Unlock instant, AI-driven research and patent intelligence for your innovation.
Method for safely transmitting physical activity monitoring data
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology for safe transmission and motion monitoring, applied in the field of human motion monitoring data transmission, can solve the problem of not providing user monitoring, and achieve the effect of improving physical fitness
Inactive Publication Date: 2014-02-05
BEIJING INFORSON TECH
View PDF4 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
The advantage of this invention is that it can provide the user with more comprehensive body data records, but this record is a static data record, and does not provide the monitoring of the user in the exercise situation.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment approach
[0053] The following examples illustrate the specific implementation, see image 3 :
[0054] 1) After the Monitor device establishes a communication channel with the AP, it sends a message Monitor-AP-1 to the AP. The format of Monitor-AP-1 is as follows:
[0056] Where MonitorID is the identification number of the Monitor device, ch is a random number randomly generated by the Monitor, and tmpkey is a random key generated by the Monitor.
[0057] 2) Since the AP does not have the key Monitor_key of the Monitor device, it cannot decrypt it, and generates a message AP-Auth-1 to the Monitor authentication server. The format of AP-Auth-1 is as follows:
[0058] AP-Auth-1 = Monitor-AP-1.
[0059] 3) The authentication server first authenticates the AP (that is, the user User). After the authentication is successful, it shares a key session_key with the AP. The authentication server queries t...
specific Embodiment approach
[0082] 1. Registration process
[0083] 1) The user registers his user name in AuthServer, sets a password, and is assigned the unique PID of the system. AuthServer saves the key User_key shared with the user.
[0084] 2) The application server AppServer also registers its own service Service with AuthServer, and shares a key Server_key with AuthServer.
[0085] 2. AP obtains Ticket from AuthServer
[0086] 1) When the user logs in from the AP, the user provides the user name, PID, password, and the application service to be used. The AP generates the user key User_key according to the user name, PID, and password, generates a random number Nonce, and combines it into a message AP-AuthServer- 1 to AuthServer, the format of AP-AuthServer-1 is as follows:
[0088] 2) AuthServer receives AP-AuthServer-1, decrypts the encrypted part, and verifies whether the data packet is cor...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a method for safely transmitting physical activity monitoring data. In the method, a communication unit of a physical activity monitor and Internet terminal equipment such as a mobile phone, a PC and a PDA need to be authenticated mutually before starting to transmit personal data in between; and the Internet terminal equipment such as the mobile phone, the PC and the PDA and a remote server need to be authenticated mutually before starting to transmit the personal data in between. A result of an authentication protocol is a key shared by both parties; after the authentication, the confidentiality, integrity, non-repudiation and the like of the data transmission can be guaranteed by the key. The method can make the equipment of the physical activity monitor and the like have the function of monitoring the amount of the physical activity in real time, safely transmits the data to the Internet terminal user equipment such as the mobile phone, the PC and the PDA specified by a user, then transmits the data to the remote server safely by the Internet terminal user equipment, and is used for storing the personal physical activity data for a long time and analyzing the data.
Description
technical field [0001] The invention relates to a data transmission method, in particular to a transmission method of human body motion monitoring data. Background technique [0002] As people pay more attention to their own health, people hope to use some tools to monitor and record their own exercise conditions, so as to maintain a certain level of exercise and improve the physical fitness of the human body. A pedometer is one of the simplest such tools, but a pedometer can only display the number of steps, and cannot correctly distinguish between various activities, nor can it accurately measure the amount of energy consumed. [0003] In recent years, a product concept called an activity meter or a physical activity monitor (Physical Activity Monitor) has evolved from a pedometer. The design goal of this type of product is to be able to continuously record physical activity information, accurately distinguish and measure all calorie-consuming activities, for example, be ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.