Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for safely transmitting physical activity monitoring data

A technology for safe transmission and motion monitoring, applied in the field of human motion monitoring data transmission, can solve the problem of not providing user monitoring, and achieve the effect of improving physical fitness

Inactive Publication Date: 2014-02-05
BEIJING INFORSON TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of this invention is that it can provide the user with more comprehensive body data records, but this record is a static data record, and does not provide the monitoring of the user in the exercise situation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safely transmitting physical activity monitoring data
  • Method for safely transmitting physical activity monitoring data
  • Method for safely transmitting physical activity monitoring data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0053] The following examples illustrate the specific implementation, see image 3 :

[0054] 1) After the Monitor device establishes a communication channel with the AP, it sends a message Monitor-AP-1 to the AP. The format of Monitor-AP-1 is as follows:

[0055] Monitor-AP-1 = MonitorID, EncMonitor_key(tmpkey, Monitor_time, MonitorID, ch).

[0056] Where MonitorID is the identification number of the Monitor device, ch is a random number randomly generated by the Monitor, and tmpkey is a random key generated by the Monitor.

[0057] 2) Since the AP does not have the key Monitor_key of the Monitor device, it cannot decrypt it, and generates a message AP-Auth-1 to the Monitor authentication server. The format of AP-Auth-1 is as follows:

[0058] AP-Auth-1 = Monitor-AP-1.

[0059] 3) The authentication server first authenticates the AP (that is, the user User). After the authentication is successful, it shares a key session_key with the AP. The authentication server queries t...

specific Embodiment approach

[0082] 1. Registration process

[0083] 1) The user registers his user name in AuthServer, sets a password, and is assigned the unique PID of the system. AuthServer saves the key User_key shared with the user.

[0084] 2) The application server AppServer also registers its own service Service with AuthServer, and shares a key Server_key with AuthServer.

[0085] 2. AP obtains Ticket from AuthServer

[0086] 1) When the user logs in from the AP, the user provides the user name, PID, password, and the application service to be used. The AP generates the user key User_key according to the user name, PID, and password, generates a random number Nonce, and combines it into a message AP-AuthServer- 1 to AuthServer, the format of AP-AuthServer-1 is as follows:

[0087] AP-AuthServer-1 = PID, Service, Nonce, AP_time, Hmac User_Key (PID, Service, Nonce, AP_time)

[0088] 2) AuthServer receives AP-AuthServer-1, decrypts the encrypted part, and verifies whether the data packet is cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for safely transmitting physical activity monitoring data. In the method, a communication unit of a physical activity monitor and Internet terminal equipment such as a mobile phone, a PC and a PDA need to be authenticated mutually before starting to transmit personal data in between; and the Internet terminal equipment such as the mobile phone, the PC and the PDA and a remote server need to be authenticated mutually before starting to transmit the personal data in between. A result of an authentication protocol is a key shared by both parties; after the authentication, the confidentiality, integrity, non-repudiation and the like of the data transmission can be guaranteed by the key. The method can make the equipment of the physical activity monitor and the like have the function of monitoring the amount of the physical activity in real time, safely transmits the data to the Internet terminal user equipment such as the mobile phone, the PC and the PDA specified by a user, then transmits the data to the remote server safely by the Internet terminal user equipment, and is used for storing the personal physical activity data for a long time and analyzing the data.

Description

technical field [0001] The invention relates to a data transmission method, in particular to a transmission method of human body motion monitoring data. Background technique [0002] As people pay more attention to their own health, people hope to use some tools to monitor and record their own exercise conditions, so as to maintain a certain level of exercise and improve the physical fitness of the human body. A pedometer is one of the simplest such tools, but a pedometer can only display the number of steps, and cannot correctly distinguish between various activities, nor can it accurately measure the amount of energy consumed. [0003] In recent years, a product concept called an activity meter or a physical activity monitor (Physical Activity Monitor) has evolved from a pedometer. The design goal of this type of product is to be able to continuously record physical activity information, accurately distinguish and measure all calorie-consuming activities, for example, be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04W12/02H04W12/06H04L9/32H04W12/04
Inventor 陈澎
Owner BEIJING INFORSON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products