CN109168162A - Bluetooth communication encryption method, device and intelligent security guard equipment - Google Patents
Bluetooth communication encryption method, device and intelligent security guard equipment Download PDFInfo
- Publication number
- CN109168162A CN109168162A CN201811385947.3A CN201811385947A CN109168162A CN 109168162 A CN109168162 A CN 109168162A CN 201811385947 A CN201811385947 A CN 201811385947A CN 109168162 A CN109168162 A CN 109168162A
- Authority
- CN
- China
- Prior art keywords
- key
- ciphertext
- user terminal
- bluetooth communication
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of Bluetooth communication encryption method, device and intelligent security guard equipment, the Bluetooth communication decryption method includes: to generate the time in preset key, use random number generator to generate random code to broadcast as initial key, and by initial key to user terminal;It is encrypted using current key to sent ciphertext in user terminal, encrypted ciphertext is then sent by Blue-tooth communication method;Receive the ciphertext sent by user terminal and the actual key encrypted to ciphertext;Judge whether actual key is consistent with initial key;When actual key is consistent with initial key, the ciphertext is decrypted using initial key, obtains plaintext corresponding with the ciphertext.Bluetooth communication encryption method of the invention, generate new key at preset time intervals by decryption end equipment, make key that will fail after the regular hour, so that the ciphertext and key that prevent user terminal from sending utilize again after maliciously being intercepted, improves the safety of Bluetooth communication.
Description
Technical field
The present invention relates to technical field of bluetooth communication, in particular to a kind of Bluetooth communication encryption method, device, intelligence
It can security device and computer storage medium.
Background technique
With the continuous development of the communication technology and smart machine, the communication mode between smart machine is also increasing,
Under different scenes, different smart machines will use the optimal communication mode of communication efficiency.Low coverage is carried out in smart machine
When from communication, Bluetooth communication can be generally used, to guarantee the efficiency of communication.
Bluetooth communication between existing smart machine all can first carry out encryption of plaintext when transmitting various plaintexts, then
By encrypted ciphertext and the cipher key delivery used is encrypted to receiving end by bluetooth.For example, when transmitting instruction, transmitting terminal
Encrypted instruction and key can be sent to receiving end, during transmission, once instruction and the key quilt of encryption
It intercepts and captures, when the instruction of encryption and key are sent to receiving end again by intercepting and capturing side, which, which can be decrypted correctly out, is instructed simultaneously
It executes.Therefore, its safety of the mode of existing Bluetooth communication encryption is very low.
Summary of the invention
In view of the above problems, the present invention provides a kind of Bluetooth communication encryption method, device, intelligent security guard equipment and calculating
Machine storage medium, to improve the safety of Bluetooth communication.
To achieve the goals above, the present invention adopts the following technical scheme that:
A kind of Bluetooth communication encryption method, comprising:
The time is generated in preset key, random number generator is used to generate random code as initial key, and will be described
Initial key is broadcasted to user terminal;
It is encrypted using current key to sent ciphertext in user terminal, is then sent by Blue-tooth communication method
Encrypted ciphertext;
Receive the ciphertext sent by user terminal and the actual key encrypted to the ciphertext;
Judge whether the actual key is consistent with the initial key;
When the actual key is consistent with the initial key, the ciphertext is solved using the initial key
It is close, obtain plaintext corresponding with the ciphertext.
In above-mentioned Bluetooth communication encryption method, the algorithm that the ciphertext is encrypted and decrypted includes that AES is calculated
Method.
Preferably, the Bluetooth communication encryption method, further includes:
After the ciphertext is decrypted using the actual key, random code is generated using random number generator immediately
To update the initial key, and the initial key of update is broadcasted to user terminal.
Preferably, the Bluetooth communication encryption method, further includes:
The random key that the user terminal is generated and broadcasted using random number generator is received, the random key is utilized
The plaintext being sent to the user terminal to needs encrypts, and generates ciphertext to be transmitted;
The ciphertext to be transmitted and the random key are sent to the user terminal.
The present invention also provides a kind of Bluetooth communication encryption devices, comprising:
Key production module, for preset key generate the time, use random number generator generate random code as
Initial key, and the initial key is broadcasted to user terminal;
Then ciphertext encrypting module is led to for being encrypted using current key to sent ciphertext in user terminal
It crosses Blue-tooth communication method and sends encrypted ciphertext;
Ciphertext receiving module, for receiving the ciphertext sent by user terminal and the reality encrypted to the ciphertext
Key;
Key judgment module, for judging whether the actual key is consistent with the initial key;
Ciphertext deciphering module, for utilizing the initial key when the actual key is consistent with the initial key
The ciphertext is decrypted, plaintext corresponding with the ciphertext is obtained.
In above-mentioned Bluetooth communication encryption device, the algorithm that the ciphertext is encrypted and decrypted includes aes algorithm.
Preferably, the Bluetooth communication encryption device, further includes:
Key updating module, for utilizing immediately random after the ciphertext is decrypted using the actual key
Code generator generates random code to update the initial key, and the initial key of update is broadcasted to user terminal.
Preferably, the Bluetooth communication encryption device, further includes:
Ciphertext encrypting module, for receiving that the user terminal generates and broadcasted using random number generator with secret
Key is encrypted using the plaintext that the random key is sent to the user terminal needs, generates ciphertext to be transmitted;
Ciphertext sending module, for the ciphertext to be transmitted and the random key to be sent to the user terminal.
The present invention also provides a kind of intelligent security guard equipment, including memory and processor, the memory is for storing
Computer program, the processor runs the computer program so that the intelligent security guard equipment executes the Bluetooth communication
Encryption method.
The present invention also provides a kind of computer storage medium, it is stored with meter used in the intelligent security guard equipment
Calculation machine program.
The present invention provides a kind of Bluetooth communication encryption method, which includes: raw in preset key
At the time, uses random number generator to generate random code and broadcast as initial key, and by the initial key to user terminal;
It is encrypted, is then sent by Blue-tooth communication method encrypted to sent ciphertext using current key in user terminal
Ciphertext;Receive the ciphertext sent by user terminal and the actual key encrypted to the ciphertext;Judge that the reality is close
Whether key is consistent with the initial key;When the actual key is consistent with the initial key, the initial key is utilized
The ciphertext is decrypted, plaintext corresponding with the ciphertext is obtained.Bluetooth communication encryption method of the invention, by decrypting end
Equipment generates new key at preset time intervals, makes key that will fail after the regular hour, to prevent user whole
It is utilized again after holding the ciphertext sent and key maliciously to be intercepted, improves the safety of Bluetooth communication.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of the scope of the invention.
Fig. 1 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 1 provides;
Fig. 2 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 2 provides;
Fig. 3 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 3 provides;
Fig. 4 is a kind of structural schematic diagram for Bluetooth communication encryption device that the embodiment of the present invention 4 provides;
Fig. 5 is the structural schematic diagram for another Bluetooth communication encryption device that the embodiment of the present invention 4 provides;
Fig. 6 is the structural schematic diagram for the third Bluetooth communication encryption device that the embodiment of the present invention 4 provides.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
Embodiment 1
Fig. 1 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 1 provides, and this method includes following step
It is rapid:
Step S11: generating the time in preset key, and random number generator is used to generate random code as initial key,
And initial key is broadcasted to user terminal.
In the embodiment of the present invention, it is provided with random number generator in the decryption end equipment for needing to carry out Bluetooth communication, and
The random number generator is opened in preset time interval and generates random code, using the random code of generation as initial key.
Wherein, the decryption end equipment, such as can be the intelligent security guards equipment such as access control equipment or intelligent door lock, it is connected using Bluetooth communication
User terminal receives user terminal and utilizes the operational order of key encryption, and carries out the decryption of the encrypted instruction and run this referring to
It enables.
In the embodiment of the present invention, which can generate program for a random code, which is stored in solution
It in the memory of close end equipment, activates according to the preset time interval, and activates one random code of generation every time, and should
The key that random code is encrypted and decrypted as Bluetooth communication.Wherein, which passes through bluetooth after generating initial key
It broadcasts to the user terminal for needing to carry out Bluetooth communication.The prefixed time interval, such as can be for every generation one in one minute
New random code or five minutes etc., here without limitation, can be set by staff.
Step S12: it is encrypted using current key to sent ciphertext in user terminal, then passes through Bluetooth communication
Mode sends encrypted ciphertext.
Step S13: the ciphertext sent by user terminal and the actual key encrypted to ciphertext are received.
In the embodiment of the present invention, which receives the ciphertext for needing to carry out the user terminal of Bluetooth communication, and
User terminal carries out the actual key that encryption uses.Wherein, it is the solution which, which carries out the actual key that encryption uses,
The key that close terminal generates, which should can automatically update after the preset period with random code, therefore the key meeting
It fails because of overlong time.
Step S14: judge whether actual key is consistent with initial key.
In the embodiment of the present invention, the decryption end equipment is in the ciphertext and corresponding actual key for receiving user terminal transmission
Afterwards, it can use the corresponding actual key to be compared with initial key in decryption terminal, judge whether two keys are consistent,
Namely judge whether the actual key that user terminal uses is no longer valid.Wherein, which can use algorithm or application
Program is realized, such as can be provided with comparison algorithm in decryption end equipment, in the actual key for receiving user terminal and sending
Afterwards, it carries out algorithm using the key of initial key and the user terminal to compare, character is compared one by one, judges all of key
Whether character is consistent.
Step S15: when actual key is consistent with initial key, being decrypted ciphertext using initial key, obtain with
The corresponding plaintext of ciphertext.
In the embodiment of the present invention, when decrypting end determines that initial key is consistent with the actual key that user terminal is sent,
That is it when the actual key of user terminal transmission is also effective, is then decrypted using the ciphertext that initial key sends user terminal,
Obtain corresponding plaintext in ciphertext.Wherein, this can be sent to the operational order etc. of decrypting end in plain text for user terminal, here not
It limits, which carries out plaintext processing accordingly after obtaining plaintext.
In the embodiment of the present invention, which includes aes algorithm (AES, Advanced
Encryption Standard, Advanced Encryption Standard).
Embodiment 2
Fig. 2 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 2 provides, and this method includes following step
It is rapid:
Step S21: generating the time in preset key, and random number generator is used to generate random code as initial key,
And initial key is broadcasted to user terminal.
This step is consistent with above-mentioned steps S11, and details are not described herein.
Step S22: it is encrypted using current key to sent ciphertext in user terminal, then passes through Bluetooth communication
Mode sends encrypted ciphertext.
This step is consistent with above-mentioned steps S12, and details are not described herein.
Step S23: the ciphertext sent by user terminal and the actual key encrypted to ciphertext are received.
This step is consistent with above-mentioned steps S13, and details are not described herein.
Step S24: judge whether actual key is consistent with initial key.
This step is consistent with above-mentioned steps S14, and details are not described herein.
Step S25: when actual key is consistent with initial key, being decrypted ciphertext using initial key, obtain with
The corresponding plaintext of ciphertext.
This step is consistent with above-mentioned steps S15, and details are not described herein.
Step S26: after ciphertext is decrypted using actual key, random code is generated using random number generator immediately
To update initial key, and the initial key of update is broadcasted to user terminal.
In the embodiment of the present invention, the decryption end equipment after being decrypted using ciphertext of the initial key to user terminal,
It can use random number generator to be immediately generated new random code as new initial key and broadcasted, without waiting for down
New initial key is being generated when one time interval.Wherein, which can not also be according to prefixed time interval
Mode carries out the generation of random code and the update of initial key, can generate new random code progress after the decryption of each ciphertext
The update of initial key, to save the calculation resources of decryption end equipment.
Embodiment 3
Fig. 3 is a kind of flow chart for Bluetooth communication encryption method that the embodiment of the present invention 3 provides, and this method includes following step
It is rapid:
Step S31: generating the time in preset key, and random number generator is used to generate random code as initial key,
And initial key is broadcasted to user terminal.
This step is consistent with above-mentioned steps S11, and details are not described herein.
Step S32: it is encrypted using current key to sent ciphertext in user terminal, then passes through Bluetooth communication
Mode sends encrypted ciphertext.
This step is consistent with above-mentioned steps S12, and details are not described herein.
Step S33: the ciphertext sent by user terminal and the actual key encrypted to ciphertext are received.
This step is consistent with above-mentioned steps S13, and details are not described herein.
Step S34: judge whether actual key is consistent with initial key.
This step is consistent with above-mentioned steps S14, and details are not described herein.
Step S35: when actual key is consistent with initial key, being decrypted ciphertext using initial key, obtain with
The corresponding plaintext of ciphertext.
This step is consistent with above-mentioned steps S15, and details are not described herein.
Step S36: the random key that user terminal is generated and broadcasted using random number generator is received, random key is utilized
The plaintext being sent to the user terminal to needs encrypts, and generates ciphertext to be transmitted.
In the embodiment of the present invention, need when transmitting information to decrypting end using Bluetooth communication in addition to user terminal using key
It is encrypted, key also can be used when decrypting end transmits information to user terminal and encrypted.Wherein, the decryption end equipment
Can also receive user terminal broadcast random key, the random key by user terminal random number generator at preset timed intervals
Interval updates, then is broadcasted by the Bluetooth communication of user terminal.Decryption terminal is after the random key for receiving user terminal, benefit
The plaintext for needing to be sent to the user terminal with random key encryption, generates ciphertext to be transmitted, and be sent to using Bluetooth communication
User terminal.
Step S37: ciphertext to be transmitted and random key are sent to the user terminal.
In the embodiment of the present invention, the decrypting end while sending ciphertext, extremely use by the also corresponding key of transmission encrypted cipher text
Family terminal, so that whether user terminal is effective using the key of current random key verifying decrypting end.
Embodiment 4
Fig. 4 is a kind of structural schematic diagram for Bluetooth communication encryption device that the embodiment of the present invention 4 provides.
The Bluetooth communication encryption device 400 includes:
Key production module 410 generates random code using random number generator and makees for generating the time in preset key
For initial key, and the initial key is broadcasted to user terminal.
Ciphertext encrypting module 420, for being encrypted using current key to sent ciphertext in user terminal, then
Encrypted ciphertext is sent by Blue-tooth communication method.
Ciphertext receiving module 430, for receiving the ciphertext sent by user terminal and being encrypted to the ciphertext
Actual key.
Key judgment module 440, for judging whether the actual key is consistent with the initial key.
Ciphertext deciphering module 450, for when the actual key is consistent with the initial key, using described initially close
The ciphertext is decrypted in key, obtains plaintext corresponding with the ciphertext.
In the embodiment of the present invention, the algorithm that the ciphertext is encrypted and decrypted includes aes algorithm.
As shown in figure 5, the Bluetooth communication encryption device 400 further include:
Key updating module 460, for after the ciphertext is decrypted using the actual key, utilize immediately with
Machine code generator generates random code to update the initial key, and the initial key of update is broadcasted to user terminal.
As shown in fig. 6, the Bluetooth communication encryption device 400 further include:
Ciphertext encrypting module 470, for receive the user terminal generate and broadcast using random number generator it is random
Key is encrypted using the plaintext that the random key is sent to the user terminal needs, generates ciphertext to be transmitted.
Ciphertext sending module 480, it is whole for the ciphertext to be transmitted and the random key to be sent to the user
End.
In addition, the present invention also provides a kind of intelligent security guard equipment, which includes memory and processor,
Memory can be used for storing computer program, and processor is by running the computer program, so that intelligent security guard equipment be made to hold
The function of the row above method or the modules in above-mentioned Bluetooth communication encryption device.
Memory may include storing program area and storage data area, wherein storing program area can storage program area, at least
Application program needed for one function (such as sound-playing function, image player function etc.) etc.;Storage data area can store root
Created data (such as audio data, phone directory etc.) etc. are used according to intelligent security guard equipment.In addition, memory may include
High-speed random access memory can also include nonvolatile memory, for example, at least disk memory, a flash memories
Part or other volatile solid-state parts.
The present embodiment additionally provides a kind of computer storage medium, by storing based on used in above-mentioned intelligent security guard equipment
Calculation machine program.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and structure in attached drawing
Figure shows the system frame in the cards of the device of multiple embodiments according to the present invention, method and computer program product
Structure, function and operation.In this regard, each box in flowchart or block diagram can represent a module, section or code
A part, a part of the module, section or code includes one or more for implementing the specified logical function
Executable instruction.It should also be noted that function marked in the box can also be to be different from the implementation as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that in structure chart and/or flow chart
The combination of each box and the box in structure chart and/or flow chart, can function or movement as defined in executing it is dedicated
Hardware based system realize, or can realize using a combination of dedicated hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention can integrate one independence of formation together
Part, be also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be intelligence
Can mobile phone, personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or
Part steps.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory),
Random access memory (RAM, Random Access Memory), magnetic or disk etc. be various to can store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. a kind of Bluetooth communication encryption method characterized by comprising
The time is generated in preset key, random number generator is used to generate random code as initial key, and will be described initial
Cipher key broadcasting is to user terminal;
It is encrypted using current key to sent ciphertext in user terminal, is then sent and encrypted by Blue-tooth communication method
Ciphertext afterwards;
Receive the ciphertext sent by user terminal and the actual key encrypted to the ciphertext;
Judge whether the actual key is consistent with the initial key;
When the actual key is consistent with the initial key, the ciphertext is decrypted using the initial key, is obtained
Obtain plaintext corresponding with the ciphertext.
2. Bluetooth communication encryption method according to claim 1, which is characterized in that the ciphertext is encrypted and solved
Close algorithm includes aes algorithm.
3. Bluetooth communication encryption method according to claim 1, which is characterized in that further include:
After the ciphertext is decrypted using the actual key, random code is generated come more using random number generator immediately
The new initial key, and the initial key of update is broadcasted to user terminal.
4. Bluetooth communication encryption method according to claim 1, which is characterized in that further include:
The random key that the user terminal is generated and broadcasted using random number generator is received, using the random key to need
The plaintext to be sent to the user terminal is encrypted, and ciphertext to be transmitted is generated;
The ciphertext to be transmitted and the random key are sent to the user terminal.
5. a kind of Bluetooth communication encryption device characterized by comprising
Key production module uses random number generator to generate random code as initially for generating the time in preset key
Key, and the initial key is broadcasted to user terminal;
Then ciphertext encrypting module passes through indigo plant for being encrypted using current key to sent ciphertext in user terminal
Tooth communication mode sends encrypted ciphertext;
Ciphertext receiving module, it is close for receiving the ciphertext sent by user terminal and the reality encrypted to the ciphertext
Key;
Key judgment module, for judging whether the actual key is consistent with the initial key;
Ciphertext deciphering module is used for when the actual key is consistent with the initial key, using the initial key to institute
It states ciphertext to be decrypted, obtains plaintext corresponding with the ciphertext.
6. Bluetooth communication encryption device according to claim 5, which is characterized in that the ciphertext is encrypted and decrypted
Algorithm include aes algorithm.
7. Bluetooth communication encryption device according to claim 5, which is characterized in that further include:
Key updating module, for utilizing random code life immediately after the ciphertext is decrypted using the actual key
It grows up to be a useful person and generates random code to update the initial key, and the initial key of update is broadcasted to user terminal.
8. Bluetooth communication encryption device according to claim 5, which is characterized in that further include:
Ciphertext encrypting module, the random key for generating and broadcasting using random number generator for receiving the user terminal, benefit
It is encrypted with the plaintext that the random key is sent to the user terminal needs, generates ciphertext to be transmitted;
Ciphertext sending module, for the ciphertext to be transmitted and the random key to be sent to the user terminal.
9. a kind of intelligent security guard equipment, which is characterized in that including memory and processor, the memory is calculated for storing
Machine program, the processor runs the computer program so that the intelligent security guard equipment executes according to claim 1 in 4
Described in any item Bluetooth communication encryption methods.
10. a kind of computer storage medium, which is characterized in that it is stored with institute in intelligent security guard equipment as claimed in claim 9
The computer program used.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811385947.3A CN109168162B (en) | 2018-11-20 | 2018-11-20 | Bluetooth communication encryption method and device and intelligent security equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811385947.3A CN109168162B (en) | 2018-11-20 | 2018-11-20 | Bluetooth communication encryption method and device and intelligent security equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109168162A true CN109168162A (en) | 2019-01-08 |
CN109168162B CN109168162B (en) | 2021-09-21 |
Family
ID=64875076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811385947.3A Active CN109168162B (en) | 2018-11-20 | 2018-11-20 | Bluetooth communication encryption method and device and intelligent security equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109168162B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110351929A (en) * | 2019-07-17 | 2019-10-18 | 苏州佩林网络科技有限公司 | A kind of wireless lamp control system based on Bluetooth technology |
CN111200807A (en) * | 2019-12-30 | 2020-05-26 | 上海博泰悦臻网络技术服务有限公司 | Bluetooth-based information interaction method and device |
CN111601293A (en) * | 2020-05-12 | 2020-08-28 | 北京三快在线科技有限公司 | Positioning method and device based on Bluetooth beacon equipment |
CN111787514A (en) * | 2020-06-28 | 2020-10-16 | 海尔优家智能科技(北京)有限公司 | Method and device for acquiring equipment control data, storage medium and electronic device |
CN112291060A (en) * | 2020-08-08 | 2021-01-29 | 北京天润海图科技有限公司 | Secure communication method, sending end and receiving end |
CN113141604A (en) * | 2021-04-27 | 2021-07-20 | 河北爱其科技有限公司 | Bluetooth safety communication system |
CN113630772A (en) * | 2021-08-17 | 2021-11-09 | 深圳市智莱科技股份有限公司 | Bluetooth data transmission method and device, Bluetooth equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105989643A (en) * | 2015-02-03 | 2016-10-05 | 吉林省施泰信息技术股份有限公司 | Communication encryption method used for electronic lock, electronic lock apparatus and system thereof |
CN106447863A (en) * | 2016-10-12 | 2017-02-22 | 北京三快在线科技有限公司 | Unlocking password processing method, door lock and foreground server |
CN106504391A (en) * | 2016-11-24 | 2017-03-15 | 北京爱接力科技发展有限公司 | A kind of control method of intelligent entrance guard, apparatus and system |
CN108111308A (en) * | 2017-12-25 | 2018-06-01 | 北京康拓科技有限公司 | One kind is based on the encrypted industry internet communication encryption method of dynamic random |
CN108447154A (en) * | 2018-03-02 | 2018-08-24 | 中国水利水电科学研究院 | Safe unlocking method and device, encryption and decryption method and device, lock and server |
WO2018182818A1 (en) * | 2017-01-09 | 2018-10-04 | Arris Enterprises Llc | Homomorphic white box system and method for using same |
-
2018
- 2018-11-20 CN CN201811385947.3A patent/CN109168162B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105989643A (en) * | 2015-02-03 | 2016-10-05 | 吉林省施泰信息技术股份有限公司 | Communication encryption method used for electronic lock, electronic lock apparatus and system thereof |
CN106447863A (en) * | 2016-10-12 | 2017-02-22 | 北京三快在线科技有限公司 | Unlocking password processing method, door lock and foreground server |
CN106504391A (en) * | 2016-11-24 | 2017-03-15 | 北京爱接力科技发展有限公司 | A kind of control method of intelligent entrance guard, apparatus and system |
WO2018182818A1 (en) * | 2017-01-09 | 2018-10-04 | Arris Enterprises Llc | Homomorphic white box system and method for using same |
CN108111308A (en) * | 2017-12-25 | 2018-06-01 | 北京康拓科技有限公司 | One kind is based on the encrypted industry internet communication encryption method of dynamic random |
CN108447154A (en) * | 2018-03-02 | 2018-08-24 | 中国水利水电科学研究院 | Safe unlocking method and device, encryption and decryption method and device, lock and server |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110351929A (en) * | 2019-07-17 | 2019-10-18 | 苏州佩林网络科技有限公司 | A kind of wireless lamp control system based on Bluetooth technology |
CN111200807A (en) * | 2019-12-30 | 2020-05-26 | 上海博泰悦臻网络技术服务有限公司 | Bluetooth-based information interaction method and device |
CN111200807B (en) * | 2019-12-30 | 2024-03-29 | 上海博泰悦臻网络技术服务有限公司 | Bluetooth-based information interaction method and device |
CN111601293A (en) * | 2020-05-12 | 2020-08-28 | 北京三快在线科技有限公司 | Positioning method and device based on Bluetooth beacon equipment |
CN111601293B (en) * | 2020-05-12 | 2022-09-30 | 北京三快在线科技有限公司 | Positioning method and device based on Bluetooth beacon equipment |
CN111787514A (en) * | 2020-06-28 | 2020-10-16 | 海尔优家智能科技(北京)有限公司 | Method and device for acquiring equipment control data, storage medium and electronic device |
CN111787514B (en) * | 2020-06-28 | 2024-03-22 | 海尔优家智能科技(北京)有限公司 | Method and device for acquiring equipment control data, storage medium and electronic device |
CN112291060A (en) * | 2020-08-08 | 2021-01-29 | 北京天润海图科技有限公司 | Secure communication method, sending end and receiving end |
CN113141604A (en) * | 2021-04-27 | 2021-07-20 | 河北爱其科技有限公司 | Bluetooth safety communication system |
CN113630772A (en) * | 2021-08-17 | 2021-11-09 | 深圳市智莱科技股份有限公司 | Bluetooth data transmission method and device, Bluetooth equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109168162B (en) | 2021-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109168162A (en) | Bluetooth communication encryption method, device and intelligent security guard equipment | |
US8712041B2 (en) | Content protection apparatus and content encryption and decryption apparatus using white-box encryption table | |
CN106504391B (en) | Control method, device and system of intelligent access control | |
CN107579817A (en) | User ID authentication method, apparatus and system based on block chain | |
CN105553951A (en) | Data transmission method and data transmission device | |
CN109150519A (en) | Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond | |
CA2548229A1 (en) | Enabling stateless server-based pre-shared secrets | |
CN105162772A (en) | IoT equipment authentication and key agreement method and device | |
CN108848495B (en) | User identity updating method using preset key | |
CN104735484B (en) | A kind of method and device for playing video | |
CN109544747A (en) | Encryption key update method, system and the computer storage medium of intelligent door lock | |
CN105119891B (en) | A kind of data interactive method, set-top box and server | |
CN105071927A (en) | Mobile device data local storage method | |
CN105847005A (en) | Encryption device and method | |
EP4344266A3 (en) | Updating a subscriber identity module | |
CN103236934A (en) | Method for cloud storage security control | |
CN108768628A (en) | Equipment end encryption method, device, system and gateway | |
CN104579680A (en) | Method for safe distribution of seed | |
CN109756325A (en) | A method of mobile office system safety is promoted using quantum key | |
CN201336704Y (en) | Remote video monitoring system | |
CN104618380A (en) | Secret key update method suitable for internet of things | |
CN113722741A (en) | Data encryption method and device and data decryption method and device | |
CN109787747A (en) | Anti- quantum calculation multi-enciphering cloud storage method and system based on multiple unsymmetrical key ponds | |
CN103324971A (en) | Smart card system and dynamic key update authentication method of smart card system | |
CN105577650A (en) | Remote time synchronization method and system of one-time password (OTP) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |