WO2022089012A1 - Procédé de communication, dispositif électronique et support d'enregistrement lisible par ordinateur - Google Patents

Procédé de communication, dispositif électronique et support d'enregistrement lisible par ordinateur Download PDF

Info

Publication number
WO2022089012A1
WO2022089012A1 PCT/CN2021/116982 CN2021116982W WO2022089012A1 WO 2022089012 A1 WO2022089012 A1 WO 2022089012A1 CN 2021116982 W CN2021116982 W CN 2021116982W WO 2022089012 A1 WO2022089012 A1 WO 2022089012A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
message
communication
information
packet
Prior art date
Application number
PCT/CN2021/116982
Other languages
English (en)
Chinese (zh)
Inventor
张志军
王皓
郭兴民
姚松平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022089012A1 publication Critical patent/WO2022089012A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present application belongs to the field of communication technologies, and in particular, relates to a communication method, an electronic device, and a computer-readable storage medium.
  • path attack also known as “path discrimination”
  • DoS Denial of Service
  • the embodiments of the present application provide a communication method, an electronic device, and a computer-readable storage medium, which can solve the problem that the current "path attack” solution has high cost and is not conducive to promotion and application.
  • an embodiment of the present application provides a communication method, including:
  • the first electronic device monitors the communication link
  • the first electronic device controls the Wi-Fi communication module of the first electronic device to enter the promiscuous mode, and sends the first message in the form of broadcasting.
  • the first electronic device can monitor the link state of the communication link related to the device.
  • the communication service between the first electronic device and other electronic devices in the local area network may be interrupted.
  • the first electronic device can control the Wi-Fi communication module of the first electronic device to enter a promiscuous mode (also called a debug mode).
  • a promiscuous mode also called a debug mode
  • the Wi-Fi communication module of the first electronic device can receive all packets passing through the Wi-Fi communication module, regardless of whether the destination address of the packets is directed to the first electronic device.
  • the promiscuous mode is used for fault detection or functional testing of the Wi-Fi communication module, but in the communication method of the present application, the promiscuous mode is used to maintain the communication service of the Wi-Fi communication module.
  • the first electronic device When the first electronic device controls the Wi-Fi communication module to enter the promiscuous mode, the first electronic device can monitor the information broadcast by other electronic devices in the local area network through the promiscuous mode, and the first electronic device can encapsulate the information to be transmitted into the first electronic device. A message, the first message is sent in the form of broadcast.
  • the first electronic device can perform data interaction with other electronic devices in the local area network through the promiscuous mode of the Wi-Fi communication module and the broadcast mechanism, so as to maintain the communication service and avoid interruption of the communication service.
  • the monitoring of the communication link by the first electronic device includes:
  • the first electronic device monitors the communication link through a heartbeat interlock mechanism.
  • the first electronic device when the first electronic device monitors the communication link, the first electronic device may establish a heartbeat interlock mechanism with the electronic device at the opposite end of the communication link.
  • the first electronic device can establish a heartbeat interlocking mechanism with the electronic device at the opposite end of the communication link
  • the first electronic device and the electronic device at the opposite end can detect whether the communication link fails by sending heartbeat information to each other.
  • either end cannot receive the heartbeat information, it means that the communication link is under attack, and the electronic device that cannot receive the heartbeat information will stop maintaining the heartbeat interlock mechanism, so that the electronic device at the opposite end cannot receive the heartbeat information.
  • the electronic devices at both ends of the communication link can successively detect that the communication link is attacked through the heartbeat interlocking mechanism.
  • the first packet is an injection packet
  • the sending of the first packet in the form of broadcasting includes:
  • the first electronic device injects the injection message into the air interface of the Wi-Fi communication module, and sends the injection message in the form of broadcast.
  • the above-mentioned first packet may be an injection packet.
  • the injection message may be injected into the air interface of the Wi-Fi communication module, and the injection message may be sent in the form of broadcasting.
  • the first electronic device injects the injection message into the air interface for broadcasting, and may not perform the carrier sensing action and the collision detection action specified in the 802.11 protocol, so as to ensure that the Wi-Fi communication module can smoothly broadcast the injection message.
  • the first packet includes a fault packet
  • the fault packet includes fault information of the communication link.
  • the first message broadcast by the first electronic device may include a fault message.
  • the fault message is used to record the fault information of the communication link.
  • the fault information may include one or more items of information such as fault time, fault object, and fault type.
  • the first packet includes a service packet
  • the service packet includes service information of the first electronic device.
  • the first message broadcast by the first electronic device may also include a service message.
  • the first electronic device has a specific service function, and when the first electronic device performs the service function, it may generate service information that needs to be transmitted externally.
  • the infrared sensor when it detects abnormal infrared information in a certain area, it can transmit the location information of the area to the camera, and the camera adjusts the direction of the lens according to the received location information, takes the image of the above area, and completes the connection between the infrared sensor and the camera. linkage.
  • the location information of the above area is the business information that the infrared sensor needs to transmit to the camera.
  • the first message broadcast by the first electronic device may include a service message.
  • the service message includes service information of the first electronic device.
  • the first electronic device transmits the service information to other electronic devices in the local area network through the service message.
  • the method further includes:
  • the first electronic device counts the number of first response information received within a preset response time period, where the first response information is information fed back by the second electronic device after receiving the first message, and the first response information is the information fed back by the second electronic device after receiving the first message.
  • An electronic device and the second electronic device are in the same local area network;
  • the first electronic device If the quantity of the first response information is less than or equal to a preset first response threshold, the first electronic device rebroadcasts the first message.
  • the second electronic device in the local area network that receives the first message can feed back the first response information to the first electronic device.
  • the first electronic device may count the number of received first response information within a preset response time period.
  • the first electronic device may determine that the broadcast of the first message is successful.
  • the first electronic device may determine that the broadcast of the first message fails, and re-broadcast the first message.
  • the method further includes:
  • the first electronic device When the first electronic device receives the second message broadcast by the second electronic device, the first electronic device verifies the signature of the second message;
  • the first electronic device saves the second message.
  • the first electronic device when the first electronic device receives the second message broadcast by the second electronic device, the first electronic device can use the public key of the second electronic device to verify the signature of the second message.
  • the first electronic device can use its own private key to sign the second message and store it locally.
  • the first electronic device may perform the first preset operation.
  • the specific form of the first preset operation can be set according to the actual situation.
  • the first preset operation may be that the first electronic device discards the message; or, the first preset operation may be that the first electronic device records and stores the message as a malicious message.
  • the method further includes:
  • the first electronic device sends first response information to the second electronic device.
  • the first electronic device can also send the first response information to the second electronic device that sends the second message, informing the second electronic device that it has received the above-mentioned Second message.
  • the method further includes:
  • the first electronic device When the first electronic device receives the audit request sent by the management device, the first electronic device sends the locally stored second message to the management device.
  • the management device may be any electronic device in the current communication system, or the management device may also be an electronic device outside the current communication system.
  • the management device may be communicatively connected to each electronic device through wired communication connection and/or wireless communication connection, and the embodiment of the present application does not impose any limitation on the communication connection between the management device and the electronic device.
  • the management device can send audit requests to each electronic device in the local area network.
  • the audit request is used to instruct each electronic device to send the locally stored first message and/or the second message to the management device, so that the management device can restore the fault according to the first message and/or the second message sent by each electronic device Development process and understanding the business operation of individual electronic devices during failures.
  • device 1 first detects that the communication link is faulty, broadcasts message 1, and message 1 records failure time 1; then device 2 broadcasts message 2, and message 2 records failure time 2 ; Device 3 broadcasts message 3 after a delay, and message 3 records failure time 3.
  • the management device obtains the message 1, message 2 and message 3 from each electronic device through the audit request, and obtains the failure time 1, the failure time through the message 1, the message 2 and the message 3. time 2 and failure time 3.
  • the management device can infer the node that fails first and the development process of the failure through the failure time 1, the failure time 2, and the failure time 3.
  • the first electronic device When the first electronic device receives the audit request, the first electronic device can send the locally stored second message to the management device, so that the management device can restore the facts according to the second message of the first electronic device.
  • the method further includes:
  • the first electronic device sends an audit request to each second electronic device, and the first electronic device and the second electronic device are in the same local area network;
  • the first electronic device receives a third message returned by each of the second electronic devices, where the third message is the first message and/or the second message received and saved by the second electronic device;
  • the first electronic device determines a target message corresponding to each of the third messages according to the third messages returned by each of the second electronic devices and a preset processing rule.
  • the first electronic device may be designated as the management device by the user.
  • the first electronic device may send an audit request to each second electronic device in the local area network.
  • Each second electronic device returns a third message to the first electronic device when receiving the audit request.
  • the third message is the first message saved by the second electronic device and/or the second message broadcast by other second electronic devices.
  • the first electronic device determines the target message corresponding to each third message according to the third message returned by each second electronic device and the preset processing rule.
  • the above-mentioned target message may be understood as a message with higher authenticity and integrity, and may also be understood as a true version and/or a complete version of the third message.
  • the above preset processing rules can be set according to actual needs.
  • the above-mentioned preset processing rules may include any one or a combination of operations such as screening, splicing and restoration, and voting.
  • the target packet corresponding to each of the third packets is determined according to the third packets returned by each of the second electronic devices and a preset processing rule, including :
  • the first electronic device performs a splicing and restoration operation on each of the third packets to obtain a target packet corresponding to each of the third packets.
  • the first electronic device can perform a splicing and restoration operation on the incomplete third packets, and then multiple third packets expressing the same content are deleted. The comparison and splicing are performed, thereby restoring the target message with higher integrity corresponding to the third message.
  • the target packet corresponding to each of the third packets is determined according to the third packets returned by each of the second electronic devices and a preset processing rule, including :
  • a voting operation is performed on the third packet with the at least two versions, and the version with the highest number of votes is used as the corresponding third packet with the at least two versions. target message.
  • these attacked second electronic devices may forge or tamper with the third packet, resulting in at least two versions of some third packets.
  • the first electronic device can perform a voting operation on these third packets with at least two versions.
  • the version with the highest number of votes is used as the target message corresponding to the third message with at least two versions.
  • the above fault may be a path attack.
  • the electronic devices at both ends of the communication link cannot perform normal data exchange.
  • the first electronic device can maintain the communication service with other electronic devices through the above-mentioned communication method.
  • the above-mentioned fault may also be a link fault other than a path attack.
  • the first electronic device When the first electronic device detects any link failure that affects the normal operation of the communication link, the first electronic device can maintain the communication service through the above communication method, and the present application does not limit the failure type of the above failure.
  • an embodiment of the present application provides a communication device, including:
  • the link monitoring module is used to monitor the communication link
  • the service maintenance module is configured to control the Wi-Fi communication module of the first electronic device to enter the promiscuous mode when the communication link fails, and send the first message in the form of broadcasting.
  • the link monitoring module is specifically configured to monitor the communication link through a heartbeat interlocking mechanism.
  • the first message is an injection message
  • the service maintenance module includes:
  • the injection sub-module is used for injecting the injection message into the air interface of the Wi-Fi communication module, and sending the injection message in the form of broadcast.
  • the first packet includes a fault packet
  • the fault packet includes fault information of the communication link.
  • the first packet includes a service packet
  • the service packet includes service information of the first electronic device.
  • the apparatus further includes:
  • a response statistics module configured to count the number of first response information received within a preset response time period, where the first response information is information fed back after the second electronic device receives the first message, and the first response information is the information fed back after the second electronic device receives the first message.
  • An electronic device and the second electronic device are in the same local area network;
  • a rebroadcasting module configured to rebroadcast the first message if the quantity of the first response information is less than or equal to a preset first response threshold.
  • the apparatus further includes:
  • a signature verification module configured to verify the signature of the second message when receiving the second message broadcast by the second electronic device
  • a message storage module configured to save the second message if the signature verification of the second message passes.
  • the apparatus further includes:
  • a response sending module configured to send first response information to the second electronic device.
  • the apparatus further includes:
  • the message sending module is configured to send the second message stored locally to the management device when receiving the audit request sent by the management device.
  • the apparatus further includes:
  • an audit request module configured to send an audit request to each second electronic device, where the first electronic device and the second electronic device are in the same local area network;
  • a message receiving module configured to receive a third message returned by each of the second electronic devices, where the third message is the first message and/or the second message received and saved by the second electronic device ;
  • a fact confirmation module configured to determine a target message corresponding to each of the third messages according to the third messages returned by each of the second electronic devices and a preset processing rule.
  • the fact confirmation module includes:
  • the splicing sub-module is configured to perform a splicing and restoration operation on each of the third packets to obtain target packets corresponding to each of the third packets.
  • the fact confirmation module includes:
  • a voting submodule configured to perform a voting operation on the third message with at least two versions when any of the third messages has at least two versions, and use the version with the highest number of votes as the version with the at least two versions
  • the target packet corresponding to the third packet of .
  • an electronic device including a memory, a processor, and a computer program stored in the memory and executable on the processor.
  • the processor executes the computer program, the electronic device realizes the steps of the above method.
  • a computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, enables an electronic device to implement the steps of the above method.
  • a chip system in a fifth aspect, is provided, the chip system may be a single chip or a chip module composed of multiple chips, the chip system includes a memory and a processor, and the processor executes the storage in the memory.
  • the first electronic device monitors the communication link, and when the first electronic device detects that the communication link is faulty, the first electronic device controls the Wi-Fi communication module of the first electronic device to enter the hybrid mode, and send the first message in the form of broadcast.
  • the first electronic device and the Wi-Fi communication module of the opposite end electronic device both enter the promiscuous mode.
  • the Wi-Fi communication module can receive all the packets that pass through the Wi-Fi communication module, regardless of whether the destination address of the packets points to the device. Therefore, the first electronic device and the electronic device at the opposite end of the communication link can perform data interaction through a broadcast mechanism to maintain the communication service and avoid interruption of the communication service.
  • the communication method provided by the present application maintains the communication service by changing the working mode of the Wi-Fi communication module, without adding extra cost, and solves the current "path attack” solution.
  • the cost is high, which is not conducive to the problem of promotion and application, and has strong ease of use and practicability.
  • FIG. 1 is a schematic diagram of a communication system provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 8 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 9 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 10 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 11 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 12 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 13 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 14 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 15 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • 16 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • 17 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 18 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 19 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 20 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • 21 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 22 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 24 is a schematic diagram of an electronic device provided by an embodiment of the present application.
  • the term “if” may be contextually interpreted as “when” or “once” or “in response to determining” or “in response to detecting “.
  • the phrases “if it is determined” or “if the [described condition or event] is detected” may be interpreted, depending on the context, to mean “once it is determined” or “in response to the determination” or “once the [described condition or event] is detected. ]” or “in response to detection of the [described condition or event]”.
  • references in this specification to "one embodiment” or “some embodiments” and the like mean that a particular feature, structure or characteristic described in connection with the embodiment is included in one or more embodiments of the present application.
  • appearances of the phrases “in one embodiment,” “in some embodiments,” “in other embodiments,” “in other embodiments,” etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean “one or more but not all embodiments” unless specifically emphasized otherwise.
  • the terms “including”, “including”, “having” and their variants mean “including but not limited to” unless specifically emphasized otherwise.
  • the communication method provided by the embodiments of the present application can be applied to mobile phones, tablet computers, wearable devices, in-vehicle devices, augmented reality (AR)/virtual reality (VR) devices, notebook computers, super mobile personal computers ( Ultra-mobile personal computer, UMPC), netbook, personal digital assistant (personal digital assistant, PDA), smart home equipment and other electronic devices supporting wireless fidelity (Wireless Fidelity, Wi-Fi) communication function, the embodiment of the present application There is no restriction on the specific type of electronic equipment.
  • the smart home device can be a smart home that supports Wi-Fi communication functions, such as smart door locks, smart lamps, sweeping robots, smart curtains, smart air conditioners, and smart speakers. equipment.
  • the electronic devices in the Internet of Things can sign and encrypt the information to be transmitted, so as to ensure that the information will not be leaked during the transmission process, and the receiver of the information can verify the information through the signature.
  • the source of information so as to achieve trusted communication on the premise that the physical link is reachable.
  • path attack also known as “path discrimination”
  • DoS Denial of Service
  • this attack method attacks the availability of communication links and achieves targeted DoS, which makes specific electronic devices unable to transmit information externally, which is easy to damage to users. It poses a threat to personal and property safety and brings inconvenience to the user's life.
  • the monitoring device cannot transmit information to the outside world. Even if the monitoring device works normally and detects the illegal intrusion of a thief, the monitoring device cannot transmit the warning information to the user, resulting in User's property loss; Assuming that the control device of the smart door lock has suffered a "path attack", at this time, the control device cannot transmit information to the outside world, and cannot control the smart door lock to perform measures such as closing, unlocking, powering off, and starting protection.
  • each electronic device in the Internet of Things communicates with each other through P2P.
  • the information goes directly to the peer device without forwarding. , completely avoiding the "path attack”.
  • the embodiments of the present application provide a communication method, an electronic device, and a computer-readable storage medium, which can mitigate the threat of "path attack” without increasing additional costs, and solve the current "path attack” solution.
  • the cost of the scheme is high, which is not conducive to the problem of promotion and application, and has strong ease of use and practicability.
  • the communication system is a system to which the communication method provided by the embodiment of the present application is applied.
  • the communication system includes at least two electronic devices 101 (only two are shown in FIG. 1 ) and at least one routing device 102 (only one is shown in FIG. 1 ).
  • Both the electronic device 101 and the routing device 102 are provided with a Wi-Fi communication module.
  • the above-mentioned routing device 102 is used to create a local area network and open a hotspot through the Wi-Fi communication module of the device.
  • the above-mentioned routing device 102 may be a dedicated network device, or the above-mentioned routing device 102 may also be an electronic device 101 .
  • the above-mentioned routing device 102 may be a router dedicated to creating a local area network.
  • the above-mentioned routing device 102 may also be a desktop computer, and the desktop computer opens a hotspot, allowing other electronic devices 101 to access.
  • the above-mentioned electronic device 101 can access the hotspot opened by the routing device 102 through the Wi-Fi communication module of the device, enter the local area network, and exchange information with other electronic devices 101 through the local area network.
  • Routing devices create local area networks and open hotspots to allow other electronic devices to access.
  • any electronic device may be defined as the first electronic device, and the electronic device at the opposite end of the first electronic device may be defined as the second electronic device.
  • the first electronic device may directly communicate with the second electronic device.
  • the first electronic device and the second electronic device form a peer-to-peer (Peer to Peer, P2P) communication link.
  • P2P peer to Peer
  • the first electronic device may not be directly communicatively connected to the second electronic device.
  • the first electronic device and the second electronic device can access the hotspot opened by the routing device through the Wi-Fi communication module to enter the local area network, and the first electronic device exchanges information with the second electronic device through the local area network.
  • the first electronic device, the routing device, and the second electronic device form a communication link, and the routing device is an intermediate node between the first electronic device and the second electronic device.
  • the communication system includes electronic device A, electronic device B, electronic device C, and routing device D.
  • the electronic device A can establish a P2P communication link with the electronic device B, and when the electronic device A and the electronic device B exchange information, no intermediate node forwarding is required.
  • the electronic device A can form a communication link with the routing device D and the electronic device C.
  • the routing device D is an intermediate node between the electronic device A and the electronic device C.
  • routing devices there may be one or more routing devices. When there are multiple routing devices in the communication link, these routing devices are all intermediate nodes of the communication link.
  • the intermediate node of the communication link may be hacked, and the attacked intermediate node may selectively discard some or all of the packets from a specific electronic device, so that the specific electronic device cannot transmit the information. to other electronic devices.
  • the electronic device can select an appropriate method according to the actual scene to detect whether the communication link where the device is located is subject to a "path attack".
  • the first electronic device and the second electronic device may establish a heartbeat interlock mechanism, and detect whether the communication link suffers from a "path attack" through the heartbeat interlock mechanism.
  • an active party and a passive party can be included.
  • the active party can send the first heartbeat information to the passive party, and the passive party can return the second heartbeat information in response to the active party.
  • the specific duration of the heartbeat cycle can be set according to the actual situation.
  • the duration of the heartbeat cycle may be set to 100ms, 120ms, 150ms, or the like.
  • an appropriate duration should be selected according to actual needs. If the duration of the heartbeat period is too short, the heartbeat interlock detection is too frequent, and the transmission of a large amount of heartbeat information will increase the network overhead of the communication system. If the duration of the heartbeat cycle is too long, the detection is likely to be untimely, and the significance of detection is lost.
  • the active party can set the specific content of the first heartbeat information by itself. For example, the active party may set the content of the first heartbeat information to "0101", "1234", "4523” and so on.
  • the active party can set the replacement timing of the content of the first heartbeat information by itself. For example, the active party can change the content of the first heartbeat information every preset heartbeat cycle; or, the active party can change the content of the first heartbeat information every preset heartbeat cycle; or, the active party can also never replace the first heartbeat information.
  • the content of the heartbeat information can change the content of the first heartbeat information every preset heartbeat cycle; or, the active party can change the content of the first heartbeat information every preset heartbeat cycle; or, the active party can also never replace the first heartbeat information.
  • the active party When the active party sends the first heartbeat information, it will use the private key of the active party to sign the content of the first heartbeat information (hereinafter referred to as the first content information). Then the active party sends the signed first heartbeat information to the intermediate node, and the intermediate node forwards the first heartbeat information to the passive party.
  • the first content information hereinafter referred to as the first content information.
  • the passive party When the passive party receives the first heartbeat information forwarded by the intermediate node, the passive party uses the public key of the active party to verify the signature of the first heartbeat information, and if the verification passes, the passive party obtains the second content information.
  • the passive party signs the second content information using the passive party's private key to obtain second heartbeat information, and sends the second heartbeat information to the intermediate node, which forwards the second heartbeat information to the active party.
  • the passive party's public key is used to verify the signature of the second heartbeat information, and if the verification is passed, the active party obtains the third content information.
  • the active party compares the third content information with the first content information, and if the third content information is consistent with the first content information, it means that the second heartbeat information is sent by the passive party and has not been tampered with.
  • the intermediate node When the communication link between the active party and the passive party suffers from a "path attack", the intermediate node will drop the packets of the active party and/or the passive party in a targeted manner. At this time, the active party cannot receive the second heartbeat information responded by the passive party or the passive party cannot receive the first heartbeat information sent by the active party, so that the active party and the passive party discover that the communication link is attacked.
  • the intermediate node when the intermediate node specifically discards the message of the active party, the active party will send the first heartbeat information to the intermediate node, but the intermediate node does not forward the first heartbeat information.
  • the passive party determines that the communication link is under attack.
  • the first preset duration can be set according to actual conditions. Typically, the first preset duration should be longer than the heartbeat period. For example, assuming that the heartbeat period is 100ms, the first preset duration may be set to durations such as 120ms, 130ms, and 150ms.
  • the passive party since the passive party does not receive the first heartbeat information, the passive party cannot feed back the second heartbeat information to the intermediate node. Therefore, the active party cannot receive the second heartbeat information fed back by the passive party.
  • the active party When the active party detects that it has not received the second heartbeat information fed back by the passive party within the second preset time period after sending the first heartbeat information, the active party determines that the communication link is under attack and stops sending the first heartbeat information. .
  • the second preset duration can be set according to actual conditions.
  • the first preset duration may be set to durations such as 20ms, 30ms, and 50ms.
  • the active party sends the first heartbeat information to the intermediate node, and the intermediate node forwards the first heartbeat information to the passive party.
  • the passive party When the passive party receives the first heartbeat information, it returns the second heartbeat information to the intermediate node. However, the intermediate node does not forward the second heartbeat information.
  • the active party When the active party detects that it has not received the second heartbeat information fed back by the passive party within the second preset time period after sending the first heartbeat information, the active party determines that the communication link is under attack and stops sending the next heartbeat cycle. First heartbeat information.
  • the passive party cannot receive the first heartbeat information in the next heartbeat cycle.
  • the passive party determines that the communication link is under attack.
  • both the active party and the passive party can use the heartbeat interlocking mechanism. Attacks on communication links were detected one after another.
  • the active party receives the second heartbeat information returned by the passive party, but the third content information is inconsistent with the first content information, it means that the communication link between the active party and the passive party may have suffered a "path attack". attack.
  • the intermediate node is controlled by a hacker, and the hacker controls the intermediate node to tamper with the message of the active party or the passive party.
  • the active party may stop sending the first heartbeat information, so that the passive party knows that the communication link is attacked.
  • the electronic devices on the communication link can successively detect that the communication link is attacked through the heartbeat interlocking mechanism.
  • the time when each electronic device on the communication link detects that the communication link is attacked may be different.
  • the time when each electronic device detects that the communication link is attacked is related to the heartbeat cycle, the first preset duration, and the second preset duration, etc. factors are related.
  • the electronic device 11 , the routing device 12 and the electronic device 13 form a communication link.
  • the electronic device 11 and the electronic device 13 are electronic devices with a heartbeat interlock mechanism established, and the routing device 12 is an intermediate node between the electronic device 11 and the electronic device 13 .
  • the heartbeat period is 100ms
  • the first preset duration is 150ms
  • the second preset duration is 50ms.
  • the electronic device 11 uses the private key of the electronic device 11 to sign the first content information "0101", obtains the first heartbeat information, and sends the first heartbeat information to the routing device 12 .
  • the routing device 12 receives the first heartbeat information, and forwards the first heartbeat information to the electronic device 13 .
  • the electronic device 13 receives the first heartbeat information forwarded by the routing device 12 .
  • the electronic device 13 verifies the signature of the first heartbeat information by using the public key of the electronic device 11, and the verification is passed, and the second content information "0101" is obtained.
  • the electronic device 13 signs the second content information using the private key of the electronic device 13 to obtain second heartbeat information, and sends the second heartbeat information to the routing device 12 .
  • the routing device 12 receives the second heartbeat information. Since the routing device 12 will discard the packets of the electronic device 13 in a targeted manner, the routing device discards the second heartbeat information and does not forward the second heartbeat information.
  • the electronic device 11 waits for the second preset time period and does not detect the second heartbeat information. At this time, the electronic device 11 determines that the communication link is under attack, so the electronic device 11 stops the heartbeat interlocking mechanism and does not send the first heartbeat information of the next heartbeat cycle.
  • the electronic device 13 waits for the first preset time period and does not detect new first heartbeat information. At this point, the electronic device 13 determines that the communication link is under attack. The electronic device 13 stops the heartbeat interlock mechanism.
  • the electronic device 21 , the routing device 22 and the electronic device 23 form a communication link.
  • the electronic device 21 and the electronic device 23 are electronic devices with a heartbeat interlock mechanism established, and the routing device 22 is an intermediate node between the electronic device 21 and the electronic device 23 .
  • the heartbeat period is 100ms
  • the first preset duration is 150ms
  • the second preset duration is 50ms.
  • the electronic device 21 uses the private key of the electronic device 21 to sign the first content information "0101", obtains the first heartbeat information, and sends the first heartbeat information to the routing device 22 .
  • the routing device 22 receives the first heartbeat information, and forwards the first heartbeat information to the electronic device 23 .
  • the electronic device 23 receives the first heartbeat information forwarded by the routing device 22 .
  • the electronic device 23 uses the public key of the electronic device 21 to verify the signature of the first heartbeat information, and the verification is passed, and the second content information "0101" is obtained.
  • the electronic device 23 signs the second content information using the private key of the electronic device 23 to obtain second heartbeat information, and sends the second heartbeat information to the routing device 22 .
  • the routing device 22 receives the second heartbeat information, and forwards the second heartbeat information to the electronic device 21 .
  • the electronic device 21 receives the second heartbeat information forwarded by the routing device 22 .
  • the electronic device 21 uses the public key of the electronic device 23 to verify the signature of the second heartbeat information, and the verification is passed, and the third content information "0101" is obtained. If the third content information is consistent with the first content information, the electronic device 21 and the electronic device 23 have completed the heartbeat interlock detection in this cycle.
  • the routing device 22 is attacked, and the routing device will discard the packets of the electronic device 21 in a targeted manner.
  • the electronic device 21 uses the private key of the electronic device 21 to sign the first content information “1111”, obtains the first heartbeat information, and sends the first heartbeat information to the routing device 22 .
  • the routing device 22 receives the first heartbeat information. Since the routing device 22 will discard the packets of the electronic device 21 in a targeted manner, the routing device discards the first heartbeat information and does not forward the first heartbeat information.
  • the electronic device 21 does not detect the second heartbeat information fed back by the electronic device 23 after waiting for the second preset time period, and the electronic device 21 determines that the communication link is attacked.
  • the electronic device 21 stops the heartbeat interlocking mechanism and no longer sends the first heartbeat information.
  • the electronic device 23 does not detect new first heartbeat information after waiting for the first preset time period, and the electronic device 23 determines that the communication link is attacked.
  • the electronic device 23 stops the heartbeat interlock mechanism.
  • the electronic devices on the communication link can successively detect that the communication link is attacked through the heartbeat interlocking mechanism.
  • the electronic device can adjust the Wi-Fi communication module so that the Wi-Fi communication module enters a promiscuous mode (also called a debug mode).
  • a promiscuous mode also called a debug mode
  • the Wi-Fi communication module of the electronic device When the Wi-Fi communication module is in the non-promiscuous mode, the Wi-Fi communication module of the electronic device only receives packets (including broadcast packets) whose destination address is directed to the device, and discards all other packets.
  • the Wi-Fi communication module of the electronic device can receive all the messages passing through the Wi-Fi communication module, regardless of whether the destination address of the message points to the device.
  • the first electronic device and the second electronic device When the communication link is attacked, the first electronic device and the second electronic device will successively enter the promiscuous mode.
  • the electronic device can encapsulate the information to be transmitted into a message, and broadcast the message to the outside world through a broadcast mechanism.
  • the Wi-Fi communication module of the surrounding electronic device is in the promiscuous mode, the surrounding electronic device can monitor the message broadcasted by the electronic device.
  • the second electronic device can obtain the message broadcasted by the first electronic device through the Wi-Fi communication module in the promiscuous mode. At this time, the first electronic device and the second electronic device establish an emergency trusted channel through the broadcast mechanism, transmit the message in the form of broadcast, and maintain the communication service. Although the communication service is degraded, the communication service will not be interrupted.
  • the Wi-Fi communication module may fail to broadcast the message smoothly due to factors such as network congestion and channel noise. Therefore, if the electronic device detects that within a period of time, the Wi-Fi communication module cannot broadcast the message due to network congestion, channel noise, etc., the electronic device can encapsulate the information to be transmitted into an injection message, and inject the message into the message. It is injected into the radio interface of the Wi-Fi communication module, and the injection message is sent to the outside in the form of broadcast.
  • the electronic device injects the injected message into the air interface for broadcasting, and does not need to perform the carrier sense action and collision detection action specified in the 802.11 protocol, so as to ensure that the Wi-Fi communication module can smoothly broadcast the above-mentioned injected message.
  • the notebook computer 31 , the notebook computer 33 , the desktop computer 34 and the smart TV 35 are electronic devices in the Internet of Things, and the router 32 is an intermediate node where the routing device is attacked.
  • the notebook computer 31, the notebook computer 33, the desktop computer 34 and the smart TV 35 discover that the communication link is attacked through the heartbeat interlocking mechanism. Therefore, the notebook computer 31, the notebook computer 33, the desktop computer 34 and the smart TV 35 control their respective Wi-Fi communication modules to enter promiscuous mode.
  • the notebook computer 31 When the notebook computer 31 wants to transmit information to the notebook computer 33, the notebook computer can encapsulate the information to be transmitted into an injection message, inject the injection message into the air interface of the Wi-Fi communication module of the device, and send it in the form of broadcast.
  • the injection message When the notebook computer 31 wants to transmit information to the notebook computer 33, the notebook computer can encapsulate the information to be transmitted into an injection message, inject the injection message into the air interface of the Wi-Fi communication module of the device, and send it in the form of broadcast.
  • the injection message The injection message.
  • the notebook computer 33 , the desktop computer 34 and the smart TV 35 all enter the promiscuous mode, the notebook computer 33 , the desktop computer 34 and the smart TV 35 can all monitor the injection message broadcast by the notebook computer 31 .
  • the electronic device on the communication link can establish an emergency trusted channel through the broadcast mechanism to maintain the communication service. Although communication through the broadcast mechanism will cause the communication service to be degraded, it will not interrupt the communication service.
  • the electronic device may send the same message multiple times in a certain broadcast channel, and/or the electronic device may The same message is sent on multiple different broadcast channels.
  • the electronic device when the electronic device sends the message A, it may send the message A every one second and continuously send the message A three times in the same broadcast channel. For another example, when the electronic device sends the message A, it can send the message A in the broadcast channel 1, the broadcast channel 2, and the broadcast channel 3 at the same time.
  • the first electronic device may not encrypt the data to be transmitted before broadcasting the data to be transmitted.
  • the first electronic device may use the public key of the second electronic device to encrypt the transmission content to obtain an encrypted message.
  • the second electronic device After the first electronic device uses the public key of the second electronic device to encrypt, only the second electronic device can decrypt the encrypted message by using the private key of the device to obtain the transmission content.
  • the notebook computer 41 , the notebook computer 43 , the desktop computer 44 and the smart TV 45 are electronic devices in the Internet of Things
  • the router 42 is a routing device
  • the router 42 is a notebook computer 41.
  • the notebook computer 41 and the notebook computer 43 establish a heartbeat interlock mechanism.
  • the router 42 When the router 42 is attacked, the router will discard the packets sent by the notebook computer 43 in a targeted manner, that is to say, the notebook computer 43 cannot transmit the packets through the router 42 to the outside.
  • the notebook computer 41 and the notebook computer 43 can resume communication through the broadcast mechanism.
  • the notebook computer 41 can use the public key of the notebook computer 43 to encrypt the data to be transmitted, and encapsulate the encrypted data to be transmitted as an injection message. Then, the notebook computer 43 injects the injection message into the air interface of the Wi-Fi communication module of the device and broadcasts it to the outside.
  • the notebook computer 43 and the desktop computer 44 around the notebook computer 41 are in promiscuous mode, so both the notebook computer 43 and the desktop computer 44 can receive the injection message, not only the notebook computer 43 can receive the injection message Inject messages.
  • the smart TV 45 is not in the promiscuous mode, so the smart TV 45 cannot receive the injection message broadcast by the notebook computer 41 .
  • the laptop computer 43 After the laptop computer 43 obtains the injection message, it can use the private key of the laptop computer 43 to decrypt the encrypted data in the injection message to obtain the data to be transmitted.
  • the desktop computer 44 After the desktop computer 44 obtains the injection message, since the desktop computer 44 does not have the private key of the laptop computer 43, the desktop computer 44 cannot decrypt the encrypted data in the injection message, and cannot know the content of the data to be transmitted.
  • the electronic device can use the public key of the receiver to encrypt the content of the message. At this point, only the receiver can decrypt the message with the private key to obtain the content of the message. Other electronic devices in the promiscuous mode in the communication system cannot directly obtain the content of the message after monitoring the message.
  • the electronic device can use the private key of the device to sign the content of the message when broadcasting the message, and prove by means of signature. The identity of the sender of this message.
  • the electronic device After the electronic device monitors the messages broadcast by other electronic devices, it can use the public key of the sender of the message to verify the signature of the message.
  • the electronic device can use the private key of the device to sign and store the above message.
  • the electronic device may perform the first preset operation on the message.
  • the specific form of the first preset operation can be set according to the actual situation.
  • the first preset operation may be that the electronic device discards the message; or, the first preset operation may be that the electronic device records and stores the message as a malicious message.
  • the electronic device can feed back the first response information to the sender of the message through a preset transmission protocol.
  • the preset transmission protocol can be set according to actual needs.
  • a transmission control protocol Transmission Control Protocol, TCP
  • TCP Transmission Control Protocol
  • the electronic device After the electronic device broadcasts the message, if the electronic device receives the first response information fed back by other electronic devices, it means that the message has been monitored by other electronic devices. At this time, the electronic device may feed back the second response information to the sender of the first response information.
  • the message sent by the electronic device may be referred to as a "fact".
  • electronic device A For example, assume that electronic device A, electronic device B, electronic device C, and electronic device D exist in the communication system.
  • electronic device A broadcasts a message
  • electronic device B may forge or tamper with the message broadcast by electronic device A.
  • the electronic device B may feed back false facts, thus causing the real facts to be covered up.
  • electronic device B can also determine the true facts from the facts recorded by electronic device C and electronic device D.
  • the electronic device can set the first response threshold. After the electronic device broadcasts the message to the outside world, the electronic device can determine whether the message is successfully broadcast according to the quantity of the first response information received within the preset response time period and the first response threshold.
  • the electronic device that broadcasts the message can determine that the message is broadcast successfully.
  • the electronic device that broadcasts the message may determine that the message broadcast fails.
  • the specific value of the first threshold can be set according to the number of electronic devices in the Internet of Things.
  • the first response threshold may be set to 1, 2, 3, 5, 10 and other values.
  • the preset response time can be set according to the actual situation.
  • the preset response duration can be set to 100ms, 200ms, 500ms, 1s, and the like.
  • the electronic device may perform a second preset operation. For example, after determining that the message broadcasting fails, the electronic device may re-broadcast the failed message until the electronic device determines that the message broadcasting is successful.
  • the electronic device may choose to broadcast the message in the same broadcast channel, or the electronic device may change the broadcasting channel and rebroadcast the failed message.
  • the electronic device can continue to broadcast message A on broadcast channel 1, or the electronic device can also change the broadcast channel, broadcast message A on broadcast channel 2.
  • the notebook computer 51 , the notebook computer 52 , the desktop computer 53 and the smart TV 54 are electronic devices in the Internet of Things.
  • Laptop 51, Laptop 52, Desktop 53 and Smart TV 54 are all in promiscuous mode.
  • the notebook computer 51 broadcasts the injection message to the outside world.
  • the first response threshold set by the notebook computer 51 is 3, and the preset response duration is 500 ms.
  • the notebook computer 51 only receives the first response information fed back by the notebook computer 52 and the smart TV 54 within 500 ms.
  • the number of first response information is 2, which is less than the first response threshold of 3. Then the notebook computer 51 determines that the above-mentioned injection message is broadcast. fail.
  • the notebook computer 51 rebroadcasts the above injection message.
  • the notebook computer 61 , the notebook computer 62 , the desktop computer 63 and the smart TV 64 are electronic devices in the Internet of Things.
  • Laptop 61, laptop 62, desktop 63 and smart TV 64 are all in promiscuous mode.
  • the notebook computer 61 broadcasts the injection message to the outside.
  • the first response threshold set by the notebook computer 61 is 2, and the preset response duration is 600 ms.
  • the notebook computer 62 , the desktop computer 63 and the smart TV 64 have all monitored the injection message. At this time, the notebook computer 62 , the desktop computer 63 and the smart TV 64 all feed back the first response information to the notebook computer 61 .
  • the notebook computer 61 receives the first response information fed back by the notebook computer 62, the desktop computer 63 and the smart TV 64 within 600 ms, and the number of first response information is 3, which is greater than the first response threshold 2, then the notebook computer 61 determines that the above injection The message is broadcast successfully.
  • the electronic device after the electronic device broadcasts the message, it can judge whether the message is successfully broadcasted through the received first response information fed back by other electronic devices. If the first response information monitored by the electronic device within the preset response time period is greater than the preset response threshold, the electronic device may determine that the message broadcast is successful. If the first response information received by the electronic device within the preset response time period is less than or equal to the preset response threshold, the electronic device can determine that the message broadcast failed and re-broadcast the message to prevent the message from being audited by others in the post-event auditing process. Node forgery or tampering.
  • the electronic devices on the communication link can enter the promiscuous mode, transmit messages in the form of broadcast, and monitor messages sent by other electronic devices to maintain communication services.
  • the first electronic device and the second electronic device can always perform data interaction in the form of broadcasting.
  • the first electronic device and the second electronic device may also negotiate and determine a new routing device. After the new routing device is determined, the new routing device can create a new local area network and open the hotspot. Other electronic devices are connected to the hotspot opened by the new routing device, and normal communication services are realized through the new local area network.
  • each electronic device may broadcast the Wi-Fi communication capability parameter of the device to the outside world.
  • the specific parameter type of the Wi-Fi communication capability parameter can be set according to actual requirements.
  • the Wi-Fi communication capability parameter may be set as one or more of parameters such as transmit power, receive sensitivity, and throughput.
  • the electronic device with the optimal Wi-Fi communication capability parameter is used as a new routing device.
  • the new routing device creates a local area network, opening hotspots to the outside world, allowing other electronic devices to access. Other electronic devices connect to the hotspot and restore communication services through the local area network created by the new routing device.
  • an electronic device may actively broadcast the network construction request message, and other electronic devices will feed back the first response information to the sending of the network construction request message after monitoring the network construction request message. square.
  • the sender of the network establishment request message When the first response information received by the sender of the network establishment request message is greater than the first response threshold, the sender of the network establishment request message creates a local area network, opens the hotspot to the outside world, and allows other electronic devices to access. Other electronic devices connect to the hotspot and restore communication services through the local area network created by the new routing device.
  • the message sent by the electronic device is referred to as a fact.
  • the facts that electronic devices need to transmit externally can include two types of facts.
  • the first category of facts is fault information.
  • the fault information may include one or more items of information such as fault time, fault object, and fault type.
  • the electronic device A determines that the communication link is attacked and enters the promiscuous mode.
  • the fact that electronic device A needs to broadcast to the outside may include the first moment (failure time), electronic device B (failure object), and information unreachable (failure type).
  • the electronic device B determines that the communication link is attacked and enters the promiscuous mode.
  • the fact that the electronic device B needs to broadcast to the outside may include the second moment (failure time), the electronic device A (the failure object), and the information unreachable (the failure type).
  • the second type of fact is business information.
  • electronic equipment may have specific business functions.
  • a camera can collect image information
  • an infrared sensor can collect infrared information.
  • an electronic device When an electronic device performs a business function, it may generate business information that needs to be transmitted externally.
  • the infrared sensor when it detects abnormal infrared information in a certain area, it can transmit the location information of the area to the camera, and the camera adjusts the direction of the lens according to the received location information, takes the image of the above area, and completes the connection between the infrared sensor and the camera. linkage.
  • the location information of the above area is the business information that the infrared sensor needs to transmit to the camera.
  • the central control device of the smart home receives the door opening command through the Internet, and then the central control device will send the door opening command to the smart door lock, and the smart door lock will execute the door opening operation after receiving the door opening command.
  • the above door opening instruction is the business information that the central control device needs to transmit to the smart door lock.
  • the management device may communicate with each electronic device in response to the user's operation, and obtain the facts recorded by each electronic device.
  • the management device may be any electronic device in the current communication system, or the management device may also be an electronic device outside the current communication system.
  • the management device may be communicatively connected to each electronic device through wired communication connection and/or wireless communication connection, and the embodiment of the present application does not impose any limitation on the communication connection between the management device and the electronic device.
  • the management device After the management device obtains the facts recorded by each electronic device.
  • the signature in each fact can be verified using the public key of the sender of each fact, verifying the identity of the sender of the fact. Then the management device can show the verified facts to the user, so that the user can understand the process of the communication link being attacked and the service information exchanged by each electronic device after the communication link is attacked.
  • the packets monitored by the electronic device may be incomplete. Therefore, after the management device obtains the facts recorded by each electronic device from each electronic device, if incomplete facts are found, the facts monitored by each electronic device can be spliced and restored to obtain complete facts.
  • the notebook computer 71 As shown in FIG. 12 , in the communication system shown in FIG. 12 , the notebook computer 71 , the smart TV 72 , the notebook computer 73 , and the desktop computer 74 are electronic devices in the Internet of Things.
  • the notebook computer 75 is a management device.
  • Laptop 71, smart TV 72, laptop 73 and desktop 74 are all in promiscuous mode.
  • the notebook computer 71 broadcasts an injection message, and the smart TV 72, the notebook computer 73, and the desktop computer 74 all monitor the injection message.
  • the smart TV 72 , the notebook computer 73 , and the desktop computer 74 only listen to part of the injected message.
  • the smart TV 72 has monitored the message segment A
  • the desktop computer 74 has monitored the message segment B
  • the laptop computer 73 has monitored the message segment C.
  • the notebook computer 75 When the notebook computer 75 is communicatively connected to the smart TV 72 , the notebook computer 73 , and the desktop computer 74 in response to the user's operation, the notebook computer 75 can obtain the message segment A from the smart TV 72 , the notebook computer 73 , and the desktop computer 74 . , message fragment B, and message fragment C.
  • the notebook computer 75 obtains the message fragment A, the message fragment B, and the message fragment C, it can The message segment A, the message segment B, and the message segment C are spliced into a complete injected message, so as to obtain the message broadcast by the notebook computer 71 at the above-mentioned moment.
  • the management device can obtain the fact recorded by the electronic device from each electronic device in the communication system.
  • the management device can splicing and restore the message fragments recorded by multiple electronic devices, so as to obtain complete facts.
  • some electronic devices may be controlled. These controlled electronic devices may send false facts to obfuscate the correct facts.
  • the management device can define the fact that there are multiple versions as a questionable fact, and vote on the questionable fact.
  • the management device can determine the version supported by the most electronic devices as the real version of the questionable fact according to the principle of minority obeying the majority.
  • the management device can also show the voting process to the user.
  • the management device may set strips with time as the axis, and divide the complete recording time into time segments, each time segment corresponding to a part of the strip. If the fact that the management device acquires a certain time period is not a suspicious fact and is monitored by multiple electronic devices, the strip corresponding to the time period is marked green. If the fact that the management device acquires a certain time period is not a suspicious fact, but is only monitored by one electronic device, it means that the authenticity of the fact needs further confirmation by the user, and the management device marks the strip corresponding to the time period in yellow.
  • the management device can mark the strip corresponding to the time period in red, and display the voting results of each electronic device. After the voting is over, the management device may generate a strip with three colors of red, yellow and blue. The user can visually check the voting behavior of each electronic device during the voting process through the strip, so that the user can find the electronic device that was attacked. For example, the user can view the voting results of each electronic device in the red strip. If a certain electronic device is voted by a minority every time, the user should check whether the electronic device is attacked.
  • the notebook computer 81 , the notebook computer 83 , the desktop computer 84 , and the smart TV 85 are electronic devices in the Internet of Things.
  • the router 82 is a routing device.
  • the notebook computer 86 is the management device.
  • the notebook computer 81 , the notebook computer 83 , the desktop computer 84 , and the smart TV 85 are all connected to the hotspot opened by the router 82 .
  • the router 82 and the smart TV 85 are attacked by hackers, the router 82 will stop forwarding the information of the laptop computer 81 and the desktop computer 84, and the communication link suffers a "path attack".
  • the notebook computer 81 , the notebook computer 83 , the desktop computer 84 , and the smart TV 85 enter the promiscuous mode after detecting that the communication link is attacked.
  • the notebook computer 81 broadcasts the injection message A to the outside world.
  • the notebook computer 83 , the desktop computer 84 , and the smart TV 85 all monitor the injection message A, and after verifying the signature of the injection message A, store the injection message A locally.
  • the notebook computer 86 is respectively connected in communication with the notebook computer 83 , the desktop computer 84 , and the smart TV 85 to obtain the facts recorded by the notebook computer 83 , the desktop computer 84 , and the smart TV 85 .
  • the notebook computer 83 monitors the injected packet A, but the notebook computer 83 only monitors part of the information of the injected packet A, that is, the packet fragment 1.
  • the desktop computer 84 monitors the injected message A, but the desktop computer 84 only monitors part of the information of the injected message A, that is, the injected message 2 .
  • the smart TV 85 has monitored the complete injection packet A, but the smart TV is controlled by a hacker, tampering with the injection packet A, and obtaining the injection packet B.
  • the notebook computer 83 sends the message fragment 1 to the notebook computer 86
  • the desktop computer 84 sends the message fragment 2 to the notebook computer 86
  • the smart TV 85 sends the injection message B to the laptop computer 86 .
  • the notebook computer 86 splices the packet fragment 1 and the packet fragment 2 into the injected packet A.
  • the notebook computer 86 finds that there are two versions of the injected message A and the injected message B in the same message. Therefore, the notebook computer 86 votes for the injected message A and the injected message B.
  • the smart TV 85 supports the injection of the message B.
  • the voting result of the injected message A and the injected message B is 2:1, so the notebook computer 86 determines that the injected message A is a true fact, and the injected message B is a false fact.
  • the management device can vote to determine the version supported by the most electronic devices as the real version of the questionable fact. thereby identifying the true facts.
  • a router 91 As shown in Fig. 16, a router 91, a notebook computer 92, a smart TV 93, a camera 94, an infrared detector 95, an alarm 96, and a monitoring host 97 are provided in the user's home.
  • the router 91 , the notebook computer 92 , the smart TV 93 , the camera 94 , the infrared detector 95 , the alarm 96 , and the monitoring host 97 are all provided with Wi-Fi communication modules.
  • the router 91 is a routing device, creates a local area network, and opens a hotspot.
  • the notebook computer 92 , the smart TV 93 , the camera 94 , the infrared detector 95 , and the alarm 96 are respectively connected to the hotspot opened by the router 91 through the Wi-Fi communication module of the device.
  • the infrared detector 95 and the camera 94 establish a heartbeat interlock mechanism, and the camera 94 establishes a heartbeat interlock mechanism with the notebook computer 92 and the alarm 96 respectively.
  • the Wi-Fi communication module of the monitoring host 97 is always in the promiscuous mode, and the monitoring host 97 is used to monitor and store all messages passing through the Wi-Fi communication module of the monitoring host 97 .
  • the router 91 and the laptop 92 are attacked by hackers. At this time, the router 91 discards the packets sent by the infrared detector 95 in a targeted manner.
  • the infrared detector 95 and the camera 94 will successively detect that the communication link is attacked. Therefore, the Wi-Fi communication module of the infrared detector 95 and the Wi-Fi communication module of the camera 94 will successively enter the promiscuous mode. .
  • the camera 94 Since the camera 94 detects that the communication link is attacked, the camera 94 stops sending the first heartbeat information or responding to the second heartbeat information, so the Wi-Fi communication module of the notebook computer 92 and the Wi-Fi communication module of the alarm 96 also enter one after another. Promiscuous mode.
  • the Wi-Fi communication module of the infrared detector 95 the Wi-Fi communication module of the camera 94 , the Wi-Fi communication module of the notebook computer 92 , and the Wi-Fi communication module of the alarm device 96
  • the Wi-Fi communication module of the monitoring host 97 is in the promiscuous mode, and the connection with the router 91 is disconnected.
  • the hacker enters the user's home and stays in area 1.
  • the area 1 is within the detection area of the infrared detector 95 , and the infrared detector 95 detects that an abnormal infrared signal exists in the area A, and generates an injection message 1 .
  • the injected message 1 includes the detection time, the location information of the area 1, and the detection event (ie, there is an abnormal infrared signal).
  • the infrared detector 95 uses the private key of the device to sign the injection message 1, injects the signed injection message 1 into the air interface of the Wi-Fi communication module of the device, and broadcasts the injection message to the outside world. 1.
  • the notebook computer 92 monitors the injected message 1, and uses the public key of the infrared detector 95 to verify the signature of the injected message 1. If the verification is passed, the notebook computer 92 signs the injection message 1 with the private key of the device and stores it locally.
  • the alarm 96 monitors the injected message 1, and uses the public key of the infrared detector 95 to verify the signature of the injected message 1. If the verification is passed, the alarm 96 signs the injection message 1 with the private key of the device and stores it locally.
  • the monitoring host 97 monitors the injected message 1 and uses the public key of the infrared detector 95 to verify the signature of the injected message 1 . If the verification is passed, the monitoring host 97 signs the injection message 1 with the private key of the device and stores it locally.
  • the camera 94 monitors the injected message 1, and uses the public key of the infrared detector 95 to verify the signature of the injected message 1. If the verification is passed, the camera 94 adjusts the shooting angle of the camera 94 according to the content of the injected message 1 to shoot the image of the area 1 . In addition, the camera 94 signs the injection message 1 with the private key of the device and stores it locally.
  • an injection message 2 is generated.
  • the injection message 2 includes the shooting time and the shooting image.
  • the camera 94 signs the injection message 2 using the private key of the device, injects the signed injection message 2 into the air interface of the Wi-Fi communication module of the device, and broadcasts the injection message 2 to the outside.
  • the notebook computer 92 monitors the injected message 2, and uses the public key of the camera 94 to verify the signature of the injected message 2. If the verification is passed, the notebook computer 92 signs the injection message 2 with the private key of the device and stores it locally.
  • the alarm 96 monitors the injected message 2, and uses the public key of the camera 94 to verify the signature of the injected message 2. If the verification is passed, the alarm 96 signs the injection message 2 with the private key of the device and stores it locally.
  • the monitoring host 97 monitors the injected message 2 and uses the public key of the camera 94 to verify the signature of the injected message 2 . If the verification is passed, the monitoring host 97 signs the injection message 2 with the private key of the device and stores it locally.
  • the infrared detector 95 monitors the injected message 2 and uses the public key of the camera 94 to verify the signature of the injected message 2 . If the verification is passed, the infrared detector 95 signs the injection message 2 with the private key of the device and stores it locally.
  • the desktop computer 98 is turned on. As shown in FIG. 21, the desktop computer 98 establishes a communication connection with the notebook computer 92, the smart TV 93, the camera 94, the infrared detector 95, the alarm 96, and the monitoring host 97 in response to the user's operation, respectively, and obtains the data recorded by each electronic device. fact.
  • the injection packet 1 recorded by the laptop computer 92 was tampered with the injection packet 3, and the injection packet 2 was tampered with the injection packet 4.
  • the Wi-Fi communication module of the smart TV 93 does not enter the promiscuous mode, so the smart TV 93 does not record the fact.
  • the camera 94 records the injection message 1 .
  • the infrared detector 95 records a fragment of the injected message 2 (message fragment 2.1).
  • the alarm 96 records the segment injected into message 1 (message segment 1.1) and the segment injected into message 2 (message segment 2.2).
  • the monitoring host 97 records the injected packet 1 and the fragment of the injected packet 2 (the packet fragment 2.3).
  • the desktop computer 98 After the desktop computer 98 obtains the facts recorded by each electronic device, it can splicing the message segment 2.1, the message segment 2.2 and the message segment 2.3 to obtain the injected message 2.
  • the first group is injection packet 1 and injection packet 3
  • the second group is injection packet 2 and injection packet 4.
  • the desktop computer 98 voted on the two groups of questionable facts separately.
  • the voting ratio of injected message 1 and injected message 3 is 3:1, and the voting ratio of injected message 2 and injected message 4 is 3:1. Therefore, the desktop computer 98 determines injected message 1 and injected message 2 as a real fact.
  • the desktop computer 98 presents the real facts to the user. At this time, the user can learn that the hacker has entered the user's home and stayed in the area 1 through the injection message 1 and the injection message 2, and the appearance of the hacker can be determined according to the photographed image in the injection message 2.
  • the electronic device when the electronic device detects that the communication link is attacked, the electronic device can control the Wi-Fi communication module to enter the promiscuous mode. At this time, the electronic device can broadcast the message to the outside in the form of broadcasting. In the promiscuous mode, the electronic device at the opposite end can monitor all the messages in the channel, so as to obtain the messages broadcast by the electronic device. That is to say, when the communication link is attacked, the first electronic device and the second electronic device can establish an emergency trusted channel through a broadcast mechanism to maintain the communication service. Although communication through the broadcast mechanism will cause the communication service to be degraded, it will not interrupt the communication service.
  • the electronic device can sign the message before broadcasting the message to the outside world. After the electronic device monitors the message, it can verify the signature of the message. If the verification is passed, the electronic device stores the message locally.
  • the management device can establish a communication connection from each electronic device, and obtain the facts recorded by each electronic device, that is, the messages stored by each electronic device.
  • the management device splices and votes the facts recorded by each electronic device to determine the real facts, so that users can understand the process of the communication link being attacked and the business information of each electronic device after the communication link is attacked through the real facts.
  • the communication method provided by this embodiment includes:
  • the first electronic device monitors the communication link
  • the first electronic device controls the Wi-Fi communication module of the first electronic device to enter the promiscuous mode, and sends the first message in the form of broadcasting.
  • FIG. 24 is a schematic diagram of an electronic device provided by an embodiment of the present application.
  • the electronic device 2400 may include a processor 2410, an external memory interface 2420, an internal memory 2421, a universal serial bus (USB) interface 2430, a charge management module 2440, a power management module 2441, a battery 2442, an antenna 1, an antenna 2 , mobile communication module 2450, wireless communication module 2460, audio module 2470, speaker 2470A, receiver 2470B, microphone 2470C, headphone jack 2470D, sensor module 2480, key 2490, motor 2491, indicator 2492, camera 2493, display screen 2494, and Subscriber identification module (subscriber identification module, SIM) card interface 2495 and so on.
  • SIM Subscriber identification module
  • the sensor module 2480 may include a pressure sensor 2480A, a gyroscope sensor 2480B, an air pressure sensor 2480C, a magnetic sensor 2480D, an acceleration sensor 2480E, a distance sensor 2480F, a proximity light sensor 2480G, a fingerprint sensor 2480H, a temperature sensor 2480J, a touch sensor 2480K, and ambient light.
  • Sensor 2480L Bone Conduction Sensor 2480M, etc.
  • the structures illustrated in the embodiments of the present invention do not constitute a specific limitation on the electronic device 2400 .
  • the electronic device 2400 may include more or less components than shown, or combine some components, or separate some components, or arrange different components.
  • the illustrated components may be implemented in hardware, software, or a combination of software and hardware.
  • the processor 2410 may include one or more processing units, for example, the processor 2410 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (neural-network processing unit, NPU), etc. Wherein, different processing units may be independent devices, or may be integrated in one or more processors.
  • application processor application processor, AP
  • modem processor graphics processor
  • image signal processor image signal processor
  • ISP image signal processor
  • controller video codec
  • digital signal processor digital signal processor
  • baseband processor baseband processor
  • neural-network processing unit neural-network processing unit
  • the controller can generate an operation control signal according to the instruction operation code and timing signal, and complete the control of fetching and executing instructions.
  • a memory may also be provided in the processor 2410 for storing instructions and data.
  • the memory in processor 2410 is cache memory. This memory may hold instructions or data that have just been used or recycled by the processor 2410. If the processor 2410 needs to use the instruction or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 2410 is reduced, thereby improving the efficiency of the system.
  • the processor 2410 may include one or more interfaces.
  • the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transceiver (universal asynchronous transmitter) receiver/transmitter, UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and / or universal serial bus (universal serial bus, USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • PCM pulse code modulation
  • UART universal asynchronous transceiver
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • SIM subscriber identity module
  • USB universal serial bus
  • the I2C interface is a bidirectional synchronous serial bus that includes a serial data line (SDA) and a serial clock line (SCL).
  • the processor 2410 may contain multiple sets of I2C buses.
  • the processor 2410 can be respectively coupled to the touch sensor 2480K, charger, flash, camera 2493, etc. through different I2C bus interfaces.
  • the processor 2410 can couple the touch sensor 2480K through the I2C interface, so that the processor 2410 and the touch sensor 2480K communicate with each other through the I2C bus interface, so as to realize the touch function of the electronic device 2400.
  • the I2S interface can be used for audio communication.
  • the processor 2410 may contain multiple sets of I2S buses.
  • the processor 2410 may be coupled with the audio module 2470 through an I2S bus to implement communication between the processor 2410 and the audio module 2470.
  • the audio module 2470 can transmit audio signals to the wireless communication module 2460 through the I2S interface, so as to realize the function of answering calls through a Bluetooth headset.
  • the PCM interface can also be used for audio communications, sampling, quantizing and encoding analog signals.
  • the audio module 2470 and the wireless communication module 2460 may be coupled through a PCM bus interface.
  • the audio module 2470 can also transmit audio signals to the wireless communication module 2460 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus may be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is typically used to connect the processor 2410 with the wireless communication module 2460.
  • the processor 2410 communicates with the Bluetooth module in the wireless communication module 2460 through the UART interface to implement the Bluetooth function.
  • the audio module 2470 can transmit audio signals to the wireless communication module 2460 through the UART interface, so as to realize the function of playing music through the Bluetooth headset.
  • the MIPI interface can be used to connect the processor 2410 with the display screen 2494, the camera 2493 and other peripheral devices.
  • MIPI interfaces include camera serial interface (CSI), display serial interface (DSI), etc.
  • the processor 2410 communicates with the camera 2493 through a CSI interface to implement the photographing function of the electronic device 2400 .
  • the processor 2410 communicates with the display screen 2494 through the DSI interface to implement the display function of the electronic device 2400.
  • the GPIO interface can be configured by software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface can be used to connect the processor 2410 with the camera 2493, the display screen 2494, the wireless communication module 2460, the audio module 2470, the sensor module 2480, and the like.
  • the GPIO interface can also be configured as I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 2430 is an interface that conforms to the USB standard specification, and can specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
  • the USB interface 2430 can be used to connect a charger to charge the electronic device 2400, and can also be used to transmit data between the electronic device 2400 and peripheral devices. It can also be used to connect headphones to play audio through the headphones.
  • the interface can also be used to connect other electronic devices, such as AR devices.
  • the interface connection relationship between the modules illustrated in the embodiment of the present invention is only a schematic illustration, and does not constitute a structural limitation of the electronic device 2400 .
  • the electronic device 2400 may also adopt different interface connection manners in the foregoing embodiments, or a combination of multiple interface connection manners.
  • the charging management module 2440 is used to receive charging input from the charger.
  • the charger may be a wireless charger or a wired charger.
  • the charging management module 2440 may receive charging input from the wired charger through the USB interface 2430 .
  • the charging management module 2440 may receive wireless charging input through the wireless charging coil of the electronic device 2400 . While the charging management module 2440 charges the battery 2442, it can also supply power to the electronic device through the power management module 2441.
  • the power management module 2441 is used to connect the battery 2442 , the charging management module 2440 and the processor 2410 .
  • the power management module 2441 receives input from the battery 2442 and/or the charging management module 2440, and supplies power to the processor 2410, the internal memory 2421, the display screen 2494, the camera 2493, and the wireless communication module 2460.
  • the power management module 2441 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
  • the power management module 2441 may also be provided in the processor 2410 .
  • the power management module 2441 and the charging management module 2440 may also be provided in the same device.
  • the wireless communication function of the electronic device 2400 may be implemented by the antenna 1, the antenna 2, the mobile communication module 2450, the wireless communication module 2460, the modem processor, the baseband processor, and the like.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in electronic device 2400 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • the antenna 1 can be multiplexed as a diversity antenna of the wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 2450 can provide wireless communication solutions including 2G/3G/4G/5G etc. applied on the electronic device 2400 .
  • the mobile communication module 2450 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), and the like.
  • the mobile communication module 2450 can receive electromagnetic waves from the antenna 1, filter and amplify the received electromagnetic waves, and transmit them to the modulation and demodulation processor for demodulation.
  • the mobile communication module 2450 can also amplify the signal modulated by the modulation and demodulation processor, and then convert it into electromagnetic waves and radiate it out through the antenna 1 .
  • at least part of the functional modules of the mobile communication module 2450 may be provided in the processor 2410 .
  • at least part of the functional modules of the mobile communication module 2450 may be provided in the same device as at least part of the modules of the processor 2410 .
  • the modem processor may include a modulator and a demodulator.
  • the modulator is used to modulate the low frequency baseband signal to be sent into a medium and high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low frequency baseband signal. Then the demodulator transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the low frequency baseband signal is processed by the baseband processor and passed to the application processor.
  • the application processor outputs sound signals through audio devices (not limited to the speaker 2470A, the receiver 2470B, etc.), or displays images or videos through the display screen 2494.
  • the modem processor may be a separate device.
  • the modem processor may be independent of the processor 2410, and may be provided in the same device as the mobile communication module 2450 or other functional modules.
  • the wireless communication module 2460 can provide applications on the electronic device 2400 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), bluetooth (BT), global navigation satellites Wireless communication solutions such as global navigation satellite system (GNSS), frequency modulation (FM), near field communication (NFC), and infrared technology (IR).
  • WLAN wireless local area networks
  • BT Bluetooth
  • GNSS global navigation satellite system
  • FM frequency modulation
  • NFC near field communication
  • IR infrared technology
  • the wireless communication module 2460 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 2460 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 2410 .
  • the wireless communication module 2460 can also receive the signal to be sent from the processor 2410 , perform frequency modulation on it, amplify the signal, and then convert it into an electromagnetic wave for radiation through the antenna 2 .
  • the antenna 1 of the electronic device 2400 is coupled with the mobile communication module 2450, and the antenna 2 is coupled with the wireless communication module 2460, so that the electronic device 2400 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code Division Multiple Access (WCDMA), Time Division Code Division Multiple Access (TD-SCDMA), Long Term Evolution (LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include global positioning system (global positioning system, GPS), global navigation satellite system (global navigation satellite system, GLONASS), Beidou navigation satellite system (beidou navigation satellite system, BDS), quasi-zenith satellite system (quasi -zenith satellite system, QZSS) and/or satellite based augmentation systems (SBAS).
  • global positioning system global positioning system, GPS
  • global navigation satellite system global navigation satellite system, GLONASS
  • Beidou navigation satellite system beidou navigation satellite system, BDS
  • quasi-zenith satellite system quadsi -zenith satellite system, QZSS
  • SBAS satellite based augmentation systems
  • the electronic device 2400 implements a display function through a GPU, a display screen 2494, and an application processor.
  • the GPU is a microprocessor for image processing, and connects the display screen 2494 and the application processor.
  • the GPU is used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 2410 may include one or more GPUs that execute program instructions to generate or alter display information.
  • Display screen 2494 is used to display images, videos, and the like.
  • Display screen 2494 includes a display panel.
  • the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode or an active-matri24 organic light-emitting diode (active-matri24 organic light).
  • emitting diodes AMOLED
  • flexible light-emitting diodes fle24 light-emitting diodes, FLED
  • Miniled MicroLed, Micro-oLed, quantum dot light-emitting diodes (quantum dot light emitting diodes, QLED), etc.
  • the electronic device 2400 may include 1 or N display screens 2494, where N is a positive integer greater than 1.
  • the electronic device 2400 can realize the shooting function through the ISP, the camera 2493, the video codec, the GPU, the display screen 2494 and the application processor.
  • the ISP is used to process the data fed back by the camera 2493. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera photosensitive element through the lens, the light signal is converted into an electrical signal, and the camera photosensitive element transmits the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise, brightness, and skin tone. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be located in the camera 2493.
  • Camera 2493 is used to capture still images or video.
  • the object is projected through the lens to generate an optical image onto the photosensitive element.
  • the photosensitive element can be a charge coupled device (CCD) or a complementary metal oxide semiconductor (complementary metal-o24ide-semiconductor, CMOS) phototransistor.
  • CCD charge coupled device
  • CMOS complementary metal oxide semiconductor
  • the photosensitive element converts the optical signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal.
  • the ISP outputs the digital image signal to the DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other formats of image signals.
  • the electronic device 2400 may include 1 or N cameras 2493 , where N is a positive integer greater than 1.
  • a digital signal processor is used to process digital signals, in addition to processing digital image signals, it can also process other digital signals. For example, when the electronic device 2400 selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy, and the like.
  • Video codecs are used to compress or decompress digital video.
  • Electronic device 2400 may support one or more video codecs. In this way, the electronic device 2400 can play or record videos in various encoding formats, such as: Moving Picture Experts Group (moving picture e24perts group, MPEG) 24, MPEG2, MPEG3, MPEG4 and so on.
  • Moving Picture Experts Group moving picture e24perts group, MPEG
  • MPEG2 Moving Picture Experts Group
  • MPEG3 MPEG4
  • the NPU is a neural-network (NN) computing processor.
  • NN neural-network
  • Applications such as intelligent cognition of the electronic device 2400 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, and the like.
  • the external memory interface 2420 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device 2400.
  • the external memory card communicates with the processor 2410 through the external memory interface 2420 to realize the data storage function. For example to save files like music, video etc in external memory card.
  • Internal memory 2421 may be used to store computer executable program code, which includes instructions.
  • the internal memory 2421 may include a storage program area and a storage data area.
  • the storage program area can store an operating system, an application program required for at least one function (such as a sound playback function, an image playback function, etc.), and the like.
  • the storage data area may store data (such as audio data, phone book, etc.) created during the use of the electronic device 2400 and the like.
  • the internal memory 2421 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (UFS), and the like.
  • the processor 2410 executes various functional applications and data processing of the electronic device 2400 by executing instructions stored in the internal memory 2421 and/or instructions stored in a memory provided in the processor.
  • the electronic device 2400 can implement audio functions through an audio module 2470, a speaker 2470A, a receiver 2470B, a microphone 2470C, an earphone interface 2470D, and an application processor. Such as music playback, recording, etc.
  • the audio module 2470 is used for converting digital audio information into analog audio signal output, and also for converting analog audio input into digital audio signal. Audio module 2470 may also be used to encode and decode audio signals. In some embodiments, the audio module 2470 may be provided in the processor 2410 , or some functional modules of the audio module 2470 may be provided in the processor 2410 .
  • Speakers 2470A also known as “horns", are used to convert audio electrical signals into sound signals. Electronic device 2400 can listen to music through speaker 2470A, or listen to hands-free calls.
  • the receiver 2470B also referred to as the "earpiece" is used to convert audio electrical signals into sound signals.
  • the electronic device 2400 answers a call or a voice message, the voice can be answered by placing the receiver 2470B close to the human ear.
  • Microphone 2470C also known as “microphone”, “microphone”, is used to convert sound signals into electrical signals. When making a call or sending a voice message, the user can make a sound by approaching the microphone 2470C through the human mouth, and input the sound signal into the microphone 2470C.
  • the electronic device 2400 may be provided with at least one microphone 2470C. In other embodiments, the electronic device 2400 can be provided with two microphones 2470C, which can implement a noise reduction function in addition to collecting sound signals. In other embodiments, the electronic device 2400 may also be provided with three, four or more microphones 2470C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions.
  • the headphone jack 2470D is used to connect wired headphones.
  • the earphone interface 2470D can be a USB interface 2430, or a 3.5mm open mobile terminal platform (OMTP) standard interface, a cellular telecommunications industry association of the USA (CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA cellular telecommunications industry association of the USA
  • the pressure sensor 2480A is used to sense pressure signals, and can convert the pressure signals into electrical signals.
  • the pressure sensor 2480A may be provided on the display screen 2494.
  • the capacitive pressure sensor may be comprised of at least two parallel plates of conductive material. When a force is applied to pressure sensor 2480A, the capacitance between the electrodes changes.
  • the electronic device 2400 determines the intensity of the pressure according to the change in capacitance. When a touch operation acts on the display screen 2494, the electronic device 2400 detects the intensity of the touch operation according to the pressure sensor 2480A.
  • the electronic device 2400 can also calculate the touched position according to the detection signal of the pressure sensor 2480A.
  • touch operations acting on the same touch position but with different touch operation intensities may correspond to different operation instructions. For example, when a touch operation whose intensity is less than the first pressure threshold acts on the short message application icon, the instruction for viewing the short message is executed. When a touch operation with a touch operation intensity greater than or equal to the first pressure threshold acts on the short message application icon, the instruction to create a new short message is executed.
  • the gyro sensor 2480B can be used to determine the motion attitude of the electronic device 2400 .
  • the angular velocity of electronic device 2400 about three axes may be determined by gyro sensor 2480B.
  • Gyro sensor 2480B can be used for image stabilization.
  • the gyroscope sensor 2480B detects the shaking angle of the electronic device 2400, calculates the distance to be compensated by the lens module according to the angle, and allows the lens to counteract the shaking of the electronic device 2400 through reverse motion to achieve anti-shake.
  • the gyroscope sensor 2480B can also be used for navigation and somatosensory game scenarios.
  • Air pressure sensor 2480C is used to measure air pressure. In some embodiments, the electronic device 2400 calculates the altitude from the air pressure value measured by the air pressure sensor 2480C to assist in positioning and navigation.
  • Magnetic sensor 2480D includes a Hall sensor.
  • the electronic device 2400 can detect the opening and closing of the flip holster using the magnetic sensor 2480D.
  • the electronic device 2400 can detect the opening and closing of the flip according to the magnetic sensor 2480D. Further, according to the detected opening and closing state of the leather case or the opening and closing state of the flip cover, characteristics such as automatic unlocking of the flip cover are set.
  • the acceleration sensor 2480E can detect the magnitude of the acceleration of the electronic device 2400 in various directions (generally three axes).
  • the magnitude and direction of gravity can be detected when the electronic device 2400 is stationary. It can also be used to identify the posture of electronic devices, and can be used in applications such as horizontal and vertical screen switching, pedometers, etc.
  • the electronic device 2400 can measure distance by infrared or laser. In some embodiments, when shooting a scene, the electronic device 2400 can use the distance sensor 2480F to measure the distance to achieve fast focusing.
  • Proximity light sensor 2480G may include, for example, light emitting diodes (LEDs) and light detectors, such as photodiodes.
  • the light emitting diodes may be infrared light emitting diodes.
  • the electronic device 2400 emits infrared light to the outside through light emitting diodes.
  • Electronic device 2400 uses photodiodes to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it may be determined that there is an object near the electronic device 2400 . When insufficient reflected light is detected, the electronic device 2400 may determine that there is no object near the electronic device 2400 .
  • the electronic device 2400 can use the proximity light sensor 2480G to detect that the user holds the electronic device 2400 close to the ear to talk, so as to automatically turn off the screen to save power.
  • Proximity light sensor 2480G can also be used in holster mode, pocket mode automatically unlock and lock screen.
  • the ambient light sensor 2480L is used to sense ambient light brightness.
  • the electronic device 2400 can adaptively adjust the brightness of the display screen 2494 according to the perceived ambient light brightness.
  • the ambient light sensor 2480L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 2480L can also cooperate with the proximity light sensor 2480G to detect whether the electronic device 2400 is in the pocket to prevent accidental touch.
  • the fingerprint sensor 2480H is used to collect fingerprints.
  • the electronic device 2400 can use the collected fingerprint characteristics to unlock fingerprints, access application locks, take photos with fingerprints, answer incoming calls with fingerprints, and the like.
  • Temperature sensor 2480J is used to detect temperature.
  • the electronic device 2400 utilizes the temperature detected by the temperature sensor 2480J to execute a temperature processing strategy. For example, when the temperature reported by the temperature sensor 2480J exceeds a threshold, the electronic device 2400 performs a performance reduction of the processor located near the temperature sensor 2480J in order to reduce power consumption and implement thermal protection.
  • the electronic device 2400 when the temperature is lower than another threshold, the electronic device 2400 heats the battery 2442 to avoid abnormal shutdown of the electronic device 2400 due to low temperature.
  • the electronic device 2400 boosts the output voltage of the battery 2442 to avoid abnormal shutdown caused by low temperature.
  • Touch sensor 2480K also known as "touch device”.
  • the touch sensor 2480K may be disposed on the display screen 2494, and the touch sensor 2480K and the display screen 2494 form a touch screen, also called “touch screen”.
  • the touch sensor 2480K is used to detect touch operations on or near it.
  • the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
  • Visual output related to touch operations may be provided through display screen 2494 .
  • the touch sensor 2480K can also be disposed on the surface of the electronic device 2400, which is different from the location where the display screen 2494 is located.
  • the bone conduction sensor 2480M can acquire vibration signals.
  • the bone conduction sensor 2480M can acquire the vibration signal of the vibrating bone mass of the human voice.
  • the bone conduction sensor 2480M can also contact the human pulse and receive the blood pressure beating signal.
  • the bone conduction sensor 2480M can also be disposed in the earphone, combined with the bone conduction earphone.
  • the audio module 2470 can analyze the voice signal based on the vibration signal of the vocal vibration bone block obtained by the bone conduction sensor 2480M, so as to realize the voice function.
  • the application processor can analyze the heart rate information based on the blood pressure beat signal obtained by the bone conduction sensor 2480M, and realize the function of heart rate detection.
  • the keys 2490 include a power-on key, a volume key, and the like. Keys 2490 may be mechanical keys. It can also be a touch key.
  • the electronic device 2400 may receive key inputs and generate key signal inputs related to user settings and function control of the electronic device 2400 .
  • Motor 2491 can generate vibration alerts.
  • the motor 2491 can be used for incoming call vibration alerts, and can also be used for touch vibration feedback.
  • touch operations acting on different applications can correspond to different vibration feedback effects.
  • the motor 2491 can also correspond to different vibration feedback effects for touch operations on different areas of the display screen 2494 .
  • Different application scenarios for example: time reminder, receiving information, alarm clock, games, etc.
  • the touch vibration feedback effect can also support customization.
  • the indicator 2492 can be an indicator light, which can be used to indicate the charging status, the change of power, and can also be used to indicate messages, missed calls, notifications, and the like.
  • the SIM card interface 2495 is used to connect a SIM card.
  • the SIM card can be inserted into the SIM card interface 2495 or pulled out from the SIM card interface 2495 to achieve contact and separation with the electronic device 2400 .
  • the electronic device 2400 may support 1 or N SIM card interfaces, where N is a positive integer greater than 24.
  • the SIM card interface 2495 can support Nano SIM card, Micro SIM card, SIM card, etc.
  • the same SIM card interface 2495 can insert multiple cards at the same time.
  • the types of the plurality of cards may be the same or different.
  • the SIM card interface 2495 can also be compatible with different types of SIM cards.
  • the SIM card interface 2495 is also compatible with external memory cards.
  • the electronic device 2400 interacts with the network through the SIM card to realize functions such as call and data communication.
  • the electronic device 2400 employs an eSIM, ie: an embedded SIM card.
  • the eSIM card can be embedded in the electronic device 2400 and cannot be separated from the electronic device 2400 .
  • the disclosed apparatus/electronic device and method may be implemented in other manners.
  • the above-described embodiments of the apparatus/electronic device are only illustrative.
  • the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, such as multiple units. Or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated modules/units if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the present application can implement all or part of the processes in the methods of the above embodiments, and can also be completed by instructing the relevant hardware through a computer program.
  • the computer program can be stored in a computer-readable storage medium, and the computer When the program is executed by the processor, the steps of the foregoing method embodiments can be implemented.
  • the computer program includes computer program code, and the computer program code may be in the form of source code, object code, executable file or some intermediate form, and the like.
  • the computer-readable storage medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (ROM, Read-Only Memory) ), random access memory (RAM, Random Access Memory), electrical carrier signals, telecommunication signals, and software distribution media, etc. It should be noted that the content contained in the computer-readable storage medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in the jurisdiction, for example, in some jurisdictions, according to legislation and patent practice, computer-readable Storage media exclude electrical carrier signals and telecommunications signals.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande est appliquée au domaine de la technologie de communication, et concerne un procédé de communication, des dispositifs électroniques et un support d'enregistrement lisible par ordinateur. Dans le procédé de communication fourni par la présente demande, un premier dispositif électronique surveille une liaison de communication. Lorsque le premier dispositif électronique détecte une défaillance de la liaison de communication, le premier dispositif électronique commande un module de communication Wi-Fi du premier dispositif électronique pour entrer dans un mode hybride et envoie un premier message sous la forme d'une diffusion. À cet instant, le premier dispositif électronique et d'autres dispositifs électroniques dans un réseau local peuvent exécuter une interaction de données sous la forme d'une diffusion, maintenir des services de communication et empêcher l'interruption de services de communication. Lorsque le premier dispositif électronique échappe à une « attaque de chemin » au moyen du procédé de communication décrit, le premier dispositif électronique maintient le service de communication par changement d'un mode de fonctionnement du module de communication Wi-Fi sans coûts supplémentaires, ce qui permet de résoudre le problème selon lequel une solution actuelle à une « attaque de chemin » génère des coûts élevés et n'est pas favorable à la promotion et à l'application, et présente une facilité d'utilisation et une possibilité de mise en œuvre élevées.
PCT/CN2021/116982 2020-10-30 2021-09-07 Procédé de communication, dispositif électronique et support d'enregistrement lisible par ordinateur WO2022089012A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011198292.6A CN114531378B (zh) 2020-10-30 2020-10-30 通信方法、电子设备及计算机可读存储介质
CN202011198292.6 2020-10-30

Publications (1)

Publication Number Publication Date
WO2022089012A1 true WO2022089012A1 (fr) 2022-05-05

Family

ID=81383570

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/116982 WO2022089012A1 (fr) 2020-10-30 2021-09-07 Procédé de communication, dispositif électronique et support d'enregistrement lisible par ordinateur

Country Status (2)

Country Link
CN (1) CN114531378B (fr)
WO (1) WO2022089012A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022058A (zh) * 2022-06-13 2022-09-06 恒大恒驰新能源汽车研究院(上海)有限公司 控制器局域网的安全检测方法、装置及电子设备
CN115811773A (zh) * 2022-11-07 2023-03-17 航天行云科技有限公司 一种无线自组网的高可靠数据传输方法
CN116849724A (zh) * 2023-06-19 2023-10-10 北京纳通医用机器人科技有限公司 基于手术机器人的通讯方法、装置、设备和存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110307574A1 (en) * 2009-12-17 2011-12-15 Justin Lipman Method and system for facilitating one-to-many data transmissions to a plurality of computing devices
US20130332621A1 (en) * 2012-06-08 2013-12-12 Ecole Polytechnique Federale De Lausanne (Epfl) System and method for cooperative data streaming
WO2016189362A1 (fr) * 2015-05-22 2016-12-01 Telefonaktiebolaget Lm Ericsson (Publ) Procédé et système de partage de spectre radiofréquence selon un protocole basé sur la concurrence avec détermination de la durée de transmission
CN108111523A (zh) * 2017-12-28 2018-06-01 网易(杭州)网络有限公司 数据传输方法和装置
CN108964959A (zh) * 2017-05-27 2018-12-07 阿里巴巴集团控股有限公司 一种用于虚拟化平台的网卡直通系统及数据包监管方法
CN112511609A (zh) * 2020-11-19 2021-03-16 航天银山电气有限公司 数据传输方法、装置及存储介质

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008092389A (ja) * 2006-10-04 2008-04-17 Seiko Epson Corp 無線通信装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110307574A1 (en) * 2009-12-17 2011-12-15 Justin Lipman Method and system for facilitating one-to-many data transmissions to a plurality of computing devices
US20130332621A1 (en) * 2012-06-08 2013-12-12 Ecole Polytechnique Federale De Lausanne (Epfl) System and method for cooperative data streaming
WO2016189362A1 (fr) * 2015-05-22 2016-12-01 Telefonaktiebolaget Lm Ericsson (Publ) Procédé et système de partage de spectre radiofréquence selon un protocole basé sur la concurrence avec détermination de la durée de transmission
CN108964959A (zh) * 2017-05-27 2018-12-07 阿里巴巴集团控股有限公司 一种用于虚拟化平台的网卡直通系统及数据包监管方法
CN108111523A (zh) * 2017-12-28 2018-06-01 网易(杭州)网络有限公司 数据传输方法和装置
CN112511609A (zh) * 2020-11-19 2021-03-16 航天银山电气有限公司 数据传输方法、装置及存储介质

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022058A (zh) * 2022-06-13 2022-09-06 恒大恒驰新能源汽车研究院(上海)有限公司 控制器局域网的安全检测方法、装置及电子设备
CN115811773A (zh) * 2022-11-07 2023-03-17 航天行云科技有限公司 一种无线自组网的高可靠数据传输方法
CN116849724A (zh) * 2023-06-19 2023-10-10 北京纳通医用机器人科技有限公司 基于手术机器人的通讯方法、装置、设备和存储介质
CN116849724B (zh) * 2023-06-19 2024-05-14 北京纳通医用机器人科技有限公司 基于手术机器人的通讯方法、装置、设备和存储介质

Also Published As

Publication number Publication date
CN114531378B (zh) 2024-04-12
CN114531378A (zh) 2022-05-24

Similar Documents

Publication Publication Date Title
EP3934292B1 (fr) Procédé, dispositif et système de connexion bluetooth
WO2022089012A1 (fr) Procédé de communication, dispositif électronique et support d'enregistrement lisible par ordinateur
US20230041669A1 (en) Bluetooth connection method, system, and electronic device
WO2021052178A1 (fr) Procédé et dispositif de connexion wi-fi
CN111373713B (zh) 一种消息传输方法及设备
WO2021043219A1 (fr) Procédé de reconnexion bluetooth et appareil associé
EP4213512A1 (fr) Procédé et système de projection d'écran et dispositif électronique
US11844119B2 (en) Bluetooth pairing method and related apparatus
WO2021147660A1 (fr) Procédé de transmission de données et dispositif
WO2023011376A1 (fr) Procédé de mise à jour de clé dans un système de communication beidou, et système et appareil associé
WO2021169698A1 (fr) Procédé de gestion de connexion et dispositif associé
WO2021104448A1 (fr) Procédé de synchronisation d'informations de clé, système et dispositif
WO2021184264A1 (fr) Procédé de sauvegrade de données, procédé d'accès à des données, et appareil et dispositif associés
WO2021175266A1 (fr) Procédé et appareil de vérification d'identité, et dispositifs électroniques
WO2022143156A1 (fr) Procédé et appareil d'appel chiffré, terminal et support de stockage
EP4247030A1 (fr) Procédé de distribution de dispositif réseau, terminal mobile et support de stockage
WO2022042264A1 (fr) Procédé, appareil et système de commutation de point d'accès
WO2024113865A1 (fr) Procédé et appareil de transmission sécurisée pour un flux vidéo
EP4290360A1 (fr) Procédé de projection d'écran, dispositif électronique et système
CN113950048A (zh) 连接建立方法、电子设备及存储介质
WO2024037040A9 (fr) Procédé de traitement de données, et dispositif électronique
WO2021051964A1 (fr) Procédé et dispositif d'appariement
WO2022179243A1 (fr) Procédé d'accès wi-fi et dispositif associé
CN114077732A (zh) 资源访问控制方法、终端设备及计算机可读存储介质
CN115550919A (zh) 设备配对认证方法、装置、发送方设备及接收方设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21884742

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21884742

Country of ref document: EP

Kind code of ref document: A1