Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A BLE Bluetooth communication data encryption method, terminal and system

A technology of data encryption and Bluetooth communication, which is applied in digital transmission systems, wireless communications, transmission systems, etc., and can solve problems such as data capture and brute force cracking

Active Publication Date: 2021-04-27
SHENZHEN TIMEYAA ELECTRONIC TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the deficiencies of the prior art, one of the purposes of the present invention is to provide a BLE Bluetooth communication data encryption method, which can solve the problems of data capture and brute force cracking when smart user equipment is connected using Bluetooth
[0004] The second purpose of the present invention is to provide a BLE Bluetooth communication data encryption terminal, which can solve the problems of data capture and brute force cracking when smart user equipment is connected using Bluetooth
[0005] The third object of the present invention is to provide a BLE Bluetooth communication data encryption system, which can solve the problems of data capture and brute force cracking when smart user equipment is connected using Bluetooth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A BLE Bluetooth communication data encryption method, terminal and system
  • A BLE Bluetooth communication data encryption method, terminal and system
  • A BLE Bluetooth communication data encryption method, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Such as figure 1 Shown, a kind of bluetooth communication data encryption method of BLE, this method comprises the following steps:

[0052] Step S1: Make a Bluetooth connection with the user equipment 7, and perform identity verification, and judge whether the negotiation of the second key has been established, if yes, execute step S6, and if not, execute step S2.

[0053] Specifically, the client 6 and the user equipment 7 need to establish the negotiation of the second key to complete the sending of the second key and the calibration of the time of the user equipment 7; Connection or the first Bluetooth connection with the client 6 after the user resets the user equipment 7 to factory settings, the client 6 needs to redistribute the second key to the user equipment 7 and calibrate the time of the user equipment 7.

[0054] Step S2: Obtain the unique identification code of the user equipment 7 through the Bluetooth broadcast, and send the unique identification code t...

Embodiment 2

[0070] Such as figure 2 As shown, a Bluetooth communication data encryption terminal 1 of BLE includes:

[0071] Memory 2, used to store program instructions;

[0072] The processor 3 is configured to run the program instructions to execute the steps described in the first embodiment.

Embodiment 3

[0074] Such as image 3 Shown, a kind of bluetooth communication data encryption system 4 of BLE, described system comprises: background server 5, client 6 and user equipment 7;

[0075] The background server 5 is used to obtain the unique identification code of the user equipment 7, generate the first key pair of the first encryption algorithm, and save the first private key in the first key pair in the database, and store the first key pair in the database. The first public key in the key pair is distributed in the user equipment 7, and the unique identification code issued by the client 6 is obtained, and the first private key corresponding to the unique identification code in the database is sent to the client 6, and the client 6 is obtained. The request for generating the second key of the second encryption algorithm is sent, and the second key of the second encryption algorithm is generated and sent to the client 6;

[0076]The client 6 is used to carry out Bluetooth co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a BLE Bluetooth communication data encryption method, terminal and system. The method reasonably distributes the first key pair of the asymmetric encryption algorithm in the production stage, and adopts the asymmetric encryption algorithm to convert the first key pair of the symmetric encryption algorithm in the initialization stage. The second key is encrypted for transmission, and the communication stage adopts a symmetric encryption algorithm combined with an encryption vector to realize the function of preventing the Bluetooth connection from being cracked by violence. At the same time, the invention also discloses a BLE Bluetooth communication data encryption system. The encryption algorithm effectively prevents the problem of packet capture between the user device and the client, and effectively reduces the problem of the Bluetooth connection being cracked by violence.

Description

technical field [0001] The present invention relates to a data encryption method, terminal and system, in particular to a BLE Bluetooth communication data encryption method, terminal and system. Background technique [0002] At present, Bluetooth connection occupies a very important position in the connection mode between smart user devices. Most of the smart user devices on the market have Bluetooth communication functions. When smart user devices use Bluetooth connections, the power consumption of general user devices All are relatively high, therefore, the usage ratio of BLE (Bluetooth Low Energy) is the highest. In the BLE standard protocol, there is a connection authentication process, but at present, most smart user devices do not use BLE's own protocol connection authentication, because in actual use, the client of the iOS system cannot get the input pairing key permissions, resulting in the client not being able to control the Bluetooth pairing connection process. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/0431H04W12/033H04W12/02H04W4/80H04W76/14H04W76/30H04L9/08H04L29/06H04W12/041
CPCH04W12/06H04W12/02H04W4/80H04W76/14H04W76/30H04L9/0825H04L9/0838H04L9/0866H04L63/0435H04W12/033H04W12/0431
Inventor 奉强刘金鑫首召兵
Owner SHENZHEN TIMEYAA ELECTRONIC TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products