Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication method, communication device, electronic device, and storage medium

A communication method and equipment technology, applied in the field of communication, can solve problems affecting data security, dependence on transmission data security, and affecting the security of smart terminal transmission data, etc.

Active Publication Date: 2021-08-20
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the security of data interaction between smart terminals depends on the communication protocol itself. If the communication protocol is found to have security loopholes, it will affect the security of data transmission between smart terminals.
Take the Bluetooth communication protocol as an example. In the existing technical solutions, data can be transmitted between the mobile phone and the computer through the Bluetooth protocol, but the security of the transmitted data only depends on the Bluetooth protocol. If the Bluetooth protocol is found to have a security loophole, it will Affects the security of data transmitted using the Bluetooth protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method, communication device, electronic device, and storage medium
  • Communication method, communication device, electronic device, and storage medium
  • Communication method, communication device, electronic device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072]Using the acquired timestamp as a first parameter, and using the first information, the second information, and the third information as a second parameter, the token is generated through an HMAC algorithm.

[0073] For example, when the first information is a random string string0, the second information is a random string string1 signed by the private key of the mobile terminal itself, and the third message is a random string string2 signed by the private key of the target device , you can combine random strings string0, string1 and string2 into a parameter seed, as shown in the following formula (1):

[0074] seed=string0+string1+string2(1)

[0075] The obtained timestamp timestamp is used as the first parameter, and the parameter seed is used as the second parameter, and the token token is generated through the HMAC algorithm, as shown in the following formula (2):

[0076] token = hmac(timestamp, seed) (2)

[0077] In addition, in order to further enhance the comm...

Embodiment 2

[0080] Using the first information, the second information, and the third information as a parameter, and using the obtained first timestamp as another parameter, generate a dynamic password through the HMAC algorithm; use the obtained second time stamp The stamp is used as the first parameter, and the dynamic password is used as the second parameter, and the token is generated through the HMAC algorithm.

[0081] For example, when the first information is a random string string0, the second information is a random string string1 signed by the private key of the mobile terminal itself, and the third message is a random string string2 signed by the private key of the target device , the random strings string0, string1 and string2 can be combined into a parameter seed through the above formula (1), the parameter seed is used as a parameter, and the obtained first timestamp is used as another parameter to generate a dynamic password optkey through the HMAC algorithm, As shown in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a communication method, a communication device, electronic equipment, and a storage medium. The communication method includes: exchanging a public key with a target device, and obtaining first information shared with the target device; sending to the target device second information signed by its own private key, and receiving the private key sent by the target device through the target device The third information signed by the key; the third information is verified based on the public key of the target device; if the verification of the third information is passed, a token for communicating with the target device is generated based on the first information, the second information and the third information. The technical solutions of the embodiments of the present invention can effectively enhance communication security between devices.

Description

technical field [0001] The present invention relates to the technical field of communication, and in particular, to a communication method, a communication device, electronic equipment, and a computer-readable storage medium. Background technique [0002] With the development of Internet technology, the functions of various smart terminals are becoming more and more powerful, and the data interaction between smart terminals is becoming more and more frequent. How to ensure the security of data interaction between smart terminals has become the focus of attention. [0003] At present, the security of data interaction between smart terminals depends on the communication protocol itself. If security loopholes are found in the communication protocol, it will affect the security of data transmission between smart terminals. Take the Bluetooth communication protocol as an example. In the existing technical solutions, data can be transmitted between the mobile phone and the compute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李鹏飞
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products