CN107426670B - Bluetooth encryption communication system and communication method - Google Patents

Bluetooth encryption communication system and communication method Download PDF

Info

Publication number
CN107426670B
CN107426670B CN201710290105.9A CN201710290105A CN107426670B CN 107426670 B CN107426670 B CN 107426670B CN 201710290105 A CN201710290105 A CN 201710290105A CN 107426670 B CN107426670 B CN 107426670B
Authority
CN
China
Prior art keywords
bluetooth
data
communication
encryption
bluetooth communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710290105.9A
Other languages
Chinese (zh)
Other versions
CN107426670A (en
Inventor
高岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengbao Co Ltd
Original Assignee
Hengbao Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hengbao Co Ltd filed Critical Hengbao Co Ltd
Priority to CN201710290105.9A priority Critical patent/CN107426670B/en
Publication of CN107426670A publication Critical patent/CN107426670A/en
Application granted granted Critical
Publication of CN107426670B publication Critical patent/CN107426670B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a Bluetooth encryption communication system and a communication method, relates to the field of communication safety, and solves the technical problem of low communication safety degree in the prior art. The Bluetooth encryption communication system comprises a plurality of first Bluetooth encryption devices and a plurality of second Bluetooth communication devices, wherein communication software of the first Bluetooth encryption devices and communication software of the second Bluetooth communication devices have unique identification numbers, each second Bluetooth communication device is bound and connected with one first Bluetooth encryption device, and the first Bluetooth encryption devices encrypt or decrypt data sent by the second Bluetooth communication devices. The invention is applied to information transmission.

Description

Bluetooth encryption communication system and communication method
Technical Field
The invention relates to the field of communication safety, in particular to a Bluetooth encryption communication system and a communication method.
Background
The communication software of the existing Bluetooth communication equipment has very high popularity, but the security means of the communication software in the communication process is limited. As long as the third party obtains the login information, the third party can log in the communication software to obtain the user information, and the existing secret communication requirement on the communication software cannot be met. When the existing encryption method is used for encrypting information in communication software, a single encryption method is used, the key generation rules are consistent, the information can be leaked through software cracking or software code leakage, and the safety degree is low.
Disclosure of Invention
The invention aims to provide a Bluetooth encryption communication system and a communication method, which solve the technical problem of low security degree of encryption communication in the prior art.
The Bluetooth encryption communication system comprises a plurality of first Bluetooth encryption devices and a plurality of second Bluetooth communication devices, wherein communication software on the first Bluetooth encryption devices and the second Bluetooth communication devices respectively have unique identification numbers, each second Bluetooth communication device is bound and connected with one first Bluetooth encryption device, and the first Bluetooth encryption devices encrypt or decrypt data sent by the second Bluetooth communication devices.
Optionally, the bluetooth communication system further comprises a second bluetooth communication device server and a first bluetooth encryption device server, after the second bluetooth communication device sends the data to the second bluetooth communication device server, the second bluetooth communication device server sends the data to the first bluetooth encryption device server, and the first bluetooth encryption device server specifies the received identification number of the communication software on the second bluetooth communication device. Optionally, data transmission is performed between the plurality of second bluetooth communication devices in a transparent transmission mode through the internet.
Optionally, the first bluetooth encryption device encrypts or decrypts data transmitted by the second bluetooth communication device using a symmetric key or an asymmetric key.
According to the Bluetooth encryption communication system, the first Bluetooth encryption device is connected with the second Bluetooth communication device, so that the problem of communication safety is solved, and if the first Bluetooth encryption device and the second Bluetooth communication device are disconnected, displayed data disappear, leakage of transmission information is avoided, and the communication safety degree is improved.
The invention also provides a Bluetooth encryption communication method, which is suitable for the Bluetooth encryption communication system and comprises the following steps:
step S1, binding and connecting the second Bluetooth communication device A with the first Bluetooth encryption device A;
step S2, the second Bluetooth communication device A sends the data to the first Bluetooth encryption device A; the first Bluetooth encryption device A encrypts data by using a secret key and sends the encrypted data to the second Bluetooth communication device A;
step S3, the second Bluetooth communication device A sends the encrypted data to the second Bluetooth communication device B;
step S4, the second Bluetooth communication device B sends the encrypted data to the first Bluetooth encryption device B bound with the second Bluetooth communication device B;
step S5, the first Bluetooth encryption device B decrypts the encrypted data by using the key and sends the decrypted data to the second Bluetooth communication device B bound with the first Bluetooth encryption device B;
step S6, the second bluetooth communication device B displays the decrypted data.
Optionally, the first bluetooth encryption device generates a set of asymmetric keys before shipment, and generates a symmetric key according to the asymmetric keys when data interaction is performed between the two second bluetooth communication devices for the first time, and encrypts or decrypts the data using the symmetric key.
Optionally, the symmetric key is stored in the two first bluetooth encryption devices, and when the two first bluetooth encryption devices are connected again, the symmetric key is directly used for processing data.
Optionally, the method for encrypting data by using a symmetric key includes the following steps:
the second Bluetooth communication device A sends data to a first Bluetooth encryption device A which is in binding connection with the second Bluetooth communication device A, the first Bluetooth encryption device A generates a process key according to communication time and a distributed symmetric key of receiving device information, the process key encrypts the data and generates a check value, and the first Bluetooth encryption device A sends the encrypted data and the check value to a second Bluetooth communication device B.
Optionally, the method for decrypting data by using a symmetric key includes the following steps:
the first Bluetooth encryption equipment B generates a process key according to the communication time and the receiving equipment information dispersed symmetric key;
the process key decrypts the encrypted data and generates a check value;
and the first Bluetooth encryption device B compares the decrypted check value with the check value generated by the first Bluetooth encryption device A, if the check values are consistent, the decryption is successful, the decrypted data is sent to the second Bluetooth communication device B bound with the first Bluetooth encryption device B, and the decrypted data is displayed on the second Bluetooth communication device B.
Optionally, after the first bluetooth encryption device is disconnected from the second bluetooth communication device, the data displayed on the second bluetooth communication device disappears.
The bluetooth encryption communication method of the present invention has similar technical effects to those of the bluetooth encryption communication system, and will not be described herein.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic structural diagram of a bluetooth encryption communication system of the present invention;
fig. 2 is a flowchart of a bluetooth encryption communication method of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Fig. 1 is a schematic structural diagram of a bluetooth encryption communication system according to the present invention, and as shown in fig. 1, the bluetooth encryption communication system according to the present invention includes a plurality of first bluetooth encryption devices and a plurality of second bluetooth communication devices, communication software on each of the first bluetooth encryption devices and the second bluetooth communication devices has a unique identification number, each of the second bluetooth communication devices is bound to one of the first bluetooth encryption devices, and the first bluetooth encryption device encrypts or decrypts data transmitted by the second bluetooth communication device.
The Bluetooth encryption communication system solves the problem of communication safety by connecting the first Bluetooth encryption device with the second Bluetooth communication device. If the first Bluetooth encryption device and the second Bluetooth communication device are disconnected, the displayed data disappear, and meanwhile, the data in the first Bluetooth encryption device can be destroyed, so that leakage of transmission information is avoided, and the communication safety degree is improved.
Preferably, the bluetooth encryption communication system further includes a second bluetooth communication device server and a first bluetooth encryption device server, after the second bluetooth communication device sends the data to the second bluetooth communication device server, the second bluetooth communication device server sends the data to the first bluetooth encryption device server, and the first bluetooth encryption device server specifies the received identification number of the communication software on the second bluetooth communication device. The manufacturer server appoints the received identification number of the communication software on the second Bluetooth communication equipment, so that the uniqueness of the communication software on the second Bluetooth communication equipment is ensured in the communication process, and the communication safety degree is further improved.
It should be noted that the first bluetooth encryption device may be a bluetooth Key, a bluetooth standard card, a bluetooth special-shaped card, etc., the second bluetooth communication device may be a different second bluetooth communication device, but the identification number of the communication software is unique, and the user may log in the same communication software on different second bluetooth communication devices to implement encryption communication, that is, the first bluetooth encryption device encrypts or decrypts the data sent by the second bluetooth communication device by using a symmetric Key or an asymmetric Key.
The second bluetooth communication device can be a mobile terminal, the communication software for communicating on the mobile terminal can be WeChat or other communication software with a unique identification number, the second bluetooth communication device server can be a WeChat server, and a user can log in the same WeChat on different mobile terminals to realize encrypted communication. Optionally, the plurality of second bluetooth communication devices perform data transmission in a transparent internet transmission manner, and follow a communication protocol during internet transmission.
It should be explained that, when the first bluetooth encryption device and the second bluetooth communication device are bound and connected, the first bluetooth encryption device needs to use the algorithm encryption characteristic value and send the algorithm encryption characteristic value to the first bluetooth encryption device server for authentication, and then the first bluetooth encryption device confirms the algorithm encryption characteristic value. The characteristic value of the first Bluetooth encryption device is one or a combination of an identification number, a Mac address or a device type of the first Bluetooth encryption device. The encryption algorithm used by the first bluetooth encryption device is one or a combination of a hash algorithm, a symmetric encryption algorithm, or an asymmetric encryption algorithm. The confirmation mode of the first Bluetooth encryption equipment is one or a combination of a key, a touch area, a vibration motor or a screen display. And after receiving the authentication request, the first Bluetooth encryption equipment server confirms whether the first Bluetooth encryption equipment exists in the equipment list and verifies the data. If the first Bluetooth encryption equipment exists, the verification is successful, and after the first Bluetooth encryption equipment is confirmed, the binding connection is successful; if the first Bluetooth encryption equipment does not exist, the verification fails, and the binding connection fails.
Example two
The present invention provides a bluetooth encryption communication method, which is suitable for a bluetooth encryption communication system as described in the first embodiment, wherein two second bluetooth communication devices for performing data interaction are a second bluetooth communication device a and a second bluetooth communication device B, the first bluetooth encryption device a is bound to the second bluetooth communication device a, and the first bluetooth encryption device B is bound to the second bluetooth communication device B, fig. 2 is a flowchart of the bluetooth encryption communication method of the present invention, and as shown in fig. 2, the method includes the following steps:
step S1, binding and connecting the second Bluetooth communication device A with the first Bluetooth encryption device A;
step S2, the second Bluetooth communication device A sends the data to the first Bluetooth encryption device A; the first Bluetooth encryption device A encrypts data by using a secret key and sends the encrypted data to the second Bluetooth communication device A;
optionally, the communication software on the second bluetooth communication device a sends the data to the first bluetooth encryption device a; the first bluetooth encryption device a encrypts data using the key and transmits the encrypted data to the second bluetooth communication device a, i.e., the communication software on the second bluetooth communication device a.
Step S3, the second Bluetooth communication device A sends the encrypted data to the second Bluetooth communication device B;
the communication software on the second Bluetooth communication equipment A sends the encrypted data to a second Bluetooth communication equipment server; the second Bluetooth communication equipment server transparently transmits the encrypted data to the first Bluetooth encryption equipment server; the first Bluetooth encryption device server transparently transmits the encrypted data to the second Bluetooth communication device server and specifies the received identification number of the communication software on the second Bluetooth communication device, and the second Bluetooth communication device server transmits the encrypted data to the second Bluetooth communication device B, namely the communication software on the second Bluetooth communication device B.
Step S4, the second Bluetooth communication device B sends the encrypted data to the first Bluetooth encryption device B bound with the second Bluetooth communication device B;
step S5, the first Bluetooth encryption device B decrypts the encrypted data by using the key and sends the decrypted data to the second Bluetooth communication device B bound with the first Bluetooth encryption device B;
optionally, the decrypted data is sent to the communication software on the second bluetooth communication device B bound with the decrypted data;
step S6, the second bluetooth communication device B displays the decrypted data.
Specifically, the decrypted data is displayed on the communication software on the second bluetooth communication device B.
The first Bluetooth encryption device A and the first Bluetooth encryption device B can encrypt or decrypt data by using a symmetric key or an asymmetric key, and the first Bluetooth encryption device A and the first Bluetooth encryption device B are matched with each other to encrypt and decrypt data. In particular, in order to combine the advantages of the symmetric key and the asymmetric key and avoid the respective disadvantages thereof, the following encryption and decryption methods can be particularly adopted in the present application:
the first Bluetooth encryption equipment generates a group of asymmetric keys before leaving a factory, and generates a symmetric key according to the asymmetric keys when data interaction is performed for the first time between the two second Bluetooth communication equipment, and the symmetric key is used for encrypting or decrypting the data.
The method for generating the symmetric key comprises the following steps: the first Bluetooth encryption device A and the first Bluetooth encryption device B generate a group of asymmetric keys before leaving a factory, when data interaction is carried out for the first time between the two second Bluetooth communication devices, private keys of the respective asymmetric keys are respectively reserved in the first Bluetooth encryption device, public keys of the asymmetric keys are sent to the first Bluetooth encryption device bound with the other second Bluetooth communication device, and the two first Bluetooth encryption devices respectively generate random numbers according to mutual public key information and device information and generate symmetric keys in a combined mode.
Preferably, the symmetric key is stored in the two first bluetooth encryption devices, and when the two first bluetooth encryption devices are connected again, the symmetric key is directly used for processing data.
It is worth mentioning that the method for encrypting data by using a symmetric key comprises the following steps:
the second Bluetooth communication device A sends data to a first Bluetooth encryption device A which is in binding connection with the second Bluetooth communication device A, the first Bluetooth encryption device A generates a process key according to communication time and a distributed symmetric key of receiving device information, the process key encrypts the data and generates a check value, and the first Bluetooth encryption device A sends the encrypted data and the check value to a second Bluetooth communication device B.
And the first Bluetooth encryption equipment A sends the encrypted data and the verification value to the second Bluetooth communication equipment B through the second Bluetooth communication equipment server and the first Bluetooth encryption equipment server.
Preferably, the method of decrypting data using a symmetric key comprises the steps of:
the first Bluetooth encryption equipment B generates a process key according to the communication time and the receiving equipment information dispersed symmetric key;
the process key decrypts the encrypted data and generates a check value;
and the first Bluetooth encryption device B compares the decrypted check value with the check value generated by the first Bluetooth encryption device A, if the check values are consistent, the decryption is successful, the decrypted data is sent to the second Bluetooth communication device B bound with the first Bluetooth encryption device B, and the decrypted data is displayed on the second Bluetooth communication device B.
If the data is inconsistent with the data, the decryption is failed, the decrypted data is sent to the second Bluetooth communication equipment B bound and connected with the second Bluetooth communication equipment B, and the data displayed on the second Bluetooth communication equipment B is a section of meaningless data.
It should be noted that the meaningless data mentioned in the description may be a meaningless data, a messy code or any pattern, or may be other abnormal data.
Optionally, after the first bluetooth encryption device is disconnected from the second bluetooth communication device, the data displayed on the second bluetooth communication device disappears.
It should be noted that the first bluetooth encryption device may be a bluetooth Key, a bluetooth standard card, a bluetooth special-shaped card, etc., the second bluetooth communication device may be a different second bluetooth communication device, but the identification number of the communication software is unique, and the user may log in the same communication software on different second bluetooth communication devices to implement encryption communication, that is, the first bluetooth encryption device encrypts or decrypts the data sent by the second bluetooth communication device by using a symmetric Key or an asymmetric Key.
The second bluetooth communication device can be a mobile terminal, the communication software for communicating on the mobile terminal can be WeChat or other communication software with a unique identification number, the second bluetooth communication device server can be a WeChat server, and a user can log in the same WeChat on different mobile terminals to realize encrypted communication.
Preferably, the user can store or destroy the data information according to the self requirement, and the communication safety degree is further improved. The treatment method comprises the following three methods: first, the communication information in the chat process is not saved. In the chat process of the two parties, the information can be displayed, the first Bluetooth encryption device and the second Bluetooth communication device cannot store the information communicated by the two parties, and when the communication process is finished, the communication content is destroyed. Second, burn after reading. After the communication information of the other party arrives, the communication information is burnt after being read, and the communication data content is directly cleared, so that the communication information is ensured not to be viewed by a third party. And thirdly, the communication information is stored in the first Bluetooth encryption device, so that the safety of the communication information is ensured, and the communication information can be selectively stored according to the requirements of users.
For example, in the case of using communication software as the wechat, in order to better protect the privacy of the second bluetooth communication device, the wechat may be set such that only users who pay attention to public numbers can obtain the buddy list. In the public number, an independent friend relationship exists, and a communication function can be initiated only after a friend is added.
The bluetooth encryption communication method of the present invention has similar technical effects to those of the bluetooth encryption communication system, and will not be described herein.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (7)

1. A Bluetooth encryption communication system is characterized by comprising a plurality of first Bluetooth encryption devices and a plurality of second Bluetooth communication devices, wherein communication software on the first Bluetooth encryption devices and the second Bluetooth communication devices respectively has a unique identification number, each second Bluetooth communication device is bound and connected with one first Bluetooth encryption device, and the first Bluetooth encryption device encrypts or decrypts data sent by the second Bluetooth communication devices;
the Bluetooth encryption communication system also comprises a second Bluetooth communication equipment server and a first Bluetooth encryption equipment server, after the second Bluetooth communication equipment sends encrypted data to the second Bluetooth communication equipment server, the second Bluetooth communication equipment server sends the encrypted data to the first Bluetooth encryption equipment server, the first Bluetooth encryption equipment server sends the encrypted data to the second Bluetooth communication equipment server and specifies the received identification number of communication software on the second Bluetooth communication equipment, and the second Bluetooth communication equipment server sends the encrypted data to the communication software of the first Bluetooth communication equipment; the first Bluetooth communication equipment server and the second Bluetooth communication equipment server perform data transmission in an internet transparent transmission mode;
the same communication software is logged in different second Bluetooth communication devices, and encrypted communication can be realized;
the first Bluetooth encryption equipment B generates a process key according to the communication time and the receiving equipment information dispersed symmetric key; the process key decrypts the encrypted data and generates a check value; the first Bluetooth encryption device B compares the decrypted check value with the check value generated by the first Bluetooth encryption device A, if the check values are consistent, the decryption is successful, the decrypted data is sent to a second Bluetooth communication device B bound with the first Bluetooth encryption device B, and the decrypted data is displayed on the second Bluetooth communication device B; if the data is inconsistent with the data, the decryption is failed, the decrypted data is sent to a second Bluetooth communication device B bound and connected with the second Bluetooth communication device B, and the data displayed on the second Bluetooth communication device B is a section of meaningless data;
after the first Bluetooth encryption device is disconnected from the second Bluetooth communication device, the data displayed on the second Bluetooth communication device disappears.
2. The bluetooth encryption communication system according to claim 1, wherein data transmission is performed between the plurality of second bluetooth communication devices by way of internet transparent transmission.
3. The bluetooth encryption communication system according to claim 1, wherein the first bluetooth encryption device encrypts or decrypts data transmitted by the second bluetooth communication device using a symmetric key or an asymmetric key.
4. A bluetooth encryption communication method, characterized in that the method comprises the steps of:
step S1, binding and connecting the second Bluetooth communication device A with the first Bluetooth encryption device A;
step S2, the second Bluetooth communication device A sends the data to the first Bluetooth encryption device A; the first Bluetooth encryption device A encrypts data by using a secret key and sends the encrypted data to the second Bluetooth communication device A;
step S3, the second Bluetooth communication device A sends the encrypted data to the first Bluetooth communication device B;
the communication software on the second Bluetooth communication equipment A sends the encrypted data to a second Bluetooth communication equipment server; the second Bluetooth communication equipment server transparently transmits the encrypted data to the first Bluetooth encryption equipment server; the first Bluetooth encryption equipment server transparently transmits the encrypted data to a second Bluetooth communication equipment server and specifies the received identification number of communication software on the second Bluetooth communication equipment, and the second Bluetooth communication equipment server transmits the encrypted data to first Bluetooth communication equipment B, namely the communication software on the first Bluetooth communication equipment B;
step S4, the second Bluetooth communication device B sends the encrypted data to the first Bluetooth encryption device B bound with the second Bluetooth communication device B;
step S5, the first Bluetooth encryption device B decrypts the encrypted data by using the key and sends the decrypted data to the second Bluetooth communication device B bound with the first Bluetooth encryption device B;
step S6, the second Bluetooth communication device B displays the decrypted data;
the same communication software is logged in different second Bluetooth communication devices, and encrypted communication can be realized;
the method for decrypting the data by using the symmetric key comprises the following steps of:
the first Bluetooth encryption equipment B generates a process key according to the communication time and the receiving equipment information dispersed symmetric key;
the process key decrypts the encrypted data and generates a check value;
the first Bluetooth encryption device B compares the decrypted check value with the check value generated by the first Bluetooth encryption device A, if the check values are consistent, the decryption is successful, the decrypted data is sent to a second Bluetooth communication device B bound with the first Bluetooth encryption device B, and the decrypted data is displayed on the second Bluetooth communication device B; if the data is inconsistent with the data, the decryption is failed, the decrypted data is sent to a second Bluetooth communication device B bound and connected with the second Bluetooth communication device B, and the data displayed on the second Bluetooth communication device B is a section of meaningless data;
after the first Bluetooth encryption device is disconnected from the second Bluetooth communication device, the data displayed on the second Bluetooth communication device disappears.
5. The bluetooth encryption communication method according to claim 4, wherein the first bluetooth encryption device generates a set of asymmetric keys before shipment, and generates a symmetric key based on the asymmetric keys when data exchange is performed for the first time between two second bluetooth communication devices, and encrypts or decrypts data using the symmetric key.
6. The bluetooth encryption communication method according to claim 5, wherein the symmetric key is stored in the two first bluetooth encryption devices, and when reconnecting, data is processed directly using the symmetric key.
7. The bluetooth encryption communication method according to claim 6, wherein the method for encrypting data using a symmetric key comprises the steps of:
the second Bluetooth communication device A sends data to a first Bluetooth encryption device A which is in binding connection with the second Bluetooth communication device A, the first Bluetooth encryption device A generates a process key according to communication time and a distributed symmetric key of receiving device information, the process key encrypts the data and generates a check value, and the first Bluetooth encryption device A sends the encrypted data and the check value to a second Bluetooth communication device B.
CN201710290105.9A 2017-04-28 2017-04-28 Bluetooth encryption communication system and communication method Active CN107426670B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710290105.9A CN107426670B (en) 2017-04-28 2017-04-28 Bluetooth encryption communication system and communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710290105.9A CN107426670B (en) 2017-04-28 2017-04-28 Bluetooth encryption communication system and communication method

Publications (2)

Publication Number Publication Date
CN107426670A CN107426670A (en) 2017-12-01
CN107426670B true CN107426670B (en) 2020-01-03

Family

ID=60424301

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710290105.9A Active CN107426670B (en) 2017-04-28 2017-04-28 Bluetooth encryption communication system and communication method

Country Status (1)

Country Link
CN (1) CN107426670B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113347597B (en) * 2021-05-27 2022-07-15 江铃汽车股份有限公司 Communication encryption method and system of Bluetooth key

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1538303A (en) * 2003-04-15 2004-10-20 联想(北京)有限公司 Communication safety control method of distribution type software system
CN101141250A (en) * 2007-10-10 2008-03-12 北京握奇数据***有限公司 Instrument equipment, data safety access method, device and system
CN105101184A (en) * 2014-05-23 2015-11-25 深圳市兴联达科技有限公司 Mobile terminal communication method and system based on bluetooth encryption

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7224805B2 (en) * 2001-07-06 2007-05-29 Nokia Corporation Consumption of content
US20140101776A1 (en) * 2012-10-10 2014-04-10 Red.Com, Inc. Digital Asset Distribution Media

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1538303A (en) * 2003-04-15 2004-10-20 联想(北京)有限公司 Communication safety control method of distribution type software system
CN101141250A (en) * 2007-10-10 2008-03-12 北京握奇数据***有限公司 Instrument equipment, data safety access method, device and system
CN105101184A (en) * 2014-05-23 2015-11-25 深圳市兴联达科技有限公司 Mobile terminal communication method and system based on bluetooth encryption

Also Published As

Publication number Publication date
CN107426670A (en) 2017-12-01

Similar Documents

Publication Publication Date Title
US10693848B2 (en) Installation of a terminal in a secure system
US11930111B2 (en) System and method for generating and depositing keys for multi-point authentication
EP3205048B1 (en) Generating a symmetric encryption key
CN110519046B (en) Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD
CN109150897B (en) End-to-end communication encryption method and device
CN102394749B (en) Line protection method, system, information safety equipment and application equipment for data transmission
CN103237305B (en) Password protection method for smart card on facing moving terminal
CN103763631A (en) Authentication method, server and television
US11652629B2 (en) Generating keys using controlled corruption in computer networks
US10733309B2 (en) Security through authentication tokens
TW201626776A (en) Improved system for establishing a secure communication channel
WO2016056988A1 (en) Mutual authentication
CN105141629A (en) Method for improving network security of public Wi-Fi based on WPA/WPA2 PSK multiple passwords
CN110519222B (en) External network access identity authentication method and system based on disposable asymmetric key pair and key fob
CN113365264A (en) Block chain wireless network data transmission method, device and system
JP2001144745A (en) Electronic authentication system
CN107426670B (en) Bluetooth encryption communication system and communication method
US9876774B2 (en) Communication security system and method
JP2001344214A (en) Method for certifying terminal and cipher communication system
CN113472731A (en) Two-factor authentication method for database user identity verification
CA3178613A1 (en) Generating keys using controlled corruption in computer networks
CN114978564A (en) Data transmission method and device based on multiple encryption
WO2016161717A1 (en) Data processing method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant