Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wearable computing autonomous security authentication system and security authentication method

A security authentication and wearable device technology, applied in the field of secure communication, can solve the problems of insecure communication, lack of user anonymity and untraceability, and inability to resist theft attacks of mobile devices and wearable devices.

Active Publication Date: 2020-09-25
HUAZHONG NORMAL UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] From the perspective of effectiveness and security, the current technology mainly has the following problems: (1) The authentication scheme is not autonomous
Existing schemes often rely on remote cloud servers to ensure authentication security, which significantly increases authentication delays; (2) most authentication schemes cannot resist theft of wearable devices or mobile terminals, which allows attackers to pass Stolen devices capture sensitive user information
(3) Most authentication schemes do not have user anonymity and untraceability
(4) Most authentication schemes are not lightweight and unsuitable for resource-constrained wearable devices for secure communication
[0004] Through the above analysis, the existing problems and defects of the existing technology are: (1) The communication method authentication scheme of the existing wearable device is not autonomous, which increases the authentication delay; and the authentication scheme does not have user anonymity and untraceability;
[0005] (2) The communication methods of existing wearable devices are vulnerable to attacks, and the communication is not safe; and it cannot resist the theft of mobile devices and wearable devices;
[0006] (3) Existing communication authentication methods are not suitable for resource-constrained wearable devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wearable computing autonomous security authentication system and security authentication method
  • Wearable computing autonomous security authentication system and security authentication method
  • Wearable computing autonomous security authentication system and security authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0136] The technical scheme includes three aspects: the setup scheme of the initialization module of the wearable device, the setup scheme of the mobile terminal registration module, and the technical scheme of security authentication between the wearable device and the mobile terminal.

[0137] The initialization mode setting scheme for the wearable device includes the following steps:

[0138] (1) The user chooses a unique ID for each wearable device j and a temporary identity TID j , to generate two sufficiently long random numbers R 1 and R 2 .

[0139] (2) Calculate the pseudo-identity PID of the wearable device j =h(ID j ||R 1 ), where h(·) represents the hash function in cryptography.

[0140] (3) The user according to the current timestamp T j , to compute a secret parameter S for the wearable device j =h(ID j ||T j ||R 2 ).

[0141] (4) The user stores information in the wearable device {PID j ,TID j ,S j ,h(·)}.

[0142] The setting scheme of the mob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of security communication, and discloses a wearable computing autonomous security authentication system and a security authentication method. An initialization module is used for performing initialization setting of wearable equipment, and an authentication and communication module A realizes security communication with a mobile terminal; the mobile terminal comprises a registration module and an authentication and communication module B; the registration module is used for authenticating a user having a mobile device, and the authentication and communication module B realizes safe communication with the wearable device; the wearable device and the mobile terminal are in wireless communication through Bluetooth, Wifi or other small-range communication protocols. The wearable computing autonomous security method provided by the invention is only carried out between the wearable device and the user mobile terminal, a lightweight authenticationmode is adopted, various known attacks can be resisted, and the scheme not only is effective, but also has very high safety, and is very suitable for being used for protecting safety communication between a wearable device and a mobile terminal in a wearable computing environment.

Description

technical field [0001] The invention belongs to the technical field of security communication, and in particular relates to a wearable computing autonomous security authentication system and a security authentication method. Background technique [0002] At present, various wearable devices are being used in various fields by people. These wearable devices can be attached to various parts of the body, such as the head, wrist, thigh, etc., to collect and transmit data. In wearable healthcare applications, wearable devices are used to monitor important health information of patients, such as heart rate, blood oxygen content, and blood sugar levels, and send the collected information to the user's mobile terminal. Much of the data collected by wearable devices is sensitive and private, and they need to be communicated in a secure manner. However, the wearable device communicates with the user's mobile terminal in a wireless manner. This wireless communication method causes va...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/08G06F1/16G06F21/32
CPCH04W12/06H04W12/08G06F21/32G06F1/163
Inventor 郭亚军郭奕旻
Owner HUAZHONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products