Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wearable equipment authentication device and authentication encryption method

A wearable device and authentication device technology, which is applied in the direction of security devices, secure communication devices, and public keys for secure communications, can solve problems such as low security, easy to be cracked, and non-compliance, and achieve good applicability and information security. The effect of self-controllable and data security equipment certification

Pending Publication Date: 2019-12-13
GUANGDONG IND TECHN COLLEGE
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the encryption and authentication schemes for mobile device security information mainly include: (1) Pure software encryption scheme: the pure software encryption and decryption scheme is mainly used for mobile phone information protection. Its advantages are convenience, easy transplantation, and strong scalability. It has the disadvantages of being easily cracked and not complying with the relevant national password management regulations; (2) SIM card encryption scheme: mainly used for mobile payment, its advantage is that it complies with the national password management regulations, mobile phones and wearable devices do not need to add hardware, The disadvantage is that the speed is slow, the storage capacity is small, and the security is low; (3) Secure SD card encryption scheme: mainly used for mobile payment, its advantages are: compliance with national password management regulations, fast speed, high security, and portability Strong performance, with encryption authentication and storage functions at the same time, strong application expansion space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wearable equipment authentication device and authentication encryption method
  • Wearable equipment authentication device and authentication encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with embodiments and drawings.

[0024] Such as figure 1 As shown, a security support platform structure for wearable devices based on cryptographic chips is shown, including wearable devices 1, cryptographic chips 2, security proxy modules 3, security proxy servers 4, security management consoles 5, and background servers 6; the password The chip, the security proxy module and the security proxy server complete the establishment of a secure channel, encryption of communication data and trusted authentication of the device;

[0025] The cryptographic chip is used to ensure the transmission security of access node data through a built-in encryption module;

[0026] The security agent module works on wearable devices and provides communication, data encryption and authentication secure transmission se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wearable equipment authentication device and an authentication encryption method. The authentication encryption method comprises a security support platform. The security support platform comprises wearable equipment, a cryptographic chip, a security agent module, a security agent server, a security management console and a server. The method comprises the steps that wearable equipment sends a network request to a cryptographic chip through an application program; the cryptographic chip receives the network request, encrypts the received network request and sends theencrypted network request to the security agent module; the security agent module transmits the received encrypted network request to a security agent server through an encryption channel; and the security proxy server decrypts the received network request and transmits the decrypted network request to a background server to complete security channel establishment, communication data encryption and credible authentication operation of the equipment. Security support and password service are provided for the wearable device, and communication security, data security and device trusted authentication of the wearable device are realized.

Description

Technical field [0001] The present invention relates to personal privacy, property and information security issues of wearable equipment in the era of mobile internet, in particular to a wearable equipment authentication device and authentication encryption method. Background technique [0002] With the rapid development of information technology, especially the performance improvement of mobile terminals and wearable devices, and the promotion of network technology and mobile communication technology around the world, the means of people obtaining information have undergone tremendous changes, especially those that require real-time information. Intense and mobile units and individuals, wearable devices, mobile computing and wireless data technology will bring brand-new changes to their lives and work. [0003] The most terrifying problem in the mobile Internet era will be security, and the same is true for wearable devices, which involve personal privacy, property and information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04L9/30H04W12/069H04W12/33
CPCH04W12/02H04W12/06H04L9/3066H04W12/03
Inventor 叶廷东黄晓红冼广淋
Owner GUANGDONG IND TECHN COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products