Authenticator and communication method thereof

An authenticator and client technology, applied in the field of communication, can solve the problems of low security, sensitive data theft, unfriendly application UI, etc., and achieve the effect of ensuring interests and improving security.

Active Publication Date: 2021-01-29
FEITIAN TECHNOLOGIES
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, standard Bluetooth uses system-level pairing, that is, pairing between one Bluetooth device and another Bluetooth device. This pairing method mainly has the following defects: On the one hand, all applications on the device after pairing can use the other party's Bluetooth device. The data transmitted by the Bluetooth device makes the data insecure; on the other hand, it is very unfriendly to the application UI. During the connection process, the slave device is completely passively connected, and the master device cannot be selected; in addition, there are still some connections between Bluetooth devices. The process does not even need to be paired to communicate. These connection methods are extremely easy to cause sensitive data to be stolen, and the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticator and communication method thereof
  • Authenticator and communication method thereof
  • Authenticator and communication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment provides a communication method for an authenticator, which is applicable to a system including a client and an authenticator, wherein the client is an application program installed in a mobile terminal with a Bluetooth function, and the authenticator has a Bluetooth function.

[0038] Such as figure 1 As shown, the method includes:

[0039] Step 101, the authenticator is powered on and enters the connection mode;

[0040] Step 102, the authenticator scans the broadcast data, obtains the first client ID in the broadcast data, obtains the first key stored by itself, and verifies the first client ID according to the first key, and if the verification is successful, execute step 103, If the verification fails, re-scan the broadcast data;

[0041] Step 103: The authenticator generates a second authenticator ID based on the first key, obtains a second key corresponding to the first key, generates a second session key based on the second key, and notifies th...

Embodiment 2

[0062] This embodiment provides a communication method for an authenticator, which is applicable to a system including a client and an authenticator, wherein the client is an application program installed in a mobile terminal with a Bluetooth function, and the authenticator has a Bluetooth function;

[0063] Such as figure 2 , 3 As shown, the method includes:

[0064] Step 201, the authenticator is powered on, and the startup mode is judged. When the startup mode is the second mode, it enters the pairing mode and executes step 202. When the startup mode is the first mode, it enters the connection mode and executes step 206;

[0065] In this embodiment, powering on the authenticator is specifically: when the key connected to the authenticator is pressed by the user, the authenticator is powered on;

[0066] Among them, the startup mode is specifically the type of key trigger;

[0067] Specifically, judging the startup mode specifically includes: the authenticator judges the...

Embodiment 3

[0189] Embodiment 3 of the present invention provides an authenticator, such as Figure 4 As shown, the authenticator includes:

[0190] The power-on processing module 11 is used to power on and enter the connection mode;

[0191] Scanning module 12, is used for scanning broadcast data, obtains the first client identification in broadcast data;

[0192] An acquisition module 13, configured to acquire the first key stored by itself;

[0193] The first verification module 14 is configured to verify the first client ID according to the first key;

[0194] The first generating module 15 is configured to generate a second authenticator ID according to the first key;

[0195] The obtaining module 13 is also used to obtain a second key corresponding to the first key;

[0196] The second generating module 16 is configured to generate a second session key according to the second key;

[0197] The notification module 17 is configured to notify that the identity v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authenticator and a communication method thereof, and belongs to the technical field of communication. The method comprises the steps: powering on the authenticator and starting a connection mode; scanning the broadcast data, obtaining a first client identifier in the broadcast data, obtaining a first key to verify the first client identifier, generating a second authenticator identifier and a second session key if the verification succeeds, notifying that the verification of the first client identifier succeeds, stopping scanning, and broadcasting the broadcast datacomprising the second authenticator identifier; and enabling the authenticator to receive a Bluetooth connection establishment request sent by the client, establish Bluetooth connection with the client, and perform handshake and encryption communication operation with the client. According to the method, data can be prevented from being stolen in the transmission process, and the data security inthe transmission process is improved, so that the benefit of a user is ensured.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an authenticator and a communication method thereof. Background technique [0002] In the prior art, standard Bluetooth uses system-level pairing, that is, pairing between one Bluetooth device and another Bluetooth device. This pairing method mainly has the following defects: On the one hand, all applications on the device after pairing can use the other party's Bluetooth device. The data transmitted by the Bluetooth device makes the data insecure; on the other hand, it is very unfriendly to the application UI. During the connection process, the slave device is completely passively connected, and the master device cannot be selected; in addition, there are still some connections between Bluetooth devices. The process does not even need to be paired to communicate, and these connection methods are extremely easy to cause sensitive data to be stolen, and the security is low. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/80H04W12/02H04W12/041H04W12/06H04W76/14
CPCH04W4/80H04W12/06H04W12/02H04W76/14H04L2209/80H04L9/3271H04L9/0637H04L9/0825H04L9/0869
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products