CN112135284B - BLE-based non-inductive unlocking method and BLE equipment - Google Patents

BLE-based non-inductive unlocking method and BLE equipment Download PDF

Info

Publication number
CN112135284B
CN112135284B CN202011054367.3A CN202011054367A CN112135284B CN 112135284 B CN112135284 B CN 112135284B CN 202011054367 A CN202011054367 A CN 202011054367A CN 112135284 B CN112135284 B CN 112135284B
Authority
CN
China
Prior art keywords
mobile terminal
ble
pairing information
mac address
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011054367.3A
Other languages
Chinese (zh)
Other versions
CN112135284A (en
Inventor
范锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Barrot Wireless Co Ltd
Original Assignee
Barrot Wireless Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Barrot Wireless Co Ltd filed Critical Barrot Wireless Co Ltd
Priority to CN202011054367.3A priority Critical patent/CN112135284B/en
Publication of CN112135284A publication Critical patent/CN112135284A/en
Application granted granted Critical
Publication of CN112135284B publication Critical patent/CN112135284B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a BLE-based non-inductive unlocking method and BLE equipment, and belongs to the technical field of Bluetooth wireless communication. The BLE-based non-inductive unlocking method comprises the following steps: establishing BLE connection with the mobile terminal by BLE equipment; judging whether pairing information and a Bluetooth MAC address of the mobile terminal are stored or not by BLE equipment, unlocking if the pairing information and the Bluetooth MAC address of the mobile terminal are stored, and receiving the pairing information and the Bluetooth MAC address of the mobile terminal sent by the mobile terminal if the pairing information and the Bluetooth MAC address of the mobile terminal are not stored; and authenticating the BLE equipment with the mobile terminal according to the pairing information, and if the authentication with the mobile terminal is successful, storing the pairing information and the Bluetooth MAC address of the mobile terminal and unlocking the mobile terminal. When the mobile terminal approaches BLE equipment or Bluetooth of the mobile terminal is switched from a closed state to an open state, the BLE equipment judges whether authentication is successful or not through the Bluetooth MAC address of the connected mobile terminal, and the BLE equipment which is successfully authenticated can be automatically unlocked without authentication with the mobile terminal again. A BLE device that fails or fails authentication needs to be authenticated again with the mobile terminal.

Description

BLE-based non-inductive unlocking method and BLE equipment
Technical Field
The application relates to the technical field of Bluetooth wireless communication, in particular to a BLE-based noninductive unlocking method and BLE equipment.
Background
Bluetooth is a global standard for wireless data and voice communications, which is a special short-range wireless technology connection that establishes a communication environment for fixed and mobile devices based on low-cost short-range wireless connections. In the process of establishing communication between the Bluetooth equipment and the mobile phone, the traditional Bluetooth equipment can be displayed in the mobile phone setting, and can actively connect back to the mobile phone after being disconnected with the mobile phone, but the traditional Bluetooth has larger power consumption. Therefore, bluetooth low energy (Bluetooth Low Energy, BLE for short) devices are increasingly favored. The BLE technology can realize low-power-consumption data transmission between bluetooth devices.
In the prior art, before a mobile terminal establishes a bluetooth connection with BLE equipment each time, it is necessary to manually open an APP to establish the bluetooth connection; after the Bluetooth connection is established, the APP and BLE equipment are required to interact with pairing information to carry out authentication; after authentication is successful, the BLE device can be unlocked. After the mobile terminal establishes connection with BLE equipment next time, the APP needs to be opened for authentication. Interaction of the pairing information delays execution of the unlocking operation; authentication needs to be carried out again each time, and the intelligentization of products and the user experience effect can be affected.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a BLE-based noninductive unlocking method and BLE equipment.
The application adopts a technical scheme that: a BLE-based non-inductive unlocking method comprising establishing BLE connection by a BLE device with a mobile terminal; judging whether pairing information and a Bluetooth MAC address of the mobile terminal are stored or not by BLE equipment, unlocking if the pairing information and the Bluetooth MAC address of the mobile terminal are stored, and receiving the pairing information and the Bluetooth MAC address of the mobile terminal sent by the mobile terminal if the pairing information and the Bluetooth MAC address of the mobile terminal are not stored; and authenticating the BLE equipment with the mobile terminal according to the pairing information, and if the authentication with the mobile terminal is successful, storing the pairing information and the Bluetooth MAC address of the mobile terminal and unlocking the mobile terminal.
The application adopts another technical scheme that: a BLE device, comprising: the Bluetooth connection module is used for establishing BLE connection with the mobile terminal; the receiving module is used for judging whether the pairing information and the Bluetooth MAC address of the mobile terminal are stored, unlocking the mobile terminal if the pairing information and the Bluetooth MAC address of the mobile terminal are stored, and receiving the pairing information and the Bluetooth MAC address of the mobile terminal sent by the mobile terminal if the pairing information and the Bluetooth MAC address of the mobile terminal are not stored; and the authentication unlocking module is used for authenticating the mobile terminal according to the pairing information, and storing and unlocking the pairing information and the Bluetooth MAC address of the mobile terminal if the authentication with the mobile terminal is successful.
The application adopts another technical scheme that: a computer readable storage medium storing computer instructions operable to perform a BLE-based non-inductive unlocking method in scheme one.
The application adopts another technical scheme that: a computer apparatus comprising a processor and a memory, the memory storing computer instructions that the processor operates to perform a BLE-based non-inductive unlocking method in scheme one.
The application has the beneficial effects that: the application provides a BLE-based non-inductive unlocking method, which comprises the steps of establishing BLE connection between BLE equipment and a mobile terminal; judging whether pairing information and a Bluetooth MAC address of the mobile terminal are stored or not by BLE equipment, unlocking if the pairing information and the Bluetooth MAC address of the mobile terminal are stored, and receiving the pairing information and the Bluetooth MAC address of the mobile terminal sent by the mobile terminal if the pairing information and the Bluetooth MAC address of the mobile terminal are not stored; and authenticating the BLE equipment with the mobile terminal according to the pairing information, and if the authentication with the mobile terminal is successful, storing the pairing information and the Bluetooth MAC address of the mobile terminal and unlocking the mobile terminal. When the mobile terminal approaches BLE equipment or Bluetooth of the mobile terminal is switched from a closed state to an open state, the BLE equipment judges whether authentication is successful or not through the connected pairing information and the Bluetooth MAC address of the mobile terminal, and the BLE equipment which is successfully authenticated can be automatically unlocked without authentication with the mobile terminal again. A BLE device that fails or fails authentication needs to be authenticated again with the mobile terminal.
Drawings
Fig. 1 is a schematic diagram of an embodiment of a BLE-based non-inductive unlocking method of the present application;
fig. 2 is a schematic diagram of a specific flow of a BLE-based non-inductive unlocking method according to the present application;
Figure 3 is a schematic diagram of one embodiment of a BLE device of the present application.
Detailed Description
The preferred embodiments of the present application will be described in detail below with reference to the accompanying drawings so that the advantages and features of the present application can be more easily understood by those skilled in the art, thereby making clear and defining the scope of the present application.
It should be noted that in this document, terms such as "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the prior art, before a mobile terminal establishes a bluetooth connection with BLE equipment each time, it is necessary to manually open an APP to establish the bluetooth connection; after the Bluetooth connection is established, the APP and BLE equipment are required to interact with pairing information to carry out authentication; after authentication is successful, the BLE device can be unlocked. After the mobile terminal establishes connection with BLE equipment next time, the APP needs to be opened for authentication. Interaction of the pairing information delays execution of the unlocking operation; authentication needs to be carried out again each time, and the intelligentization of products and the user experience effect can be affected.
Aiming at the problems, the application provides a BLE-based non-inductive unlocking method. After the authentication between the BLE equipment and the mobile terminal is successful, the mobile terminal is connected with the BLE equipment without authentication, the BLE equipment is directly unlocked, and the unlocking control time is optimized. The BLE device of the present application may be a charging pile with BLE technology.
The charging pile of the prior art will be briefly described. The charging pile has the function similar to that of an oiling machine in a gas station, can be fixed on the ground or a wall, is installed in public buildings (public buildings, malls, public parking lots and the like) and residential community parking lots or charging stations, and can charge electric automobiles of various types according to different voltage levels. The input end of the charging pile is directly connected with an alternating current power grid, and the output end of the charging pile is provided with a charging plug for charging the electric automobile. The charging pile generally provides two charging modes of conventional charging and quick charging, people can use a specific charging card to swipe the card on a man-machine interaction operation interface provided by the charging pile for corresponding charging mode, charging time, charge data printing and other operations, and a charging pile display screen can display data of charging quantity, charge, charging time and the like.
Fig. 1 shows a specific embodiment of the BLE-based non-inductive unlocking method of the present application, in which the BLE-based non-inductive unlocking method of the present application includes: step S101. The method mainly comprises the following steps: and establishing BLE connection with the mobile terminal by the BLE equipment.
It should be noted that the mobile terminal of the present application may be one of a mobile phone, an iPad, a computer, etc.
Bluetooth Low Energy (BLE) technology is a low cost, short range, interoperable, robust wireless technology that operates in the unlicensed 2.4GHz ISM radio frequency band. The intelligent power consumption is reduced to the maximum extent by utilizing an intelligent means. The BLE technology adopts a variable connection time interval, which may be set to be different from several milliseconds to several seconds according to specific applications, and at the same time, the BLE technology adopts a fast connection mode, so that the BLE technology is in a "non-connection" state when idle, at the moment, both ends of the link are only aware of each other, the link is opened only when necessary for working, and then the link is closed in a time as short as possible. Therefore, the BLE technology has the advantages of low power consumption, low cost, low delay, long transmission distance, quick start, instant link, high safety and the like. Based on the above advantages, BLE technology is currently being widely adopted by electronic devices with high real-time performance.
In this embodiment, the mobile terminal sends out a broadcast, where the broadcast data carries the bluetooth MAC address of the mobile terminal, and the BLE device acquires the bluetooth MAC address of the mobile terminal through the broadcast.
The MAC (MEDIA ACCESS Control or Medium Access Control) address is interpreted as a media access Control, or as a physical address or a hardware address, and is used to define the location of the network device. In the OSI model, the third layer network layer is responsible for IP addresses, and the second layer data link layer is responsible for bluetooth MAC addresses. Thus a host will have a bluetooth MAC address and each network location will have an IP address specific to it. The bluetooth MAC address is determined by the network card and is fixed. Therefore, the corresponding mobile terminal can be identified according to the Bluetooth MAC address.
In a specific embodiment of the application, the BLE device adds HOGP a protocol before the BLE connection is established by the BLE device with the mobile terminal.
In the prior art, the BLE device will automatically initiate broadcasting, but it cannot display the bluetooth interface of the mobile terminal, and the mobile terminal needs to install the APP and search. By adding HOGP protocol in the method, the user can realize automatic connection of BLE equipment without installing APP. And the user does not need to unlock and click the APP on the mobile terminal, and can realize automatic connection with BLE equipment with HOGP protocol, thereby providing convenience for the user in the use process and simultaneously reducing the power consumption of the mobile terminal and the BLE equipment with HOGP protocol.
Specifically, during the connection process, the mobile terminal can display a BLE device supporting standard protocols of the SIG organization of the bluetooth technical union in the setup-bluetooth interface, and the HOGP protocol is one of the standard protocols. The BLE equipment added with HOGP protocol can realize automatic connection with the mobile terminal without opening the mobile terminal APP. The HOGP protocol is a configuration file of the human-computer interaction HID based on the general attribute protocol GATT, and realizes the communication between the human-computer interaction equipment and the Bluetooth equipment.
In the specific embodiment shown in fig. 1, the non-inductive unlocking method based on BLE of the present application further includes: step S102. The method comprises the following steps: and judging whether pairing information and the Bluetooth MAC address of the mobile terminal are stored or not by the BLE equipment, unlocking the BLE equipment if the pairing information and the Bluetooth MAC address of the mobile terminal are stored in the BLE equipment, and receiving the pairing information and the Bluetooth MAC address of the mobile terminal sent by the mobile terminal if the pairing information and the Bluetooth MAC address of the mobile terminal are not stored in the BLE equipment.
Specifically, after the mobile terminal establishes a BLE connection with the BLE device, the mobile terminal sends pairing information to the BLE device through a data transmission protocol.
The DTS of the data transmission service (Data Transmission Service) supports data transmission among data sources such as a relational database, noSQL, big data (OLAP) and the like. The data transmission service integrates data migration, data subscription and data real-time synchronization. The data transmission aims at solving the difficult problem of remote and millisecond-level asynchronous data transmission in public cloud and mixed cloud scenes.
In the specific embodiment, whether the BLE equipment stores pairing information and the Bluetooth MAC address of the mobile terminal is judged, so that whether the BLE equipment and the mobile terminal are authenticated can be judged, if the BLE equipment stores the pairing information and the Bluetooth MAC address of the mobile terminal, pairing and authentication are not required, the BLE equipment automatically executes unlocking operation, the mobile terminal does not need to operate APP, the mobile terminal does not need to unlock the equipment, and the effect of non-inductive unlocking is achieved. The BLE device with failed authentication has no pairing information and Bluetooth MAC address, so that the pairing and authentication processes are re-executed, otherwise, the unlocking operation cannot be completed.
In the specific embodiment shown in fig. 1, the method for unlocking BLE according to the present application further includes: step S103. The method comprises the following steps: and authenticating the BLE equipment with the mobile terminal according to the pairing information, and if the BLE equipment and the mobile terminal are successfully authenticated, storing the pairing information and the Bluetooth MAC address of the mobile terminal and unlocking the mobile terminal.
In a specific embodiment of the present application, the pairing information includes a key preset by the mobile terminal, and the BLE device authenticates the mobile terminal by using a key input method.
In this embodiment, in the process that the BLE device and the mobile terminal perform authentication for the first time, the BLE device sends a pairing request, when the BLE device and the mobile terminal are paired successfully, the mobile terminal sends a preset key to the BLE device for authentication, and when the authentication is passed, the BLE device stores pairing information and a bluetooth MAC address of the mobile terminal.
In this embodiment, the preset key of the mobile terminal and the bluetooth MAC address of the mobile terminal are determined, if the preset key of the mobile terminal and the bluetooth MAC address of the mobile terminal are already stored in the BLE device, the BLE device and the mobile terminal are successfully authenticated, otherwise the authentication between the BLE device and the mobile terminal fails or is not authenticated.
In this embodiment, whether the key preset by the mobile terminal and the bluetooth MAC address of the mobile terminal are stored in the BLE device or not is determined, so as to determine validity of the current mobile terminal, if the current mobile terminal is legal, authentication is successful, and if the current mobile terminal is not legal, authentication fails.
In a specific embodiment of the present application, the pairing information further includes user information of the mobile terminal and/or identification information of the mobile terminal.
In the actual authentication process, multiple authentications may be required for a mobile terminal. In order to reduce the number of authentication, the pairing information may include user information of the mobile terminal and/or identification information of the mobile terminal. User information and identification information of the mobile terminal are stored in the BLE equipment in advance, when the BLE equipment receives the pairing information of the user information of the mobile terminal and/or the identification information of the mobile terminal, whether the user information and/or the identification information received by the BLE equipment is the same as the pre-stored user information and/or the identification information is judged, and if the user information and the identification information are the same, authentication is also successful.
The user information of the mobile terminal may be a character sequence of a certificate number, a name, etc. The identification information of the mobile terminal may be identification information of an identification card on the mobile terminal, such as ICCID, UMID, or phone number of the user, or may be identification information of the mobile terminal, such as IMSI or ESN. Or for safety, the identification information of the user comprises the identification information of the identification card and the identification information of the mobile terminal, and the identification information of the identification card or the identification information of the mobile terminal can be conveniently set by utilizing the existing resources.
In a specific embodiment of the present application, the method for unlocking BLE without sense further includes, if authentication between the BLE device and the mobile terminal fails, deleting pairing information by the BLE device, and disconnecting the BLE device from the mobile terminal.
In this embodiment, if authentication between the BLE device and the mobile terminal fails, the pairing information may be deleted in order to save the storage space of the BLE device. When the current mobile terminal performs the next authentication, new pairing information is retransmitted, so that the problem that BLE equipment spending in the next authentication is caused because the pairing information is possibly consistent for two times can be avoided.
In a specific embodiment of the present application, the method for unlocking BLE without sense of the present application further includes, if authentication between the BLE device and the mobile terminal is successful, sending an authentication success report to the mobile terminal by the BLE device, otherwise, sending an authentication failure report to the mobile terminal by the BLE device before the BLE device and the mobile terminal are disconnected.
In this embodiment, multiple authentications may be required for a mobile terminal during the actual authentication process. And when the authentication fails, an authentication failure report is sent to the mobile terminal, and the authentication failure comprises information such as failure reasons, so that the mobile terminal can avoid the parameters in the next authentication process, thereby reducing the authentication times.
In this embodiment, after the BLE device to which HOGP is added successfully authenticates with the mobile terminal, the mobile terminal can automatically establish a BLE connection when the mobile terminal approaches the BLE device, without opening the APP to perform a connection procedure.
In the specific embodiment, after the mobile terminal is connected with the BLE equipment, whether authentication is successful is judged by verifying the Bluetooth MAC address of the mobile terminal, after the mobile terminal which is successfully authenticated is connected with the BLE equipment, the BLE equipment stores pairing information and the Bluetooth MAC address of the mobile terminal, pairing and authentication are not required, unlocking operation is automatically executed, the mobile terminal does not need to run APP, and unlocking equipment is also not needed, so that the effect of noninductive unlocking is achieved; if authentication fails, the pairing and authentication processes are re-executed because the pairing information MAC address is not stored in the BLE equipment, otherwise, the unlocking operation cannot be completed.
Fig. 2 shows a schematic diagram of a specific flow of the BLE-based non-inductive unlocking method of the present application. As can be seen from fig. 2, the BLE device and the mobile terminal are first BLE connected and paired, after the BLE device and the mobile terminal are connected, whether the BLE device and the mobile terminal are successfully authenticated is determined, if yes, the BLE device is directly unlocked, if not, the mobile terminal sends pairing information to the BLE device to request authentication, if the authentication is successful, the BLE device is unlocked, and if the authentication is failed, the BLE device and the mobile terminal are disconnected.
Figure 3 shows a specific embodiment of the BLE device of the present application in which the BLE device of the present application comprises: and the Bluetooth connection module. The module is used for establishing BLE connection with the mobile terminal.
In a specific embodiment of the present application, the bluetooth connection module further comprises a protocol adding module for adding HOGP protocols.
In the specific embodiment shown in fig. 3, the BLE device of the present application further comprises: and judging the receiving module. The module is used for judging whether the pairing information and the Bluetooth MAC address of the mobile terminal are stored, unlocking the mobile terminal if the pairing information and the Bluetooth MAC address of the mobile terminal are stored, and receiving the pairing information and the Bluetooth MAC address of the mobile terminal sent by the mobile terminal if the pairing information and the Bluetooth MAC address of the mobile terminal are not stored.
In a specific embodiment of the present application, the pairing information further includes a key preset by the mobile terminal.
In a specific embodiment of the present application, the pairing information further includes user information of the mobile terminal and/or identification information of the mobile terminal.
In the specific embodiment shown in fig. 3, the BLE device of the present application further comprises: and an authentication unlocking module. The module is used for authenticating the mobile terminal according to the pairing information, and storing and unlocking the pairing information and the Bluetooth MAC address of the mobile terminal if the authentication with the mobile terminal is successful.
The BLE device provided by the application can be used for executing the non-inductive unlocking method based on BLE described in any one of the embodiments, and the implementation principle and technical effects are similar and are not repeated here.
In this embodiment, the bluetooth connection module, the judgment receiving module, the authentication unlocking module in the BLE device of the present application may be directly in hardware, in a software module executed by a processor, or in a combination of both.
A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium.
The Processor may be a central processing unit (English: central Processing Unit, CPU for short), other general purpose Processor, digital signal Processor (English: DIGITAL SIGNAL Processor, DSP for short), application specific integrated Circuit (Application SPECIFIC INTEGRATED Circuit, ASIC for short), field programmable gate array (English: field Programmable GATE ARRAY, FPGA for short), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In a third embodiment of the application, a computer readable storage medium stores computer instructions operable to perform the BLE-based non-inductive unlocking method described in any of the embodiments.
In a fourth embodiment of the application, a computer device includes a processor and a memory, the memory storing computer instructions, the processor operating the computer instructions to perform a BLE-based non-inductive unlocking method in scheme one.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another apparatus, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
The foregoing description is only illustrative of the present application and is not intended to limit the scope of the application, and all equivalent structural changes made by the present application and the accompanying drawings, or direct or indirect application in other related technical fields, are included in the scope of the present application.

Claims (6)

1. A BLE-based non-inductive unlocking method, comprising:
the BLE equipment and the mobile terminal establish BLE connection, wherein the mobile terminal sends out broadcasting, the broadcasting data carries the Bluetooth MAC address of the mobile terminal, and the BLE equipment acquires the Bluetooth MAC address of the mobile terminal through broadcasting;
judging whether pairing information and a Bluetooth MAC address of the mobile terminal are stored by the BLE device,
If the pairing information and the Bluetooth MAC address of the mobile terminal are stored, unlocking,
If the pairing information and the Bluetooth MAC address of the mobile terminal are not stored, receiving the pairing information and the Bluetooth MAC address of the mobile terminal, which are sent by the mobile terminal, wherein the pairing information comprises a key preset by the mobile terminal;
Authenticating the BLE equipment with the mobile terminal according to the pairing information, and if the authentication with the mobile terminal is successful, storing the pairing information and the Bluetooth MAC address of the mobile terminal and unlocking; the BLE equipment authenticates the mobile terminal by adopting a key input mode according to the pairing information;
the pairing information comprises user information of the mobile terminal and/or identification information of the mobile terminal, wherein the user information of the mobile terminal comprises a certificate number and a name character sequence, and the identification information comprises identification information of an identification card of the mobile terminal;
If the authentication of the BLE equipment and the mobile terminal fails, deleting the pairing information by the BLE equipment, and disconnecting BLE connection with the mobile terminal;
and if the authentication between the BLE equipment and the mobile terminal is successful, the BLE equipment sends an authentication success report to the mobile terminal, otherwise, before the BLE equipment and the mobile terminal are disconnected, the authentication failure report is sent to the mobile terminal.
2. The BLE-based sensorless unlocking method of claim 1, further comprising adding HOGP a protocol by the BLE device before the BLE connection is established by the BLE device with the mobile terminal.
3. The BLE-based sensorless unlocking method of claim 1, wherein the pairing information is transmitted to the BLE device by the mobile terminal through a data transmission protocol.
4. A BLE device, comprising:
The Bluetooth connection module is used for establishing BLE connection with the mobile terminal, wherein the mobile terminal sends out broadcasting, the broadcasting data carries the Bluetooth MAC address of the mobile terminal, and the BLE equipment acquires the Bluetooth MAC address of the mobile terminal through broadcasting;
A judging and receiving module for judging whether the pairing information and the Bluetooth MAC address of the mobile terminal are stored,
If the pairing information and the Bluetooth MAC address of the mobile terminal are stored, unlocking,
If the pairing information and the Bluetooth MAC address of the mobile terminal are not stored, receiving the pairing information sent by the mobile terminal and the Bluetooth MAC address of the mobile terminal, wherein the pairing information comprises a key preset by the mobile terminal;
The authentication unlocking module is used for authenticating the mobile terminal according to the pairing information, and if the authentication with the mobile terminal is successful, storing the pairing information and the Bluetooth MAC address of the mobile terminal and unlocking the mobile terminal; the BLE equipment authenticates the mobile terminal by adopting a key input mode according to the pairing information;
the pairing information comprises user information of the mobile terminal and/or identification information of the mobile terminal, wherein the user information of the mobile terminal comprises a certificate number and a name character sequence, and the identification information comprises identification information of an identification card of the mobile terminal;
If the authentication of the BLE equipment and the mobile terminal fails, deleting the pairing information by the BLE equipment, and disconnecting BLE connection with the mobile terminal;
and if the authentication between the BLE equipment and the mobile terminal is successful, the BLE equipment sends an authentication success report to the mobile terminal, otherwise, before the BLE equipment and the mobile terminal are disconnected, the authentication failure report is sent to the mobile terminal.
5. A computer readable storage medium storing computer instructions operable to perform the BLE-based non-inductive unlocking method of any one of claims 1-3.
6. A computer device comprising a processor and a memory, the memory storing computer instructions, characterized in that: the processor operates the computer instructions to perform the BLE-based non-inductive unlocking method of any one of claims 1-3.
CN202011054367.3A 2020-09-29 2020-09-29 BLE-based non-inductive unlocking method and BLE equipment Active CN112135284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011054367.3A CN112135284B (en) 2020-09-29 2020-09-29 BLE-based non-inductive unlocking method and BLE equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011054367.3A CN112135284B (en) 2020-09-29 2020-09-29 BLE-based non-inductive unlocking method and BLE equipment

Publications (2)

Publication Number Publication Date
CN112135284A CN112135284A (en) 2020-12-25
CN112135284B true CN112135284B (en) 2024-05-03

Family

ID=73843201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011054367.3A Active CN112135284B (en) 2020-09-29 2020-09-29 BLE-based non-inductive unlocking method and BLE equipment

Country Status (1)

Country Link
CN (1) CN112135284B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113022362A (en) * 2021-04-16 2021-06-25 重庆长安新能源汽车科技有限公司 Alternating current charging method and system for realizing vehicle pile identification based on Bluetooth communication
CN113386591B (en) * 2021-06-11 2022-11-04 宁波均胜新能源汽车技术有限公司 Charging pile charging method and system based on Bluetooth technology

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1913439A (en) * 2006-09-08 2007-02-14 华为技术有限公司 Authentication method and method for transmitting successful authentication information
CN101252376A (en) * 2008-03-27 2008-08-27 宇龙计算机通信科技(深圳)有限公司 System and method for connecting blue tooth equipment and mobile communication terminal thereof
CN103378876A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Bluetooth-based terminal unlocking method
KR20140074155A (en) * 2012-12-03 2014-06-17 삼성전자주식회사 Method And Mobile Terminal For Controlling Screen Lock
CN107609387A (en) * 2017-09-30 2018-01-19 广东欧珀移动通信有限公司 The method and apparatus of terminal unlocking, terminal device, computer-readable recording medium
KR20180047954A (en) * 2016-11-02 2018-05-10 박광호 USB Storage Device Lock System Based BLE
CN108024241A (en) * 2016-10-31 2018-05-11 中国电信股份有限公司 Terminal accessing authentication method, system and authentication server
CN108541324A (en) * 2016-12-27 2018-09-14 深圳易马达科技有限公司 A kind of unlocking method of electronic lock device, client and its electronic lock device
CN109788463A (en) * 2018-12-17 2019-05-21 平安科技(深圳)有限公司 Method, apparatus, computer equipment and the storage medium of controlling terminal unlock
CN109963274A (en) * 2017-12-26 2019-07-02 上海商米科技有限公司 Method, equipment and the computer storage medium of wireless unlock electronic equipment
CN110276865A (en) * 2019-05-09 2019-09-24 北京致行慕远科技有限公司 Solve lock control method, device, electric vehicle and terminal
CN110602309A (en) * 2019-08-02 2019-12-20 华为技术有限公司 Device unlocking method and system and related device
CN111417100A (en) * 2020-04-10 2020-07-14 北京百瑞互联技术有限公司 Automatic connection and control method for Bluetooth low-power-consumption equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2640105B1 (en) * 2010-11-12 2015-10-28 ZTE Corporation Method, device and system for unlocking mobile terminal by operator
CN109830017B (en) * 2019-02-01 2022-02-22 深圳市汇顶科技股份有限公司 Data management method, device, equipment, system and storage medium of intelligent lock

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1913439A (en) * 2006-09-08 2007-02-14 华为技术有限公司 Authentication method and method for transmitting successful authentication information
CN101252376A (en) * 2008-03-27 2008-08-27 宇龙计算机通信科技(深圳)有限公司 System and method for connecting blue tooth equipment and mobile communication terminal thereof
CN103378876A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Bluetooth-based terminal unlocking method
KR20140074155A (en) * 2012-12-03 2014-06-17 삼성전자주식회사 Method And Mobile Terminal For Controlling Screen Lock
CN108024241A (en) * 2016-10-31 2018-05-11 中国电信股份有限公司 Terminal accessing authentication method, system and authentication server
KR20180047954A (en) * 2016-11-02 2018-05-10 박광호 USB Storage Device Lock System Based BLE
CN108541324A (en) * 2016-12-27 2018-09-14 深圳易马达科技有限公司 A kind of unlocking method of electronic lock device, client and its electronic lock device
CN107609387A (en) * 2017-09-30 2018-01-19 广东欧珀移动通信有限公司 The method and apparatus of terminal unlocking, terminal device, computer-readable recording medium
CN109963274A (en) * 2017-12-26 2019-07-02 上海商米科技有限公司 Method, equipment and the computer storage medium of wireless unlock electronic equipment
CN109788463A (en) * 2018-12-17 2019-05-21 平安科技(深圳)有限公司 Method, apparatus, computer equipment and the storage medium of controlling terminal unlock
CN110276865A (en) * 2019-05-09 2019-09-24 北京致行慕远科技有限公司 Solve lock control method, device, electric vehicle and terminal
CN110602309A (en) * 2019-08-02 2019-12-20 华为技术有限公司 Device unlocking method and system and related device
CN111417100A (en) * 2020-04-10 2020-07-14 北京百瑞互联技术有限公司 Automatic connection and control method for Bluetooth low-power-consumption equipment

Also Published As

Publication number Publication date
CN112135284A (en) 2020-12-25

Similar Documents

Publication Publication Date Title
CN105992306B (en) Binding method of terminal and home gateway
CN111373775B (en) Peripheral computing device
CN112135284B (en) BLE-based non-inductive unlocking method and BLE equipment
WO2014059813A1 (en) Data transmission method and terminal device
CN102789685B (en) Universal remote controller, parameter configuration method thereof and controlled equipment
US8188857B2 (en) Authentication system and method thereof for wireless networks
CN109906561A (en) A kind of matching method cancels matching method, terminal device and external equipment
CN100593936C (en) Roaming authentication method based on WAPI
CN104735814A (en) Access method, system and related device for automatically getting access to WiFi network
CN102882560A (en) Bluetooth low energy approach detections through vehicle paired capable devices
CN101141264A (en) WAN module based remote startup or wakeup validating method
CN103596177A (en) Method for making mobile terminal get access to public WiFi in one-key mode
CN100496156C (en) A certificate roaming authentication method based on WAPI
CN105933888A (en) Burning method and device of eSIM (Subscriber Identity Module) card based on NFC
EP2234438A1 (en) Wireless personal area network accessing method
CN109803252B (en) Secondary eSIM card logout method, eSIM server, terminal and system
CN103874065A (en) Method and device for judging user position abnormity
CN104125568A (en) Wireless access point safe authentication method and system
CN103812900A (en) Data synchronization method, device and system
CN104981027A (en) Application synchronization method and system for mobile terminals
CN104697105A (en) Air conditioner control system and method
CN108605223B (en) Method and terminal for acquiring time and time zone
CN114710524B (en) Data interaction method, device and equipment of in-vehicle local area network and storage medium
CN113411286B (en) Access processing method and device based on 5G technology, electronic equipment and storage medium
CN116101116B (en) Charging method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: A1009, floor 9, block a, No. 9, Shangdi Third Street, Haidian District, Beijing 100085

Applicant after: Beijing Bairui Internet Technology Co.,Ltd.

Address before: 7-1-1, building C, 7 / F, building 2-1, No.2, Shangdi Information Road, Haidian District, Beijing 100085

Applicant before: BARROT WIRELESS Co.,Ltd.

Country or region before: China

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant