CN107426670A - A kind of Bluetooth encryption communication system and communication means - Google Patents
A kind of Bluetooth encryption communication system and communication means Download PDFInfo
- Publication number
- CN107426670A CN107426670A CN201710290105.9A CN201710290105A CN107426670A CN 107426670 A CN107426670 A CN 107426670A CN 201710290105 A CN201710290105 A CN 201710290105A CN 107426670 A CN107426670 A CN 107426670A
- Authority
- CN
- China
- Prior art keywords
- bluetooth
- encryption
- data
- equipment
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/30—Connection release
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of Bluetooth encryption communication system and communication means, is related to field of communication security, solves the technical problem that communication security degree is low in the prior art.The Bluetooth encryption communication system of the present invention includes multiple first Bluetooth encryption equipment and multiple second Bluetooth communication equipments, the communication software of first Bluetooth encryption equipment and the second Bluetooth communication equipment is respectively provided with unique identification number, each second Bluetooth communication equipment is connected with a first Bluetooth encryption apparatus bound, the data encryption or decryption that the first Bluetooth encryption equipment is sent to the second Bluetooth communication equipment.The present invention is applied to information transfer.
Description
Technical field
The present invention relates to field of communication security, and in particular to a kind of Bluetooth encryption communication system and communication means.
Background technology
The communication software of existing Bluetooth communication equipment, popularity is very high, but communication software is in communication process
Secrecy means it is limited.As long as third party obtains log-on message, just energy logging on communication software obtains user profile, it is impossible to meets existing
In the secret communication demand to communication software.When information in communication software is encrypted existing encryption method, list is used
One encryption method, key create-rule is consistent, can be cracked by software or software code leakage is low and leakage, safe coefficient.
The content of the invention
It is an object of the invention to provide a kind of Bluetooth encryption communication system and communication means, solution is encrypted in the prior art
The low technical problem of the safe coefficient of communication.
The Bluetooth encryption communication system of the present invention, including multiple first Bluetooth encryption equipment and multiple second Bluetooth communications are set
Standby, the communication software in the first Bluetooth encryption equipment and the second Bluetooth communication equipment is respectively provided with unique identification number, and each second
Bluetooth communication equipment is all connected with a first Bluetooth encryption apparatus bound, and the first Bluetooth encryption equipment is set to the second Bluetooth communication
The data encryption or decryption that preparation is sent.
Alternatively, in addition to the second Bluetooth communication equipment server and the first Bluetooth encryption device server, the second bluetooth
After communication equipment sends the data to the second Bluetooth communication equipment server, the second Bluetooth communication equipment server sends data
To the first Bluetooth encryption device server, the first Bluetooth encryption device server is specified on the second Bluetooth communication equipment received
The identification number of communication software.Alternatively, data are carried out by way of internet transparent transmission between multiple second Bluetooth communication equipments
Transmission.
Alternatively, the data that the first Bluetooth encryption equipment is sent to the second Bluetooth communication equipment use symmetric key or non-right
Key is claimed to be encrypted or decrypt.
The Bluetooth encryption communication system of the present invention is connected by the first Bluetooth encryption equipment with the second Bluetooth communication equipment, is solved
The problem of communication security of having determined, if the first Bluetooth encryption equipment connects disconnection with the second Bluetooth communication equipment, the data shown
Disappear, avoid the leakage of transmission information, improve communication security degree.
The present invention also provides a kind of Bluetooth encryption communication means, should suitable for Bluetooth encryption communication system as described above
Method comprises the following steps:
Step S1, the second Bluetooth communication equipment A and the binding of the first Bluetooth encryption device A are connected;
Step S2, the second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A;First Bluetooth encryption is set
Standby A is encrypted using data key, and the data after encryption are sent into the second Bluetooth communication equipment A;
Step S3, the data after encryption are sent to the second Bluetooth communication equipment B by the second Bluetooth communication equipment A;
Step S4, the data after encryption are sent to by the second Bluetooth communication equipment B binds the first bluetooth being connected with it and adds
Close equipment B;
Step S5, the first Bluetooth encryption equipment B is decrypted using the data after key pair encryption, and by the number after decryption
The the second Bluetooth communication equipment B bound according to being sent to it;
Step S6, the second Bluetooth communication equipment B shows the data after the decryption.
Alternatively, the first Bluetooth encryption equipment was led in previous existence of dispatching from the factory into one group of unsymmetrical key, and in two the second bluetooths
When carrying out first time data interaction between letter equipment, symmetric key is generated according to unsymmetrical key, using symmetric key to data
It is encrypted or decrypts.
Alternatively, symmetric key is stored in two the first Bluetooth encryption equipment, when being again coupled to, directly using symmetrical
Data key is handled.
Alternatively, the method that data are encrypted is comprised the following steps using symmetric key:
Second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A bound and be connected with it, the first bluetooth
Encryption device A adds data according to call duration time, receiving device information dispersion symmetric key, generating process key, process key
It is close, and check value is generated, the data after encryption and check value are sent to the second Bluetooth communication equipment by the first Bluetooth encryption device A
B。
Alternatively, the method that data are decrypted is comprised the following steps using symmetric key:
First Bluetooth encryption equipment B is according to call duration time, receiving device information dispersion symmetric key, generating process key;
Data deciphering after encryption is generated check value by process key;
First Bluetooth encryption equipment B carries out the check value that the check value after decryption and the first Bluetooth encryption device A generate
Compare, if unanimously, successful decryption, and the data after decryption are sent to the second Bluetooth communication equipment B bound with it, second
The data of decryption are shown on Bluetooth communication equipment B.
Alternatively, after the first Bluetooth encryption equipment disconnects with the second Bluetooth communication equipment, the second Bluetooth communication equipment
The data of upper display disappear.
The Bluetooth encryption communication means of the present invention, it is similar with the technique effect of above-mentioned Bluetooth encryption communication system, herein
Do not describe one by one.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments described in application, for those of ordinary skill in the art, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is the structural representation of the Bluetooth encryption communication system of the present invention;
Fig. 2 is the flow chart of the Bluetooth encryption communication means of the present invention.
Embodiment
With reference to the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Ground describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on the present invention
In embodiment, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
Embodiment one
Fig. 1 is the structural representation of the Bluetooth encryption communication system of the present invention, as shown in figure 1, the Bluetooth encryption of the present invention
Communication system includes multiple first Bluetooth encryption equipment and multiple second Bluetooth communication equipments, the first Bluetooth encryption equipment and second
Communication software on Bluetooth communication equipment is respectively provided with unique identification number, each second Bluetooth communication equipment and one first indigo plant
The binding connection of tooth encryption device, the data encryption or decryption that the first Bluetooth encryption equipment is sent to the second Bluetooth communication equipment.
The Bluetooth encryption communication system of the present invention is connected by the first Bluetooth encryption equipment with the second Bluetooth communication equipment, is solved
The problem of communication security of having determined.If the first Bluetooth encryption equipment connects disconnection with the second Bluetooth communication equipment, the data shown
Disappear, meanwhile, the data in the first Bluetooth encryption equipment can destroy, and so as to avoid the leakage of transmission information, improve communication
Safe coefficient.
Preferably, Bluetooth encryption communication system also includes the second Bluetooth communication equipment server and the first Bluetooth encryption equipment
Server, after the second Bluetooth communication equipment sends the data to the second Bluetooth communication equipment server, the second Bluetooth communication equipment
Server sends the data to the first Bluetooth encryption device server, and the first Bluetooth encryption device server specifies second received
The identification number of communication software on Bluetooth communication equipment.Vendor server specifies the communication on the second Bluetooth communication equipment received
The identification number of software, ensure that in communication process, the uniqueness of the communication software on the second Bluetooth communication equipment, further carry
High communication security degree.
It should be noted that the first Bluetooth encryption equipment can be bluetooth Key, bluetooth standard card, the special-shaped card of bluetooth etc., the
Two Bluetooth communication equipments can be the second different Bluetooth communication equipments, but the identification number of communication software is unique, user
Same communication software can be logged on the second different Bluetooth communication equipments, realize coded communication, i.e. the first Bluetooth encryption
Equipment is encrypted or decrypted using symmetric key or unsymmetrical key to the data that the second Bluetooth communication equipment is sent.
Wherein, the second Bluetooth communication equipment can be mobile terminal, and the communication software to be communicated on mobile terminals can
Think wechat, or others have the communication software of unique identifying number, and the second Bluetooth communication equipment server can be
Wechat server, the same WeChat ID that user can be logged on different mobile terminals realize coded communication.Alternatively, it is multiple
Carried out data transmission between second Bluetooth communication equipment by way of internet transparent transmission, it then follows communication protocols during the Internet transmission
View.
It is to be understood that when the first Bluetooth encryption equipment and the binding connection of the second Bluetooth communication equipment, the first bluetooth adds
After close equipment needs to use algorithm for encryption characteristic value, and transmission is authenticated to the first Bluetooth encryption device server, first is blue
Tooth encryption device is confirmed.The characteristic value of first Bluetooth encryption equipment is the identification number of the first Bluetooth encryption equipment, Mac addresses
Or one in device type or combination.The AES that first Bluetooth encryption equipment uses is hashing algorithm, symmetric cryptography calculation
One kind or combination in method or rivest, shamir, adelman.The mode that first Bluetooth encryption equipment is confirmed is button, Petting Area
Domain, vibrations motor or one kind in screen display or combination.After first Bluetooth encryption device server receives certification request, slave unit row
Confirm that the first Bluetooth encryption equipment whether there is in table, and data are verified.If the first Bluetooth encryption equipment is present, school
Success is tested, after the first Bluetooth encryption equipment confirms, binds successful connection;If the first Bluetooth encryption equipment is not present, verification is lost
Lose, bind connection failure.
Embodiment two
The present invention proposes a kind of Bluetooth encryption communication means, suitable for the Bluetooth encryption communication system as described in embodiment one
System, two the second Bluetooth communication equipments for carrying out data interaction are the second Bluetooth communication equipment A and the second Bluetooth communication equipment B,
It is the first Bluetooth encryption device A with the second Bluetooth communication equipment A binding connections, binds and connect with the second Bluetooth communication equipment B
For the first Bluetooth encryption equipment B, Fig. 2 be the present invention Bluetooth encryption communication means flow chart, as shown in Fig. 2 including such as
Lower step:
Step S1, the second Bluetooth communication equipment A and the binding of the first Bluetooth encryption device A are connected;
Step S2, the second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A;First Bluetooth encryption is set
Standby A is encrypted using data key, and the data after encryption are sent into the second Bluetooth communication equipment A;
Alternatively, the communication software on the second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A;The
One Bluetooth encryption device A is encrypted using data key, and the data after encryption are sent into the second Bluetooth communication equipment
Communication software on A, that is, the second Bluetooth communication equipment A.
Step S3, the data after encryption are sent to the second Bluetooth communication equipment B by the second Bluetooth communication equipment A;
Data after encryption are sent to the second Bluetooth communication equipment by the communication software wherein on the second Bluetooth communication equipment A
Server;Data penetration transmission after encryption is sent to the first Bluetooth encryption device server by the second Bluetooth communication equipment server;
Data penetration transmission after encryption is sent to the second Bluetooth communication equipment server by the first Bluetooth encryption device server, and is specified and connect
The identification number for the communication software on the second Bluetooth communication equipment received, the second Bluetooth communication equipment server is by the data after encryption
The communication software being sent on the second Bluetooth communication equipment B, namely the second Bluetooth communication equipment B.
Step S4, the data after encryption are sent to by the second Bluetooth communication equipment B binds the first bluetooth being connected with it and adds
Close equipment B;
Step S5, the first Bluetooth encryption equipment B is decrypted using the data after key pair encryption, and by the number after decryption
The the second Bluetooth communication equipment B bound according to being sent to it;
Alternatively, the data after decryption are sent to the communication software on the second Bluetooth communication equipment B bound with it;
Step S6, the second Bluetooth communication equipment B shows the data after the decryption.
Specifically, the data after the decryption are shown on the communication software on the second Bluetooth communication equipment B.
First Bluetooth encryption device A and the first Bluetooth encryption equipment B can be used symmetric key or asymmetric-key encryption or
Ciphertext data, the first Bluetooth encryption device A and the first Bluetooth encryption equipment B cooperate, to data encryption and decryption.Especially
Ground, the advantages of in order to combine symmetric key and unsymmetrical key, and the shortcomings that avoid its each, the application can particularly adopt
With following encryption and decryption mode:
First Bluetooth encryption equipment in previous existence of dispatching from the factory into one group of unsymmetrical key, and two the second Bluetooth communication equipments it
Between carry out first time data interaction when, according to unsymmetrical key generate symmetric key, data are encrypted using symmetric key
Or decryption.
Wherein, the method for generating symmetric key is:First Bluetooth encryption device A and the first Bluetooth encryption equipment B are dispatching from the factory
Previous existence into one group of unsymmetrical key, and between two the second Bluetooth communication equipments during progress first time data interaction, incites somebody to action respective
The private key of unsymmetrical key is retained in the first Bluetooth encryption equipment respectively, and the public key of unsymmetrical key is sent to another
In first Bluetooth encryption equipment of two Bluetooth communication equipments binding, two the first Bluetooth encryption equipment are according to mutual public key information
With each self-generating random number of facility information, combination producing symmetric key.
Preferably, symmetric key is stored in two the first Bluetooth encryption equipment, when being again coupled to, directly using symmetrical
Data key is handled.
It is noted that the method that data are encrypted is comprised the following steps using symmetric key:
Second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A bound and be connected with it, the first bluetooth
Encryption device A adds data according to call duration time, receiving device information dispersion symmetric key, generating process key, process key
It is close, and check value is generated, the data after encryption and check value are sent to the second Bluetooth communication equipment by the first Bluetooth encryption device A
B。
Wherein, taken through the first Bluetooth encryption device A through the second Bluetooth communication equipment server and the first Bluetooth encryption equipment
Data after encryption and check value are sent to the second Bluetooth communication equipment B by business device.
Preferably, the method that data are decrypted is comprised the following steps using symmetric key:
First Bluetooth encryption equipment B is according to call duration time, receiving device information dispersion symmetric key, generating process key;
Data deciphering after encryption is generated check value by process key;
First Bluetooth encryption equipment B carries out the check value that the check value after decryption and the first Bluetooth encryption device A generate
Compare, if unanimously, successful decryption, and the data after decryption are sent to the second Bluetooth communication equipment B bound with it, second
The data of decryption are shown on Bluetooth communication equipment B.
If inconsistent, decryption failure, and the data after decryption are sent to the second Bluetooth communication bound and be connected with it
The data shown on equipment B, the second Bluetooth communication equipment B are one section of insignificant data.
It is to be understood that the one section of insignificant data mentioned in specification, can be one section of insignificant data,
One section of mess code or arbitrary graphic, or other improper datas.
Alternatively, after the first Bluetooth encryption equipment disconnects with the second Bluetooth communication equipment, the second Bluetooth communication equipment
The data of upper display disappear.
It should be noted that the first Bluetooth encryption equipment can be bluetooth Key, bluetooth standard card, the special-shaped card of bluetooth etc., the
Two Bluetooth communication equipments can be the second different Bluetooth communication equipments, but the identification number of communication software is unique, user
Same communication software can be logged on the second different Bluetooth communication equipments, realize coded communication, i.e. the first Bluetooth encryption
Equipment is encrypted or decrypted using symmetric key or unsymmetrical key to the data that the second Bluetooth communication equipment is sent.
Wherein, the second Bluetooth communication equipment can be mobile terminal, and the communication software to be communicated on mobile terminals can
Think wechat, or others have the communication software of unique identifying number, and the second Bluetooth communication equipment server can be
Wechat server, the same WeChat ID that user can be logged on different mobile terminals realize coded communication.
Preferably, user can be stored or destroyed to data message according to the demand of itself, further be improved logical
Believe safe coefficient.Processing mode includes following three kinds:One, the communication information in chat process is not preserved.In both sides' chat process
In, information could be shown, and the first Bluetooth encryption equipment, the second Bluetooth communication equipment are all without the letter for preserving intercommunication
Breath, when communication process terminates, Content of Communication is also destroyed.Two, burn-after-reading.After the communication information of other side reaches, after readding
Burn, directly remove the data content of communication, so as to ensure that the communication information will not be viewed by third party.Three, it will communicate
Information is stored in the first Bluetooth encryption equipment, also can be according to user's request, selectively so that it is guaranteed that the safety of the communication information
Preserve the communication information.
Exemplarily,, can in order to preferably protect the privacy of the second Bluetooth communication equipment so that communication software is wechat as an example
Wechat is arranged to only pay close attention to the user of public number can just get buddy list.In public number, there is independent good friend to close
System, addition good friend could initiate communication function later.
The Bluetooth encryption communication means of the present invention, it is similar with the technique effect of above-mentioned Bluetooth encryption communication system, herein
Do not describe one by one.
Although having been described for the preferred embodiment of the application, those skilled in the art once know basic creation
Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into having altered and changing for the application scope.Obviously, those skilled in the art can be to the application
Various changes and modification are carried out without departing from spirit and scope.So, if these modifications and variations of the application
Belong within the scope of the application claim and its equivalent technologies, then the application is also intended to exist comprising these changes and modification
It is interior.
Claims (10)
1. a kind of Bluetooth encryption communication system, it is characterised in that including multiple first Bluetooth encryption equipment and multiple second bluetooths
Communication equipment, the communication software in the first Bluetooth encryption equipment and the second Bluetooth communication equipment are respectively provided with unique identification number, often
Individual second Bluetooth communication equipment is all connected with a first Bluetooth encryption apparatus bound, and the first Bluetooth encryption equipment is to the second bluetooth
The data encryption or decryption that communication equipment is sent.
2. Bluetooth encryption communication system as claimed in claim 1, it is characterised in that also including the second Bluetooth communication equipment service
Device and the first Bluetooth encryption device server, the second Bluetooth communication equipment send the data to the second Bluetooth communication equipment server
Afterwards, the second Bluetooth communication equipment server sends the data to the first Bluetooth encryption device server, the first Bluetooth encryption equipment
Server specifies the identification number of the communication software on the second Bluetooth communication equipment received.
3. Bluetooth encryption communication system as claimed in claim 1, it is characterised in that lead between multiple second Bluetooth communication equipments
The mode for crossing internet transparent transmission carries out data transmission.
4. Bluetooth encryption communication system as claimed in claim 1, it is characterised in that the first Bluetooth encryption equipment is to the second bluetooth
The data that communication equipment is sent are encrypted or decrypted using symmetric key or unsymmetrical key.
5. a kind of Bluetooth encryption communication means, it is characterised in that this method comprises the following steps:
Step S1, the second Bluetooth communication equipment A and the binding of the first Bluetooth encryption device A are connected;
Step S2, the second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A;First Bluetooth encryption device A makes
It is encrypted with data key, and the data after encryption is sent to the second Bluetooth communication equipment A;
Step S3, the data after encryption are sent to the second Bluetooth communication equipment B by the second Bluetooth communication equipment A;
Step S4, the data after encryption are sent to by the second Bluetooth communication equipment B binds the first Bluetooth encryption being connected with it and sets
Standby B;
Step S5, the first Bluetooth encryption equipment B is decrypted using the data after key pair encryption, and the data after decryption are sent out
Give the second Bluetooth communication equipment B bound with it;
Step S6, the second Bluetooth communication equipment B shows the data after the decryption.
6. Bluetooth encryption communication means as claimed in claim 5, it is characterised in that the first Bluetooth encryption equipment was in previous existence of dispatching from the factory
Into one group of unsymmetrical key, and between two the second Bluetooth communication equipments during progress first time data interaction, according to asymmetric
Key generates symmetric key, and data are encrypted or decrypted using symmetric key.
7. Bluetooth encryption communication means as claimed in claim 6, it is characterised in that symmetric key is stored in two first indigo plants
In tooth encryption device, when being again coupled to, directly data are handled using symmetric key.
8. Bluetooth encryption communication means as claimed in claim 7, it is characterised in that data are encrypted using symmetric key
Method comprise the following steps:
Second Bluetooth communication equipment A sends the data to the first Bluetooth encryption device A bound and be connected with it, the first Bluetooth encryption
Device A is according to call duration time, receiving device information dispersion symmetric key, generating process key, process key by data encryption, and
Check value is generated, the data after encryption and check value are sent to the second Bluetooth communication equipment B by the first Bluetooth encryption device A.
9. Bluetooth encryption communication means as claimed in claim 7, it is characterised in that data are decrypted using symmetric key
Method comprise the following steps:
First Bluetooth encryption equipment B is according to call duration time, receiving device information dispersion symmetric key, generating process key;
Data deciphering after encryption is generated check value by process key;
First Bluetooth encryption equipment B by the check value after decryption compared with the check value that the first Bluetooth encryption device A generates,
If consistent, successful decryption, and the data after decryption are sent to the second Bluetooth communication equipment B bound with it, the second bluetooth
The data of decryption are shown on communication equipment B.
10. Bluetooth encryption communication means as claimed in claim 5, it is characterised in that the first Bluetooth encryption equipment is blue with second
After tooth communication equipment disconnects, the data shown on the second Bluetooth communication equipment disappear.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710290105.9A CN107426670B (en) | 2017-04-28 | 2017-04-28 | Bluetooth encryption communication system and communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710290105.9A CN107426670B (en) | 2017-04-28 | 2017-04-28 | Bluetooth encryption communication system and communication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107426670A true CN107426670A (en) | 2017-12-01 |
CN107426670B CN107426670B (en) | 2020-01-03 |
Family
ID=60424301
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710290105.9A Active CN107426670B (en) | 2017-04-28 | 2017-04-28 | Bluetooth encryption communication system and communication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107426670B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113347597A (en) * | 2021-05-27 | 2021-09-03 | 江铃汽车股份有限公司 | Communication encryption method and system of Bluetooth key |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1538303A (en) * | 2003-04-15 | 2004-10-20 | 联想(北京)有限公司 | Communication safety control method of distribution type software system |
US20070288390A1 (en) * | 2001-07-06 | 2007-12-13 | Nokia Corporation | Relating to Consumption of Content |
CN101141250A (en) * | 2007-10-10 | 2008-03-12 | 北京握奇数据***有限公司 | Instrument equipment, data safety access method, device and system |
US20140101776A1 (en) * | 2012-10-10 | 2014-04-10 | Red.Com, Inc. | Digital Asset Distribution Media |
CN105101184A (en) * | 2014-05-23 | 2015-11-25 | 深圳市兴联达科技有限公司 | Mobile terminal communication method and system based on bluetooth encryption |
-
2017
- 2017-04-28 CN CN201710290105.9A patent/CN107426670B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070288390A1 (en) * | 2001-07-06 | 2007-12-13 | Nokia Corporation | Relating to Consumption of Content |
CN1538303A (en) * | 2003-04-15 | 2004-10-20 | 联想(北京)有限公司 | Communication safety control method of distribution type software system |
CN101141250A (en) * | 2007-10-10 | 2008-03-12 | 北京握奇数据***有限公司 | Instrument equipment, data safety access method, device and system |
US20140101776A1 (en) * | 2012-10-10 | 2014-04-10 | Red.Com, Inc. | Digital Asset Distribution Media |
CN105101184A (en) * | 2014-05-23 | 2015-11-25 | 深圳市兴联达科技有限公司 | Mobile terminal communication method and system based on bluetooth encryption |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113347597A (en) * | 2021-05-27 | 2021-09-03 | 江铃汽车股份有限公司 | Communication encryption method and system of Bluetooth key |
Also Published As
Publication number | Publication date |
---|---|
CN107426670B (en) | 2020-01-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102394749B (en) | Line protection method, system, information safety equipment and application equipment for data transmission | |
CN110011802A (en) | A kind of two side of efficient SM9 cooperates with the method and system of generation digital signature | |
CN109347809A (en) | A kind of application virtualization safety communicating method towards under autonomous controllable environment | |
CN106603485A (en) | Secret key negotiation method and device | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
CN101978650B (en) | A system and method of secure network authentication | |
CN106878016A (en) | Data is activation, method of reseptance and device | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
CN108809643A (en) | A kind of method, system and the equipment of equipment and high in the clouds arranging key | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN110120939A (en) | A kind of encryption method and system of the deniable authentication based on heterogeneous system | |
CN107483429B (en) | A kind of data ciphering method and device | |
CN109150897A (en) | A kind of communication encrypting method and device end to end | |
CN105610847B (en) | A method of support more switching node electronic government documents safe transmissions to exchange | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN102685749A (en) | Wireless safety authentication method orienting to mobile terminal | |
CN109951513A (en) | Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card | |
CN103297230B (en) | Information encipher-decipher method, Apparatus and system | |
CN103167494B (en) | Method for sending information and system | |
CN104954378A (en) | Asymmetric message encryption method and system | |
CN108206739A (en) | Key generation method and device | |
CN106792700A (en) | The method for building up and system of a kind of secure communication environment of wearable device | |
CN110493162A (en) | Identity identifying method and system based on wearable device | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN110224816A (en) | Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |