[go: up one dir, main page]

CN115941308B - Multi-device self-organizing network method, device, equipment and storage medium - Google Patents

Multi-device self-organizing network method, device, equipment and storage medium

Info

Publication number
CN115941308B
CN115941308B CN202211520096.5A CN202211520096A CN115941308B CN 115941308 B CN115941308 B CN 115941308B CN 202211520096 A CN202211520096 A CN 202211520096A CN 115941308 B CN115941308 B CN 115941308B
Authority
CN
China
Prior art keywords
equipment
information
networked
devices
hoc network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211520096.5A
Other languages
Chinese (zh)
Other versions
CN115941308A (en
Inventor
杨奕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kaihong Digital Industry Development Co Ltd
Original Assignee
Shenzhen Kaihong Digital Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kaihong Digital Industry Development Co Ltd filed Critical Shenzhen Kaihong Digital Industry Development Co Ltd
Priority to CN202211520096.5A priority Critical patent/CN115941308B/en
Publication of CN115941308A publication Critical patent/CN115941308A/en
Application granted granted Critical
Publication of CN115941308B publication Critical patent/CN115941308B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种多设备自组网方法、装置、设备及存储介质,该方法包括:第一设备分别与多个第二设备进行认证,认证成功后所述第一设备与每个所述第二设备建立数据通路;基于所述数据通路所述第一设备获得各个所述第二设备的设备信息;每个所述第二设备从所述第一设备获得其他所述第二设备的所述设备信息,以完成各个所述第二设备之间互信,所述第一设备以及各个所述第二设备进行自组网,实现了提高多设备自组网的效率。

The present application discloses a method, apparatus, device and storage medium for self-organizing networking of multiple devices. The method includes: a first device authenticates with multiple second devices respectively, and after successful authentication, the first device establishes a data path with each second device; based on the data path, the first device obtains the device information of each second device; each second device obtains the device information of other second devices from the first device to achieve mutual trust between each second device, and the first device and each second device conduct self-organizing networking, thereby improving the efficiency of the self-organizing networking of multiple devices.

Description

Multi-device ad hoc network method, device, equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a storage medium for multi-device ad hoc networking.
Background
An ad hoc network is a network combining mobile communication and a computer network, wherein the information exchange of the network adopts a packet switching mechanism in the computer network, and each device in the ad hoc network has two functions of a router and a host. The device needs to run various application programs facing users, such as editors, browsers and the like, as a host, and the device needs to run corresponding routing protocols as a router, and completes the forwarding and routing maintenance work of the data packets according to the routing strategy and the routing table. At present, two-by-two authentication is needed between the devices of the ad hoc network, the authentication process is repeated and complicated, resources such as a network and the like are inevitably occupied more and time is consumed, and the efficiency of the ad hoc network is lower.
Therefore, how to improve the efficiency of multi-device ad hoc network is a problem to be solved.
Disclosure of Invention
The embodiment of the application provides a multi-device ad hoc network method, a device, equipment and a storage medium, which can improve the efficiency of multi-device ad hoc network.
In a first aspect, an embodiment of the present application provides a multi-device ad hoc network method, where the multi-device ad hoc network method includes:
The method comprises the steps that a first device authenticates with a plurality of second devices respectively, and after authentication is successful, the first device establishes a data path with each second device;
acquiring device information of each second device based on the first device of the data path;
And each second device obtains the device information of other second devices from the first device so as to complete mutual trust among the second devices, and the first device and the second devices conduct ad hoc network.
In a second aspect, an embodiment of the present application further provides a multi-device ad hoc network apparatus, where the multi-device ad hoc network apparatus includes a processor and a memory, where the memory stores a computer program, and the processor executes the multi-device ad hoc network method when calling the computer program in the memory.
In a third aspect, an embodiment of the present application further provides an apparatus, where the apparatus includes a multi-device ad hoc network device as described above.
In a fourth aspect, an embodiment of the present application further provides a storage medium, where the storage medium is used to store a computer program, where the computer program when executed by a processor causes the processor to implement the multi-device ad hoc network method described above.
The embodiment of the application provides a multi-device ad hoc network method, a device, equipment and a storage medium, wherein a first device respectively authenticates with a plurality of second devices, a data path is established between the first device and each second device after the authentication is successful, the first device obtains the equipment information of each second device based on the data path, and then each second device obtains the equipment information of other second devices from the first device so as to complete mutual trust among the second devices, and the first device and each second device perform ad hoc network, so that the times of authentication among the devices are reduced, and the efficiency of the multi-device ad hoc network is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an interaction process of a current multi-device ad hoc network;
fig. 2 is a schematic flowchart of steps of a multi-device ad hoc network method according to an embodiment of the present application;
fig. 3 is a schematic diagram of an interaction process of a multi-device ad hoc network according to an embodiment of the present application;
Fig. 4 is a schematic diagram of an interaction process of another multi-device ad hoc network according to an embodiment of the present application;
Fig. 5 is a schematic flowchart of steps of another multi-device ad hoc network method according to an embodiment of the present application;
Fig. 6 is a schematic block diagram of a multi-device ad hoc network device according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that the description of "first", "second", etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," and the like in various places are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present application.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
An ad hoc network is a network combining mobile communication and a computer network, wherein the information exchange of the network adopts a packet switching mechanism in the computer network, and each device in the ad hoc network has two functions of a router and a host. The device needs to run various application programs facing users, such as editors, browsers and the like, as a host, and the device needs to run corresponding routing protocols as a router, and completes the forwarding and routing maintenance work of the data packets according to the routing strategy and the routing table. At present, two-by-two authentication is needed between devices of an ad hoc network, for example, as shown in fig. 1, when a device a, a device B and a device C perform ad hoc network, the authentication is needed between the device a and the device B, between the device a and the device C, and between the device B and the device C, the authentication process is repeated and complicated, which inevitably occupies more resources such as a network and is time-consuming, and the efficiency of the ad hoc network is low.
In order to solve the problems, the embodiment of the application provides a multi-device ad hoc network method, a device, equipment and a storage medium, wherein the method comprises the steps that a first device respectively authenticates with a plurality of second devices, a data path is established between the first device and each second device after authentication is successful, equipment information of each second device is obtained based on the data path, each second device obtains equipment information of other second devices from the first device, mutual communication among the second devices is completed, and the first device and each second device conduct ad hoc network, so that the multi-device ad hoc network efficiency is improved.
Referring to fig. 2, fig. 2 is a flow chart of a multi-device ad hoc network method provided in an embodiment of the present application, where the method may be applied to a device, and the device may be any one of a mobile phone, a camera, a tablet computer, a wearable device, a vehicle-mounted device, an augmented reality (augmentedreality, AR)/a virtual reality (virtualreality, VR) device, a notebook computer, a Personal Computer (PC), a netbook, a Personal Digital Assistant (PDA), and the embodiment of the present application is not limited in any way.
As shown in fig. 2, the multi-device ad hoc network method provided in the embodiment of the present application includes steps S101 to S103.
S101, the first equipment respectively authenticates with a plurality of second equipment, and after authentication is successful, the first equipment establishes a data path with each second equipment.
The first device and the second device are communication devices to be networked, such as a mobile phone, a camera, a tablet computer, a helmet, and the like.
In some embodiments, the first device performs authentication with a plurality of second devices, and before the first device establishes a data path with each of the second devices after the authentication is successful, the method includes:
One communication device is selected from a plurality of communication devices to be determined as the first device, and the other communication devices are determined as the second device.
By way of example, a certain communication device may be selected from the individual communication devices by arbitration, and determined as a first device, and the remaining other communication devices determined as second devices.
In another embodiment, the first device may be determined according to the first device setting information input by the user through the interactive operation of the user, and the other communication devices are determined as the second devices. For example, a first device setting interface is displayed, the user inputs first device setting information through the first device setting interface, and the first device is determined according to the first device setting information input by the user. For another example, a first device setup voice request is output, the user inputs first device setup voice reply information according to the first device setup voice request, and the first device is determined according to the first device setup voice reply information.
The first device authenticates with each second device separately. The first device sends a negotiation command to each second device, and the second device returns a negotiation response command to the first device after receiving the negotiation command. After receiving the negotiation response command, the first device sends a request authentication command to the second device, after receiving the request authentication command, the second device returns the request authentication response command to the first device, after receiving the request authentication response command, the first device inputs pin (PersonalIdentificationNumber) codes and performs pin code authentication, after passing the authentication, the second device sends an end authentication command to the second device, and after receiving the end authentication command, the second device ends the authentication state. After the first device completes authentication with each second device, the first device establishes a data path with each second device.
S102, acquiring device information of each second device based on the first device of the data path.
After the first device establishes a data path with each second device, the first device obtains device information of the corresponding second device based on each data path. Wherein the device information includes, but is not limited to, a device type, a device version, a device ID, authentication information, and the like, and the authentication information includes, but is not limited to, key information.
S103, each second device obtains the device information of other second devices from the first device so as to complete mutual trust among the second devices, and the first device and the second devices conduct self-networking.
Since the first device obtains the device information of each second device, each second device can obtain the device information of the other respective second devices based on the data path with the first device. And each second device completes mutual trust among the second devices based on the device information according to the obtained device information of other second devices, and the first device and each second device perform ad hoc network.
For example, as shown in fig. 3, when the device a, the device B, and the device C perform ad hoc networking, the device a is used as a first device, the device B and the device C are used as a second device, the device a and the device B perform authentication, the device a and the device C perform authentication, the device a obtains device information of the device B and the device C, then the device B obtains device information of the device C from the device a, the device C obtains device information of the device B from the device a, that is, the device B and the device C obtain device information of each other, mutual trust between the device B and the device C is completed based on the device information, and the device a, the device B, and the device C perform ad hoc networking.
In some embodiments, each of the second devices obtains the device information of the other second devices from the first device to complete mutual trust between the respective second devices, including:
The method comprises the steps that first equipment to be networked obtains equipment information of second equipment to be networked from the first equipment, and the second equipment to be networked is added to a trust list of the first equipment to be networked; the second device to be networked obtains device information of the first device to be networked from the first device, and adds the first device to be networked to a trust list of the second device to be networked;
The first equipment to be networked and the second equipment to be networked are any two pieces of equipment in the second equipment.
For example, taking the device a, the device B and the device C shown in fig. 3 as an example, the device B obtains the device information of the device C from the device a and adds the device C to the trust list of the device B, the device C obtains the device information of the device B from the device a and adds the device B to the trust list of the device C, and at this time, mutual trust is completed between the device B and the device C, so that the ad hoc network of the device a, the device B and the device C can be completed, and authentication operations between the device B and the device C are reduced.
As another example, as shown in fig. 4, when the device a, the device B, the device C, and the device D perform ad hoc network, the device a is used as a first device, the device B, the device C, and the device D are used as a second device, the device a authenticates the device B, the device a authenticates the device C, and the device a authenticates the device D, the device a obtains device information of the device B, the device C, and the device D, and then the device B obtains device information of the device C, and the device D from the device a, the device C obtains device information of the device B, and the device D from the device a, and the device D performs ad hoc network based on the device information to complete the mutual trust of the device B and the device C, the mutual trust of the device B and the device D, and the mutual trust of the device C and the device D. The authentication between the equipment B and the equipment C is reduced, and the authentication between the equipment B and the equipment D, the authentication between the equipment C and the equipment D and the like are performed for a plurality of times.
In some embodiments, the first device to be networked obtains the device information of a second device to be networked from the first device, and adding the second device to be networked to a trust list of the first device to be networked includes:
The first equipment to be networked obtains equipment information of the second equipment to be networked from the first equipment, and verification information is obtained according to the equipment information of the second equipment to be networked;
The first equipment to be networked sends the verification information to the second equipment to be networked, the second equipment to be networked verifies the verification information, and if verification is correct, correct information is returned;
and the first equipment to be networked adds the second equipment to be networked to a trust list of the first equipment to be networked based on the correct information.
For example, taking the device a, the device B, and the device C shown in fig. 3 as an example, the device B obtains the device information of the device C from the device a, then obtains the verification information, such as the key, according to the device information of the device C through analysis processing, the device B sends the verification information to the device C, the device C verifies the received verification information, if the verification is correct, the device C returns correct information to the device B, and the device B adds the device C to the trust list of the device B after receiving the correct information returned by the device C. For example, after obtaining the key, the device B sends the key to the device C, the device C compares the received key with the local key to determine whether the key is consistent, if so, that is, the key is correct, the device C returns correct information to the device B, and after receiving the correct information returned by the device C, the device B adds the device C to the trust list of the device B.
In some embodiments, as shown in fig. 5, step S104 may be further included after step S102.
S104, the first equipment completes mutual trust among the second equipment according to the equipment information of the second equipment, and the first equipment and the second equipment conduct self-networking.
For example, still taking the ad hoc network of the device a, the device B and the device C as the first device, the device B and the device C as the second device, authenticating the device a and the device B, authenticating the device a and the device C, obtaining the device information of the device B and the device C by the device a, and then completing the mutual trust of the device B and the device C by the device a according to the device information of the device B and the device C, and performing the ad hoc network by the device a, the device B and the device C.
In some embodiments, the first device completes mutual trust between the second devices according to the device information of the second devices, including:
The first device obtains corresponding verification information according to the device information of each second device, sends the verification information to the corresponding second device, and the second device verifies the verification information, and returns correct information if the verification is correct;
And the first equipment completes mutual trust among the second equipment based on the correct information returned by the second equipment.
For example, still take the ad hoc network of the device a, the device B and the device C as the first device, the device B and the device C as the second device, the device a authenticates the device B, the device a authenticates the device a and the device C, the device a obtains the device information of the device B and the device C, then the device a analyzes and processes the device information according to the device information of the device B to obtain corresponding verification information, such as a key, sends the verification information to the device B, the device B verifies and validates the received verification information, if the verification and validation is correct, the device B returns correct information to the device a, and the device a records that the device B and the device C are mutually trusted after receiving the correct information returned by the device B. For example, the device a sends the key to the device B, the device B compares the received key with the local, and confirms whether the key is consistent, if so, that is, the device B returns correct information to the device a, the device a records that the device B and the device C are mutually trusted after receiving the correct information returned by the device B, and the device a, the device B and the device C perform ad hoc network, so that authentication operations between the device B and the device C are reduced.
Compared with the mode of carrying out authentication ad hoc network in pairs between multiple devices, the authentication times between the multiple devices are reduced, so that the resource consumption and the consumed time are reduced, and meanwhile, the reduction of the authentication times reduces the manual operation complexity of pin code verification and reduces the error probability.
In the above embodiment, the first device performs authentication with the plurality of second devices, after the authentication is successful, the first device establishes a data path with each second device, obtains device information of each second device based on the data path first device, and then each second device obtains device information of other second devices from the first device, so as to complete mutual trust between the second devices, and the first device and each second device perform ad hoc network, thereby reducing the times of authentication between the devices, and improving the efficiency of multi-device ad hoc network.
Referring to fig. 6, fig. 6 is a schematic block diagram of a multi-device ad hoc network device according to an embodiment of the present application.
As shown in fig. 6, the multi-device ad hoc network apparatus 200 may include a processor 211 and a memory 212, where the processor 211 and the memory 212 are connected through a bus, such as an I2C (Inter-INTEGRATED CIRCUIT) bus.
Specifically, the processor 211 may be a Micro-control unit (Micro-controllerUnit, MCU), a central processing unit (CentralProcessingUnit, CPU), or a digital signal processor (DIGITALSIGNAL PROCESSOR, DSP), etc.
Specifically, the Memory 212 may be a Flash chip, a Read-Only Memory (ROM) disk, an optical disk, a U-disk, a removable hard disk, or the like. The memory 212 stores therein various computer programs for execution by the processor 211.
Wherein the processor 211 is configured to run a computer program stored in the memory processor 211 and to implement the following steps when the computer program is executed:
The method comprises the steps that a first device authenticates with a plurality of second devices respectively, and after authentication is successful, the first device establishes a data path with each second device;
acquiring device information of each second device based on the first device of the data path;
And each second device obtains the device information of other second devices from the first device so as to complete mutual trust among the second devices, and the first device and the second devices conduct ad hoc network.
In some embodiments, when implementing that each of the second devices obtains the device information of the other second devices from the first device to complete the mutual trust between the respective second devices, the processor 211 is configured to implement:
The method comprises the steps that first equipment to be networked obtains equipment information of second equipment to be networked from the first equipment, and the second equipment to be networked is added to a trust list of the first equipment to be networked; the second device to be networked obtains device information of the first device to be networked from the first device, and adds the first device to be networked to a trust list of the second device to be networked;
The first equipment to be networked and the second equipment to be networked are any two pieces of equipment in the second equipment.
In some embodiments, when implementing that the first device to be networked obtains the device information of a second device to be networked from the first device, the processor 211 is configured to, when adding the second device to be networked to a trust list of the first device to be networked:
The first equipment to be networked obtains equipment information of the second equipment to be networked from the first equipment, and verification information is obtained according to the equipment information of the second equipment to be networked;
The first equipment to be networked sends the verification information to the second equipment to be networked, the second equipment to be networked verifies the verification information, and if verification is correct, correct information is returned;
and the first equipment to be networked adds the second equipment to be networked to a trust list of the first equipment to be networked based on the correct information.
In some embodiments, the device information includes a device ID, the authentication information including a key.
In some embodiments, the processor 211 is configured to, after implementing the obtaining, by the first device based on the data path, device information of each of the second devices, implement:
and the first equipment completes mutual trust among the second equipment according to the equipment information of the second equipment, and the first equipment and the second equipment perform ad hoc network.
In some embodiments, when implementing that the first device completes mutual trust between the second devices according to the device information of the second devices, the processor 211 is configured to implement:
The first device obtains corresponding verification information according to the device information of each second device, sends the verification information to the corresponding second device, and the second device verifies the verification information, and returns correct information if the verification is correct;
And the first equipment completes mutual trust among the second equipment based on the correct information returned by the second equipment.
In some embodiments, the processor 211 is configured to, before implementing authentication between the first device and the plurality of second devices, respectively, and after the authentication is successful, establish a data path with each of the second devices, implement:
One communication device is selected from a plurality of communication devices to be determined as the first device, and the other communication devices are determined as the second device.
There is also provided in embodiments of the present application a device of the type including, but not limited to, a cell phone, a camera, a tablet, a wearable device, a vehicle-mounted device, an augmented reality (augmentedreality, AR)/virtual reality (virtualreality, VR) device, a notebook, a Personal Computer (PC), a netbook, a Personal Digital Assistant (PDA), etc., without any limitation in embodiments of the present application.
The device includes a multi-device ad hoc network apparatus, which may be the multi-device ad hoc network apparatus 200 described in the above embodiment, for example. The device may execute any multi-device ad hoc network method provided by the embodiment of the present application, so that the beneficial effects that any multi-device ad hoc network method provided by the embodiment of the present application can be achieved are detailed in the previous embodiments, and are not described herein.
The embodiment of the application also provides a storage medium, wherein the storage medium stores a computer program, the computer program comprises program instructions, and the processor executes the program instructions to realize the steps of the multi-device ad hoc network method provided by the embodiment. For example, the computer program is loaded by a processor, the following steps may be performed:
The method comprises the steps that a first device authenticates with a plurality of second devices respectively, and after authentication is successful, the first device establishes a data path with each second device;
acquiring device information of each second device based on the first device of the data path;
And each second device obtains the device information of other second devices from the first device so as to complete mutual trust among the second devices, and the first device and the second devices conduct ad hoc network.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
The storage medium may be an internal storage unit of the multi-device ad hoc network apparatus or device of the foregoing embodiment, for example, a hard disk or a memory of the multi-device ad hoc network apparatus or device. The storage medium may also be an external storage device of the multi-device ad hoc network apparatus or device, such as a plug-in hard disk, a smart memory card (SMARTMEDIACARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASHCARD) or the like.
Because the computer program stored in the storage medium can execute any multi-device ad hoc network method provided by the embodiment of the present application, the beneficial effects that any multi-device ad hoc network method provided by the embodiment of the present application can be achieved, and detailed descriptions of the foregoing embodiments are omitted.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the application, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (8)

1. A multi-device ad hoc network method is characterized in that, the multi-device ad hoc network method comprises the following steps:
The method comprises the steps that a first device authenticates with a plurality of second devices respectively, and after authentication is successful, the first device establishes a data path with each second device;
acquiring device information of each second device based on the first device of the data path;
each second device obtains the device information of other second devices from the first device so as to complete mutual trust among the second devices, and the first device and the second devices perform ad hoc network;
Each second device obtains the device information of other second devices from the first device to complete mutual trust between the second devices, including:
The method comprises the steps that first equipment to be networked obtains equipment information of second equipment to be networked from the first equipment, and the second equipment to be networked is added to a trust list of the first equipment to be networked; the second device to be networked obtains device information of the first device to be networked from the first device, and adds the first device to be networked to a trust list of the second device to be networked;
The first equipment to be networked and the second equipment to be networked are any two pieces of equipment in the second equipment;
The first device to be networked obtains the device information of a second device to be networked from the first device, and adds the second device to be networked to a trust list of the first device to be networked, including:
The first equipment to be networked obtains equipment information of the second equipment to be networked from the first equipment, and verification information is obtained according to the equipment information of the second equipment to be networked;
The first equipment to be networked sends the verification information to the second equipment to be networked, the second equipment to be networked verifies the verification information, and if verification is correct, correct information is returned;
and the first equipment to be networked adds the second equipment to be networked to a trust list of the first equipment to be networked based on the correct information.
2. The method of claim 1, wherein the device information comprises a device ID, the authentication information, and the authentication information comprises a key.
3. The method of claim 1, wherein after the first device obtains device information of each of the second devices based on the data path, comprising:
and the first equipment completes mutual trust among the second equipment according to the equipment information of the second equipment, and the first equipment and the second equipment perform ad hoc network.
4. A method according to claim 3, wherein the first device performs mutual trust between the second devices according to the device information of the second devices, and the method comprises:
The first device obtains corresponding verification information according to the device information of each second device, sends the verification information to the corresponding second device, and the second device verifies the verification information, and returns correct information if the verification is correct;
And the first equipment completes mutual trust among the second equipment based on the correct information returned by the second equipment.
5. The method according to any one of claims 1 to 4, wherein the first device performs authentication with a plurality of second devices, respectively, and before the first device establishes a data path with each of the second devices after the authentication is successful, the method comprises:
One communication device is selected from a plurality of communication devices to be determined as the first device, and the other communication devices are determined as the second device.
6. A multi-device ad hoc network device, characterized in that the multi-device ad hoc network device comprises a processor, a memory, the memory storing a computer program executable by the processor, the computer program, when executed by the processor, implementing the multi-device ad hoc network method according to any one of claims 1 to 5.
7. An apparatus comprising the multi-device ad hoc network device of claim 6.
8. A storage medium for computer readable storage, wherein the storage medium stores one or more programs executable by one or more processors to implement the steps of the multi-device ad hoc networking method of any one of claims 1 to 5.
CN202211520096.5A 2022-11-30 2022-11-30 Multi-device self-organizing network method, device, equipment and storage medium Active CN115941308B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211520096.5A CN115941308B (en) 2022-11-30 2022-11-30 Multi-device self-organizing network method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211520096.5A CN115941308B (en) 2022-11-30 2022-11-30 Multi-device self-organizing network method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115941308A CN115941308A (en) 2023-04-07
CN115941308B true CN115941308B (en) 2025-09-05

Family

ID=86555236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211520096.5A Active CN115941308B (en) 2022-11-30 2022-11-30 Multi-device self-organizing network method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115941308B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1691603A (en) * 2004-04-28 2005-11-02 联想(北京)有限公司 A method for implementing equipment group and intercommunication between grouped equipments

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8595484B2 (en) * 2008-07-29 2013-11-26 Motorola Solutions, Inc. Method and device for distributing public key infrastructure (PKI) certificate path data
US8787358B2 (en) * 2011-06-28 2014-07-22 Cisco Technology, Inc. System for ad-hoc communication sessions
FR3004046B1 (en) * 2013-03-28 2015-04-17 Commissariat Energie Atomique METHOD AND DEVICE FOR FORMING A SECURE RESOURCE SECURE WIRELESS NETWORK
CN108834111B (en) * 2018-06-13 2024-04-05 深圳市广通远驰科技有限公司 Dual-mode wireless communication terminal with ad hoc network
CN108834121B (en) * 2018-07-02 2021-04-02 中国联合网络通信集团有限公司 A kind of bluetooth device ad hoc network method and system
CN109168164A (en) * 2018-10-26 2019-01-08 电子科技大学 A kind of safety certifying method of the wireless self-networking applied to finite region
CN110381504A (en) * 2019-06-25 2019-10-25 福州数据技术研究院有限公司 A kind of wireless self-networking encryption communication method and its terminal
CN113904891B (en) * 2021-09-30 2023-03-10 珠海格力电器股份有限公司 Method, device and equipment for sharing distribution network information in ad hoc network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1691603A (en) * 2004-04-28 2005-11-02 联想(北京)有限公司 A method for implementing equipment group and intercommunication between grouped equipments

Also Published As

Publication number Publication date
CN115941308A (en) 2023-04-07

Similar Documents

Publication Publication Date Title
US11824992B2 (en) Secure token refresh
CN111490878B (en) Key generation method, device, equipment and medium
US20200177388A1 (en) Cross-blockchain resource transmission
KR101270323B1 (en) Methods, apparatuses, and computer program products for providing a single service sign-on
CN113794694B (en) Binary consensus method and device based on reliable broadcast
EP2537115B1 (en) Method and apparatus to reset platform configuration register in mobile trusted module
WO2021164125A1 (en) Session creation method and related device
US11849028B2 (en) Method and system for secure IoT device onboarding using a blockchain network
CN115065703B (en) Internet of things system, authentication and communication method thereof and related equipment
CN112822678B (en) A method for service-based architecture authorization
CN115941308B (en) Multi-device self-organizing network method, device, equipment and storage medium
CN118316631B (en) Identity authentication realization method and system
CN112887155B (en) QoS (quality of service) associated information synchronization method and related product
WO2025082087A1 (en) Communication method and system, network side device, and internet of things terminal
WO2016165674A1 (en) Trusted environment operating method and device for terminal
CN116389323A (en) Throughput test method, device and storage medium
CN117992942A (en) Virtual image-based authentication method, device and electronic device
CN109041265A (en) A kind of core network access method and base station
CN114979148A (en) Data transmission method, device and computer readable storage medium
CN105282818A (en) A wireless speaker network access method and user terminal
CN111130812A (en) Communication rate determining method and device
CN118709173B (en) Block chain intelligent account management method, device, computer equipment and storage medium
CN114520977B (en) Router authentication method, router authentication device and storage medium
CN108897898A (en) A kind of method, system and the server of the access of static website hosted data
CN116684195A (en) Unified access method, device, equipment and storage medium based on network twinning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant