Unlock instant, AI-driven research and patent intelligence for your innovation.

A discovery method of p2p group, related equipment and p2p group

A discovery method and device technology, applied in the field of communication, can solve problems such as the inability to guarantee that client device information will not be leaked

Active Publication Date: 2019-11-29
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that only by using the scheme of setting a temporary MAC address for the client device, the hacker can still obtain the fixed MAC address of the client device, so there is no guarantee that the information of the client device will not be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A discovery method of p2p group, related equipment and p2p group
  • A discovery method of p2p group, related equipment and p2p group
  • A discovery method of p2p group, related equipment and p2p group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0127] In Embodiment 1 of the present invention, a P2P group discovery method is provided, which is applied to the GO device side. In Embodiment 1, the GO device can receive the information protection instruction sent by the client device before establishing a secure connection with the client device, and the information The protection indication carries information protection identification information, or the information protection indication carries information protection identification information and a white list.

[0128] A method for discovering a P2P group provided in Embodiment 1 of the present invention, such as Figure 4 ~ Figure 5 As shown, it specifically includes the following steps:

[0129] S401. Before the GO device establishes a secure connection with the client device, the GO device receives an information protection instruction sent by the client device;

[0130]Wherein, the client device and the GO device belong to the same P2P group, and the information ...

Embodiment 2

[0169] Corresponding to Embodiment 1 of the present invention, in Embodiment 2 of the present invention, a P2P group discovery method is provided, which is applied to the client device side, such as Figure 6 As shown, it specifically includes the following steps:

[0170] S601. The client device determines whether the GO device needs to protect the device information of the client device.

[0171] S602. Before the GO device establishes a secure connection with the client device, the client device sends an information protection instruction of the client device to the GO device;

[0172] Wherein, the client device and the GO device belong to the same P2P group, and the information protection indication is used to indicate whether the GO device needs to protect the device information of the client device.

[0173] Further, when the client device is a client device that establishes a P2P group with the GO device, this step can be specifically implemented as: after the client de...

Embodiment 3

[0197] In Embodiment 3 of the present invention, a P2P group discovery method is provided, which is applied to the GO device side. In Embodiment 3, the GO device receives the encrypted information protection instruction sent by the client device after establishing a secure connection with the client device, and The information protection indication carries information protection identification information, or the information protection indication carries information protection identification information and a white list.

[0198] A method for discovering a P2P group provided in Embodiment 3 of the present invention, such as Figure 8 ~ Figure 9 As shown, it specifically includes the following steps:

[0199] S801. After the GO device establishes a secure connection with the client device, receive an encrypted information protection instruction sent by the client device.

[0200] Further, in the embodiment of the present invention, after the GO device and the client device est...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A P2P group discovery method, related equipment and P2P group provided by the embodiment of the present invention, on the client equipment side, the client equipment determines whether the GO equipment needs to protect the equipment information of the client equipment; and sends the information of the client equipment to the GO equipment Protection indication; on the GO device side, the GO device obtains the information protection indication of the client device; receives the P2P query message sent by the P2P device; determines whether to carry the client in the response message sent to the P2P device according to the obtained information protection indication of the client device Device information of the device, and send a response message to the P2P device. The invention relates to the technical field of communication. Improved the security of the device information of the client device.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a P2P group discovery method, related equipment and P2P group. Background technique [0002] Since the wireless fidelity (Wi-Fi, Wireless Fidelity) was released in 1997 by the Institute of Electrical and Electronics Engineers (IEEE, Institute of Electrical and Electronics Engineers) 802.11, there are many leading Wi-Fi companies in the industry. Under the vigorous promotion of the alliance, and at the same time, it has developed rapidly due to its advantages of rapid deployment, convenient use and high transmission rate. [0003] In the prior art, not only mobile phones, tablet computers, and laptops use Wi-Fi, but wearable device products include wrist-supported watches (including watches and wristbands, etc.), feet-supported shoes (including shoes, socks or other products worn on the legs in the future), head-supported Glass (including glasses, helmets, headband...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/12
CPCH04L61/00
Inventor 庞高昆方平
Owner HUAWEI TECH CO LTD