CN111726802B - Communication method, device and storage medium based on WiFi Aware - Google Patents
Communication method, device and storage medium based on WiFi Aware Download PDFInfo
- Publication number
- CN111726802B CN111726802B CN201910213940.1A CN201910213940A CN111726802B CN 111726802 B CN111726802 B CN 111726802B CN 201910213940 A CN201910213940 A CN 201910213940A CN 111726802 B CN111726802 B CN 111726802B
- Authority
- CN
- China
- Prior art keywords
- service
- group
- terminal
- service identifier
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 208
- 238000000034 method Methods 0.000 title claims abstract description 113
- 230000006870 function Effects 0.000 claims description 23
- 238000004458 analytical method Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 28
- 230000009286 beneficial effect Effects 0.000 description 18
- 238000005336 cracking Methods 0.000 description 15
- 238000012545 processing Methods 0.000 description 12
- 238000005516 engineering process Methods 0.000 description 9
- 230000008901 benefit Effects 0.000 description 7
- 230000002427 irreversible effect Effects 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/08—User group management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The disclosure relates to a communication method, a device and a storage medium based on WiFi Aware, wherein the method comprises the following steps: encrypting the first service identification using the group key; generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier; broadcasting a service message; the group comprises at least two terminals, the terminals in the group communicate through WiFi Aware, and the method is applied to the first terminal in the group. According to the communication method, device and storage medium based on WiFi Aware, encryption of information broadcasted in communication based on WiFi Aware is achieved, safety of communication based on WiFi Aware is improved, and user privacy is effectively protected.
Description
Technical Field
The disclosure relates to electronic equipment technology, and in particular relates to a communication method, device and storage medium based on WiFi Aware.
Background
With the rapid development of communication technology, a proximity-Aware network (neighbor awareness network, NAN) mechanism based on WiFi technology, also referred to as WiFi Aware technology, proposed by the WiFi alliance (WFA) is becoming a hotspot of interest. When the WiFi equipment with the WiFi Aware function is not connected to a traditional communication network (such as GPS, cellular network or hot spot connection, etc.), surrounding equipment, applications and services can be perceived, and social applications such as games, point-to-point messages, media sharing, etc. can be performed, for example, distance assessment, shopping restaurant preference information notification, vehicle searching, game invitation, etc.
In the current WiFi Aware function, the information when the user pays attention to, requests, issues and replies to the service, the information related to the service, and the MAC address of the user equipment are generally transmitted in a broadcast or multicast manner, and most of the information is transmitted in the clear. The information comprises the information of interest and hobby time of the user, and the like, relates to the privacy of the user, and can be received and analyzed by other surrounding people, so that the privacy security of the user is threatened. There is therefore a need for an effective mechanism to protect user privacy.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a communication method, device and storage medium based on WiFi Aware. The technical proposal is as follows:
according to a first aspect of embodiments of the present disclosure, there is provided a communication method based on WiFi Aware, a group including at least two terminals, the terminals in the group communicating through WiFi Aware, the method being applied to a first terminal in the group, including:
encrypting the first service identification using the group key;
generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier;
broadcasting the service message.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the first terminal firstly encrypts the first service identifier by using the group key, then generates a service message according to the encrypted first service identifier and service information corresponding to the first service identifier, and finally broadcasts the service message, wherein the encrypted service message cannot be obtained even if the encrypted service message is received by other terminal equipment outside the group, and further, the privacy information of the terminals in the group cannot be obtained, thereby realizing encryption of information broadcasted in communication based on WiFi Aware, improving the safety of communication based on WiFi Aware, and effectively protecting the privacy of users.
Optionally, the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
before the service message is generated by using the service information corresponding to the first service identifier and the encrypted first service identifier, the communication method based on the WiFi Aware further comprises the following steps:
updating and encrypting the communication port information and/or the identification information of the first terminal by using a first preset byte in the group timestamp to obtain encrypted service information;
The generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier includes:
and generating a service message by using the encrypted service information and the encrypted first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the first terminal uses the first preset byte in the group timestamp to update and encrypt the communication port information and/or the identification information of the first terminal, and the service message with better confidentiality is obtained.
Optionally, the encrypting the first service identifier using the group key includes:
and carrying out hash operation on the group key and the first service identifier to obtain the encrypted first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the hash operation is carried out on the group key and the first service identifier to obtain the encrypted first service identifier, so that the method has the advantage of irreversible operation, improves the difficulty of cracking the first service identifier, and has good confidentiality.
Optionally, the performing hash operation on the group key and the first service identifier to obtain the encrypted first service identifier includes:
And carrying out hash operation on the group key and the first service identifier by using a second preset byte in the group timestamp to obtain the encrypted first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the preset bytes in the group timestamp are also used as the input of the hash operation, so that the cracking difficulty of other terminals outside the group is further improved, dictionary attacks are avoided, the communication safety based on WiFi Aware is improved, and the user privacy is effectively protected.
Optionally, before the service message is generated by using the service information corresponding to the first service identifier and the encrypted first service identifier, the communication method based on WiFi Aware further includes:
generating a random address for the first terminal by using a third preset byte in the group timestamp;
the generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier includes:
and generating the service message by using the service information, the encrypted first service identifier and the random address.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the virtual MAC address is adopted to replace the real MAC address of the terminal, so that the security performance is better, the communication security based on WiFi Aware is improved, and the user privacy is effectively protected.
Optionally, the first terminal is a slave terminal in the group, and before encrypting the first service identifier by using the group key, the communication method based on WiFi Aware further includes:
and receiving the group key sent by the master terminal in the group.
Optionally, the first terminal is a master terminal in the group, and before encrypting the first service identifier by using the group key, the communication method based on WiFi Aware further includes:
generating the group key using a random number generation function;
and sending the group key to the slave terminals in the group.
According to a second aspect of the embodiments of the present disclosure, there is provided a communication method based on WiFi Aware, a group including at least two terminals, the terminals in the group communicating through WiFi Aware, the method being applied to a second terminal in the group, including:
receiving a service message broadcast by a first terminal in the group, wherein the service message comprises: the encrypted first service identifier and the service information corresponding to the first service identifier;
and acquiring the first service identifier by using the group key and the encrypted first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: by encrypting the first service identifier by using the group key, a service message is generated according to the encrypted first service identifier and the service information corresponding to the first service identifier, so that the encrypted service message cannot be acquired even if the encrypted service message is received by other terminal equipment outside the group, and further the privacy information of the terminals in the group cannot be acquired, encryption of information broadcasted in communication based on WiFi Aware is realized, the safety of communication based on WiFi Aware is improved, and the privacy of a user is effectively protected.
Optionally, the service message includes: encrypted service information; the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
after receiving the service message broadcast by the first terminal in the group, the communication method based on WiFi Aware further comprises the following steps:
and acquiring the communication port information of the first terminal and/or the identification information of the first terminal by using a first preset byte in the group timestamp.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: and updating and encrypting the communication port information and/or the identification information of the first terminal by using a first preset byte in the group timestamp, thereby obtaining the service message with better confidentiality.
Optionally, the encrypted first service identifier is obtained by performing hash operation on the group key and the first service identifier by the first terminal, and the obtaining the first service identifier by using the group key and the encrypted first service identifier includes:
performing hash operation on the group key and a pre-stored service identifier to obtain an encrypted service identifier;
and if the encrypted service identifier is the same as the encrypted first service identifier, taking the pre-stored service identifier as the first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the hash operation is carried out on the group key and the first service identifier to obtain the encrypted first service identifier, so that the method has the advantage of irreversible operation, improves the difficulty of cracking the first service identifier, and has good confidentiality.
Optionally, the encrypted first service identifier is obtained by performing a hash operation on the group key and the first service identifier by using a second preset byte in a group timestamp by the first terminal, and the hash operation is performed on the group key and a pre-stored service identifier to obtain an encrypted service identifier, which includes:
And carrying out hash operation on the group key and the pre-stored service identifier by using a second preset byte in the group timestamp to obtain the encrypted service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the preset bytes in the group timestamp are also used as the input of the hash operation, so that the cracking difficulty of other terminals outside the group is further improved, dictionary attacks are avoided, the communication safety based on WiFi Aware is improved, and the user privacy is effectively protected.
Optionally, the second terminal is a slave terminal in the group, and before the first service identifier is obtained by using the group key and the encrypted first service identifier, the communication method based on WiFi Aware further includes:
and receiving the group key sent by the master terminal in the group.
Optionally, the second terminal is a master terminal in the group, and before receiving the service message broadcast by the first terminal in the group, the communication method based on WiFi Aware further includes:
generating the group key using a random number generation function;
and sending the group key to the slave terminals in the group.
According to a third aspect of embodiments of the present disclosure, there is provided a WiFi Aware-based communication device as a first terminal, performing a WiFi Aware-based communication method in any one of the possible implementations of the first aspect, including:
an encryption module configured to encrypt the first service identification using the group key;
the service message generation module is configured to generate a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier;
and the sending module is configured to broadcast the service message.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the first terminal firstly encrypts the first service identifier by using the group key, then generates a service message according to the encrypted first service identifier and service information corresponding to the first service identifier, and finally broadcasts the service message, wherein the encrypted service message cannot be obtained even if the encrypted service message is received by other terminal equipment outside the group, and further, the privacy information of the terminals in the group cannot be obtained, thereby realizing encryption of information broadcasted in communication based on WiFi Aware, improving the safety of communication based on WiFi Aware, and effectively protecting the privacy of users.
Optionally, the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
the encryption module is configured to update and encrypt the communication port information and/or the identification information of the first terminal by using a first preset byte in the group timestamp to obtain encrypted service information;
the service message generation module is configured to generate a service message using the encrypted service information and the encrypted first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the first terminal uses the first preset byte in the group timestamp to update and encrypt the communication port information and/or the identification information of the first terminal, and the service message with better confidentiality is obtained.
Optionally, the encryption module is configured to perform hash operation on the group key and the first service identifier to obtain the encrypted first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the hash operation is carried out on the group key and the first service identifier to obtain the encrypted first service identifier, so that the method has the advantage of irreversible operation, improves the difficulty of cracking the first service identifier, and has good confidentiality.
Optionally, the encryption module is configured to perform hash operation on the group key and the first service identifier by using a second preset byte in the group timestamp, so as to obtain the encrypted first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the preset bytes in the group timestamp are also used as the input of the hash operation, so that the cracking difficulty of other terminals outside the group is further improved, dictionary attacks are avoided, the communication safety based on WiFi Aware is improved, and the user privacy is effectively protected.
Optionally, the WiFi Aware-based communication device further includes:
a random address generation module configured to generate a random address for the first terminal using a third preset byte in the group timestamp;
the service message generation module is configured to generate the service message using the service information, the encrypted first service identification, and the random address.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the virtual MAC address is adopted to replace the real MAC address of the terminal, so that the security performance is better, the communication security based on WiFi Aware is improved, and the user privacy is effectively protected.
Optionally, the first terminal is a slave terminal in the group, and the WiFi Aware-based communication device further includes:
and the receiving module is configured to receive the group key sent by the master terminal in the group.
Optionally, the first terminal is a master terminal in the group, and the WiFi Aware-based communication device further includes:
a group key generation module configured to generate the group key using a random number generation function;
the transmitting module is configured to transmit the group key to the slave terminals in the group.
According to a fourth aspect of embodiments of the present disclosure, there is provided a WiFi Aware-based communication device as a second terminal, performing a WiFi Aware-based communication method in any one of the possible implementations of the second aspect, including:
a receiving module configured to receive a service message broadcast by a first terminal within the group, the service message comprising: the encrypted first service identifier and the service information corresponding to the first service identifier;
and the service identifier acquisition module is configured to acquire the first service identifier by using the group key and the encrypted first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: by encrypting the first service identifier by using the group key, a service message is generated according to the encrypted first service identifier and the service information corresponding to the first service identifier, so that the encrypted service message cannot be acquired even if the encrypted service message is received by other terminal equipment outside the group, and further the privacy information of the terminals in the group cannot be acquired, encryption of information broadcasted in communication based on WiFi Aware is realized, the safety of communication based on WiFi Aware is improved, and the privacy of a user is effectively protected.
Optionally, the service message includes: encrypted service information; the service information includes: communication port information of the first terminal and/or identification information of the first terminal; the communication device based on WiFi Aware further comprises:
and the service information analysis module is configured to acquire the communication port information of the first terminal and/or the identification information of the first terminal by using a first preset byte in the group timestamp.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: and updating and encrypting the communication port information and/or the identification information of the first terminal by using a first preset byte in the group timestamp, thereby obtaining the service message with better confidentiality.
Optionally, the encrypted first service identifier is obtained by performing hash operation on the group key and the first service identifier by the first terminal; the service information analysis module comprises:
the encryption sub-module is configured to perform hash operation on the group key and a pre-stored service identifier to obtain an encrypted service identifier;
and the identification sub-module is configured to take the pre-stored service identifier as the first service identifier if the encrypted service identifier is the same as the encrypted first service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the hash operation is carried out on the group key and the first service identifier to obtain the encrypted first service identifier, so that the method has the advantage of irreversible operation, improves the difficulty of cracking the first service identifier, and has good confidentiality.
Optionally, the encrypted first service identifier is obtained by performing hash operation on the group key and the first service identifier by using a second preset byte in a group timestamp by the first terminal, and the encryption sub-module is configured to perform hash operation on the group key and the pre-stored service identifier by using the second preset byte in the group timestamp to obtain the encrypted service identifier.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: the preset bytes in the group timestamp are also used as the input of the hash operation, so that the cracking difficulty of other terminals outside the group is further improved, dictionary attacks are avoided, the communication safety based on WiFi Aware is improved, and the user privacy is effectively protected.
Optionally, the second terminal is a slave terminal in the group, and the receiving module is configured to receive the group key sent by the master terminal in the group.
Optionally, the second terminal is a master terminal in the group, and the WiFi Aware-based communication device further includes:
a group key generation module configured to generate the group key using a random number generation function;
and a transmitting module configured to transmit the group key to the slave terminals within the group.
According to a fifth aspect of embodiments of the present disclosure, there is provided a WiFi Aware-based communication device, including:
a processor;
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the WiFi Aware-based communication method of the first aspect described above.
The technical solution provided by the embodiments of the present disclosure may refer to the communication method based on wifi ware of the first aspect.
According to a sixth aspect of embodiments of the present disclosure, there is provided a WiFi Aware-based communication device, including:
a processor;
a memory for storing executable instructions of the processor;
wherein the processor is further configured to perform the WiFi Aware-based communication method of the second aspect above.
The technical solution provided by the embodiments of the present disclosure may refer to the communication method based on wifi ware in the second aspect.
According to a seventh aspect of embodiments of the present disclosure, there is provided a WiFi Aware-based communication device, including: a memory, a processor, and computer instructions that execute the steps of the wifi aware-based communications method of the first aspect described above.
According to an eighth aspect of embodiments of the present disclosure, there is provided a WiFi Aware-based communication device, including: a memory, a processor, and computer instructions that execute the steps of the wifi aware-based communications method of the second aspect described above.
According to a ninth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the WiFi Aware-based communication method of the first aspect described above.
According to a tenth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the WiFi Aware-based communication method of the second aspect described above.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a schematic view of a scenario in which the present disclosure is applied;
FIG. 2 is a flow chart illustrating a WiFi Aware based communication method according to an exemplary embodiment;
FIG. 3 is a flow chart illustrating a WiFi Aware based communication method according to another exemplary embodiment;
FIG. 4 is a flow chart illustrating a method of WiFi Aware-based communication according to yet another exemplary embodiment;
FIG. 5 is a flow chart illustrating a method of WiFi Aware-based communication according to yet another exemplary embodiment;
FIG. 6 is a flow chart illustrating a method of WiFi Aware-based communication according to yet another exemplary embodiment;
FIG. 7 is a flow chart illustrating a method of WiFi Aware-based communication according to yet another exemplary embodiment;
FIG. 8 is a block diagram of a WiFi Aware based communication device, according to an exemplary embodiment;
FIG. 9 is a block diagram of a WiFi Aware-based communication device, according to another exemplary embodiment;
FIG. 10 is a block diagram of a WiFi Aware-based communication device, according to yet another exemplary embodiment;
FIG. 11 is a block diagram of a WiFi Aware-based communication device, according to yet another exemplary embodiment;
FIG. 12 is a block diagram of a WiFi Aware-based communication device, according to yet another exemplary embodiment;
FIG. 13 is a block diagram of a WiFi Aware-based communication device, according to yet another exemplary embodiment;
FIG. 14 is a block diagram of a WiFi Aware-based communication device, according to yet another exemplary embodiment;
FIG. 15 is a block diagram of a WiFi Aware-based communication device, according to yet another exemplary embodiment;
FIG. 16 is a block diagram illustrating an entity of a WiFi Aware-based communication device, according to an exemplary embodiment;
FIG. 17 is a block diagram illustrating an entity of a WiFi Aware-based communication device according to another exemplary embodiment;
Fig. 18 is a block diagram illustrating a WiFi Aware-based communications device 500 according to an example embodiment.
Specific embodiments of the present disclosure have been shown by way of the above drawings and will be described in more detail below. These drawings and the written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the disclosed concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The technical scheme of the present disclosure is described in detail below with specific examples. The following embodiments may be combined with each other, and some embodiments may not be repeated for the same or similar concepts or processes.
Fig. 1 is a schematic view of a scenario in which the present disclosure is applied, as shown in fig. 1, and the present disclosure relates to a group (WiFi Aware group) communicating through WiFi Aware. One group includes at least two terminals. Fig. 1 exemplarily shows two groups, group 1 and group 2. Group 1 includes terminal 1, terminal 2, terminal 3, and terminal 4, and group 2 includes terminal 2, terminal 5, and terminal 6. Wherein terminals in the same group are interested in the same at least one service. For example, 4 terminals in group 1 are all interested in service 1, service 2, and service 3. The 3 terminals in group 2 are each interested in service 4 and service 5. It will be appreciated that the services of interest to the terminals in group 1 may be completely different, partially identical, or completely identical to the services of interest to the terminals in group 2, and this disclosure is not limited in this regard. It will be appreciated that the services may be provided by a server or by one or more terminals within a group. The terminal may make service interests, requests, issues, and replies within the group. It can be understood that, in the present disclosure, a service of interest to a terminal is a service of interest to a user using the terminal, and in the present disclosure, the terminal is used to refer to the user using the terminal, and no special distinction is made between the terminal and the user.
The terminal in the present disclosure may be a cellular phone, a cordless phone, a handheld device with a wireless communication function, an in-vehicle device, a wearable device, or the like, which carries a WiFi Aware function.
The present disclosure relates to information transmission for terminals within a group, which may employ multicast or broadcast modes when the terminals transmit information within the group due to attention, request, release, and reply services. When multicasting or broadcasting information, the terminal does not transmit in the form of encrypted data packets, but rather transmits in the form of plain text packets such as control packets and management packets. The information carries the privacy information of the user using the terminal, and the privacy information can be received and analyzed by other terminals in other surrounding non-groups, so that the privacy security of the user is threatened. There is therefore a need for an effective mechanism to protect user privacy.
The disclosure provides a communication method based on WiFi Aware, wherein a terminal encrypts a service identifier by using a group key before sending information; and generating service information according to the service information corresponding to the service identifier and the encrypted service identifier and broadcasting the service information, thereby realizing the encryption of the information transmitted by broadcasting and improving the communication security based on WiFi Aware.
Fig. 2 is a flow chart illustrating a WiFi Aware-based communication method according to an example embodiment. The execution subject of the method may be a communication device based on WiFi Aware, or may be a device integrated with the communication device based on WiFi Aware, where the method is applied to a first terminal in a group that sends a service message, and the first terminal may be any terminal as shown in fig. 1. As shown in fig. 2, the method may include the steps of:
in step S101, the first service identification is encrypted using the group key.
Specifically, the service message broadcasted by the first terminal to other terminals in the group includes a first service identifier, which is also called a service name, so that the other terminals determine the service related to the current broadcast according to the first service identifier. By way of example, the first service identification may be a game name, book name, movie theatrical name, photo sharing, location sharing, etc. Thus, privacy information such as user preferences may be related to the first service identification. The method and the device encrypt the first service identifier, and can encrypt the first service identifier by adopting the group key, so that other terminals in a non-group are prevented from acquiring the terminal privacy according to the received unencrypted first service identifier.
Illustratively, the terminals in the group include a master terminal (master) and a slave terminal. The master terminal may be generated by a group internal negotiation. The masters in the group are responsible for distributing and managing the group keys.
In one possible implementation, if the first terminal is a master terminal in the group, before the first terminal encrypts the first service identifier using the group key, a random number generating function is used to generate the group key, and the group key is sent to the slave terminals in the group.
Illustratively, the first terminal may employ a random number generation function to generate a group key at group creation. A group key may be an array of bytes. Optionally, the first terminal may further generate a group key according to the group identifier, the service identifier of interest to the group, and so on. Optionally, the terminals in the group may also negotiate a group key by using other communication methods.
For example, when the first terminal sends a group key to the slave terminals in the group, the group key may be distributed to other terminals in the group by means of a secure wifi aware encrypted data path. For example, the first terminal distributes the group key in the form of a data packet. The first terminal may also send the group key to the slave terminals in the group using other encrypted communication methods, for example. For example, the first terminal may agree on a password with each slave terminal at the time of group creation, and encrypt the group key using the agreed password.
It will be appreciated that the first terminal may also update the group key periodically or at preset periods and distribute to other terminals in the group.
In one possible implementation, if the first terminal is a slave terminal in the group, the first terminal needs to receive the group key sent by the master terminal in the group before the first terminal encrypts the first service identifier using the group key.
Illustratively, the first terminal may receive the group key on a secure wifi aware encrypted data path. Illustratively, when the received group key is an encrypted group key, the first terminal decrypts the encrypted group key to obtain the group key.
In step S102, a service message is generated using the service information corresponding to the first service identifier and the encrypted first service identifier.
Specifically, the service information corresponding to the first service identifier is further included in the service message to be broadcast by the first terminal. For example, when the first terminal broadcasts a game being played to other terminals in the group, the first service identifier included in the service message may be a name identifier of the game, and the service information corresponding to the first service identifier may be introduction information of the game, progress information of the first terminal in the game, a latest record created in the game by the first terminal, and the like. The service information may also be, for example, location information of the first terminal in the game, virtual room information established by the first terminal in the game, team name in the game to invite other players to participate in the game together. It can be understood that when the external terminal cannot obtain the correct first service identifier, it is difficult for the external terminal to correctly analyze the service information corresponding to the first service identifier, so that the service information may not be encrypted. It will be appreciated that the service information described above may also be encrypted. Optionally, the encryption manner of the service information may be the same as or different from the first service identifier.
In step S103, the service message is broadcast.
Specifically, the first terminal broadcasts the service message in the group, and even if the encrypted service message is received by other terminal devices outside the group, the service message cannot be acquired, and thus the privacy information of the terminals in the group cannot be acquired.
In the communication method based on WiFi Aware, the first terminal firstly encrypts the first service identifier by using the group key, then generates the service message according to the encrypted first service identifier and the service information corresponding to the first service identifier, finally broadcasts the service message, and even if the encrypted service message is received by other terminal equipment outside the group, the service message cannot be acquired, and further the privacy information of the terminal in the group cannot be acquired.
Fig. 3 is a flow chart illustrating a WiFi Aware-based communication method according to another example embodiment. In this embodiment, the service information includes identification information and port information of the first terminal, and in order to further improve the security effect, the information in the service information is encrypted. As shown in fig. 3, the WiFi Aware-based communication method may include the steps of:
In step S201, the first service identification is encrypted using the group key.
Specifically, S201 in this embodiment is the same as S101 in the embodiment shown in fig. 2, and this disclosure will not be repeated.
In step S202, the communication port information and/or the identification information of the first terminal is updated and encrypted by using the first preset byte in the group timestamp, so as to obtain encrypted service information.
Specifically, when the first terminal issues service information, the service information may carry identification information and port information of the first terminal, and the disclosure of the information may threaten privacy security of a user, so that the communication port information and/or the identification information of the first terminal in the service information need to be encrypted.
The identification information of the first terminal may be a universally unique identification code (Universally Unique Identifier, UUID) of the first terminal, or may be a user identification code using the first terminal, for example, a mobile phone number/application registration account number/client identification module (Subscriber Identity Module, SIM) number of the user, etc. The communication port information of the first terminal includes transmission control protocol (Transmission Control Protocol, TCP)/user datagram protocol (User Datagram Protocol, UDP) port information.
For example, the update encryption may be performed using the first preset byte in the group timestamp. The master terminal in the group periodically transmits a synchronization beacon (sync beacon) frame for achieving synchronization of the terminals in the group. The master terminal issues a group Timestamp (TSF) through the sync beacon frame. Illustratively, the first terminal employs the latest TSF each time the communication port information and/or the identification information of the first terminal is encrypted, thereby implementing update encryption.
Illustratively, the group timestamp may be N bits of binary data, N being a positive integer. The encryption field may be selected from several bytes in the TSF, i.e., the first preset byte. For example, the first preset byte may be the upper M bits or the lower L bits of the TSF, where M and L are positive integers not greater than N, for example, the values of M and L may be 4.
In a possible implementation manner, the identity of the first terminal is encrypted, and specifically, the following formula one may be adopted:
encrypted uuid=uuid|| (TSF &0xFFFFFFFFFF 800000) equation one
In a possible implementation manner, the communication port information of the first terminal is encrypted, and specifically, the following formula two may be adopted:
TCP/UDP port=tcp/UDP port|| (TSF &0xFFFFFFFFFF 800000) equation two
By way of example, 0xFFFFFFFFFF800000 is 16-ary data, converting it into binary representation 1111_1111_1111_1111_1111_1111_1111_1111_1111_1111_1111_1111_1111_1111_1111_1111_00000, when the TSF is represented in binary, TSF &0 xFFFFFFFFFFFF 800000 represents bitwise ANDed of TSF with 0 xFFFFFFFFFFFF 800000.
In step S203, a service message is generated using the encrypted service information and the encrypted first service identification.
Specifically, S203 in this embodiment is similar to S102 in the embodiment shown in fig. 2, and this disclosure will not be repeated.
In step S204, the service message is broadcast.
Specifically, S204 in the present embodiment is the same as S103 in the embodiment shown in fig. 2, which is not described in detail in this disclosure.
In the communication method based on the WiFi Aware, the service information corresponding to the first service identifier comprises the communication port information and/or the identification information of the first terminal, the first terminal uses the first preset byte in the group timestamp to update and encrypt the communication port information and/or the identification information of the first terminal, so that the service information with better confidentiality is obtained, the encrypted service information cannot be obtained even if the service information is received by other terminal equipment outside the group, and further, the privacy information of the terminal in the group cannot be obtained.
Fig. 4 is a flow chart illustrating a communication method based on WiFi Aware according to yet another exemplary embodiment. The present embodiment relates to a specific implementation step of encrypting a first service identification using a group key. As shown in fig. 4, the WiFi Aware-based communication method may include the steps of:
in step S301, a hash operation is performed on the group key and the first service identifier, so as to obtain an encrypted first service identifier.
Specifically, when encrypting the first service identifier using the group key, a Hash (Hash) operation may be used to encrypt the first service identifier. The hash operations include a family of secure hash algorithms (Secure Hash Algorithm, SHA), such as SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, and the like. The hash operation is performed by taking the first service identifier and the Group Key as inputs, and an operation result is obtained and taken as the encrypted first service identifier. Illustratively, the hash may be performed with a standard hashed message authentication code (Hashed Message Authentication Code, HMAC) operation, and the output length of the hash may be set to 256, i.e., the first service identification is encrypted using the HMAC-SHA-256 function.
In a possible implementation manner, a hash operation is performed on the group key and the first service identifier by using a second preset byte in the group timestamp, so as to obtain the encrypted first service identifier.
For example, in order to ensure that the first service identifier can be updated periodically, improve the cracking difficulty of other terminals outside the group, and avoid dictionary attack, a second preset byte in the TSF issued by the main terminal in the group through the sync beacon can be used as a variable in the hash operation process, so that the periodic update of the first service identifier is realized. Optionally, one possible acquisition formula of the first service identifier is shown in the following formula three:
encrypted first service identifier=hmac-SHA-256 (Group Key, first service identifier|| (TSF &0xFFFFFFFFFF 800000)) equation three
The second preset byte in this embodiment is similar to the first preset byte in the above embodiment, and may be several bits in the TSF.
It can be understood that each terminal device in the group pre-stores the service identifier of the service of interest of the terminal in the group, when receiving the encrypted first service identifier sent by the first terminal, the same encryption algorithm can be used to encrypt the locally pre-stored service identifier to obtain a plurality of encrypted second service identifiers, and comparing the received first service identifier with the second service identifier, a third service identifier identical to the first service identifier can be selected from the second service identifiers, so as to determine that the service identifier sent by the first terminal is identical to the service identifier corresponding to the third service identifier.
The master terminal may send the service identifier and the encrypted service identifier corresponding to the service identifier to each terminal in the group when the group is established, so that each terminal may obtain the decrypted service identifier by searching a pre-stored mapping table when receiving the first service identifier.
The terminal in the group may further determine, after receiving the encrypted first service identifier and the service information corresponding to the first service identifier, a service identifier corresponding to the encrypted first service identifier according to a pre-stored service identifier of interest and content of the service information.
In step S302, a service message is generated using the service information corresponding to the first service identifier and the encrypted first service identifier.
In step S303, a service message is broadcast.
Specifically, S302 and S303 in this embodiment are the same as S102 and S103 in the embodiment shown in fig. 2, and this disclosure will not be repeated here.
In the communication method based on WiFi Aware, hash operation is carried out on the group key and the first service identifier to obtain the encrypted first service identifier, so that the communication method based on WiFi Aware has the advantage of irreversible operation, improves the difficulty of cracking the first service identifier, and has good confidentiality. When the preset bytes in the group timestamp are also used as the input of the hash operation, the cracking difficulty of other terminals outside the group is further improved, and dictionary attacks are avoided. The communication security based on WiFi Aware is improved, and user privacy is effectively protected.
Fig. 5 is a flow chart illustrating a communication method based on WiFi Aware according to yet another exemplary embodiment. In this embodiment, a virtual MAC address is generated for the first terminal device, which further improves security performance. As shown in fig. 4, the wifi aware-based communication method may include the steps of:
in step S401, the first service identification is encrypted using the group key.
Specifically, S401 in the present embodiment is the same as S101 in the embodiment shown in fig. 2, and this disclosure will not be repeated.
In step S402, a random address is generated for the first terminal using the third preset byte in the group timestamp.
Specifically, the service information sent by the first terminal may further include a Media access control (Media AccessControl, MAC) address of the first terminal, so that other terminals in the group can conveniently feed back a message to the first terminal according to the MAC address of the first terminal. However, the MAC address information is easily used as a marker of the user identity to locate the action track of the user, thereby threatening the privacy security of the user. In this embodiment, a random address is generated for the first terminal to replace the real MAC address of the first terminal, so as to avoid that other terminals mark the action track of the user through the MAC address information. The use of random addresses does not affect the interaction of the terminals within the group.
For example, the master terminal in the group may be used to obtain a virtual address updated periodically through the third preset byte in the TSF issued by the sync beacon, which is used as a random address, also referred to as a random MAC address. For example, a random function that generates a 6-byte random number that meets the MAC address specification may be used to generate the random MAC address. A possible MAC address generation formula is shown as formula four below:
random MAC address = random () | (TSF &0xFFFFFFFFFF 800000) equation four
The third preset byte in this embodiment is similar to the first preset byte and the second preset byte in the above embodiment, and may be several bits in the TSF. The first preset byte, the second preset byte and the third preset byte may be the same or different.
In step S403, a service message is generated using the service information, the encrypted first service identification and the random address.
Specifically, S403 in the present embodiment is similar to S102 in the embodiment shown in fig. 2, and this disclosure will not be repeated.
In step S404, a service message is broadcast.
Specifically, S404 in the present embodiment is the same as S103 in the embodiment shown in fig. 2, and this disclosure will not be repeated.
In the communication method based on WiFi Aware, the virtual MAC address is adopted to replace the real MAC address of the terminal, so that the communication method based on WiFi Aware has good confidentiality, the safety of communication based on WiFi Aware is improved, and the privacy of a user is effectively protected.
The disclosure further provides a communication method based on WiFi Aware, and the execution body of the method is a second terminal that receives a service message sent by a first terminal in the communication method based on WiFi Aware provided in the embodiments shown in fig. 2 and fig. 5. The technical features and technical effects that are the same as or corresponding to those of the above embodiments are not repeated in this disclosure.
Fig. 6 is a flow chart illustrating a communication method based on WiFi Aware according to yet another exemplary embodiment. The execution subject of the method may be a communication device based on WiFi Aware, or may be a device integrated with a communication device based on WiFi Aware, where the method is applied to a second terminal in a group that receives a service message, and the second terminal may be any terminal as shown in fig. 1. As shown in fig. 6, the method may include the steps of:
s501, receiving a service message broadcast by a first terminal in a group.
Wherein the service message comprises: the encrypted first service identifier and the service information corresponding to the first service identifier.
S502, acquiring a first service identifier by using the group key and the encrypted first service identifier.
In a possible implementation manner, the encrypted first service identifier is obtained by performing hash operation on the group key and the first service identifier by the first terminal. Correspondingly, the obtaining the first service identifier in S502 by using the group key and the encrypted first service identifier may include:
s11, carrying out hash operation on the group key and a pre-stored service identifier to obtain an encrypted service identifier;
and S12, if the encrypted service identifier is the same as the encrypted first service identifier, taking the pre-stored service identifier as the first service identifier.
For example, to further improve security performance, the encrypted first service identifier may be obtained by performing a hash operation on the group key and the first service identifier by using a second preset byte in the group timestamp for the first terminal. Correspondingly, in S11, hash operation is performed on the group key and the pre-stored service identifier, so as to obtain an encrypted service identifier, which includes:
and carrying out hash operation on the group key and the pre-stored service identifier by using a second preset byte in the group timestamp to obtain the encrypted service identifier.
Fig. 7 is a flow chart illustrating a communication method based on WiFi Aware according to yet another exemplary embodiment. In this embodiment, the service message includes: encrypted service information; the service information includes: communication port information of the first terminal and/or identification information of the first terminal. As shown in fig. 7, the method may include the steps of:
s601, receiving a service message broadcast by a first terminal in the group.
S602, acquiring communication port information of the first terminal and/or identification information of the first terminal by using a first preset byte in the group timestamp.
S603, acquiring the first service identifier by using the group key and the encrypted first service identifier.
In combination with the embodiments shown in fig. 6 or fig. 7, in a possible implementation manner, if the second terminal is a slave terminal in the group, the second terminal further receives the group key sent by the master terminal in the group. In another possible implementation, the second terminal is a master terminal in the group, and the second terminal is further configured to generate a group key using a random number generation function and send the group key to slave terminals in the group.
The following are device embodiments of the present disclosure that may be used to perform method embodiments of the present disclosure. For details not disclosed in the embodiments of the apparatus of the present disclosure, please refer to the embodiments of the method of the present disclosure.
Fig. 8 is a block diagram illustrating a WiFi Aware-based communication device according to an example embodiment. As shown in fig. 8, the WiFi Aware-based communication device may implement part or all of the server through software, hardware, or a combination of both. The WiFi Aware-based communication device may be any of the terminals shown in fig. 1, for example. The communication device based on WiFi Aware, as a first terminal in a group, may include:
an encryption module 11 configured to encrypt the first service identification using the group key;
a service message generation module 12 configured to generate a service message using the service information corresponding to the first service identifier and the encrypted first service identifier;
a transmitting module 13 configured to broadcast the service message.
According to the WiFi Aware-based communication device, the first service identifier is encrypted by using the group key, then the service message is generated according to the encrypted first service identifier and the service information corresponding to the first service identifier, and finally the service message is broadcasted, and even if the encrypted service message is received by other terminal equipment outside the group, the service message cannot be obtained, and further the privacy information of the terminal in the group cannot be obtained, so that encryption of information broadcasted in WiFi Aware-based communication is realized, the safety of WiFi Aware-based communication is improved, and the privacy of a user is effectively protected.
In another embodiment, the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
the encryption module 11 is configured to update and encrypt the communication port information and/or the identification information of the first terminal by using a first preset byte in the group timestamp to obtain encrypted service information;
the service message generation module 12 is configured to generate a service message using the encrypted service information and the encrypted first service identification.
According to the WiFi Aware-based communication device, the communication port information and/or the identification information of the first terminal are updated and encrypted by using the first preset byte in the group timestamp, so that the service message with better confidentiality is obtained.
In another embodiment, the encryption module 11 is configured to perform a hash operation on the group key and the first service identifier to obtain an encrypted first service identifier.
According to the WiFi Aware-based communication device, hash operation is performed on the group key and the first service identifier, so that the encrypted first service identifier is obtained, the advantage of irreversible operation is achieved, the difficulty in cracking the first service identifier is improved, and good confidentiality is achieved.
In another embodiment, the encryption module 11 is configured to perform a hash operation on the group key and the first service identifier by using the second preset byte in the group timestamp, to obtain the encrypted first service identifier.
According to the WiFi Aware-based communication device, the preset bytes in the group timestamp are used as the input of the hash operation, so that the cracking difficulty of other terminals outside the group is further improved, dictionary attacks are avoided, the communication safety based on the WiFi Aware is improved, and the privacy of a user is effectively protected.
Fig. 9 is a block diagram illustrating a WiFi Aware-based communication device according to another example embodiment. As shown in fig. 9, on the basis of the block diagram shown in fig. 8, the WiFi Aware-based communication device further includes:
a random address generation module 14 configured to generate a random address for the first terminal using a third preset byte in the group timestamp;
the service message generation module 12 is configured to generate a service message using the service information, the encrypted first service identification and the random address.
According to the WiFi Aware-based communication device, the virtual MAC address is adopted to replace the real MAC address of the terminal, so that the communication device has good confidentiality, the safety of WiFi Aware-based communication is improved, and the privacy of a user is effectively protected.
Fig. 10 is a block diagram of a WiFi Aware-based communications device according to yet another example embodiment. As shown in fig. 10, on the basis of the block diagrams shown in fig. 8 or fig. 9, when the first terminal is a slave terminal in the group, the WiFi Aware-based communication device further includes:
the receiving module 15 is configured to receive a group key sent by a master terminal within a group.
Fig. 11 is a block diagram illustrating a WiFi Aware-based communication device according to yet another example embodiment. As shown in fig. 11, on the basis of the block diagrams shown in fig. 8 or fig. 9, when the first terminal is a master terminal in the group, the WiFi Aware-based communication device further includes:
a group key generation module 16 configured to generate a group key using a random number generation function;
a transmitting module 12 configured to transmit the group key to the slave terminals within the group.
It will be appreciated that the communication device based on WiFi Aware may be configured to operate as a first terminal for a period of time and as a second terminal for another period of time, and thus may include the transmitting module 12 while including the receiving module 15.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 12 is a block diagram of a WiFi Aware-based communications device according to yet another example embodiment. As shown in fig. 12, the WiFi Aware-based communication device may implement part or all of the server through software, hardware, or a combination of both. The WiFi Aware-based communication device may be any of the terminals shown in fig. 1, for example. The WiFi Aware-based communication device, as a second terminal in the group, may include:
the receiving module 21 is configured to receive a service message broadcast by a first terminal in the group, where the service message includes: the encrypted first service identifier and the service information corresponding to the first service identifier;
the service identifier obtaining module 22 is configured to obtain the first service identifier using the group key and the encrypted first service identifier.
According to the WiFi Aware-based communication device, the first service identifier is encrypted by using the group key, and the service message is generated according to the encrypted first service identifier and the service information corresponding to the first service identifier, so that the encrypted service message cannot be obtained even if the encrypted service message is received by other terminal equipment outside the group, and further the privacy information of the terminal in the group cannot be obtained, encryption of information broadcast and sent in WiFi Aware-based communication is realized, the safety of WiFi Aware-based communication is improved, and the privacy of a user is effectively protected.
Fig. 13 is a block diagram of a WiFi Aware-based communications device according to yet another example embodiment. As shown in fig. 13, on the basis of the block diagram shown in fig. 12 described above, the service message includes: encrypted service information; the service information includes: communication port information of the first terminal and/or identification information of the first terminal; the communication device based on WiFi Aware further comprises:
the service information analysis module 23 is configured to acquire the communication port information of the first terminal and/or the identification information of the first terminal by using the first preset byte in the group timestamp.
According to the WiFi Aware-based communication device, the communication port information and/or the identification information of the first terminal are updated and encrypted by using the first preset byte in the group timestamp, so that the service message with better confidentiality is obtained.
Fig. 14 is a block diagram of a WiFi Aware-based communications device according to yet another example embodiment. As shown in fig. 14, on the basis of the block diagram shown in fig. 13, the encrypted first service identifier is obtained by performing a hash operation on the group key and the first service identifier by the first terminal; the service information analysis module 23 includes:
An encryption sub-module 231 configured to perform hash operation on the group key and the pre-stored service identifier to obtain an encrypted service identifier;
the identifying sub-module 232 is configured to use the pre-stored service identifier as the first service identifier if the encrypted service identifier is the same as the encrypted first service identifier.
According to the WiFi Aware-based communication device, hash operation is performed on the group key and the first service identifier, so that the encrypted first service identifier is obtained, the advantage of irreversible operation is achieved, the difficulty in cracking the first service identifier is improved, and good confidentiality is achieved.
In another embodiment, the encrypted first service identifier is obtained by hashing the group key and the first service identifier by using a second preset byte in the group timestamp by the first terminal, and the encryption sub-module 231 is configured to perform hash operation on the group key and the pre-stored service identifier by using the second preset byte in the group timestamp to obtain the encrypted service identifier.
According to the WiFi Aware-based communication device, the preset bytes in the group timestamp are used as the input of the hash operation, so that the cracking difficulty of other terminals outside the group is further improved, dictionary attacks are avoided, the communication safety based on the WiFi Aware is improved, and the privacy of a user is effectively protected.
In another embodiment, when the second terminal is a slave terminal in the group, the receiving module 21 is configured to receive the group key sent by the master terminal in the group.
Fig. 15 is a block diagram of a WiFi Aware-based communications device according to yet another example embodiment. As shown in fig. 15, on the basis of the block diagrams shown in fig. 12 to 14, when the second terminal is the master terminal in the group, the WiFi Aware-based communication device further includes:
a group key generation module 24 configured to generate a group key using a random number generation function;
the transmitting module 25 is configured to transmit the group key to the slave terminals within the group.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 16 is a block diagram illustrating an entity of a WiFi Aware-based communication device according to an example embodiment. As shown in fig. 16, the WiFi Aware-based communication device, as a first terminal in a group, includes:
a processor 31 and a memory 32;
the memory 32 is used for storing executable instructions of the processor 31;
wherein the processor 31 is configured to:
Encrypting the first service identification using the group key;
generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier;
the service message is broadcast.
Optionally, the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
the processor 31 is further configured to, prior to generating the service message using the service information corresponding to the first service identification and the encrypted first service identification:
updating and encrypting the communication port information and/or the identification information of the first terminal by using a first preset byte in the group timestamp to obtain encrypted service information;
generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier, including:
and generating a service message by using the encrypted service information and the encrypted first service identifier.
Optionally, encrypting the first service identifier using the group key includes:
and carrying out hash operation on the group key and the first service identifier to obtain the encrypted first service identifier.
Optionally, performing hash operation on the group key and the first service identifier to obtain an encrypted first service identifier, including:
And carrying out hash operation on the group key and the first service identifier by using a second preset byte in the group timestamp to obtain the encrypted first service identifier.
Optionally, before generating the service message using the service information corresponding to the first service identifier and the encrypted first service identifier, the processor 31 is further configured to:
generating a random address for the first terminal by using a third preset byte in the group timestamp;
generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier, including:
the service message is generated using the service information, the encrypted first service identification and the random address.
Optionally, before the first terminal is a slave terminal in the group encrypts the first service identification using the group key, the processor 31 is further configured to:
and receiving the group key sent by the master terminal in the group.
Optionally, before the first terminal is a master terminal in the group and encrypts the first service identification using the group key, the processor 31 is further configured to:
generating a group key using a random number generation function;
and sending the group key to the slave terminals in the group.
Fig. 17 is a block diagram illustrating an entity of a WiFi Aware-based communication device according to another example embodiment. As shown in fig. 17, the WiFi Aware-based communication device, as a second terminal in a group, includes:
A processor 41 and a memory 42;
the memory 42 is used for storing executable instructions of the processor 41;
wherein the processor 41 is configured to:
receiving a service message broadcast by a first terminal in a group, wherein the service message comprises: the encrypted first service identifier and the service information corresponding to the first service identifier;
and acquiring the first service identifier by using the group key and the encrypted first service identifier.
Optionally, the service message includes: encrypted service information; the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
after receiving the service message broadcast by the first terminal within the group, the processor 41 is further configured to:
and acquiring the communication port information of the first terminal and/or the identification information of the first terminal by using the first preset byte in the group timestamp.
Optionally, the encrypted first service identifier is obtained by performing hash operation on the group key and the first service identifier by the first terminal, and the obtaining the first service identifier by using the group key and the encrypted first service identifier includes:
performing hash operation on the group key and a pre-stored service identifier to obtain an encrypted service identifier;
And if the encrypted service identifier is the same as the encrypted first service identifier, taking the pre-stored service identifier as the first service identifier.
Optionally, the encrypted first service identifier is obtained by performing a hash operation on the group key and the first service identifier by using a second preset byte in the group timestamp by the first terminal, and performing a hash operation on the group key and a pre-stored service identifier to obtain the encrypted service identifier, which includes:
and carrying out hash operation on the group key and the pre-stored service identifier by using a second preset byte in the group timestamp to obtain the encrypted service identifier.
Optionally, the second terminal is a slave terminal in the group, and before acquiring the first service identifier, using the group key and the encrypted first service identifier, the processor 41 is further configured to:
and receiving the group key sent by the master terminal in the group.
Optionally, the second terminal is a master terminal in the group, and before receiving the service message broadcast by the first terminal in the group, the processor 41 is further configured to:
generating a group key using a random number generation function;
and sending the group key to the slave terminals in the group.
In the above embodiment of the session processing device, it should be understood that the processor may be a central processing sub-module (english: central Processing Unit, abbreviated as CPU), or may be another general purpose processor, a digital signal processor (english: digital Signal Processor, abbreviated as DSP), an application specific integrated circuit (english: application Specific Integrated Circuit, abbreviated as ASIC), or the like. A general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc., and the aforementioned memory 532 may be a read-only memory (ROM), a random access memory (random access memory, RAM), a flash memory, a hard disk, or a solid state disk. SIM cards, also known as subscriber identity cards, smart cards, have to be used with digital mobile phones. Namely, the information of the digital mobile phone client, the encrypted key, the telephone directory of the user and the like are stored on the computer chip. The steps of a method disclosed in connection with the embodiments of the present disclosure may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution.
Fig. 18 is a block diagram illustrating a WiFi Aware-based communication 500 according to an example embodiment. For example, the apparatus 500 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, or the like.
Referring to fig. 18, apparatus 500 may include one or more of the following components: a processing component 502, a memory 504, a power supply component 506, a multimedia component 508, an audio component 510, an input/output (I/O) interface 512, a sensor component 514, and a communication component 516.
The processing component 502 generally controls overall operation of the apparatus 500, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 502 may include one or more processors 520 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 502 can include one or more modules that facilitate interactions between the processing component 502 and other components. For example, the processing component 502 can include a multimedia module to facilitate interaction between the multimedia component 508 and the processing component 502.
The memory 504 is configured to store various types of data to support operations at the apparatus 500. Examples of such data include instructions for any application or method operating on the apparatus 500, contact data, phonebook data, messages, pictures, videos, and the like. The memory 504 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power supply component 506 provides power to the various components of the device 500. The power components 506 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 500.
The multimedia component 508 includes a touch-sensitive display screen between the device 500 and the user that provides an output interface. In some embodiments, the touch display screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or sliding action, but also the duration and pressure associated with the touch or sliding operation. In some embodiments, the multimedia component 508 includes a front-facing camera and/or a rear-facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the apparatus 500 is in an operational mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 510 is configured to output and/or input audio signals. For example, the audio component 510 includes a Microphone (MIC) configured to receive external audio signals when the device 500 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 504 or transmitted via the communication component 516. In some embodiments, the audio component 510 further comprises a speaker for outputting audio signals.
The I/O interface 512 provides an interface between the processing component 502 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a main bar button, a volume button, a start button and a lock button.
The sensor assembly 514 includes one or more sensors for providing status assessment of various aspects of the apparatus 500. For example, the sensor assembly 514 may detect the on/off state of the device 500, the relative positioning of the components, such as the display and keypad of the device 500, the sensor assembly 514 may also detect a change in position of the device 500 or a component of the device 500, the presence or absence of user contact with the device 500, the orientation or acceleration/deceleration of the device 500, and a change in temperature of the device 500. The sensor assembly 514 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 514 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 514 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 516 is configured to facilitate communication between the apparatus 500 and other devices in a wired or wireless manner. The apparatus 500 may access a wireless network based on a communication standard, such as WiFi,2G or 3G, or a combination thereof. In one exemplary embodiment, the communication component 516 receives broadcast signals or broadcast-related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 516 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 500 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for executing the methods described above.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as memory 504, including instructions executable by processor 620 of apparatus 500 to perform the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
A non-transitory computer readable storage medium, which when executed by a processor of the apparatus 500, causes the apparatus 500 to perform, as a first terminal, a WiFi Aware-based communication method. The method comprises the following steps:
encrypting the first service identification using the group key;
generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier;
the service message is broadcast.
In another embodiment, the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
before the service information corresponding to the first service identifier and the encrypted first service identifier are used for generating the service message, the communication method based on the WiFi Aware further comprises the following steps:
updating and encrypting the communication port information and/or the identification information of the first terminal by using a first preset byte in the group timestamp to obtain encrypted service information;
generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier, including:
and generating a service message by using the encrypted service information and the encrypted first service identifier.
In another embodiment, encrypting the first service identification using the group key includes:
And carrying out hash operation on the group key and the first service identifier to obtain the encrypted first service identifier.
In another embodiment, performing a hash operation on the group key and the first service identifier to obtain an encrypted first service identifier, including:
and carrying out hash operation on the group key and the first service identifier by using a second preset byte in the group timestamp to obtain the encrypted first service identifier.
In another embodiment, before generating the service message by using the service information corresponding to the first service identifier and the encrypted first service identifier, the communication method based on WiFi Aware further includes:
generating a random address for the first terminal by using a third preset byte in the group timestamp;
generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier, including:
the service message is generated using the service information, the encrypted first service identification and the random address.
In another embodiment, the first terminal is a slave terminal in the group, and before encrypting the first service identifier by using the group key, the communication method based on WiFi Aware further includes:
and receiving the group key sent by the master terminal in the group.
In another embodiment, the first terminal is a master terminal in the group, and before encrypting the first service identifier by using the group key, the communication method based on WiFi Aware further includes:
generating a group key using a random number generation function;
and sending the group key to the slave terminals in the group.
Another non-transitory computer-readable storage medium, when executed by the processor of the apparatus 500, causes the apparatus 500, as a second terminal, to perform a WiFi Aware-based communication method. The method comprises the following steps:
receiving a service message broadcast by a first terminal in a group, wherein the service message comprises: the encrypted first service identifier and the service information corresponding to the first service identifier;
and acquiring the first service identifier by using the group key and the encrypted first service identifier.
In another embodiment, the service message includes: encrypted service information; the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
after receiving the service message broadcast by the first terminal in the group, the communication based on WiFi Aware further includes:
and acquiring the communication port information of the first terminal and/or the identification information of the first terminal by using the first preset byte in the group timestamp.
In another embodiment, the encrypted first service identifier is obtained by performing a hash operation on the group key and the first service identifier by the first terminal, and the obtaining the first service identifier by using the group key and the encrypted first service identifier includes:
performing hash operation on the group key and a pre-stored service identifier to obtain an encrypted service identifier;
and if the encrypted service identifier is the same as the encrypted first service identifier, taking the pre-stored service identifier as the first service identifier.
In another embodiment, the encrypted first service identifier is obtained by performing a hash operation on the group key and the first service identifier by using a second preset byte in the group timestamp by the first terminal, and performing a hash operation on the group key and a pre-stored service identifier to obtain the encrypted service identifier, which includes:
and carrying out hash operation on the group key and the pre-stored service identifier by using a second preset byte in the group timestamp to obtain the encrypted service identifier.
In another embodiment, the second terminal is a slave terminal in the group, and before the first service identifier is obtained by using the group key and the encrypted first service identifier, the communication method based on WiFi Aware further includes:
And receiving the group key sent by the master terminal in the group.
In another embodiment, the second terminal is a master terminal in the group, and before receiving the service message broadcast by the first terminal in the group, the communication method based on WiFi Aware further includes:
generating a group key using a random number generation function;
and sending the group key to the slave terminals in the group.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (22)
1. A communication method based on WiFi Aware, wherein a group includes at least two terminals, the terminals in the group communicate through WiFi Aware, the method being applied to a first terminal in the group, the method comprising:
Encrypting the first service identification using the group key;
generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier;
broadcasting the service message;
the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
before the service message is generated by using the service information corresponding to the first service identifier and the encrypted first service identifier, the method further comprises:
updating and encrypting the communication port information and/or the identification information of the first terminal by using a first preset byte in the group timestamp to obtain encrypted service information;
the generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier includes:
generating a service message by using the encrypted service information and the encrypted first service identifier;
or,
before the service message is generated by using the service information corresponding to the first service identifier and the encrypted first service identifier, the method further includes:
generating a random address for the first terminal by using a third preset byte in the group timestamp;
The generating a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier includes:
and generating the service message by using the service information, the encrypted first service identifier and the random address.
2. The method of claim 1, wherein encrypting the first service identification using the group key comprises:
and carrying out hash operation on the group key and the first service identifier to obtain the encrypted first service identifier.
3. The method of claim 2, wherein hashing the group key and the first service identifier to obtain the encrypted first service identifier comprises:
and carrying out hash operation on the group key and the first service identifier by using a second preset byte in the group timestamp to obtain the encrypted first service identifier.
4. A method according to any of claims 1-3, wherein the first terminal is a slave terminal in the group, the method further comprising, prior to encrypting the first service identification using the group key:
And receiving the group key sent by the master terminal in the group.
5. A method according to any of claims 1-3, wherein the first terminal is a master terminal in the group, and wherein prior to encrypting the first service identification using the group key, the method further comprises:
generating the group key using a random number generation function;
and sending the group key to the slave terminals in the group.
6. A communication method based on WiFi Aware, wherein a group includes at least two terminals, the terminals in the group communicate through WiFi Aware, the method being applied to a second terminal in the group, the method comprising:
receiving a service message broadcast by a first terminal in the group, wherein the service message comprises: the encrypted first service identifier and the service information corresponding to the first service identifier;
acquiring the first service identifier by using a group key and the encrypted first service identifier;
the service message includes: encrypted service information; the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
After receiving the service message broadcast by the first terminal in the group, the method further includes:
and acquiring the communication port information of the first terminal and/or the identification information of the first terminal by using a first preset byte in the group timestamp.
7. The method of claim 6, wherein the encrypted first service identifier is obtained by hashing the group key and the first service identifier by the first terminal, and the obtaining the first service identifier using the group key and the encrypted first service identifier includes:
performing hash operation on the group key and a pre-stored service identifier to obtain an encrypted service identifier;
and if the encrypted service identifier is the same as the encrypted first service identifier, taking the pre-stored service identifier as the first service identifier.
8. The method of claim 7, wherein the encrypted first service identifier is obtained by hashing the group key and the first service identifier by using a second preset byte in a group timestamp by the first terminal, and the hashing the group key and a pre-stored service identifier to obtain the encrypted service identifier includes:
And carrying out hash operation on the group key and the pre-stored service identifier by using a second preset byte in the group timestamp to obtain the encrypted service identifier.
9. The method according to any of claims 6-8, wherein the second terminal is a slave terminal in the group, and wherein the method further comprises, prior to obtaining the first service identifier, using the group key and the encrypted first service identifier:
and receiving the group key sent by the master terminal in the group.
10. The method according to any of claims 6-8, wherein the second terminal is a master terminal in the group, the method further comprising, prior to receiving the service message broadcast by the first terminal in the group:
generating the group key using a random number generation function;
and sending the group key to the slave terminals in the group.
11. A WiFi Aware-based communication device, wherein a group includes at least two terminals, the terminals in the group communicate through WiFi Aware, the device being a first terminal in the group, comprising:
An encryption module configured to encrypt the first service identification using the group key;
the service message generation module is configured to generate a service message by using the service information corresponding to the first service identifier and the encrypted first service identifier;
a transmission module configured to broadcast the service message;
the service information includes: communication port information of the first terminal and/or identification information of the first terminal;
the encryption module is configured to update and encrypt the communication port information and/or the identification information of the first terminal by using a first preset byte in the group timestamp to obtain encrypted service information;
the service message generation module is configured to generate a service message by using the encrypted service information and the encrypted first service identifier;
the apparatus further comprises:
a random address generation module configured to generate a random address for the first terminal using a third preset byte in the group timestamp;
the service message generation module is configured to generate the service message using the service information, the encrypted first service identification, and the random address.
12. The apparatus of claim 11, wherein the encryption module is configured to hash the group key and the first service identifier to obtain the encrypted first service identifier.
13. The apparatus of claim 12, wherein the encryption module is configured to hash the group key and the first service identifier using a second preset byte in a group timestamp to obtain the encrypted first service identifier.
14. The apparatus according to any of claims 11-13, wherein the first terminal is a slave terminal in the group, the apparatus further comprising:
and the receiving module is configured to receive the group key sent by the master terminal in the group.
15. The apparatus according to any of claims 11-13, wherein the first terminal is a master terminal in the group, the apparatus further comprising:
a group key generation module configured to generate the group key using a random number generation function;
the transmitting module is configured to transmit the group key to the slave terminals in the group.
16. A WiFi Aware-based communication device, wherein a group includes at least two terminals, the terminals in the group communicate through WiFi Aware, the device being a second terminal in the group, comprising:
a receiving module configured to receive a service message broadcast by a first terminal within the group, the service message comprising: the encrypted first service identifier and the service information corresponding to the first service identifier;
a service identifier obtaining module configured to obtain the first service identifier by using the group key and the encrypted first service identifier;
the service message includes: encrypted service information; the service information includes: communication port information of the first terminal and/or identification information of the first terminal; the apparatus further comprises:
and the service information analysis module is configured to acquire the communication port information of the first terminal and/or the identification information of the first terminal by using a first preset byte in the group timestamp.
17. The apparatus of claim 16, wherein the encrypted first service identifier is obtained by hashing the group key and the first service identifier by the first terminal; the service information analysis module comprises:
The encryption sub-module is configured to perform hash operation on the group key and a pre-stored service identifier to obtain an encrypted service identifier;
and the identification sub-module is configured to take the pre-stored service identifier as the first service identifier if the encrypted service identifier is the same as the encrypted first service identifier.
18. The apparatus of claim 17, wherein the encrypted first service identifier is obtained by hashing the group key and the first service identifier by using a second preset byte in a group timestamp by the first terminal, and wherein the encryption submodule is configured to hash the group key and the pre-stored service identifier by using the second preset byte in the group timestamp to obtain the encrypted service identifier.
19. The apparatus according to any of claims 16-18, wherein the second terminal is a slave terminal in the group, the receiving module being configured to receive the group key sent by a master terminal within the group.
20. The apparatus according to any of claims 16-18, wherein the second terminal is a master terminal in the group, the apparatus further comprising:
A group key generation module configured to generate the group key using a random number generation function;
and a transmitting module configured to transmit the group key to the slave terminals within the group.
21. A WiFi Aware-based communication device, comprising: memory, a processor, and computer instructions that execute the computer instructions to perform the steps of the method of any one of claims 1-10.
22. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method according to any of claims 1-10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910213940.1A CN111726802B (en) | 2019-03-20 | 2019-03-20 | Communication method, device and storage medium based on WiFi Aware |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910213940.1A CN111726802B (en) | 2019-03-20 | 2019-03-20 | Communication method, device and storage medium based on WiFi Aware |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111726802A CN111726802A (en) | 2020-09-29 |
CN111726802B true CN111726802B (en) | 2023-05-30 |
Family
ID=72562514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910213940.1A Active CN111726802B (en) | 2019-03-20 | 2019-03-20 | Communication method, device and storage medium based on WiFi Aware |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111726802B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109068317A (en) * | 2018-06-27 | 2018-12-21 | 努比亚技术有限公司 | Communication means, communication processing apparatus and computer readable storage medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10178092B2 (en) * | 2013-11-18 | 2019-01-08 | Qualcomm Incorporated | Methods and apparatus for private service identifiers in neighborhood aware networks |
US9692699B2 (en) * | 2014-10-30 | 2017-06-27 | Intel Corporation | Apparatus, system and method of protecting a service identifier |
US20160285630A1 (en) * | 2015-03-23 | 2016-09-29 | Qualcomm Incorporated | Private service identifiers in neighborhood aware networks |
US20170070343A1 (en) * | 2015-09-04 | 2017-03-09 | Qualcomm Incorporated | Unicast key management across multiple neighborhood aware network data link groups |
-
2019
- 2019-03-20 CN CN201910213940.1A patent/CN111726802B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109068317A (en) * | 2018-06-27 | 2018-12-21 | 努比亚技术有限公司 | Communication means, communication processing apparatus and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111726802A (en) | 2020-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110912880B (en) | Network distribution method and device, electronic equipment and storage medium | |
CN104869612B (en) | Access the method and device of network | |
US9819652B2 (en) | Information interaction methods and devices | |
CN106211159B (en) | Bluetooth-based identity recognition method and device | |
CN110769485A (en) | Method for making target terminal access target wireless network provided by wireless access point | |
CN113115403B (en) | Method, device, electronic equipment and storage medium for network node to access network | |
CN115967491B (en) | Privacy intersection method, system and readable storage medium | |
WO2017128719A1 (en) | Method, apparatus and system for accessing wireless local area network | |
US9723486B2 (en) | Method and apparatus for accessing network | |
CN109246110B (en) | Data sharing method and device and computer readable storage medium | |
CN112115464B (en) | Unlocking processing method and device, electronic equipment and storage medium | |
US10673611B2 (en) | Data transmission method, device, and system | |
CN116325664A (en) | Method and device for intelligent equipment network distribution | |
CN108053241B (en) | Data analysis method, device and computer readable storage medium | |
CN112383532B (en) | Device networking method and device, electronic device and storage medium | |
CN114666048A (en) | Data processing method and device, electronic equipment and storage medium | |
CN111726802B (en) | Communication method, device and storage medium based on WiFi Aware | |
CN112434339A (en) | Information processing method and device | |
CN116208411A (en) | Encryption method and device and electronic equipment | |
CN117714087A (en) | File encryption transmission method, system, medium and equipment | |
CN107318148B (en) | Wireless local area network access information storage method and device | |
CN112055977B (en) | Service slice activation method, service slice activation device and storage medium | |
CN114969164B (en) | Data query method and device and readable storage medium | |
WO2023197178A1 (en) | Information processing methods, apparatus, communication device and storage medium | |
CN116318652A (en) | Key distribution method, device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |