CN110177000A - A kind of encrypted transmission method of wearable device - Google Patents

A kind of encrypted transmission method of wearable device Download PDF

Info

Publication number
CN110177000A
CN110177000A CN201910424097.1A CN201910424097A CN110177000A CN 110177000 A CN110177000 A CN 110177000A CN 201910424097 A CN201910424097 A CN 201910424097A CN 110177000 A CN110177000 A CN 110177000A
Authority
CN
China
Prior art keywords
data
authentication
data frame
receiving end
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910424097.1A
Other languages
Chinese (zh)
Inventor
王志豪
尹波
蒋菡
邹立志
张新
刘扬川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201910424097.1A priority Critical patent/CN110177000A/en
Publication of CN110177000A publication Critical patent/CN110177000A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Measuring And Recording Apparatus For Diagnosis (AREA)

Abstract

本发明公开了一种可穿戴设备的加密传输方法。发射端通过人体生物信息监测设备采集人体数据。采集完成后,接收端将与发射端进行匹配连接。此时接收端向发射端发送一串明文同步数据帧,发射端接收明文数据后,将会把时间戳作种子密钥,使用SHA1加密算法得到计算结果并向接收端返回ACK。接收端用SHA1加密算法计算,并把结果发送给发射端。发射端将收到的计算结果与自身种子密钥进行比对,判断是否认证成功。认证成功后,进行数据传输,发射端对所传输的数据皆以AES128加密标准的加密方式进行数据加密,保证数据传输的安全性。接收端同样以AES128加密标准的解密方式进行数据接收。通过上述方式,本发明能保证数据传输安全性,防范用户信息的泄露,能够有效保障使用者的信息安全。

The invention discloses an encrypted transmission method of a wearable device. The transmitter collects human body data through human body biological information monitoring equipment. After the acquisition is completed, the receiving end will make a matching connection with the transmitting end. At this time, the receiving end sends a series of plaintext synchronization data frames to the transmitting end. After receiving the plaintext data, the transmitting end will use the timestamp as the seed key, use the SHA1 encryption algorithm to obtain the calculation result, and return an ACK to the receiving end. The receiver calculates with the SHA1 encryption algorithm and sends the result to the transmitter. The transmitter compares the received calculation result with its own seed key to determine whether the authentication is successful. After the authentication is successful, the data transmission is carried out, and the transmitting end encrypts the transmitted data with the encryption method of the AES128 encryption standard to ensure the security of the data transmission. The receiving end also uses the decryption method of the AES128 encryption standard to receive data. Through the above method, the present invention can ensure the security of data transmission, prevent leakage of user information, and effectively guarantee the security of user information.

Description

一种可穿戴设备的加密传输方法A kind of encrypted transmission method of wearable device

技术领域technical field

本发明涉及可穿戴设备的数据传输技术领域,具体而言,涉及一种数据加密传输方法。The present invention relates to the technical field of data transmission of wearable devices, in particular to a data encryption transmission method.

背景技术Background technique

目前无线通信主要使用的方式有:无线局域网(wireless fidelity),带宽较宽但功耗较高;红外数据传输技术(Infrared Data Association,IrDA),虽然有较快的传输速率,较低的功率消耗,但是其传输距离较短,而且使用该技术进行通信的两个设备位置之间必须对准,中间不能有阻挡物;ZigBee技术低速率、低功耗、低成本和短距离,但不能直接与安卓终端进行交互;超宽带(Ultra WideBand,UWB)技术,虽然它的传输速率高,但是它的传输距离较短而且功耗较高;蓝牙低能耗(Bluetooth Low Energy,BLE)功耗低、连接快速、可靠性强、传输距离长。At present, the main methods of wireless communication are: wireless local area network (wireless fidelity), which has wide bandwidth but high power consumption; infrared data transmission technology (Infrared Data Association, IrDA), although it has a faster transmission rate and lower power consumption , but its transmission distance is short, and the positions of two devices using this technology for communication must be aligned, and there must be no obstacles in the middle; ZigBee technology has low speed, low power consumption, low cost and short distance, but it cannot directly communicate with Android terminal to interact; Ultra Wideband (UWB) technology, although its transmission rate is high, but its transmission distance is short and power consumption is high; Bluetooth Low Energy (Bluetooth Low Energy, BLE) has low power consumption, connection Fast, reliable, long transmission distance.

因此蓝牙传输得到了广泛的应用。现有的蓝牙数据传输均是未加密的。大量未加密认证及加密数据传输的蓝牙通信设备极易被破解,如果可穿戴医疗监测设备使用未加密的蓝牙通讯,可能会造成数据的泄漏,甚至使用者的生命安全将得不到保障。Therefore, Bluetooth transmission has been widely used. Existing Bluetooth data transmissions are unencrypted. A large number of Bluetooth communication devices with unencrypted authentication and encrypted data transmission are easily cracked. If wearable medical monitoring devices use unencrypted Bluetooth communication, data leakage may be caused, and even the lives of users will not be guaranteed.

发明内容Contents of the invention

本发明旨在解决以上现有技术的问题。本发明提供一种可穿戴设备的加密传输方法,旨在提升设备的安全性,防范用户信息的泄露,保障用户的信息安全。The present invention aims to solve the above problems of the prior art. The invention provides an encrypted transmission method of a wearable device, which aims to improve the security of the device, prevent the leakage of user information, and ensure the security of the user's information.

为实现上述技术目的,本发明采取的技术方案为:For realizing above-mentioned technical purpose, the technical scheme that the present invention takes is:

步骤1:发射端通过人体生物信息监测设备采集人体数据。采集完成后,接收端将与发射端进行匹配连接。接收端与发送端连接后,接收端向发送一串同步明文数据帧,数据帧中包含了时间戳、同步指令、校验和。Step 1: The transmitter collects human body data through human body biological information monitoring equipment. After the acquisition is completed, the receiving end will make a matching connection with the transmitting end. After the receiving end is connected to the sending end, the receiving end sends a series of synchronous plaintext data frames, which contain timestamps, synchronization instructions, and checksums.

步骤2:发送端接收同步明文数据帧后,将时间戳作为SHA1加密认证算法的种子密钥。Step 2: After receiving the synchronous plaintext data frame, the sender uses the timestamp as the seed key of the SHA1 encryption authentication algorithm.

步骤3:当接收端收到发送端的ACK数据帧之后,则发送一帧认证数据帧。Step 3: After receiving the ACK data frame from the sender, the receiver sends an authentication data frame.

步骤4:发送端将接收到认证数据帧,与将自身缓存的时间戳作种子密钥进行SHA1加密算法的计算结果比对,如果结果相同,则认证通过,返回认证通过的ACK数据帧,否则认证失败,断开蓝牙连接。Step 4: The sender will receive the authentication data frame and compare it with the calculation result of the SHA1 encryption algorithm using the cached timestamp as the seed key. If the result is the same, the authentication is passed, and the ACK data frame of the authentication is returned, otherwise Authentication failed, disconnect the Bluetooth connection.

步骤5:发送端与接收端以加密方式进行数据通讯。所述以加密方式进行数据通讯,包括发送端对进行传输的数据加密后传输,接收端对收到的数据进行解密。Step 5: The sending end and the receiving end conduct data communication in an encrypted manner. The data communication in an encrypted manner includes that the transmitting end encrypts the transmitted data before transmitting, and the receiving end decrypts the received data.

具体地,步骤2中,发送端接收同步明文数据帧后,向接收端返回已接收数据帧的ACK数据帧,并将同步明文数据帧中的时间戳提出,缓存作为SHA1加密认证算法的种子密钥。数据加密采用AES128标准的加密方式进行处理,数据解密采用AES128标准的解密方式进行处理。Specifically, in step 2, after receiving the synchronous plaintext data frame, the sending end returns the ACK data frame of the received data frame to the receiving end, and proposes the time stamp in the synchronous plaintext data frame, and caches it as the seed key of the SHA1 encryption authentication algorithm. key. Data encryption is processed by AES128 standard encryption method, and data decryption is processed by AES128 standard decryption method.

进一步,步骤3所述认证数据帧为经SHA1哈希加密算法计算的数据结果。Further, the authentication data frame in step 3 is the data result calculated by the SHA1 hash encryption algorithm.

蓝牙发送的数据经加密后处理后,能保证蓝牙设备传输数据的安全性,防范用户信息的泄露,能够有效保障使用者的信息安全。After the data sent by Bluetooth is encrypted and processed, it can ensure the security of the data transmitted by the Bluetooth device, prevent the leakage of user information, and effectively protect the user's information security.

本方法使用蓝牙连接完成认证过程,能起到传输过程的耗能少,低延时的作用。The method uses the bluetooth connection to complete the authentication process, and can play the role of less energy consumption and low delay in the transmission process.

本方法将时间戳作为种子密钥,能保证传输过程的实时性和准确性。This method uses the time stamp as the seed key, which can ensure the real-time and accuracy of the transmission process.

附图说明Description of drawings

图1是本发明本发明的流程示意图。Fig. 1 is a schematic flow chart of the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、详细地描述。所描述的实施例仅仅是本发明的一部分实施例。The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

参见图1,本发明的方法包括以下步骤:Referring to Fig. 1, method of the present invention comprises the following steps:

步骤1:发射端(可穿戴设备)通过人体生物信息监测设备采集人体数据。采集完成后,接收端将与发射端进行匹配连接。接收端与发送端连接后,接收端向发送一串同步明文数据帧,数据帧中包含了时间戳、同步指令、校验和。Step 1: The transmitter (wearable device) collects human body data through the human body biological information monitoring device. After the acquisition is completed, the receiving end will make a matching connection with the transmitting end. After the receiving end is connected to the sending end, the receiving end sends a series of synchronous plaintext data frames, which contain timestamps, synchronization instructions, and checksums.

步骤2:发送端接收同步数明文据帧,向接收端返回ACK,并将时间戳提出,缓存作为加密认证算法的种子密钥。Step 2: The sender receives the synchronization number plaintext data frame, returns ACK to the receiver, and puts forward the timestamp, which is cached as the seed key of the encryption authentication algorithm.

步骤3:接收端收到ACK,向发送端发送一帧经SHA1哈希加密算法计算的数据加密结果的认证数据帧。Step 3: The receiving end receives the ACK, and sends an authentication data frame of the data encryption result calculated by the SHA1 hash encryption algorithm to the sending end.

步骤4:发送端收到认证数据帧,与自身的种子密钥进行SHA1加密算法计算结果比对,如果结果相同,则认证通过,返回认证通过的ACK数据帧,否则认证失败,断开蓝牙连接。Step 4: The sender receives the authentication data frame and compares the calculation result of the SHA1 encryption algorithm with its own seed key. If the result is the same, the authentication is passed and the ACK data frame of the authentication is returned, otherwise the authentication fails and the Bluetooth connection is disconnected. .

步骤5:接收端收到认证成功的ACK数据帧,开始数据传输。Step 5: The receiving end receives the ACK data frame of successful authentication and starts data transmission.

步骤6:发送端将采集的数据以AES128加密标准的加密方式进行加密。Step 6: The sending end encrypts the collected data with the encryption method of the AES128 encryption standard.

步骤7:发送端将加密后数据发送给接收端。Step 7: The sender sends the encrypted data to the receiver.

步骤8:接收端将收到的加密数据以AES128加密标准的解密方式进行解密。Step 8: The receiving end decrypts the received encrypted data with the decryption method of the AES128 encryption standard.

步骤9:将解密的数据转化为图形在安卓终端上显示。Step 9: convert the decrypted data into graphics and display it on the Android terminal.

以上仅是本发明的优选实施方式,本发明的保护范围并不仅局限于上述实施例,凡属于本发明思路下的技术方案均属于本发明的保护范围。应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理前提下的若干改进和润饰,应视为本发明的保护范围。The above are only preferred implementations of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions under the idea of the present invention belong to the protection scope of the present invention. It should be pointed out that for those skilled in the art, some improvements and modifications without departing from the principle of the present invention should be regarded as the protection scope of the present invention.

Claims (6)

1.一种可穿戴设备的加密传输方法,其特征在于,包括以下步骤:1. An encrypted transmission method for a wearable device, comprising the following steps: 步骤1:接收端与发送端连接后,接收端向发送一串同步明文数据帧;Step 1: After the receiving end is connected to the sending end, the receiving end sends a series of synchronous plaintext data frames to the 步骤2:发送端接收同步明文数据帧后,将时间戳作为SHA1加密认证算法的种子密钥;Step 2: After receiving the synchronous plaintext data frame, the sender uses the timestamp as the seed key of the SHA1 encryption authentication algorithm; 步骤3:当接收端收到发送端的ACK数据帧之后,则发送一帧认证数据帧;Step 3: After the receiving end receives the ACK data frame from the sending end, it sends an authentication data frame; 步骤4:发送端将接收到认证数据帧,与将自身缓存的时间戳作种子密钥进行SHA1加密算法的计算结果比对,如果结果相同,则认证通过,返回认证通过的ACK数据帧,否则认证失败,断开蓝牙连接;Step 4: The sender will receive the authentication data frame and compare it with the calculation result of the SHA1 encryption algorithm using the cached timestamp as the seed key. If the result is the same, the authentication is passed, and the ACK data frame of the authentication is returned, otherwise Authentication failed, disconnect the Bluetooth connection; 步骤5:发送端与接收端以加密方式进行数据通讯。Step 5: The sending end and the receiving end conduct data communication in an encrypted manner. 2.根据权利要求1所述一种可穿戴设备的加密传输方法,其特征在于:步骤1所述同步明文数据帧包括时间戳、同步指令以及校验和。2. An encrypted transmission method for a wearable device according to claim 1, characterized in that: the synchronization plaintext data frame in step 1 includes a timestamp, a synchronization instruction and a checksum. 3.根据权利要求1所述一种可穿戴设备的加密传输方法,其特征在于:步骤2中,所述将时间戳作为SHA1加密认证算法的种子密钥的具体过程为,向接收端返回已接收数据帧的ACK数据帧,并将同步明文数据帧中的时间戳提出,缓存作为SHA1加密认证算法的种子密钥。3. An encrypted transmission method for a wearable device according to claim 1, characterized in that: in step 2, the specific process of using the timestamp as the seed key of the SHA1 encryption authentication algorithm is to return the received key to the receiving end Receive the ACK data frame of the data frame, and propose the timestamp in the synchronous plaintext data frame, and cache it as the seed key of the SHA1 encryption authentication algorithm. 4.根据权利要求1所述一种可穿戴设备的加密传输方法,其特征在于:步骤3所述认证数据帧为经SHA1哈希加密算法计算的数据结果。4. An encrypted transmission method for a wearable device according to claim 1, wherein the authentication data frame in step 3 is a data result calculated by the SHA1 hash encryption algorithm. 5.根据权利要求1到4任一项所述一种可穿戴设备的加密传输方法,其特征在于:步骤5所述以加密方式进行数据通讯,包括发送端对进行传输的数据加密后传输,接收端对收到的数据进行解密。5. An encrypted transmission method for a wearable device according to any one of claims 1 to 4, characterized in that: performing data communication in an encrypted manner as described in step 5, including that the transmitting end encrypts the transmitted data before transmitting, The receiving end decrypts the received data. 6.根据权利要求5所述一种可穿戴设备的加密传输方法,其特征在于:所述数据加密采用AES128标准的加密方式进行处理,数据解密采用AES128标准的解密方式进行处理。6 . The encrypted transmission method of a wearable device according to claim 5 , wherein the data encryption is processed by an encryption method of the AES128 standard, and the data decryption is processed by a decryption method of the AES128 standard. 7 .
CN201910424097.1A 2019-05-21 2019-05-21 A kind of encrypted transmission method of wearable device Pending CN110177000A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910424097.1A CN110177000A (en) 2019-05-21 2019-05-21 A kind of encrypted transmission method of wearable device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910424097.1A CN110177000A (en) 2019-05-21 2019-05-21 A kind of encrypted transmission method of wearable device

Publications (1)

Publication Number Publication Date
CN110177000A true CN110177000A (en) 2019-08-27

Family

ID=67691768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910424097.1A Pending CN110177000A (en) 2019-05-21 2019-05-21 A kind of encrypted transmission method of wearable device

Country Status (1)

Country Link
CN (1) CN110177000A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199705A (en) * 2020-10-23 2021-01-08 哈尔滨森美朴科技发展有限责任公司 Data access method and system based on wireless perception

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490711A (en) * 2015-12-31 2016-04-13 福建联迪商用设备有限公司 Bluetooth automatic connection method, master device, slave device, and system
CN106304046A (en) * 2015-06-01 2017-01-04 陈晓华 To the encryption of iBeacon broadcast, the method for authentication
CN106572427A (en) * 2015-10-12 2017-04-19 阿里巴巴集团控股有限公司 Establishment method and device for establishing short-range communication
CN108768919A (en) * 2018-03-23 2018-11-06 浙江大学 A kind of encryption method for cyborg data transmission
CN108810859A (en) * 2018-05-20 2018-11-13 陈将 A kind of Bluetooth smart watch sound control method and system based on encryption function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106304046A (en) * 2015-06-01 2017-01-04 陈晓华 To the encryption of iBeacon broadcast, the method for authentication
CN106572427A (en) * 2015-10-12 2017-04-19 阿里巴巴集团控股有限公司 Establishment method and device for establishing short-range communication
CN105490711A (en) * 2015-12-31 2016-04-13 福建联迪商用设备有限公司 Bluetooth automatic connection method, master device, slave device, and system
CN108768919A (en) * 2018-03-23 2018-11-06 浙江大学 A kind of encryption method for cyborg data transmission
CN108810859A (en) * 2018-05-20 2018-11-13 陈将 A kind of Bluetooth smart watch sound control method and system based on encryption function

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199705A (en) * 2020-10-23 2021-01-08 哈尔滨森美朴科技发展有限责任公司 Data access method and system based on wireless perception

Similar Documents

Publication Publication Date Title
CN110572828B (en) Internet of Things security authentication method, system and terminal based on national secret algorithm
EP4149157A3 (en) Method and apparatus for wireless communication in wireless communication system
AR068582A1 (en) METHOD AND APPLIANCE FOR GENERATING RADIO CONTROL PROTOCOL DATA UNITS LINK
CN101707767B (en) Data transmission method and devices
CN107147666A (en) The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform
CN103457722A (en) Bidirectional identity authentication and data safety transmission providing body area network safety method based on Shamir threshold
MX2007003452A (en) Method and apparatus for encryption of over-the-air communications in a wireless communication system.
CN103000181A (en) System and implement method thereof for secret communications based on public communication network voice channel
CN107148015A (en) A Continuous Encryption Physical Layer Security Transmission Method Based on Polar Code Construction
CN104717074A (en) Shared key security communication method for fusing private information
CN108616357A (en) A method of being suitable for key management and the Fast synchronization of quantum key distribution system
CN107947925A (en) A kind of quantum key encryption system and control method suitable for longitudinal difference protection
CN103561023A (en) Method and device for sending and receiving communication information
CN105847001A (en) Device, system and method for digital microwave communication based on quantum encryption
CN110177000A (en) A kind of encrypted transmission method of wearable device
TWI728333B (en) Data transmission method and system between sensor and electronic device
CN104732614A (en) Access device for encrypting wiegand protocol signal and encryption and decryption method thereof
CN104158629A (en) Distributed new energy running data encryption, compression and transmission method based on LZW (Lempel-Ziv-Welch) algorithm
GB2529342A (en) Method and system for exchanging encrypted messages between computing devices in a communication network
CN104683976A (en) Message sending and receiving methods
CN116743505B (en) Safety transmission encryption method based on national secret
CN104618355B (en) A kind of safety storage and the method for transmission data
CN106604275B (en) Information transmission encryption and decryption method and system based on mobile internet
CN113890890B (en) Efficient data management method applied to intelligent medical system
CN109410394A (en) A kind of method for sending information and information transmitting system of intelligent door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190827