Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of authentication method of wearable device

A technology for wearable devices and authentication methods, applied in wireless communication, electrical components, security devices, etc., can solve the problems of increased chip design costs and difficulties in equipment integration, and achieve the effect of avoiding design difficulties.

Active Publication Date: 2018-10-30
RUN TECH CO LTD BEIJING
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Solved the problem of device integration difficulties and increased chip design costs caused by the addition of security modules to original wearable devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of authentication method of wearable device
  • A kind of authentication method of wearable device
  • A kind of authentication method of wearable device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] figure 1 A flowchart of the authentication method of the wearable device provided in the first embodiment is given.

[0021] Such as figure 1 , The authentication method of the wearable device provided in the first embodiment includes:

[0022] S101. The smart terminal generates a first pseudo-random number r p , And the first pseudo-random number r p Send to the wearable device.

[0023] It should be noted that the smart terminal generates the first pseudo-random number r through its internal random function generator p . Among them, the function of the random function generator is to generate a random number within a given range.

[0024] The smart terminal sets the first pseudo-random number r p Send it to the wearable device and use this as an access request to start a new session period.

[0025] S102. The wearable device receives the first pseudo-random number r p ,Generate the second pseudo-random number r D ; Calculate the first variable And the second variable Where P...

Embodiment 2

[0072] figure 2 It is a flowchart of a wearable device authentication method provided in the second embodiment of the present invention.

[0073] by figure 2 As shown, an authentication method for a wearable device includes: step S101 to step S106. Among them, steps S101-S104 have been described in the first embodiment, and will not be repeated here. In addition, it also includes:

[0074] S105. Update the pseudo-identity identifier PID of the smart terminal pre-stored in the wearable device D , The first pre-shared secret value S D And the second pre-shared secret value S′ D .

[0075] After step S103 is over, the smart terminal will have its pre-stored pseudo-identity identifier PID D , The first pre-shared secret value S D And the second pre-shared secret value S′ D The update process is as follows:

[0076] Change the existing second pre-shared secret value S′ D Assign the first pre-shared secret value: S D =S′ D ;

[0077] The eighth variable S calculated in step S103 8 Assign ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method of a wearable device. The method utilizes the excitation-response randomness of a physical unclonable function, and introduces lightweight operators such as a pseudo-random function, an XOR operation, and a one-way authentication function to realize a smart phone. Mutual authentication with wearable devices. During the interaction between smartphones and wearable devices, sensitive data such as pseudo-identifiers and pre-shared secret values ​​of wearable devices are transmitted anonymously to ensure the security of interactive data. At the same time, a dynamic update mechanism is introduced to improve the freshness and randomness of the session cycle, preventing malicious attackers from replaying, impersonating and other attacks. This method uses lightweight cryptographic operators to realize mutual authentication between smartphones and wearable devices, and is suitable for resource-constrained wearable device application scenarios.

Description

Technical field [0001] The present invention relates to the technical field of wearable devices, and in particular to an authentication method for wearable devices. Background technique [0002] With the continuous development of wireless communication technology, wearable devices can perceive, analyze, store, and provide intelligent services to users' information and data. Therefore, in most cases, wearable devices use short-range wireless communication technologies such as WiFi and Bluetooth to collect user data in real time. For example, users can obtain personal information such as short messages and whereabouts in real time through a handheld device in a WiFi environment. [0003] Due to the openness of the wireless communication technology itself, and the information obtained by the wearable device includes the user's sensitive information, the wearable device and the external terminal are vulnerable to malicious attacks during the data interaction process. In the prior art...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/069H04W12/122
CPCH04W12/04H04W12/06
Inventor 刘虹万月亮曹晓飞
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products