CN115277176A - Communication method, communication device, storage medium, and electronic apparatus - Google Patents

Communication method, communication device, storage medium, and electronic apparatus Download PDF

Info

Publication number
CN115277176A
CN115277176A CN202210880437.3A CN202210880437A CN115277176A CN 115277176 A CN115277176 A CN 115277176A CN 202210880437 A CN202210880437 A CN 202210880437A CN 115277176 A CN115277176 A CN 115277176A
Authority
CN
China
Prior art keywords
target slave
identity information
equipment
master device
dynamic verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210880437.3A
Other languages
Chinese (zh)
Other versions
CN115277176B (en
Inventor
郭茂文
黎艳
张�荣
卢燕青
苏军根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210880437.3A priority Critical patent/CN115277176B/en
Publication of CN115277176A publication Critical patent/CN115277176A/en
Application granted granted Critical
Publication of CN115277176B publication Critical patent/CN115277176B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure provides a communication method, a communication device, a storage medium and equipment, and relates to the technical field of communication. The communication method is applied to the main equipment of cooperative communication, and comprises the following steps: generating first dynamic verification information based on the identity information of the master device, and sending a capability calling request carrying the first dynamic verification information to a target slave device; receiving an authentication request which is sent by the target slave device according to the capability calling request and carries second dynamic verification information under the condition that the target slave device passes the authentication of the master device; the second dynamic verification information is generated by the target slave device based on identity information of the target slave device; and if the target slave equipment is determined to be registered in the master equipment according to the second dynamic verification information, determining that the target slave equipment passes authentication, and calling the capability of the target slave equipment. The method and the device can reduce the complexity of mutual authentication of the terminal equipment and the implementation cost of capability calling to a certain extent.

Description

Communication method, communication device, storage medium, and electronic apparatus
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a communication method, a communication apparatus, a storage medium, and an electronic device.
Background
With the development of communication technology, capability calling among different devices can be realized through cooperative communication. For example, the terminal virtualization technology enables the capability calling between digital home terminals through cooperative communication to be realized, and further, not only can multiple device resources be shared, but also the smart home service experience can be improved, for example, a set top box calls the capability of a smart sound box to realize the sound quality improvement of an interactive network Television (IPTV), and the like.
In the above capability calling process, authentication or access control needs to be performed on the terminal device. In the related art, an access control method for collaborative communication between digital home terminals generally adopts a digital certificate or an authentication management platform. The method needs a certificate management platform or an authentication management system on the network side to participate, and the complexity of mutual authentication of the terminal equipment and the implementation cost of capability calling are increased.
Disclosure of Invention
The disclosure provides a communication device, a communication apparatus, a computer-readable storage medium, and an electronic apparatus, which are used for reducing the complexity of mutual authentication of terminal devices and the implementation cost of capability calling to some extent.
According to a first aspect of the present disclosure, a communication method is provided, which is applied to a master device of cooperative communication, and includes: generating first dynamic verification information based on the identity information of the master equipment, and sending a capacity calling request carrying the first dynamic verification information to target slave equipment; the first dynamic verification information is used for the target slave device to authenticate the master device; receiving an authentication request which is sent by the target slave device according to the capability calling request and carries second dynamic verification information under the condition that the target slave device passes the authentication of the master device; the second dynamic verification information is generated by the target slave device based on identity information of the target slave device; and if the target slave equipment is determined to be registered in the master equipment according to the second dynamic verification information, determining that the target slave equipment passes the authentication, and performing capacity calling on the target slave equipment.
In one embodiment, the identity information of the master device includes an identifier of the master device and a MAC address of the master device, and the generating first dynamic verification information based on the identity information of the master device includes: generating a first random number; and generating a first hash value based on the first random number, the identifier of the main device and the MAC address of the main device, and using the first random number and the first hash value as the first dynamic verification information.
In one embodiment, the second dynamic verification information includes a second random number and a second hash value, and if it is determined that the target slave device is registered to the master device according to the second dynamic verification information, it is determined that the target slave device is authenticated, the method includes: determining candidate slave devices from the registered slave devices according to the source address of the authentication request; determining a third hash value of the candidate slave device according to the second random number and the identity information of the candidate slave device; if the third hash value is the same as the second hash value, determining the candidate slave device as the target slave device, and determining that the master device has registered the target slave device.
According to a second aspect of the present disclosure, there is provided a communication method applied to a target slave device of cooperative communication, including: receiving a capability calling request which is sent by a main device and carries first dynamic verification information; the first dynamic verification information is generated by the master device based on identity information of the master device; if the master device is determined to be registered in the target slave device according to the first dynamic verification information, determining that the master device passes authentication; generating second dynamic verification information based on the identity information of the target slave equipment, and sending an authentication request carrying the second dynamic verification information to the master equipment; the second dynamic verification information is used for the master device to authenticate the target slave device; and accepting the capability call of the master device under the condition that the target slave device is authenticated.
According to a third aspect of the present disclosure, there is provided a communication method applied to a master device of cooperative communication, including: broadcasting a first registration request, wherein the first registration request carries first identity information, and the first identity information is generated by the main equipment based on the identity information of the main equipment; receiving a second registration request sent by a target slave device in response to the first registration request under the condition that the master device is determined not to be registered according to the first identity information; and initiating a registration process to the target slave equipment to register the target slave equipment under the condition that a preset registration condition is met.
In one embodiment, the initiating a registration procedure with the target slave device includes: generating a first public key and a first private key based on preset key parameters, sending the first public key to the target slave equipment, enabling the target slave equipment to determine a shared key according to the first public key and a second private key, and encrypting the identity information of the target slave equipment by adopting the shared key to obtain encrypted target slave equipment identity information; receiving the encrypted target slave device identity information and a second public key sent by the target slave device; determining the shared key according to the first private key and the second public key, decrypting the encrypted target slave equipment identity information by using the shared key to obtain the identity information of the target slave equipment, and registering the identity information of the target slave equipment; encrypting the identity information of the master equipment by adopting the shared secret key to obtain encrypted master equipment identity information, and sending the encrypted master equipment identity information to the target slave equipment; and receiving registration feedback sent by the target slave equipment based on the encrypted master equipment identity information.
According to a fourth aspect of the present disclosure, there is provided a communication method applied to a target slave device of cooperative communication, including: if the target slave equipment is determined not to register the master equipment according to first identity information carried by a first registration request broadcast by the master equipment, responding to the first registration request, and sending a second registration request to the master equipment; the first identity information is generated by the main device based on identity information of the main device; and executing a registration process initiated by the main equipment under the condition of meeting a preset registration condition, and registering the main equipment.
In one embodiment, the receiving the registration procedure initiated by the master device includes: receiving a first public key sent by the main equipment; generating a second public key and a second private key based on preset key parameters, and determining a shared key according to the first public key and the second private key; encrypting the identity information of the target slave equipment by using the shared secret key to obtain encrypted target slave equipment identity information, sending the encrypted target slave equipment identity information and the second public key to the master equipment, enabling the master equipment to determine a shared secret key according to a first private key and the second public key, decrypting the encrypted target slave equipment identity information by using the shared secret key to obtain the target slave equipment identity information, and registering the target slave equipment identity information; receiving encrypted main equipment identity information sent by the main equipment, and decrypting the encrypted main equipment identity information by adopting the shared secret key to obtain the identity information of the main equipment; and registering the identity information of the main equipment and sending registration feedback to the main equipment.
According to a fifth aspect of the present disclosure, there is provided a communication apparatus applied to a master device of cooperative communication, including: the system comprises a capability calling request sending module, a capability calling request sending module and a capability calling request sending module, wherein the capability calling request sending module is configured to generate first dynamic verification information based on identity information of the master device and send a capability calling request carrying the first dynamic verification information to a target slave device; the first dynamic verification information is used for the target slave device to authenticate the master device; the authentication request receiving module is configured to receive an authentication request which is sent by the target slave device according to the capability calling request and carries second dynamic verification information under the condition that the target slave device passes the authentication of the master device; the second dynamic verification information is generated by the target slave device based on identity information of the target slave device; and the target slave equipment authentication module is configured to determine that the target slave equipment is authenticated and perform capability calling on the target slave equipment if the target slave equipment is determined to be registered in the master equipment according to the second dynamic verification information.
According to a sixth aspect of the present disclosure, there is provided a communication apparatus applied to a target slave device of cooperative communication, including: the system comprises a capability calling request receiving module, a first dynamic verification information sending module and a second dynamic verification information sending module, wherein the capability calling request receiving module is configured to receive a capability calling request which is sent by a main device and carries first dynamic verification information; the first dynamic verification information is generated by the master device based on identity information of the master device; a master device authentication module configured to determine that the master device is authenticated if it is determined that the master device is registered in the target slave device according to the first dynamic verification information; the authentication request sending module is configured to generate second dynamic verification information based on the identity information of the target slave device and send an authentication request carrying the second dynamic verification information to the master device; the second dynamic verification information is used for the master device to authenticate the target slave device; a capability call accepting module configured to accept a capability call made by the master device in a case where the target slave device is authenticated.
According to a seventh aspect of the present disclosure, there is provided a communication apparatus applied to a master device of cooperative communication, including: a first registration request broadcasting module configured to broadcast a first registration request, where the first registration request carries first identity information, and the first identity information is generated by the main device based on identity information of the main device; a second registration request receiving module configured to receive a second registration request transmitted by the target slave device according to the first identity information; and the registration process initiating module is configured to initiate a registration process to the target slave device to register with the target slave device under the condition that a preset registration condition is met.
According to an eighth aspect of the present disclosure, there is provided a communication apparatus applied to a target slave device of cooperative communication, including: the second registration request sending module is configured to respond to a first registration request and send a second registration request to the main device if the target slave device is determined not to be registered with the main device according to first identity information carried by the first registration request broadcast by the main device; the first identity information is generated by the main device based on identity information of the main device; and the registration flow receiving module is configured to receive a registration flow initiated by the main device under the condition that a preset registration condition is met, and register with the main device.
According to a ninth aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the communication method of the first to fourth aspects described above and possible implementations thereof.
According to a tenth aspect of the present disclosure, there is provided an electronic device comprising: a processor; and a memory for storing executable instructions for the processor; wherein the processor is configured to perform the communication method of the first to fourth aspects described above and possible implementations thereof via execution of executable instructions.
The technical scheme of the disclosure has the following beneficial effects:
in the scheme, the master device generates first dynamic verification information based on identity information of the master device, and sends a capability calling request carrying the first dynamic verification information to the target slave device so that the target slave device authenticates the master device; the master device authenticates the target slave device based on second dynamic verification information generated by the identity information of the target slave device, and determines that the master device passes the authentication of the target slave device under the condition that the target slave device is registered in the master device; in the bidirectional authentication, the authentication of the equipment can be realized through the identity information of the registered equipment without the participation of a certificate management platform or an authentication management system at a network side, so that the implementation cost of the mutual authentication complexity and the capability calling of the equipment is reduced.
Drawings
Fig. 1 is a schematic diagram of a system architecture provided by an embodiment of the present disclosure;
fig. 2 is a schematic implementation flow diagram of a communication method according to an embodiment of the present disclosure;
fig. 3 is a schematic implementation flow diagram of a communication method according to an embodiment of the present disclosure;
fig. 4 is a schematic implementation flow diagram of a communication method according to an embodiment of the present disclosure;
fig. 5 is a schematic implementation flow diagram of a communication method according to an embodiment of the present disclosure;
fig. 6 is a schematic implementation flow diagram of a communication method according to an embodiment of the present disclosure;
fig. 7 is a schematic implementation flow diagram of a communication method according to an embodiment of the present disclosure;
fig. 8 is a schematic implementation flow diagram of a communication method according to an embodiment of the present disclosure;
fig. 9 is a schematic implementation flow diagram of a communication method according to an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of a communication device according to an embodiment of the present disclosure;
fig. 11 is a schematic structural diagram of a communication device according to an embodiment of the present disclosure;
fig. 12 is a schematic structural diagram of a communication device according to an embodiment of the present disclosure;
fig. 13 is a schematic structural diagram of a communication device according to an embodiment of the present disclosure;
fig. 14 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described more fully hereinafter with reference to the accompanying drawings.
The drawings are schematic illustrations of the present disclosure and are not necessarily drawn to scale. Some of the block diagrams shown in the figures may be functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in hardware modules or integrated circuits, or in networks, processors or microcontrollers. Embodiments may be embodied in many different forms and should not be construed as limited to the examples set forth herein. The described features, structures, or characteristics of the disclosure may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough explanation of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that one or more of the specific details can be omitted, or one or more of the specific details can be replaced with other methods, components, devices, steps, etc., in implementing the embodiments of the disclosure.
The terminal virtualization technology enables the digital home terminals to realize capability calling through cooperative communication, so that not only can multiple equipment resources be shared, but also the service experience of the smart home can be improved, for example, the set top box calls the capability of the intelligent sound box to realize IPTV sound quality improvement.
In the device discovery and capability calling processes, authentication or access control needs to be performed on the terminal device. In the related art, an access control method for collaborative communication between digital home terminals generally adopts a digital certificate or an authentication management platform. In this way, a certificate management platform or an authentication management system on the network side needs to participate, so that the complexity of mutual authentication of the terminal devices and the implementation cost of capability calling are increased.
In view of the above problems, exemplary embodiments of the present disclosure first provide a communication method capable of reducing the complexity of mutual authentication of terminal devices and the implementation cost of capability invocation to some extent.
The following explains the noun terms appearing herein.
A master device: refers to the capability caller.
The slave device: the method refers to a method for providing the capability and receiving the capability calling party.
Cooperative communication: the slave device shares the resources with the master device, so that the called capability is consistent with the master device.
Media Access Control (MAC) Address: is an address used to confirm the location of the network device. In the OSI model, a third layer network layer is responsible for IP addresses and a second layer data link layer is responsible for MAC addresses.
ECDHE key exchange algorithm: based on the DHE algorithm, the ECC elliptic curve characteristic is utilized, and the public key and the final session key can be calculated with less calculation.
The system architecture and application scenario of an operating environment of the above communication method are exemplarily described below with reference to fig. 1.
Fig. 1 shows a schematic diagram of a system architecture, which system architecture 100 may comprise a master device 101, a first slave device 102 and a second slave device 103; the master device 101 is a caller, and the first slave device 102 and the second slave device 103 are callees; the master device 101 may be a set-top box, a home intelligent terminal, a digital conference desktop intelligent terminal, a financial intelligent terminal, and the like, and the first slave device 102 and the second slave device 103 may be cameras, speakers, projectors, and the like. The master device 101 may request initiation of a capability call to the first slave device 102 and/or the second slave device 103 to enable resource sharing. The master device 101 and the first slave device 102 and the second slave device 103 may form a connection through a wired or wireless communication link to perform data interaction.
Fig. 2 is a schematic implementation flow diagram of a communication method provided in the embodiment of the present disclosure, which may be executed by the master device 101, as shown in fig. 2, the method includes the following steps S201 to S203:
step S201, generating first dynamic verification information based on the identity information of the master device, and sending a capability calling request carrying the first dynamic verification information to the target slave device; the first dynamic verification information is used for the target slave device to authenticate the master device;
step S202, receiving an authentication request which is sent by a target slave device according to a capability calling request and carries second dynamic verification information under the condition that the target slave device passes the authentication of the master device; the second dynamic verification information is generated by the target slave device based on the identity information of the target slave device;
step S203, if it is determined that the target slave device is registered in the master device according to the second dynamic verification information, determining that the target slave device is authenticated, and performing capability call on the target slave device.
In the communication method, the master device generates first dynamic verification information based on the identity information of the master device, and sends a capability calling request carrying the first dynamic verification information to the target slave device so that the target slave device authenticates the master device; the master device authenticates the target slave device based on second dynamic verification information generated by the identity information of the target slave device, and determines that the master device passes the authentication of the target slave device under the condition that the target slave device is registered in the master device; in the bidirectional authentication, the authentication of the equipment can be realized through the identity information of the registered equipment without the participation of a certificate management platform or an authentication management system at a network side, so that the implementation cost of the mutual authentication complexity and the capability calling of the equipment is reduced.
Each step in fig. 2 is explained in detail below.
Referring to fig. 2, in step S201, first dynamic authentication information is generated based on identity information of a master device, and a capability invocation request carrying the first dynamic authentication information is sent to a target slave device.
And the first dynamic verification information is used for the target slave device to authenticate the master device.
The identity information of the master device is used to represent the identity of the master device, and generally, the identity of each device has uniqueness, so the identity information of the master device may be information that uniquely identifies the master device; such as: the identity of the master device, the address of the master device, etc., without limitation. The identity information of the master device may adopt one-dimensional identity information or may adopt multiple-dimensional identity information, which is not limited herein.
The first dynamic verification information may be generated based on identity information of one dimension of the master device, or may be generated based on identity information of multiple dimensions of the master device, which is not limited herein. In one embodiment, the first dynamic verification information may be generated by transforming identity information of the master device by using a hash function; such as: the identity information of the master device is transformed by using an addition hash function, a bit operation hash function, a multiplication hash function, a division hash function, a table lookup hash function, or a hybrid hash function, which is not limited herein.
In one embodiment, the target slave device may determine whether the master device is registered according to the first dynamic verification information, and in the case of the registered master device, determine that the target slave device authenticates the master device; otherwise, the authentication is not passed.
The capability call request is used for requesting a capability call from the slave device; such as: the main device is a set-top box and can request the capability calling from the slave device sound so as to realize the improvement of IPTV tone quality. In an embodiment, the capability call request may be sent based on a confirmation call instruction of the user, or may be automatically called at power-on, which is not limited herein.
With continued reference to fig. 2, in step S202, an authentication request carrying second dynamic verification information is received, where the target slave device authenticates the master device, and the authentication request is sent according to the capability invocation request.
Wherein the second dynamic verification information is generated by the target slave device based on the identity information of the target slave device.
Identity information of the target slave device, i.e., information uniquely identifying the target slave device; such as: identification of the target slave device, address of the target slave device, etc., without limitation. The identity information of the target slave device may adopt one-dimensional identity information or may adopt multiple-dimensional identity information, which is not limited herein.
The second dynamic verification information may be generated based on the identity information of one dimension of the target slave device, or may be generated based on the identity information of multiple dimensions of the target slave device, which is not limited herein. In one embodiment, the second dynamic verification information may be generated by transforming the identity information of the target slave device by using a hash function; such as: and transforming the identity information of the target slave device by using an addition hash function, a bit operation hash function, a multiplication hash function, a division hash function, a table lookup hash function or a hybrid hash function, which is not limited herein.
The authentication request is used for requesting the master device to authenticate the target slave device by the target slave device so as to realize cooperative communication; generally, when the target slave device passes the master device authentication, the target slave device transmits the authentication result to the master device.
With continued reference to fig. 2, in step S203, if it is determined that the target slave device is registered in the master device according to the second dynamic verification information, it is determined that the target slave device is authenticated, and a capability call is performed on the target slave device.
The target slave device is registered in the master device, and it can be understood that the master device stores the identity information of the target slave device; in one embodiment, dynamic authentication information of the identity information of the slave device stored by the master device may be determined; and comparing the dynamic verification information of the identity information of the slave equipment with the second dynamic verification information, and under the condition that the dynamic verification information of the identity information of the slave equipment is consistent with the second dynamic verification information, determining the slave equipment as target equipment, wherein the target slave equipment is registered in the master equipment, and determining that the master equipment passes the authentication of the target slave equipment.
The identity information of the slave device stored by the master device may be identity information of one slave device, or may be identity information of a plurality of slave devices, which is not limited herein. Comparing the dynamic verification information of the slave equipment with second dynamic verification information under the condition of storing the identity information of the slave equipment; and comparing the dynamic verification information of the plurality of slave devices with the second dynamic verification information one by one under the condition of storing the identity information of the plurality of slave devices.
In one embodiment, the identity information of the master device includes an identification of the master device and a MAC address of the master device; fig. 3 is a schematic diagram of an implementation flow of a communication method provided in an embodiment of the present disclosure, and as shown in fig. 3, the step S201 includes the following steps S301 and S302:
step S301 generates a first random number.
The first random number may be generated using a random function.
The identity of the master device, i.e., the ID of the master device. The MAC address of the host device refers to a physical address of the host device, and is an address that is burned into the flash memory chip by a manufacturer of the host device during production to confirm the location of the host device.
Step S302, generating a first hash value based on the first random number, the identifier of the master device, and the MAC address of the master device, and using the first random number and the first hash value as first dynamic verification information.
The first random number, the identifier of the main device and the MAC address of the main device may be transformed by using a hash function to obtain a first hash value; in one embodiment, the first random number, the ID of the master device, and the MAC address of the master device may be concatenated, and the concatenated data may be subjected to a hash operation to obtain a first hash value; such as: the first random number, the identifier of the host device, and the MAC address of the host device are transformed by using an addition hash function, a bit operation hash function, a multiplication hash function, a division hash function, a table lookup hash function, or a hybrid hash function, which is not limited herein.
In one embodiment, a first hash value is generated based on the first random number, an identification of the master device, or a MAC address of the master device, and the first random number and the first hash value are used as the first dynamic authentication information.
In an implementation manner, the second dynamic verification information includes a second random number and a second hash value, fig. 4 is a schematic implementation flow diagram of a communication method provided in an embodiment of the present disclosure, and as shown in fig. 4, the step S203 includes the following steps S401 to S403:
step S401 determines candidate slave devices from the registered slave devices according to the source address of the authentication request.
The source address of the authentication request may be a source MAC address of the authentication request, or a source IP address carried by the authentication request, which is not limited herein. In one embodiment, the master device may match the identity information of the registered slave devices according to the source address of the authentication request, and determine the matched slave devices as candidate slave devices.
In the case where the source address of the authentication request is the MAC address of the target slave device, the source address of the authentication request may be compared with the MAC addresses of the registered slave devices, and a slave device whose MAC address coincides with the source address of the authentication request may be determined as a candidate slave device; in the case where the source address of the authentication request is the identification of the target slave device, the source address of the authentication request may be compared with the identifications of the registered slave devices, and the slave device whose identification coincides with the source address of the authentication request may be determined as a candidate slave device. The determined candidate slave device may be one slave device or a plurality of slave devices.
And S402, determining a third hash value of the candidate slave device according to the second random number and the identity information of the candidate slave device.
The second random number and the identity information of the candidate slave device can be transformed by adopting a hash function to obtain a third hash value; such as: and transforming the second random number and the identity information of the candidate slave device by using an addition hash function, a bit operation hash function, a multiplication hash function, a division hash function, a table lookup hash function or a hybrid hash function, which is not limited herein. The candidate slave devices are in one-to-one correspondence with the third hash values.
And step S403, if the third hash value is the same as the second hash value, determining the candidate slave device as the target slave device, and determining that the master device has registered the target slave device.
And if the number of the candidate slave devices is 1, comparing the third hash value with the second hash value, and if the third hash value is consistent with the second hash value, determining the candidate slave devices as target slave devices and determining that the master device has registered the target slave devices. And under the condition that the number of the candidate slave devices is greater than 1, comparing the third hash value of each candidate slave device with the second hash value one by one, if a third hash value consistent with the second hash value exists, determining the candidate slave device corresponding to the third hash value as a target slave device, and determining that the master device has registered the target slave device.
Fig. 5 is a schematic implementation flow diagram of a communication method provided by an embodiment of the present disclosure, which may be executed by a target slave device, where the target slave device may be any one of the first slave device 102 and the second slave device 103, as shown in fig. 3, the method includes the following steps S501 to S504:
step S501, receiving a capability calling request which is sent by a main device and carries first dynamic verification information; the first dynamic verification information is generated by the main equipment based on the identity information of the main equipment;
step S502, if the master device is determined to be registered in the target slave device according to the first dynamic verification information, the master device is determined to pass the authentication;
step S503, generating second dynamic verification information based on the identity information of the target slave equipment, and sending an authentication request carrying the second dynamic verification information to the master equipment; the second dynamic verification information is used for the master equipment to authenticate the target slave equipment;
step S504 is to accept a capability call made by the master device when the target slave device is authenticated.
In the communication method, the target slave device authenticates the master device based on first dynamic verification information generated by the identity information of the master device, and determines that the target slave device passes the authentication of the master device under the condition that the target slave device is registered with the master device; the target slave device generates second dynamic verification information based on the identity information of the target slave device, and sends an authentication request carrying the second dynamic verification information to the master device, so that the master device authenticates the target slave device, and then the target slave device is called by the master device to share resources with the master device; in the bidirectional authentication, the authentication of the equipment can be realized through the identity information of the registered equipment without the participation of a certificate management platform or an authentication management system at a network side, so that the implementation cost of the mutual authentication complexity and the capability calling of the equipment is reduced.
Each step in fig. 5 is explained in detail below.
Referring to fig. 5, in step S501, a capability invocation request carrying first dynamic authentication information sent by a master device is received.
Wherein the first dynamic authentication information is generated by the master device based on the identity information of the master device.
The first dynamic verification information may be generated based on identity information of one dimension of the master device, or may be generated based on identity information of multiple dimensions of the master device, which is not limited herein. Identity information of the master device, i.e., information uniquely identifying the master device; such as: the identity of the master device, the address of the master device, etc., without limitation.
In one embodiment, the first dynamic verification information may be obtained by transforming identity information of the master device by using a hash function; such as: the identity information of the host device is transformed by using an addition hash function, a bit operation hash function, a multiplication hash function, a division hash function, a table lookup hash function, or a hybrid hash function, which is not limited herein.
With continued reference to fig. 5, in step S502, if it is determined that the master device is registered with the target slave device according to the first dynamic verification information, it is determined that the master device is authenticated.
The master device is registered in the target slave device, and the target slave device can store the identity information of the master device; in one embodiment, a hash function may be used to transform the identity information of the master device stored in the target slave device, so as to obtain the dynamic verification information of the master device; and comparing the dynamic verification information of the master device with the first dynamic verification information, and under the condition that the dynamic verification information of the master device is consistent with the first dynamic verification information, determining that the master device is registered in the target slave device, and determining that the target slave device passes the authentication of the master device.
The identity information of the master device stored by the target slave device may be identity information of one master device, or may be identity information of a plurality of master devices, which is not limited herein. Comparing the dynamic verification information of the main equipment with the first dynamic verification information under the condition of storing the identity information of the main equipment; and comparing the dynamic verification information of the plurality of main devices with the first dynamic verification information one by one under the condition of storing the identity information of the plurality of main devices.
With continued reference to fig. 5, in step S503, second dynamic verification information is generated based on the identity information of the target slave device, and an authentication request carrying the second dynamic verification information is sent to the master device.
And the second dynamic verification information is used for the master device to authenticate the target slave device.
Identity information of the target slave device, i.e., information uniquely identifying the target slave device; such as: identification of the target slave device, address of the target slave device, etc., without limitation. The identity information of the target slave device may adopt one-dimensional identity information, and may also adopt multiple-dimensional identity information, which is not limited herein.
The second dynamic authentication information may be generated based on the identity information of one dimension of the target slave device, or may be generated based on the identity information of multiple dimensions of the target slave device, which is not limited herein. In one embodiment, the second dynamic verification information may be obtained by transforming identity information of the target slave device by using a hash function; such as: and transforming the identity information of the target slave device by using an addition hash function, a bit operation hash function, a multiplication hash function, a division hash function, a table lookup hash function or a hybrid hash function, which is not limited herein.
In one embodiment, the target slave device may determine whether the master device has been registered according to the first dynamic verification information, and in the case of the registered master device, determine that the target slave device has authenticated the master device; otherwise, the authentication is not passed.
With continued reference to fig. 5, in step S504, a capability call made by the master device in the case where the target slave device is authenticated is accepted.
After the bidirectional authentication, the target slave device receives the capability call of the master device and realizes resource sharing with the master device.
In one embodiment, if it is determined that the master device is not registered with the target slave device according to the first dynamic verification information, it is determined that the authentication of the master device is not passed.
Fig. 6 is a schematic implementation flow diagram of a communication method provided by the embodiment of the present disclosure, which may be executed by the master device 101, as shown in fig. 6, the method includes the following steps S601 to S603:
step S601, broadcasting a first registration request, wherein the first registration request carries first identity information, and the first identity information is generated by the main equipment based on the identity information of the main equipment;
step S602, receiving a second registration request sent by a target slave device in response to the first registration request under the condition that the target slave device determines that the master device is not registered according to the first identity information;
step S603, initiating a registration procedure to the target slave device to register the target slave device when a preset registration condition is satisfied.
In the communication method, the master device seeks registration with the target slave device by broadcasting a first registration request carrying first identity information; initiating a registration process to the target slave equipment and registering with the target slave equipment under the condition that a second registration request sent by the target slave equipment is received and a preset registration condition is met; in this way, the master device can register with the target slave device in time.
Each step in fig. 6 is explained in detail below.
Referring to fig. 6, in step S601, a first registration request is broadcast, where the first registration request carries first identity information, and the first identity information is generated by the primary device based on identity information of the primary device.
The first registration request may be a periodic broadcast, a cyclic broadcast, or a monitoring of the slave device, and the broadcast is performed after the slave device is on-line, which is not limited herein. Here, the number of slave devices may be one or more, and is not limited herein.
Identity information of the master device, i.e., information uniquely identifying the master device; such as: the identity of the master device, the address of the master device, etc., without limitation. The first identity information may be generated based on identity information of one dimension of the host device, or may be generated based on identity information of multiple dimensions of the host device, which is not limited herein.
And broadcasting the first registration request, and thus, after the slave equipment is on line, determining whether the master equipment is registered or not according to the first identity information carried by the first registration request.
With continued reference to fig. 6, in step S602, a second registration request sent by the target slave device in response to the first registration request if it is determined that the master device is not registered according to the first identity information is received.
The target slave device may be understood as a slave device not registered with the master device. In one embodiment, sending the second registration request according to the first identity information may be implemented by: firstly, determining whether a main device is registered according to first identity information; second, in case the master device is not registered, a second registration request is transmitted to the master device to register the master device.
With continuing reference to fig. 6, in step S603, in case that a preset registration condition is satisfied, a registration procedure is initiated to the target slave device to register the target slave device.
The preset registration condition represents a registration requirement; if the preset registration condition is met, a registration process can be initiated for registration; in one embodiment, the preset registration condition may be a confirmation registration instruction input by the user at the host device; in an embodiment, the preset registration condition may be that a registration confirmation instruction of the user is not received within a preset time length after the second registration request is received; and are not limited herein.
In an implementation manner, the interaction of the identity information of the device in the registration process may be implemented by using an ECDHE key exchange algorithm to ensure session security, fig. 7 is a schematic implementation flow diagram of a communication method provided by an embodiment of the present disclosure, and as shown in fig. 7, the step S602 includes the following steps S701 to S705:
step S701, generating a first public key and a first private key based on preset key parameters, and sending the first public key to the target slave device, so that the target slave device determines a shared key according to the first public key and the second private key, and encrypts identity information of the target slave device by using the shared key to obtain encrypted identity information of the target slave device.
The preset key parameter may be an elliptic curve in an ECDHE key exchange algorithm and a base point G on the elliptic curve; the preset key parameters of the master device and the target slave device are the same; in one embodiment, the master device may negotiate with the target slave device to determine the preset key parameter; further, the master device and the target slave device disclose respective default key parameters, and negotiate to determine preset key parameters among the common default key parameters.
In one embodiment, the master device may send the preset key parameter directly to the target slave device; further, the target slave device discloses the default key parameters of the target slave device, the master device determines the common key parameters according to the default key parameters of the target slave device, and directly determines the preset key parameters from the common key parameters to send to the target slave device.
The preset key parameter may be determined by negotiation before the first public key is sent, or may be sent along with the first public key when the first public key is sent, which is not limited herein. Under the condition that the preset key parameter is determined by negotiation before the first public key is sent, the preset key parameter may be sent or may not be sent when the first public key is sent.
Under the condition of performing key exchange by using an ECDHE key exchange algorithm, the generation of the second public key and the second private key and the determination of the shared key only follow the ECDHE key exchange algorithm, which is not described herein.
Step S702, receiving the encrypted target slave device identity information and the second public key sent by the target slave device.
The second public key may be generated by the target slave device according to the preset key parameter by using a CDHE key exchange algorithm.
Step S703, determining a shared secret key according to the first private key and the second public key, decrypting the encrypted target slave device identity information by using the shared secret key to obtain the identity information of the target slave device, and registering the identity information of the target slave device.
Because the elliptic curve meets the multiplication exchange combination law, the first private key and the second public key, and the first public key and the second private key can determine the shared key.
Identity information of the target slave device, i.e., information uniquely identifying the target slave device; such as: identification of the target slave device, address of the target slave device, etc., without limitation. The identity information of the target slave device may adopt one-dimensional identity information or may adopt multiple-dimensional identity information, which is not limited herein.
The foregoing steps S701 to S703 are completed when the master device has registered the target slave device; that is, the master device has stored identity information for the target slave device.
Step S704, encrypt the identity information of the master device with the shared key to obtain encrypted master device identity information, and send the encrypted master device identity information to the target slave device.
Identity information of the master device, i.e., information uniquely identifying the master device; such as: the identity of the master device, the address of the master device, etc., without limitation.
The identity information of the master device may adopt one-dimensional identity information or may adopt multiple-dimensional identity information, which is not limited herein.
Step S705, receiving registration feedback sent by the target slave device based on the encrypted master device identity information.
And the target slave equipment sends registration feedback to the master equipment so that the master equipment can learn the registration completion condition in time.
Fig. 8 is a schematic implementation flow diagram of a communication method provided by an embodiment of the present disclosure, which may be executed by a target slave device, where the target slave device is any one of the first slave device 102 and the second slave device 103, as shown in fig. 8, the method includes the following steps S801 and S802:
step 801, if it is determined that the target slave device is not registered with the master device according to first identity information carried by a first registration request broadcast by the master device, responding to the first registration request, and sending a second registration request to the master device; the first identity information is generated by the main equipment based on the identity information of the main equipment;
step S802, executing a registration procedure initiated by the master device when a preset registration condition is satisfied, so as to register the master device.
In the communication method, the target slave device sends a second registration request to the master device to request for registering the master device in response to the first registration request under the condition that the target slave device determines that the master device is not registered according to first identity information carried by the first registration request broadcast by the master device; after a registration process initiated by the main equipment under the condition of meeting a preset registration condition is received, registering with the main equipment; in this way, the target slave device can register with the master device in time.
Each step in fig. 6 is explained in detail below.
Referring to fig. 8, in step S801, if it is determined that the target slave device is not registered with the master device according to the first identity information carried in the first registration request broadcast by the master device, a second registration request is sent to the master device in response to the first registration request.
Wherein the first identity information is generated by the master device based on the identity information of the master device.
The target slave device does not register with the master device, and it can be understood that the target slave device does not store the identity information of the master device; in one embodiment, whether to register the master device may be determined according to a source address of the first registration request; the source address of the first registration request may be a source MAC address of the first registration request, or may be a source IP address of the first registration request, which is not limited herein.
With continued reference to fig. 8, in step S802, a registration procedure initiated by the master device when a preset registration condition is satisfied is performed to register the master device.
The preset registration condition represents a registration requirement; if the preset registration condition is met, a registration process can be initiated for registration; in one embodiment, the preset registration condition may be a confirmation registration instruction input by the user at the host device; in an embodiment, the preset registration condition may be that a registration confirmation instruction of the user is not received within a preset time length after the second registration request is received; and are not limited herein.
In an implementation manner, the interaction of the identity information of the device in the registration process may be implemented by using an ECDHE key exchange algorithm to ensure session security, fig. 9 is a schematic diagram of an implementation process of a communication method provided by an embodiment of the present disclosure, as shown in fig. 9, the step S803 includes the following steps S901 to S905:
step S901, receiving a first public key sent by a master device.
Wherein the first public key may be generated by the master device based on a preset key parameter.
Step S902, generating a second public key and a second private key based on the preset key parameter, and determining a shared key according to the first public key and the second private key.
The preset key parameters are not described herein; in the case of performing key exchange by using an ECDHE key exchange algorithm, the generation of the second public key and the second private key and the determination of the shared key may follow the ECDHE key exchange algorithm, which is not described herein.
Step S903, encrypting the identity information of the target slave equipment by using the shared secret key to obtain encrypted target slave equipment identity information, sending the encrypted target slave equipment identity information and the second public key to the master equipment, enabling the master equipment to determine the shared secret key according to the first private key and the second public key, decrypting the encrypted target slave equipment identity information by using the shared secret key to obtain target slave equipment identity information, and registering the target slave equipment identity information.
Identity information of the target slave device, i.e., information uniquely identifying the target slave device; such as: identification of the target slave device, address of the target slave device, etc., without limitation. The identity information of the target slave device may adopt one-dimensional identity information or may adopt multiple-dimensional identity information, which is not limited herein.
Step S904, receiving the encrypted master device identity information sent by the master device, and decrypting the encrypted master device identity information by using the shared key to obtain the identity information of the master device.
Because the elliptic curve meets the multiplication exchange combination law, the first private key and the second public key, and the first public key and the second private key can determine the shared key.
Step S905, registering the identity information of the main equipment and sending registration feedback to the main equipment.
And the target slave equipment sends registration feedback to the master equipment so that the master equipment can learn the registration completion condition in time.
Exemplary embodiments of the present disclosure also provide a communication device 1000. The communication device is applied to a main device of cooperative communication; referring to fig. 10, the communication device 1000 may include:
a capability invocation request sending module 1001 configured to generate first dynamic verification information based on the identity information of the master device, and send a capability invocation request carrying the first dynamic verification information to the target slave device; the first dynamic verification information is used for the target slave device to authenticate the master device;
the authentication request receiving module 1002 is configured to receive an authentication request carrying second dynamic verification information, which is sent by a target slave device according to a capability calling request when the target slave device passes authentication of the master device; the second dynamic verification information is generated by the target slave device based on the identity information of the target slave device;
and the target slave device authentication module 1003 is configured to determine that the target slave device is authenticated and make a capability call to the target slave device if the target slave device is determined to be registered in the master device according to the second dynamic verification information.
In one embodiment, the identity information of the master device includes an identifier of the master device and a MAC address of the master device, and the generating of the first dynamic verification information based on the identity information of the master device includes: generating a first random number; and generating a first hash value based on the first random number, the identifier of the main device and the MAC address of the main device, and taking the first random number and the first hash value as first dynamic verification information.
In one embodiment, the second dynamic verification information includes a second random number and a second hash value, and if it is determined that the target slave device is registered in the master device according to the second dynamic verification information, it is determined that the target slave device is authenticated, the method includes: determining candidate slave devices from the registered slave devices according to the source address of the authentication request; determining a third hash value of the candidate slave equipment according to the second random number and the identity information of the candidate slave equipment; and if the third hash value is the same as the second hash value, determining the candidate slave device as the target slave device, and determining that the master device is registered with the target slave device.
Exemplary embodiments of the present disclosure also provide a communication device 1100. The communication device is applied to target slave equipment of cooperative communication; referring to fig. 11, the communication apparatus 1100 may include:
a capability calling request receiving module 1101 configured to receive a capability calling request carrying first dynamic verification information sent by a master device; the first dynamic verification information is generated by the main equipment based on the identity information of the main equipment;
a master device authentication module 1102 configured to determine that the master device is authenticated if it is determined that the master device is registered in the target slave device according to the first dynamic verification information;
an authentication request sending module 1103 configured to generate second dynamic verification information based on the identity information of the target slave device, and send an authentication request carrying the second dynamic verification information to the master device; the second dynamic verification information is used for the master device to authenticate the target slave device;
a capability call acceptance module 1104 configured to accept a capability call made by the master device in a case where the target slave device is authenticated.
An exemplary embodiment of the present disclosure also provides a communication apparatus 1200. The communication device is applied to a main device of cooperative communication; referring to fig. 12, the communication apparatus 1200 may include:
a first registration request broadcasting module 1201 configured to broadcast a first registration request, where the first registration request carries first identity information, and the first identity information is generated by the host device based on identity information of the host device;
a second registration request receiving module 1202 configured to receive a second registration request transmitted by a target slave device in response to the first registration request in a case where it is determined that the master device is not registered according to the first identity information;
a registration procedure initiating module 1203, configured to initiate a registration procedure to the target slave device to register the target slave device if a preset registration condition is met.
In one embodiment, initiating a registration procedure with a target slave device includes: generating a first public key and a first private key based on preset key parameters, sending the first public key to the target slave equipment, enabling the target slave equipment to determine a shared key according to the first public key and the second private key, and encrypting the identity information of the target slave equipment by adopting the shared key to obtain encrypted identity information of the target slave equipment; receiving encrypted target slave equipment identity information and a second public key sent by the target slave equipment; determining a shared key according to the first private key and the second public key, decrypting the encrypted target slave equipment identity information by adopting the shared key to obtain the identity information of the target slave equipment, and registering the identity information of the target slave equipment; encrypting the identity information of the master equipment by adopting a shared secret key to obtain encrypted master equipment identity information, and sending the encrypted master equipment identity information to target slave equipment; and receiving registration feedback sent by the target slave device based on the encrypted master device identity information.
The exemplary embodiments of the present disclosure also provide a communication device 1300. The communication device is applied to target slave equipment of cooperative communication; referring to fig. 13, the communication apparatus 1300 may include:
a second registration request sending module 1301, configured to, if it is determined that the target slave device is not registered with the master device according to the first identity information carried in the first registration request broadcast by the master device, send a second registration request to the master device in response to the first registration request; the first identity information is generated by the main equipment based on the identity information of the main equipment;
a registration procedure receiving module 1302, configured to execute a registration procedure initiated by the master device when a preset registration condition is met, so as to register the master device.
In one embodiment, receiving a registration procedure initiated by a master device includes: receiving a first public key sent by a main device; generating a second public key and a second private key based on preset key parameters, and determining a shared key according to the first public key and the second private key; encrypting the identity information of the target slave equipment by using a shared key to obtain encrypted target slave equipment identity information, sending the encrypted target slave equipment identity information and a second public key to the master equipment, enabling the master equipment to determine the shared key according to the first private key and the second public key, decrypting the encrypted target slave equipment identity information by using the shared key to obtain target slave equipment identity information, and registering the target slave equipment identity information; receiving encrypted main equipment identity information sent by main equipment, and decrypting the encrypted main equipment identity information by adopting a shared key to obtain the identity information of the main equipment; and registering the identity information of the main equipment and sending registration feedback to the main equipment.
Exemplary embodiments of the present disclosure also provide a computer-readable storage medium, which may be implemented in the form of a program product, including program code for causing an electronic device to perform the steps according to various exemplary embodiments of the present disclosure described in the above-mentioned "exemplary method" section of this specification, when the program product is run on the electronic device. In an alternative embodiment, the program product may be embodied as a portable compact disc read only memory (CD-ROM) and include program code, and may be run on an electronic device, such as a personal computer. However, the program product of the present disclosure is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Exemplary embodiments of the present disclosure also provide an electronic device, which may be, for example, the PON management monitoring system 101 and the OLT102 described above. The electronic device may include a processor and a memory. The memory stores executable instructions of the processor, such as may be program code. The processor executes the executable instructions to perform the bandwidth allocation method of the passive optical network in the exemplary embodiment, such as may perform the method steps of fig. 2.
Referring now to FIG. 14, an electronic device in the form of a general purpose computing device is illustrated. It should be understood that the electronic device 1400 shown in fig. 14 is only one example and should not limit the scope of use or the functionality of embodiments of the present disclosure.
As shown in fig. 14, the electronic device 1400 may include: a processor 1410, a memory 1420, a bus 1430, an I/O (input/output) interface 1440, a network adapter 1450.
The memory 1420 may include volatile memory, such as RAM1421, cache memory unit 1422, and non-volatile memory, such as ROM1423. Memory 1420 can also include one or more program modules 1424, such program modules 1424 include, but are not limited to: an operating system, one or more application programs, other program modules, and program data, each of which or some combination thereof may comprise an implementation of a network environment. For example, the program modules 1424 may include the modules of the bandwidth allocation apparatus 900 of the passive optical network described above.
The bus 1430 is used to enable connections between the various components of the electronic device 1400, and may include a data bus, an address bus, and a control bus.
Electronic device 1400 can communicate with one or more external devices 1100 (e.g., keyboard, mouse, external controller, etc.) through I/O interface 1440.
The electronic device 1400 may communicate with one or more networks through the network adapter 1450, for example, the network adapter 1450 may provide mobile communication solutions such as 3G/4G/5G, or wireless communication solutions such as wireless local area network, bluetooth, near field communication, etc. The network adapter 1450 may communicate with other modules of the electronic device 1400 via the bus 1430.
Although not shown in fig. 14, other hardware and/or software modules may also be provided in the electronic device 1400, including but not limited to: displays, microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functions of two or more modules or units described above may be embodied in one module or unit, according to exemplary embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
As will be appreciated by one skilled in the art, aspects of the present disclosure may be embodied as a system, method or program product. Accordingly, various aspects of the present disclosure may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system. Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice in the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is to be limited only by the following claims.

Claims (14)

1. A communication method applied to a master device of cooperative communication is characterized by comprising the following steps:
generating first dynamic verification information based on the identity information of the master device, and sending a capability calling request carrying the first dynamic verification information to a target slave device; the first dynamic verification information is used for the target slave device to authenticate the master device;
receiving an authentication request which is sent by the target slave device according to the capability calling request and carries second dynamic verification information under the condition that the target slave device passes the authentication of the master device; the second dynamic verification information is generated by the target slave device based on identity information of the target slave device;
and if the target slave equipment is determined to be registered in the master equipment according to the second dynamic verification information, determining that the target slave equipment passes the authentication, and performing capacity calling on the target slave equipment.
2. The communication method according to claim 1, wherein the identity information of the master device includes an identifier of the master device and a MAC address of the master device, and the generating first dynamic authentication information based on the identity information of the master device includes:
generating a first random number;
and generating a first hash value based on the first random number, the identifier of the main device and the MAC address of the main device, and using the first random number and the first hash value as the first dynamic verification information.
3. The communication method according to claim 1, wherein the second dynamic verification information includes a second random number and a second hash value, and the determining that the target slave device is authenticated if it is determined that the target slave device is registered in the master device according to the second dynamic verification information includes:
determining candidate slave devices from the registered slave devices according to the source address of the authentication request;
determining a third hash value of the candidate slave equipment according to the second random number and the identity information of the candidate slave equipment;
and if the third hash value is the same as the second hash value, determining the candidate slave device as the target slave device, and determining that the master device has registered the target slave device.
4. A communication method applied to a target slave device of cooperative communication is characterized by comprising the following steps:
receiving a capability calling request which is sent by a main device and carries first dynamic verification information; the first dynamic verification information is generated by the master device based on identity information of the master device;
if the master device is determined to be registered in the target slave device according to the first dynamic verification information, determining that the master device passes the authentication;
generating second dynamic verification information based on the identity information of the target slave equipment, and sending an authentication request carrying the second dynamic verification information to the master equipment; the second dynamic verification information is used for the master device to authenticate the target slave device;
and accepting the capability call of the master device under the condition that the target slave device is authenticated.
5. A communication method is applied to a master device of cooperative communication, and is characterized by comprising the following steps:
broadcasting a first registration request, wherein the first registration request carries first identity information, and the first identity information is generated by the main equipment based on the identity information of the main equipment;
receiving a second registration request sent by a target slave device in response to the first registration request under the condition that the master device is determined not to be registered according to the first identity information;
and initiating a registration process to the target slave equipment to register the target slave equipment under the condition that a preset registration condition is met.
6. The communication method according to claim 5, wherein the initiating a registration procedure with the target slave device comprises:
generating a first public key and a first private key based on preset key parameters, sending the first public key to the target slave equipment, enabling the target slave equipment to determine a shared key according to the first public key and a second private key, and encrypting identity information of the target slave equipment by adopting the shared key to obtain encrypted identity information of the target slave equipment;
receiving the encrypted target slave device identity information and a second public key sent by the target slave device;
determining the shared key according to the first private key and the second public key, decrypting the encrypted target slave equipment identity information by adopting the shared key to obtain the identity information of the target slave equipment, and registering the identity information of the target slave equipment;
encrypting the identity information of the master equipment by adopting the shared secret key to obtain encrypted master equipment identity information, and sending the encrypted master equipment identity information to the target slave equipment;
and receiving registration feedback sent by the target slave device based on the encrypted master device identity information.
7. A communication method applied to a target slave device of cooperative communication is characterized by comprising the following steps:
if the target slave equipment is determined not to register the main equipment according to first identity information carried by a first registration request broadcast by the main equipment, responding to the first registration request and sending a second registration request to the main equipment; the first identity information is generated by the main device based on identity information of the main device;
and executing a registration process initiated by the main equipment under the condition of meeting a preset registration condition so as to register the main equipment.
8. The communication method according to claim 7, wherein the receiving the registration procedure initiated by the master device comprises:
receiving a first public key sent by the main equipment;
generating a second public key and a second private key based on preset key parameters, and determining a shared key according to the first public key and the second private key;
encrypting the identity information of the target slave equipment by using the shared secret key to obtain encrypted target slave equipment identity information, sending the encrypted target slave equipment identity information and the second public key to the master equipment, enabling the master equipment to determine a shared secret key according to a first private key and the second public key, decrypting the encrypted target slave equipment identity information by using the shared secret key to obtain the target slave equipment identity information, and registering the target slave equipment identity information;
receiving encrypted main equipment identity information sent by the main equipment, and decrypting the encrypted main equipment identity information by adopting the shared secret key to obtain the identity information of the main equipment;
and registering the identity information of the main equipment and sending registration feedback to the main equipment.
9. A communication apparatus applied to a master device in cooperative communication, comprising:
the system comprises a capability calling request sending module, a capability calling request sending module and a capability calling request sending module, wherein the capability calling request sending module is configured to generate first dynamic verification information based on identity information of the master device and send a capability calling request carrying the first dynamic verification information to a target slave device; the first dynamic verification information is used for the target slave device to authenticate the master device;
the authentication request receiving module is configured to receive an authentication request which is sent by the target slave device according to the capability calling request and carries second dynamic verification information under the condition that the target slave device passes the authentication of the master device; the second dynamic verification information is generated by the target slave device based on identity information of the target slave device;
and the target slave equipment authentication module is configured to determine that the target slave equipment is authenticated and perform capability calling on the target slave equipment if the target slave equipment is determined to be registered in the master equipment according to the second dynamic verification information.
10. A communication apparatus, applied to a target slave device of cooperative communication, comprising:
the system comprises a capability calling request receiving module, a first dynamic verification information sending module and a second dynamic verification information sending module, wherein the capability calling request receiving module is configured to receive a capability calling request which is sent by a main device and carries first dynamic verification information; the first dynamic verification information is generated by the master device based on identity information of the master device;
a master device authentication module configured to determine that the master device is authenticated if it is determined that the master device is registered in the target slave device according to the first dynamic verification information;
the authentication request sending module is configured to generate second dynamic verification information based on the identity information of the target slave device and send an authentication request carrying the second dynamic verification information to the master device; the second dynamic verification information is used for the master device to authenticate the target slave device;
a capability call accepting module configured to accept a capability call made by the master device in a case where the target slave device is authenticated.
11. A communication apparatus applied to a master device in cooperative communication, comprising:
a first registration request broadcasting module configured to broadcast a first registration request, where the first registration request carries first identity information, and the first identity information is generated by the main device based on identity information of the main device;
a second registration request receiving module configured to receive a second registration request transmitted by the target slave device according to the first identity information;
and the registration process initiating module is configured to initiate a registration process to the target slave device to register with the target slave device under the condition that a preset registration condition is met.
12. A communication apparatus, applied to a target slave device of cooperative communication, comprising:
the second registration request sending module is configured to respond to a first registration request and send a second registration request to the main device if the target slave device is determined not to be registered with the main device according to first identity information carried by the first registration request broadcast by the main device; the first identity information is generated by the main device based on identity information of the main device;
and the registration flow receiving module is configured to receive a registration flow initiated by the main device under the condition that a preset registration condition is met, and register with the main device.
13. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 1 to 8.
14. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any of claims 1 to 8 via execution of the executable instructions.
CN202210880437.3A 2022-07-25 2022-07-25 Communication method, communication device, storage medium, and electronic apparatus Active CN115277176B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210880437.3A CN115277176B (en) 2022-07-25 2022-07-25 Communication method, communication device, storage medium, and electronic apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210880437.3A CN115277176B (en) 2022-07-25 2022-07-25 Communication method, communication device, storage medium, and electronic apparatus

Publications (2)

Publication Number Publication Date
CN115277176A true CN115277176A (en) 2022-11-01
CN115277176B CN115277176B (en) 2024-04-05

Family

ID=83769445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210880437.3A Active CN115277176B (en) 2022-07-25 2022-07-25 Communication method, communication device, storage medium, and electronic apparatus

Country Status (1)

Country Link
CN (1) CN115277176B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1523820A (en) * 2003-02-19 2004-08-25 联想(北京)有限公司 Coordinate working method for multiple control equipment in home network based on peer connection
CN101060613A (en) * 2006-04-21 2007-10-24 华为技术有限公司 Digital TV broadcasting service receiving and deciphering method, master terminal and its slave terminal
CN102065378A (en) * 2009-11-13 2011-05-18 索尼公司 Wireless communication device, wireless communication system, program and wireless communication method
CN104581715A (en) * 2014-11-22 2015-04-29 杭州木梢科技有限公司 Sensing system key protecting method in field of Internet of things and wireless access equipment
CN106789273A (en) * 2016-12-27 2017-05-31 上海斐讯数据通信技术有限公司 A kind of router automatically configures network-building method and system
WO2019170026A1 (en) * 2018-03-09 2019-09-12 山东量子科学技术研究院有限公司 Wearable device-based identity authentication method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1523820A (en) * 2003-02-19 2004-08-25 联想(北京)有限公司 Coordinate working method for multiple control equipment in home network based on peer connection
CN101060613A (en) * 2006-04-21 2007-10-24 华为技术有限公司 Digital TV broadcasting service receiving and deciphering method, master terminal and its slave terminal
CN102065378A (en) * 2009-11-13 2011-05-18 索尼公司 Wireless communication device, wireless communication system, program and wireless communication method
CN104581715A (en) * 2014-11-22 2015-04-29 杭州木梢科技有限公司 Sensing system key protecting method in field of Internet of things and wireless access equipment
CN106789273A (en) * 2016-12-27 2017-05-31 上海斐讯数据通信技术有限公司 A kind of router automatically configures network-building method and system
WO2019170026A1 (en) * 2018-03-09 2019-09-12 山东量子科学技术研究院有限公司 Wearable device-based identity authentication method and system

Also Published As

Publication number Publication date
CN115277176B (en) 2024-04-05

Similar Documents

Publication Publication Date Title
EP3916604B1 (en) Method and apparatus for processing privacy data of block chain, device, storage medium and computer program product
WO2019120091A1 (en) Identity authentication method and system, and computing device
JP7069286B2 (en) Privacy data processing methods, privacy data processing devices, devices and media
CN107708099B (en) Bluetooth device sharing request and control method and device, and readable storage medium
CN111131416B (en) Service providing method and device, storage medium and electronic device
CN112632521A (en) Request response method and device, electronic equipment and storage medium
KR101952329B1 (en) Method for generating address information used in transaction of cryptocurrency based on blockchain, electronic apparatus and computer readable recording medium
WO2022111016A1 (en) Mobile network access system and method, and storage medium, and electronic device
CN113489706A (en) Data processing method, device, system, equipment and storage medium
CN112565236A (en) Information authentication method, device, computer equipment and storage medium
CN115277176B (en) Communication method, communication device, storage medium, and electronic apparatus
CN114760602B (en) Holographic communication method, device, system and computer readable storage medium
CN116488873A (en) Information transmission method, apparatus, computer device and storage medium
US20220174490A1 (en) System, method, storage medium and equipment for mobile network access
CN109379378A (en) Sending method, device, server, system and the storage medium of internet short message
CN112994882B (en) Authentication method, device, medium and equipment based on block chain
US20150295917A1 (en) Identity protocol translation gateway
US8572383B2 (en) Key exchange device, key exchange processing system, key exchange method, and program
CN114650182A (en) Identity authentication method, system, device, gateway equipment, equipment and terminal
CN114039723A (en) Method and device for generating shared key, electronic equipment and storage medium
CN113452513A (en) Key distribution method, device and system
KR20190111748A (en) Method for generating address information used in transaction of cryptocurrency based on blockchain, electronic apparatus and computer readable recording medium
US12028315B2 (en) Methods, devices, and computer program products for authenticating peripheral device
US20230127607A1 (en) Methods, devices, and computer program products for authenticating peripheral device
CN116743377B (en) Data processing method, device, equipment and storage medium based on blockchain key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant