CN110636588A - Data communication method and device - Google Patents

Data communication method and device Download PDF

Info

Publication number
CN110636588A
CN110636588A CN201810663516.2A CN201810663516A CN110636588A CN 110636588 A CN110636588 A CN 110636588A CN 201810663516 A CN201810663516 A CN 201810663516A CN 110636588 A CN110636588 A CN 110636588A
Authority
CN
China
Prior art keywords
data
target information
specific communication
communication data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810663516.2A
Other languages
Chinese (zh)
Inventor
朱永利
徐俊
陈辰
肖月振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810663516.2A priority Critical patent/CN110636588A/en
Publication of CN110636588A publication Critical patent/CN110636588A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a data communication method and device. The method comprises the following steps: the target information is added into the specific communication data, the specific communication data comprises the service set identification of the wireless network, and the transmission of the specific communication data such as the service set identification does not need to depend on accessing the same 802.11 network, so that the target information can be provided for the data acquirer through the specific communication data, so that the data acquirer can connect the target wireless network according to the target information or execute an operation instruction, the communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information isolated island state is reduced, and the reliability of the communication is improved.

Description

Data communication method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a data communication method and apparatus.
Background
With the development of communication technology, various communication devices are increasingly widely used. A communication device generally needs to perform data interaction with other communication devices to obtain required information, receive control of other communication devices, or control other communication devices, and therefore a data communication method is needed.
In the prior art, a communication device may be accessed into an 802.11 network (i.e., a network conforming to an 802.11 wireless network standard), and then, the communication device may serve as a data provider to transmit data to other communication devices in the network, or may serve as a data acquirer to receive data transmitted by other communication devices in the network.
However, since the communication device must access the same 802.11 network to be able to communicate, in practical applications, the communication device may have difficulty accessing the network, i.e., communicating with other communication devices, and thus is in an information isolated island state, i.e., the reliability of communication is low.
Disclosure of Invention
In view of the above, the present application is proposed to provide a data communication method and apparatus that overcomes or at least partially solves the above problems.
The application provides a data communication method, which comprises the following steps:
adding target information to specific communication data, wherein the specific communication data comprises a service set identifier of a wireless network, and the target information comprises at least one of the service set identifier of the target wireless network and a password of the target wireless network, or the target information comprises an operation instruction;
and providing the target information to a data acquirer through the specific communication data so that the data acquirer can connect with the target wireless network or execute the operation instruction.
Optionally, the adding the target information to the specific communication data includes:
extracting key information from the target information according to the limited length of the specific communication data;
adding the key information to the specific communication data.
Optionally, the adding the target information to the specific communication data includes:
determining the number of the specific communication data according to the length of the target information and the limited length of the specific communication data;
and splitting the target information and then respectively adding the split target information to the determined at least one piece of specific communication data.
Optionally, before the adding the target information to the specific communication data, the method further includes:
and encrypting the target information.
Optionally, before the encrypting the target information, the method further includes:
acquiring key information provided by the data acquirer;
and generating an encryption key for the target information according to the key information.
Optionally, before the providing the target information to the data acquirer through the specific communication data, the method further includes:
acquiring the equipment identification provided by the data acquirer;
and confirming that the data acquirer is verified according to the equipment identifier.
Optionally, each data in the specific communication data is stored in a set position or carries a corresponding information identifier.
Optionally, the information identifier includes at least one of an encryption identifier, a number of frames carrying the target information, a sequence number of a current frame, a length of the target information, and a position of the target information in the specific communication data.
Optionally, the providing the target information to the data acquirer through the specific communication data includes:
and starting a hotspot mode, and providing the specific communication data serving as a service set identifier to the data acquirer.
Optionally, when the specific communication data includes a plurality of communication data, the starting the hot spot mode, and providing the specific communication data as a service set identifier to the data acquirer includes:
and starting a hotspot mode at a specific time interval, taking each specific communication data as a service set identifier, and respectively providing each service set identifier for the data acquisition party.
The application also provides a data communication method, which comprises the following steps:
acquiring specific communication data of a data provider, wherein the specific communication data comprises a service set identifier of a wireless network;
extracting target information from the specific communication data, wherein the target information comprises at least one of a service set identifier of a target wireless network and a password of the target wireless network, or the target information comprises an operation instruction;
and connecting the target wireless network or executing the operation instruction according to the target information.
Optionally, each data in the specific communication data is stored in a set location or carries a corresponding information identifier, and the extracting target information from the specific communication data includes:
and extracting the target information from the specific communication data according to the set position of the specific communication data or the corresponding information identifier.
Optionally, the target information includes a plurality of pieces of sub information, and the specific communication data includes a length of at least one piece of sub information;
the extracting target information from the specific communication data includes:
extracting a length of the at least one sub information from the specific communication data;
and extracting sub information from the target information according to the length of the at least one piece of sub information.
Optionally, the specific communication data includes a frame number and a current frame sequence number that carry the target information;
the method further comprises the following steps:
extracting the frame number carrying the target information and the current frame sequence number from the specific communication data;
and determining to continuously acquire specific communication data from the data provider according to the number of the frames carrying the target information and the sequence number of the current frame.
Optionally, the method includes:
and splicing the target information acquired for multiple times.
Optionally, after the extracting the target information from the specific communication data, the method further includes:
and decrypting the target information.
Optionally, the specific communication data includes an encrypted identifier, and the decrypting the target information includes:
acquiring the encryption identifier from the specific communication data;
and decrypting the target information according to the encrypted identifier.
Optionally, the decrypting the target information includes:
generating a decryption key according to the key information corresponding to the communication;
and decrypting the target information by adopting the decryption key.
Optionally, the method further includes:
and providing the key information to the data provider so that the data provider can obtain an encryption key for encrypting the target information according to the key information.
Optionally, before the obtaining of the specific communication data of the data provider, the method further includes:
and providing the equipment identification of the data acquirer for the data provider to verify the data acquirer according to the equipment identification of the data acquirer.
The application also provides a data communication method, which comprises the following steps:
adding the target information to specific communication data, wherein the specific communication data comprises a service set identification of the wireless network;
and providing the target information to a data acquirer through the specific communication data.
The present application also provides a data communication apparatus, comprising:
the target information adding module is used for adding target information into specific communication data, wherein the specific communication data comprise a service set identifier of a wireless network, and the target information comprises at least one of the service set identifier of the target wireless network and a password of the target wireless network, or the target information comprises an operation instruction;
and the target information providing module is used for providing the target information to a data acquirer through the specific communication data so that the data acquirer can be connected with the target wireless network or execute the operation instruction.
Optionally, the target information adding module includes:
the key information extraction submodule is used for extracting key information from the target information according to the limited length of the specific communication data;
and the key information adding submodule is used for adding the key information into the specific communication data.
Optionally, the target information adding module includes:
the specific communication data number determining submodule is used for determining the number of the specific communication data according to the length of the target information and the limited length of the specific communication data;
and the target information adding submodule is used for splitting the target information and then respectively adding the split target information to the determined at least one piece of specific communication data.
Optionally, the apparatus further comprises:
and the encryption module is used for encrypting the target information.
Optionally, the apparatus further comprises:
the key information acquisition module is used for acquiring the key information provided by the data acquirer;
and the encryption key generation module is used for generating an encryption key for the target information according to the key information.
Optionally, the apparatus further comprises:
the device identifier acquisition module is used for acquiring the device identifier provided by the data acquirer;
and the verification module is used for confirming that the data acquirer is verified according to the equipment identifier.
The present application also provides a data communication apparatus, comprising:
the specific communication data acquisition module is used for acquiring specific communication data of a data provider, wherein the specific communication data comprises a service set identifier of a wireless network;
a target information extraction module, configured to extract target information from the specific communication data, where the target information includes at least one of a service set identifier of a target wireless network and a password of the target wireless network, or the target information includes an operation instruction;
and the connection execution module is used for connecting the target wireless network or executing the operation instruction according to the target information.
Optionally, the target information includes a plurality of pieces of sub information, and the specific communication data includes a length of at least one piece of sub information;
the target information extraction module includes:
a length extraction sub-module for extracting a length of the at least one piece of sub information from the specific communication data;
and the sub-information extraction sub-module is used for extracting the sub-information from the target information according to the length of the at least one piece of sub-information.
Optionally, the specific communication data includes a frame number and a current frame sequence number that carry the target information;
the device further comprises:
a frame number and sequence number extracting module, configured to extract the frame number carrying the target information and the current frame sequence number from the specific communication data;
and the determining module is used for determining to continuously acquire the specific communication data from the data provider according to the number of the frames carrying the target information and the sequence number of the current frame.
Optionally, the apparatus includes:
and the target information splicing module is used for splicing the target information acquired for multiple times.
Optionally, the apparatus further comprises:
and the decryption module is used for decrypting the target information.
Optionally, the apparatus further comprises:
and the key information providing module is used for providing the key information to the data provider so that the data provider can obtain an encryption key for encrypting the target information according to the key information.
Optionally, the apparatus further comprises:
and the device identifier providing module is used for providing the device identifier of the data acquirer for the data provider to verify the data acquirer according to the device identifier of the data acquirer.
The present application also provides a data communication apparatus, comprising:
the target information adding module is used for adding target information into specific communication data, and the specific communication data comprises a service set identifier of a wireless network;
and the target information providing module is used for providing the target information to the data acquirer through the specific communication data.
The present application also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method according to one or more of the foregoing when executing the computer program.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method according to one or more of the foregoing.
In the embodiment of the application, the target information can be added into the specific communication data, and the specific communication data comprises the service set identifier of the wireless network, and the transmission of the specific communication data such as the service set identifier does not need to depend on accessing the same 802.11 network, so that the target information can be provided for the data acquirer through the specific communication data, so that the data acquirer can connect the target wireless network according to the target information or execute an operation instruction, communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information isolated island state is reduced, and the reliability of communication is improved.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented according to the content of the description in order to make the technical means of the present application more clearly understood, and the following detailed description of the present application is given in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 illustrates a flow chart of a method of data communication according to one embodiment of the present application;
FIG. 2 illustrates a flow chart of a method of data communication according to a second embodiment of the present application;
FIG. 3 illustrates a flow chart of a method of data communication according to a third embodiment of the present application;
FIG. 4 illustrates a flow chart of a method of data communication according to a fourth embodiment of the present application;
FIG. 5 illustrates a flow diagram of a method of data communication according to one embodiment of the present application;
FIG. 6 illustrates a flow diagram of another method of data communication according to one embodiment of the present application;
FIG. 7 illustrates a timing diagram of a method of data communication according to an embodiment of the present application;
FIG. 8 is a block diagram of a data communication device according to an embodiment of the present application;
FIG. 9 is a block diagram of a data communication device according to a sixth embodiment of the present application;
fig. 10 is a block diagram of a data communication device according to a seventh embodiment of the present application;
FIG. 11 illustrates a block diagram of an exemplary system according to an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While the exemplary embodiments of the present application are illustrated in the accompanying drawings, it should be understood that the present application may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In order to facilitate a person skilled in the art to understand the embodiments of the present application in a deep manner, definitions of terms used in the embodiments of the present application will be described first.
The target information is data which needs to be provided by the data provider to the data acquirer, and the target information can be used for the data acquirer to perform business processing, or the target information comprises an operation instruction which can be executed by the data acquirer to accept the control of the data provider. In order to configure the network of the data acquirer, and enable the data acquirer to access the designated network, the reliability of the distribution network is improved, the target information includes at least one of a service set identifier of the target wireless network and a password of the target wireless network, or in order to facilitate that the communication device can control another communication device without accessing the same 802.11 network, the target information includes an operation instruction.
The service Set identifier includes an ssid (service Set identifier), or any other applicable identifier, which is not limited in this embodiment of the present application. The target information may be encrypted using an encryption key according to a predetermined encryption algorithm. An encryption algorithm is used to encrypt the data. For example, the encryption algorithm may include AES (Advanced encryption standard).
The data provider is a communication device that provides the target information, and correspondingly, the data acquirer is a communication device that acquires the target information.
The specific communication data is communication data carrying target information, and the specific communication data can be transferred between communication devices which do not access the same 802.11 network. The specific communication data includes a service set identifier, and may be carried in any management frame such as beacon (beacon) frame, Probe Request (Probe Request) frame, or Probe response (Probe response) frame. Of course, in practical applications, the service set identifier may also be carried in other management frames.
The service set is identified as a name of a WIreless network, such as a hotspot name in a WIFI (WIreless-Fidelity) network.
The beacon frame is a broadcast frame, and is used for an AP (Access Point) to announce the presence of a network, so that an STA (Station) determines the presence of the network. The AP is an access point of an 802.11 network, such as a hotspot in a WIFI network, and both the AP and the STA may include a communication device.
The Probe Request frame is a broadcast frame for the STA to Probe the surrounding 802.11 network.
The Probe response frame is a unicast frame, and is used for the AP to respond to the Probe Request frame.
The communication devices may include a mobile phone, a smart watch, a VR (Virtual Reality) device, a tablet computer, an e-book reader, an MP3(Moving Picture Experts Group Audio Layer III, motion Picture Experts compressed standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV) player, a laptop, a car computer, a desktop computer, a set-top box, a smart tv, a wearable device, and so on. The communication device can interact with a remote server to obtain a client, a plug-in and a data communication service, and can comprise any device in the following fig. 7-9 to implement any method in fig. 1-6, thereby realizing communication between communication devices which do not access the same 802.11 network.
The client may include at least one application. The client can run in the communication equipment, so that the data communication method provided by the embodiment of the application is realized.
The plug-in can be included in an application program running on the communication device, so as to realize the data communication method provided by the embodiment of the application.
The embodiment of the application can be applied to the data communication scene in the 802.11 network, including the communication scene among communication devices in a home or an office. In the prior art, communication equipment needing to communicate has to access the same 802.11 network, which may cause that when some communication equipment does not access the network, communication is difficult to carry out, and therefore, the communication is in an information island state, and the reliability of communication is low. Therefore, to solve this problem, the present application provides a data communication method. In the embodiment of the application, since the transmission of the specific communication data such as the service set identifier does not need to rely on accessing the same 802.11 network, the data provider can add the target information to be transmitted to the specific communication data, and when the data acquirer acquires the specific communication data, the data acquirer can acquire the target information certainly, that is, the data acquirer is provided with the target information through the specific communication data, so that the communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information island state is reduced, and the reliability of communication is improved.
The embodiment of the present application may be implemented as a client or a plug-in, and the communication device may obtain and install the client or the plug-in from a remote server, so as to implement the data communication method provided by the embodiment of the present application through the client or the plug-in. Of course, the embodiments of the present application may also be deployed on a remote server in the form of software, and the communication device may access the remote server to obtain a data communication service.
Example one
Referring to fig. 1, a flowchart of a data communication method according to an embodiment of the present application is shown, and the specific steps include:
step 101, adding target information to specific communication data, wherein the specific communication data comprises a service set identifier of a wireless network, and the target information comprises at least one of the service set identifier of the target wireless network and a password of the target wireless network, or the target information comprises an operation instruction.
Since the transmission of specific communication data such as service set identification does not need to rely on accessing the same 802.11 network, the target information is provided to the data acquirer for subsequent passing of the specific communication data, so that communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information isolated island state is reduced, the reliability of communication is improved, and the target information can be added to the service set identification.
The target information may be encoded according to a predetermined encoding method, and characters in the service set identifier may be replaced by the encoded target information, or the encoded target information may be used as the service set identifier.
The encoding method may be determined in advance, for example, when the target information includes a text, the encoding method may include UTF-8(8-bit Unicode Transformation Format, 8-bit ten thousand code Transformation Format); when the target information includes numbers, the encoding may include Base 64.
UTF-8 is a variable length character encoding method for ten thousand codes.
Base64 is a method of representing binary data based on 64 printable characters.
And step 102, providing the target information to a data acquirer through the specific communication data, so that the data acquirer can connect with the target wireless network or execute the operation instruction.
Since the specific communication data carries the target information, the specific communication data can be provided to the data acquirer, that is, the target information is provided to the data acquirer.
The data provider can enter a hotspot mode, the service set identifier of the hotspot is the specific communication data bearing the target information, and the hotspot can be sensed by the data acquirer in the surrounding environment, so that when the data acquirer senses the hotspot, the hotspot communication data is acquired, and the provided target information can be acquired.
In the embodiment of the application, the data acquirer acquires at least one of the service set identifier of the target wireless network and the password of the target wireless network through the specific communication data, and then can connect to the target wireless network, or acquire the operation instruction, and accordingly can execute the operation instruction.
In the embodiment of the application, the target information can be added into the specific communication data, the specific communication data comprises the service set identifier of the wireless network, and the transmission of the specific communication data such as the service set identifier does not need to depend on accessing the same 802.11 network, so that the target information can be provided for the data acquirer through the specific communication data so that the data acquirer can be connected with the target wireless network, or an operation instruction is executed, thereby realizing the communication between communication devices which do not access the same 802.11 network, reducing the possibility that the communication devices are in an information isolated island state, and improving the reliability of the communication.
Example two
Referring to fig. 2, a flowchart of a data communication method according to a second embodiment of the present application is shown, and the specific steps include:
step 201, obtaining specific communication data of a data provider, wherein the specific communication data comprises a service set identifier of a wireless network.
Since the transmission of the specific communication data such as the service set identifier does not need to rely on accessing the same 802.11 network, in order to subsequently obtain the target information through the specific communication data, the communication between the communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information isolated island state is reduced, the reliability of communication is improved, and the specific communication data of the data provider can be obtained.
The data acquirer can detect the hot spots in the surrounding environment, and when the hot spots of the data provider are detected, the service set identification of the hot spots can be the specific communication data of the data provider.
Step 202, extracting target information from the specific communication data.
The target information may be extracted from the specific communication data in accordance with the encoding method of the target information.
For the extracted target information, if the target information comprises data required for performing service processing, performing service processing according to the data; if the target information includes an operation instruction, the operation instruction may be executed. Of course, in practical application, other corresponding processing operations may also be performed according to target information of other data types.
Step 203, connecting the target wireless network according to the target information, or executing the operation instruction.
In the embodiment of the application, the specific communication data can be acquired and comprise the service set identifier of the wireless network, and the transmission of the specific communication data such as the service set identifier does not need to depend on accessing the same 802.11 network, so that the target information provided by a data provider can be acquired through the specific communication data, and the target wireless network is connected or an operation instruction is executed according to the target information, so that the communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information isolated island state is reduced, and the reliability of the communication is improved.
EXAMPLE III
Referring to fig. 3, a flowchart of a data communication method according to a third embodiment of the present application is shown, and the specific steps include:
in step 301, a data acquirer provides at least one of a device identifier and key information of the data acquirer.
In this embodiment of the application, optionally, in order to facilitate the data provider to perform identity confirmation on an object performing communication, and further improve reliability of communication, the data acquirer may provide the device identifier of the data acquirer to the data provider, so that the data provider can verify the data acquirer according to the device identifier of the data acquirer.
The device identifier is an identifier of the communication device, and the device identifier may be determined and stored in the communication device when the device is shipped from a factory.
The manner in which the data acquirer provides the device identifier of the data acquirer to the data provider may be the same as the manner in which the data provider provides the target information to the data acquirer, and is not described here any more.
In this embodiment, optionally, in order to reduce the possibility that subsequent target information is acquired by other devices and improve the security of communication, the data acquirer may provide key information, so that the data provider may encrypt the target information subsequently.
The key information is used to generate a key, including an encryption decryption or decryption key in the subsequent. The key information may include a character string of a first preset length (e.g., 8 characters). The key information may be generated by the data acquirer for each communication, or may be generated according to a key information generation rule set in advance and updated at a specific time interval.
The key information generation rule is a rule for generating key information.
The specific time period can be obtained by setting in advance.
The manner in which the data acquirer provides the key information to the data provider may be the same as the manner in which the data provider provides the target information to the data acquirer, and is not described here any more.
In this embodiment of the application, optionally, in order to ensure that the data provider and the data acquirer can accurately acquire the data provided by the other party without both accessing the same 802.11 network, and further improve the reliability of communication, the specific communication data includes the feature code.
The feature code is an identification indicating that specific communication data is for communication between the data provider and the data acquirer. The feature code may comprise a character or a string of characters. Of course, in practical applications, in order to enable the data acquirer to quickly and accurately perform service processing or perform operations corresponding to the data according to the specific communication data, the feature codes may include a plurality of feature codes, and each feature code may correspond to one type of information carried by the specific communication data.
For example, the signature includes ICAT or ADP. Taking the example that the feature code includes ICAT inclusion as an example, if device identification is included in specific communication data, the data structure of the specific communication data may be "ICAT" + "{ deviceId (device identification) }"; if the specific communication data comprises the key information, the data of the specific communication data is a random string of 'ICAT' +8 characters, wherein the random string of 8 characters is the key information; if device identification and key information are included in the particular communication data, the data structure of the particular communication data may be a random string of "ICAT" + "{ deviceId }" +8 characters. The data acquirer can enter a hot spot mode, and the service set identifier of the hot spot is a random string of "ICAT" + "{ deviceId }" +8 characters.
Step 302, a data provider acquires at least one of the device identifier and the key information provided by the data acquirer, authenticates the data acquirer according to the device identifier, and/or encrypts target information according to the key information.
In order to improve the reliability of communication, the data provider can authenticate the data acquirer; in order to improve the security of communication, the target information may be encrypted based on the key information.
In this embodiment of the present application, optionally, in order to improve reliability of communication, the data provider may obtain a device identifier provided by the data acquirer, and confirm that the data acquirer is verified according to the device identifier.
The manner in which the data provider obtains the device identifier provided by the data acquirer may be the same as the manner in which the data acquirer obtains the target information, and is not described here any more.
The data provider can provide the device identifier for the server, the server determines whether the data acquirer is legal or not according to the device identifier, and feeds a determined result back to the data acquirer, if the data acquirer determines that the result is legal, the data acquirer is determined to be verified, otherwise, the data acquirer is determined not to be verified.
The server is configured to provide communication-related services for the data acquirer or the data provider, such as verifying whether the data acquirer is legitimate or not, or acquiring corresponding device information according to the device identifier, where the device information includes a device key and the like that are stored in the communication device together with the device identifier.
The device information is information related to the communication device.
The device key is a key corresponding to the communication device.
The device identifier and the device key may be burned into a flash (flash memory) of the communication device when the communication device leaves a factory.
The server may compare the device identifier with a list of legitimate devices stored in the server, determine that the communication device corresponding to the device identifier is legitimate if the device identifier exists in the list of legitimate devices, and feed back device information of the communication device to the data provider, otherwise determine that the communication device corresponding to the device identifier is illegitimate.
The server can obtain the device identification of the legal communication device in advance and store the device identification into a legal device list.
In another optional embodiment of the present application, in order to improve communication efficiency, the legal device list may also be stored in the data provider, and correspondingly, the data provider may also determine whether the device identifier exists in the local legal device list without verifying the data acquirer through the server, and further verify the data acquirer.
In this embodiment, optionally, in order to encrypt data for communication and improve security of communication, the data provider may obtain key information provided by the data acquirer, and generate an encryption key for the target information according to the key information.
The data provider may provide the key information to the server, and the server generates the encryption key based on the key information according to a key generation rule determined in advance.
The key generation rule is a rule for generating an encryption key from key information.
For example, when the key information is a random string, the corresponding key generation rule may be Base64(HMACMD5 ("random string", { device key })). HMACMD5 is a hashing algorithm.
In another optional embodiment of the present application, in order to improve communication efficiency, the data provider may generate the encryption key based on the key information locally according to a key generation rule agreed with the data acquirer in advance, instead of generating the encryption key through the server. Alternatively, the encryption key may be an encryption key agreed in advance by the data provider and the data acquirer.
In this embodiment, optionally, since the target information may include relatively sensitive information, such as a password, the data provider may perform encryption processing on the target information in order to improve the security of communication.
The target information may be determined in advance, such as by receiving a user submission, etc.
In this embodiment, optionally, in order to further improve the reliability of communication, when the specific communication data includes the feature code, the data provider may obtain the specific communication data carrying the feature code, so as to extract the device identifier and/or the key information from the obtained specific communication data.
For example, if the data acquirer is used as a hotspot and the service set identifier is a random string of "ICAT" + "{ deviceId }" +8 characters, the data provider may obtain the service set identifier of the data acquirer by acquiring a beacon frame sent by the data acquirer, or by sending a ProbeRequest frame and receiving a Probe response frame fed back by the data acquirer, and extract the device identifier and the key information.
Through the operations in steps 301 and 302 described above, the data provider authenticates the data acquirer and/or encrypts the target information. In another optional embodiment of the present application, in order to avoid performing unnecessary operations when the verification fails, if the data provider verifies the data acquirer and encrypts the target information, the target information may be encrypted after the data acquirer is verified. In another optional embodiment of the present application, in order to improve the communication efficiency, the data acquirer may not be authenticated, and the target information may not be encrypted, that is, step 301 and step 302 are optional steps. In another alternative embodiment of the present application, the data acquirer may also authenticate the data provider and/or acquire key information provided by the data provider in a similar manner.
Step 303, the data provider adds the target information to specific communication data, wherein the specific communication data comprises a service set identifier of the wireless network.
For a manner of adding the target information to the specific communication data, reference may be made to the related description in the foregoing, and details are not repeated here.
In this embodiment, optionally, since the length of the specific communication data such as the service set identifier is limited, and the limited length of the specific communication data may be smaller than the target information, in order to ensure that the target information can be added to the specific communication data, and further improve the reliability of communication, the data provider may extract key information from the target information according to the limited length of the specific communication data, and add the key information to the specific communication data.
The limited length of the specific communication data is the maximum load of information carried by the specific communication data, which may be referred to as a payload, for example, the maximum length of the service set identifier may be 32 characters, and if the entire length of the service set identifier is used for carrying the target information, the limited length thereof may be 32 characters.
The key information is the information with the highest importance or the most representative information in the target information.
A number of characters that meet a defined length of specific communication data may be extracted from the target information according to the defined length, and then the extracted characters may be used as key information.
The characters with the number which is in the front of the sequence and is in accordance with the limited length can be extracted according to the sequence of the characters in the target information.
Of course, in practical applications, the key information may be extracted from the target information by other means according to the limited length. For example, the limited length and the target information can be provided to the user, and the characters submitted by the user are received as key information; or, extracting key information from the target information according to the limited length by adopting a method such as machine learning; or extracting the target information to obtain the key information.
For example, the target information includes a target service set identifier, and since the first 9 bits of the service set identifier can be used to accurately identify different hotspots, the first 9 bits of the target service set identifier can be extracted as key information.
In this embodiment, optionally, since the length of the specific communication data such as the service set identifier is limited, and the limited length of the specific communication data may be smaller than the target information, in order to ensure that the target information can be completely provided to the data acquirer, and improve the communication effect and reliability, the number of the specific communication data may be determined according to the length of the target information and the limited length of the specific communication data, and the target information may be split and then added to at least one determined specific communication data, respectively.
The target information may be split according to the limited length of the specific communication data and the length of the target information to obtain a split result with the length less than or equal to the limited length, and the split result is added to the specific communication data respectively.
In this embodiment, optionally, the target information may include more than one piece of data, and in order to facilitate subsequent extraction of the target information from the specific communication data, the specific communication data may also include other data related to the target information, such as whether to encrypt or not, so that, in order to facilitate subsequent accurate extraction of each piece of data included in the specific communication data, and further accurate extraction of the target information, reliability of communication is further improved, and each piece of data in the specific communication data is stored in a set location or carries a corresponding information identifier.
The set position is a position set in the specific communication data for each data.
The information identifier is an identifier corresponding to each data included in the specific communication data, so that information related to the data, such as an encryption identifier, can be used to indicate whether the data is encrypted.
The data that can be included in the specific communication data and the corresponding set position, or the information identifier may be obtained by determining in advance, for example, by receiving a submission from a user. When the data acquisition party acquires the specific communication data, the target information can be extracted according to the set position or the information identifier.
In this embodiment of the application, optionally, in order to ensure that a subsequent data acquirer can accurately extract target information from specific communication data provided by a data provider, and further improve reliability of communication, the information identifier includes at least one of an encryption identifier, a number of frames carrying the target information, a current frame number, a length of the target information, and a position of the target information in the specific communication data.
The number of frames carrying the target information is the number of specific communication data carrying the splitting result of the same target information, namely the number of frames in which the target information is located.
The current frame sequence number is the sequence number of the current frame in the frame carrying the target information.
The length of the target information is the number of characters included in the target information.
In this embodiment of the application, optionally, in order to ensure that the subsequent data acquirer can accurately extract the target information from the specific communication data provided by the data provider, and further improve the reliability of communication, the data structure of the specific communication data may include a feature code + a protocol frame header + a payload.
The header of the protocol frame may include the information identifier in the foregoing.
Take the example of a service set identification length for a particular communication of data being 32 characters.
A data structure may include a signature ICAT (occupying 0-3 characters, for a total of 4 characters), a protocol header (occupying 4-5 characters, for a total of 2 characters), and a payload (occupying the remaining 6-31 characters, for a total of 26 characters). The header of the protocol frame comprises a flag bit and a data type, and each of the flag bit and the data type occupies one character. The flag bits (bits) 7-bit4 may be all 1, so as to further distinguish the service set identifier carrying the target information from other service set identifiers, avoid the data acquisition party from decoding by mistake, and improve the reliability of communication; the flag bit3 is an encryption flag to indicate whether the payload is encrypted (yes can be indicated by 1, and no can be indicated by 0); bit2-bit0 reserved. The data type is a data type of the target information, for example, the target information includes a target service set identifier and a password of the target service set identifier, and the data type may be 00011111, so that a subsequent data acquirer can accurately process the target information based on the data type, thereby avoiding the data acquirer from decoding by mistake.
For example, if the service set identifier not carrying the target information is asd2046 and the target information is [123456789], the target information is added to the service set identifier not carrying the target information, and the service set identifier carrying the target information is obtained as ICATxxx [123456789 ].
Another data structure may include a feature code ADP (occupying 0-2 characters, for a total of 3 characters), a protocol header (occupying 3-6 characters, for a total of 4 characters), and a payload (occupying the remaining 7-31 characters, for a total of 25 characters). The protocol frame comprises a flag bit, frame sequence number information and sub information length, each of which occupies 1 character, and the service set identifier is a character string ending with a null character, so the protocol frame occupies 4 characters in total. The zone bits bit7-bit3 may be all 1, so as to further distinguish the service set identifier carrying the target information from other service set identifiers; the flag bit2 is used to indicate whether the target information is Chinese-coded (may be 1 to indicate yes, and 0 to indicate no); the flag bit1 is used for indicating whether the target information is encrypted; bit0 is reserved. The frame number information bit7-bit4 is the current frame number, and bit3-bit0 are the total number of frames, that is, the number of specific communication data including the split result of the target information. The sub information length is the sub information length included in the target information, so that a subsequent data acquirer can acquire each sub information from the target information. For example, when the target information includes the target service set identifier and the password of the target service set identifier, the flag bit2 is used to indicate whether the target service set identifier is chinese-encoded, and the flag bit1 is used to indicate whether the password of the target service set identifier is encrypted.
For example, if the service set identifier not carrying the target information is asd2046, and the target information includes the target service set identifier abcdef and the password of the target service set identifier is 123456789 abcdefjk 012345678110qwerty, the target information is added to the service set identifier not carrying the target information, and the service set identifiers carrying the target information are adpxxabcdef 123456789 abcdefghii and adpxxjk 012345678110 qwerty.
Step 304, the data provider provides the target information to the data acquirer through the specific communication data.
For a way that the data provider provides the target information to the data acquirer through the specific communication data, reference may be made to the related description in the foregoing, and details are not repeated here.
In this embodiment of the application, optionally, in order to ensure that target information can be provided to a data acquirer through specific communication data, so as to implement communication between communication devices that do not access the same 802.11 network, reduce the possibility that the communication devices are in an information isolated island state, and improve the reliability of communication, a data provider may start a hotspot mode, and provide the specific communication data as a service set identifier to the data acquirer. That is, as long as the data acquirer can detect the hotspot, the target information provided by the data provider can be acquired.
The data provider may enter the hotspot mode, and use the specific communication data as the service set identifier, including sending out a beacon frame carrying the specific communication data, or respond to the Probe Request frame of the data acquirer through the Probe response frame carrying the specific communication data, thereby providing the specific communication data as the service set identifier to the data acquirer.
In another optional embodiment of the present application, the data acquirer may be in a hotspot mode, the data provider sends out a Probe response frame, where the Probe response frame carries specific communication data, and the data acquirer may acquire the specific communication data by acquiring the Probe response frame.
In this embodiment of the application, optionally, as can be seen from the foregoing, the length of the target information may be longer than the limited length of the specific data, so as to be split into more than one specific communication data, and therefore, in order to ensure that the data acquirer can acquire complete information and improve reliability of communication, when the specific communication data includes a plurality of data, the data provider may start a hot spot mode at intervals of a specific duration, and provide each service set identifier to the data acquirer with each specific communication data as a service set identifier.
The specific time period may be determined in advance, for example, the specific time period may be 3 seconds.
For example, the specific communication data for transmitting the target information includes ADPxxxxabcdef123456789ABCDEFGHI and ADPxxxxJK012345678110 qwertyieop, so that the data provider can control the interface related to the hot spot in the system, enter the hot spot mode, the service set identifier of the hot spot is adpxxabcdef 123456789ABCDEFGHI, re-enter the hot spot mode after 3 seconds, and the service set identifier of the hot spot is ADPxxxxJK012345678110 qwertyiop.
In this embodiment, optionally, in order to ensure that the target information can be provided to the data acquirer by the specific communication data, and improve the reliability of communication, the data provider may periodically enter the hot spot mode, and provide the specific communication data as the service set identifier to the data acquirer.
For example, the specific communication data for transmitting the target information includes ADPxxxxabcdef123456789 abcdefghii and ADPxxxxJK012345678110 qwertyieop. After sequentially taking ADP xxabcdef123456789 abcdefghii and adpxxjk 012345678110 qwertyuop as service set identifiers of hot spots, the data provider may repeat the service set identifiers of hot spots again by sequentially taking ADPxxxx abcdef123456789 abcdefghii and ADPxxxxJK012345678110 qwertyuop as service set identifiers of hot spots at an interval of 3 seconds. The preset times can be determined in advance.
In step 305, the data acquirer acquires specific communication data of the data provider, and extracts the target information from the specific communication data.
For the way of acquiring the specific communication data by the data acquirer and the way of extracting the target information from the specific communication data, reference may be made to the foregoing related description, and details are not repeated here.
In this embodiment, optionally, in order to ensure that target information can be completely acquired and improve communication effect and reliability, the specific communication data includes a frame number and a current frame serial number that carry the target information, and accordingly, a data acquirer may extract the frame number and the current frame serial number that carry the target information from the specific communication data, and determine to continue acquiring the specific communication data from the data provider according to the frame number and the current frame serial number that carry the target information.
The number of frames carrying the target information and the current frame sequence number can be acquired from the flag bits in the specific communication data, whether the acquisition of the specific communication data carrying the target information is completed or not is determined according to the number of frames carrying the target information and the current frame sequence number, if not, the acquisition of the specific communication data from the data provider is continued, and if not, the acquisition of the specific communication data from the data provider is stopped.
For example, obtaining ADP xxxxabcdef123456789ABCDEFGHI from the data provider, obtaining the number of frames carrying the target information from the flag bit as 2, and obtaining the current frame number as 1, continuing to obtain ADPxxxxJK012345678110 qwertyuop from the data obtaining party, at this time, obtaining the number of frames carrying the target information from the flag bit as 2, and obtaining the current frame number as 2, and stopping obtaining when the obtaining is determined to be completed.
In this embodiment, optionally, in order to accurately identify specific communication data in surrounding hotspots, that is, to improve the accuracy of acquiring the specific communication data and further improve the accuracy of acquiring the target information, the data acquirer may acquire a service set identifier of a hotspot in the surrounding environment, and if it is determined that the service set identifier includes a feature code, for example, starts with the feature code, it is determined that the service set identifier is the specific communication data. For the determined specific communication data, the characters at the position of the protocol frame header identified by the service set can be decoded according to Base64, if the characters meet the specification of the protocol frame header, the decoding can be successful, the target information can be extracted, otherwise, the decoding fails, and the target information is not extracted.
For example, if the obtained service set identifier is adpxxabcdef 123456789ABCDEFGHI, and it is determined that the service set identifier includes a feature code ADP, and xxxx is successfully analyzed, target information abcdef123456789ABCDEFGHI carried in the service set identifier may be obtained.
In the embodiment of the application, optionally, each data included in the specific communication data can be accurately extracted, and then the target information is accurately extracted, so that the reliability of communication is further improved, each data in the specific communication data is stored in a set position or carries a corresponding information identifier, and correspondingly, the data acquirer can extract the target information from the specific communication data according to the set position of the specific communication data or the corresponding information identifier.
The target information may be extracted from the specific communication data according to a set position of the target information or a length of the target information.
In this embodiment, optionally, since the target information may include more than one piece of information, in order to ensure that each piece of information can be obtained and improve reliability of communication, the target information includes a plurality of pieces of sub information, and the specific communication data includes a length of at least one piece of sub information; accordingly, the data acquirer may extract the length of the at least one piece of sub information from the specific communication data, and extract the piece of sub information from the target information according to the length of the at least one piece of sub information.
The sub information may be extracted from the payload in the specific communication data according to the length of each sub information, and if other information is included in the payload, the remaining information may be extracted as one word information.
For example, for adpxxabcdef 123456789ABCDEFGHI, if one sub-information length obtained from the flag bit is 6, abcdef is extracted as one sub-information, and the remaining 123456789ABCDEFGHI is extracted as another sub-information.
In this embodiment of the application, optionally, since one piece of target information may be split into more than one piece of specific communication data, in order to ensure that complete target information can be acquired, a data acquirer may splice target information acquired multiple times.
The target information carried in the plurality of specific communication data may be spliced according to the current frame sequence number included in each specific communication data.
For example, two specific communication numbers are obtained, which sequentially include ADPxxxxabcd ef123456789 abcdefghii and ADPxxxxJK012345678110 qwertyieop according to the current frame sequence number, and abcdef123456789 abcdefghii includes sub-information ascdef and sub-information 123456789ABCD efghii, so that 123456789ABCD efghii and JK012345678110 qwertyiop are spliced to obtain 123456789ABCD efghjk 012345678110 qwertyiop.
Step 306, the data acquirer decrypts the target information.
To improve the security of communication, the target information may be encrypted, and thus, the data acquirer may decrypt the target information.
In this embodiment, optionally, in order to improve the security of communication further, the key information may be changed, that is, the encryption key used for encrypting the target information in each communication process may be different, so to ensure that the target information can be decrypted, and improve the security and reliability of communication, the data acquirer may generate the decryption key according to the key information corresponding to the communication this time, and decrypt the target information by using the decryption key.
The key information provided to the data provider in the communication can be acquired, and the decryption key is generated.
The way in which the data acquirer generates the decryption key according to the key information may be the same as the way in which the data provider generates the encryption key according to the key information, and is not described here any more.
In this embodiment, optionally, in order to reduce the possibility of incorrect decryption by the data acquirer, that is, reduce the possibility of decrypting unencrypted target information, and reduce unnecessary operations, thereby improving the efficiency and reliability of acquiring the target information, the specific communication data includes an encryption identifier, and correspondingly, the data acquirer may acquire the encryption identifier from the specific communication data, and decrypt the target information according to the encryption identifier.
Whether the target information is encrypted or not can be determined according to the encryption identifier, if yes, the target information is decrypted, and otherwise, the target information is not decrypted.
In another optional embodiment of the present application, since the data provider encrypts the target information is an optional step, if the target information is not encrypted, the step of decrypting the target information may not be performed, that is, step 306 is an optional step.
And 307, the data acquirer processes according to the target information.
The data acquirer can perform corresponding processing operation according to the data type of the target information.
Wherein, the data acquirer can acquire the data type of the target information from the flag bit of the specific communication data.
In this embodiment of the application, optionally, because a propagation manner of the service set identifier is more reliable than a multicast manner or a manner of forwarding the broadcast packet by the router, in order to improve reliability of network configuration for the communication device, a network may be distributed to the communication device through the service set identifier, where the target information includes the service set identifier of the target wireless network and the password of the target wireless network, and correspondingly, the data acquirer may connect the target wireless network according to at least one of the service set identifier of the target wireless network and the password of the target wireless network.
In this embodiment of the present application, optionally, in order to facilitate that the communication device can control another communication device without accessing the same 802.11 network, the target information includes an operation instruction, and accordingly, the data acquirer may execute the operation instruction.
In the embodiment of the application, firstly, the data provider can add the target information to the specific communication data, and the specific communication data comprises the service set identifier of the wireless network, and as the transfer of the specific communication data such as the service set identifier does not need to rely on accessing the same 802.11 network, the target information can be provided to the data acquirer through the specific communication data, so that the communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information island state is reduced, and the reliability of the communication is improved.
Secondly, the data acquirer can provide the device identification of the data acquirer to the data provider through specific communication data, so that the data provider can verify the communication object, and the reliability of communication is further improved.
In addition, the data acquirer can provide the key information to the data provider by specifying the communication data, so that the data provider can encrypt the provided target information, and the communication security is improved.
In addition, the data provider can enter a hotspot mode, and the service set identifier of the hotspot is the specific communication data, so that the data acquirer can acquire the target information provided by the data provider as long as the data acquirer can detect the hotspot, thereby ensuring that the data acquirer can communicate without accessing the same 802.11 network and improving the reliability of communication.
In addition, the target information may include a target service set identifier and a password of the target service set identifier, so that as long as the data acquirer can detect the hot spot of the data provider, the data acquirer can connect the target service set identifier according to the target service set identifier and the password of the target service set identifier, and the propagation mode of the service set identifier is more reliable than the multicast mode or the mode of forwarding the broadcast packet by the router, so that the reliability of network configuration is improved.
In addition, the data provider can extract the key information of the target information according to the limited length of the specific communication data, add the key information to the specific communication data, or split and add the target information to at least one specific communication data, so that the target information can be provided for the data acquirer, and the reliability of communication is further improved.
Example four
Referring to fig. 4, a flowchart of a data communication method according to a fourth embodiment of the present application is shown, and the specific steps include:
step 401, adding the target information to specific communication data, wherein the specific communication data comprises a service set identifier of the wireless network.
In the embodiment of the present application, a specific implementation manner of this step may refer to the description in the foregoing embodiment, and is not described herein again.
Step 402, providing the target information to a data acquirer through the specific communication data.
In the embodiment of the present application, a specific implementation manner of this step may refer to the description in the foregoing embodiment, and is not described herein again.
In the embodiment of the application, the target information can be added into the specific communication data, the specific communication data comprises the service set identification of the wireless network, and the transmission of the specific communication data such as the service set identification does not need to depend on accessing the same 802.11 network, so that the target information can be provided for the data acquisition party through the specific communication data, the communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information isolated island state is reduced, and the reliability of the communication is improved.
It will be appreciated by those skilled in the art that the method steps in the above-described embodiments are not required to be each other, and in particular cases, one or more of the steps may be omitted as long as the technical purpose of data communication is achieved. The invention is not limited to the number and order of steps in the embodiments, and the scope of the invention is defined by the claims.
In order to facilitate better understanding of the present application for those skilled in the art, a method for data communication according to the embodiments of the present application is described below by using several specific examples, which specifically include the following steps:
referring to fig. 5, a flow chart of a method of data communication is provided. The method is applied to a data provider (such as a smart phone), and specifically comprises the following steps:
step 501, processing a service set identifier and a password of a target WIFI network to obtain target information;
when the service set identifier comprises a Chinese character, the UTF-8 is adopted to encode the service set identifier, and the password (which is encrypted) is encoded by adopting the Base 64.
Step 502, encoding according to a protocol;
the target information may be encoded according to a data structure of the specific communication data, including determining the number of the specific communication data required (for example, the number of the specific communication data required is N) according to the length of the target information and the limited length of the specific listening data.
Step 503, starting a hotspot;
the hot spot can be started through an interface related to the hot spot in the system, the service set identifier of the hot spot is specific communication data, and the specific communication data carries target information obtained by the coding
Step 504, determining whether a plurality of specific communication data need to be provided, if yes, returning to step 403, otherwise, ending, and of course, looping step 403 and step 404 to repeat using each specific communication data as a hot spot.
Wherein if it is determined that a plurality of specific communication data needs to be provided. The hotspot may be turned back on after 3 seconds and the service set identification of the hotspot is changed to the next specific communication data.
Referring to fig. 6, a flow chart of a method of data communication is provided. The method is applied to a data acquisition party (such as intelligent WIFI equipment such as a smart television), and specifically comprises the following steps:
step 601, sniffing peripheral hot spots;
step 602, determining that the service set identifier is specific communication data;
if the service set identifier is found to start with the feature code, determining the service set identifier as specific communication data;
step 603, decoding according to a protocol;
the particular communication data may be decoded in accordance with a data format of the particular communication data. Analyzing the header of the protocol frame, if the analysis is successful, continuing to execute the subsequent steps, otherwise, giving up the analysis and stopping executing the subsequent steps.
Step 604, determining whether there are other specific communication data; if yes, feeding back step 601, otherwise, executing step 605;
the frame number carrying the target information and the current frame serial number can be obtained according to the frame header of the resolution protocol, and whether the beacon frame carrying the specific communication data is required to be continuously obtained or not is determined.
And step 605, acquiring a service set identifier and a password of the target WIFI network.
The target information in each acquired specific data can be spliced, and the target information is split according to the sub-information length in the protocol frame header to obtain the service set identifier and the password of the target WIFI network. Of course, if the password is encrypted, the password may be decrypted; if the service set identifier before transmission is a Chinese character, the service set identifier obtained by splitting needs to be converted into a Chinese character.
When the service set identification and the password of the target WIFI network are obtained, the target WIFI network can be determined according to the WIFI list in the service set identification matching environment, and the password is adopted to connect the target WIFI network.
Referring to fig. 7, a timing diagram of a data communication method is provided. The method can be used for interaction between a data acquisition party (such as intelligent WIFI equipment like an intelligent television), a data providing party (such as an intelligent mobile phone) and a server, and specifically comprises the following steps:
step 701, the data acquirer enters an AP mode, and encodes the service set identifier of the data acquirer.
The device identifier and the key information of the data acquirer can be added to the service set identifier to obtain the specific communication data.
The key information may be a random string.
Step 702, a data provider scans surrounding WIFI;
step 703, the data provider finds a service set identifier beginning with ICAT;
if it is determined that the service set identification begins with ICAT, it can be determined that the service set identification is specific communication data.
Step 704, the data provider analyzes the service set identifier to obtain a device identifier and key information;
step 705, the data provider inquires the device information from the server according to the device identifier;
step 706, the server returns the device information to the data provider;
the server may return the device information of the data acquirer to the data provider if the data acquirer is determined to be a legal device according to the device identifier.
Step 707, the data provider presents the device information to the user, receives a data communication instruction of the user for the data provider, that is, determines to provide data to the data acquirer according to the user operation;
the data communication instructions are for instructing provision of data to a data acquirer.
Step 708, the data provider obtains a session key from the server according to the device identifier and the key information;
step 709, the server returns the session key to the data provider;
and the server acquires a corresponding device key according to the device identifier and generates a session key according to the device key and the key information.
Step 710, the data provider encrypts the data and encodes the data according to a protocol;
the data provider can encrypt data by using an AES algorithm according to the session key, and generate a character string with the maximum length of 32 characters, namely specific communication data, according to the data structure of the specific communication data;
step 711, connecting the data provider with the WIFI network of the specified service set identifier;
and the specified service set identification is the service set identification of the hotspot of the data acquirer.
The data provider may send a Probe Request frame in each channel in a broadcast manner, where the Probe Request frame carries the specific communication data encoded in step 709. And because the specific communication data carried in the request is plaintext, the data acquirer can acquire the specific communication data.
In step 712, the data acquirer finds the special Probe Request frame, unpacks, decrypts, and obtains the data provided by the data provider.
The beginning of the service set identifier carried by the special Probe Request frame is ICAT.
The data acquirer can decode the specific communication data according to the data format of the specific communication data, and decrypt the encrypted data according to the session key, so as to obtain the data sent by the data provider. Such as a service set identification and password for the target WIFI network, or an operating instruction to control the television.
EXAMPLE five
Referring to fig. 8, a block diagram of a data communication device according to a fifth embodiment of the present application is shown, the device including:
a target information adding module 801, configured to add target information to specific communication data, where the specific communication data includes a service set identifier of a wireless network, and the target information includes at least one of a service set identifier of a target wireless network and a password of the target wireless network, or the target information includes an operation instruction;
a target information providing module 802, configured to provide the target information to a data acquirer through the specific communication data, so that the data acquirer connects to the target wireless network, or executes the operation instruction.
Optionally, the target information adding module includes:
the key information extraction submodule is used for extracting key information from the target information according to the limited length of the specific communication data;
and the key information adding submodule is used for adding the key information into the specific communication data.
Optionally, the target information adding module includes:
the specific communication data number determining submodule is used for determining the number of the specific communication data according to the length of the target information and the limited length of the specific communication data;
and the target information adding submodule is used for splitting the target information and then respectively adding the split target information to the determined at least one piece of specific communication data.
Optionally, the apparatus further comprises:
and the encryption module is used for encrypting the target information.
Optionally, the apparatus further comprises:
the key information acquisition module is used for acquiring the key information provided by the data acquirer;
and the encryption key generation module is used for generating an encryption key for the target information according to the key information.
Optionally, the apparatus further comprises:
the device identifier acquisition module is used for acquiring the device identifier provided by the data acquirer;
and the verification module is used for confirming that the data acquirer is verified according to the equipment identifier.
Optionally, each data in the specific communication data is stored in a set position or carries a corresponding information identifier.
Optionally, the information identifier includes at least one of an encryption identifier, a number of frames carrying the target information, a sequence number of a current frame, a length of the target information, and a position of the target information in the specific communication data.
Optionally, the target information providing module includes:
and the hotspot opening sub-module is used for opening a hotspot mode and providing the specific communication data serving as a service set identifier to the data acquisition party.
Optionally, when the specific communication data includes a plurality of communication data, the hotspot opening sub-module is further configured to:
and starting a hotspot mode at a specific time interval, taking each specific communication data as a service set identifier, and respectively providing each service set identifier for the data acquisition party.
In the embodiment of the application, the target information can be added into the specific communication data, the specific communication data comprises the service set identification of the wireless network, and the transmission of the specific communication data such as the service set identification does not need to depend on accessing the same 802.11 network, so that the target information can be provided for the data acquisition party through the specific communication data, the communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information isolated island state is reduced, and the reliability of the communication is improved.
EXAMPLE six
Referring to fig. 9, a block diagram of a data communication device according to a sixth embodiment of the present application is shown, the device including:
a specific communication data obtaining module 901, configured to obtain specific communication data of a data provider, where the specific communication data includes a service set identifier of a wireless network;
a target information extraction module 902, configured to extract target information from the specific communication data, where the target information includes at least one of a service set identifier of a target wireless network and a password of the target wireless network, or the target information includes an operation instruction;
and a connection executing module 903, configured to connect to the target wireless network according to the target information, or execute the operation instruction.
Optionally, each data in the specific communication data is stored in a set location or carries a corresponding information identifier, and the target information extraction module includes:
and the target information extraction submodule is used for extracting the target information from the specific communication data according to the set position of the specific communication data or the corresponding information identifier.
Optionally, the target information includes a plurality of pieces of sub information, and the specific communication data includes a length of at least one piece of sub information;
the target information extraction module includes:
a length extraction sub-module for extracting a length of the at least one piece of sub information from the specific communication data;
and the sub-information extraction sub-module is used for extracting the sub-information from the target information according to the length of the at least one piece of sub-information.
Optionally, the specific communication data includes a frame number and a current frame sequence number that carry the target information;
the device further comprises:
a frame number and sequence number extracting module, configured to extract the frame number carrying the target information and the current frame sequence number from the specific communication data;
and the determining module is used for determining to continuously acquire the specific communication data from the data provider according to the number of the frames carrying the target information and the sequence number of the current frame.
Optionally, the apparatus includes:
and the target information splicing module is used for splicing the target information acquired for multiple times.
Optionally, the apparatus further comprises:
and the decryption module is used for decrypting the target information.
Optionally, the specific communication data includes an encrypted identifier, and the decryption module includes:
an encrypted identifier obtaining sub-module, configured to obtain the encrypted identifier from the specific communication data;
and the first decryption submodule is used for decrypting the target information according to the encrypted identifier.
Optionally, the decryption module includes:
the decryption key generation submodule is used for generating a decryption key according to the key information corresponding to the communication;
and the second decryption submodule is used for decrypting the target information by adopting the decryption key.
Optionally, the apparatus further comprises:
and the key information providing module is used for providing the key information to the data provider so that the data provider can obtain an encryption key for encrypting the target information according to the key information.
Optionally, the apparatus further comprises:
and the device identifier providing module is used for providing the device identifier of the data acquirer for the data provider to verify the data acquirer according to the device identifier of the data acquirer.
In the embodiment of the application, the specific communication data can be acquired and comprise the service set identifier of the wireless network, and the transmission of the specific communication data such as the service set identifier does not need to depend on accessing the same 802.11 network, so that the target information provided by the data provider can be acquired through the specific communication data, the communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information island state is reduced, and the reliability of the communication is improved.
EXAMPLE seven
Referring to fig. 10, a block diagram of a data communication apparatus according to a seventh embodiment of the present application is shown, the apparatus including:
a target information adding module 1001 configured to add target information to specific communication data, where the specific communication data includes a service set identifier of a wireless network;
a target information providing module 1002, configured to provide the target information to the data acquirer through the specific communication data.
In the embodiment of the application, the specific communication data can be acquired and comprise the service set identifier of the wireless network, and the transmission of the specific communication data such as the service set identifier does not need to depend on accessing the same 802.11 network, so that the target information provided by the data provider can be acquired through the specific communication data, the communication between communication devices which do not access the same 802.11 network is realized, the possibility that the communication devices are in an information island state is reduced, and the reliability of the communication is improved.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Embodiments of the application may be implemented as a system using any suitable hardware, firmware, software, or any combination thereof, in a desired configuration. Fig. 11 schematically illustrates an example system (or apparatus) 1100 that can be used to implement various embodiments described herein.
For one embodiment, fig. 11 illustrates an exemplary system 1100 having one or more processors 1102, a system control module (chipset) 1104 coupled to at least one of the processor(s) 1102, a system memory 1106 coupled to the system control module 1104, a non-volatile memory (NVM)/storage 1108 coupled to the system control module 1104, one or more input/output devices 1110 coupled to the system control module 1104, and a network interface 1112 coupled to the system control module 1106.
The processor 1102 may include one or more single-core or multi-core processors, and the processor 1102 may include any combination of general-purpose or special-purpose processors (e.g., graphics processors, application processors, baseband processors, etc.). In some embodiments, the system 1100 is capable of functioning as a data communication device as described in embodiments herein.
In some embodiments, system 1100 may include one or more computer-readable media (e.g., system memory 1106 or NVM/storage 1108) having instructions and one or more processors 1102 in combination with the one or more computer-readable media configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 1104 may include any suitable interface controllers to provide any suitable interface to at least one of the processor(s) 1102 and/or to any suitable device or component in communication with system control module 1104.
The system control module 1104 may include a memory controller module to provide an interface to the system memory 1106. The memory controller module may be a hardware module, a software module, and/or a firmware module.
System memory 1106 may be used, for example, to load and store data and/or instructions for system 1100. For one embodiment, system memory 1106 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 1106 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 1104 may include one or more input/output controllers to provide an interface to NVM/storage 1108 and input/output device(s) 1110.
For example, NVM/storage 1108 may be used to store data and/or instructions. NVM/storage 1108 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 1108 may include storage resources that are physically part of the device on which system 1100 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 1108 may be accessed over a network via input/output device(s) 1110.
Input/output device(s) 1110 may provide an interface for system 1100 to communicate with any other suitable device, input/output device(s) 1110 may include communication components, audio components, sensor components, and so forth. Network interface 1112 may provide an interface for system 1100 to communicate over one or more networks, and system 1100 may communicate wirelessly with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols, such as to access a wireless network based on a communication standard, such as WiFi, 2G, or 3G, or a combination thereof.
For one embodiment, at least one of the processor(s) 1102 may be packaged together with logic for one or more controller(s) (e.g., memory controller module) of system control module 1104. For one embodiment, at least one of the processor(s) 1102 may be packaged together with logic for one or more controller(s) of system control module 1104 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 1102 may be integrated on the same die with logic for one or more controller(s) of the system control module 1104. For one embodiment, at least one of the processor(s) 1102 may be integrated on the same die with logic for one or more controller(s) of system control module 1104 to form a system on chip (SoC).
In various embodiments, system 1100 may be, but is not limited to being: a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 1100 may have more or fewer components and/or different architectures. For example, in some embodiments, system 1100 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
Wherein, if the display includes a touch panel, the display screen may be implemented as a touch screen display to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
The present application further provides a non-volatile readable storage medium, where one or more modules (programs) are stored in the storage medium, and when the one or more modules are applied to a terminal device, the one or more modules may cause the terminal device to execute instructions (instructions) of method steps in the present application.
Provided in one example is an apparatus comprising: one or more processors; and one or more machine readable media having instructions stored thereon, which when executed by the one or more processors, cause the apparatus to perform a method as performed by a data communication apparatus in embodiments of the present application.
One or more machine readable media having instructions stored thereon that, when executed by one or more processors, cause an apparatus to perform a method as performed by a data communication apparatus in embodiments of the present application are also provided in one example.
The embodiment of the application discloses a data communication method and device.
Example 1 includes a data communication method, comprising:
adding target information to specific communication data, wherein the specific communication data comprises a service set identifier of a wireless network, and the target information comprises at least one of the service set identifier of the target wireless network and a password of the target wireless network, or the target information comprises an operation instruction;
and providing the target information to a data acquirer through the specific communication data so that the data acquirer can connect with the target wireless network or execute the operation instruction.
Example 2 may include the method of example 1, wherein the adding target information to the particular communication data comprises:
extracting key information from the target information according to the limited length of the specific communication data;
adding the key information to the specific communication data.
Example 3 may include the method of example 1 and/or example 2, wherein the adding target information to the particular communication data comprises:
determining the number of the specific communication data according to the length of the target information and the limited length of the specific communication data;
and splitting the target information and then respectively adding the split target information to the determined at least one piece of specific communication data.
Example 4 may include the method of one or more of examples 1-3, wherein prior to the adding the target information to the particular communication data, the method further comprises:
and encrypting the target information.
Example 5 may include the method of one or more of examples 1-4, wherein prior to the cryptographic processing of the target information, the method further comprises:
acquiring key information provided by the data acquirer;
and generating an encryption key for the target information according to the key information.
Example 6 may include the method of one or more of examples 1-5, wherein prior to the providing the target information to the data acquirer via the particular communication data, the method further comprises:
acquiring the equipment identification provided by the data acquirer;
and confirming that the data acquirer is verified according to the equipment identifier.
Example 7 may include the method of one or more of examples 1 to 6, wherein each piece of data in the specific communication data is stored in a set location or carries a corresponding information identifier.
Example 8 may include the method of one or more of examples 1-7, wherein the information identifier includes at least one of an encryption identifier, a number of frames carrying the target information, a current frame sequence number, a length of the target information, and a location of the target information in the particular communication data.
Example 9 may include the method of one or more of examples 1-8, wherein the providing the target information to the data acquirer via the particular communication data includes:
and starting a hotspot mode, and providing the specific communication data serving as a service set identifier to the data acquirer.
Example 10 may include the method of one or more of examples 1-9, wherein, when the particular communication data includes a plurality of communication data, the enabling of the hotspot mode to provide the particular communication data as the service set identification to the data acquirer includes:
and starting a hotspot mode at a specific time interval, taking each specific communication data as a service set identifier, and respectively providing each service set identifier for the data acquisition party.
Example 11 includes a data communication method, comprising:
acquiring specific communication data of a data provider, wherein the specific communication data comprises a service set identifier of a wireless network;
extracting target information from the specific communication data, wherein the target information comprises at least one of a service set identifier of a target wireless network and a password of the target wireless network, or the target information comprises an operation instruction;
and connecting the target wireless network or executing the operation instruction according to the target information.
Example 12 may include the method of example 11, where each piece of data in the specific communication data is stored in a set location or carries a corresponding information identifier, and extracting the target information from the specific communication data includes:
and extracting the target information from the specific communication data according to the set position of the specific communication data or the corresponding information identifier.
Example 13 may include the method of example 11 and/or example 12, the target information comprising a plurality of pieces of sub information, the particular communication data comprising a length of at least one piece of sub information;
the extracting target information from the specific communication data includes:
extracting a length of the at least one sub information from the specific communication data;
and extracting sub information from the target information according to the length of the at least one piece of sub information.
Example 14 may include the method of one or more of examples 11-13, wherein the particular communication data includes a number of frames carrying the target information and a current frame sequence number;
the method further comprises the following steps:
extracting the frame number carrying the target information and the current frame sequence number from the specific communication data;
and determining to continuously acquire specific communication data from the data provider according to the number of the frames carrying the target information and the sequence number of the current frame.
Example 15 may include the method of one or more of examples 11-14, wherein the method comprises:
and splicing the target information acquired for multiple times.
Example 16 may include the method of one or more of examples 11-15, wherein after the extracting the target information from the particular communication data, the method further comprises:
and decrypting the target information.
Example 17 may include the method of one or more of examples 11-16, wherein the particular communication data includes an encrypted identification, and decrypting the target information includes:
acquiring the encryption identifier from the specific communication data;
and decrypting the target information according to the encrypted identifier.
Example 18 may include the method of one or more of examples 11-17, wherein the decrypting the target information includes:
generating a decryption key according to the key information corresponding to the communication;
and decrypting the target information by adopting the decryption key.
Example 19 may include the method of one or more of examples 11-18, wherein the method further comprises:
and providing the key information to the data provider so that the data provider can obtain an encryption key for encrypting the target information according to the key information.
Example 20 may include the method of one or more of examples 11-19, wherein, prior to the obtaining the particular communication data of the data provider, the method further comprises:
and providing the equipment identification of the data acquirer for the data provider to verify the data acquirer according to the equipment identification of the data acquirer.
Example 21 includes a data communication method, comprising:
adding the target information to specific communication data, wherein the specific communication data comprises a service set identification of the wireless network;
and providing the target information to a data acquirer through the specific communication data.
Example 22 includes a data communication apparatus comprising:
the target information adding module is used for adding target information into specific communication data, wherein the specific communication data comprise a service set identifier of a wireless network, and the target information comprises at least one of the service set identifier of the target wireless network and a password of the target wireless network, or the target information comprises an operation instruction;
and the target information providing module is used for providing the target information to a data acquirer through the specific communication data so that the data acquirer can be connected with the target wireless network or execute the operation instruction.
Example 23 may include the apparatus of example 22, the target information addition module comprising:
the key information extraction submodule is used for extracting key information from the target information according to the limited length of the specific communication data;
and the key information adding submodule is used for adding the key information into the specific communication data.
Example 24 may include the apparatus of example 22 and/or example 23, wherein the target information addition module includes:
the specific communication data number determining submodule is used for determining the number of the specific communication data according to the length of the target information and the limited length of the specific communication data;
and the target information adding submodule is used for splitting the target information and then respectively adding the split target information to the determined at least one piece of specific communication data.
Example 25 may include the apparatus of one or more of example 22-example 24, wherein the apparatus further comprises:
and the encryption module is used for encrypting the target information.
Example 26 may include the apparatus of one or more of example 22-example 25, wherein the apparatus further comprises:
the key information acquisition module is used for acquiring the key information provided by the data acquirer;
and the encryption key generation module is used for generating an encryption key for the target information according to the key information.
Example 27 may include the apparatus of one or more of examples 22-26, wherein the apparatus further comprises:
the device identifier acquisition module is used for acquiring the device identifier provided by the data acquirer;
and the verification module is used for confirming that the data acquirer is verified according to the equipment identifier.
Example 28 may include the apparatus of one or more of examples 22 to 27, wherein each of the specific communication data is stored in a set location or carries a corresponding information identifier.
Example 29 may include the apparatus of one or more of example 22-example 28, wherein the information identification includes at least one of an encryption identification, a number of frames carrying the target information, a current frame sequence number, a length of the target information, and a location of the target information in the particular communication data.
Example 30 may include the apparatus of one or more of example 22-example 29, wherein the target information providing module comprises:
and the hotspot opening sub-module is used for opening a hotspot mode and providing the specific communication data serving as a service set identifier to the data acquisition party.
Example 31 may include the apparatus of one or more of examples 22-30, wherein, when the particular communication data includes a plurality of ones, the hotspot opening sub-module is further to:
and starting a hotspot mode at a specific time interval, taking each specific communication data as a service set identifier, and respectively providing each service set identifier for the data acquisition party.
Example 32 includes a data communication apparatus comprising:
the specific communication data acquisition module is used for acquiring specific communication data of a data provider, wherein the specific communication data comprises a service set identifier of a wireless network;
a target information extraction module, configured to extract target information from the specific communication data, where the target information includes at least one of a service set identifier of a target wireless network and a password of the target wireless network, or the target information includes an operation instruction;
and the connection execution module is used for connecting the target wireless network or executing the operation instruction according to the target information.
Example 33 may include the apparatus of example 32, wherein each piece of data in the specific communication data is stored in a set location or carries a corresponding information identifier, and the target information extraction module includes:
and the target information extraction submodule is used for extracting the target information from the specific communication data according to the set position of the specific communication data or the corresponding information identifier.
Example 34 may include the apparatus of example 33 and/or example 32, the target information comprising a plurality of pieces of sub information, the particular communication data comprising a length of at least one piece of sub information;
the target information extraction module includes:
a length extraction sub-module for extracting a length of the at least one piece of sub information from the specific communication data;
and the sub-information extraction sub-module is used for extracting the sub-information from the target information according to the length of the at least one piece of sub-information.
Example 35 may include the apparatus of example 32-example 34, wherein the particular communication data includes a number of frames carrying the target information and a current frame sequence number;
the device further comprises:
a frame number and sequence number extracting module, configured to extract the frame number carrying the target information and the current frame sequence number from the specific communication data;
and the determining module is used for determining to continuously acquire the specific communication data from the data provider according to the number of the frames carrying the target information and the sequence number of the current frame.
Example 36 may include the apparatus of one or more of example 32-example 35, wherein the apparatus comprises:
and the target information splicing module is used for splicing the target information acquired for multiple times.
Example 37 may include the apparatus of one or more of example 32-example 36, wherein the apparatus further comprises:
and the decryption module is used for decrypting the target information.
Example 38 may include the apparatus of one or more of example 32-example 37, wherein the particular communication data includes an encrypted identification, and the decryption module includes:
an encrypted identifier obtaining sub-module, configured to obtain the encrypted identifier from the specific communication data;
and the first decryption submodule is used for decrypting the target information according to the encrypted identifier.
Example 39 may include the apparatus of one or more of example 32-example 38, wherein the decryption module comprises:
the decryption key generation submodule is used for generating a decryption key according to the key information corresponding to the communication;
and the second decryption submodule is used for decrypting the target information by adopting the decryption key.
Example 40 may include the apparatus of one or more of example 32-example 39, wherein the apparatus further comprises:
and the key information providing module is used for providing the key information to the data provider so that the data provider can obtain an encryption key for encrypting the target information according to the key information.
Example 41 may include the apparatus of one or more of examples 32-40, wherein the apparatus further comprises:
and the device identifier providing module is used for providing the device identifier of the data acquirer for the data provider to verify the data acquirer according to the device identifier of the data acquirer.
Example 42 may include a data communication apparatus comprising:
the target information adding module is used for adding target information into specific communication data, and the specific communication data comprises a service set identifier of a wireless network;
and the target information providing module is used for providing the target information to the data acquirer through the specific communication data.
Example 43, a computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements a method as in one or more of examples 1-21 when executing the computer program.
Example 44, a computer-readable storage medium, on which a computer program is stored, characterized in that the program, when executed by a processor, implements a method as in one or more of examples 1-21.
Although certain examples have been illustrated and described for purposes of description, a wide variety of alternate and/or equivalent implementations, or calculations, may be made to achieve the same objectives without departing from the scope of practice of the present application. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that the embodiments described herein be limited only by the claims and the equivalents thereof.

Claims (26)

1. A method of data communication, comprising:
adding target information to specific communication data, wherein the specific communication data comprises a service set identifier of a wireless network, and the target information comprises at least one of the service set identifier of the target wireless network and a password of the target wireless network, or the target information comprises an operation instruction;
and providing the target information to a data acquirer through the specific communication data so that the data acquirer can connect with the target wireless network or execute the operation instruction.
2. The method of claim 1, wherein adding target information to specific communication data comprises:
extracting key information from the target information according to the limited length of the specific communication data;
adding the key information to the specific communication data.
3. The method of claim 1, wherein adding target information to specific communication data comprises:
determining the number of the specific communication data according to the length of the target information and the limited length of the specific communication data;
and splitting the target information and then respectively adding the split target information to the determined at least one piece of specific communication data.
4. The method of claim 1, wherein prior to said adding target information to specific communication data, the method further comprises:
and encrypting the target information.
5. The method according to claim 4, wherein before said encrypting the target information, the method further comprises:
acquiring key information provided by the data acquirer;
and generating an encryption key for the target information according to the key information.
6. The method according to claim 1, wherein before said providing the target information to the data acquirer via the specific communication data, the method further comprises:
acquiring the equipment identification provided by the data acquirer;
and confirming that the data acquirer is verified according to the equipment identifier.
7. The method according to claim 1, wherein each data in the specific communication data is stored in a set location or carries a corresponding information identifier.
8. The method of claim 7, wherein the information identifier comprises at least one of an encryption identifier, a number of frames carrying the target information, a current frame sequence number, a length of the target information, and a position of the target information in the specific communication data.
9. The method according to claim 1, wherein the providing the target information to a data acquirer via the specific communication data comprises:
and starting a hotspot mode, and providing the specific communication data serving as a service set identifier to the data acquirer.
10. The method of claim 9, wherein when the specific communication data includes a plurality of communication data, the enabling of the hotspot mode, and the providing of the specific communication data as the service set identifier to the data acquirer includes:
and starting a hotspot mode at a specific time interval, taking each specific communication data as a service set identifier, and respectively providing each service set identifier for the data acquisition party.
11. A method of data communication, comprising:
acquiring specific communication data of a data provider, wherein the specific communication data comprises a service set identifier of a wireless network;
extracting target information from the specific communication data, wherein the target information comprises at least one of a service set identifier of a target wireless network and a password of the target wireless network, or the target information comprises an operation instruction;
and connecting the target wireless network or executing the operation instruction according to the target information.
12. The method according to claim 11, wherein each data in the specific communication data is stored in a set location or carries a corresponding information identifier, and the extracting target information from the specific communication data includes:
and extracting the target information from the specific communication data according to the set position of the specific communication data or the corresponding information identifier.
13. The method according to claim 11, wherein the target information includes a plurality of pieces of sub information, and the specific communication data includes a length of at least one piece of sub information;
the extracting target information from the specific communication data includes:
extracting a length of the at least one sub information from the specific communication data;
and extracting sub information from the target information according to the length of the at least one piece of sub information.
14. The method of claim 11, wherein the specific communication data comprises a frame number and a current frame sequence number carrying the target information;
the method further comprises the following steps:
extracting the frame number carrying the target information and the current frame sequence number from the specific communication data;
and determining to continuously acquire specific communication data from the data provider according to the number of the frames carrying the target information and the sequence number of the current frame.
15. The method of claim 14, wherein the method comprises:
and splicing the target information acquired for multiple times.
16. The method of claim 11, wherein after said extracting target information from said particular communication data, said method further comprises:
and decrypting the target information.
17. The method of claim 16, wherein the specific communication data includes an encrypted identifier, and wherein decrypting the target information comprises:
acquiring the encryption identifier from the specific communication data;
and decrypting the target information according to the encrypted identifier.
18. The method of claim 16, wherein decrypting the target information comprises:
generating a decryption key according to the key information corresponding to the communication;
and decrypting the target information by adopting the decryption key.
19. The method of claim 11, further comprising:
and providing the key information to the data provider so that the data provider can obtain an encryption key for encrypting the target information according to the key information.
20. The method of claim 11, wherein prior to said obtaining data provider specific communication data, the method further comprises:
and providing the equipment identification of the data acquirer for the data provider to verify the data acquirer according to the equipment identification of the data acquirer.
21. A method of data communication, comprising:
adding the target information to specific communication data, wherein the specific communication data comprises a service set identification of the wireless network;
and providing the target information to a data acquirer through the specific communication data.
22. A data communication apparatus, comprising:
the target information adding module is used for adding target information into specific communication data, wherein the specific communication data comprise a service set identifier of a wireless network, and the target information comprises at least one of the service set identifier of the target wireless network and a password of the target wireless network, or the target information comprises an operation instruction;
and the target information providing module is used for providing the target information to a data acquirer through the specific communication data so that the data acquirer can be connected with the target wireless network or execute the operation instruction.
23. A data communication apparatus, comprising:
the specific communication data acquisition module is used for acquiring specific communication data of a data provider, wherein the specific communication data comprises a service set identifier of a wireless network;
a target information extraction module, configured to extract target information from the specific communication data, where the target information includes at least one of a service set identifier of a target wireless network and a password of the target wireless network, or the target information includes an operation instruction;
and the connection execution module is used for connecting the target wireless network or executing the operation instruction according to the target information.
24. A data communication apparatus, comprising:
the target information adding module is used for adding target information into specific communication data, and the specific communication data comprises a service set identifier of a wireless network;
and the target information providing module is used for providing the target information to the data acquirer through the specific communication data.
25. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to one or more of claims 1-21 when executing the computer program.
26. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of one or more of claims 1-21.
CN201810663516.2A 2018-06-25 2018-06-25 Data communication method and device Pending CN110636588A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810663516.2A CN110636588A (en) 2018-06-25 2018-06-25 Data communication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810663516.2A CN110636588A (en) 2018-06-25 2018-06-25 Data communication method and device

Publications (1)

Publication Number Publication Date
CN110636588A true CN110636588A (en) 2019-12-31

Family

ID=68968647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810663516.2A Pending CN110636588A (en) 2018-06-25 2018-06-25 Data communication method and device

Country Status (1)

Country Link
CN (1) CN110636588A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120290689A1 (en) * 2011-05-15 2012-11-15 Adam Beguelin Network Interface Auto Configuration of Wireless Devices
CN104410970A (en) * 2014-12-23 2015-03-11 北京极科极客科技有限公司 Wireless intelligent accessing method
CN104703176A (en) * 2015-03-18 2015-06-10 北京联盛德微电子有限责任公司 Configuration method of wireless network, intelligent terminal and wireless network equipment
CN105072665A (en) * 2015-07-01 2015-11-18 北京奇虎科技有限公司 Networking control and access method and corresponding terminal and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120290689A1 (en) * 2011-05-15 2012-11-15 Adam Beguelin Network Interface Auto Configuration of Wireless Devices
CN104410970A (en) * 2014-12-23 2015-03-11 北京极科极客科技有限公司 Wireless intelligent accessing method
CN104703176A (en) * 2015-03-18 2015-06-10 北京联盛德微电子有限责任公司 Configuration method of wireless network, intelligent terminal and wireless network equipment
CN105072665A (en) * 2015-07-01 2015-11-18 北京奇虎科技有限公司 Networking control and access method and corresponding terminal and equipment

Similar Documents

Publication Publication Date Title
US10812969B2 (en) System and method for configuring a wireless device for wireless network access
US10818291B2 (en) Method and apparatus for interacting information
US10182255B2 (en) Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal
US10154014B2 (en) Method and system for efficient encryption, transmission, and decryption of video data
CN105099692B (en) Security verification method and device, server and terminal
CN107786331B (en) Data processing method, device, system and computer readable storage medium
KR102433939B1 (en) Methods for fast, secure and privacy-friendly internet connection discovery in wireless networks
CN109862560B (en) Bluetooth authentication method, device, equipment and medium
CN109309650B (en) Data processing method, terminal equipment and network equipment
CN104427501A (en) Network access method, device and system
MX2011013938A (en) Systems, methods, and apparatuses for ciphering error detection and recovery.
CN114553590B (en) Data transmission method and related equipment
CN105208028A (en) Data transmission method and related device and equipment
CN105848145A (en) WIFI intelligent configuration method and device
US20160352420A1 (en) Information transmission method, information reception method and apparatus
CN111726801A (en) Network security control method
US9100715B2 (en) Apparatus and method for controlling output of protected content on a television
US20220231852A1 (en) Neighbor awareness networking password authentication
US8443195B2 (en) Method and apparatus for performing security communication
CN109451504B (en) Internet of things module authentication method and system
WO2024109874A1 (en) Networking method, apparatus and device for set-top box, and readable storage medium
EP3041185A1 (en) A method for authenticating a user equipment in order to established a secured communication session with a server
CN110636588A (en) Data communication method and device
CN106385684B (en) Method and device for sharing wireless network and method and device for accessing wireless network
CN117501653A (en) Apparatus, system and method for operating a wireless network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40020070

Country of ref document: HK

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191231