CN114697879A - Bluetooth pairing method, electronic device, chip and storage medium - Google Patents

Bluetooth pairing method, electronic device, chip and storage medium Download PDF

Info

Publication number
CN114697879A
CN114697879A CN202011630687.9A CN202011630687A CN114697879A CN 114697879 A CN114697879 A CN 114697879A CN 202011630687 A CN202011630687 A CN 202011630687A CN 114697879 A CN114697879 A CN 114697879A
Authority
CN
China
Prior art keywords
electronic device
irk
rpa
trusted
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011630687.9A
Other languages
Chinese (zh)
Other versions
CN114697879B (en
Inventor
李�荣
蒋钟寅
赵丽美
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202011630687.9A priority Critical patent/CN114697879B/en
Publication of CN114697879A publication Critical patent/CN114697879A/en
Application granted granted Critical
Publication of CN114697879B publication Critical patent/CN114697879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the application is suitable for the technical field of communication, and provides a Bluetooth pairing method, electronic equipment, a chip and a storage medium. The Bluetooth pairing method comprises the following steps: the first electronic device generates a first IRK according to the shared identification information, the shared identification information is information which the plurality of electronic devices have, the plurality of electronic devices comprise the first electronic device, the first electronic device generates a first RPA according to the first IRK, and sends a first BLE broadcast message carrying the first RPA. Since the shared identification information is the same, the plurality of electronic devices can generate the same IRK according to the shared identification information. And at the broadcasting side, generating RPA according to the IRK, carrying the RPA in the broadcast message and sending the RPA. Correspondingly, after other electronic devices receive the broadcast message, the RPA can be successfully analyzed according to the same IRK, and whether the device identity is trusted or not is determined at the device discovery stage, so that the pairing time is shortened.

Description

Bluetooth pairing method, electronic device, chip and storage medium
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to a Bluetooth pairing method, electronic equipment, a chip and a storage medium.
Background
Bluetooth is a wireless technology that supports short-range communication of devices, with a small communication range, typically within 10 m. Bluetooth development has so far included multiple versions. Conventionally, bluetooth (basic rate/enhanced data rate, BR/EDR) before bluetooth release 3.0 is referred to as legacy bluetooth, and Bluetooth Low Energy (BLE) is introduced in bluetooth release 4.0.
At present, after the BLE broadcast scanning is started, all peripheral devices, including trusted devices and untrusted devices, can be found, and a suitable device needs to be manually selected to establish a Low Energy (LE) connection, and then the next pairing authentication can be performed. The Bluetooth pairing process has more steps and consumes longer time.
Disclosure of Invention
The embodiment of the application provides a Bluetooth pairing method, electronic equipment, a chip and a storage medium, and whether the equipment identity is credible or not can be determined at the equipment discovery stage, so that the pairing time is shortened.
In a first aspect, a bluetooth pairing method is provided, which is applied to a first electronic device, and includes: the method comprises the steps of generating a first IRK according to shared identification information, wherein the shared identification information is information which a plurality of electronic devices have, the plurality of electronic devices comprise a first electronic device, generating a first RPA according to the first IRK, and sending a first BLE broadcast message, wherein the first BLE broadcast message comprises the first RPA.
In the bluetooth pairing method provided by the first aspect, the plurality of electronic devices may have the same shared identification information. Since the shared identification information is the same, the IRK generated by each electronic device according to the shared identification information is the same. When a first electronic device in the plurality of electronic devices is used as a broadcaster, the first electronic device generates an RPA according to the IRK, and the transmitted broadcast message carries the RPA. Accordingly, if other electronic devices in the plurality of electronic devices receive the broadcast message, the RPA may be parsed according to the IRK. If the parsing is successful, the broadcast electronic device is one of the plurality of electronic devices and can be determined as a trusted device. Therefore, whether the equipment identity is credible or not can be determined in the equipment discovery stage, the message flow of Bluetooth pairing is simplified, the pairing time is shortened, and the time delay is shortened for subsequent service transmission. Moreover, the pairing process does not need manual participation, autonomous pairing can be completed, user experience is improved, and realization of non-sensing networking is supported.
In a possible implementation, the method further includes: and transmitting data with the second electronic device based on the BLE broadcast message.
In this implementation, after the trusted device is determined in the device discovery phase, communication may be performed based on BLE broadcast messages, so that data transmission delay is shortened.
In a possible implementation, the method further includes: and establishing LE connection with the second electronic equipment, and transmitting data with the second electronic equipment based on the LE connection.
In the implementation mode, after the trusted device is determined in the device discovery stage, the LE connection is established, communication is performed based on the LE connection, and the reliability of communication is improved.
In a possible implementation, the method further includes: and receiving a second BLE broadcast message, when the second BLE broadcast message comprises a second RPA, analyzing the second RPA according to the IRK stored in the first electronic device, and if the second RPA is successfully analyzed according to the IRK stored in the first electronic device, storing the electronic device corresponding to the second RPA in a trusted device list, wherein the trusted device list is stored in the first chip.
In this implementation, the trusted device list may be provided for upper layer applications by storing the trusted device list in the first chip. And can filter out the non-trusted equipment in the equipment discovery stage, shorten the time delay, promote system security and efficiency.
In a possible implementation, the method further includes: receiving the operation of a user, wherein the operation is used for checking the trusted equipment in the trusted equipment list; in response to the operation, a target interface is displayed, the target interface including a trusted device.
In one possible implementation, the target interface includes at least one device group, and the device group includes at least one trusted device, and the trusted devices in the device group have the same shared identification information.
In the implementation mode, the trusted equipment can be displayed for the user in groups, so that the user can know the networking condition, and the user experience is improved.
In one possible implementation, the first electronic device is in a sleep state.
In the implementation mode, broadcast scanning can be started when the electronic equipment is in a dormant state, and the prior equipment identity can be discovered in the equipment stage under the condition that the OS is not awakened, so that the power consumption of the equipment is reduced.
In a second aspect, a bluetooth pairing method is provided, which is applied to a second electronic device, and includes: the method comprises the steps of generating a first IRK according to shared identification information, wherein the shared identification information is information which a plurality of electronic devices have, the plurality of electronic devices comprise a second electronic device, receiving BLE broadcast messages sent by the first electronic device, when the BLE broadcast messages comprise RPA, analyzing the RPA according to the first IRK, and if the RPA is successfully analyzed according to the first IRK, determining that the first electronic device is a trusted device.
In a possible implementation, the method further includes: the first electronic device is stored in a trusted device list, which is stored in the first chip.
In a possible implementation, the method further includes: receiving an operation of a user, wherein the operation is used for checking trusted equipment in a trusted equipment list; in response to the operation, a target interface is displayed, the target interface including a trusted device.
In one possible implementation, the target interface includes at least one device group, and the device group includes at least one trusted device, and the trusted devices in the device group have the same shared identification information.
In a possible implementation, the method further includes: transmitting data with the first electronic device based on the BLE broadcast message.
In a possible implementation, the method further includes: and establishing LE connection with the first electronic equipment, and transmitting data with the first electronic equipment based on the LE connection.
In one possible implementation, the second electronic device is in a sleep state.
In a third aspect, an apparatus is provided, comprising: means or units for performing the steps of any of the above aspects.
In a fourth aspect, an electronic device is provided, which includes a processor, a memory, and a transceiver configured to communicate with other devices, the processor being configured to invoke a program stored in the memory to perform a method provided by any of the above aspects.
In a fifth aspect, a chip is provided, comprising a processor coupled with a memory, the processor executing a computer program stored in the memory to perform the method provided in any of the above aspects.
In a sixth aspect, a computer-readable storage medium is provided, in which instructions are stored, which when executed on a computer or processor, implement the method provided in any of the above aspects.
In a seventh aspect, a program product is provided, the program product comprising a computer program stored in a readable storage medium, the computer program being readable from the readable storage medium by at least one processor of a device, the at least one processor executing the computer program to cause the device to perform the method provided by any of the above aspects.
In any of the above aspects, in one possible implementation manner, the shared identification information includes any one of the following: a user account, a group identification, or an identification of an application.
In one possible implementation manner, the method may further include: and storing the first IRK in the first chip, wherein the maximum number of the IRKs stored in the first chip is more than 16.
In the implementation mode, the first chip is added in the electronic device, so that the IRK capacity is enlarged, the capability of the electronic device for storing and processing the IRK is improved, and the communication performance is improved in a scene of multi-group or multi-service coexistence.
In one possible implementation, the first chip is an MCU or a sensor hub.
Drawings
FIG. 1 is a diagram of a system architecture to which embodiments of the present application are applicable;
FIG. 2 is a schematic diagram of a structure of the RPA;
figure 3 is a schematic diagram of an architecture of a BLE protocol stack;
figure 4 is a schematic diagram of another structure of a BLE protocol stack provided in the embodiment of the present application;
FIG. 5 is a message interaction diagram for one implementation of a Bluetooth pairing method;
FIG. 6 is a schematic diagram of the IRK generation of FIG. 5;
FIG. 7 is a schematic diagram of an interface after scanning by the first electronic device and the second electronic device;
FIG. 8 is a schematic diagram of an interface between a first electronic device and a second electronic device requesting pairing;
FIG. 9 is a schematic diagram of an interface between a first electronic device and a second electronic device after pairing;
FIG. 10 is a message interaction diagram of another implementation of a Bluetooth pairing method;
fig. 11 is a schematic diagram of the IRK generation principle provided in the embodiment of the present application;
fig. 12 is a networking topology diagram provided in an embodiment of the present application;
fig. 13 is a message interaction diagram of a bluetooth pairing method according to an embodiment of the present application;
fig. 14 is a schematic interface diagram of a second electronic device after scanning according to an embodiment of the present application;
fig. 15 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of another electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below with reference to the drawings.
The Bluetooth pairing method provided by the embodiment of the application is suitable for electronic equipment for Bluetooth communication. For example, fig. 1 is a system architecture diagram applicable to the embodiment of the present application. As shown in fig. 1, the system may include a mobile phone a, a mobile phone B, a mobile phone C, a smart band D, and a television E. Each device supports bluetooth communication. For example, cell phone B may be in bluetooth communication with cell phone a, cell phone C, smart band D, and television E. The embodiment of the application does not limit the number of the electronic devices in the application scene.
The name and the type of the electronic equipment are not limited in the embodiment of the application. For example, the electronic device may also be referred to as a User Equipment (UE), a terminal device, a terminal or a Mobile Terminal (MT), and some examples of the electronic device are: a mobile phone (mobile phone), a tablet computer, a notebook computer, a palm top computer, a wearable device, a bluetooth sound box, a third-party car machine, a third-party large screen, an internet of things (IOT) device, a teaching device, a Mobile Internet Device (MID), a Virtual Reality (VR) device, an Augmented Reality (AR) device, a wireless terminal in industrial control (industrial control), a wireless terminal in self-driving (self-driving), a wireless terminal in remote surgery (remote medical supply), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation security (transportation safety), a wireless terminal in smart city (smart city), a wireless terminal in smart home (smart home), and the like.
Note that, in the embodiment of the present application, BLE communication and bluetooth communication have the same meaning.
First, a concept related to the embodiment of the present application will be explained.
1. Authentication, pairing and binding
In bluetooth communication, in order to ensure the security of communication, the electronic device performs data interaction in an authentication manner. Wherein the first authentication between two electronic devices may be referred to as a pairing process. After the pairing process of the two electronic devices, the keys are stored in the devices, and if the stored keys are not cleared manually, the pairing process cannot occur in the subsequent connection.
Optionally, the pairing process may include pairing and binding. Pairing refers to selecting and determining devices that need to communicate, i.e., identity determination, and generally refers to a process from requesting pairing to obtaining a short-term key (STK). Binding refers to a process of exchanging one or a combination of at least 2 of a Long Term Key (LTK), an Identity Resolving Key (IRK), and a Connection Signature Resolving Key (CSRK), and storing the exchanged keys in a local database.
2. IRK, Resolvable Private Address (RPA)
The IRK is associated with the RPA. The IRK can be used for generating the RPA, and correspondingly, the IRK is required to be used as input when the RPA is analyzed. If the electronic device a knows the IRK of the electronic device B, when receiving an RPA, it may determine whether the RPA corresponds to the electronic device B according to the IRK of the electronic device B, thereby determining the identity of the electronic device corresponding to the RPA.
Illustratively, fig. 2 is a schematic diagram of a structure of the RPA. As shown in FIG. 2, the RPA is 48 bits. The upper 24bits are the random number part, the highest two bits are '10' for identifying the address type, and the rest bits represent the random number. The low-order 24bits are hash values (hash values) obtained by performing hash (hash) operation on the random number and the IRK, and the calculation method of the hash operation is not limited in the embodiment of the present application. Illustratively, in FIG. 2, the Least Significant Bit (LSB) is located on the left side of the binary number and the Most Significant Bit (MSB) is located on the right side of the binary number.
3. Broadcaster and initiator
In the embodiment of the present application, the two communication parties are respectively referred to as a first electronic device and a second electronic device. Among them, a device that transmits a broadcast packet is called a broadcaster (broadcaster), a device that receives a broadcast packet in a broadcast channel but is not connected to the broadcaster is called a scanner (scanner), and a device that receives a broadcast packet in a broadcast channel and is connected to the broadcaster is called an initiator (initiator).
The names of the broadcaster, the scanner and the initiator are not limited in the embodiment of the application. For example, the broadcaster is also referred to as broadcaster and the originator is also referred to as originator.
For convenience of description, in the embodiments of the present application, a first electronic device is taken as a broadcaster and a second electronic device is taken as an initiator.
Next, the BLE protocol stack will be explained.
Optionally, in an implementation manner, fig. 3 is a schematic structural diagram of a BLE protocol stack. The initiator and broadcaster's BLE protocol stack structure is similar. As shown in fig. 3, the BLE protocol stack includes a host (host), a Host Controller Interface (HCI), and a controller (controller). The controller includes a Link Layer (LL) and a physical layer (PHY). Alternatively, the controller may include a main controller and a sub-controller.
The higher layer protocol in the host may include generic attribute profile (GATT), Generic Access Profile (GAP), attribute protocol (ATT), Security Management Protocol (SMP), and logical link control and adaptation protocol (L2 CAP), which are described in detail in the bluetooth protocol. The SMP is used for managing encryption and security of BLE connection, and the L2CAP may be used for distinguishing an encrypted channel or a common channel. In an embodiment of the present application, the host may generate an IRK.
The HCI is used for implementing a scenario of a BLE protocol stack by using 2 chips, and is used for standardizing a communication protocol, a communication command and the like between a host and a controller.
The link layer in the controller is used for managing and controlling the link, determining the sending time of the data packet, selecting a radio frequency channel, realizing the feedback and retransmission of the data packet and the like. The link layer stores a resolution list (resolving list), the resolution list is provided to the controller by the host through the HCI command, and includes entries such as local irk (local irk), peer irk (peer irk) or identity address (identity address), and the maximum number of the entries is 16. It can be understood that the link layer supports a maximum of 16 IRKs.
The physical layer in the controller is used to select a radio frequency band, a modulation and demodulation scheme, and the like used for BLE communication.
Optionally, in another implementation manner, fig. 4 is another schematic structural diagram of a BLE protocol stack provided in the embodiment of the present application. Fig. 4 is compared with fig. 3, as shown in fig. 4, the BLE protocol stack may further include a Micro Controller Unit (MCU) connected with the HCI. The MCU can be loaded with a Bluetooth system, and the Bluetooth system can perform data interaction with a Bluetooth chip to realize broadcasting and scanning. Optionally, when the electronic device is in a sleep state, the broadcasting and scanning can still be started through the bluetooth system on the MCU, so that the non-sensing networking of the electronic device is realized, and the user experience is improved.
The MCU may have a resolution list (resolving list) stored thereon, which is similar in principle to the resolution list in fig. 3, except that: the resolution list on the MCU supports more than 16 IRKs, and the embodiment of the present application does not limit the number of supported IRKs. Therefore, by adding the MCU, the storage capacity of the IRK is greatly improved, and the RPA analyzing capability of the electronic equipment is improved.
The MCU may also store thereon a list of trusted devices. The trusted device list includes information about trusted devices determined by the bluetooth pairing method provided in the embodiment of the present application.
It should be noted that fig. 4 is only an example, and the MCU in fig. 4 may be replaced by other devices having similar functions, for example, a sensor hub (sensorhub).
One implementation of the bluetooth pairing method is described below with reference to fig. 5 to 10. As shown in fig. 5, the bluetooth pairing method may include:
s501, after the first electronic device starts Bluetooth, a first IRK is generated.
And S502, after the Bluetooth is started by the second electronic device, generating a second IRK.
The present embodiment does not limit the execution sequence of S501 and S502.
Illustratively, fig. 6 is a schematic diagram of the IRK generation in fig. 5. As shown in fig. 6, the first IRK is associated with identification information of the first electronic device, and the second IRK is associated with identification information of the second electronic device. The identification information is used to uniquely distinguish different electronic devices, for example, device identification codes. And the initiator BLE protocol stack generates a second IRK according to the identification information of the second electronic equipment, and the broadcaster BLE protocol stack generates a first IRK according to the identification information of the first electronic equipment.
S503, the first electronic equipment sends the broadcast message.
And S504, the second electronic equipment discovers the equipment through scanning.
The second electronic device may discover all surrounding devices, including trusted devices and untrusted devices, by scanning, and needs to further manually determine and select a suitable device by a user to establish an LE connection, so as to perform a subsequent pairing process.
For example, fig. 7 is a schematic interface diagram after the first electronic device and the second electronic device scan. Fig. 7 (a) shows a scanning result of the second electronic device, and fig. 7 (b) shows a scanning result of the first electronic device. As shown in fig. 7 (a), the bluetooth master interface 70 includes a bluetooth function switch control 71, an open detection switch control 72, a "device name" tab, a "received file" tab, a paired device, and an available device. Wherein the paired devices comprise devices that were previously successfully paired by the second electronic device. The available devices include devices that are discovered by the second electronic device by scanning and that have not been paired, and need to be manually determined by the user a of the second electronic device and select the appropriate device for pairing. For example, as shown in (a) of fig. 7, the user a may click the first electronic device to perform pairing, and accordingly, the second electronic device initiates a pairing procedure in response to the click operation of the user a.
The bluetooth main interface 76 displayed by the first electronic device is similar to the bluetooth main interface 70 in principle, and is not described herein again.
And S505, the first electronic equipment and the second electronic equipment establish LE connection.
S506, the second electronic device sends a Pairing Request (Pairing Request) to the first electronic device. Correspondingly, the first electronic device receives a pairing sending request sent by the second electronic device.
S507, the first electronic device sends a Pairing Response (Pairing Response) to the second electronic device. Correspondingly, the second electronic device receives the sending pairing response sent by the first electronic device.
Specifically, S506 and S507 are stage 1 of the pairing process for exchanging configuration information through the pairing request and the pairing response. The configuration information is used to determine the pairing and in the following stage 3 to assign the keys. Optionally, the configuration information may include input and output capabilities of the electronic device. Different electronic devices have different types, different hardware configurations, and different input and output capabilities. For example, whether the electronic device is capable of inputting, the manner of inputting, whether it is capable of displaying, and the like. Optionally, the input and output capabilities of the electronic device may include any one of the following: no input and no output, only a display screen, a display screen and a choice of yes/no, only a keyboard, a keyboard and a display screen.
It should be noted that, in this embodiment, other contents included in the configuration information are not limited, for example, the type of the electronic device or the pairing code.
For example, fig. 8 is a schematic diagram of an interface for a first electronic device and a second electronic device to request pairing. In this example, the first electronic device and the second electronic device each have a display screen and can select "yes/no". Here, continuing to (a) in fig. 7, after the user a of the second electronic device clicks the first electronic device, the paired popup window 80 pops up in the bluetooth main interface 70, as shown in (a) in fig. 8. User a may operate by viewing the prompt to pair popup 80. For example, the hint information includes: "to pair with: a first electronic device. Matching codes: 502239". The pair popup 80 also includes a cancel button and a pair button. The user a may click a pairing button, and accordingly, the second electronic device sends a pairing request to the first electronic device in response to the operation of the user a, where the pairing request may include the input/output capability and the pairing code of the second electronic device. Similarly, continuing to fig. 7 (b), as shown in fig. 8 (b), the pairing popup window 86 is popped up in the bluetooth main interface 76. The user B of the first electronic device may operate by viewing the prompt to pair popup 86. For example, the hint information includes: "second electronic device" wants to pair with your "first electronic device". Please determine that the code "502239" is displayed on the "second electronic device". The pair popup 86 also includes a cancel button and a pair button. The user B can click the pairing key, and correspondingly, the first electronic equipment responds to the operation of the user B and sends a pairing response to the second electronic equipment.
The user a and the user B may be the same user or different users.
It can be seen that in this embodiment, the pairing request and the pairing response require manual confirmation by the user on the interface.
S508, the first electronic device and the second electronic device are paired based on the SMP.
Specifically, S508 is stage 2 of the pairing process, and is configured to determine a pairing algorithm between the first electronic device and the second electronic device by using information carried in the pairing request and the pairing response, generate an STK, and establish an encrypted link.
S509, the first electronic device sends a Key Distribution message (Key Distribution) to the second electronic device. Correspondingly, the second electronic device receives the key distribution message sent by the first electronic device.
S510, the second electronic device sends a Key Distribution message (Key Distribution) to the first electronic device. Accordingly, the first electronic device receives the key distribution message sent by the second electronic device.
Specifically, S509 and S510 are stage 3 of the pairing process, and are used to establish the post-link transmission key using the STK encryption in stage 2. Wherein, the secret key can be one of LTK, IRK or CSRK or the combination of at least two of LTK, IRK and CSRK. And the stage 3 is the binding process, after the stage 3, the first electronic device and the second electronic device store the key of the other party in a local database, and can directly establish connection when communication is needed next time, so that the pairing process is omitted.
And S511, completing pairing of the first electronic device and the second electronic device, and disconnecting the LE connection.
Fig. 9 is an exemplary interface diagram after a first electronic device and a second electronic device are paired. Fig. 9 (a) shows the bluetooth master interface 70 of the second electronic device, and in contrast to fig. 7 (a), in fig. 9 (a), the paired device comprises the first electronic device. Similarly, as shown in (b) of fig. 9, after the first electronic device is paired with the second electronic device, in the bluetooth main interface 76 displayed by the first electronic device, the paired devices include the second electronic device.
Therefore, in the bluetooth pairing method provided by this embodiment, the LE connection is first established in the pairing process, and then pairing is performed, which results in a large number of pairing process steps, long time consumption, and large subsequent service communication delay. In the pairing process, user intervention is needed, proper equipment is manually selected to initiate pairing, and the number of user operation steps is large. In addition, the pairing process requires that an Operating System (OS) is always in an operating state.
Furthermore, after the first electronic device is paired with the second electronic device, Bluetooth communication can be performed according to requirements. Optionally, as shown in fig. 10, the bluetooth pairing method provided in this embodiment may further include:
s1001, the first electronic device generates RPA according to the first IRK.
Specifically, the first electronic device generates an RPA based on the first IRK and a random number. The RPA comprises the random number and a hash value obtained by hash operation of the random number and the first IRK.
S1002, the first electronic device sends a broadcast message, wherein the broadcast message comprises an RPA.
And S1003, the second electronic equipment acquires the RPA through scanning.
Specifically, the second electronic device receives the broadcast message sent by the first electronic device, and determines whether the address is an RPA according to the type of the address carried by the second electronic device.
And S1004, the second electronic device analyzes the RPA by using the first IRK stored locally, and determines whether the device corresponding to the RPA is a trusted device.
Specifically, after the pairing process, the second electronic device stores the first IRK of the first electronic device. The second electronic device may obtain the hash value to be compared through the same hash operation as the first electronic device, using the first IRK and the random number in the RPA carried in the broadcast message. If the hash value to be compared is the same as the hash value in the RPA carried in the broadcast message, the RPA is successfully analyzed, it can be determined that the RPA corresponds to the first electronic device, S1005 can be executed, and the bluetooth communication continues.
S1005, the first electronic device and the second electronic device establish LE connection.
The embodiment of the application provides a Bluetooth pairing method, and a plurality of electronic devices can share the same identification information. Each of the plurality of electronic devices may generate an IRK according to the shared identification information. Because the shared identification information is the same, the IRK generated by each electronic device is the same, and each electronic device locally stores the IRK. When a first electronic device of the multiple electronic devices is a broadcaster, the first electronic device may generate an RPA according to the IRK, and the transmitted broadcast message carries the RPA. Correspondingly, if other electronic devices in the plurality of electronic devices receive the broadcast message, the RPA in the broadcast message is acquired, and the RPA can be analyzed according to the locally stored IRK. If the analysis is successful, the broadcasted electronic equipment is the first electronic equipment, and the equipment identity is determined to be credible. Therefore, in the broadcast scanning stage or the device discovery stage, whether the broadcaster is the trusted device can be determined, the message flow of bluetooth pairing is simplified, the pairing time is shortened, and the time delay is reduced for subsequent service transmission. Moreover, the pairing process does not need manual participation, autonomous pairing can be completed, user experience is improved, and technical support is provided for non-perception networking of the equipment.
The embodiment of the application does not limit the name and content of the shared identification information, and the shared identification information can be different in different scenes. Optionally, the shared identification information may be any one of the following items: a user account, a group identification, or an identification of an application. Optionally, the group identifier may be a bar code or a two-dimensional code. In practical applications, the type of group may be various, such as a chat group, a conference group, a work group, and so on. The name and the purpose of the application program are not limited in the embodiment of the application. Exemplarily, fig. 11 is a schematic diagram of a principle of generating an IRK according to an embodiment of the present application. As shown in fig. 11, the identities of the applications may include APP1 and APP2, the group identities may include group 1 and group 2, and the user account may include account 1. The first electronic device and the second electronic device may generate IRK1 according to APP1, generate IRK2 according to APP2, generate IRK3 according to group 1, generate IRK4 according to group 2, and generate IRK5 according to account 1.
In this embodiment of the present application, the number of shared identification information of each electronic device is not limited, and it can also be understood that the number of IRKs generated according to the shared identification information is not limited.
The following is an example of an application scenario of the embodiment of the present application, but the application scenario is not limited thereto.
Optionally, in an application scenario, as shown in fig. 1, a user logs in a mobile phone a, a mobile phone B, a mobile phone C, an intelligent bracelet D, and a television E using the same account. Then, the mobile phone a, the mobile phone B, the mobile phone C, the smart band D, and the television E may all generate the same IRK according to the account. Through broadcast scanning among the devices, the devices can be mutually confirmed to be trusted devices in the device discovery phase, and a trusted home network is established.
Optionally, in another application scenario, for example, a conference scenario, the participants may establish a temporary group, and the identifier of the temporary group may be a two-dimensional code. After the user uses the respective device to start the same service, each device can generate the same IRK according to the two-dimensional code. Through broadcast scanning among the devices, the devices can be mutually confirmed as trusted devices in the device discovery phase, and a trusted conference group network is established.
Optionally, in yet another application scenario, as shown in fig. 12, 16 electronic devices are included. The electronic devices 1 to 6 have the same group identifier, specifically, the group 1, and the electronic devices 1 to 6 can generate the same IRK according to the group 1. Any two devices in the electronic devices 1-6 can be paired according to the same IRK, and the trusted network 1 is established without sensing. Similarly, the electronic devices 7 to 11, 2 have the same application program identifier, specifically APP1, and the electronic devices 7 to 11 and 2 can generate the same IRK according to APP1, and establish the trusted network 2 without sensing. The electronic devices 12 to 16 and 6 have the same account number, specifically account number 1, and the electronic devices 12 to 16 and 6 can generate the same IRK according to the account number 1 and establish the trusted network 3 without sensing.
It should be noted that the bluetooth pairing method provided in the embodiment of the present application and the embodiments shown in fig. 5 to fig. 10 may be combined with each other. For example, as shown in fig. 12, the electronic apparatus 1 and the electronic apparatus 7 do not have shared identification information. The electronic device 1 and the electronic device 7 may be paired by using the bluetooth pairing method provided in the embodiments shown in fig. 5 to fig. 10, and at this time, the IRK generated by the electronic device 1 is different from the IRK generated by the electronic device 7. Similarly, the bluetooth pairing method provided in the embodiments shown in fig. 5 to 10 can be adopted between the electronic device 1 and the electronic device 12, and between the electronic device 12 and the electronic device 7.
The technical solution of the present application will be described in detail by specific examples. The following embodiments may be combined with each other and may not be described in detail in some embodiments for the same or similar concepts or processes.
The terms "first," "second," "third," "fourth," and the like in the embodiments of the present application, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Fig. 13 is a message interaction diagram of a bluetooth pairing method according to an embodiment of the present application. The execution main body related to the present embodiment includes a first electronic device and a second electronic device. As shown in fig. 13, the bluetooth pairing method provided in this embodiment may include:
s1301, the first electronic device generates a first IRK according to the shared identification information.
S1302, the second electronic device generates a first IRK according to the shared identification information.
The present embodiment does not limit the execution sequence of S1301 and S1302.
The shared identification information is information which is possessed by a plurality of electronic devices, and the plurality of electronic devices include a first electronic device and a second electronic device. For the shared identification information, reference may be made to the related description above in this application, which is not described herein again.
In this embodiment, the first IRK is associated with shared identification information that each of the plurality of electronic devices has. Since the shared identification information is the same, the first IRK generated by each of the plurality of electronic devices is the same.
It should be noted that, in this embodiment, the number of the groups to which the first electronic device and the second electronic device belong is not limited, and the number of the electronic devices included in each group is not limited, and may be different according to different application scenarios. For example, as shown in fig. 12, it is assumed that the first electronic device is an electronic device 2, and the group to which the first electronic device belongs includes 2 electronic devices 1 to 6 and 7 to 11 and 2. Wherein each group has shared identification information.
And S1303, the first electronic device generates an RPA according to the first IRK.
The structure of the first RPA can be seen in fig. 2, and is not described herein.
S1304, the first electronic device transmits a first BLE broadcast message, where the first BLE broadcast message includes a first RPA.
S1305, the second electronic device obtains the first RPA in the first BLE broadcast message through scanning.
And S1306, the second electronic device analyzes the first RPA according to the first IRK.
Specifically, after the second electronic device receives the first BLE broadcast message, it may be determined what type of address the address carried in the first BLE broadcast message is. When the address carried in the first BLE broadcast message is determined to be the RPA, the first RPA in the first BLE broadcast message is analyzed according to the first IRK. If the analysis is successful, S1307 is executed.
It should be noted that, if there are multiple first IRKs, the first RPA in the first BLE broadcast message is sequentially parsed according to each first IRK until parsing is successful or parsing fails.
S1307, if the second electronic device successfully resolves the first RPA according to the first IRK, it is determined that the first electronic device is a trusted device.
As can be seen, in the bluetooth pairing method provided by this embodiment, a plurality of electronic devices may have the same shared identification information. Each of the plurality of electronic devices may generate an IRK according to the shared identification information. Since the shared identification information is the same, the IRK generated by each electronic device is the same. When a first electronic device of the multiple electronic devices is a broadcaster, the first electronic device may generate an RPA according to the IRK, and the transmitted broadcast message carries the RPA. Correspondingly, the second electronic device of the plurality of electronic devices serves as an initiator, acquires the RPA in the broadcast message after receiving the broadcast message, and can analyze the RPA according to the locally stored IRK. And if the analysis is successful, the first electronic equipment is the trusted equipment. The bluetooth pairing method provided by the embodiment can determine whether the broadcaster is the trusted device or not in the device discovery stage, thereby simplifying the pairing message process, shortening the pairing time and shortening the time delay for subsequent service transmission. Moreover, the pairing process does not need manual participation, autonomous pairing can be completed, user experience is improved, and technical support is provided for non-perception networking.
Optionally, the bluetooth pairing method provided in this embodiment may further include:
s1308, the first electronic device stores the first IRK in a first chip of the first electronic device.
S1309, the second electronic device stores the first IRK in a first chip of the second electronic device.
The present embodiment does not limit the execution order of S1308 and S1309.
The maximum number of the IRKs stored in the first chip is larger than 16. Reference may be made to the structure of the BLE protocol stack shown in figure 4. Optionally, the first chip may be an MCU or a sensor hub. Optionally, the first IRK may be stored in a resolution list (resolving list) in the first chip.
Typically, the chip for short-range communication has limited hardware resources and limited processing capability, for example, in the BLE protocol stack shown in fig. 3, the link layer of the chip supports 16 IRKs at maximum. In the embodiment, the first chip is added, so that the IRK capacity is enlarged, the capability of the electronic device for storing and processing the IRK is improved, and the communication performance is improved in a scene of multiple groups or multiple services coexisting.
Optionally, the first chip may be loaded with a bluetooth system, and the first electronic device and the second electronic device are in a sleep state. Therefore, when the electronic equipment is in a dormant state, broadcast scanning can be started through the Bluetooth system on the first chip, the prior equipment identity can be found in the equipment stage under the condition that the OS is not awakened, and the power consumption of the equipment is reduced.
Optionally, a non-sensing function switch may be disposed in the first electronic device and the second electronic device, and a user may turn on the non-sensing function of the electronic device or turn off the non-sensing function of the electronic device according to a requirement. The unaware functionality refers to the ability of the electronic device to turn on broadcast scanning in a sleep state. The present embodiment does not limit the manner in which the user sets the non-sensory function. For example, the control may be performed by voice control, by touch operation in a related interface, and the like.
Optionally, after S1307, the bluetooth pairing method provided in this embodiment may further include:
s1310, the second electronic device stores the first electronic device in a trusted device list in the first chip.
By storing the trusted device list in the first chip, the trusted device list may be provided for upper layer applications. And can filter out the non-trusted equipment in the equipment discovery stage, shorten the time delay, promote system security and efficiency.
Optionally, the bluetooth pairing method provided in this embodiment may further include:
the second electronic device receives an operation of a user, and the operation is used for viewing the trusted devices in the trusted device list.
The second electronic device displays a target interface in response to the operation, the target interface including the trusted device.
The present embodiment does not limit the operation of the user. For example, the user may input a voice command or perform a touch operation in the relevant interface.
Fig. 14 is a schematic interface diagram of a scanned second electronic device according to an embodiment of the present application. Optionally, in an implementation manner, the target interface may include at least one device group, where the device group includes at least one trusted device, and the trusted devices in the device group have the same shared identification information. Illustratively, as shown in fig. 14 (a), two device groups, device group 1 and device group 2, are included in the target interface 1401. The device group 1 may include a mobile phone a, a mobile phone B, a smart band, and a speaker. The shared identification information of the device group 1 may be a user account. The equipment group 2 can comprise tablet computers 1-5, and the shared identification information of the equipment group 2 can be a conference group identification. By displaying the credible equipment for the user group, the user can know the networking condition, and the user experience is improved. Optionally, in another implementation, the target interface directly includes a plurality of trusted devices. For example, as shown in fig. 14 (b), the present embodiment does not limit the arrangement order of the plurality of trusted devices in the target interface 1401. Optionally, in order to improve the user experience, a plurality of trusted devices may be displayed in sequence according to different device groups.
Optionally, after S1307, the bluetooth pairing method provided in this embodiment may further include:
s1311, the first electronic device, and the second electronic device transmit data based on the BLE broadcast message.
In this implementation, after the trusted device is determined in the device discovery phase, communication may be performed based on BLE broadcast messages, so that data transmission delay is shortened. Optionally, the first electronic device and the second electronic device may be in a sleep state.
Optionally, after S1307, the bluetooth pairing method provided in this embodiment may further include:
s1312, the first electronic device and the second electronic device establish LE connection and transmit data based on the LE connection.
In the implementation mode, after the trusted device is determined in the device discovery stage, the LE connection is established, communication is performed based on the LE connection, and the reliability of communication is improved.
It should be noted that, in this embodiment, the first electronic device serves as a broadcaster and the second electronic device serves as an initiator. In the actual communication process, the second electronic device may also perform broadcasting, and correspondingly, the first electronic device may perform scanning. At this time, the second electronic device may perform the operation related to the first electronic device in this embodiment, and the first electronic device may perform the operation related to the second electronic device in this embodiment.
Optionally, the first electronic device may further perform the following steps:
a second BLE broadcast message is received.
When the second BLE broadcast message includes the second RPA, parsing the second RPA according to the IRK stored by the first electronic device.
And if the second RPA is successfully analyzed according to the IRK stored in the first electronic equipment, storing the electronic equipment corresponding to the second RPA in the trusted equipment list. A list of trusted devices is stored in the first chip.
Optionally, the first electronic device may further perform the following steps:
and receiving the operation of the user, wherein the operation is used for viewing the trusted devices in the trusted device list.
In response to the operation, a target interface is displayed, the target interface including a trusted device.
Fig. 15 is a schematic structural diagram of an electronic device according to an embodiment of the present application in a case where functional modules are divided according to respective functions. The electronic device provided in this embodiment may perform operations performed by the first electronic device or the second electronic device in the method embodiment of the present application. As shown in fig. 15, the electronic device may include: a sending module 1501, a processing module 1502, and a receiving module 1503.
A sending module 1501 is configured to send data to other devices. For example, at the broadcaster, BLE broadcast messages, pairing responses, key assignment messages, etc. may be sent. At the initiator, a pairing request, a key assignment message, etc. may be sent.
A receiving module 1503, configured to receive data from other devices. For example, at the initiator, a BLE broadcast message, a pairing response, a key assignment message, etc. may be received. At the broadcaster, a pairing request, a key assignment message, etc. may be sent.
The processing module 1502 is configured to generate an RPA according to the IRK, store the IRK, analyze the RPA according to the IRK, store the trusted device, and the like.
It should be noted that all relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Referring to fig. 16, another structure of an electronic device provided in an embodiment of the present application is shown, where the electronic device includes: a processor 1601, a receiver 1602, a transmitter 1603, a memory 1604, and a bus 1605. The processor 1601 includes one or more processing cores, and the processor 1601 executes software programs and modules to execute various functional applications and information processing. The receiver 1602 and the transmitter 1603 may be implemented as one communication component, which may be a baseband chip. The memory 1604 is coupled to the processor 1601 by a bus 1605. The memory 1604 may be used for storing at least one program instruction, and the processor 1601 is used for executing the at least one program instruction to realize the technical solutions of the above embodiments. The implementation principle and technical effect are similar to those of the embodiments related to the method, and are not described herein again.
When the terminal is started, the processor can read the software program in the memory, interpret and execute the instruction of the software program, and process the data of the software program. When data needs to be sent through the antenna, the processor performs baseband processing on the data to be sent, and then outputs baseband signals to a control circuit in the control circuit, and the control circuit performs radio frequency processing on the baseband signals and then sends the radio frequency signals to the outside through the antenna in the form of electromagnetic waves. When data is sent to the terminal, the control circuit receives radio frequency signals through the antenna, converts the radio frequency signals into baseband signals and outputs the baseband signals to the processor, and the processor converts the baseband signals into the data and processes the data.
Those skilled in the art will appreciate that fig. 16 shows only one memory and processor for ease of illustration. In an actual terminal, there may be multiple processors and memories. The memory may also be referred to as a storage medium or a storage device, and the like, which is not limited in this application.
As an alternative implementation manner, the processor may include a baseband processor and a central processing unit, the baseband processor is mainly used for processing communication data, and the central processing unit is mainly used for executing a software program and processing data of the software program. Those skilled in the art will appreciate that the baseband processor and the central processing unit may be integrated into a single processor, or may be separate processors, interconnected via bus, etc. Those skilled in the art will appreciate that the terminal may include a plurality of baseband processors to accommodate different network formats, a plurality of central processors to enhance its processing capability, and various components of the terminal may be connected by various buses. The baseband processor may also be expressed as a baseband processing circuit or a baseband processing chip. The central processing unit may also be expressed as a central processing circuit or a central processing chip. The function of processing the communication protocol and the communication data may be built in the processor, or may be stored in the memory in the form of a software program, and the processor executes the software program to realize the baseband processing function. The memory may be integrated within the processor or may be separate from the processor. The memory includes a Cache, which may store frequently accessed data/instructions.
In the embodiments of the present application, the processor may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component, and may implement or execute the methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor.
In the embodiment of the present application, the memory may be a nonvolatile memory, such as a Hard Disk Drive (HDD) or a solid-state drive (SS), and may also be a volatile memory (volatile memory), for example, a random-access memory (RAM). The memory is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, not limited thereto.
The memory in the embodiments of the present application may also be circuitry or any other device capable of performing a storage function for storing program instructions and/or data. The methods provided by the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a network appliance, a user device, or other programmable apparatus. The computer instructions may be stored in, or transmitted from, a computer-readable storage medium to another computer-readable storage medium, for example, from one website, computer, server, or data center, over a wired (e.g., coaxial cable, fiber optics, Digital Subscriber Line (DSL), or wireless (e.g., infrared, wireless, microwave, etc.) network, the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more integrated servers, data centers, etc., the available medium may be magnetic medium (e.g., floppy disk, hard disk, magnetic tape), optical medium (e.g., digital video disc (digital video disc, DWD), or a semiconductor medium (e.g., SSD), etc.
The embodiment of the present application provides a chip, which includes a processor, where the processor is coupled with a memory, and the processor executes a computer program stored in the memory to execute the technical solution in the above embodiments.
The embodiment of the present application provides a computer program product, which, when running on a terminal, enables the terminal to execute the technical solutions in the above embodiments. The implementation principle and technical effect are similar to those of the related embodiments, and are not described herein again.
The embodiment of the present application provides a computer-readable storage medium, on which program instructions are stored, and when the program instructions are executed by a terminal, the terminal is enabled to execute the technical solutions of the above embodiments. The principle and technical effects are similar to those of the related embodiments, and are not described herein again. In summary, the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (23)

1. A Bluetooth pairing method is applied to a first electronic device, and comprises the following steps:
generating a first identity analysis key IRK according to the shared identification information; the shared identification information is information which a plurality of electronic devices have, and the plurality of electronic devices comprise the first electronic device;
generating a first Resolvable Private Address (RPA) according to the first IRK;
transmitting a first Bluetooth Low Energy (BLE) broadcast message, the first BLE broadcast message including the first RPA.
2. The method of claim 1, wherein the shared identification information comprises any one of: a user account, a group identification, or an identification of an application.
3. The method of claim 1, further comprising:
and storing the first IRK in a first chip, wherein the maximum number of the IRKs stored in the first chip is more than 16.
4. The method according to any one of claims 1-3, further comprising:
transmitting data with a second electronic device based on a BLE broadcast message, the second electronic device being a device of the plurality of electronic devices other than the first electronic device.
5. The method according to any one of claims 1-3, further comprising:
establishing a low-energy-consumption LE connection with a second electronic device, wherein the second electronic device is a device except the first electronic device in the plurality of electronic devices;
transmitting data with the second electronic device based on the LE connection.
6. The method according to any one of claims 1-5, further comprising:
receiving a second BLE broadcast message;
when the second BLE broadcast message includes a second RPA, parsing the second RPA according to an IRK stored by the first electronic device;
if the second RPA is successfully analyzed according to the IRK stored in the first electronic equipment, storing the electronic equipment corresponding to the second RPA in a trusted equipment list; the list of trusted devices is stored in the first chip.
7. The method according to claim 3 or 6, wherein the first chip is a Micro Control Unit (MCU) or a sensor hub.
8. The method of claim 6, further comprising:
receiving an operation of a user, wherein the operation is used for viewing the trusted devices in the trusted device list;
in response to the operation, displaying a target interface, the target interface including the trusted device.
9. The method of claim 8, wherein the target interface comprises at least one device group, wherein the device group comprises at least one trusted device, and wherein the trusted devices in the device group have the same shared identification information.
10. The method of any of claims 1-4, 6-7, wherein the first electronic device is in a sleep state.
11. A Bluetooth pairing method applied to a second electronic device, the method comprising:
generating a first identity analysis key IRK according to the shared identification information; the shared identification information is information which is possessed by a plurality of electronic devices, and the plurality of electronic devices comprise the second electronic device;
receiving a Bluetooth low energy consumption BLE broadcast message sent by first electronic equipment;
when the BLE broadcast message includes a Resolvable Private Address (RPA), resolving the RPA according to the first IRK;
and if the RPA is successfully analyzed according to the first IRK, determining that the first electronic equipment is trusted equipment.
12. The method of claim 11, wherein the shared identification information comprises any one of: a user account, a group identification, or an identification of an application.
13. The method of claim 11, further comprising:
and storing the first IRK in a first chip, wherein the maximum number of the IRKs stored in the first chip is more than 16.
14. The method according to any one of claims 11-13, further comprising:
storing the first electronic device in a trusted device list, the trusted device list being stored in a first chip.
15. The method according to claim 13 or 14, wherein the first chip is a Micro Control Unit (MCU) or a sensor hub.
16. The method of claim 14, further comprising:
receiving an operation of a user, wherein the operation is used for viewing the trusted devices in the trusted device list;
in response to the operation, displaying a target interface, the target interface including the trusted device.
17. The method of claim 16, wherein the target interface includes at least one device group, wherein the device group includes at least one trusted device, and wherein the trusted devices in the device group have the same shared identification information.
18. The method according to any one of claims 11-15, further comprising:
transmitting data with the first electronic device based on a BLE broadcast message.
19. The method according to any one of claims 11-17, further comprising:
establishing a low energy LE connection with the first electronic device;
transmitting data with the first electronic device based on the LE connection.
20. The method of any of claims 11-15, 18, wherein the second electronic device is in a sleep state.
21. An electronic device comprising a processor, a memory, and a transceiver for communicating with other devices, the processor being configured to invoke a program stored in the memory to perform the method of any one of claims 1-20.
22. A chip comprising a processor coupled with a memory, the processor executing a computer program stored in the memory to perform the method of any of claims 1-20.
23. A computer-readable storage medium having stored thereon computer instructions which, when run on an electronic device, cause the electronic device to perform the method of any one of claims 1-20.
CN202011630687.9A 2020-12-30 2020-12-30 Bluetooth pairing method, electronic device, chip and storage medium Active CN114697879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011630687.9A CN114697879B (en) 2020-12-30 2020-12-30 Bluetooth pairing method, electronic device, chip and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011630687.9A CN114697879B (en) 2020-12-30 2020-12-30 Bluetooth pairing method, electronic device, chip and storage medium

Publications (2)

Publication Number Publication Date
CN114697879A true CN114697879A (en) 2022-07-01
CN114697879B CN114697879B (en) 2023-06-02

Family

ID=82134413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011630687.9A Active CN114697879B (en) 2020-12-30 2020-12-30 Bluetooth pairing method, electronic device, chip and storage medium

Country Status (1)

Country Link
CN (1) CN114697879B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024040406A1 (en) * 2022-08-22 2024-02-29 华为技术有限公司 Communication method, apparatus and system
WO2024049004A1 (en) * 2022-09-01 2024-03-07 삼성전자주식회사 Electronic device, method, and non-transitory computer-readable storage medium for processing advertising packet broadcasted from external electronic device in wireless environment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130111165A (en) * 2012-03-29 2013-10-10 브로드콤 코포레이션 Bluetooth low energy privacy
EP2720404A1 (en) * 2012-10-11 2014-04-16 Nordic Semiconductor ASA Addressable radio device
CN108769973A (en) * 2018-07-19 2018-11-06 深圳芯之联科技有限公司 A kind of method for secret protection of bluetooth equipment
CN110213759A (en) * 2019-06-11 2019-09-06 桃芯科技(苏州)有限公司 Anti-lost detection method, storage medium and electronic equipment based on broadcast
US20190356478A1 (en) * 2018-05-17 2019-11-21 Bose Corporation Secure systems and methods for resolving audio device identity using remote application

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130111165A (en) * 2012-03-29 2013-10-10 브로드콤 코포레이션 Bluetooth low energy privacy
EP2720404A1 (en) * 2012-10-11 2014-04-16 Nordic Semiconductor ASA Addressable radio device
US20190356478A1 (en) * 2018-05-17 2019-11-21 Bose Corporation Secure systems and methods for resolving audio device identity using remote application
CN108769973A (en) * 2018-07-19 2018-11-06 深圳芯之联科技有限公司 A kind of method for secret protection of bluetooth equipment
CN110213759A (en) * 2019-06-11 2019-09-06 桃芯科技(苏州)有限公司 Anti-lost detection method, storage medium and electronic equipment based on broadcast

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贾丽云: "可穿戴设备的人机交互信息系统的研究", 《中国优秀硕士学位论文全文数据库(电子期刊)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024040406A1 (en) * 2022-08-22 2024-02-29 华为技术有限公司 Communication method, apparatus and system
WO2024049004A1 (en) * 2022-09-01 2024-03-07 삼성전자주식회사 Electronic device, method, and non-transitory computer-readable storage medium for processing advertising packet broadcasted from external electronic device in wireless environment

Also Published As

Publication number Publication date
CN114697879B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
WO2018177124A1 (en) Service processing method and device, data sharing system and storage medium
CN111372325B (en) Method and device for establishing Wi-Fi point-to-point connection
CN105141568B (en) Secured communication channel method for building up and system, client and server
CN111459433B (en) Screen transmission method, device and storage medium
WO2016082801A1 (en) Method and device for establishing wireless connection
CN112312586B (en) WiFi direct connection establishing method, device, equipment and storage medium
US9503893B2 (en) Communication management system, relay device, communication control system, communication system, communication method, and recording medium storing communication control program
US8601135B2 (en) Supporting WPS sessions using TCP-based connections
US10863559B2 (en) Method and apparatus for communicating in a wireless communication network
KR20110008272A (en) Methods, apparatuses, and computer program products for providing a single service sign-on
WO2021135593A1 (en) Device sharing method and electronic device
WO2022143071A1 (en) Connection establishment method and electronic device
US11089443B2 (en) Electronic device and method for connecting short range communication
CN114697879B (en) Bluetooth pairing method, electronic device, chip and storage medium
CN112291364A (en) Message pushing processing method and device
US20230156466A1 (en) Bluetooth Networking Method for Electronic Device and Related Device
US20230379705A1 (en) Electronic device and method for setting up a data path
CN117044304A (en) Electronic device for performing network management operation and operation method thereof
CN116868599A (en) Electronic device for transmitting/receiving network configuration information and method of operating the same
US20190327789A1 (en) Cellular extension on a datalink layer communication channel
CN115550415B (en) Device connection method and electronic device
WO2023246601A1 (en) Device discovery method, apparatus and system
EP4280639A1 (en) Electronic device for managing network configuration information and operation method of same
CN115913600A (en) Method, apparatus, electronic device and medium for identifying device
CN116684216A (en) Communication method, readable medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant