Check patentability & draft patents in minutes with Patsnap Eureka AI!

Encryption method and encryption device used for wearable device

A wearable device, encryption technology, applied in computer security devices, digital data protection, instruments, etc., to achieve the effect of simple structure, flexible password setting, and strong implementability

Inactive Publication Date: 2016-02-03
SHANGHAI WEARAPAY INC
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a security method for wearable devices and its security device. By setting control modules and switches for password verification, it solves the problem that wearable devices need to be equipped with mobile terminals or other more complex devices. The structure of the implementation of password authentication problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and encryption device used for wearable device
  • Encryption method and encryption device used for wearable device
  • Encryption method and encryption device used for wearable device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] refer to figure 2, install a security device on the wearable device. The security device includes a control module and two switches. Taking a normally open switch as an example, assuming that the two switches are the first switch S1 and the second switch S2 respectively, when the first switch S1 Or when the second switch S2 is closed, the control module will receive a corresponding closed conduction signal. Assume that the default security password of the wearable device set by the user is abcd, where a, b, c, and d are all positive integers, and the user uses this password to unlock the wearable device or enable the wearable device to complete a certain function / behavior (such as mobile payment function). The set security preset password is saved in the control module. The security verification process can perform the following actions in sequence: press the first switch S1, a times; press the second switch S2, b times; press the first switch S1, c times; press the ...

Embodiment 2

[0058] In one embodiment, the security device of the wearable device can use a combination of a control module and a multi-function switch, wherein the multi-function switch is an example of a double-action tact switch, and each double-action tact switch includes two independent switch path. Specifically, such as image 3 As shown, the double-action tact switch is provided with a fourth switch S4 and a fifth switch S5. One end of the fourth switch S4 is electrically connected to the first connection end 1 of the control module, one end of the fifth switch S5 is electrically connected to the fourth connection end 4 of the control module, and the other ends of the fourth switch S4 and the fifth switch S5 are respectively electrically connected to the control module. The second connection end 2 and the third connection end 3 of the module; the fifth connection end 5 and the sixth connection end 6 are all electrically connected to the common ground. Continue to refer to figure...

Embodiment 3

[0061] refer to Figure 4 In the shown embodiment, the security device of the wearable device includes a control module and a rotary switch, and the rotary switch is provided with a rotary button, a sixth switch S6 and a seventh switch S7. The rotary switch features three states to image 3 For example, when the rotary button of the rotary switch is in the middle position, the sixth switch S6 and the seventh switch S7 are in a non-conductive state; when the rotary button of the rotary switch is rotated to the left position, the sixth switch S6 is in a conductive state, and the seventh switch S6 is in a conductive state. The switch S7 is in a non-conducting state; when the rotary button of the rotary switch is rotated to the right position, the sixth switch S6 is in a non-conducting state, and the seventh switch S7 is in a conducting state. Similarly, for the security verification method of this embodiment, the description of Embodiment 1 may also be referred to.

[0062] In ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an encryption method an encryption device used for wearable device. The method is applied to the encryption device which is in integral arrangement with the wearable device. The encryption device comprises a control module and a plurality of switches, wherein each switch comprises at least one switch passageway. The method comprises the following steps: receiving closed conduction signals of a plurality of switch passageways, wherein the closed conduction signals are taken as the encryption verification passwords. According to the invention, through the arrangement of the control module and the password verification of the switches, the problems that the wearable device needs the arrangement of a mobile terminal or other complicated structure to realize password verification can be solved.

Description

technical field [0001] The invention belongs to the field of wearable devices, and in particular relates to a security method for wearable devices and a security device thereof. Background technique [0002] A wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable device is not only a hardware device, but also can realize some special functions through software support, data interaction and cloud interaction. [0003] Wearable devices mostly exist in the form of portable accessories that can be connected to various mobile terminals such as smartphones, such as smart bracelets, smart watches and other mainstream product forms. The wearable device itself is not of great value, the key lies in the data it obtains and the services it provides, such as detecting user health data by carrying it around, providing convenient mobile payment and other functions. [0004] When a user uses a wearable devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602G06F2221/2153
Inventor 徐雄伟张亦农杨铁党任庆亮
Owner SHANGHAI WEARAPAY INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More