CN105141639A - Cloud-computing-platform-based bluetooth dynamic password security certificate method - Google Patents

Cloud-computing-platform-based bluetooth dynamic password security certificate method Download PDF

Info

Publication number
CN105141639A
CN105141639A CN201510635662.0A CN201510635662A CN105141639A CN 105141639 A CN105141639 A CN 105141639A CN 201510635662 A CN201510635662 A CN 201510635662A CN 105141639 A CN105141639 A CN 105141639A
Authority
CN
China
Prior art keywords
bluetooth equipment
code
handheld terminal
bluetooth
remote server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510635662.0A
Other languages
Chinese (zh)
Inventor
刘毅
勾壮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Xinhui Juyuan Technology Co Ltd
Original Assignee
Chengdu Xinhui Juyuan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Xinhui Juyuan Technology Co Ltd filed Critical Chengdu Xinhui Juyuan Technology Co Ltd
Priority to CN201510635662.0A priority Critical patent/CN105141639A/en
Publication of CN105141639A publication Critical patent/CN105141639A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a cloud-computing-platform-based bluetooth dynamic password security certificate method. The method comprises the following steps that: S1, a device password is set in a bluetooth device (3) and the device information of the bluetooth device (3) is stored in a remote server (2); S2, a hand-held terminal (1) submits user log-in information to a remote server (2); and after identity authentication of the remote server (2), the information of the bluetooth device (3) is obtained; S3, the bluetooth device (3) generates a random number as a question code and sends the question code to the hand-held terminal (1); S4, the hand-held terminal (1) obtains a response code based on the question code; and S5, the bluetooth device (3) verifies the response code. The method has the following beneficial effects: centralized authorization management is realized; user-based authorization is realized essentially; and the user operation is simplified; and the authorization management can be carried out by being separated from the device without the user operation, so that the transparency for the user can be realized.

Description

Based on the bluetooth dynamic password safety certifying method of cloud computing platform
Technical field
The present invention relates to bluetooth devices technical field, particularly, relate to a kind of bluetooth dynamic password safety certifying method based on cloud computing platform.
Background technology
In specific Bluetooth technology application scenarios, a bluetooth equipment can be authorized and be allowed multiple user access, for the consideration of fail safe, needs to verify the identity of user.Conventional method is that requirement user terminal (being generally smart mobile phone) carries out binding (Bonding) with target Bluetooth devices.Binding is the security authentication mechanism of Bluetooth specification definition, and it requires first to carry out matching (Pairing), and then user terminal and bluetooth equipment both sides exchange and store permanent key.For specific application scenarios as previously mentioned, there is following shortcoming in the safety certification based on binding:
1. binding is in fact user terminal (mobile phone) and associating of carrying out in operating system aspect between bluetooth equipment, and associating between non-user with equipment.
2. binding procedure cannot automation, usually needs with people mutual, such as inputs PIN code, clicks confirming button etc.
3. equipment and each authorized user have needed binding procedure, and the key of each user terminal needs to be stored on bluetooth equipment.
4. cannot concentrate and carry out empowerment management, empowerment management cannot carry out by separation instrumentation.
5., as changed bluetooth equipment, binding procedure need be repeated to each user.
6., as changed user terminal (mobile phone), also need again to bind.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of bluetooth dynamic password safety certifying method based on cloud computing platform, with solve cannot realize user and bluetooth equipment associate and cannot the automation technical problem of binding.
The present invention's adopted technical scheme that solves the problem is:
Based on the bluetooth dynamic password safety certifying method of cloud computing platform, comprise the following steps:
S1, be arranged in bluetooth equipment by device password, the device id of bluetooth equipment and device password are stored in remote server, and the ID of equipment is the identification code of differentiation equipment, each equipment corresponding independently identification code, normally a MAC Address;
S2, handheld terminal submit to user login information to remote server, and after remote server authentication, handheld terminal obtains the information of the bluetooth equipment of its granted access, and handheld terminal can be the equipment that mobile phone etc. is equipped with bluetooth module;
S3, handheld terminal according to the bluetooth equipment of its granted access of device id identification, and initiate connection request to the bluetooth equipment of granted access, after bluetooth equipment receives connection request, generate random number as inquiry code, and inquiry code is sent to handheld terminal;
S4, handheld terminal read addresses inquires to code, and then handheld terminal obtains answer code, and answer code is sent to bluetooth equipment, and answer code is adopt cryptographic algorithm to be encrypted with the device password of this bluetooth equipment to inquiry code to obtain;
S5, bluetooth equipment device password, to addressing inquires to the code answer code of identical cryptographic algorithm calculation expectation and comparing with the answer code received, if identical, are verified, otherwise authentication failed.
Authorizing by keeper is that remote server carries out unifying to manage beyond the clouds, does not need mobile phone and equipment to bind.Can obtain the facility information of its granted access after user successfully passes the authentication in high in the clouds, and then complete the binding of handheld terminal and bluetooth equipment, authorize and be not limited to specific handheld terminal, therefore user conducts interviews to equipment by different terminals.Realize the empowerment management of centralization, be the real mandate based on user, and simplify user operation.Handheld terminal is the user terminal of user operation, can be the portable intelligent device such as smart mobile phone, panel computer.
Optionally, in described step 1, the method of operation be arranged at by device password in bluetooth equipment is: without password when bluetooth equipment dispatches from the factory, therefore open mode is operated in, handheld terminal submits to user login information to remote server, after remote server authentication, handheld terminal submits bluetooth equipment application for registration to remote server, after succeeding in registration, remote server will generate random device password and be set in bluetooth equipment by handheld terminal, the device id of this bluetooth equipment and device password are stored in remote server simultaneously, after this bluetooth equipment will work in safe mode.Because device password needs to transmit on Internet, therefore there is monitored risk.If adopt the channel (as SSL) of encryption to carry out transmitting, this risk can reduce greatly, can meet the security requirement of overwhelming majority application.
Optionally, in described step 1, the method for operation be arranged at by device password in bluetooth equipment is: be arranged in bluetooth equipment in factory by device password, and device id and device password are by the database of safe dedicated network stored in remote server.
Optionally, the information that in described step S2, handheld terminal obtains the bluetooth equipment of its granted access comprises device id and device password, is encrypted the code that meets with a response in described step S4 by the handheld terminal device password of this bluetooth equipment to inquiry code cryptographic algorithm.
Optionally, the information that in described step S2, handheld terminal obtains the bluetooth equipment of its granted access comprises device id, in described step S4, the handheld terminal acquisition device password of this bluetooth equipment to the method that inquiry code cryptographic algorithm is encrypted the code that meets with a response is: after handheld terminal reads and addresses inquires to code, device id and inquiry code are sent to remote server, by the remote server device password of this bluetooth equipment, the code that meets with a response is encrypted to inquiry code cryptographic algorithm, and by remote server, this answer code is sent to handheld terminal.
Optionally, in described step S3, after bluetooth equipment generates and addresses inquires to code, bluetooth equipment starts timer, duration 15 seconds, then arranges if the verification passes and is verified mark, stop timer; If authentication failed, disconnect; If timer expiry, check and verify by mark, if this is masked as vacation, disconnect.
Optionally, the cryptographic algorithm of employing can be AES Advanced Encryption Standard (English: AdvancedEncryptionStandard, abbreviation: AES), key length: 128, inquiry code length: 128.
Bluetooth equipment has two kinds of mode of operations:
1. open mode: without device password, allows any user to access.
2. safe mode: have device password, only allows to be accessed by the user of password authentification.
Without password when bluetooth equipment dispatches from the factory, be therefore operated in open mode.The user of first use will submit facility registration application to high in the clouds.After succeeding in registration, high in the clouds will be generated random device password and is set in bluetooth equipment by handheld terminal.After this bluetooth equipment will work in safe mode.
Bluetooth Low Energy (the being called for short BLE) protocol stack defined by Bluetooth specification 4.0 between handheld terminal with bluetooth equipment is communicated.
Attribute agreement (ATT) is the simple stateless client/server agreement of one based on attribute (Attribute).In BLE, any equipment both can be client, also can be server, even both.User end to server request msg, server return data is to client.The data that each server comprises exist with the form of attribute, and each attribute is endowed a UUID, a group access control authority and a value.Client can the value of read/write attribute, and objective attribute target attribute is uniquely specified by UUID.
General-purpose attribute configuration file (GATT) builds on attribute agreement (ATT), provides data abstraction model and level.It define and organize how among applications and swap data, therefore deserve to be called the backbone of BLE transfer of data.
General-purpose accessing configuration file (GAP), as the foundation stone of interoperability between Bluetooth Low Energy equipment, define any BLE and realize mandatory framework, equipment can be found mutually, outwards broadcast data, set up safety connection and perform basic operation in a standardized manner.
GAP defines bluetooth equipment and adds 4 kinds of roles that BLE network can adopt:
(Broadcaster) –, towards the application only needing regularly outwards transmission data, broadcasts this role and periodically outwards sends broadcast data packet broadcaster.
(, towards the application only need collecting data from broadcasting equipment, the broadcast packet that observer role's broadcast listening end sends is to obtain data wherein for Observer) – for observer.
Center (Central) – center role corresponds to the master control side (Master) of link layer, the promoter that it always connects.
Periphery (Peripheral) – periphery role correspond to link layer by prosecutor (Slave), it allows center find it by broadcast, then connects with it.
General connection establishment process: this two steps process is generally used for being connected to new periphery bluetooth equipment.Center bluetooth equipment first starts scanning, receives all broadcast packets.To the bluetooth equipment that each finds, decision is attached thereto or continues to process next bluetooth equipment by application program.For this reason, application program can be pointed out user to select or mate the content of broadcast packet according to predefined rule parsing.Once make decision, center bluetooth equipment uses directed connection establishment process to be connected to bluetooth equipment.
Directed connection establishment process: center bluetooth equipment is connected to specific periphery bluetooth equipment by the single step process of this standard.Center initiates to connect to specifying the particular bluetooth equipment of Bluetooth address by link layer, does not need to know that this equipment is really available before.If target device is unavailable or not can connection mode, this process may failure.
1. handheld terminal is with center role work, and bluetooth equipment works with periphery role.When not connecting, bluetooth equipment outwards sends broadcast.Handheld terminal scanning also discovering device, is then connected by directed connection establishment process and equipment.
2., after connection establishment, bluetooth equipment generates random inquiry code and is stored as the value (this attribute has specific UUID) of certain particular community.Namely handheld terminal obtains inquiry code by the value of this attribute of ATT protocol access.
3., after handheld terminal meets with a response code, by the value of ATT agreement by certain particular community on answer code write device, namely equipment obtain answer code.
To sum up, the invention has the beneficial effects as follows:
1, the present invention is the bluetooth dynamic password security authentication mechanism based on cloud computing platform, realizes the empowerment management of centralization, is the real mandate based on user, and simplifies user operation.
2, empowerment management can carry out by separation instrumentation, without the need to user operation, can accomplish user transparent.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide the further understanding to the embodiment of the present invention, forms a application's part, does not form the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is structural representation of the present invention.
Fig. 2 is a kind of principle process intention of the present invention.
Fig. 3 is a kind of principle process intention that device password is arranged in bluetooth equipment by the present invention.
Mark and corresponding parts title in accompanying drawing:
1-handheld terminal, 2-remote server, 3-bluetooth equipment.
Embodiment
Clearly understand for making the object, technical solutions and advantages of the present invention, below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, and exemplary embodiment of the present invention and explanation thereof are only for explaining the present invention, not as a limitation of the invention.
Embodiment 1:
As shown in Figure 1, based on the bluetooth dynamic password safety certifying method of cloud computing platform, comprise the following steps:
S1, be arranged in bluetooth equipment 3 by device password, the device id of bluetooth equipment 3 and device password are stored in remote server 2, and the ID of equipment is the identification code of differentiation equipment, each equipment corresponding independently identification code, normally a MAC Address;
S2, handheld terminal 1 submit to user login information to remote server 2, and after remote server 2 authentication, handheld terminal 1 obtains the information of the bluetooth equipment 3 of its granted access, and handheld terminal 1 can be the equipment that mobile phone etc. is equipped with bluetooth module;
S3, handheld terminal 1 according to the bluetooth equipment 3 of its granted access of device id identification, and initiate connection request to the bluetooth equipment 3 of granted access, after bluetooth equipment 3 receives connection request, generate random number as inquiry code, and inquiry code is sent to handheld terminal 1;
S4, handheld terminal 1 read addresses inquires to code, and then handheld terminal 1 obtains answer code, and answer code is sent to bluetooth equipment 3, and answer code is adopt cryptographic algorithm to be encrypted with the device password of this bluetooth equipment 3 to inquiry code to obtain;
S5, bluetooth equipment 3 compare with the answer code received the answer code of addressing inquires to code identical cryptographic algorithm calculation expectation with device password, if identical, are verified, otherwise authentication failed.
Authorizing by keeper is that remote server 2 carries out unifying to manage beyond the clouds, does not need mobile phone and equipment to bind.The facility information of its granted access can be obtained after user successfully passes the authentication in high in the clouds, and then complete the binding of handheld terminal 1 and bluetooth equipment 3, mandate is not limited to specific handheld terminal, and therefore user conducts interviews to equipment by different terminals.Realize the empowerment management of centralization, be the real mandate based on user, and simplify user operation.
Embodiment 2:
As shown in Figure 1, Figure 2, Figure 3 shows, the present embodiment comprises each step of embodiment 1, and the difference of itself and embodiment 1 is:
As shown in Figure 3, in the present embodiment step 1, the method of operation be arranged at by device password in bluetooth equipment 3 is: without password when bluetooth equipment 3 dispatches from the factory, therefore open mode is operated in, handheld terminal 1 submits to user login information to remote server 2, after remote server 2 authentication, handheld terminal 1 submits bluetooth equipment 3 application for registration to remote server 2, after succeeding in registration, remote server 2 will generate random device password and be set in bluetooth equipment by handheld terminal, the device id of this bluetooth equipment 3 and device password are stored in remote server 2 simultaneously, after this bluetooth equipment will work in safe mode.Because device password needs to transmit on Internet, therefore there is monitored risk, if adopt the channel (as SSL) of encryption to carry out transmitting, this risk can reduce greatly, can meet the security requirement of overwhelming majority application.
Optionally, as shown in Figure 2, the information that in described step S2, handheld terminal 1 obtains the bluetooth equipment 3 of its granted access comprises device id and device password, is encrypted the code that meets with a response in described step S4 by handheld terminal 1 device password of this bluetooth equipment 3 to inquiry code cryptographic algorithm.
Also can adopt and alternatively obtain answer code: the information that in described step S2, handheld terminal 1 obtains the bluetooth equipment 3 of its granted access comprises device id, in described step S4, handheld terminal 1 obtains the method for answer code and is: by device id with address inquires to code and be sent to remote server 2 after handheld terminal 1 reads and addresses inquires to code, by remote server 2 device password of this bluetooth equipment 3, the code that meets with a response is encrypted to inquiry code cryptographic algorithm, and by remote server 2, this answer code is sent to handheld terminal 1.
Optionally, as shown in Figure 2, in described step S3, after bluetooth equipment 3 generates and addresses inquires to code, bluetooth equipment 3 starts timer, duration 15 seconds, then arranges if the verification passes and is verified mark, stop timer; If authentication failed, disconnect; If timer expiry, check and verify by mark, if this is masked as vacation, disconnect.
Optionally, the cryptographic algorithm of employing can be AES Advanced Encryption Standard (English: AdvancedEncryptionStandard, abbreviation: AES), key length: 128, inquiry code length: 128.
Embodiment 3:
The present embodiment comprises each step of embodiment 1, and the difference of itself and embodiment 1 is:
In this implementation step 1, the method for operation be arranged at by device password in bluetooth equipment 3 is: be arranged in bluetooth equipment 3 in factory by device password, and device id and device password are by the database of safe dedicated network stored in remote server 2.
Optionally, the information that in described step S2, handheld terminal 1 obtains the bluetooth equipment 3 of its granted access comprises device id, in described step S4, handheld terminal 1 obtains the method for answer code and is: by device id with address inquires to code and be sent to remote server 2 after handheld terminal 1 reads and addresses inquires to code, by remote server 2 device password of this bluetooth equipment 3, the code that meets with a response is encrypted to inquiry code cryptographic algorithm, and by remote server 2, this answer code is sent to handheld terminal 1.Device password transmission on the internet can be avoided completely like this, the application scenario of high security demand can be met.
For the occasion of Generally Recognized as safe sexual demand, also can adopt following method: the information that in described step S2, handheld terminal 1 obtains the bluetooth equipment 3 of its granted access comprises device id and device password, in described step S4, by handheld terminal 1 device password of this bluetooth equipment 3, the code that meets with a response is encrypted to inquiry code cryptographic algorithm.
Optionally, in described step S3, after bluetooth equipment 3 generates and addresses inquires to code, bluetooth equipment 3 starts timer, duration 15 seconds, then arranges if the verification passes and is verified mark, stop timer; If authentication failed, disconnect; If timer expiry, check and verify by mark, if this is masked as vacation, disconnect.
Optionally, the cryptographic algorithm of employing can be AES Advanced Encryption Standard (English: AdvancedEncryptionStandard, abbreviation: AES), key length: 128, inquiry code length: 128.
Above-described embodiment; object of the present invention, technical scheme and beneficial effect are further described; be understood that; the foregoing is only the specific embodiment of the present invention; the protection range be not intended to limit the present invention; within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (7)

1., based on the bluetooth dynamic password safety certifying method of cloud computing platform, it is characterized in that, comprise the following steps:
S1, device password is arranged in bluetooth equipment (3), the device id of bluetooth equipment (3) and device password are stored in remote server (2);
S2, handheld terminal (1) submit to user login information to remote server (2), and after remote server (2) authentication, handheld terminal (1) obtains the information of the bluetooth equipment (3) of its granted access;
S3, handheld terminal (1) are according to the bluetooth equipment (3) of its granted access of device id identification, and initiate connection request to the bluetooth equipment (3) of granted access, after bluetooth equipment (3) receives connection request, generate random number as inquiry code, and inquiry code is sent to handheld terminal (1);
S4, handheld terminal (1) read addresses inquires to code, and then handheld terminal (1) obtains answer code, and answer code is sent to bluetooth equipment (3), and answer code is adopt cryptographic algorithm to be encrypted with the device password of this bluetooth equipment (3) to inquiry code to obtain;
S5, bluetooth equipment (3) compare with the answer code received the answer code of addressing inquires to code identical cryptographic algorithm calculation expectation with device password, if identical, are verified, otherwise authentication failed.
2. the bluetooth dynamic password safety certifying method based on cloud computing platform according to claim 1, it is characterized in that, in described step 1, the method of operation be arranged at by device password in bluetooth equipment (3) is: without password when bluetooth equipment (3) dispatches from the factory, be operated in open mode, handheld terminal (1) submits to user login information to remote server (2), after remote server (2) authentication, handheld terminal (1) submits bluetooth equipment (3) application for registration to remote server (2), after succeeding in registration, remote server (2) will generate random device password and be set in bluetooth equipment (3) by handheld terminal (1), the device id of this bluetooth equipment (3) and device password are stored in remote server (2) simultaneously, after this bluetooth equipment (3) will work in safe mode.
3. the bluetooth dynamic password safety certifying method based on cloud computing platform according to claim 1, it is characterized in that, in described step 1, the method of operation be arranged at by device password in bluetooth equipment (3) is: be arranged in bluetooth equipment (3) in factory by device password, and device id and device password are by the database of safe dedicated network stored in remote server (2).
4. the bluetooth dynamic password safety certifying method based on cloud computing platform according to Claims 2 or 3, it is characterized in that, the information that in described step S2, handheld terminal (1) obtains the bluetooth equipment (3) of its granted access comprises device id and device password, is encrypted the code that meets with a response in described step S4 by handheld terminal (1) device password of this bluetooth equipment (3) to inquiry code cryptographic algorithm.
5. the bluetooth dynamic password safety certifying method based on cloud computing platform according to Claims 2 or 3, it is characterized in that, the information that in described step S2, handheld terminal (1) obtains the bluetooth equipment (3) of its granted access comprises device id, in described step S4, handheld terminal (1) the acquisition device password of this bluetooth equipment (3) to the method that inquiry code cryptographic algorithm is encrypted the code that meets with a response is: after handheld terminal (1) reads and addresses inquires to code, device id and inquiry code are sent to remote server (2), by remote server (2) device password of this bluetooth equipment (3), the code that meets with a response is encrypted to inquiry code cryptographic algorithm, and by remote server (2), this answer code is sent to handheld terminal (1).
6. the bluetooth dynamic password safety certifying method based on cloud computing platform as claimed in any of claims 1 to 3, it is characterized in that, in described step S3, after bluetooth equipment (3) generates and addresses inquires to code, bluetooth equipment (3) starts timer, then arrange if the verification passes and be verified mark, stop timer; If authentication failed, disconnect; If timer expiry, check and verify by mark, if this is masked as vacation, disconnect.
7. the bluetooth dynamic password safety certifying method based on cloud computing platform as claimed in any of claims 1 to 3, is characterized in that, the cryptographic algorithm of employing is AES Advanced Encryption Standard.
CN201510635662.0A 2015-09-30 2015-09-30 Cloud-computing-platform-based bluetooth dynamic password security certificate method Pending CN105141639A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510635662.0A CN105141639A (en) 2015-09-30 2015-09-30 Cloud-computing-platform-based bluetooth dynamic password security certificate method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510635662.0A CN105141639A (en) 2015-09-30 2015-09-30 Cloud-computing-platform-based bluetooth dynamic password security certificate method

Publications (1)

Publication Number Publication Date
CN105141639A true CN105141639A (en) 2015-12-09

Family

ID=54726846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510635662.0A Pending CN105141639A (en) 2015-09-30 2015-09-30 Cloud-computing-platform-based bluetooth dynamic password security certificate method

Country Status (1)

Country Link
CN (1) CN105141639A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516908A (en) * 2016-01-04 2016-04-20 北京映翰通网络技术股份有限公司 Bluetooth-based lock control method and system
CN105871859A (en) * 2016-04-19 2016-08-17 福州蓝电信息技术有限公司 Safe wireless communication method
CN106603486A (en) * 2016-11-03 2017-04-26 厦门雅迅网络股份有限公司 Mobile terminal safety authorization method and system
CN109067755A (en) * 2018-08-17 2018-12-21 深圳市永达电子信息股份有限公司 A kind of access control method and system of security switch
CN111698259A (en) * 2020-06-18 2020-09-22 北京无忧创想信息技术有限公司 Dynamic authentication login equipment, system and method based on Bluetooth equipment
CN112055344A (en) * 2020-08-31 2020-12-08 江苏徐工工程机械研究院有限公司 Engineering machinery Bluetooth equipment identity authentication system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101455025A (en) * 2006-05-26 2009-06-10 卢森特技术有限公司 Encryption method for secure packet transmission
CN103152329A (en) * 2013-02-07 2013-06-12 中金金融认证中心有限公司 Method and system for identity authentication by Bluetooth
EP2747368A1 (en) * 2012-12-19 2014-06-25 Gemalto SA Method for customising a security element
CN104202299A (en) * 2014-08-06 2014-12-10 北京中金国信科技有限公司 System and method of identity authentication based on Bluetooth
CN104540132A (en) * 2015-01-15 2015-04-22 天地融科技股份有限公司 Communication method of Bluetooth devices, mobile device, electronic signature device and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101455025A (en) * 2006-05-26 2009-06-10 卢森特技术有限公司 Encryption method for secure packet transmission
EP2747368A1 (en) * 2012-12-19 2014-06-25 Gemalto SA Method for customising a security element
CN103152329A (en) * 2013-02-07 2013-06-12 中金金融认证中心有限公司 Method and system for identity authentication by Bluetooth
CN104202299A (en) * 2014-08-06 2014-12-10 北京中金国信科技有限公司 System and method of identity authentication based on Bluetooth
CN104540132A (en) * 2015-01-15 2015-04-22 天地融科技股份有限公司 Communication method of Bluetooth devices, mobile device, electronic signature device and server

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516908A (en) * 2016-01-04 2016-04-20 北京映翰通网络技术股份有限公司 Bluetooth-based lock control method and system
CN105516908B (en) * 2016-01-04 2019-03-12 北京映翰通网络技术股份有限公司 A kind of locking method and system based on bluetooth
CN105871859A (en) * 2016-04-19 2016-08-17 福州蓝电信息技术有限公司 Safe wireless communication method
CN106603486A (en) * 2016-11-03 2017-04-26 厦门雅迅网络股份有限公司 Mobile terminal safety authorization method and system
CN106603486B (en) * 2016-11-03 2021-09-07 厦门雅迅网络股份有限公司 Method and system for security authorization of mobile terminal
CN109067755A (en) * 2018-08-17 2018-12-21 深圳市永达电子信息股份有限公司 A kind of access control method and system of security switch
CN111698259A (en) * 2020-06-18 2020-09-22 北京无忧创想信息技术有限公司 Dynamic authentication login equipment, system and method based on Bluetooth equipment
CN111698259B (en) * 2020-06-18 2022-05-10 北京无忧创想信息技术有限公司 Dynamic authentication login equipment, system and method based on Bluetooth equipment
CN112055344A (en) * 2020-08-31 2020-12-08 江苏徐工工程机械研究院有限公司 Engineering machinery Bluetooth equipment identity authentication system and method
CN112055344B (en) * 2020-08-31 2023-12-12 江苏徐工工程机械研究院有限公司 Engineering machinery Bluetooth equipment identity authentication system and method

Similar Documents

Publication Publication Date Title
CN105306452A (en) Bluetooth dynamic password security authentication method avoiding device password transmission and based on cloud computing platform
US10642969B2 (en) Automating internet of things security provisioning
EP3073699B1 (en) System and method for controlling mutual access of smart devices
CN105141639A (en) Cloud-computing-platform-based bluetooth dynamic password security certificate method
CN108512862B (en) Internet of things terminal security authentication management and control platform based on certificate-free identification authentication technology
US8375207B2 (en) Method and apparatus for authenticating a network device
US9025769B2 (en) Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone
KR20160127167A (en) Multi-factor certificate authority
CN103888265A (en) Login system and method based on mobile terminal
CN105099713A (en) Bluetooth dynamic password security authentication method for setting equipment password by means of handheld terminal based on cloud computing platform
WO2006028651A2 (en) A device introduction and access control framework
US20140259124A1 (en) Secure wireless network connection method
US11245523B2 (en) Method for implementing client side credential control to authorize access to a protected device
CN103237038A (en) Two-way network access authentication method based on digital certificate
CN113746633A (en) Internet of things equipment binding method, device and system, cloud server and storage medium
CN104247485A (en) Network application function authorisation in a generic bootstrapping architecture
CN109583154A (en) A kind of system and method based on Web middleware access intelligent code key
JP2016521029A (en) Network system comprising security management server and home network, and method for including a device in the network system
WO2016109609A1 (en) System and method for providing authenticated communications from a remote device to a local device
CN108259486B (en) End-to-end key exchange method based on certificate
KR101757692B1 (en) Remote control system of home network device using token server authentication and method thereof
CN112333214B (en) Safe user authentication method and system for Internet of things equipment management
JP6783527B2 (en) Electronic key re-registration system, electronic key re-registration method and program
CN114221822A (en) Network distribution method, gateway device and computer readable storage medium
CN108989034B (en) Audio and video monitoring method and system, monitoring server and computer medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151209

RJ01 Rejection of invention patent application after publication