Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal

A technology of Bluetooth communication and communication method, which is applied in the application field of Bluetooth encrypted communication, and can solve the problems of economic loss of users and enterprises, huge Bluetooth protocol rules, complex architecture, etc.

Active Publication Date: 2019-12-13
JINAN UNIVERSITY
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] However, with the continuous formulation of Bluetooth standards and the continuous popularization of Bluetooth technology, the number of devices using the Bluetooth communication protocol is increasing. However, due to the Bluetooth protocol's huge rules, complex structure, and various functional modules, more security issues have emerged.
In recent years, incidents of Bluetooth security vulnerabilities have also been frequently exposed, causing serious economic losses to users and enterprises.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal
  • Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal
  • Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] Such as Figure 4 As shown, this embodiment discloses a bluetooth communication method, including the authentication request of the mobile terminal (smart phone is selected in this embodiment), the authentication reception of the device terminal and the data communication between the two.

[0096] The concrete steps of this embodiment are as follows:

[0097] Step 1. Establish a link, and the mobile phone scans the QR code on the device to obtain the public key. The two-dimensional code here contains the second public key information on the device side, which can be directly obtained by scanning the two-dimensional code on the Bluetooth device side through the mobile phone camera (ie, image collector).

[0098] Step 2. Perform ECDH key exchange:

[0099] Step 2.1, the exchange here includes two parts:

[0100] 1. The key on the mobile phone (including public key and private key), and the private key is embedded into the app on the mobile phone by writing code, and st...

Embodiment 2

[0137] Such as figure 2 As shown, this embodiment is an example of an overall communication system composed of a mobile terminal and a device terminal. The mobile terminal is a smart phone in this embodiment, including a first application layer and a first link layer:

[0138] The first application layer specifically includes an interaction unit and a logic calculation unit;

[0139] The interactive unit includes an image collector, which in this embodiment is a self-contained camera of the mobile phone; and also includes a user operation graphic interface, which is an APP operation interface of a mobile phone in this embodiment, and the image collector is used to obtain a device-side public key; The user operates the graphical interface to obtain the user password;

[0140] The logic calculation unit is used to generate an ECDH Based AES Key symmetric key K;

[0141] The logic computing unit is also used to divide the master key into user-based AES key and HMAC key; execut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Bluetooth communication authentication request, receiving and communication method, a mobile terminal and an equipment terminal, and the Bluetooth communication authentication request and communication method comprises the steps: carrying out the Bluetooth scanning with the equipment terminal, and establishing a communication link on a link layer; obtaining an equipment end public key; performing ECDH key exchange, and generating an ECDH Base AES Key symmetric key K; acquiring a user password, and sending the user password to the equipment end; after the equipment terminal passes user authentication, performing data communication with the equipment terminal, and disconnecting connection after communication is completed; in the user password sending process and thedata communication process, an AES encryption channel is adopted for encryption and decryption transmission, and a secret key of an AES encryption function is a symmetric secret key K. According to the method, the secret keys of the two communication parties are stored in the application layer, detection and verification are carried out on the application layer through the ECDH secret key exchange technology, it is guaranteed that the secret keys are stored in a protected thread, and data cannot be accessed by other malicious programs.

Description

technical field [0001] The invention relates to the application field of Bluetooth encrypted communication, in particular to a Bluetooth communication authentication request, receiving and communication method, a mobile terminal, and a device terminal. Background technique [0002] However, with the continuous formulation of Bluetooth standards and the continuous popularization of Bluetooth technology, the number of devices using the Bluetooth communication protocol is increasing. However, due to the Bluetooth protocol's huge rules, complex structure, and various functional modules, many security issues have emerged. In recent years, incidents of Bluetooth security vulnerabilities have also been frequently exposed, causing serious economic losses to users and enterprises. [0003] Attackers can obtain private files owned by Bluetooth users, bypass the operating system that isolates application data from other applications; gain command execution permissions on the phone, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/80H04W12/02H04W12/04H04W12/06H04W12/041H04W12/0471H04W12/128
CPCH04W4/80H04W12/02H04W12/04H04W12/06H04W12/03
Inventor 翁健付新文温钊迪陈俊颖郑晓鹏罗晓峰林越陈栋张悦
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products