CN110177000A - A kind of encrypted transmission method of wearable device - Google Patents
A kind of encrypted transmission method of wearable device Download PDFInfo
- Publication number
- CN110177000A CN110177000A CN201910424097.1A CN201910424097A CN110177000A CN 110177000 A CN110177000 A CN 110177000A CN 201910424097 A CN201910424097 A CN 201910424097A CN 110177000 A CN110177000 A CN 110177000A
- Authority
- CN
- China
- Prior art keywords
- data
- transmitting terminal
- receiving end
- frame
- wearable device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Abstract
The invention discloses a kind of encrypted transmission methods of wearable device.Transmitting terminal acquires somatic data by biological information of human body monitoring device.After the completion of acquisition, receiving end will carry out matching connection with transmitting terminal.Receiving end sends a string of plaintext synchrodata frames to transmitting terminal at this time, after transmitting terminal receives clear data, it will timestamp is made seed key, calculated result is obtained using SHA1 Encryption Algorithm and returns to ACK to receiving end.Receiving end is calculated with SHA1 Encryption Algorithm, and sends the result to transmitting terminal.The calculated result received is compared transmitting terminal with itself seed key, judges whether to authenticate successfully.After authenticating successfully, carry out data transmission, transmitting terminal all carries out data encryption to the data transmitted with the cipher mode of AES128 encryption standard, guarantees the safety of data transmission.Receiving end equally carries out data receiver with the manner of decryption of AES128 encryption standard.By the above-mentioned means, the present invention can guarantee data transmission security, the leakage of user information is taken precautions against, is capable of the information security of effective guarantee user.
Description
Technical field
The present invention relates to the technical field of data transmission of wearable device, in particular to a kind of Data Encryption Transmission
Method.
Background technique
The main mode to be used of wireless communication has at present: WLAN (wireless fidelity), broader bandwidth but
Power consumption is higher;Infrared data transmission technology (Infrared Data Association, IrDA), although there is faster transmission speed
Rate, lower power consumption, but its transmission range is shorter, and between two device locations communicated using the technology
It must be aligned, centre cannot have obstacle;ZigBee technology low rate, low-power consumption, low cost and short distance, but cannot directly with
Android terminal interacts;Ultra wide band (Ultra WideBand, UWB) technology, although its transmission rate is high, its biography
Defeated distance is shorter and power consumption is higher;Bluetooth low energy consumption (Bluetooth Low Energy, BLE) is low in energy consumption, connection is quick, can
It is strong by property, transmission range is long.
Therefore Bluetooth transmission is widely used.Existing Bluetooth data transfer is unencryption.Do not add largely
The Bluetooth communication equipment of close certification and encrypted data transmission is easily cracked, if wearable medical monitoring equipment uses unencryption
Bluetooth communication, be likely to result in the leakage of data, cannot be ensured even with the life security of person.
Summary of the invention
Present invention seek to address that the above problem of the prior art.The present invention provides a kind of encrypted transmission side of wearable device
Method, it is intended to which the leakage of user information is taken precautions against in the safety of lifting means, ensures the information security of user.
To realize the above-mentioned technical purpose, the technical scheme adopted by the invention is as follows:
Step 1: transmitting terminal acquires somatic data by biological information of human body monitoring device.After the completion of acquisition, receiving end will
Matching connection is carried out with transmitting terminal.After receiving end is connect with transmitting terminal, receiving end is to a string of transmission synchronous clear data frames, data
Contained in frame timestamp, synchronic command, verification and.
Step 2: after transmitting terminal receives synchronous clear data frame, timestamp is close as the seed of SHA1 encryption identifying algorithm
Key.
Step 3: after receiving end receives the ack msg frame of transmitting terminal, then sending a frame authentication data frame.
Step 4: transmitting terminal will receive authentication data frame, carry out SHA1 with the timestamp of own cache is made seed key
The calculated result of Encryption Algorithm compares, if result is identical, certification passes through, otherwise the ack msg frame that return authentication passes through is recognized
Card failure, disconnects bluetooth connection.
Step 5: transmitting terminal and receiving end cryptographically carry out data communication.The data that cryptographically carry out are led to
News, including transmitting terminal to transmitting after the data encryption transmitted, the data received are decrypted in receiving end.
Specifically, in step 2, after transmitting terminal receives synchronous clear data frame, data accepted frame is returned to receiving end
Ack msg frame, and the timestamp in synchronous clear data frame is proposed, it caches close as the seed of SHA1 encryption identifying algorithm
Key.Data encryption is handled using the cipher mode of AES128 standard, and data deciphering uses the manner of decryption of AES128 standard
It is handled.
Further, authentication data frame described in step 3 is the data result calculated through SHA1 Hash Encryption Algorithm.
After the encrypted post-processing of data that bluetooth is sent, it can guarantee the safety of bluetooth equipment transmission data, take precautions against user
The information security of effective guarantee user is capable of in the leakage of information.
This method completes verification process using bluetooth connection, and the energy consumption that can play the role of transmission process is few, low delay.
This method can guarantee the real-time and accuracy of transmission process using timestamp as seed key.
Detailed description of the invention
Fig. 1 is the flow diagram of invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, detailed
Carefully describe.Described embodiment is only a part of the embodiments of the present invention.
Referring to Fig. 1, the method for the present invention includes the following steps:
Step 1: transmitting terminal (wearable device) acquires somatic data by biological information of human body monitoring device.Acquisition is completed
Afterwards, receiving end will carry out matching connection with transmitting terminal.After receiving end is connect with transmitting terminal, receiving end synchronizes in plain text to a string of transmission
Data frame, contain in data frame timestamp, synchronic command, verification and.
Step 2: transmitting terminal is received with step number in plain text according to frame, returns to ACK to receiving end, and timestamp is proposed, caching is made
For the seed key for encrypting identifying algorithm.
Step 3: receiving end receives ACK, sends the data encryption that a frame is calculated through SHA1 Hash Encryption Algorithm to transmitting terminal
As a result authentication data frame.
Step 4: transmitting terminal receives authentication data frame, carries out SHA1 Encryption Algorithm calculated result ratio with the seed key of itself
Right, if result is identical, certification passes through, the ack msg frame that return authentication passes through, otherwise authentification failure, disconnects bluetooth connection.
Step 5: receiving end receives the successful ack msg frame of certification, starts data transmission.
Step 6: transmitting terminal encrypts the data of acquisition with the cipher mode of AES128 encryption standard.
Step 7: encrypted data is sent to receiving end by transmitting terminal.
Step 8: the encryption data received is decrypted with the manner of decryption of AES128 encryption standard for receiving end.
Step 9: converting figure in android terminal for the data of decryption and show.
The above is only the preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-described embodiment,
All technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art
For those of ordinary skill, several improvements and modifications without departing from the principles of the present invention should be regarded as protection of the invention
Range.
Claims (6)
1. a kind of encrypted transmission method of wearable device, which comprises the following steps:
Step 1: after receiving end is connect with transmitting terminal, receiving end is to a string of transmission synchronous clear data frames;
Step 2: after transmitting terminal receives synchronous clear data frame, using timestamp as the seed key of SHA1 encryption identifying algorithm;
Step 3: after receiving end receives the ack msg frame of transmitting terminal, then sending a frame authentication data frame;
Step 4: transmitting terminal will receive authentication data frame, carry out SHA1 encryption with the timestamp of own cache is made seed key
The calculated result of algorithm compares, if result is identical, certification passes through, the ack msg frame that return authentication passes through, and otherwise certification is lost
It loses, disconnects bluetooth connection;
Step 5: transmitting terminal and receiving end cryptographically carry out data communication.
2. a kind of encrypted transmission method of wearable device according to claim 1, it is characterised in that: synchronous described in step 1
Clear data frame include timestamp, synchronic command and verification and.
3. a kind of encrypted transmission method of wearable device according to claim 1, it is characterised in that: described to incite somebody to action in step 2
Timestamp is to return to data accepted frame to receiving end as the detailed process of the seed key of SHA1 encryption identifying algorithm
Ack msg frame, and the timestamp in synchronous clear data frame is proposed, it caches close as the seed of SHA1 encryption identifying algorithm
Key.
4. a kind of encrypted transmission method of wearable device according to claim 1, it is characterised in that: authenticated described in step 3
Data frame is the data result calculated through SHA1 Hash Encryption Algorithm.
5. according to claim 1 to a kind of any one of 4 encrypted transmission methods of wearable device, it is characterised in that: step 5
Described cryptographically to carry out data communication, including transmitting terminal to transmitting after the data encryption transmitted, receiving end is to receiving
Data be decrypted.
6. a kind of encrypted transmission method of wearable device according to claim 5, it is characterised in that: the data encryption is adopted
It is handled with the cipher mode of AES128 standard, data deciphering is handled using the manner of decryption of AES128 standard.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910424097.1A CN110177000A (en) | 2019-05-21 | 2019-05-21 | A kind of encrypted transmission method of wearable device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910424097.1A CN110177000A (en) | 2019-05-21 | 2019-05-21 | A kind of encrypted transmission method of wearable device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110177000A true CN110177000A (en) | 2019-08-27 |
Family
ID=67691768
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910424097.1A Pending CN110177000A (en) | 2019-05-21 | 2019-05-21 | A kind of encrypted transmission method of wearable device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110177000A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112199705A (en) * | 2020-10-23 | 2021-01-08 | 哈尔滨森美朴科技发展有限责任公司 | Data access method and system based on wireless perception |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105490711A (en) * | 2015-12-31 | 2016-04-13 | 福建联迪商用设备有限公司 | Bluetooth automatic connection method, master device, slave device, and system |
CN106304046A (en) * | 2015-06-01 | 2017-01-04 | 陈晓华 | To the encryption of iBeacon broadcast, the method for authentication |
CN106572427A (en) * | 2015-10-12 | 2017-04-19 | 阿里巴巴集团控股有限公司 | Establishment method and device for establishing short-range communication |
CN108768919A (en) * | 2018-03-23 | 2018-11-06 | 浙江大学 | A kind of encryption method for cyborg data transmission |
CN108810859A (en) * | 2018-05-20 | 2018-11-13 | 陈将 | A kind of Bluetooth smart watch sound control method and system based on encryption function |
-
2019
- 2019-05-21 CN CN201910424097.1A patent/CN110177000A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106304046A (en) * | 2015-06-01 | 2017-01-04 | 陈晓华 | To the encryption of iBeacon broadcast, the method for authentication |
CN106572427A (en) * | 2015-10-12 | 2017-04-19 | 阿里巴巴集团控股有限公司 | Establishment method and device for establishing short-range communication |
CN105490711A (en) * | 2015-12-31 | 2016-04-13 | 福建联迪商用设备有限公司 | Bluetooth automatic connection method, master device, slave device, and system |
CN108768919A (en) * | 2018-03-23 | 2018-11-06 | 浙江大学 | A kind of encryption method for cyborg data transmission |
CN108810859A (en) * | 2018-05-20 | 2018-11-13 | 陈将 | A kind of Bluetooth smart watch sound control method and system based on encryption function |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112199705A (en) * | 2020-10-23 | 2021-01-08 | 哈尔滨森美朴科技发展有限责任公司 | Data access method and system based on wireless perception |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106712962B (en) | Bidirectional authentication method and system for mobile RFID system | |
CN105303659B (en) | A kind of gate inhibition's personal identification method and device based on ultrasonic wave | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
TW201701599A (en) | Wireless communication | |
CN104158653A (en) | Method of secure communication based on commercial cipher algorithm | |
CN105323754B (en) | A kind of distributed method for authenticating based on wildcard | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
CN102256249A (en) | Identity authentication method and equipment applied to wireless network | |
CN101707767B (en) | Data transmission method and devices | |
CN103795728A (en) | EAP authentication method capable of hiding identities and suitable for resource-constrained terminal | |
CN103581900A (en) | Communication safety control method and device, first mobile terminal and mobile health device | |
US20070081672A1 (en) | Methods to enhance wlan security | |
CN105407109A (en) | Data secure transmission method between Bluetooth devices | |
KR101481403B1 (en) | Data certification and acquisition method for vehicle | |
CN102857503A (en) | Secure wireless transmission method for fingerprint data | |
WO2019165571A1 (en) | Method and system for transmitting data | |
CN105847001A (en) | Device, system and method for digital microwave communication based on quantum encryption | |
KR102219086B1 (en) | HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems | |
CN108155996B (en) | Smart home safe communication method based on family's channel | |
CN110177000A (en) | A kind of encrypted transmission method of wearable device | |
Mare et al. | Adapt-lite: Privacy-aware, secure, and efficient mhealth sensing | |
CN104732614A (en) | Access device for encrypting wiegand protocol signal and encryption and decryption method thereof | |
CN108540287A (en) | Internet of Things safety management encryption method | |
CN105099640A (en) | Joint time-frequency duplex shared channel characteristic obtaining method | |
CN102722668A (en) | Wireless safety computer lock and using method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190827 |
|
RJ01 | Rejection of invention patent application after publication |