WO2022161098A1 - 一种秘钥的分发方法及电子设备 - Google Patents

一种秘钥的分发方法及电子设备 Download PDF

Info

Publication number
WO2022161098A1
WO2022161098A1 PCT/CN2021/143193 CN2021143193W WO2022161098A1 WO 2022161098 A1 WO2022161098 A1 WO 2022161098A1 CN 2021143193 W CN2021143193 W CN 2021143193W WO 2022161098 A1 WO2022161098 A1 WO 2022161098A1
Authority
WO
WIPO (PCT)
Prior art keywords
bluetooth
electronic device
secret key
location information
distance
Prior art date
Application number
PCT/CN2021/143193
Other languages
English (en)
French (fr)
Inventor
刘治文
Original Assignee
展讯通信(上海)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 展讯通信(上海)有限公司 filed Critical 展讯通信(上海)有限公司
Publication of WO2022161098A1 publication Critical patent/WO2022161098A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • the present application relates to the field of terminal technologies, and in particular, to a key distribution method and electronic device.
  • BLE Isochronous Channels that is, the physical layer standard of BLE Audio technology
  • BLE Isochronous Channels that is, the physical layer standard of BLE Audio technology
  • BLE Isochronous Channels that is, the physical layer standard of BLE Audio technology
  • BLE Isochronous Channels that is, the physical layer standard of BLE Audio technology
  • BLE Isochronous Channels that is, the physical layer standard of BLE Audio technology
  • BLE Isochronous Streams Broadcast Isochronous Streams
  • CIG Connection-oriented CIG
  • the present application provides a key distribution method and an electronic device, and the present application also provides a computer-readable storage medium to provide a key distribution method to improve the security of electronic devices during broadcasting.
  • the present application provides a method for distributing a secret key, which is applied to an electronic device, and the method includes:
  • a key is sent to one or more Bluetooth devices.
  • the location information includes the alignment angle and distance between the electronic device and the Bluetooth device, and based on the location information, a secret key is sent to one or more Bluetooth devices, including:
  • the key is sent to the Bluetooth device.
  • the secret key includes a ciphertext portion
  • the ciphertext portion includes an alignment angle and distance between the electronic device and the Bluetooth device.
  • the location information includes the distance between the electronic device and the Bluetooth device, and based on the location information, a secret key is sent to one or more Bluetooth devices, including:
  • the secret key is sent to the Bluetooth device.
  • the method further includes:
  • the first data is broadcast to one or more Bluetooth devices, the first data is encrypted based on the secret key.
  • the present application provides a method for distributing a secret key, which is applied to an electronic device, and the method includes:
  • the access code is sent to the Bluetooth device, so that the Bluetooth device calculates and obtains the secret key based on the sequence code and the access code.
  • the present application provides a key distribution device, including:
  • an acquisition module for acquiring the location information of one or more Bluetooth devices
  • the sending module is used for sending the secret key to one or more Bluetooth devices based on the location information.
  • the location information includes the alignment angle and distance between the electronic device and the Bluetooth device, and the sending module is also used for
  • the key is sent to the Bluetooth device.
  • the secret key includes a ciphertext portion
  • the ciphertext portion includes an alignment angle and distance between the electronic device and the Bluetooth device.
  • the location information includes the distance between the electronic device and the Bluetooth device, and the sending module is also used for
  • the secret key is sent to the Bluetooth device.
  • a broadcast module configured to broadcast the first data to one or more Bluetooth devices, where the first data is encrypted based on the secret key.
  • the present application provides another key distribution device, which is applied to electronic equipment, and the method includes:
  • the receiving module is used to receive the serial code sent by the Bluetooth device
  • a judging module for judging whether the serial code is occupied
  • the sending module is configured to send the access code to the Bluetooth device if it is not occupied, so that the Bluetooth device can obtain the secret key based on the sequence code and the access code.
  • the present application provides a chip module including the key distribution apparatus according to any one of the above-mentioned first aspect.
  • the present application provides a chip module, including the device for distributing the secret key in the second aspect.
  • the present application provides an electronic device, the electronic device further includes a processor and a storage device, the storage device stores an application program, and when the application program is run by the processor, the electronic device executes any one of the first aspects above distribution method.
  • the present application provides an electronic device, the electronic device further includes a processor and a storage device, the storage device stores an application program, and when the application program is run by the processor, the electronic device executes the distribution method in the second aspect above .
  • the present application provides a computer-readable storage medium, including computer instructions, which, when the computer instructions are executed on a computer device, cause the computer device to execute the distribution method according to any one of the above-mentioned first aspects.
  • the present application provides a computer-readable storage medium, comprising computer instructions, which, when executed on a computer device, cause the computer device to perform the distribution method in the second aspect.
  • FIG. 1 is a BIG application scenario diagram provided by an embodiment of the present application
  • Fig. 2 is a BIGInfo air interface format diagram provided by an embodiment of the present application
  • FIG. 3 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 4 is a flowchart of a method for distributing a secret key provided by an embodiment of the present application
  • FIG. 5 is a schematic diagram of a first preset area in an embodiment of the present application.
  • FIG. 6 is a flowchart of another method for distributing a secret key provided by an embodiment of the present application.
  • first and second are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implicitly indicating the number of indicated technical features.
  • a feature defined as “first” or “second” may expressly or implicitly include one or more of that feature.
  • plural means two or more.
  • BIS is a logical transmission that enables devices to transmit isochronous data, which can be framed or unframed.
  • BIS supports variable size packets and the transmission of one or more packets per isochronous event, allowing a range of data rates to be supported.
  • Data communication is one-way from the broadcast device; therefore, without an acknowledgment protocol, broadcast synchronous communication is inherently unreliable.
  • BIS supports multiple retransmissions (see 4.4.6.1 Broadcast Isochronous Stream).
  • a BIG consists of two or more BISs with the same ISO_Interval that are expected to have a temporal relationship at the application layer, or consists of a single BIS.
  • the maximum number of BISs in a large system should be 31. Large events also contain control sub-events (see Section 4.4.6.7)
  • FIG. 1 specifically relates to a BIG application scenario diagram provided by an embodiment of the present application.
  • One audio source device (center device C) and 4 speakers form a BIG, and there is an independent BIS between each speaker and the audio device.
  • Broadcast_code/GIV/GSKD is randomly generated and broadcast in the form of plaintext on the air interface.
  • Broadcast_Code comes from the upper host protocol stack and is the seed variable of the entire encryption process. The description of these parameters in the protocol is as follows:
  • a BIG can be encrypted, in which case all BIS pdus of all BISs in that BIG (except those with empty payloads) should be encrypted.
  • the link layer shall determine whether the BIG is encrypted by checking the length of the BIG Info (see 4.4.6.11). The rest of this section applies only to Crypto BISE.
  • Broadcast_Code a 16-octet parameter provided by the host.
  • GIV 64-bit parameters generated by the controller.
  • GSKD a 128-bit parameter generated by the controller.
  • the simulcaster's controller shall generate new GIVs and GSKDs using the random number generation requirements defined in Section 2 of Part H of [Vol 3] and shall transmit them in the BIG Info.
  • Each broadcast synchronization PDU in the encrypted BIG shall be encrypted using the CCM algorithm (see [Vol 6] part E, clause 2).
  • GIV/GSKD are two fields in BIGInfo.
  • BIGInfo carries all parameters related to the current BIG, and its air interface format can be seen in FIG. 2, which specifically relates to the BIGInfo air interface format diagram provided by an embodiment of the present application.
  • Broadcast_code/GSKD is used to generate the GSK used for the final broadcast link encryption, and GIV is used for the final algorithm flow of encrypting the plaintext.
  • Broadcast_code is the seed parameter of the entire BIG encryption process, and because GIV/GSKD is in the The air interface is sent in plaintext, and Broadcast_Code is a key security control parameter.
  • Broadcast_Code is used to support encrypted BIS. It is used to encrypt the data encryption process in BIS transmission and the data decryption process in BIS reception.
  • the term "Bluetooth Privacy Code” shall be used.
  • Broadcast_Code has different representation levels on different networks. On at the UI level, the Broadcast Code shall be represented as a string of at least 4 octets, meeting the requirements for PINUI in section 3.2.3.3 (e.g. no more than 16 octets when represented in UTF-8) . 16 octets for a higher level of security
  • Broadcast_Code should be represented as a 128-bit value.
  • the conversion from string to number should represent the string via UTF-8, placing the resulting bytes in an 8-bit field, starting with the least significant bit, and then padding the most significant bit with zeros (if necessary).
  • the string " House” is represented as the value 0x00000000_6573756F_4820656E_72B8C342.
  • LE Security Mode 3 has three security levels: 1 No security (no authentication and encryption); 2 Use unauthenticated Broadcast_Code; 3 Use authenticated Broadcast_Code.
  • the device should indicate an appropriate error to the user if the Broadcast_Code was not received by the device using a verified method (eg, the Broadcast_Code is not sufficiently secure)
  • Devices with services that require the use of unauthenticated encrypted BIG should have their security set to LE Security Mode 3 Level 2.
  • Devices with services that require the use of an authenticated encrypted BIG should have their security set to LE Security Mode 3 Level 3.
  • the host When a user initiates a service that includes a broadcast encryption key, the host shall provide the controller with the broadcast code associated with the encryption key.
  • the device When the user starts a service that needs to receive encrypted BIS, the device should use the broadcast code of the encrypted BIS. If the device does not have a broadcast code or cannot obtain a broadcast code, an appropriate error should be indicated to the user (eg code not available).
  • the present application provides a method for distributing a secret key, where the secret key includes but is not limited to Broadcast_Code.
  • FIG. 3 is a schematic structural diagram of an electronic device provided by an embodiment of the present application, the method can be applied to the electronic device 3, and the electronic device 3 includes, but is not limited to, a processor 31 and a memory 32.
  • FIG. 3 is only an example of an electronic device, and does not constitute a limitation on the electronic device 3. It may include more or less components than the one shown in the figure, or combine some components, or different components,
  • the electronic device 3 may also include an input and output device, a network access device, a bus, and the like.
  • the so-called processor 31 may be a central processing unit (Central Processing Unit, CPU), or other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory 32 may be an internal storage unit of the electronic device 1 , such as a hard disk or a memory of the electronic device 3 .
  • the memory 32 can also be an external storage device of the electronic device 1, such as a plug-in hard disk equipped on the electronic device 3, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, a flash memory card (Flash Card), etc.
  • the memory 32 may also include both an internal storage unit of the electronic device 3 and an external storage device.
  • the memory 32 is used to store computer programs and other programs and data required by the electronic device 3 .
  • the memory 32 may also be used to temporarily store data that has been or will be output.
  • the electronic device may further include a display screen for displaying images, videos, etc., and may also be used for accepting data input by a user.
  • the display includes a display panel.
  • the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode or an active-matrix organic light-emitting diode (active-matrix organic light).
  • AMOLED organic light-emitting diode
  • FLED flexible light-emitting diode
  • Miniled MicroLed, Micro-oLed, quantum dot light-emitting diode (quantum dot light emitting diodes, QLED) and so on.
  • the electronic device 3 may include 1 or N display screens 104 , where N is a positive integer greater than 1.
  • FIG. 4 it is a flowchart of a method for distributing a secret key provided by an embodiment of the present application.
  • the method can be applied to the above-mentioned electronic device, and specifically includes:
  • Step 402 the electronic device obtains the location information of one or more Bluetooth devices
  • a specific electronic device may send a positioning request or receive positioning information sent by a Bluetooth device to acquire position information of one or more Bluetooth devices.
  • the electronic device may acquire the alignment angle and signal strength information of the electronic device and one or more Bluetooth devices based on the positioning technology in the Bluetooth protocol or other positioning technologies.
  • the alignment angle includes, but is not limited to, the angle of arrival and the angle of departure.
  • the calculation of the angle of arrival and the angle of departure is relative to the sending or receiving device, and the specific obtaining method refers to the relevant protocol, which is not limited here.
  • the electronic device may also determine the distance information with the Bluetooth device based on the signal strength information with one or more Bluetooth devices.
  • the Bluetooth device that communicates with the electronic device can also determine the alignment angle and distance between the electronic device and the electronic device when receiving broadcast data from the electronic device.
  • Step 404 based on the location information, send a secret key to the Bluetooth device,
  • the electronic device may send a secret key to the Bluetooth device, such as Broadcast_Code, when it is detected that the distance from the Bluetooth device is less than a preset distance threshold, eg, less than 0.1 meters, based on the near-field technology.
  • the Bluetooth device can decrypt the data packet encrypted with the secret key broadcast by the electronic device to obtain data.
  • an electronic device is set up as a key distribution device in a venue.
  • a Bluetooth device such as a headset
  • the electronic device detects that the distance from the headset is less than a preset threshold, it sends the secret key to the headset. .
  • the electronic device determines a first preset area based on the alignment angle and distance between the electronic device and one or more of the Bluetooth devices, and only the Bluetooth devices in the first preset area can Get the secret key sent by the electronic device.
  • FIG. 5 specifically relates to a schematic diagram of a first preset area determined by an electronic device in an embodiment of the present application.
  • the electronic device 502 can set a first preset area, and the size of the first preset area can be set as required.
  • the electronic device 502 can determine whether each Bluetooth device falls within the first preset area according to the alignment angle and distance of each Bluetooth device, and if it falls within the first preset area, send the secret key To the Bluetooth devices in the first preset area.
  • FIG. 5 Exemplarily, in FIG. 5 , 504 , 506 and 508 are located in the first preset area 500 (in the box), which are legitimate users.
  • 510 and 512 are outside the first preset area and are illegal users.
  • the secret key sent by the electronic device 502 to each Bluetooth device includes a ciphertext portion, which may be the distance and alignment angle between the electronic device and the Bluetooth device.
  • the Bluetooth device can determine the distance and alignment angle between it and the electronic device, and use the distance and the anti-rotation angle to decrypt the encrypted data.
  • the Broadcase_code consists of two parts, one part is shared in plain text, and the other part is the cipher text part located based on the first preset area, and only the Bluetooth device in the first preset area can obtain the correct password. text to obtain the final broadcast_code.
  • FIG. 6 it is specifically related to a flowchart of a method for distributing a secret key provided by an embodiment of the present application, which is applied to the above electronic device.
  • Step 602 the electronic device receives the serial code sent by the Bluetooth device.
  • the serial code is used to limit the number of Bluetooth devices that communicate with the electronic device.
  • the serial code is all positive integers from 1 to 9, that is, it indicates that the electronic device can communicate with 9 Bluetooth devices at most.
  • the Bluetooth device is an electronic device that can have an input function, and can receive a serial code input by a user, and after receiving the user's serial code, send the serial code to the electronic device.
  • Step 604 judging whether the sequence code is occupied
  • the electronic device After receiving the serial code, the electronic device can determine whether the serial code is occupied. That is, whether a user has already used the serial code.
  • Step 606 determine whether the sequence code is occupied
  • the access code is sent to the Bluetooth device.
  • the access code can be a set of random and unique access codes.
  • the Bluetooth device can use the access code and the serial code to calculate the pre-configured algorithm. Secret key.
  • the Bluetooth device after receiving the access code, the Bluetooth device can display the access code, and then the user inputs the data serial number and the access code to the Bluetooth device again to calculate the secret key.
  • the electronic device may not return the access code or return an incorrect access code. Thereby preventing unauthorized users from accessing.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. It should be noted that, the division of modules in the embodiment of the present invention is schematic, and is only a logical function division, and there may be other division manners in actual implementation.
  • Each functional unit in each of the embodiments of the embodiments of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a computer-readable storage medium.
  • a computer-readable storage medium includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: flash memory, removable hard disk, read-only memory, random access memory, magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

本申请提供了一种秘钥的分发方法,应用于电子设备,所述方法包括:获取一个或多个蓝牙设备的位置信息;基于所述位置信息,向一个或多个所述蓝牙设备发送秘钥,以提高广播的安全性。

Description

一种秘钥的分发方法及电子设备
本申请要求于2021年01月29日提交中国专利局、申请号为202110126460.9、申请名称为“一种秘钥的分发方法及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及终端技术领域,尤其涉及一种秘钥的分发方法及电子设备。
背景技术
T5.2 CORE SPEC发布了BLE Isochronous Channels(即BLE Audio技术的物理层标准),具体细分为面向广播的BIG(Broadcast Isochronous Streams)标准和面向连接的CIG(Connected Isochronous Group)标准。BIG和CIG有独立的安全模型和加密流程,CIG的安全模型和加密流程与BLE ACL保持一致。但是BIG的安全模型和加密流程在CORE SPEC中有说明,但在具体场景中有诸多不足之处。
发明内容
本申请提供了一种秘钥的分发方法及电子设备,本申请还提供一种计算机可读存储介质,以提供一种一种秘钥的分发方法,以提高电子设备广播时安全性。
第一方面,本申请提供了一种秘钥的分发方法,应用于电子设备,方法包括:
获取一个或多个蓝牙设备的位置信息;
基于位置信息,向一个或多个蓝牙设备发送秘钥。
进一步地,位置信息包括电子设备与蓝牙设备之间的对准角度与距离,基于位置信息,向一个或多个蓝牙设备发送秘钥,包括:
基于电子设备与一个或多个蓝牙设备之间的对准角度与距离,判断蓝牙设备是否在预设区域内;
若判断结果为在预设区域内,向蓝牙设备发送秘钥。
进一步地,秘钥包括密文部分,密文部分包括电子设备与蓝牙设备之间的对准角度与距离。
进一步地,位置信息包括电子设备与蓝牙设备之间的距离,基于位置信息,向一个或多个蓝牙设备发送秘钥,包括:
判断电子设备与蓝牙设备之间的距离是否小于预设距离阈值;
若判断结果为小于预设距离阈值,向蓝牙设备发送秘钥。
进一步地,基于位置信息,向一个或多个蓝牙设备发送秘钥之后,方法还包括:
向一个或多个蓝牙设备广播第一数据,第一数据基于秘钥进行加密。
第二方面,本申请提供了一种秘钥的分发方法,应用于电子设备,方法包括:
接收蓝牙设备发送的序列码;
判断序列码是否属于预设序列码;
若属于预设序列码,向蓝牙设备发送接入码,以使得蓝牙设备基于序列码和接入码计算获得秘钥。
第三方面,本申请提供了一种秘钥的分发装置,包括:
获取模块,用于获取一个或多个蓝牙设备的位置信息;
发送模块,用于基于位置信息,向一个或多个蓝牙设备发送秘钥。
进一步地,位置信息包括电子设备与蓝牙设备之间的对准角度与距离,发送模块还用于
基于电子设备与一个或多个蓝牙设备之间的对准角度与距离,判断蓝牙设备是否在预设区域内;
若判断结果为在预设区域内,向蓝牙设备发送秘钥。
进一步地,秘钥包括密文部分,密文部分包括电子设备与蓝牙设备之间的对准角度与距离。
进一步地,位置信息包括电子设备与蓝牙设备之间的距离,发送模块还用于
判断电子设备与蓝牙设备之间的距离是否小于预设距离阈值;
若判断结果为小于预设距离阈值,向蓝牙设备发送秘钥。
进一步地,还包括广播模块,用于向一个或多个蓝牙设备广播第一数据,第一数据基于秘钥进行加密。
第四方面,本申请提供了另一种秘钥的分发装置,应用于电子设备,方法包括:
接收模块,用于接收蓝牙设备发送的序列码;
判断模块,用于判断所述序列码是否被占用;
发送模块,用于若未被占用,向蓝牙设备发送接入码,以使得蓝牙设备基于序列码和接入码计算获得秘钥。
第五方面,本申请提供了一种芯片模组,包括上述第一方面中任一项的秘钥的分发装置。
第六方面,本申请提供了一种芯片模组,包括上述第二方面中秘钥的分发装置。
第七方面,本申请提供了一种电子设备,电子设备还包括处理器和存储设备,存储设备存有应用程序,应用程序由处理器运行时,使得电子设备执行上述第一方面中任一项的分发方法。
第八方面,本申请提供了一种电子设备,电子设备还包括处理器和存储设备,存储设备存有应用程序,应用程序由处理器运行时,使得电子设备执行上述第二方面中的分发方法。
第九方面,本申请提供了一种计算机可读存储介质,包括计算机指令,当计算机指令在计算机设备上运行时,使得计算机设备执行如上述第一方面中任一项分发方法。
第十方面,本申请提供了一种计算机可读存储介质,包括计算机指令,当计算机指令在计算机设备上运行时,使得计算机设备执行如上述第二方面中分发方法。
附图说明
图1为本申请一个实施例提供的BIG应用场景图;
图2为本申请一个实施例提供的BIGInfo空口格式图;
图3为本申请一个实施例提供的电子设备的结构示意图;
图4为本申请实施例提供的一种秘钥的分发方法的流程图;
图5为本申请一个实施例中的第一预设区域的示意图;
图6为本申请实施例提供的令另一种秘钥的分发方法的流程图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请实施例的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。
以下,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。在本申请实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。
现在公布的BT5.2 CORE SPEC中,BIG和BIS的定义如下,
BIS是一种逻辑传输,使设备能够传输同步数据,等时数据可以是有帧的,也可以是无帧的。BIS支持可变大小的数据包以及在每个等时事件中传输一个或多个数据包,从而允许支持一定范围的数据速率。数据通信是来自广播设备的单向的;因此没有确认协议,广播同步通信本质上是不可靠的。为了提高分组传送的可靠性,BIS支持多次重传(见4.4.6.1 Broadcast Isochronous Stream)。
一个BIG由两个或多个具有相同ISO_Interval的BIS组成,它们在应用层预期具有时间关系,或者由一个BIS组成。一个大系统中的最大BIS数应为31。大事件还包含控制子事件(参见第4.4.6.7节)
一个典型的BIG应用场景可以参考图1,具体涉及本申请一个实施例提供的BIG应用场景图。一个音源设备(中心设备C)和4台音箱组成一个BIG,每个音箱和音源设备间有一条独立BIS。
现在公布的BT5.2 CORE SPEC中,BIG加密流程中有3个主要的变量,Broadcast_code/GIV/GSKD,GIV/GSKD是随机产生的,在空口以明文的形式广播。Broadcast_Code来自于上层的host协议栈,是整个加密流程的种子变量,协议中对这些参数的描写如下:
一个BIG可以被加密,在这种情况下,该BIG中所有BIS的所有BIS pdu(除了那些有空负载的)都应该被加密。链路层应通过检查BIG Info的长度来确定BIG是否加密(见第4.4.6.11节)。本节其余部分仅适用于加密BISE。
在加密或解密BIG中所有广播同步PDU的过程中,应使用以下参数:
Broadcast_Code,主机提供的16个八位字节的参数。
GIV,控制器生成的64位参数。
GSKD,由控制器生成的128位参数。
对于每个加密的BIG,同步广播公司的控制器应使用[Vol 3]H部分第2节中定义的随机数生成要求生成新的GIV和GSKD,并应在BIG Info中传输它们。应使用CCM 算法对加密BIG中的每个广播同步PDU进行加密(见[Vol 6]E部分,第2节)。
GIV/GSKD是BIGInfo中的两个字段,BIGInfo携带所有的关于当前BIG的参数,其空口格式可参见图2,具体涉及本申请一个实施例提供的BIGInfo空口格式图。
Broadcast_code/GSKD用于产生最终广播链路加密使用的GSK,GIV用于最终对明文进行加密的算法流程,从下图可以得出,Broadcast_code是整个BIG加密流程的种子参数,而且因为GIV/GSKD在空口以明文形式发送,Broadcast_Code是安全的关键控制参数。
关于Broadcast Code的表现形式,BT5.2 CORE SPEC中给出了简单的描述,参照下面的介绍:
Broadcast_Code用于支持加密的BIS。它用于加密BIS传输中的数据加密过程和BIS接收中的数据解密过程。当在UI级别上引用Broadcast_Code时,应使用术语“蓝牙隐私代码”。Broadcast_Code在不同的网络上有不同的表示水平。打开在UI级别,Broadcast Code应表示为至少4个八位字节的字符串,满足第3.2.3.3节对PINUI的要求(例如,在UTF-8中表示时不超过16个八位字节)。16个八位字节应用于更高级别的安全性
在除UI以外的所有级别上,Broadcast_Code应表示为128位值。从字符串到数字的转换应通过UTF-8表示字符串,将产生的字节放在8位字段中,从最低有效位开始,然后在最高有效位中填充零(如有必要)。例如,字符串“
Figure PCTCN2021143193-appb-000001
House”表示为值0x00000000_6573756F_4820656E_72B8C342。
关于BIG的顶层安全模型,BT5.2 CORE SPEC只给出了简单的描述,没有任何细节技术和标准,参考下面的介绍:
LE安全模式3有三个安全级别:1无安全性(无身份验证和加密);2使用未经认证的Broadcast_Code码;3使用经过身份验证的Broadcast_Code。
当服务需要3级安全性时,如果设备没有使用经过验证的方法接收到Broadcast_Code,则设备应向用户指示适当的错误(例如,Broadcast_Code的安全性不足)
具有需要使用未经验证的加密BIG的服务的设备应将其安全设置为LE安全模式3级别2。具有需要使用经过身份验证的加密BIG的服务的设备应将其安全设置为LE安全模式3级别3。
当用户发起包括广播加密大的服务时,主机应向控制器提供与加密大相关的广播编码。
当用户启动需要接收加密BIS的服务时,设备应使用该加密BIS的广播码。如果设备没有广播代码或无法获得广播代码,则应向用户指示适当的错误(例如,代码不可用)。
发明人发现,协议中对应密钥(Broadcast_Code)的产生/分发/存储/更新,密钥使用数量的限制,密钥使用者的限制和鉴权,并没有做过多的解释和说明,并不能满足更多的安全需求。
基于此,本申请提供了一种秘钥的分发方法,该秘钥包括但不限于Broadcast_Code。
参见图3为本申请一个实施例提供的电子设备的结构示意图,该方法可应用于电 子设备3上,电子设备3包括,但不仅限于,处理器31、存储器32。本领域技术人员可以理解,图3仅仅是电子设备的示例,并不构成对电子设备3的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如电子设备3还可以包括输入输出设备、网络接入设备、总线等。
所称处理器31可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
存储器32可以是电子设备1的内部存储单元,例如电子设备3的硬盘或内存。存储器32也可以是电子设备1的外部存储设备,例如电子设备3上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,存储器32还可以既包括电子设备3的内部存储单元也包括外部存储设备。存储器32用于存储计算机程序以及电子设备3所需的其他程序和数据。存储器32还可以用于暂时地存储已经输出或者将要输出的数据。
在一个实施例中,电子设备还可包括显示屏,用于显示图像,视频等,还可以用来接受用户输入的数据。显示屏包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备3可以包括1个或N个显示屏104,N为大于1的正整数。
参见图4,为本申请一个实施例提供的秘钥的分发方法的流程图,该方法可应用于上述电子设备,具体包括:
步骤402,电子设备获取一个或多个蓝牙设备的位置信息
具体电子设备可以发送定位请求或者接收蓝牙设备发送的定位信息,以获取一个或多个蓝牙设备的位置信息。
示例性地,电子设备可以基于蓝牙协议中的定位技术或其他定位技术,获取电子设备与一个或多个蓝牙设备的对准角度和信号强度信息。示例性地,该对准角度包括但不限于到达角和离开角。到达角和离开角的计算是相对发送或者接收设备而言的,具体的获取方法参照相关协议,在此不进行限定。
示例性地,电子设备还可以基于与一个或多个蓝牙设备之间的信号强度信息,确定与蓝牙设备之间的距离信息。
同理,与电子设备进行通信的蓝牙设备也可以在接收电子设备的广播数据时,确定电子设备与其之间的对准角度与距离。
步骤404,基于位置信息,向所述蓝牙设备发送秘钥,
在一个实施例中,电子设备可以基于近场技术,当检测到与蓝牙设备的距离小于预设距离阈值时,例如小于0.1米时,向蓝牙设备发送秘钥,如发送Broadcast_Code。 蓝牙设备接收到秘钥后,可以对电子设备广播的用该秘钥加密的数据包进行解密,以获取数据。例如,电子设备作为秘钥的分发设备设置一会场中,用户拿着耳机等蓝牙设备接近或者碰触该电子设备时,电子设备检测到与耳机的距离小于预设阈值时,向耳机发送秘钥。
在一个实施例中,电子设备基于所述电子设备与一个或多个所述蓝牙设备之间的对准角度与距离,确定第一预设区域,且第一预设区域内的蓝牙设备才可获取该电子设备发送的秘钥。
具体地,参见图5,具体涉及本申请一个实施例中的电子设备所确定的第一预设区域的示意图。
电子设备502可以设置第一预设区域,该第一预设区域的大小可以根据需要设定。
图5中,电子设备502可以根据每个蓝牙设备的对准角度与距离,判断每个蓝牙设备是否落该第一预设区域内,如果落入该第一预设区域内,将秘钥发送给第一预设区域内的蓝牙设备。
示例性地,图5中504、506以及508处于第一预设区域500(方框内)内,为合法用户。
图5中510、512处于第一预设区域外,为非法用户。
在一个实施例中,电子设备502向每个蓝牙设备发送的秘钥包括密文部分,该密文部分可为电子设备与蓝牙设备之间的距离和对准角度。蓝牙设备在接收电子设备502通过上述密文部分加密的数据时,可以确定其与电子设备之间的距离与对准角度,并使用该距离与对转角度对加密的数据进行解密。
可以理解,在该实施例中Broadcase_code由两部分组成,一部分是明文分享的,一部分是基于第一预设区域定位的密文部分,只有处于第一预设区域内的蓝牙设备可以取得正确的密文,从而获得最终的broadcast_code。
参见图6,具体涉及本申请一个实施例提供的秘钥的分发方法的流程图,应用于上述电子设备。
步骤602,电子设备接收蓝牙设备发送的序列码。
该序列码用于限制与电子设备进行通信的蓝牙设备的数量,例如,序列码为1-9所有正整数,即指示电子设备最多与9个蓝牙设备通信。
在一个实施例中,蓝牙设备为可以具有输入功能的电子设备,可以接收用户输入的序列码,接收到用户的序列码后将序列码发送给电子设备。
步骤604,判断所述序列码是否被占用;
电子设备在接收到该序列码后,可以判断该序列码是否被占用。即是否已经有用户使用该序列码。
步骤606,判断所述序列码是否被占用;
如果序列码未被占用,则向蓝牙设备发送接入码,该接入码可以为一组随机且唯一的接入码,蓝牙设备可以通过预先配置的算法,使用该接入码和序列码计算秘钥。
在一个实施例中,蓝牙设备接收到该接入码后,可以显示该接入码,然后用户再次向蓝牙设备输入数据序列号和接入码,以计算秘钥。
若序列码已经被占用,电子设备可不返回接入码或者返回错误的接入码。从而防止非法用户接入。
本申请实施例可以根据上述方法示例对上述电子设备等进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本发明实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请实施例各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:快闪存储器、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (18)

  1. 一种秘钥的分发方法,其特征在于,应用于电子设备,所述方法包括:
    获取一个或多个蓝牙设备的位置信息;
    基于所述位置信息,向一个或多个所述蓝牙设备发送秘钥。
  2. 根据权利要求1所述的分发方法,其特征在于,所述位置信息包括所述电子设备与所述蓝牙设备之间的对准角度与距离,所述基于所述位置信息,向一个或多个所述蓝牙设备发送秘钥,包括:
    基于所述电子设备与一个或多个蓝牙设备之间的对准角度与距离,判断所述蓝牙设备是否在预设区域内;
    若判断结果为在预设区域内,向所述蓝牙设备发送秘钥。
  3. 根据权利要求3所述的分发方法,其特征在于,所述秘钥包括密文部分,所述密文部分包括所述电子设备与所述蓝牙设备之间的对准角度与距离。
  4. 根据权利要求1所述的分发方法,其特征在于,所述位置信息包括所述电子设备与所述蓝牙设备之间的距离,所述基于所述位置信息,向一个或多个所述蓝牙设备发送秘钥,包括:
    判断所述电子设备与所述蓝牙设备之间的距离是否小于预设距离阈值;
    若判断结果为小于预设距离阈值,向所述蓝牙设备发送秘钥。
  5. 根据权利要求1所述的分发方法,其特征在于,所述基于所述位置信息,向一个或多个所述蓝牙设备发送秘钥之后,所述方法还包括:
    向一个或多个所述蓝牙设备广播第一数据,所述第一数据基于所述秘钥进行加密。
  6. 一种秘钥的分发方法,其特征在于,应用于电子设备,所述方法包括:
    接收蓝牙设备发送的序列码;
    判断所述序列码是否被占用;
    若未被占用,向所述蓝牙设备发送接入码,以使得所述蓝牙设备基于所述序列码和所述接入码计算获得秘钥。
  7. 一种秘钥的分发装置,其特征在于,包括:
    获取模块,用于获取一个或多个蓝牙设备的位置信息;
    发送模块,用于基于所述位置信息,向一个或多个所述蓝牙设备发送秘钥。
  8. 根据权利要求7所述的分发装置,其特征在于,所述位置信息包括所述电子设备与所述蓝牙设备之间的对准角度与距离,所述发送模块还用于
    基于所述电子设备与一个或多个蓝牙设备之间的对准角度与距离,判断所述蓝牙设备是否在预设区域内;
    若判断结果为在预设区域内,向所述蓝牙设备发送秘钥。
  9. 根据权利要求8所述的分发方法,其特征在于,所述秘钥包括密文部分,所述密文部分包括所述电子设备与所述蓝牙设备之间的对准角度与距离。
  10. 根据权利要求7所述的分发装置,其特征在于,所述位置信息包括所述电子设备与所述蓝牙设备之间的距离,所述发送模块还用于
    判断所述电子设备与所述蓝牙设备之间的距离是否小于预设距离阈值;
    若判断结果为小于预设距离阈值,向所述蓝牙设备发送秘钥。
  11. 根据权利要求7所述的分发装置,其特征在于,
    还包括广播模块,用于向一个或多个所述蓝牙设备广播第一数据,所述第一数据基于所述秘钥进行加密。
  12. 一种秘钥的分发装置,其特征在于,应用于电子设备,所述方法包括:
    接收模块,用于接收蓝牙设备发送的序列码;
    判断模块,用于判断所述序列码是否被占用;
    发送模块,用于若未被占用,向所述蓝牙设备发送接入码,以使得所述蓝牙设备基于所述序列码和所述接入码计算获得秘钥。
  13. 一种芯片模组,包括权利要求7-11中任一项所述的秘钥的分发装置。
  14. 一种芯片模组,包括权利要求12中所述的秘钥的分发装置。
  15. 一种电子设备,其特征在于,所述电子设备还包括处理器和存储设备,所述存储设备存有应用程序,所述应用程序由所述处理器运行时,使得所述电子设备执行权利要求1-5中任一项所述的分发方法。
  16. 一种电子设备,其特征在于,所述电子设备还包括处理器和存储设备,所述存储设备存有应用程序,所述应用程序由所述处理器运行时,使得所述电子设备执行权利要求6所述的分发方法。
  17. 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在计算机设备上运行时,使得所述计算机设备执行如权利要求1-5中任一项所述分发方法。
  18. 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在计算机设备上运行时,使得所述计算机设备执行如权利要求6中任一项所述分发方法。
PCT/CN2021/143193 2021-01-29 2021-12-30 一种秘钥的分发方法及电子设备 WO2022161098A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110126460.9A CN112969174A (zh) 2021-01-29 2021-01-29 一种秘钥的分发方法及电子设备
CN202110126460.9 2021-01-29

Publications (1)

Publication Number Publication Date
WO2022161098A1 true WO2022161098A1 (zh) 2022-08-04

Family

ID=76272437

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/143193 WO2022161098A1 (zh) 2021-01-29 2021-12-30 一种秘钥的分发方法及电子设备

Country Status (2)

Country Link
CN (1) CN112969174A (zh)
WO (1) WO2022161098A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112969174A (zh) * 2021-01-29 2021-06-15 展讯通信(上海)有限公司 一种秘钥的分发方法及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282210A (zh) * 2007-04-02 2008-10-08 北京华旗资讯数码科技有限公司 小区域信息加密系统
CN102170300A (zh) * 2010-02-26 2011-08-31 通用汽车环球科技运作有限责任公司 配对域中的多个近场通信标签
CN111601293A (zh) * 2020-05-12 2020-08-28 北京三快在线科技有限公司 基于蓝牙信标设备的定位方法及装置
CN112969174A (zh) * 2021-01-29 2021-06-15 展讯通信(上海)有限公司 一种秘钥的分发方法及电子设备

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013191648A1 (en) * 2012-06-20 2013-12-27 Certis Cisco Security Pte Ltd Bluetooth pairing system, method, and apparatus
CN106211048A (zh) * 2016-08-31 2016-12-07 重庆智城互盈科技发展有限公司 智能锁的密码开锁方法、装置及系统
CN107690030A (zh) * 2017-08-31 2018-02-13 恒宝股份有限公司 一种解锁和锁定移动智能设备的方法及蓝牙智能卡
CN110493761B (zh) * 2019-07-30 2022-04-22 惠州Tcl移动通信有限公司 一种蓝牙通信方法、移动终端及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282210A (zh) * 2007-04-02 2008-10-08 北京华旗资讯数码科技有限公司 小区域信息加密系统
CN102170300A (zh) * 2010-02-26 2011-08-31 通用汽车环球科技运作有限责任公司 配对域中的多个近场通信标签
CN111601293A (zh) * 2020-05-12 2020-08-28 北京三快在线科技有限公司 基于蓝牙信标设备的定位方法及装置
CN112969174A (zh) * 2021-01-29 2021-06-15 展讯通信(上海)有限公司 一种秘钥的分发方法及电子设备

Also Published As

Publication number Publication date
CN112969174A (zh) 2021-06-15

Similar Documents

Publication Publication Date Title
US11218459B2 (en) Reoccuring keying system
US10594672B2 (en) Secure node admission in a communication network
US10812969B2 (en) System and method for configuring a wireless device for wireless network access
US10003604B2 (en) Authenticated communication between security devices
CN104094267B (zh) 安全共享来自源装置的媒体内容的方法、装置和系统
CN108599925B (zh) 一种基于量子通信网络的改进型aka身份认证系统和方法
US11736304B2 (en) Secure authentication of remote equipment
US20120254622A1 (en) Secure Access to Electronic Devices
US20110197059A1 (en) Securing out-of-band messages
US20060126847A1 (en) System and method for establishing secure communications between devices in distributed wireless networks
CN107708112A (zh) 一种适用于mqtt‑sn协议的加密方法
US20160380770A1 (en) System and Method for Hash-Based Data Stream Authentication
US8156340B1 (en) System and method for securing system content by automated device authentication
JP2006109449A (ja) 認証された無線局に暗号化キーを無線で提供するアクセスポイント
WO2019148717A1 (zh) 请求合法性的校验装置、方法及计算机可读存储介质
WO2022111187A1 (zh) 终端认证方法、装置、计算机设备及存储介质
US20180013832A1 (en) Health device, gateway device and method for securing protocol using the same
WO2022161098A1 (zh) 一种秘钥的分发方法及电子设备
US11838755B2 (en) Techniques for secure authentication of the controlled devices
US20050128520A1 (en) Digital signature protection for software
CN113141333A (zh) 入网设备的通信方法、设备、服务器、系统及存储介质
WO2021146801A1 (en) Secure data transfer system
WO2021102023A1 (en) Transmission of secure information in a content distribution network
EP2317455A1 (en) System and method for secure serialization
WO2023211538A1 (en) Method and apparatus for distributing encrypted device unique credentials

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21922686

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21922686

Country of ref document: EP

Kind code of ref document: A1