WO2012116544A1 - 一种蓝牙连接方法及系统 - Google Patents
一种蓝牙连接方法及系统 Download PDFInfo
- Publication number
- WO2012116544A1 WO2012116544A1 PCT/CN2011/079659 CN2011079659W WO2012116544A1 WO 2012116544 A1 WO2012116544 A1 WO 2012116544A1 CN 2011079659 W CN2011079659 W CN 2011079659W WO 2012116544 A1 WO2012116544 A1 WO 2012116544A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- server
- bluetooth
- client
- idi
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/18—Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/04—Details of telephonic subscriber devices including near field communication means, e.g. RFID
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present invention relates to Bluetooth technology for wireless communication, and in particular, to a Bluetooth connection method and system. Background technique
- Bluetooth is a radio technology that supports short-range communication of devices. With a typical communication distance of 10m, Bluetooth can wirelessly communicate between many devices including mobile phones, PDAs, wireless headsets, notebook computers, and related peripherals. exchange. With Bluetooth technology, communication between mobile communication terminal devices can be effectively simplified, and communication between the device and the Internet can be successfully simplified, thereby making data transmission more rapid and efficient, and broadening the path for wireless communication.
- Bluetooth uses a decentralized network structure, fast frequency hopping and short packet technology to support point-to-point and point-to-multipoint communication. It operates in the global 2.4GHz ISM (Industrial Scientific Medical) band with a data rate of 1Mbps and time division duplexing. The transmission scheme implements full duplex transmission.
- the Service Discovery Protocol is also called Bluetooth SDP, which is used to provide specific meanings of applications in the Bluetooth environment, to discover which services are available and to determine the characteristics of available services. .
- SDP defines a method for a Bluetooth client to discover available Bluetooth server services and features.
- the Bluetooth service attributes are shown in Table 1:
- SDP uses a client/server model and a request/response mechanism, as shown in Figure 1, on the server.
- the record of the service is saved, the client initiates a transaction by requesting a Protocol Data Unit (PDU), and the server returns a response protocol data unit to respond to the request.
- PDU Protocol Data Unit
- Each SDP PDU includes a PDU header (Header) and a PDU-specific parameter (Parmeter ); the PDU header includes three fields: a PDU identifier (PDU ID), a Transaction ID (Transaction ID), and a Parameter Length (Parameter Length). Specifically as shown in Figure 2.
- PDU ID is used to distinguish the type of the PDU, so as to determine the meaning of the PDU and correctly parse its parameters.
- the PDU ID specification and its corresponding value are shown in Table 2;
- the Transaction ID is used to distinguish the PDUs of different requests. When receiving the response PDU, it determines whether it is the response of the corresponding request PDU according to the Transaction ID of the response PDU.
- the specific judgment principle is as follows: The SDP client selects the Transaction ID of the existing request PDU. Different arbitrary values are used as the Transaction ID of a request PDU.
- the Transaction ID contained in the response PDU must be the same as the Transaction ID of the corresponding request PDU.
- the Parameter Length field indicates the total length (in bytes) of the parameters carried by the PDU.
- Radio Frequency Identification is a non-contact automatic identification technology that automatically identifies target objects and acquires relevant data through radio frequency signals. The identification work can be performed in various harsh environments without manual intervention. RFID technology recognizes high-speed moving objects and recognizes multiple labels at the same time, making operation quick and easy. RFID is a simple wireless system, through Often consists of at least one interrogator (or reader) and multiple transponders (or tags). This system is often used to control, detect and track objects.
- Bluetooth and RFID technologies are two very promising options.
- Bluetooth can interact with other devices in the effective range to collect information or issue commands.
- the current mode of Bluetooth connection usually has a disadvantage, that is, it is necessary to query the Bluetooth device and the query service before establishing a Bluetooth connection, and it takes a dozen seconds or even two or thirty seconds to complete the above query; As such, the above query also requires human involvement. Therefore, the currently widely used mode of Bluetooth connectivity does not satisfactorily meet the requirements of simple, fast connection in communication terminals and constantly changing environments. Summary of the invention
- the main object of the present invention is to provide a method and system for Bluetooth connection, which can realize fast connection of a Bluetooth service.
- a Bluetooth connection method comprising:
- the client reads the information stored in the RFID card
- the method further includes: storing the Bluetooth address and the ID value of the RFID card to the RFID card.
- the establishing a Bluetooth connection with the server according to the read information is:
- the challenge/response mechanism of the SDP service search, and RFID are used to perform Bluetooth authentication with the server, and the Bluetooth connection is established when the authentication is passed.
- the challenge/response mechanism and the RFID using the SDP service search and the Bluetooth authentication with the server are:
- the server generates a random number R, and sends R and the query message Query to the client;
- the server forwards the received H(ID) and H(ID II R) and R to the back-end database; the database calculates H(ID*i) and passes the service according to the received data and the list stored by itself. Forwarded to the client;
- the client compares whether the received H(ID*i) and the calculated H(ID*) are equal. When they are equal, the ID value in the RFID card is updated to ID*, and the Bluetooth authentication is passed.
- the database calculates H(ID*i) according to the received data and a list stored by itself:
- the method further includes: the database determining whether the calculated associated pointer of the H(ID*i) in the list is 0, and is 0. Then add a new record; if not 0, modify the record pointed to by the associated pointer.
- the method further includes: determining that the current client is an unauthorized terminal when not equal.
- a Bluetooth connection system comprising: an RFID card, a client, and a server; wherein
- the client is configured to read information stored in the RFID card, and establish a Bluetooth connection with the server according to the read information.
- the RFID card is configured to store a Bluetooth address and an ID value of the RFID card.
- the client is specifically configured to use the SDP service search according to the read information. Cable challenge/response mechanism, as well as RFID, Bluetooth authentication with the server, and Bluetooth connection when authentication passes.
- system further includes a database
- the server is configured to generate a random number R, send the R and the query message Query to the client, and forward the R, the H (ID) and the H (ID II R) sent by the client to the server.
- a database configured to calculate H(ID*i) according to the received data and a list stored by itself, and forward it to the client through the server;
- the database is further configured to determine whether the calculated associated pointer of the H(ID*i) in the list is 0, if it is 0, a new record is added; if not, the record pointed to by the associated pointer is added. to modify.
- the invention stores the Bluetooth address and the ID value of the RFID card in the RFID card.
- the client reads the information stored in the RFID card
- the client directly uses the SDP service search to interact with the server, thereby realizing the search during the Bluetooth service.
- Automatically complete the purpose of Bluetooth authentication thus establishing a secure and reliable Bluetooth connection; this method greatly reduces the time for establishing a Bluetooth connection, making the application of the Bluetooth service simpler and faster, lower in cost, more efficient, and easy to promote Can also be widely applied to industrial control, business management, home life, etc., especially in the blue that requires safety certification More suitable for dental applications.
- Figure 1 is a schematic diagram of the structure of the SDP client/server model
- FIG. 2 is a schematic diagram of a format of a PDU
- FIG. 3 is a schematic flowchart diagram of a Bluetooth connection method provided by the present invention.
- FIG. 4 is a schematic flowchart of a specific embodiment of a Bluetooth connection method provided by the present invention
- FIG. 5 is a schematic diagram of interaction of PDU packets searched by an SDP service
- FIG. 6 is a schematic diagram of a process of Bluetooth authentication provided by the present invention.
- FIG. 7 is a time comparison diagram of a Bluetooth connection method provided by the present invention and a conventional Bluetooth connection method. detailed description
- the client reads the information stored in the RFID card; and establishes a Bluetooth connection with the server according to the read information.
- FIG. 3 shows the flow of the Bluetooth connection method of the present invention. As shown in FIG. 3, the method includes the following steps:
- Step 301 The client reads information pre-stored in the RFID card.
- the RFID card records seven bytes of data, wherein the six bytes of data are Bluetooth addresses, and one byte of data is the ID value of the initialized RFID card; it should be noted that the ID value initialized here is not RFID.
- the unique ID value configured at the factory, but a pre-stored random number for Bluetooth authentication;
- Step 302 The client establishes a Bluetooth connection with the server according to the read information.
- the client and the server use the challenge/response mechanism of the SDP service search, and use the RFID to perform Bluetooth authentication with the server, if the authentication Via, establish a Bluetooth connection.
- FIG. 4 shows a flow of a specific embodiment of a Bluetooth connection method provided by the present invention. As shown in FIG. 4, the embodiment includes the following steps:
- Step 401 Store the Bluetooth address and the ID value information of the RFID card into the RFID card.
- Step 402 The client reads the information stored in the RFID card to obtain the Bluetooth address. In this step, the client acquires a 48-bit bit.
- Bluetooth address which defines a communication terminal that uniquely identifies a Bluetooth device.
- Step 403 The client uses the challenge/response mechanism of the SDP service search, the RFID card, performs a Bluetooth service search according to the read information, performs Bluetooth authentication at the same time, and establishes a Bluetooth connection through the authentication;
- the client sends the RADIUS packet interaction with the server, sends the information required for the Bluetooth authentication, completes the Bluetooth authentication, and establishes a Bluetooth connection.
- SDP is an application layer protocol
- L2CAP Logical Link Control and Adaptation Protocol
- the Bluetooth authentication part in the Bluetooth connection method provided by the present invention is further described in detail below with reference to FIG. 5 and FIG. 6.
- the description is made on the case where the RFID card is independent of the client, so as to more clearly understand the process of Bluetooth authentication. It should be understood that in practical applications, the RFID card can also be located in the client.
- Step 61 The client reads an ID value stored in the RFID card.
- Step 62 After receiving the SDP service search request (SDP_ServiceSearchRequest) sent by the client, the server generates a random number R, and adds the random number R and the query message Query to the SDP service search response (SDP_ServiceSearchResponse) and returns it to the client. ;
- the SDP_ServiceSearchRequest sent by the specific client is sent by the server.
- the SDP_ServiceSearchResponse port is shown in Figure 5.
- Step 64 The server forwards the received H(ID) and H(ID II R) and the generated random number R to the database in the background;
- Step 65 The database calculates H(ID*i) according to the received data and the stored list, and sends the data to the server;
- the pre-stored list in the database is (H(IDi), IDi, Pointeri), where the primary key is H(ID), and the ID is an ID of an electronic tag authorized to establish a Bluetooth connection with the server, H(ID)
- H(ID) For the calculated value of a one-way hash function, Pointer is an associated pointer to the data record to maintain data consistency.
- Step 66 The server adds the received H(ID*i) to the SDP service attribute response (SDP_ServiceAttributeResponse) and sends it to the client.
- the step further includes: comparing, by the client, whether the received H(ID*i) is equal to the calculated H(ID*), and if yes, performing step 67 to complete the Bluetooth service search and the Bluetooth authentication, if not If they are equal, the Bluetooth authentication fails and the Bluetooth service is terminated.
- Step 67 The client updates the ID value in the RFID card to ID*.
- the security of the Bluetooth connection is increased due to the continuous update of the ID value in the RFID card.
- FIG. 7 shows a time comparison between the above-mentioned Bluetooth connection method and the conventional Bluetooth connection method, wherein the portion of the left oblique line filled in the histogram is time-consuming for the device query, and the portion filled with the grid line is time-consuming for the service search. The portion filled with the right slash is time consuming for the connection.
- the column corresponding to the RFID is a time chart of the Bluetooth connection method provided by the present invention, because the device queries the time of reading the Bluetooth address in the RFID card (ie, the device query in FIG. 7 takes time).
- the present invention also provides a Bluetooth connection system, the system comprising: an RFID card, a client, and a server; wherein
- a client configured to read information stored in the RFID card, and establish a Bluetooth connection with the server according to the read information
- the RFID card is configured to store a Bluetooth address and an ID value of the RFID card.
- the client is configured to perform Bluetooth authentication with the server according to the read information, the challenge/response mechanism of the service discovery protocol SDP service search, and the RFID, and establish a Bluetooth connection when the authentication is passed.
- system further includes a database
- the server is further configured to generate a random number R, send the R and the query message Query to the client, and forward the R, the H (ID) and the H (ID II R) sent by the client to the Database
- the database is configured to calculate H(ID*i) according to the received data and a list stored by itself, and forward the data to the client through the server;
- the client is further configured to calculate H(ID), H(ID
- the database is further configured to determine whether the calculated Pointer of the H(ID*i) in the list (H(IDi), IDi, Pointeri) is 0, and if so, add a new record j: (H) (ID), ID *i, j); If no, modify the Pointer record to (H(ID), ID, i).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Mobile Radio Communication Systems (AREA)
Description
一种蓝牙连接方法及系统 技术领域
本发明涉及无线通信的蓝牙技术, 尤其涉及一种蓝牙连接方法及系统。 背景技术
蓝牙 ( Bluetooth )是一种支持设备短距离通信的无线电技术, 一般的 通信距离在 10m内, 蓝牙能在包括移动电话、 PDA、 无线耳机、 笔记本电 脑、 相关外设等众多设备之间进行无线信息交换。 利用蓝牙技术, 能够有 效地简化移动通信终端设备之间的通信, 也能够成功地简化设备与因特网 之间的通信, 从而使得数据的传输变得更加迅速高效, 为无线通信拓宽道 路。
蓝牙采用分散式网络结构、 以及快跳频和短包技术, 支持点对点及点 对多点通信, 工作在全球通用的 2.4GHz ISM ( Industrial Scientific Medical ) 频段, 其数据速率为 1Mbps, 采用时分双工传输方案实现全双工传输。 其 中, 在蓝牙协议栈中, 月良务发现协议(Service Discovery Protocol, SDP )也 叫做蓝牙 SDP, 用于提供应用程序在蓝牙环境中特定的涵义, 用于发现哪 个服务可用和决定可用服务的特征。 SDP 定义了一个蓝牙客户机发现可用 蓝牙服务器服务和特征的方法, 其中, 蓝牙服务属性如表 1所示:
表 1
SDP采用客户端 /服务器模型和请求 /响应机制, 如图 1所示, 服务器上
保存服务的记录,客户端通过请求协议数据单元(Protocol Data Unit, PDU ) 发起一次事务, 服务器返回响应协议数据单元来响应这个请求。
每一个 SDP 的 PDU 包括 PDU 头 (Header ) 和 PDU 特定的参数 ( Parameter ); PDU头包括三个域: PDU标识符( PDU ID )、 事务标识符 ( Transaction ID )和参数长度 ( Parameter Length ), 具体如图 2所示。其中, PDU ID用来区分 PDU的类型,以此来判断 PDU的意义及正确解析其参数, PDU ID规范和其对应的值详见表 2;
表 2
Transaction ID用来区分不同请求的 PDU, 收到响应 PDU时, 根据该 响应 PDU的 Transaction ID来判断是否为相应请求 PDU的响应, 具体判断 原则为: SDP客户端选择与已有请求 PDU的 Transaction ID不同的任意值 作为一个请求 PDU的 Transaction ID,响应 PDU所包含的 Transaction ID必 须与其对应的请求 PDU的 Transaction ID相同。参数长度字段表示了该 PDU 所带参数的总长度(以字节为单位)。
射频识别( Radio Frequency Identification, RFID )是一种非接触式的自 动识别技术, 它通过射频信号自动识别目标对象并获取相关数据, 识别工 作无须人工干预, 可工作于各种恶劣环境。 RFID技术可识别高速运动物体 并可同时识别多个标签, 操作快捷方便。 RFID是一种简单的无线系统, 通
常至少由一个询问器(或阅读器)和多个应答器(或标签)组成。 该系统 常用于控制、 检测和跟踪物体。
通讯终端和不断变换的环境的信息交互可以改变和提高人们的生活习 惯和生活水平, 而蓝牙和 RFID技术是两项十分具有潜力的选择。蓝牙可以 与有效范围内的其他设备进行信息交互, 从而达到采集信息或者发布命令 的目的。 但目前通常使用的蓝牙连接的模式有一个缺点, 就是每次建立蓝 牙连接之前都需要经过查询蓝牙设备和查询服务, 而要完成上述查询会耗 费十几秒甚至二、 三十秒的时间; 不仅如此, 上述查询还需要人为的参与。 因此, 目前普遍使用的蓝牙连接的模式在通讯终端和不断变换的环境中不 能很好地满足简洁、 快速连接的要求。 发明内容
有鉴于此, 本发明的主要目的在于提供一种蓝牙连接的方法及系统, 能实现蓝牙服务的快速连接。
为达到上述目的, 本发明的技术方案是这样实现的:
一种蓝牙连接方法, 所述方法包括:
客户端读取存储在 RFID卡的信息;
根据读取的信息与服务端建立蓝牙连接。
进一步地,在客户端读取存储在 RFID卡的信息之前,所述方法还包括: 存储蓝牙地址和 RFID卡的 ID值至所述 RFID卡。
其中, 所述根据读取的信息与服务端建立蓝牙连接为:
根据读取的信息利用 SDP服务搜索的挑战 /应答机制、 以及 RFID, 与 服务端进行蓝牙认证, 认证通过时建立蓝牙连接。
其中, 所述利用 SDP服务搜索的挑战 /应答机制以及 RFID, 与服务端 进行蓝牙认证为:
服务端产生一个随机数 R, 并将 R和询问消息 Query发送给客户端;
客户端根据收到的 R和读取到的 ID值,通过单向哈希函数计算 H(ID)、 H(ID II R)、 ID*=S(ID)、 以及 H(ID*)=H(S(ID)), 并将 H(ID) 和 H(ID II R)发 送给服务端;
所述服务端将接收到的 H(ID) 和 H(ID II R)以及 R转发给后台数据库; 所述数据库根据接收到的数据及自身存储的列表, 计算 H(ID*i)并通过 服务端转发给客户端;
客户端比较接收到的 H(ID*i)与计算得到的 H(ID*)是否相等, 相等时, 将 RFID卡内的 ID值更新为 ID*, 蓝牙认证通过。
其中, 所述数据库根据接收到的数据及自身存储的列表, 计算 H(ID*i) 为:
数据库在自身存储的列表中查找是否存在 i满足 Η(Π¾= H(ID), 存在 时, 找到 H(IDi)对应的 IDi, 计算 H(IDi II R);
比较 H(IDi II R)与接收到的 H(ID II R)是否相等,相等时进一步计算 ID*i =S(IDi)、 Η(Π^)=Η(8(Π¾), 并将 H(ID*i)发送给服务端。
进一步地, 在数据库将 H(ID*i)发送给服务端之后, 所述方法还包括: 所述数据库判断计算得到的 H(ID*i)在列表中对应的关联指针是否为 0, 是 0则增加新的记录; 不是 0则将所述关联指针指向的记录进行修改。
进一步地, 在比较 H(IDi II R)与接收到的 H(ID II R)是否相等之后, 所 述方法还包括: 不相等时, 判定当前客户端为未授权的终端。
一种蓝牙连接系统, 所述系统包括: RFID卡、 客户端、 及服务端; 其 中,
客户端, 用于读取存储在 RFID卡的信息, 并根据读取的信息与所述服 务端建立蓝牙连接。
进一步地, 所述 RFID卡, 用于存储蓝牙地址和 RFID卡的 ID值。 进一步地, 所述客户端, 具体用于根据读取的信息, 利用 SDP服务搜
索的挑战 /应答机制、 以及 RFID, 与服务端进行蓝牙认证, 认证通过时建立 蓝牙连接。
进一步地, 所述系统还包括数据库;
相应的, 所述服务端, 用于产生一个随机数 R, 将 R和询问消息 Query 发送给客户端, 并将 R、 客户端发来的 H(ID) 和 H(ID II R)转发给所述数据 库;
数据库, 用于根据接收到的数据及自身存储的列表, 计算 H(ID*i)并通 过服务端转发给客户端;
客户端, 还用于根据 R和读取的 ID, 通过单向哈希函数计算 H(ID)、 H(ID II R)、 ID*=S(ID)、 以及 H(ID*)=H(S(ID)), 并将 H(ID) 和 H(ID II R)发 送给服务端, 比较接收到的 H(ID*i)与计算得到的 H(ID*)是否相等, 相等时 确认蓝牙认证通过。
其中, 所述数据库,具体用于在自身存储的列表中查找是否存在 i满足 Η(Π¾= H(ID),存在则找到 H(IDi)对应的 ID 计算 H(IDi II R);比较 H(IDi II R) 与接收到的 H(ID II R)是否相等,相等时计算
并将 H(ID*i)发送给服务端。
进一步地, 所述数据库, 还用于判断计算得到的 H(ID*i)在列表中对应 的关联指针是否为 0,是 0则增加新的记录; 不是 0则将所述关联指针指向 的记录进行修改。
本发明通过将蓝牙地址和 RFID卡的 ID值存储在 RFID卡内, 当客户 端读取 RFID卡内存储的信息后, 直接使用 SDP服务搜索与服务端进行交 互, 实现了在蓝牙服务搜索时, 自动完成蓝牙认证的目的, 从而建立安全 可靠的蓝牙连接; 该方法大大减少了建立蓝牙连接的时间, 使得蓝牙服务 的应用在实现上更为简洁快速, 且成本较低, 效率更高, 便于推广; 还可 广泛应用到工业控制、 企业管理、 家居生活等, 尤其在需要安全认证的蓝
牙应用中更为适用。 附图说明
图 1为 SDP客户端 /服务器模型的结构示意图;
图 2为 PDU的格式示意图;
图 3为本发明提供的蓝牙连接方法的流程示意图;
图 4为本发明提供的蓝牙连接方法的具体实施例的流程示意图; 图 5为 SDP服务搜索的 PDU报文交互示意图;
图 6为本发明提供的蓝牙认证的过程示意图;
图 7 为本发明提供的蓝牙连接方法与传统的蓝牙连接方法的用时对照 图。 具体实施方式
本发明的基本思想为: 客户端读取存储在 RFID卡的信息;根据读取的 信息, 与服务端建立蓝牙连接。
为使本发明的目的、 技术方案和优点更加清楚明白, 以下举实施例并 参照附图, 对本发明进一步详细说明。
图 3示出了本发明的蓝牙连接方法的流程, 如图 3所示, 所述方法包 括下述步驟:
步驟 301 , 客户端读取预先存储在 RFID卡的信息;
本步驟中, RFID卡记录七个字节的数据, 其中六个字节的数据为蓝牙 地址, 一个字节的数据为初始化的 RFID卡的 ID值; 应当注意, 此处初始 化的 ID值不是 RFID卡在出厂时所配置的唯一的 ID值,而是预先存储的用 于蓝牙认证的一个随机数;
另夕卜, 应当理解, RFID卡可以位于客户端内部, 也可以相对于客户端 独立存在。
步驟 302, 客户端根据读取的信息, 与服务端建立蓝牙连接; 本步驟中, 客户端与服务端利用 SDP服务搜索的挑战 /应答机制, 并利 用 RFID, 与服务端进行蓝牙认证, 若认证通过, 建立蓝牙连接。
图 4示出了本发明提供的蓝牙连接方法的具体实施例的流程, 如图 4 所示, 所述实施例包括下述步驟:
步驟 401 , 存储蓝牙地址和 RFID卡的 ID值信息到 RFID卡内; 步驟 402, 客户端读取存储在 RFID卡的信息, 获取所述蓝牙地址; 本步驟中, 客户端获取一个 48位比特的蓝牙地址, 该地址定义了一个 通信终端, 可以唯一标识一个蓝牙设备。
步驟 403,客户端利用 SDP服务搜索的挑战 /应答机制、 RFID卡,根据 读取的信息, 进行蓝牙服务搜索, 同时进行蓝牙认证, 认证通过则建立蓝 牙连接;
具体地, 结合图 5所示的 SDP服务搜索的过程, 客户端通过与服务端 进行 PDU报文的交互, 发送蓝牙认证所需要的信息, 完成蓝牙认证, 建立 蓝牙连接。
应当理解, SDP 为一个应用层的协议, 而客户端与服务端在传输层的 功能还需要逻辑链路控制和适配协议 ( Logical Link Control and Adaptation Protocol, L2CAP )进行保证。
下面结合图 5和图 6,进一步对本发明提供的蓝牙连接方法中蓝牙认证 部分进行详细说明; 其中, 以 RFID卡相对于客户端独立存在的情况进行说 明, 以更清晰地明了蓝牙认证的过程, 应当理解, 实际应用时, RFID卡也 可以位于客户端内。
步驟 61 , 客户端读取存储在 RFID卡内的 ID值;
一般地, 客户端通过自身配置的 RFID读卡器读取存储在该 RFID卡内 的 ID值;
步驟 62 , 服务端收到客户端发送的 SDP 服务搜索请求 ( SDP_ServiceSearchRequest )后, 产生一个随机数 R, 并将该随机数 R和 询问消息 Query添加到 SDP服务搜索响应 ( SDP_ServiceSearchResponse ) 中返回给客户端;
其中, 具体客户端发送的 SDP_ServiceSearchRequest、 服务端发送的
SDP_ServiceSearchResponse 口图 5所示。
步驟 63 ,客户端根据预先存储的单向哈希函数,计算 H(ID)、 H(ID II R)、 ID*=S(ID)、 以及 H(ID*)=H(S(ID)), 并将计算出的 H(ID) 和 H(ID II R)添加 到 SDP服务属性请求( SDP_ServiceAttributeRequest ) 中发送给服务端; 其中, 单向的哈希函数为 H(x) 函数和 S(x)函数; S(x)函数的作用是通 过原先 RFID卡内存储的 ID值, 产生新的 RFID卡的 ID值, 即 ID*=S(ID); 本发明实施例中, S(x)的规则对于客户端和数据库可以是公开的,对于服务 端可以保密。
步驟 64, 服务端将接收到的 H(ID) 和 H(ID II R)以及产生的随机数 R 转发给后台的数据库;
步驟 65 , 数据库根据接收到的数据及自身存储的列表, 计算 H(ID*i)并 发送给服务端;
具体地, 数据库中预先存储的列表为 ( H(IDi), IDi, Pointeri ), 其中, 主键为 H(ID), ID为授权可与服务端建立蓝牙连接的电子标签的 ID, H(ID) 为单向 Hash函数的计算值, Pointer是数据记录的关联指针, 用来保持数据 的一致性。
其中,数据库计算 H(ID*i)的具体过程为: 首先,数据库在列表(Η(Π¾, IDi, Pointer^中查找是否存在 i满足 H(IDi)= H(ID), 若存在, 则找到 Η(Π¾ 对应的 ID i, 计算 H(IDi II R);
然后, 比较计算得到的 H(IDi II R)与接收到的 H(ID II R)是否相等, 若
相等, 则进一步计算 ID*i =S(IDi)、
并将 H(ID*i)发送给服 务端; 其中, 还可以将 ID *i也一同发送给服务端。
另外, 若此时数据库判断计算得到的 H(ID*i)在列表(Η(Π¾ , IDi, Pointer ) 中对应的 Pointer是否为 0, 若是, 则增加新的记录 j: ( H(ID* , ID*i, j ); 若否, 则找到所述 Pointer指向的第 Pointer条记录, 将该记录修 改为 (H(ID*i), ID*i, i )。
步驟 66 , 服务端将接收到的 H(ID*i)添加到 SDP 服务属性响应 ( SDP_ServiceAttributeResponse ) 中发送给客户端;
具体地, 本步驟中还包括客户端比较接收到的 H(ID*i)与计算得到的 H(ID*)是否相等, 若相等, 则执行步驟 67, 完成蓝牙服务搜索和蓝牙认证, 若不相等, 则蓝牙认证失败, 蓝牙服务终止。
步驟 67, 客户端将 RFID卡中的 ID值更新为 ID*。
本步驟中, 由于 RFID卡中 ID值的不断更新, 增加了蓝牙连接的安全 性。
图 7示出了利用上述蓝牙连接方法与传统的蓝牙连接方法的用时对照, 其中, 柱形图中左斜线填充的部分为设备查询耗时, 网格线填充的部分为 服务搜索耗时, 右斜线填充的部分为连接耗时。 如图 7所示, RFID所对应 的柱形为利用本发明所提供的蓝牙连接方法的用时图, 由于在客户端读取 到 RFID卡内的蓝牙地址后 (即图 7中的设备查询耗时), 直接跳过传统方 法中搜索蓝牙设备的步驟, 而是根据读取到的 RFID卡内存储的 ID值, 通 过 SDP服务搜索, 实现在蓝牙服务搜索时, 自动完成蓝牙认证, 以建立蓝 牙连接; 而传统方法中搜索蓝牙设备是建立蓝牙连接过程中最为耗时的部 分, 因此, 如图 7所示, RFID所对应的柱形在设备查询用时上要达到少于 传统方法, 可见, 本发明提供的蓝牙连接的方法大大减少了蓝牙连接的时 间。
本发明还提供了一种蓝牙连接系统,所述系统包括: RFID卡、客户端、 及服务端; 其中,
客户端, 用于读取存储在 RFID卡的信息, 并根据读取的信息, 与所述 服务端建立蓝牙连接;
进一步地, 所述 RFID卡, 用于存储蓝牙地址和 RFID卡的 ID值。 所述客户端, 用于根据读取的信息, 利用服务发现协议 SDP服务搜索 的挑战 /应答机制、 以及 RFID, 与服务端进行蓝牙认证, 认证通过时建立蓝 牙连接。
进一步地, 所述系统还包括数据库;
相应的, 服务端, 还用于产生一个随机数 R, 将 R和询问消息 Query 发送给客户端, 并将 R、 客户端发来的 H(ID) 和 H(ID II R)转发给所述数据 库;
所述数据库, 用于根据接收到的数据及自身存储的列表, 计算 H(ID*i) 并通过服务端转发给客户端;
所述客户端,还用于根据 R和读取的 ID ,通过单向哈希函数计算 H(ID)、 H(ID || R)、 ID*=S(ID)、 以及 H(ID*)=H(S(ID)) , 并将计算出的 H(ID) 和 H(ID II R)发送给服务端, 并比较接收到的 H(ID*i)与计算得到的 H(ID*)是否 相等, 相等时, 确认蓝牙认证通过。
进一步地, 所述数据库, 具体用于在自身存储的列表(Η(Π¾, IDi, Pointeri ) 中查找是否存在 i满足 Η(Π¾= H(ID), 存在时找到 Η(Π¾对应的 ID i, 计算 H(IDi II R); 比较 H(IDi II R)与接收到的 H(ID II R)是否相等, 相等 时, 则进一步计算 ID*i =S(IDi)、 H(ID*i)=H(S(IDi))。 并将 H(ID*i)发送给服务 端。
其中,所述数据库,还用于判断计算得到的 H(ID*i)在列表(H(IDi), IDi, Pointeri ) 中对应的 Pointer是否为 0, 若是, 则增加新的记录 j: ( H(ID ),
ID *i, j); 若否, 则将第 Pointer条记录修改为 ( H(ID ), ID , i )。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。
Claims
1、 一种蓝牙连接方法, 其特征在于, 所述方法包括:
客户端读取存储在射频识别 RFID卡的信息;
根据读取的信息与服务端建立蓝牙连接。
2、 根据权利要求 1 所述的方法, 其特征在于, 在客户端读取存储在
RFID卡的信息之前, 所述方法还包括:
存储蓝牙地址和 RFID卡的 ID值至所述 RFID卡。
3、 根据权利要求 1或 2所述的方法, 其特征在于, 所述根据读取的信 息与服务端建立蓝牙连接为:
根据读取的信息, 利用服务发现协议 SDP服务搜索的挑战 /应答机制、 以及 RFID , 与服务端进行蓝牙认证, 认证通过时建立蓝牙连接。
4、根据权利要求 3所述的方法, 其特征在于, 所述利用 SDP服务搜索 的挑战 /应答机制以及 RFID , 与服务端进行蓝牙认证为:
服务端产生一个随机数 R, 并将 R和询问消息 Query发送给客户端; 客户端根据收到的 R和读取到的 ID值,通过单向哈希函数计算 H(ID)、
H(ID II R)、 ID*=S(ID)、 以及 H(ID*)=H(S(ID)), 并将 H(ID) 和 H(ID II R)发 送给服务端;
所述服务端将接收到的 H(ID) 和 H(ID II R)以及 R转发给后台的数据 库;
所述数据库根据接收到的数据及自身存储的列表, 计算 H(ID*i)并通过 服务端转发给客户端;
客户端比较接收到的 H(ID*i)与计算得到的 H(ID*)是否相等, 相等时, 将 RFID卡内的 ID值更新为 ID* , 蓝牙认证通过。
5、 根据权利要求 4所述的方法, 其特征在于, 所述数据库根据接收到 的数据及自身存储的列表, 计算 H(ID*i)为: 数据库在自身存储的列表中查找是否存在 i满足 Η(Π¾= H(ID), 存在 时, 找到 H(IDi)对应的 IDi, 计算 H(IDi II R);
比较 H(IDi II R)与接收到的 H(ID II R)是否相等,相等时进一步计算 ID*i =S(IDi)、 Η(Π^)=Η(8(Π¾), 并将 H(ID*i)发送给服务端。
6、 根据权利要求 5所述的方法, 其特征在于, 在数据库将 H(ID*i)发送 给服务端之后, 所述方法还包括:
所述数据库判断计算得到的 H(ID*i)在列表中对应的关联指针是否为 0, 是 0则增加新的记录; 不是 0则将所述关联指针指向的记录进行修改。
7、 根据权利要求 5所述的方法, 其特征在于, 在比较 H(IDi II R)与接 收到的 H(ID II R)是否相等之后, 所述方法还包括: 不相等时, 判定当前客 户端为未授权的终端。
8、 一种蓝牙连接系统, 其特征在于, 所述系统包括: RFID 卡、 客户 端、 及服务端; 其中,
客户端, 用于读取存储在 RFID卡的信息, 并根据读取的信息与所述服 务端建立蓝牙连接。
9、 根据权利要求 8所述的系统, 其特征在于, 所述 RFID卡, 用于存 储蓝牙地址和 RFID卡的 ID值。
10、 根据权利要求 8或 9所述的系统, 其特征在于, 所述客户端, 具 体用于根据读取的信息, 利用 SDP服务搜索的挑战 /应答机制、 以及 RFID, 与服务端进行蓝牙认证, 认证通过时建立蓝牙连接。
11、 根据权利要求 10所述的系统, 其特征在于, 所述系统还包括数据 库;
相应的, 所述服务端, 用于产生一个随机数 R, 将 R和询问消息 Query 发送给客户端, 并将 R、 客户端发来的 H(ID) 和 H(ID II R)转发给所述数据 库; 数据库, 用于根据接收到的数据及自身存储的列表, 计算 H(ID*i)并通 过服务端转发给客户端;
客户端, 还用于根据 R和读取的 ID , 通过单向哈希函数计算 H(ID)、 H(ID II R)、 ID*=S(ID)、 以及 H(ID*)=H(S(ID)), 并将 H(ID) 和 H(ID II R)发 送给服务端, 比较接收到的 H(ID*i)与计算得到的 H(ID*)是否相等, 相等时 确认蓝牙认证通过。
12、 根据权利要求 11所述的系统, 其特征在于, 所述数据库, 具体用 于在自身存储的列表中查找是否存在 i 满足 Η(Π¾= H(ID) , 存在则找到 H(IDi)对应的 ID i, 计算 H(IDi II R); 比较 H(IDi II R)与接收到的 H(ID II R) 是否相等, 相等时计算 ID*i =S(IDi)、 H(ID*i)=H(S(IDi)); 并将 H(ID*i)发送给 服务端。
13、 根据权利要求 12所述的系统, 其特征在于, 所述数据库, 还用于 判断计算得到的 H(ID*i)在列表中对应的关联指针是否为 0, 是 0则增加新 的记录; 不是 0则将所述关联指针指向的记录进行修改。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP11859774.9A EP2667519B1 (en) | 2011-03-03 | 2011-09-15 | Bluetooth connection method |
| US13/985,848 US9191772B2 (en) | 2011-03-03 | 2011-09-15 | Bluetooth connection method and system |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110051743.8 | 2011-03-03 | ||
| CN201110051743.8A CN102111192B (zh) | 2011-03-03 | 2011-03-03 | 一种蓝牙连接方法及系统 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2012116544A1 true WO2012116544A1 (zh) | 2012-09-07 |
Family
ID=44175235
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2011/079659 Ceased WO2012116544A1 (zh) | 2011-03-03 | 2011-09-15 | 一种蓝牙连接方法及系统 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US9191772B2 (zh) |
| EP (1) | EP2667519B1 (zh) |
| CN (1) | CN102111192B (zh) |
| WO (1) | WO2012116544A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114390496A (zh) * | 2021-12-24 | 2022-04-22 | 杭州所思互连科技有限公司 | 基于蓝牙ble的远程安全组网装置、方法、计算机设备和存储介质 |
Families Citing this family (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102111192B (zh) * | 2011-03-03 | 2014-09-10 | 中兴通讯股份有限公司 | 一种蓝牙连接方法及系统 |
| KR102014716B1 (ko) * | 2013-04-24 | 2019-08-27 | 삼성전자주식회사 | 대역외 채널을 이용한 무선 연결 방법, 저장 매체 및 전자 장치 |
| CN105337740B (zh) * | 2014-07-31 | 2019-01-04 | 阿里巴巴集团控股有限公司 | 一种身份验证方法、客户端、中继设备及服务器 |
| CN104637135B (zh) * | 2014-12-25 | 2017-02-22 | 山东康威通信技术股份有限公司 | 一种电力监控领域蓝牙控制半离线井盖的方法 |
| TWI638316B (zh) * | 2015-02-16 | 2018-10-11 | 薩摩亞商北極星科技全球有限公司 | 具備選擇性功能的rfid藍牙轉接器 |
| US10019718B2 (en) | 2015-05-12 | 2018-07-10 | Bank Of America Corporation | Customer-based associate interfaces |
| CN105933846B (zh) * | 2016-04-01 | 2020-09-15 | 腾讯科技(深圳)有限公司 | 一种业务处理方法、装置、终端及业务系统 |
| KR102028298B1 (ko) | 2016-04-01 | 2019-10-02 | 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 | 서비스 처리 방법 및 장치 |
| US10659464B2 (en) * | 2017-05-10 | 2020-05-19 | Microsoft Technology Licensing, Llc | Securely authenticating a bot user |
| CN107454561A (zh) * | 2017-08-14 | 2017-12-08 | 恒宝股份有限公司 | 一种蓝牙链路数据保护方法及其保护系统 |
| CN107835238B (zh) * | 2017-10-31 | 2021-05-18 | 乐鑫信息科技(上海)股份有限公司 | 一种解决属性数据库重复发现的方法 |
| CN108428452B (zh) * | 2018-03-14 | 2019-12-13 | 百度在线网络技术(北京)有限公司 | 终端支架和远场语音交互系统 |
| CN108810859A (zh) * | 2018-05-20 | 2018-11-13 | 陈将 | 一种基于加密功能的蓝牙智能手表语音控制方法及系统 |
| US11546096B2 (en) * | 2019-06-21 | 2023-01-03 | Carrier Corporation | Method and system for data transfer in a Bluetooth low energy network |
| CN112333677B (zh) * | 2019-11-19 | 2022-08-19 | 杭州智缤科技有限公司 | 一种低功耗蓝牙的安全通信方法 |
| CN113810886A (zh) * | 2020-05-27 | 2021-12-17 | 华为技术有限公司 | 验证方法及装置 |
| CN112562300A (zh) * | 2020-12-03 | 2021-03-26 | 星宏网络科技有限公司 | 一种基于蓝牙的设备无线控制系统及方法 |
| CN114882608A (zh) * | 2022-06-23 | 2022-08-09 | 淮阴工学院 | 一种提高电子签到实时性的方法 |
| CN116528209B (zh) * | 2023-05-05 | 2023-11-24 | 荣耀终端有限公司 | 蓝牙扫描方法、设备、芯片系统及存储介质 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1422008A (zh) * | 2002-12-31 | 2003-06-04 | 艾威梯软件技术(北京)有限公司 | 一种蓝牙设备之间建立蓝牙连接的方法 |
| CN1914858A (zh) * | 2004-03-02 | 2007-02-14 | 松下电器产业株式会社 | 通信系统和通信方法 |
| CN101567054A (zh) * | 2009-05-21 | 2009-10-28 | 金纯� | 蓝牙rfid读写器 |
| CN102111192A (zh) * | 2011-03-03 | 2011-06-29 | 中兴通讯股份有限公司 | 一种蓝牙连接方法及系统 |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100619005B1 (ko) | 1999-11-25 | 2006-08-31 | 삼성전자주식회사 | 장치간의 연결 설정을 위한 인증방법 |
| US6862594B1 (en) * | 2000-05-09 | 2005-03-01 | Sun Microsystems, Inc. | Method and apparatus to discover services using flexible search criteria |
| JP2002141895A (ja) * | 2000-11-01 | 2002-05-17 | Sony Corp | コンテンツ配信システムおよびコンテンツ配信方法 |
| US6842460B1 (en) * | 2001-06-27 | 2005-01-11 | Nokia Corporation | Ad hoc network discovery menu |
| US7102640B1 (en) * | 2002-03-21 | 2006-09-05 | Nokia Corporation | Service/device indication with graphical interface |
| US7565108B2 (en) * | 2002-03-26 | 2009-07-21 | Nokia Corporation | Radio frequency identification (RF-ID) based discovery for short range radio communication with reader device having transponder functionality |
| JP3754004B2 (ja) * | 2002-05-20 | 2006-03-08 | システムニーズ株式会社 | データ更新方法 |
| US20060061482A1 (en) * | 2004-09-23 | 2006-03-23 | Patrick Monney | RFID auto-connect for wireless devices |
| EP1806869A4 (en) * | 2004-10-28 | 2009-05-27 | Mitsubishi Electric Corp | COMMUNICATION DEVICE AND COMMUNICATION PROCESS |
| US20080045218A1 (en) * | 2004-12-15 | 2008-02-21 | Toshio Okochi | Wireless Communication Terminal and its Control Method |
| JP4435076B2 (ja) | 2005-11-18 | 2010-03-17 | フェリカネットワークス株式会社 | 携帯端末,データ通信方法,およびコンピュータプログラム |
| KR100800733B1 (ko) * | 2006-02-08 | 2008-02-01 | 삼성전자주식회사 | 블루투스 시스템 및 블루투스 본딩 프로세스 방법 |
| US7450010B1 (en) * | 2006-04-17 | 2008-11-11 | Tc License Ltd. | RFID mutual authentication verification session |
| CN101277185B (zh) * | 2007-03-28 | 2011-04-27 | 联想(北京)有限公司 | 一种基于无线标识的认证方法、系统和无线标识、服务器 |
| US20080280560A1 (en) * | 2007-05-09 | 2008-11-13 | Micron Technology, Inc. | Method and system of placing a rfid tag in a continuous transmission mode |
| JP4983505B2 (ja) * | 2007-09-25 | 2012-07-25 | ブラザー工業株式会社 | 無線タグ通信装置 |
| JP4716195B2 (ja) * | 2007-10-17 | 2011-07-06 | ブラザー工業株式会社 | 無線タグ通信装置 |
| US7970350B2 (en) * | 2007-10-31 | 2011-06-28 | Motorola Mobility, Inc. | Devices and methods for content sharing |
| JP4506856B2 (ja) * | 2008-03-10 | 2010-07-21 | ソニー株式会社 | 通信装置、及び通信方法 |
| US8898089B2 (en) * | 2008-06-24 | 2014-11-25 | Visa U.S.A. Inc. | Dynamic verification value system and method |
| CN101354740A (zh) * | 2008-09-12 | 2009-01-28 | 深圳市中航软件技术有限公司 | 移动式rfid读写终端 |
| CN101877602B (zh) * | 2009-04-29 | 2014-01-01 | 深圳富泰宏精密工业有限公司 | 蓝牙连接方法 |
| TWI398153B (zh) * | 2010-01-22 | 2013-06-01 | Univ Nat Chi Nan | Certification methods, authentication systems and electronic tags |
-
2011
- 2011-03-03 CN CN201110051743.8A patent/CN102111192B/zh not_active Expired - Fee Related
- 2011-09-15 WO PCT/CN2011/079659 patent/WO2012116544A1/zh not_active Ceased
- 2011-09-15 EP EP11859774.9A patent/EP2667519B1/en not_active Not-in-force
- 2011-09-15 US US13/985,848 patent/US9191772B2/en not_active Expired - Fee Related
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1422008A (zh) * | 2002-12-31 | 2003-06-04 | 艾威梯软件技术(北京)有限公司 | 一种蓝牙设备之间建立蓝牙连接的方法 |
| CN1914858A (zh) * | 2004-03-02 | 2007-02-14 | 松下电器产业株式会社 | 通信系统和通信方法 |
| CN101567054A (zh) * | 2009-05-21 | 2009-10-28 | 金纯� | 蓝牙rfid读写器 |
| CN102111192A (zh) * | 2011-03-03 | 2011-06-29 | 中兴通讯股份有限公司 | 一种蓝牙连接方法及系统 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP2667519A4 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114390496A (zh) * | 2021-12-24 | 2022-04-22 | 杭州所思互连科技有限公司 | 基于蓝牙ble的远程安全组网装置、方法、计算机设备和存储介质 |
| CN114390496B (zh) * | 2021-12-24 | 2023-09-19 | 杭州所思互连科技有限公司 | 基于蓝牙ble的远程安全组网装置、方法、计算机设备和存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102111192B (zh) | 2014-09-10 |
| US9191772B2 (en) | 2015-11-17 |
| CN102111192A (zh) | 2011-06-29 |
| EP2667519A1 (en) | 2013-11-27 |
| EP2667519A4 (en) | 2015-01-28 |
| EP2667519B1 (en) | 2018-11-07 |
| US20130324046A1 (en) | 2013-12-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2012116544A1 (zh) | 一种蓝牙连接方法及系统 | |
| CN103929833B (zh) | 近场通信网络中的电子设备及其通信方法 | |
| CN106454996B (zh) | 用于低功耗数据传送的方法及装备 | |
| US9743225B2 (en) | Method and apparatus for forming communication link using bluetooth | |
| US9794323B2 (en) | Method and apparatus for performing object transfer service using bluetooth low energy in wireless communication system | |
| CA2878980C (en) | Wireless network service transaction protocol | |
| CA2651236C (en) | Mechanism to convey discovery information in a wireless network | |
| US8582471B2 (en) | Wireless ad-hoc network configuration method and apparatus | |
| CN102186164A (zh) | 操作设备资源的方法和管理装置 | |
| US20150147972A1 (en) | Method for performing an interaction from a communicating device configured to establish a wireless communication channel and corresponding telecommunication system | |
| US20170339128A1 (en) | Method and apparatus for authenticating a device using bluetooth technology | |
| WO2012000271A1 (zh) | 终端接入方法和无线通信网络 | |
| US10492060B2 (en) | Method and device for transmitting/receiving data in wireless communication system | |
| CN104125568A (zh) | 无线接入点安全认证方法和系统 | |
| US10924904B2 (en) | Method and apparatus for performing object transfer service by using bluetooth communication in wireless communication system | |
| US10560977B2 (en) | Method for performing an interaction from a communicating device configured to establish a wireless communication channel and corresponding telecommunication system | |
| US20230103916A1 (en) | Audio data reception method using short-range wireless communication in wireless communication system, and apparatus therefor | |
| CN114269027B (zh) | 一种基于NDN和Ad-hoc网络的智能仓储方法 | |
| US20250113397A1 (en) | Method for transmitting and receiving data in short-range wireless communication system, and device therefor | |
| JP2013026704A (ja) | 通信装置、通信装置の探索方法、及びプログラム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11859774 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 13985848 Country of ref document: US |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2011859774 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |

