Bluetooth communication authentication request, receiving and communication method, mobile terminal, device terminal

A technology of Bluetooth communication and authentication request, which is applied to the device side, receiving and communication methods, Bluetooth communication authentication request, and mobile terminal fields. Effects of safety, speed improvement, and computing efficiency improvement

Active Publication Date: 2022-04-22
JINAN UNIVERSITY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] However, with the continuous formulation of Bluetooth standards and the continuous popularization of Bluetooth technology, the number of devices using the Bluetooth communication protocol is increasing. However, due to the Bluetooth protocol's huge rules, complex structure, and various functional modules, more security issues have emerged.
In recent years, incidents of Bluetooth security vulnerabilities have also been frequently exposed, causing serious economic losses to users and enterprises.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bluetooth communication authentication request, receiving and communication method, mobile terminal, device terminal
  • Bluetooth communication authentication request, receiving and communication method, mobile terminal, device terminal
  • Bluetooth communication authentication request, receiving and communication method, mobile terminal, device terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] Such as Figure 4 As shown, this embodiment discloses a bluetooth communication method, including the authentication request of the mobile terminal (smart phone is selected in this embodiment), the authentication reception of the device terminal and the data communication between the two.

[0096] The concrete steps of this embodiment are as follows:

[0097] Step 1. Establish a link, and the mobile phone scans the QR code on the device to obtain the public key. The two-dimensional code here contains the second public key information on the device side, which can be directly obtained by scanning the two-dimensional code on the Bluetooth device side through the mobile phone camera (ie, image collector).

[0098] Step 2. Perform ECDH key exchange:

[0099] Step 2.1, the exchange here includes two parts:

[0100] 1. The key on the mobile phone (including public key and private key), and the private key is embedded into the app on the mobile phone by writing code, and st...

Embodiment 2

[0137] Such as figure 2 As shown, this embodiment is an example of an overall communication system composed of a mobile terminal and a device terminal. The mobile terminal is a smart phone in this embodiment, including a first application layer and a first link layer:

[0138] The first application layer specifically includes an interaction unit and a logic calculation unit;

[0139] The interactive unit includes an image collector, which in this embodiment is a self-contained camera of the mobile phone; and also includes a user operation graphic interface, which is an APP operation interface of a mobile phone in this embodiment, and the image collector is used to obtain a device-side public key; The user operates the graphical interface to obtain the user password;

[0140] The logic calculation unit is used to generate an ECDH Based AES Key symmetric key K;

[0141] The logic computing unit is also used to divide the master key into user-based AES key and HMAC key; execut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a bluetooth communication authentication request, a receiving and communication method, a mobile terminal, and a device end. The bluetooth communication authentication request and the communication method include the steps of: performing bluetooth scanning with the device end, establishing a communication link on the link layer; obtaining Device-side public key; perform ECDH key exchange to generate ECDH Based AES Key symmetric key K; obtain user password and send user password to the device side; after the device side passes user authentication, perform data communication with the device side, after the communication is completed Disconnect; the sending user password and the data communication process all adopt AES encryption channel encryption and decryption transmission, and the key of the AES encryption function is a symmetric secret key K. The present invention stores the keys of both communication parties in the application layer, and detects and verifies them through the ECDH key exchange technology on the application layer, ensuring that the keys are stored in a protected thread, and the data will not be stolen by other malicious programs access.

Description

technical field [0001] The invention relates to the application field of Bluetooth encrypted communication, in particular to a Bluetooth communication authentication request, receiving and communication method, a mobile terminal, and a device terminal. Background technique [0002] However, with the continuous formulation of Bluetooth standards and the continuous popularization of Bluetooth technology, the number of devices using the Bluetooth communication protocol is increasing. However, due to the Bluetooth protocol's huge rules, complex structure, and various functional modules, many security issues have emerged. In recent years, incidents of Bluetooth security vulnerabilities have also been frequently exposed, causing serious economic losses to users and enterprises. [0003] Attackers can obtain private files owned by Bluetooth users, bypass the operating system that isolates application data from other applications; gain command execution permissions on the phone, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/80H04W12/03H04W12/041H04W12/06H04W12/0471H04W12/128
CPCH04W4/80H04W12/02H04W12/04H04W12/06H04W12/03
Inventor 翁健付新文温钊迪陈俊颖郑晓鹏罗晓峰林越陈栋张悦
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products