Bluetooth security connection method and device, terminal and computer readable storage medium
A Bluetooth connection and secure connection technology, applied in the field of information security, can solve problems such as the existence of Bluetooth pairing process and potential safety hazards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] figure 1 It shows an implementation flowchart of a bluetooth secure connection method provided by Embodiment 1 of the present invention, including steps S101 to S103.
[0031] In S101, a Bluetooth connection is established with a target object.
[0032] Specifically, when making a secure Bluetooth connection with a target object, a mutual Bluetooth connection must first be established before sending a verification request and performing legality verification, wherein the Bluetooth connection may be an ordinary Bluetooth connection. Specifically, the normal bluetooth connection includes a connection established through just work, or a connection established through transparent transmission, and also includes a connection established through digital comparison or pairing code comparison. In order to reduce user participation and improve user experience, the embodiment of the present invention establishes a common connection with a Bluetooth device in a just work manner. ...
Embodiment 2
[0038] like figure 2 As shown, Embodiment 2 of the present invention further defines steps S102 to S103 in Embodiment 1 above, including: S201 to S204.
[0039] In S201, perform a Bluetooth connection with the target object;
[0040] In S202, acquire a first signature value obtained by the target object signing first information using a preset private key.
[0041] In S203, perform signature verification on the first signature value.
[0042] In S204, disconnect the Bluetooth connection if the verification of the first signature value fails.
[0043] Wherein, the preset private key includes at least one of the AppRootPriKey private key of the root key of the application terminal, AppPriKey of the device private key of the application terminal, DevRootPriKey of the device root key and DevPriKey of the bluetooth device.
[0044]For example, the target object is the Bluetooth device, the preset private key is the Bluetooth device private key DevPriKey, the Bluetooth device ob...
Embodiment 3
[0064] It should be noted that, the implementation manners of the two-way authentication between the Bluetooth device and the application end device in the first embodiment and the second embodiment may have various situations and include various combinations. Two combinations are listed below.
[0065] Firstly, the implementation process of the Bluetooth device authenticating the application end device includes steps A, B, C, and D.
[0066] A: The application device generates a pair of temporary asymmetric public key and private key AppPubKey, AppPriKey, uses the preset key AppRootPriKey to sign the temporary asymmetric public key AppPubKey to obtain the first signature value AppPubKeySign, and transfers the temporary non- The symmetric public key AppPubKey and the first signature value AppPubKeySign are sent to the Bluetooth device.
[0067] B: The Bluetooth device verifies the legitimacy of the first signature value AppPubKeySign using the preset application-side device r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


