Bluetooth communication encryption method, device and intelligent security device
A technology of Bluetooth communication and encryption method, which can be applied to secure communication devices, encryption devices with shift registers/memory, security devices, etc., and can solve problems such as low security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] figure 1 It is a flowchart of a Bluetooth communication encryption method provided in Embodiment 1 of the present invention, and the method includes the following steps:
[0044] Step S11: At the preset key generation time, use a random code generator to generate a random code as an initial key, and broadcast the initial key to the user terminal.
[0045] In the embodiment of the present invention, a random code generator is set in the decryption terminal device that needs to perform Bluetooth communication, and the random code generator is turned on at a preset time interval to generate a random code, and the generated random code is used as the initial key . Wherein, the decryption end device, for example, can be an access control device or a smart security device such as a smart door lock, which uses Bluetooth communication to connect to a user terminal, receives an operation command encrypted by the user terminal using a key, and decrypts the encrypted command and ...
Embodiment 2
[0056] figure 2 It is a flowchart of a Bluetooth communication encryption method provided in Embodiment 2 of the present invention, and the method includes the following steps:
[0057] Step S21: At the preset key generation time, use a random code generator to generate a random code as an initial key, and broadcast the initial key to the user terminal.
[0058] This step is consistent with the above step S11, and will not be repeated here.
[0059] Step S22: use the current key to encrypt the ciphertext to be sent at the user terminal, and then send the encrypted ciphertext through Bluetooth communication.
[0060] This step is consistent with the above step S12, and will not be repeated here.
[0061] Step S23: Receive the ciphertext sent by the user terminal and the actual key for encrypting the ciphertext.
[0062] This step is consistent with the above step S13, and will not be repeated here.
[0063] Step S24: Judging whether the actual key is consistent with the in...
Embodiment 3
[0070] image 3 It is a flowchart of a Bluetooth communication encryption method provided in Embodiment 3 of the present invention, and the method includes the following steps:
[0071] Step S31: At the preset key generation time, use a random code generator to generate a random code as an initial key, and broadcast the initial key to the user terminal.
[0072] This step is consistent with the above step S11, and will not be repeated here.
[0073] Step S32: Encrypt the ciphertext to be sent using the current key at the user terminal, and then send the encrypted ciphertext through Bluetooth communication.
[0074] This step is consistent with the above step S12, and will not be repeated here.
[0075] Step S33: Receive the ciphertext sent by the user terminal and the actual key for encrypting the ciphertext.
[0076] This step is consistent with the above step S13, and will not be repeated here.
[0077] Step S34: Judging whether the actual key is consistent with the init...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



