Unlock instant, AI-driven research and patent intelligence for your innovation.

A lightweight BLE wearable device security authentication method

A wearable device, security authentication technology, applied in security devices, digital data authentication, computer security devices, etc., can solve problems such as increasing the hardware cost and development cost of wearable devices

Active Publication Date: 2020-05-08
BEIJING UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, current manufacturers rarely pay attention to the access authentication of wearable devices, and only a few manufacturers have proposed security protection methods for wearable devices using encrypted channels or NFC hardware, but the above methods will greatly increase the hardware cost of wearable devices and development costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A lightweight BLE wearable device security authentication method
  • A lightweight BLE wearable device security authentication method
  • A lightweight BLE wearable device security authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0026] During the use of the existing BLE wearable device, it needs to work with other mobile terminals to process the data recorded in the BLE wearable device. Therefore, the device security authentication method of the present invention is based on the information interaction between the BLE wearable device and the mobile terminal, such as figure 1 . After the device connection is established, it needs to be authenticated according to the authentication method of the present invention. Here, the entire security authentication is divided into two stages: the initial connection security authentication stage, and the reconnection security authentication stage.

[0027] In the initial connection security authentication stage, that is, at this time, the BLE wearable device does not perform any security settings, and the BLE wearable device and m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a lightweight BLE wearable device security authentication method. Lightweight random ID generation technology is adopted, and the security authentication is divided into two parts, namely a primary connection security authentication phase and a secondary connection security authentication phase, for unopened BLE wearable devices and opened BLE wearable devices. The security authentication of legal mobile devices using the wearable devices is supported through the compulsive one-way authentication between the wearable devices and the mobile terminals so as to prevent intermediary near field attacks, and crackers can also be prevented from performing replay attacks on the wearable devices provided with no security setting.

Description

technical field [0001] The invention belongs to the technical field of Bluetooth security, and in particular relates to a lightweight BLE wearable device security authentication method. Background technique [0002] In recent years, wearable devices such as smart bracelets have gradually entered people's daily lives due to their good interactivity and easy to wear features, and are subtly affecting people's lifestyles and habits. The vast majority of wearable devices have been successfully introduced using Bluetooth Low Energy (BLE) technology. Bluetooth Low Energy (BLE) technology inherits the advantages of traditional Bluetooth technology such as frequency hopping technology, and adopts high-efficiency discovery mechanism, few data channels and wide channel intervals, introduces broadcast data packets, quickly establishes connections, introduces data bits, low Technologies such as operating current and ultra-low sleep current achieve the goals of lower power consumption, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06G06F21/44H04W76/10
CPCG06F21/445H04W12/06H04W76/10
Inventor 林莉郑丹娜冯家豪杜昱彤李琛
Owner BEIJING UNIV OF TECH