CN111447213A - Verification code determination method and device for discovery service and equipment discovery system - Google Patents

Verification code determination method and device for discovery service and equipment discovery system Download PDF

Info

Publication number
CN111447213A
CN111447213A CN202010215222.0A CN202010215222A CN111447213A CN 111447213 A CN111447213 A CN 111447213A CN 202010215222 A CN202010215222 A CN 202010215222A CN 111447213 A CN111447213 A CN 111447213A
Authority
CN
China
Prior art keywords
service
verification code
information
multicast
broadcast
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010215222.0A
Other languages
Chinese (zh)
Other versions
CN111447213B (en
Inventor
蒋加平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202010215222.0A priority Critical patent/CN111447213B/en
Publication of CN111447213A publication Critical patent/CN111447213A/en
Application granted granted Critical
Publication of CN111447213B publication Critical patent/CN111447213B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1454Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a verification code determination method, a verification code determination device and an equipment discovery system for discovery service. The scheme is as follows: the first service equipment generates a first verification code matched with the first service, multicasts/broadcasts the verification code to be detected, the verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code, and under the condition that a multicast response/broadcast response indicating that the verification code to be detected is occupied is not received, the first verification code is determined to be the verification code for finding the first service. Compared with the prior art, the technical scheme provided by the embodiment of the invention has the advantages that the first service equipment can autonomously determine the verification code corresponding to the service provided by the first service equipment without the assistance of a third-party server, so that the third-party server does not need to be deployed in the network deployment process, and the network deployment cost is effectively reduced.

Description

Verification code determination method and device for discovery service and equipment discovery system
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a verification code determination method, device, and device discovery system for discovery services.
Background
Different service devices may provide different service functions for the user device, for example, the screen projection device may provide a screen projection service for the user device, and the like. Since the number of service devices in the network that can provide services for the user device may be more than one, the user device often needs to access the services provided by each service device in the network by means of a third-party server. Specifically, the third-party server allocates a corresponding verification code to the service according to the service provided by the service device, and the user device can discover or even access the corresponding service device based on the verification code, thereby discovering and accessing the service provided by the service device.
In the above verification code determining process, since the verification code of the discovery service device can be determined only by using a third-party server, the third-party server needs to be deployed in the network when the network is deployed, which results in higher network deployment cost.
Disclosure of Invention
The embodiment of the invention aims to provide a verification code determining method, a verification code determining device and an equipment discovery system for discovery service, so as to reduce network deployment cost. The specific technical scheme is as follows:
the embodiment of the invention provides a verification code determining method for discovering service, which is applied to first service equipment and comprises the following steps:
generating a first verification code matched with the first service;
multicasting/broadcasting a verification code to be detected, wherein the verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code;
and under the condition that the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received, determining the first verification code as the verification code for discovering the first service.
An embodiment of the present invention further provides an apparatus for determining an authentication code for discovering a device, which is applied to a first service device, and the apparatus includes:
the generation module is used for generating a first verification code matched with the first service;
the first multicast module/first broadcast module is used for multicasting/broadcasting the verification code to be detected, wherein the verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code;
a determining module, configured to determine the first verification code as the verification code for discovering the first service when a multicast response/broadcast response indicating that the verification code to be detected is occupied is not received.
The embodiment of the invention also provides a device discovery system which is applied to the peer-to-peer network and comprises a first service device and a user device;
the first service equipment is used for generating a first verification code matched with the first service; multicasting/broadcasting a verification code to be detected, wherein the verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code; determining the first verification code as a verification code for discovering the first service under the condition that a multicast response/broadcast response indicating that the verification code to be detected is occupied is not received;
and the user equipment is used for determining the first service equipment as equipment to be accessed according to the first verification code.
The embodiment of the invention also provides electronic equipment which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete mutual communication through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing any one of the steps of the verification code determination method for discovering services when executing the program stored in the memory.
An embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the method for determining an authentication code for a discovery service includes any one of the above steps.
Embodiments of the present invention further provide a computer program product containing instructions, which when run on a computer, cause the computer to execute any one of the above-mentioned verification code determination methods for discovery services.
The embodiment of the invention has the following beneficial effects:
according to the technical scheme provided by the embodiment of the invention, the first service equipment generates the first verification code matched with the first service, the first verification code or the verification code encrypted by the first verification code is used as the verification code to be detected, the verification code to be detected is multicast/broadcast in the network, and when the multicast response/broadcast response of the verification code to be detected is not received, the generated first verification code is determined as the verification code for discovering the first service. Compared with the prior art, the first service equipment can autonomously determine the verification code corresponding to the service provided by the first service equipment without the assistance of a third-party server, so that the third-party server does not need to be deployed in the network deployment process, and the network deployment cost is effectively reduced.
Of course, not all of the advantages described above need to be achieved at the same time in the practice of any one product or method of the invention.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a first flowchart illustrating a verification code determining method for discovery service according to an embodiment of the present invention;
fig. 2 is a second flowchart illustrating a verification code determining method for discovery service according to an embodiment of the present invention;
fig. 3 is a third flowchart illustrating an authentication code determining method for discovering services according to an embodiment of the present invention;
fig. 4 is a fourth flowchart illustrating a verification code determining method for discovery service according to an embodiment of the present invention;
fig. 5 is a fifth flowchart illustrating a verification code determining method for discovery service according to an embodiment of the present invention;
fig. 6 is a sixth flowchart illustrating a verification code determining method for discovery service according to an embodiment of the present invention;
fig. 7 is a schematic flowchart of a seventh method for determining an authentication code for a discovery service according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a device discovery system according to an embodiment of the present invention;
fig. 9 is a signaling diagram of a device discovery process according to an embodiment of the present invention;
fig. 10-a is a schematic diagram of a first structure of an apparatus for determining an authentication code for a discovery service according to an embodiment of the present invention;
fig. 10-b is a schematic diagram of a second structure of an apparatus for determining an authentication code for a discovery service according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, when a service device provides a service for a user device, a verification code corresponding to the service provided by the service device is often obtained with the assistance of a third-party server, and the user device can discover and even access the service provided by the service device according to the determined verification code. The service device is taken as a screen projection device for example, and the screen projection device can provide screen projection service for the user device. When the service device provides the screen projection service for the user device, a verification code corresponding to the screen projection service needs to be generated by means of a third-party server. At this time, the third-party server may assign or push the verification code to the screen projection device, so that the user device may discover or even access the screen projection service provided by the screen projection device. But this will increase the deployment cost of the network deployment due to the presence of the third party server.
In order to solve the problem of high network deployment, an embodiment of the present invention provides a verification code determination method for discovery services. The method can be applied to a first service device in the peer-to-peer network, where the first service device can be any service device in the peer-to-peer network, that is, the first service device can be any electronic device in the peer-to-peer network that provides a service for the user equipment. Here, the first service apparatus is not particularly limited. In the method provided by the embodiment of the present invention, a first verification code matching a first service is generated, and a verification code to be detected is multicast/broadcast, where the verification code to be detected is the first verification code or a verification code obtained by encrypting the first verification code, and the first verification code is determined as a verification code for finding the first service when a multicast response/broadcast response indicating that the verification code to be detected is occupied is not received.
The peer-to-peer network comprises at least one serving device. In addition, the peer-to-peer network may further include a plurality of service devices and at least one user device. Here, the number of the user equipment and the service equipment included in the peer-to-peer network is not particularly limited.
In the embodiment of the present invention, the peer-to-peer network is any network that can provide multicast/broadcast functions, and each device in the network can directly access point-to-point. For example, a plurality of electronic devices may access a multicast group in which a router is located, and a network formed by the plurality of electronic devices is a peer-to-peer network. The user equipment and the service equipment are not specifically described here.
According to the method provided by the embodiment of the invention, the first service equipment generates the first verification code matched with the first service, the first verification code or the verification code encrypted by the first verification code is used as the verification code to be detected, the verification code to be detected is multicast/broadcast in the network, and when the multicast response/broadcast response of the verification code to be detected is not received, the generated first verification code is determined as the verification code for finding the first service. Compared with the prior art, the first service equipment can autonomously determine the verification code corresponding to the service provided by the first service equipment without the assistance of a third-party server, so that the third-party server does not need to be deployed in the network deployment process, and the network deployment cost is effectively reduced.
Specific examples are provided below to illustrate examples of the present invention.
As shown in fig. 1, fig. 1 is a first flowchart illustrating a verification code determination method for discovery service according to an embodiment of the present invention. The method is applied to a first service device in a peer-to-peer network, and specifically comprises the following steps.
Step S101, generating a first verification code matched with the first service.
In this step, the first service device may provide the first service for the user equipment. The first service device may generate a first verification code that matches the first service.
In this embodiment of the present invention, the service that the first service device may provide may be a plurality of different services, and the first service may be any one of the plurality of different services, for example, the first service device may be a screen projection device, and the first service may be a screen projection service provided by the first service device. Here, the first service is not particularly limited. For the specific generation step of the first verification code, reference may be made to the following description, which is not specifically described herein.
In this embodiment of the present invention, the first service device may be any service device in a peer-to-peer network. For example, the first service device may be a service device that accesses the peer-to-peer network at the current time. The first serving device may also be a serving device that has accessed the peer-to-peer network before the current time. Here, the first service apparatus is not particularly limited.
The first service device may access the peer-to-peer network in a plurality of manners, for example, the peer-to-peer network is a multicast group where a router is located, and the first service device may access the peer-to-peer network in a manner of joining the multicast group. Here, the manner in which the first service device accesses the peer-to-peer network is not particularly limited.
The user equipment may be any user equipment in a peer-to-peer network. For example, the ue may be a ue accessing the peer-to-peer network at the current time. The user equipment may also be a user equipment that has accessed the peer-to-peer network before the current time. The user equipment may also be a user equipment that has accessed the peer-to-peer network after the current time. For example, the current time is a time point corresponding to the first verification code matched with the first service generated by the first service device, and the user equipment may be a user equipment accessing the network of the pair after the time point. In addition, as for the manner of accessing the peer-to-peer network by the user equipment, reference may be made to the manner of accessing the peer-to-peer network by the first service equipment, and here, the manner of accessing the peer-to-peer network by the user equipment is not particularly limited.
Step S102, the verification code to be detected is multicast/broadcast, and the verification code to be detected is the first verification code or the verification code after the first verification code is encrypted.
In an optional embodiment, after generating the first verification code, the first service device may use the first verification code as the verification code to be detected, and multicast/broadcast the verification code to be detected in the peer-to-peer network.
In another optional embodiment, after generating the first verification code, the first service device may encrypt the first verification code, use the encrypted first verification code as the verification code to be detected, and multicast/broadcast the verification code to be detected in the peer-to-peer network.
In this embodiment of the present invention, the multicasting/broadcasting the verification code to be detected may be represented by that the first service device directly multicasts/broadcasts the verification code to be detected to the peer-to-peer network, or may be represented by that the first service device multicasts/broadcasts the verification code to be detected to the peer-to-peer network in a form of multicasting/broadcasting a detection request including the verification code to be detected. Here, the multicast/broadcast format of the verification code to be detected is not particularly limited.
In an optional embodiment, in step S102, multicasting/broadcasting the verification code to be detected may specifically be represented as:
the first service equipment carries out multicast/broadcast for a preset number of times on the verification code to be detected according to a preset time interval.
In the embodiment of the present invention, when the verification code to be detected is multicast/broadcast, the verification code to be detected or the detection request including the verification code to be detected is transmitted in the peer-to-peer network in the form of a multicast packet/broadcast packet, and due to the influence of factors such as a network environment, a packet loss phenomenon may occur in the transmission process of the multicast packet/broadcast packet, so that the reception of the multicast packet/broadcast packet by other service devices in the peer-to-peer network except the first service device and the detection of the verification code to be detected are influenced. In order to reduce the probability of packet loss in the multicast/broadcast process of the to-be-detected verification code, the first service device may multicast/broadcast the to-be-detected verification code for a preset number of times in the peer-to-peer network according to a preset time interval. For example, the first service device may multicast/broadcast the detection request including the to-be-detected authentication code once every 0.3 seconds in the peer-to-peer network until the detection request is multicast/broadcast 3 times, and stop multicasting/broadcasting the detection request including the to-be-detected authentication code.
In the peer-to-peer network, since the serving device and the ue may access or exit the peer-to-peer network at any time, that is, the serving device and the ue in the peer-to-peer network may be changed at any time, in the embodiment of the present invention, in order to improve the flexibility of the peer-to-peer network, the peer-to-peer network may adopt a network providing a multicast/broadcast function. In addition, considering that data transmission in the network with the broadcasting function is performed in a broadcasting manner, when the number of devices in the network reaches a preset device number threshold, the number of broadcast packets transmitted in the network is large, that is, excessive data transmitted in the network will cause a network storm and affect normal use of the network. Therefore, in the embodiment of the present invention, if the network with the broadcast function can overcome the influence of the network storm, or does not consider the influence of the network storm, for example, when the number of service devices in the peer-to-peer network is small, the peer-to-peer network may be a network with the broadcast function. However, when considering the effect of a network storm, the peer-to-peer network may be a network having a multicast function in order to improve the stability of the network. Therefore, the peer-to-peer network may select a network with a multicast function or a broadcast function according to factors such as an actual application scenario and user requirements, and is not limited in detail herein.
Step S103, under the condition that the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received, the first verification code is determined as the verification code for finding the first service.
In an optional embodiment, if the peer-to-peer network only includes the first service device, when the first service device multicasts/broadcasts the to-be-detected verification code in the peer-to-peer network, the first service device will not receive a multicast response/broadcast response indicating that the to-be-detected verification code is occupied, and at this time, the first service device may determine the first verification code as the verification code for finding the first service.
In another optional embodiment, the peer-to-peer network includes a plurality of service devices, for example, a second service device included in the peer-to-peer network, where the service provided by the second service device may be a plurality of different services, and the second service may be any one of the plurality of different services, for example, the second service device may be a screen projection device, and the second service may be a screen projection service provided by the second service device. At this time, the multicast response/broadcast response indicating that the verification code to be detected is occupied is used to indicate that the verification code to be detected matches the second verification code, where the second verification code may be a verification code determined by the second service device to discover the second service. The number of the second service devices included in the peer-to-peer network may be one or multiple.
Specifically, when the first service device multicasts/broadcasts the to-be-detected verification code in the peer-to-peer network, each second service device except the first service device in the peer-to-peer network may detect the received to-be-detected verification code, and when it is determined that the to-be-detected verification code is occupied, multicast/broadcast in the peer-to-peer network indicates that the multicast response/broadcast response to the to-be-detected verification code is occupied. When the first service device does not receive the multicast response/broadcast response indicating that the verification code to be detected is occupied, that is, the first verification code is not occupied by other service devices in the peer-to-peer network, the first service device may determine the first verification code as the verification code for discovering the first service. The specific verification process of the verification code to be detected is described below, and is not specifically described herein.
Because the verification code to be detected can be the first verification code or the verification code obtained by encrypting the first verification code, the matching between the verification code to be detected and the second verification code specifically includes the following two situations:
in a first case, when the verification code to be detected may be the first verification code, and when the second service device receives the verification code to be detected multicast/broadcast by the first service device, if the verification code to be detected is the same as the second verification code, the second service device may determine that the verification code to be detected matches the second verification code. That is, if the verification code to be detected is different from the second verification code, the second service device may determine that the verification code to be detected is not matched with the second verification code.
In case two, when the to-be-detected verification code is the first verification code or the verification code obtained by encrypting the first verification code, the second service device may decrypt the to-be-detected verification code after receiving the to-be-detected verification code multicast/broadcast by the first service device, so as to obtain the decrypted verification code. If the decrypted verification code is the same as the second verification code, the second service device may determine that the verification code to be detected matches the second verification code. That is, if the decrypted verification code is different from the second verification code, the second service device may determine that the verification code to be detected is not matched with the second verification code. Or, after receiving the to-be-detected verification code multicast/broadcast by the first service device, the second service device may also not decrypt the to-be-detected verification code, and compare the to-be-detected verification code with the verification code encrypted by the second verification code according to an agreed encryption method, and if the to-be-detected verification code is the same as the verification code encrypted by the second verification code according to an agreed encryption method, match the verification code; i.e. if different, there is no match.
The first service equipment can accurately determine whether the verification code to be detected is occupied or not by receiving the multicast response/broadcast response indicating that the verification code to be detected is occupied, namely, under the condition that the multicast/broadcast times of the verification code to be detected and the time of waiting for the multicast response/broadcast response of the first service equipment can be guaranteed, the probability of conflict between the first verification code and the verification code corresponding to the service provided by the second service equipment is reduced, the uniqueness of the first verification code is guaranteed, and therefore the accuracy and the effectiveness of the first verification code are improved.
In the above embodiments, only the first service device and the user equipment in the peer-to-peer network are taken as examples for explanation. The second service equipment except the first service equipment in the peer-to-peer network can determine the verification code for finding the second service by referring to the execution step corresponding to the first service equipment. And will not be described in detail herein.
By using the method shown in fig. 1, the first service device generates a first verification code matched with the first service, and uses the first verification code or the verification code encrypted by the first verification code as the verification code to be detected, multicasts/broadcasts the verification code to be detected in the network, and determines the generated first verification code as the verification code for finding the first service when the multicast response/broadcast response of the verification code to be detected is not received. Compared with the prior art, the first service equipment can autonomously determine the verification code corresponding to the service provided by the first service equipment without the assistance of a third-party server, so that the third-party server does not need to be deployed in the network deployment process, and the network deployment cost is effectively reduced.
In an optional embodiment, in order to avoid that the verification time length for the to-be-detected verification code is too long, and ensure the validity of the first verification code, if the first service device does not receive the multicast response/broadcast response indicating that the to-be-detected verification code is occupied within the preset time length, it may be determined that the first service device does not receive the multicast response/broadcast response indicating that the to-be-detected verification code is occupied. The preset duration may be set according to the detection duration of the verification code to be detected, the user requirement, and the like, and is not specifically limited herein.
In an optional embodiment, after determining the first verification code as the verification code of the first service, the first service device may display the first verification code on a display interface of the first service device, so that a user may determine the verification code corresponding to the first service provided by the first service device by viewing the display interface of the first service device. The user may input, into the user device, the verification code displayed on the display interface of the first service device when determining to access the first service. The user equipment receives the verification code input by the user, so that the first service provided by the first service equipment is accessed.
In an alternative embodiment, according to the method shown in fig. 1, an embodiment of the present invention further provides a verification code determination method for discovering a service. As shown in fig. 2, fig. 2 is a second flowchart of a verification code determination method for discovery service according to an embodiment of the present invention. The method comprises the following steps.
In step S201, a target port for providing the first service is determined.
In the peer-to-peer network, the service device provides service for the user device through different ports. The first service device may open a port corresponding to the first service as a target port for providing the first service.
In an alternative embodiment, the service device in the peer-to-peer network may include a plurality of ports, and different ports may correspond to different services, or different ports may correspond to the same service. Here, the port of the service device is not particularly limited. In addition, the destination port may be any one of a plurality of ports through which the first service device provides a service for the user equipment, and does not perform any limiting function.
Step S202, generating a verification code corresponding to the target port as a first verification code matched with the first service.
In this step, after the first service device determines the target port, the first service device may randomly generate, according to a preset character string, the verification code corresponding to the target port, as the first verification code matched with the first service.
In an embodiment of the present invention, the preset character string includes letters and numbers. To facilitate the temporary memorization of the first verification code by the user, the length of the first verification code can be controlled. For example, the first verification code may be 4 characters in length. At this time, the first verification code has (26+10)41679616 choices. Where 26 is 26 letters, i.e., A-Z, and 10 is 10 numbers, i.e., 0-9. For another example, the first verification code may be 6 characters in length. At this time, the first verification code has (26+10)62176782336 choices.
In an optional embodiment, when generating the first verification code, the first service device may randomly combine 26 letters and 10 numbers, and use a character string obtained by the combination as the first verification code.
In another alternative embodiment, a plurality of authentication codes obtained by randomly combining 26 letters and 10 numbers may be stored in the first service device in advance. When generating the first verification code, the first service device may randomly select one verification code from the stored multiple verification codes as the first verification code.
By the methods provided in steps S201 and S202, the first service device can accurately determine the first verification code matched with the first service.
Step S203, multicast/broadcast the verification code to be detected, where the verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code.
Step S204, under the condition that the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received, the first verification code is determined as the verification code for finding the first service.
The above steps S203 to S204 are the same as the above steps S102 to S103.
In an alternative embodiment, in the case of receiving a multicast response/broadcast response indicating that the verification code to be detected is occupied, the step S202 is executed again.
In this step, if the first service device receives the multicast response/broadcast response indicating that the verification code to be detected is occupied within the preset time period, the first service device may return to execute the verification code corresponding to the generation target port, as a step of executing the first verification code matched with the first service. That is, the first service device regenerates the first verification code matching the first service.
In the embodiment of the present invention, when a multicast response/broadcast response indicating that the verification code to be detected is occupied is received, by executing step S202 again, when the first verification code is occupied by other service devices in the peer-to-peer network, a new first verification code matched with the first service may be regenerated, so that the uniqueness of the first verification code generated by the first service device is ensured, the probability that the first verification code is occupied is reduced, and the validity of the first verification code is improved.
In another alternative embodiment, when there are multiple ports at a port of the first service device providing the first service, in order to improve the flexibility of determining the first verification code matching the first service, when the first service device receives a multicast response/broadcast response indicating that the verification code to be detected is occupied, the first service device may directly return to perform the step S201, that is, re-determine the target port providing the first service, and further generate the first verification code matching the first service, in addition to returning to the step S202.
In the embodiment of the present invention, when the destination port is determined again, the first service device may randomly determine one port from the plurality of ports capable of providing the first service for the user device, as the destination port, which may effectively prevent the user device from directly accessing the destination port of the service device according to the address information and the port information in the service information received by the user device at a later stage. The safety of the communication process of the user equipment and the service equipment is effectively improved through the change of the target port.
In an optional embodiment, according to the method shown in fig. 1, an embodiment of the present invention further provides a verification code determination method for discovering a service. As shown in fig. 3, fig. 3 is a third flowchart illustrating an authentication code determination method for discovery service according to an embodiment of the present invention. The method comprises the following steps.
Step S301 generates a first verification code matching the first service.
Step S302, the verification code to be detected is multicast/broadcast, and the verification code to be detected is the first verification code or the verification code after the first verification code is encrypted.
Step S303, determining the first verification code as the verification code for finding the first service when the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received.
The above steps S301 to S303 are the same as the above steps S101 to S103.
Step S304, the first service information is multicast/broadcast.
In an optional embodiment, after determining the first authentication code as the authentication code for discovering the first service, the first service device may multicast, in the form of a multicast packet, the first service information including the first authentication code, address information of the first service device, and port information of the target port to the peer-to-peer network, or broadcast, in the form of a broadcast packet, the first service device may broadcast the first service information to the peer-to-peer network. In this embodiment, the first service information includes the first verification code, address information of the first service device, and port information of the target port.
In another optional embodiment, after determining the first authentication code as the authentication code for discovering the first service, the first service device may multicast, in the form of a multicast packet, the first service information including the authentication code encrypted for the first authentication code, address information of the first service device, and port information of the target port to the peer-to-peer network, or broadcast, in the form of a broadcast packet, the first service device may broadcast the first service information to the peer-to-peer network. In this embodiment, the first service information includes an encrypted verification code of the first verification code, address information of the first service device, and port information of the target port.
After the first service device multicasts/broadcasts the first service information, each device in the peer-to-peer network may receive the first service information, that is, the user device in the peer-to-peer network may also receive the first service information. The user equipment may access the first service device according to the address information and the port information included in the first service information when the first authentication code included in the first service information matches the authentication code input by the user.
In the embodiment of the present invention, the first service device may perform encryption processing on the address information and the port information in addition to the encryption processing on the first verification code, so as to improve the security of the first service information and ensure the security of communication between the service device and the user equipment.
In an optional embodiment, the address information of the first service device may include an Internet Protocol (IP) address of the first service device, and the port information of the target port may include a port number of the target port.
In the embodiment of the present invention, when the first service device multicasts/broadcasts the first service information in the peer-to-peer network, both other service devices and the user equipment in the peer-to-peer network may receive the first service information. At this time, the user equipment and the other service equipment may store the received first service information. For example, the user equipment and the other service equipment may generate a corresponding relationship between the first service equipment and the first service information, as shown in table 1, or generate a corresponding relationship between the verification code in the first service information, and the address information of the first service equipment and the port information of the target port, as shown in table 2. The user equipment and the other service equipment may store the generated corresponding relationship in respective storage spaces. Therefore, the user equipment can determine the service equipment to be accessed according to the stored corresponding relation under the condition that the verification code input by the user is matched with the stored verification code, namely, the service equipment to be accessed is found, and then the service equipment to be accessed can be accessed according to the address and the port of the found service equipment to be accessed.
TABLE 1
Service device Service information
Device 1 Information 1 (identifying code 1, address 1, port number 1)
Device 2 Information 1 (identifying code 2, address 2, port number 2)
TABLE 2
Verification code Address Port number
Verification code 1 Address 1 Port number 1
Verification code 2 Address 2 Port No. 2
In the embodiment of the present invention, the multicast/broadcast manner for the first service information may refer to a multicast/broadcast manner of the to-be-detected authentication code in the peer-to-peer network, so as to reduce the probability of packet loss of the first service information. The specific procedures are not specifically described herein. In addition, the preset time interval and the preset number of times corresponding to the first service information multicast/broadcast may be the same as or different from the preset time interval and the preset number of times corresponding to the verification code to be detected.
Through the method shown in fig. 3, the first service device can enable the user device in the peer-to-peer network to timely and accurately receive the verification code corresponding to the first service provided by the first service device through multicasting/broadcasting the first service information, so as to access the first service according to the verification code.
In an alternative embodiment, according to the method shown in fig. 3, an embodiment of the present invention further provides a verification code determination method for discovering a service. As shown in fig. 4, fig. 4 is a fourth flowchart illustrating a verification code determination method for discovery service according to an embodiment of the present invention. The method is applied to the first service device, and specifically comprises the following steps.
Step S401 generates a first verification code matching the first service.
Step S402, the verification code to be detected is multicast/broadcast, and the verification code to be detected is the first verification code or the verification code after the first verification code is encrypted.
Step S403, determining the first verification code as the verification code for finding the first service when the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received.
The above-described steps S401 to S403 are the same as the above-described steps S301 to S303.
Step S404, receiving a service inquiry request multicast/broadcast by the user equipment.
In this step, the ue may multicast/broadcast the service query request in the peer-to-peer network, and at this time, the first service device may receive the service query request. The multicast/broadcast method of the service inquiry request may refer to the multicast/broadcast method of the verification code to be detected, and is not specifically described here.
The service inquiry request is different according to different user requirements. For example, the service query request may be a service query request corresponding to services provided by all service devices at the current time. The user equipment sends the service inquiry request, all the service equipment receiving the service inquiry request respond, namely, each service equipment receiving the service inquiry request in the peer-to-peer network multicasts/broadcasts the service information corresponding to the service equipment, thereby realizing the update of the user equipment to all the current service information and improving the accuracy and the effectiveness of the service information. For another example, the service query request may be a query request for a service provided by a service device in the peer-to-peer network. At this time, the service inquiry request may include a verification code corresponding to the service, such as service information displayed on a display interface of the service device, when all the service devices in the peer-to-peer network receive the service inquiry request, the service device providing the service may only respond to the service inquiry request, and the other service devices do not respond, or the service device storing the service information corresponding to the service may respond to the service inquiry request, so that the user device determines the service information corresponding to the service. Here, the service inquiry request is not particularly limited.
Step S405, multicast/broadcast the first service information.
In an optional embodiment, in a case where a service query request is received, the first service device may multicast/broadcast the first service information, and in this case, the service query request may be a query request for services corresponding to services provided by all service devices at the current time.
In this embodiment, only the first service device is taken as an example for explanation. For each service device in the peer-to-peer network, after each service device receives the service query request, each service device may multicast/broadcast service information including a service provided by the service device.
In another optional embodiment, in the case of receiving the service query request, if the third verification code carried in the service query request matches the first verification code, the first service information is multicast/broadcast. The third verification code may be a verification code input by a user, or a verification code obtained by encrypting the verification code input by the user. In this case, the service query request may be a query request for a service provided by a service device in the peer-to-peer network.
In an optional embodiment, if the third verification code carried in the service query request does not match the first verification code, the first service device does not respond to the service query request, that is, the first service device does not process the received service query request.
In another optional embodiment, if the third verification code carried in the service query request does not match the first verification code, but the third verification code carried in the service query request matches a verification code included in a certain service information in the service information stored in the first service device, at this time, the first service device may respond to the service query request. I.e. the first service device multicasts/broadcasts service information comprising an authentication code matching the third authentication code.
The matching condition of the third verification code and the first verification code can refer to the matching condition of the second verification code and the first verification code, and is not specifically described herein.
In an alternative embodiment, after performing step S403, that is, determining the first verification code as the verification code of the first service, the first service device may directly perform step S405, that is, multicasting/broadcasting the first service information. After the first service device performs the step S404 once, that is, after the first service device receives the service inquiry request once, the first service device performs the step S405 again, or after the step S404 is performed once, when it is determined that the verification code carried by the service inquiry request matches the first verification code, the step S405 is performed again.
In an optional embodiment, each service device in the peer-to-peer network has a corresponding response duration to the response of the query request; the response time length corresponding to each service device is positively correlated with the time length of the service device accessing the peer-to-peer network. That is, if the time length of the service device accessing the peer-to-peer network is earlier, the response time length corresponding to the service device is longer; if the time length of the service equipment accessing the peer-to-peer network is later, the response time length corresponding to the service equipment is shorter.
In step S405, the multicasting/broadcasting the first service information may specifically be represented as:
and multicasting/broadcasting the first service information after the response time length corresponding to the first service equipment.
In an alternative embodiment, according to the method shown in fig. 3, an embodiment of the present invention further provides a verification code determination method for discovering a service. As shown in fig. 5, fig. 5 is a fifth flowchart illustrating a verification code determining method for discovery service according to an embodiment of the present invention. The method comprises the following steps.
Step S501, a first verification code matching the first service is generated.
Step S502, multicast/broadcast the verification code to be detected, wherein the verification code to be detected is the first verification code or the verification code after encrypting the first verification code.
Step S503, in the case that the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received, determining the first verification code as the verification code for finding the first service.
The above steps S501 to S503 are the same as the above steps S301 to S303.
Step S504, in case of receiving the second service information multicast/broadcast by the second service device, stores the second service information.
In this step, the second service device in the peer-to-peer network may multicast/broadcast the second service information after determining a certain authentication code as the authentication code of the discovered second service (i.e. the second authentication code). At this time, each device in the peer-to-peer network may receive the second service information, that is, the first service device will receive the second service information. The first service device may store the received second service information.
The second service information comprises a verification code for discovering the second service, which is determined by the second service equipment, address information of the second service equipment and port information of a port for providing the second service; alternatively, the second service information may include an encrypted verification code for accessing the second service, which is determined by the second service device, address information of the second service device, and port information of a port providing the second service. The process of determining the second service information is similar to the process of determining the first service information, and is not specifically described here.
In another embodiment of the present invention, the step S504 may be executed before the step S501, or during the execution of any one of the steps S501 to S503.
And step S505, selecting the service information to be accessed from the stored second service information.
In this step, the first service device may select the service information to be accessed from the stored second service information according to a preset selection rule. For the method for selecting the service information to be accessed, reference may be made to the following description, which is not specifically described herein.
Step S506, the first service information and the service information to be accessed are multicast/broadcast.
In this step, the first service device may multicast/broadcast the selected service information to be accessed while multicasting/broadcasting the first service information.
In the embodiment of the present invention, due to a network environment, a packet loss phenomenon in a data packet transmission process, and the like, a user equipment may not receive first service information multicast/broadcast by a first service device, so that the first service device multicasts/broadcasts service information to be accessed selected from received second service information while multicasting/broadcasting the first service information, thereby increasing the number of times of sending each service information and improving the probability of receiving the service information by the user equipment. And when different service devices in the peer-to-peer network provide the same service, the network resource consumption caused by each service device responding to the service inquiry request due to the fact that the service information is not stored in the user device and the service inquiry request is multicast/broadcast is effectively reduced.
The steps S505 to S506 may be executed after the first service device determines the first verification code as the verification code of the first service, or may be executed after the first service device receives the service inquiry request, which is not specifically described herein.
In an optional embodiment, in step S505, the service information to be accessed is selected from the stored second service information, which may specifically be represented as:
selecting second service information of which the multicast value/broadcast value is larger than a preset multicast value/preset broadcast value as service information to be accessed based on the stored multicast value/broadcast value of the second service information; the multicast value/broadcast value is calculated according to the maximum effective duration of the service information, the preset multicast frequency/preset broadcast frequency and the number of times of receiving the service information.
In an optional embodiment, the multicast value/broadcast value e (i) of the second service information stored in the first service device may be represented as:
E(i)=w1*(Pi*Fi-Ni)+w2*Ti
wherein i is service information corresponding to the ith second service device, and w1Is a first predetermined weight, PiMaximum effective time length of service information corresponding to ith second service equipment, FiA preset multicast frequency/a preset broadcast frequency, N, of the service information corresponding to the ith second service device in the peer-to-peer networkiThe number of times of receiving the service information corresponding to the ith second service device for the first service device, w2Is a second predetermined weight, TiThe remaining time corresponding to the maximum valid duration of the service information corresponding to the ith other service device, that is, the difference between the maximum valid duration of the service information corresponding to the ith second service device and the existence duration of the service information. Wherein the service letterThe existing time length of the message may be represented as a difference between the current time and the time when the service information is received, or may be represented as a difference between the current time and the time when the service information is stored.
In the embodiment of the invention, the service information to be accessed is selected from the received service information multicast/broadcast by the second service equipment according to the multicast value/broadcast value, so that the probability of multicast/broadcast of each second service information stored can be more balanced.
In another optional embodiment, when the first service device receives the service query request, the first service device may multicast/broadcast the first service information and the service information to be accessed according to the response duration when multicasting/broadcasting the first service information and the service information to be accessed. That is, the first service device multicasts/broadcasts the first service information and the service information to be accessed after the corresponding response time length. In this case, in step S505, the service information to be accessed is selected from the stored second service information, which may be specifically represented as:
and selecting the service information which is not multicast/broadcast by other service equipment from the stored service information as the service information to be accessed.
Specifically, the service information that is not multicast/broadcast by other service devices in response to the service inquiry request may be selected from the stored service information as the service information to be accessed. For ease of understanding, the description will be made by taking as an example that only two serving devices, device 1 and device 2, are included in the peer-to-peer network. It is assumed that the device 1 and the device 2 receive the service query request at the same time, the response time duration corresponding to the device 1 is 1 second, the response time duration of the device 2 is 2 seconds, the service information stored in the device 1 includes information 1, information 2 and information 3, and the service information stored in the device 2 includes information 1, information 2, information 3 and information 4. Since the device 1 multicasts/broadcasts the first service information and the information to be accessed prior to the device 2, the device 1 may select the information 1, the information 2, and the information 3 as the service information to be accessed. When the device 2 multicasts/broadcasts the first service information and the information to be accessed, since the information 1, the information 2, and the information 3 are already multicasted/broadcast by the device 1, the device 2 may select the information 4 as the information of the service to be accessed.
In an optional embodiment, the peer-to-peer network may further include a second service device other than the first service device. According to the method shown in fig. 1, an embodiment of the present invention further provides a verification code determination method for discovering services. As shown in fig. 6, fig. 6 is a sixth flowchart illustrating a verification code determining method for discovery service according to an embodiment of the present invention. The method comprises the following steps.
Step S601, a first verification code matched with the first service is generated.
Step S602, multicast/broadcast the verification code to be detected, where the verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code.
Step S603, determining the first verification code as the verification code for finding the first service when the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received.
The above steps S601 to S603 are the same as the above steps S101 to S103.
Step S604, acquiring a multicast/broadcast fourth verification code of the second service device.
In this step, the second service device may multicast/broadcast the fourth verification code in the peer-to-peer network after generating the verification code matching with the service provided by the second service device. At this time, each device in the peer-to-peer network may receive the fourth verification code, that is, the first service device may also receive the second service device multicast/broadcast the fourth verification code. As for the multicast/broadcast mode of the fourth verification code, reference may be made to the above-mentioned multicast/broadcast mode of the verification code to be detected by the first service device, which is not specifically described herein.
In an optional embodiment, the second service device may determine an authentication code corresponding to the second service provided by the second service device, where the fourth authentication code may be an authentication code corresponding to the second service, and the fourth authentication code may also be an authentication code obtained by encrypting the authentication code corresponding to the second service.
In step S605, when the fourth verification code matches the first verification code, a multicast response/broadcast response indicating that the fourth verification code is occupied is multicast/broadcast.
In an optional embodiment, if the fourth verification code may be a verification code corresponding to the second service, the first service device may directly compare the fourth verification code with the first verification code. When the fourth verification code is the same as the first verification code, the first service device may determine that the fourth verification code matches the first verification code. At this time, the fourth authentication code is occupied by the first authentication code, and the first service device may multicast/broadcast a multicast response/broadcast response indicating that the fourth authentication code is occupied.
In another optional embodiment, if the fourth verification code may also be a verification code obtained by encrypting the verification code corresponding to the second service, the first service device may decrypt the fourth verification code to obtain a decrypted verification code, and compare the decrypted verification code with the first verification code. When the decrypted verification code is the same as the first verification code, the first service device may determine that the fourth verification code matches the first verification code. At this time, the fourth authentication code is occupied by the first authentication code, and the first service device may multicast/broadcast a multicast response/broadcast response indicating that the fourth authentication code is occupied. In addition, the first service device may also compare the fourth verification code with the verification code encrypted by the first verification code according to the agreed encryption method, and if the fourth verification code is the same as the verification code encrypted by the agreed encryption method, the fourth verification code and the verification code are matched.
Since the number of the second service devices in the peer-to-peer network may be one or multiple, and the second services correspondingly provided by different second service devices may be the same or different, the fourth verification code may be the same as the second verification code, for example, the second service corresponding to the fourth verification code and the second service corresponding to the second verification code are the same service provided by the same second service device; the fourth verification code may also be the same as the second verification code, for example, a second service corresponding to the fourth verification code and a second service corresponding to the second verification code are different services provided by the same second service device, or services provided by different second service devices.
The detection process of the to-be-detected verification code may refer to a detection process of the first service device for the fourth verification code.
In the embodiment of the invention, the service equipment can timely and accurately determine whether the verification code generated by the service equipment is occupied by other service equipment in the peer-to-peer network through multicasting/broadcasting the verification code to be detected, thereby reducing the repetition rate of the verification code, improving the uniqueness of the verification code and ensuring the effectiveness of the verification code.
In an optional embodiment, according to the method shown in fig. 1, an embodiment of the present invention further provides a verification code determination method for discovering a service. As shown in fig. 7, fig. 7 is a seventh flowchart illustrating a verification code determining method for discovery service according to an embodiment of the present invention. The method comprises the following steps.
Step S701 is to generate a first verification code matching the first service.
Step S702, multicast/broadcast the verification code to be detected, wherein the verification code to be detected is the first verification code or the verification code after encrypting the first verification code.
Step S703, determining the first verification code as the verification code for discovering the first service when the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received.
The steps S701 to S703 are the same as the steps S101 to S103.
Step S704, it is detected whether the existence duration of the first verification code is equal to the maximum valid duration of the first verification code. If yes, the process returns to step S701.
In this step, the first service device may detect in real time whether the existence duration of the first verification code is equal to the maximum valid duration of the first verification code, that is, detect whether the first verification code is valid. The first service device may determine that the first verification code is invalid when the existence duration of the first verification code is equal to the maximum valid duration of the first verification code. At this time, the first service device may discard the first verification code and return to perform step S701. I.e. the step of generating a first authentication code matching the first service is performed back.
When generating the first verification code, the first service device may record a generation time of the first verification code. The existing duration of the first verification code may be a time difference between the current time and the recorded generation time of the first verification code.
In this embodiment of the present invention, when the existence duration of the first verification code is less than the maximum valid duration of the first verification code, the first service device may determine that the first verification code is valid. At this point, the first service apparatus may continue to use the first verification code. I.e. the first service information comprising the first authentication code is still valid. In addition, since the first verification code is discarded when the existence duration of the first verification code is equal to the maximum valid duration of the first verification code, the existence duration of the first verification code is not longer than the maximum valid duration of the first verification code.
By adopting the method shown in fig. 7, the first service device can detect whether the first verification code is valid in real time, and timely re-determine the first verification code when the first verification code is invalid, so that the validity of the first verification code is ensured, the validity of the first service information is improved, and meanwhile, the first verification code is updated on time, so that the security of the first verification code and the first service information can be improved, and the security of service access is improved.
Based on the same inventive concept, according to the verification code determination method for discovery service provided by the embodiment of the invention, the embodiment of the invention also provides a device discovery system. As shown in fig. 8, fig. 8 is a schematic structural diagram of a device discovery system according to an embodiment of the present invention. The device discovery system comprises a first serving device 801 and a user device 802. The system is applied to a peer-to-peer network, that is, the first service device 801 and the user equipment 802 are in the same peer-to-peer network
The first service device 801 is configured to generate a first verification code matching the first service; multicasting/broadcasting the verification code to be detected, wherein the verification code to be detected is a first verification code or a verification code obtained by encrypting the first verification code; under the condition that a multicast response/broadcast response indicating that the verification code to be detected is occupied is not received, determining the first verification code as the verification code for finding the first service;
the user equipment 802 is configured to determine that the first service equipment 801 is a device to be accessed according to the first verification code.
Optionally, the device discovery system may further include a second service device other than the first service device 801;
optionally, the second service device is configured to, when receiving the to-be-detected verification code multicast/broadcast by the first service device 801 and the to-be-detected verification code matches the second verification code, multicast/broadcast indicates that the to-be-detected verification code is occupied by a multicast response/broadcast response; the second verification code is a verification code determined by the second service device for discovering the second service.
Optionally, the first service device 801 may be specifically configured to determine a target port for providing the first service; and generating a verification code corresponding to the target port as a first verification code matched with the first service.
Optionally, the first service device 801 may be further configured to multicast/broadcast the first service information after determining the first verification code as the verification code for discovering the first service; the first service information includes a first verification code, address information of the first service device 801, and port information of a target port, or the first service information includes a verification code obtained by encrypting the first verification code, address information of the first service device 801, and port information of the target port;
the user equipment 802 may be specifically configured to receive and store the first service information; when the authentication code input by the user matches the authentication code included in the stored first service information, the first service device 801 is determined as the device to be accessed.
Optionally, the user equipment 802 may be further configured to, after the first service equipment 801 is determined as a device to be accessed, access the first service provided by the first service equipment 801 according to the address information and the port information included in the first service information.
Optionally, the user equipment 802 may also be configured to perform a multicast/broadcast service query request;
in one embodiment, the user equipment 802 may multicast/broadcast a service query request when the authentication code entered by the user does not match the authentication code in the stored service information. After the multicast/broadcast service inquiry request, the user equipment can wait for a preset time, and if new service information is received and can be matched with the verification code input by the user, the address information and the port information corresponding to the verification code are used for service access; if service information which can be matched with the verification code input by the user is not received after waiting for the preset time, the user equipment can prompt the user that the corresponding service is not found.
The first service device 801 may be further configured to multicast/broadcast the first service information when receiving the service query request; or under the condition of receiving the service inquiry request, if the third verification code carried by the service inquiry request is matched with the first verification code, multicasting/broadcasting the first service information.
Optionally, the first service device 801 is specifically configured to, after the response duration of the first service device 801, multicast/broadcast the multicast/broadcast packet with the first service information, where the response duration of the first service device 801 is positively correlated with a duration that the first service device 801 accesses the peer-to-peer network.
Optionally, the first service device 801 may be specifically configured to, before multicasting/broadcasting the first service information, store the second service information when receiving the second service information multicast/broadcast by the second service device; selecting service information to be accessed from the stored second service information; multicasting/broadcasting the first service information and the service information to be accessed;
the second service information comprises a verification code for discovering the second service determined by the second service device, address information of the second service device and port information of a port for providing the second service, or the second service information comprises the verification code obtained by encrypting the verification code for discovering the second service determined by the second service device, the address information of the second service device and the port information of the port for providing the second service;
the user equipment 802 is further configured to receive and store the information of the service to be accessed.
Optionally, the first service device 801 is specifically configured to select, based on a multicast value/broadcast value of the stored second service information, the second service information whose multicast value/broadcast value is greater than a preset multicast value/preset broadcast value, as the service information to be accessed; the multicast value/broadcast value is calculated according to the maximum effective duration of the service information, the preset multicast frequency/preset broadcast frequency and the number of times of receiving the service information.
Optionally, the first service device 801 is specifically configured to perform multicast/broadcast on the to-be-detected verification code for a preset number of times according to a preset time interval;
the first service device 801 is further configured to regenerate the first verification code matching the first service when the existence duration of the first verification code is equal to the maximum valid duration of the first verification code; or under the condition of receiving a multicast response/broadcast response indicating that the verification code to be detected is occupied, regenerating the first verification code matched with the first service.
Compared with the prior art, the device discovery system provided by the embodiment is applied, the first service device can autonomously determine the verification code corresponding to the service provided by the first service device, and the user device can determine that the first service device is the device to be accessed based on the verification code, that is, the first service device is discovered, and the whole process does not need the assistance of a third-party server, so that the third-party server does not need to be deployed in the network deployment process, and the network deployment cost is effectively reduced.
For ease of understanding, the process of the device discovery system to discover a device to be accessed is described below with reference to fig. 9. Fig. 9 is a signaling diagram of a device discovery process according to an embodiment of the present invention.
In step S901, the first service device determines a target port for providing the first service.
Step S902, the first service device generates a verification code corresponding to the target port as a first verification code matched with the first service.
Step S903, the first service device performs multicast/broadcast on the verification code to be detected for a first preset number of times according to the first time interval.
The verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code.
Step S904, the second service device detects whether the verification code to be detected matches the second verification code when receiving the verification code to be detected. If yes, go to step S905.
The second verification code is a verification code which is determined by the second service device and provides the second service.
And the user equipment does not process the verification code to be detected under the condition of receiving the verification code to be detected.
In step S905, the second service device multicasts/broadcasts a multicast response/broadcast response indicating that the verification code to be detected is occupied.
When the second service device determines that the verification code to be detected is not matched with the second verification code, the second service device may not respond to the received verification code to be detected, or multicast/broadcast response indicating that the verification code to be detected is not occupied.
Step S906, when the first service device receives the multicast response/broadcast response indicating that the verification code to be detected is occupied within the preset time, the first service device regenerates the first verification code matched with the first service, that is, returns to execute the step S901 or the step S902.
The user equipment does not perform any process upon receiving the multicast response/broadcast response.
Step S907, the first service device determines the first verification code as the verification code for discovering the first service when the first service device does not receive the multicast response/broadcast response indicating that the verification code to be detected is occupied within the preset time duration.
Step S908, the first service device performs multicast/broadcast on the first service information for a second preset number of times according to the second time interval.
The first service information includes a first verification code, address information of the first service device, and port information of the target port, or the first service information includes a verification code obtained by encrypting the first verification code, address information of the first service device, and port information of the target port.
In step S909, the second service apparatus and the user apparatus receive and store the first service information.
In step S910, when the verification code input by the user matches the verification code included in the stored first service information, the user equipment determines the first service equipment as the device to be accessed.
Step S911, the user equipment accesses the first service provided by the first service device according to the address information and the port information included in the first service information.
Step S912, the second service device performs multicast/broadcast on the second service information for a third preset number of times according to the third time interval.
The second service information includes a second verification code, address information of the second service device, and port information of a port providing the second service, or the second service information includes a verification code obtained by encrypting the second verification code, address information of the second service device, and port information of a port providing the second service.
Step S912 may be executed after the second service device determines the second verification code as the verification code of the second service, or may be executed after receiving a service query request multicast/broadcast by the user equipment.
In step S913, the first service device and the user device receive and store the second service information.
And when the verification code input by the user is matched with the verification code included in the stored second service information, determining the second service equipment as the equipment to be accessed. The second service can be accessed specifically in the manner described above with reference to steps S910 to S911.
Step S914, the user equipment multicasts/broadcasts the service inquiry request.
The above step S914 may be performed during the execution of any of the above steps S901 to S913.
In step S915, the first service device and the second service device receive the service inquiry request.
In step S916, the first service device and the second service device respond to the service inquiry request.
The first service device responding to the service query request may specifically be represented as: if the third verification code carried by the service query request is matched with the first verification code, the first service equipment performs multicast/broadcast for a fourth preset number of times on the first service information according to a fourth time interval, or the first service equipment selects service information to be accessed from the stored second service information and performs multicast/broadcast for the fourth preset number of times on the first service information and the service information to be accessed according to the fourth time interval.
The first time interval, the second time interval, the third time interval and the fourth time interval may be the same or different. The first preset number, the second preset number, the third preset number and the fourth preset number may be the same or different.
The specific manner of the second service device responding to the service inquiry request may refer to the manner of the first service device responding to the service inquiry request, and is not specifically described herein.
When the first service device and the second service device do not determine the verification code corresponding to the service provided by the first service device and the second service device, the first service device and the second service device may not respond to the service inquiry request.
In step S917, when the existing duration of the first verification code is equal to the maximum valid duration of the first verification code, the first verification code matched with the first service is regenerated, that is, the first service device returns to perform step S901 or step S902.
The above step S917 may be performed during the execution of any one of the above steps S908-S916.
In the foregoing embodiment, the device discovery process of the device discovery system is described by taking only the first service device as an example to provide the first service for the user equipment. The second service device may also provide the second service (not shown in fig. 9) to the user equipment in the same manner, and will not be described in detail here.
By the system provided by the embodiment of the invention, before the first service is provided by the first service device, the first verification code matched with the first service is generated, the first verification code or the verification code encrypted by the first verification code is used as the verification code to be detected, the verification code to be detected is multicast/broadcast in the network, and when the multicast response/broadcast response of the verification code to be detected is not received, the generated first verification code is determined as the verification code for finding the first service. Compared with the prior art, the first service equipment can autonomously determine the verification code corresponding to the service provided by the first service equipment, the user equipment can determine that the first service equipment is the equipment to be accessed based on the verification code, namely the first service equipment is found, the user equipment can also access the first service equipment through the verification code, and the whole process does not need the assistance of a third-party server, so that the third-party server does not need to be deployed in the network deployment process, and the network deployment cost is effectively reduced.
Based on the same inventive concept, according to the verification code determination method for discovering services provided by the embodiment of the present invention, the embodiment of the present invention further provides a verification code determination apparatus for discovering services. As shown in fig. 10, fig. 10-a is a first schematic structural diagram of an apparatus for determining an authentication code for a discovery service according to an embodiment of the present invention, and fig. 10-b is a second schematic structural diagram of an apparatus for determining an authentication code for a discovery service according to an embodiment of the present invention. The apparatus includes the following modules.
A generating module 1001, configured to generate a first verification code matching a first service;
the first multicast module 1002/first broadcast module 1003 is configured to multicast/broadcast a to-be-detected verification code, where the to-be-detected verification code is a first verification code or a verification code obtained by encrypting the first verification code;
a determining module 1004, configured to determine the first verification code as the verification code for discovering the first service if a multicast response/broadcast response indicating that the verification code to be detected is occupied is not received.
Optionally, the first service device is in a peer-to-peer network, and the peer-to-peer network further includes a second service device other than the first service device;
the multicast response/broadcast response indicating that the verification code to be detected is occupied may be used to indicate that the verification code to be detected matches a second verification code, where the second verification code is a verification code determined by the second service device to discover the second service.
Optionally, the generating module 1001 is specifically configured to determine a target port providing the first service; and generating a verification code corresponding to the target port as a first verification code matched with the first service.
Optionally, the apparatus for determining an authentication code for discovering a service may further include:
a first executing module, configured to, in a case that a multicast response/broadcast response indicating that the verification code to be detected is occupied is received, invoke the generating module 1001 to execute a step of generating the verification code corresponding to the target port as a first verification code matched with the first service.
Optionally, the apparatus for determining an authentication code for discovering a service may further include:
a second multicasting module/second broadcasting module for multicasting/broadcasting the first service information after determining the first verification code as the verification code of the first service is discovered; the first service information includes a first verification code, address information of the first service device, and port information of the target port, or the first service information includes a verification code obtained by encrypting the first verification code, address information of the first service device, and port information of the target port.
Optionally, the apparatus for determining an authentication code for discovering a service may further include:
a receiving module, configured to receive a service query request multicast/broadcast by a user equipment;
the second multicast module/the second broadcast module is specifically configured to multicast/broadcast the first service information when receiving the service query request; or under the condition of receiving the service inquiry request, if the third verification code carried by the service inquiry request is matched with the first verification code, multicasting/broadcasting the first service information.
Optionally, each service device in the peer-to-peer network has a corresponding response duration; the response time length corresponding to each service device is positively correlated with the time length of the service device accessing the peer-to-peer network;
the second multicast module/the second broadcast module may be specifically configured to multicast/broadcast the first service information after the response duration corresponding to the first service device.
Optionally, the apparatus for determining an authentication code for discovering a service may further include:
the storage module is used for storing the second service information under the condition of receiving the second service information multicast/broadcast by the second service equipment; the second service information includes a verification code for discovering the second service, which is determined by the second service device, address information of the second service device, and port information of a port providing the second service, or the second service information includes a verification code obtained by encrypting the verification code for discovering the second service, which is determined by the second service device, address information of the second service device, and port information of the port providing the second service;
the selecting module is used for selecting the service information to be accessed from the stored second service information;
the second multicast module/the second broadcast module is specifically configured to multicast/broadcast the first service information and the service information to be accessed.
Optionally, the selecting module is specifically configured to select, based on the stored multicast value/broadcast value of the second service information, the second service information whose multicast value is greater than the preset multicast value/preset broadcast value as the service information to be accessed; the multicast value/broadcast value is calculated according to the maximum effective duration of the service information, the preset multicast frequency/preset broadcast frequency and the number of times of receiving the service information.
Optionally, the first multicast module/first broadcast module is specifically configured to perform multicast/broadcast on the to-be-detected verification code for a preset number of times according to a preset time interval;
the above apparatus for determining an authentication code for discovering a service may further include:
the acquisition module is used for acquiring a fourth verification code multicast/broadcast by the second service equipment;
the third multicast module/the third broadcast module is used for multicasting/broadcasting a multicast response/broadcast response which represents that the fourth verification code is occupied when the fourth verification code is matched with the first verification code;
the above apparatus for determining an authentication code for discovering a service may further include:
a second executing module, configured to invoke the generating module 1001 to execute the step of generating the first verification code matching the first service when an existing duration of the first verification code is equal to a maximum valid duration of the first verification code.
By the device provided by the embodiment of the invention, the first service equipment generates the first verification code matched with the first service, the first verification code or the verification code encrypted by the first verification code is used as the verification code to be detected, the verification code to be detected is multicast/broadcast in the network, and when the multicast response/broadcast response of the verification code to be detected is not received, the generated first verification code is determined as the verification code for finding the first service. Compared with the prior art, the first service equipment can autonomously determine the verification code corresponding to the service provided by the first service equipment without the assistance of a third-party server, so that the third-party server does not need to be deployed in the network deployment process, and the network deployment cost is effectively reduced.
Based on the same inventive concept, according to the verification code determination method for discovery service provided in the embodiment of the present invention, an embodiment of the present invention further provides an electronic device, where the electronic device is the first service device. As shown in fig. 11, the system comprises a processor 1101, a communication interface 1102, a memory 1103 and a communication bus 1104, wherein the processor 1101, the communication interface 1102 and the memory 1103 complete communication with each other through the communication bus 1104;
a memory 1103 for storing a computer program;
the processor 1101 is configured to implement the following steps when executing the program stored in the memory 1103:
determining a target port for providing a first service for user equipment in a peer-to-peer network;
generating a first verification code matched with the first service;
multicasting/broadcasting the verification code to be detected, wherein the verification code to be detected is a first verification code or a verification code obtained by encrypting the first verification code;
and under the condition that the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received, determining the first verification code as the verification code for discovering the first service.
According to the electronic device provided by the embodiment of the invention, the first service device generates the first verification code matched with the first service, the first verification code or the verification code encrypted by the first verification code is used as the verification code to be detected, the verification code to be detected is multicast/broadcast in the network, and when the multicast response/broadcast response of the verification code to be detected is not received, the generated first verification code is determined as the verification code for finding the first service. Compared with the prior art, the first service equipment can autonomously determine the verification code corresponding to the service provided by the first service equipment without the assistance of a third-party server, so that the third-party server does not need to be deployed in the network deployment process, and the network deployment cost is effectively reduced.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
Based on the same inventive concept, the embodiment of the present invention provides a method for determining an authentication code for discovering a service, and further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of any one of the methods for determining an authentication code for discovering a service.
Based on the same inventive concept, according to the verification code determination method for discovery service provided in the embodiment of the present invention, the embodiment of the present invention further provides a computer program product containing instructions, which, when run on a computer, causes the computer to execute any one of the verification code determination methods for discovery service in the embodiments.
The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g., from one website site, computer, server, or data center via a wired (e.g., coaxial cable, optical fiber, digital subscriber line (DS L)) or wireless (e.g., infrared, wireless, microwave, etc.) manner to another website site, computer, server, or data center.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, embodiments of the system, the apparatus, the electronic device, the computer-readable storage medium, and the computer program product are substantially similar to the method embodiment, so that the description is simple, and the relevant points can be referred to only part of the description of the method embodiment.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (16)

1. An authentication code determination method for discovering services, applied to a first service device, the method comprising:
generating a first verification code matched with the first service;
multicasting/broadcasting a verification code to be detected, wherein the verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code;
and under the condition that the multicast response/broadcast response indicating that the verification code to be detected is occupied is not received, determining the first verification code as the verification code for discovering the first service.
2. The method of claim 1, wherein the first serving device is in a peer-to-peer network that further includes a second serving device other than the first serving device;
the multicast response/broadcast response indicating that the verification code to be detected is occupied is used for indicating that the verification code to be detected is matched with a second verification code, and the second verification code is a verification code for finding a second service determined by the second service equipment.
3. The method of claim 1, wherein the step of generating the first authentication code matching the first service comprises:
determining a target port for providing the first service;
and generating a verification code corresponding to the target port as a first verification code matched with the first service.
4. The method of claim 3, further comprising:
and returning and executing the verification code corresponding to the generated target port as a first verification code matched with the first service under the condition of receiving a multicast response/broadcast response indicating that the verification code to be detected is occupied.
5. The method of claim 3, wherein after determining the first authentication code as the authentication code for discovering the first service, further comprising:
multicasting/broadcasting the first service information; the first service information includes the first verification code, address information of the first service device, and port information of the target port, or the first service information includes the verification code encrypted by the first verification code, the address information of the first service device, and the port information of the target port.
6. The method of claim 5, further comprising, before multicasting/broadcasting the first service information:
receiving a service inquiry request of user equipment multicast/broadcast;
the step of multicasting/broadcasting the first service information includes:
multicasting/broadcasting first service information in case of receiving the service inquiry request; or
And under the condition of receiving the service inquiry request, if a third verification code carried by the service inquiry request is matched with the first verification code, multicasting/broadcasting the first service information.
7. The method of claim 6, wherein there is a corresponding response duration for each serving device in the peer-to-peer network; the response time length corresponding to each service device is positively correlated with the time length of the service device accessing the peer-to-peer network;
the step of multicasting/broadcasting the first service information includes:
and multicasting/broadcasting the first service information after the response time length corresponding to the first service equipment.
8. The method of claim 5, further comprising, before multicasting/broadcasting the first service information:
under the condition of receiving second service information multicast/broadcast by second service equipment, storing the second service information; the second service information includes a verification code for discovering a second service determined by the second service device, address information of the second service device, and port information of a port providing the second service, or the second service information includes a verification code obtained by encrypting the verification code for discovering the second service determined by the second service device, the address information of the second service device, and the port information of the port providing the second service;
selecting service information to be accessed from the stored second service information;
the step of multicasting/broadcasting the first service information includes:
multicasting/broadcasting the first service information and the service information to be accessed.
9. The method of claim 8, wherein the step of selecting the service information to be accessed from the stored second service information comprises:
selecting second service information of which the multicast value/broadcast value is larger than a preset multicast value/preset broadcast value as service information to be accessed based on the stored multicast value/broadcast value of the second service information; the multicast value/broadcast value is calculated according to the maximum effective duration of the service information, the preset multicast frequency/preset broadcast frequency and the times of receiving the service information.
10. The method of claim 1, wherein the step of multicasting/broadcasting the verification code to be detected comprises:
multicasting/broadcasting the verification code to be detected for a preset number of times according to a preset time interval;
the method further comprises the following steps:
acquiring a fourth verification code multicast/broadcast by the second service equipment;
when the fourth verification code matches the first verification code, multicasting/broadcasting a multicasting response/broadcasting response indicating that the fourth verification code is occupied;
the method further comprises the following steps:
and when the existing duration of the first verification code is equal to the maximum effective duration of the first verification code, returning to execute the step of generating the first verification code matched with the first service.
11. An apparatus for identifying a service, the apparatus being applied to a first service device, the apparatus comprising:
the generation module is used for generating a first verification code matched with the first service;
the first multicast module/first broadcast module is used for multicasting/broadcasting the verification code to be detected, wherein the verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code;
a determining module, configured to determine the first verification code as the verification code for discovering the first service when a multicast response/broadcast response indicating that the verification code to be detected is occupied is not received.
12. A device discovery system, applied to a peer-to-peer network, comprising a first service device and a user device;
the first service equipment is used for generating a first verification code matched with the first service; multicasting/broadcasting a verification code to be detected, wherein the verification code to be detected is the first verification code or the verification code obtained by encrypting the first verification code; determining the first verification code as a verification code for discovering the first service under the condition that a multicast response/broadcast response indicating that the verification code to be detected is occupied is not received;
and the user equipment is used for determining the first service equipment as equipment to be accessed according to the first verification code.
13. The system of claim 12, further comprising a second service device other than the first service device;
the second service device is configured to, when receiving the to-be-detected verification code multicast/broadcast by the first service device, when the to-be-detected verification code matches a second verification code, multicast/broadcast indicates a multicast response/broadcast response that the to-be-detected verification code is occupied; the second verification code is a verification code for discovering a second service determined by the second service device.
14. The system according to claim 12, wherein the first service device is specifically configured to determine a target port for providing the first service; generating a verification code corresponding to the target port as a first verification code matched with the first service;
the first service device is further configured to multicast/broadcast first service information after determining the first authentication code as an authentication code for discovering the first service; the first service information includes the first verification code, address information of the first service device, and port information of the target port, or the first service information includes the verification code encrypted by the first verification code, the address information of the first service device, and the port information of the target port;
the user equipment is specifically configured to receive and store the first service information; and when the verification code input by the user is matched with the verification code included in the stored first service information, determining the first service equipment as the equipment to be accessed.
15. The system according to claim 14, wherein the user equipment is further configured to, after the first service device is determined as the device to be accessed, access a first service provided by the first service device according to address information and port information included in the first service information;
the user equipment is also used for a multicast/broadcast service inquiry request;
the first service device is further configured to multicast/broadcast first service information in a case where the service query request is received; or under the condition of receiving the service inquiry request, if a third verification code carried by the service inquiry request is matched with the first verification code, multicasting/broadcasting the first service information;
the first service device is specifically configured to multicast/broadcast, after a response duration of the first service device, first service information, where the response duration of the first service device is positively correlated to a duration that the first service device accesses the peer-to-peer network.
16. The system according to claim 14, wherein the first service device is specifically configured to store, in case of receiving second service information multicast/broadcast by a second service device, the second service information before multicasting/broadcasting the first service information; selecting service information to be accessed from the stored second service information; multicasting/broadcasting the first service information and the service information to be accessed;
the second service information includes a verification code for discovering a second service determined by the second service device, address information of the second service device, and port information of a port providing the second service, or the second service information includes a verification code obtained by encrypting the verification code for discovering the second service determined by the second service device, the address information of the second service device, and the port information of the port providing the second service;
the user equipment is also used for receiving and storing the service information to be accessed;
the first service device is specifically configured to select, based on the stored multicast value/broadcast value of the second service information, the second service information whose multicast value/broadcast value is greater than a preset multicast value/preset broadcast value as the service information to be accessed; the multicast value/broadcast value is calculated according to the maximum effective duration of the service information, the preset multicast frequency/preset broadcast frequency and the times of receiving the service information.
CN202010215222.0A 2020-03-24 2020-03-24 Verification code determination method and device for discovery service and equipment discovery system Active CN111447213B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010215222.0A CN111447213B (en) 2020-03-24 2020-03-24 Verification code determination method and device for discovery service and equipment discovery system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010215222.0A CN111447213B (en) 2020-03-24 2020-03-24 Verification code determination method and device for discovery service and equipment discovery system

Publications (2)

Publication Number Publication Date
CN111447213A true CN111447213A (en) 2020-07-24
CN111447213B CN111447213B (en) 2022-07-05

Family

ID=71654371

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010215222.0A Active CN111447213B (en) 2020-03-24 2020-03-24 Verification code determination method and device for discovery service and equipment discovery system

Country Status (1)

Country Link
CN (1) CN111447213B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130250803A1 (en) * 2012-03-20 2013-09-26 Qualcomm Incorporated System and method of infrastructure service discovery
CN103379580A (en) * 2012-04-13 2013-10-30 华为技术有限公司 Device discovery method, device and system
CN105577732A (en) * 2014-10-31 2016-05-11 华为技术有限公司 Service discovery method, related device and system
CN107005913A (en) * 2015-07-13 2017-08-01 华为技术有限公司 Verification method, user equipment and the adjacent service functional entity of adjacent service communication
CN107332912A (en) * 2017-07-03 2017-11-07 广州视源电子科技股份有限公司 Service discovery method, device, system and storage medium, computer equipment
TW201740746A (en) * 2016-05-13 2017-11-16 財團法人工業技術研究院 Service identification method, network entity and user equipment using the same
CN107566453A (en) * 2017-08-03 2018-01-09 广州视源电子科技股份有限公司 Service discovery method, device, computer-readable recording medium and computer equipment
US20190132385A1 (en) * 2017-10-31 2019-05-02 Microsoft Technology Licensing, Llc Techniques for peer matching in peer-to-peer communications

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130250803A1 (en) * 2012-03-20 2013-09-26 Qualcomm Incorporated System and method of infrastructure service discovery
CN103379580A (en) * 2012-04-13 2013-10-30 华为技术有限公司 Device discovery method, device and system
CN105577732A (en) * 2014-10-31 2016-05-11 华为技术有限公司 Service discovery method, related device and system
CN107005913A (en) * 2015-07-13 2017-08-01 华为技术有限公司 Verification method, user equipment and the adjacent service functional entity of adjacent service communication
TW201740746A (en) * 2016-05-13 2017-11-16 財團法人工業技術研究院 Service identification method, network entity and user equipment using the same
CN107332912A (en) * 2017-07-03 2017-11-07 广州视源电子科技股份有限公司 Service discovery method, device, system and storage medium, computer equipment
CN107566453A (en) * 2017-08-03 2018-01-09 广州视源电子科技股份有限公司 Service discovery method, device, computer-readable recording medium and computer equipment
US20190132385A1 (en) * 2017-10-31 2019-05-02 Microsoft Technology Licensing, Llc Techniques for peer matching in peer-to-peer communications

Also Published As

Publication number Publication date
CN111447213B (en) 2022-07-05

Similar Documents

Publication Publication Date Title
US10911430B2 (en) Account login connection method and apparatus, and storage medium
CN101179566B (en) Method and apparatus for preventing ARP packet attack
US9344429B2 (en) Network apparatus based on content name and method for protecting content
KR20130031660A (en) Network apparatus based contents name and method for generate and authenticate contents name
WO2019134303A1 (en) Live stream room popularity processing method and apparatus, server and storage medium
US20210021412A1 (en) Method and apparatus for electing representative node device, computer device, and storage medium
CN111406396A (en) Computer-implemented systems and methods for data propagation and communication in a network, such as a blockchain network
US20210314156A1 (en) Authentication method, content delivery network cdn, and content server
JP2019515555A (en) Anonymous Identification Information and Protocol of Identification Information Oriented Network
US20130291073A1 (en) Multi-stack subscriber sign on
CN108880972B (en) Information processing method, server and terminal
CN113746788A (en) Data processing method and device
US20170270561A1 (en) Method, terminal and server for monitoring advertisement exhibition
CN110417905B (en) Contract issuing method, device, equipment and union chain system
KR102162851B1 (en) Method and device for determining popular live broadcast video
CN107342964A (en) A kind of message parsing method and equipment
CN110213671B (en) Hotspot short video determination method and device
CN112311769A (en) Method, system, electronic device and medium for security authentication
US9509513B2 (en) Provisioning using a generic configuration
CN110311855B (en) User message processing method and device, electronic equipment and storage medium
JPWO2010064439A1 (en) Identification information management system, identification information generation method and management method, terminal, and generation and management program
CN110913011A (en) Session keeping method, session keeping device, readable storage medium and electronic equipment
CN112436939B (en) Key negotiation method, device and system and electronic equipment
US20190306110A1 (en) Experience differentiation
CN111447213B (en) Verification code determination method and device for discovery service and equipment discovery system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant