WO2022042740A1 - 一种数据传输方法及电子设备 - Google Patents

一种数据传输方法及电子设备 Download PDF

Info

Publication number
WO2022042740A1
WO2022042740A1 PCT/CN2021/115541 CN2021115541W WO2022042740A1 WO 2022042740 A1 WO2022042740 A1 WO 2022042740A1 CN 2021115541 W CN2021115541 W CN 2021115541W WO 2022042740 A1 WO2022042740 A1 WO 2022042740A1
Authority
WO
WIPO (PCT)
Prior art keywords
antenna
electronic device
message
specific data
transmission
Prior art date
Application number
PCT/CN2021/115541
Other languages
English (en)
French (fr)
Inventor
劳成彪
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022042740A1 publication Critical patent/WO2022042740A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/02Transmitters
    • H04B1/04Circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0602Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using antenna switching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation

Definitions

  • the present application relates to the technical field of the Internet of Things, and in particular, to a data transmission method and an electronic device.
  • a third-party device for example, a device installed with cloned application software, or a gateway device, or a server
  • the device that sends data first establishes a connection with the third-party device, and sends the data to be sent to the third-party device.
  • the third-party device establishes a connection with the device that receives the data, and forwards the data to be sent to the device that receives the data.
  • the user needs to perform multiple connections, export and import of data on multiple devices, and the operations are cumbersome.
  • the data to be transmitted is sensitive data such as distribution network information, device configuration information, and user data, there is a risk of leakage when the data to be transmitted is exported and cached on a third-party device.
  • the data transmission method and electronic device provided by the present application can simplify the complexity of user operations and at the same time improve the security of data transmission.
  • an electronic device for data transmission includes: one or more processors; one or more memories; a first antenna; a second antenna, and the transmission distance of the second antenna is less than or equal to a preset safe transmission distance; wherein, the The first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; or, the first antenna and the second antenna are the same antenna, and the second antenna the transmit power of the antenna configuration is less than the transmit power of the first antenna configuration; and one or more computer programs, wherein the one or more computer programs are stored on the one or more memories when the computer programs are
  • the one or more processors when executed, cause the electronic device to perform the steps of: receiving an input; in response to the input, sending a first message through the first antenna with a first cycle; receiving another a second message of the electronic device; in response to the second message, switching to the second antenna, and sending a third message at a second cycle through the second antenna; wherein the third message includes specific
  • an electronic device for data transmission includes: one or more processors; one or more memories; a first antenna; a second antenna, and the transmission distance of the second antenna is less than or equal to a preset safe transmission distance; wherein, the The first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; or, the first antenna and the second antenna are the same antenna, and the second antenna the transmit power of the antenna configuration is less than the transmit power of the first antenna configuration; and one or more computer programs, wherein the one or more computer programs are stored on the one or more memories when the computer programs are
  • the one or more processors when executed, cause the electronic device to perform the steps of: receiving an input; in response to the input, sending a first message through the first antenna with a first cycle; receiving another A second message of the electronic device; in response to the second message, obtaining a first random number from the second message, generating a second random number, and switching to the second antenna, through the second
  • the security of communication can be improved, and the process of key negotiation can be simplified, thereby realizing fast transmission of specific data.
  • the user does not need to manually input information such as verification codes during the key negotiation process, which also reduces the complexity of user operations.
  • the electronic device after receiving the message that the transmission of the specific data is successful from the other electronic device, or after sending the fourth message, it is prompted that the transmission of the specific data is successful.
  • the electronic device prompts, so that the user of the electronic device can learn that the transmission is successful.
  • the encrypting the specific data by using the session key, and sending a fourth message to the other electronic device specifically includes: switching to the first antenna of the electronic device, and the fourth message is sent through the first antenna of the electronic device.
  • the electronic device further performs: the fourth message further includes the first complete check value of the specific data.
  • the fourth message further includes the first complete check value of the specific data.
  • the prompting that the specific data is successfully transmitted includes: displaying a message that the specific data is successfully transmitted, and/or playing a message that the specific data is successfully transmitted. voice. In this way, the specific form of prompting a specific data transmission project is refined.
  • the specific data includes at least one of configuration information and user data; wherein the configuration information includes network configuration information, sensor alarm threshold setting information, One or more of alarm trigger action information, silent time setting information, timer setting information, firmware upgrade setting information and power consumption threshold setting information; the user data includes application program installation data, which is stored on the electronic device one or more of the photos, videos, audio recordings and documents of the electronic device, as well as the operating log of the electronic device. In this way, specific information for some specific data is listed.
  • an electronic device in a third aspect, includes: one or more processors; one or more memories; a first antenna; a second antenna, and the transmission distance of the second antenna is less than or equal to a preset safe transmission distance; wherein, the The first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; or, the first antenna and the second antenna are the same antenna, and the second antenna the transmit power of the antenna configuration is less than the transmit power of the first antenna configuration; and one or more computer programs, wherein the one or more computer programs are stored on the one or more memories when the computer programs are When executed by the one or more processors, the electronic device performs the following operations: receiving an input; receiving a first message from another electronic device; switching to the second message in response to the first message an antenna, generating a first random number, and sending a second message including the first random number at a second cycle through the second antenna; receiving a third message from the other electronic device; in response to the third message,
  • the electronic device further performs: receiving the first complete check value of the specific data sent by the other electronic device, calculating the specific data a second complete check value of the data; after the second complete check value is equal to the first complete check value, send a message that the specific data transmission is successful to the other electronic device. Therefore, by calculating a complete check value for the specific data, it is further ensured that the specific data has not been tampered with, and the security of data transmission is improved.
  • sending the message that the specific data transmission is successful to the other electronic device specifically includes: switching to the first antenna, using the first antenna The antenna sends a message that the specific data transmission was successful. In this way, the specific transmission mode is refined.
  • an electronic device is provided.
  • the electronic device is not connected to a routing device or a hotspot, and the electronic device includes: one or more processors; one or more memories; a first antenna; and a second antenna, and the transmission distance of the second antenna is less than is equal to the preset safe transmission distance; wherein, the first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; or, the first antenna and the The second antenna is the same antenna, and the transmit power of the second antenna configuration is less than the transmit power of the first antenna configuration; and one or more computer programs, wherein the one or more computer programs are stored in the one On or more memories, the computer program, when executed by the one or more processors, causes the electronic device to perform the following operations: receiving an input; receiving a first message from another electronic device; responding to The first message is switched to the second antenna, and a second message is sent through the second antenna; wherein the second message includes specific data of the electronic device; all information received from the other
  • an electronic device is provided.
  • the electronic device is not connected to a routing device or a hotspot, and the electronic device includes: one or more processors; one or more memories; a first antenna; and a second antenna, and the transmission distance of the second antenna is less than is equal to the preset safe transmission distance; wherein, the first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; or, the first antenna and the The second antenna is the same antenna, and the transmit power of the second antenna configuration is less than the transmit power of the first antenna configuration; and one or more computer programs, wherein the one or more computer programs are stored in the one On or more memories, the computer program, when executed by the one or more processors, causes the electronic device to perform the following operations: receiving an input; receiving a first message from another electronic device; responding to the first message, switching to the second antenna, and sending a second message through the second antenna; receiving a response message to the second message from the other electronic device; responding to the response message
  • the security of communication can be improved, and the process of key negotiation can be simplified, thereby realizing fast transmission of specific data.
  • the user does not need to manually input information such as verification codes during the key negotiation process, which also reduces the complexity of user operations.
  • the second message includes a session key
  • the third message includes specific data encrypted with the session key. In this way, the security is further increased by means of a key.
  • the session key is preset; the specific data is a log of the electronic device. In this way, the specific form of specific data is refined.
  • a data transmission method is provided.
  • the method is applied to an electronic device, the electronic device comprising: one or more processors; one or more memories; a first antenna; The set safe transmission distance; wherein, the first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; or, the first antenna and the second antenna are different.
  • the antennas are the same antenna, and the transmit power of the second antenna configuration is smaller than the transmit power of the first antenna configuration; the method includes: receiving an input; in response to the input, using the first antenna to Send a first message in a cycle; receive a second message from another electronic device; in response to the second message, switch to the second antenna, and send a third message through the second antenna in a second cycle; Wherein, the third message includes specific data; after receiving the message that the specific data is successfully transmitted from the other electronic device, or after sending the third message, prompting that the specific data is successfully transmitted.
  • a data transmission method is provided.
  • the method is applied to an electronic device, and the electronic device includes: one or more processors; one or more memories; a first antenna; a second antenna, and the transmission distance of the second antenna is less than or equal to a preset Safe transmission distance; wherein, the first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; or, the first antenna and the second antenna are the same antenna, and the transmit power of the second antenna configuration is less than the transmit power of the first antenna configuration; the method includes: receiving an input; in response to the input, passing through the first antenna at a first cycle Send a first message; receive a second message from another electronic device; in response to the second message, obtain a first random number from the second message, generate a second random number, and switch to the first random number Two antennas, sending a third message containing the second random number through the second antenna; generating a session key according to the first random number and the second random number, and using the session
  • the seventh aspect after receiving the message that the transmission of the specific data is successful from the other electronic device, or after sending the fourth message, it is prompted that the transmission of the specific data is successful.
  • the use of the session key to encrypt the specific data and sending a fourth message to the other electronic device specifically includes: switching to the first antenna of the electronic device, and the fourth message is sent through the first antenna of the electronic device.
  • the method further includes: the fourth message further includes a first complete check value of the specific data.
  • the prompting that the specific data is successfully transmitted includes: displaying a message that the specific data is successfully transmitted, and/or playing a message that the specific data is successfully transmitted. 's voice.
  • the specific data includes at least one of configuration information and user data; wherein the configuration information includes network configuration information, sensor alarm threshold setting information, One or more of alarm trigger action information, silent time setting information, timer setting information, firmware upgrade setting information and power consumption threshold setting information; the user data includes application program installation data, which is stored on the electronic device one or more of the photos, videos, audio recordings and documents of the electronic device, as well as the operating log of the electronic device.
  • a data transmission method is provided.
  • the method is applied to an electronic device, and the electronic device includes: one or more processors; one or more memories; a first antenna; a second antenna, and the transmission distance of the second antenna is less than or equal to a preset Safe transmission distance; wherein, the first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; or, the first antenna and the second antenna are the same antenna, and the transmit power of the second antenna configuration is less than the transmit power of the first antenna configuration; the method includes: receiving an input; receiving a first message from another electronic device; a message, switch to the second antenna, generate a first random number, and send a second message including the first random number in a second cycle through the second antenna; receiving the first random number from the other electronic device three messages; in response to the third message, obtaining the second random number from the third message, and generating a session key according to the first random number and the second random number; receiving the A fourth message of another electronic device
  • the method further includes: receiving a first complete check value of the specific data sent by the other electronic device, and calculating a second complete check value of the specific data; After the two complete check values are equal to the first complete check value, a message that the specific data is successfully transmitted is sent to the other electronic device.
  • sending the message that the specific data transmission is successful to the other electronic device specifically includes: switching to the first antenna, using the first antenna The antenna sends a message that the specific data transmission was successful.
  • a data transmission method is provided.
  • the method is applied to an electronic device that is not connected to a routing device or a hotspot, the electronic device comprising: one or more processors; one or more memories; a first antenna; a second antenna , the transmission distance of the second antenna is less than or equal to a preset safe transmission distance; wherein, the first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; Alternatively, the first antenna and the second antenna are the same antenna, and the transmit power of the second antenna configuration is less than the transmit power of the first antenna configuration; the method includes: receiving an input; receiving A first message of another electronic device; switching to the second antenna in response to the first message, and sending a second message through the second antenna; wherein the second message includes specific data of the electronic device ; after receiving the message that the specific data is successfully transmitted from the other electronic device, or after sending the second message, prompting that the specific data is successfully transmitted.
  • a tenth aspect provides a data transmission method.
  • the method is applied to an electronic device that is not connected to a routing device or a hotspot, the electronic device comprising: one or more processors; one or more memories; a first antenna; a second antenna , the transmission distance of the second antenna is less than or equal to a preset safe transmission distance; wherein, the first antenna and the second antenna are different antennas, and the transmission distance of the second antenna is smaller than the transmission distance of the first antenna; Alternatively, the first antenna and the second antenna are the same antenna, and the transmit power of the second antenna configuration is less than the transmit power of the first antenna configuration; the method includes: receiving an input; receiving a first message of another electronic device; switching to the second antenna in response to the first message, and sending a second message through the second antenna; receiving a message from the other electronic device for the first Two-message response message; switching to the first antenna in response to the response message, and sending a third message containing specific data through the first antenna; receiving the specific data of the other electronic device
  • the second message includes a session key
  • the third message includes specific data encrypted with the session key
  • the session key is preset; the specific data is a log of the electronic device.
  • any implementation manner and corresponding technical effect of the tenth aspect and the tenth aspect reference may be made to any one implementation manner and corresponding technical effect of the above-mentioned corresponding aspects and corresponding aspects, which will not be repeated here.
  • a computer-readable storage medium includes a computer program that, when executed on an electronic device, causes the electronic device to perform any one of the implementations of the sixth aspect and the sixth aspect, the seventh aspect and the seventh aspect Any implementation of the aspect, any implementation of the eighth aspect and the eighth aspect, any implementation of the ninth aspect and the ninth aspect, or any implementation of the tenth aspect and the tenth aspect. method.
  • a twelfth aspect provides a computer program product that, when run on a computer, causes the computer to execute any one of the implementations of the sixth aspect and the sixth aspect, and any one of the seventh aspect and the seventh aspect An implementation manner, any one of the eighth aspect and the eighth aspect, any one of the ninth aspect and the ninth aspect, and the tenth aspect and any one of the tenth aspect.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application
  • FIG. 2 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a data transmission provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of data transmission according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a data transmission provided by an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of data transmission according to an embodiment of the present application.
  • FIG. 8 is a schematic diagram of some graphical user interfaces of an electronic device provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a chip system provided by an embodiment of the present application.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application. As shown in FIG. 1 , the first electronic device 100 and the second electronic device 200 can perform wireless communication.
  • the first electronic device 100 may be a mobile device, a household appliance, a sensor device, or the like.
  • the first electronic device 100 may be a mobile phone, a tablet computer, a personal computer (PC), a personal digital assistant (PDA), a netbook, a wearable device (such as a smart watch, a smart bracelet), an enhanced Augmented reality (AR) devices, virtual reality (VR) devices, in-vehicle devices, smart screens, smart speakers, smart cameras and other mobile devices.
  • AR Augmented reality
  • VR virtual reality
  • the first electronic device 100 may be a smart refrigerator, a smart TV, a smart lamp, a smart socket, a smart air purifier, a humidifier, a smart range hood, a smart door lock, a smart power strip, a smart induction cooker, a smart fan, a smart Smart home appliances such as disinfection boxes and smart aromatherapy machines.
  • the first electronic device 100 may also be a smoke sensor, a gas sensor, a human body sensor, a temperature sensor, a humidity sensor, a door and window sensor, a PM2.5 air sensor, a door and window switch sensor, an emergency button, an alarm and other sensor devices.
  • the second electronic device 200 may also be any one of a mobile device, a home appliance or a sensor device. The embodiments of the present application do not limit the specific forms of the first electronic device 100 and the second electronic device 200 .
  • the structure of the first electronic device 100 will be described below. It should be noted that the second electronic device 200 may also refer to the structure of the first electronic device 100, but the second electronic device 200 may include more or less components than the first electronic device 100, or combine certain components, or Split some parts, or different parts arrangement.
  • the second electronic device 200 may be an electronic device in the same form as the first electronic device 100 , or may be an electronic device in a different form, which is not limited in this embodiment of the present application.
  • FIG. 2 is a schematic structural diagram of a first electronic device 100 according to an embodiment of the present application.
  • the first electronic device 100 may include one or more processors 110, one or more memories 120, one or more communication interfaces 130, a wireless communication module 140, one or more antennas, and the like.
  • the processor 110, the memory 120, the communication interface 130, and the wireless communication module 140 are connected through a bus.
  • the processor 110 may be a general-purpose central processing unit (Central Processing Unit, CPU), a microprocessor, an application-specific integrated circuit (Application-Specific Integrated Circuit, ASIC), or an integrated circuit for controlling the execution of the program of the present application, etc. .
  • the processor 110 may include multiple CPUs, and the processor 110 may be a single-CPU processor or a multi-CPU processor.
  • a processor in a single-core processor or a multi-core processor may refer to one or more devices, circuits, or processing cores for processing data, such as computer program instructions.
  • the memory 120 may be used to store computer executable program code including instructions.
  • the internal memory may include a program storage area and a data storage area.
  • the storage program area may store the operating system and the programs or instructions required by the embodiments of the present application, and the like.
  • the communication interface 130 can be used to communicate with other devices or communication networks, such as Ethernet, wireless local area networks (WLAN) and the like.
  • the first electronic device 100 may also not include the communication interface 130, which is not limited in this embodiment of the present application.
  • the wireless communication module 140 may provide a wireless communication solution including WLAN (eg Wi-Fi network), Bluetooth, NFC, infrared technology, etc. applied on the first electronic device 100 .
  • the wireless communication module 140 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 140 receives electromagnetic waves via the antenna, frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 140 can also receive the signal to be sent from the processor 110, frequency-modulate the signal, amplify the signal, and radiate it into electromagnetic waves through the antenna.
  • the first electronic device 100 includes at least two antennas, such as Antenna 1 (a first antenna, also referred to as a strong antenna) and Antenna 2 (a second antenna, also referred to as a weak antenna) ).
  • the wireless communication module 140 can switch between the antenna 1 and the antenna 2 .
  • the transmit power applied to Antenna 1 or Antenna 2 is the same.
  • the transmission distance of the antenna 1 is the first distance.
  • the transmission distance of the antenna 2 is the second distance.
  • the second distance is smaller than the first distance.
  • the wireless communication module 140 when the wireless communication module 140 switches to the antenna 1 to transmit the wireless signal, the electronic device within the first distance (eg, the first distance is 6m, 8m, 10m) of the first electronic device 100 can receive the wireless signal.
  • the wireless communication module 140 switches to the antenna 2 to transmit the wireless signal, the electronic devices within the second distance (eg, the second distance is 30 cm) of the first electronic device 100 can receive the wireless signal.
  • the second distance is less than or equal to a preset safety distance.
  • the preset safety distance is smaller than the first distance.
  • the first distance, the second distance, and the preset safety distance can all be adjusted by the user according to their needs.
  • the second distance may be a preset safety distance.
  • the wireless communication module 140 can be controlled to be connected to the antenna 2 to send an ultra-short-range wireless signal.
  • the wireless communication module 140 can be controlled to be connected to the antenna 1 to send normal wireless signals.
  • the first electronic device 100 may include a variable resistance circuit module 150 and an antenna.
  • the variable resistance circuit module 150 can change the resistance value under the control of the wireless communication module 140, thereby changing the transmission distance of the same antenna. That is, when the resistance value of the variable resistance circuit module 150 is adjusted to the resistance value 1, the transmission power of the antenna is the first transmission power (higher transmission power), and the transmission distance of the antenna is the first distance. At this time, electronic devices located within a first distance (eg, the first distance is 6m, 8m, 10m) of the first electronic device 100 can receive the wireless signal.
  • a first distance eg, the first distance is 6m, 8m, 10m
  • the transmission power of the antenna is the second transmission power (lower transmission power), and the transmission distance of the antenna is the second distance.
  • the second transmit power is smaller than the first transmit power.
  • the second distance is less than or equal to a preset safety distance.
  • the preset safety distance is smaller than the first distance.
  • the first distance, the second distance, and the preset safety distance can all be adjusted by the user according to their needs.
  • the second distance may be a preset safety distance.
  • the resistance value of the variable resistance circuit module 150 can be controlled to be adjusted to a resistance value of 2, so as to send an ultra-short-range wireless signal.
  • the resistance value of the variable resistance circuit module 150 can be controlled to be adjusted to a resistance value of 1, so as to transmit normal wireless signals.
  • the resistance value of the variable resistance circuit module 150 is adjusted to a resistance value of 1, the first electronic device 100 is connected to the first antenna.
  • the resistance value of the variable resistance circuit module 150 is adjusted to a resistance value of 2
  • the first electronic device 100 is connected to the second antenna; the first antenna and the second antenna are the same, but the transmission distance of the first antenna is greater than that of the second antenna. Transmission distance; the transmission distance of the second antenna is less than or equal to the preset safety distance, and the transmission distance of the first antenna is greater than the preset safety distance.
  • the transmission distance of the first antenna and the transmission distance of the second antenna are the above-mentioned first distance and second distance, respectively.
  • the wireless communication mode adopted by the above-mentioned wireless communication module 140 may specifically adopt a mode such as BLE, Wi-Fi Aware, and the like.
  • the wireless communication method is based on the interaction of the computer network MAC (Medium Access Control, media access control) layer, also known as the data link layer protocol extension, and does not need to involve the upper-layer network communication of the MAC layer. Data interaction can be fully realized.
  • BLE is an ultra-low-power short-range wireless communication scheme for device B launched by the Bluetooth Special Interest Group in 2016, which can realize communication through the MAC layer.
  • Wi-Fi Aware Wi-Fi Neighborhood Aware Network, Wi-Fi Neighborhood Aware Network, also known as Wi-Fi Neighborhood Aware Network, NAN for short
  • Wi-Fi Neighborhood Aware Network is a new type of low-power point-to-point interconnection Wi-Fi Mesh communication
  • This technology can bypass the network infrastructure (such as access point (AP) or cellular network), and realize one-to-one, one-to-many or many-to-many connection communication between devices, which can also pass through the MAC layer. achieve communication. Understandably, the higher the number of layers of the computer network involved, the harder it is to ensure its security.
  • the wireless-based MAC layer communication adopted in this embodiment enables data to interact based on the extension of the data link layer protocol, which can significantly improve the security of data transmission.
  • the technical solutions involved in the following embodiments can all be implemented in the first electronic device 100 and the second electronic device 200 having the above-mentioned structures.
  • the first electronic device and the second electronic device each include a first antenna and a second antenna.
  • FIG. 4 is a schematic flowchart of a data transmission method according to an embodiment of the present application. As shown in Figure 4, the method includes:
  • the first electronic device receives an input.
  • the second electronic device receives an input.
  • the first electronic device receives an input for instructing the first electronic device to send specific data.
  • the input can be user input or instructions sent by other devices.
  • the user input includes the user operating a specific key, inputting a voice command, a specific touch operation, a specific space gesture, and the like.
  • the second electronic device receives an input for instructing the second electronic device to receive specific data.
  • the input can be user input or instructions sent by other devices.
  • the user input includes the user operating a specific key, inputting a voice command, a specific touch operation, a specific space gesture, and the like.
  • the first electronic device stores configuration information
  • the configuration information includes but is not limited to network settings, sensor alarm threshold settings, alarm triggering actions, silent time settings, timer settings, firmware upgrade settings, power consumption threshold settings, etc.
  • the network distribution information includes, for example, the identification of the Wi-Fi network (for example, the Service Set Identifier (SSID) and the password and other information.
  • SSID Service Set Identifier
  • the configuration information varies with the device type, model, etc. of the first electronic device. Different.
  • the second electronic device is a device that has not been set. Wherein, the first electronic device receives an input, which can be an operation instructing the first electronic device to send configuration information to the second electronic device. A predefined operation 1 is executed on the electronic device.
  • the predefined operation 1 is, for example, pressing a specific key (physical key or virtual key) on the first electronic device.
  • the configuration information of the first electronic device is the specific key
  • the second electronic device receives an input, which can be a predefined operation 2 performed by the user on the second electronic device.
  • the predefined operation 2 is, for example, an operation of turning on the second electronic device or instructing to set the second electronic device.
  • the first electronic device and the second electronic device have the same device type and the same model or are similar. Then, the configuration information of the first electronic device can be sent to the second electronic device, and the second electronic device can directly perform settings according to the received configuration information. As another example, the device types of the first electronic device and the second electronic device are different. Part of the configuration information in the first electronic device can be sent to the second electronic device, and the second electronic device can perform the device directly according to the received part of the configuration information. For example, when the first electronic device and the second electronic device need to access the same network, the second electronic device can also directly use the configuration information of the network settings of the first electronic device.
  • the first electronic device is an old device used by the user
  • the second electronic device is a new device to be replaced by the user.
  • the first electronic device receives an input, for example, an operation instructing the first electronic device to send configuration information and/or user data to the second electronic device.
  • the specific data is configuration information and/or user data of the first electronic device.
  • the user data includes but is not limited to the information of the application program installed on the first electronic device, and the basic settings of the installed application program, photos, videos, recordings, and files stored on the first electronic device, and the operation log of the first electronic device. Wait.
  • the second electronic device receives an input such as an operation of turning on the wireless function for the user or an operation of instructing to receive specific data.
  • the first electronic device sends the first message in the first cycle through the first antenna.
  • the first message is used to request to send specific data to the second electronic device, so as to negotiate a session key with the second electronic device.
  • the first electronic device may broadcast the request through wireless means such as Wi-Fi or Bluetooth.
  • wireless means such as Wi-Fi or Bluetooth.
  • Wi-Fi Wireless Fidelity
  • Bluetooth Wireless Fidelity
  • the NAN mechanism is a standard developed by the Wi-Fi Alliance. This standard is that all devices participating in the NAN mechanism (ie, NAN devices, such as the first electronic device and the second electronic device) are synchronized without a central node.
  • the maintenance work of the NAN mechanism and the service discovery work are performed in the discovery window (discovery window, DW) agreed by the NAN mechanism.
  • the service discovery may be implemented by sending a service discovery frame (service discovery frame, SDF) message.
  • the server discovery frame message includes a query message or a broadcast message.
  • the NAN device can establish a corresponding connection based on the information obtained in the service discovery message, and then intelligently manage it based on the NAN.
  • the SDF message is an action frame specially defined for service discovery. According to different functions, SDF message frames can be roughly divided into three types, SDF publish (publish) message, SDF subscribe (subscribe) message and SDF reply (follow-up) message.
  • SDF publish message is used to publish the services that the NAN device can provide, or to reply to the NAN subscribe message sent by other NAN devices.
  • a NAN subscribe message is used to find services to use.
  • the SDF follow-up message is used to reply to the received SDF publish message, or to negotiate more information.
  • an indication is included in the SDF message to indicate which SDF message the message belongs to.
  • the first electronic device may carry information such as a service identifier for transmitting specific data, an identifier of the first electronic device, and the like in the SDF publish message.
  • the first electronic device may carry information such as a service identifier for transmitting specific data, an identifier of the first electronic device, and the like through the BLE beacon.
  • the first electronic device can acquire the identifier of the second electronic device or the address of the second electronic device, and can also send the first message in a peer-to-peer manner.
  • the first electronic device may send the first message in a first cycle within a preset time period, or may send the first message a preset number of times within a preset time period. This embodiment of the present application does not limit this.
  • the second electronic device receives the first message and switches to the second antenna of the second electronic device.
  • the second electronic device generates a first random number, and generates a second message according to the first random number.
  • the second electronic device after receiving the request for transmitting specific data sent by the first electronic device, the second electronic device generates first random data for negotiating a session key with the second electronic device.
  • the second electronic device sends the second message in the second cycle through the second antenna.
  • the second electronic device can control the wireless communication module 140 to connect to the second antenna.
  • the second electronic device controls the resistance value of the variable resistance circuit module 150 to be the second resistance value (larger resistance value), so that the The antenna transmit power is the second transmit power.
  • the second electronic device may carry the first random number in the SDF Follow-up message.
  • the second electronic device may carry the first random number in the BLE beacon.
  • the second message sent by the second electronic device through the second antenna can only be received by the electronic device within a very short distance range (for example, 30 cm) from the second electronic device. Therefore, it can be guaranteed that the electronic device that receives the second message is a trusted device of the second electronic device.
  • a voice prompt or a flashing light may be used to prompt the user to bring the first electronic device close to the second electronic device.
  • the second electronic device may also prompt the user at other times, for example, after receiving the first message sent by the first electronic device.
  • the user may also be prompted by the first electronic device to approach the second electronic device.
  • the embodiments of the present application do not limit the prompting manner, prompting timing, and the like.
  • the first electronic device receives the second message and acquires the first random number.
  • the first electronic device switches to the second antenna of the first electronic device.
  • the first electronic device generates a second random number, and generates a third message according to the second random number.
  • the first electronic device sends a third message through the second antenna.
  • the process of sending the third message by the first electronic device is the same as or similar to the process of sending the second message by the second electronic device, and details are not repeated here.
  • the first electronic device may carry the second random number in the SDF follow-up message.
  • the first electronic device may carry the second random number in the BLE beacon.
  • the first electronic device generates a session key according to the first random number and the second random number.
  • the first electronic device may use a predefined algorithm or a key derivation function (key derivation function, KDF) in cryptography to calculate the session key.
  • KDF key derivation function
  • the predefined algorithms include but are not limited to data splicing, data encoding format conversion, data location conversion, hash (HASH) operation (such as MD5/SHA-1, etc.) and the like.
  • KDF algorithms include, for example, PBKDF2, bcrypt, scrypt, HKDF (HMAC-based KDF), and the like. This embodiment of the present application does not limit the specific method for generating the session key according to the first random number and the second random number.
  • the first electronic device switches to the first antenna of the first electronic device.
  • the first electronic device can control the wireless communication module 140 to connect to the first antenna.
  • the first electronic device controls the resistance value of the variable resistance circuit module 150 to be the first resistance value (smaller resistance value), so that the The antenna transmit power is the first transmit power.
  • the first electronic device may also switch to the first antenna at other times. For example, after performing S409, that is, after sending the third message, the first electronic device switches back to the first antenna. For another example, before performing S413, that is, before sending the fourth message to the second electronic device through the first antenna to the first electronic device, the first electronic device switches back to the first antenna. This embodiment of the present application does not limit this.
  • the first electronic device encrypts specific data of the first electronic device using the session key, obtains encrypted data, and generates a fourth message according to the encrypted data.
  • the first electronic device uses a certain encryption algorithm to encrypt the specific data with the session key, and generates signature or integrity verification information of the specific data, so as to ensure the security of transmitting the specific data and avoid the leakage of the specific data.
  • the second electronic device executes S410'-S412'. Details as follows:
  • the second electronic device within the transmission distance of the second antenna of the first electronic device, the second electronic device receives the third message, and obtains the second random number.
  • the second electronic device switches to the first antenna of the second electronic device.
  • the second electronic device can control the wireless communication module 140 to connect to the first antenna.
  • the second electronic device controls the resistance value of the variable resistance circuit module 150 to be the first resistance value (smaller resistance value), so that the second electronic device The antenna transmit power of is the first transmit power.
  • the second electronic device may also switch to the first antenna at other times. For example, after performing S405, that is, after sending the second message, the second electronic device switches back to the first antenna. For another example, before performing S416, that is, before the second electronic device sends a message that the specific data transmission is successful to the first electronic device through the first antenna, the second electronic device switches back to the first antenna. This embodiment of the present application does not limit this.
  • the second electronic device generates a session key according to the first random number and the second random number.
  • the algorithm used by the second electronic device to generate the session key here is the same as the algorithm used by the first electronic device to generate the session key, so that the session keys generated by the two electronic devices are the same. Furthermore, the generated session key can be used to decrypt the data sent by the peer electronic device.
  • the first electronic device sends a fourth message through the first antenna.
  • the first electronic device may broadcast and transmit encrypted specific data through a wireless connection (eg, Wi-Fi or Bluetooth).
  • a wireless connection eg, Wi-Fi or Bluetooth
  • the second electronic device may carry encrypted specific data in the SDF Follow-up message or in the BLE beacon.
  • the first electronic device establishes a point-to-point wireless connection (eg, Wi-Fi or Bluetooth) with the second electronic device, and sends encrypted specific data to the second electronic device through the wireless connection.
  • the second electronic device receives the fourth message and obtains encrypted data.
  • the second electronic device decrypts the encrypted data using the session key, and obtains specific data of the first electronic device.
  • the second electronic device decrypts the encrypted specific data by using the session key, and verifies the signature or integrity verification information of the specific data.
  • the second electronic device sends a message that the specific data is successfully transmitted through the first antenna.
  • the first electronic device receives the specific data transmission successful message, displays the specific data transmission successful message and/or plays the specific data transmission successful voice.
  • the second electronic device displays a message that the specific data transmission is successful and/or plays a voice that the specific data transmission is successful.
  • the execution order of S417 and S417' is not limited in this embodiment.
  • any one of steps S417 and S417' may be performed, or both steps may be performed, or both steps may not be performed.
  • the first electronic device and the second electronic device negotiate a session key by switching to the second antenna to send an ultra-short-range wireless signal to complete the authentication of both parties. Since the first electronic device and the second electronic device are only within the transmission distance of the second antenna (the transmission distance of the second antenna is less than or equal to the preset safe distance), the ultra-short-range wireless signal sent by the opposite end electronic device can be received. Therefore, negotiating a session key by sending an ultra-short-range wireless signal can improve the security of communication, and also help simplify the process of key negotiation, so as to achieve rapid transmission of specific data. In addition, it can be noted that the user does not need to manually input information such as verification codes during the key negotiation process, which also reduces the complexity of user operations.
  • FIG. 5 is a schematic flowchart of a data transmission method provided by an embodiment of the present application. As shown in Figure 5, the method includes:
  • the first electronic device receives an input.
  • the second electronic device receives an input.
  • the first electronic device receives an input for instructing the first electronic device to send specific data.
  • the input can be user input or instructions sent by other devices.
  • the user input includes the user operating a specific key, inputting a voice command, a specific touch operation, a specific space gesture, and the like.
  • the second electronic device receives an input for instructing the second electronic device to receive specific data.
  • the input can be user input or instructions sent by other devices.
  • the user input includes the user operating a specific key, inputting a voice command, a specific touch operation, a specific space gesture, and the like.
  • the first electronic device sends the first message in the first cycle through the first antenna.
  • the first message is used to request to send specific data to the second electronic device.
  • the second electronic device receives the first message and switches to the second antenna of the second electronic device.
  • the second electronic device generates a first random number, and generates a second message according to the first random number.
  • the second electronic device after receiving the request for transmitting specific data sent by the first electronic device, the second electronic device generates first random data for negotiating a session key with the second electronic device.
  • the second electronic device sends the second message in the second cycle through the second antenna.
  • the first electronic device receives the second message and acquires the first random number.
  • the first electronic device switches to the second antenna of the first electronic device.
  • the first electronic device generates a second random number, and generates a third message according to the second random number.
  • the first electronic device sends a third message through the second antenna.
  • the first electronic device generates a session key according to the first random number and the second random number.
  • the first electronic device switches to the first antenna of the first electronic device.
  • the first electronic device uses the session key to encrypt the specific data of the first electronic device to obtain encrypted data; uses an integrity check algorithm for the specific data of the first electronic device to obtain a first integrity check value; according to The encrypted data and the first integrity check value generate a fourth message.
  • the integrity check algorithm for example, can use a hash algorithm and a key to hash the encrypted data to obtain a hash value of the data (ie, the first integrity check value), and then the hash value It is sent to the second electronic device together with the encrypted data, so that after the second electronic device receives the hash value and the encrypted data, it uses the same integrity check algorithm to calculate another hash value for the encrypted data. value (ie the second integrity check value).
  • the second integrity check value is equal to the first integrity check value, it indicates that the encrypted data is complete and has not been tampered with. Then, the specific data that has not been tampered with is obtained according to the complete encrypted data.
  • other integrity check algorithms may also be used, which are not limited in this embodiment of the present application.
  • the second electronic device executes S510'-S512'. Details as follows:
  • the second electronic device within the transmission distance of the second antenna of the first electronic device, the second electronic device receives the third message, and obtains a second random number.
  • the second electronic device switches to the first antenna of the second electronic device.
  • the second electronic device generates a session key according to the first random number and the second random number.
  • the first electronic device sends a fourth message through the first antenna.
  • the second electronic device receives the fourth message, and obtains the encrypted data and the first integrity check value.
  • the second electronic device decrypts the encrypted data using the session key, and obtains the specific data of the first electronic device; for the specific data of the first electronic device, uses an integrity check algorithm to obtain a second integrity check value .
  • the second electronic device determines whether the first integrity check value is equal to the second integrity check value.
  • the second electronic device sends a message that the specific data transmission is successful through the first antenna.
  • the first electronic device receives the specific data transmission success message, displays the specific data transmission successful message and/or plays the specific data transmission successful voice.
  • the second electronic device displays a message that the specific data transmission is successful and/or plays a voice that the specific data transmission is successful.
  • the first electronic device and the second electronic device first negotiate the session key through the second antenna, and then transmit specific data encrypted with the session key through the first antenna.
  • the feature of the second antenna having a safe transmission distance can be utilized, and the first electronic device and the second electronic device directly transmit specific data through the second antenna.
  • FIG. 6 is a schematic flowchart of a data transmission method provided by an embodiment of the present application. As shown in Figure 6, the method includes:
  • the first electronic device receives an input.
  • the second electronic device receives an input.
  • the first electronic device receives an input for instructing the first electronic device to send specific data.
  • the input can be user input or instructions sent by other devices.
  • the user input includes the user operating a specific key, inputting a voice command, a specific touch operation, a specific space gesture, and the like.
  • the second electronic device receives an input for instructing the second electronic device to receive specific data.
  • the input can be user input or instructions sent by other devices.
  • the user input includes the user operating a specific key, inputting a voice command, a specific touch operation, a specific space gesture, and the like.
  • the first electronic device sends the first message in the first cycle through the first antenna.
  • the first message is used for requesting to transmit specific data to the second electronic device.
  • the second electronic device receives the first message and switches to the second antenna of the second electronic device.
  • the second electronic device may prompt the user of the second electronic device to approach the first electronic device, so as to receive specific data subsequently sent by the first electronic device.
  • the first electronic device executes S601 or S602
  • the user of the first electronic device is prompted to approach the second electronic device, so that the second electronic device can subsequently receive specific data subsequently sent by the first electronic device. This is not limited.
  • the second electronic device sends a response message in a second cycle through the second antenna.
  • the first electronic device receives a response message.
  • the first electronic device after the first electronic device receives the response message, it indicates that the first electronic device is located within the transmission distance of the second antenna of the second electronic device.
  • the second electronic device is also located within the emission distance of the second antenna of the first electronic device. Then, when the first electronic device sends specific data through the second antenna, the second electronic device determines that the specific data can be received.
  • S602-S605 may not be performed, that is, after S601, S606 is performed.
  • the first electronic device generates a second message according to the specific data of the first electronic device, and switches to the second antenna of the first electronic device.
  • the first electronic device sends the second message through the second antenna.
  • the second electronic device receives the second message and acquires specific data.
  • the second electronic device determines whether the specific data of the first electronic device has been received.
  • the end of the specific data may carry a specific identifier
  • the second electronic device may determine whether to finish receiving the specific data of the first electronic device by detecting the specific identifier.
  • the beginning or the end of the specific data may also carry the size of the specific data, and the second electronic device may also determine whether the specific data of the first electronic device has been received by detecting the size of the received specific data of the first electronic device. data, which is not limited in this embodiment of the present application.
  • the second electronic device determines that the specific data of the first electronic device has been received, and sends a message that the specific data is successfully transmitted through the second antenna.
  • the first electronic device receives the specific data transmission successful message, displays the specific data transmission successful message and/or plays the specific data transmission successful voice, and switches to the first antenna.
  • the second electronic device displays a message that the specific data transmission is successful and/or plays a voice that the specific data transmission is successful, and switches to the first antenna.
  • This embodiment of the present application does not limit the execution order of S611 and S611'.
  • any one of steps S611 and S611' may be performed, or both steps may be performed, or both steps may not be performed.
  • FIG. 7 is a schematic flowchart of a data transmission method according to an embodiment of the present application. As shown in Figure 7, the method includes:
  • the first electronic device receives an input.
  • the second electronic device receives an input.
  • the first electronic device receives an input for instructing the first electronic device to collect specific data.
  • the input can be user input or instructions sent by other devices.
  • the user input includes the user operating a specific key, inputting a voice command, a specific touch operation, a specific space gesture, and the like.
  • the specific data is, for example, an operation log.
  • the second electronic device receives an input instructing the second electronic device to send specific data.
  • the input can be user input or instructions sent by other devices.
  • the user input includes the user operating a specific key, inputting a voice command, a specific touch operation, a specific space gesture, and the like.
  • the second electronic device may not be networked, connected to the Internet or a mobile communication network.
  • the first electronic device sends the first message in the first cycle through the first antenna.
  • the first message is used to request the first electronic device to collect specific data of the second electronic device.
  • the first electronic device requests to collect the operation log of the second electronic device.
  • the first electronic device may carry information such as a service identifier for collecting device operation logs, an identifier of the first electronic device, and the like in the SDF publish message.
  • the first electronic device may carry information such as a service identifier for collecting device operation logs, an identifier of the first electronic device, and the like through the BLE beacon.
  • the second electronic device receives the first message and switches to the second antenna of the second electronic device.
  • the second electronic device sends the second message in the second cycle through the second antenna.
  • the second message may carry information of the second electronic device, such as the device type (for example, product ID), device name, login account information, etc. of the second electronic device.
  • the second message may also carry a session key (eg, AES 128Key) randomly generated by the second electronic device, which can be used by the first electronic device to decrypt specific data encrypted by the second electronic device subsequently.
  • the second electronic device transmits the session key through the second antenna, thereby ensuring secure transmission of the session key.
  • the first electronic device receives the second message.
  • the first electronic device sends a response message to the second message.
  • the second electronic device After receiving the response message of the second message, the second electronic device switches to the first antenna.
  • the second electronic device sends a third message including specific data through the first antenna.
  • the second electronic device may encrypt specific data using the session key generated in S704.
  • the first electronic device receives the third message.
  • the first electronic device decrypts the third message according to the received session key to obtain specific data.
  • the first electronic device sends a response message that the third message is successfully received to the second electronic device.
  • the first electronic device displays a message that the specific data transmission is successful and/or plays a voice that the specific data transmission is successful, and switches to the first antenna.
  • the second electronic device displays a message that the specific data transmission is successful and/or plays a voice that the specific data transmission is successful, and switches to the first antenna.
  • This embodiment of the present application does not limit the execution order of S711 and S711'.
  • any one of steps S711 and S711' may be performed, or both steps may be performed, or both steps may not be performed.
  • Scenario 1 The user newly purchases a large number of devices of the same or similar device type.
  • the setup information for these devices is the same or similar. Therefore, the user may first set one of the electronic devices through, for example, a mobile phone.
  • the set electronic device is the first electronic device.
  • the configuration information of the electronic device that has been set is directly cloned to other electronic devices (ie, the second electronic device), so as to complete the setting of other electronic devices.
  • a number of new smart lighting devices have been newly purchased.
  • the user can first establish a wireless connection with the lighting device A through the mobile phone, and through "smart life" or other applications, configure the lighting device to the network, set the lighting parameters such as brightness and color temperature, whether to delay the shutdown, the duration of the delay, and whether it is automatic.
  • Firmware upgrade, power consumption threshold setting, etc. That is, the lighting apparatus A stores configuration information.
  • the user can clone the configuration information of lighting device A to other lighting devices (eg, lighting device B, lighting device C, etc.).
  • lighting device A and lighting device B respectively receive an input
  • configuration data of lighting device A is transmitted to lighting device B.
  • the user only needs to trigger an input on the lighting device A and the lighting device B, and then move them close to each other within a preset safe distance, and the two can realize the transmission of specific data.
  • the user's operation is very simple, especially suitable for the elderly, children and other people with weak understanding and operation ability, which is easy to master.
  • the specific data can be preset by a control device or a binding device of the electronic device.
  • the owner's mobile phone can preset specific data of the IoT light as configuration data.
  • the embodiment of the present application utilizes the safe distance transmission key of ultra-short-range wireless communication, and when the first antenna is working, the data encrypted by the key is transmitted, and decrypted at another electronic device, so as to The security of the transmission between the lighting device A and the lighting device B is physically guaranteed, and the attack of the middle device and the risk of data leakage are eliminated.
  • the same method can be used to complete the cloning of the configuration information of the lighting device A to other devices such as the lighting device C.
  • the configuration information is generally the same or similar.
  • the configuration information includes, for example, network information of the access network, an alarm triggering action, a silent time, a timer setting, a firmware upgrade setting, and the like. Therefore, the method of the embodiments of the present application can also be used to set one of the sensors first, and then use the set sensor to clone the configuration information to other sensors, so as to avoid repeated settings for similar sensors, simplify user operations, and improve settings. effectiveness.
  • the methods provided by the embodiments of the present application rarely involve user interface operations, for a large number of devices without display screens in smart homes, the methods provided by the embodiments of the present application are more friendly and easy to implement.
  • Scenario 2 The user replaces the old electronic device with a new electronic device.
  • New electronic equipment is usually the same type of equipment as the old electronic equipment, and the model is similar. Then, the configuration information and/or user data on the old electronic device can be cloned directly to the new electronic device. Therefore, it is avoided to export the configuration information and/or user data on the old electronic device to the intermediate device, and then import the intermediate device back to the new electronic device, which improves data security and simplifies user operations.
  • Scenario 3 An IoT device in the home that cannot access the Internet or fails to be connected to the network fails.
  • the operation log is sent to the mobile phone or computer through the network.
  • the IoT device prints the operation log to the mobile phone or computer through a communication interface such as a serial port, so that the user can analyze the fault and locate the problem.
  • the operation log of the IoT device can be sent to other electronic devices by ultra-short distance, and the operation log of the electronic device can be viewed through other electronic devices, which is convenient for fault analysis of the electronic device and maintenance of the electronic device. . This solves the maintenance problem of IoT devices that cannot access the Internet, fail to configure the network, or do not have an external communication interface.
  • the user can open the “Smart Life” APP in the mobile phone to enter the home device list interface 801 .
  • the mobile phone is bound to three devices: air conditioner, smart desk lamp and smart speaker. Among them, the smart desk lamp is not connected to the network.
  • the mobile phone sends a message to the smart desk lamp requesting to collect the operation log of the smart desk lamp, that is, S702 is performed, and subsequent steps are performed.
  • the mobile phone also displays a prompt interface 803 as shown in (2) in FIG. 8 .
  • the prompt information 804 in the prompt interface 803 is used to prompt the user that the operation log of the smart desk lamp is being collected.
  • the mobile phone can display a prompt interface 805 as shown in (3) in FIG. 8 , where the prompt information 806 is used to prompt the user that the operation log of the smart desk lamp has been successfully collected.
  • the prompt information 806 further includes a viewing control 807 .
  • the mobile phone displays the operation log of the smart desk lamp, which is convenient for the user to perform fault analysis on the operation condition of the smart desk lamp.
  • the mobile phone and the smart desk lamp may not be bound in advance, and the mobile phone may also request to collect the operation log of the smart desk lamp, which is not limited in this application.
  • FIG. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
  • the electronic device includes: one or more processors 910, one or more memories 920, and one or more computer programs.
  • the one or more computer programs are stored on the one or more memories, and when the computer programs are executed by the one or more processors, cause the electronic device to perform the first step in the above embodiments An operation performed by an electronic device or a second electronic device.
  • an embodiment of the present application further provides a chip system, where the chip system includes at least one processor 1001 and at least one interface circuit 1002 .
  • the processor 1001 and the interface circuit 1002 may be interconnected by wires.
  • the interface circuit 1002 may be used to receive signals from other devices (eg, the memory of the first electronic device 100, or the memory of the second electronic device 200).
  • the interface circuit 1002 may be used to send signals to other devices (eg, the processor 1001).
  • the interface circuit 1002 can read the instructions stored in the memory and send the instructions to the processor 1001 .
  • the electronic device can be made to execute each step performed by the first electronic device 100 or the second electronic device 200 in the above embodiments.
  • the chip system may also include other discrete devices, which are not specifically limited in this embodiment of the present application.
  • An embodiment of the present application further provides an apparatus, the apparatus is included in an electronic device, and the apparatus has a function of implementing the behavior of the electronic device in any of the methods in the foregoing embodiments.
  • This function can be implemented by hardware or by executing corresponding software by hardware.
  • the hardware or software includes at least one module or unit corresponding to the above-mentioned functions. For example, a detection module or unit, a display module or unit, a determination module or unit, and a calculation module or unit, etc.
  • Embodiments of the present application further provide a computer storage medium, including computer instructions, when the computer instructions are executed on the electronic device, the electronic device is made to execute any of the methods in the foregoing embodiments.
  • Embodiments of the present application further provide a computer program product, which, when the computer program product runs on a computer, causes the computer to execute any of the methods in the foregoing embodiments.
  • the embodiments of the present application further provide a graphical user interface on an electronic device, where the electronic device has a display screen, a camera, a memory, and one or more processors, and the one or more processors are configured to execute the storage in the One or more computer programs in memory, the graphical user interface comprising a graphical user interface displayed when the electronic device performs any of the methods in the above-described embodiments.
  • the above-mentioned electronic devices and the like include corresponding hardware structures and/or software modules for executing each function.
  • the embodiments of the present application can be implemented in hardware or a combination of hardware and computer software. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of the embodiments of the present invention.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. It should be noted that, the division of modules in the embodiment of the present invention is schematic, and is only a logical function division, and there may be other division manners in actual implementation.
  • Each functional unit in each of the embodiments of the embodiments of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a computer-readable storage medium.
  • a computer-readable storage medium includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: flash memory, removable hard disk, read-only memory, random access memory, magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种数据传输方法及电子设备,涉及电子技术领域,简化用户操作的复杂度,同时提升数据传输的安全性。该方法包括:第一电子设备接收传输特定数据的输入后,向第二电子设备发送传输特定数据的请求,第二电子设备接收到请求后,通过弱天线发送生成的第一随机数,第一电子设备位于弱天线的发射距离内,接收到第一随机数,第一电子设备也通过弱天线发送生成的第二随机数。两个电子设备分别使用第一随机数和第二随机数生成会话密钥,第一电子设备使用自己生成的会话密钥加密特定数据并发送给第二电子设备,第二电子设备接收到加密后的特定数据后,使用自己生成的会话密钥进行解密。

Description

一种数据传输方法及电子设备
本申请要求于2020年8月31日提交国家知识产权局、申请号为202010899646.3、申请名称为“一种数据传输方法及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及物联网技术领域,尤其涉及一种数据传输方法及电子设备。
背景技术
现实生活中存在大量需要将一个设备的数据传输到另一个设备的场景。例如,更换新设备时,需要将旧设备中的配置信息等发送到新设备中。又例如,新购入多个相同型号的IoT设备时,需要将其中已设置好的IoT设备的配置信息克隆到其他的IoT设备上。
目前,一般需要依赖第三方设备(例如安装有克隆应用软件的设备,或网关设备,或服务器)完成两个设备之间的数据传输。具体地,发送数据的设备先与第三方设备建立连接,将待发送的数据发送给第三方设备。然后,第三方设备与接收数据的设备建立连接,在将待发送的数据转发给接收数据的设备。由此可见,用户需要在多个设备上进行多次的连接、数据的导出和导入,操作繁琐。另外,当待传输的数据为配网信息、设备的配置信息以及用户数据等敏感数据时,将待传输的数据导出并缓存在第三方设备上存在泄漏风险。
发明内容
本申请提供的一种数据传输方法及电子设备,可以简化用户操作的复杂度,同时提升数据传输的安全性。
第一方面,提供一种数据传输的电子设备。所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下步骤:接收到一个输入;响应于所述输入,通过所述第一天线以第一周期发送第一消息;接收到另一电子设备的第二消息;响应于所述第二消息,切换至所述第二天线,并通过所述第二天线以第二周期发送第三消息;其中,所述第三消息包含特定数据;接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第三消息后,提示所述特定数据传输成功。这样,可以提升通信的安全性,实现快速传输特定数据,并且降低了用户操作的复杂度。
第二方面,提供一种数据传输的电子设备。所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小 于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下步骤:接收到一个输入;响应于所述输入,通过所述第一天线以第一周期发送第一消息;接收到另一电子设备的第二消息;响应于所述第二消息,从所述第二消息中获取到第一随机数,生成第二随机数,并切换至所述第二天线,通过所述第二天线发送包含所述第二随机数的第三消息;根据所述第一随机数和所述第二随机数生成会话密钥,使用所述会话密钥对所述特定数据进行加密,并向所述另一电子设备发送第四消息,所述第四消息包括加密后的所述特定数据。这样,可以提升通信的安全性,也有利于简化密钥协商的流程,从而实现快速传输特定数据。并且,可以注意到,密钥协商的过程中不需要用户手动输入验证码等信息,也降低了用户操作的复杂度。
根据第二方面,接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第四消息后,提示所述特定数据传输成功。这样,所述电子设备进行提示,便于所述电子设备的用户获悉到传输成功。
根据第二方面,或者以上第二方面的任意一种实现方式,所述使用所述会话密钥对所述特定数据进行加密,并向所述另一电子设备发送第四消息,具体包括:切换至所述电子设备的所述第一天线,通过所述电子设备的所述第一天线发送所述第四消息。这样,所述电子设备的用户无需保持所述电子设备和所述另一电子设备一直处于预设的安全距离内,在较远的距离内也可实现所述特定数据的传输。
根据第二方面,或者以上第二方面的任意一种实现方式,所述电子设备还执行:所述第四消息还包括所述特定数据的第一完整校验值。这样,通过对特定数据计算完整校验值,进一步保证特定数据未被篡改,提升数据传输的安全性。
根据第二方面,或者以上第二方面的任意一种实现方式,述提示所述特定数据传输成功,包括:显示所述特定数据成功传输的消息,和/或,播放所述特定数据成功传输的语音。这样,就细化了提示特定数据传输工程的具体形式。
根据第二方面,或者以上第二方面的任意一种实现方式,所述特定数据包括配置信息和用户数据中的至少一项;其中,所述配置信息包括网络配置信息、传感器告警门限设置信息、告警触发动作信息、静默时间设置信息、定时器设置信息、固件升级设置信息和用电门限设置信息中的一项或多项;所述用户数据包括应用程序的安装数据,所述电子设备上存储的照片、视频、录音和文件,以及所述电子设备的运行日志中的一项或多项。这样,就列出了部分特定数据的具体信息。
第三方面,提供一种电子设备。所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所 述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下操作:接收到一个输入;接收到另一电子设备的第一消息;响应于所述第一消息,切换至所述第二天线,生成第一随机数,通过所述第二天线以第二周期发送包括所述第一随机数的第二消息;接收到所述另一电子设备的第三消息;响应于所述第三消息,从所述第三消息中获取到所述第二随机数,根据所述第一随机数和所述第二随机数生成会话密钥;接收到所述另一电子设备的第四消息;响应于所述第四消息,从所述第四消息中获取到加密后的特定数据,使用所述会话密钥进行解密得到所述特定数据。这样,就从接收端的电子设备一侧,表明可以提升通信的安全性,实现快速传输特定数据,并且降低了用户操作的复杂度。
根据第三方面,或者以上第三方面的任意一种实现方式,所述电子设备还执行:接收到所述另一电子设备发送的所述特定数据的第一完整校验值,计算所述特定数据的第二完整校验值;在所述第二完整校验值与所述第一完整校验值相等后,向所述另一电子设备发送所述特定数据传输成功的消息。由此,通过对特定数据计算完整校验值,进一步保证特定数据未被篡改,提升数据传输的安全性。
根据第三方面,或者以上第三方面的任意一种实现方式,向所述另一电子设备发送所述特定数据传输成功的消息,具体包括:切换至所述第一天线,使用所述第一天线发送所述特定数据传输成功的消息。这样,就细化了具体的传输方式。
第四方面,提供一种电子设备。所述电子设备未接入路由设备或热点,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下操作:接收到一个输入;接收到另一电子设备的第一消息;响应于所述第一消息,切换至所述第二天线,并通过所述第二天线发送第二消息;其中,第二消息包括所述电子设备的特定数据;接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第二消息后,提示所述特定数据传输成功。这样,可以提升通信的安全性,实现快速传输特定数据,并且降低了用户操作的复杂度。
第五方面,提供一种电子设备。所述电子设备未接入路由设备或热点,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下操作:接收到一个输入;接收到另一电子设备的第一消息;响应于所述第一消息,切换至所述第二天线,并通过所述第二天线发送第二消息;接 收到所述另一电子设备的针对所述第二消息的响应消息;响应于所述响应消息,切换至所述第一天线,并通过所述第一天线发送包含特定数据的第三消息;接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第三消息后,提示所述特定数据传输成功。这样,可以提升通信的安全性,也有利于简化密钥协商的流程,从而实现快速传输特定数据。并且,可以注意到,密钥协商的过程中不需要用户手动输入验证码等信息,也降低了用户操作的复杂度。
根据第五方面,所述第二消息包括会话密钥,所述第三消息包含经所述会话密钥加密后的特定数据。这样,就通过密钥的方式进一步增加安全性。
根据第五方面,或者以上第五方面的任意一种实现方式,所述会话密钥为预先设置的;所述特定数据为所述电子设备的日志。这样,就细化了特定数据的具体形式。
第六方面,提供一种数据传输方法。所述方法应用于一种电子设备,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:接收到一个输入;响应于所述输入,通过所述第一天线以第一周期发送第一消息;接收到另一电子设备的第二消息;响应于所述第二消息,切换至所述第二天线,并通过所述第二天线以第二周期发送第三消息;其中,所述第三消息包含特定数据;接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第三消息后,提示所述特定数据传输成功。
第七方面,提供一种数据传输方法。所述方法应用于电子设备,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:接收到一个输入;响应于所述输入,通过所述第一天线以第一周期发送第一消息;接收到另一电子设备的第二消息;响应于所述第二消息,从所述第二消息中获取到第一随机数,生成第二随机数,并切换至所述第二天线,通过所述第二天线发送包含所述第二随机数的第三消息;根据所述第一随机数和所述第二随机数生成会话密钥,使用所述会话密钥对所述特定数据进行加密,并向所述另一电子设备发送第四消息,所述第四消息包括加密后的所述特定数据。
根据第七方面,接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第四消息后,提示所述特定数据传输成功。
根据第七方面,或者以上第七方面的任意一种实现方式,所述使用所述会话密钥对所述特定数据进行加密,并向所述另一电子设备发送第四消息,具体包括:切换至所述电子设备的所述第一天线,通过所述电子设备的所述第一天线发送所述第四消息。
根据第七方面,或者以上第七方面的任意一种实现方式,所述方法还包括:所述第四消息还包括所述特定数据的第一完整校验值。
根据第七方面,或者以上第七方面的任意一种实现方式,所述提示所述特定数据 传输成功,包括:显示所述特定数据成功传输的消息,和/或,播放所述特定数据成功传输的语音。
根据第七方面,或者以上第七方面的任意一种实现方式,所述特定数据包括配置信息和用户数据中的至少一项;其中,所述配置信息包括网络配置信息、传感器告警门限设置信息、告警触发动作信息、静默时间设置信息、定时器设置信息、固件升级设置信息和用电门限设置信息中的一项或多项;所述用户数据包括应用程序的安装数据,所述电子设备上存储的照片、视频、录音和文件,以及所述电子设备的运行日志中的一项或多项。
第八方面,提供一种数据传输方法。所述方法应用于电子设备,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:接收到一个输入;接收到另一电子设备的第一消息;响应于所述第一消息,切换至所述第二天线,生成第一随机数,通过所述第二天线以第二周期发送包括所述第一随机数的第二消息;接收到所述另一电子设备的第三消息;响应于所述第三消息,从所述第三消息中获取到所述第二随机数,根据所述第一随机数和所述第二随机数生成会话密钥;接收到所述另一电子设备的第四消息;响应于所述第四消息,从所述第四消息中获取到加密后的特定数据,使用所述会话密钥进行解密得到所述特定数据。
根据第八方面,所述方法还包括:接收到所述另一电子设备发送的所述特定数据的第一完整校验值,计算所述特定数据的第二完整校验值;在所述第二完整校验值与所述第一完整校验值相等后,向所述另一电子设备发送所述特定数据传输成功的消息。
根据第八方面,或者以上第八方面的任意一种实现方式,向所述另一电子设备发送所述特定数据传输成功的消息,具体包括:切换至所述第一天线,使用所述第一天线发送所述特定数据传输成功的消息。
第九方面,提供一种数据传输方法。所述方法应用于一种电子设备,所述电子设备未接入路由设备或热点,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:接收到一个输入;接收到另一电子设备的第一消息;应于所述第一消息,切换至所述第二天线,并通过所述第二天线发送第二消息;其中,第二消息包括所述电子设备的特定数据;接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第二消息后,提示所述特定数据传输成功。
第十方面,提供一种数据传输方法。所述方法应用于一种电子设备,所述电子设备未接入路由设备或热点,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发 射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:接收到一个输入;接收到另一电子设备的第一消息;响应于所述第一消息,切换至所述第二天线,并通过所述第二天线发送第二消息;接收到所述另一电子设备的针对所述第二消息的响应消息;响应于所述响应消息,切换至所述第一天线,并通过所述第一天线发送包含特定数据的第三消息;接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第三消息后,提示所述特定数据传输成功。
根据第十方面,所述第二消息包括会话密钥,所述第三消息包含经所述会话密钥加密后的特定数据。
根据第十方面,或者以上第十方面的任意一种实现方式,所述会话密钥为预先设置的;所述特定数据为所述电子设备的日志。
第六方面及第六方面的任意一种实现方式、第七方面及第七方面的任意一种实现方式、第八方面及第八方面的任意一种实现方式、第九方面及第九方面的任意一种实现方式、第十方面及第十方面的任意一种实现方式和对应的技术效果可参见上述相应方面以及相应方面中任意一种实现方式和对应的技术效果,此处不再赘述。
第十一方面,提供一种计算机可读存储介质。所述计算机可读存储介质包括计算机程序,当所述计算机程序在电子设备上运行时,使得所述电子设备执行如第六方面及第六方面的任意一种实现方式、第七方面及第七方面的任意一种实现方式、第八方面及第八方面的任意一种实现方式、第九方面及第九方面的任意一种实现方式、第十方面及第十方面的任意一种实现方式的方法。
第十二方面,提供一种计算机程序产品,当其在计算机上运行时,使得计算机执行如如第六方面及第六方面的任意一种实现方式、第七方面及第七方面的任意一种实现方式、第八方面及第八方面的任意一种实现方式、第九方面及第九方面的任意一种实现方式、第十方面及第十方面的任意一种实现方式的方法。
第十二方面及第十二方面中任意一种实现方式和对应的技术效果可参见上述相应方面以及相应方面中任意一种实现方式和对应的技术效果,此处不再赘述。
附图说明
图1为本申请实施例提供的一种应用场景的示意图;
图2为本申请实施例提供的一种电子设备的结构示意图;
图3为本申请实施例提供的一种电子设备的结构示意图;
图4为本申请实施例提供的一种数据传输的流程示意图;
图5为本申请实施例提供的一种数据传输的流程示意图;
图6为本申请实施例提供的一种数据传输的流程示意图;
图7为本申请实施例提供的一种数据传输的流程示意图;
图8为本申请实施例提供的电子设备的一些图形用户界面的示意图;
图9为本申请实施例提供的一种电子设备的结构示意图;
图10为本申请实施例提供的一种芯片系统的结构示意图。
具体实施方式
在本申请实施例的描述中,除非另有说明,“/”表示或的意思。例如,A/B可以表示A或B。本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。在本申请实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。在本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
图1为本申请实施例提供的一种应用场景的示意图。如图1所示,第一电子设备100与第二电子设备200可进行无线通信。
示例性地,本申请实施例中第一电子设备100可以为移动设备、家用电器或者传感器设备等。例如,第一电子设备100可以为手机、平板电脑、个人计算机(personal computer,PC)、个人数字助理(personal digital assistant,PDA)、上网本、可穿戴设备(例如智能手表、智能手环)、增强现实技术(augmented reality,AR)设备、虚拟现实(virtual reality,VR)设备、车载设备、智慧屏、智能音箱、智能摄像头等移动设备。又例如,第一电子设备100可以是智能冰箱、智能电视、智能灯、智能插座、智能空气净化器、加湿器、智能油烟机、智能门锁、智能插线板、智能电磁炉、智能风扇、智能消毒盒、智能香薰机等智能家电。又例如,第一电子设备100还可以是烟雾传感器、燃气传感器、人体感应器、温度传感器、湿度传感器、门窗感应器、PM2.5空气传感器、门窗开关传感器、紧急按钮、报警器等传感器设备。第二电子设备200也可以是移动设备、家电电器或传感器设备中的任意一种。本申请实施例对第一电子设备100和第二电子设备200的具体形式均不做限定。
下面对第一电子设备100的结构进行说明。需要说明的是,第二电子设备200也可以参考第一电子设备100的结构,但第二电子设备200可以包括比第一电子设备100更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。第二电子设备200可以与第一电子设备100为相同形式的电子设备,也可以为不同形式的电子设备,本申请实施例对此不做限定。
请参考图2,图2为本申请实施例提供的第一电子设备100的结构示意图。第一电子设备100可以包括一个或多个处理器110、一个或多个存储器120、以及一个或多个通信接口130、无线通信模块140以及一个或多个天线等。处理器110、存储器120、通信接口130、无线通信模块140通过总线相连接。
其中,处理器110可以为通用中央处理器(Central Processing Unit,CPU)、微处理器、特定应用集成电路(Application-Specific Integrated Circuit,ASIC),或者用于控制本申请方案程序执行的集成电路等。在一个示例中,处理器110可以包括多个CPU,并且处理器110可以是一个单核(single-CPU)处理器或多核(multi-CPU)处理器。单核处理器或多核处理器中的处理器可以指一个或多个设备、电路或用于处理数据(例 如计算机程序指令)的处理核。
存储器120,可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。内部存储器可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统以及本申请实施例需要使用的程序或指令等。
通信接口130,可用于与其他设备或通信网络通信,如以太网,无线局域网(wireless local area networks,WLAN)等。一些示例中,第一电子设备100也可以不包括通信接口130,本申请实施例对此不做限定。
无线通信模块140可以提供应用在第一电子设备100上的包括WLAN(如Wi-Fi)网络),蓝牙,NFC,红外技术等无线通信的解决方案。无线通信模块140可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块140经由天线接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块140还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线转为电磁波辐射出去。
在一些实施例中,如图2所示,第一电子设备100包括至少两个天线,例如天线1(第一天线,也称为强天线)和天线2(第二天线,也称为弱天线)。无线通信模块140可以在天线1和天线2之间进行切换。施加在天线1或天线2上的发射功率相同。其中,天线1的发射距离为第一距离。天线2的发射距离为第二距离。第二距离小于第一距离。例如,当无线通信模块140切换到天线1发送无线信号时,位于第一电子设备100的第一距离(例如,第一距离为6m、8m、10m)内的电子设备可接收到该无线信号。当无线通信模块140切换到天线2发送无线信号时,位于第一电子设备100的第二距离(例如,第二距离为30cm)范围内的电子设备可接收到该无线信号。第二距离小于等于预设的安全距离。预设的安全距离小于第一距离。第一距离、第二距离、预设的安全距离都可由用户根据需要自行调整设置。在一种实施方式中,第二距离可以为预设的安全距离。换言之,当第一电子设备100需要发送超短距的无线信号时,可以控制无线通信模块140连接到天线2,以发送超短距的无线信号。当第一电子设备100不需要发送超短距的无线信号时,可以控制无线通信模块140连接到天线1,以发送正常的无线信号。
在另一些实施例中,如图3所示,第一电子设备100可以包括可变电阻电路模块150和一个天线。可变电阻电路模块150可以在无线通信模块140的控制下改变电阻值的大小,从而改变同一天线的发射距离。也就是说,当可变电阻电路模块150的电阻值调整为电阻值1时,该天线的发射功率为第一发射功率(较高的发射功率),该天线的发射距离为第一距离。此时,位于第一电子设备100的第一距离(例如,第一距离为6m、8m、10m)内的电子设备可接收到该无线信号。当可变电阻电路模块150的电阻值调整为电阻值2时,该天线的发射功率为第二发射功率(较低的发射功率),该天线的发射距离为第二距离。第二发射功率小于第一发射功率。第二距离小于等于预设的安全距离。预设的安全距离小于第一距离。第一距离、第二距离、预设的安全距离都可由用户根据需要自行调整设置。在一种实施方式中,第二距离可以为预设的安全距离。换言之,当第一电子设备100需要发送超短距的无线信号时,可以控制可变电阻电路模块150的电阻值调整为电阻值2,以发送超短距的无线信号。当第一电 子设备100不需要发送超短距的无线信号时,可以控制可变电阻电路模块150的电阻值调整为电阻值1,以发送正常的无线信号。换句话说,在所述另一些实施例中,当可变电阻电路模块150的电阻值调整为电阻值1时,第一电子设备100连接第一天线。当可变电阻电路模块150的电阻值调整为电阻值2时,第一电子设备100连接第二天线;其中,第一天线和第二天线相同,但第一天线的发射距离大于第二天线的发射距离;第二天线的发射距离小于等于预设的安全距离,第一天线的发射距离大于预设的安全距离。第一天线的发射距离和第二天线的发射距离分别为上述的第一距离和第二距离。
示例性的,上述无线通信模块140采用的无线通信方式具体可以采用如BLE、Wi-Fi Aware等方式。其中,该无线通信方式是基于计算机网络MAC(Medium Access Control,媒体访问控制)层,又称为数据链路层协议扩展进行的交互,无需涉及到MAC层的上层网络通信,在数据链路层便可完整的实现数据交互。其中,BLE是由蓝牙特别兴趣小组于2016年推出的一种超低功耗的用于设备B的近距离无线通信方案,可通过MAC层实现通信。Wi-Fi Aware(Wi-Fi Neighborhood Aware Network,Wi-Fi邻居发现网络,又称为Wi-Fi Neighborhood Aware Network,简称NAN)是一种新型的低功耗点对点互连互通的Wi-Fi Mesh通信技术,该技术能够绕开网络基础设施(如接入点(Access Point,AP)或蜂窝网),实现一对一、一对多或多对多的设备间的连接通信,同样可通过MAC层实现通信。可以理解地,涉及的计算机网络的层数越高,其安全性就越难保证。本实施例采用的基于无线的MAC层通信,能够让数据基于数据链路层协议扩展进行交互,可显著地提高数据传输的安全性。
以下实施例中所涉及的技术方案均可以在具有上述结构第一电子设备100和第二电子设备200中实现。第一电子设备和第二电子设备均包含第一天线和第二天线。下面结合附图对本申请实施例提供的技术方案进行详细说明。
图4为本申请实施例提供的一种数据传输方法的流程示意图。如图4所示,该方法包括:
S401、第一电子设备接收到一个输入。
S401'、第二电子设备接收到一个输入。
其中,第一电子设备接收到一个输入,用于指示第一电子设备发送特定数据。该输入可以为用户输入,也可以为其他设备发送的指令。其中,用户输入包括用户操作特定按键、输入语音命令、特定的触摸操作、特定的隔空手势等。
第二电子设备接收到一个输入,用于指示第二电子设备接收特定数据。该输入可以为用户输入,也可以为其他设备发送的指令。其中,用户输入包括用户操作特定按键、输入语音命令、特定的触摸操作、特定的隔空手势等。
在一些实施例中,第一电子设备存储有配置信息,配置信息包括但不限于网络设置、传感器告警门限设置、告警触发动作、静默时间设置、定时器设置、固件升级设置、用电门限设置等。其中配网信息例如包括Wi-Fi网络的标识(例如服务集标识(Service Set Identifier,SSID)和密码等信息。需要注意的是,配置信息随着第一电子设备的设备类型、型号等不同而不同。第二电子设备为未进行设置的设备。其中,第一电子设备接收到一个输入,可以为指示第一电子设备将配置信息发送给第二电子 设备的操作。例如,为用户在第一电子设备上执行预定义操作1。其中,预定义操作1例如为按压第一电子设备上特定的按键(物理按键或虚拟按键)。在该实施例中,第一电子设备的配置信息即为特定数据。第二电子设备接收到一个输入,可以为用户在第二电子设备执行的预定义操作2。其中,预定义操作2例如为开机或指示设置第二电子设备的操作。
作为一个示例,第一电子设备和第二电子设备的设备类型相同,型号相同或接近。那么,可以将第一电子设备的配置信息发送给第二电子设备,第二电子设备可以直接根据接收到的配置信息进行设置。作为另一示例,第一电子设备和第二电子设备的设备类型不同。可以将第一电子设备中部分配置信息发送给第二电子设备,第二电子设备可以直接根据接收到的部分配置信息进行设备。比如,当第一电子设备和第二电子设备需要接入同一个网络时,那么第二电子设备也可以直接使用第一电子设备的网络设置的配置信息。
在另一些实施例中,第一电子设备为用户使用的旧设备,第二电子设备为用户将要更换的新设备。其中,第一电子设备接收到一个输入,例如为指示第一电子设备将配置信息和/或用户数据发送给第二电子设备的操作。即,特定数据即为第一电子设备的配置信息和/或用户数据。其中,用户数据包括但不限于第一电子设备安装的应用程序的信息,以及安装的应用程序的基本设置,第一电子设备上存储的照片、视频、录音、文件,第一电子设备的运行日志等。第二电子设备接收到一个输入例如为用户开启无线功能的操作或者指示接收特定数据的操作。
需要说明的是,本申请实施例中对S401和S401'的执行顺序不做限定。
S402、第一电子设备通过第一天线,以第一周期发送第一消息。
其中,第一消息,用于请求向第二电子设备发送特定数据,以便与第二电子设备协商会话密钥。
在一些实施例中,第一电子设备可以通过Wi-Fi或蓝牙等无线方式广播请求。下面以第一电子设备采用Wi-Fi Aware技术发送传输特定数据的服务标识为例进行说明。
首先,对NAN机制进行简单说明。NAN机制是Wi-Fi联盟制定的一个标准。这个标准是在没有中心节点的情况下,所有参与NAN机制的设备(即NAN设备,例如第一电子设备、第二电子设备)同步起来。在NAN机制约定的发现时间窗(discovery window,DW)中进行NAN机制的维持工作和服务发现工作。其中,服务发现可通过发送服务发现帧(service discovery frame,SDF)消息实现。该服务器发现帧消息包括查询消息或广播消息。NAN设备基于服务发现消息中获得的信息,可以建立相应的连接,然后基于NAN智能管理。其中,SDF消息是一种专门定义用来做服务发现的动作帧。根据功能的不同,SDF消息帧大致可以分为三种,SDF发布(publish)消息、SDF订阅(subscribe)消息和SDF回复(follow-up)消息。其中,SDF publish消息,用于发布NAN设备所能提供的服务,或者用于回复其他NAN设备发送的NAN subscribe消息。NAN subscribe消息,用于查找需要使用的服务。SDF follow-up消息,用于回复收到的SDF publish消息,或者用于协商更多的信息。一般,在SDF消息中包含一个指示,用于指示该消息属于那种SDF消息。
作为一个示例,第一电子设备可以在SDF publish消息中携带传输特定数据的服务 标识、第一电子设备的标识等信息。作为另一个示例,第一电子设备可以通过BLE beacon中携带传输特定数据的服务标识、第一电子设备的标识等信息。
在又一些实施例中,第一电子设备能够获取第二电子设备的标识或第二电子设备的地址,也可以采用点对点的方式发送第一消息。
在又一些实施例中,第一电子设备可以在预设时长内以第一周期发送第一消息,也可以在预设时长内发送预设次数的第一消息。本申请实施例对此不做限定。
S403、第二电子设备接收到第一消息,切换至第二电子设备的第二天线。
S404、第二电子设备生成第一随机数,根据第一随机数生成第二消息。
示例性的,在接收到第一电子设备发送的传输特定数据的请求后,第二电子设备生成第一随机数据,用于与第二电子设备协商会话密钥。
其中,本申请实施例不限定S403和S404的执行顺序。
S405、第二电子设备通过第二天线,以第二周期发送第二消息。
示例性的,第二电子设备具备图2所示的结构时,第二电子设备可以控制无线通信模块140连接第二天线。示例性的,第二电子设备具备图3所示的结构时,第二电子设备控制可变电阻电路模块150的电阻值为第二电阻值(较大的电阻值),使得第二电子设备的天线发射功率为第二发射功率。
作为一个示例,第二电子设备可以在SDF Follow-up消息中携带第一随机数。作为另一个示例,第二电子设备可以通过BLE beacon中携带第一随机数。
前文已说明,由于第二电子设备通过第二天线发送的第二消息,只有距离第二电子设备在极短的距离范围(例如30cm)内的电子设备才能接收到。因此,可以保证接收到第二消息的电子设备为第二电子设备的可信设备。
在一些实施例中,第二电子设备在发送第二消息之前,可以采用语音提示或灯闪烁等方式,提示用户将第一电子设备靠近第二电子设备。当然,第二电子设备也可以在其他时机提示用户,例如在接收到第一电子设备发送的第一消息之后。还可以由第一电子设备提示用户,靠近第二电子设备。本申请实施例对提示方式、提示时机等均不做限定。
S406、在第二电子设备的第二天线的发射距离内,第一电子设备接收到第二消息,获取到第一随机数。
S407、第一电子设备切换至第一电子设备的第二天线。
S408、第一电子设备生成第二随机数,根据第二随机数生成第三消息。
S409、第一电子设备通过第二天线,发送第三消息。
其中,S407-S409中,另外,第一电子设备发送第三消息的过程,与第二电子设备发送第二消息的过程相同或类似,此处不再赘述。其他内容可以参考S405中的相关描述。
作为一个示例,第一电子设备可以在SDF Follow-up消息中携带第二随机数。作为另一个示例,第一电子设备可以通过BLE beacon中携带第二随机数。
S410、第一电子设备根据第一随机数和第二随机数生成会话密钥。
示例性的,第一电子设备可以采用预定义的算法或者密码学中的密钥导出函数(key derivation function,KDF)计算得到会话密钥。其中,预定义的算法包括但不限 于数据拼接、数据编码格式转换、数据位置转换、哈希(HASH)运算(例如MD5/SHA-1等)等。KDF算法例如包括PBKDF2、bcrypt、scrypt、HKDF(HMAC-based KDF)等。本申请实施例对根据第一随机数和第二随机数生成会话密钥的具体方法不做限定。
S411、第一电子设备切换至第一电子设备的第一天线。
具体的,例如,第一电子设备具备图2所示的结构时,第一电子设备可以控制无线通信模块140连接第一天线。示例性的,第一电子设备具备图3所示的结构时,第一电子设备控制可变电阻电路模块150的电阻值为第一电阻值(较小的电阻值),使得第一电子设备的天线发射功率为第一发射功率。
在其他一些实施例中,第一电子设备也可以在其他时间切换至第一天线。例如,在执行完S409之后,即发送完第三消息后,第一电子设备切换回第一天线。又例如,在执行S413,即向第一电子设备通过第一天线,向第二电子设备发送第四消息之前,第一电子设备切换回第一天线。本申请实施例对此不做限定。
S412、第一电子设备使用会话密钥加密第一电子设备的特定数据,得到加密后的数据,根据加密后的数据生成第四消息。
第一电子设备采用一定的加密算法使用会话密钥加密特定数据,并生成特定数据的签名或完整性校验信息,以确保传输特定数据的安全性,避免特定数据的泄漏。
在第一电子设备执行S410-S412的过程中,第二电子设备执行S410'-S412'。具体如下:
S410'、在第一电子设备的第二天线的发射距离内,第二电子设备接收到第三消息,获取第二随机数。
S411'、第二电子设备切换至第二电子设备的第一天线。
具体的,例如,第二电子设备具备图2所示的结构时,第二电子设备可以控制无线通信模块140连接第一天线。再示例性的,第二电子设备具备图3所示的结构时,第二电子设备控制可变电阻电路模块150的电阻值为第一电阻值(较小的电阻值),使得第二电子设备的天线发射功率为第一发射功率。
在其他一些实施例中,第二电子设备也可以在其他时间切换至第一天线,例如,在执行完S405之后,即发送完第二消息后,第二电子设备切换回第一天线。又例如,在执行S416,即第二电子设备通过第一天线,向第一电子设备发送特定数据传输成功的消息之前,第二电子设备切换回第一天线。本申请实施例对此不做限定。
S412'、第二电子设备根据第一随机数、第二随机数生成会话密钥。
需要说明的是,这里第二电子设备生成会话密钥采用的算法,与第一电子设备生成会话密钥采用的算法相同,从而使得两个电子设备生成的会话密钥是相同的。进而,可以使用生成的会话密钥解密对端电子设备发送的数据。
S413、第一电子设备通过第一天线,发送第四消息。
示例性的,第一电子设备可以通过无线连接的方式(例如Wi-Fi或者蓝牙)广播发送加密的特定数据。例如,第二电子设备可以在SDF Follow-up消息中或者BLE beacon中携带加密的特定数据。或者,第一电子设备与第二电子设备建立点到点的无线连接(例如Wi-Fi或者蓝牙),通过无线连接向第二电子设备发送加密的特定数据。
S414、第二电子设备接收到第四消息,获取到加密后的数据。
S415、第二电子设备使用会话密钥解密加密后的数据,获取到第一电子设备的特定数据。
第二电子设备采用会话密钥对加密的特定数据进行解密,并校验特定数据的签名或完整性校验信息。
S416、第二电子设备通过第一天线,发送特定数据传输成功的消息。
S417、第一电子设备接收到特定数据传输成功消息,显示特定数据传输成功的消息和/或播放特定数据传输成功的语音。
S417'、第二电子设备显示特定数据传输成功的消息和/或播放特定数据传输成功的语音。
本实施例中不限定S417和S417'的执行顺序。另外,本申请实施例可以执行S417和S417'中任一个步骤,或者两个步骤均执行,或者两个步骤均不执行。
由此可见,本申请实施例提供的数据传输方法中,第一电子设备和第二电子设备通过切换至第二天线发送超短距无线信号来协商会话密钥,完成对双方的认证。由于第一电子设备和第二电子设备只有位于第二天线的发射距离(第二天线的发射距离小于等于预设的安全距离)内,才能接收到对端电子设备发送的超短距无线信号。因此,通过发送超短距无线信号来协商会话密钥,可以提升通信的安全性,也有利于简化密钥协商的流程,从而实现快速传输特定数据。并且,可以注意到,密钥协商的过程中不需要用户手动输入验证码等信息,也降低了用户操作的复杂度。
图5为本申请实施例提供的一种数据传输的方法的流程示意图。如图5所示,该方法包括:
S501、第一电子设备接收到一个输入。
S501'、第二电子设备接收到一个输入。
其中,第一电子设备接收到一个输入,用于指示第一电子设备发送特定数据。该输入可以为用户输入,也可以为其他设备发送的指令。其中,用户输入包括用户操作特定按键、输入语音命令、特定的触摸操作、特定的隔空手势等。
第二电子设备接收到一个输入,用于指示第二电子设备接收特定数据。该输入可以为用户输入,也可以为其他设备发送的指令。其中,用户输入包括用户操作特定按键、输入语音命令、特定的触摸操作、特定的隔空手势等。
需要说明的是,本申请实施例中对S501和S501'的执行顺序不做限定。
S502、第一电子设备通过第一天线,以第一周期发送第一消息。
其中,第一消息,用于请求向第二电子设备发送特定数据。
S503、第二电子设备接收到第一消息,切换至第二电子设备的第二天线。
S504、第二电子设备生成第一随机数,根据第一随机数生成第二消息。
示例性的,在接收到第一电子设备发送的传输特定数据的请求后,第二电子设备生成第一随机数据,用于与第二电子设备协商会话密钥。
其中,本申请实施例不限定S503和S504的执行顺序。
S505、第二电子设备通过第二天线,以第二周期发送第二消息。
S506、在第二电子设备的第二天线的发射距离内,第一电子设备接收到第二消息,获取到第一随机数。
S507、第一电子设备切换至第一电子设备的第二天线。
S508、第一电子设备生成第二随机数,根据第二随机数生成第三消息。
S509、第一电子设备通过第二天线,发送第三消息。
S510、第一电子设备根据第一随机数和第二随机数生成会话密钥。
S511、第一电子设备切换至第一电子设备的第一天线。
S512、第一电子设备使用会话密钥加密第一电子设备的特定数据,得到加密后的数据;针对第一电子设备的特定数据使用完整性校验算法,得到第一完整性校验值;根据加密后的数据和第一完整性校验值生成第四消息。
其中,完整性校验算法,例如可以采用哈希算法和密钥对加密后的数据进行哈希得到该数据的一个哈希值(即第一完整性校验值),然后将该哈希值和加密后的数据一块发送给第二电子设备,以便于第二电子设备收到该哈希值和加密后的数据之后,对加密后的数据采用相同的完整性校验算法计算另一个哈希值(即第二完整性校验值)。当第二完整性校验值与第一完整性校验值相等时,表示加密后的数据是完整的,未被篡改。那么,根据完整的加密后的数据获取未被篡改的特定数据。当然,也可以采用其他的完整性校验算法,本申请实施例对此不做限定。
在第一电子设备执行S510-S512的过程中,第二电子设备执行S510'-S512'。具体如下:
S510'、在第一电子设备的第二天线的发射距离内,第二电子设备接收到第三消息,获取第二随机数。
S511'、第二电子设备切换至第二电子设备的第一天线。
S512'、第二电子设备根据第一随机数、第二随机数生成会话密钥。
S513、第一电子设备通过第一天线,发送第四消息。
S514、第二电子设备接收到第四消息,获取到加密后的数据和第一完整性校验值。
S515、第二电子设备使用会话密钥解密加密后的数据,获取到第一电子设备的特定数据;针对第一电子设备的特定数据,使用完整性校验算法,得到第二完整性校验值。
S516、第二电子设备确定第一完整性校验值是否与第二完整性校验值相等。
S517、若第一完整性校验值与第二完整性校验值相等,则第二电子设备通过第一天线,发送特定数据传输成功的消息。
S518、第一电子设备接收到特定数据传输成功消息,显示特定数据传输成功的消息和/或播放特定数据传输成功的语音。
S518'、第二电子设备显示特定数据传输成功的消息和/或播放特定数据传输成功的语音。
其他内容可参考图4中S410-S417'中相关内容的描述,这里不再赘述。
在以上实施例中,第一电子设备和第二电子设备先通过第二天线协商会话密钥,再通过第一天线传输使用会话密钥加密的特定数据。在其他一些实施例中,可以利用第二天线具有安全的发射距离的特点,第一电子设备和第二电子设备直接通过第二天线传输特定数据。
图6为本申请实施例提供的一种数据传输的方法的流程示意图。如图6所示,该 方法包括:
S601、第一电子设备接收到一个输入。
S601'、第二电子设备接收到一个输入。
其中,第一电子设备接收到一个输入,用于指示第一电子设备发送特定数据。该输入可以为用户输入,也可以为其他设备发送的指令。其中,用户输入包括用户操作特定按键、输入语音命令、特定的触摸操作、特定的隔空手势等。
第二电子设备接收到一个输入,用于指示第二电子设备接收特定数据。该输入可以为用户输入,也可以为其他设备发送的指令。其中,用户输入包括用户操作特定按键、输入语音命令、特定的触摸操作、特定的隔空手势等。
需要说明的是,本申请实施例中对S601和S601'的执行顺序不做限定。
S602、第一电子设备通过第一天线,以第一周期发送第一消息。
其中,第一消息,用于请求向第二电子设备传输特定数据。
S603、第二电子设备接收到第一消息,切换至第二电子设备的第二天线。
可选的,第二电子设备在接收第一消息后,可以提示第二电子设备的用户靠近第一电子设备,以便接收第一电子设备后续发送的特定数据。或者,第一电子设备执行S601或执行S602后,提示第一电子设备的用户靠近第二电子设备,以便后续第二电子设备能接收到第一电子设备后续发送的特定数据,本申请实施例对此不做限定。
S604、第二电子设备通过第二天线,以第二周期发送响应消息。
S605、在第二电子设备的第二天线的发射距离内,第一电子设备接收到响应消息。
换言之,当第一电子设备接收到响应消息后,表明第一电子设备位于第二电子设备的第二天线的发射距离内。相应的,第二电子设备也位于第一电子设备的第二天线的发射距离内。那么,第一电子设备通过第二天线发送特定数据时,第二电子设备确定能够接收到特定数据。
在另一些实施例中,也可以不执行S602-S605,即,S601之后,执行S606。
S606、第一电子设备根据第一电子设备的特定数据生成第二消息,切换至第一电子设备的第二天线。
S607、第一电子设备通过第二天线,发送第二消息。
换言之,本实施例中,无需第一电子设备和第二电子设备协商会话密钥,而是直接通过第二天线发送特定数据。这样,仅在第一电子设备的第二天线的发射距离内的电子设备可以接收到特定数据,从而保证发送特定数据的安全性。
S608、第二电子设备接收到第二消息,获取到特定数据。
S609、第二电子设备确定是否接收完第一电子设备的特定数据。
在一些示例中,特定数据的末尾可以携带特定标识,第二电子设备可以通过检测该特定标识确定是否接收完第一电子设备的特定数据。另一些示例中,特定数据的开头或末尾也可以携带特定数据的大小,第二电子设备也可以通过检测接收到的第一电子设备的特定数据的大小来确定是否接收完第一电子设备的特定数据,本申请实施例对此不做限定。
S610、第二电子设备确定接收完第一电子设备的特定数据,则通过第二天线,发送特定数据传输成功的消息。
S611、第一电子设备接收到特定数据传输成功消息,显示特定数据传输成功的消息和/或播放特定数据传输成功的语音,切换至第一天线。
S611'、第二电子设备显示特定数据传输成功的消息和/或播放特定数据传输成功的语音,切换至第一天线。
本申请实施例不限定S611和S611'的执行顺序。另外,本申请实施例可以执行S611和S611'中任一个步骤,或者两个步骤均执行,或者两个步骤均不执行。
其他内容可参考上述实施例中相关内容的描述,这里不再赘述。
在有些场景下,由于某些特殊的原因,第二电子设备无法联网。比如,第二电子设备无法连接路由设备,无法通过路由设备的Wi-Fi将第二电子设备的数据传输出来。而为了查明原因,需要从第二电子设备处获取到第二电子设备记录的历史日志,便于维护人员分析出具体原因,以便维修。此时,就需要简易便捷地从第二电子设备处读取到第二电子设备存储的日志信息。图7就提供了这样场景下的一种数据传输方法。图7为本申请实施例提供的一种数据传输的方法的流程示意图。如图7所示,该方法包括:
S701、第一电子设备接收到一个输入。
S701'、第二电子设备接收到一个输入。
其中,第一电子设备接收到一个输入,用于指示第一电子设备收集特定数据。该输入可以为用户输入,也可以为其他设备发送的指令。其中,用户输入包括用户操作特定按键、输入语音命令、特定的触摸操作、特定的隔空手势等。其中,特定数据例如为运行日志。
第二电子设备接收到一个输入,用于指示第二电子设备发送特定数据。该输入可以为用户输入,也可以为其他设备发送的指令。其中,用户输入包括用户操作特定按键、输入语音命令、特定的触摸操作、特定的隔空手势等。第二电子设备可以未联网,未连接到互联网或者移动通信网络。
需要说明的是,本申请实施例中对S701和S701'的执行顺序不做限定。
S702、第一电子设备通过第一天线,以第一周期发送第一消息。
其中,第一消息,用于请求第一电子设备收集第二电子设备特定数据。例如,第一电子设备请求收集第二电子设备的运行日志。
作为一个示例,第一电子设备可以在SDF publish消息中携带收集设备运行日志的服务标识、第一电子设备的标识等信息。作为另一个示例,第一电子设备可以通过BLE beacon中携带收集设备运行日志的服务标识、第一电子设备的标识等信息。
S703、第二电子设备接收到第一消息,切换至第二电子设备的第二天线。
S704、第二电子设备通过第二天线,以第二周期发送第二消息。
其中,第二消息中可以携带第二电子设备的信息,例如第二电子设备的设备类型(例如,product ID)、设备名称、登录账号信息等。可选的,第二消息中还可以携带第二电子设备随机生成会话密钥(例如AES 128Key),可用于后续第一电子设备对第二电子设备加密的特定数据进行解密。换言之,第二电子设备通过第二天线传输会话密钥,进而保证会话密钥的安全传输。
S705、在第二电子设备的第二天线的发射距离内,第一电子设备接收到第二消息。
S706、第一电子设备发送针对第二消息的响应消息。
S707、第二电子设备接收到第二消息的响应消息后,切换至第一天线。
S708、第二电子设备通过第一天线,发送包含特定数据的第三消息。
在一些示例中,第二电子设备可以使用S704中生成的会话密钥对特定数据进行加密。
S709、第一电子设备接收到第三消息。
一些示例中,第一电子设备根据接收到的会话密钥对第三消息进行解密,得到特定数据。
S710、第一电子设备向第二电子设备发送第三消息接收成功的响应消息。
S711、第一电子设备显示特定数据传输成功的消息和/或播放特定数据传输成功的语音,切换至第一天线。
S711'、第二电子设备显示特定数据传输成功的消息和/或播放特定数据传输成功的语音,切换至第一天线。
本申请实施例不限定S711和S711'的执行顺序。另外,本申请实施例可以执行S711和S711'中任一个步骤,或者两个步骤均执行,或者两个步骤均不执行。
其他内容可参考上述实施例中相关内容的描述,这里不再赘述。
下面介绍几种本申请实施例提供的技术方案的应用场景的示意。
场景一、用户新购大量设备类型相同或相似的设备。这些设备的设置信息相同或类似。于是,用户可以先通过例如手机等对其中一个电子设备进行设置。已设置好的电子设备即为第一电子设备。然后,将已设置好的电子设备的配置信息直接克隆到其他电子设备(即第二电子)上,以完成其他电子设备的设置。
例如,新购入多个智能照明设备(智能台灯、吸顶灯、智能灯带、香薰灯等)。用户可以先通过手机与其中的照明设备A建立无线连接,通过“智慧生活”或者其他应用,对照明设备进行配网、设置亮度色温等灯光参数,是否延迟关闭、延迟关闭的时长、是否自动进行固件升级、用电量门限设置等。即,照明设备A存储有配置信息。而后,用户可以将照明设备A的配置信息克隆到其他的照明设备上(例如照明设备B、照明设备C等)。
在一种实施方式中,照明设备A和照明设备B在分别接收到一个输入后,照明设备A与照明设备B相互靠近至30cm的范围内时,照明设备A的配置数据传输至照明设备B。这样,用户仅需对照明设备A和照明设备B触发一个输入后,将两者相互靠近至预设的安全距离内,两者即可实现特定数据的传输。用户的操作非常简便,尤其适于老人、孩子等理解能力、操作能力较弱的人,便于掌握。
在一种实施方式中,特定数据可由电子设备的控制设备或绑定设备预先设置好。比如,主人的手机可预先设置IoT灯的特定数据为配置数据。
需要注意的是,本申请实施例利用了超短距无线通信的安全距离传输密钥,在第一天线工作时,传输密钥加密后的数据,并在另一电子设备处实现解密,从而在物理上保证了照明设备A与照明设备B之间传输的安全性,消除了中间设备的攻击以及数据泄露风险。
而后,可以采用相同的方法完成将照明设备A的配置信息克隆到照明设备C等其 他设备上。或者,采用相同的方法完成照明设备B的配置信息克隆到照明设备C等其他设备上。
由上可见,对于需要给多个电子设备设置相同的配置信息时,可以先对设置其中一个电子设备。而后,将设置好的电子设备中的配置信息直接克隆到其他电子设备上。简化了用户分别设置多个电子设备的流程,提高了设置多个电子设备的效率。
又例如,在智能家居生活中,通常需要设置大量的传感器。例如,烟雾传感器、燃气传感器、水浸探测器、异响传感器等。这些传感器虽然为不同类型的传感器,但配置信息大体上相同或类似。配置信息例如包括接入网络的网络信息、告警触发动作、静默时间、定时器设置、固件升级设置等。因此,也可以采用本申请实施例的方法,先对其中一个传感器进行设置,再使用设置好的传感器将配置信息克隆到其他传感器,以避免对类似的传感器重复进行设置,简化用户操作,提高设置效率。
此外,由于本申请实施例提供的方法极少涉及到用户界面操作,针对智能家居中大量的没有显示屏的设备来说,本申请实施例提供的方法更加友好,便于实现。
场景二、用户使用新的电子设备更换旧的电子设备。新的电子设备通常与旧的电子设备为类型相同的设备,且型号接近。那么,可以直接将旧的电子设备上的配置信息和/或用户数据克隆到新的电子设备上。从而避免将旧的电子设备上的配置信息和/或用户数据导出到中间设备,再由中间设备导回到新的电子设备,提升了数据的安全性,又简化了用户操作。
场景三、家庭中某个不能上网或者配网失败的IoT设备发生运行故障。一般,IoT设备出现故障时,会通过网络将运行日志发送到手机或电脑上。或者,IoT设备通过例如串口等通信接口打印运行日志到手机或电脑上,以便用户进行故障分析,问题定位。在本方案中,可以将IoT设备的运行日志通过超短距的方式发送其他电子设备上,通过其他电子设备查看该电子设备的运行日志,便于对该电子设备进行故障分析,以便维护该电子设备。由此解决了不能上网或者配网失败或者不具有外接通信接口的IoT设备的维护问题。
例如,如图8中的(1)所示,用户可以打开手机中“智慧生活”APP,进入家居设备列表界面801。可见,手机绑定有空调、智能台灯以及智能音箱三个设备。其中,智能台灯处于未连网状态。进一步的,响应于用户操作控件802,手机向智能台灯发送请收集智能台灯的运行日志的消息,即,执行S702,以及执行之后的步骤。在手机收集智能台灯的过程中,手机还显示如图8中的(2)所示的提示界面803。提示界面803中的提示信息804,用于提示用户正在收集智能台灯的运行日志。在手机成功接收到智能台灯的运行日志后,手机可以显示如图8中的(3)所示的提示界面805,其中提示信息806用于提示用户已成功收集到智能台灯的运行日志。可选的,提示信息806还包括查看控件807。响应于用户操作控件807,手机显示智能台灯的运行日志,便于用户对智能台灯的运行情况进行故障分析等。需要注意的是,在另一些实施例中,手机与智能台灯也可以没有预先进行绑定,手机也可以请求收集该智能台灯的运行日志,本申请对此不做限定。
图9为本申请实施例提供一种电子设备的结构示意图。如图9所示,该电子设备包括:一个或多个处理器910,一个或多个存储器920,以及一个或多个计算机程序。 其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行上述实施例中的第一电子设备或第二电子设备执行的操作。
如图10所示,本申请实施例还提供一种芯片系统,该芯片系统包括至少一个处理器1001和至少一个接口电路1002。处理器1001和接口电路1002可通过线路互联。例如,接口电路1002可用于从其它装置(例如第一电子设备100的存储器,或第二电子设备200的存储器)接收信号。又例如,接口电路1002可用于向其它装置(例如处理器1001)发送信号。示例性的,接口电路1002可读取存储器中存储的指令,并将该指令发送给处理器1001。当所述指令被处理器1001执行时,可使得电子设备执行上述实施例中的第一电子设备100或第二电子设备200执行的各个步骤。当然,该芯片系统还可以包含其他分立器件,本申请实施例对此不作具体限定。
本申请实施例还提供一种装置,该装置包含在电子设备中,该装置具有实现上述实施例中任一方法中电子设备行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括至少一个与上述功能相对应的模块或单元。例如,检测模块或单元、显示模块或单元、确定模块或单元、以及计算模块或单元等。
本申请实施例还提供一种计算机存储介质,包括计算机指令,当计算机指令在电子设备上运行时,使得电子设备执行如上述实施例中任一方法。
本申请实施例还提供一种计算机程序产品,当计算机程序产品在计算机上运行时,使得计算机执行如上述实施例中任一方法。
本申请实施例还提供一种电子设备上的图形用户界面,所述电子设备具有显示屏、摄像头、存储器、以及一个或多个处理器,所述一个或多个处理器用于执行存储在所述存储器中的一个或多个计算机程序,所述图形用户界面包括所述电子设备执行如上述实施例中任一方法时显示的图形用户界面。
可以理解的是,上述电子设备等为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请实施例能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明实施例的范围。
本申请实施例可以根据上述方法示例对上述电子设备等进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本发明实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请实施例各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:快闪存储器、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (29)

  1. 一种电子设备,其特征在于,所述电子设备包括:
    一个或多个处理器;
    一个或多个存储器;
    一个第一天线;
    一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;
    以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下步骤:
    接收到一个输入;
    响应于所述输入,通过所述第一天线以第一周期发送第一消息;
    接收到另一电子设备的第二消息;
    响应于所述第二消息,切换至所述第二天线,并通过所述第二天线以第二周期发送第三消息;其中,所述第三消息包含特定数据;
    接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第三消息后,提示所述特定数据传输成功。
  2. 一种电子设备,其特征在于,所述电子设备包括:
    一个或多个处理器;
    一个或多个存储器;
    一个第一天线;
    一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;
    以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下步骤:
    接收到一个输入;
    响应于所述输入,通过所述第一天线以第一周期发送第一消息;
    接收到另一电子设备的第二消息;
    响应于所述第二消息,从所述第二消息中获取到第一随机数,生成第二随机数,并切换至所述第二天线,通过所述第二天线发送包含所述第二随机数的第三消息;
    根据所述第一随机数和所述第二随机数生成会话密钥,使用所述会话密钥对特定数据进行加密,并向所述另一电子设备发送第四消息,所述第四消息包括加密后的所述特定数据。
  3. 根据权利要求2所述的电子设备,其特征在于,接收到所述另一电子设备的所 述特定数据传输成功的消息后,或者,在发送完所述第四消息后,提示所述特定数据传输成功。
  4. 根据权利要求2或3所述的电子设备,其特征在于,所述使用所述会话密钥对所述特定数据进行加密,并向所述另一电子设备发送第四消息,具体包括:
    切换至所述电子设备的所述第一天线,通过所述电子设备的所述第一天线发送所述第四消息。
  5. 根据权利要求2-4中任意一项所述的电子设备,其特征在于,所述电子设备还执行:
    所述第四消息还包括所述特定数据的第一完整校验值。
  6. 根据权利要求3-5中任意一项所述的电子设备,其特征在于,所述提示所述特定数据传输成功,包括:显示所述特定数据成功传输的消息,和/或,播放所述特定数据成功传输的语音。
  7. 根据权利要求2-6中任意一项所述的电子设备,其特征在于,所述特定数据包括配置信息和用户数据中的至少一项;其中,所述配置信息包括网络配置信息、传感器告警门限设置信息、告警触发动作信息、静默时间设置信息、定时器设置信息、固件升级设置信息和用电门限设置信息中的一项或多项;所述用户数据包括应用程序的安装数据,所述电子设备上存储的照片、视频、录音和文件,以及所述电子设备的运行日志中的一项或多项。
  8. 一种电子设备,其特征在于,所述电子设备包括:
    一个或多个处理器;
    一个或多个存储器;
    一个第一天线;
    一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;
    以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下操作:
    接收到一个输入;
    接收到另一电子设备的第一消息;
    响应于所述第一消息,切换至所述第二天线,生成第一随机数,通过所述第二天线以第二周期发送包括所述第一随机数的第二消息;
    接收到所述另一电子设备的第三消息;
    响应于所述第三消息,从所述第三消息中获取到第二随机数,根据所述第一随机数和所述第二随机数生成会话密钥;
    接收到所述另一电子设备的第四消息;
    响应于所述第四消息,从所述第四消息中获取到加密后的特定数据,使用所述会话密钥进行解密得到所述特定数据。
  9. 根据权利要求8所述的电子设备,其特征在于,所述电子设备还执行:
    接收到所述另一电子设备发送的所述特定数据的第一完整校验值,计算所述特定数据的第二完整校验值;
    在所述第二完整校验值与所述第一完整校验值相等后,向所述另一电子设备发送所述特定数据传输成功的消息。
  10. 根据权利要求9所述的电子设备,其特征在于,向所述另一电子设备发送所述特定数据传输成功的消息,具体包括:
    切换至所述第一天线,使用所述第一天线发送所述特定数据传输成功的消息。
  11. 一种电子设备,所述电子设备未接入路由设备或热点,其特征在于,所述电子设备包括:
    一个或多个处理器;
    一个或多个存储器;
    一个第一天线;
    一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;
    以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下操作:
    接收到一个输入;
    接收到另一电子设备的第一消息;
    响应于所述第一消息,切换至所述第二天线,并通过所述第二天线发送第二消息;其中,第二消息包括所述电子设备的特定数据;
    接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第二消息后,提示所述特定数据传输成功。
  12. 一种数据传输的电子设备,所述电子设备未接入路由设备或热点,其特征在于,所述电子设备包括:
    一个或多个处理器;
    一个或多个存储器;
    一个第一天线;
    一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;
    以及一个或多个计算机程序,其中所述一个或多个计算机程序存储在所述一个或多个存储器上,当所述计算机程序被所述一个或多个处理器执行时,使得所述电子设备执行如下操作:
    接收到一个输入;
    接收到另一电子设备的第一消息;
    响应于所述第一消息,切换至所述第二天线,并通过所述第二天线发送第二消息;
    接收到所述另一电子设备的针对所述第二消息的响应消息;
    响应于所述响应消息,切换至所述第一天线,并通过所述第一天线发送包含特定数据的第三消息;
    接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第三消息后,提示所述特定数据传输成功。
  13. 根据权利要求12所述的电子设备,其特征在于,所述第二消息包括会话密钥,所述第三消息包含经所述会话密钥加密后的特定数据。
  14. 根据权利要求12或13所述的电子设备,其特征在于,会话密钥为预先设置的;所述特定数据为所述电子设备的日志。
  15. 一种数据传输方法,所述方法应用于一种电子设备,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:
    接收到一个输入;
    响应于所述输入,通过所述第一天线以第一周期发送第一消息;
    接收到另一电子设备的第二消息;
    响应于所述第二消息,切换至所述第二天线,并通过所述第二天线以第二周期发送第三消息;其中,所述第三消息包含特定数据;
    接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第三消息后,提示所述特定数据传输成功。
  16. 一种数据传输方法,所述方法应用于电子设备,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:
    接收到一个输入;
    响应于所述输入,通过所述第一天线以第一周期发送第一消息;
    接收到另一电子设备的第二消息;
    响应于所述第二消息,从所述第二消息中获取到第一随机数,生成第二随机数,并切换至所述第二天线,通过所述第二天线发送包含所述第二随机数的第三消息;
    根据所述第一随机数和所述第二随机数生成会话密钥,使用所述会话密钥对特定数据进行加密,并向所述另一电子设备发送第四消息,所述第四消息包括加密后的所述特定数据。
  17. 根据权利要求16所述的方法,其特征在于,接收到所述另一电子设备的所述 特定数据传输成功的消息后,或者,在发送完所述第四消息后,提示所述特定数据传输成功。
  18. 根据权利要求16或17所述的方法,其特征在于,所述使用所述会话密钥对所述特定数据进行加密,并向所述另一电子设备发送第四消息,具体包括:
    切换至所述电子设备的所述第一天线,通过所述电子设备的所述第一天线发送所述第四消息。
  19. 根据权利要求16-18中任意一项所述的方法,其特征在于,所述方法还包括:所述第四消息还包括所述特定数据的第一完整校验值。
  20. 根据权利要求17-19中任意一项所述的方法,其特征在于,所述提示所述特定数据传输成功,包括:显示所述特定数据成功传输的消息,和/或,播放所述特定数据成功传输的语音。
  21. 根据权利要求16-20中任意一项所述的方法,其特征在于,所述特定数据包括配置信息和用户数据中的至少一项;其中,所述配置信息包括网络配置信息、传感器告警门限设置信息、告警触发动作信息、静默时间设置信息、定时器设置信息、固件升级设置信息和用电门限设置信息中的一项或多项;所述用户数据包括应用程序的安装数据,所述电子设备上存储的照片、视频、录音和文件,以及所述电子设备的运行日志中的一项或多项。
  22. 一种数据传输方法,所述方法应用于电子设备,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:接收到一个输入;
    接收到另一电子设备的第一消息;
    响应于所述第一消息,切换至所述第二天线,生成第一随机数,通过所述第二天线以第二周期发送包括所述第一随机数的第二消息;
    接收到所述另一电子设备的第三消息;
    响应于所述第三消息,从所述第三消息中获取到第二随机数,根据所述第一随机数和所述第二随机数生成会话密钥;
    接收到所述另一电子设备的第四消息;
    响应于所述第四消息,从所述第四消息中获取到加密后的特定数据,使用所述会话密钥进行解密得到所述特定数据。
  23. 根据权利要求22所述的方法,其特征在于,所述方法还包括:
    接收到所述另一电子设备发送的所述特定数据的第一完整校验值,计算所述特定数据的第二完整校验值;
    在所述第二完整校验值与所述第一完整校验值相等后,向所述另一电子设备发送所述特定数据传输成功的消息。
  24. 根据权利要求23所述的方法,其特征在于,向所述另一电子设备发送所述特定数据传输成功的消息,具体包括:
    切换至所述第一天线,使用所述第一天线发送所述特定数据传输成功的消息。
  25. 一种数据传输方法,所述方法应用于一种电子设备,所述电子设备未接入路由设备或热点,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:
    接收到一个输入;
    接收到另一电子设备的第一消息;
    响应于所述第一消息,切换至所述第二天线,并通过所述第二天线发送第二消息;其中,第二消息包括所述电子设备的特定数据;
    接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第二消息后,提示所述特定数据传输成功。
  26. 一种数据传输方法,所述方法应用于一种电子设备,所述电子设备未接入路由设备或热点,所述电子设备包括:一个或多个处理器;一个或多个存储器;一个第一天线;一个第二天线,所述第二天线的发射距离小于等于预设的安全发射距离;其中,所述第一天线和所述第二天线为不同的天线,第二天线的发射距离小于第一天线的发射距离;或者,所述第一天线和所述第二天线为同一天线,且所述第二天线配置的发射功率小于所述第一天线配置的发射功率;所述方法包括:
    接收到一个输入;
    接收到另一电子设备的第一消息;
    响应于所述第一消息,切换至所述第二天线,并通过所述第二天线发送第二消息;
    接收到所述另一电子设备的针对所述第二消息的响应消息;
    响应于所述响应消息,切换至所述第一天线,并通过所述第一天线发送包含特定数据的第三消息;
    接收到所述另一电子设备的所述特定数据传输成功的消息后,或者,在发送完所述第三消息后,提示所述特定数据传输成功。
  27. 根据权利要求26所述的方法,其特征在于,所述第二消息包括会话密钥,所述第三消息包含经所述会话密钥加密后的特定数据。
  28. 根据权利要求26或27所述的方法,其特征在于,所述会话密钥为预先设置的;所述特定数据为所述电子设备的日志。
  29. 一种计算机可读存储介质,其特征在于,包括计算机程序,当所述计算机程序在电子设备上运行时,使得所述电子设备执行如权利要求15-28中任意一项所述的方法。
PCT/CN2021/115541 2020-08-31 2021-08-31 一种数据传输方法及电子设备 WO2022042740A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010899646.3 2020-08-31
CN202010899646.3A CN114205812A (zh) 2020-08-31 2020-08-31 一种数据传输方法及电子设备

Publications (1)

Publication Number Publication Date
WO2022042740A1 true WO2022042740A1 (zh) 2022-03-03

Family

ID=80354705

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/115541 WO2022042740A1 (zh) 2020-08-31 2021-08-31 一种数据传输方法及电子设备

Country Status (2)

Country Link
CN (1) CN114205812A (zh)
WO (1) WO2022042740A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1692807A1 (en) * 2003-10-29 2006-08-23 Argelcom Limited A secure cryptographic communication system using kem-dem
CN101420303A (zh) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 一种语音数据的通信方法及其装置
CN105530016A (zh) * 2014-09-30 2016-04-27 联想(北京)有限公司 信号处理方法及装置
CN105933119A (zh) * 2015-12-24 2016-09-07 中国银联股份有限公司 一种认证方法及设备
CN109993868A (zh) * 2019-04-01 2019-07-09 胡渐佳 一种智能门锁无线开锁方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408688B (zh) * 2015-07-27 2021-05-18 法雷奥舒适驾驶助手公司 对轮询识别中身份编码识别的改进
US10574445B2 (en) * 2016-12-21 2020-02-25 Intel IP Corporation Range constrained device configuration
EP3582530B1 (en) * 2017-03-03 2023-02-22 Huawei Technologies Co., Ltd. Method for connecting to network, mobile terminal, electronic device, and graphical user interface
EP3604721A4 (en) * 2017-03-30 2020-04-15 Mitsubishi Jidosha Kogyo Kabushiki Kaisha VEHICLE COMMUNICATION SYSTEM

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1692807A1 (en) * 2003-10-29 2006-08-23 Argelcom Limited A secure cryptographic communication system using kem-dem
CN101420303A (zh) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 一种语音数据的通信方法及其装置
CN105530016A (zh) * 2014-09-30 2016-04-27 联想(北京)有限公司 信号处理方法及装置
CN105933119A (zh) * 2015-12-24 2016-09-07 中国银联股份有限公司 一种认证方法及设备
CN109993868A (zh) * 2019-04-01 2019-07-09 胡渐佳 一种智能门锁无线开锁方法

Also Published As

Publication number Publication date
CN114205812A (zh) 2022-03-18

Similar Documents

Publication Publication Date Title
US11259178B2 (en) Bluetooth mesh network provisioning authentication
JP7298005B2 (ja) メッシュネットワークコミッショニング
WO2021018153A1 (zh) 一种设备配网注册的方法、设备及系统
US20230093016A1 (en) Discovery and provisioning method, electronic device, and system
WO2016041329A1 (zh) 接入无线网络的方法及装置
CN106888206B (zh) 密钥交换方法、装置及系统
CN108886685B (zh) 一种终端匹配方法、装置
JP2018523384A (ja) 遠隔制御プロキシデバイスを介して遠隔制御デバイスを使用してIoTデバイスを制御すること
JP2016533055A (ja) パッシブニアフィールド通信を使用するワイヤレス構成
WO2022022175A1 (zh) 多媒体数据处理方法、装置、电子设备及存储介质
CN117055833A (zh) 一种传屏方法、设备及存储介质
WO2016173190A1 (zh) 信息提供方法和装置
US20190306714A1 (en) Method and system for accessing wireless network by smart device
JP2007202112A (ja) 無線ローカルエリアネットワークへアクセスする電子装置を設定するシステム及び方法
WO2023001082A1 (zh) 一种配网方法及装置
WO2016049895A1 (zh) 配置的方法、配置的装置及设备
CN113794996B (zh) 设备通信、设备控制方法、装置、电子设备和存储介质
WO2022028333A1 (zh) 一种自动控制方法、电子设备及计算机可读存储介质
WO2022042740A1 (zh) 一种数据传输方法及电子设备
WO2017067330A1 (zh) 一种配置管理无线接入点的装置和方法
WO2022042170A1 (zh) 一种IoT设备及其授权方法
JP6545224B2 (ja) 通信装置、制御方法、及びプログラム
CN112672335B (zh) 一种蓝牙广播加密通信方法和系统
CN117440349A (zh) 组网方法和电子设备
JP6299264B2 (ja) 制限エリア内で認証を行うモバイル装置、システム及び方法

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21860572

Country of ref document: EP

Kind code of ref document: A1