Communication method, communication processing apparatus, and computer readable storage medium
A communication method and processor technology, applied in wireless communication, safety devices, electrical components, etc., can solve the problem of low security of data transmission
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0066] The communication method provided by the embodiment of the present invention is applicable to various terminals, such as portable terminals and wearable devices. The wearable devices specifically include existing ordinary bracelets, flexible screen bracelets, and even wearable mobile terminals. However, these terminals are all communication devices based on WIFI Aware technology. For details, please refer to figure 2 , figure 2 The basic flow chart of the communication method provided in this embodiment. In this embodiment, the execution subject of the communication method may be the first terminal itself, or a processing device installed on the first terminal, or even the first terminal. The main control unit on the terminal, but no matter which execution subject is used, the communication between the first terminal and the second terminal is realized based on WIF Aware technology, that is, the proximity awareness service (NAN protocol). In the example, the first te...
no. 2 example
[0086] image 3 The basic flow chart of the communication method provided by the second embodiment of the present invention. In this embodiment, the first terminal is used as the receiving end and the second terminal is used as the sending end as an example for illustration, wherein the communication method of the sending end specifically includes the following steps:
[0087] S301. Receive second data information sent by a first terminal.
[0088] In this step, the second data information is data information including at least a service discovery data frame, the service discovery data frame includes an identification field and a content field newly added by the first terminal, and the identification field and the content field The service identifier and encryption public key are written in , where the encryption public key in the content field is determined by the service identifier in the identification field.
[0089] S302. Extract the service identifier in the second data...
no. 3 example
[0103] Please refer to Figure 4 , Figure 4 The flow chart of the communication method based on the WIFI Aware network provided by the embodiment of the present invention, the method specifically realizes mutual communication through the following steps:
[0104] S401. The first WIFI Aware device broadcasts a communication rule signal within a range covered by its own signal.
[0105]Optionally, the communication rule signal is a service discovery data frame, and the first WIFI Aware device expands and designs the existing service discovery data frame (NAN attribute), specifically adding and setting a custom field in the NAN attribute There are three fields, namely Sub ID, Sub lenth and public key content, and the encryption method is written in the three fields. The encryption method can refer to the RSA asymmetric encryption algorithm to complete the encryption and decryption process, that is, It is said that through the above transformation method, the broadcast service ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


