CN109271794A - A kind of network physical risk checking method of wearable smart machine - Google Patents
A kind of network physical risk checking method of wearable smart machine Download PDFInfo
- Publication number
- CN109271794A CN109271794A CN201811181457.1A CN201811181457A CN109271794A CN 109271794 A CN109271794 A CN 109271794A CN 201811181457 A CN201811181457 A CN 201811181457A CN 109271794 A CN109271794 A CN 109271794A
- Authority
- CN
- China
- Prior art keywords
- smart machine
- wearable smart
- password
- network physical
- application scenarios
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a kind of network physical risk checking methods of wearable smart machine, comprising the following steps: Step 1: the application scenarios of a set of wearable smart machine of simulation;Step 2: being operated in different application scenarios: including different modes of transportation, being manually entered password;Step 3: capturing the acceleration change situation and rotational case for the equipment that accelerometer and gyro sensor are collected into different application scene by program;Step 4: being changed according to the information analysis user behavior of collection and with the presence or absence of risks such as Password Inputs.A kind of network physical risk checking method of wearable smart machine of the invention; by analyzing input habit of the user under different usage scenarios; the risk that the privacy informations such as behavioural analysis and the password of user are leaked out by wearable smart machine is avoided, protects the data safety of user to a greater extent.
Description
Technical field
The present invention relates to the network risks detection technique field of Internet of Things wearable device more particularly to a kind of wearable intelligence
The network physical risk checking method of energy equipment.
Background technique
With the prevalence of wearable smart machine (such as smartwatch, Intelligent bracelet), existing wearable intelligence in the market
Number of devices is more and more, but simultaneously, and the safety of wearable smart machine is also challenged, for example once occurs to chase after
The intelligent dog ring (being similar to wearable smart machine) of track pet position is by hacker attacks, and it is illegal to cause criminal to carry out pet
The event of capture, so for users, the safety of wearable smart machine is still a big focus, and for intelligent hand
For the wearables smart machine such as table, Intelligent bracelet, the problem of accelerometer and gyro sensor therein can expose
It is in fact also very much, for example once there is information leakage, the privacy informations such as the behavioural analysis of user and password all may be by that can wear
It wears smart machine and is leaked out.
Summary of the invention
The object of the invention is that providing a kind of network physical of wearable smart machine to solve the above-mentioned problems
Risk checking method, the present invention through the following technical solutions to achieve the above objectives:
A kind of network physical risk checking method of wearable smart machine, comprising the following steps:
Step 1: the application scenarios of a set of wearable smart machine of simulation;
Step 2: being operated in different application scenarios: including different modes of transportation, being manually entered password;
Step 3: capturing the equipment that accelerometer and gyro sensor are collected into different application scene by program
Acceleration change situation and rotational case;
Step 4: being changed according to the information analysis user behavior of collection and with the presence or absence of risks such as Password Inputs.
Further scheme is:
Application scenarios include but is not limited to walking, transit trip in the step 1.
Further scheme is:
In the step 2, password is manually entered in use for different application scenarios.
The beneficial effects of the present invention are:
A kind of network physical risk checking method of wearable smart machine of the invention, by user in different uses
Input habit analysis under scene, avoids the privacy informations such as behavioural analysis and the password of user and passes through wearable smart machine
The risk being leaked out protects the data safety of user to a greater extent.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
In required practical attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only the one of the present embodiment
A little embodiments for those of ordinary skill in the art without creative efforts, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is process for using figure of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, technical solution of the present invention will be carried out below
Detailed description.Obviously, described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Base
Embodiment in the present invention, those of ordinary skill in the art are obtained all without making creative work
Other embodiment belongs to the range that the present invention is protected.
As shown in Figure 1, a kind of network physical risk checking method of wearable smart machine, comprising the following steps:
Step 1: the application scenarios of a set of wearable smart machine of simulation;
The step in environmental simulation can be by writing easy journey for a smartwatch based on android system
Sequence, come capture it embedded accelerometer and gyroscope data-signal;
Application scenarios include but is not limited to walking, transit trip in the step 1.
Step 2: being operated in different application scenarios: including different modes of transportation, being manually entered password;
In the step 2, password is manually entered in use for different application scenarios.
Step 3: capturing the equipment that accelerometer and gyro sensor are collected into different application scene by program
Acceleration change situation and rotational case;
Step 4: being changed according to the information analysis user behavior of collection and with the presence or absence of risks such as Password Inputs.
According to the acceleration of collection in x, y, in z-axis situation of change analysis user's current kinetic situation (be divided into walking and
It takes bus, is answered under ambulatory status are as follows: parabola cyclically-varying is presented in x-axis and y-axis, and z-axis at the uniform velocity changes;It takes pubic transport
Answered in the state of vehicle are as follows: x-axis, y-axis remain unchanged, and z-axis at the uniform velocity changes), and password is manually entered (according to x, y, the position of z-axis
Move variation and judge hand moving direction and distance of the user when inputting password, to carry out cracking detection to user password), root
Security risk is judged whether there is according to analysis result.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
It is further to note that specific technical features described in the above specific embodiments, in reconcilable situation
Under, it can be combined in any appropriate way, in order to avoid unnecessary repetition, the present invention is to various possible combinations
No further explanation will be given for mode.In addition, various embodiments of the present invention can be combined randomly, as long as its
Without prejudice to thought of the invention, it should also be regarded as the disclosure of the present invention.
Claims (3)
1. a kind of network physical risk checking method of wearable smart machine, which comprises the following steps:
Step 1: the application scenarios of a set of wearable smart machine of simulation;
Step 2: being operated in different application scenarios: including different modes of transportation, being manually entered password;
Step 3: capturing adding for the equipment that accelerometer and gyro sensor are collected into different application scene by program
Velocity variations situation and rotational case;
Step 4: being changed according to the information analysis user behavior of collection and with the presence or absence of risks such as Password Inputs.
2. a kind of network physical risk checking method of wearable smart machine as described in claim 1, which is characterized in that institute
Stating application scenarios in step 1 includes but is not limited to walking, transit trip.
3. a kind of network physical risk checking method of wearable smart machine as described in claim 1, which is characterized in that institute
It states in step 2, password is manually entered in use for different application scenarios.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811181457.1A CN109271794A (en) | 2018-10-10 | 2018-10-10 | A kind of network physical risk checking method of wearable smart machine |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811181457.1A CN109271794A (en) | 2018-10-10 | 2018-10-10 | A kind of network physical risk checking method of wearable smart machine |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109271794A true CN109271794A (en) | 2019-01-25 |
Family
ID=65195539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811181457.1A Pending CN109271794A (en) | 2018-10-10 | 2018-10-10 | A kind of network physical risk checking method of wearable smart machine |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109271794A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150350236A1 (en) * | 2014-06-03 | 2015-12-03 | Hexadite Ltd. | System and methods thereof for monitoring and preventing security incidents in a computerized environment |
CN105243301A (en) * | 2014-07-09 | 2016-01-13 | 阿里巴巴集团控股有限公司 | Keyboard input abnormality detection method and apparatus as well as security prompt method and apparatus |
CN105243799A (en) * | 2015-09-30 | 2016-01-13 | 小米科技有限责任公司 | Safety reminding processing method and device |
CN105303039A (en) * | 2015-10-14 | 2016-02-03 | 无锡百灵传感技术有限公司 | Acceleration sensor based behavior analysis system |
CN106095099A (en) * | 2016-06-12 | 2016-11-09 | 南京邮电大学 | A kind of user behavior motion detection recognition methods |
CN106683340A (en) * | 2016-12-15 | 2017-05-17 | 歌尔股份有限公司 | User behavior monitoring method and wearable equipment |
CN107657277A (en) * | 2017-09-22 | 2018-02-02 | 上海斐讯数据通信技术有限公司 | A kind of human body unusual checking based on big data and decision method and system |
US10043013B1 (en) * | 2016-09-09 | 2018-08-07 | Symantec Corporation | Systems and methods for detecting gadgets on computing devices |
-
2018
- 2018-10-10 CN CN201811181457.1A patent/CN109271794A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150350236A1 (en) * | 2014-06-03 | 2015-12-03 | Hexadite Ltd. | System and methods thereof for monitoring and preventing security incidents in a computerized environment |
CN105243301A (en) * | 2014-07-09 | 2016-01-13 | 阿里巴巴集团控股有限公司 | Keyboard input abnormality detection method and apparatus as well as security prompt method and apparatus |
CN105243799A (en) * | 2015-09-30 | 2016-01-13 | 小米科技有限责任公司 | Safety reminding processing method and device |
CN105303039A (en) * | 2015-10-14 | 2016-02-03 | 无锡百灵传感技术有限公司 | Acceleration sensor based behavior analysis system |
CN106095099A (en) * | 2016-06-12 | 2016-11-09 | 南京邮电大学 | A kind of user behavior motion detection recognition methods |
US10043013B1 (en) * | 2016-09-09 | 2018-08-07 | Symantec Corporation | Systems and methods for detecting gadgets on computing devices |
CN106683340A (en) * | 2016-12-15 | 2017-05-17 | 歌尔股份有限公司 | User behavior monitoring method and wearable equipment |
CN107657277A (en) * | 2017-09-22 | 2018-02-02 | 上海斐讯数据通信技术有限公司 | A kind of human body unusual checking based on big data and decision method and system |
Non-Patent Citations (2)
Title |
---|
刘金芳: "可穿戴设备的信息安全风险及我国应对建议", 《信息安全与技术》 * |
无: "黑进智能手表-可穿戴设备的Cyberphysical风险", 《HTTPS://WWW.ANQUANKE.COM/POST/ID/146571》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khan et al. | Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions | |
Rawat et al. | Artificial cyber espionage based protection of technological enabled automated cities infrastructure by dark web cyber offender | |
Schmittner et al. | Limitation and improvement of STPA-Sec for safety and security co-analysis | |
Muhammad et al. | Emerging cybersecurity and privacy threats to electric vehicles and their impact on human and environmental sustainability | |
CN104813331A (en) | Web application container for client-level runtime control | |
JP2024109780A (en) | System and method for secure access to assets or information using blockchain | |
CN105637522A (en) | World-driven access control using trusted certificates | |
CN112966183A (en) | Service protection method, system and intelligent platform for cloud computing and information security | |
CN106559386B (en) | A kind of authentication method and device | |
CN106131223A (en) | A kind of method and device adding reminder events | |
Beck et al. | Privaros: A framework for privacy-compliant delivery drones | |
US20150288788A1 (en) | Mobile Device Management | |
CN113190877A (en) | Model loading method and device, readable storage medium and electronic equipment | |
Gressel et al. | Privacy-aware eye tracking: Challenges and future directions | |
CN108924086A (en) | A kind of host information acquisition method based on TSM Security Agent | |
CN109271794A (en) | A kind of network physical risk checking method of wearable smart machine | |
Hou et al. | An ontology-based dynamic attack graph generation approach for the internet of vehicles | |
Feng et al. | Security after login: Identity change detection on smartphones using sensor fusion | |
Panda et al. | Privacy impact assessment of cyber attacks on connected and autonomous vehicles | |
Hu et al. | St-ifgsm: Enhancing robustness of human mobility signature identification model via spatial-temporal iterative fgsm | |
CN106156591A (en) | A kind of smart phone user Transparent Authentication method under cloud environment | |
KR102385702B1 (en) | Data analysis service method and data analysis service system using the method | |
CN107612939A (en) | The safety protecting method and device of self-service terminal | |
Chowdhury | Security risk modelling using SecureUML | |
Zou et al. | Cyber resilience of autonomous mobility systems: Cyber attacks and resilience-enhancing strategies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190125 |