A kind of authentication method of wearable device
A technology for wearable devices and authentication methods, applied in wireless communication, electrical components, security devices, etc., can solve the problems of increased chip design costs and difficulties in equipment integration, and achieve the effect of avoiding design difficulties.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] figure 1 A flowchart of the authentication method of the wearable device provided in the first embodiment is given.
[0021] Such as figure 1 , The authentication method of the wearable device provided in the first embodiment includes:
[0022] S101. The smart terminal generates a first pseudo-random number r p , And the first pseudo-random number r p Send to the wearable device.
[0023] It should be noted that the smart terminal generates the first pseudo-random number r through its internal random function generator p . Among them, the function of the random function generator is to generate a random number within a given range.
[0024] The smart terminal sets the first pseudo-random number r p Send it to the wearable device and use this as an access request to start a new session period.
[0025] S102. The wearable device receives the first pseudo-random number r p ,Generate the second pseudo-random number r D ; Calculate the first variable And the second variable Where P...
Embodiment 2
[0072] figure 2 It is a flowchart of a wearable device authentication method provided in the second embodiment of the present invention.
[0073] by figure 2 As shown, an authentication method for a wearable device includes: step S101 to step S106. Among them, steps S101-S104 have been described in the first embodiment, and will not be repeated here. In addition, it also includes:
[0074] S105. Update the pseudo-identity identifier PID of the smart terminal pre-stored in the wearable device D , The first pre-shared secret value S D And the second pre-shared secret value S′ D .
[0075] After step S103 is over, the smart terminal will have its pre-stored pseudo-identity identifier PID D , The first pre-shared secret value S D And the second pre-shared secret value S′ D The update process is as follows:
[0076] Change the existing second pre-shared secret value S′ D Assign the first pre-shared secret value: S D =S′ D ;
[0077] The eighth variable S calculated in step S103 8 Assign ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com