[go: up one dir, main page]

CN110139274A - A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium - Google Patents

A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium Download PDF

Info

Publication number
CN110139274A
CN110139274A CN201910152196.9A CN201910152196A CN110139274A CN 110139274 A CN110139274 A CN 110139274A CN 201910152196 A CN201910152196 A CN 201910152196A CN 110139274 A CN110139274 A CN 110139274A
Authority
CN
China
Prior art keywords
information
bluetooth
equipment
authentication
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910152196.9A
Other languages
Chinese (zh)
Inventor
李封翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yujie Technology Co Ltd
Original Assignee
Shanghai Yujie Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yujie Technology Co Ltd filed Critical Shanghai Yujie Technology Co Ltd
Priority to CN201910152196.9A priority Critical patent/CN110139274A/en
Publication of CN110139274A publication Critical patent/CN110139274A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present embodiments relate to the field of wireless connection, the method for authenticating of bluetooth equipment a kind of, electronic equipment and can storage medium are disclosed.In the present invention, the method for authenticating of bluetooth equipment is applied to bluetooth equipment, comprising: prestore at least two sets of facility informations;It is authenticated when needing distribution with gateway, wherein, corresponding facility information is extracted according to built-in identification information, the verification information of bluetooth equipment is obtained by extracted facility information, the verification information of the verification information of bluetooth equipment and gateway is compared, determine whether that the authentication is passed according to comparison result, wherein identification information can be modified;Whether passed through according to authentication, it is determined whether connect with gateway, so that the application scenarios of bluetooth equipment are more extensive.

Description

Authentication method of Bluetooth device, electronic device and storage medium
Technical Field
The embodiment of the invention relates to the field of wireless connection, in particular to an authentication method of Bluetooth equipment, electronic equipment and a storable medium.
Background
A wireless network (wireless network) is a network implemented by using a wireless communication technology, and in the prior art, a mesh network is formed by wireless networks, and each device in the mesh network can be accessed only by authentication.
The Bluetooth technology was introduced in 1998, which is characterized by high traffic, and is mainly used for wireless earphones and wireless speakers, and the Bluetooth low-power consumption specification BLE was introduced in about 2000, and now: 1. point-to-point with low power consumption, such as sports health product applications, 2. one-to-many broadcast, such as beacon, 3. many-to-many mesh technology. The existing bluetooth technology is applied to the internet of things, and a plurality of bluetooth devices are used as nodes to form a network.
The inventor finds that at least the following problems exist in the prior art: the Bluetooth equipment is internally provided with information for authentication when leaving a factory, and when the Bluetooth equipment is accessed to a certain mesh network, the information is used for authentication, but manufacturers of the Bluetooth equipment are different, and the equipment can only be networked with equipment adopting the same authentication strategy, so that the application range of products is greatly limited, and the range of products selected by users is also limited.
Disclosure of Invention
The embodiment of the invention aims to provide an authentication method of a Bluetooth device, an electronic device and a storage medium, so that the application scene of the Bluetooth device is wider.
In order to solve the above technical problem, an embodiment of the present invention provides an authentication method for a bluetooth device, which is applied to the bluetooth device, and includes: at least two sets of equipment information are prestored; authenticating with gateway equipment when a network needs to be distributed, wherein corresponding equipment information is extracted according to built-in identification information, verification information of Bluetooth equipment is obtained through the extracted equipment information, the verification information of the Bluetooth equipment is compared with the verification information of the gateway equipment, whether authentication is passed or not is determined according to a comparison result, and the identification information can be modified; and determining whether to connect with the gateway equipment according to whether the authentication is passed or not.
An embodiment of the present invention also provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of authenticating a bluetooth device as described above.
Embodiments of the present invention also provide a computer-readable storage medium storing a computer program, which when executed by a processor implements the above-mentioned method for authenticating a bluetooth device.
Compared with the prior art, the implementation mode of the invention has the main differences and the effects that: the method comprises the steps that a plurality of sets of equipment information are prestored in the Bluetooth equipment, the required set of equipment information is selected when authentication is needed, the equipment information is converted into verification information, and the converted verification information is compared with gateway equipment, so that whether the authentication passes or not is determined. Because the Bluetooth equipment is internally provided with a plurality of sets of equipment information, the equipment information can be selected according to the identification information, and different verification information can be obtained by modifying the identification information, so that authentication of different strategies is carried out, and the application scenes of the Bluetooth equipment are widened.
As a further improvement, the device information is pre-stored at factory configuration. The source of the equipment information is determined, the equipment information is prestored in factory configuration, and the operation is simple.
As a further improvement, the identity information includes: MAC addresses and keys.
As a further improvement, the verification information is determined by a hash value generated after the MAC address and the secret key are subjected to hash operation. In the embodiment, the information is verified by utilizing the Hash operation definitely, the verification information is used for comparison, and the safety is better by adopting the Hash value.
As a further improvement, the built-in identification information can be modified by the mobile terminal. The embodiment can be definitely modified through the mobile terminal, and is convenient for the user to operate.
As a further improvement, the built-in identification information may be modified by receiving a broadcast from the mobile terminal. The embodiment can definitely modify the form of the broadcast sent by the mobile terminal, so that the modification process is accurate and feasible.
As a further improvement, the identification information comprises N types, and each type of identification information corresponds to one set of equipment information.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flowchart of an authentication method of a bluetooth device according to a first embodiment of the present invention;
fig. 2 is a flowchart of an authentication process in an authentication method of a bluetooth device according to a first embodiment of the present invention;
fig. 3 is a schematic diagram of a bluetooth bulb in the authentication method of the bluetooth device according to the first embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to a fourth embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not constitute any limitation to the specific implementation manner of the present invention, and the embodiments may be mutually incorporated and referred to without contradiction.
A first embodiment of the present invention relates to an authentication method of a bluetooth device.
The embodiment is applied to a Bluetooth device, which is an electronic device with a built-in Bluetooth chip, such as a Bluetooth bulb, a Bluetooth microphone, a Bluetooth earphone, a Bluetooth remote controller, etc. In this embodiment, a bluetooth device is taken as an example of a bluetooth bulb for specific description.
The inventor of the present application finds that when the same device needs to access different platforms, the software and hardware of the device may be completely the same, but because the authentication keys of different platform vendors are different, the device cannot be switched to the B platform after performing key adaptation for the a platform.
The flow of the authentication method of the bluetooth device in this embodiment is shown in fig. 1, which specifically includes the following steps:
step 101, two sets of equipment information are prestored.
Specifically, the device information in the present embodiment may include: the product identifier (such as a product ID), the MAC address, and the secret key may be pre-stored in factory configuration.
And 102, authenticating with the gateway equipment when the network needs to be distributed.
Specifically, when the bluetooth bulb is to be connected to a network, authentication with a grid device in the network is required, and in practical application, the bluetooth bulb can be set to be in a distribution network when being powered on. The authentication process in this step is specifically shown in fig. 2, and includes the following steps:
step 1021, extracting the corresponding device information according to the built-in identification information.
In particular, the identification information may be modified. As shown in fig. 3, it is assumed that the bluetooth bulb in this embodiment may be connected to a gateway device in the first network on the left side, which may be a bluetooth speaker as shown in the figure, or a gateway device in the second network on the right side, which may be a router as shown in the figure. The gateway device is connected with the server through the cloud end, and can request information for verification from the server.
Furthermore, the identification information has multiple types, each type of identification information may correspond to a set of device information, for example, when the identification information is "1", the corresponding device information is used for authentication for accessing the first network, and when the identification information is "2", the corresponding device information is used for authentication for accessing the second network.
Continuing to explain, the identification information may be set at a predetermined position of the memory, and when a network needs to be distributed, the identification information may be extracted from the predetermined position, and then the device information that needs to be adopted at present is determined according to the corresponding relationship between the identification information and the device information.
In step 1022, the verification information of the bluetooth bulb is obtained through the extracted device information.
Specifically, the verification information is determined by a hash value generated after the hash operation is performed on the MAC address and the key, and in practical application, the SHA256 algorithm may be used as the hash algorithm.
And step 1023, comparing the verification information of the Bluetooth device with the verification information of the gateway device.
In practical application, when the gateway device scans the MAC address of the bluetooth bulb, the gateway device queries the key of the device from the server through the MAC address, generates a hash value by using data composed of the MAC address and the key of the device, and also adopts the SHA256 algorithm. As shown in fig. 3, if the bluetooth speaker scans the MAC address of a certain bluetooth bulb, the key of the bluetooth bulb is obtained by querying the first server through the MAC address, and the obtained hash value is used as the verification information to be compared by using the SHA256 hash algorithm in combination with the scanned MAC address.
And step 1024, determining whether the authentication is passed according to the comparison result.
Specifically, the comparison result is determined to be the authentication pass if the comparison result is consistent, and the comparison result is determined to be the authentication fail if the comparison result is inconsistent.
In summary, the above steps 1021 to 1024 specifically describe how the bluetooth bulb authenticates with the gateway device when needing to join the network.
And 103, determining whether to connect with the gateway equipment according to whether the authentication is passed or not.
Specifically, if the authentication is passed, the gateway device is connected, and the corresponding network can be accessed.
It can be seen that, compared with the prior art, in the embodiment, multiple sets of device information are pre-stored in the bluetooth device, the required set of device information is selected when authentication is required, the device information is converted into verification information, and the converted verification information is compared with the gateway device, so that whether the authentication passes or not is determined. Because the Bluetooth equipment is internally provided with a plurality of sets of equipment information, the equipment information can be selected according to the identification information, and different verification information can be obtained by modifying the identification information, so that authentication of different strategies is carried out, and the application scenes of the Bluetooth equipment are widened. The hash operation is also used for verifying information definitely, the verification information is used for comparison, and the safety is better by adopting a hash value.
In addition, it should be noted that, in this embodiment, a bluetooth bulb is taken as an example, and in practical applications, bluetooth devices may be other devices, such as a bluetooth microphone, a bluetooth earphone, and the like.
A second embodiment of the present invention relates to an authentication method of a bluetooth device. The second embodiment is a further improvement on the first embodiment, and the main improvement is that in the second embodiment of the invention, the built-in identification information can be modified through the mobile terminal, so that the operation of a user is more convenient.
Specifically, when the identification information needs to be modified, the mobile terminal is used for sending the Bluetooth broadcast carrying the switching instruction, the MAC address or the identification number of the Bluetooth device is used as the identification code of a broadcast receiver, the Bluetooth device receives the broadcast carrying the MAC address or the identification number of the Bluetooth device, obtains the switching instruction after analysis, and directly discards the broadcast if the broadcast carrying the MAC address or the identification number which is not consistent with the MAC address or the identification number is received.
Therefore, the embodiment can realize the modification of the identification information in the Bluetooth equipment without connecting the mobile terminal of the user with the Bluetooth equipment, and the modification process is simple and easy to realize.
A third embodiment of the present invention relates to an authentication method of a bluetooth device. The third embodiment is substantially the same as the first embodiment, and mainly differs therefrom in that: in the first embodiment, two sets of device information are prestored in the bluetooth device. In the second embodiment of the present invention, three sets of device information are pre-stored in the bluetooth device, so that the bluetooth device can be applied to networks with more authentication strategies.
Specifically, in the embodiment, three sets of device information are prestored in the bluetooth device, and correspondingly, there are three types of identification information, the bluetooth device respectively corresponds to different device information through multiple types of identification information, the identification information is set according to a network to be accessed, and then, when a network needs to be distributed, the corresponding device information is extracted according to the identification information.
Therefore, the bluetooth device in this embodiment prestores more sets of device information, so that the bluetooth device can be applied to networks with more authentication strategies.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
A fourth embodiment of the present invention relates to an electronic apparatus, as shown in fig. 4, including:
at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to perform the method for authenticating a bluetooth device as described in any one of the first to third embodiments.
Where the memory and processor are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting together one or more of the various circuits of the processor and the memory. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the processor. The processor is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And the memory may be used to store data used by the processor in performing operations.
A fifth embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program realizes the above-described method embodiments when executed by a processor.
That is, as can be understood by those skilled in the art, all or part of the steps in the method according to the above embodiments may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (9)

1. An authentication method of a Bluetooth device, which is applied to the Bluetooth device, includes:
at least two sets of equipment information are prestored;
authenticating with gateway equipment when a network needs to be distributed, wherein corresponding equipment information is extracted according to built-in identification information, verification information of Bluetooth equipment is obtained through the extracted equipment information, the verification information of the Bluetooth equipment is compared with the verification information of the gateway equipment, whether authentication is passed or not is determined according to a comparison result, and the identification information can be modified;
and determining whether to connect with the gateway equipment according to whether the authentication is passed or not.
2. The method of claim 1, wherein the device information is pre-stored in a factory configuration.
3. The method of claim 1, wherein the identity information comprises: MAC addresses and keys.
4. The authentication method of the bluetooth device according to claim 3, wherein the verification information is determined by a hash value generated by hashing the MAC address and the secret key.
5. The authentication method of the bluetooth device according to claim 1, wherein the built-in identification information is modifiable by a mobile terminal.
6. The method of claim 5, wherein the built-in identification information is modified by receiving a broadcast from a mobile terminal.
7. The method for authenticating the Bluetooth device of any one of claims 1 to 6, wherein the identification information includes N types, and each type of identification information corresponds to a set of device information.
8. An electronic device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of authenticating a bluetooth device as claimed in any one of claims 1 to 7.
9. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the method of authenticating a bluetooth device according to any one of claims 1 to 7.
CN201910152196.9A 2019-02-28 2019-02-28 A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium Pending CN110139274A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910152196.9A CN110139274A (en) 2019-02-28 2019-02-28 A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910152196.9A CN110139274A (en) 2019-02-28 2019-02-28 A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium

Publications (1)

Publication Number Publication Date
CN110139274A true CN110139274A (en) 2019-08-16

Family

ID=67568486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910152196.9A Pending CN110139274A (en) 2019-02-28 2019-02-28 A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium

Country Status (1)

Country Link
CN (1) CN110139274A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333677A (en) * 2019-11-19 2021-02-05 杭州智缤科技有限公司 Safe communication method of low-power-consumption Bluetooth
CN113840266A (en) * 2020-06-24 2021-12-24 华为技术有限公司 Bluetooth pairing method, device, system, electronic equipment and storage medium
WO2022061668A1 (en) * 2020-09-24 2022-03-31 Oppo广东移动通信有限公司 Bluetooth device access authentication method, and electronic device and storage medium
CN114666154A (en) * 2022-04-08 2022-06-24 深圳市欧瑞博科技股份有限公司 Device communication method, apparatus, gateway, device, system, medium and product

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333677A (en) * 2019-11-19 2021-02-05 杭州智缤科技有限公司 Safe communication method of low-power-consumption Bluetooth
CN112333677B (en) * 2019-11-19 2022-08-19 杭州智缤科技有限公司 Safe communication method of low-power-consumption Bluetooth
CN113840266A (en) * 2020-06-24 2021-12-24 华为技术有限公司 Bluetooth pairing method, device, system, electronic equipment and storage medium
CN113840266B (en) * 2020-06-24 2024-05-03 华为技术有限公司 Bluetooth pairing method, device, system, electronic equipment and storage medium
WO2022061668A1 (en) * 2020-09-24 2022-03-31 Oppo广东移动通信有限公司 Bluetooth device access authentication method, and electronic device and storage medium
CN114666154A (en) * 2022-04-08 2022-06-24 深圳市欧瑞博科技股份有限公司 Device communication method, apparatus, gateway, device, system, medium and product
CN114666154B (en) * 2022-04-08 2023-11-24 深圳市欧瑞博科技股份有限公司 Device communication method, device, gateway, device, system, medium and product

Similar Documents

Publication Publication Date Title
US10579790B2 (en) Authentication of a device
US9154503B2 (en) Authorization method and terminal device
KR20130129373A (en) Pre-association discovery
CN110139274A (en) A kind of method for authenticating of bluetooth equipment, electronic equipment and can storage medium
US9154483B1 (en) Secure device configuration
US11019489B2 (en) Automatically connecting to a secured network
WO2021259015A1 (en) Method for connecting bluetooth key to vehicle, vehicle bluetooth system, and bluetooth key
CN112533206A (en) Network distribution method and device, storage medium and electronic equipment
CN110099427A (en) A kind of method and system to distribution net equipment access network hotspot equipment
US10285054B2 (en) Method and system for storing and accessing client device information in a distributed set of nodes
US10863559B2 (en) Method and apparatus for communicating in a wireless communication network
CN108293055A (en) Method, apparatus and system for authenticating to mobile network and for by the server of device authentication to mobile network
US20140286323A1 (en) Wireless network system and connecting method thereof
CN101616414A (en) Method, system and server for terminal authentication
US9306921B2 (en) Method and system for storing and accessing client device information in a distributed set of nodes
CN116888922A (en) Service authorization method, system and communication device
US8989380B1 (en) Controlling communication of a wireless communication device
WO2021134562A1 (en) Configuration device replacement method and apparatus, device, and storage medium
CN107113615B (en) Authentication method and system for Access Point (AP) and related equipment
CN114390521A (en) Key updating method, device, equipment and storage medium
CN119696842A (en) Correlation control method and correlation device
CN110602693A (en) Networking method and equipment of wireless network
WO2022094936A1 (en) Access method, device, and cloud platform device
CN113489631A (en) Equipment network configuration method, intelligent equipment and storage medium
WO2022147843A1 (en) Access authentication method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190816