Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A wearable device identity authentication method based on cross bit operation

A wearable device and identity authentication technology, which is applied to user identity/authority verification and key distribution, can solve problems such as increased cost, large amount of computation, and long response time, so as to ensure security, reduce computing cost, and solve identity authentication problems Effect

Active Publication Date: 2017-06-23
XUANCAI INTERACTIVE NETWORK SCI & TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005]At present, the existing wearable devices on the market lack the identity authentication link between the devices when they are connected to the mobile terminal, and only rely on the identity authentication link inside the Bluetooth protocol stack and It is not possible to carry out two-way identification of the communication equipment entities
Commonly used authentication methods based on public key encryption algorithms have the disadvantages of large amount of calculation, which increases the cost and causes defects such as long response time, and is not suitable for wearable devices with low computing power.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wearable device identity authentication method based on cross bit operation
  • A wearable device identity authentication method based on cross bit operation
  • A wearable device identity authentication method based on cross bit operation

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0035] The first embodiment of the present invention is a wearable device identity authentication method based on cross bit operation, including: a wearable device (W), a mobile terminal (M) and a background server (S), and the wearable device (W) receives After the authentication request sent by the mobile terminal (M), the authentication message parameters are calculated and generated through the cross bit operation and the left circular shift operation to form the first authentication message set, and sent to the mobile terminal (M); the mobile terminal (M) will Receive the first authentication message set sent by the wearable device (W) together with the random number generated by itself to form the second authentication message set, and send it to the server (S); the server (S) receives the second authentication message set Afterwards, it is judged whether the temporary identity of the wearable device in the second authentication message set satisfies the first matching co...

no. 2 example

[0037] The present invention proposes an ultra-lightweight wearable device identity authentication method by using the cross bit operation Cro(X,Y), the exclusive OR operation XOR and the left circular shift operation Rot(X,Y). The authentication method includes three parts: a wearable device (Wearable Device, referred to as W), a mobile terminal (Mobile Device, referred to as M) and a background server (Server, referred to as S).

[0038] 1. Symbols and function explanations used in the method

[0039] ID: the real identity of wearable devices

[0040] IDS: Temporary Identity for Wearable Devices

[0041] N i : random number, i=1,2,d

[0042] K i : authentication key, i=1,2

[0043] A~D: authentication message

[0044] ⊕: Bitwise exclusive OR (XOR) operation

[0045] ||: information or text at both ends to connect

[0046] ==: comparison operator

[0047] Cro(X,Y): cross bit operation, X, Y are the entry parameters of the function with L bits (L is an even number), X...

no. 3 example

[0062] The third embodiment of the present invention is a wearable device identity authentication method, including: a wearable device (W), a mobile terminal (M) and a background server (S), and the identity authentication method includes the following steps:

[0063] 1) The mobile terminal (M) generates a random number N 1 , and initiate an authentication request to the wearable device (W);

[0064] 2) The wearable device (W) receives the authentication request and the random number N sent by the mobile terminal (M) 1 After that, send the first message set to the mobile terminal (M);

[0065] 3) After receiving the first set of messages sent by the wearable device (W), the mobile terminal (M) together with the random number N generated by itself 1 , sending a second message set to the server (S), where the second message set includes at least the first verification parameter and the temporary identity of the wearable device;

[0066] 4) After receiving the second set of me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a wearable device identity authentication method based on the cross bit operation, which solves the problem of two-way identity authentication between the wearable device and the mobile terminal. It is realized by using cross-bit operation Cro(X,Y), exclusive-or operation XOR and left circular shift operation Rot(X,Y), which is suitable for wearable devices with low computing power. Addresses the danger of data leakage when data is wirelessly transmitted between a mobile game and a wearable device over an insecure channel.

Description

technical field [0001] The invention relates to the technical field of wearable device identity authentication. Background technique [0002] With the diversification of games, more and more wearable devices such as smart glasses and smart bracelets are applied to mobile games. [0003] Wearable devices are in the early stages of development, and security issues such as privacy leaks have not been well resolved. Wearable devices and mobile terminals are often connected through Bluetooth. Bluetooth transmission belongs to wireless channel transmission, and wireless channel is an unsafe channel. Data leakage will occur during the transmission process, thereby exposing user privacy. [0004] Identity authentication is the first line of defense for information security. By proving that the communication object is the entity claimed by the other party, the two parties can avoid errors in the transmission of data transmission targets and prevent data from being maliciously stolen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04L9/08H04L9/0891H04L9/321H04L9/3263H04L2209/80H04W12/02H04W12/06H04W88/02H04W12/33
Inventor 朱富裕陈杰陆林
Owner XUANCAI INTERACTIVE NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products