CN114390492A - Timing method, device, equipment and storage medium - Google Patents

Timing method, device, equipment and storage medium Download PDF

Info

Publication number
CN114390492A
CN114390492A CN202011126849.5A CN202011126849A CN114390492A CN 114390492 A CN114390492 A CN 114390492A CN 202011126849 A CN202011126849 A CN 202011126849A CN 114390492 A CN114390492 A CN 114390492A
Authority
CN
China
Prior art keywords
timing
timestamp
request message
time
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011126849.5A
Other languages
Chinese (zh)
Inventor
曾春亮
翟召轩
杨启昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202011126849.5A priority Critical patent/CN114390492A/en
Priority to PCT/CN2021/120756 priority patent/WO2022083410A1/en
Publication of CN114390492A publication Critical patent/CN114390492A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/06Synchronising arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/06Synchronising arrangements
    • H04J3/0635Clock or time synchronisation in a network
    • H04J3/0638Clock or time synchronisation among nodes; Internode synchronisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/06Synchronising arrangements
    • H04J3/0635Clock or time synchronisation in a network
    • H04J3/0682Clock or time synchronisation in a network by delay compensation, e.g. by compensation of propagation delay or variations thereof, by ranging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements
    • H04W56/001Synchronization between nodes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a time correction method, a time correction device, time correction equipment and a storage medium. The method comprises the following steps: encrypting the timing request message by the first timestamp to obtain an encrypted timing request message; broadcasting an encrypted timing request message outwards; receiving a time correction response message returned by the second device when the second device determines that the first device is in a time correction state, wherein the time correction state refers to a state that the difference value between a first time stamp and a second time stamp is greater than a preset threshold, and the second time stamp is determined based on the time stamp when the second device scans the encrypted time correction request message; and correcting the time of the first device according to the timing time. The technical scheme provided by the embodiment of the application realizes an automatic timing scheme, does not need user participation and improves timing efficiency.

Description

Timing method, device, equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of data encryption, in particular to a time correction method, a time correction device, time correction equipment and a storage medium.
Background
Timing refers to correcting the device time so that the error between the device time and the reference time is within a reasonable range.
In the related art, the timing scheme for the bluetooth device is as follows: the Bluetooth device is provided with an interactive control for triggering timing, and a user triggers the interactive control to start a timing process of the Bluetooth device.
Disclosure of Invention
The embodiment of the application provides a time correction method, a time correction device, time correction equipment and a storage medium. The technical scheme is as follows:
in one aspect, an embodiment of the present application provides a timing method, which is applied to a first device, and the method includes:
encrypting the time correction request message through a first timestamp to obtain an encrypted time correction request message, wherein the first timestamp is determined based on the timestamp of the first device when generating the encrypted time correction request message, and the time correction request message is used for requesting to correct the time of the first device;
broadcasting the encrypted timing request message, wherein the encrypted timing request message carries the first timestamp;
receiving a timing response message returned by the second device when the first device is determined to be in a timing waiting state, wherein the timing response message carries timing time, the timing waiting state refers to a state that a difference value between a first timestamp and a second timestamp is greater than a preset threshold, and the second timestamp is determined based on the timestamp of the second device when the encrypted timing request message is scanned;
and correcting the time of the first equipment according to the time correcting time.
On the other hand, an embodiment of the present application provides a timing method, which is applied to a second device, and the method includes:
scanning an encrypted time correction request message broadcast by first equipment, wherein the encrypted time correction request message carries a first timestamp, and the first timestamp is determined based on a timestamp of the first equipment when generating the encrypted time correction request message;
decrypting the encrypted timing request message according to the first timestamp;
and if the decryption is successful, but the difference value between the first timestamp and the second timestamp is greater than a preset threshold, sending a time correction response message to the first device, wherein the second timestamp is determined based on the timestamp of the encrypted time correction request message scanned by the second device, and the first device is used for correcting the time of the first device according to the time correction time carried by the time correction response message.
In another aspect, an embodiment of the present application provides a timing device, where the timing device includes:
the encryption module is used for encrypting the time correction request message through a first timestamp to obtain an encrypted time correction request message, wherein the first timestamp is the timestamp of the first device when the first device generates the encrypted time correction request message, and the time correction request message is used for requesting to correct the time of the first device;
the broadcast module is used for broadcasting the encrypted timing request message, and the encrypted timing request message carries the first timestamp;
a message receiving module, configured to receive a timing response message returned by the second device when it is determined that the first device is in the to-be-calibrated state, where the timing response message carries timing time, and when the second device succeeds in decryption through the first timestamp but a difference between the first timestamp and a second timestamp is greater than a preset threshold, the second device determines that the first device is in the to-be-calibrated state, and the second timestamp is determined based on a timestamp of the second device when the encrypted timing request message is scanned;
and the correcting module is used for correcting the time of the first equipment according to the time correcting time.
In another aspect, an embodiment of the present application provides a timing device, where the timing device includes:
the encryption module is used for encrypting the time correction request message through a first timestamp to obtain an encrypted time correction request message, wherein the first timestamp is determined based on the timestamp of the first device when the encrypted time correction request message is generated, and the time correction request message is used for requesting to correct the time of the first device;
the broadcast module is used for broadcasting the encrypted timing request message, and the encrypted timing request message carries the first timestamp;
a message receiving module, configured to receive a timing response message returned by the second device when determining that the first device is in a to-be-calibrated state, where the timing response message carries timing time, the to-be-calibrated state refers to a state where a difference between the first timestamp and the second timestamp is greater than a preset threshold, and the second timestamp is determined based on a timestamp of the second device when scanning the encrypted timing request message;
and the correcting module is used for correcting the time of the first equipment according to the time correcting time.
In another aspect, an embodiment of the present application provides a computer device, where the computer device includes a bluetooth chip, and the bluetooth chip stores a computer instruction, where the computer instruction is used to execute the timing method. In still another aspect, an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and the computer program is loaded and executed by a processor to implement the timing method as described above.
In another aspect, an embodiment of the present application provides a computer program product, where the computer program product includes computer instructions, where the computer instructions are stored in a computer-readable storage medium, and a processor of a computer device reads the computer instructions from the computer-readable storage medium, and executes the computer instructions, so that the computer device executes the timing method described above.
The technical scheme provided by the embodiment of the application can bring the beneficial effects of at least comprising:
the time correction request message is encrypted through the first timestamp, time data determined based on the first timestamp is carried to the encrypted time correction request message and then is broadcasted outwards, when the encrypted time correction request message is scanned by a follow-up second device, a second timestamp used in decryption is generated based on the time data, if the difference value between the second timestamp and the current time is large, or the encrypted time correction request message cannot be decrypted, a time correction flow of the first device is initiated, an automatic time correction scheme is realized, user participation is not needed, and time correction efficiency is improved.
Drawings
FIG. 1 is a schematic illustration of an implementation environment provided by one embodiment of the present application;
FIG. 2 is a schematic diagram of a timing process provided by one embodiment of the present application;
FIG. 3 is a flow chart of a timing method provided by an embodiment of the present application;
FIG. 4 is a flow chart of a timing method provided by another embodiment of the present application;
FIG. 5 is a flow chart of a timing method provided by another embodiment of the present application;
FIG. 6 is a block diagram of a timing device provided in one embodiment of the present application;
FIG. 7 is a block diagram of a timing device provided in one embodiment of the present application;
FIG. 8 is a block diagram of a computer device provided by one embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, a schematic diagram of an implementation environment provided by an embodiment of the present application is shown. The implementation environment includes: a first device 11 and a second device 12.
FIG. 1 illustrates a schematic diagram of an implementation environment provided by one embodiment of the present application. The implementation environment includes: a first device 11 and a second device 12.
The first device 11 is a transmitting device of a broadcast message, which is broadcast by the bluetooth Beacon form. The first device 11 may be a smart phone, a tablet computer, a smart appliance (e.g., a smart speaker, a smart refrigerator, a smart air conditioner, etc.), a wearable smart device (e.g., smart glasses, a smart watch, etc.), a smart sensor (e.g., a temperature sensor, a door and window sensor, etc.), and the device type of the first device 11 is not limited in the embodiments of the present application.
The first device 11 has a broadcasting function and a data encryption function. In the embodiment of the present application, the first device 11 encrypts the timing request message by the first time stamp generated based on the time stamp at the time of generating the encryption request message, obtains the encryption timing request message, and then broadcasts the encryption timing request message to the outside. It is to be understood that the first timestamp may be a timestamp of when the first device generated the encryption request message. Of course, it may be calculated based on the time stamp at the time of generating the encryption request message.
The second device 12 is a receiving device for broadcast messages. The second device 12 may be a smart phone, a tablet computer, a smart appliance (e.g., a smart speaker, a smart refrigerator, a smart air conditioner, etc.), a wearable smart device (e.g., smart glasses, a smart watch, etc.), a smart sensor (e.g., a temperature sensor, a door and window sensor, etc.), and the device type of the second device 12 is not limited in the embodiments of the present application.
The second device 12 has a scanning function and a data decryption function. The second device 12 scans the encrypted timing request message broadcast by the first device 11 through the scanning function. After the encrypted timing request message is scanned, the second device 11 determines a second timestamp used for decryption, and if a difference between the second timestamp and the timestamp of the second device 11 is large, a timing process for the first device 11 is initiated. If the difference between the second timestamp and the timestamp of the second device 11 is small, the second device 12 decrypts the encrypted timing request message through the data decryption function, and if the decryption fails, initiates a timing process for the first device 11.
As shown in fig. 1, the first device 11 is a smart home appliance, and the second device 12 is a smart phone.
In the embodiment of the present application, a cloud 13 may also be included. The cloud 13 is a server that manages bluetooth devices (including the first device 11 and the second device 12). The user may register a home account with the cloud 13 using the second device 12, to which both the first device 11 and the second device 12 are added. The first device 11 and the second device 12 form a home communication network therebetween, through which bluetooth communication is possible between the devices. It can be understood that the function provided by the cloud 13 may also be implemented locally, which is not limited in this embodiment of the present application.
Illustratively, the cloud 13 assigns a home address to the home account. The broadcast message sent by the first device may carry a home address, so that the broadcast message may be acquired by the second device 12 or by other devices in the home communications network.
In the related art, the encryption initialization vector is set by negotiation between the encryption party and the decryption party and is usually fixed, so that the encrypted message is easy to crack by illegal equipment, and the security is low.
Based on this, the embodiment of the present application provides a timing scheme, where a timing request message is encrypted by a first timestamp, and time data determined based on the first timestamp is carried to the encrypted timing request message and then broadcast, and when a subsequent second device scans the encrypted timing request message, a second timestamp used in decryption is generated based on the time data, and if the second timestamp is larger than the current time difference value or the encrypted timing request message cannot be decrypted, a timing procedure for calibrating the first device is initiated, so that an automatic timing scheme is implemented, which does not need user participation and improves timing efficiency.
Fig. 2 is a schematic diagram illustrating a timing process provided in an embodiment of the present application. The method comprises the steps that a first device is an intelligent air conditioner, a second device is a smart phone, the current timestamp of the first device is 11:53:27, the first device encrypts a time correction request message based on time, then the time stamp is carried in the encrypted time correction request message and is sent to the second device, the second device reads the time stamp from the encrypted time correction request message, when decryption through the time stamp is successful, but the difference value between the time stamp and the time stamp when the second device scans the encrypted time correction request message is larger than a preset threshold, a time correction response carrying time correction time is sent to the first device, and the first device corrects the self time to be 11:58:42 according to the time correction response.
Referring to fig. 3, a flowchart of a timing method provided in an embodiment of the present application is shown, where the method is applied to the first device in fig. 1, and the method includes:
step 301, the time correction request message is encrypted through the first timestamp to obtain an encrypted time correction request message.
The first timestamp is determined based on a timestamp of when the first device generated the encrypted timing request message. In one example, the first timestamp is the timestamp of when the first device generated the encrypted message. In another example, the first timestamp is determined based on a timestamp of when the first device generates the encryption and a preset time difference, and the preset time difference is set by the first device by default or by self-definition.
The timing request message is used for requesting to correct the time of the first device. Optionally, the timing request message includes a header, a device address, a first timestamp, plaintext, a message integrity code, and so on. The header is used to indicate the first device and attribute information of the timing request message, such as whether the first device completes a distribution network, whether the first device is a timing request message, whether the timing request message is encrypted, and the like. The device address is a network address of the first device, and when the first device is a bluetooth device, the device address is a home device address allocated when the bluetooth device and the gateway device are in a network. The plaintext is also data to be encrypted, and in the embodiment of the present application, the plaintext is null data.
The encrypted timing request message is obtained by encrypting the timing request message. Optionally, the encryption timing request message includes a packet header, a device address, a first timestamp, a cipher text, a message integrity code, and the like.
Optionally, the encrypted timing request message is also a device discovery message. Since the complete first timestamp is carried in the device discovery message, the second device can correct the first device based on the first timestamp. In this case, the first device broadcasts the device discovery message, the second device scans the device discovery message and then establishes connection with the first device, and the distribution network process and the timing process are completed.
In one possible implementation, the first device initiates a timing procedure after establishing a binding relationship with other devices. In another possible implementation, the first device initiates a timing procedure when it is powered back up after being powered off. In another possible implementation manner, the first device initiates a timing procedure before sending the service message carrying the service data. The embodiment of the application does not limit the time for initiating the timing process.
Optionally, before step 301, the method further includes: and setting a timing parameter according to the power consumption of the first equipment, and then initiating a timing flow by the first equipment according to the timing parameter. The timing parameters include at least one of: a first time interval, a timing window, a second time interval.
The first time interval is a time interval between two adjacent times of initiating the timing procedure of the first device. Optionally, the first time interval is inversely related to the power consumption of the first device. That is, the larger the first time interval, the smaller the power consumption of the first device; the smaller the first time interval, the greater the power consumption of the first device.
The timing window is a time window in which the encrypted timing request message is broadcast. Optionally, the timing window has a positive correlation with the power consumption of the first device. That is, the larger the timing window is, the larger the power consumption of the first device is; the smaller the timing window, the smaller the power consumption of the first device.
The second time interval is the time interval between two adjacent broadcast encryption timing request messages. Optionally, the second time interval is inversely related to the power consumption of the first device. That is, the smaller the second time interval, the greater the power consumption of the first device; the larger the second time interval, the smaller the power consumption of the first device.
In one example, the first time interval is 30 minutes, the timing window is 15 seconds, and the second time interval is 200 milliseconds. In another example, the first time interval is flexibly set according to the timing initiation times, such as the first time interval is 30 seconds, the second time interval is 1 minute, the third time interval is 2 minutes, and the latter time interval is twice as long as the former time interval until the first time interval is 30 minutes.
Step 302, broadcasting an encrypted timing request message.
The encrypted timing request message carries a first timestamp.
Step 303, receiving a timing response message returned by the second device when determining that the first device is in the timing response message returned by the timing waiting state.
The time waiting state refers to a state that the difference value between the first time stamp and the second time stamp is greater than a preset threshold. The timing waiting state is used for indicating that the time of the first device is deviated from the time of the second device. And the second device determines that the first device is in a timing state when the decryption by the first timestamp is successful but the difference value between the first timestamp and the second timestamp is greater than a preset threshold.
The second timestamp is determined based on the timestamp of when the second device scanned the encrypted timing request message. In one example, the second timestamp is the timestamp of when the second device scanned the encrypted timing request message. In another example, the second timestamp is determined by a timestamp of when the second device scans the encrypted timing request message and a preset time difference value, and the preset time difference value is set by the second device by default or by self-definition.
The preset threshold is set according to experiments or experience, and the embodiment of the present application does not limit this. Illustratively, the preset threshold is 8 seconds.
The timing response message is used for responding to the encrypted timing request message. Optionally, the timing response message carries a packet header, a device address of the second device, timing time, and the like. The time-correcting time is used to correct the time of the first device, and is usually a reference time, which is obtained locally by the second device or from the network.
When the difference value between the first timestamp and the timestamp of the second device during decryption is large, it indicates that the time of the first device is not synchronous with the time of the second device, and the time of the first device needs to be corrected.
Optionally, before sending the timing response message, the second device determines whether to establish a communication connection with the first device, and if the communication connection is not established between the first device and the second device, the second device sends a connection establishment request to the first device, and the first device establishes a communication connection with the second device according to the connection establishment request. After the communication connection is established, the second equipment returns a time correction response message to the first equipment through the communication connection; or after the communication connection is established, the first device sends a timing request to the second device through the communication connection, and the second device returns a timing response message through the communication connection according to the timing request.
And step 304, correcting the time of the first device according to the timing time.
The first device sets the time to the current time of the first device to realize the time correction of the first device.
Optionally, after the time calibration is completed, the first device detects whether a data interaction requirement with the second device exists within a preset time, if not, the communication connection is disconnected, and if so, the communication connection is maintained. The preset time is set according to actual requirements, and the embodiment of the application is not limited thereto. Illustratively, the preset time period is 10 minutes. The data interaction requirement with the second equipment means that data interaction with the second equipment is required. By the mode, after the time correction is completed, if the first equipment judges that the data interaction with the second equipment is not needed within a long time, the communication connection between the first equipment and the second equipment is disconnected, and the connection resources of the first equipment are saved.
Optionally, after completing timing, the first device updates the timing flag bit from the first preset value to the second preset value. And the value of the timing flag bit is used for indicating whether the timing of the first equipment is finished or not. When the value of the timing zone bit is a first preset value, the timing zone bit is used for indicating that the time of the first equipment is not corrected; when the timing flag bit is a second preset value, the timing flag bit is used for indicating that the time of the first device is corrected. Before the subsequent first device encrypts the timing request message, whether the time of the first device needs to be corrected is determined according to the timing zone bit, and if not, the subsequent process is not carried out. By the method, repeated timing is avoided, and processing resources of the first device are saved.
Optionally, the first device updates the calibration flag bit from the second preset value to the first preset value when detecting that there is a preset calibration opportunity, where the preset calibration opportunity includes, but is not limited to: and powering on the first equipment again after power failure, and enabling the time interval between the last time correction time and the current time to reach a first time interval. By the mode, the first equipment can be timely calibrated.
To sum up, the technical scheme provided by the embodiment of the application encrypts the timing request message through the first timestamp, and carries the time data determined based on the first timestamp to the encrypted timing request message and broadcasts the time data to the outside, when the encrypted timing request message is scanned by the subsequent second device, the second timestamp used in decryption is generated based on the time data, if the second timestamp is larger than the current time difference value, or the encrypted timing request message cannot be decrypted, the timing flow of the first device is initiated, so that an automatic timing scheme is realized, user participation is not needed, and the timing efficiency is improved.
In the above embodiment, the encrypted time correction request message is obtained by processing the time correction request message with the first timestamp by the first device, and the following explains the procedure. In an alternative embodiment provided on the basis of the embodiment shown in fig. 3, step 301 is implemented as the following sub-steps:
in step 301a, an encrypted initialization vector is generated based on the first timestamp.
The encryption initialization vector refers to an initialization vector used in an encryption process.
Optionally, step 301a comprises the following sub-steps:
step 301a1, encoding the timestamp according to a preset format to obtain a first encoded timestamp.
The preset format refers to a format that allows recognition and parsing by the first device and the device receiving the encrypted message. Optionally, the preset format is negotiated by the first device and the device receiving the encrypted message. Illustratively, the predetermined format is a network coding order.
In step 301a2, if the number of bits included in the first encoded timestamp is smaller than the number of bits included in the initialization vector, performing bit-filling processing on the first encoded timestamp to obtain the first bit-filled timestamp.
The initialization vector is pre-agreed by the first device and the device receiving the encrypted message. Taking the first device as a bluetooth device and the device receiving the encrypted message as a gateway device as an example, the first device and the gateway device negotiate to determine an initialization vector in the process of the distribution network.
The bit complementing process is to increase the number of bits included in the first encoded timestamp so that the number of bits included in the first encoded timestamp is the same as the number of bits included in the initialization vector.
Optionally, the first device calculates a difference between a bit number included in the first encoded timestamp and a bit number included in the initialization vector, and then fills a set value at a specified position of the first encoded timestamp, where the number of fills is the difference.
The specified location is set by the first device by default, or by negotiation between the first device and the device receiving the encrypted message. Such as before the first bit of the first encoded timestamp or after the last bit of the first encoded timestamp. The setting value is also set by the first device by default or by the first device and the device receiving the encrypted message negotiating the setting, such as 0 or 1.
Illustratively, the first coded timestamp includes 8 bits, which is 11100111, the initialization vector includes 13 bits, the first device calculates that a difference between a bit number included in the first coded timestamp and a bit number included in the initialization vector is 5, and then complements 50 bits after the last bit of the first coded timestamp, so as to obtain 11100111, where the bit number included in the first coded timestamp is the same as the bit number included in the initialization vector.
And if the bit number included by the first coded timestamp is equal to the bit number included by the initialization vector, directly determining the first coded timestamp as a first post-bit-filling timestamp.
Step 301a3, performing a logic operation on the first post-bit-padding timestamp and the initialization vector to obtain an encrypted initialization vector.
Optionally, the first device performs an exclusive or operation on the first post-bit-padding timestamp and the initialization vector to obtain an encrypted initialization vector. Illustratively, the initialization vector is 1100101011001, the timestamp is 1110011100000 after the first complementary bit, and the two are xor-processed to obtain an encrypted initial vector of 0010110111001.
And step 301b, encrypting the timing request message by the encryption initialization vector to obtain an encrypted timing request message.
The first device encrypts the time correction request message through the encryption initialization vector, the encryption algorithm and the encryption key to obtain the encryption time correction request message.
The Encryption Algorithm used in the Encryption process includes, but is not limited to, a Data Encryption Standard (DES) Algorithm, a Triple Data Encryption Algorithm (3 DES) Algorithm, an Advanced Encryption Standard (AES) Algorithm, and the like. In the embodiment of the present application, only the encryption algorithm is exemplified as the AES algorithm. The encryption key is negotiated and set by the first device and the device that receives the encrypted timing request message.
Optionally, the timing scheme provided in the embodiment of the present application is applied to the field of Internet of Things (IOT), where the first device is a bluetooth device, and the second device is a mobile terminal. The time correcting method comprises the following steps:
and step 31, encrypting the timing request message through the first timestamp to obtain an encrypted timing request message.
The first timestamp is determined based on a timestamp of when the bluetooth device generated the encrypted timing request message.
The timing request message is used for requesting the correction of the time of the Bluetooth device.
Step 32, broadcasting the encrypted timing request message.
The encrypted timing request message carries time data determined based on the first timestamp.
And step 33, receiving a timing response message returned by the mobile terminal when the mobile terminal determines that the Bluetooth device is in the timing response message returned by the timing state to be calibrated.
The time waiting state refers to a state that the difference value between the first time stamp and the second time stamp is greater than a preset threshold. The timing waiting state is used for indicating that the time of the first device is deviated from the time of the second device.
And the mobile terminal determines that the Bluetooth device is in a waiting time correcting state when the decryption is successful through the first timestamp but the difference value between the first timestamp and the second timestamp is greater than a preset threshold. The second time stamp is a time stamp when the mobile terminal scans the encrypted timing request message. The time correction response message carries time correction time.
And step 34, correcting the time of the Bluetooth device according to the timing time.
Referring to fig. 4, a flowchart of a timing method according to an embodiment of the present application is shown. The method is applied to the second device in the embodiment of fig. 1, and the method comprises the following steps:
step 401, scanning an encrypted timing request message broadcast by a first device.
The encrypted timing request message carries a first timestamp.
Step 402, decrypting the encrypted timing request message according to the first timestamp.
The process of the second device decrypting the encrypted timing request message by the first timestamp is as follows: and generating a decryption initial vector according to the first time stamp, and decrypting the encryption timing request message through the decryption initial vector. The steps of generating the decryption initial vector according to the first timestamp and generating the encryption initial vector according to the first timestamp are the same, and are not described herein again.
Step 403, if the decryption is successful, but the difference between the first timestamp and the second timestamp is greater than the preset threshold, sending a timing response message to the first device.
The preset threshold is set according to experiments or experience, and the embodiment of the present application does not limit this. Illustratively, the preset threshold is 8 seconds.
The timing response message is used for responding to the encrypted timing request message. Optionally, the timing response message carries a packet header, a device address of the second device, timing time, and the like. The time-correcting time is used to correct the time of the first device, and is usually a reference time, which is obtained locally by the second device or from the network. The first device is used for correcting the time of the first device according to the time correcting time carried by the time correcting response message.
And the second equipment determines that the Bluetooth equipment is in a state of waiting for timing when the decryption is successful through the first timestamp but the difference value between the first timestamp and the second timestamp is greater than a preset threshold, and then sends a timing response message to the first equipment. That is, when the difference between the first timestamp and the timestamp of the second device scanning the encrypted timing request message is large, it indicates that the time of the first device is not synchronized with the time of the second device, and the time of the first device needs to be corrected.
Optionally, before sending the timing response message, the second device determines whether to establish a communication connection with the first device, and if the communication connection is not established between the first device and the second device, the second device sends a connection establishment request to the first device, and the first device establishes a communication connection with the second device according to the connection establishment request. After the communication connection is established, the second equipment returns a time correction response message to the first equipment through the communication connection; or after the communication connection is established, the first device sends a timing request to the second device through the communication connection, and the second device returns a timing response message through the communication connection according to the timing request.
To sum up, the technical scheme provided by the embodiment of the application encrypts the timing request message through the first timestamp, and carries the time data determined based on the first timestamp to the encrypted timing request message and broadcasts the time data to the outside, when the encrypted timing request message is scanned by the subsequent second device, the second timestamp used in decryption is generated based on the time data, if the second timestamp is larger than the current time difference value, or the encrypted timing request message cannot be decrypted, the timing flow of the first device is initiated, so that an automatic timing scheme is realized, user participation is not needed, and the timing efficiency is improved.
Fig. 5 is a flow chart illustrating timing of a time of a first device according to an embodiment of the present application. The method comprises the following steps:
step 501, after the first device completes binding, or after the first device is powered off and then powered on, an encrypted timing request message is broadcast.
Step 502, after scanning the encrypted timing request broadcast, the second device decrypts the encrypted timing request message according to the first timestamp carried by the encrypted timing request message.
Step 503, if the decryption is successful, and the difference between the second timestamp and the timestamp of the second device when scanning the encrypted timing request message is greater than the preset threshold, initiating connection timing.
Step 504, the first device establishes a communication connection with the second device.
Step 505, the first device sends a timing request to the second device.
Step 506, the second device sends a timing response to the first device, and the timing response carries timing time.
And step 507, the first device finishes timing according to the timing time.
Step 508, the first device disconnects the communication with the second device.
Optionally, the timing scheme provided in this embodiment of the present application is applied to the IOT field, where the first device is a bluetooth device and the second device is a mobile terminal. The time correcting method comprises the following steps:
step 51, scanning the encrypted timing request message broadcast by the bluetooth device.
The encrypted timing request message carries a first timestamp.
The first timestamp is a timestamp of when the bluetooth device generated the encrypted timing request message.
And step 52, decrypting the encrypted timing request message according to the first time stamp.
And 53, if the decryption is successful, but the difference value between the first time stamp and the second time stamp is greater than a preset threshold, sending a timing response message to the bluetooth device.
The Bluetooth device is used for correcting the time of the Bluetooth device according to the time correcting time carried by the time correcting response message.
In the following, embodiments of the apparatus of the present application are described, and for portions of the embodiments of the apparatus not described in detail, reference may be made to technical details disclosed in the above-mentioned method embodiments.
Fig. 6 is a block diagram illustrating a timing device according to an exemplary embodiment of the present application. The timing device can be realized by software, hardware or a combination of the software and the hardware to form all or part of the terminal. This timing device includes:
the encryption module 601 is configured to encrypt the timing request message by using a first timestamp to obtain an encrypted timing request message, where the first timestamp is determined based on a timestamp of the first device when the encrypted timing request message is generated, and the timing request message is used to request to correct the time of the first device.
A broadcasting module 602, configured to broadcast the encrypted timing request message, where the encrypted timing request message carries the first timestamp.
A message receiving module 603, configured to receive a timing response message returned by the second device when determining that the first device is in a to-be-calibrated state, where the timing response message carries timing time, the to-be-calibrated state refers to a state where a difference between the first timestamp and the second timestamp is greater than a preset threshold, and the second timestamp is determined based on a timestamp of the encrypted timing request message scanned by the second device.
A correcting module 604, configured to correct the time of the first device according to the time-correcting time.
To sum up, the technical scheme provided by the embodiment of the application encrypts the timing request message through the first timestamp, and carries the time data determined based on the first timestamp to the encrypted timing request message and broadcasts the time data to the outside, when the encrypted timing request message is scanned by the subsequent second device, the second timestamp used in decryption is generated based on the time data, if the second timestamp is larger than the current time difference value, or the encrypted timing request message cannot be decrypted, the timing flow of the first device is initiated, so that an automatic timing scheme is realized, user participation is not needed, and the timing efficiency is improved.
In an optional embodiment provided based on the embodiment shown in fig. 6, the encryption module 601 is configured to:
generating an encryption initialization vector according to the first timestamp;
and encrypting the timing request message through the encrypted initialization vector to obtain the encrypted timing request message.
Optionally, the encryption module 601 is configured to:
coding the first timestamp according to a preset format to obtain a first coded timestamp;
if the bit number included by the first coded timestamp is smaller than the bit number included by an initialization vector, performing bit complementing processing on the first coded timestamp to obtain a first bit-complemented timestamp, wherein the bit number included by the first bit-complemented timestamp is the same as the bit number included by the initialization vector;
and performing logic operation on the first post-bit-complementing timestamp and the initialization vector to obtain the encrypted initialization vector.
Optionally, the encryption module 601 is configured to:
and carrying out XOR operation on the first post-bit-complementing timestamp and the initialization vector to obtain the encrypted initialization vector.
In an optional embodiment provided based on the embodiment shown in fig. 6, the apparatus further comprises: a parameter setting module (not shown in fig. 6).
A parameter setting module, configured to set a timing parameter according to power consumption of the first device, where the timing parameter includes at least one of: a first time interval, a timing window and a second time interval; the first time interval is a time interval between two adjacent times of initiating the timing process of the first device, the timing window is a time window for broadcasting the encrypted timing request message, and the second time interval is a time interval between two adjacent times of broadcasting the encrypted timing request message.
And the encryption module is further configured to encrypt the timing request message according to the timing parameter from the first timestamp, and start execution of the step of obtaining the encrypted timing request message.
In an optional embodiment provided based on the embodiment shown in fig. 6, the apparatus further comprises: a flag bit update module (not shown in fig. 6).
And the flag bit updating module is used for updating the timing flag bit from a first preset value to a second preset value, indicating that the time of the first equipment is not corrected when the timing flag bit is the first preset value, and indicating that the time of the first equipment is corrected when the timing flag bit is the second preset value.
In an optional embodiment provided based on the embodiment shown in fig. 6, the first device is a bluetooth device, and the second device is a mobile terminal;
the encryption module 601 is configured to encrypt the timing request message by using a first timestamp to obtain an encrypted timing request message, where the first timestamp is determined based on a timestamp of the bluetooth device when the encrypted timing request message is generated, and the timing request message is used to request to correct the time of the bluetooth device.
The broadcasting module 602 is configured to broadcast the encrypted timing request message, where the encrypted timing request message carries the first timestamp.
The message receiving module 603 is configured to receive a timing response message returned by the second device when it is determined that the first device is in the to-be-calibrated state, where the timing response message carries timing time, and when the second device succeeds in decryption through the first timestamp but a difference between the first timestamp and the second timestamp is greater than a preset threshold, it is determined that the first device is in the to-be-calibrated state, and the second timestamp is a timestamp when the second device scans the encrypted timing request message.
The timing module 604 is configured to correct the time of the bluetooth device according to the timing time.
Fig. 7 is a block diagram illustrating a timing device according to an exemplary embodiment of the present application. The timing device can be realized by software, hardware or a combination of the software and the hardware to form all or part of the terminal. This timing device includes:
the scanning module 701 is configured to scan an encrypted timing request message broadcasted by a first device, where the encrypted timing request message carries a first timestamp, and the first timestamp is determined based on a timestamp when the encrypted timing request message is generated by the first device.
A decryption module 702, configured to decrypt the encrypted timing request message according to the first timestamp.
A message sending module 703 is configured to send a timing response message to the first device if the decryption is successful, but a difference between the first timestamp and the second timestamp is greater than a preset threshold, where the second timestamp is determined based on a timestamp of the encrypted timing request message scanned by the second device, and the first device is configured to correct the time of the first device according to the timing time carried by the timing response message.
In an alternative embodiment provided based on the embodiment shown in fig. 7, the decryption module 702 is configured to:
generating a decryption initialization vector according to the first timestamp;
and decrypting the timing request message according to the decryption initialization vector.
It should be noted that, when the apparatus provided in the foregoing embodiment implements the functions thereof, only the division of the functional modules is illustrated, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the internal structure of the apparatus may be divided into different functional modules to implement all or part of the functions described above. In addition, the apparatus and method embodiments provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments for details, which are not described herein again.
Fig. 8 is a block diagram illustrating a computer device according to an exemplary embodiment of the present application. The computer device in the present application may comprise one or more of the following components: a processor 810 and a memory 820.
Processor 810 may include one or more processing cores. The processor 810 interfaces with various components throughout the computer device using various interfaces and circuitry to perform various functions of the computer device and process data by executing or performing instructions, programs, code sets, or instruction sets stored in the memory 820 and invoking data stored in the memory 820. Alternatively, the processor 810 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 810 may integrate one or a combination of a Central Processing Unit (CPU) and a modem. Wherein, the CPU mainly processes an operating system, an application program and the like; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 810, but may be implemented by a single chip.
Alternatively, the processor 810, when executing the program instructions in the memory 820, implements the timing method provided by the various method embodiments described below.
The Memory 820 may include a Random Access Memory (RAM) or a Read-Only Memory (ROM). Optionally, the memory 820 includes a non-transitory computer-readable medium. The memory 820 may be used to store instructions, programs, code sets, or instruction sets. The memory 820 may include a program storage area and a data storage area, wherein the program storage area may store instructions for implementing an operating system, instructions for at least one function, instructions for implementing the various method embodiments described above, and the like; the storage data area may store data created according to use of the computer device, and the like.
The structure of the computer device is only illustrative, and in actual implementation, the computer device may include more or less components, which is not limited by the embodiment.
Those skilled in the art will appreciate that the configuration illustrated in FIG. 8 is not intended to be limiting of the computer device 800 and may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components may be employed.
In an exemplary embodiment, the present application provides a computer device, where the computer device includes a bluetooth chip, and the bluetooth chip stores computer instructions, and the computer instructions are used to execute the above timing method.
In an exemplary embodiment, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program is loaded and executed by a processor of a terminal to implement the time calibration method in the above-mentioned method embodiments.
Alternatively, the computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, a computer program product is also provided, which includes computer instructions stored in a computer-readable storage medium, which are read by a processor of a computer device from the computer-readable storage medium, and the processor executes the computer instructions to make the computer device execute the time correction method provided in the foregoing aspect or various optional implementations of the aspect.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. As used herein, the terms "first," "second," and the like, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (13)

1. A timing method is applied to a first device, and comprises the following steps:
encrypting the time correction request message through a first timestamp to obtain an encrypted time correction request message, wherein the first timestamp is determined based on the timestamp of the first device when generating the encrypted time correction request message, and the time correction request message is used for requesting to correct the time of the first device;
broadcasting the encrypted timing request message, wherein the encrypted timing request message carries the first timestamp;
receiving a timing response message returned by the second device when the first device is determined to be in a timing waiting state, wherein the timing response message carries timing time, the timing waiting state refers to a state that a difference value between a first timestamp and a second timestamp is greater than a preset threshold, and the second timestamp is determined based on the timestamp of the second device when the encrypted timing request message is scanned;
and correcting the time of the first equipment according to the time correcting time.
2. The method according to claim 1, wherein the encrypting the timing request message with the first timestamp to obtain an encrypted timing request message comprises:
generating an encryption initialization vector according to the first timestamp;
and encrypting the timing request message through the encrypted initialization vector to obtain the encrypted timing request message.
3. The method of claim 2, wherein generating an encrypted initialization vector based on the first timestamp comprises:
coding the first timestamp according to a preset format to obtain a first coded timestamp;
if the bit number included by the first coded timestamp is smaller than the bit number included by an initialization vector, performing bit complementing processing on the first coded timestamp to obtain a first bit-complemented timestamp, wherein the bit number included by the first bit-complemented timestamp is the same as the bit number included by the initialization vector;
and performing logic operation on the first post-bit-complementing timestamp and the initialization vector to obtain the encrypted initialization vector.
4. The method of claim 3, wherein performing a logical operation on the first post-complement timestamp and the initialization vector to obtain the encrypted initialization vector comprises:
and carrying out XOR operation on the first post-bit-complementing timestamp and the initialization vector to obtain the encrypted initialization vector.
5. The method according to any one of claims 1 to 4, wherein before the encrypting the timing request message by the first timestamp to obtain the encrypted timing request message, the method comprises:
setting a timing parameter according to the power consumption of the first device, wherein the timing parameter comprises at least one of the following items: a first time interval, a timing window and a second time interval; the first time interval is a time interval between two adjacent times of initiating the timing process of the first device, the timing window is a time window for broadcasting the encrypted timing request message, and the second time interval is a time interval between two adjacent times of broadcasting the encrypted timing request message;
and encrypting the timing request message according to the timing parameter from the first timestamp to obtain an encrypted timing request message.
6. The method according to any one of claims 1 to 4, wherein after correcting the time of the first device according to the timing time, the method further comprises:
and updating a timing zone bit from a first preset value to a second preset value, wherein the timing zone bit is used for indicating that the time of the first equipment is not corrected when being the first preset value, and the timing zone bit is used for indicating that the time of the first equipment is corrected when being the second preset value.
7. The method according to any one of claims 1 to 4, wherein the first device is a Bluetooth device and the second device is a mobile terminal, the method comprising:
encrypting the timing request message by using a first timestamp to obtain an encrypted timing request message, wherein the first timestamp is determined based on the timestamp of the Bluetooth device when generating the encrypted timing request message, and the timing request message is used for requesting to correct the time of the Bluetooth device;
broadcasting the encrypted timing request message, wherein the encrypted timing request message carries the first timestamp;
receiving a timing response message returned by the second device when the first device is determined to be in a timing waiting state, wherein the timing response message carries timing time, the timing waiting state refers to a state that a difference value between a first timestamp and a second timestamp is greater than a preset threshold, and the second timestamp is a timestamp when the second device scans the encrypted timing request message;
and correcting the time of the Bluetooth equipment according to the timing time.
8. A timing method is applied to a second device, and comprises the following steps:
scanning an encrypted time correction request message broadcast by first equipment, wherein the encrypted time correction request message carries a first timestamp, and the first timestamp is determined based on a timestamp of the first equipment when generating the encrypted time correction request message;
decrypting the encrypted timing request message according to the first timestamp;
and if the decryption is successful, but the difference value between the first timestamp and the second timestamp is greater than a preset threshold, sending a time correction response message to the first device, wherein the second timestamp is determined based on the timestamp of the encrypted time correction request message scanned by the second device, and the first device is used for correcting the time of the first device according to the time correction time carried by the time correction response message.
9. The method of claim 8, wherein decrypting the encrypted timing request message according to the first timestamp comprises:
generating a decryption initialization vector according to the first timestamp;
and decrypting the timing request message according to the decryption initialization vector.
10. A timing device, the device comprising:
the encryption module is used for encrypting the time correction request message through a first timestamp to obtain an encrypted time correction request message, wherein the first timestamp is determined based on the timestamp of the first device when the encrypted time correction request message is generated, and the time correction request message is used for requesting to correct the time of the first device;
the broadcast module is used for broadcasting the encrypted timing request message, and the encrypted timing request message carries the first timestamp;
a message receiving module, configured to receive a timing response message returned by the second device when determining that the first device is in a to-be-calibrated state, where the timing response message carries timing time, the to-be-calibrated state refers to a state where a difference between the first timestamp and the second timestamp is greater than a preset threshold, and the second timestamp is determined based on a timestamp of the second device when scanning the encrypted timing request message;
and the correcting module is used for correcting the time of the first equipment according to the time correcting time.
11. A timing device, the device comprising:
the scanning module is used for scanning an encrypted timing request message broadcast by first equipment, wherein the encrypted timing request message carries a first timestamp, and the first timestamp is determined based on the timestamp of the first equipment when the encrypted timing request message is generated;
the decryption module is used for decrypting the encrypted timing request message according to the first timestamp;
and the message sending module is configured to send a time correction response message to the first device if the decryption is successful but a difference between the first timestamp and the second timestamp is greater than a preset threshold, where the second timestamp is determined based on a timestamp of the second device when the encrypted time correction request message is scanned, and the first device is configured to correct the time of the first device according to the time correction time carried by the time correction response message.
12. A computer device comprising a bluetooth chip, wherein the bluetooth chip stores computer instructions for performing the timing method according to any one of claims 1 to 9.
13. A computer-readable storage medium, in which a computer program is stored, which is loaded and executed by a processor to implement the timing method according to any one of claims 1 to 9.
CN202011126849.5A 2020-10-20 2020-10-20 Timing method, device, equipment and storage medium Pending CN114390492A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011126849.5A CN114390492A (en) 2020-10-20 2020-10-20 Timing method, device, equipment and storage medium
PCT/CN2021/120756 WO2022083410A1 (en) 2020-10-20 2021-09-26 Time correction method and apparatus, and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011126849.5A CN114390492A (en) 2020-10-20 2020-10-20 Timing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114390492A true CN114390492A (en) 2022-04-22

Family

ID=81192911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011126849.5A Pending CN114390492A (en) 2020-10-20 2020-10-20 Timing method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN114390492A (en)
WO (1) WO2022083410A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116846681A (en) * 2023-08-25 2023-10-03 荣耀终端有限公司 Device connection method, electronic device, and computer-readable storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115021866B (en) * 2022-05-24 2024-03-12 卡斯柯信号有限公司 Data timeliness checking method and system applied to security coding software

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763029A (en) * 2008-12-25 2010-06-30 索尼株式会社 Electronic apparatus, imaging device, method for time correction, and program
CN102739626A (en) * 2011-04-12 2012-10-17 索尼公司 Method and device for time synchronization, time stamping device and trusted time server
CN103636161A (en) * 2011-02-12 2014-03-12 瑟蒂弗克司有限公司 Use of non-interactive identity based key agreement derived secret keys with authenticated encryption
US9651651B1 (en) * 2016-03-31 2017-05-16 Voll, Inc. Imaging-based frequency receiver device calibration
CN108469725A (en) * 2018-03-27 2018-08-31 国网河北省电力有限公司电力科学研究院 Clock calibration method and terminal device
CN108964825A (en) * 2018-07-10 2018-12-07 重庆思柏高科技有限公司 Calibration method, correction device and time server
CN111385049A (en) * 2018-12-29 2020-07-07 中兴通讯股份有限公司 Time correction method, device, system and storage medium
CN111769895A (en) * 2019-04-01 2020-10-13 西安诺瓦电子科技有限公司 Multi-device timing method and system and device timing method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006092832A1 (en) * 2005-02-28 2006-09-08 Fujitsu Limited Time stamp device, time calibration method, and time calibration program
CN110445570B (en) * 2019-07-25 2021-07-20 腾讯科技(深圳)有限公司 Time calibration method, device and computer storage medium
CN110649984B (en) * 2019-09-26 2021-01-22 北京和利时系统工程有限公司 Clock synchronization method and device, computer storage medium and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763029A (en) * 2008-12-25 2010-06-30 索尼株式会社 Electronic apparatus, imaging device, method for time correction, and program
CN103636161A (en) * 2011-02-12 2014-03-12 瑟蒂弗克司有限公司 Use of non-interactive identity based key agreement derived secret keys with authenticated encryption
CN102739626A (en) * 2011-04-12 2012-10-17 索尼公司 Method and device for time synchronization, time stamping device and trusted time server
US9651651B1 (en) * 2016-03-31 2017-05-16 Voll, Inc. Imaging-based frequency receiver device calibration
CN108469725A (en) * 2018-03-27 2018-08-31 国网河北省电力有限公司电力科学研究院 Clock calibration method and terminal device
CN108964825A (en) * 2018-07-10 2018-12-07 重庆思柏高科技有限公司 Calibration method, correction device and time server
CN111385049A (en) * 2018-12-29 2020-07-07 中兴通讯股份有限公司 Time correction method, device, system and storage medium
CN111769895A (en) * 2019-04-01 2020-10-13 西安诺瓦电子科技有限公司 Multi-device timing method and system and device timing method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116846681A (en) * 2023-08-25 2023-10-03 荣耀终端有限公司 Device connection method, electronic device, and computer-readable storage medium
CN116846681B (en) * 2023-08-25 2023-11-21 荣耀终端有限公司 Device connection method, electronic device, and computer-readable storage medium

Also Published As

Publication number Publication date
WO2022083410A1 (en) 2022-04-28

Similar Documents

Publication Publication Date Title
CN110177354B (en) Wireless control method and system for vehicle
CN113055867B (en) Terminal auxiliary network distribution method and device and electronic equipment
US8699475B2 (en) Communication system, communication apparatus and method for setting communication parameters of the apparatus
JP5053424B2 (en) RELAY DEVICE, WIRELESS COMMUNICATION DEVICE, NETWORK SYSTEM, PROGRAM, AND METHOD
CN111246539B (en) Networking binding method of intelligent household appliance, intelligent household appliance and user terminal
CN113099443B (en) Equipment authentication method, device, equipment and system
EP3537652B1 (en) Method for securely controlling smart home appliance and terminal device
US20240031800A1 (en) Network access authentication method and device
US20170338959A1 (en) Method and apparatus for providing service on basis of identifier of user equipment
JP2017515353A (en) Addressing identifier assignment method, access point, station, and communication system
CN107567017B (en) Wireless connection system, device and method
US8792644B2 (en) Communication apparatus for performing communication parameter setting and authentication process, control method thereof and storage medium storing program
CN114125832B (en) Network connection method, terminal, network equipment to be distributed and storage medium
WO2022083410A1 (en) Time correction method and apparatus, and device and storage medium
CN109150508A (en) Equipment control and controlled method, device, computer equipment and storage medium
US20200067703A1 (en) First vehicle-side terminal, method for operating the first terminal, second vehicle-side terminal and method for operating the second vehicle-side terminal
WO2022083448A1 (en) Encryption method, decryption method, an apparatus and a device
WO2018202117A1 (en) Key updating method and device
CN114390521A (en) Key updating method, device, equipment and storage medium
CN115118458B (en) Data processing method, device, computer equipment and storage medium
CN116347656A (en) Bluetooth encryption connection method and device and electronic equipment
CN114793178B (en) Network distribution method, device, equipment and storage medium
KR100655579B1 (en) System and method of location management for providing service based location in mobile
CN115567195A (en) Secure communication method, client, server, terminal and network side equipment
CN112422275A (en) Key negotiation method, system, equipment and computer storage medium in UART communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination