Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control method for Bluetooth security management

A control method and security management technology, which is applied in the control field of Bluetooth security management, can solve problems such as risks, lack of Bluetooth communication equipment management capabilities, inability to identify and control management, etc., and achieve the effect of simple implementation methods

Active Publication Date: 2015-09-09
神州融安科技(北京)有限公司
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology does not have the ability to manage both sides of the Bluetooth communication device during the use of Bluetooth
Especially when the application communicates between the mobile smart device and the smart password device, when there is some important change in the connected Bluetooth device, it cannot be identified and controlled, so there is a risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method for Bluetooth security management
  • Control method for Bluetooth security management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] Certain terms are used, for example, in the description and claims to refer to particular components. Those skilled in the art should understand that hardware manufacturers may use different terms to refer to the same component. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a criterion for distinguishing. As mentioned throughout the specification and claims, "comprising" is an open term, so it should be interpreted as "including but not limited to". "Approximately" means that within an acceptable error range, those skilled in the art can solve the technical problem within a certain error range and basically achieve the technical effect. The subsequent description of the specification is a preferred implementation mode for implementing the application, but the description is for the purpose of illustrating the general principle of the application, and is not intended...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a control method for Bluetooth security management. The method comprises the following steps: I, executing Bluetooth binding operation on USBKey equipment in order that the Bluetooth of only one piece of mobile equipment can be linked to the USBKey equipment; II, executing a link negotiation process in order that the mobile equipment acquires authorization, and communicates with USBKey via Bluetooth or a USB (Universal Serial Bus) interface in the same link encryption and security message transmission way; and III, transmitting a function command by the mobile equipment, and clearing the security state of the USBKey equipment after successful connection or disconnection of every Bluetooth binding. The control method has the advantages that an implementation method is simple, and the problems of security matching and credible communication between mobile intelligent equipment and intelligent password equipment is solved through the Bluetooth security management.

Description

technical field [0001] The invention relates to a control method for bluetooth security management. Background technique [0002] Bluetooth communication was originally designed to facilitate low-cost, low-power wireless communication connections between mobile devices and accessories, and has now become the IEEE802.15 standard. The general bluetooth system structure consists of three parts: the bottom hardware module, the intermediate protocol layer and the application layer. The bottom hardware module includes the baseband layer, the link management layer and the radio frequency layer. The interpretation of the control interface (HCI) is transmitted. The intermediate protocol layer usually includes logical link control and adaptation protocol, service discovery protocol, serial port emulation protocol, etc., and the application layer generally corresponds to various application models and applications. The prior art does not have the ability to manage both parties of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W4/00
CPCH04W4/80H04W12/06
Inventor 李登峰
Owner 神州融安科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products