
Therefore, the emphasis that the accuracy connected between main side and electronic tag is those skilled in the art's concern how is improved Problem.
Summary of the invention
The purpose of the application is to provide a kind of authentication method of bluetooth equipment, the authentication method of another bluetooth equipment, three Kind bluetooth equipment and computer readable storage medium send authentication data to the second bluetooth equipment by the first bluetooth equipment, Second bluetooth equipment carries out authentication operation according to authentication data, is attached again when certification passes through, that is, to the second bluetooth Equipment carries out data transmission.Wrong the case where connecting is avoided the occurrence of, the accuracy of connection is improved.
In order to solve the above technical problems, the application provides a kind of authentication method of bluetooth equipment, comprising:
First bluetooth equipment carries out authentication data generation processing to the first pre-arranged code, obtains the first authentication data;
First authentication data is sent to the second bluetooth equipment, so that second bluetooth equipment is default according to second Coding executes authentication operation to first authentication data, and when authentication operation passes through, the first bluetooth equipment of Xiang Suoshu sends the Two authentication datas;
When receiving second authentication data, authentication operation is executed to second authentication data;
When authentication operation passes through, carry out data transmission with second bluetooth equipment.
Optionally, the first bluetooth equipment carries out authentication data generation processing to the first pre-arranged code, obtains the first certification number According to, comprising:
First bluetooth equipment carries out random code generation, obtains random code;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the first check value;
The random code and first check value are integrated, first authentication data is obtained.
Optionally, the random code and first check value are integrated, obtains first authentication data, wrapped It includes:
The random code and first check value are combined into data group;
The data group is subjected to out-of-order processing according to preset rules, obtains first authentication data.
Optionally, when receiving second authentication data, authentication operation, packet are executed to second authentication data It includes:
When receiving second authentication data, second authentication data is torn open according to the preset rules Point, obtain the random code and second check value;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the first check value;
Judge whether first check value and second check value are identical;
If so, determining that authentication operation passes through;
If it is not, then determining that authentication operation fails.
The application also provides a kind of bluetooth equipment, comprising:
First authentication data generation module obtains first for carrying out authentication data generation processing to the first pre-arranged code Authentication data;
First authentication data sending module, for first authentication data to be sent to the second bluetooth equipment, with toilet It states the second bluetooth equipment and authentication operation is executed to first authentication data according to the second pre-arranged code, when authentication operation passes through When, the first bluetooth equipment of Xiang Suoshu sends the second authentication data;
First authentication operation module, for being held to second authentication data when receiving second authentication data Row authentication operation;
Data transmission module, for carrying out data transmission with second bluetooth equipment when authentication operation passes through.
The application also provides a kind of authentication method of bluetooth equipment, comprising:
When second bluetooth equipment receives the first authentication data of the first bluetooth equipment transmission, according to the second pre-arranged code pair First authentication data executes authentication operation;
When authentication operation passes through, authentication data generation processing is carried out according to second pre-arranged code, second is obtained and recognizes Demonstrate,prove data;
Second authentication data is sent to first bluetooth equipment, so as to when first bluetooth equipment is to described When the authentication operation of second authentication data passes through, carry out data transmission with second bluetooth equipment.
Optionally, it is pre- according to second when the second bluetooth equipment receives the first authentication data of the first bluetooth equipment transmission If coding executes authentication operation to first authentication data, comprising:
When receiving first authentication data, first authentication data is split according to preset rules, is obtained To the random code and first check value;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the second check value;
Judge whether first check value and second check value are identical;
If so, determining that authentication operation passes through;
If it is not, then determining that authentication operation fails.
The application also provides a kind of bluetooth equipment, comprising:
Second authentication operation module, when for receiving the first authentication data of the first bluetooth equipment transmission, according to second Pre-arranged code executes authentication operation to first authentication data;
Second authentication data generation module, for being recognized according to second pre-arranged code when authentication operation passes through Data generation processing is demonstrate,proved, the second authentication data is obtained;
Second authentication data sending module, for second authentication data to be sent to first bluetooth equipment, with When box lunch first bluetooth equipment passes through the authentication operation of second authentication data, carried out with second bluetooth equipment Data transmission.
The application also provides a kind of bluetooth equipment, comprising:
Memory, for storing computer program;
Processor, the step of authentication method as described above is realized when for executing the computer program.
The application also provides a kind of computer readable storage medium, and calculating is stored on the computer readable storage medium The step of machine program, the computer program realizes authentication method as described above when being executed by processor.
The authentication method of a kind of bluetooth equipment provided herein, comprising: the first bluetooth equipment is to the first pre-arranged code Authentication data generation processing is carried out, the first authentication data is obtained;First authentication data is sent to the second bluetooth equipment, with Toilet states the second bluetooth equipment and executes authentication operation to first authentication data according to the second pre-arranged code, when authentication operation is logical Out-of-date, the first bluetooth equipment of Xiang Suoshu sends the second authentication data;When receiving second authentication data, to described second Authentication data executes authentication operation;When authentication operation passes through, carry out data transmission with second bluetooth equipment.
The first authentication data is generated to the first pre-arranged code by the first bluetooth equipment, and is sent to the second bluetooth equipment, So that the second bluetooth equipment judges the first pre-arranged code of the first bluetooth equipment according to first authentication data and this is second default Whether coding is identical, if the same indicates that certification passes through, the first bluetooth equipment carries out data transmission with the second bluetooth equipment.It can See, realize mutual authentication operation between two bluetooth equipments, avoids occurring wrong the case where connecting between two bluetooth equipments, Improve the accuracy of bluetooth equipment connection.
The application also provides authentication method, three kinds of bluetooth equipments and the computer-readable storage medium of another bluetooth equipment Matter has the above beneficial effect, and this will not be repeated here.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart of the authentication method of the first bluetooth equipment provided by the embodiment of the present application;
Fig. 2 is the flow chart of the authentication method of second of bluetooth equipment provided by the embodiment of the present application;
Fig. 3 is the flow chart of the authentication method of the third bluetooth equipment provided by the embodiment of the present application;
Fig. 4 is the flow chart of the authentication method of the 4th kind of bluetooth equipment provided by the embodiment of the present application;
Fig. 5 is a kind of structural schematic diagram of bluetooth equipment provided by the embodiment of the present application;
Fig. 6 is the structural schematic diagram of another kind bluetooth equipment provided by the embodiment of the present application.
Specific embodiment
The core of the application is to provide a kind of authentication method of bluetooth equipment, the authentication method of another bluetooth equipment, three Kind bluetooth equipment and computer readable storage medium send authentication data to the second bluetooth equipment by the first bluetooth equipment, Second bluetooth equipment carries out authentication operation according to authentication data, is attached again when certification passes through, that is, to the second bluetooth Equipment carries out data transmission.Wrong the case where connecting is avoided the occurrence of, the accuracy of connection is improved.
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
The prior art between main side equipment and electronic tag when needing to establish connection, between main side equipment and electronic tag There is no verification process, directly electronic tag is attached.The accuracy pole being attached in the case where not authenticated It is low.It is easy to cause main side equipment to receive mistake to the electronic tag transmission data or electronic tag for being not belonging to its compass of competency Main side send data, cause data transmission fault, electronic tag managerial confusion, material handling mistake.
This application provides a kind of authentication methods of bluetooth equipment, are generated by the first bluetooth equipment to the first pre-arranged code First authentication data, and it is sent to the second bluetooth equipment, so that the second bluetooth equipment judges first according to first authentication data Whether the first pre-arranged code of bluetooth equipment and second pre-arranged code are identical, if the same indicate that certification passes through, and first is blue Tooth equipment carries out data transmission with the second bluetooth equipment.As it can be seen that mutual authentication operation is realized between two bluetooth equipments, It avoids occurring wrong the case where connecting between two bluetooth equipments, improves the accuracy of bluetooth equipment connection.
Referring to FIG. 1, Fig. 1 is the flow chart of the authentication method of the first bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, this method may include:
S101, the first bluetooth equipment carry out authentication data generation processing to the first pre-arranged code, obtain the first authentication data;
This step is intended to carry out authentication data generation processing to the first pre-arranged code, obtains the first authentication data.It is, The process for generating processing by authentication data according to the content of the first pre-arranged code, generates corresponding with the first pre-arranged code first Authentication data.
Wherein, authentication data generates processing and is mainly encoded arbitrary data content according to the first pre-arranged code, obtains Data after to coding, and as authentication data.And a side of authentication data is obtained, appointed according to the second pre-arranged code to same Meaning data content is encoded, compare local coding result and the authentication data that receives in as a result, if coding result It is identical, it may be said that bright the first pre-arranged code used and the second pre-arranged code are identical.As it can be seen that the certification generated in this step Data are exactly and to avoid carrying out pre-arranged code for judging whether respective pre-arranged code is identical in the bluetooth equipment of both ends Plaintext transmission avoids the occurrence of the case where pre-arranged code is trapped, and improves the safety of authentication data.
First authentication data is sent to the second bluetooth equipment by S102, so that the second bluetooth equipment is according to the second default volume Code executes authentication operation to the first authentication data, when authentication operation passes through, sends the second authentication data to the first bluetooth equipment;
On the basis of S101, this step is intended to the first authentication data being sent to the second bluetooth equipment, so as to the second indigo plant Tooth equipment executes authentication operation to the first authentication data according to the second pre-arranged code.It is, according to the second pre-arranged code to Data content in one authentication data carries out coding calculating, obtains coding result.Judge the coding result and the first authentication data In coding result it is whether identical;If so, the first pre-arranged code of explanation and the second pre-arranged code are identical, i.e. expression certifications Operation passes through.
In order to further increase the accuracy of authentication method, when authentication operation passes through, the second bluetooth equipment generates second Authentication data is simultaneously sent to the first bluetooth equipment, i.e. the first bluetooth equipment carries out an authentication operation again, guarantees that the first bluetooth is set The standby accuracy connected between the second bluetooth equipment, the case where avoiding the occurrence of connection error.
S103 executes authentication operation to the second authentication data when receiving the second authentication data;
On the basis of S102, this step is intended to execute authentication operation to the second authentication data received.Wherein, to The authentication operation that two authentication datas execute, with the authentication operation that the second bluetooth equipment executes the first bluetooth equipment in previous step It is similar, it can be not specifically limited herein with reference to the authentication operation in previous step.
S104 carries out data transmission when authentication operation passes through with the second bluetooth equipment.
On the basis of S103, this step is intended to carry out data transmission the second bluetooth equipment when authentication operation passes through, Connection is established with the second bluetooth equipment.
To sum up, the present embodiment generates the first authentication data to the first pre-arranged code by the first bluetooth equipment, and is sent to Second bluetooth equipment, so that the second bluetooth equipment judges according to first authentication data the first pre-arranged code of the first bluetooth equipment It is whether identical with second pre-arranged code, if the same indicate that certification passes through, the first bluetooth equipment and the second bluetooth equipment into The transmission of row data.As it can be seen that realizing mutual authentication operation between two bluetooth equipments, avoid going out between two bluetooth equipments Existing wrong the case where connecting, improve the accuracy of bluetooth equipment connection.
A kind of authentication method of bluetooth equipment provided by the present application is further described below by way of one embodiment.
Referring to FIG. 2, Fig. 2 is the flow chart of the authentication method of second of bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, this method may include:
S201, the first bluetooth equipment carry out random code generation, obtain random code;
S202 carries out coding calculating to random code according to the first pre-arranged code, obtains the first check value;
S203 integrates random code and the first check value, obtains the first authentication data;
As it can be seen that step S201 to step S203 mainly to how to be carried out in the application authentication data generation processing say It is bright.By taking 8 random codes as an example, the first bluetooth equipment firstly generates 8 random codes, then according to the first pre-arranged code to 8 with Machine code carries out coding calculating, obtains the first check value, that is, the first pre-arranged code and 8 random codeds are carried out coding meter It calculates, finally is integrated to obtain the first authentication data by 8 random codes and the first check value.Receive setting for the first authentication data It is standby, so that it may 8 random codes to be encoded using local pre-arranged code, by the in coding result and the first authentication data One check value is compared, if identical, illustrates that the first pre-arranged code is identical with local pre-arranged code, that is, mutual Match, illustrates that certification passes through.As it can be seen that can be authenticated in two Bluetooth terminals by the authentication data generated respectively store it is default Whether whether coding is identical, that is, authenticate and be mutually matched between the two, to there is the case where incorrect link.
Wherein, the method that this step generates random code can be generated using any one random code provided in the prior art Method is not specifically limited herein as long as obtaining the random code for meeting digit.
Optionally, step S203 may include:
Step 1: random code and the first check value are combined into data group;
Step 2: data group is carried out out-of-order processing according to preset rules, the first authentication data is obtained.
As it can be seen that this step is mainly that the data group that random code and the first check value synthesize is carried out out-of-order processing.For example, raw At 8 random codes be 12345678, by coding calculate after the first check value be 45812441, the data group being combined into is i.e. It puts behind for random code is placed on the first check value of front, i.e., 1234567845812441, out-of-order processing finally is carried out to it Result be 1278434562581441.It is envisioned that carrying out the result of out-of-order processing according to the difference of preset rules Can be different, but its result is to upset the data in data group, avoids the content of authentication data from carrying out plaintext transmission, reduces number According to the probability of leakage.
First authentication data is sent to the second bluetooth equipment by S204, so that the second bluetooth equipment is according to the second default volume Code executes authentication operation to the first authentication data, when authentication operation passes through, sends the second authentication data to the first bluetooth equipment;
S205 executes authentication operation to the second authentication data when receiving the second authentication data;
S206 carries out data transmission when authentication operation passes through with the second bluetooth equipment.
Specific implementation process about above-mentioned steps S204 to S206 can refer to the content of previous embodiment, herein no longer into Row repeats.
A kind of authentication method of bluetooth equipment provided by the present application is further described below by way of one embodiment.
Referring to FIG. 3, Fig. 3 is the flow chart of the authentication method of the third bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, this method may include:
S301, the first bluetooth equipment carry out authentication data generation processing to the first pre-arranged code, obtain the first authentication data;
First authentication data is sent to the second bluetooth equipment by S302, so that the second bluetooth equipment is according to the second default volume Code executes authentication operation to the first authentication data, when authentication operation passes through, sends the second authentication data to the first bluetooth equipment;
S303 splits the second authentication data according to preset rules when receiving the second authentication data, obtain with Machine code and the second check value;
S304 carries out coding calculating to random code according to the first pre-arranged code, obtains the first check value;
S305 judges whether the first check value and the second check value are identical;If so, executing S306;If it is not, then executing S307;
S306 determines that authentication operation passes through, carries out data transmission with the second bluetooth equipment;
S307 determines authentication operation failure;
As it can be seen that S303 to S307 step mainly in technical scheme when the first bluetooth equipment receive second indigo plant When the second authentication data that tooth equipment is sent, it is illustrated according to the authentication operation that the second authentication data executes.Wherein, specifically Step is exactly that random code and the second check value are split out from the second authentication data, then using the first pre-arranged code to random code Coding calculating is carried out, the result that coding calculates is compared with the second check value, if the same indicates to determine authentication operation Pass through, that is, the first pre-arranged code of the first bluetooth equipment and the pre-arranged code of the second bluetooth equipment be it is identical, i.e., mutually Matching.
Wherein, the mode that the mode of coding calculating can be calculated with reference to the coding in above-described embodiment is carried out, is not done herein It repeats.
Specific implementation process about above-mentioned steps S301, S302 can refer to the content of previous embodiment, herein no longer into Row repeats.
Above-described embodiment is described using the first bluetooth equipment as executing subject, below by way of one embodiment with Second bluetooth equipment is that a kind of authentication method of bluetooth equipment of execution theme is further described.
Referring to FIG. 4, Fig. 4 is the flow chart of the authentication method of the 4th kind of bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, this method may include:
S401, it is default according to second when the second bluetooth equipment receives the first authentication data of the first bluetooth equipment transmission Coding executes authentication operation to the first authentication data;
This step is intended to when the second bluetooth equipment passively receives the first authentication data, is executed according to the second pre-arranged code Authentication operation.Wherein, performed authentication operation can be with reference to the authentication operation process in above embodiments.
Optionally, the authentication operation in this step may include:
Step 1 splits the first authentication data according to preset rules, obtains when receiving the first authentication data Random code and the first check value;
Step 2 carries out coding calculating to random code according to the second pre-arranged code, obtains the second check value;
Step 3 judges whether the first check value and the second check value are identical;
Step 4, if so, determining that authentication operation passes through;
Step 5, if it is not, then determining that authentication operation fails.
Wherein, the out-of-order preset rules of processing of the progress in the preset rules with previous embodiment of the present embodiment are identical, protect The available identical random code of split process and the first check value are demonstrate,proved.
S402 carries out authentication data generation processing according to the second pre-arranged code, obtains second and recognize when authentication operation passes through Demonstrate,prove data;
Second authentication data is sent to the first bluetooth equipment by S403, so that the first bluetooth equipment is when to the second certification number According to authentication operation pass through when, carry out data transmission with the second bluetooth equipment.
As it can be seen that a kind of authentication method of bluetooth equipment provided in this embodiment, by the second authentication data received Authentication operation is executed, whether pre-arranged code and the local terminal pre-arranged code to determine opposite end bluetooth equipment are identical, if so, mark Certification passes through, and continues to feed back authentication data.After equally authenticating and pass through so as to the first bluetooth equipment, established with the second bluetooth equipment Data are transmitted in connection.
Certification below by way of a more specific embodiment, to a kind of bluetooth equipment provided in technical scheme Method is further described.
In the present embodiment, which is applied in main side equipment and ESL (Electronic Shelf Label electronics Shelf label) communication connection during.
The authentication method may include:
Step 1, verification process of the ESL to main side equipment: main side equipment sends authentication data to ESL according to the rule of agreement Packet, ESL verify data packet, are confirmed whether that certification passes through;
Step 2, verification process of the main side equipment to ESL: ESL certification passes through and then about establishes rules to the transmission of main side equipment Authentication data packet then, main side equipment verify data packet, are confirmed whether that certification passes through;
Step 3, when certification passes through, main side equipment and ESL establish connection.
Wherein, each ESL is preset with the KEY value an of initial default, the pre-arranged code in authentication authorization and accounting method.And in goods Server in frame system records the KEY value for having each ESL.
Therefore, the process for sending authentication data packet includes:
Step 1, the random number N of 8 bytes is obtained;
Step 2,8 byte random numbers of step 1 are calculated with the check value to 8 bytes using preset KEY value coding MIC;
Step 3, the obtained MIC of the N and step 2 of step 1 is merged into data packet (i.e. preceding 8 byte for obtaining 16 bytes It is N, rear 8 byte is MIC);
Step 4, byte random ordering is carried out to 16 byte data packets of step 3;
Step 5, the data packet after step 4 random ordering is sent.
Further, process authentication data packet verified, that is, execute authentication operation process include:
Step 1, byte order adjustment is carried out to the data packet that receives, revert to normal data packet (preceding 8 byte is N, 8 bytes are MIC afterwards);
Step 2, coding calculating is carried out to preceding 8 byte random code N using preset KEY value, obtains check value MIC_2;
Step 3, judge MIC and MIC_2, if identical, certification passes through, the authentification failure if different;
In addition, avoiding rogue device from being attached with main side equipment or ESL to improve the safety of commodity shelf system.It can To carry out dynamic update to KEY value according to predetermined period after connection certification passes through.
As it can be seen that the present embodiment generates the first authentication data to the first pre-arranged code by main side equipment, and it is sent to ESL, So that ESL judges whether the first pre-arranged code of main side equipment and second pre-arranged code are identical according to first authentication data, If the same indicate that certification passes through, main side equipment carries out data transmission with ESL.As it can be seen that being realized between two bluetooth equipments Mutual authentication operation, avoid occurring between two bluetooth equipments it is wrong even the case where, improve the accuracy of bluetooth equipment connection.
A kind of bluetooth equipment provided by the embodiments of the present application is introduced below, a kind of bluetooth equipment described below with A kind of authentication method of above-described bluetooth equipment can correspond to each other reference.
Referring to FIG. 5, Fig. 5 is a kind of structural schematic diagram of bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, which may include:
First authentication data generation module 110 obtains for carrying out authentication data generation processing to the first pre-arranged code One authentication data;
First authentication data sending module 120, for the first authentication data to be sent to the second bluetooth equipment, so as to second Bluetooth equipment executes authentication operation to the first authentication data according to the second pre-arranged code, when authentication operation passes through, to the first indigo plant Tooth equipment sends the second authentication data;
First authentication operation module 130, for executing certification to the second authentication data when receiving the second authentication data Operation;
Data transmission module 140, for carrying out data transmission with the second bluetooth equipment when authentication operation passes through.
A kind of bluetooth equipment provided by the embodiments of the present application is introduced below, a kind of bluetooth equipment described below with A kind of authentication method of above-described bluetooth equipment can correspond to each other reference.
Referring to FIG. 6, Fig. 6 is the structural schematic diagram of another kind bluetooth equipment provided by the embodiment of the present application.
In the present embodiment, which may include:
Second authentication operation module 210, when for receiving the first authentication data of the first bluetooth equipment transmission, according to the Two pre-arranged codes execute authentication operation to the first authentication data;
Second authentication data generation module 220, for being authenticated according to the second pre-arranged code when authentication operation passes through Data generation processing, obtains the second authentication data;
Second authentication data sending module 230, for the second authentication data to be sent to the first bluetooth equipment, so as to first Bluetooth equipment carries out data transmission when the authentication operation to the second authentication data passes through with the second bluetooth equipment.
The embodiment of the present application also provides a kind of bluetooth equipment, comprising:
Memory, for storing computer program;
Processor, when for executing computer program the step of the realization such as authentication method of above embodiments.
The embodiment of the present application also provides a kind of computer readable storage medium, stores on the computer readable storage medium There is computer program, the computer program realizes the step of authentication method as described above in Example when being executed by processor Suddenly.
The computer readable storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-OnlyMemory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. are various can store program The medium of code.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Above to the authentication method of a kind of authentication method of bluetooth equipment provided herein, another bluetooth equipment, Three kinds of bluetooth equipments and computer readable storage medium are described in detail.Specific case used herein is to the application Principle and embodiment be expounded, the present processes that the above embodiments are only used to help understand and its core Thought is thought.It should be pointed out that for those skilled in the art, under the premise of not departing from the application principle, Can also to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the protection scope of the claim of this application It is interior.

Claims (10)

1. a kind of authentication method of bluetooth equipment characterized by comprising
First bluetooth equipment carries out authentication data generation processing to the first pre-arranged code, obtains the first authentication data;
First authentication data is sent to the second bluetooth equipment, so that second bluetooth equipment is according to the second pre-arranged code Authentication operation is executed to first authentication data, when authentication operation passes through, the first bluetooth equipment of Xiang Suoshu, which sends second, to be recognized Demonstrate,prove data;
When receiving second authentication data, authentication operation is executed to second authentication data;
When authentication operation passes through, carry out data transmission with second bluetooth equipment.
2. authentication method according to claim 1, which is characterized in that the first bluetooth equipment recognizes the first pre-arranged code Data generation processing is demonstrate,proved, the first authentication data is obtained, comprising:
First bluetooth equipment carries out random code generation, obtains random code;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the first check value;
The random code and first check value are integrated, first authentication data is obtained.
3. authentication method according to claim 2, which is characterized in that carried out to the random code and first check value Integration, obtains first authentication data, comprising:
The random code and first check value are combined into data group;
The data group is subjected to out-of-order processing according to preset rules, obtains first authentication data.
4. authentication method according to claim 3, which is characterized in that when receiving second authentication data, to institute It states the second authentication data and executes authentication operation, comprising:
When receiving second authentication data, second authentication data is split according to the preset rules, is obtained To the random code and second check value;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the first check value;
Judge whether first check value and second check value are identical;
If so, determining that authentication operation passes through;
If it is not, then determining that authentication operation fails.
5. a kind of bluetooth equipment characterized by comprising
First authentication data generation module obtains the first certification for carrying out authentication data generation processing to the first pre-arranged code Data;
First authentication data sending module, for first authentication data to be sent to the second bluetooth equipment, so as to described Two bluetooth equipments execute authentication operation to first authentication data according to the second pre-arranged code, when authentication operation passes through, to First bluetooth equipment sends the second authentication data;
First authentication operation module, for recognizing second authentication data execution when receiving second authentication data Card operation;
Data transmission module, for carrying out data transmission with second bluetooth equipment when authentication operation passes through.
6. a kind of authentication method of bluetooth equipment characterized by comprising
When second bluetooth equipment receives the first authentication data of the first bluetooth equipment transmission, according to the second pre-arranged code to described First authentication data executes authentication operation;
When authentication operation passes through, authentication data generation processing is carried out according to second pre-arranged code, obtains the second certification number According to;
Second authentication data is sent to first bluetooth equipment, so as to when first bluetooth equipment is to described second When the authentication operation of authentication data passes through, carry out data transmission with second bluetooth equipment.
7. authentication method according to claim 6, which is characterized in that the second bluetooth equipment receives the first bluetooth equipment hair When the first authentication data sent, authentication operation is executed to first authentication data according to the second pre-arranged code, comprising:
When receiving first authentication data, first authentication data is split according to preset rules, obtains institute State random code and first check value;
Coding calculating is carried out to the random code according to first pre-arranged code, obtains the second check value;
Judge whether first check value and second check value are identical;
If so, determining that authentication operation passes through;
If it is not, then determining that authentication operation fails.
8. a kind of bluetooth equipment characterized by comprising
Second authentication operation module, it is default according to second when for receiving the first authentication data of the first bluetooth equipment transmission Coding executes authentication operation to first authentication data;
Second authentication data generation module, for carrying out certification number according to second pre-arranged code when authentication operation passes through It is handled according to generation, obtains the second authentication data;
Second authentication data sending module, for second authentication data to be sent to first bluetooth equipment, to work as When first bluetooth equipment passes through the authentication operation of second authentication data, data are carried out with second bluetooth equipment Transmission.
9. a kind of bluetooth equipment characterized by comprising
Memory, for storing computer program;
Processor realizes the step such as the described in any item authentication methods of Claims 1-4 when for executing the computer program The step of authentication method described in rapid and/or claim 6 or 7.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program is realized when the computer program is executed by processor such as the step of Claims 1-4 described in any item authentication methods And/or the step of authentication method described in claim 6 or 7.
CN201910435058.1A 2019-05-23 2019-05-23 A kind of authentication method and relevant apparatus of bluetooth equipment Pending CN110049480A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910435058.1A CN110049480A (en) 2019-05-23 2019-05-23 A kind of authentication method and relevant apparatus of bluetooth equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910435058.1A CN110049480A (en) 2019-05-23 2019-05-23 A kind of authentication method and relevant apparatus of bluetooth equipment

Publications (1)

Publication Number Publication Date
CN110049480A true CN110049480A (en) 2019-07-23

Family

ID=67283432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910435058.1A Pending CN110049480A (en) 2019-05-23 2019-05-23 A kind of authentication method and relevant apparatus of bluetooth equipment

Country Status (1)

Country Link
CN (1) CN110049480A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110944312A (en) * 2019-11-14 2020-03-31 合肥星空物联信息科技有限公司 Method for performing dual-mode Bluetooth pairing by using audio data and Bluetooth device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916852A (en) * 2012-12-28 2014-07-09 联想(北京)有限公司 Data transmission method and mobile terminal
CN105357769A (en) * 2015-11-23 2016-02-24 王家城 Random access and safety control of wireless SIM card transmission protocol
CN107969001A (en) * 2018-01-17 2018-04-27 飞天诚信科技股份有限公司 A kind of method and device of Bluetooth pairing two-way authentication
CN108243481A (en) * 2018-01-19 2018-07-03 腾讯科技(深圳)有限公司 Document transmission method and device
CN109462846A (en) * 2018-12-27 2019-03-12 飞天诚信科技股份有限公司 A kind of method, system and bluetooth equipment realizing bluetooth equipment and matching safely

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916852A (en) * 2012-12-28 2014-07-09 联想(北京)有限公司 Data transmission method and mobile terminal
CN105357769A (en) * 2015-11-23 2016-02-24 王家城 Random access and safety control of wireless SIM card transmission protocol
CN107969001A (en) * 2018-01-17 2018-04-27 飞天诚信科技股份有限公司 A kind of method and device of Bluetooth pairing two-way authentication
CN108243481A (en) * 2018-01-19 2018-07-03 腾讯科技(深圳)有限公司 Document transmission method and device
CN109462846A (en) * 2018-12-27 2019-03-12 飞天诚信科技股份有限公司 A kind of method, system and bluetooth equipment realizing bluetooth equipment and matching safely

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110944312A (en) * 2019-11-14 2020-03-31 合肥星空物联信息科技有限公司 Method for performing dual-mode Bluetooth pairing by using audio data and Bluetooth device
CN110944312B (en) * 2019-11-14 2023-08-25 合肥星空物联信息科技有限公司 Method for carrying out dual-mode Bluetooth pairing by utilizing audio data and Bluetooth device

Similar Documents

Publication Publication Date Title
CN109741056B (en) Method and device for uploading electronic certificate
CN107294738B (en) The treating method and apparatus of communication charge
CN104765999B (en) Method, terminal and server for processing user resource information
CN105306490B (en) Payment verifying system, method and device
CN101252435B (en) Method for realizing dynamic password generation and judge on smart card
US20150207790A1 (en) Method and system for generating and authorizing dynamic password
CN106503589A (en) The method of calibration of block chain Transaction Information correctness, apparatus and system
CN105721149B (en) A kind of car networking system session key generates and the method for car-mounted terminal and ECU binding
CN102523095B (en) User digital certificate remote update method with intelligent card protection function
CN104796257A (en) Flexible data authentication
CN108234385A (en) A kind of method for authenticating user identity and device
CN106411950A (en) Block-chain transaction ID based authentication method, device and system
CN108011719A (en) A kind of endorsement method, device and digital signature system
CN107564175A (en) One kind moves back chucking method, moves back card terminal, mobile network operating side and reimbursement terminal
CN101567073A (en) Method, device and system for realizing batch electronic transaction
CN110445792A (en) Verification code generation method, verifying code verification method and identifying code login system
CN108900311A (en) A kind of no certificate bluetooth key endorsement method and system
CN102883323B (en) A kind of method and apparatus of protection mobile terminal user's private data
CN105320873B (en) A kind of unlocking method of terminal applies, device, terminal and SIM card
Radu et al. Practical EMV relay protection
CN108600184A (en) A kind of equipment authentication method of embedded chip certificate
CN103530768A (en) Mobile communication payment system and cost payment method thereof
CN105635164B (en) The method and apparatus of safety certification
CN107506207A (en) The safe verification method and terminal of a kind of POS
CN102231667B (en) Method and device for registering serial device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190723

RJ01 Rejection of invention patent application after publication