CN111918263A - Bluetooth connection method and device and Internet of things equipment - Google Patents

Bluetooth connection method and device and Internet of things equipment Download PDF

Info

Publication number
CN111918263A
CN111918263A CN202010827256.5A CN202010827256A CN111918263A CN 111918263 A CN111918263 A CN 111918263A CN 202010827256 A CN202010827256 A CN 202010827256A CN 111918263 A CN111918263 A CN 111918263A
Authority
CN
China
Prior art keywords
equipment
target
authorization
target equipment
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010827256.5A
Other languages
Chinese (zh)
Other versions
CN111918263B (en
Inventor
李光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aux Air Conditioning Co Ltd
Ningbo Aux Electric Co Ltd
Original Assignee
Aux Air Conditioning Co Ltd
Ningbo Aux Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aux Air Conditioning Co Ltd, Ningbo Aux Electric Co Ltd filed Critical Aux Air Conditioning Co Ltd
Priority to CN202010827256.5A priority Critical patent/CN111918263B/en
Publication of CN111918263A publication Critical patent/CN111918263A/en
Application granted granted Critical
Publication of CN111918263B publication Critical patent/CN111918263B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application discloses a Bluetooth connection method, a Bluetooth connection device and Internet of things equipment, wherein the method comprises the following steps: acquiring a pre-stored authorization information table, wherein the authorization information table comprises an identity of an authorized device and verification information of the authorized device; determining target equipment, wherein the target equipment is equipment with the identity identifier same as the identity identifier of authorized equipment in an authorization information table in the environment where the Internet of things equipment is located; acquiring verification information of the target equipment; determining verification information corresponding to the target equipment from the authorization information table according to the identity of the target equipment; performing connection authority verification according to the verification information of the target equipment and verification information corresponding to the target equipment; and if the connection authority is verified successfully, establishing Bluetooth connection with the target equipment. The scheme that this application provided can improve the security of thing networking device.

Description

Bluetooth connection method and device and Internet of things equipment
Technical Field
The invention relates to the technical field of Internet of things, in particular to a Bluetooth connection method and device and Internet of things equipment.
Background
With the development of intelligent control technology, the application of the internet of things equipment is more and more extensive. For the internet of things device, a commonly used control mode is bluetooth control, and in the bluetooth control mode, the internet of things device and the device for control need to be paired first. Currently, when bluetooth connection Control is adopted, bluetooth connection between a Control device and an internet of things device is usually established directly according to a Media Access Control (MAC) Address of the Control device, but in this way, there is a risk that the MAC Address is stolen, that is, an illegal device can Control the internet of things device by modifying its MAC Address, so that a security risk of the internet of things device can be caused.
Disclosure of Invention
In order to solve the above problem, in a first aspect, an embodiment of the present invention provides a bluetooth connection method, which is applied to an internet of things device, and the method includes:
acquiring a pre-stored authorization information table, wherein the authorization information table comprises an identity of an authorized device and verification information of the authorized device;
determining target equipment, wherein the target equipment is equipment with the identity identifier same as the identity identifier of authorized equipment in an authorization information table in the environment where the Internet of things equipment is located;
acquiring verification information of the target equipment;
determining verification information corresponding to the target equipment from the authorization information table according to the identity of the target equipment;
performing connection authority verification according to the verification information of the target equipment and verification information corresponding to the target equipment;
and if the connection authority is verified successfully, establishing Bluetooth connection with the target equipment.
In an optional embodiment, the determining the target device includes:
and determining target equipment from the equipment to be connected, wherein the equipment to be connected is the equipment which has started Bluetooth and has the same identity identifier as the identity identifier in the authorization information table in the environment where the equipment of the Internet of things is located.
In an optional embodiment, the determining a target device from the devices to be connected includes:
judging whether a main authorization device exists in the devices to be connected, wherein the main authorization device is the first device successfully paired with the Internet of things device;
and if the main authorization equipment exists in the equipment to be connected, taking the main authorization equipment as target equipment.
In an optional embodiment, the determining a target device from the devices to be connected further includes:
and if the main authorization equipment does not exist in the equipment to be connected, taking the equipment to be connected with the highest priority as target equipment.
In an alternative embodiment, the method further comprises:
if the connection authority is not successfully verified, judging whether all the devices to be connected are already used as target devices;
if the equipment to be connected which is not taken as the target equipment exists, determining new target equipment from the equipment to be connected which is not taken as the target equipment;
and re-executing the step of acquiring the verification information of the target equipment according to the new target equipment.
In an optional embodiment, the determining a new target device from the devices to be connected that have never been target devices includes:
and acquiring the device to be connected with the highest priority as a new target device from the devices to be connected which are not taken as the target devices.
In an alternative embodiment, the method further comprises:
acquiring the number of times of connection for establishing Bluetooth connection between the pre-stored authorized equipment and the Internet of things equipment;
and determining the priority of each device to be connected according to the connection times of the authorized devices corresponding to the devices to be connected, wherein the higher the connection times is, the higher the priority is.
In an alternative embodiment, the verification information includes authorization data and validity data;
the checking the connection authority according to the verification information of the target device and the check information corresponding to the target device includes:
performing authorization verification and validity verification on the target equipment according to the verification information of the target equipment, the authorization data corresponding to the target equipment and the validity data corresponding to the target equipment;
if the authorization verification is successful and the validity verification is successful, judging that the connection authority verification of the target equipment is successful;
and if the authorization verification fails or the validity verification fails, judging that the connection authority verification fails.
In an optional implementation manner, the performing, according to the verification information of the target device, the authorization data corresponding to the target device, and the validity data corresponding to the target device, authorization check and validity check on the target device includes:
judging whether the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment or not;
if the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment, judging that authorization verification is successful;
if the verification information of the target equipment is inconsistent with the authorization data corresponding to the target equipment, judging that authorization verification fails;
if the validity data corresponding to the target equipment is in a valid state, the validity verification is successful;
and if the validity data corresponding to the target equipment is in an invalid state, the validity check fails.
In an optional implementation manner, the determining whether the verification information of the target device is consistent with the authorization data corresponding to the target device includes:
judging whether the target equipment is main authorization equipment or not, wherein the main authorization equipment is first equipment successfully paired with the Internet of things equipment;
if the target equipment is main authorization equipment, judging whether the verification information of the target equipment conforms to authorization data corresponding to the target equipment or not;
if the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment, judging that the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment;
if the verification information of the target equipment does not accord with the authorization data corresponding to the target equipment, acquiring new authorization data;
and if the new authorization data is inconsistent with the old authorization data, judging that the verification information of the target device is consistent with the authorization data corresponding to the target device.
In an alternative embodiment, the identity is obtained from a hash function value of a character formed by the MAC address of the terminal device and the IMEI of the terminal device.
In an optional embodiment, the method further includes, after the bluetooth connection is established with the target device, acquiring preference information of the target device for the internet of things device;
and operating according to the preference information.
In a second aspect, an embodiment of the present invention provides a bluetooth connection device, which is applied to an internet of things device, and the device includes:
the first acquisition module is used for acquiring a prestored authorization information table, wherein the authorization information table comprises an identity identifier of authorized equipment and verification information of the authorized equipment;
the first determining module is used for determining target equipment, wherein the target equipment is equipment with the identity identifier same as the identity identifier of authorized equipment in the authorization information table in the environment where the Internet of things equipment is located;
the second acquisition module is used for acquiring the verification information of the target equipment;
the second determining module is used for determining the verification information corresponding to the target equipment from the authorization information table according to the identity of the target equipment;
the verification module is used for verifying the connection authority according to the verification information of the target equipment and the verification information corresponding to the target equipment; and when the connection authority is verified successfully, establishing Bluetooth connection with the target equipment.
In a third aspect, an embodiment of the present invention provides an internet of things device, where the internet of things device includes a memory and a processor, the memory is electrically connected to the processor, the memory stores an executable program, and the processor, when executing the executable program, implements the method according to any one of the foregoing embodiments.
According to the Bluetooth connection method, the device and the Internet of things equipment, pre-stored verification information is obtained through the Internet of things equipment, verification information of the target equipment is obtained, connection authority verification is conducted on the target equipment according to the verification information of the target equipment and the corresponding verification information of the target equipment, and therefore Bluetooth connection with the target equipment is established under the condition that the connection authority verification is successful, so that illegal equipment can be prevented from being connected with the Internet of things equipment, and safety of the Internet of things equipment is improved.
Drawings
Fig. 1 is a schematic block diagram of a structure of an internet of things device provided in an embodiment of the present application;
fig. 2 is a schematic diagram of an external connection architecture of an internet of things device according to an embodiment of the present application;
fig. 3 is a first flowchart illustrating a bluetooth connection method according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a bluetooth connection method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a bluetooth connection apparatus according to an embodiment of the present application.
Description of reference numerals: 100-internet of things devices; 110-bluetooth connection means; 111-a first acquisition module; 112-a first determination module; 113-a second acquisition module; 114-a second determination module; 115-a check module; 120-a memory; 130-a processor; 200-a server; 300-a network; 400-terminal equipment.
Detailed Description
With the development of the intelligent control technology, the application of the internet of things device 100 is more and more extensive. Bluetooth is a short-distance wireless communication protocol standard and is widely applied to various terminal devices and Internet of things devices. During Bluetooth connection, identity identification can be carried out through the Bluetooth MAC address, namely, after the Bluetooth connection is completed, the Bluetooth connection parties can identify the identities of the Bluetooth MAC address parties and identify the identities of the Bluetooth MAC address parties.
The Bluetooth-based identity recognition can be used for improving user experience in certain scenes, for example, a Bluetooth sound box or vehicle-mounted entertainment equipment provides preference settings such as different songs for different users through different connected mobile phone Bluetooth, and an intelligent air conditioner provides personalized functions such as temperature, humidity and pendulum wind for different users through different connected mobile phone Bluetooth. However, in this way, there is a risk that the MAC address is stolen, that is, an illegal device may control the internet of things device by modifying its MAC address, which may cause a security risk of the internet of things device.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Referring to fig. 1, fig. 1 is a schematic block diagram of a structure of an internet of things device 100 according to an embodiment of the present disclosure, where the internet of things device 100 includes a bluetooth connection device 110, a memory 120 and a processor 130, and the memory 120 and the processor 130 are electrically connected to each other directly or indirectly for implementing data interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The bluetooth connection device 110 includes at least one software function module which can be stored in the memory 120 in the form of software or Firmware (Firmware) or solidified in an Operating System (OS) of the internet of things device 100. The processor 130 is used for executing executable modules stored in the memory 120, such as software functional modules and computer programs included in the bluetooth connection apparatus 110.
Referring to fig. 2, the internet of things device 100 may be communicatively connected to the server 200 through the network 300, and the server 200 may also be communicatively connected to a plurality of terminal devices 400 (terminal devices 400-terminal devices 400) through the network 300, respectively.
Referring to fig. 3, fig. 3 is a schematic flow chart of the bluetooth connection method provided in this embodiment, and the bluetooth connection method includes steps S110 to S150.
Step S110, a pre-stored authorization information table is obtained, where the authorization information table includes an identity of an authorized device and verification information of the authorized device.
Step S120, determining a target device, where the target device is a device in an environment where the internet of things device 100 is located, and the identity of the target device is the same as the identity of the authorized device in the authorization information table.
Step S130, acquiring the verification information of the target device.
Step S140, determining, from the authorization information table, verification information corresponding to the target device according to the identity of the target device.
And step S150, performing connection authority verification according to the verification information of the target device and the verification information corresponding to the target device.
And step S160, if the connection authority is successfully verified, establishing Bluetooth connection with the target equipment.
In this embodiment, the connection authority of the target device is determined through the pre-stored authorization information table, so that the bluetooth connection is established between the target device and the target device when the connection authority of the target device is successfully verified, thereby preventing an illegal device having the same MAC address as an authorized device from controlling the internet of things device 100, reducing the risk of the internet of things device 100 being illegally controlled, and improving the security of the internet of things device 100.
In one embodiment, the authorization information table may be set directly by the user according to the other terminal device 400 that may control the internet of things device 100, and then stored in the internet of things device 100.
Referring to fig. 2, in another embodiment, the authorization information table may be synchronized by the master authorization device to the internet of things device 100. The main authorization device is a device that is successfully paired with the internet of things device 100, and after the internet of things device 100 is successfully paired with the main authorization device, the main authorization device is not directly paired with the other terminal devices 400. After the master authorization device is successfully paired with the internet of things device 100, the master authorization device generates its own verification information, identity identifier and device type identifier, and synchronizes the verification information, identity identifier and device type identifier to the internet of things device 100, where the synchronization process may be: the master authorization device sends the verification information, the identity identifier and the device type identifier to the server 200. The server 200 may store the verification information, the identity identifier, and the device type identifier in an authorization information table configured thereon, or may send the verification information, the identity identifier, and the device type identifier to the internet of things device 100, and the internet of things device 100 stores these pieces of information in a storage information table configured on the internet of things device 100.
After the main authorization device is successfully paired with the internet of things device 100, the main authorization device may also interact with other terminal devices 400, generate verification information, an identity identifier, and a device type identifier of the other terminal devices 400, and send the verification information, the identity identifier, and the device type identifier to the server 200. The server 200 may store the verification information, the identity identifier, and the device type identifier in an authorization information table configured thereon, or may send the verification information, the identity identifier, and the device type identifier to the internet of things device 100. The internet of things device 100 stores this information in a storage information table configured on the internet of things device 100. In short, the authorized devices include the master authorization device and the other terminal devices 400 authorized by the master authorization device. The master authorization device also sends the verification information, the identity identifier and the device type identifier corresponding to each terminal device 400 to the corresponding terminal device 400.
In this embodiment, the verification information is data used for verifying whether the terminal device 400 can be connected to the internet of things device 100, and the verification information may include authorization data representing whether the terminal device 400 has been subjected to connection authorization and validity data representing whether the authorization of the terminal device 400 is valid; the identification is data for identifying each terminal device 400, and the device type identification is data for characterizing whether the terminal device 400 is a master authorization device or an authorized device. When the device connected to the internet of things needs to be authorized by the master authorization device, the authorization data may be generated by the master authorization device and then shared with the corresponding other terminal devices, where the authorization data may be a digital code or a character code randomly generated by the master authorization device, or the authorization data may also be a digital code or a character code input by a user, and the authorization data may be multiple bits, for example, 6 bits. The validity data may be generated by the master authorization device and then shared with the corresponding other terminal devices.
Of course, in this embodiment, the terminal device 400 successfully paired with the internet of things for the first time refers to the terminal device 400 successfully paired with the internet of things device 100 for the first time when the internet of things device 100 is put into use, or the terminal device 400 successfully paired with the internet of things device 100 for the first time after the internet of things device 100 is reset.
To aid understanding, the authorized device, the master authorization device, is described below in connection with an actual scenario.
For example, in the communication system, the internet of things device 100, the server 200, the terminal device a, the terminal device B, the terminal device C, the terminal device D, the terminal device E, and the terminal device F are included. Initially, each terminal device 400 is connected and paired with the internet of things device 100, but if the terminal device a is successfully paired first, the terminal device a is the master authorization device, and the terminal device B, the terminal device C, the terminal device D, the terminal device E, and the terminal device F are no longer paired with the internet of things device 100. At this time, the terminal device a synchronizes the verification information, the identity identifier, and the device type identifier of itself to the internet of things device 100. The terminal device a interacts with the terminal device B, the terminal device C and the terminal device D, and sends the generated verification information, the generated identity and the generated device type identifier to the corresponding terminal device B, the corresponding terminal device C and the corresponding terminal device D to complete authorization, that is, the authorized devices include the terminal device a, the terminal device B, the terminal device C and the corresponding terminal device D.
In this embodiment, the other terminal devices 400 are authorized by the master authorization device, so that the terminal devices 400 connectable to the internet of things device 100 can be determined by the user as needed, and then the corresponding terminal devices 400 are authorized, thereby improving the user experience.
Optionally, in this embodiment, step S120 includes determining a target device from devices to be connected, where the devices to be connected are terminal devices 400 in an environment where the internet of things device 100 is located, and the bluetooth is already turned on and the identity identifier is the same as the identity identifier in the authorization information table.
In this embodiment, for specifically determining the target device, the internet of things device 100 may operate in a master mode or a slave mode. Still taking the communication system including the internet of things device 100, the server 200, the terminal device a, the terminal device B, the terminal device C, the terminal device D, the terminal device E, and the terminal device F as an example, if the internet of things device 100 includes the terminal device a, the terminal device B, the terminal device C, the terminal device E, and the terminal device F within the bluetooth communication range, then the terminal device a, the terminal device B, and the terminal device C are connectable devices. The target device is then one of terminal device a, terminal device B, and terminal device C.
Optionally, in this embodiment, determining the target device from the devices to be connected includes determining whether a master authorization device exists in the devices to be connected; and if the main authorization device exists in the devices to be connected, taking the main authorization device as the target device.
In this embodiment, the main authorization device is used as the terminal device preferentially connected, so that the user experience can be improved, and the control authority of the owner of the internet of things device on the internet of things device is ensured.
Optionally, in this embodiment, the determining the target device from the devices to be connected further includes, if the master authorized device does not exist in the devices to be connected, using the device to be connected with the highest priority as the target device.
In this embodiment, when the master authorization device does not exist in the devices to be connected, the connection order is determined according to the priority, so that the user experience can be improved.
Referring to fig. 4, optionally, in this embodiment, the bluetooth connection method further includes, if the connection authority check fails, executing step S170-step S180.
Step S170, determining whether all the devices to be connected have been targeted devices.
Step S180, if the device to be connected which is not taken as the target device exists, determining a new target device from the device to be connected which is not taken as the target device, and re-executing the step of obtaining the verification information of the target device according to the new target device.
In this embodiment, under the condition that the target device cannot pass the connection verification, the new terminal device 400 is replaced as the target device, and it is ensured that the authorized terminal device 400 is connected to the internet of things device 100 as much as possible, so that the user experience is improved.
Of course, in this embodiment, under the condition that the connection permission of the target device fails to be checked, the internet of things device may send information that the connection permission check fails to the master authorization device, and after receiving the information that the connection permission check fails, the master authorization device may regenerate the authorization data corresponding to the terminal device and share the authorization data with the internet of things device and the corresponding terminal device.
Optionally, in this embodiment, determining a new target device from the devices to be connected that have never been target devices includes acquiring, from the devices to be connected that have never been target devices, a device to be connected with the highest priority as the new target device.
In the embodiment, when a new target device is selected, the target device is selected according to the priority sequence, so that the selected result can be ensured to better meet the user requirement, and the user experience is improved.
Optionally, in this embodiment, the bluetooth connection method further includes acquiring a number of times of connection for establishing bluetooth connection between a pre-stored authorized device and the internet of things device 100; and determining the priority of each device to be connected according to the connection times of the authorized devices corresponding to the devices to be connected, wherein the higher the connection times is, the higher the priority is.
In this embodiment, the connection times of establishing the bluetooth connection between the authorized device and the internet of things device 100 are prestored, and the connection permission is determined according to the connection times, so that the user experience can be further improved.
Optionally, in this embodiment, when the verification information includes the authorization data and the validity data, performing connection permission verification according to the verification information of the target device and the verification information corresponding to the target device, including performing authorization verification and validity verification on the target device according to the verification information of the target device, the authorization data corresponding to the target device, and the validity data corresponding to the target device; if the authorization verification is successful and the validity verification is successful, judging that the connection authority verification of the target equipment is successful; and if the authorization verification fails or the validity verification fails, judging that the connection authority verification fails.
In this embodiment, the target data is checked through the authorization data and the validity data, so that the connection state between the terminal device 400 and the internet of things device 100 can be controlled under different connection conditions, and the user experience is improved.
Optionally, in this embodiment, authorization verification and validity verification are performed on the target device according to the verification information of the target device, the authorization data corresponding to the target device, and the validity data corresponding to the target device, including determining whether the verification information of the target device is consistent with the authorization data corresponding to the target device; if the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment, judging that the authorization verification is successful; if the verification information of the target equipment is inconsistent with the authorization data corresponding to the target equipment, judging that the authorization verification fails; if the validity data corresponding to the target equipment is in a valid state, the validity verification is successful; and if the validity data corresponding to the target equipment is in an invalid state, the validity check fails.
The embodiment is used for specifically performing authorization verification and validity verification.
In this embodiment, after it is determined that the authorization check of the target device fails, the internet of things device may update the validity data of the target device, and update the validity data to an invalid state. The internet of things equipment can also inform the master authorization equipment of the information that the authorization and the verification of the target equipment are not passed, and the master authorization equipment can authorize the target equipment again after receiving the information that the authorization and the verification of the target equipment are not passed, that is, the authorization check code of the target equipment is regenerated, and the authorization check code is synchronized to the internet of things equipment and is shared to the target equipment.
Optionally, in this embodiment, determining whether the verification information of the target device is consistent with authorization data corresponding to the target device includes determining whether the target device is a master authorization device, where the master authorization device is a first device that is successfully paired with the internet of things device 100; if the target equipment is the main authorization equipment, judging whether the verification information of the target equipment conforms to the authorization data corresponding to the target equipment or not; if the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment, judging that the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment; if the verification information of the target equipment does not accord with the authorization data corresponding to the target equipment, new authorization data is obtained; and if the new authorization data is inconsistent with the old authorization data, judging that the verification information of the target device is consistent with the authorization data corresponding to the target device.
In this embodiment, when the authorization data of the master authorization device is verified, if the authorization verification of the master authorization device is unsuccessful, the master authorization device is notified to update the authorization data, and when the master authorization data is successfully updated, it is determined that the target device authentication information is consistent with the authorization data corresponding to the target device, so that the master authorization device can preferentially ensure control over the internet-of-things device 100.
Of course, in this embodiment, when the verification information of the target device does not match the authorization data corresponding to the target device, after acquiring new authorization data, the step of determining whether the verification information of the target device matches the authorization data corresponding to the target device may be executed again until the preset number of cycles is met.
In this embodiment, the valid state of the validity data of the master authorization device may be always valid, that is, as long as the target device is the master authorization device, it may be considered that the validity check of the master authorization device is successful.
In one possible embodiment, the identity comprises a MAC address of the device. In another possible embodiment, the identity is obtained from a hash function value of a character formed by the bluetooth MAC address of the terminal device 400 and the IMEI of the terminal device 400, and the identity may be a character at some specific position in the whole hash function value that is intercepted, for example, a specific 12-bit or 16-bit may be intercepted, and so on. The hash function value can be calculated by a hash function, MD5, SHA1, SHA256, and other algorithms. When there are two or more IMEI numbers in the IMEI of the terminal device 400, the first IMEI number can be selected for calculation.
The hash function value of the character formed by the MAC address of the terminal device 400 and the IMEI of the terminal device 400 is used as the identity of the terminal device 400, so that a third party can be prevented from obtaining the MAC data of the bluetooth of the terminal device 400, and the security of the internet of things device 100 can be further improved.
Optionally, in this embodiment, the bluetooth connection method further includes, after the bluetooth connection is established with the target device, acquiring preference information of the target device for the internet of things device 100; operating according to the preference information.
When the terminal equipment operates the Internet of things equipment, the Internet of things equipment records operation content and can synchronize the content to the server. The server can calculate personal preference through a preference algorithm according to the historical operation information, establish a personal database and update and perfect the database according to the operation of the corresponding user. After the terminal equipment is connected with the Internet of things equipment, the Bluetooth Internet of things equipment sends the identity of the terminal equipment to the server to acquire historical operation information.
In this embodiment, the internet of things device 100 stores the historical operation information of the target device, so that after the target device establishes the bluetooth connection with the internet of things device 100 again, the operation is performed according to the historical operation information, and thus the user experience can be further improved.
Referring to fig. 5, an embodiment of the present application further provides a bluetooth connection apparatus 110, where the bluetooth connection apparatus 110 includes a first obtaining module 111, a first determining module 112, a second obtaining module 113, a second determining module 114, and a checking module 115. The bluetooth connection device 110 includes a software function module which can be stored in the memory 120 in the form of software or firmware or solidified in an Operating System (OS) of the internet of things device 100.
The first obtaining module 111 is configured to obtain a pre-stored authorization information table, where the authorization information table includes an identity of an authorized device and verification information of the authorized device.
The first acquisition module in the present embodiment is used to execute step S110, and the detailed description about the first acquisition module may refer to the description about step S110.
The first determining module 112 is configured to determine a target device, where the target device is a device in an environment where the internet of things device 100 is located, and an identity of the target device is the same as an identity of an authorized device in the authorization information table.
The first determining module 112 in the present embodiment is used to execute step S120, and the detailed description about the first determining module 112 may refer to the description about step S120.
A second obtaining module 113, configured to obtain the verification information of the target device.
The second obtaining module 113 in this embodiment is used to execute step S130, and the detailed description about the second obtaining module 113 may refer to the description about step S130.
And a second determining module 114, configured to determine, according to the identity of the target device, verification information corresponding to the target device from the authorization information table.
The second determining module 114 in the present embodiment is used to execute step S140, and the detailed description about the second determining module 114 may refer to the description about step S140.
The verification module 115 is configured to perform connection right verification according to the verification information of the target device and verification information corresponding to the target device; and when the connection authority is verified successfully, establishing Bluetooth connection with the target equipment.
The verification module 115 in this embodiment is configured to perform steps S150 to S160, and the detailed description about the verification module 115 may refer to the description about steps S150 to S160.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (14)

1. A Bluetooth connection method is applied to equipment of the Internet of things, and comprises the following steps:
acquiring a pre-stored authorization information table, wherein the authorization information table comprises an identity of an authorized device and verification information of the authorized device;
determining target equipment, wherein the target equipment is equipment with the identity identifier same as the identity identifier of authorized equipment in an authorization information table in the environment where the Internet of things equipment is located;
acquiring verification information of the target equipment;
determining verification information corresponding to the target equipment from the authorization information table according to the identity of the target equipment;
performing connection authority verification according to the verification information of the target equipment and verification information corresponding to the target equipment;
and if the connection authority is verified successfully, establishing Bluetooth connection with the target equipment.
2. The method of claim 1, wherein the determining the target device comprises:
and determining target equipment from the equipment to be connected, wherein the equipment to be connected is the equipment which has started Bluetooth and has the same identity identifier as the identity identifier in the authorization information table in the environment where the equipment of the Internet of things is located.
3. The method according to claim 2, wherein the determining a target device from the devices to be connected comprises:
judging whether a main authorization device exists in the devices to be connected, wherein the main authorization device is the first device successfully paired with the Internet of things device;
and if the main authorization equipment exists in the equipment to be connected, taking the main authorization equipment as target equipment.
4. The method of claim 3, wherein the determining a target device from the devices to be connected further comprises:
and if the main authorization equipment does not exist in the equipment to be connected, taking the equipment to be connected with the highest priority as target equipment.
5. The method of claim 2, further comprising:
if the connection authority is not successfully verified, judging whether all the devices to be connected are already used as target devices;
if the equipment to be connected which is not taken as the target equipment exists, determining new target equipment from the equipment to be connected which is not taken as the target equipment;
and re-executing the step of acquiring the verification information of the target equipment according to the new target equipment.
6. The method according to claim 5, wherein the determining a new target device from the devices to be connected which are never target devices comprises:
and acquiring the device to be connected with the highest priority as a new target device from the devices to be connected which are not taken as the target devices.
7. The method according to claim 4 or 6, characterized in that the method further comprises:
acquiring the number of times of connection for establishing Bluetooth connection between the pre-stored authorized equipment and the Internet of things equipment; and determining the priority of each device to be connected according to the connection times of the authorized devices corresponding to the devices to be connected, wherein the higher the connection times is, the higher the priority is.
8. The method of claim 1, wherein the verification information includes authorization data and validity data;
the checking the connection authority according to the verification information of the target device and the check information corresponding to the target device includes:
performing authorization verification and validity verification on the target equipment according to the verification information of the target equipment, the authorization data corresponding to the target equipment and the validity data corresponding to the target equipment;
if the authorization verification is successful and the validity verification is successful, judging that the connection authority verification of the target equipment is successful;
and if the authorization verification fails or the validity verification fails, judging that the connection authority verification fails.
9. The method according to claim 8, wherein the performing authorization check and validity check on the target device according to the verification information of the target device, the authorization data corresponding to the target device, and the validity data corresponding to the target device includes:
judging whether the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment or not;
if the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment, judging that authorization verification is successful;
if the verification information of the target equipment is inconsistent with the authorization data corresponding to the target equipment, judging that authorization verification fails;
if the validity data corresponding to the target equipment is in a valid state, the validity verification is successful;
and if the validity data corresponding to the target equipment is in an invalid state, the validity check fails.
10. The method of claim 9, wherein the determining whether the authentication information of the target device is consistent with the authorization data corresponding to the target device comprises:
judging whether the target equipment is main authorization equipment or not, wherein the main authorization equipment is first equipment successfully paired with the Internet of things equipment;
if the target equipment is main authorization equipment, judging whether the verification information of the target equipment conforms to authorization data corresponding to the target equipment or not;
if the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment, judging that the verification information of the target equipment is consistent with the authorization data corresponding to the target equipment;
if the verification information of the target equipment does not accord with the authorization data corresponding to the target equipment, acquiring new authorization data;
and if the new authorization data is inconsistent with the old authorization data, judging that the verification information of the target device is consistent with the authorization data corresponding to the target device.
11. The method according to any of claims 1-6 or 8-10, wherein the identity is obtained from a hash function of a character consisting of the MAC address of the terminal equipment and the IMEI of the terminal equipment.
12. The method according to claim 1, further comprising obtaining preference information of the target device for the internet of things device after the bluetooth connection is established with the target device;
and operating according to the preference information.
13. The utility model provides a bluetooth connecting device, its characterized in that is applied to thing networking equipment, the device includes:
the first acquisition module is used for acquiring a prestored authorization information table, wherein the authorization information table comprises an identity identifier of authorized equipment and verification information of the authorized equipment;
the first determining module is used for determining target equipment, wherein the target equipment is equipment with the identity identifier same as the identity identifier of authorized equipment in the authorization information table in the environment where the Internet of things equipment is located;
the second acquisition module is used for acquiring the verification information of the target equipment;
the second determining module is used for determining the verification information corresponding to the target equipment from the authorization information table according to the identity of the target equipment;
the verification module is used for verifying the connection authority according to the verification information of the target equipment and the verification information corresponding to the target equipment; and when the connection authority is verified successfully, establishing Bluetooth connection with the target equipment.
14. An internet of things device, comprising a memory and a processor, the memory being electrically connected to the processor, the memory having stored therein an executable program, the processor, when executing the executable program, implementing the method of any one of claims 1-11.
CN202010827256.5A 2020-08-17 2020-08-17 Bluetooth connection method and device and Internet of things equipment Active CN111918263B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010827256.5A CN111918263B (en) 2020-08-17 2020-08-17 Bluetooth connection method and device and Internet of things equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010827256.5A CN111918263B (en) 2020-08-17 2020-08-17 Bluetooth connection method and device and Internet of things equipment

Publications (2)

Publication Number Publication Date
CN111918263A true CN111918263A (en) 2020-11-10
CN111918263B CN111918263B (en) 2024-01-23

Family

ID=73278150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010827256.5A Active CN111918263B (en) 2020-08-17 2020-08-17 Bluetooth connection method and device and Internet of things equipment

Country Status (1)

Country Link
CN (1) CN111918263B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113950055A (en) * 2021-10-08 2022-01-18 湖北亿咖通科技有限公司 Application configuration method and system and mobile terminal
CN114697294A (en) * 2020-12-28 2022-07-01 深圳Tcl新技术有限公司 Network distribution method, device and system and computer readable storage medium
WO2023246695A1 (en) * 2022-06-22 2023-12-28 华为技术有限公司 Device authorization method, electronic device and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060057435A (en) * 2004-11-23 2006-05-26 삼성전자주식회사 System and method for authentication in network
KR100737526B1 (en) * 2006-05-09 2007-07-10 한국전자통신연구원 Access control method in wireless lan
US20140192743A1 (en) * 2011-12-15 2014-07-10 Proximetry, Inc. Systems and Methods for Updating Provisioning Information Provided by a Client
CN105610821A (en) * 2015-12-26 2016-05-25 小米科技有限责任公司 Security verification method and apparatuses
US9729539B1 (en) * 2014-03-28 2017-08-08 Pulse Secure, Llc Network access session detection to provide single-sign on (SSO) functionality for a network access control device
CN109561085A (en) * 2018-11-26 2019-04-02 平安科技(深圳)有限公司 A kind of auth method based on EIC equipment identification code, server and medium
CN109618344A (en) * 2019-01-25 2019-04-12 刘美连 A kind of secure connection method and device of wireless monitoring equipment
WO2019120102A1 (en) * 2017-12-21 2019-06-27 安克创新科技股份有限公司 Wireless handheld electronic device, smart electronic device and pairing connection method thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060057435A (en) * 2004-11-23 2006-05-26 삼성전자주식회사 System and method for authentication in network
KR100737526B1 (en) * 2006-05-09 2007-07-10 한국전자통신연구원 Access control method in wireless lan
US20140192743A1 (en) * 2011-12-15 2014-07-10 Proximetry, Inc. Systems and Methods for Updating Provisioning Information Provided by a Client
US9729539B1 (en) * 2014-03-28 2017-08-08 Pulse Secure, Llc Network access session detection to provide single-sign on (SSO) functionality for a network access control device
CN105610821A (en) * 2015-12-26 2016-05-25 小米科技有限责任公司 Security verification method and apparatuses
WO2019120102A1 (en) * 2017-12-21 2019-06-27 安克创新科技股份有限公司 Wireless handheld electronic device, smart electronic device and pairing connection method thereof
CN109561085A (en) * 2018-11-26 2019-04-02 平安科技(深圳)有限公司 A kind of auth method based on EIC equipment identification code, server and medium
CN109618344A (en) * 2019-01-25 2019-04-12 刘美连 A kind of secure connection method and device of wireless monitoring equipment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
""S5-066361 E-OSF definition discussion paper"", 3GPP TSG_SA\\WG5_TM *
叶阿勇;李晴;金俊林;孟铃玉;: "无线网络接入中用户身份和位置的双重隐身机制研究", 信息网络安全, no. 07 *
肖清旺;王锦华;朱易翔;: "物联网智能终端设备识别方法", 电信科学, no. 02 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114697294A (en) * 2020-12-28 2022-07-01 深圳Tcl新技术有限公司 Network distribution method, device and system and computer readable storage medium
CN114697294B (en) * 2020-12-28 2024-03-12 深圳Tcl新技术有限公司 Distribution network method, device and system and computer readable storage medium
CN113950055A (en) * 2021-10-08 2022-01-18 湖北亿咖通科技有限公司 Application configuration method and system and mobile terminal
WO2023246695A1 (en) * 2022-06-22 2023-12-28 华为技术有限公司 Device authorization method, electronic device and system

Also Published As

Publication number Publication date
CN111918263B (en) 2024-01-23

Similar Documents

Publication Publication Date Title
CN111918263B (en) Bluetooth connection method and device and Internet of things equipment
CN107085870B (en) Regulating vehicle access using encryption methods
CN106257861B (en) By control equipment come the authentication method and its system with auto communication
CN108737381B (en) Extension authentication method of Internet of things system
CN107919962B (en) Internet of things equipment registration and authentication method
EP3714586A1 (en) Remote device control
CN105188055A (en) Wireless network access method, wireless access point and server
CN112559993B (en) Identity authentication method, device and system and electronic equipment
US20130086695A1 (en) Method and system for remote access to data stored on a host system
JP2019009688A (en) Maintenance system and maintenance method
CN108234450B (en) Identity authentication method, terminal registration method, server and terminal
JP2019036091A (en) Vehicle security system and vehicle security method
CN111783068A (en) Device authentication method, system, electronic device and storage medium
WO2006079282A1 (en) A method for setting the key and setting the initial security key in the mobile terminal
KR102427977B1 (en) Update method to automotive ECU device by using external hardware module
WO2019056971A1 (en) Authentication method and device
CN114128212A (en) Method and system for authenticating secure credential transmission to a device
JP7423856B2 (en) How to identify electric vehicle charging stations
CN107437996B (en) Identity authentication method, device and terminal
KR102386456B1 (en) Electronic apparatus, control method thereof, and system
CN111093190B (en) Method, device, system, electronic equipment and storage medium for writing key data
CN105430649A (en) Wifi access method and apparatus
CN108390892B (en) Control method and device for security access of remote storage system
JP2018006782A (en) Data providing system, data providing apparatus, on-vehicle computer, data providing method, and computer program
CN112565251B (en) Access authentication method, device and system for vehicle-mounted application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant