CN111741137B - Point-to-point communication method based on 5G technology - Google Patents

Point-to-point communication method based on 5G technology Download PDF

Info

Publication number
CN111741137B
CN111741137B CN202010881553.8A CN202010881553A CN111741137B CN 111741137 B CN111741137 B CN 111741137B CN 202010881553 A CN202010881553 A CN 202010881553A CN 111741137 B CN111741137 B CN 111741137B
Authority
CN
China
Prior art keywords
communication
point
information
peer
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010881553.8A
Other languages
Chinese (zh)
Other versions
CN111741137A (en
Inventor
张凯
郑应强
路国强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing LSSEC Technology Co Ltd
Original Assignee
Beijing LSSEC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing LSSEC Technology Co Ltd filed Critical Beijing LSSEC Technology Co Ltd
Priority to CN202010881553.8A priority Critical patent/CN111741137B/en
Publication of CN111741137A publication Critical patent/CN111741137A/en
Application granted granted Critical
Publication of CN111741137B publication Critical patent/CN111741137B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Abstract

The invention provides a point-to-point communication method based on a 5G technology, which comprises the following steps: step S1: sending a first communication request to a server and receiving first response information of the server to the first communication request; the first communication request includes: an identification of the target device; step S2: analyzing the first response information to obtain communication parameters; step S3: establishing a peer-to-peer communication with the target device based on the communication parameters. The point-to-point communication method based on the 5G technology realizes the point-to-point communication among the 5G devices, can fully utilize the high bandwidth advantage of the 5G, does not need to lead the flow to pass through a server, and further reduces the burden of the server.

Description

Point-to-point communication method based on 5G technology
Technical Field
The invention relates to the technical field of communication, in particular to a point-to-point communication method based on a 5G technology.
Background
Currently, the fifth generation mobile communication technology (abbreviated as 5G or 5G technology) is the latest generation cellular mobile communication technology, and is an extension following 4G (LTE-A, WiMax), 3G (UMTS, LTE) and 2G (gsm) systems. The performance goals of 5G are high data rates, reduced latency, energy savings, reduced cost, increased system capacity, and large-scale device connectivity. However, the existing 5G communication method is generally a method of relaying through a server; therefore, the total amount of equipment accessed to the server is increased, and the accessed 5G equipment has high bandwidth and high speed, so that great burden is brought to the server.
Disclosure of Invention
One of the objectives of the present invention is to provide a peer-to-peer communication method based on 5G technology, which realizes peer-to-peer communication between 5G devices, can fully utilize the high bandwidth advantage of 5G, and does not need to make traffic pass through a server, thereby reducing the burden of the server.
The point-to-point communication method based on the 5G technology provided by the embodiment of the invention is applied to initiating equipment and comprises the following steps:
step S1: sending a first communication request to a server and receiving first response information of the server to the first communication request; the first communication request includes: an identification of the target device;
step S2: analyzing the first response information to obtain communication parameters;
step S3: establishing a peer-to-peer communication with the target device based on the communication parameters.
Preferably, the communication parameters include IPV6 address information of the target device and/or communication port information and/or communication authentication information of the target device.
Preferably, the first communication request further includes: IPV6 address information of the originating device and/or communication port information of the originating device.
Preferably, the peer-to-peer communication method based on the 5G technology further includes:
step S4: receiving a second communication request sent by a third-party device to join the peer-to-peer communication,
step S5: analyzing the second communication request, acquiring the identity data of the third-party equipment, and verifying the identity data;
step S6: when the verification is passed, receiving a first verification result of the target equipment for the identity data of the third-party equipment;
step S7: and when the first verification result is that the third-party device is passed, the third-party device is accepted to join the peer-to-peer communication.
Preferably, when the third party device requests to join in peer-to-peer communication, the number of devices in peer-to-peer communication is greater than a preset value, and after the first verification result is passed, the initiating device further performs the following operations:
step S6A: determining at least one verification device selected by a server from devices in the peer-to-peer communication based on a preset rule;
step S6B: receiving a second verification result of the verification device for the identity data of the third-party device; and when the second verification result is that the third-party device is passed, the third-party device is accepted to join the peer-to-peer communication.
The invention also provides a point-to-point communication method based on the 5G technology, which is applied to a server and comprises the following steps:
step S11: receiving a first communication request sent by initiating equipment;
step S12: analyzing the first communication request, and obtaining the identifier of the target equipment and/or the IPV6 address information of the initiating equipment and/or the communication port information of the initiating equipment corresponding to the first communication request;
step S13: acquiring the current communication state of the target equipment based on the identification of the target equipment;
step S14: when the communication state is accessible, obtaining IPV6 address information of the target device and/or communication port information and/or communication verification information of the target device;
step S15: generating first response information based on the IPV6 address information of the target device and/or the communication port information and/or the communication verification information of the target device;
step S16: and sending the first response information to the initiating device.
Preferably, the peer-to-peer communication method based on the 5G technology further includes:
step S21: receiving reported information sent by initiating equipment and/or target equipment after establishing point-to-point communication;
step S22: based on the reported information, establishing point-to-point communication information and adding the point-to-point communication information into a point-to-point communication list; the point-to-point communication information includes: one or more combinations of the communication number, the IPV6 address information of the initiating device, the communication port information of the initiating device, the IPV6 address information of the target device, the communication port information of the target device, the communication verification information of the initiating device and the communication verification information of the target device, the first allowed access condition sent by the initiating device and the second allowed access condition sent by the target device;
step S23: receiving a third communication request for joining in peer-to-peer communication sent by a third-party device;
step S24: receiving IPV6 address information of the third-party equipment and communication port information of the third-party equipment sent by the third-party equipment;
step S25: analyzing the third communication request to obtain a third request; the third request includes: a communication number;
step S26: acquiring a first allowed access condition and/or a second allowed access condition in target point-to-point communication information of the target point-to-point communication based on the third request and the point-to-point communication list;
step S27: based on the first allowed access condition and/or the second allowed access condition, the IPV6 address information of the third-party device and the communication port information of the third-party device; verifying the access qualification of the third-party equipment; when the third-party equipment meets the first access permission condition and/or the second access permission condition, the third-party equipment has the qualification of accessing the target point-to-point communication, and the qualification of the third-party equipment is verified;
step S28: when the qualification of the third-party equipment passes, generating second response information based on the IPV6 address information of the initiating equipment, the communication port information of the initiating equipment and the communication verification information of the initiating equipment in the target point-to-point communication information, and sending the second response information to the third-party equipment; and generating third response information based on the IPV6 address information of the target device, the communication port information of the target device and the communication verification information of the target device, and sending the third response information to the third-party device.
Preferably, between step S14 and step S15, the method further comprises:
step S14A: sending a first verification request to initiating equipment and receiving first verification information of the initiating equipment for the first verification request; the first check information includes: the method comprises the steps that the bandwidth of the initiating device and/or the first position information of the initiating device and/or the frequency range of a receiving signal of the initiating device and/or the frequency range of a sending signal of the initiating device are/is set;
step S14B: sending a second check-up request to the target device and receiving second check-up information of the target device for the second check-up request; the second check-up information includes: the bandwidth of the target device and/or the first position information of the target device and/or the frequency range of the received signal of the target device and/or the frequency range of the transmitted signal of the target device;
step S14C: verifying the first verification information and the second verification information, and executing step S15 when a preset peer-to-peer communication establishment condition is met; otherwise, fourth response information indicating that the point-to-point communication is not established is generated, and the fourth response information is sent to the initiating device.
Preferably, the peer-to-peer communication method based on the 5G technology further includes:
step S17: after the point-to-point communication is established between the initiating device and the target device, first position information of the initiating device and second position information of the target device are obtained in real time, and when the distance between the first position information and the second position information exceeds the distance allowed by the point-to-point communication, reminding information is sent to the initiating device and/or the target device.
Preferably, step S26: acquiring a first allowed access condition and/or a second allowed access condition in target point-to-point communication information of the target point-to-point communication based on the third request and the point-to-point communication list, wherein the first allowed access condition and/or the second allowed access condition comprises the following steps:
step S261: establishing a matrix A according to different point-to-point communications and point-to-point communication information thereof in a point-to-point communication list; the matrix is as follows:
Figure 690491DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 89243DEST_PATH_IMAGE002
is as follows
Figure 519087DEST_PATH_IMAGE003
The first corresponding to point-to-point communication
Figure 137544DEST_PATH_IMAGE004
Point-to-point communication information;
step S262: establishing a mapping relation between first allowed access conditions and/or second allowed access conditions of different point-to-point communications in the point-to-point communication list and each row element in the matrix A;
step S32: analyzing the third communication request, and extracting a pointing vector B based on a preset vector model, namely:
Figure 412667DEST_PATH_IMAGE005
wherein the content of the first and second substances,
Figure 56138DEST_PATH_IMAGE006
analyzing the third communication request based on the vector model to obtain an m-th vector value;
step S33: and calculating the similarity between the pointing vector B and each point-to-point communication of the matrix A, wherein the calculation formula is as follows:
Figure 266671DEST_PATH_IMAGE007
wherein the content of the first and second substances,
Figure 995592DEST_PATH_IMAGE008
to point to the similarity between vector B and the jth row parameter data of matrix a,
Figure 120412DEST_PATH_IMAGE009
is as follows
Figure 618390DEST_PATH_IMAGE010
Row, column k element;
Figure 390036DEST_PATH_IMAGE011
is the kth element in vector B;
and acquiring the first allowed access condition and/or the second allowed access condition mapped by the row with the maximum similarity with the pointing vector B in the matrix A.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic diagram of a peer-to-peer communication method based on the 5G technology according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
An embodiment of the present invention provides a peer-to-peer communication method based on a 5G technology, as shown in fig. 1, applied to an initiating device, including:
step S1: sending a first communication request to a server and receiving first response information of the server to the first communication request; the first communication request includes: an identification of the target device;
step S2: analyzing the first response information to obtain communication parameters;
step S3: establishing a peer-to-peer communication with the target device based on the communication parameters.
The working principle and the beneficial effects of the technical scheme are as follows:
a user uses initiating equipment to send a first communication request representing a point-to-point communication request to a server, the server receives the first communication request, analyzes the first request, verifies the first request, and sends first response information to the initiating equipment after the verification is passed; when the initiating terminal receives the first response information, the first response information is analyzed, the communication parameters of the target equipment which expects to establish point-to-point communication are obtained, and the initiating equipment and the target equipment establish point-to-point communication based on the communication parameters; establishing point-to-point communication connection between the initiating device and the target device through the server; the data transmission flow between the initiating device and the target device does not need to pass through the server, so that the load of the server is reduced, the data transmission path between the initiating device and the target device is shortened, and the data transmission efficiency between the initiating device and the target device is improved. The initiating device and the target device are both devices with 5G communication technology.
The point-to-point communication method based on the 5G technology realizes the point-to-point communication among the 5G devices, can fully utilize the high bandwidth advantage of the 5G, does not need to lead the flow to pass through a server, and further reduces the burden of the server.
In one embodiment, the communication parameters include IPV6 address information of the target device and/or communication port information and/or communication verification information of the target device.
The working principle and the beneficial effects of the scheme are as follows:
an application scenario corresponding to this embodiment: because the IPV4 of the operator is the NAT scheme, the direct communication can not be carried out through the IPV4 address, and the embodiment carries out the point-to-point communication through the IPV6 address; by means of the handshake server, the handshake server stores IPV6 addresses and port information uploaded by each device; each device reports its IPV6 address and communication port to the server; when the device A needs to communicate with the device B, the IPV6 address and the port of the device B are obtained from the server; device a and device B communicate peer-to-peer via IPV6 addresses.
In one embodiment, the first communication request further comprises: IPV6 address information of the originating device and/or communication port information of the originating device.
The working principle and the beneficial effects of the technical scheme are as follows:
when the sending equipment requests to establish the point-to-point communication, the sending equipment firstly needs to be provided with the basis of the point-to-point communication, and the server verifies the qualification of initiating the point-to-point communication of the initiating equipment by sending the IPV6 address information and/or the communication port information of the sending equipment to the server, so that the processing efficiency of the server on the establishment of the point-to-point communication connection is improved.
In one embodiment, the peer-to-peer communication method based on the 5G technology further includes:
step S4: receiving a second communication request sent by a third-party device to join the peer-to-peer communication,
step S5: analyzing the second communication request, acquiring the identity data of the third-party equipment, and verifying the identity data;
step S6: when the verification is passed, receiving a first verification result of the target equipment for the identity data of the third-party equipment;
step S7: and when the first verification result is that the third-party device is passed, the third-party device is accepted to join the peer-to-peer communication.
The working principle and the beneficial effects of the technical scheme are as follows:
the third-party equipment is added into the point-to-point communication between the initiating equipment and the target equipment, the verification is required to be respectively carried out on the initiating equipment and the target equipment, and when the third-party equipment passes the verification, the third-party equipment can be added into the point-to-point communication; the security of the peer-to-peer communication between the initiator device and the target device is ensured.
In one embodiment, when the number of devices in peer-to-peer communication is greater than a preset value when a third party device requests to join peer-to-peer communication, after the first verification result is passed, the initiating device further performs the following operations:
step S6A: determining at least one verification device selected by a server from devices in the peer-to-peer communication based on a preset rule;
step S6B: receiving a second verification result of the verification device for the identity data of the third-party device; and when the second verification result is that the third-party device is passed, the third-party device is accepted to join the peer-to-peer communication.
The working principle and the beneficial effects of the technical scheme are as follows:
when the number of the devices in the peer-to-peer communication is larger than a preset value (for example, 3), if the devices in the peer-to-peer communication need to be added or each device needs to be verified, the adding speed of the devices which need to be added is very low, and the communication of the devices in the peer-to-peer communication is influenced; therefore, the server is used for selecting the equipment in the point-to-point communication, the verification equipment is selected, the initiating equipment, the target equipment and the verification equipment are adopted for carrying out admission verification on the third-party equipment, and when the verification is passed, the third-party equipment permits the entry of the point-to-point communication; wherein, the preset rule comprises: and extracting the device with the earliest time for the device to join the point-to-point communication and/or extracting the device with the highest performance index and/or the device with the maximum preset authority pre-stored in the server.
The invention also provides a point-to-point communication method based on the 5G technology, which is applied to a server and comprises the following steps:
step S11: receiving a first communication request sent by initiating equipment;
step S12: analyzing the first communication request, and obtaining the identifier of the target equipment and/or the IPV6 address information of the initiating equipment and/or the communication port information of the initiating equipment corresponding to the first communication request;
step S13: acquiring the current communication state of the target equipment based on the identification of the target equipment;
step S14: when the communication state is accessible, obtaining IPV6 address information of the target device and/or communication port information and/or communication verification information of the target device;
step S15: generating first response information based on the IPV6 address information of the target device and/or the communication port information and/or the communication verification information of the target device;
step S16: and sending the first response information to the initiating device.
The working principle and the beneficial effects of the technical scheme are as follows:
when receiving a request of correspondingly establishing the point-to-point communication of the initiating device, the server needs to confirm the communication state of the target device, and when the communication state of the target device is inaccessible, the server directly returns inaccessible response information to the initiating device, namely the point-to-point communication of the initiating device fails to be established. When the communication state of the target device is accessible, sending IPV6 address information of the target device and/or communication port information and/or communication verification information of the target device to the initiating device; and the initiating equipment verifies with the target equipment according to the communication verification information, and establishes point-to-point communication connection with the target equipment after the verification is passed.
In one embodiment, the peer-to-peer communication method based on the 5G technology further includes:
step S21: receiving reported information sent by initiating equipment and/or target equipment after establishing point-to-point communication;
step S22: based on the reported information, establishing point-to-point communication information and adding the point-to-point communication information into a point-to-point communication list; the point-to-point communication information includes: one or more combinations of the communication number, the IPV6 address information of the initiating device, the communication port information of the initiating device, the IPV6 address information of the target device, the communication port information of the target device, the communication verification information of the initiating device and the communication verification information of the target device, the first allowed access condition sent by the initiating device and the second allowed access condition sent by the target device;
step S23: receiving a third communication request for joining in peer-to-peer communication sent by a third-party device;
step S24: receiving IPV6 address information of the third-party equipment and communication port information of the third-party equipment sent by the third-party equipment;
step S25: analyzing the third communication request to obtain a third request; the third request includes: a communication number;
step S26: acquiring a first allowed access condition and/or a second allowed access condition in target point-to-point communication information of the target point-to-point communication based on the third request and the point-to-point communication list;
step S27: based on the first allowed access condition and/or the second allowed access condition, the IPV6 address information of the third-party device and the communication port information of the third-party device; verifying the access qualification of the third-party equipment; when the third-party equipment meets the first access permission condition and/or the second access permission condition, the third-party equipment has the qualification of accessing the target point-to-point communication, and the qualification of the third-party equipment is verified;
step S28: when the qualification of the third-party equipment passes, generating second response information based on the IPV6 address information of the initiating equipment, the communication port information of the initiating equipment and the communication verification information of the initiating equipment in the target point-to-point communication information, and sending the second response information to the third-party equipment; and generating third response information based on the IPV6 address information of the target device, the communication port information of the target device and the communication verification information of the target device, and sending the third response information to the third-party device.
The working principle and the beneficial effects of the technical scheme are as follows:
when the third-party equipment needs to enter the point-to-point communication between the initiating equipment and the target equipment, verifying whether the third-party equipment can enter the point-to-point communication by adopting a server, wherein the verification is based on a first allowed access condition of the initiating equipment and/or a second allowed access condition of the target equipment; and verifying the third-party equipment at the server side, so that the point-to-point communication between the initiating equipment and the target equipment is not influenced.
In one embodiment, between step S14 and step S15, further comprising:
step S14A: sending a first verification request to initiating equipment and receiving first verification information of the initiating equipment for the first verification request; the first check information includes: the method comprises the steps that the bandwidth of the initiating device and/or the first position information of the initiating device and/or the frequency range of a receiving signal of the initiating device and/or the frequency range of a sending signal of the initiating device are/is set;
step S14B: sending a second check-up request to the target device and receiving second check-up information of the target device for the second check-up request; the second check-up information includes: the bandwidth of the target device and/or the first position information of the target device and/or the frequency range of the received signal of the target device and/or the frequency range of the transmitted signal of the target device;
step S14C: verifying the first verification information and the second verification information, and executing step S15 when a preset peer-to-peer communication establishment condition is met; otherwise, fourth response information indicating that the point-to-point communication is not established is generated, and the fourth response information is sent to the initiating device.
The working principle and the beneficial effects of the technical scheme are as follows:
the server respectively checks the initiating device and the target device by adopting the first checking information and the second checking information, confirms the conditions of the initiating device and the target device through the preset point-to-point communication establishing condition and ensures that the initiating device and the target device can meet the data transmission between the initiating device and the target device after establishing point-to-point communication connection. For example, the preset peer-to-peer communication establishment condition includes that the distance between the initiator and the target device is within a preset range, or both the bandwidth of the initiator and the bandwidth of the target device can meet the minimum requirement of peer-to-peer communication, or the frequency of the transmission signal of the transmitter matches the frequency of the reception signal of the target device, or the frequency of the reception signal of the transmitter matches the frequency of the transmission signal of the target device.
In one embodiment, the peer-to-peer communication method based on the 5G technology further includes:
step S17: after the point-to-point communication is established between the initiating device and the target device, first position information of the initiating device and second position information of the target device are obtained in real time, and when the distance between the first position information and the second position information exceeds the distance allowed by the point-to-point communication, reminding information is sent to the initiating device and/or the target device.
The working principle and the beneficial effects of the technical scheme are as follows:
after the point-to-point communication is established, the server can also track the states of the target equipment and the initiating equipment, and when the states of the target equipment and the initiating equipment influence the point-to-point communication connection, the server reminds the initiating equipment and the target equipment to eliminate the influence. For example, the initiating device and the target device are alerted when the distance between the initiating device and the target device exceeds a preset optimal communication threshold range for peer-to-peer communication.
In one embodiment, step S26: acquiring a first allowed access condition and/or a second allowed access condition in target point-to-point communication information of the target point-to-point communication based on the third request and the point-to-point communication list, wherein the first allowed access condition and/or the second allowed access condition comprises the following steps:
step S261: establishing a matrix A according to different point-to-point communications and point-to-point communication information thereof in a point-to-point communication list; the matrix is as follows:
Figure 543937DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 426443DEST_PATH_IMAGE002
is as follows
Figure 778927DEST_PATH_IMAGE003
The first corresponding to point-to-point communication
Figure 98306DEST_PATH_IMAGE004
Point-to-point communication information;
step S262: establishing a mapping relation between first allowed access conditions and/or second allowed access conditions of different point-to-point communications in the point-to-point communication list and each row element in the matrix A;
step S32: analyzing the third communication request, and extracting a pointing vector B based on a preset vector model, namely:
Figure 536240DEST_PATH_IMAGE005
wherein the content of the first and second substances,
Figure 956857DEST_PATH_IMAGE006
analyzing the third communication request based on the vector model to obtain an m-th vector value;
step S33: and calculating the similarity between the pointing vector B and each point-to-point communication of the matrix A, wherein the calculation formula is as follows:
Figure 304793DEST_PATH_IMAGE012
wherein the content of the first and second substances,
Figure 418243DEST_PATH_IMAGE008
to point to the similarity between vector B and the jth row parameter data of matrix a,
Figure 343473DEST_PATH_IMAGE009
is as follows
Figure 941683DEST_PATH_IMAGE010
Row, column k element;
Figure 3180DEST_PATH_IMAGE011
is the kth element in vector BA peptide;
and acquiring the first allowed access condition and/or the second allowed access condition mapped by the row with the maximum similarity with the pointing vector B in the matrix A.
The working principle and the beneficial effects of the technical scheme are as follows:
the server extracts the characteristics of the point-to-point communication in the point-to-point communication list to form a matrix; processing the third communication request, for example: extracting a pointing vector based on a preset vector model; according to the matching of the pointing vector and the matrix, the aim point-to-point communication which is required to be accessed by the third-party equipment and is determined based on the third request and the point-to-point communication list is realized; then, a first allowed access condition and a second allowed access condition of the target point-to-point communication are obtained. In the implementation, the similarity between the features extracted by the third communication request and the features of the point-to-point communication is calculated, so that the screening can be rapidly carried out, and the target point-to-point communication can be rapidly and accurately determined.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (7)

1. A point-to-point communication method based on 5G technology is applied to initiating equipment and is characterized by comprising the following steps:
step S1: sending a first communication request to a server and receiving first response information of the server to the first communication request; the first communication request includes: an identification of the target device;
step S2: analyzing the first response information to obtain communication parameters;
step S3: establishing point-to-point communication with the target device based on the communication parameters;
step S4: receiving a second communication request sent by a third party device to join the peer-to-peer communication,
step S5: analyzing the second communication request, acquiring the identity data of third-party equipment, and verifying the identity data;
step S6: when the verification is passed, receiving a first verification result of the target device for the identity data of the third-party device;
step S7: when the first verification result is passed, accepting the third-party equipment to join the peer-to-peer communication;
step S8: after the point-to-point communication is established between the initiating device and the target device, receiving reminding information of the server; the reminding information is information generated when the distance between the first position information and the second position information exceeds the distance allowed by the point-to-point communication.
2. The peer-to-peer communication method based on 5G technology according to claim 1, wherein the communication parameters include IPV6 address information of the target device and/or communication port information and/or communication authentication information of the target device.
3. The peer-to-peer communication method based on 5G technology according to claim 1, wherein the first communication request further comprises: IPV6 address information of the initiator device and/or communication port information of the initiator device.
4. The peer-to-peer communication method based on 5G technology according to claim 1, wherein the number of devices in the peer-to-peer communication is greater than a preset value when the third party device requests to join the peer-to-peer communication, and after the first verification result is passed, the initiating device further performs operations comprising:
step S6A: determining at least one verification device selected by the server from the devices in the peer-to-peer communication based on a preset rule;
step S6B: receiving a second verification result of the verification device for the identity data of the third party device; and when the second verification result is that the third-party equipment is passed, accepting the third-party equipment to join the peer-to-peer communication.
5. A peer-to-peer communication method based on 5G technology is applied to a server and is characterized by comprising the following steps:
step S11: receiving a first communication request sent by initiating equipment;
step S12: analyzing the first communication request, and obtaining an identifier of a target device corresponding to the first communication request and/or IPV6 address information of the initiating device and/or communication port information of the initiating device;
step S13: acquiring the current communication state of the target equipment based on the identification of the target equipment;
step S14: when the communication state is accessible, obtaining IPV6 address information of the target device and/or communication port information and/or communication verification information of the target device;
step S15: generating first response information based on the IPV6 address information of the target device and/or the communication port information of the target device and/or the communication verification information;
step S16: sending the first response information to the initiating device;
step S17: after the point-to-point communication is established between the initiating device and the target device, acquiring first position information of the initiating device and second position information of the target device in real time, and sending reminding information to the initiating device and/or the target device when the distance between the first position information and the second position information exceeds the distance allowed by the point-to-point communication;
step S21: receiving report information sent by the initiating device and/or the target device after the point-to-point communication is established;
step S22: based on the reported information, establishing point-to-point communication information and adding the point-to-point communication information into a point-to-point communication list; the point-to-point communication information includes: one or more combinations of communication numbers, IPV6 address information of the initiator device, communication port information of the initiator device, IPV6 address information of the target device, communication port information of the target device, communication verification information of the initiator device and communication verification information of the target device, first allowed access conditions sent by the initiator device and second allowed access conditions sent by the target device;
step S23: receiving a third communication request which is sent by third-party equipment and is added into the peer-to-peer communication;
step S24: receiving IPV6 address information of the third-party equipment and communication port information of the third-party equipment, which are sent by the third-party equipment;
step S25: analyzing the third communication request to obtain a third request; the third request comprises: the communication number;
step S26: acquiring the first allowed access condition and/or the second allowed access condition in target point-to-point communication information of target point-to-point communication based on the third request and the point-to-point communication list;
step S27: based on the first and/or second allowed access conditions, the IPV6 address information of the third party device, the communication port information of the third party device; verifying access qualification of the third-party device; when the third-party device meets the first allowed access condition and/or the second allowed access condition, the third-party device is qualified to access the target point-to-point communication, and the qualification of the third-party device is verified;
step S28: when the qualification of the third-party device passes, generating second response information based on the IPV6 address information of the initiating device, the communication port information of the initiating device and the communication verification information of the initiating device in the target peer-to-peer communication information, and sending the second response information to the third-party device; and generating third response information based on the IPV6 address information of the target device, the communication port information of the target device and the communication verification information of the target device, and sending the third response information to the third-party device.
6. The peer-to-peer communication method based on 5G technology according to claim 5, further comprising between the step S14 and the step S15:
step S14A: sending a first verification request to the initiating device and receiving first verification information of the initiating device for the first verification request; the first verification information includes: a bandwidth of the initiating device and/or first location information of the initiating device and/or a frequency range of a received signal of the initiating device and/or a frequency range of a transmitted signal of the initiating device;
step S14B: sending a second check-up request to the target device and receiving second check-up information of the target device for the second check-up request; the second check-up information includes: the bandwidth of the target device and/or the first location information of the target device and/or the frequency range of the received signal of the target device and/or the frequency range of the transmitted signal of the target device;
step S14C: verifying the first verification information and the second verification information, and executing step S15 when a preset peer-to-peer communication establishment condition is met; otherwise, fourth response information indicating that the point-to-point communication is not established is generated, and the fourth response information is sent to the initiating device.
7. The peer-to-peer communication method based on 5G technology according to claim 5, wherein the step S26: acquiring the first allowed access condition and/or the second allowed access condition in target point-to-point communication information of target point-to-point communication based on the third request and the point-to-point communication list, wherein the acquiring comprises:
step S261: establishing a matrix A according to different point-to-point communications and point-to-point communication information thereof in the point-to-point communication list; the matrix is as follows:
Figure RE-462078DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure RE-644798DEST_PATH_IMAGE002
is as follows
Figure RE-18010DEST_PATH_IMAGE003
A second one of the point-to-point communication
Figure RE-616482DEST_PATH_IMAGE004
-said point-to-point communication information;
step S262: establishing a mapping relation between the first allowed access condition and/or the second allowed access condition of different point-to-point communication in the point-to-point communication list and each row element in the matrix A;
step S32: analyzing the third communication request, and extracting a pointing vector B based on a preset vector model, namely:
Figure RE-696433DEST_PATH_IMAGE005
wherein the content of the first and second substances,
Figure RE-112371DEST_PATH_IMAGE006
obtaining an mth vector value after the third communication request is analyzed based on the vector model;
step S33: calculating the similarity between the pointing vector B and each point-to-point communication of the matrix A, wherein the calculation formula is as follows:
Figure RE-582667DEST_PATH_IMAGE007
wherein the content of the first and second substances,
Figure RE-47146DEST_PATH_IMAGE008
is the direction ofThe similarity between the vector B and the jth row parameter data of the matrix a,
Figure RE-DEST_PATH_IMAGE009
is as follows
Figure RE-512763DEST_PATH_IMAGE010
Row, column k element;
Figure RE-99602DEST_PATH_IMAGE011
is the kth element in vector B;
and acquiring the first allowed access condition and/or the second allowed access condition mapped by the row with the maximum similarity with the pointing vector B in the matrix A.
CN202010881553.8A 2020-08-28 2020-08-28 Point-to-point communication method based on 5G technology Active CN111741137B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010881553.8A CN111741137B (en) 2020-08-28 2020-08-28 Point-to-point communication method based on 5G technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010881553.8A CN111741137B (en) 2020-08-28 2020-08-28 Point-to-point communication method based on 5G technology

Publications (2)

Publication Number Publication Date
CN111741137A CN111741137A (en) 2020-10-02
CN111741137B true CN111741137B (en) 2020-12-29

Family

ID=72658920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010881553.8A Active CN111741137B (en) 2020-08-28 2020-08-28 Point-to-point communication method based on 5G technology

Country Status (1)

Country Link
CN (1) CN111741137B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238075A (en) * 2010-05-05 2011-11-09 杭州华三通信技术有限公司 IPv6 (Internet Protocol version 6) routing establishing method based on Ethernet Point-to-Point Protocol and access server
CN102811263A (en) * 2012-07-25 2012-12-05 中国联合网络通信集团有限公司 Internet protocol version 6 (IPv6)-based communication method and system for mobile terminal and mobile terminal
WO2015103486A1 (en) * 2014-01-03 2015-07-09 Qualcomm Incorporated Exchanging internet protocol version capability information between client devices over a communications network
CN109660497A (en) * 2017-10-12 2019-04-19 阿里巴巴集团控股有限公司 Data processing method and device, terminal, processor, storage medium
CN109729080A (en) * 2018-12-20 2019-05-07 全链通有限公司 Access attack guarding method and system based on block chain domain name system
CN110677379A (en) * 2018-07-02 2020-01-10 瞻博网络公司 Method and apparatus for blocking, detecting and/or preventing malicious traffic

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101369950B (en) * 2007-08-13 2011-09-28 康佳集团股份有限公司 Communication method between digital houses
TWI569615B (en) * 2010-03-01 2017-02-01 內數位專利控股公司 Machine-to-machine gateway
CN113630297B (en) * 2019-07-26 2023-05-12 华为技术有限公司 Method and terminal for controlling first equipment
CN111065076B (en) * 2019-12-25 2021-04-20 郭晋华 Signal intensity threshold-based M2M Internet of things improved communication method, device and system applied to new-generation information technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102238075A (en) * 2010-05-05 2011-11-09 杭州华三通信技术有限公司 IPv6 (Internet Protocol version 6) routing establishing method based on Ethernet Point-to-Point Protocol and access server
CN102811263A (en) * 2012-07-25 2012-12-05 中国联合网络通信集团有限公司 Internet protocol version 6 (IPv6)-based communication method and system for mobile terminal and mobile terminal
WO2015103486A1 (en) * 2014-01-03 2015-07-09 Qualcomm Incorporated Exchanging internet protocol version capability information between client devices over a communications network
CN109660497A (en) * 2017-10-12 2019-04-19 阿里巴巴集团控股有限公司 Data processing method and device, terminal, processor, storage medium
CN110677379A (en) * 2018-07-02 2020-01-10 瞻博网络公司 Method and apparatus for blocking, detecting and/or preventing malicious traffic
CN109729080A (en) * 2018-12-20 2019-05-07 全链通有限公司 Access attack guarding method and system based on block chain domain name system

Also Published As

Publication number Publication date
CN111741137A (en) 2020-10-02

Similar Documents

Publication Publication Date Title
CN108833238A (en) Equipment matches network method
CN104967595A (en) Method and apparatus for registering devices on Internet of things platform
CN109246769B (en) PDU session establishment method and device
RU2013122949A (en) IMPROVED METHOD, ACCESS POINT, SERVER AND SYSTEM FOR AUTOMATIC REMOTE ACCESS TO IEEE 802.11 STANDARD NETWORKS
CN105991600A (en) Identity authentication and apparatus, server and terminal
CN105681258B (en) Session method and conversational device based on third-party server
CN109167780B (en) Method, device, system and medium for controlling resource access
KR20170110170A (en) Machine-to-machine bootstrapping
CN108683722B (en) Data transmission method, ESB platform and client
CN105792194A (en) Base station legality authentication method, device and system and network device
CN106507414B (en) Message forwarding method and device
CN108574673A (en) ARP message aggression detection method and device applied to gateway
CN103051598B (en) Method, user equipment and packet access gateway for secure access to Internet services
CN111741137B (en) Point-to-point communication method based on 5G technology
CN112651044B (en) Business transaction method, system and storage medium based on block chain technology
CN111432453B (en) Communication channel determination method, device and equipment
US9288215B2 (en) Utilizing routing for secure transactions
CN114363879B (en) Roaming processing method and system for wireless terminal
CN110169105B (en) Method, device and system for link reconstruction
US9980106B2 (en) MTC device communication method, device, and system
CN107294800A (en) Network data access control method and system based on Mobile operating system
GB2609054A (en) Methods and systems for allowing device to send and receive data
CN103188662A (en) Method and device for verifying wireless access point
KR101351607B1 (en) Methdo and apparatus for controlling packet transmission between server and a plurality of hosts, the server, and method for receiving packet from the apparatus
CN108076460B (en) Method and terminal for authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant