CN110177000A - A kind of encrypted transmission method of wearable device - Google Patents

A kind of encrypted transmission method of wearable device Download PDF

Info

Publication number
CN110177000A
CN110177000A CN201910424097.1A CN201910424097A CN110177000A CN 110177000 A CN110177000 A CN 110177000A CN 201910424097 A CN201910424097 A CN 201910424097A CN 110177000 A CN110177000 A CN 110177000A
Authority
CN
China
Prior art keywords
data
transmitting terminal
receiving end
frame
wearable device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910424097.1A
Other languages
Chinese (zh)
Inventor
王志豪
尹波
蒋菡
邹立志
张新
刘扬川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201910424097.1A priority Critical patent/CN110177000A/en
Publication of CN110177000A publication Critical patent/CN110177000A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

The invention discloses a kind of encrypted transmission methods of wearable device.Transmitting terminal acquires somatic data by biological information of human body monitoring device.After the completion of acquisition, receiving end will carry out matching connection with transmitting terminal.Receiving end sends a string of plaintext synchrodata frames to transmitting terminal at this time, after transmitting terminal receives clear data, it will timestamp is made seed key, calculated result is obtained using SHA1 Encryption Algorithm and returns to ACK to receiving end.Receiving end is calculated with SHA1 Encryption Algorithm, and sends the result to transmitting terminal.The calculated result received is compared transmitting terminal with itself seed key, judges whether to authenticate successfully.After authenticating successfully, carry out data transmission, transmitting terminal all carries out data encryption to the data transmitted with the cipher mode of AES128 encryption standard, guarantees the safety of data transmission.Receiving end equally carries out data receiver with the manner of decryption of AES128 encryption standard.By the above-mentioned means, the present invention can guarantee data transmission security, the leakage of user information is taken precautions against, is capable of the information security of effective guarantee user.

Description

A kind of encrypted transmission method of wearable device
Technical field
The present invention relates to the technical field of data transmission of wearable device, in particular to a kind of Data Encryption Transmission Method.
Background technique
The main mode to be used of wireless communication has at present: WLAN (wireless fidelity), broader bandwidth but Power consumption is higher;Infrared data transmission technology (Infrared Data Association, IrDA), although there is faster transmission speed Rate, lower power consumption, but its transmission range is shorter, and between two device locations communicated using the technology It must be aligned, centre cannot have obstacle;ZigBee technology low rate, low-power consumption, low cost and short distance, but cannot directly with Android terminal interacts;Ultra wide band (Ultra WideBand, UWB) technology, although its transmission rate is high, its biography Defeated distance is shorter and power consumption is higher;Bluetooth low energy consumption (Bluetooth Low Energy, BLE) is low in energy consumption, connection is quick, can It is strong by property, transmission range is long.
Therefore Bluetooth transmission is widely used.Existing Bluetooth data transfer is unencryption.Do not add largely The Bluetooth communication equipment of close certification and encrypted data transmission is easily cracked, if wearable medical monitoring equipment uses unencryption Bluetooth communication, be likely to result in the leakage of data, cannot be ensured even with the life security of person.
Summary of the invention
Present invention seek to address that the above problem of the prior art.The present invention provides a kind of encrypted transmission side of wearable device Method, it is intended to which the leakage of user information is taken precautions against in the safety of lifting means, ensures the information security of user.
To realize the above-mentioned technical purpose, the technical scheme adopted by the invention is as follows:
Step 1: transmitting terminal acquires somatic data by biological information of human body monitoring device.After the completion of acquisition, receiving end will Matching connection is carried out with transmitting terminal.After receiving end is connect with transmitting terminal, receiving end is to a string of transmission synchronous clear data frames, data Contained in frame timestamp, synchronic command, verification and.
Step 2: after transmitting terminal receives synchronous clear data frame, timestamp is close as the seed of SHA1 encryption identifying algorithm Key.
Step 3: after receiving end receives the ack msg frame of transmitting terminal, then sending a frame authentication data frame.
Step 4: transmitting terminal will receive authentication data frame, carry out SHA1 with the timestamp of own cache is made seed key The calculated result of Encryption Algorithm compares, if result is identical, certification passes through, otherwise the ack msg frame that return authentication passes through is recognized Card failure, disconnects bluetooth connection.
Step 5: transmitting terminal and receiving end cryptographically carry out data communication.The data that cryptographically carry out are led to News, including transmitting terminal to transmitting after the data encryption transmitted, the data received are decrypted in receiving end.
Specifically, in step 2, after transmitting terminal receives synchronous clear data frame, data accepted frame is returned to receiving end Ack msg frame, and the timestamp in synchronous clear data frame is proposed, it caches close as the seed of SHA1 encryption identifying algorithm Key.Data encryption is handled using the cipher mode of AES128 standard, and data deciphering uses the manner of decryption of AES128 standard It is handled.
Further, authentication data frame described in step 3 is the data result calculated through SHA1 Hash Encryption Algorithm.
After the encrypted post-processing of data that bluetooth is sent, it can guarantee the safety of bluetooth equipment transmission data, take precautions against user The information security of effective guarantee user is capable of in the leakage of information.
This method completes verification process using bluetooth connection, and the energy consumption that can play the role of transmission process is few, low delay.
This method can guarantee the real-time and accuracy of transmission process using timestamp as seed key.
Detailed description of the invention
Fig. 1 is the flow diagram of invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, detailed Carefully describe.Described embodiment is only a part of the embodiments of the present invention.
Referring to Fig. 1, the method for the present invention includes the following steps:
Step 1: transmitting terminal (wearable device) acquires somatic data by biological information of human body monitoring device.Acquisition is completed Afterwards, receiving end will carry out matching connection with transmitting terminal.After receiving end is connect with transmitting terminal, receiving end synchronizes in plain text to a string of transmission Data frame, contain in data frame timestamp, synchronic command, verification and.
Step 2: transmitting terminal is received with step number in plain text according to frame, returns to ACK to receiving end, and timestamp is proposed, caching is made For the seed key for encrypting identifying algorithm.
Step 3: receiving end receives ACK, sends the data encryption that a frame is calculated through SHA1 Hash Encryption Algorithm to transmitting terminal As a result authentication data frame.
Step 4: transmitting terminal receives authentication data frame, carries out SHA1 Encryption Algorithm calculated result ratio with the seed key of itself Right, if result is identical, certification passes through, the ack msg frame that return authentication passes through, otherwise authentification failure, disconnects bluetooth connection.
Step 5: receiving end receives the successful ack msg frame of certification, starts data transmission.
Step 6: transmitting terminal encrypts the data of acquisition with the cipher mode of AES128 encryption standard.
Step 7: encrypted data is sent to receiving end by transmitting terminal.
Step 8: the encryption data received is decrypted with the manner of decryption of AES128 encryption standard for receiving end.
Step 9: converting figure in android terminal for the data of decryption and show.
The above is only the preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-described embodiment, All technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art For those of ordinary skill, several improvements and modifications without departing from the principles of the present invention should be regarded as protection of the invention Range.

Claims (6)

1. a kind of encrypted transmission method of wearable device, which comprises the following steps:
Step 1: after receiving end is connect with transmitting terminal, receiving end is to a string of transmission synchronous clear data frames;
Step 2: after transmitting terminal receives synchronous clear data frame, using timestamp as the seed key of SHA1 encryption identifying algorithm;
Step 3: after receiving end receives the ack msg frame of transmitting terminal, then sending a frame authentication data frame;
Step 4: transmitting terminal will receive authentication data frame, carry out SHA1 encryption with the timestamp of own cache is made seed key The calculated result of algorithm compares, if result is identical, certification passes through, the ack msg frame that return authentication passes through, and otherwise certification is lost It loses, disconnects bluetooth connection;
Step 5: transmitting terminal and receiving end cryptographically carry out data communication.
2. a kind of encrypted transmission method of wearable device according to claim 1, it is characterised in that: synchronous described in step 1 Clear data frame include timestamp, synchronic command and verification and.
3. a kind of encrypted transmission method of wearable device according to claim 1, it is characterised in that: described to incite somebody to action in step 2 Timestamp is to return to data accepted frame to receiving end as the detailed process of the seed key of SHA1 encryption identifying algorithm Ack msg frame, and the timestamp in synchronous clear data frame is proposed, it caches close as the seed of SHA1 encryption identifying algorithm Key.
4. a kind of encrypted transmission method of wearable device according to claim 1, it is characterised in that: authenticated described in step 3 Data frame is the data result calculated through SHA1 Hash Encryption Algorithm.
5. according to claim 1 to a kind of any one of 4 encrypted transmission methods of wearable device, it is characterised in that: step 5 Described cryptographically to carry out data communication, including transmitting terminal to transmitting after the data encryption transmitted, receiving end is to receiving Data be decrypted.
6. a kind of encrypted transmission method of wearable device according to claim 5, it is characterised in that: the data encryption is adopted It is handled with the cipher mode of AES128 standard, data deciphering is handled using the manner of decryption of AES128 standard.
CN201910424097.1A 2019-05-21 2019-05-21 A kind of encrypted transmission method of wearable device Pending CN110177000A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910424097.1A CN110177000A (en) 2019-05-21 2019-05-21 A kind of encrypted transmission method of wearable device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910424097.1A CN110177000A (en) 2019-05-21 2019-05-21 A kind of encrypted transmission method of wearable device

Publications (1)

Publication Number Publication Date
CN110177000A true CN110177000A (en) 2019-08-27

Family

ID=67691768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910424097.1A Pending CN110177000A (en) 2019-05-21 2019-05-21 A kind of encrypted transmission method of wearable device

Country Status (1)

Country Link
CN (1) CN110177000A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199705A (en) * 2020-10-23 2021-01-08 哈尔滨森美朴科技发展有限责任公司 Data access method and system based on wireless perception

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490711A (en) * 2015-12-31 2016-04-13 福建联迪商用设备有限公司 Bluetooth automatic connection method, master device, slave device, and system
CN106304046A (en) * 2015-06-01 2017-01-04 陈晓华 To the encryption of iBeacon broadcast, the method for authentication
CN106572427A (en) * 2015-10-12 2017-04-19 阿里巴巴集团控股有限公司 Establishment method and device for establishing short-range communication
CN108768919A (en) * 2018-03-23 2018-11-06 浙江大学 A kind of encryption method for cyborg data transmission
CN108810859A (en) * 2018-05-20 2018-11-13 陈将 A kind of Bluetooth smart watch sound control method and system based on encryption function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106304046A (en) * 2015-06-01 2017-01-04 陈晓华 To the encryption of iBeacon broadcast, the method for authentication
CN106572427A (en) * 2015-10-12 2017-04-19 阿里巴巴集团控股有限公司 Establishment method and device for establishing short-range communication
CN105490711A (en) * 2015-12-31 2016-04-13 福建联迪商用设备有限公司 Bluetooth automatic connection method, master device, slave device, and system
CN108768919A (en) * 2018-03-23 2018-11-06 浙江大学 A kind of encryption method for cyborg data transmission
CN108810859A (en) * 2018-05-20 2018-11-13 陈将 A kind of Bluetooth smart watch sound control method and system based on encryption function

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199705A (en) * 2020-10-23 2021-01-08 哈尔滨森美朴科技发展有限责任公司 Data access method and system based on wireless perception

Similar Documents

Publication Publication Date Title
CN106712962B (en) Bidirectional authentication method and system for mobile RFID system
CN105303659B (en) A kind of gate inhibition's personal identification method and device based on ultrasonic wave
CN105162599B (en) A kind of data transmission system and its transmission method
TW201701599A (en) Wireless communication
CN104158653A (en) Method of secure communication based on commercial cipher algorithm
CN105323754B (en) A kind of distributed method for authenticating based on wildcard
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN102256249A (en) Identity authentication method and equipment applied to wireless network
CN101707767B (en) Data transmission method and devices
CN103795728A (en) EAP authentication method capable of hiding identities and suitable for resource-constrained terminal
CN103581900A (en) Communication safety control method and device, first mobile terminal and mobile health device
US20070081672A1 (en) Methods to enhance wlan security
CN105407109A (en) Data secure transmission method between Bluetooth devices
KR101481403B1 (en) Data certification and acquisition method for vehicle
CN102857503A (en) Secure wireless transmission method for fingerprint data
WO2019165571A1 (en) Method and system for transmitting data
CN105847001A (en) Device, system and method for digital microwave communication based on quantum encryption
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN108155996B (en) Smart home safe communication method based on family's channel
CN110177000A (en) A kind of encrypted transmission method of wearable device
Mare et al. Adapt-lite: Privacy-aware, secure, and efficient mhealth sensing
CN104732614A (en) Access device for encrypting wiegand protocol signal and encryption and decryption method thereof
CN108540287A (en) Internet of Things safety management encryption method
CN105099640A (en) Joint time-frequency duplex shared channel characteristic obtaining method
CN102722668A (en) Wireless safety computer lock and using method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190827

RJ01 Rejection of invention patent application after publication