Terminal pairing method and system
A terminal pairing and terminal technology, applied in the field of communication, can solve problems such as insecurity, achieve the effect of ensuring security and improving convenience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] figure 1 For the schematic diagram of the terminal pairing system provided by Embodiment 1 of the present invention, please refer to figure 1 , the terminal pairing system provided in this embodiment includes: a first terminal 11 and a second terminal 12, wherein,
[0046] The first terminal 11 is used to generate a first random factor, use a preset first verification algorithm to verify the first random factor, and generate a first verification value; Encrypt with the first verification value, generate the first ciphertext, and send it to the second terminal 12 through a secure wireless channel; in practical applications, the secure wireless channel can guarantee security in terms of attributes, such as infrared and other directional security Channel, a safe channel with ultra-short communication distance, can also use data encryption technology to ensure the security of communication;
[0047] The second terminal 12 is used to decrypt the first ciphertext using the pr...
Embodiment 2
[0059] figure 2 For the flow chart of the terminal pairing method provided by Embodiment 2 of the present invention, please refer to figure 2 , the terminal pairing method provided in this embodiment includes:
[0060] S201: The first terminal generates a first random factor, uses a preset first verification algorithm to verify the first random factor, and generates a first verification value; calculates the first random factor and the first random factor according to the preset first key Encrypting the first verification value to generate a first ciphertext, and sending it to the second terminal through a secure wireless channel;
[0061] S202: The second terminal uses the preset second key to decrypt the first ciphertext to obtain the first random factor and the first check value; uses the preset second check algorithm to check the first random factor, And compare and check with the first check value; if match, then generate the second random factor, use the preset secon...
Embodiment 3
[0076] Taking the terminals as Bluetooth devices and the data communication channel as an example, the present invention will be further explained in combination with specific application scenarios.
[0077] Bluetooth Low Energy (BLE) technology is a low-cost, short-range, interoperable, and very robust wireless communication technology that operates in the license-free 2.4GHz ISM radio frequency band. The communication protocol was designed from the ground up as an ultra-low power (ULP), secure wireless communication technology. When two low-power Bluetooth devices need to exchange data, they first need to establish a connection with each other, and when the connection is established for the first time, they need to be paired to establish a trust relationship. However, as the application scenarios of Bluetooth low energy technology become more and more extensive, in the pairing process, both sides of Bluetooth low energy devices need to perform multiple interactions and negot...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


