CN115606212A - Method and apparatus for device discovery - Google Patents

Method and apparatus for device discovery Download PDF

Info

Publication number
CN115606212A
CN115606212A CN202080100978.9A CN202080100978A CN115606212A CN 115606212 A CN115606212 A CN 115606212A CN 202080100978 A CN202080100978 A CN 202080100978A CN 115606212 A CN115606212 A CN 115606212A
Authority
CN
China
Prior art keywords
data
protocol
information
specific
application protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202080100978.9A
Other languages
Chinese (zh)
Inventor
罗朝明
茹昭
吕小强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202310139051.1A priority Critical patent/CN116208950A/en
Publication of CN115606212A publication Critical patent/CN115606212A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides a method and equipment for equipment discovery, wherein the method comprises the following steps: the method comprises the steps that first equipment encrypts first data through a first secret key to obtain first verification information, wherein the first secret key is one of a pair of secret keys corresponding to a first application protocol; the first device sends first information to a second device, wherein the first information comprises first verification information, and the first verification information is used for the second device to determine whether the first device uses the first application protocol.

Description

Method and device for device discovery Technical Field
The present embodiments relate to the field of communications, and in particular, to a method and device for device discovery.
Background
In some scenarios, an electronic device wants to establish a connection with another device supporting a certain application protocol or a certain function, and in a specific implementation, peripheral devices supporting the function are known in a device discovery manner, and further, the devices establishing the connection can be selected to establish the connection.
The identification of the devices of the same manufacturer to the same application protocol is uniform, and the ambiguity of understanding between the devices can not be caused. However, in the case of cross-vendor device interconnection, there may be a problem that devices of different vendors do not agree on the same identity identification, and thus how to determine whether a device uses a certain application protocol is a problem to be solved continuously.
Disclosure of Invention
The embodiment of the application provides a method and equipment for equipment discovery, which can verify whether the equipment uses a specific application protocol or not, so that the problem of unavailability after access can be avoided.
In a first aspect, a method for device discovery is provided, the method including: the method comprises the steps that first equipment encrypts first data through a first secret key to obtain first verification information, wherein the first secret key is one of a pair of secret keys corresponding to a first application protocol;
the first device sends first information to a second device, wherein the first information comprises the first verification information, and the first verification information is used for the second device to determine whether the first device uses the first application protocol.
In a second aspect, a method for device discovery is provided, the method comprising: the first equipment processes the first data through a first algorithm to obtain first verification information; the first device sends first information to a second device, wherein the first information comprises first verification information, and the first verification information is used for the second device to determine whether the first device uses a first application protocol.
In a third aspect, a method for device discovery is provided, the method comprising: the method comprises the steps that a second device receives first information sent by a first device, wherein the first information comprises first verification information, and the first verification information is obtained by encrypting first data through a first secret key; decrypting the first verification information through a second key to obtain second data, wherein the first key and the second key are a pair of keys corresponding to a first application protocol; acquiring the first data; and determining whether the first device uses the first application protocol according to whether the first data and the second data are consistent.
In a fourth aspect, a method for device discovery is provided, the method comprising: the method comprises the steps that a second device receives first information sent by a first device, wherein the first information comprises first verification information, and the first verification information is obtained by processing first data through a first algorithm; acquiring the first data;
processing the first data through the first algorithm to obtain second verification information; and determining whether the first device uses the first application protocol according to whether the first verification information and the second verification information are consistent.
In a fifth aspect, a device for device discovery is provided, configured to perform the method in the first aspect or each implementation manner thereof.
In particular, the apparatus comprises functional modules for performing the methods in the first to second aspects or implementations thereof described above.
In a sixth aspect, a device for device discovery is provided, configured to perform the method of the second aspect or its implementations.
In particular, the apparatus comprises functional modules for performing the methods in the third to fourth aspects or implementations thereof described above.
In a seventh aspect, a device for device discovery is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory to execute the method in the first to fourth aspects or the implementation manners thereof.
In an eighth aspect, a chip is provided for implementing the method in any one of the first to fourth aspects or implementations thereof. Specifically, the chip includes: a processor configured to call and run the computer program from the memory, so that the device on which the chip is installed performs the method in any one of the first to fourth aspects or the implementation manners thereof.
In a ninth aspect, a computer-readable storage medium is provided for storing a computer program, the computer program causing a computer to perform the method of any one of the first to fourth aspects or implementations thereof.
A tenth aspect provides a computer program product comprising computer program instructions to cause a computer to perform the method of any one of the first to fourth aspects or implementations thereof.
In an eleventh aspect, there is provided a computer program which, when run on a computer, causes the computer to perform the method of any one of the first to fourth aspects or implementations thereof.
Based on the technical solution in the first aspect, the data can be encrypted and decrypted between the devices through a pair of keys corresponding to the first application protocol to verify whether the devices support a specific application protocol, and since the pair of keys corresponding to the first application protocol has a constraint relationship, the verification through the pair of keys is beneficial to avoiding the problem that the devices cannot be used after access due to misjudgment.
Drawings
Fig. 1 is a schematic flow chart of a method for device discovery provided in accordance with the present application.
Fig. 2-4 are overall flow diagrams of methods for device discovery according to embodiments of the present application.
Fig. 5 is a schematic flow chart of a method for device discovery according to another embodiment of the present application.
Fig. 6 is a schematic block diagram of a device for device discovery according to an embodiment of the present application.
Fig. 7 is a schematic block diagram of a device for device discovery according to another embodiment of the present application.
Fig. 8 is a schematic block diagram of a device for device discovery according to yet another embodiment of the present application.
Fig. 9 is a schematic block diagram of a device for device discovery according to yet another embodiment of the present application.
Fig. 10 is a schematic block diagram of a device for device discovery according to an embodiment of the present application.
Fig. 11 is a schematic block diagram of a chip provided according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art without making any creative effort with respect to the embodiments in the present application belong to the protection scope of the present application.
The identification of the devices of the same manufacturer to the same application protocol is uniform, and the ambiguity of understanding between the devices can not be caused. However, in the case of interconnection between devices of vendors, for example, the mobile phones of vendor a, the bluetooth bracelets of vendor B, C, D, the same application protocol P1 is used by vendor a, the application protocol P1 specifies that the additional Data in the vendor Specific Data (Manufacturer Specific Data) includes the identifier "ID1", the broadcast Data of the bracelet of vendor B, C includes the identifier "P1", and the mobile phone of vendor a can recognize the identifier "ID1" according to the specification of the protocol P1, so as to determine that the bracelet of vendor B, C uses the application protocol P1. However, if the D vendor uses the application protocol P2 unknown to the a vendor, the additional Data in the manual Specific Data of the broadcast Data of the bracelet of the D vendor may also have the identifier "ID1", which may cause the mobile phone of the a vendor to misinterpret the application protocol used by the bracelet of the D vendor as P1, and further cause the mobile phone of the a vendor to prompt the user that the bracelet of the D vendor has the function (for example, the configuration function specified by the application protocol P1), and cause the problem that the bracelet cannot be used in the subsequent use.
Fig. 1 is a schematic flow diagram of a method 100 for device discovery according to an embodiment of the present application, and as shown in fig. 1, the method 100 may include, but is not limited to, the following:
s101, encrypting first data through a first secret key by first equipment to obtain first verification information;
s102, the first device sends first information to a second device, wherein the first information comprises the first verification information;
s103, the second device decrypts the first verification information according to a second key, and determines whether the first device uses a first application protocol, wherein the first key and the second key are a pair of keys corresponding to the first application protocol.
In this embodiment, the first device is also called a peripheral device, a slave device, the second device is also called a master device, and the like. The second device wants to find a device supporting a first application protocol or a first function, wherein the first application protocol defines an attribute type and a usage manner of the first function.
Optionally, in some embodiments, the first device may be, for example, a wearable device, which may also be referred to as a wearable smart device, and is a generic term for intelligently designing daily wearing using wearable technology, developing wearable devices, such as glasses, gloves, watches, clothes, and shoes. The wearable device may be worn directly on the body or may be a portable device integrated into the user's clothing or accessory. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device has full functions and large size, and can realize complete or partial functions without depending on a smart phone, for example: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
Alternatively, in some embodiments, the second device may be an electronic device, such as a Mobile Phone (Mobile Phone), a tablet (Pad), a computer with wireless transceiving function, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in self driving (self driving), a wireless terminal device in remote medical (remote medical), a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation safety (transportation safety), a wireless terminal device in city (smart city), or a wireless terminal device in smart home (smart home), and the like.
Optionally, in some embodiments, the first key and the second key may be a pair of asymmetric keys, that is, the first key and the second key are different, in which case, the first key is a first private key, the second key is a first public key, and the first public key and the first private key may be generated based on an asymmetric Algorithm, for example, a Digital Signature Algorithm (DSA), an RSA Algorithm, an Elliptic Curve Cryptography (ECC) Algorithm, or the like.
Alternatively, in some embodiments, the first key and the second key may be a pair of symmetric keys, that is, the first key and the second key are the same, in which case, the first key and the second key may be generated based on a symmetric algorithm, such as Advanced Encryption Standard (AES), data Encryption Standard (DES), or the like.
In the specific implementation, the data is encrypted and decrypted by the asymmetric key, so that the security is higher, the probability of misjudgment is low, and the encryption and decryption of the data by the key are easier to implement.
In the following, the first key and the second key are taken as a first public key and a first private key respectively for explanation, when symmetric key encryption is used, only the first public key and the first private key need to be replaced by the same key, and the application is not limited thereto.
Optionally, in some embodiments, all vendors using the first application protocol maintain the same pair of keys, which may be generated and issued to the vendors by the protocol formulator, for example.
Optionally, in another embodiment, each vendor using the first application protocol may also generate a pair of keys corresponding to the vendor, for example, the first private key K1 is maintained by the vendor, and the first public key K2 is issued in a specific public channel, so that when the second device needs to decrypt data, the first public key K2 corresponding to the vendor may be acquired from the specific public channel according to a vendor identifier in data sent by the first device, so as to implement decryption of the data.
It should be understood that, in this embodiment of the present application, the pair of keys corresponding to the first application protocol may be a pair of keys common to all vendors that use the first application protocol, or may also be a pair of keys corresponding to vendors of the first device among vendors that use the first application protocol, which is not limited in this application.
In some embodiments of the present application, a first device encrypts first data through a first private key K1 to obtain first verification information, and further the first device sends the first information to a second device, where the first information includes the first verification information, so that the second device that receives the first information may parse the first information to obtain the first verification information, and then decrypt the first verification information according to the first public key K2 to determine whether the first device uses the first application protocol.
Specifically, the second device may obtain first data, decrypt the first verification information by using a first public key K2 to obtain second data, and further determine whether the first device uses the first application protocol according to whether the first data and the second data are consistent. For example, if the first data and the second data are consistent, it is determined that the first device uses the first application protocol, or that the first device has the first function. For another example, if the first data and the second data are inconsistent, it is determined that the first device does not use the first application protocol, or the first device does not have the first function. Further, the second device may prompt a user that the first device has the first function, so that the user may trigger the second device to establish a connection with the first device to use the first function of the first device.
Alternatively, the first data may be specific data or hash digest data of the specific data, that is, the first data may be original data of the specific data, or data obtained by processing the specific data, and the processing may be, for example, hash digest algorithm processing.
In some embodiments, the specific data comprises at least one of:
a specific identifier, predefined data, at least part of the data in the first information.
As some examples, the particular identification includes at least one of:
the protocol name and the protocol version number of the first application protocol.
In some embodiments, if the specific data is specific identification or predefined data, the second device may know such data according to an appointment or from a public channel, in which case, the specific identification and predefined data may not be included in the first information.
In other embodiments, if the specific data is at least part of the data in the first information, the first verification information is generated according to the data in the first information. In this case, after receiving the first information, the second device may obtain the specific data from the first information, and if the first verification information is encrypted according to the specific data, that is, the first data is the same as the specific data, the second device may decrypt the first verification information to obtain second data, compare the first data with the second data to determine whether the two data are consistent, or if the first verification information is encrypted according to hash digest data of the specific data, that is, the first data is hash digest data of the specific data, the second device may decrypt the first verification information to obtain the second data, hash digest the specific data to obtain third data, and compare the third data with the second data to determine whether the two data are consistent.
Optionally, in this embodiment of the present application, the first information may be transmitted through a connection implemented by any protocol that supports interaction between devices.
As an example, the first information is broadcast data based on a Bluetooth Low Energy (BLE) protocol.
As yet another example, the first information is a Beacon Frame based on a Wireless Fidelity (WIFI, or WI-FI) protocol. For example, the first authentication information includes a Service Set Identifier (SSID) field and/or a vendor-defined field in the beacon frame.
It should be noted that, since the maximum length of the broadcast data (AdvData) and the scan response data (ScanRspData) in the broadcast packet of BLE is 31 bytes, accordingly, the length of the first authentication information generated after encryption is required to be not more than 31 bytes, the length of the specific data is implicitly required to be not more than 31 bytes, and an asymmetric algorithm in which the key length is not more than 31 bytes is used.
Similarly, if the SSID field of the beacon frame is used to carry the first authentication information, since the maximum length of the SSID field of the beacon frame is 32 bytes, it is correspondingly required that the length of the first authentication information generated after encryption does not exceed 32 bytes, it is implicitly required that the length of the specific data does not exceed 32 bytes, and an asymmetric algorithm with a key length not greater than 32 bytes is used.
Based on this, as another example, a first Generic Attribute protocol (GS 1) service may be defined, which is used to verify whether the first device uses the first application protocol, and may carry the first information through feature data of the GS 1.
Because the length of the feature data of the GS1 can be set to be longer, the feature data of the GS1 bears the first information, and the limit on the length of the first information is smaller, so that the encryption algorithm and the selection of specific data are more flexible.
In the embodiment of the present application, the generic attribute protocol is abbreviated as GATT protocol. The GATT protocol defines attribute types and specifies how to use, including a framework for data transfer and storage and some basic operations. One Profile may contain one or more services; a service may contain one or more characteristics; one property contains at least two attributes: one for declarations and the other for storing attribute values. The attribute includes, for example, a Universally Unique Identifier (UUID).
Optionally, in some embodiments, the first information may further include a first identifier, where the first identifier is used to indicate that the first device uses the first application protocol. The first identifier may be used by a second device to prejudge whether the first device uses the first application protocol. And in the case that the first information comprises the first identifier, the second device further judges according to the first verification information.
In some embodiments, the first identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
In the following, with reference to fig. 2 to fig. 4, a method for device discovery according to an embodiment of the present application is described by taking the first device as a smart band and the second device as a mobile phone as an example, but the embodiment of the present application is not limited thereto.
The first embodiment is as follows: based on BLE broadcast data bearing encrypted data identification equipment, first application protocol or first function is realized
As shown in fig. 2, the specific implementation process includes at least some of the following steps:
s21, the smart band encrypts data D1 by using a first private key K1 to obtain first verification information, and the first verification information is recorded as S1;
in some embodiments, the data D2 includes at least one of:
a specific identity, predefined data, at least part of the BLE broadcast data.
S22, the intelligent bracelet sets the S1 into BLE broadcast data, namely the BLE broadcast data comprise the S1;
optionally, in some embodiments, the smart band may further set a first identifier in BLE broadcast data at the same time, that is, the BLE broadcast data may include the first identifier and S1, where the first identifier is used by the mobile phone to preliminarily determine whether the smart band uses the first application protocol;
s23, broadcasting BEL broadcast data by the smart band;
s24, the mobile phone receives and analyzes BLE broadcast data sent by the smart band, and S1 in the BLE broadcast data is obtained;
optionally, if the first application protocol specifies that BLE broadcast data simultaneously includes the first identifier and S1, the mobile phone may check whether the BLE broadcast data includes the first identifier, thereby preliminarily determining whether the smart band uses the first application protocol, if so, performing step S25, otherwise, determining that the specific application protocol is not used.
S25, the first public key K2 of the mobile phone decrypts the S1 to obtain D2;
and S26, according to the fact that if the D2 is consistent with the known data D1, the intelligent bracelet is indicated to use the first application protocol, and otherwise, the first application protocol is not used.
Example two: the device for identifying the encrypted data carried by the beacon frame based on the WIFI protocol realizes a first application protocol or a first function
As shown in fig. 3, the specific implementation process includes at least some of the following steps:
s31, the smart band encrypts data D1 by using a first private key K1 to obtain first verification information, and the first verification information is marked as S1;
in some embodiments, the data D2 includes at least one of:
a specific identifier, predefined data, at least part of the data in the beacon frame.
S32, the smart band starts a wireless service access point (soft AP) realized by software, and S1 is set to an SSID (service set identifier) and/or a vendor-defined data field in a beacon frame;
optionally, in some embodiments, the smart band may further set a first identifier in a beacon frame at the same time, that is, the beacon frame may include the first identifier and S1, where the first identifier is used for the mobile phone to preliminarily determine whether the smart band uses the first application protocol;
s33, broadcasting a beacon frame by the smart band;
s34, the mobile phone receives and analyzes the beacon frame sent by the smart bracelet to obtain S1 in the beacon frame;
optionally, if the beacon frame specified by the first application protocol includes the first identifier and S1 at the same time, the mobile phone may check whether the beacon frame includes the first identifier, thereby preliminarily determining whether the smart band uses the first application protocol, if so, performing step S25, otherwise, determining that the specific application protocol is not used.
S35, the first public key K2 of the mobile phone decrypts the S1 to obtain D2;
and S36, if the D2 is consistent with the known data D1, indicating that the intelligent bracelet uses the first application protocol, otherwise, not using the first application protocol.
Optionally, if the hash digest data H1 of the data D1 used in S1 is encrypted, the mobile phone needs to decrypt S1 to obtain H2 when verifying the signature S1, and needs to perform hash digest calculation on D1 to obtain H3, and then the mobile phone compares H2 with H3, if the two are consistent, the verification is passed, otherwise, the verification fails.
Example three: defining a first generic attribute protocol, GATT, service, denoted GS1, for verifying whether the first device uses the first application protocol, and may carry the first information through feature data of GS 1.
As shown in fig. 4, the specific implementation process includes at least some of the following steps:
first, a first GATT service, denoted GS1, is defined for verifying whether a first device uses the first application protocol, where the first GATT service includes a first property (probabilistic) A1 for storing and transmitting encrypted first verification information S1, and optionally, may further include a second property A2 for storing and transmitting data D1.
Optionally, the UUID of the GS1 may be customized by the manufacturer of the device.
S41, the first equipment realizes the function of GS1 and sets the UUID of the GS1 to BLE broadcast data;
s42, broadcasting the BLE broadcasting data by the first equipment;
s43, the second equipment receives and analyzes BLE broadcast data of the first equipment, and obtains the UUID of the GS 1;
s44, the second device establishes GATT connection with the first device;
and S45, the second equipment acquires the service list of the first equipment, checks whether the service list contains the service of the UUID, judges that a specific application protocol is not used if the service list does not contain the service of the UUID, and executes the subsequent process if the service list contains the service of the UUID.
S46, the smart band encrypts data D1 by using a first private key K1 to obtain first verification information S1, and S1 is set as a part or all of characteristic values of A1;
optionally, the specific identifier, the predefined data, at least part of the characteristic value data of the first characteristic A1, at least part of the characteristic value data of the second characteristic A2, at least part of the BLE broadcast data transmitted by the first device.
S47, the second equipment acquires the characteristic value data of the first characteristic A1 in the UUID service;
and S48, the first equipment returns the characteristic value data of the first characteristic A1.
It should be understood that the characteristic value data of the first characteristic A1 may be generated before S47, or may also be generated after S47, which is not limited in this application.
S49, if the acquisition fails, determining that the first application protocol is not used by the first equipment; or alternatively
And S50, if the obtaining is successful, further obtaining S1 in the A1, and analyzing the S1 according to the first public key K2 to obtain D2.
S51, if the D2 is consistent with the known data D1, the fact that the intelligent bracelet uses the first application protocol is indicated, and otherwise, the first application protocol is not used.
Optionally, in the foregoing three embodiments, if the hash digest data H1 of the data D1 used in S1 is obtained by encrypting, the mobile phone needs to decrypt S1 to obtain H2 when verifying the signature S1, and needs to perform hash digest calculation on D1 to obtain H3, then the mobile phone compares H2 with H3, if the two are consistent, the verification is passed, otherwise, the verification fails.
Alternatively, in the three embodiments, a symmetric encryption algorithm (e.g., AES, DES, etc.) and a symmetric key (i.e., the keys K1 and K2 in the flow described above) may be used instead of the asymmetric encryption algorithm and the asymmetric key. The first device performs symmetric encryption calculation on the D1 by using a secret key K1 to obtain S1, decrypts the S1 by using K2 (equal to K1) during mobile phone verification to obtain data D2, if the D2 is the same as the D1, the verification is passed, and if the D2 is not the same as the D1, the verification fails.
Fig. 5 is a schematic flow diagram of a method 500 for device discovery according to another embodiment of the present application, as shown in fig. 5, the method 500 may include, but is not limited to, the following:
s510, the first equipment processes the first data through a first algorithm to obtain first verification information;
s520, the first device sends first information to a second device, wherein the first information comprises the first verification information;
s530, acquiring first data;
s540, processing the first data through the first algorithm to obtain second verification information;
s550, determining whether the first device uses the first application protocol according to whether the first verification information is consistent with the second verification information.
Optionally, in some embodiments, the first algorithm may be a hash digest algorithm, or may also be another processing algorithm, and the application is not limited thereto.
It should be understood that the method 500 is different from the foregoing embodiment 100 in that encryption and decryption of the first data by the key is replaced by processing the first data by the first algorithm, and other implementations are similar and will not be described herein again for brevity.
Optionally, in some embodiments, the first information is BLE broadcast data based on a bluetooth low energy BLE protocol.
Optionally, in some embodiments, the first data comprises at least one of:
a specific identity, predefined data, at least part of the BLE broadcast data.
Optionally, in some embodiments, the first information is a beacon frame based on WIFI protocol.
Optionally, in some embodiments, the first verification information comprises a service set identification SSID field and/or a vendor-defined field in the beacon frame.
Optionally, in some embodiments, the first data comprises at least one of:
a specific identifier, predefined data, at least part of the data in the beacon frame.
Optionally, in some embodiments, the specific identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the first information further includes a first identifier, where the first identifier is used to indicate that the first device uses the first application protocol.
Optionally, the first information is feature data of a first generic attribute protocol GATT service.
Optionally, in some embodiments, the first data comprises at least one of:
a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
Optionally, in some embodiments, the specific identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the method 500 further comprises:
the first device transmits BLE broadcast data to a second device, the BLE broadcast data including a universally unique identification code UUID of the first GATT service.
Optionally, in some embodiments, the first information is feature data of a first generic attribute protocol GATT service.
Optionally, in some embodiments, the first data comprises at least one of:
a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
Optionally, in some embodiments, the specific identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the method 500 further comprises:
and if the first data is failed to be acquired, determining that the first device does not use the first application protocol.
Optionally, in some embodiments, the method 500 further comprises:
the second device receives BLE broadcast data transmitted by the first device, wherein the BLE broadcast data comprises a universal unique identification code UUID of the first GATT service.
Optionally, in some embodiments, the method 500 further comprises: the twenty-eighth obtains a service list of the first device.
Optionally, in some embodiments, the determining whether the first device uses the first application protocol according to whether the first verification information and the second verification information are consistent includes:
and if the service list comprises the UUID of the first GATT service, determining whether the first equipment uses the first application protocol or not according to the consistency of the first verification information and the second verification information.
Optionally, in some embodiments, the method 500 further comprises:
if the service list does not include the UUID of the first GATT service, determining that the first device does not use the first application protocol.
Method embodiments of the present application are described in detail above with reference to fig. 1-5, and apparatus embodiments of the present application are described in detail below with reference to fig. 6-11, it being understood that apparatus embodiments correspond to method embodiments and that similar descriptions may be had with reference to method embodiments.
Fig. 6 shows a schematic block diagram of a device 600 for device discovery according to an embodiment of the present application. As shown in fig. 6, the apparatus 600 includes: the processing unit 610 is configured to encrypt first data by using a first key to obtain first verification information, where the first key is one of a pair of keys corresponding to a first application protocol;
a communication unit 620, configured to send first information to a second device, where the first information includes the first authentication information, and the first authentication information is used for the second device to determine whether the first device uses the first application protocol.
2. The device according to claim 1, wherein the first information is BLE broadcast data based on a Bluetooth Low Energy (BLE) protocol.
3. The apparatus of claim 2, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data comprises at least one of:
a specific identity, predefined data, at least part of the BLE broadcast data.
4. The device of claim 1, wherein the first information is a beacon frame based on a WIFI protocol.
5. The device of claim 4, wherein the first authentication information comprises a Service Set Identification (SSID) field and/or a vendor-defined field in the beacon frame.
6. The apparatus of claim 4 or 5, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data comprises at least one of the following:
a specific identifier, predefined data, at least part of the data in the beacon frame.
7. The apparatus according to claim 3 or 6, wherein the specific identifier comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
8. The device of any of claims 1-7, further comprising a first identifier in the first information, the first identifier to indicate that the first device uses the first application protocol.
9. The device of claim 1, wherein the first information is feature data of a first generic attribute protocol service (GATT) service, the first GATT service configured to verify whether the first device uses the first application protocol.
10. The apparatus of claim 9, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data is at least one of:
a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
11. The apparatus of claim 10, wherein the specific identifier comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
12. The device according to any of claims 9-11, wherein the communication unit is further configured to:
transmitting BLE broadcast data to a second device, the BLE broadcast data comprising a universally unique identification code (UUID) of the first GATT service.
13. The apparatus of any of claims 1-12, the pair of keys corresponding to the first application protocol being a pair of asymmetric keys determined based on an asymmetric algorithm or a pair of symmetric keys determined based on a symmetric algorithm.
Optionally, in some embodiments, the communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system on a chip. The processing unit may be one or more processors.
It should be understood that the device 600 according to the embodiment of the present application may correspond to a first device in the embodiment of the method of the present application, and the above and other operations and/or functions of each unit in the device 600 for device discovery are respectively for implementing corresponding flows of the first device in the methods shown in fig. 1 to fig. 4, and are not described herein again for brevity.
Fig. 7 shows a schematic block diagram of a device 700 for device discovery according to an embodiment of the present application. As shown in fig. 7, the apparatus 700 includes:
a communication unit 710, configured to receive first information sent by a first device, where the first information includes first authentication information, and the first authentication information is obtained by encrypting first data with a first key;
the processing unit 720 decrypts the first authentication information by using a second key to obtain second data, where the first key and the second key are a pair of keys corresponding to a first application protocol, obtains the first data, and
and determining whether the first device uses the first application protocol according to whether the first data and the second data are consistent.
Optionally, in some embodiments, the first information is BLE broadcast data based on a bluetooth low energy BLE protocol.
Optionally, in some embodiments, the first data is specific data or hash digest data of the specific data, wherein the specific data includes at least one of:
a specific identity, predefined data, at least part of the BLE broadcast data.
Optionally, in some embodiments, the first information is a beacon frame based on WIFI.
Optionally, in some embodiments, the first verification information comprises a service set identification SSID field and/or a vendor-defined field in the beacon frame.
Optionally, in some embodiments, the first data is specific data or hash digest data of the specific data, wherein the specific data includes at least one of:
a specific identifier, predefined data, at least part of the data in the beacon frame.
Optionally, in some embodiments, the specific identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the processing unit 720 is configured to:
and if the first information comprises a first identifier, determining whether the first device uses the first application protocol according to whether the first data and the second data are consistent, wherein the first identifier is used for indicating that the first device uses the first application protocol.
Optionally, in some embodiments, the first identifier comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the first information is feature data of a first generic attribute protocol GATT service.
Optionally, in some embodiments, the first data is specific data or hash digest data of the specific data, wherein the specific data is at least one of:
a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
Optionally, in some embodiments, the specific identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the processing unit 720 is further configured to:
obtaining the first data from the characteristic data of the first GATT service.
Optionally, in some embodiments, the processing unit 720 is further configured to:
and if the first data is failed to be acquired, determining that the first device does not use the first application protocol.
Optionally, in some embodiments, the communication unit 710 is further configured to:
transmitting BLE broadcast data to a second device, the BLE broadcast data comprising a universally unique identification code (UUID) of the first GATT service.
Optionally, in some embodiments, the processing unit 720 is further configured to:
and acquiring a service list of the first equipment.
Optionally, in some embodiments, the processing unit is further configured to:
and if the service list comprises the UUID of the first GATT service, determining whether the first equipment uses the first application protocol or not according to the consistency of the first data and the second data.
Optionally, in some embodiments, the processing unit 720 is further configured to:
if the service list does not include the UUID of the first GATT service, determining that the first device does not use the first application protocol.
Optionally, in some embodiments, the pair of keys corresponding to the first application protocol is a pair of asymmetric keys determined based on an asymmetric algorithm, or a pair of symmetric keys determined based on a symmetric algorithm.
Optionally, in some embodiments, the communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system on a chip. The processing unit may be one or more processors.
It should be understood that the device 700 according to the embodiment of the present application may correspond to a second device in the embodiment of the method of the present application, and the above and other operations and/or functions of each unit in the device 700 for device discovery are respectively for implementing corresponding flows of the second device in the methods shown in fig. 1 to fig. 4, and are not described herein again for brevity.
Fig. 8 shows a schematic block diagram of a device 800 for device discovery according to an embodiment of the present application. As shown in fig. 8, the apparatus 800 includes:
the processing unit 810 is configured to process the first data through a first algorithm to obtain first verification information;
a communication unit 820, configured to send first information to a second device, where the first information includes the first authentication information, and the first authentication information is used by the second device to determine whether the first device uses a first application protocol.
Optionally, in some embodiments, the first information is BLE broadcast data based on a bluetooth low energy BLE protocol.
Optionally, in some embodiments, the first data comprises at least one of:
a specific identity, predefined data, at least part of the BLE broadcast data.
Optionally, in some embodiments, the first information is a beacon frame based on WIFI.
Optionally, in some embodiments, the first verification information comprises a service set identification SSID field and/or a vendor-defined field in the beacon frame.
Optionally, in some embodiments, the first data comprises at least one of:
a specific identifier, predefined data, at least part of the data in the beacon frame.
Optionally, in some embodiments, the specific identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the first information further includes a first identifier, where the first identifier is used to indicate that the first device uses the first application protocol.
Optionally, in some embodiments, the first information is feature data of a first generic attribute protocol GATT service.
Optionally, in some embodiments, the first data comprises at least one of:
a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
Optionally, in some embodiments, the specific identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the communication unit 820 is further configured to: transmitting BLE broadcast data to a second device, the BLE broadcast data comprising a universally unique identification code UUID of the first GATT service.
Optionally, in some embodiments, the first algorithm is a hash digest algorithm.
Optionally, in some embodiments, the communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system on a chip. The processing unit may be one or more processors.
It should be understood that the device 800 according to the embodiment of the present application may correspond to the first device in the embodiment of the method of the present application, and the above and other operations and/or functions of each unit in the device 800 for device discovery are respectively for implementing the corresponding flow of the first device in the method shown in fig. 5, and are not described herein again for brevity.
Fig. 9 shows a schematic block diagram of a device 900 for device discovery according to an embodiment of the present application. As shown in fig. 9, the apparatus 900 includes: a communication unit 910, configured to receive first information sent by a first device, where the first information includes first verification information, and the first verification information is obtained by processing first data through a first algorithm;
a processing unit 920, configured to obtain the first data;
processing the first data through the first algorithm to obtain second verification information; and determining whether the first device uses the first application protocol according to whether the first verification information and the second verification information are consistent.
Optionally, in some embodiments, the first information is a broadcast packet based on a bluetooth low energy, BLE, protocol.
Optionally, in some embodiments, the first data comprises at least one of:
a specific identity, predefined data, at least part of the BLE broadcast data.
Optionally, in some embodiments, the first information is a beacon frame based on a wireless fidelity protocol.
Optionally, the first verification information includes a service set identification SSID field and/or a vendor-defined field in the beacon frame.
Optionally, in some embodiments, the first data comprises at least one of:
a specific identifier, predefined data, at least part of the data in the beacon frame.
Optionally, in some embodiments, the specific identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, the processing unit 920 is further configured to: and determining whether the first device uses the first application protocol according to whether the first verification information and the second verification information are consistent or not under the condition that the first information comprises a first identifier, wherein the first identifier is used for indicating that the first device uses the first application protocol.
Optionally, in some embodiments, the first identifier comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the first information is feature data of a first generic attribute protocol GATT service.
Optionally, in some embodiments, the first data comprises at least one of: a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
Optionally, in some embodiments, the specific identification comprises at least one of:
the protocol name and the protocol version number of the first application protocol.
Optionally, in some embodiments, the processing unit 920 is further configured to:
and if the first data acquisition fails, determining that the first device does not use the first application protocol.
Optionally, in some embodiments, the communication unit 910 is further configured to: receiving BLE broadcast data transmitted by the first device, the BLE broadcast data including a universally unique identification code (UUID) of the first GATT service.
Optionally, in some embodiments, the communication unit 910 is further configured to: and acquiring a service list of the first equipment.
Optionally, in some embodiments, the processing unit 920 is further configured to:
and if the service list comprises the UUID of the first GATT service, determining whether the first equipment uses the first application protocol or not according to the consistency of the first verification information and the second verification information.
Optionally, in some embodiments, the processing unit 920 is further configured to: if the service list does not include the UUID of the first GATT service, determining that the first device does not use the first application protocol.
Optionally, in some embodiments, the first algorithm is a hash digest algorithm.
Optionally, in some embodiments, the communication unit may be a communication interface or a transceiver, or an input/output interface of a communication chip or a system on a chip. The processing unit may be one or more processors.
It should be understood that the device 900 according to the embodiment of the present application may correspond to a second device in the embodiment of the method of the present application, and the above-mentioned and other operations and/or functions of each unit in the device 900 for device discovery are respectively for implementing a corresponding flow of the second device in the method shown in fig. 5, and are not described herein again for brevity.
Fig. 10 is a schematic structural diagram of a device 1000 for device discovery according to an embodiment of the present application. The communication device 1000 shown in fig. 10 includes a processor 1010, and the processor 1010 may call and execute a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 10, the communication device 1000 may further include a memory 1020. From the memory 1020, the processor 1010 may call and execute a computer program to implement the method in the embodiment of the present application. The memory 1020 may be a separate device from the processor 1010 or may be integrated into the processor 1010.
Optionally, as shown in fig. 10, the communication device 1000 may further include a transceiver 1030, and the processor 1010 may control the transceiver 1030 to communicate with other devices, and specifically, may transmit information or data to the other devices or receive information or data transmitted by the other devices. The transceiver 1030 may include a transmitter and a receiver, among others. The transceiver 1030 may further include antennas, and the number of antennas may be one or more.
Optionally, the communication device 1000 may specifically be the first device or the second device in the embodiment of the present application, and the communication device 1000 may implement a corresponding process implemented by the first device or the second device in each method in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the communication device 1000 may specifically be the first device or the second device in the embodiment of the present application, and the communication device 1000 may implement a corresponding process implemented by the first device or the second device in each method in the embodiment of the present application, and for brevity, details are not described here again.
Fig. 11 is a schematic structural diagram of a chip of the embodiment of the present application. The chip 1100 shown in fig. 11 includes a processor 1110, and the processor 1110 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
Optionally, as shown in fig. 10, the chip 1100 may further include a memory 1120. From the memory 1120, the processor 1110 can call and run a computer program to implement the method in the embodiment of the present application.
The memory 1120 may be a separate device from the processor 1110, or may be integrated in the processor 1110.
Optionally, the chip 1100 may also include an input interface 1130. The processor 1110 may control the input interface 1130 to communicate with other devices or chips, and in particular, may obtain information or data sent by other devices or chips.
Optionally, the chip 1100 may further include an output interface 1140. The processor 1110 may control the output interface 1140 to communicate with other devices or chips, and in particular, may output information or data to the other devices or chips.
Optionally, the chip 1100 may be applied to the first device in the embodiment of the present application, and the chip 1100 may implement a corresponding process implemented by the first device in each method in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the chip 1100 may be applied to a second device in the embodiment of the present application, and the chip 1100 may implement a corresponding process implemented by the second device in each method in the embodiment of the present application, which is not described herein again for brevity.
Alternatively, the device mentioned in the embodiments of the present application may also be a chip. For example, it may be a system-on-chip, a system-on-chip or a system-on-chip, etc.
The embodiment of the application also provides a communication system. The communication system includes a device for device discovery and a device for device discovery. The device for device discovery may be configured to implement the corresponding function implemented by the device for device discovery in the foregoing method, and the device for device discovery may be configured to implement the corresponding function implemented by the device for device discovery in the foregoing method, which is not described herein again for brevity.
It should be understood that the processor of the embodiments of the present application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off the shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It will be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double Data Rate Synchronous Dynamic random access memory (DDR SDRAM), enhanced Synchronous SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood that the above memories are exemplary but not limiting illustrations, for example, the memories in the embodiments of the present application may also be Static Random Access Memory (SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (enhanced SDRAM, ESDRAM), synchronous Link DRAM (SLDRAM), direct Rambus RAM (DR RAM), and the like. That is, the memory in the embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
The embodiment of the application also provides a computer readable storage medium for storing the computer program.
Optionally, the computer-readable storage medium may be applied to the first device or the second device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the first device or the second device in the methods in the embodiments of the present application, which are not described herein again for brevity.
Optionally, the computer-readable storage medium may be applied to the first device or the second device in the embodiment of the present application, and the computer program enables the computer to execute the corresponding process implemented by the first device or the second device in the methods in the embodiments of the present application, which is not described herein again for brevity.
Embodiments of the present application also provide a computer program product comprising computer program instructions.
Optionally, the computer program product may be applied to the first device or the second device in the embodiment of the present application, and the computer program instructions enable the computer to execute corresponding processes implemented by the first device or the second device in the methods in the embodiments of the present application, which are not described herein again for brevity.
Optionally, the computer program product may be applied to the first device or the second device in the embodiment of the present application, and the computer program instructions enable the computer to execute the corresponding processes implemented by the first device or the second device in the methods in the embodiments of the present application, which are not described herein again for brevity.
The embodiment of the application also provides a computer program.
Optionally, the computer program may be applied to the device for device discovery in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute a corresponding process implemented by the device for device discovery in each method in the embodiment of the present application, which is not described herein again for brevity.
Optionally, the computer program may be applied to the first device or the second device in the embodiment of the present application, and when the computer program runs on a computer, the computer is enabled to execute a corresponding process implemented by the first device or the second device in each method in the embodiment of the present application, which is not described herein again for brevity.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. With regard to such understanding, the technical solutions of the present application, which essentially or partially contribute to the prior art, may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a device for device discovery, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (136)

  1. A method for device discovery, comprising:
    the method comprises the steps that first equipment encrypts first data through a first secret key to obtain first verification information, wherein the first secret key is one of a pair of secret keys corresponding to a first application protocol;
    the first device sends first information to a second device, wherein the first information comprises the first verification information, and the first verification information is used for the second device to determine whether the first device uses the first application protocol.
  2. The method according to claim 1, wherein the first information is BLE broadcast data based on a Bluetooth Low Energy (BLE) protocol.
  3. The method of claim 2, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data comprises at least one of the following:
    a specific identity, predefined data, at least part of the BLE broadcast data.
  4. The method of claim 1, wherein the first information is a beacon frame based on a WIFI protocol.
  5. The method of claim 4, wherein the first authentication information comprises a Service Set Identification (SSID) field and/or a vendor-defined field in the beacon frame.
  6. The method of claim 4 or 5, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data comprises at least one of the following:
    a specific identifier, predefined data, at least part of the data in the beacon frame.
  7. The method according to claim 3 or 6, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  8. The method according to any of claims 1-7, further comprising a first identifier in the first information, the first identifier indicating that the first device uses the first application protocol.
  9. The method of claim 1, wherein the first information is feature data of a first generic attribute protocol service (GATT) service, the first GATT service being configured to verify whether the first device uses the first application protocol.
  10. The method of claim 9, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data is at least one of:
    a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
  11. The method of claim 10, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  12. The method according to any one of claims 9-11, further comprising:
    the first device transmits BLE broadcast data to a second device, the BLE broadcast data including a universally unique identification code UUID of the first GATT service.
  13. The method of any of claims 1-12, the pair of keys corresponding to the first application protocol being a pair of asymmetric keys determined based on an asymmetric algorithm or a pair of symmetric keys determined based on a symmetric algorithm.
  14. A method for device discovery, comprising:
    the method comprises the steps that a second device receives first information sent by a first device, wherein the first information comprises first verification information, and the first verification information is obtained by encrypting first data through a first secret key;
    decrypting the first verification information through a second key to obtain second data, wherein the first key and the second key are a pair of keys corresponding to a first application protocol;
    acquiring the first data;
    and determining whether the first device uses the first application protocol according to whether the first data and the second data are consistent.
  15. The method according to claim 14, wherein the first information is BLE broadcast data based on a Bluetooth Low Energy (BLE) protocol.
  16. The method of claim 15, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data comprises at least one of the following:
    a specific identity, predefined data, at least part of the BLE broadcast data.
  17. The method of claim 14, wherein the first information is a beacon frame based on WIFI protocol.
  18. The method of claim 17, wherein the first authentication information comprises a Service Set Identification (SSID) field and/or a vendor-defined field in the beacon frame.
  19. The method of claim 17 or 18, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data comprises at least one of the following:
    a specific identifier, predefined data, at least part of the data in the beacon frame.
  20. The method according to claim 16 or 19, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  21. The method according to any of claims 14-20, wherein said determining whether the first device uses the first application protocol based on whether the first data and the second data are consistent comprises:
    and if the first information comprises a first identifier, determining whether the first device uses the first application protocol according to whether the first data and the second data are consistent, wherein the first identifier is used for indicating that the first device uses the first application protocol.
  22. The method of claim 21, wherein the first identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  23. The method of claim 14, wherein the first information is feature data of a first generic attribute protocol (GATT) service.
  24. The method of claim 23, wherein the first data is specific data or hash digest data of the specific data, and wherein the specific data is at least one of:
    a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
  25. The method of claim 24, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  26. The method of any one of claims 23-25, wherein said obtaining the first data comprises:
    obtaining the first data from the characteristic data of the first GATT service.
  27. The method of claim 26, further comprising:
    and if the first data acquisition fails, determining that the first device does not use the first application protocol.
  28. The method according to any one of claims 23-27, further comprising:
    the first device transmits BLE broadcast data to a second device, the BLE broadcast data including a universally unique identification code, UUID, of the first GATT service.
  29. The method of claim 28, further comprising:
    and acquiring a service list of the first equipment.
  30. The method of claim 29, wherein determining whether the first device uses the first application protocol based on whether the first data and the second data are consistent comprises:
    and if the service list comprises the UUID of the first GATT service, determining whether the first equipment uses the first application protocol or not according to the consistency of the first data and the second data.
  31. The method of claim 29, further comprising:
    if the service list does not include the UUID of the first GATT service, determining that the first device does not use the first application protocol.
  32. The method of any of claims 14-31, the pair of keys corresponding to the first application protocol being a pair of asymmetric keys determined based on an asymmetric algorithm or a pair of symmetric keys determined based on a symmetric algorithm.
  33. A method for device discovery, comprising:
    the first equipment processes the first data through a first algorithm to obtain first verification information;
    the first device sends first information to a second device, wherein the first information comprises first verification information, and the first verification information is used for the second device to determine whether the first device uses a first application protocol.
  34. The method according to claim 33, wherein the first information is BLE broadcast data based on a Bluetooth Low Energy (BLE) protocol.
  35. The method of claim 34, wherein the first data comprises at least one of:
    a specific identity, predefined data, at least part of the BLE broadcast data.
  36. The method of claim 32, wherein the first information is a beacon frame based on WIFI protocol.
  37. The method of claim 36, wherein the first authentication information comprises a Service Set Identification (SSID) field and/or a vendor-defined field in the beacon frame.
  38. The method of claim 36 or 37, wherein the first data comprises at least one of:
    a specific identifier, predefined data, at least part of the data in the beacon frame.
  39. The method according to claim 35 or 38, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  40. The method of any of claims 33-39, further comprising a first identifier in the first information, the first identifier indicating that the first device used the first application protocol.
  41. The method of claim 33, wherein the first information is feature data of a first generic attribute protocol (GATT) service.
  42. The method of claim 41, wherein the first data comprises at least one of:
    a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
  43. The method of claim 42, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  44. The method of any one of claims 41 to 43, further comprising:
    the first device transmits BLE broadcast data to a second device, the BLE broadcast data including a universally unique identification code, UUID, of the first GATT service.
  45. The method of any one of claims 33-44, the first algorithm being a hash digest algorithm.
  46. A method for device discovery, comprising:
    the method comprises the steps that a second device receives first information sent by a first device, wherein the first information comprises first verification information, and the first verification information is obtained by processing first data through a first algorithm;
    acquiring the first data;
    processing the first data through the first algorithm to obtain second verification information;
    and determining whether the first device uses the first application protocol according to whether the first verification information is consistent with the second verification information.
  47. The method according to claim 46, wherein the first information is a broadcast packet based on a Bluetooth Low Energy (BLE) protocol.
  48. The method of claim 47, wherein the first data comprises at least one of:
    a specific identity, predefined data, at least part of the BLE broadcast data.
  49. The method of claim 46, wherein the first information is a beacon frame based on a WIFI protocol.
  50. The method of claim 49, wherein the first authentication information comprises a Service Set Identification (SSID) field and/or a vendor-defined field in the beacon frame.
  51. The method of claim 49 or claim 50, wherein the first data comprises at least one of:
    a specific identifier, predefined data, at least part of the data in the beacon frame.
  52. The method according to claim 48 or 51, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  53. The method according to any of claims 46-52, wherein said determining whether the first device uses the first application protocol based on whether the first authentication information and the second authentication information are consistent comprises:
    and if the first information comprises a first identifier, determining whether the first device uses the first application protocol according to whether the first verification information and the second verification information are consistent, wherein the first identifier is used for indicating that the first device uses the first application protocol.
  54. The method of claim 53, wherein the first identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  55. The method of claim 46, wherein the first information is feature data of a first generic attribute protocol (GATT) service.
  56. The method of claim 55, wherein the first data comprises at least one of:
    a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
  57. The method according to claim 56, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  58. The method of claim 56 or 57, further comprising:
    and if the first data is failed to be acquired, determining that the first device does not use the first application protocol.
  59. The method of any one of claims 55-58, further comprising:
    the second device receives BLE broadcast data transmitted by the first device, wherein the BLE broadcast data comprises a universal unique identification code UUID of the first GATT service.
  60. The method of claim 59, further comprising:
    and acquiring a service list of the first equipment.
  61. The method of claim 60, wherein determining whether the first device uses the first application protocol based on whether the first authentication information and the second authentication information are consistent comprises:
    and if the service list comprises the UUID of the first GATT service, determining whether the first equipment uses the first application protocol or not according to the consistency of the first verification information and the second verification information.
  62. The method of claim 61, further comprising:
    if the service list does not include the UUID of the first GATT service, determining that the first device does not use the first application protocol.
  63. The method of any one of claims 46-62, the first algorithm being a hash digest algorithm.
  64. A device for device discovery, comprising:
    the processing unit is used for encrypting first data through a first secret key to obtain first verification information, wherein the first secret key is one of a pair of secret keys corresponding to a first application protocol;
    a communication unit, configured to send first information to a second device, where the first information includes the first authentication information, and the first authentication information is used by the second device to determine whether the first device uses the first application protocol.
  65. The device according to claim 63, wherein the first information is BLE broadcast data based on a Bluetooth Low Energy (BLE) protocol.
  66. The apparatus of claim 65, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data comprises at least one of:
    a specific identity, predefined data, at least part of the BLE broadcast data.
  67. The device of claim 64, wherein the first information is a beacon frame based on a WIFI protocol.
  68. The device of claim 67, wherein the first authentication information comprises a Service Set Identification (SSID) field and/or a vendor-defined field in the beacon frame.
  69. The apparatus of claim 67 or 68, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data comprises at least one of:
    a specific identifier, predefined data, at least part of the data in the beacon frame.
  70. The apparatus according to claim 66 or 69, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  71. The device of any of claims 64-70, further comprising a first identification in the first information, the first identification to indicate that the first device used the first application protocol.
  72. The device of claim 64, wherein the first information is feature data of a first generic Attribute protocol service (GATT) service for verifying whether the first device uses the first application protocol.
  73. The apparatus of claim 72, wherein the first data is specific data or a hash digest of the specific data, and wherein the specific data is at least one of:
    a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
  74. The apparatus according to claim 73, wherein the specific identity comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  75. The device of any one of claims 72-74, wherein the communication unit is further configured to:
    transmitting BLE broadcast data to a second device, the BLE broadcast data comprising a universally unique identification code (UUID) of the first GATT service.
  76. The device of any one of claims 64-75, the pair of keys to which the first application protocol corresponds is a pair of asymmetric keys determined based on an asymmetric algorithm or a pair of symmetric keys determined based on a symmetric algorithm.
  77. A device for device discovery, comprising:
    the communication unit is used for receiving first information sent by first equipment, wherein the first information comprises first verification information, and the first verification information is obtained by encrypting first data through a first secret key;
    the processing unit is used for decrypting the first verification information through a second key to obtain second data, wherein the first key and the second key are a pair of keys corresponding to a first application protocol;
    acquiring the first data; and
    and determining whether the first device uses the first application protocol according to whether the first data and the second data are consistent.
  78. The device according to claim 77, wherein the first information is BLE broadcast data based on a Bluetooth Low Energy (BLE) protocol.
  79. The apparatus of claim 78, wherein the first data is specific data or a hash digest of the specific data, wherein the specific data comprises at least one of:
    a specific identity, predefined data, at least part of the BLE broadcast data.
  80. The device of claim 77, wherein the first information is a beacon frame based on a WIFI protocol.
  81. The device of claim 80, wherein the first authentication information comprises a Service Set Identification (SSID) field and/or a vendor-defined field in the beacon frame.
  82. The device of claim 80 or 81, wherein the first data is specific data or hash digest data of the specific data, wherein the specific data comprises at least one of:
    a specific identifier, predefined data, at least part of the data in the beacon frame.
  83. The apparatus according to claim 79 or 82, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  84. The device of any one of claims 77-83, wherein the determining whether the first device uses the first application protocol based on whether the first data and the second data are consistent comprises:
    and if the first information comprises a first identifier, determining whether the first device uses the first application protocol according to whether the first data and the second data are consistent, wherein the first identifier is used for indicating that the first device uses the first application protocol.
  85. The device of claim 84, wherein the first identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  86. The apparatus of claim 77, wherein the first information is feature data of a first generic attribute protocol (GATT) service.
  87. The apparatus of claim 86, wherein the first data is specific data or a hash digest of the specific data, and wherein the specific data is at least one of:
    a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
  88. The apparatus according to claim 87, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  89. The device of claim 87 or 88, wherein the processing unit is further configured to:
    obtaining the first data from the characteristic data of the first GATT service.
  90. The device of claim 89, wherein the processing unit is further configured to:
    and if the first data is failed to be acquired, determining that the first device does not use the first application protocol.
  91. The device of any one of claims 86-90, wherein the communication unit is further configured to:
    receiving BLE broadcast data transmitted by the first device, the BLE broadcast data including a universally unique identification code (UUID) of the first GATT service.
  92. The device of claim 91, wherein the processing unit is further configured to:
    and acquiring a service list of the first equipment.
  93. The device of claim 92, wherein the processing unit is further configured to:
    and if the service list comprises the UUID of the first GATT service, determining whether the first equipment uses the first application protocol or not according to the consistency of the first data and the second data.
  94. The device of claim 92, wherein the processing unit is further configured to:
    if the service list does not include the UUID of the first GATT service, determining that the first device does not use the first application protocol.
  95. The apparatus of any one of claims 77-94, the pair of keys to which the first application protocol corresponds being a pair of asymmetric keys determined based on an asymmetric algorithm, or a pair of symmetric keys determined based on a symmetric algorithm.
  96. A device for device discovery, comprising:
    the processing unit is used for processing the first data through a first algorithm to obtain first verification information;
    the communication unit is configured to send first information to a second device, where the first information includes the first authentication information, and the first authentication information is used by the second device to determine whether the first device uses a first application protocol.
  97. The device according to claim 96, wherein the first information is BLE broadcast data based on a Bluetooth Low Energy (BLE) protocol.
  98. The device of claim 97, wherein the first data comprises at least one of:
    a specific identity, predefined data, at least part of the BLE broadcast data.
  99. The device of claim 96, wherein the first information is a beacon frame based on WIFI protocol.
  100. The device of claim 99, wherein the first authentication information comprises a Service Set Identification (SSID) field and/or a vendor-defined field in the beacon frame.
  101. The device of claim 99 or 100, wherein the first data comprises at least one of:
    a specific identifier, predefined data, at least part of the data in the beacon frame.
  102. The apparatus according to claim 98 or 101, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  103. The device of any of claims 96-102, further comprising a first identification in the first information, the first identification indicating that the first device used the first application protocol.
  104. The apparatus according to claim 96, wherein the first information is feature data of a first generic attribute protocol, GATT, service.
  105. The device of claim 104, wherein the first data comprises at least one of:
    a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
  106. The device of claim 105, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  107. The device of any one of claims 104-106, wherein the communication unit is further configured to:
    transmitting BLE broadcast data to a second device, the BLE broadcast data comprising a universally unique identification code (UUID) of the first GATT service.
  108. The apparatus of any one of claims 96-107, the first algorithm being a hash digest algorithm.
  109. A device for device discovery, comprising:
    the communication unit is used for receiving first information sent by first equipment, wherein the first information comprises first verification information, and the first verification information is obtained by processing first data through a first algorithm;
    a processing unit for acquiring the first data;
    processing the first data through the first algorithm to obtain second verification information; and
    and determining whether the first device uses the first application protocol according to whether the first verification information and the second verification information are consistent.
  110. The device according to claim 109, wherein the first information is a broadcast packet based on the Bluetooth Low Energy (BLE) protocol.
  111. The device of claim 110, wherein the first data comprises at least one of:
    a specific identity, predefined data, at least part of the BLE broadcast data.
  112. The device of claim 109, wherein the first information is a beacon frame based on WIFI protocol.
  113. The device of claim 112, wherein the first authentication information comprises a Service Set Identification (SSID) field and/or a vendor-defined field in the beacon frame.
  114. The device of claim 112 or 113, wherein the first data comprises at least one of:
    a specific identifier, predefined data, at least part of the data in the beacon frame.
  115. The apparatus as claimed in claim 111 or 114, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  116. The device of any one of claims 109-115, wherein the processing unit is further configured to:
    and if the first information comprises a first identifier, determining whether the first device uses the first application protocol according to whether the first verification information and the second verification information are consistent, wherein the first identifier is used for indicating that the first device uses the first application protocol.
  117. The device of claim 116, wherein the first identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  118. The apparatus of claim 109, wherein the first information is feature data of a first generic attribute protocol, GATT, service.
  119. The device of claim 118, wherein the first data comprises at least one of:
    a specific identifier, predefined data, at least part of data in characteristic value data of a first characteristic of the first GATT service, at least part of data in characteristic value data of a second characteristic of the first GATT service, at least part of data in BLE broadcast data transmitted by the first device, wherein the first characteristic is used for saving and transmitting the first verification information, and the second characteristic is used for saving and transmitting the specific data.
  120. The apparatus as claimed in claim 119, wherein the specific identifier comprises at least one of:
    the protocol name and the protocol version number of the first application protocol.
  121. The device of any one of claims 118-120, wherein the processing unit is further configured to:
    and if the first data acquisition fails, determining that the first device does not use the first application protocol.
  122. The device of any one of claims 118-121, wherein the communication unit is further configured to:
    receiving BLE broadcast data transmitted by the first device, the BLE broadcast data including a universally unique identification code (UUID) of the first GATT service.
  123. The device of claim 122, wherein the communication unit is further configured to:
    and acquiring a service list of the first equipment.
  124. The device of claim 123, wherein the processing unit is further configured to:
    and if the service list comprises the UUID of the first GATT service, determining whether the first equipment uses the first application protocol or not according to the consistency of the first verification information and the second verification information.
  125. The device of claim 123, wherein the processing unit is further configured to:
    if the service list does not include the UUID of the first GATT service, determining that the first device does not use the first application protocol.
  126. The apparatus of any one of claims 109-125, the first algorithm being a hash digest algorithm.
  127. A device for device discovery, comprising: a processor and a memory for storing a computer program, the processor for invoking and executing the computer program stored in the memory, performing the method of any of claims 1-13, or the method of any of claims 33-45.
  128. A chip, comprising: a processor for calling and running a computer program from memory to cause a device on which the chip is installed to perform the method of any of claims 1 to 13, or the method of any of claims 33 to 45.
  129. A computer-readable storage medium for storing a computer program which causes a computer to perform the method of any one of claims 1 to 13, or the method of any one of claims 33 to 45.
  130. A computer program product comprising computer program instructions to cause a computer to perform the method of any of claims 1 to 13, or the method of any of claims 33 to 45.
  131. A computer program, characterized in that the computer program causes a computer to perform the method of any of claims 1 to 13, or the method of any of claims 33 to 45.
  132. A device for device discovery, comprising: a processor and a memory for storing a computer program, the processor being configured to invoke and execute the computer program stored in the memory, to perform the method of any of claims 14 to 32, or to perform the method of any of claims 46 to 63.
  133. A chip, comprising: a processor for calling and running a computer program from memory to cause a device on which the chip is installed to perform the method of any of claims 14 to 32, or the method of any of claims 46 to 63.
  134. [ claim 1 ] correction 20.10.2020 to rules 91 ] a computer-readable storage medium for storing a computer program for causing a computer to perform the method according to any one of claims 14 to 32, or the method according to any one of claims 46 to 63.
  135. [ correction 20.10.2020] according to rules 91 ] a computer program product comprising computer program instructions for causing a computer to perform the method according to any one of claims 14 to 32 or the method according to any one of claims 46 to 63.
  136. [ claim 1 ] correction 20.10.2020 according to rules 91 ] a computer program for causing a computer to perform the method according to any one of claims 14 to 32 or the method according to any one of claims 46 to 63.
CN202080100978.9A 2020-08-12 2020-08-12 Method and apparatus for device discovery Pending CN115606212A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310139051.1A CN116208950A (en) 2020-08-12 2020-08-12 Method and apparatus for device discovery

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/108729 WO2022032535A1 (en) 2020-08-12 2020-08-12 Methods and devices for device discovery

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202310139051.1A Division CN116208950A (en) 2020-08-12 2020-08-12 Method and apparatus for device discovery

Publications (1)

Publication Number Publication Date
CN115606212A true CN115606212A (en) 2023-01-13

Family

ID=80246706

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202310139051.1A Pending CN116208950A (en) 2020-08-12 2020-08-12 Method and apparatus for device discovery
CN202080100978.9A Pending CN115606212A (en) 2020-08-12 2020-08-12 Method and apparatus for device discovery

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202310139051.1A Pending CN116208950A (en) 2020-08-12 2020-08-12 Method and apparatus for device discovery

Country Status (2)

Country Link
CN (2) CN116208950A (en)
WO (1) WO2022032535A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016108075A1 (en) * 2014-12-31 2016-07-07 Nokia Technologies Oy Methods and apparatuses for configuring a ble advertising beacon
CN107396347A (en) * 2016-05-16 2017-11-24 阿里巴巴集团控股有限公司 A kind of Intelligent worn device and method, system and the intelligent terminal of intelligent terminal pairing
CN106059869B (en) * 2016-07-26 2019-06-18 北京握奇智能科技有限公司 A kind of internet of things intelligent household equipment safety control method and system
CN109688573A (en) * 2019-01-22 2019-04-26 北京深思数盾科技股份有限公司 Exchange method and bluetooth equipment between bluetooth equipment
CN111343634B (en) * 2020-03-05 2023-01-03 深圳市丰鑫科技服务有限公司 Safe connection method and data transmission method between low-power-consumption Bluetooth devices

Also Published As

Publication number Publication date
WO2022032535A1 (en) 2022-02-17
CN116208950A (en) 2023-06-02

Similar Documents

Publication Publication Date Title
CN107231627B (en) Bluetooth network and network distribution method
CN107370711B (en) Identity verification method and system and intelligent wearable device
US10009760B2 (en) Providing network credentials
CA3090703A1 (en) Configuration systems and methods for secure operation of networked transducers
CN112822177B (en) Data transmission method, device, equipment and storage medium
CN112291100A (en) Network distribution method, network distribution device and storage medium
JP2010531108A (en) System and method for providing OTA service
CN113840266A (en) Bluetooth pairing method, device, system, electronic equipment and storage medium
CN111788836B (en) Data transmission method and BLE equipment
CN114172544A (en) Method for copying smart card and electronic equipment
WO2018030296A1 (en) Communication device, communication method and program
EP4152791A1 (en) Electronic device and method for electronic device to provide ranging-based service
CN112771815B (en) Key processing method and device
US20200034835A1 (en) Payment system for user non-repudiation using user terminal and method thereof
CN115606212A (en) Method and apparatus for device discovery
WO2022143157A1 (en) Key negotiation method and related device therefor
CN111163462B (en) Network distribution method and related product
CN113392062B (en) Data storage method and device, electronic equipment and computer readable storage medium
WO2018076242A1 (en) Information transmition method and device
WO2020090443A1 (en) Communication device, control method, and program
EP4274285A1 (en) Method and device for secure ranging based on ultra-wideband communication
CN115474290B (en) Screen transmission data processing method, device and system
KR20120064292A (en) Application service authentication system and method thereof
WO2023144716A1 (en) System and method for enabling short distance secure communication
KR101922540B1 (en) Verification mehod for beacon id

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination