CN113347597B - Communication encryption method and system of Bluetooth key - Google Patents
Communication encryption method and system of Bluetooth key Download PDFInfo
- Publication number
- CN113347597B CN113347597B CN202110583986.XA CN202110583986A CN113347597B CN 113347597 B CN113347597 B CN 113347597B CN 202110583986 A CN202110583986 A CN 202110583986A CN 113347597 B CN113347597 B CN 113347597B
- Authority
- CN
- China
- Prior art keywords
- vehicle
- control instruction
- mobile terminal
- bluetooth module
- mounted bluetooth
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a communication encryption method and a system of a Bluetooth key, wherein the method comprises the following steps: when a first control instruction sent by the mobile terminal is received, the first control instruction is encrypted and fed back to the mobile terminal, so that the mobile terminal sends the encrypted first control instruction to the vehicle-mounted Bluetooth module; and when receiving a second control instruction sent by the vehicle-mounted Bluetooth module, decrypting the second control instruction and feeding back the second control instruction to the vehicle-mounted Bluetooth module so that the vehicle-mounted Bluetooth module sends the decrypted second control instruction to the mobile terminal. Through the mode, the control instructions sent by the mobile terminal and the vehicle-mounted Bluetooth module can be encrypted and decrypted respectively, so that the confidentiality of communication between the mobile terminal and the vehicle-mounted Bluetooth module can be greatly improved, the communication confidentiality between the Bluetooth key and an automobile is correspondingly greatly improved, and the use experience of a user is improved.
Description
Technical Field
The invention relates to the technical field of automobiles, in particular to a communication encryption method and system of a Bluetooth key.
Background
With the development of technology and the popularization of keyless concept of automobiles, the traditional physical automobile Key slowly presents various limitations in the using process, and therefore, the bluetooth Key (PAAK, Phone as a Key) is beginning to enter the public field of vision as a typical digital Key technology. The existing Bluetooth key is a combination of a smart phone, a watch, a tablet personal computer and an automobile key, a user uses Bluetooth as a bridge to realize communication between mobile equipment and an automobile, and multiple controls can be carried out on the automobile through a mobile terminal APP paired with the user. The automobile with the Bluetooth key function can be a keyless entry and starting system in the true sense, and brand new operation experience and great convenience are brought to an automobile owner.
Generally speaking, a user opens a mobile terminal APP and is connected to a vehicle-end bluetooth master Module (BLE) through bluetooth, and when the vehicle-end bluetooth master Module authenticates that the mobile device has an authorized legal digital key, the mobile device of the user becomes a virtual car key, and besides the general functions of a traditional physical key, stronger functions such as starting a vehicle and inquiring related vehicle information can be realized through the mobile terminal APP.
However, the existing bluetooth key has poor confidentiality in communication with the automobile, and has the risk of user information leakage, thereby reducing the user experience.
Disclosure of Invention
Based on this, the present invention provides a communication encryption method and system for a bluetooth key, so as to solve the problem of poor security of the communication between the bluetooth key and the vehicle in the prior art.
A communication encryption method for a bluetooth key, the method comprising:
when a first control instruction sent by a mobile terminal is received, encrypting the first control instruction and feeding back the encrypted first control instruction to the mobile terminal so that the mobile terminal sends the encrypted first control instruction to a vehicle-mounted Bluetooth module;
and when a second control instruction sent by the vehicle-mounted Bluetooth module is received, the second control instruction is decrypted and fed back to the vehicle-mounted Bluetooth module, so that the vehicle-mounted Bluetooth module sends the decrypted second control instruction to the mobile terminal.
The beneficial effects of the invention are: encrypting a first control instruction sent by a mobile terminal and feeding back the first control instruction to the mobile terminal so that the mobile terminal sends the encrypted first control instruction to a vehicle-mounted Bluetooth module; in addition, the second control instruction sent by the vehicle-mounted Bluetooth module is decrypted and fed back to the vehicle-mounted Bluetooth module, so that the vehicle-mounted Bluetooth module sends the decrypted second control instruction to the mobile terminal. Through the mode, the control instructions sent by the mobile terminal and the vehicle-mounted Bluetooth module can be encrypted and decrypted respectively, so that the confidentiality of communication between the mobile terminal and the vehicle-mounted Bluetooth module can be greatly improved, the communication confidentiality between a Bluetooth key and an automobile is correspondingly greatly improved, and the use experience of a user is improved.
Preferably, when receiving a first control instruction sent by a mobile terminal, the step of encrypting the first control instruction and feeding the encrypted first control instruction back to the mobile terminal includes:
establishing communication connection with the mobile terminal and receiving a first control instruction sent by the mobile terminal;
and encrypting the first control instruction through a preset encryption key so as to generate a vehicle master key which can be identified by the vehicle-mounted Bluetooth module and feed the vehicle master key back to the mobile terminal.
Preferably, after the step of encrypting the first control instruction by using a preset encryption key to generate a vehicle master key that can be identified by the vehicle-mounted bluetooth module and feed the vehicle master key back to the mobile terminal, the method further includes:
when the mobile terminal sends the vehicle master key to the vehicle-mounted Bluetooth module, communication connection with the vehicle-mounted terminal is established through the vehicle-mounted Bluetooth module, so that the vehicle-mounted terminal controls the current vehicle according to the vehicle master key.
Preferably, when a second control instruction sent by the vehicle-mounted bluetooth module is received, the step of decrypting the second control instruction and feeding the second control instruction back to the vehicle-mounted bluetooth module includes:
establishing communication connection with the vehicle-mounted Bluetooth module and receiving a second control instruction of the vehicle-mounted Bluetooth module;
and decrypting the second control instruction through a preset decryption key to generate a mobile master key which can be identified by the mobile terminal and feed the mobile master key back to the vehicle-mounted Bluetooth module.
Preferably, after the step of decrypting the second control instruction by using a preset decryption key to generate a mobile master key that can be identified by the mobile terminal and feeding the mobile master key back to the vehicle-mounted bluetooth module, the method further includes:
when the vehicle-mounted Bluetooth module sends the mobile master key to the mobile terminal, a display signal in the mobile master key is extracted through the mobile terminal and displayed in real time, wherein the display signal comprises a success prompt and a failure prompt.
Another object of the present invention is to provide a communication encryption system of bluetooth key, which comprises:
the encryption module is used for encrypting the first control instruction and feeding the encrypted first control instruction back to the mobile terminal when the first control instruction sent by the mobile terminal is received, so that the mobile terminal sends the encrypted first control instruction to the vehicle-mounted Bluetooth module;
and the decryption module is used for decrypting the second control instruction and feeding the second control instruction back to the vehicle-mounted Bluetooth module when receiving the second control instruction sent by the vehicle-mounted Bluetooth module, so that the vehicle-mounted Bluetooth module sends the decrypted second control instruction to the mobile terminal.
Among the above-mentioned communication encryption system of bluetooth key, the encryption module is specifically used for:
establishing communication connection with the mobile terminal and receiving a first control instruction sent by the mobile terminal;
and encrypting the first control instruction through a preset encryption key so as to generate a vehicle master key which can be identified by the vehicle-mounted Bluetooth module and feed back the vehicle master key to the mobile terminal.
Wherein, in the communication encryption system of above-mentioned bluetooth key, encryption module still is used for:
when the mobile terminal sends the vehicle master key to the vehicle-mounted Bluetooth module, communication connection with the vehicle-mounted terminal is established through the vehicle-mounted Bluetooth module, so that the vehicle-mounted terminal controls the current vehicle according to the vehicle master key.
In the communication encryption system of the bluetooth key, the decryption module is specifically configured to:
establishing communication connection with the vehicle-mounted Bluetooth module and receiving a second control instruction of the vehicle-mounted Bluetooth module;
and decrypting the second control instruction through a preset decryption key to generate a mobile master key which can be identified by the mobile terminal and feed the mobile master key back to the vehicle-mounted Bluetooth module.
Wherein, in the communication encryption system of above-mentioned bluetooth key, decryption module still is used for:
when the vehicle-mounted Bluetooth module sends the mobile master key to the mobile terminal, a display signal in the mobile master key is extracted through the mobile terminal and displayed in real time, wherein the display signal comprises a success prompt and a failure prompt.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
Fig. 1 is a flowchart of a communication encryption method of a bluetooth key according to a first embodiment of the present invention;
fig. 2 is a flowchart of a communication encryption method of a bluetooth key according to a second embodiment of the present invention;
fig. 3 is a block diagram of a communication encryption system of a bluetooth key according to a third embodiment of the present invention.
The following detailed description will further illustrate the invention in conjunction with the above-described figures.
Detailed Description
To facilitate an understanding of the invention, the invention will now be described more fully with reference to the accompanying drawings. Several embodiments of the invention are presented in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. The terms "vertical," "horizontal," "left," "right," and the like as used herein are for illustrative purposes only.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The existing Bluetooth key is poor in confidentiality of communication with an automobile, and the risk of user information leakage exists, so that the user experience is reduced.
Referring to fig. 1, a communication encryption method for a bluetooth key according to a first embodiment of the present invention is specifically applied between a mobile terminal, a vehicle-mounted bluetooth module, and a cryptographic machine, where the mobile terminal may be a tablet computer, a mobile phone, or a notebook computer, and the cryptographic machine is a computer, and an encryption function and a decryption function are pre-installed in the cryptographic machine.
Specifically, the communication encryption method of the bluetooth key specifically comprises the following steps:
step S10, when a first control instruction sent by a mobile terminal is received, the first control instruction is encrypted and fed back to the mobile terminal, so that the mobile terminal sends the encrypted first control instruction to a vehicle-mounted Bluetooth module;
specifically, in this embodiment, the mobile terminal is a tablet computer, which can establish a bluetooth communication connection with the vehicle-mounted bluetooth module, and it should be noted that, in order to improve the security of the communication between the mobile terminal and the vehicle-mounted bluetooth module, a cryptographic engine is further provided, and the cryptographic engine can establish a communication connection with the mobile terminal and is located between the mobile terminal and the vehicle-mounted bluetooth module.
Therefore, in this embodiment, when the first control instruction sent by the mobile terminal is received, the first control instruction is received by the cryptographic machine first, the cryptographic machine can encrypt the first control instruction and feed back the encrypted first control instruction to the original mobile terminal, and then the original mobile terminal sends the encrypted first control instruction of the cryptographic machine to the vehicle-mounted bluetooth module, so that the confidentiality of the first control instruction is greatly improved.
And step S20, when a second control instruction sent by the vehicle-mounted Bluetooth module is received, decrypting the second control instruction and feeding the second control instruction back to the vehicle-mounted Bluetooth module so that the vehicle-mounted Bluetooth module sends the decrypted second control instruction to the mobile terminal.
Specifically, in this embodiment, according to the same working principle as that of step S10, the mobile terminal is a tablet computer, which is capable of establishing a bluetooth communication connection with the vehicle-mounted bluetooth module, and the cryptographic engine is disposed between the mobile terminal and the vehicle-mounted bluetooth module.
In this embodiment, when the second control instruction sent by the vehicle-mounted bluetooth module is received, the second control instruction is received by the crypto machine first, and the crypto machine can decrypt the second control instruction and feed back the second control instruction to the original vehicle-mounted bluetooth module, and then the original vehicle-mounted bluetooth module sends the decrypted second control instruction to the mobile terminal.
When the vehicle-mounted Bluetooth module is used, a first control instruction sent by a mobile terminal is encrypted and fed back to the mobile terminal, so that the mobile terminal sends the encrypted first control instruction to the vehicle-mounted Bluetooth module; in addition, the second control instruction sent by the vehicle-mounted Bluetooth module is decrypted and fed back to the vehicle-mounted Bluetooth module, so that the vehicle-mounted Bluetooth module sends the decrypted second control instruction to the mobile terminal. Through the mode, the control instructions sent by the mobile terminal and the vehicle-mounted Bluetooth module can be encrypted and decrypted respectively, so that the confidentiality of communication between the mobile terminal and the vehicle-mounted Bluetooth module can be greatly improved, the communication confidentiality between the Bluetooth key and an automobile is correspondingly greatly improved, and the use experience of a user is improved.
It should be noted that the above implementation procedure is only for illustrating the applicability of the present application, but this does not represent that the communication encryption method of the bluetooth key of the present application has only the above implementation procedure, and on the contrary, the communication encryption method of the bluetooth key of the present application can be incorporated into the feasible embodiments of the present application as long as the communication encryption method of the bluetooth key of the present application can be implemented.
In summary, the communication encryption method for the bluetooth key in the above embodiments of the present invention can encrypt and decrypt the control commands sent by the mobile terminal and the vehicle-mounted bluetooth module respectively, so as to greatly increase the security of communication between the mobile terminal and the vehicle-mounted bluetooth module, correspondingly greatly improve the security of communication between the bluetooth key and the vehicle, and improve the user experience.
Referring to fig. 2, a communication encryption method for a bluetooth key according to a second embodiment of the present invention is shown, which includes the following steps:
step S11, establishing communication connection with the mobile terminal and receiving a first control instruction sent by the mobile terminal; and encrypting the first control instruction through a preset encryption key so as to generate a vehicle master key which can be identified by the vehicle-mounted Bluetooth module and feed the vehicle master key back to the mobile terminal.
In this embodiment, it should be noted that, the mobile terminal is a tablet computer, and in order to enable the cryptographic machine to receive the control instruction sent by the mobile terminal, first, a communication connection between the mobile terminal and the cryptographic machine and a communication connection between the mobile terminal and the vehicle-mounted bluetooth module are established.
When the communication connection of the mobile terminal, the vehicle-mounted Bluetooth module and the cipher machine is established, the cipher machine can immediately receive a first control instruction sent by the mobile terminal to the vehicle-mounted Bluetooth module, and the first control instruction is encrypted.
Specifically, an encryption key is preset in the cryptographic machine, and the encryption key includes a root key GMPK, so that during operation, the first control instruction can be encrypted through the encryption key, a vehicle master key that can be identified by the vehicle-mounted bluetooth module is generated, and the vehicle master key is fed back to the mobile terminal.
And step S21, when the mobile terminal sends the vehicle master key to the vehicle-mounted Bluetooth module, establishing communication connection with the vehicle-mounted terminal through the vehicle-mounted Bluetooth module so that the vehicle-mounted terminal controls the current vehicle according to the vehicle master key.
In this embodiment, when the mobile terminal receives the vehicle master key fed back by the cryptographic machine, the mobile terminal immediately sends the vehicle master key to the vehicle-mounted bluetooth module.
When the vehicle-mounted Bluetooth module receives the vehicle master key, the vehicle-mounted terminal is immediately awakened and communication connection with the vehicle-mounted terminal is established, so that the vehicle-mounted terminal controls the current vehicle according to the vehicle master key, and remote control of the vehicle by the Bluetooth key can be completed.
Step S31, establishing communication connection with the vehicle-mounted Bluetooth module and receiving a second control instruction of the vehicle-mounted Bluetooth module; and decrypting the second control instruction through a preset decryption key to generate a mobile master key which can be identified by the mobile terminal and feed the mobile master key back to the vehicle-mounted Bluetooth module.
Specifically, in this embodiment, it should be noted that the operation principle of this step is similar to that of step S11, the mobile terminal is a tablet computer, and in order to enable the cryptographic machine to receive the control instruction sent by the mobile terminal, first, the communication connection between the mobile terminal and the cryptographic machine is established, and the communication connection between the mobile terminal and the vehicle-mounted bluetooth module is established.
When the password machine works, the password machine can receive a second control instruction sent to the mobile terminal by the vehicle-mounted Bluetooth module, and the second control instruction is decrypted.
Specifically, a decryption key is preset in the cipher machine, the decryption key also includes a root key GMPK, and in operation, the decryption key can decrypt the second control instruction, generate a mobile master key that can be identified by the mobile terminal, and feed back the mobile master key to the vehicle-mounted bluetooth module.
And step S41, when the vehicle-mounted Bluetooth module sends the mobile master key to the mobile terminal, extracting a display signal in the mobile master key through the mobile terminal and displaying the display signal in real time, wherein the display signal comprises a success prompt and a failure prompt.
In this embodiment, it can be understood that, when the vehicle-mounted bluetooth module receives the mobile master key fed back by the cryptographic engine, the vehicle-mounted bluetooth module immediately sends the mobile master key to the mobile terminal.
When the mobile terminal receives the mobile master key, the display signal in the mobile master key can be immediately extracted and displayed in real time, and the display signal comprises a success prompt and a failure prompt, so that a user can clearly know whether a vehicle executes a corresponding action according to a control instruction sent by the mobile terminal, and the success prompt is displayed when the vehicle is executed successfully; when the execution fails, a failure prompt is displayed.
It should be noted that, the method provided by the second embodiment of the present invention, which implements the same principle and produces some technical effects as the first embodiment, can refer to the corresponding contents in the first embodiment for the sake of brief description, where this embodiment is not mentioned.
In summary, the communication encryption method for the bluetooth key in the above embodiments of the present invention can encrypt and decrypt the control commands sent by the mobile terminal and the vehicle-mounted bluetooth module respectively, so as to greatly increase the security of the communication between the mobile terminal and the vehicle-mounted bluetooth module, correspondingly greatly improve the security of the communication between the bluetooth key and the vehicle, and improve the user experience.
Referring to fig. 3, a communication encryption system of a bluetooth key according to a third embodiment of the present invention is shown, and the system specifically includes:
the encryption module 12 is configured to, when receiving a first control instruction sent by a mobile terminal, encrypt the first control instruction and feed the encrypted first control instruction back to the mobile terminal, so that the mobile terminal sends the encrypted first control instruction to the vehicle-mounted bluetooth module;
and the decryption module 22 is configured to, when receiving a second control instruction sent by the vehicle-mounted bluetooth module, decrypt the second control instruction and feed the second control instruction back to the vehicle-mounted bluetooth module, so that the vehicle-mounted bluetooth module sends the decrypted second control instruction to the mobile terminal.
In the communication encryption system of the bluetooth key, the encryption module 12 is specifically configured to:
establishing communication connection with the mobile terminal and receiving a first control instruction sent by the mobile terminal;
and encrypting the first control instruction through a preset encryption key so as to generate a vehicle master key which can be identified by the vehicle-mounted Bluetooth module and feed the vehicle master key back to the mobile terminal.
In the communication encryption system of the bluetooth key, the encryption module 12 is further configured to:
when the mobile terminal sends the vehicle master key to the vehicle-mounted Bluetooth module, communication connection with the vehicle-mounted terminal is established through the vehicle-mounted Bluetooth module, so that the vehicle-mounted terminal controls the current vehicle according to the vehicle master key.
In the communication encryption system of the bluetooth key, the decryption module 22 is specifically configured to:
establishing communication connection with the vehicle-mounted Bluetooth module and receiving a second control instruction of the vehicle-mounted Bluetooth module;
and decrypting the second control instruction through a preset decryption key to generate a mobile master key which can be identified by the mobile terminal and feed the mobile master key back to the vehicle-mounted Bluetooth module.
In the above communication encryption system using a bluetooth key, the decryption module 22 is further configured to:
when the vehicle-mounted Bluetooth module sends the mobile master key to the mobile terminal, a display signal in the mobile master key is extracted through the mobile terminal and displayed in real time, wherein the display signal comprises a success prompt and a failure prompt.
In summary, the communication encryption method and system for the bluetooth key in the embodiments of the present invention can encrypt and decrypt the control commands sent by the mobile terminal and the vehicle-mounted bluetooth module, so as to greatly increase the security of the communication between the mobile terminal and the vehicle-mounted bluetooth module, correspondingly greatly improve the security of the communication between the bluetooth key and the vehicle, and improve the user experience.
The logic and/or steps represented in the flowcharts or otherwise described herein, such as an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following technologies, which are well known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
In the description of the specification, reference to the description of "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the present invention. It should be noted that various changes and modifications can be made by those skilled in the art without departing from the spirit of the invention, and these changes and modifications are all within the scope of the invention. Therefore, the protection scope of the present patent should be subject to the appended claims.
Claims (2)
1. A communication encryption method of a Bluetooth key is applied to a cipher machine, and is characterized by comprising the following steps:
when a first control instruction sent by a mobile terminal is received, encrypting the first control instruction and feeding back the encrypted first control instruction to the mobile terminal so that the mobile terminal sends the encrypted first control instruction to a vehicle-mounted Bluetooth module;
when a second control instruction sent by the vehicle-mounted Bluetooth module is received, the second control instruction is decrypted and fed back to the vehicle-mounted Bluetooth module, so that the vehicle-mounted Bluetooth module sends the decrypted second control instruction to the mobile terminal;
when a first control instruction sent by the mobile terminal is received, the step of encrypting the first control instruction and feeding the encrypted first control instruction back to the mobile terminal comprises the following steps:
establishing communication connection with the mobile terminal and receiving a first control instruction sent by the mobile terminal;
encrypting the first control instruction through a preset encryption key to generate a vehicle master key which can be identified by the vehicle-mounted Bluetooth module and feed back the vehicle master key to the mobile terminal;
after the step of encrypting the first control instruction through a preset encryption key to generate a vehicle master key which can be identified by the vehicle-mounted bluetooth module and feeding the vehicle master key back to the mobile terminal, the method further includes:
when the mobile terminal sends the vehicle master key to the vehicle-mounted Bluetooth module, communication connection with the vehicle-mounted terminal is established through the vehicle-mounted Bluetooth module, so that the vehicle-mounted terminal controls a current vehicle according to the vehicle master key;
when receiving a second control instruction sent by the vehicle-mounted Bluetooth module, the step of decrypting the second control instruction and feeding back the second control instruction to the vehicle-mounted Bluetooth module comprises the following steps:
establishing communication connection with the vehicle-mounted Bluetooth module and receiving a second control instruction of the vehicle-mounted Bluetooth module;
decrypting the second control instruction through a preset decryption key to generate a mobile master key which can be identified by the mobile terminal and feed the mobile master key back to the vehicle-mounted Bluetooth module;
after the step of decrypting the second control instruction by using a preset decryption key to generate a mobile master key which can be identified by the mobile terminal and feeding the mobile master key back to the vehicle-mounted bluetooth module, the method further comprises:
when the vehicle-mounted Bluetooth module sends the mobile master key to the mobile terminal, a display signal in the mobile master key is extracted through the mobile terminal and displayed in real time, wherein the display signal comprises a success prompt and a failure prompt.
2. A communication encryption system for a bluetooth key, the system comprising:
the encryption module is used for encrypting the first control instruction and feeding the encrypted first control instruction back to the mobile terminal when the first control instruction sent by the mobile terminal is received, so that the mobile terminal sends the encrypted first control instruction to the vehicle-mounted Bluetooth module;
the decryption module is used for decrypting the second control instruction and feeding the second control instruction back to the vehicle-mounted Bluetooth module when receiving the second control instruction sent by the vehicle-mounted Bluetooth module, so that the vehicle-mounted Bluetooth module sends the decrypted second control instruction to the mobile terminal;
the encryption module is specifically configured to:
establishing communication connection with the mobile terminal and receiving a first control instruction sent by the mobile terminal;
encrypting the first control instruction through a preset encryption key to generate a vehicle master key which can be identified by the vehicle-mounted Bluetooth module and feed the vehicle master key back to the mobile terminal;
the encryption module is further configured to:
when the mobile terminal sends the vehicle master key to the vehicle-mounted Bluetooth module, communication connection with the vehicle-mounted terminal is established through the vehicle-mounted Bluetooth module, so that the vehicle-mounted terminal controls the current vehicle according to the vehicle master key;
the decryption module is specifically configured to:
establishing communication connection with the vehicle-mounted Bluetooth module and receiving a second control instruction of the vehicle-mounted Bluetooth module;
decrypting the second control instruction through a preset decryption key to generate a mobile master key which can be identified by the mobile terminal and feed the mobile master key back to the vehicle-mounted Bluetooth module;
the decryption module is further configured to:
when the vehicle-mounted Bluetooth module sends the mobile master key to the mobile terminal, a display signal in the mobile master key is extracted through the mobile terminal and displayed in real time, wherein the display signal comprises a success prompt and a failure prompt.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110583986.XA CN113347597B (en) | 2021-05-27 | 2021-05-27 | Communication encryption method and system of Bluetooth key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110583986.XA CN113347597B (en) | 2021-05-27 | 2021-05-27 | Communication encryption method and system of Bluetooth key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113347597A CN113347597A (en) | 2021-09-03 |
CN113347597B true CN113347597B (en) | 2022-07-15 |
Family
ID=77471708
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110583986.XA Active CN113347597B (en) | 2021-05-27 | 2021-05-27 | Communication encryption method and system of Bluetooth key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113347597B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105635951A (en) * | 2016-01-19 | 2016-06-01 | 广州市云剑电子技术有限公司 | Data transmission control method based on Bluetooth |
CN110481502A (en) * | 2019-08-05 | 2019-11-22 | 浙江合众新能源汽车有限公司 | Automobile short range unlocking method and system based on bluetooth |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9241235B2 (en) * | 2013-03-14 | 2016-01-19 | Voxx International Corporation | Passive entry cell phone and method and system therefor |
CN107426670B (en) * | 2017-04-28 | 2020-01-03 | 恒宝股份有限公司 | Bluetooth encryption communication system and communication method |
CN107689098A (en) * | 2017-09-05 | 2018-02-13 | 上海博泰悦臻电子设备制造有限公司 | The implementation method and system of bluetooth car key |
CN114999029A (en) * | 2020-04-01 | 2022-09-02 | 支付宝(杭州)信息技术有限公司 | Vehicle unlocking method and system |
CN111447601B (en) * | 2020-04-07 | 2023-06-20 | 北京四维智联科技有限公司 | Implementation method and device of automobile Bluetooth key |
-
2021
- 2021-05-27 CN CN202110583986.XA patent/CN113347597B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105635951A (en) * | 2016-01-19 | 2016-06-01 | 广州市云剑电子技术有限公司 | Data transmission control method based on Bluetooth |
CN110481502A (en) * | 2019-08-05 | 2019-11-22 | 浙江合众新能源汽车有限公司 | Automobile short range unlocking method and system based on bluetooth |
Also Published As
Publication number | Publication date |
---|---|
CN113347597A (en) | 2021-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109862040B (en) | Security authentication method and authentication system | |
EP3885204B1 (en) | Automobile control method and device based on nfc automobile key, automobile and storage medium | |
EP3723399A1 (en) | Identity verification method and apparatus | |
EP3648396B1 (en) | Maintenance system and maintenance method | |
CN106713264A (en) | Method for vehicle safety remote control and diagnosis and system thereof | |
CN103502057B (en) | Vehicle communication device | |
CN103037370A (en) | Portable storage device and identity authentication method | |
CN113722699A (en) | Identity authentication method and device, readable storage medium and vehicle | |
CN113591057B (en) | Biological characteristic off-line identity recognition method and system | |
CN110933109A (en) | Dynamic small program authentication method and device | |
CN112950813A (en) | Intelligent lock device, scooter, intelligent lock body control method thereof and storage medium | |
CN113674456A (en) | Unlocking method, unlocking device, electronic equipment and storage medium | |
CN113556710A (en) | Vehicle Bluetooth key method and device and vehicle | |
CN115242634A (en) | Software upgrading method, device and storage medium | |
CN114999031A (en) | Key management method for Bluetooth key safety vehicle control | |
CN113179258B (en) | Vehicle-mounted data encryption method based on multi-encryption algorithm | |
CN113347597B (en) | Communication encryption method and system of Bluetooth key | |
CN114290942A (en) | Charging control method and device based on Bluetooth, readable storage medium and equipment | |
CN111865602B (en) | Intelligent energy service system heterogeneous terminal multiparty authentication method and system | |
CN111200807B (en) | Bluetooth-based information interaction method and device | |
CN111464293A (en) | Data sending method, data receiving method, storage medium and terminal equipment | |
CN111476924A (en) | Vehicle door state display method and mobile terminal | |
CN115696321A (en) | Method and system for filling secret key of digital key | |
CN104929443A (en) | Intelligent lock and opening method and device thereof | |
CN112214753A (en) | Authentication method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |