Unlock instant, AI-driven research and patent intelligence for your innovation.

Bluetooth security connection method and device, terminal and computer readable storage medium

A Bluetooth connection and secure connection technology, applied in the field of information security, can solve problems such as the existence of Bluetooth pairing process and potential safety hazards

Active Publication Date: 2018-06-15
北京明华联盟科技有限公司
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiments of the present invention provide a Bluetooth secure connection method, device, terminal, and computer-readable storage medium, aiming to solve the technical problem of potential safety hazards in the Bluetooth pairing process in the prior art such as Just work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bluetooth security connection method and device, terminal and computer readable storage medium
  • Bluetooth security connection method and device, terminal and computer readable storage medium
  • Bluetooth security connection method and device, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It shows an implementation flowchart of a bluetooth secure connection method provided by Embodiment 1 of the present invention, including steps S101 to S103.

[0031] In S101, a Bluetooth connection is established with a target object.

[0032] Specifically, when making a secure Bluetooth connection with a target object, a mutual Bluetooth connection must first be established before sending a verification request and performing legality verification, wherein the Bluetooth connection may be an ordinary Bluetooth connection. Specifically, the normal bluetooth connection includes a connection established through just work, or a connection established through transparent transmission, and also includes a connection established through digital comparison or pairing code comparison. In order to reduce user participation and improve user experience, the embodiment of the present invention establishes a common connection with a Bluetooth device in a just work manner. ...

Embodiment 2

[0038] like figure 2 As shown, Embodiment 2 of the present invention further defines steps S102 to S103 in Embodiment 1 above, including: S201 to S204.

[0039] In S201, perform a Bluetooth connection with the target object;

[0040] In S202, acquire a first signature value obtained by the target object signing first information using a preset private key.

[0041] In S203, perform signature verification on the first signature value.

[0042] In S204, disconnect the Bluetooth connection if the verification of the first signature value fails.

[0043] Wherein, the preset private key includes at least one of the AppRootPriKey private key of the root key of the application terminal, AppPriKey of the device private key of the application terminal, DevRootPriKey of the device root key and DevPriKey of the bluetooth device.

[0044]For example, the target object is the Bluetooth device, the preset private key is the Bluetooth device private key DevPriKey, the Bluetooth device ob...

Embodiment 3

[0064] It should be noted that, the implementation manners of the two-way authentication between the Bluetooth device and the application end device in the first embodiment and the second embodiment may have various situations and include various combinations. Two combinations are listed below.

[0065] Firstly, the implementation process of the Bluetooth device authenticating the application end device includes steps A, B, C, and D.

[0066] A: The application device generates a pair of temporary asymmetric public key and private key AppPubKey, AppPriKey, uses the preset key AppRootPriKey to sign the temporary asymmetric public key AppPubKey to obtain the first signature value AppPubKeySign, and transfers the temporary non- The symmetric public key AppPubKey and the first signature value AppPubKeySign are sent to the Bluetooth device.

[0067] B: The Bluetooth device verifies the legitimacy of the first signature value AppPubKeySign using the preset application-side device r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and particularly relates to a Bluetooth security connection method and device, a terminal and a computer readable storage medium.The method includes the following steps: establishing a Bluetooth connection with a target object; verifying the source legitimacy of the target object, and verifying the consistency of user equipmentidentities of the target object; and if the source of the target object is illegal or the identities of the user equipment are inconsistent, breaking the Bluetooth connection. According to the schemeof the invention, during the establishment of the Bluetooth connection, the Bluetooth connection with the target object is firstly performed, and then the source legitimacy of the target object and the consistency of the user equipment identities of the target object are verified, when the source of the target object is illegal or the identities of the user equipment are inconsistent, the Bluetooth connection can be broken, and thus the purpose of the Bluetooth security connection can be achieved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a bluetooth secure connection method, device, terminal and computer-readable storage medium. Background technique [0002] The bluetooth pairing methods in the prior art include: digital comparison, pairing code input comparison, and a pairing method of just work. Among them, the pairing method of Just work initiates the connection between the devices and completes the pairing. It does not require the user to participate in the pairing process, nor does it require the user to understand the knowledge of Bluetooth pairing, which has a better user experience. [0003] However, since the user does not participate in the Bluetooth pairing process in the Just work mode, the Bluetooth device may be connected to an illegal application device without the user's knowledge, which has a relatively large security risk. Contents of the invention [0004] In view of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/80H04W12/06H04W76/14H04L29/06H04L9/32
CPCH04L63/083H04L63/0869H04L63/0876H04W12/06H04L9/3249
Inventor 陈柳章
Owner 北京明华联盟科技有限公司