Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bluetooth device connection method based on network security and system thereof

A Bluetooth device and network security technology, applied in the field of network security, can solve problems such as hidden security risks, wasting time, reducing connection efficiency, etc., and achieve the effects of improving connection security, improving security, and saving time

Active Publication Date: 2019-01-04
深圳市信富达科技有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using Bluetooth connection for data transmission has the functions of fast and low cost. As mentioned above, with the wide application of Bluetooth technology, there are potential safety hazards in the direct connection process. If the Bluetooth device is checked for safety, it will waste time and reduce the connection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bluetooth device connection method based on network security and system thereof
  • Bluetooth device connection method based on network security and system thereof
  • Bluetooth device connection method based on network security and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Such as figure 1 As shown, a Bluetooth device connection method based on network security, the mobile terminal establishes a Bluetooth connection with the target terminal through the transfer terminal, including the following steps:

[0063] 101: The mobile terminal detects all Bluetooth devices in the Bluetooth-on state, and extracts the transfer terminal and the first Bluetooth address of the transfer terminal;

[0064] 102: The mobile terminal sends a first Bluetooth connection request to the transfer terminal according to the first Bluetooth address, where the first Bluetooth connection request includes the second Bluetooth address of the mobile terminal and the identity information of the target terminal for which it requests connection;

[0065] 103: The transfer terminal extracts the historical connection list, and judges whether the second Bluetooth address exists in the historical connection list;

[0066] 104: If yes, the transfer terminal extracts the target t...

Embodiment 2

[0071] Such as figure 2 As shown, the transfer terminal is provided with a first preset security list, and the first preset security list includes the final connection time of each Bluetooth device connected to the transfer terminal;

[0072] When the relay terminal receives the first Bluetooth connection request sent by the mobile terminal, it extracts the final connection time corresponding to the mobile terminal;

[0073] judging whether the final connection time is within the first preset safety time;

[0074] If so, then send a second bluetooth connection request to the target terminal;

[0075] If not, re-verify the identity information of the mobile terminal.

[0076] Such as image 3 As shown, the target terminal is provided with a second preset security list, and the second preset security list includes the final connection time of each Bluetooth device connected to the target terminal;

[0077] When the target terminal receives the second Bluetooth connection re...

Embodiment 3

[0085] Such as Figure 4 As shown, after step 106, it also includes:

[0086] The target terminal adds the second Bluetooth address of the mobile terminal to the storage device.

[0087] Such as Figure 5 As shown in , the target terminal records the access times of the mobile terminal;

[0088] Judging whether the number of access times is greater than or equal to the preset number of times;

[0089] If so, the target terminal adds the second Bluetooth address of the mobile terminal to the storage device.

[0090] Specifically, the mobile terminal establishes a connection with the target terminal for the first time through the transfer terminal. When the mobile terminal does not cause security problems after multiple connections with the target terminal, the mobile terminal can directly connect to the target terminal without passing through the transfer terminal. At the same time, The mobile terminal is equivalent to another transit terminal.

[0091] After the mobile te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Bluetooth device connection method based on network security and a system thereof. The method comprises the following steps: detecting all Bluetooth devices in a Bluetooth onstate by a mobile phone, and extracting a transit terminal and a first Bluetooth address of the transit terminal from the Bluetooth devices; transmitting a first Bluetooth connection request to the relay terminal according to the first Bluetooth address by the first terminal; wherein the first Bluetooth connection request includes a second Bluetooth address of the mobile terminal and identity information of the target terminal; extracting the history connection list and judges whether the second Bluetooth address exists in the history connection list by the transit terminal; if yes, extracting the corresponding target terminal and its third Bluetooth address from its historical connection list according to the identity information of the target terminal by the relay terminal; transmittinga second Bluetooth connection request to the target terminal according to the third Bluetooth address by the relay terminal, wherein the second Bluetooth connection request includes a second Bluetooth address of the mobile terminal; and establishing a connection with the mobile terminal through the second Bluetooth address by the target terminal.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security-based Bluetooth device connection method and system thereof. Background technique [0002] Bluetooth (Bluetooth) technology is a radio technology that supports short-distance communication (generally within 10m) of devices. It can exchange information wirelessly between many devices including mobile phones, PDAs, wireless headsets, notebook computers, and related peripherals. With the continuous development of electronic technology and communication technology, more and more types of electronic products are equipped with bluetooth devices to establish bluetooth connections and realize fast data transmission. Using Bluetooth connection for data transmission has the functions of fast and low cost. As mentioned above, with the wide application of Bluetooth technology, there are potential safety hazards in the direct connection process. If the Bluetooth device is c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/80H04W12/06H04W76/11H04W76/14
CPCH04W4/80H04W12/06H04W76/11H04W76/14
Inventor 顾健
Owner 深圳市信富达科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products