Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An authenticator and its communication method

An authenticator and client technology, applied in the field of communication, can solve the problems of low security, sensitive data theft, data insecurity, etc., and achieve the effect of improving security and ensuring interests

Active Publication Date: 2021-04-06
FEITIAN TECHNOLOGIES
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, standard Bluetooth uses system-level pairing, that is, pairing between one Bluetooth device and another Bluetooth device. This pairing method mainly has the following defects: On the one hand, all applications on the device after pairing can use the other party's Bluetooth device. The data transmitted by the Bluetooth device makes the data insecure; on the other hand, it is very unfriendly to the application UI. During the connection process, the slave device is completely passively connected, and the master device cannot be selected; in addition, there are still some connections between Bluetooth devices. The process does not even need to be paired to communicate. These connection methods are extremely easy to cause sensitive data to be stolen, and the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authenticator and its communication method
  • An authenticator and its communication method
  • An authenticator and its communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment provides a communication method for an authenticator, which is applicable to a system including a client and an authenticator, wherein the client is an application program installed in a mobile terminal with a Bluetooth function, and the authenticator has a Bluetooth function.

[0038] Such as figure 1 As shown, the method includes:

[0039] Step 101, the authenticator is powered on and enters the connection mode;

[0040] Step 102, the authenticator scans the broadcast data, obtains the first client ID in the broadcast data, obtains the first key stored by itself, and verifies the first client ID according to the first key, and if the verification is successful, execute step 103, If the verification fails, re-scan the broadcast data;

[0041] Step 103: The authenticator generates a second authenticator ID based on the first key, obtains a second key corresponding to the first key, generates a second session key based on the second key, and notifies th...

Embodiment 2

[0062] This embodiment provides a communication method for an authenticator, which is applicable to a system including a client and an authenticator, wherein the client is an application program installed in a mobile terminal with a Bluetooth function, and the authenticator has a Bluetooth function;

[0063] Such as figure 2 , 3 As shown, the method includes:

[0064] Step 201, the authenticator is powered on, and the startup mode is judged. When the startup mode is the second mode, it enters the pairing mode and executes step 202. When the startup mode is the first mode, it enters the connection mode and executes step 206;

[0065] In this embodiment, powering on the authenticator is specifically: when the key connected to the authenticator is pressed by the user, the authenticator is powered on;

[0066] Among them, the startup mode is specifically the type of key trigger;

[0067] Specifically, judging the startup mode specifically includes: the authenticator judges the...

Embodiment 3

[0189] Embodiment 3 of the present invention provides an authenticator, such as Figure 4 As shown, the authenticator includes:

[0190] The power-on processing module 11 is used to power on and enter the connection mode;

[0191] Scanning module 12, is used for scanning broadcast data, obtains the first client identification in broadcast data;

[0192] An acquisition module 13, configured to acquire the first key stored by itself;

[0193] The first verification module 14 is configured to verify the first client ID according to the first key;

[0194] The first generating module 15 is configured to generate a second authenticator ID according to the first key;

[0195] The obtaining module 13 is also used to obtain a second key corresponding to the first key;

[0196] The second generating module 16 is configured to generate a second session key according to the second key;

[0197] The notification module 17 is configured to notify that the identity v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authenticator and a communication method thereof, belonging to the technical field of communication. The method includes: powering on the authenticator and entering the connection mode; scanning the broadcast data, obtaining the first client ID in the broadcast data, obtaining the first key to verify the first client ID, and generating a second authenticator if the verification is successful ID and the second session key, notify the successful verification of the ID of the first client, stop scanning and broadcast the broadcast data including the ID of the second authenticator; the authenticator receives the Bluetooth connection establishment request sent by the client, and establishes a Bluetooth connection with the client Bluetooth connection, handshake and encrypted communication operations with the client. The invention can ensure that the data is not stolen during the transmission process, improves the data security during the transmission process, and thus guarantees the interests of users.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an authenticator and a communication method thereof. Background technique [0002] In the prior art, standard Bluetooth uses system-level pairing, that is, pairing between one Bluetooth device and another Bluetooth device. This pairing method mainly has the following defects: On the one hand, all applications on the device after pairing can use the other party's Bluetooth device. The data transmitted by the Bluetooth device makes the data insecure; on the other hand, it is very unfriendly to the application UI. During the connection process, the slave device is completely passively connected, and the master device cannot be selected; in addition, there are still some connections between Bluetooth devices. The process does not even need to be paired to communicate, and these connection methods are extremely easy to cause sensitive data to be stolen, and the security is low. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/80H04W12/02H04W12/041H04W12/06H04W76/14
CPCH04W4/80H04W12/06H04W12/02H04W76/14H04L2209/80H04L9/3271H04L9/0637H04L9/0825H04L9/0869
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products