Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal

A technology for smart mobile terminals and smart bracelets, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of binding and authentication methods between smart bracelets and smart mobile terminals, and achieve performance impact. Low, improve ease of use, and achieve the effect of secure binding

Inactive Publication Date: 2014-11-19
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there is no method for realizing the binding and auth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal
  • Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal
  • Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention aims to propose a method for realizing the binding and authentication of smart bracelets and smart mobile terminals, so as to realize secure binding and pairing between smart bracelets and smart mobile terminals, and to realize access control to smart mobile terminals by using smart bracelets .

[0031] Below in conjunction with accompanying drawing and embodiment the scheme of the present invention will be further described:

[0032] The present invention improves the Diffie-Hellman protocol in the initialization process, adding timestamp authentication and combining the bracelet MAC address and the IMEI number of the smart mobile terminal for identity authentication, and in the initialization process, we consider the security of the channel, through Judging the Bluetooth signal strength rssi of the bracelet to limit the distance between the smart mobile terminal and the bracelet initialization, which can be controlled within the set distance thre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of mobile Internet application security and discloses an authentication method of an intelligent bracelet and an intelligent mobile terminal for implementing safety binding and pairing of the bracelet and the mobile terminal and utilizing the bracelet to implement access control of the mobile terminal; a Diffie-Hellman protocol is improved in a binding initialization scheme, a time stamp is added and an MAC (Media Access Control) address of the bracelet and an IMEI (International Mobile Equipment Identity Number) of the intelligent mobile terminal are combined to carry out pairing; a communication signal distance model is utilized to prevent man-in-the-middle attack during binding initialization. In an authentication scheme, after the mobile terminal is successfully authenticated by utilizing the bracelet, a user can visit protected information in the mobile terminal, so that the dynamic access control of the mobile terminal is implemented; an authentication process is automatically completed, so that usability of the user is improved; an authentication protocol is based on Hash transform and symmetric encryption algorithms so as to have low influence on the performance. Authentication parameters are timely updated after each authentication, so that safety is increased. The method is suitable for access control of privacy information of the mobile terminal.

Description

technical field [0001] The present invention relates to the field of mobile Internet application security, specifically, it relates to a binding method of a smart bracelet and a smart mobile terminal based on asymmetric key negotiation technology, and a smart wristband based on one-time pad authentication technology. The authentication method of the ring and the intelligent mobile terminal. Background technique [0002] Smart bracelets are currently popular wearable smart devices. Many convenient functions can be realized through smart bracelets, such as health status detection, exercise records, and various time reminders. The data collected by the smart bracelet needs to be uploaded through the personal smart mobile terminal, and the access authentication to the smart mobile terminal can also be realized based on the smart bracelet. These applications all need to be able to realize the binding and authentication between the smart bracelet and the smart mobile terminal. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 罗光春陈爱国田玲秦科
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products