CN111405537A - Bidirectional security authentication method based on ble connection, system and equipment thereof - Google Patents

Bidirectional security authentication method based on ble connection, system and equipment thereof Download PDF

Info

Publication number
CN111405537A
CN111405537A CN202010206358.5A CN202010206358A CN111405537A CN 111405537 A CN111405537 A CN 111405537A CN 202010206358 A CN202010206358 A CN 202010206358A CN 111405537 A CN111405537 A CN 111405537A
Authority
CN
China
Prior art keywords
ble
signature information
signature
information
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010206358.5A
Other languages
Chinese (zh)
Inventor
徐宏
李涛
高永会
苏钉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tuya Information Technology Co Ltd
Original Assignee
Hangzhou Tuya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tuya Information Technology Co Ltd filed Critical Hangzhou Tuya Information Technology Co Ltd
Priority to CN202010206358.5A priority Critical patent/CN111405537A/en
Publication of CN111405537A publication Critical patent/CN111405537A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention relates to a bidirectional security authentication method, which is used for establishing a ble link between a client and a ble terminal and setting authentication time limit of the bidirectional security authentication method, and comprises the following steps: sending an authentication request to the ble terminal and returning the signature verification information; performing hash value operation on the signature checking information according to a preset algorithm to obtain first signature information; sending first signature information to the ble terminal, and returning second signature information after the first signature information is successfully verified by the ble terminal; performing hash value operation on the first signature information according to a preset algorithm to obtain a calculation result; comparing the second signature information with the calculation result to obtain a comparison result; if the first signature information and the second signature information are the same, performing hash value operation on the first signature information and the second signature information according to a preset algorithm to obtain a session key; and encrypting the transmission data in the ble link according to the session key. By the technical scheme of the invention, the safety of communication in the ble link can be effectively improved.

Description

Bidirectional security authentication method based on ble connection, system and equipment thereof
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a bidirectional security authentication method based on ble connection, a system thereof, a computer-readable storage medium, and a computer device.
Background
However, many products are considered to be insufficient in a security scheme, and have more or less vulnerabilities, and typically include non-secret, unknown pseudo-random number strength, no user authentication, no end-to-end security execution, and some even plaintext communication based, so that a machine for eavesdropping, MIMT attack and message tampering is provided for lawless persons.
As more and more security vulnerabilities issue emerge, people are increasingly paying attention to this block of security. Especially, terminals such as intelligent bracelet, intelligent lock that have been on fire in recent years, it is very important to promote the security of terminal product.
However, for a general small-sized B L E terminal, the manufacturer has insufficient design experience in the safety scheme, and may have certain design holes, and moreover, the selected MCU processing capability and performance cannot run more complex encryption algorithms, such as algorithms of asymmetric algorithms RSA, ECC, ECDH password exchange and the like.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art or the related art.
Therefore, the present invention aims to provide a bi-directional security authentication method based on ble connection, which can make the two parties to connect to each other to clarify the identity of the other party before a secure communication link is established between a ble terminal and a mobile phone APP end, and make the two parties to communicate to clarify a subsequent symmetrically encrypted session key after a bi-directional authentication process.
In order to achieve the above object, a technical solution of a first aspect of the present invention provides a bidirectional security authentication method based on ble connection, which is used for establishing a ble link between a client and a ble terminal and setting an authentication time limit of the bidirectional security authentication method, where the bidirectional security authentication method includes the following steps:
sending an authentication request to the ble terminal and returning the signature verification information;
performing hash value operation on the signature checking information according to a preset algorithm to obtain first signature information;
sending first signature information to the ble terminal, and returning second signature information after the first signature information is successfully verified by the ble terminal;
performing hash value operation on the first signature information according to a preset algorithm to obtain a calculation result;
comparing the second signature information with the calculation result to obtain a comparison result;
if the first signature information and the second signature information are the same, performing hash value operation on the first signature information and the second signature information according to a preset algorithm to obtain a session key;
and encrypting the transmission data in the ble link according to the session key.
In the foregoing technical solution, preferably, returning the second signature information after the ble terminal successfully verifies the first signature information, includes the following steps:
the ble terminal performs hash value operation on the signature verification information according to a preset algorithm to obtain ble signature information;
comparing the ble signature information with the first signature information;
if so, ble signature information is used as the first signature information.
The technical solution of the second aspect of the present invention provides a ble connection-based bidirectional security authentication system, which is used for establishing a ble link with a ble terminal and setting an authentication time limit of the bidirectional security authentication system, and the bidirectional security authentication system includes:
the authentication request module is set to be used for sending an authentication request to the ble terminal and returning the signature verification information;
the signature verification calculation module is used for carrying out hash value operation on the signature verification information according to a preset algorithm to obtain first signature information;
the sending module is configured to send the first signature information to the ble terminal, and return the second signature information after the first signature information is successfully verified by the ble terminal;
the signature calculation module is arranged for carrying out hash value operation on the first signature information according to a preset algorithm to obtain a calculation result;
the comparison module is arranged for comparing the second signature information with the calculation result to obtain a comparison result;
the session key calculation module is configured to perform hash value operation on the first signature information and the second signature information according to a preset algorithm to obtain a session key;
and the encryption module is configured to encrypt the transmission data in the ble link according to the session key.
In the above technical solution, preferably, the ble terminal includes:
the ble signature module is configured to perform hash value operation on the signature verification information according to a preset algorithm to obtain ble signature information;
the ble signature comparison module is arranged for comparing the first signature information with the ble signature information; if so, ble signature information is used as the first signature information.
In any of the above technical solutions, preferably, the preset algorithm is an HMAC-SHA1 algorithm.
In any of the above technical solutions, preferably, the signature verification information includes a random number, an encrypted identifier, and a plaintext; the authentication time limit is 5s-10 s.
An embodiment of the third aspect of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the bi-directional secure authentication method based on ble connection provided in any of the above-mentioned embodiments of the first aspect.
The technical scheme of the fourth aspect of the invention provides computer equipment, which comprises a storage medium and a processor; a storage medium for storing a computer program; a processor, configured to execute a computer program to implement the steps of the bi-directional secure authentication method based on ble connection provided in any technical solution of the first aspect.
Compared with the prior art, the bidirectional security authentication method based on ble connection, the system thereof, the computer readable storage medium and the computer device provided by the invention have the advantages that: before a secure communication link is established between a ble terminal and a mobile phone APP terminal, the two parties are connected to make the identity of the other party clear, and after a bidirectional authentication process, the two parties make a session key for subsequent symmetric encryption clear, so that the communication security on the ble link is improved.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 illustrates a block flow diagram of a method of two-way secure authentication according to an embodiment of the present invention;
fig. 2 shows a block diagram of a processing flow of a ble terminal according to an embodiment of the present invention;
fig. 3 is a block diagram showing a bidirectional secure authentication system according to another embodiment of the present invention;
fig. 4 shows a block diagram of a ble terminal according to an embodiment of the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
A method of bi-directional secure authentication based on ble connection, a system thereof, a computer-readable storage medium, and a computer device according to some embodiments of the present invention are described below with reference to fig. 1 to 4.
As shown in fig. 1, the bidirectional security authentication method based on ble connection according to an embodiment of the present invention is used for establishing a ble link between a client and a ble terminal, and setting an authentication time limit of the bidirectional security authentication method, and after both communication parties establish the ble connection, an authentication window period is set for 10 seconds, and if the authentication method is not completed within the window period, the ble terminal actively disconnects the current connection.
The bidirectional security authentication method comprises the following steps:
s1, sending an authentication request to the ble terminal and returning the signature verification information;
in this step, the client initiates an authentication request, and the ble terminal sends information requiring an opposite-end signature after receiving the request, that is: the signature verification information includes: random number, and signature verification plaintext (hereinafter abbreviated as pa).
S2, performing hash value operation on the signature checking information according to a preset algorithm to obtain first signature information;
in the step, after the opposite end receives the signature verification information, the hmac-sha1(auth _ key, pa) is called to calculate a hash value (first signature information is called hash1 for short), and the signature hash1+ information of the opposite end, namely the first signature information pb, is sent to the device end.
S3, sending the first signature information to the ble terminal, and returning the second signature information after the first signature information is successfully verified by the ble terminal;
in this step, the ble terminal receives the response message and then compares the response message with the hash result computed by itself. If the comparison result is not expected, the flow is immediately terminated and the current connection is disconnected; if the result is expected, the hmac-sha1(auth _ key, pb) is called to operate the hash value (i.e. the second signature information is called hash2), and then the signature hash2 is sent to the opposite end.
S4, performing hash value operation on the first signature information according to a preset algorithm to obtain a calculation result;
in this step, the client compares the hash2 with the hash result of its own operation. If the comparison result is not expected, the equipment is considered to be illegal/unregistered, and the current connection is released; if the result is expected, the subsequent process of computing the session key is executed.
S5, comparing the second signature information with the calculation result to obtain a comparison result;
if the first signature information and the second signature information are the same, S6, performing hash value operation on the first signature information and the second signature information according to a preset algorithm to obtain a session key;
s7, encrypt the transmission data in the ble link according to the session key.
In this embodiment, both parties have hash1 and hash2 values, and call the algorithm hash _ sha1(auth _ key, trunate (hash1^ hash2)) to calculate the session key session _ key. And the subsequent data communication of both sides adopts AES _ CBC (session _ key, data) encryption and decryption to ensure that the transmission data in the link are all ciphertexts.
As shown in fig. 2, in some possible embodiments of the present invention, returning the second signature information after the ble terminal successfully verifies the first signature information includes the following steps:
s31, the ble terminal performs hash value operation on the verification information according to a preset algorithm to obtain ble signature information;
s32, comparing the ble signature information with the first signature information; if so, ble signature information is used as the first signature information.
As shown in fig. 3, the bidirectional security authentication system 100 based on ble connection according to another embodiment of the present invention is configured to establish a ble link with a ble terminal 200 and set an authentication time limit of the bidirectional security authentication system, where the bidirectional security authentication system 100 includes:
the authentication request module 102 is configured to send an authentication request to the ble terminal and return signature verification information;
the signature verification calculation module 104 is configured to perform hash value operation on the signature verification information according to a preset algorithm to obtain first signature information;
the sending module 106 is configured to send the first signature information to the ble terminal, and return the second signature information after the first signature information is successfully verified by the ble terminal;
the signature calculation module 108 is configured to perform a hash value operation on the first signature information according to a preset algorithm to obtain a calculation result;
a comparison module 110 configured to compare the second signature information with the calculation result to obtain a comparison result;
the session key calculation module 112 is configured to perform hash value operation on the first signature information and the second signature information according to a preset algorithm to obtain a session key;
and an encryption module 114 configured to encrypt the transmission data in the ble link according to the session key.
In other possible embodiments of the present invention, ble terminal 200 includes:
the ble signature module 202 is configured to perform hash value operation on the signature verification information according to a preset algorithm to obtain ble signature information;
a ble signature comparison module 204 configured to compare the ble signature information with the first signature information; if so, ble signature information is used as the first signature information.
In any of the above embodiments, preferably, the preset algorithm is the HMAC-SHA1 algorithm.
In this embodiment, HMAC-SHA1 is a keyed hash algorithm constructed from the SHA1 hash function, used as an HMAC (hash-based message authentication code). The HMAC process mixes the key with the message data, performs hash calculation on the mixing result using a hash function, mixes the resulting hash value with the key, and then applies the hash function again.
SHA-1 (secure hash algorithm, also known as SHS, secure hash standard) is a cryptographic hash algorithm issued by the united states government that will generate a 160-bit hash value from a string of characters of arbitrary length. HMAC-SHA1 is used as a standard algorithm, and the specific operation process of the algorithm is not described in detail in the invention.
The HMAC algorithm is a message integrity verification method based on a secret key, and the safety of the HMAC algorithm is established on the basis of a Hash encryption algorithm. It requires both communication parties to share secret key, contract algorithm, and carry out Hash operation to message, forming fixed length authentication code. And the two communication parties determine the legality of the message through the verification of the authentication code. The HMAC is a Hash-based Message Authentication Code (Hash-based Message Authentication Code) related to a key, and the HMAC uses a Hash algorithm to generate a Message digest as an output by taking a key and a Message as inputs.
The HMAC may be used to determine whether a message sent over an unsecured channel has been tampered with, provided that the sender and receiver share a secret key. The sender calculates the hash value of the original data and puts the original data and the hash value in one message for simultaneous transmission. The recipient recalculates the hash value of the received message and checks if the calculated HMAC matches the transmitted HMAC. Because a key is required to change the message and regenerate the correct hash value, any change to the data or hash value will result in a mismatch. Thus, if the original hash value matches the calculated hash value, the message passes authentication.
In any of the above embodiments, preferably, the signature verification information includes a random number, an encrypted identifier, and a plaintext; the authentication time limit is 5s-10 s.
Based on the methods shown in fig. 1 and fig. 2, correspondingly, the present application further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps of the bidirectional secure authentication based on ble connection in any of the embodiments described above are implemented.
Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method of the embodiments of the present application.
In order to achieve the above object, based on the method shown in fig. 1 and fig. 2 and the virtual device embodiment shown in fig. 3 and fig. 4, the present application further provides a computer device, including a storage medium and a processor; a storage medium for storing a computer program; a processor for executing a computer program to implement the steps of bi-directional secure authentication based on ble connection of any of the above embodiments.
Optionally, the computer device may also include a user interface, a network interface, a camera, Radio Frequency (RF) circuitry, sensors, audio circuitry, a WI-FI module, and so forth. The user interface may include a Display screen (Display), an input unit such as a keypad (Keyboard), etc., and the optional user interface may also include a USB interface, a card reader interface, etc. The network interface may optionally include a standard wired interface, a wireless interface (e.g., a bluetooth interface, WI-FI interface), etc.
It will be appreciated by those skilled in the art that the present embodiment provides a computer device architecture that is not limiting of the computer device, and that may include more or fewer components, or some components in combination, or a different arrangement of components.
The storage medium may further include an operating system and a network communication module. An operating system is a program that manages and maintains the hardware and software resources of a computer device, supporting the operation of information handling programs, as well as other software and/or programs. The network communication module is used for realizing communication among components in the storage medium and other hardware and software in the entity device.
Compared with the prior art, the bidirectional security authentication method based on ble connection, the system thereof, the computer readable storage medium and the computer device provided by the invention have the advantages that: before a secure communication link is established between a ble terminal and a mobile phone APP terminal, the two parties are connected to make the identity of the other party clear, and after a bidirectional authentication process, the two parties make a session key for subsequent symmetric encryption clear, so that the communication security on the ble link is improved.
In the present invention, the terms "first", "second", and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance; the term "plurality" means two or more unless expressly limited otherwise. The terms "mounted," "connected," "fixed," and the like are to be construed broadly, and for example, "connected" may be a fixed connection, a removable connection, or an integral connection; "coupled" may be direct or indirect through an intermediary. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "left", "right", "front", "rear", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of description and simplification of description, but do not indicate or imply that the referred device or unit must have a specific direction, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention.
In the description herein, the description of the terms "one embodiment," "some embodiments," "specific embodiments," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A bidirectional security authentication method based on ble connection is characterized in that the method is used for establishing a ble link between a client and a ble terminal and setting authentication time limit of the bidirectional security authentication method, and the bidirectional security authentication method comprises the following steps:
sending an authentication request to the ble terminal and returning label checking information;
performing hash value operation on the signature verification information according to a preset algorithm to obtain first signature information;
sending the first signature information to the ble terminal, and returning second signature information after the first signature information is successfully verified by the ble terminal;
performing hash value operation on the first signature information according to the preset algorithm to obtain a calculation result;
comparing the second signature information with the calculation result to obtain a comparison result;
if the first signature information and the second signature information are the same, performing hash value operation on the first signature information and the second signature information according to a preset algorithm to obtain a session key;
and encrypting the transmission data in the ble link according to the session key.
2. The method for bidirectional security authentication based on ble connection according to claim 1, wherein the ble terminal returns second signature information after the first signature information is successfully verified, comprising the following steps:
the ble terminal performs hash value operation on the signature verification information according to the preset algorithm to obtain ble signature information;
comparing the ble signature information with the first signature information;
and if so, the ble signature information is used as the first signature information.
3. The bi-directional secure authentication method based on ble connection according to claim 1 or 2, wherein: the preset algorithm is an HMAC-SHA1 algorithm.
4. The bi-directional secure authentication method based on ble connection according to claim 1 or 2, wherein: the signature verification information comprises a random number, an encryption identifier and a plaintext;
the authentication time limit is 5s-10 s.
5. A bidirectional security authentication system based on ble connection is characterized in that the system is used for establishing a ble link with a ble terminal and setting authentication time limit of the bidirectional security authentication system, and the bidirectional security authentication system comprises:
the authentication request module is configured to send an authentication request to the ble terminal and return signature verification information;
the signature verification calculation module is used for carrying out hash value operation on the signature verification information according to a preset algorithm to obtain first signature information;
a sending module, configured to send the first signature information to the ble terminal, and return second signature information after the ble terminal successfully verifies the first signature information;
the signature calculation module is arranged for carrying out hash value operation on the first signature information according to the preset algorithm to obtain a calculation result;
the comparison module is arranged for comparing the second signature information with the calculation result to obtain a comparison result;
the session key calculation module is configured to perform hash value operation on the first signature information and the second signature information according to a preset algorithm to obtain a session key;
and the encryption module is configured to encrypt the transmission data in the ble link according to the session key.
6. The bi-directional secure authentication system based on ble connection of claim 5, wherein the ble terminal comprises:
the ble signature module is configured to perform hash value operation on the signature verification information according to the preset algorithm to obtain ble signature information;
a ble signature comparison module configured to compare the ble signature information with the first signature information; and if so, the ble signature information is used as the first signature information.
7. The bi-directional secure authentication system based on ble connection according to claim 5 or 6, wherein: the preset algorithm is an HMAC-SHA1 algorithm.
8. The bi-directional secure authentication system based on ble connection according to claim 5 or 6, wherein: the signature verification information comprises a random number, an encrypted identifier and a plaintext.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the bi-directional secure authentication method based on ble connection according to any one of claims 1 to 4.
10. A computer device comprising a storage medium and a processor; a storage medium for storing a computer program; a processor for executing a computer program to implement the steps of the bi-directional secure authentication method based on ble connection according to any one of claims 1 to 4.
CN202010206358.5A 2020-03-23 2020-03-23 Bidirectional security authentication method based on ble connection, system and equipment thereof Pending CN111405537A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010206358.5A CN111405537A (en) 2020-03-23 2020-03-23 Bidirectional security authentication method based on ble connection, system and equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010206358.5A CN111405537A (en) 2020-03-23 2020-03-23 Bidirectional security authentication method based on ble connection, system and equipment thereof

Publications (1)

Publication Number Publication Date
CN111405537A true CN111405537A (en) 2020-07-10

Family

ID=71413980

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010206358.5A Pending CN111405537A (en) 2020-03-23 2020-03-23 Bidirectional security authentication method based on ble connection, system and equipment thereof

Country Status (1)

Country Link
CN (1) CN111405537A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113194465A (en) * 2021-04-20 2021-07-30 歌尔股份有限公司 BLE connection verification method and device between terminals and readable storage medium
CN114697956A (en) * 2022-01-26 2022-07-01 深圳市三诺数字科技有限公司 Secure communication method based on double links and related equipment thereof
WO2023103425A1 (en) * 2021-12-10 2023-06-15 青岛海尔科技有限公司 Communicative connection method, system, and apparatus, storage medium, and processor

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107302541A (en) * 2017-07-31 2017-10-27 成都蓝码科技发展有限公司 A kind of data encryption and transmission method based on http protocol
CN108683674A (en) * 2018-05-22 2018-10-19 深圳中泰智丰物联网科技有限公司 Verification method, device, terminal and the computer readable storage medium of door lock communication
CN109067549A (en) * 2018-09-21 2018-12-21 北京仁信证科技有限公司 Virtual key two-way authentication system and method
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK
CN110380852A (en) * 2019-07-22 2019-10-25 中国联合网络通信集团有限公司 Mutual authentication method and communication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107302541A (en) * 2017-07-31 2017-10-27 成都蓝码科技发展有限公司 A kind of data encryption and transmission method based on http protocol
CN108683674A (en) * 2018-05-22 2018-10-19 深圳中泰智丰物联网科技有限公司 Verification method, device, terminal and the computer readable storage medium of door lock communication
CN109067549A (en) * 2018-09-21 2018-12-21 北京仁信证科技有限公司 Virtual key two-way authentication system and method
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK
CN110380852A (en) * 2019-07-22 2019-10-25 中国联合网络通信集团有限公司 Mutual authentication method and communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周伟伟等: "ZigBee节点多因子身份认证方案研究", 《系统仿真学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113194465A (en) * 2021-04-20 2021-07-30 歌尔股份有限公司 BLE connection verification method and device between terminals and readable storage medium
CN113194465B (en) * 2021-04-20 2023-11-24 歌尔股份有限公司 BLE connection verification method and device between terminals and readable storage medium
WO2023103425A1 (en) * 2021-12-10 2023-06-15 青岛海尔科技有限公司 Communicative connection method, system, and apparatus, storage medium, and processor
CN114697956A (en) * 2022-01-26 2022-07-01 深圳市三诺数字科技有限公司 Secure communication method based on double links and related equipment thereof

Similar Documents

Publication Publication Date Title
KR100983050B1 (en) System, method and computer program product for authenticating a data agreement between network entities
US8644515B2 (en) Display authenticated security association
KR101095239B1 (en) Secure communications
US7120422B2 (en) Method, element and system for securing communication between two parties
US20020164026A1 (en) An authentication method
US20050076216A1 (en) Method for securing a communication
CN110020524B (en) Bidirectional authentication method based on smart card
CN113067828A (en) Message processing method and device, server, computer equipment and storage medium
CN111404664B (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN109688098B (en) Method, device and equipment for secure communication of data and computer readable storage medium
CN111405537A (en) Bidirectional security authentication method based on ble connection, system and equipment thereof
CN114143117B (en) Data processing method and device
CN112565205B (en) Credible authentication and measurement method, server, terminal and readable storage medium
CN111914291A (en) Message processing method, device, equipment and storage medium
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN112566119A (en) Terminal authentication method and device, computer equipment and storage medium
CN115378587A (en) Key acquisition method, device, equipment and readable storage medium
WO2022135391A1 (en) Identity authentication method and apparatus, and storage medium, program and program product
KR101014849B1 (en) Method for mutual authenticating and key exchanging to Public Key without trusted third party and apparatus thereof
Dowling et al. There can be no compromise: The necessity of ratcheted authentication in secure messaging
WO2018047132A1 (en) A system and method for authentication and secure communication
CN111064577A (en) Security authentication method and device and electronic equipment
Shojaie et al. Enhancing EAP-TLS authentication protocol for IEEE 802.11 i
WO2008004174A2 (en) Establishing a secure authenticated channel
Al-Bakri et al. A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination