CN107426670A - A kind of Bluetooth encryption communication system and communication means - Google Patents

A kind of Bluetooth encryption communication system and communication means Download PDF

Info

Publication number
CN107426670A
CN107426670A CN201710290105.9A CN201710290105A CN107426670A CN 107426670 A CN107426670 A CN 107426670A CN 201710290105 A CN201710290105 A CN 201710290105A CN 107426670 A CN107426670 A CN 107426670A
Authority
CN
China
Prior art keywords
bluetooth
encryption
data
equipment
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710290105.9A
Other languages
Chinese (zh)
Other versions
CN107426670B (en
Inventor
高岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengbao Co Ltd
Original Assignee
Hengbao Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hengbao Co Ltd filed Critical Hengbao Co Ltd
Priority to CN201710290105.9A priority Critical patent/CN107426670B/en
Publication of CN107426670A publication Critical patent/CN107426670A/en
Application granted granted Critical
Publication of CN107426670B publication Critical patent/CN107426670B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of Bluetooth encryption communication system and communication means, is related to field of communication security, solves the technical problem that communication security degree is low in the prior art.The Bluetooth encryption communication system of the present invention includes multiple first Bluetooth encryption equipment and multiple second Bluetooth communication equipments, the communication software of first Bluetooth encryption equipment and the second Bluetooth communication equipment is respectively provided with unique identification number, each second Bluetooth communication equipment is connected with a first Bluetooth encryption apparatus bound, the data encryption or decryption that the first Bluetooth encryption equipment is sent to the second Bluetooth communication equipment.The present invention is applied to information transfer.

Description

A kind of Bluetooth encryption communication system and communication means
Technical field
The present invention relates to field of communication security, and in particular to a kind of Bluetooth encryption communication system and communication means.
Background technology
The communication software of existing Bluetooth communication equipment, popularity is very high, but communication software is in communication process Secrecy means it is limited.As long as third party obtains log-on message, just energy logging on communication software obtains user profile, it is impossible to meets existing In the secret communication demand to communication software.When information in communication software is encrypted existing encryption method, list is used One encryption method, key create-rule is consistent, can be cracked by software or software code leakage is low and leakage, safe coefficient.
The content of the invention
It is an object of the invention to provide a kind of Bluetooth encryption communication system and communication means, solution is encrypted in the prior art The low technical problem of the safe coefficient of communication.
The Bluetooth encryption communication system of the present invention, including multiple first Bluetooth encryption equipment and multiple second Bluetooth communications are set Standby, the communication software in the first Bluetooth encryption equipment and the second Bluetooth communication equipment is respectively provided with unique identification number, and each second Bluetooth communication equipment is all connected with a first Bluetooth encryption apparatus bound, and the first Bluetooth encryption equipment is set to the second Bluetooth communication The data encryption or decryption that preparation is sent.
Alternatively, in addition to the second Bluetooth communication equipment server and the first Bluetooth encryption device server, the second bluetooth After communication equipment sends the data to the second Bluetooth communication equipment server, the second Bluetooth communication equipment server sends data To the first Bluetooth encryption device server, the first Bluetooth encryption device server is specified on the second Bluetooth communication equipment received The identification number of communication software.Alternatively, data are carried out by way of internet transparent transmission between multiple second Bluetooth communication equipments Transmission.
Alternatively, the data that the first Bluetooth encryption equipment is sent to the second Bluetooth communication equipment use symmetric key or non-right Key is claimed to be encrypted or decrypt.
The Bluetooth encryption communication system of the present invention is connected by the first Bluetooth encryption equipment with the second Bluetooth communication equipment, is solved The problem of communication security of having determined, if the first Bluetooth encryption equipment connects disconnection with the second Bluetooth communication equipment, the data shown Disappear, avoid the leakage of transmission information, improve communication security degree.
The present invention also provides a kind of Bluetooth encryption communication means, should suitable for Bluetooth encryption communication system as described above Method comprises the following steps:
Step S1, the second Bluetooth communication equipment A and the binding of the first Bluetooth encryption device A are connected;
Step S2, the second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A;First Bluetooth encryption is set Standby A is encrypted using data key, and the data after encryption are sent into the second Bluetooth communication equipment A;
Step S3, the data after encryption are sent to the second Bluetooth communication equipment B by the second Bluetooth communication equipment A;
Step S4, the data after encryption are sent to by the second Bluetooth communication equipment B binds the first bluetooth being connected with it and adds Close equipment B;
Step S5, the first Bluetooth encryption equipment B is decrypted using the data after key pair encryption, and by the number after decryption The the second Bluetooth communication equipment B bound according to being sent to it;
Step S6, the second Bluetooth communication equipment B shows the data after the decryption.
Alternatively, the first Bluetooth encryption equipment was led in previous existence of dispatching from the factory into one group of unsymmetrical key, and in two the second bluetooths When carrying out first time data interaction between letter equipment, symmetric key is generated according to unsymmetrical key, using symmetric key to data It is encrypted or decrypts.
Alternatively, symmetric key is stored in two the first Bluetooth encryption equipment, when being again coupled to, directly using symmetrical Data key is handled.
Alternatively, the method that data are encrypted is comprised the following steps using symmetric key:
Second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A bound and be connected with it, the first bluetooth Encryption device A adds data according to call duration time, receiving device information dispersion symmetric key, generating process key, process key It is close, and check value is generated, the data after encryption and check value are sent to the second Bluetooth communication equipment by the first Bluetooth encryption device A B。
Alternatively, the method that data are decrypted is comprised the following steps using symmetric key:
First Bluetooth encryption equipment B is according to call duration time, receiving device information dispersion symmetric key, generating process key;
Data deciphering after encryption is generated check value by process key;
First Bluetooth encryption equipment B carries out the check value that the check value after decryption and the first Bluetooth encryption device A generate Compare, if unanimously, successful decryption, and the data after decryption are sent to the second Bluetooth communication equipment B bound with it, second The data of decryption are shown on Bluetooth communication equipment B.
Alternatively, after the first Bluetooth encryption equipment disconnects with the second Bluetooth communication equipment, the second Bluetooth communication equipment The data of upper display disappear.
The Bluetooth encryption communication means of the present invention, it is similar with the technique effect of above-mentioned Bluetooth encryption communication system, herein Do not describe one by one.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments described in application, for those of ordinary skill in the art, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is the structural representation of the Bluetooth encryption communication system of the present invention;
Fig. 2 is the flow chart of the Bluetooth encryption communication means of the present invention.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on the present invention In embodiment, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Embodiment one
Fig. 1 is the structural representation of the Bluetooth encryption communication system of the present invention, as shown in figure 1, the Bluetooth encryption of the present invention Communication system includes multiple first Bluetooth encryption equipment and multiple second Bluetooth communication equipments, the first Bluetooth encryption equipment and second Communication software on Bluetooth communication equipment is respectively provided with unique identification number, each second Bluetooth communication equipment and one first indigo plant The binding connection of tooth encryption device, the data encryption or decryption that the first Bluetooth encryption equipment is sent to the second Bluetooth communication equipment.
The Bluetooth encryption communication system of the present invention is connected by the first Bluetooth encryption equipment with the second Bluetooth communication equipment, is solved The problem of communication security of having determined.If the first Bluetooth encryption equipment connects disconnection with the second Bluetooth communication equipment, the data shown Disappear, meanwhile, the data in the first Bluetooth encryption equipment can destroy, and so as to avoid the leakage of transmission information, improve communication Safe coefficient.
Preferably, Bluetooth encryption communication system also includes the second Bluetooth communication equipment server and the first Bluetooth encryption equipment Server, after the second Bluetooth communication equipment sends the data to the second Bluetooth communication equipment server, the second Bluetooth communication equipment Server sends the data to the first Bluetooth encryption device server, and the first Bluetooth encryption device server specifies second received The identification number of communication software on Bluetooth communication equipment.Vendor server specifies the communication on the second Bluetooth communication equipment received The identification number of software, ensure that in communication process, the uniqueness of the communication software on the second Bluetooth communication equipment, further carry High communication security degree.
It should be noted that the first Bluetooth encryption equipment can be bluetooth Key, bluetooth standard card, the special-shaped card of bluetooth etc., the Two Bluetooth communication equipments can be the second different Bluetooth communication equipments, but the identification number of communication software is unique, user Same communication software can be logged on the second different Bluetooth communication equipments, realize coded communication, i.e. the first Bluetooth encryption Equipment is encrypted or decrypted using symmetric key or unsymmetrical key to the data that the second Bluetooth communication equipment is sent.
Wherein, the second Bluetooth communication equipment can be mobile terminal, and the communication software to be communicated on mobile terminals can Think wechat, or others have the communication software of unique identifying number, and the second Bluetooth communication equipment server can be Wechat server, the same WeChat ID that user can be logged on different mobile terminals realize coded communication.Alternatively, it is multiple Carried out data transmission between second Bluetooth communication equipment by way of internet transparent transmission, it then follows communication protocols during the Internet transmission View.
It is to be understood that when the first Bluetooth encryption equipment and the binding connection of the second Bluetooth communication equipment, the first bluetooth adds After close equipment needs to use algorithm for encryption characteristic value, and transmission is authenticated to the first Bluetooth encryption device server, first is blue Tooth encryption device is confirmed.The characteristic value of first Bluetooth encryption equipment is the identification number of the first Bluetooth encryption equipment, Mac addresses Or one in device type or combination.The AES that first Bluetooth encryption equipment uses is hashing algorithm, symmetric cryptography calculation One kind or combination in method or rivest, shamir, adelman.The mode that first Bluetooth encryption equipment is confirmed is button, Petting Area Domain, vibrations motor or one kind in screen display or combination.After first Bluetooth encryption device server receives certification request, slave unit row Confirm that the first Bluetooth encryption equipment whether there is in table, and data are verified.If the first Bluetooth encryption equipment is present, school Success is tested, after the first Bluetooth encryption equipment confirms, binds successful connection;If the first Bluetooth encryption equipment is not present, verification is lost Lose, bind connection failure.
Embodiment two
The present invention proposes a kind of Bluetooth encryption communication means, suitable for the Bluetooth encryption communication system as described in embodiment one System, two the second Bluetooth communication equipments for carrying out data interaction are the second Bluetooth communication equipment A and the second Bluetooth communication equipment B, It is the first Bluetooth encryption device A with the second Bluetooth communication equipment A binding connections, binds and connect with the second Bluetooth communication equipment B For the first Bluetooth encryption equipment B, Fig. 2 be the present invention Bluetooth encryption communication means flow chart, as shown in Fig. 2 including such as Lower step:
Step S1, the second Bluetooth communication equipment A and the binding of the first Bluetooth encryption device A are connected;
Step S2, the second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A;First Bluetooth encryption is set Standby A is encrypted using data key, and the data after encryption are sent into the second Bluetooth communication equipment A;
Alternatively, the communication software on the second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A;The One Bluetooth encryption device A is encrypted using data key, and the data after encryption are sent into the second Bluetooth communication equipment Communication software on A, that is, the second Bluetooth communication equipment A.
Step S3, the data after encryption are sent to the second Bluetooth communication equipment B by the second Bluetooth communication equipment A;
Data after encryption are sent to the second Bluetooth communication equipment by the communication software wherein on the second Bluetooth communication equipment A Server;Data penetration transmission after encryption is sent to the first Bluetooth encryption device server by the second Bluetooth communication equipment server; Data penetration transmission after encryption is sent to the second Bluetooth communication equipment server by the first Bluetooth encryption device server, and is specified and connect The identification number for the communication software on the second Bluetooth communication equipment received, the second Bluetooth communication equipment server is by the data after encryption The communication software being sent on the second Bluetooth communication equipment B, namely the second Bluetooth communication equipment B.
Step S4, the data after encryption are sent to by the second Bluetooth communication equipment B binds the first bluetooth being connected with it and adds Close equipment B;
Step S5, the first Bluetooth encryption equipment B is decrypted using the data after key pair encryption, and by the number after decryption The the second Bluetooth communication equipment B bound according to being sent to it;
Alternatively, the data after decryption are sent to the communication software on the second Bluetooth communication equipment B bound with it;
Step S6, the second Bluetooth communication equipment B shows the data after the decryption.
Specifically, the data after the decryption are shown on the communication software on the second Bluetooth communication equipment B.
First Bluetooth encryption device A and the first Bluetooth encryption equipment B can be used symmetric key or asymmetric-key encryption or Ciphertext data, the first Bluetooth encryption device A and the first Bluetooth encryption equipment B cooperate, to data encryption and decryption.Especially Ground, the advantages of in order to combine symmetric key and unsymmetrical key, and the shortcomings that avoid its each, the application can particularly adopt With following encryption and decryption mode:
First Bluetooth encryption equipment in previous existence of dispatching from the factory into one group of unsymmetrical key, and two the second Bluetooth communication equipments it Between carry out first time data interaction when, according to unsymmetrical key generate symmetric key, data are encrypted using symmetric key Or decryption.
Wherein, the method for generating symmetric key is:First Bluetooth encryption device A and the first Bluetooth encryption equipment B are dispatching from the factory Previous existence into one group of unsymmetrical key, and between two the second Bluetooth communication equipments during progress first time data interaction, incites somebody to action respective The private key of unsymmetrical key is retained in the first Bluetooth encryption equipment respectively, and the public key of unsymmetrical key is sent to another In first Bluetooth encryption equipment of two Bluetooth communication equipments binding, two the first Bluetooth encryption equipment are according to mutual public key information With each self-generating random number of facility information, combination producing symmetric key.
Preferably, symmetric key is stored in two the first Bluetooth encryption equipment, when being again coupled to, directly using symmetrical Data key is handled.
It is noted that the method that data are encrypted is comprised the following steps using symmetric key:
Second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A bound and be connected with it, the first bluetooth Encryption device A adds data according to call duration time, receiving device information dispersion symmetric key, generating process key, process key It is close, and check value is generated, the data after encryption and check value are sent to the second Bluetooth communication equipment by the first Bluetooth encryption device A B。
Wherein, taken through the first Bluetooth encryption device A through the second Bluetooth communication equipment server and the first Bluetooth encryption equipment Data after encryption and check value are sent to the second Bluetooth communication equipment B by business device.
Preferably, the method that data are decrypted is comprised the following steps using symmetric key:
First Bluetooth encryption equipment B is according to call duration time, receiving device information dispersion symmetric key, generating process key;
Data deciphering after encryption is generated check value by process key;
First Bluetooth encryption equipment B carries out the check value that the check value after decryption and the first Bluetooth encryption device A generate Compare, if unanimously, successful decryption, and the data after decryption are sent to the second Bluetooth communication equipment B bound with it, second The data of decryption are shown on Bluetooth communication equipment B.
If inconsistent, decryption failure, and the data after decryption are sent to the second Bluetooth communication bound and be connected with it The data shown on equipment B, the second Bluetooth communication equipment B are one section of insignificant data.
It is to be understood that the one section of insignificant data mentioned in specification, can be one section of insignificant data, One section of mess code or arbitrary graphic, or other improper datas.
Alternatively, after the first Bluetooth encryption equipment disconnects with the second Bluetooth communication equipment, the second Bluetooth communication equipment The data of upper display disappear.
It should be noted that the first Bluetooth encryption equipment can be bluetooth Key, bluetooth standard card, the special-shaped card of bluetooth etc., the Two Bluetooth communication equipments can be the second different Bluetooth communication equipments, but the identification number of communication software is unique, user Same communication software can be logged on the second different Bluetooth communication equipments, realize coded communication, i.e. the first Bluetooth encryption Equipment is encrypted or decrypted using symmetric key or unsymmetrical key to the data that the second Bluetooth communication equipment is sent.
Wherein, the second Bluetooth communication equipment can be mobile terminal, and the communication software to be communicated on mobile terminals can Think wechat, or others have the communication software of unique identifying number, and the second Bluetooth communication equipment server can be Wechat server, the same WeChat ID that user can be logged on different mobile terminals realize coded communication.
Preferably, user can be stored or destroyed to data message according to the demand of itself, further be improved logical Believe safe coefficient.Processing mode includes following three kinds:One, the communication information in chat process is not preserved.In both sides' chat process In, information could be shown, and the first Bluetooth encryption equipment, the second Bluetooth communication equipment are all without the letter for preserving intercommunication Breath, when communication process terminates, Content of Communication is also destroyed.Two, burn-after-reading.After the communication information of other side reaches, after readding Burn, directly remove the data content of communication, so as to ensure that the communication information will not be viewed by third party.Three, it will communicate Information is stored in the first Bluetooth encryption equipment, also can be according to user's request, selectively so that it is guaranteed that the safety of the communication information Preserve the communication information.
Exemplarily,, can in order to preferably protect the privacy of the second Bluetooth communication equipment so that communication software is wechat as an example Wechat is arranged to only pay close attention to the user of public number can just get buddy list.In public number, there is independent good friend to close System, addition good friend could initiate communication function later.
The Bluetooth encryption communication means of the present invention, it is similar with the technique effect of above-mentioned Bluetooth encryption communication system, herein Do not describe one by one.
Although having been described for the preferred embodiment of the application, those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the application scope.Obviously, those skilled in the art can be to the application Various changes and modification are carried out without departing from spirit and scope.So, if these modifications and variations of the application Belong within the scope of the application claim and its equivalent technologies, then the application is also intended to exist comprising these changes and modification It is interior.

Claims (10)

1. a kind of Bluetooth encryption communication system, it is characterised in that including multiple first Bluetooth encryption equipment and multiple second bluetooths Communication equipment, the communication software in the first Bluetooth encryption equipment and the second Bluetooth communication equipment are respectively provided with unique identification number, often Individual second Bluetooth communication equipment is all connected with a first Bluetooth encryption apparatus bound, and the first Bluetooth encryption equipment is to the second bluetooth The data encryption or decryption that communication equipment is sent.
2. Bluetooth encryption communication system as claimed in claim 1, it is characterised in that also including the second Bluetooth communication equipment service Device and the first Bluetooth encryption device server, the second Bluetooth communication equipment send the data to the second Bluetooth communication equipment server Afterwards, the second Bluetooth communication equipment server sends the data to the first Bluetooth encryption device server, the first Bluetooth encryption equipment Server specifies the identification number of the communication software on the second Bluetooth communication equipment received.
3. Bluetooth encryption communication system as claimed in claim 1, it is characterised in that lead between multiple second Bluetooth communication equipments The mode for crossing internet transparent transmission carries out data transmission.
4. Bluetooth encryption communication system as claimed in claim 1, it is characterised in that the first Bluetooth encryption equipment is to the second bluetooth The data that communication equipment is sent are encrypted or decrypted using symmetric key or unsymmetrical key.
5. a kind of Bluetooth encryption communication means, it is characterised in that this method comprises the following steps:
Step S1, the second Bluetooth communication equipment A and the binding of the first Bluetooth encryption device A are connected;
Step S2, the second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A;First Bluetooth encryption device A makes It is encrypted with data key, and the data after encryption is sent to the second Bluetooth communication equipment A;
Step S3, the data after encryption are sent to the second Bluetooth communication equipment B by the second Bluetooth communication equipment A;
Step S4, the data after encryption are sent to by the second Bluetooth communication equipment B binds the first Bluetooth encryption being connected with it and sets Standby B;
Step S5, the first Bluetooth encryption equipment B is decrypted using the data after key pair encryption, and the data after decryption are sent out Give the second Bluetooth communication equipment B bound with it;
Step S6, the second Bluetooth communication equipment B shows the data after the decryption.
6. Bluetooth encryption communication means as claimed in claim 5, it is characterised in that the first Bluetooth encryption equipment was in previous existence of dispatching from the factory Into one group of unsymmetrical key, and between two the second Bluetooth communication equipments during progress first time data interaction, according to asymmetric Key generates symmetric key, and data are encrypted or decrypted using symmetric key.
7. Bluetooth encryption communication means as claimed in claim 6, it is characterised in that symmetric key is stored in two first indigo plants In tooth encryption device, when being again coupled to, directly data are handled using symmetric key.
8. Bluetooth encryption communication means as claimed in claim 7, it is characterised in that data are encrypted using symmetric key Method comprise the following steps:
Second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A bound and be connected with it, the first Bluetooth encryption Device A is according to call duration time, receiving device information dispersion symmetric key, generating process key, process key by data encryption, and Check value is generated, the data after encryption and check value are sent to the second Bluetooth communication equipment B by the first Bluetooth encryption device A.
9. Bluetooth encryption communication means as claimed in claim 7, it is characterised in that data are decrypted using symmetric key Method comprise the following steps:
First Bluetooth encryption equipment B is according to call duration time, receiving device information dispersion symmetric key, generating process key;
Data deciphering after encryption is generated check value by process key;
First Bluetooth encryption equipment B by the check value after decryption compared with the check value that the first Bluetooth encryption device A generates, If consistent, successful decryption, and the data after decryption are sent to the second Bluetooth communication equipment B bound with it, the second bluetooth The data of decryption are shown on communication equipment B.
10. Bluetooth encryption communication means as claimed in claim 5, it is characterised in that the first Bluetooth encryption equipment is blue with second After tooth communication equipment disconnects, the data shown on the second Bluetooth communication equipment disappear.
CN201710290105.9A 2017-04-28 2017-04-28 Bluetooth encryption communication system and communication method Active CN107426670B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710290105.9A CN107426670B (en) 2017-04-28 2017-04-28 Bluetooth encryption communication system and communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710290105.9A CN107426670B (en) 2017-04-28 2017-04-28 Bluetooth encryption communication system and communication method

Publications (2)

Publication Number Publication Date
CN107426670A true CN107426670A (en) 2017-12-01
CN107426670B CN107426670B (en) 2020-01-03

Family

ID=60424301

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710290105.9A Active CN107426670B (en) 2017-04-28 2017-04-28 Bluetooth encryption communication system and communication method

Country Status (1)

Country Link
CN (1) CN107426670B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347597A (en) * 2021-05-27 2021-09-03 江铃汽车股份有限公司 Communication encryption method and system of Bluetooth key

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1538303A (en) * 2003-04-15 2004-10-20 联想(北京)有限公司 Communication safety control method of distribution type software system
US20070288390A1 (en) * 2001-07-06 2007-12-13 Nokia Corporation Relating to Consumption of Content
CN101141250A (en) * 2007-10-10 2008-03-12 北京握奇数据***有限公司 Instrument equipment, data safety access method, device and system
US20140101776A1 (en) * 2012-10-10 2014-04-10 Red.Com, Inc. Digital Asset Distribution Media
CN105101184A (en) * 2014-05-23 2015-11-25 深圳市兴联达科技有限公司 Mobile terminal communication method and system based on bluetooth encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070288390A1 (en) * 2001-07-06 2007-12-13 Nokia Corporation Relating to Consumption of Content
CN1538303A (en) * 2003-04-15 2004-10-20 联想(北京)有限公司 Communication safety control method of distribution type software system
CN101141250A (en) * 2007-10-10 2008-03-12 北京握奇数据***有限公司 Instrument equipment, data safety access method, device and system
US20140101776A1 (en) * 2012-10-10 2014-04-10 Red.Com, Inc. Digital Asset Distribution Media
CN105101184A (en) * 2014-05-23 2015-11-25 深圳市兴联达科技有限公司 Mobile terminal communication method and system based on bluetooth encryption

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347597A (en) * 2021-05-27 2021-09-03 江铃汽车股份有限公司 Communication encryption method and system of Bluetooth key

Also Published As

Publication number Publication date
CN107426670B (en) 2020-01-03

Similar Documents

Publication Publication Date Title
CN102394749B (en) Line protection method, system, information safety equipment and application equipment for data transmission
CN110011802A (en) A kind of two side of efficient SM9 cooperates with the method and system of generation digital signature
CN109347809A (en) A kind of application virtualization safety communicating method towards under autonomous controllable environment
CN106603485A (en) Secret key negotiation method and device
CN105162599B (en) A kind of data transmission system and its transmission method
CN101978650B (en) A system and method of secure network authentication
CN106878016A (en) Data is activation, method of reseptance and device
CN105450395A (en) Information encryption and decryption processing method and system
CN108809643A (en) A kind of method, system and the equipment of equipment and high in the clouds arranging key
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN110120939A (en) A kind of encryption method and system of the deniable authentication based on heterogeneous system
CN107483429B (en) A kind of data ciphering method and device
CN109150897A (en) A kind of communication encrypting method and device end to end
CN105610847B (en) A method of support more switching node electronic government documents safe transmissions to exchange
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN102685749A (en) Wireless safety authentication method orienting to mobile terminal
CN109951513A (en) Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN103297230B (en) Information encipher-decipher method, Apparatus and system
CN103167494B (en) Method for sending information and system
CN104954378A (en) Asymmetric message encryption method and system
CN108206739A (en) Key generation method and device
CN106792700A (en) The method for building up and system of a kind of secure communication environment of wearable device
CN110493162A (en) Identity identifying method and system based on wearable device
CN107666395A (en) One population file management method, user terminal, group chat system
CN110224816A (en) Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant