Bluetooth device safe login identity authentication method and device

An authentication method and secure login technology, applied in the field of secure login authentication of Bluetooth devices, can solve the problems of complex information encryption and decryption processing, cracking or interception, and high cost, and achieve the problem of not easy to crack, improve security, and increase cracking. effect of difficulty

Inactive Publication Date: 2016-12-07
福州米立科技股份有限公司
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method has high security, there are also risks such as the connection authentication password being cracked or intercepted; the information encryption and decryption processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bluetooth device safe login identity authentication method and device
  • Bluetooth device safe login identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0034] Bluetooth (Bluetooth): is a wireless technology standard that enables short-range data exchange between fixed devices, mobile devices, and building personal area networks. Bluetooth technology stipulates that when Bluetooth communication is performed between each pair of devices, one must be the master device and the other must be the slave device to communicate. During communication, the master device must search and initiate l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Bluetooth device safe login identity authentication method and device. The Bluetooth device safe login identity authentication method comprises the steps that a Bluetooth slave device generates a random code and encrypts the random code into ciphertext by using a preset encryption key; the Bluetooth slave device calculates the current login password based on the random code and waits for connecting with a Bluetooth primary device; the Bluetooth primary device is connected with the Bluetooth slave device; the Bluetooth primary device presets an encryption key same as that of the Bluetooth slave device; the Bluetooth slave device sends the random code ciphertext to the Bluetooth primary device; the Bluetooth primary device decrypts the random code by using the encryption key, calculates the current login password based on the random code and accesses the Bluetooth slave device by using the login password; the Bluetooth slave device verifies the login password sent by the Bluetooth primary device; if the login password is correct, the Bluetooth slave device sends a login success response and allows the Bluetooth primary device to access; otherwise, the Bluetooth slave device sends a login failure response and disconnects the connection with the Bluetooth primary device. According to the scheme, a Bluetooth device safe login identity authentication method which is simple in authentication process, high in safety and low in resource occupancy is provided.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a bluetooth device security login identity verification method and device. Background technique [0002] Bluetooth (Bluetooth): is a wireless technology standard that enables short-distance data exchange between fixed devices, mobile devices and building personal area networks. For security reasons, before two Bluetooth devices establish a trusted connection, It is usually necessary to authenticate the other device, and then pair and connect after the verification is passed. The traditional pairing method between Bluetooth devices is: each device must enter a PIN code, and only when both devices enter the same PIN code can the pairing succeed. Since the PIN code is a string of static plaintext, it is easy to transfer In the process of being intercepted, the function information of the device is leaked or cracked, and there is a great security risk. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/06H04L9/08
CPCH04L9/0863H04L9/0869H04L63/0838H04W12/06H04L63/0428
Inventor 陈太星
Owner 福州米立科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products