WO2021159506A1 - Procédé et appareil de reconnaissance automatique d'identité, et puce - Google Patents

Procédé et appareil de reconnaissance automatique d'identité, et puce Download PDF

Info

Publication number
WO2021159506A1
WO2021159506A1 PCT/CN2020/075363 CN2020075363W WO2021159506A1 WO 2021159506 A1 WO2021159506 A1 WO 2021159506A1 CN 2020075363 W CN2020075363 W CN 2020075363W WO 2021159506 A1 WO2021159506 A1 WO 2021159506A1
Authority
WO
WIPO (PCT)
Prior art keywords
ble
ble terminal
terminal
mac address
determined
Prior art date
Application number
PCT/CN2020/075363
Other languages
English (en)
Chinese (zh)
Inventor
袁明武
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to CN202080001499.1A priority Critical patent/CN111758248B/zh
Priority to PCT/CN2020/075363 priority patent/WO2021159506A1/fr
Publication of WO2021159506A1 publication Critical patent/WO2021159506A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/60Security, fault tolerance
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • This application relates to the field of Bluetooth technology, and more specifically, to methods, devices, and chips for automatic identification.
  • Bluetooth low energy (Bluetooh Low Energy, BLE) technology plays an increasingly important role in wireless transmission applications with low power consumption, flexibility and convenience. It is widely used in applications such as identification and wireless control. Mobile phones use BLE technology. There are more and more scenarios for identification. For example, the mobile phone turns on the Bluetooth door lock, the mobile phone turns on the Bluetooth light, etc. In these applications, the connection control needs to be performed through the application (App) on the mobile phone. Specifically, the user needs to take Out of the mobile phone, open the App used to control the Bluetooth device, connect to the Bluetooth device, and then control the Bluetooth device, the user experience is not good, therefore, how to achieve more convenient identification is an urgent problem to be solved.
  • App application
  • the present application provides a method, device and chip for automatic identification, which can realize convenient identification, thereby improving user experience.
  • an automatic identification method is provided, which is applied to a first Bluetooth low energy BLE end, where the first BLE end is configured as a human-computer interaction device HID, and includes:
  • the media access control MAC address of the second BLE terminal is acquired based on the first Bluetooth connection, where the second BLE terminal is bound to the first BLE terminal Ordered equipment;
  • the second BLE terminal is a trusted device, it is determined whether the first BLE terminal performs a preset operation.
  • the first BLE end is configured to include HID service, battery service, and device information service, and the appearance field in the broadcast data packet sent by the first BLE end is HID to change the The first BLE end is configured as HID.
  • the method before the acquiring the MAC address of the second BLE terminal based on the first Bluetooth connection, the method further includes:
  • the acquiring the media access control MAC address of the second BLE terminal based on the first Bluetooth connection includes:
  • the determining whether the first BLE terminal performs a preset operation according to whether the second BLE terminal is a trusted device includes:
  • the second BLE terminal is a trusted device, determine that the first BLE terminal performs the preset operation.
  • the second BLE terminal is not a trusted device, it is determined that the first BLE terminal does not perform the preset operation.
  • the determining whether the first BLE terminal performs a preset operation according to whether the second BLE terminal is a trusted device includes:
  • the time interval between the second BLE terminal being determined to be a trusted device for two consecutive times, and the time interval of the second BLE terminal At least one of the time permissions determines whether the first BLE terminal performs the preset operation.
  • the second BLE terminal is determined to be a trusted device twice in a row. At least one of the time interval of and the time authority of the second BLE terminal to determine whether the first BLE terminal performs the preset operation includes:
  • the second BLE terminal is a trusted device, and the signal strength of the second BLE terminal is greater than or equal to a preset value, determine that the first BLE terminal performs the preset operation; or
  • the second BLE terminal is a trusted device, and the signal strength of the second BLE terminal is less than the preset value, it is determined that the first BLE terminal does not perform the preset operation.
  • the second BLE end is a trusted device, and the signal strength of the second BLE end, the second BLE end is determined to be a trusted device between two consecutive times. At least one of the time interval and the time authority of the second BLE terminal to determine whether the first BLE terminal performs the preset operation includes:
  • the time interval during which the second BLE end is determined to be a trusted device twice in a row is within the preset time period, determine that the first BLE end does not perform the preset operation;
  • the time interval during which the second BLE end is determined to be a trusted device twice in a row is greater than the preset duration, it is determined that the first BLE end performs the preset operation.
  • the second BLE end is determined to be a trusted device between two consecutive times. At least one of the time interval and the time authority of the second BLE terminal, determining whether the first BLE terminal performs the preset operation, including: if the second BLE terminal is a trusted device, and the Within the time authority of the second BLE terminal, it is determined that the first BLE terminal performs the preset operation; or
  • the second BLE terminal is a trusted device but is not within the time authority range of the second BLE terminal, it is determined that the first BLE terminal does not perform the preset operation.
  • the determining whether the second BLE terminal is a trusted device according to the MAC address of the second BLE terminal includes:
  • the second BLE end is a trusted device
  • the second BLE end is an untrusted device.
  • the first BLE terminal is a Bluetooth door lock, and the preset operation is to turn on the Bluetooth door lock; or the first BLE terminal is a Bluetooth light, and the preset operation is to turn on The Bluetooth light.
  • an apparatus for automatically identifying an identity is provided.
  • the apparatus is configured as a human-computer interaction device HID and includes:
  • the storage module is used to store the MAC address list of the equipment successfully bound with the device
  • the Bluetooth low energy BLE module is used to obtain the media access control MAC address of the second BLE terminal based on the first Bluetooth connection when the second BLE terminal is close to the device.
  • the processing module is configured to determine whether the second BLE terminal is a trusted device according to the MAC address of the second BLE terminal, and determine whether the device performs a preset operation according to whether the second BLE terminal is a trusted device .
  • the device is configured to include HID service, battery service, and device information service, and the appearance field in the broadcast data packet sent by the first BLE end is HID. HID.
  • the BLE module before the acquiring the MAC address of the second BLE terminal based on the first Bluetooth connection, the BLE module is further configured to:
  • the BLE module is also used to:
  • the processing module is also used to:
  • the second BLE end is a trusted device, determine that the device performs the preset operation
  • the second BLE terminal is not a trusted device, it is determined that the device does not perform the preset operation.
  • the processing module is also used to:
  • the signal strength of the second BLE terminal determines whether the device performs a preset operation.
  • the processing module is also used to:
  • the second BLE terminal is a trusted device, and the signal strength of the second BLE terminal is greater than or equal to a preset value, determine that the device performs the preset operation; or
  • the second BLE terminal is an optional device, and the signal strength of the second BLE terminal is less than the preset value, it is determined that the device does not perform the preset operation.
  • the processing module is also used to:
  • the time interval during which the second BLE terminal is determined to be a trusted device twice in a row is within the preset time period, determine that the device does not perform the preset operation;
  • the time interval during which the second BLE end is determined to be a trusted device twice in a row is greater than the preset duration, it is determined that the device performs the preset operation.
  • the processing module is also used to:
  • the second BLE terminal is a trusted device and is within the time authority of the second BLE terminal, determine that the device performs the preset operation;
  • the second BLE terminal is a trusted device but is not within the time authority range of the second BLE terminal, it is determined that the device does not perform the preset operation.
  • the processing module is also used to:
  • the second BLE end is a trusted device
  • the second BLE end is an untrusted device.
  • the device is a Bluetooth door lock, and the preset operation is to turn on the Bluetooth door lock; or the device is a Bluetooth light, and the preset operation is to turn on the Bluetooth light.
  • a chip which is used to implement the method in the above-mentioned first aspect or each of its implementation manners.
  • the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes the method in the first aspect or its implementation manners.
  • a computer-readable medium for storing a computer program, and the computer program includes instructions for executing the first aspect or any possible implementation of the first aspect.
  • a computer program product including instructions is provided.
  • the computer runs the instructions of the computer program product
  • the computer executes the method in the first aspect or any possible implementation of the first aspect.
  • the computer program product may run on the first BLE end of the third aspect.
  • the Bluetooth connection with the first BLE end can be automatically established, and further can be based on the MAC of the device
  • the address determines whether it is a trusted device, and the operation on the first BLE end can be realized when the device is a trusted device.
  • the first BLE end since the first BLE end stores the device’s MAC address, so the user does not need to operate the device to control the first BLE end, which can improve user experience.
  • Fig. 1 is a schematic flowchart of a method for automatically identifying an identity according to an embodiment of the present application.
  • Fig. 2 is an overall flowchart of an automatic identification method according to an embodiment of the present application.
  • Fig. 3 is a schematic structural diagram of an automatic identification device according to an embodiment of the present application.
  • the slave device can be, for example, a BLE device such as a Bluetooth door lock and a Bluetooth light
  • the master device can be a mobile phone, for example. , Tablet computers and other mobile electronic devices.
  • Link Layer Link Layer
  • the master device turns on the Bluetooth module, scans the broadcast data packet, and further, the master device sends a connection request to the slave device;
  • the slave device receives the connection request from the master device, it can be determined that the master device wants to establish a Bluetooth connection with the slave device, and the slave device returns a connection response to the master device.
  • the link layer is located in the controller (Controller) part of the BLE protocol stack, and the specific implementation can refer to related technologies, which will not be repeated here.
  • an encrypted link between the BLE devices is established, that is, a pairing process is performed. Mainly divided into three stages:
  • the first stage it is used to exchange pairing features to obtain the temporary key TK, specifically, to exchange authentication requirements (authentication requirements) of the two parties and the human-computer interaction capabilities (IO capabilities) of the two parties;
  • the TK value of the first stage is used as the secret key of the second stage to calculate the identity confirmation information and generate the short-term key STK, where the identity confirmation value guarantees that the device communicating with itself is the device that needs to be connected to itself , The identity of the other party must be determined. Both the master device and the slave device need to calculate the identity confirmation value to determine whether the other party is the device that needs to be connected.
  • the function of STK is that the third stage of the pairing and binding process no longer uses plaintext for data transmission.
  • the third stage is the process of device binding.
  • the long-term keys used in the encrypted link are calculated, such as LTK, IRK, and CSRK.
  • the data transmitted in the third stage passes through the first and second stages.
  • the short-term key is encrypted for transmission. Therefore, the data packet transmitted in the third stage is encrypted ciphertext.
  • the master device and the slave device will save the long-term key, so that the two devices are successfully bound, or paired successfully. After that, the two can exchange data through the long-term key.
  • the plaintext data needs to be encrypted.
  • the encryption process takes plaintext data packets as input, and uses long-term secret key encryption to generate ciphertext data packets;
  • the opposite end When the opposite end receives the ciphertext data packet, it needs to decrypt the ciphertext data packet.
  • the decryption process takes the ciphertext data packet as input and the long-term secret key as the decryption key to generate the plaintext data packet.
  • the embodiments of the present application provide a method for automatic identification, which can configure BLE terminals such as Bluetooth door locks as Human Interface Device (HID), so that BLE devices such as mobile phones are close to the first BLE terminal.
  • BLE terminals such as Bluetooth door locks as Human Interface Device (HID)
  • HID Human Interface Device
  • the mobile phone can automatically establish a connection with the Bluetooth door lock, which can further control the opening of the Bluetooth door lock without requiring the user to operate the App, which is conducive to improving the user experience.
  • the method 200 may be executed by a first BLE terminal, and the first BLE terminal is configured as an HID.
  • the method 200 may include the following contents:
  • S202 Determine whether the second BLE end is a trusted device according to the MAC address of the second BLE end;
  • S203 Determine whether the first BLE terminal performs a preset operation according to whether the second BLE terminal is a trusted device.
  • the method 200 of the embodiment of the present application can be applied to various BLE devices, such as a BLE chip, or a device including a BLE chip, such as a Bluetooth door lock, a Bluetooth lamp, and the like.
  • the second BLE end may be, for example, a mobile electronic device such as a mobile phone or a tablet, which is not limited in the embodiment of the present application.
  • the first BLE terminal is taken as a slave device, and the second BLE terminal is a master device as an example for description.
  • the first BLE terminal and the second BLE terminal may also be BLE chips.
  • the first BLE end can be configured as HID.
  • HID For the master device, when receiving a broadcast data packet sent by HID, it actively establishes a connection with the HID, that is, the user does not need to open the control
  • the HID App only needs to keep the Bluetooth module of the main device turned on.
  • the first BLE end can be configured to include HID services, battery (battery) services, and device information (Device Information) services, and the appearance (Appearance) field in the broadcast data packet sent by the first BLE end can be configured.
  • HID battery (battery) services
  • Device Information Device Information
  • the second BLE terminal When the second BLE terminal is close to the first BLE terminal, the second BLE terminal can receive the broadcast data packet sent by the first BLE terminal, and determine that the Appearance field in the broadcast data packet is HID, and the first BLE terminal can be determined
  • the BLE end is HID.
  • the second BLE end may actively establish a first Bluetooth connection with the first BLE end. Specifically, the second BLE end may send a connection request to the first BLE end, The connection response returned by the first BLE terminal is further received to establish the first Bluetooth connection. After that, the second BLE terminal and the first BLE terminal can exchange data through the first Bluetooth connection, for example, obtain all data.
  • the MAC address of the second BLE end The MAC address of the second BLE end.
  • the connection request may also include key information that is exchanged when the second BLE end and the first BLE end establish a binding relationship, so that the first BLE end can determine the first BLE end
  • the second BLE end is a bound device.
  • the first BLE end may also determine whether the second BLE end is a trusted device through the MAC address of the second BLE end, or the MAC address of the second BLE segment and the key information .
  • the first Bluetooth connection is an encrypted link, and the data transmitted on the encrypted link may be the long-term key determined when the second BLE end and the first BLE end are paired.
  • the third BLE end may use the pairing process in the foregoing embodiment to establish The binding relationship between the third BLE end and the first BLE end, further, the first BLE end may obtain the MAC address of the third BLE end, so that the third BLE end can approach the third BLE end next time.
  • the third BLE terminal can actively establish a Bluetooth connection with the first BLE terminal, so that the first BLE terminal can obtain the MAC address of the third BLE terminal based on the Bluetooth connection In order to perform the identity verification of the three BLE ends.
  • the first BLE terminal needs to perform password verification to be paired, and the third BLE terminal paired with the first BLE terminal fails the password verification, or fails to connect with the first BLE terminal, or fails to connect with the first BLE terminal. If the pairing of the BLE end fails, all of these may cause the binding of the first BLE end and the third BLE end to fail, and thus the MAC address of the third BLE end cannot be obtained.
  • the first BLE end as a Bluetooth door lock and the third BLE end as a mobile phone
  • a mobile phone that fails to pair cannot automatically establish a connection with the Bluetooth door lock, and the Bluetooth door lock cannot obtain the MAC address of the mobile phone based on the automatically established connection. .
  • the first BLE terminal may obtain the MAC address of the second BLE terminal based on the established first Bluetooth connection.
  • the first BLE terminal may use the application program interface (API) of the system. Acquire the MAC address of the second BLE end.
  • API application program interface
  • the second BLE end can automatically establish a connection with the first BLE end, so that the first BLE end A BLE terminal may obtain the MAC address of the second BLE terminal through the connection to determine whether the second BLE terminal is a trusted device.
  • the first BLE end may perform identity verification according to the MAC address of the second BLE end, or may also perform identity verification for other identity information that can identify the device. This application does not Limited to this.
  • the MAC address list of the bound device is stored in the first BLE terminal. If the second BLE terminal is a device that has been bound to the first BLE terminal, the first BLE terminal stores the MAC address of the second BLE terminal.
  • the embodiment of the present application does not specifically limit the manner in which the second BLE end and the first BLE end establish a binding relationship.
  • the pairing process in the foregoing embodiment may be used to establish the binding relationship, or If the binding relationship is established in other ways, the embodiment of the present application is not limited to this.
  • the MAC address of the second BLE terminal may be stored when establishing a binding relationship with the second BLE terminal, that is, the first BLE terminal may be stored when establishing a binding relationship with the second BLE terminal Acquire and store the MAC address of the second BLE end, for example, obtain the MAC address of the second BLE end through the API of the system, so that when the next connection is made, the second BLE can be verified by the MAC address of the second BLE end Whether the end is credible.
  • the first BLE end may determine whether the first BLE end is a trusted device according to whether the MAC address of the second BLE end is in the stored MAC address list.
  • the second BLE end may be determined that the second BLE end is a trusted device.
  • the second BLE end is an untrusted device.
  • the MAC address of the second BLE end may also be saved to the MAC address list, so that the next time the connection is made, the The second BLE terminal can control the first BLE terminal.
  • the Bluetooth connection with the first BLE end can be automatically established.
  • the MAC address of the device determines whether the device is a trusted device, and when the device is a trusted device, the control of the first BLE end can be achieved.
  • the bound device since the MAC address of the device is stored on the first BLE end, the user does not need to operate the device to control the first BLE end, which can improve the user experience.
  • the determining whether the first BLE terminal performs the preset operation according to whether the second BLE terminal is a trusted device includes:
  • the signal strength of the second BLE terminal determines whether the first BLE terminal performs the preset operation.
  • the first BLE terminal is a Bluetooth door lock
  • the preset operation may be to turn on the Bluetooth door lock
  • the first BLE terminal is a Bluetooth light
  • the preset operation may be to turn on Bluetooth light, when the preset operation is to turn on the Bluetooth light, when a device that has not been bound to the first BLE terminal approaches the Bluetooth light, the Bluetooth light will not turn on.
  • the first BLE terminal may check the signal strength of the connection to the second BLE terminal, for example, receive a signal Strength (Received Signal Strength Indicator, RSSI), if the RSSI signal strength is less than a preset value, the first BLE end does not perform the preset operation, for example, if the first BLE end is a Bluetooth door lock, it does not open For the Bluetooth door lock, or if the RSSI signal strength is greater than or equal to a preset value, the first BLE end performs a preset operation, for example, if the first BLE end is a Bluetooth door lock, the Bluetooth door lock is turned on.
  • RSSI Received Signal Strength Indicator
  • the preset value can be the RSSI value when the distance between the mobile phone and the door lock is 1m, or the RSSI value when the distance between the mobile phone and the door lock is 0.5m, and the user can adjust the preset value according to needs. This embodiment does not limit this.
  • the time interval during which the second BLE terminal is determined to be a trusted device twice in a row is within the preset time period, it is determined not to operate the first BLE terminal;
  • the time interval during which the second BLE end is determined to be a trusted device twice in a row is greater than the preset duration, it is determined that the first BLE end performs the preset operation.
  • the first array and the second array are set.
  • the first array is used to store the information of the devices that have been successfully matched, that is, the information of the devices whose MAC addresses are in the MAC address list, or that are determined to be trusted devices.
  • Device information the second array is used to store the time count value after the device in the first array is successfully matched.
  • the first BLE end determines that the MAC address of the device A is in the MAC address list, that is, the device A is successfully matched, then it searches in the first array to determine whether it has been matched before.
  • the time count value corresponding to the device A is obtained in the second array, that is, the time interval from the last successful match to the current successful match, If the time count value is less than or equal to the preset duration, for example, 5 minutes, the first BLE terminal does not perform the preset operation, or if the time count value is greater than the preset duration, the first BLE terminal performs the preset operation, Further, the time count value corresponding to the device A in the second array can also be cleared.
  • determining whether the first BLE terminal performs a preset operation according to the time interval during which a device is continuously matched is beneficial to avoid misoperation caused when the device continuously appears near the first BLE terminal.
  • the Bluetooth door lock will frequently perform opening operations, but the user’s The real intention is not to open the Bluetooth door lock.
  • the time interval may be 10 minutes or half an hour, and the user may also adjust the time interval according to requirements, which is not limited in this embodiment.
  • each bound device may correspond to a corresponding time authority.
  • the MAC address list includes the MAC addresses of five devices, and the five devices may correspond to corresponding time authority.
  • device A corresponds to The time permission of is permanent, the time permission corresponding to device B is 10 days, the time permission corresponding to device C is 1 day, etc.
  • the MAC address of the device connected to the first BLE end is in the MAC address list, it can be further combined with the time authority of the device to determine whether the first BLE end performs a preset operation, for example, if the Within the time authority of the device, it can be determined that the first BLE terminal performs the preset operation, such as opening the Bluetooth door lock, otherwise the first BLE terminal does not perform the preset operation, for example, does not open the Bluetooth door lock, so that it can Realize the fine control of different devices on the first BLE end.
  • a preset operation for example, if the Within the time authority of the device, it can be determined that the first BLE terminal performs the preset operation, such as opening the Bluetooth door lock, otherwise the first BLE terminal does not perform the preset operation, for example, does not open the Bluetooth door lock, so that it can Realize the fine control of different devices on the first BLE end.
  • the first BLE end may also update the MAC address list in combination with the time authority of the device, and when the time authority of a certain device is exceeded, the MAC address of the device is cleared from the MAC address list.
  • the devices in the updated MAC address list are all devices within the time authority, and the first BLE terminal can directly determine whether to operate the first BLE terminal according to the MAC address list.
  • the first BLE terminal is a Bluetooth door lock, and 5 mobile phones are bound to the Bluetooth door lock, but only one of the 5 mobile phones has the long-term unlock time permission, and the other devices have only 3 days time permission .
  • the Bluetooth door lock can learn the time authority of the mobile phone. If the time authority has expired, the corresponding MAC address of the mobile phone can be deleted from the MAC address list, and at the same time
  • the mobile phone that is successfully paired with the Bluetooth door lock may also have a key list. After the time authority of the mobile phone expires, the Bluetooth door lock may also delete the key paired with the mobile phone from the key list.
  • the slave device sends a broadcast data packet, where the Appearance field in the broadcast data packet is HID.
  • the master device when the master device approaches the slave device, it can scan the broadcast data packet. According to the Appearance field in the broadcast data packet as HID, it can be determined that the slave device is HID, and the Bluetooth connection with the slave device can be established. .
  • S302 The slave device determines whether to establish a connection with the master device.
  • the master device is a bound device, and when the master device is close to the slave device, the master device can actively establish a Bluetooth connection with the slave device.
  • the master device is an unbound device, and the user can also manually operate the master device to establish a Bluetooth connection with the slave device.
  • the slave device determines whether the master device and the slave device are bound.
  • the master device and the slave device may determine whether they are bound by exchanging key information.
  • the master device may send to the slave device the key information saved when the binding relationship was established.
  • the slave device can verify the key information to determine whether the master device and the slave device are bound.
  • the slave device disconnects from the master device.
  • the master device that has not established a binding relationship, it can be determined that it must be an untrusted device, and the slave device can disconnect its Bluetooth connection.
  • the slave device may also establish the binding relationship between the slave device and the master device through the pairing process described above, so as to execute the subsequent process.
  • the slave device obtains the MAC address of the master device.
  • the slave device may obtain the MAC address of the master device through the API of the system.
  • S307 Store the MAC address in the MAC address list, and further execute S308.
  • the slave device may perform a preset operation, such as opening a Bluetooth door lock or Bluetooth.
  • the slave device may also determine that the master device is an untrusted device.
  • the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not correspond to the embodiments of the present application.
  • the implementation process constitutes any limitation.
  • FIG. 3 is a schematic structural diagram of an apparatus 400 for automatically identifying an identity according to an embodiment of the present application.
  • the apparatus is configured as a human-computer interaction device HID, and includes:
  • the storage module 410 is configured to store a list of MAC addresses of devices that are successfully bound with the device;
  • the Bluetooth low energy BLE module 420 is configured to obtain the media access control MAC address of the second BLE terminal based on the first Bluetooth connection when the second BLE terminal is close to the device, where the second BLE terminal is The equipment bound to the device;
  • the processing module 430 is configured to determine whether the second BLE terminal is a trusted device according to the MAC address of the second BLE terminal, and determine whether the apparatus performs preset according to whether the second BLE terminal is a trusted device operate.
  • the storage module 410 may be a memory, which may be used to store a computer program
  • the processing module 430 may be a processor, which may be used to call and execute the computer program from the memory for executing Figures 1 to 2 show the method steps in the embodiment.
  • the device is configured to include HID service, battery service, and device information service, and the appearance field in the broadcast data packet sent by the first BLE end is HID to set the device Configure as HID.
  • the BLE module before the acquiring the MAC address of the second BLE terminal based on the first Bluetooth connection, the BLE module is further configured to:
  • the BLE module is also used to:
  • the processing module is further configured to:
  • the second BLE end is a trusted device, determine that the device performs the preset operation
  • the second BLE terminal is not a trusted device, it is determined that the device does not perform the preset operation.
  • the processing module is further configured to:
  • the signal strength of the second BLE terminal determines whether the device performs a preset operation.
  • the processing module is further configured to:
  • the second BLE terminal is a trusted device, and the signal strength of the second BLE terminal is greater than or equal to a preset value, determine that the device performs the preset operation; or
  • the second BLE terminal is an optional device, and the signal strength of the second BLE terminal is less than the preset value, it is determined that the device does not perform the preset operation.
  • the processing module is further configured to:
  • the time interval during which the second BLE terminal is determined to be a trusted device twice in a row is within the preset time period, determine that the device does not perform the preset operation;
  • the time interval during which the second BLE end is determined to be a trusted device twice in a row is greater than the preset duration, it is determined that the device performs the preset operation.
  • the processing module is further configured to:
  • the second BLE terminal is a trusted device and is within the time authority of the second BLE terminal, determine that the device performs the preset operation;
  • the second BLE terminal is a trusted device but is not within the time authority range of the second BLE terminal, it is determined that the device does not perform the preset operation.
  • the processing module is further configured to:
  • the second BLE end is a trusted device
  • the second BLE end is an untrusted device.
  • the device is a Bluetooth door lock, and the preset operation is to turn on the Bluetooth door lock; or the device is a Bluetooth light, and the preset operation is to turn on the Bluetooth light .
  • the Bluetooth connection with the device can be automatically established, and it can be further determined whether it is based on the MAC address of the device.
  • a trusted device when the device is a trusted device, the device can be controlled. For a bound device, since the device's MAC address is stored on the device, the user does not need to operate the device. The device can be controlled and the user experience can be improved.
  • the above-mentioned processing module may be an integrated circuit chip with signal processing capability.
  • the steps of the foregoing method embodiments may be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
  • the above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP Digital Signal Processor
  • ASIC application specific integrated circuit
  • FPGA ready-made programmable gate array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the above-mentioned storage module may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), and electrically available Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • DDR SDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • Enhanced SDRAM, ESDRAM Enhanced Synchronous Dynamic Random Access Memory
  • Synchronous Link Dynamic Random Access Memory Synchronous Link Dynamic Random Access Memory
  • DR RAM Direct Rambus RAM
  • the embodiment of the present application also provides a chip for implementing the method in the embodiment shown in FIG. 1 and FIG. 2.
  • the chip includes: a processor, configured to call and run a computer program from the memory, so that the device installed with the chip executes the method in the foregoing embodiment.
  • the embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium can be applied to the device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the first BLE end or the second BLE end in each method of the embodiment of the present application. For the sake of brevity, No longer.
  • the embodiments of the present application also provide a computer program product, including computer program instructions.
  • the computer program product can be applied to the device in the embodiment of the present application, and the computer program instruction causes the computer to execute the corresponding process implemented by the first BLE end or the second BLE end in each method of the embodiment of the present application. For the sake of brevity, This will not be repeated here.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un procédé et un appareil de reconnaissance automatique d'identité, et une puce. Le procédé est appliqué à une première extrémité Bluetooth à faible énergie (BLE). La première extrémité BLE est configurée comme un dispositif d'interface humaine (HID). Le procédé consiste à : obtenir, lorsqu'une seconde extrémité BLE est proche de la première extrémité BLE, une adresse de commande d'accès au support (MAC) de la seconde extrémité BLE sur la base d'une première connexion Bluetooth, la seconde extrémité BLE étant un dispositif qui a été lié à la première extrémité BLE ; déterminer, en fonction de l'adresse MAC de la seconde extrémité BLE, si la seconde extrémité BLE est un dispositif de confiance ; et déterminer, selon que la seconde extrémité BLE est un dispositif de confiance, si la première extrémité BLE réalise une opération prédéfinie.
PCT/CN2020/075363 2020-02-14 2020-02-14 Procédé et appareil de reconnaissance automatique d'identité, et puce WO2021159506A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202080001499.1A CN111758248B (zh) 2020-02-14 2020-02-14 自动识别身份的方法、装置和芯片
PCT/CN2020/075363 WO2021159506A1 (fr) 2020-02-14 2020-02-14 Procédé et appareil de reconnaissance automatique d'identité, et puce

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/075363 WO2021159506A1 (fr) 2020-02-14 2020-02-14 Procédé et appareil de reconnaissance automatique d'identité, et puce

Publications (1)

Publication Number Publication Date
WO2021159506A1 true WO2021159506A1 (fr) 2021-08-19

Family

ID=72713474

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/075363 WO2021159506A1 (fr) 2020-02-14 2020-02-14 Procédé et appareil de reconnaissance automatique d'identité, et puce

Country Status (2)

Country Link
CN (1) CN111758248B (fr)
WO (1) WO2021159506A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112466015A (zh) * 2020-12-21 2021-03-09 上海哈敦智能科技有限公司 Ble蓝牙无钥匙感应系统
CN115273278A (zh) * 2022-03-16 2022-11-01 浙江利尔达物联网技术有限公司 一种基于ble hid profile的靠近自动解锁的方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394531A (zh) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 终端设备的无线网络连接方法
CN105430603A (zh) * 2015-12-03 2016-03-23 北京握奇智能科技有限公司 一种蓝牙设备的安全连接方法及系统
CN106550314A (zh) * 2015-09-19 2017-03-29 深圳市潮流网络技术有限公司 一种基于蓝牙定位技术的呼叫转移方法
CN107396283A (zh) * 2017-06-30 2017-11-24 上海斐讯数据通信技术有限公司 一种路由器无线连接认证方法与系统
CN108537934A (zh) * 2018-06-12 2018-09-14 上海酷信息科技有限公司 蓝牙感应钥匙
CN108542055A (zh) * 2018-06-12 2018-09-18 上海酷信息科技有限公司 骑行手环

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9992615B2 (en) * 2016-01-14 2018-06-05 Lg Electronics Inc. Method and apparatus for controlling a device using Bluetooth technology
US9961484B2 (en) * 2016-01-22 2018-05-01 Lg Electronics Inc. Method and apparatus for controlling a device using bluetooth technology
CN105931330B (zh) * 2016-04-19 2019-03-05 北京奇虎科技有限公司 智能开锁方法和智能锁
CN106127892A (zh) * 2016-06-17 2016-11-16 广东工业大学 一种基于蓝牙通信的家居门控方法
CN106780901A (zh) * 2016-12-27 2017-05-31 李天瑜 一种基于手机mac地址的智能门锁系统及其应用
CN107274531A (zh) * 2017-07-07 2017-10-20 成都东软学院 门禁控制方法及门禁系统
CN107545636A (zh) * 2017-09-04 2018-01-05 杭州干城科技有限公司 基于蓝牙通信的光交箱智能锁控制方法、装置及其系统
KR102422330B1 (ko) * 2017-09-13 2022-07-19 현대자동차주식회사 차량, 차량과 통신하는 단말기, 및 차량의 제어 방법
CN107833317A (zh) * 2017-10-20 2018-03-23 珠海华发新科技投资控股有限公司 蓝牙门禁控制系统和方法
CN109905869A (zh) * 2019-04-04 2019-06-18 苏州足加新能源科技有限公司 一种充电设备与智能设备间数据传输方法
CN110572804B (zh) * 2019-08-27 2022-04-22 暨南大学 蓝牙通信认证请求、接收及通信方法、移动端、设备端
KR102086722B1 (ko) * 2019-08-28 2020-03-09 주식회사 블루앤 방향 탐지 기반의 실내외 접근 식별을 통한 출입문 원격 개방 시스템

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394531A (zh) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 终端设备的无线网络连接方法
CN106550314A (zh) * 2015-09-19 2017-03-29 深圳市潮流网络技术有限公司 一种基于蓝牙定位技术的呼叫转移方法
CN105430603A (zh) * 2015-12-03 2016-03-23 北京握奇智能科技有限公司 一种蓝牙设备的安全连接方法及系统
CN107396283A (zh) * 2017-06-30 2017-11-24 上海斐讯数据通信技术有限公司 一种路由器无线连接认证方法与系统
CN108537934A (zh) * 2018-06-12 2018-09-14 上海酷信息科技有限公司 蓝牙感应钥匙
CN108542055A (zh) * 2018-06-12 2018-09-18 上海酷信息科技有限公司 骑行手环

Also Published As

Publication number Publication date
CN111758248B (zh) 2021-10-22
CN111758248A (zh) 2020-10-09

Similar Documents

Publication Publication Date Title
US10812969B2 (en) System and method for configuring a wireless device for wireless network access
AU2006211768B2 (en) Wireless network system and communication method for external device to temporarily access wireless network
EP2630816B1 (fr) Authentification d'identités de terminaux d'accès dans des réseaux itinérants
US20050086465A1 (en) System and method for protecting network management frames
EP3032845B1 (fr) Dispositif d'aide auditive apte à authentifier une demande de changer un mode de service et procédé associé
US20030236980A1 (en) Authentication in a communication system
US11546699B2 (en) Hearing device with service mode and related method
JP2000269959A (ja) キー更新による認証方法
CN106961334A (zh) 控制器和附件之间的安全无线通信
CN106559213B (zh) 设备管理方法、设备及系统
WO2021159506A1 (fr) Procédé et appareil de reconnaissance automatique d'identité, et puce
KR20160143333A (ko) 이중 채널을 이용한 이중 인증 방법
CN112512048B (zh) 移动网络接入系统、方法、存储介质及电子设备
EP3942770B1 (fr) Modules de plate-forme de confiance enchaînés (tpm) en tant que bus sécurisé de pré-placement des capacités de dispositif
KR101451163B1 (ko) 무선 네트워크 접속 인증 방법 및 그 시스템
US20240054836A1 (en) Physical access control system with secure relay
KR20190047557A (ko) 비동기식 근거리 무선 통신을 통해 오티피를 제공하는 이어폰 장치
WO2022248258A1 (fr) Protection contre les attaques par réexécution
Wognsen et al. A secure relay protocol for door access control
WO2021043396A1 (fr) Dispositif et procédé pour faire fonctionner un dispositif
WO2019076041A1 (fr) Procédé de connexion appariée de dispositifs d'accès, et dispositifs d'accès
DK201470778A1 (en) Hearing device with service mode and related method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20918458

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20918458

Country of ref document: EP

Kind code of ref document: A1