Unlock instant, AI-driven research and patent intelligence for your innovation.

Bluetooth secure connection method, device, terminal and computer-readable storage medium

A Bluetooth connection and secure connection technology, applied in the field of information security, can solve the problems of the Bluetooth pairing process, hidden dangers and other problems

Active Publication Date: 2021-10-22
北京明华联盟科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiments of the present invention provide a Bluetooth secure connection method, device, terminal, and computer-readable storage medium, aiming to solve the technical problem of potential safety hazards in the Bluetooth pairing process in the prior art such as Just work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bluetooth secure connection method, device, terminal and computer-readable storage medium
  • Bluetooth secure connection method, device, terminal and computer-readable storage medium
  • Bluetooth secure connection method, device, terminal and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It shows an implementation flowchart of a bluetooth secure connection method provided by Embodiment 1 of the present invention, including steps S101 to S103.

[0031] In S101, a Bluetooth connection is established with a target object.

[0032] Specifically, when making a secure Bluetooth connection with a target object, a mutual Bluetooth connection must first be established before sending a verification request and performing legality verification, wherein the Bluetooth connection may be an ordinary Bluetooth connection. Specifically, the normal bluetooth connection includes a connection established through just work, or a connection established through transparent transmission, and also includes a connection established through digital comparison or pairing code comparison. In order to reduce user participation and improve user experience, the embodiment of the present invention establishes a common connection with a Bluetooth device in a just work manner. ...

Embodiment 2

[0038] like figure 2 As shown, Embodiment 2 of the present invention further defines steps S102 to S103 in Embodiment 1 above, including: S201 to S204.

[0039] In S201, perform a Bluetooth connection with the target object;

[0040] In S202, acquire a first signature value obtained by the target object signing first information using a preset private key.

[0041] In S203, perform signature verification on the first signature value.

[0042] In S204, disconnect the Bluetooth connection if the verification of the first signature value fails.

[0043] Wherein, the preset private key includes at least one of the AppRootPriKey private key of the root key of the application terminal, AppPriKey of the device private key of the application terminal, DevRootPriKey of the device root key and DevPriKey of the bluetooth device.

[0044]For example, the target object is the Bluetooth device, the preset private key is the Bluetooth device private key DevPriKey, the Bluetooth device ob...

Embodiment 3

[0064] It should be noted that, the implementation manners of the two-way authentication between the Bluetooth device and the application end device in the first embodiment and the second embodiment may have various situations and include various combinations. Two combinations are listed below.

[0065] Firstly, the implementation process of the Bluetooth device authenticating the application end device includes steps A, B, C, and D.

[0066] A: The application device generates a pair of temporary asymmetric public key and private key AppPubKey, AppPriKey, uses the preset key AppRootPriKey to sign the temporary asymmetric public key AppPubKey to obtain the first signature value AppPubKeySign, and transfers the temporary non- The symmetric public key AppPubKey and the first signature value AppPubKeySign are sent to the Bluetooth device.

[0067] B: The Bluetooth device verifies the legitimacy of the first signature value AppPubKeySign using the preset application-side device r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention belongs to the technical field of information security, and in particular relates to a bluetooth secure connection method, device, terminal and computer-readable storage medium, wherein the method includes: performing a bluetooth connection with a target object; verifying the legality of the source of the target object And verify the identity consistency of the user equipment of the target object; if the source of the target object is illegal or the identity of the user equipment is inconsistent, then disconnect the bluetooth connection; connection, and then verify the source legitimacy of the target object and verify the consistency of the user equipment identity of the target object, so that when the source of the target object is illegal or the user equipment identity is inconsistent, the Bluetooth connection is disconnected to achieve Purpose of Bluetooth secure connection.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a bluetooth secure connection method, device, terminal and computer-readable storage medium. Background technique [0002] The bluetooth pairing methods in the prior art include: digital comparison, pairing code input comparison, and a pairing method of just work. Among them, the pairing method of Just work initiates the connection between the devices and completes the pairing. It does not require the user to participate in the pairing process, nor does it require the user to understand the knowledge of Bluetooth pairing, which has a better user experience. [0003] However, since the user does not participate in the Bluetooth pairing process in the Just work mode, the Bluetooth device may be connected to an illegal application device without the user's knowledge, which has a relatively large security risk. Contents of the invention [0004] In view of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/80H04W12/06H04W76/14H04L29/06H04L9/32
CPCH04L63/083H04L63/0869H04L63/0876H04W12/06H04L9/3249
Inventor 陈柳章
Owner 北京明华联盟科技有限公司