CN114257999A - Method for accessing Bluetooth sharing equipment to network cloud by virtue of mobile phone - Google Patents

Method for accessing Bluetooth sharing equipment to network cloud by virtue of mobile phone Download PDF

Info

Publication number
CN114257999A
CN114257999A CN202111436174.9A CN202111436174A CN114257999A CN 114257999 A CN114257999 A CN 114257999A CN 202111436174 A CN202111436174 A CN 202111436174A CN 114257999 A CN114257999 A CN 114257999A
Authority
CN
China
Prior art keywords
sharing device
string
bluetooth
bluetooth sharing
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111436174.9A
Other languages
Chinese (zh)
Inventor
周明森
熊运自
曾宏清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou Gaoshengda Technology Co Ltd
Original Assignee
Huizhou Gaoshengda Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou Gaoshengda Technology Co Ltd filed Critical Huizhou Gaoshengda Technology Co Ltd
Priority to CN202111436174.9A priority Critical patent/CN114257999A/en
Publication of CN114257999A publication Critical patent/CN114257999A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/047Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
    • H04W12/0471Key exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for accessing a Bluetooth sharing device to a network cloud by a mobile phone, which comprises the following steps that a mobile terminal is in Bluetooth connection with the Bluetooth sharing device; the mobile terminal generates a first character string and sends the first character string to the Bluetooth sharing device; the Bluetooth sharing equipment generates a second character string and sends the second character string and the MAC address to the mobile terminal; the mobile terminal and the Bluetooth sharing equipment generate a temporary communication key according to the first character string and the second character string; the mobile terminal sends an MAC address to the network cloud end and requests an encryption key for communication between the network cloud end and the Bluetooth sharing device; and the Bluetooth sharing device decrypts the second network character string to obtain a first network character string, and decrypts the first network character string to obtain a key character string used by the network cloud and the Bluetooth sharing device, so that the mobile terminal is in communication connection with the Bluetooth sharing device and the network cloud. The invention can enable the Bluetooth sharing equipment to carry out data communication with the network cloud end, and improves the reliability and the safety of data transmission.

Description

Method for accessing Bluetooth sharing equipment to network cloud by virtue of mobile phone
Technical Field
The invention relates to the field of internet security communication methods, in particular to a method for accessing a Bluetooth sharing device to a network cloud by means of a mobile phone.
Background
With the continuous development of the internet of things, sharing devices are more and more, each sharing device must be accessed to the cloud to complete charging authorization management, however, for the sharing devices only with bluetooth communication, the sharing devices only with bluetooth communication are required to be accessed to the internet and must be realized by other devices, generally mobile phones, but at present, the connection of the mobile phone network to the cloud is not very safe, and two problems are not well solved, namely, 1, how to confirm that the mobile phone APP has the authority to operate the device, but not the mobile phone APP which is pretended; 2. communication data of the cloud and the Bluetooth sharing device need to be forwarded by means of the mobile phone APP, and the Bluetooth sharing identifies how to identify whether the data is tampered in the forwarding process of the mobile phone APP and whether the instruction is issued by the cloud.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, and provides a method for accessing a Bluetooth sharing device to a network cloud end by a mobile phone, so that the Bluetooth sharing device can carry out data communication with the network cloud end, and the reliability and the safety of data transmission are improved.
The purpose of the invention is realized by the following technical scheme:
a method for accessing a Bluetooth sharing device to a network cloud by means of a mobile phone comprises the following steps:
the mobile terminal is connected with the Bluetooth sharing device through Bluetooth;
the mobile terminal generating a first string str1 and transmitting the first string str1 to the Bluetooth sharing device;
the Bluetooth sharing device generating a second string str2 and transmitting the second string str2 and the MAC address to the mobile terminal;
the mobile terminal and the Bluetooth sharing device generate a temporary communication key Tkey according to a first string str1 and a second string str 2;
the mobile terminal sends the MAC address to a network cloud end and requests an encryption key Dkey of the communication between the network cloud end and the Bluetooth sharing device;
the network cloud generates a Key string Key, and the network cloud sends a first network string Key1 to the mobile terminal;
the mobile terminal acquires the first network string Key1, encrypts the first network string Key1 through a temporary communication Key Tkey to generate a second network string Key2, and then sends the second network string Key2 to the bluetooth sharing device;
the Bluetooth sharing device decrypts the second network string Key2 through the temporary communication Key Tkey to obtain a first network string Key1, and then decrypts the first network string Key1 through the encryption Key Dkey to obtain a Key string Key used by the network cloud and the Bluetooth sharing device for communication control, so that the mobile terminal is in communication connection with the Bluetooth sharing device and the network cloud.
In one embodiment, the step of performing bluetooth connection between the mobile terminal and the bluetooth sharing device specifically includes:
s110, the mobile terminal opens a Bluetooth connection;
s120, the Bluetooth sharing equipment opens Bluetooth connection;
s130, the mobile terminal and the Bluetooth sharing device are connected in a matching mode through a Bluetooth protocol.
In one embodiment, the step of generating the first character string str1 by the mobile terminal specifically includes:
the mobile terminal generates a random first string str1 of 8 bytes.
In one embodiment, the step of generating the first character string str1 by the bluetooth sharing device specifically includes:
the bluetooth sharing device generates a random second string str2 of 8 bytes.
In one embodiment, the MAC address is a MAC address of the bluetooth sharing device.
In one embodiment, the step of sending the MAC address to a network cloud and requesting an encryption key Dkey for the network cloud to communicate with the bluetooth sharing device further includes:
and the network cloud and the Bluetooth sharing device generate an encryption key Dkey used in the handshaking process according to the first character string str1, the second character string str2 and the MAC address.
In one embodiment, the internet cloud and the bluetooth sharing device generate an encryption key Dkey used in the handshake process according to the first string str1, the second string str2, and the MAC address according to an algorithm agreed between the internet cloud and the bluetooth sharing device.
In one embodiment, the mobile terminal is a mobile phone, a tablet or a notebook computer.
In one embodiment, the step of decrypting, by the bluetooth sharing device, the second network string Key2 by using the temporary communication Key Tkey to obtain the first network string Key1 further includes:
and performing data verification on the first network string Key1, and if the data verification is wrong, not performing decryption operation.
In one embodiment, the step of decrypting the first network string Key1 by using the encryption Key Dkey to obtain the Key string Key used by the cloud and the bluetooth sharing device for communication control further includes:
and carrying out data verification on the Key string Key, and if the data verification is wrong, not carrying out handshake operation.
Compared with the prior art, the invention has the following advantages and beneficial effects:
the invention relates to a method for accessing a Bluetooth sharing device to a network cloud end by a mobile phone, which is characterized in that a first character string str1 is arranged on a mobile terminal, a second character string str2 is arranged on the Bluetooth sharing device, and a temporary communication key Tkey is generated according to the two character strings. And moreover, the encryption key Dkey is set when the network cloud end communicates with the Bluetooth sharing device, so that the cracking difficulty can be improved, and the connection safety and reliability can be further improved.
Drawings
Fig. 1 is a flowchart of a method for a bluetooth sharing device to access a network cloud via a mobile phone according to an embodiment of the present invention.
Detailed Description
To facilitate an understanding of the invention, the invention will now be described more fully with reference to the accompanying drawings. Preferred embodiments of the present invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Referring to fig. 1, a method for a bluetooth sharing device to access a cloud via a mobile phone includes the following steps:
s100, the mobile terminal is in Bluetooth connection with Bluetooth sharing equipment; in this embodiment, the mobile terminal is a mobile phone, a tablet, or a notebook computer. Specifically, the mobile terminal in the present application takes APP in a mobile phone as an example.
S200, the mobile terminal generates a first character string str1 and sends the first character string str1 to the Bluetooth sharing device;
s300, the Bluetooth sharing device generates a second string str2 and sends the second string str2 and the MAC address to the mobile terminal;
s400, the mobile terminal and the Bluetooth sharing device generate a temporary communication key Tkey according to a first string str1 and a second string str 2; it should be noted that the mobile terminal and the bluetooth sharing device generate the temporary communication key Tkey for communication therebetween according to the agreed algorithm based on the two character strings.
S500, the mobile terminal sends the MAC address to a network cloud and requests an encryption key Dkey of the communication between the network cloud and the Bluetooth sharing device;
s600, the network cloud generates a Key string Key, and sends a first network string Key1 to the mobile terminal; it should be noted that the network cloud generates the Key string Key as a Key for communication control between the subsequent network cloud and the bluetooth sharing device.
S700, the mobile terminal acquires the first network string Key1, encrypts the first network string Key1 through a temporary communication Key Tkey to generate a second network string Key2, and then sends the second network string Key2 to the Bluetooth sharing equipment;
s800, the Bluetooth sharing device decrypts the second network character string Key2 through the temporary communication Key Tkey to obtain a first network character string Key1, and then decrypts the first network character string Key1 through the encryption Key Dkey to obtain a Key character string Key used by the network cloud and the Bluetooth sharing device for communication control, so that the mobile terminal is in communication connection with the Bluetooth sharing device and the network cloud. Specifically, the encryption operation is to perform a DES encryption operation, and the decryption operation is to perform a DES decryption operation.
It should be noted that the step of performing bluetooth connection between the mobile terminal and the bluetooth sharing device specifically includes: s110, the mobile terminal opens a Bluetooth connection; s120, the Bluetooth sharing equipment opens Bluetooth connection; s130, the mobile terminal and the Bluetooth sharing device are connected in a matching mode through a Bluetooth protocol.
In this way, by setting the first string str1 in the mobile terminal, setting the second string str2 in the bluetooth sharing device, and generating the temporary communication key Tkey according to the two strings, since the temporary communication key Tkey is agreed between the mobile terminal and the bluetooth sharing device, the negotiation algorithm is only clear for the mobile terminal and the bluetooth sharing device, and thus the security during connection can be ensured. And moreover, the encryption key Dkey is set when the network cloud end communicates with the Bluetooth sharing device, so that the cracking difficulty can be improved, and the connection safety and reliability can be further improved.
In this embodiment, the step of generating the first character string str1 by the mobile terminal specifically includes: the mobile terminal generates a random first string str1 of 8 bytes. The step of generating the first character string str1 by the bluetooth sharing device is specifically as follows: the bluetooth sharing device generates a random second string str2 of 8 bytes. Further, the MAC address is a MAC address of the bluetooth sharing device. Therefore, the MAC addresses of the first character string str1, the second character string str2 and the Bluetooth sharing device are generated randomly, and the generation is different every time, so that the uncertainty is brought to password cracking, the difficulty is increased, and the safety is improved.
It should be noted that, before the step of sending the MAC address to a network cloud and requesting an encryption key Dkey for communication between the network cloud and the bluetooth sharing device, the mobile terminal further includes:
and the network cloud and the Bluetooth sharing device generate an encryption key Dkey used in the handshaking process according to the first character string str1, the second character string str2 and the MAC address.
In this embodiment, the internet cloud and the bluetooth sharing device generate an encryption key Dkey used in the handshake process according to the first string str1, the second string str2, and the MAC address according to an algorithm agreed between the internet cloud and the bluetooth sharing device.
It should be noted that the step of decrypting, by the bluetooth sharing device, the second network string Key2 by using the temporary communication Key Tkey to obtain the first network string Key1 further includes: and performing data verification on the first network string Key1, and if the data verification is wrong, not performing decryption operation.
It should be noted that the step of decrypting the first network string Key1 by using the encryption Key Dkey to obtain the Key string Key used by the communication control between the network cloud and the bluetooth sharing device further includes: and carrying out data verification on the Key string Key, and if the data verification is wrong, not carrying out handshake operation.
It can be understood that, if the data packet sent by the bluetooth sharing device in step 300 is captured by the bluetooth packet capturing tool, and the corresponding bluetooth packet capturing tool itself simulates the bluetooth sharing device to cheat the mobile phone APP, it must know the random string str1 sent by the mobile phone APP, and must also know how to generate the temporary communication key Tkey between str1 and str2 with the algorithm agreed with the mobile phone APP, otherwise, the subsequent mobile phone APP cannot decrypt when replying data; the first string str1 is easily caught by a packet, but the negotiation algorithm between them is unknown, and also if the mobile phone APP received in step 300 is impersonated, it cannot generate Dkey, so that the subsequent bluetooth sharing device must decrypt the data check error when decrypting Key2 by using the temporary communication Key Tkey, so as to exclude that it is not a legitimate mobile phone APP. Therefore, it is very difficult for an illegal mobile phone terminal to impersonate a legal APP to cheat the Bluetooth sharing device, and it is also very difficult for the same phishing Bluetooth sharing device to cheat the mobile phone APP; how to confirm the authenticity of the cloud by the Bluetooth sharing device is, a pseudo cloud may exist to cheat the device, the network cloud wants to cheat the Bluetooth sharing device, and therefore it needs to know the rule for generating the encryption key Dkey, obviously, the rule for generating the encryption key Dkey is a legal cloud, and the rule which is in agreement with the legal Bluetooth sharing device is not public, so that it is very difficult to know the rule, and the generated data depends on the MAC addresses of the first string str1, the second string str2 and the Bluetooth sharing device, and the MAC addresses are different from one another and are a random value. The method is characterized in that the method relies on the generation of the three random character strings, so that great difficulty is brought to cracking, the situation that an illegal cloud wants to cheat the Bluetooth sharing device is basically impossible, the safety of the method cannot be influenced even if the mobile terminal and the network cloud cheat each other, and finally returned data need the Bluetooth sharing device to decrypt, and as long as the data do not correspond to each other, the Dkey of the data is wrong, so that the data needing the Bluetooth sharing device to decrypt in the last step are verified, the data are found to be wrong, and the wrong network character string Key cannot be used, so that the handshaking process of the method is very safe.
The method for the Bluetooth sharing device to access the network cloud by means of the mobile phone further comprises a communication control step. The communication control step specifically includes:
the mobile terminal (for example, a mobile phone APP below) scans a sharing bar code of the Bluetooth sharing device to request for obtaining the use authorization, and when the authorization passes through obtaining the authorization response information MSG, the authorization response information MSG is subjected to DES encryption through a temporary communication key TKey to generate first authorization response information MGS 1; specifically, the DES encryption is an encryption algorithm of the data encryption system of IBM corporation.
The mobile phone APP sends the encrypted first authorization response message MSG 1. Thus, the purpose of this one-step encryption is to prevent the bluetooth sharing device from being spoofed by an illegal mobile phone APP.
The Bluetooth sharing device carries out DES decryption on the received first authorization response message MSG1 through the temporary communication key Tkey to obtain the authorization response message MSG. It should be noted that if the decrypted data check fails, the APP of the sent data is considered to be a fake mobile phone APP, and the data is no longer processed; after the verification is passed, the authorization response message MSG is subjected to DES encryption through the Key character string Key to generate a second authorization response message MSG 2. Furthermore, the purpose of encryption is two points, which can prevent the bluetooth sharing device from being intercepted or tampered in the transmission process through the data communicated with the internet cloud, and can also be used for judging whether the data is the data sent by the legal bluetooth sharing device after the internet cloud receives the data, and then performing DES encryption on the second authorization response information MSG2 through the temporary communication key Tkey to generate the third authorization response information MSG 3. So, set up the step of encrypting, prevent that the bluetooth from grabbing a packet instrument and grabbing a packet interception bluetooth data to the analysis data package is cracked, and illegal cell-phone APP wants to analyze data also meaninglessly after receiving data, and it must know interim communication key Tkey and just can decrypt, thereby has improved the security.
The Bluetooth sharing device sends the third authorization response information MSG3 to the mobile phone APP, and the third authorization response information MSG3 is subjected to DES decryption through the temporary communication key Tkey to obtain the second authorization response information MSG2, so that the mobile phone APP can prevent counterfeit Bluetooth sharing devices, and if the decrypted data check fails, the received Bluetooth sharing devices are likely to be counterfeit, and the data are not forwarded.
The mobile phone APP sends the MSG2 to the cloud, the network cloud receives the second authorization response message MSG2, the second authorization response message MSG2 is subjected to DES decryption through the encryption Key Key to obtain authorization response message MSG, the authorization message of the mobile phone APP is verified, the verification is passed, and a corresponding control command CMD is generated; it should be noted that the control command CMD performs DES encryption through the encryption Key to generate the first encryption control command CMD1, so that encryption can only be performed by the current bluetooth sharing device to have the encryption Key for decryption, the mobile phone APP receives the first encryption control command CMD1, but does not know what the first encryption control command CMD1 means, and even if the data packet is illegally intercepted and tampered, the security of network connection is improved.
The network cloud terminal issues a first encryption control command CMD1 to the mobile phone APP, the mobile phone APP carries out DES encryption on the first encryption control command CMD1 through the temporary communication key Tkey to obtain a second encryption control command CMD2, and therefore fake APP deception Bluetooth sharing equipment can be prevented.
The mobile phone APP sends a second encryption control command CMD2 to the Bluetooth sharing device, the Bluetooth sharing device performs DES decryption on the second encryption control command CMD2 through a temporary communication Key Tkey to obtain a first encryption control command CMD1, after the decrypted data passes verification, the first encryption control command CMD1 performs DES decryption through an encryption Key to obtain an encryption control command CMD, after the verification passes, the command action of the encryption control command CMD is responded, and if the verification does not pass the non-response action. Here, if the cloud is fake, the encryption control command CMD is not checked, and if the cloud is fake, the first encryption control command CMD1 is not checked.
The Bluetooth sharing equipment generates a reply command RCMD, DES encryption is carried out through a Key character string Key, the reply command RCMD generates a ciphertext first reply command RCMD1, and DES encryption is carried out on the first reply command RCMD1 again through a temporary communication Key Tkey to generate a second reply command RCMD 2; the encryption is carried out twice, legal Bluetooth sharing equipment is used for sending the data when the mobile phone APP is informed of communication data at one time, the network cloud is informed of sending the data by the legal Bluetooth sharing equipment at the other time, and meanwhile, the situation that the integrity of the data cannot be determined after the data is received by the opposite side caused by interception and tampering of a data packet in the sending process is avoided.
The Bluetooth sharing device sends a second reply instruction RCMD2 to the mobile phone APP, the second reply instruction of the mobile phone APP decrypts the RCMD2 ciphertext through the encryption key Tkey to obtain a first reply instruction RCMD1, and the first reply instruction RCMD1 is sent to the cloud end of the network after the decryption verification is passed, so that the Bluetooth sharing device is prevented from being counterfeited.
The mobile phone APP sends the first reply instruction RCMD1 to the internet cloud, the internet cloud carries out DES decryption on the first reply instruction RCMD1 through the encryption Key Key to obtain the reply instruction RCMD, and after data verification is passed, operation corresponding to the reply instruction RCMD of the Bluetooth sharing device is executed.
The communication process is controlled, the mobile phone cannot directly send data to the network cloud, and the data correspondingly sent by the mobile phone can be sent to the network cloud only after being subjected to DES (data encryption Standard) encryption by the Bluetooth sharing device through the encryption Key Key. However, the encryption Key is only available in the bluetooth sharing device, and the mobile phone APP does not exist, so that although the bluetooth sharing device is connected with the network cloud by means of the mobile phone network in the whole process, the mobile phone APP also cannot decrypt information of mutual communication between the cloud and the bluetooth sharing device, so that the mobile phone APP owner is not afraid of cracking the whole encryption process. In the communication control process, the Bluetooth sharing equipment is in the anti-counterfeiting cloud end and the anti-counterfeiting mobile phone APP, the mobile phone APP is also in the anti-counterfeiting Bluetooth sharing equipment, and the network cloud end is also in the anti-counterfeiting Bluetooth sharing equipment. Finally, the Bluetooth sharing device really works, so that as long as the Bluetooth sharing device prevents counterfeiting of the APP and counterfeiting of the cloud end of the network, other people can be prevented from using the Bluetooth sharing device without authorization of the cloud end of the network of the Bluetooth sharing device, and the method is high in safety.
The above embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for accessing a Bluetooth sharing device to a network cloud by a mobile phone is characterized by comprising the following steps:
the mobile terminal is connected with the Bluetooth sharing device through Bluetooth;
the mobile terminal generating a first string str1 and transmitting the first string str1 to the Bluetooth sharing device;
the Bluetooth sharing device generating a second string str2 and transmitting the second string str2 and the MAC address to the mobile terminal;
the mobile terminal and the Bluetooth sharing device generate a temporary communication key Tkey according to a first string str1 and a second string str 2;
the mobile terminal sends the MAC address to a network cloud end and requests an encryption key Dkey of the communication between the network cloud end and the Bluetooth sharing device;
the network cloud generates a Key string Key, and the network cloud sends a first network string Key1 to the mobile terminal;
the mobile terminal acquires the first network string Key1, encrypts the first network string Key1 through a temporary communication Key Tkey to generate a second network string Key2, and then sends the second network string Key2 to the bluetooth sharing device;
the Bluetooth sharing device decrypts the second network string Key2 through the temporary communication Key Tkey to obtain a first network string Key1, and then decrypts the first network string Key1 through the encryption Key Dkey to obtain a Key string Key used by the network cloud and the Bluetooth sharing device for communication control, so that the mobile terminal is in communication connection with the Bluetooth sharing device and the network cloud.
2. The method for accessing the internet cloud by the bluetooth sharing device through the mobile phone according to claim 1, wherein the step of performing bluetooth connection between the mobile terminal and the bluetooth sharing device specifically comprises:
s110, the mobile terminal opens a Bluetooth connection;
s120, the Bluetooth sharing equipment opens Bluetooth connection;
s130, the mobile terminal and the Bluetooth sharing device are connected in a matching mode through a Bluetooth protocol.
3. The method for the bluetooth sharing device to access the internet cloud via the mobile phone according to claim 1, wherein the step of the mobile terminal generating the first string str1 specifically comprises:
the mobile terminal generates a random first string str1 of 8 bytes.
4. The method for the bluetooth sharing device to access the internet cloud via the mobile phone according to claim 1, wherein the step of the bluetooth sharing device generating the first string str1 specifically includes:
the bluetooth sharing device generates a random second string str2 of 8 bytes.
5. The method of claim 1, wherein the MAC address is a MAC address of the bluetooth sharing device.
6. The method for accessing the internet cloud by the bluetooth sharing device via the mobile phone according to claim 1, wherein the step of sending the MAC address to the internet cloud by the mobile terminal and requesting the encryption key Dkey for the internet cloud to communicate with the bluetooth sharing device further comprises:
and the network cloud and the Bluetooth sharing device generate an encryption key Dkey used in the handshaking process according to the first character string str1, the second character string str2 and the MAC address.
7. The method for the bluetooth sharing device to access the internet cloud via the mobile phone according to claim 6, wherein the internet cloud and the bluetooth sharing device generate the encryption key Dkey used in the handshake process according to the first string str1, the second string str2, and the MAC address according to an algorithm agreed between the internet cloud and the bluetooth sharing device.
8. The method for accessing the cloud end of the network by the Bluetooth sharing device through the mobile phone according to any one of claims 1 to 7, wherein the mobile terminal is a mobile phone, a tablet or a notebook computer.
9. The method for the bluetooth sharing device to access the cloud via the mobile phone according to claim 1, wherein the step of the bluetooth sharing device decrypting the second network string Key2 with the temporary communication Key Tkey to obtain the first network string Key1 further comprises:
and performing data verification on the first network string Key1, and if the data verification is wrong, not performing decryption operation.
10. The method for accessing the internet cloud by the bluetooth sharing device via the mobile phone according to claim 9, wherein the step of decrypting the first internet string Key1 through the encryption Key Dkey to obtain the Key string Key used by the internet cloud for controlling communication with the bluetooth sharing device further comprises:
and carrying out data verification on the Key string Key, and if the data verification is wrong, not carrying out handshake operation.
CN202111436174.9A 2021-11-29 2021-11-29 Method for accessing Bluetooth sharing equipment to network cloud by virtue of mobile phone Pending CN114257999A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111436174.9A CN114257999A (en) 2021-11-29 2021-11-29 Method for accessing Bluetooth sharing equipment to network cloud by virtue of mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111436174.9A CN114257999A (en) 2021-11-29 2021-11-29 Method for accessing Bluetooth sharing equipment to network cloud by virtue of mobile phone

Publications (1)

Publication Number Publication Date
CN114257999A true CN114257999A (en) 2022-03-29

Family

ID=80793510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111436174.9A Pending CN114257999A (en) 2021-11-29 2021-11-29 Method for accessing Bluetooth sharing equipment to network cloud by virtue of mobile phone

Country Status (1)

Country Link
CN (1) CN114257999A (en)

Similar Documents

Publication Publication Date Title
JP4545197B2 (en) Wireless network system and communication method using the same
US8904178B2 (en) System and method for secure remote access
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
TWI288552B (en) Method for implementing new password and computer readable medium for performing the method
KR100994937B1 (en) Secure proximity verification of a node on a network
CN108769007B (en) Gateway security authentication method, server and gateway
WO2018127081A1 (en) Method and system for obtaining encryption key
EP2779524A1 (en) Secure data transmission method, device and system
CN101772024B (en) User identification method, device and system
JP2005196776A (en) Safe data communication method and its system between communication terminal and communication equipment
CN112861089B (en) Authorization authentication method, resource server, resource user, equipment and medium
KR101706117B1 (en) Apparatus and method for other portable terminal authentication in portable terminal
WO2012024872A1 (en) Method, system and related apparatus for encrypting communication in mobile internet
KR20010004791A (en) Apparatus for securing user's informaton and method thereof in mobile communication system connecting with internet
CN109873819B (en) Method and system for preventing illegal access to server
CN113242238B (en) Secure communication method, device and system
KR101531662B1 (en) Method and system for mutual authentication between client and server
CN115396121A (en) Security authentication method for security chip OTA data packet and security chip device
CN1612522B (en) Challenge-based authentication without requiring knowledge of secret authentication data
KR100957044B1 (en) Method and system for providing mutual authentication using kerberos
CN110611679A (en) Data transmission method, device, equipment and system
CN110929231A (en) Digital asset authorization method and device and server
CN107888548A (en) A kind of Information Authentication method and device
JP2007116641A (en) Private information transmitting method
CN114386063A (en) Authentication system, method and device for accessing data of Internet of things equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination