CN116437346A - Communication method, communication device, apparatus, and storage medium - Google Patents

Communication method, communication device, apparatus, and storage medium Download PDF

Info

Publication number
CN116437346A
CN116437346A CN202310325137.3A CN202310325137A CN116437346A CN 116437346 A CN116437346 A CN 116437346A CN 202310325137 A CN202310325137 A CN 202310325137A CN 116437346 A CN116437346 A CN 116437346A
Authority
CN
China
Prior art keywords
information
slave device
slave
master
master device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310325137.3A
Other languages
Chinese (zh)
Inventor
滑安南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kaihong Digital Industry Development Co Ltd
Original Assignee
Shenzhen Kaihong Digital Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kaihong Digital Industry Development Co Ltd filed Critical Shenzhen Kaihong Digital Industry Development Co Ltd
Priority to CN202310325137.3A priority Critical patent/CN116437346A/en
Publication of CN116437346A publication Critical patent/CN116437346A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a communication method, a device, equipment and a storage medium. The method is applied to a communication system and comprises a master device and a slave device which are connected through short-range wireless communication, and comprises the following steps: after the master device and the slave device are mutually discovered, the master device receives first transmission information sent by the slave device, wherein the first transmission information comprises first device information and data information; after the main equipment receives the first transmission information, verifying the first equipment information to obtain a first verification result, and obtaining corresponding response information based on the data information; when the first verification result is that verification is successful, second transmission information is sent to the slave equipment, so that the slave equipment receives the second transmission information, and the second transmission information comprises second equipment information and response information; and when the slave device verifies the second device information to obtain a second verification result and the second device information passes, the master device and the slave device realize communication transmission. The embodiment of the application aims to provide a communication method for improving the communication efficiency between devices.

Description

Communication method, communication device, apparatus, and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a communication method, a communication device, an apparatus, and a computer readable storage medium.
Background
With the rapid development of computer network technology and internet of things technology, the internet of things era is becoming a reality. Various intelligent devices enter into daily life of people, and how to realize authentication among different devices, so that the devices can communicate with each other is a key of everything interconnection.
In the prior art, a communication mode among devices supports various approaches such as Bluetooth, WIFI, NFC and the like. One of the common authentication schemes at present is that both end devices must perform a communication interaction to perform identity authentication, and after the identity authentication passes, establish device trust, and then perform formal data transmission. However, the above method consumes one information interaction for identity authentication, and effective communication often must be successfully performed after the identity authentication, so that at least two continuous transceiving of information must be maintained to complete one successful data transmission, thereby reducing the efficiency of communication between devices. In addition, under the conditions of more signal interference and unstable hardware equipment, the scheme can lead to lower transmission success rate among the equipment.
Disclosure of Invention
The application provides a communication method, a communication device, equipment and a computer readable storage medium, aiming at improving the efficiency of communication between equipment.
To achieve the above object, the present application provides a communication method applied to a communication system, the communication system including a master device and at least one slave device, the master device and the slave device being connectable by way of short-range wireless communication, the method comprising:
after the master device and the slave device discover each other, the master device receives first transmission information sent by the slave device, wherein the first transmission information comprises first device information and data information;
after the main equipment receives the first transmission information, the main equipment verifies the first equipment information to obtain a first verification result, and obtains corresponding response information based on the data information;
when the first verification result is that verification is successful, the master device sends second transmission information to the slave device so that the slave device receives the second transmission information, wherein the second transmission information comprises second device information and response information;
and when the slave equipment verifies the second equipment information to obtain a second verification result and the second verification result is passed, the master equipment and the slave equipment realize communication transmission.
To achieve the above object, the present application further provides a communication device including:
the sending module is used for receiving first transmission information sent by the slave equipment after the master equipment and the slave equipment are mutually discovered, wherein the first transmission information comprises first equipment information and data information;
the verification module is used for verifying the first equipment information by the master equipment after the first transmission information is received by the master equipment to obtain a first verification result and obtaining corresponding response information based on the data information;
the sending module is further configured to send second transmission information to the slave device when the first verification result is that verification is successful, so that the slave device receives the second transmission information, where the second transmission information includes second device information and the response information;
and the communication module is used for verifying the second equipment information by the slave equipment to obtain a second verification result, and when the second verification result is passed, the communication transmission is realized between the master equipment and the slave equipment.
In addition, to achieve the above object, the present application further provides an apparatus including a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and implement the steps of any one of the communication methods provided in the embodiments of the present application when the computer program is executed.
In addition, to achieve the above object, the present application further provides a computer-readable storage medium storing a computer program, which when executed by a processor, causes the processor to implement the steps of any one of the communication methods provided in the embodiments of the present application.
The communication method, the communication device, the equipment and the computer readable storage medium disclosed by the embodiment of the application can be used for enabling the master equipment to receive the first equipment information and the data information sent by the slave equipment after the master equipment and the slave equipment are mutually discovered. And the master device verifies the slave device based on the first device information to obtain a corresponding verification result, and obtains corresponding response information based on the data information. After the verification is successful, the master device sends the second device information and the response information to the slave device, so that the slave device can verify the second device information and accept the response information. After the verification of the slave device is successful, the authentication between the master device and the slave device can be realized. Furthermore, as the data information is received and transmitted in the authentication process, the communication efficiency between the master device and the slave device is improved. In addition, the communication process is less affected by signal interference, so that the reliability and stability of communication between the master device and the slave device are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic step diagram of a communication method according to an embodiment of the present application;
fig. 2 is a schematic view of a scenario of a master device and a slave device according to an embodiment of the present application;
fig. 3 is a schematic diagram of a step of a master device sending second transmission information to a slave device according to an embodiment of the present application;
FIG. 4 is a flow chart of a communication method as shown in FIG. 1;
FIG. 5 is a schematic diagram illustrating steps for changing rights according to an embodiment of the present application;
fig. 6 is a schematic diagram of a step of a master device sending second device information and rights change information to a slave device according to an embodiment of the present application;
FIG. 7 is a flow chart of a modification of rights as shown in FIG. 4;
FIG. 8 is a schematic block diagram of a communication device provided by an embodiment of the present application;
Fig. 9 is a schematic block diagram of an apparatus provided in an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations. In addition, although the division of the functional modules is performed in the apparatus schematic, in some cases, the division of the modules may be different from that in the apparatus schematic.
The term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
In order to facilitate understanding of embodiments of the present application, some of the background references to embodiments of the present application are briefly described below.
The common interconnection between devices is mostly applied to the interaction scenario of "1+n". "1" is a super terminal, as the master device; "N" is a slave device with a relatively single function. The communication between the master device and the slave device mostly is to send the information containing the identity of the master device through the two terminals respectively once, complete identity authentication after one interaction, and then start effective data transmission. The specific flow is as follows: the two devices respectively send own identity data. And the two devices receive the opposite terminal information and respectively identify the opposite terminals. After one interaction is completed and the identity recognition is passed, the trust of the equipment is established, and the formal data transmission is carried out.
The technical means has the defect that one information interaction is consumed for authentication between devices. Since effective communication must be performed after device authentication is successful, continuous transmission and reception of information must be maintained at least twice to complete one data transmission, and thus data transmission efficiency is low. In addition, under the conditions of more signal interference and unstable hardware equipment, the scheme can lead to lower transmission success rate among the equipment.
Therefore, there is a need for a communication method to achieve improved efficiency and success rate of communication between devices.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic diagram illustrating steps of a communication method according to an embodiment of the present application; fig. 2 is a schematic view of a scenario of a master device and a slave device according to an embodiment of the present application. The communication method can be applied to a communication system, and the communication system comprises a master device and at least one slave device, wherein the master device and the slave devices can be connected in a short-range wireless communication mode.
As shown in fig. 1, the communication method includes steps S11 to S14.
Step S11: after the master device and the slave device discover each other, the master device receives first transmission information sent by the slave device.
The master device is a device capable of actively establishing connection with the slave device; the slave device is a device that passively establishes a connection with the master device.
As shown in fig. 2, the master device and the plurality of slave devices may be connected by means of short-range wireless communication.
It should be noted that, the near field communication technology is integrated and evolved by a non-contact Radio Frequency Identification (RFID) and interconnection technology, and combines the functions of an inductive card reader, an inductive card and a point-to-point on a single chip, so that the near field communication technology can perform identification and data exchange with compatible equipment in a short distance.
Further, after the master device and the slave device discover each other, the master device can receive the first transmission information sent by the slave device.
Wherein the first transmission information includes first device information and data information. The first device information is device information of the slave device, which includes device type information, device number, domain ID information, and the like, which is not limited in this application. In addition, the data information is information which needs to be interacted by the master device and the slave device.
In this embodiment of the present application, after a master device and a slave device connected based on close range wireless communication discover each other, the master device may receive first transmission information sent by the slave device, where the first transmission information includes first device information and data information. In this way, the master device may be caused to receive the first device information of the slave device and to be used for identification of the identity of the slave device, and to accept data information for enabling interaction of information between the master device and the slave device.
Step S12: after the master device receives the first transmission information, the master device verifies the first device information to obtain a first verification result, and obtains corresponding response information based on the data information.
It can be appreciated that the first verification result is a verification result of the identity information of the slave device by the master device. Specifically, the master device may verify the first device information, thereby authenticating whether the identity of the slave device is legal, and obtaining a first verification result. For example, device type information of the slave device may be verified to authenticate whether the identity of the slave device is legitimate.
Further, after receiving the data information sent by the slave device, the master device may respond based on the data information, so as to obtain response information corresponding to the data information.
In the embodiment of the application, the master device can perform identity verification on the slave device based on the first device information so as to confirm whether the identity of the corresponding slave device is legal or not. In addition, corresponding response information can be obtained based on the received data information, so that the slave device opposite side can be informed of the received data information sent by the slave device opposite side, and the situation of data receiving failure is avoided.
Step S13: and when the first verification result is that the verification is successful, the master device sends second transmission information to the slave device so that the slave device receives the second transmission information.
Specifically, when the first verification result is that verification is successful, the identity of the slave device is legal. The master device may then send the second transmission information to the slave device to cause the slave device to receive the second transmission information.
Wherein the second transmission information includes second device information and response information.
The second device information is device information of the master device, which includes device type information, device number, domain ID information, and the like, which is not limited in this application.
It will be appreciated that the second device information may be used for authentication of the host device; in addition, the slave device may determine that the master device has received the data information it has transmitted after receiving the response information of the master device. Otherwise, it indicates that the master device does not receive the data information sent by the master device, and the data information can be repeatedly sent to the master device at the moment, so that data transmission between the master device and the slave device can be realized, and the probability of failure of data transmission is reduced.
Step S14: and when the slave equipment verifies the second equipment information to obtain a second verification result and the second verification result is that the verification is successful, the master equipment and the slave equipment realize communication transmission.
It will be appreciated that the slave device may verify the second device information to confirm that the identity of the master device is legitimate. Further, when the second verification result is that verification is successful, the identity of the master device is legal, and identity authentication between the master device and the slave device is achieved. In addition, the process also realizes the receiving and transmitting of the data information between the master device and the slave device. That is, communication transmission is realized between the master device and the slave device, and the above-mentioned process does not need to separately perform authentication of identity and data information receiving and transmitting between the master device and the slave device, so that the communication transmission efficiency of the master device and the slave device is higher.
In the embodiment of the application, after the master device and the slave device discover each other, the master device can receive the first device information and the data information sent by the slave device. And the master device verifies the slave device based on the first device information to obtain a corresponding verification result, and obtains corresponding response information based on the data information. After the verification is successful, the master device sends the second device information and the response information to the slave device, so that the slave device can verify the second device information and accept the response information. After the verification of the slave device is successful, the authentication between the master device and the slave device can be realized. Furthermore, as the data information is received and transmitted in the authentication process, the communication efficiency between the master device and the slave device is improved. In addition, the communication process is less affected by signal interference, so that the reliability and stability of communication between the master device and the slave device are improved.
With continued reference to fig. 3, fig. 3 is a schematic diagram of a step of sending, by a master device, second transmission information to a slave device according to an embodiment of the present application. As shown in fig. 3, when the first verification result is that the verification is successful, the master device may also transmit second transmission information to the slave device through steps S131 to S132.
Step S131: and when the first verification result is that the verification is successful, the master device judges whether the slave device has joined other domains.
Specifically, the master device may determine whether the slave device has joined the other domain based on the first device information. For example, it may be determined whether or not the domain ID information of the slave device matches the domain ID information of the slave device, and when the domain ID information of the slave device does not match the domain ID information of the master device, it is indicated that the slave device has joined another domain.
It should be noted that the domain is a device group. It will be appreciated that the slave device may only perform normal communication interactions with the master device when joining the master device domain.
Step S132: when the slave device has joined the other domain, the master device transmits second transmission information to the slave device to cause the slave device to leave the other domain based on the second transmission information.
Specifically, when the slave device has joined the other domain, the master device may send the second transmission information to the slave device, so that the slave device receives the second transmission information. Wherein the second transmission information includes second device information. Based on this, the slave device can leave the other domain based on the second device information. For example, the slave device may determine that its own domain ID information is inconsistent with the master device based on its domain ID information, at which time the slave device may leave the other domain.
In the embodiment of the present application, when the first verification result is that the verification is successful, the master device may determine whether the slave device has joined the other domain based on the first device information. And transmitting second transmission information to the slave device when the slave device has joined the other domain, so that the slave device leaves the other domain based on the second transmission information. Therefore, the situation that the slave device joins other domains and cannot normally communicate with the master device can be prevented, and the probability of communication failure of the slave device and the master device is reduced.
Optionally, after the master device determines whether the slave device has joined the other domain, the method further includes: when the slave device does not join other domains, the master device judges whether the slave device joins the master device domain; the master device sends second transmission information to the slave device when the slave device does not join the master device domain.
Specifically, when the slave device does not join the other domain, the master device may also determine whether the slave device joins the master device domain based on the first device information. For example, it may be determined whether or not the slave device joins the master device domain based on the domain ID information of the slave device. Further, the master device sends second transmission information to the slave device when it is determined that the slave device does not join the master device domain.
It will be appreciated that the second transfer information may be used to cause the slave device to join the master device domain.
Optionally, after the second device information is verified by the slave device to obtain a second verification result, and the second verification result is passing, the method includes: when the slave device judges that the slave device does not join other domains based on the second device information and the slave device joins the master device domain, communication transmission is realized between the master device and the slave device.
Specifically, after the slave device verifies the second device information to obtain a second verification result, and the second verification result is passed, the identity of the master device is indicated to be legal. At this time, the slave device may determine that it does not join the other domain based on the second transmission information, and join the master device domain based on the second transmission information. The master domain may be joined, for example, based on domain ID information of the master. In this way, communication transmissions between the master device and the slave device may be achieved.
In the embodiment of the present application, when the slave device does not join other domains, the master device may determine whether the slave device joins the master device domain, and when the slave device does not join the master device domain, the master device sends second transmission information to the slave device, so that the slave device can join the master device domain based on the second device information. Further, when the slave device judges that the slave device does not join other domains based on the second device information and the slave device joins the master device domain, communication transmission between the master device and the slave device can be achieved. The method may further determine that the slave device joins the master device domain. Therefore, the normal communication between the slave device and the master device can be realized, and the probability of communication failure of the slave device and the master device caused by the fact that the slave device does not join the master device domain is prevented.
With continued reference to fig. 4, fig. 4 is a flow chart of a communication method as shown in fig. 1. As shown in fig. 4, after the master device and the slave device discover each other, the slave device can send the first transmission information to the master device, so that the master device can receive the first transmission information. Wherein the first transmission information includes first device information and data information. The first device information is device information of the slave device, which includes device type information, device number, domain ID information, and the like.
Further, after the master device receives the first transmission information, the master device verifies the first device information to obtain a first verification result, and obtains corresponding response information based on the data information. And judging whether the slave device joins the other domain based on the first device information, and when the slave device joins the other domain, the master device transmits second transmission information to the slave device so that the slave device receives the second transmission information. When the slave device verifies the second device information to obtain a second verification result, and the second verification result is that verification is successful, the slave device can judge whether the slave device has joined other domains or not based on the second transmission information, and when the slave device has not joined other domains and joins the master device domain, communication transmission is realized between the master device and the slave device.
In addition, when the master device determines whether the slave device joins the other domain based on the first device information, and the slave device does not join the other domain, the master device may further determine whether the slave device joins the master device domain. When the slave device does not join the master device domain, the master device transmits second transmission information to the slave device so that the slave device receives the second transmission information. When the slave device verifies the second device information to obtain a second verification result, and the second verification result is that verification is successful, the slave device can judge whether the slave device has joined other domains or not based on the second transmission information, and when the slave device has not joined other domains and joins the master device domain, communication transmission is realized between the master device and the slave device.
The communication process realizes the authentication of the identity between the master device and the slave device and the receiving and transmitting of the data, so that the communication efficiency between the master device and the slave device is improved. In addition, the communication process is less affected by signal interference, so that the reliability and stability of communication between the master device and the slave device are improved.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating steps of a permission change according to an embodiment of the present application. As shown in fig. 5, the change of the authority of the slave device can be realized through steps S21 to S24.
Step S21: after the master device and the slave device discover each other, the master device receives first transmission information sent by the slave device.
Step S22: after the master device receives the first transmission information, the master device verifies the first device information to obtain a first verification result, and obtains corresponding response information based on the data information.
It should be noted that, for the description of step S21 and step S22, reference may be made to the above embodiments, and for avoiding repetition, the description is omitted here.
Step S23: and when the first verification result is that the verification is successful, the master device sends the second transmission information and the permission change information to the slave device so that the slave device receives the second transmission information and the permission change information.
Specifically, when the first verification result is that verification is successful, the identity of the slave device is legal. At this time, the master device may send the second transmission information and the permission change information to the slave device, so that the slave device receives the second transmission information and the permission change information.
It is understood that the slave device may make the rights change based on the rights change information.
Step S24: and when the slave device verifies the second device information to obtain a second verification result and the second verification result is that the verification is successful, the master device enables the slave device to conduct permission change based on the permission change information.
It will be appreciated that the slave device may verify the second device information to confirm that the identity of the master device is legitimate. Further, when the second verification result is that verification is successful, the identity of the master device is legal, and identity authentication between the master device and the slave device is achieved. Further, the slave device may perform the authority change based on the authority change information. Therefore, the process realizes the identity authentication between the master device and the slave device, the permission change of the slave device and the data receiving and transmitting at the same time. That is, communication transmission is realized between the master device and the slave device, and the above-mentioned process does not need to separately perform authentication of identity between the master device and the slave device, permission change of the slave device and data transmission and reception, so that the communication transmission efficiency of the master device and the slave device is high.
In the embodiment of the application, after the master device and the slave device discover each other, the master device can receive the first device information and the data information sent by the slave device. And the master device verifies the slave device based on the first device information to obtain a corresponding verification result, and obtains corresponding response information based on the data information. After the verification is successful, the master device sends the second transmission information and the permission change information to the slave device, so that the authentication between the master device and the slave device, the data receiving and transmitting and the permission change of the slave device can be realized. Therefore, the communication efficiency between the master device and the slave device is improved. In addition, the communication process is less affected by signal interference, so that the reliability and stability of communication between the master device and the slave device are improved.
With continued reference to fig. 6, fig. 6 is a schematic diagram illustrating steps of a master device sending second device information and rights modification information to a slave device according to an embodiment of the present application. As shown in fig. 6, the master device may transmit the second device information and the rights change information to the slave device through steps S231 to S233.
Step S231: and when the first verification result is that the verification is successful, the master device judges whether the slave device has joined other domains.
Specifically, the master device may determine whether the slave device has joined the other domain based on the first device information. For example, it may be determined whether or not the domain ID information of the slave device matches the domain ID information of the slave device, and when the domain ID information of the slave device does not match the domain ID information of the master device, it is indicated that the slave device has joined another domain.
Step S232: when the slave device does not join the other domain, the master device determines whether the slave device has joined the master domain.
Specifically, when the slave device does not join the other domain, the master device may also determine whether the slave device joins the master device domain based on the first device information. For example, it may be determined whether or not the slave device joins the master device domain based on the domain ID information of the slave device. Further, the master device sends second transmission information to the slave device when it is determined that the slave device does not join the master device domain.
It will be appreciated that the second transfer information may be used to cause the slave device to join the master device domain.
Step S233: when the slave device joins the master device domain, the master device transmits second device information and authority change information to the slave device.
Further, when the slave device joins the master device domain, it is indicated that normal communication transmission can be achieved between the master device and the slave device. At this time, the master device transmits the second device information and the authority change information to the slave device, so that the slave device can perform the authority change based on the authority change information.
In the embodiment of the application, when the slave device does not join other domains, the master device may determine whether the slave device joins the master device domain, and when the slave device joins the master device domain, the master device sends second transmission information and permission change information to the slave device, so that the slave device can perform permission change based on the permission change information, and communication transmission between the master device and the slave device is realized. Therefore, the normal communication between the slave device and the master device can be realized, and the probability of communication failure of the slave device and the master device caused by the fact that the slave device does not join the master device domain is prevented.
Optionally, when the slave device verifies the second device information to obtain a second verification result, and the second verification result is that verification is successful, the master device makes the slave device perform permission change based on the permission change information, including: when the slave device verifies the second device information to obtain a second verification result and the second verification result is that verification is successful, the master device enables the slave device to judge whether the slave device has joined other domains or not based on the second device information; when the slave device does not join other domains, the master device causes the slave device to perform the authority change based on the authority change information.
Specifically, when the slave device verifies the second device information to obtain a second verification result and the second verification result is verification success, the identity of the master device is legal, at this time, the master device makes the slave device determine whether the slave device has joined other domains based on the second device information, and when the slave device does not join other domains, the master device makes the slave device perform permission change based on the permission change information.
In the embodiment of the application, when the slave device judges that the slave device does not join other domains based on the second device information and the slave device joins the master device domain, communication transmission between the master device and the slave device can be realized. The method may further determine that the slave device joins the master device domain. Therefore, the normal communication between the slave device and the master device can be realized, and the probability of communication failure of the slave device and the master device caused by the fact that the slave device does not join the master device domain is prevented.
Optionally, after the master device causes the slave device to perform the permission change based on the permission change information when the slave device does not join the other domain, the method includes: the master device determines the result of permission change of the slave device; and when the result of the permission change of the slave device is failure, the master device resends the permission change information to the slave device.
In the embodiment of the application, the result of permission change of the slave device can also be determined through the master device. And when the result of the permission change of the slave device is failure, the permission change information is sent to the slave device again. Thus, the probability of failure of the permission change of the slave device can be reduced.
Referring to fig. 7, fig. 7 is a flow chart of a rights change shown in fig. 4. As shown in fig. 7, after the master device and the slave device discover each other, the slave device can send the first transmission information to the master device, so that the master device can receive the first transmission information. Wherein the first transmission information includes first device information and data information. The first device information is device information of the slave device, which includes device type information, device number, domain ID information, and the like.
Further, after the master device receives the first transmission information, the master device verifies the first device information to obtain a first verification result, and obtains corresponding response information based on the data information. And judging whether the slave device joins other domains based on the first device information, and further judging whether the slave device joins the master device domain when the slave device does not join the other domains. When the slave device does not join the master device domain, the master device transmits second device information and rights change information to the slave device, so that the slave device receives the second transmission information and the rights change information. When the slave device verifies the second device information to obtain a second verification result, and the second verification result is that verification is successful, the slave device can judge whether the slave device has joined other domains or not based on the second transmission information, and when the slave device has not joined other domains and joins the main device domain, the slave device can perform permission change operation based on permission change information. The process realizes the authentication between the master device and the slave device, the data receiving and transmitting and the modification of the authority of the slave device. Therefore, the communication efficiency between the master device and the slave device is improved. In addition, the communication process is less affected by signal interference, so that the reliability and stability of communication between the master device and the slave device are improved.
Referring to fig. 8, fig. 8 is a schematic block diagram of a communication device according to an embodiment of the present application, where the communication device may be configured in a server to perform the steps of the foregoing communication method.
As shown in fig. 8, the communication apparatus 200 includes: a sending module 201, a verification module 202 and a communication module 203.
A sending module 201, configured to receive, by the master device, first transmission information sent by the slave device after the master device and the slave device discover each other, where the first transmission information includes first device information and data information;
the verification module 202 is configured to verify the first device information to obtain a first verification result after the master device receives the first transmission information, and obtain corresponding response information based on the data information;
the sending module 201 is further configured to send, when the first verification result is that verification is successful, second transmission information to the slave device, so that the slave device receives the second transmission information, where the second transmission information includes second device information and the response information;
and the communication module 203 is configured to implement communication transmission between the master device and the slave device when the slave device verifies the second device information to obtain a second verification result and the second verification result is passed.
The sending module 201 is further configured to, when the first verification result is that verification is successful, determine whether the slave device has joined another domain; and when the slave device has joined the other domain, the master device sends the second transmission information to the slave device so that the slave device leaves the other domain based on the second transmission information.
The sending module 201 is further configured to, when the slave device does not join another domain, determine whether the slave device joins a master domain; and when the slave device does not join the master device domain, the master device sends the second transmission information to the slave device.
The communication module 203 is further configured to, when the slave device determines that the slave device does not join other domains based on the second device information, and the slave device joins the master device domain, implement communication transmission between the master device and the slave device.
The sending module 201 is further configured to send, when the first verification result is that verification is successful, second transmission information and permission change information to the slave device by the master device, so that the slave device receives the second transmission information and the permission change information
The communication module 203 is further configured to, when the slave device verifies the second device information to obtain a second verification result and the second verification result is that verification is successful, cause the slave device to perform permission change based on the permission change information.
The sending module 201 is further configured to, when the first verification result is that verification is successful, determine whether the slave device has joined another domain; when the slave device does not join other domains, the master device judges whether the slave device has joined the master device domain; and when the slave device joins the master device domain, the master device transmits the second device information and the permission change information to the slave device.
The communication module 203 is further configured to, when the slave device verifies the second device information to obtain a second verification result and the second verification result is that verification is successful, cause the slave device to determine whether the slave device has joined other domains based on the second device information; and when the slave device does not join other domains, the master device enables the slave device to conduct authority change based on the authority change information.
The communication module 203 is further configured to determine, by using the master device, a result of permission modification performed by the slave device; and when the result of the permission change of the slave device is failure, the master device resends the permission change information to the slave device.
It should be noted that, for convenience and brevity of description, specific working processes of the above-described apparatus and each module, unit may refer to corresponding processes in the foregoing method embodiments, which are not repeated herein.
The methods and apparatus of the present application are operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The above-described method, apparatus may be implemented, for example, in the form of a computer program that is executable on a device as shown in fig. 9.
Referring to fig. 9, fig. 9 is a schematic block diagram of an apparatus according to an embodiment of the present application. The device may be a server.
As shown in fig. 9, the device includes a processor, a memory, and a network interface connected by a system bus, wherein the memory may include a volatile storage medium, a non-volatile storage medium, and an internal memory.
The non-volatile storage medium may store an operating system and a computer program. The computer program comprises program instructions that, when executed, cause a processor to perform any one of a number of communication methods.
The processor is used to provide computing and control capabilities to support the operation of the entire device.
The internal memory provides an environment for the execution of a computer program in a non-volatile storage medium that, when executed by a processor, causes the processor to perform any one of a number of communication methods.
The network interface is used for network communication such as transmitting assigned tasks and the like. It will be appreciated by those skilled in the art that the structure of the apparatus is merely a block diagram of some of the structures associated with the aspects of the present application and is not limiting of the apparatus to which the aspects of the present application may be applied, and that a particular apparatus may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
It should be appreciated that the processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein in some embodiments the processor is configured to run a computer program stored in the memory to implement the steps of: after the master device and the slave device discover each other, the master device receives first transmission information sent by the slave device, wherein the first transmission information comprises first device information and data information; after the main equipment receives the first transmission information, the main equipment verifies the first equipment information to obtain a first verification result, and obtains corresponding response information based on the data information; when the first verification result is that verification is successful, the master device sends second transmission information to the slave device so that the slave device receives the second transmission information, wherein the second transmission information comprises second device information and response information; and when the slave equipment verifies the second equipment information to obtain a second verification result and the second verification result is that verification is successful, communication transmission is realized between the master equipment and the slave equipment.
In some embodiments, the processor is further configured to, when the first verification result is that verification is successful, determine, by the master device, whether the slave device has joined another domain; and when the slave device has joined the other domain, the master device sends the second transmission information to the slave device so that the slave device leaves the other domain based on the second transmission information.
In some embodiments, the processor is further configured to determine, when the slave device does not join the other domain, whether the slave device joins a master domain; and when the slave device does not join the master device domain, the master device sends the second transmission information to the slave device.
In some embodiments, the processor is further configured to implement a communication transmission between the master device and the slave device when the slave device determines that the slave device does not join the other domain based on the second device information, and the slave device joins the master device domain.
In some embodiments, the processor is further configured to send, when the first verification result is that verification is successful, second transmission information and rights change information to the slave device, so that the slave device receives the second transmission information and the rights change information; and when the slave device verifies the second device information to obtain a second verification result and the second verification result is that verification is successful, the master device enables the slave device to conduct permission change based on the permission change information.
In some embodiments, the processor is further configured to, when the first verification result is that verification is successful, determine, by the master device, whether the slave device has joined another domain; when the slave device does not join other domains, the master device judges whether the slave device has joined the master device domain; and when the slave device joins the master device domain, the master device transmits the second device information and the permission change information to the slave device.
In some embodiments, the processor is further configured to, when the slave device verifies the second device information to obtain a second verification result, and the second verification result is that verification is successful, cause the slave device to determine whether the slave device has joined to another domain based on the second device information; and when the slave device does not join other domains, the master device enables the slave device to conduct authority change based on the authority change information.
In some embodiments, the processor is further configured to determine, by the master device, a result of the slave device making the permission change; and when the result of the permission change of the slave device is failure, the master device resends the permission change information to the slave device.
The embodiment of the application also provides a computer readable storage medium, and a computer program is stored on the computer readable storage medium, and the computer program includes program instructions, and when the program instructions are executed, any one of the communication methods provided by the embodiment of the application is implemented.
The computer readable storage medium may be an internal storage unit of the device according to the foregoing embodiment, for example, a hard disk or a memory of the device. The computer readable storage medium may also be an external storage device of the device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the device.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like.
While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. A communication method, characterized by being applied to a communication system including a master device and at least one slave device, the master device and the slave devices being connectable by means of short-range wireless communication, the method comprising:
after the master device and the slave device discover each other, the master device receives first transmission information sent by the slave device, wherein the first transmission information comprises first device information and data information;
after the main equipment receives the first transmission information, the main equipment verifies the first equipment information to obtain a first verification result, and obtains corresponding response information based on the data information;
when the first verification result is that verification is successful, the master device sends second transmission information to the slave device so that the slave device receives the second transmission information, wherein the second transmission information comprises second device information and response information;
and when the slave equipment verifies the second equipment information to obtain a second verification result and the second verification result is that verification is successful, communication transmission is realized between the master equipment and the slave equipment.
2. The method according to claim 1, wherein when the first verification result is that verification is successful, the master device sends second transmission information to the slave device, including:
when the first verification result is that verification is successful, the master device judges whether the slave device has joined other domains;
and when the slave device has joined the other domain, the master device sends the second transmission information to the slave device so that the slave device leaves the other domain based on the second transmission information.
3. The method of claim 2, wherein after the master device determines whether the slave device has joined other domains, further comprising:
when the slave device does not join other domains, the master device judges whether the slave device joins a master device domain;
and when the slave device does not join the master device domain, the master device sends the second transmission information to the slave device.
4. The method according to claim 1, wherein after the slave device verifies the second device information to obtain a second verification result, and the second verification result is that verification is successful, comprising:
And when the slave device judges that the slave device does not join other domains based on the second device information and joins the master device domain, the master device and the slave device realize communication transmission.
5. The method of claim 4, wherein the first device information and the second device information comprise device type information, device number, domain ID information.
6. The method according to claim 1, wherein after the master device receives the first transmission information, the master device verifies the first device information to obtain the first verification result, and obtains corresponding response information based on the data information, and further comprising;
when the first verification result is that verification is successful, the master device sends second transmission information and authority change information to the slave device, so that the slave device receives the second transmission information and the authority change information;
and when the slave device verifies the second device information to obtain a second verification result and the second verification result is that verification is successful, the master device enables the slave device to conduct permission change based on the permission change information.
7. The method according to claim 6, wherein the master device sending second device information and rights change information to the slave device when the first verification result is that verification is successful, includes:
when the first verification result is that verification is successful, the master device judges whether the slave device has joined other domains;
when the slave device does not join other domains, the master device judges whether the slave device has joined the master device domain;
and when the slave device joins the master device domain, the master device transmits the second device information and the permission change information to the slave device.
8. The method according to claim 6, wherein when the slave device verifies the second device information to obtain a second verification result, and the second verification result is that verification is successful, the master device causes the slave device to perform the permission change based on the permission change information, including:
when the slave device verifies the second device information to obtain a second verification result and the second verification result is that verification is successful, the master device enables the slave device to judge whether the slave device has joined other domains or not based on the second device information;
And when the slave device does not join other domains, the master device enables the slave device to conduct authority change based on the authority change information.
9. The method according to claim 8, wherein the master device causes the slave device to make a rights change based on the rights change information when the slave device does not join the other domain, comprising:
the master device determines the result of permission change of the slave device;
and when the result of the permission change of the slave device is failure, the master device resends the permission change information to the slave device.
10. A communication device, the communication device comprising:
the sending module is used for receiving first transmission information sent by the slave equipment after the master equipment and the slave equipment are mutually discovered, wherein the first transmission information comprises first equipment information and data information;
the verification module is used for verifying the first equipment information by the master equipment after the first transmission information is received by the master equipment to obtain a first verification result and obtaining corresponding response information based on the data information;
The sending module is further configured to send second transmission information to the slave device when the first verification result is that verification is successful, so that the slave device receives the second transmission information, where the second transmission information includes second device information and the response information;
and the communication module is used for realizing communication transmission between the master device and the slave device when the slave device verifies the second device information to obtain a second verification result and the second verification result is verification success.
11. An apparatus, comprising: a memory and a processor; wherein the memory is connected to the processor for storing a program and the processor is adapted to implement the steps of the communication method according to any one of claims 1-9 by running the program stored in the memory.
12. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when executed by a processor, causes the processor to implement the steps of the communication method according to any one of claims 1-9.
CN202310325137.3A 2023-03-23 2023-03-23 Communication method, communication device, apparatus, and storage medium Pending CN116437346A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310325137.3A CN116437346A (en) 2023-03-23 2023-03-23 Communication method, communication device, apparatus, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310325137.3A CN116437346A (en) 2023-03-23 2023-03-23 Communication method, communication device, apparatus, and storage medium

Publications (1)

Publication Number Publication Date
CN116437346A true CN116437346A (en) 2023-07-14

Family

ID=87093744

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310325137.3A Pending CN116437346A (en) 2023-03-23 2023-03-23 Communication method, communication device, apparatus, and storage medium

Country Status (1)

Country Link
CN (1) CN116437346A (en)

Similar Documents

Publication Publication Date Title
CN105992306B (en) Binding method of terminal and home gateway
CN101406020B (en) Methods, apparatuses and software for authentication of devices temporarily provided with a SIM to store a challenge-response
US20030172271A1 (en) Apparatus and method for wireless device set-up and authentication using audio authentication_information
CN101527630B (en) Method, server and system for manufacturing certificate remotely
US20140302779A1 (en) Method, device and system for establishing conversation relationship
CN105408910A (en) Systems and methods for authenticating access to operating system by user before the operating system is booted using wireless communication token
CN102801616A (en) Message sending and receiving method, device and system
EP2365673A2 (en) Electronic apparatus and terminal
KR20100077914A (en) Wireless communication device and method of controlling the same
CN111464653B (en) Method, system and device for interconnecting vehicle-mounted equipment
CN116889001A (en) Digital key authentication method, mobile terminal and computer storage medium
CN116437346A (en) Communication method, communication device, apparatus, and storage medium
CN111666590A (en) Distributed file secure transmission method, device and system
US20220104102A1 (en) Proximity device network
US20190172051A1 (en) Electronic device and method for processing remote payment
EP4274309A1 (en) Electronic device for performing network management operation, and operating method therefor
CN110191438B (en) Authentication method for vehicle-to-vehicle communication and related product
CN113014610B (en) Remote access method, device and system
CN105046136A (en) Identity card information obtaining method, terminal and identity card information obtaining system
CN107425975B (en) Communication device and method executed by communication device
CN116614867A (en) Data transmission method, data transmission device, equipment and storage medium
CN114726505B (en) Vehicle remote security authentication method and device, storage medium and terminal equipment
CN117354800A (en) Communication method, terminal equipment and computer readable storage medium
TWI434529B (en) System and method for providing secure connection to near field communication devices
CN116996878A (en) Equipment networking method, device, equipment and medium based on digital twin platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination