Unlock instant, AI-driven research and patent intelligence for your innovation.

Bluetooth communication encryption method, device and intelligent security device

A technology of Bluetooth communication and encryption method, which can be applied to secure communication devices, encryption devices with shift registers/memory, security devices, etc., and can solve problems such as low security

Active Publication Date: 2019-01-08
BEIJING QDING INTERCONNECTION TECHNOLOGY CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security of the existing Bluetooth communication encryption method is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bluetooth communication encryption method, device and intelligent security device
  • Bluetooth communication encryption method, device and intelligent security device
  • Bluetooth communication encryption method, device and intelligent security device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] figure 1 It is a flowchart of a Bluetooth communication encryption method provided in Embodiment 1 of the present invention, and the method includes the following steps:

[0044] Step S11: At the preset key generation time, use a random code generator to generate a random code as an initial key, and broadcast the initial key to the user terminal.

[0045] In the embodiment of the present invention, a random code generator is set in the decryption terminal device that needs to perform Bluetooth communication, and the random code generator is turned on at a preset time interval to generate a random code, and the generated random code is used as the initial key . Wherein, the decryption end device, for example, can be an access control device or a smart security device such as a smart door lock, which uses Bluetooth communication to connect to a user terminal, receives an operation command encrypted by the user terminal using a key, and decrypts the encrypted command and ...

Embodiment 2

[0056] figure 2 It is a flowchart of a Bluetooth communication encryption method provided in Embodiment 2 of the present invention, and the method includes the following steps:

[0057] Step S21: At the preset key generation time, use a random code generator to generate a random code as an initial key, and broadcast the initial key to the user terminal.

[0058] This step is consistent with the above step S11, and will not be repeated here.

[0059] Step S22: use the current key to encrypt the ciphertext to be sent at the user terminal, and then send the encrypted ciphertext through Bluetooth communication.

[0060] This step is consistent with the above step S12, and will not be repeated here.

[0061] Step S23: Receive the ciphertext sent by the user terminal and the actual key for encrypting the ciphertext.

[0062] This step is consistent with the above step S13, and will not be repeated here.

[0063] Step S24: Judging whether the actual key is consistent with the in...

Embodiment 3

[0070] image 3 It is a flowchart of a Bluetooth communication encryption method provided in Embodiment 3 of the present invention, and the method includes the following steps:

[0071] Step S31: At the preset key generation time, use a random code generator to generate a random code as an initial key, and broadcast the initial key to the user terminal.

[0072] This step is consistent with the above step S11, and will not be repeated here.

[0073] Step S32: Encrypt the ciphertext to be sent using the current key at the user terminal, and then send the encrypted ciphertext through Bluetooth communication.

[0074] This step is consistent with the above step S12, and will not be repeated here.

[0075] Step S33: Receive the ciphertext sent by the user terminal and the actual key for encrypting the ciphertext.

[0076] This step is consistent with the above step S13, and will not be repeated here.

[0077] Step S34: Judging whether the actual key is consistent with the init...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Bluetooth communication encryption method, a device and an intelligent security device. The Bluetooth communication decryption method comprises the following steps: at a preset key generation time, a random code generator is used to generate a random code as an initial key, and the initial key is broadcasted to a user terminal; encrypting the encrypted ciphertext to be sent by using the current key at the user terminal, and then the encrypted ciphertext is sent through the Bluetooth communication mode. receiving a ciphertext sent by the user terminal and an actual keyfor encrypting the ciphertext; judging whether the actual key is consistent with the initial key; when the actual key coincides with the initial key, decrypting the ciphertext by using the initial keyto obtain plaintext corresponding to the ciphertext. The encryption method of the Bluetooth communication of the invention generates a new key by a decryption end device at a predetermined time interval, so that the key will be invalid after a certain time, thereby preventing the ciphertext and the key sent by the user terminal from being intercepted maliciously and being used again, and improving the security of the Bluetooth communication.

Description

technical field [0001] The invention relates to the technical field of bluetooth communication, in particular to a bluetooth communication encryption method, device, intelligent security equipment and computer storage medium. Background technique [0002] With the continuous development of communication technology and smart devices, communication methods between smart devices are also increasing. In different scenarios, different smart devices will use communication methods with optimal communication efficiency. When smart devices perform short-distance communication, Bluetooth communication is generally used to ensure communication efficiency. [0003] In the existing Bluetooth communication between smart devices, when transmitting various plaintexts, the plaintexts will be encrypted first, and then the encrypted ciphertexts and encryption keys are transmitted to the receiving end through Bluetooth. For example, when transmitting an instruction, the sending end will send t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04L9/08H04L9/06H04W4/80H04W12/03H04W12/041
CPCH04L9/0631H04L9/0869H04W12/02H04W12/04H04W4/80
Inventor 钟桂鑫许小阳孟宪军
Owner BEIJING QDING INTERCONNECTION TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More