WO-2026090781-A1 - TOKEN TRANSMISSION METHOD, DEVICE, AND STORAGE MEDIUM
Abstract
Embodiments of the present invention relate to the technical field of communications, and provide a token transmission method, a device, and a storage medium. The method comprises: a first device sends a changed first token, the first token being used for identity authentication in communication between the first device and a second device. The embodiments of the present invention can provide a method for transmitting a changed token.
Inventors
- TAN, Kangxi
Assignees
- 北京小米移动软件有限公司
Dates
- Publication Date
- 20260507
- Application Date
- 20241028
Claims (15)
- A token transmission method, characterized in that the method includes: The first device sends a modified first token, which is used for authentication when the first device and the second device communicate.
- According to the method of claim 1, the first device sending the first token includes one or more of the following: The first device sends the first token to the third device so that the second device can obtain the first token from the third device; The first device sends the first token to the second device through the communication connection established with the second device; The first device sends a broadcast message, the broadcast message including the first token.
- The method according to claim 1 or 2, characterized in that the method further comprises: A first feature value is generated based on the first verification information and the preset keywords; The first token is generated based on the first feature value and the first verification information; The preset keyword is negotiated in advance by the first device and the second device, and the first feature value and the first verification information are used to verify the first token.
- According to the method of claim 3, the first verification information includes one or more of the following: First value; A first identifier, wherein the first identifier is used to identify a first algorithm for generating the first feature value; The first value includes one or more of the following: First random number; Timestamp; The value of the counter.
- The method according to claim 4, wherein the first algorithm is obtained by the first device from the fourth device.
- A token transmission method, characterized in that the method includes: The second device obtains the first token after the first device has changed it. The first token is used for authentication when the first device and the second device communicate.
- According to the method of claim 6, the first device acquires the first token by one or more of the following: The second device obtains the first token from the third device, and the first token is obtained by the third device from the first device; The second device obtains the first token from the first device through a communication connection established with the first device; The second device receives a broadcast message sent by the first device, the broadcast message including the first token.
- The method according to claim 6 or 7, characterized in that the method further comprises: Verify the first token; If the first token passes verification, authentication is performed before the first device is used based on the first token.
- The method according to claim 8, wherein the verification of the first token includes: First verification information and first feature value are determined based on the first token. The first feature value is generated by the first device based on the first verification information and a preset keyword. The preset keyword is negotiated in advance by the first device and the second device. A second feature value is generated based on the first verification information and the preset keyword; If the first feature value and the second feature value are the same, the first token is determined to have passed the verification; if the first feature value and the second feature value are not the same, the first token is determined to have failed the verification.
- According to the method of claim 9, the first verification information includes one or more of the following: First value; A first identifier, wherein the first identifier is used to identify a first algorithm for generating the first feature value; The first value includes one or more of the following: First random number; Timestamp; The value of the counter.
- The method according to claim 10, wherein the second feature value is generated according to the first algorithm; the first algorithm is obtained by the second device from the first device, or by the second device from the fourth device.
- A communication device, characterized in that the communication device is used to execute the token transmission method provided in the first and/or second aspects of the embodiments of this disclosure.
- A communication system, characterized in that it includes a first device and a second device; The first device is configured to implement the token transmission method according to any one of claims 1 to 5, and the second device is configured to implement the token transmission method according to any one of claims 6 to 11.
- A storage medium storing instructions, characterized in that, when the instructions are executed on a communication device, the communication device performs a token transmission method as described in any one of claims 1 to 5, or performs a token transmission method as described in any one of claims 6 to 11.
- A program product comprising at least one of a program and instructions, characterized in that, when the program or instructions are executed by a communication device, they implement the token transmission method of any one of claims 1 to 5, or implement the token transmission method of any one of claims 6 to 11.
Description
Token transmission methods, devices, and storage media Technical Field This disclosure relates to the field of communication technology, and in particular to a token transmission method, device, and storage medium. Background Technology In the field of mobile communications, especially in the Bluetooth field, the broadcaster needs to change the token every time it broadcasts, and the changed token needs to be sent to the receiver before communication begins. Summary of the Invention This disclosure provides a token transmission method, device, and storage medium. In a first aspect, embodiments of this disclosure provide a token transmission method, the method comprising: The first device sends a modified first token, which is used for authentication when the first device and the second device communicate. Secondly, embodiments of this disclosure provide a token transmission method, the method comprising: The second device obtains the first token after the first device has changed it. The first token is used for authentication when the first device and the second device communicate. Thirdly, embodiments of this disclosure provide a communication device for executing the token transmission method provided in the first and/or second aspects of embodiments of this disclosure. Fourthly, embodiments of this disclosure provide a communication system, including a first device and a second device; The first device is configured to implement the token transmission method provided in the first aspect of the present disclosure, and the second device is configured to implement the token transmission method provided in the second aspect of the present disclosure. Fifthly, embodiments of this disclosure provide a storage medium storing instructions that, when executed on a communication device, cause the communication device to perform the token transmission method provided in the first and/or second aspects of embodiments of this disclosure. In a sixth aspect, embodiments of this disclosure provide a program product, including at least one of a program and instructions, characterized in that, when the at least one of the program and instructions is executed by a communication device, it implements the token transmission method provided in the first aspect of embodiments of this disclosure, or implements the token transmission method provided in the second aspect of embodiments of this disclosure. In a seventh aspect, embodiments of this disclosure provide a computer program product, which includes a computer program that, when executed by a processor, implements the method described in the first aspect or the method provided in the second aspect. Eighthly, embodiments of this disclosure provide a chip or chip system. The chip or chip system includes processing circuitry configured to perform the method provided according to the first or second aspect described above. It is understood that the aforementioned communication devices, communication systems, storage media, program products, computer programs, chips, or chip systems are all used to perform the methods provided in the embodiments of this disclosure. Based on the token transmission method, device, and storage medium provided in the embodiments of this disclosure, a method for transmitting modified tokens between devices can be provided, which is beneficial to communication stability and accuracy. Additional aspects and advantages of embodiments of this disclosure will be set forth in part in the description which follows, and will become apparent from the description or may be learned by practice of this disclosure. Attached Figure Description To more clearly illustrate the technical solutions in the embodiments of this disclosure, the accompanying drawings required for the description of the embodiments are introduced below. The following drawings are only some embodiments of this disclosure and do not impose specific limitations on the protection scope of this disclosure. Figure 1 is a schematic diagram of the architecture of a communication system according to an embodiment of the present disclosure; Figure 2a is one of the interactive schematic diagrams of a token transmission method according to an embodiment of the present disclosure; Figure 2b is a second interactive schematic diagram of a token transmission method according to an embodiment of the present disclosure; Figure 2c is a third interactive schematic diagram of a token transmission method according to an embodiment of the present disclosure; Figure 3 is a schematic flowchart of a token transmission method according to an embodiment of the present disclosure; Figure 4 is a second schematic flowchart illustrating a token transmission method according to an embodiment of the present disclosure; Figure 5 is a schematic diagram of the structure of a communication device according to an embodiment of the present disclosure; Figure 6 is a second schematic diagram of the structure of a communication devi