WO2012083871A1 - Method and device for managing bluetooth connection - Google Patents

Method and device for managing bluetooth connection Download PDF

Info

Publication number
WO2012083871A1
WO2012083871A1 PCT/CN2011/084469 CN2011084469W WO2012083871A1 WO 2012083871 A1 WO2012083871 A1 WO 2012083871A1 CN 2011084469 W CN2011084469 W CN 2011084469W WO 2012083871 A1 WO2012083871 A1 WO 2012083871A1
Authority
WO
WIPO (PCT)
Prior art keywords
bluetooth device
security mode
user
local
external
Prior art date
Application number
PCT/CN2011/084469
Other languages
French (fr)
Chinese (zh)
Inventor
丁吉
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Publication of WO2012083871A1 publication Critical patent/WO2012083871A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/002Transmission of channel access control information
    • H04W74/004Transmission of channel access control information in the uplink, i.e. towards network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to the field of communications, and in particular, to a Bluetooth connection management method and device.
  • Bluetooth wireless technology uses the globally available 2. 4 GHz wireless band, allowing multiple Bluetooth devices to wirelessly share data connections in at least 10 meters. Existing Bluetooth devices can use the following two security modes when connecting:
  • Embodiments of the present invention provide a method and a device for managing a Bluetooth connection, so that a user can select a security mode according to an actual application.
  • a method for managing a Bluetooth connection comprising:
  • the security mode is set, and the access request of the external Bluetooth device to the local Bluetooth device is processed according to the selected security mode.
  • a Bluetooth device including:
  • Safe mode setting module used to set the security mode according to user selection
  • the security mode processing module is configured to process an access request of the external Bluetooth device to the local Bluetooth device according to the selected one of the security modes.
  • the invention provides a management method and device for a Bluetooth secure connection, which are preset with two or more security modes, thereby allowing the user to select a security mode of the Bluetooth connection according to actual application requirements and determine different external Bluetooth devices. Access rights enhance the user experience.
  • Embodiment 1 is a flowchart of a method for managing a Bluetooth connection in Embodiment 1 of the present invention
  • Embodiment 2 is a flowchart of a method for managing a Bluetooth connection in Embodiment 2 of the present invention
  • Embodiment 3 is a flowchart of a method for managing a Bluetooth connection in Embodiment 3 of the present invention
  • Embodiment 4 is a flowchart of a method for managing a Bluetooth connection in Embodiment 4 of the present invention.
  • FIG. 5 is a flowchart of a method for managing a Bluetooth connection according to Embodiment 5 of the present invention.
  • FIG. 6 is a block diagram of a Bluetooth device in Embodiment 6 of the present invention.
  • FIG. 7 is a block diagram of a Bluetooth device in Embodiment 6 of the present invention.
  • This embodiment discloses a Bluetooth connection management method, as shown in FIG. 1 , including the following steps:
  • the setting security mode means that at least two security modes are preset in the Bluetooth device, and the user selects one security mode among the at least two security modes.
  • the at least two security modes include any two or more combinations of the prohibition mode, the advanced security mode, the intermediate security mode, and the low-level security mode.
  • the combination may be: a combination of a forbidden mode, an advanced security mode, a combination of an advanced security mode, an intermediate security mode, a combination of an intermediate security mode, a low-level security mode, a combination of a forbidden mode, a low-level security mode, a forbidden mode, an intermediate security mode Combination, advanced security mode, combination of low-level security mode, forbidden mode, advanced security mode, combination of intermediate security mode, advanced security mode, intermediate security mode, combination of low-level security mode, forbidden mode, advanced security mode, low-level security mode.
  • the forbidden mode means: Rejecting access requests from all external Bluetooth devices; Advanced security mode means: Every time an external Bluetooth device access request requires user confirmation; Intermediate security mode means: After the user confirms once, at the preset time The same external Bluetooth device directly accesses the local Bluetooth device without the user reconfirming; the low-level security mode means: All external Bluetooth devices can be directly accessed. The user determines the access rights of the external Bluetooth device by selecting the four security modes.
  • the embodiment provides a method for managing a Bluetooth connection. Compared with the prior art, the method can allow the user to determine the access rights of the external Bluetooth device according to the actual situation, so that the user can use the security mode of the Bluetooth connection that meets his own needs. user experience.
  • Embodiments 1 to 5 the specific steps of the above four security modes are respectively described. Regardless of the combination of the security modes, if one of the security modes is selected, the following Embodiment 2 can be followed. The corresponding flow to the execution in Embodiment 5 is performed.
  • Example 2 This embodiment discloses a method for managing a Bluetooth connection, which includes the following steps:
  • the setting security mode means that at least two security modes are preset, and the user selects one security mode among the at least two security modes.
  • the at least two security modes may use the solution disclosed in Embodiment 1, and when the at least two security modes include the prohibition mode, the prohibition mode is set as the current security mode as an example. Be explained.
  • the embodiment of the present invention when receiving an access request from the external Bluetooth device to the local Bluetooth device, the embodiment of the present invention also needs to perform the following process.
  • the external Bluetooth device is prohibited from accessing the local Bluetooth device through Bluetooth.
  • the method for managing the Bluetooth connection provided in this embodiment prohibits the external Bluetooth device from accessing the local Bluetooth device through the Bluetooth mode.
  • This embodiment discloses a method for managing a Bluetooth connection, which includes the following steps: 301. Set a security mode according to a user selection.
  • the setting security mode means that at least two security modes are preset, and the user selects one security mode among the at least two security modes.
  • the at least two security modes in this embodiment may use the solution disclosed in Embodiment 1, and in the case where the at least two security modes include the advanced security mode, the advanced security mode is set as the current security mode.
  • the following embodiments of the present invention also need to perform the following procedures.
  • step 303 Determine, by the local Bluetooth device, whether the user requests an access request of the external Bluetooth device, and if the local Bluetooth device receives the permission instruction of the user, perform step 303; and the local Bluetooth device receives the prohibition instruction of the user. Next, go to step 304.
  • the external Bluetooth device is prohibited from accessing the local Bluetooth device by using a Bluetooth mode.
  • the method for managing the Bluetooth connection provided in this embodiment requires the user to confirm the access request of the external Bluetooth device, and only the external Bluetooth device allowed by the user can access the local Bluetooth device through the Bluetooth mode.
  • This embodiment discloses a method for managing a Bluetooth connection, which includes the following steps:
  • the setting security mode means that at least two security modes are preset, and the user selects one security mode among the at least two security modes.
  • the at least two security modes in this embodiment may use the solution disclosed in Embodiment 1, and when the intermediate security mode is included in the at least two security modes, the intermediate security mode is set as the current security mode.
  • the following embodiments of the present invention also need to perform the following processes.
  • step 4 02. After the external Bluetooth device sends an access request to the local Bluetooth device, it is determined whether the access request of the external Bluetooth device has been allowed by the user before, if the access request of the external Bluetooth device has been allowed by the user before. Command, go to step 4 03; If the access request of the external Bluetooth device has not received the user's permission command before, go to step 4 04.
  • step 4 03. Whether the difference between the time when the access request of the external Bluetooth device is determined and the time when the user's permission command was last received is within a preset time difference, if the time of the external Bluetooth device access request is the last time The difference between the time of the user's allowed instruction is within the preset time difference, and step 4 05 is performed; if the difference between the time of the access request of the external Bluetooth device and the time when the user's permission command was last obtained exceeds the To preset the time difference, go to step 4 04.
  • step 4 04. Determine whether the local Bluetooth device receives an instruction that the user allows the access request of the external Bluetooth device, and if the local Bluetooth device receives the permission instruction of the user, perform step 4 05; receive the local Bluetooth device In the case of the user's prohibition command, go to step 060.
  • the certain external Bluetooth device can directly access the local Bluetooth device through the Bluetooth mode within the preset time difference range without requiring the user to confirm again.
  • the intermediate security mode in this embodiment is applicable to a situation in which a device needs to transmit data to a local Bluetooth device multiple times or browse a local Bluetooth device multiple times within a certain period of time by using a Bluetooth method.
  • This embodiment discloses a method for managing a Bluetooth connection, which includes the following steps:
  • the setting security mode means that at least two security modes are preset, and the user selects one security mode among the at least two security modes.
  • the at least two security modes in this embodiment may adopt the solution disclosed in Embodiment 1, and in the case that the at least two security modes include the low-level security mode, the low-level security mode is set as the current security mode.
  • the embodiment of the present invention After the low-level security mode is selected, in order to be able to process the access request of the external Bluetooth device to the local Bluetooth device according to the selected security mode, the embodiment of the present invention also needs to perform the following 502 process.
  • the external Bluetooth device is always allowed to access the local Bluetooth device through Bluetooth.
  • all external Bluetooth devices can directly access the local Bluetooth device through Bluetooth, which is suitable for the case where the local Bluetooth device is accessed a lot and does not require the user to confirm the access request of the external Bluetooth device one by one.
  • the method may include: when the two parties support Secure S imp le Pa The device is bound and automatically accepts the application connection request of the external Bluetooth device; if the two parties do not support the binding of the SSP, the local Bluetooth device directly accepts the application connection request of the external Bluetooth device without concern whether the binding has been established.
  • Example 6 Example 6:
  • the management device includes:
  • the security mode setting module 601 is a security mode processing module 602.
  • the security mode setting module 601 is configured to set the security mode according to user selection.
  • the safety mode setting sub-module 6 01 1 is also included in the safety mode setting module 6 01.
  • the security mode setting sub-module 6 01 1 is for selecting one of the at least two security modes set in advance.
  • the secure mode processing module 602 processes the access request of the external Bluetooth device to the local Bluetooth device in accordance with the selected one of the security modes.
  • the at least two security modes include any two or more combinations of the prohibition mode, the advanced security mode, the intermediate security mode, and the low-level security mode.
  • the combination may be: a combination of a forbidden mode, an advanced security mode, a combination of an advanced security mode, an intermediate security mode, a combination of an intermediate security mode, a low-level security mode, a combination of a forbidden mode, a low-level security mode, a forbidden mode, an intermediate security mode Combination, advanced security mode, combination of low-level security mode, forbidden mode, advanced security mode, combination of intermediate security mode, advanced security mode, intermediate security mode, combination of low-level security mode, forbidden mode, advanced security mode, low-level security mode.
  • this embodiment uses a combination of the prohibit mode, the advanced security mode, the intermediate security mode, and the low-level security mode as an example, as shown in Figure 7.
  • the Bluetooth device providing a combination of the prohibit mode, the advanced security mode, the intermediate security mode, and the low-level security mode in FIG. 7 includes: a security mode setting module 701 and a security mode processing module 702.
  • the safety mode setting sub-module 701 1 is also included in the safety mode setting module 7 01.
  • the security mode setting module 701 is used to set the security mode according to the user selection.
  • the security mode setting sub-module 701 1 is configured to set a security mode in four preset security modes, and the security mode processing module 702 is configured to process the external Bluetooth device to the local Bluetooth device according to the selected one of the security modes. Access request.
  • the security mode is set in the security mode setting module 701 of the local Bluetooth device.
  • At least two security modes in this embodiment shown in FIG. 7 are: disable mode, advanced security mode, intermediate security mode, and low-level security mode. The following describes each security mode separately.
  • the security mode setting sub-module 701 1 in the security mode setting module 701 sets the security mode When the mode is set to the disable mode, the external Bluetooth device issues an access request to the local Bluetooth device, and the security mode processing module 702 of the local Bluetooth device enables the access request sent by the first access control unit 71 to the local Bluetooth device to the local Bluetooth device. Process it.
  • the first access control unit 71 prohibits the external Bluetooth device from accessing the local Bluetooth device through Bluetooth.
  • the external Bluetooth device issues an access request to the local Bluetooth device, and the security mode processing module 702 of the local Bluetooth device enables the first determination.
  • the unit 72 and the second access control unit 73 process an access request issued by the external Bluetooth device to the local Bluetooth device.
  • the first determining unit 72 determines whether an instruction of the user of the local Bluetooth device is allowed to allow the access request of the external Bluetooth device, and if the first determining unit 72 receives the permission instruction of the user, the second access control unit 73 allows the external The Bluetooth device accesses the local Bluetooth device through the Bluetooth mode; if the first determining unit 72 receives the prohibition instruction of the user, the second access control unit 73 prohibits the external Bluetooth device from accessing the local Bluetooth device through the Bluetooth mode.
  • the external Bluetooth device issues an access request to the local Bluetooth device, and the security mode processing module 702 of the local Bluetooth device enables the second.
  • the determining unit 74, the third access control unit 75, and the third determining unit 76 process an access request issued by the external Bluetooth device to the local Bluetooth device.
  • the second determining unit 74 first determines whether the access request of the external Bluetooth device has obtained the permission instruction of the user before the access, if the access request of the external Bluetooth device has not been allowed by the user before the access. After the instruction, the third determining unit 76 determines whether the local Bluetooth device receives the instruction that the user allows the access request of the external bluetooth device, and if the third determining unit 76 receives the permission instruction of the user, the third access control unit 75 allows The external Bluetooth device accesses the local Bluetooth device through the Bluetooth mode; if the third determining unit 76 receives the prohibition instruction of the user, the third access control unit 75 prohibits the external Bluetooth device from accessing the local Bluetooth device through the Bluetooth mode.
  • the second determining unit 74 determines the Whether the difference between the time of the access request of the secondary external Bluetooth device and the time when the user's permission command was last obtained is within a preset time difference. If the difference between the time of the access request of the external Bluetooth device and the time when the user's permission command was last obtained is within the preset time difference, the third access control unit 75 allows the external Bluetooth device to pass the Bluetooth. Access to local Bluetooth devices.
  • the third determining unit 76 determines the local Bluetooth device again. Receiving an instruction of the user to allow an access request of the external Bluetooth device, if the third determining unit 76 receives the permission instruction of the user, the third access control unit 75 allows the external Bluetooth device to access the local Bluetooth device by using a Bluetooth mode; If the third determining unit 76 receives the prohibition instruction of the user, the third access control unit 75 prohibits the external Bluetooth device from accessing the local Bluetooth device by Bluetooth.
  • the external Bluetooth device issues an access request to the local Bluetooth device, and the security mode processing module 702 of the local Bluetooth device enables the fourth. Access control unit 77.
  • the fourth access control unit 77 always allows the external Bluetooth device to access the local Bluetooth device in a Bluetooth mode.
  • the embodiment provides a Bluetooth device, which provides a security mode of at least two Bluetooth connections, and can allow the user to select a security mode according to actual conditions to determine the access rights of the external Bluetooth device, so that the user can use the Bluetooth connection that meets his needs.
  • the security mode enhances the user experience.
  • the embodiments of the present invention are mainly used in various types of devices connected by using Bluetooth, such as: a mobile phone with a Bluetooth function, a computer, a vehicle tool, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed are a method and a device for managing a bluetooth connection, which relates to the field of communications and enables a user to select a security mode of the bluetooth connection according to an actual application situation. The method for managing a bluetooth connection comprises: setting a security mode according to selection made by a user; and processing an access request from an external bluetooth device to a local bluetooth device according to the selected security mode. An embodiment of the present invention further provides a bluetooth device, comprising: a security mode setting module, used to select a security mode from at least two preset security modes; and a security mode processing module, used to process an access request from an external bluetooth device to a local bluetooth device according to the selected security mode. The embodiments of the present invention are applied to the bluetooth connection, and allows a user to select a security mode for the bluetooth connection according to an actual requirement of the user and determine different access rights of the external bluetooth device, thereby improving the user experience.

Description

蓝牙连接的管理方法及设备  Bluetooth connection management method and device
本申请要求于 2010 年 12 月 22 日提交中国专利局、 申请号为 201010601414.1、 发明名称为 "蓝牙连接的管理方法及设备" 的中国专利 申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域 The present application claims priority to Chinese Patent Application No. 201010601414.1, entitled "Bluetooth Connection Management Method and Apparatus", filed on December 22, 2010, the entire contents of . Technical field
本发明涉及通信领域, 尤其涉及一种蓝牙连接的管理方法及设备。  The present invention relates to the field of communications, and in particular, to a Bluetooth connection management method and device.
背景技术 Background technique
蓝牙无线技术使用全球可用的 2. 4 GH z的无线波段, 允许多个蓝牙 设备在至少 1 0米范围内通过无线方式进行数据连接共享。 现有的蓝牙 设备在进行连接时可以釆用如下两种安全模式:  Bluetooth wireless technology uses the globally available 2. 4 GHz wireless band, allowing multiple Bluetooth devices to wirelessly share data connections in at least 10 meters. Existing Bluetooth devices can use the following two security modes when connecting:
一、 在外部设备每次访问蓝牙设备时, 都会提示用户是否允许本 次访问, 只有在用户确认允许本次访问的情况下才能进行后续的数据 连接共享。  1. Each time an external device accesses a Bluetooth device, it will prompt the user whether to allow this access. Only when the user confirms that the access is allowed, the subsequent data connection sharing can be performed.
二、 在外部设备访问蓝牙设备时, 不需要用户的确认, 而是直接 允许进行后续的数据连接共享。  2. When the external device accesses the Bluetooth device, the user's confirmation is not required, but the subsequent data connection sharing is directly allowed.
在实现上述现有技术方案的过程中,发明人发现现有技术中至少存在 如下问题: 上述任何一种安全模式, 都是在蓝牙设备出厂时统一设置, 用户不能够根据实际应用情况选择安全模式, 使得用户的使用体验较差。 发明内容  In the process of implementing the above prior art solution, the inventor has found that at least the following problems exist in the prior art: Any of the above security modes are uniformly set when the Bluetooth device is shipped from the factory, and the user cannot select the security mode according to the actual application situation. , making the user's experience worse. Summary of the invention
本发明的实施例提供一种蓝牙连接的管理方法及设备, 使得用户 能够根据实际应用情况选择安全模式。  Embodiments of the present invention provide a method and a device for managing a Bluetooth connection, so that a user can select a security mode according to an actual application.
为达到上述目的, 本发明的实施例釆用如下技术方案: 一种蓝牙连接的管理方法, 包括: In order to achieve the above object, embodiments of the present invention use the following technical solutions: A method for managing a Bluetooth connection, comprising:
根据用户选择, 设定安全模式, 按照所选择的安全模式处理外部 蓝牙设备对本地蓝牙设备的访问请求。  According to the user selection, the security mode is set, and the access request of the external Bluetooth device to the local Bluetooth device is processed according to the selected security mode.
一种蓝牙设备, 包括:  A Bluetooth device, including:
安全模式设置模块: 用于根据用户选择, 设定安全模式;  Safe mode setting module: used to set the security mode according to user selection;
安全模式处理模块: 用于按照所选择的一种安全模式处理外部蓝 牙设备对本地蓝牙设备的访问请求。  The security mode processing module is configured to process an access request of the external Bluetooth device to the local Bluetooth device according to the selected one of the security modes.
本发明提供了用于蓝牙安全连接的管理方法及设备, 预先设置了两 个或两个以上的安全模式, 从而允许用户根据实际应用需要来选择蓝牙 连接的安全模式并确定外部其他蓝牙设备的不同访问权限, 提升了用户 体验。  The invention provides a management method and device for a Bluetooth secure connection, which are preset with two or more security modes, thereby allowing the user to select a security mode of the Bluetooth connection according to actual application requirements and determine different external Bluetooth devices. Access rights enhance the user experience.
附图说明 DRAWINGS
图 1为本发明实施例 1中蓝牙连接的管理方法的流程图;  1 is a flowchart of a method for managing a Bluetooth connection in Embodiment 1 of the present invention;
图 2为本发明实施例 2中蓝牙连接的管理方法的流程图;  2 is a flowchart of a method for managing a Bluetooth connection in Embodiment 2 of the present invention;
图 3为本发明实施例 3中蓝牙连接的管理方法的流程图;  3 is a flowchart of a method for managing a Bluetooth connection in Embodiment 3 of the present invention;
图 4为本发明实施例 4中蓝牙连接的管理方法的流程图;  4 is a flowchart of a method for managing a Bluetooth connection in Embodiment 4 of the present invention;
图 5为本发明实施例 5中蓝牙连接的管理方法的流程图;  FIG. 5 is a flowchart of a method for managing a Bluetooth connection according to Embodiment 5 of the present invention; FIG.
图 6为本发明实施例 6中蓝牙设备的框图;  6 is a block diagram of a Bluetooth device in Embodiment 6 of the present invention;
图 7为本发明实施例 6中蓝牙设备的框图。  Figure 7 is a block diagram of a Bluetooth device in Embodiment 6 of the present invention.
具体实施方式 detailed description
下面结合本发明实施例的附图对本发明实施例的技术方案进行清 楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不 是全部的实施例。基于本发明中的实施例, 本领域普通技术人员在没有作出 创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。 实例 1 : The technical solutions of the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings of the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention. Example 1:
本实施例公开了一种蓝牙连接的管理方法,如图 1 ,包括如下步骤: This embodiment discloses a Bluetooth connection management method, as shown in FIG. 1 , including the following steps:
1 01、 根据用户选择, 设定安全模式。 1 01. Set the security mode according to the user's selection.
所述设定安全模式是指, 蓝牙设备中预先设置至少两个安全模式, 用户在所述至少两个安全模式中选择一个安全模式。  The setting security mode means that at least two security modes are preset in the Bluetooth device, and the user selects one security mode among the at least two security modes.
1 02、 按照所选择的安全模式处理外部蓝牙设备对本地蓝牙设备的 访问请求。  1 02. Process the access request of the external Bluetooth device to the local Bluetooth device according to the selected security mode.
所述至少两种安全模式包括禁止模式、 高级安全模式、 中级安全 模式、 低级安全模式中任意两种或两种以上的组合。 所述组合可以为: 禁止模式、 高级安全模式的组合, 高级安全模式、 中级安全模式的组 合, 中级安全模式、 低级安全模式的组合, 禁止模式、 低级安全模式 的组合, 禁止模式、 中级安全模式的组合, 高级安全模式、 低级安全 模式的组合, 禁止模式、 高级安全模式、 中级安全模式的组合, 高级 安全模式、 中级安全模式、 低级安全模式的组合, 禁止模式、 高级安 全模式、 低级安全模式的组合, 禁止模式、 中级安全模式、 低级安全 模式的组合, 禁止模式、 高级安全模式、 中级安全模式、 低级安全模 式的组合。  The at least two security modes include any two or more combinations of the prohibition mode, the advanced security mode, the intermediate security mode, and the low-level security mode. The combination may be: a combination of a forbidden mode, an advanced security mode, a combination of an advanced security mode, an intermediate security mode, a combination of an intermediate security mode, a low-level security mode, a combination of a forbidden mode, a low-level security mode, a forbidden mode, an intermediate security mode Combination, advanced security mode, combination of low-level security mode, forbidden mode, advanced security mode, combination of intermediate security mode, advanced security mode, intermediate security mode, combination of low-level security mode, forbidden mode, advanced security mode, low-level security mode The combination of the disabled mode, the intermediate security mode, the low-level security mode, the forbidden mode, the advanced security mode, the intermediate security mode, and the low-level security mode.
禁止模式是指: 拒绝所有外部蓝牙设备的访问请求; 高级安全模 式是指: 每次外部蓝牙设备的访问请求都需要用户确认; 中级安全模 式是指: 在用户确认过一次后, 在预设时间内同一外部蓝牙设备直接 访问本地蓝牙设备而不需用户再次确认; 低级安全模式是指: 所有外 部蓝牙设备可以直接访问。 用户通过对所述四种安全模式进行选择来 确定外部蓝牙设备的访问权限。  The forbidden mode means: Rejecting access requests from all external Bluetooth devices; Advanced security mode means: Every time an external Bluetooth device access request requires user confirmation; Intermediate security mode means: After the user confirms once, at the preset time The same external Bluetooth device directly accesses the local Bluetooth device without the user reconfirming; the low-level security mode means: All external Bluetooth devices can be directly accessed. The user determines the access rights of the external Bluetooth device by selecting the four security modes.
本实施例提供了一种蓝牙连接的管理方法, 与现有技术相比, 能 够允许用户根据实际情况决定外部蓝牙设备的访问权限, 使用户可以 使用符合自己需求的蓝牙连接的安全模式, 提升了用户体验。  The embodiment provides a method for managing a Bluetooth connection. Compared with the prior art, the method can allow the user to determine the access rights of the external Bluetooth device according to the actual situation, so that the user can use the security mode of the Bluetooth connection that meets his own needs. user experience.
下面实施例 1 至实施例 5分别对上述四种安全模式的具体步骤进 行说明, 不论安全模式的组合釆用上述哪种方式, 在选择确定了一个 安全模式后, 都可以按照下述实施例 2至实施例 5中对应的流程执行。  In the following Embodiments 1 to 5, the specific steps of the above four security modes are respectively described. Regardless of the combination of the security modes, if one of the security modes is selected, the following Embodiment 2 can be followed. The corresponding flow to the execution in Embodiment 5 is performed.
实例 2 : 本实施例公开了一种蓝牙连接的管理方法, 包括如下步骤:Example 2: This embodiment discloses a method for managing a Bluetooth connection, which includes the following steps:
2 01、 根据用户选择, 设定安全模式。 2 01. Set the security mode according to the user's selection.
所述设定安全模式是指, 预先设置至少两个安全模式, 用户在所 述至少两个安全模式中选择一个安全模式。 本实施例中所述至少两种 安全模式可以釆用实施例 1 中公开的方案, 在上述至少两种安全模式 中包含禁止模式的情况下, 以设定了禁止模式作为当前的安全模式为 例进行说明。  The setting security mode means that at least two security modes are preset, and the user selects one security mode among the at least two security modes. In the embodiment, the at least two security modes may use the solution disclosed in Embodiment 1, and when the at least two security modes include the prohibition mode, the prohibition mode is set as the current security mode as an example. Be explained.
在选择了禁止模式后, 当接收到外部蓝牙设备对本地蓝牙设备的 访问请求时, 本发明实施例还需要执行下述 2 02过程。  After the prohibition mode is selected, when receiving an access request from the external Bluetooth device to the local Bluetooth device, the embodiment of the present invention also needs to perform the following process.
2 02、 禁止所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设备。 本实施例提供的蓝牙连接的管理方法, 禁止外部蓝牙设备通过蓝 牙方式访问本地蓝牙设备。  2 02. The external Bluetooth device is prohibited from accessing the local Bluetooth device through Bluetooth. The method for managing the Bluetooth connection provided in this embodiment prohibits the external Bluetooth device from accessing the local Bluetooth device through the Bluetooth mode.
实例 3:  Example 3:
本实施例公开了一种蓝牙连接的管理方法, 包括如下步骤: 301、 根据用户选择, 设定安全模式。  This embodiment discloses a method for managing a Bluetooth connection, which includes the following steps: 301. Set a security mode according to a user selection.
所述设定安全模式是指, 预先设置至少两个安全模式, 用户在所 述至少两个安全模式中选择一个安全模式。 本实施例中所述至少两种 安全模式可以釆用实施例 1 中公开的方案, 在上述至少两种安全模式 中包含高级安全模式的情况下, 以设定了高级安全模式作为当前的安 全模式为例进行说明。  The setting security mode means that at least two security modes are preset, and the user selects one security mode among the at least two security modes. The at least two security modes in this embodiment may use the solution disclosed in Embodiment 1, and in the case where the at least two security modes include the advanced security mode, the advanced security mode is set as the current security mode. Give an example for explanation.
在选择了高级安全模式后, 为了能够了按照所选择的安全模式处 理外部蓝牙设备对本地蓝牙设备的访问请求, 本发明实施例还需要执 行下述 3 02至 304过程。  After the advanced security mode is selected, in order to be able to process the access request of the external Bluetooth device to the local Bluetooth device according to the selected security mode, the following embodiments of the present invention also need to perform the following procedures.
302、 判断本地蓝牙设备是否接收到用户允许外部蓝牙设备的访问 请求的指令, 在本地蓝牙设备接收到用户的允许指令的情况下, 执行 步骤 303 ; 在本地蓝牙设备接收到用户的禁止指令的情况下, 执行步骤 304。  302. Determine, by the local Bluetooth device, whether the user requests an access request of the external Bluetooth device, and if the local Bluetooth device receives the permission instruction of the user, perform step 303; and the local Bluetooth device receives the prohibition instruction of the user. Next, go to step 304.
303、 允许所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设备。 303. Allow the external Bluetooth device to access the local Bluetooth device by using Bluetooth.
304、 禁止所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设备。 本实施例提供的蓝牙连接的管理方法, 需要用户对外部蓝牙设备 的访问请求进行确认, 只有用户允许的外部蓝牙设备可以通过蓝牙方 式访问本地蓝牙设备。 304. The external Bluetooth device is prohibited from accessing the local Bluetooth device by using a Bluetooth mode. The method for managing the Bluetooth connection provided in this embodiment requires the user to confirm the access request of the external Bluetooth device, and only the external Bluetooth device allowed by the user can access the local Bluetooth device through the Bluetooth mode.
实例 4:  Example 4:
本实施例公开了一种蓝牙连接的管理方法, 包括如下步骤: This embodiment discloses a method for managing a Bluetooth connection, which includes the following steps:
4 01、 根据用户选择, 设定安全模式。 4 01. Set the security mode according to the user's selection.
所述设定安全模式是指, 预先设置至少两个安全模式, 用户在所 述至少两个安全模式中选择一个安全模式。 本实施例中所述至少两种 安全模式可以釆用实施例 1 中公开的方案, 在上述至少两种安全模式 中包含中级安全模式的情况下, 以设定了中级安全模式作为当前的安 全模式为例进行说明。  The setting security mode means that at least two security modes are preset, and the user selects one security mode among the at least two security modes. The at least two security modes in this embodiment may use the solution disclosed in Embodiment 1, and when the intermediate security mode is included in the at least two security modes, the intermediate security mode is set as the current security mode. Give an example for explanation.
在选择了中级安全模式后, 为了能够了按照所选择的安全模式处 理外部蓝牙设备对本地蓝牙设备的访问请求, 本发明实施例还需要执 行下述 4 02至 4 06过程。  After the intermediate security mode is selected, in order to be able to process the access request of the external Bluetooth device to the local Bluetooth device according to the selected security mode, the following embodiments of the present invention also need to perform the following processes.
4 02、 外部蓝牙设备向本地蓝牙设备发出访问请求后, 判断此次外 部蓝牙设备的访问请求在以前是否得到过用户的允许指令, 如果此次 外部蓝牙设备的访问请求在以前得到过用户的允许指令, 执行步骤 4 03 ; 如果此次外部蓝牙设备的访问请求在以前未得到过用户的允许指 令, 执行步骤 4 04。  4 02. After the external Bluetooth device sends an access request to the local Bluetooth device, it is determined whether the access request of the external Bluetooth device has been allowed by the user before, if the access request of the external Bluetooth device has been allowed by the user before. Command, go to step 4 03; If the access request of the external Bluetooth device has not received the user's permission command before, go to step 4 04.
4 03、 判断此次外部蓝牙设备的访问请求的时刻与上一次得到用户 的允许指令的时刻的差值是否在预设时间差之内, 如果此次外部蓝牙 设备的访问请求的时刻与上一次得到用户的允许指令的时刻的差值在 所述预设时间差之内, 执行步骤 4 05 ; 如果此次外部蓝牙设备的访问请 求的时刻与上一次得到用户的允许指令的时刻的差值超出所述预设时 间差, 执行步骤 4 04。  4 03. Whether the difference between the time when the access request of the external Bluetooth device is determined and the time when the user's permission command was last received is within a preset time difference, if the time of the external Bluetooth device access request is the last time The difference between the time of the user's allowed instruction is within the preset time difference, and step 4 05 is performed; if the difference between the time of the access request of the external Bluetooth device and the time when the user's permission command was last obtained exceeds the To preset the time difference, go to step 4 04.
4 04、 判断本地蓝牙设备是否接收到用户允许所述此次外部蓝牙设 备的访问请求的指令, 在本地蓝牙设备接收到用户的允许指令的情况 下, 执行步骤 4 05 ; 在本地蓝牙设备接收到用户的禁止指令的情况下, 执行步骤 4 06。  4 04. Determine whether the local Bluetooth device receives an instruction that the user allows the access request of the external Bluetooth device, and if the local Bluetooth device receives the permission instruction of the user, perform step 4 05; receive the local Bluetooth device In the case of the user's prohibition command, go to step 060.
4 05、 允许所述此次外部蓝牙设备通过蓝牙方式访问本地蓝牙设 备。 406、 禁止所述此次外部蓝牙设备通过蓝牙方式访问本地蓝牙设 备。 4 05. Allow the external Bluetooth device to access the local Bluetooth device through Bluetooth. 406. The external Bluetooth device is prohibited from accessing the local Bluetooth device by using a Bluetooth mode.
本实施例中, 在用户对某个外部蓝牙设备的访问请求确认一次后, 在预设时间差范围内所述某个外部蓝牙设备可再次通过蓝牙方式直接 访问本地蓝牙设备而不需要用户再次确认。 本实施例中的中级安全模 式适用于某一设备需要通过蓝牙方式在一定时间段内多次向本地蓝牙 设备传输数据或是多次浏览本地蓝牙设备的情况。  In this embodiment, after the user confirms the access request of an external Bluetooth device once, the certain external Bluetooth device can directly access the local Bluetooth device through the Bluetooth mode within the preset time difference range without requiring the user to confirm again. The intermediate security mode in this embodiment is applicable to a situation in which a device needs to transmit data to a local Bluetooth device multiple times or browse a local Bluetooth device multiple times within a certain period of time by using a Bluetooth method.
实例 5 :  Example 5:
本实施例公开了一种蓝牙连接的管理方法, 包括如下步骤:  This embodiment discloses a method for managing a Bluetooth connection, which includes the following steps:
501、 根据用户选择, 设定安全模式。  501. Set the security mode according to the user selection.
所述设定安全模式是指, 预先设置至少两个安全模式, 用户在所 述至少两个安全模式中选择一个安全模式。 本实施例中所述至少两种 安全模式可以釆用实施例 1 中公开的方案, 在上述至少两种安全模式 中包含低级安全模式的情况下, 以设定了低级安全模式作为当前的安 全模式为例进行说明。  The setting security mode means that at least two security modes are preset, and the user selects one security mode among the at least two security modes. The at least two security modes in this embodiment may adopt the solution disclosed in Embodiment 1, and in the case that the at least two security modes include the low-level security mode, the low-level security mode is set as the current security mode. Give an example for explanation.
在选择了低级安全模式后, 为了能够了按照所选择的安全模式处 理外部蓝牙设备对本地蓝牙设备的访问请求, 本发明实施例还需要执 行下述 502过程。  After the low-level security mode is selected, in order to be able to process the access request of the external Bluetooth device to the local Bluetooth device according to the selected security mode, the embodiment of the present invention also needs to perform the following 502 process.
502、 总是允许所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设 备。  502. The external Bluetooth device is always allowed to access the local Bluetooth device through Bluetooth.
本实施例中, 所有外部蓝牙设备都可以通过蓝牙方式直接访问本 地蓝牙设备, 适用于本地蓝牙设备被访问次数较多而且又不需要用户 对外部蓝牙设备的访问请求进行逐个确认的情况。 具体来说, 可以包 括: 在双方支持 Secure S imp l e Pa i r ing (安全简单^ J西己对, SSP) 々绑 定且所述绑定未建立的情况下, 本地蓝牙设备自动完成与外部蓝牙设 备的绑定并自动接受外部蓝牙设备的应用连接请求; 在双方不支持 SSP的绑定的情况下, 本地蓝牙设备直接接受外部蓝牙设备的应用连接 请求而不关心是否已建立绑定。 实例 6 :  In this embodiment, all external Bluetooth devices can directly access the local Bluetooth device through Bluetooth, which is suitable for the case where the local Bluetooth device is accessed a lot and does not require the user to confirm the access request of the external Bluetooth device one by one. Specifically, the method may include: when the two parties support Secure S imp le Pa The device is bound and automatically accepts the application connection request of the external Bluetooth device; if the two parties do not support the binding of the SSP, the local Bluetooth device directly accepts the application connection request of the external Bluetooth device without concern whether the binding has been established. Example 6:
本实施例公开了一种蓝牙设备, 如图 6所示, 所述管理设备包括: 安全模式设置模块 601 ,安全模式处理模块 602。安全模式设置模块 601 用于根据用户选择, 设定安全模式。 安全模式设置模块 6 01 中还包含 安全模式设置子模块 6 01 1。安全模式设置子模块 6 01 1用于在预先设置 的至少两种安全模式中选择一种安全模式。 安全模式处理模块 602 按 照所选择的一种安全模式处理外部蓝牙设备对本地蓝牙设备的访问请 求。 This embodiment discloses a Bluetooth device. As shown in FIG. 6, the management device includes: The security mode setting module 601 is a security mode processing module 602. The security mode setting module 601 is configured to set the security mode according to user selection. The safety mode setting sub-module 6 01 1 is also included in the safety mode setting module 6 01. The security mode setting sub-module 6 01 1 is for selecting one of the at least two security modes set in advance. The secure mode processing module 602 processes the access request of the external Bluetooth device to the local Bluetooth device in accordance with the selected one of the security modes.
所述至少两种安全模式包括禁止模式、 高级安全模式、 中级安全 模式、 低级安全模式中任意两种或两种以上的组合。 所述组合可以为: 禁止模式、 高级安全模式的组合, 高级安全模式、 中级安全模式的组 合, 中级安全模式、 低级安全模式的组合, 禁止模式、 低级安全模式 的组合, 禁止模式、 中级安全模式的组合, 高级安全模式、 低级安全 模式的组合, 禁止模式、 高级安全模式、 中级安全模式的组合, 高级 安全模式、 中级安全模式、 低级安全模式的组合, 禁止模式、 高级安 全模式、 低级安全模式的组合, 禁止模式、 中级安全模式、 低级安全 模式的组合, 禁止模式、 高级安全模式、 中级安全模式、 低级安全模 式的组合。  The at least two security modes include any two or more combinations of the prohibition mode, the advanced security mode, the intermediate security mode, and the low-level security mode. The combination may be: a combination of a forbidden mode, an advanced security mode, a combination of an advanced security mode, an intermediate security mode, a combination of an intermediate security mode, a low-level security mode, a combination of a forbidden mode, a low-level security mode, a forbidden mode, an intermediate security mode Combination, advanced security mode, combination of low-level security mode, forbidden mode, advanced security mode, combination of intermediate security mode, advanced security mode, intermediate security mode, combination of low-level security mode, forbidden mode, advanced security mode, low-level security mode The combination of the disabled mode, the intermediate security mode, the low-level security mode, the forbidden mode, the advanced security mode, the intermediate security mode, and the low-level security mode.
在图 6 的基础上, 本实施例以禁止模式、 高级安全模式、 中级安 全模式、 低级安全模式的组合为例来进行说明, 如图 7 所示。 图 7 中 提供禁止模式、 高级安全模式、 中级安全模式、 低级安全模式的组合 的蓝牙设备包括: 安全模式设置模块 701 , 安全模式处理模块 702。 安 全模式设置模块 7 01 中还包括安全模式设置子模块 701 1。 安全模式设 置模块 701 用于根据用户选择, 设定安全模式。 安全模式设置子模块 701 1 用于在预先设置的四种安全模式中设定一种安全模式, 安全模式 处理模块 7 02 用于按照所选择的一种安全模式处理外部蓝牙设备对本 地蓝牙设备的访问请求。  Based on Figure 6, this embodiment uses a combination of the prohibit mode, the advanced security mode, the intermediate security mode, and the low-level security mode as an example, as shown in Figure 7. The Bluetooth device providing a combination of the prohibit mode, the advanced security mode, the intermediate security mode, and the low-level security mode in FIG. 7 includes: a security mode setting module 701 and a security mode processing module 702. The safety mode setting sub-module 701 1 is also included in the safety mode setting module 7 01. The security mode setting module 701 is used to set the security mode according to the user selection. The security mode setting sub-module 701 1 is configured to set a security mode in four preset security modes, and the security mode processing module 702 is configured to process the external Bluetooth device to the local Bluetooth device according to the selected one of the security modes. Access request.
在本地蓝牙设备的安全模式设置模块 701中对安全模式进行设定。 图 7 所示本实施例中的至少两种安全模式分别为: 禁止模式, 高级安 全模式, 中级安全模式, 低级安全模式。 下面针对各个安全模式分别 进行说明。  The security mode is set in the security mode setting module 701 of the local Bluetooth device. At least two security modes in this embodiment shown in FIG. 7 are: disable mode, advanced security mode, intermediate security mode, and low-level security mode. The following describes each security mode separately.
在安全模式设置模块 701 中的安全模式设置子模块 701 1将安全模 式设置为禁止模式的情况下, 外部蓝牙设备向本地蓝牙设备发出访问 请求, 本地蓝牙设备的安全模式处理模块 702 启用第一访问控制单元 71 对所述外部蓝牙设备向本地蓝牙设备发出的访问请求进行处理。 所 述第一访问控制单元 71禁止所述外部蓝牙设备通过蓝牙方式访问本地 蓝牙设备。 The security mode setting sub-module 701 1 in the security mode setting module 701 sets the security mode When the mode is set to the disable mode, the external Bluetooth device issues an access request to the local Bluetooth device, and the security mode processing module 702 of the local Bluetooth device enables the access request sent by the first access control unit 71 to the local Bluetooth device to the local Bluetooth device. Process it. The first access control unit 71 prohibits the external Bluetooth device from accessing the local Bluetooth device through Bluetooth.
在安全模式设置模块 701 中的安全模式设置子模块 7011将安全模 式设置为高级安全模式的情况下, 外部蓝牙设备向本地蓝牙设备发出 访问请求, 本地蓝牙设备的安全模式处理模块 702 启用第一判断单元 72和第二访问控制单元 73对所述外部蓝牙设备向本地蓝牙设备发出的 访问请求进行处理。  In the case where the security mode setting sub-module 7011 in the security mode setting module 701 sets the security mode to the advanced security mode, the external Bluetooth device issues an access request to the local Bluetooth device, and the security mode processing module 702 of the local Bluetooth device enables the first determination. The unit 72 and the second access control unit 73 process an access request issued by the external Bluetooth device to the local Bluetooth device.
第一判断单元 72判断是否接收到本地蓝牙设备的用户允许所述外 部蓝牙设备的访问请求的指令, 如果第一判断单元 72接收到了用户的 允许指令, 则第二访问控制单元 73允许所述外部蓝牙设备通过蓝牙方 式访问本地蓝牙设备;如果第一判断单元 72接收到了用户的禁止指令, 则第二访问控制单元 73禁止所述外部蓝牙设备通过蓝牙方式访问本地 蓝牙设备。  The first determining unit 72 determines whether an instruction of the user of the local Bluetooth device is allowed to allow the access request of the external Bluetooth device, and if the first determining unit 72 receives the permission instruction of the user, the second access control unit 73 allows the external The Bluetooth device accesses the local Bluetooth device through the Bluetooth mode; if the first determining unit 72 receives the prohibition instruction of the user, the second access control unit 73 prohibits the external Bluetooth device from accessing the local Bluetooth device through the Bluetooth mode.
在安全模式设置模块 701 中的安全模式设置子模块 7011将安全模 式设定为中级安全模式的情况下, 外部蓝牙设备向本地蓝牙设备发出 访问请求, 本地蓝牙设备的安全模式处理模块 702 启用第二判断单元 74、 第三访问控制单元 75、 第三判断单元 76对所述外部蓝牙设备向本 地蓝牙设备发出的访问请求进行处理。  In the case where the security mode setting sub-module 7011 in the security mode setting module 701 sets the security mode to the intermediate security mode, the external Bluetooth device issues an access request to the local Bluetooth device, and the security mode processing module 702 of the local Bluetooth device enables the second. The determining unit 74, the third access control unit 75, and the third determining unit 76 process an access request issued by the external Bluetooth device to the local Bluetooth device.
第二判断单元 74首先判断此次外部蓝牙设备的访问请求在此次访 问以前是否得到过用户的允许指令, 如果所述此次外部蓝牙设备的访 问请求在此次访问以前未得到过用户的允许指令, 则第三判断单元 76 再判断本地蓝牙设备是否接收到用户允许所述外部蓝牙设备的访问请 求的指令, 如果第三判断单元 76接收到了用户的允许指令, 则第三访 问控制单元 75 允许所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设 备; 如果第三判断单元 76接收到了用户的禁止指令, 则第三访问控制 单元 75禁止所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设备。  The second determining unit 74 first determines whether the access request of the external Bluetooth device has obtained the permission instruction of the user before the access, if the access request of the external Bluetooth device has not been allowed by the user before the access. After the instruction, the third determining unit 76 determines whether the local Bluetooth device receives the instruction that the user allows the access request of the external bluetooth device, and if the third determining unit 76 receives the permission instruction of the user, the third access control unit 75 allows The external Bluetooth device accesses the local Bluetooth device through the Bluetooth mode; if the third determining unit 76 receives the prohibition instruction of the user, the third access control unit 75 prohibits the external Bluetooth device from accessing the local Bluetooth device through the Bluetooth mode.
如果第二判断单元 74判断所述此次外部蓝牙设备的访问请求在此 次访问以前得到过用户的允许指令, 则第二判断单元 74再判断所述此 次外部蓝牙设备的访问请求的时刻与上一次得到用户的允许指令的时 刻的差值是否在预设时间差之内。 如果所述此次外部蓝牙设备的访问 请求的时刻与上一次得到用户的允许指令的时刻的差值在所述预设时 间差之内, 则第三访问控制单元 75允许所述外部蓝牙设备通过蓝牙方 式访问本地蓝牙设备。 如果第二判断单元 74判断所述此次外部蓝牙设 备的访问请求的时刻与上一次得到用户的允许指令的时刻的差值超出 所述预设时间差, 则第三判断单元 76再判断本地蓝牙设备是否接收到 用户允许所述外部蓝牙设备的访问请求的指令, 如果第三判断单元 76 接收到了用户的允许指令, 则第三访问控制单元 75允许所述外部蓝牙 设备通过蓝牙方式访问本地蓝牙设备; 如果第三判断单元 76接收到了 用户的禁止指令, 则第三访问控制单元 75禁止所述外部蓝牙设备通过 蓝牙方式访问本地蓝牙设备。 If the second determining unit 74 determines that the access request of the current external Bluetooth device has been allowed by the user before the access, the second determining unit 74 determines the Whether the difference between the time of the access request of the secondary external Bluetooth device and the time when the user's permission command was last obtained is within a preset time difference. If the difference between the time of the access request of the external Bluetooth device and the time when the user's permission command was last obtained is within the preset time difference, the third access control unit 75 allows the external Bluetooth device to pass the Bluetooth. Access to local Bluetooth devices. If the second determining unit 74 determines that the difference between the time of the access request of the external Bluetooth device and the time when the user's permission command was last exceeded the preset time difference, the third determining unit 76 determines the local Bluetooth device again. Receiving an instruction of the user to allow an access request of the external Bluetooth device, if the third determining unit 76 receives the permission instruction of the user, the third access control unit 75 allows the external Bluetooth device to access the local Bluetooth device by using a Bluetooth mode; If the third determining unit 76 receives the prohibition instruction of the user, the third access control unit 75 prohibits the external Bluetooth device from accessing the local Bluetooth device by Bluetooth.
在安全模式设置模块 701 中的安全模式设置子模块 7011将安全模 式设定为低级安全模式的情况下, 外部蓝牙设备向本地蓝牙设备发出 访问请求, 本地蓝牙设备的安全模式处理模块 702 启用第四访问控制 单元 77。所述第四访问控制单元 77总是允许所述外部蓝牙设备通过蓝 牙方式访问本地蓝牙设备。  In the case where the security mode setting sub-module 7011 in the security mode setting module 701 sets the security mode to the low-level security mode, the external Bluetooth device issues an access request to the local Bluetooth device, and the security mode processing module 702 of the local Bluetooth device enables the fourth. Access control unit 77. The fourth access control unit 77 always allows the external Bluetooth device to access the local Bluetooth device in a Bluetooth mode.
本实施例提供了一种蓝牙设备, 提供至少两种蓝牙连接的安全模 式, 能够允许用户根据实际情况选择一种安全模式以决定外部蓝牙设 备的访问权限, 使用户可以使用符合自己需求的蓝牙连接的安全模式, 提升了用户体验。  The embodiment provides a Bluetooth device, which provides a security mode of at least two Bluetooth connections, and can allow the user to select a security mode according to actual conditions to determine the access rights of the external Bluetooth device, so that the user can use the Bluetooth connection that meets his needs. The security mode enhances the user experience.
本发明实施例主要用在各类使用蓝牙进行连接的设备中, 如: 具 有蓝牙功能的手机、 电脑、 车载工具等等。  The embodiments of the present invention are mainly used in various types of devices connected by using Bluetooth, such as: a mobile phone with a Bluetooth function, a computer, a vehicle tool, and the like.
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不 局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本 发明的保护范围应所述以权利要求的保护范围为准。  The above is only the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope of the present invention. It should be covered by the scope of the present invention. Therefore, the scope of the invention should be determined by the scope of the claims.

Claims

权 利 要 求 Rights request
1、 一种蓝牙连接的管理方法, 其特征在于, 包括:  A method for managing a Bluetooth connection, comprising:
根据用户选择, 设定安全模式;  Set the security mode according to the user's choice;
按照所选择的安全模式处理外部蓝牙设备对本地蓝牙设备的访问 请求。  The external Bluetooth device's access request to the local Bluetooth device is processed in accordance with the selected security mode.
2、 根据权利要求 1所述的蓝牙连接的管理方法, 其特征在于, 所 述设定安全模式包括: 在预先设置的至少两个安全模式中设定一种安 全模式。  2. The method of managing a Bluetooth connection according to claim 1, wherein the setting the security mode comprises: setting a security mode in at least two security modes set in advance.
3、 根据权利要求 2所述的蓝牙连接的管理方法, 其特征在于, 所 述至少两个安全模式包括禁止模式、 高级安全模式、 中级安全模式、 低级安全模式中任意两种或两种以上的组合。  The method for managing a Bluetooth connection according to claim 2, wherein the at least two security modes include any two or more of a forbidden mode, an advanced security mode, an intermediate security mode, and a low-level security mode. combination.
4、 根据权利要求 3所述的蓝牙连接的管理方法, 其特征在于, 所 选择的安全模式为禁止模式时, 按照所选择的安全模式处理外部蓝牙 设备对本地蓝牙设备的访问请求包括:  The method for managing a Bluetooth connection according to claim 3, wherein when the selected security mode is the forbidden mode, processing the access request of the external Bluetooth device to the local Bluetooth device according to the selected security mode comprises:
总是禁止所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设备。 The external Bluetooth device is always prohibited from accessing the local Bluetooth device via Bluetooth.
5、 根据权利要求 3所述的蓝牙连接的管理方法, 其特征在于, 所 选择的安全模式为高级安全模式时, 按照所选择的安全模式处理外部 蓝牙设备对本地蓝牙设备的访问请求包括: The method for managing a Bluetooth connection according to claim 3, wherein when the selected security mode is the advanced security mode, processing the access request of the external Bluetooth device to the local Bluetooth device according to the selected security mode comprises:
判断本地蓝牙设备是否接收到用户允许所述外部蓝牙设备的访问 请求的指令;  Determining whether the local Bluetooth device receives an instruction that the user allows an access request by the external Bluetooth device;
在本地蓝牙设备接收到用户的允许指令的情况下, 允许所述外部 蓝牙设备通过蓝牙方式访问本地蓝牙设备;  Allowing the external Bluetooth device to access the local Bluetooth device by Bluetooth when the local Bluetooth device receives the user's permission instruction;
在本地蓝牙设备接收到用户的禁止指令的情况下, 禁止所述外部 蓝牙设备通过蓝牙方式访问本地蓝牙设备。  In the case that the local Bluetooth device receives the prohibition instruction of the user, the external Bluetooth device is prohibited from accessing the local Bluetooth device by Bluetooth.
6、 根据权利要求 3所述的蓝牙连接的管理方法, 其特征在于, 所 选择的安全模式为中级安全模式时, 按照所选择的安全模式处理外部 蓝牙设备对本地蓝牙设备的访问请求包括:  The method for managing a Bluetooth connection according to claim 3, wherein when the selected security mode is the intermediate security mode, processing the access request of the external Bluetooth device to the local Bluetooth device according to the selected security mode comprises:
在此次外部蓝牙设备的访问请求之前得到过用户的允许指令时, 判断此次外部蓝牙设备的访问请求的时刻与上一次得到用户的允许指 令的时刻的差值是否在预设时间差之内;  When the user's permission command is obtained before the access request of the external Bluetooth device, whether the difference between the time of the access request of the external Bluetooth device and the time when the user's permission command was last obtained is within a preset time difference;
如果此次外部蓝牙设备的访问请求的时刻与上一次得到用户的允 许指令的时刻的差值在预设时间差之内, 允许外部蓝牙设备通过蓝牙 方式访问本地蓝牙设备; If the access request of the external Bluetooth device is the same as the last time the user is allowed The difference between the moments of the command is within a preset time difference, allowing the external Bluetooth device to access the local Bluetooth device via Bluetooth;
在所述外部蓝牙设备在此次访问请求前未得到用户的允许指令 时, 或是在此次外部蓝牙设备的访问请求的时刻与上一次得到用户的 允许指令的时刻的差值超出预设时间差时, 则判断本地蓝牙设备是否 接收到用户允许所述外部蓝牙设备的访问请求的指令;  When the external Bluetooth device does not obtain the permission instruction of the user before the access request, or the difference between the time of the access request of the external Bluetooth device and the time when the user's permission command was last obtained exceeds the preset time difference And determining, by the local Bluetooth device, an instruction that the user allows an access request of the external Bluetooth device;
在本地蓝牙设备接收到用户的允许指令的情况下, 允许所述外部 蓝牙设备通过蓝牙方式访问本地蓝牙设备;  Allowing the external Bluetooth device to access the local Bluetooth device by Bluetooth when the local Bluetooth device receives the user's permission instruction;
在本地蓝牙设备接收到用户的禁止指令的情况下, 禁止所述外部 蓝牙设备通过蓝牙方式访问本地蓝牙设备。  In the case that the local Bluetooth device receives the prohibition instruction of the user, the external Bluetooth device is prohibited from accessing the local Bluetooth device by Bluetooth.
7、 根据权利要求 3所述的蓝牙连接的管理方法, 其特征在于, 所 选择的安全模式为低级安全模式时, 按照所选择的安全模式处理外部 蓝牙设备对本地蓝牙设备的访问请求包括: 总是允许所述外部蓝牙设 备通过蓝牙方式访问本地蓝牙设备。  The method for managing a Bluetooth connection according to claim 3, wherein when the selected security mode is the low-level security mode, processing the external Bluetooth device's access request to the local Bluetooth device according to the selected security mode includes: The external Bluetooth device is allowed to access the local Bluetooth device through Bluetooth.
8、 一种蓝牙设备, 其特征在于, 包括:  8. A Bluetooth device, comprising:
安全模式设置模块, 用于根据用户选择, 设定安全模式;  a safety mode setting module for setting a safety mode according to a user selection;
安全模式处理模块, 用于按照所选择的一种安全模式处理外部蓝 牙设备对本地蓝牙设备的访问请求。  The security mode processing module is configured to process an access request of the external Bluetooth device to the local Bluetooth device according to the selected one of the security modes.
9、 根据权利要求 8所述的蓝牙设备, 其特征在于, 所述安全模式 设置模块还包括:  The Bluetooth device according to claim 8, wherein the security mode setting module further comprises:
安全模式设置子模块, 用于在预选设置的至少两个安全模式中设 定一种安全模式。  The safety mode setting sub-module is used to set a safety mode in at least two safety modes of the pre-selected settings.
1 0、 根据权利要求 9 所述的蓝牙设备, 其特征在于, 所述安全模 式设置模块中预先设置的至少两个安全模式包括禁止模式、 高级安全 模式、 中级安全模式、 低级安全模式中任意两种或两种以上的组合。  The Bluetooth device according to claim 9, wherein at least two security modes preset in the security mode setting module include any two of a forbidden mode, an advanced security mode, an intermediate security mode, and a low-level security mode. Kind or a combination of two or more.
1 1、 根据权利要求 1 0所述的蓝牙设备, 其特征在于, 安全模式设 置模块选择的安全模式为禁止模式时, 安全模式处理模块包括:  1 . The Bluetooth device according to claim 10, wherein when the security mode selected by the security mode setting module is a forbidden mode, the security mode processing module includes:
第一访问控制单元, 用于禁止所述外部蓝牙设备通过蓝牙方式访 问本地蓝牙设备。  The first access control unit is configured to prohibit the external Bluetooth device from accessing the local Bluetooth device by using a Bluetooth mode.
1 2、 根据权利要求 1 0所述的蓝牙设备, 其特征在于, 安全模式设 置模块所选择的安全模式为高级安全模式时, 安全模式处理模块包括: 第一判断单元, 用于判断是否接收到本地蓝牙设备的用户允许所 述外部蓝牙设备的访问请求的指令; The Bluetooth device according to claim 10, wherein when the security mode selected by the security mode setting module is the advanced security mode, the security mode processing module includes: a first determining unit, configured to determine whether an instruction of the user of the local Bluetooth device is allowed to access the external Bluetooth device;
第二访问控制单元, 用于在本地蓝牙设备接收到用户的允许指令 的情况下, 允许所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设备; 所述第二访问控制单元还用于在本地蓝牙设备接收到用户的禁止 指令的情况下, 禁止所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设 备。  a second access control unit, configured to allow the external Bluetooth device to access the local Bluetooth device by using a Bluetooth device when the local Bluetooth device receives the permission instruction of the user; the second access control unit is further configured to use the local Bluetooth device When the user's prohibition instruction is received, the external Bluetooth device is prohibited from accessing the local Bluetooth device through Bluetooth.
1 3、 根据权利要求 10所述的蓝牙设备, 其特征在于, 安全模式设 置模块所选择的安全模式为中级安全模式时, 安全模式处理模块包括: 第二判断单元, 用于在此次外部蓝牙设备的访问请求之前得到过 用户的允许指令时, 判断此次外部蓝牙设备的访问请求的时刻与上一 次得到用户的允许指令的时刻的差值是否在预设时间差之内;  The Bluetooth device according to claim 10, wherein when the security mode selected by the security mode setting module is the intermediate security mode, the security mode processing module includes: a second determining unit, configured to use the external Bluetooth Whether the difference between the time of the access request of the external Bluetooth device and the time of the last time the user's permission command was obtained is within a preset time difference when the user's permission request is obtained before the access request of the device;
第三访问控制单元, 用于在此次外部蓝牙设备的访问请求的时刻 与上一次得到用户的允许指令的时刻的差值在预设时间差之内时, 允 许外部蓝牙设备通过蓝牙方式访问本地蓝牙设备;  The third access control unit is configured to allow the external Bluetooth device to access the local Bluetooth through the Bluetooth mode when the difference between the time of the access request of the external Bluetooth device and the time when the user's permission command was last obtained is within a preset time difference Equipment
第三判断单元, 用于在所述外部蓝牙设备在此次访问请求前未得 到用户的允许指令, 或是在此次外部蓝牙设备的访问请求的时刻与上 一次得到用户的允许指令的时刻的差值超出预设时间差时, 判断本地 蓝牙设备是否接收到用户允许所述外部蓝牙设备的访问请求的指令; 所述第三访问控制单元还用于在本地蓝牙设备接收到用户的允许 指令的情况下, 允许所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设 备;  a third determining unit, configured to: when the external Bluetooth device does not obtain an allowed instruction of the user before the access request, or at a time of the access request of the external Bluetooth device and a time when the user's permission instruction is obtained last time When the difference exceeds the preset time difference, determining whether the local Bluetooth device receives an instruction that the user allows the access request of the external Bluetooth device; the third access control unit is further configured to: when the local Bluetooth device receives the permission instruction of the user And allowing the external Bluetooth device to access the local Bluetooth device by using Bluetooth;
所述第三访问控制单元还用于在本地蓝牙设备接收到用户的禁止 指令的情况下, 禁止所述外部蓝牙设备通过蓝牙方式访问本地蓝牙设 备。  The third access control unit is further configured to prohibit the external Bluetooth device from accessing the local Bluetooth device by using a Bluetooth mode when the local Bluetooth device receives the prohibition instruction of the user.
14、 根据权利要求 10所述的蓝牙设备, 其特征在于, 安全模式设置 模块所选择的安全模式为低级安全模式时, 安全模式处理模块包括: 第 四访问控制单元, 用于总是允许所述外部蓝牙设备通过蓝牙方式访问本 地蓝牙设备。 The Bluetooth device according to claim 10, wherein when the security mode selected by the security mode setting module is a low-level security mode, the security mode processing module includes: a fourth access control unit, configured to always allow the The external Bluetooth device accesses the local Bluetooth device via Bluetooth.
PCT/CN2011/084469 2010-12-22 2011-12-22 Method and device for managing bluetooth connection WO2012083871A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010601414.1 2010-12-22
CN201010601414.1A CN102075217B (en) 2010-12-22 2010-12-22 Method for managing Bluetooth connection and equipment

Publications (1)

Publication Number Publication Date
WO2012083871A1 true WO2012083871A1 (en) 2012-06-28

Family

ID=44033580

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/084469 WO2012083871A1 (en) 2010-12-22 2011-12-22 Method and device for managing bluetooth connection

Country Status (2)

Country Link
CN (1) CN102075217B (en)
WO (1) WO2012083871A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108416207A (en) * 2018-03-07 2018-08-17 北京元心科技有限公司 Bluetooth access right discrimination method, device and mobile terminal

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075217B (en) * 2010-12-22 2014-04-30 华为终端有限公司 Method for managing Bluetooth connection and equipment
CN104517071B (en) * 2015-01-16 2017-04-05 宇龙计算机通信科技(深圳)有限公司 System processing method, system processing meanss and terminal
CN105224830B (en) * 2015-09-21 2018-03-30 广州碧德电子科技有限公司 A kind of communication software authorizing secure management method
CN108319442B (en) * 2018-01-23 2019-12-10 维沃移动通信有限公司 Audio playing control method and mobile terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1647053A (en) * 2002-04-11 2005-07-27 国际商业机器公司 Computer, computer security setting method, and program
CN1691812A (en) * 2004-04-28 2005-11-02 株式会社Ntt都科摩 Mobile station and communication control method
CN101026394A (en) * 2006-02-08 2007-08-29 三星电子株式会社 Method and apparatus for secured communication between bluetooth devices
US20080076392A1 (en) * 2006-09-22 2008-03-27 Amit Khetawat Method and apparatus for securing a wireless air interface
CN102075217A (en) * 2010-12-22 2011-05-25 华为终端有限公司 Method for managing Bluetooth connection and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1647053A (en) * 2002-04-11 2005-07-27 国际商业机器公司 Computer, computer security setting method, and program
CN1691812A (en) * 2004-04-28 2005-11-02 株式会社Ntt都科摩 Mobile station and communication control method
CN101026394A (en) * 2006-02-08 2007-08-29 三星电子株式会社 Method and apparatus for secured communication between bluetooth devices
US20080076392A1 (en) * 2006-09-22 2008-03-27 Amit Khetawat Method and apparatus for securing a wireless air interface
CN102075217A (en) * 2010-12-22 2011-05-25 华为终端有限公司 Method for managing Bluetooth connection and equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108416207A (en) * 2018-03-07 2018-08-17 北京元心科技有限公司 Bluetooth access right discrimination method, device and mobile terminal
CN108416207B (en) * 2018-03-07 2022-09-16 北京元心科技有限公司 Bluetooth use permission identification method and device and mobile terminal

Also Published As

Publication number Publication date
CN102075217B (en) 2014-04-30
CN102075217A (en) 2011-05-25

Similar Documents

Publication Publication Date Title
US11089476B2 (en) Network access control method and apparatus
US10848946B2 (en) Network access method, device, and system
CN104966340B (en) Access control system, access control method and cloud service platform
WO2012083871A1 (en) Method and device for managing bluetooth connection
US9198040B2 (en) Deploying wireless docking as a service
GB2519263B (en) Prioritized token based arbiter and method
JP6159475B2 (en) Access control method and apparatus
EP3185619B1 (en) Method and device for connecting to network
KR20160114620A (en) Methods, devices and systems for dynamic network access administration
US7917653B2 (en) SyncML data sync system and data exchanging method for data exchange between clients
CN105282868B (en) System and method for WiFi network to be temporarily added
US11722483B2 (en) Structure-based access control
CN105933854A (en) Method, system and device for realizing machine to machine service
JP2021511604A (en) Vehicle cloud bonding system and method
JP5472027B2 (en) Wireless communication device and peripheral device having the same
US20140123229A1 (en) Antenna/actuation key assembly
WO2017031855A1 (en) Playing device grouping control method and user terminal
WO2010124564A1 (en) Home network, equipment information share method among the home networks, and home network system
CN107659932B (en) Equipment access method and device
WO2016033889A1 (en) Terminal, wireless access device and triggering method, and system
WO2018053989A1 (en) Volte-based remote control establishment method and apparatus
KR20190012736A (en) Internet of Things and a control setting method of the Internet of Things
US20220277061A1 (en) Method for providing iot devices access to restricted access information
WO2023000225A1 (en) Wireless communication method, station device, and access point device
US9088489B2 (en) Simplified activation and management of wireless wide area network (WWAN) account

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11850290

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11850290

Country of ref document: EP

Kind code of ref document: A1