Bluetooth data encrypted transmission method, Bluetooth device and computer-readable storage medium
A Bluetooth data, encrypted transmission technology, applied in the field of communication, can solve the problems of low security, disadvantageous protection of user privacy, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0069] Aiming at the technical problem that the data transmitted via Bluetooth is leaked in the network, the security is low, and it is not conducive to the protection of user privacy, this embodiment provides a Bluetooth data encryption transmission method. see image 3 as shown, image 3 A schematic flowchart of a Bluetooth data encrypted transmission method provided in this embodiment, including:
[0070] S301: Obtain a user ID;
[0071] In this embodiment, the user identifier may be a preset identifier that exists in the sending end device, for example, it may be an IMEI (International Mobile Equipment Identity, International Mobile Equipment Identity), or other preset identifiers. The identifier in the sending device, such as "ABCSS", "125AB", etc.
[0072] In addition, in this embodiment, the user identifier may also be input by the user each time the device needs to be acquired. In fact, because the Bluetooth transmission is a short-distance transmission, the distan...
no. 2 example
[0095] This embodiment provides a method for encrypted transmission of Bluetooth data, specifically:
[0096] Because Bluetooth is a short-distance transmission, it is very suitable for users to add user IDs, which is convenient for users to negotiate directly to obtain user IDs for encryption and anti-encryption.
[0097] Since the file will become a byte stream when it is transmitted on the network, it is possible to add a user-specific identifier when the file is converted, such as the mobile phone IMEI code. IMEI is unique, and the IMEI is encapsulated and then used as a byte header to become a part of the file. , re-encrypt the entire file, and use the encryption method as the end of the byte;
[0098] When receiving, the receiving end first recognizes the byte header, and then decrypts it according to the encryption method of identifying the byte tail by the byte header.
[0099] In this way, when anyone intercepts the information in the network, because "IMEI+file+file...
no. 3 example
[0101] This embodiment provides a bluetooth device, see Figure 8 As shown, it includes a processor 801 , a memory 802 and a communication bus 803 . in:
[0102] The communication bus 803 is used to realize connection and communication between the processor 801 and the memory 802 .
[0103] The processor 801 is configured to execute one or more programs stored in the memory 802, so as to implement the steps of the Bluetooth data encryption transmission process at the sending end in the above-mentioned first embodiment and / or the second embodiment, or to realize the above-mentioned first embodiment And / or each step of the bluetooth data encrypted transmission process at the receiving end in the second embodiment.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


