CN111679865A - Wearable computer control method, wearable computer control system, storage medium and terminal - Google Patents

Wearable computer control method, wearable computer control system, storage medium and terminal Download PDF

Info

Publication number
CN111679865A
CN111679865A CN202010442535.XA CN202010442535A CN111679865A CN 111679865 A CN111679865 A CN 111679865A CN 202010442535 A CN202010442535 A CN 202010442535A CN 111679865 A CN111679865 A CN 111679865A
Authority
CN
China
Prior art keywords
data
module
wearable computer
starting
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010442535.XA
Other languages
Chinese (zh)
Inventor
马志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Polytechnic
Original Assignee
Shenzhen Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Polytechnic filed Critical Shenzhen Polytechnic
Priority to CN202010442535.XA priority Critical patent/CN111679865A/en
Publication of CN111679865A publication Critical patent/CN111679865A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/163Wearable computers, e.g. on a belt
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • G06F3/0412Digitisers structurally integrated in a display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Abstract

The invention belongs to the technical field of computers, and discloses a wearable computer control method, a wearable computer control system, a wearable computer control storage medium and a wearable computer control terminal, which comprise: the device comprises a power supply module, a touch module, a scanning module, a central control module, a starting module, a wireless network communication module, a data protection module, a data storage module and a display module. The invention ensures that the program loaded into the memory of the computer and operated is real and reliable data through the starting module, has flexible loading target and high loading success rate, and can ensure that the computer operates reliably and quickly; meanwhile, when the Data protection module modifies the memory address, for example, the type of the original Data is int, the modified Data becomes class and the Data is encrypted Data, because the encryption algorithm is confused, if the source code is cracked, no correct decryption mode which can be obtained by any memory tool exists, the Data can be directly damaged by falsely modifying the Data, and thus the Data security is ensured.

Description

Wearable computer control method, wearable computer control system, storage medium and terminal
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a wearable computer control method, a wearable computer control system, a wearable computer control storage medium and a wearable computer control terminal.
Background
Wearable computers (Wearable computers) are miniature electronic devices that can be worn on the body and moved out of the way to perform activities. The computer is composed of light equipment and watch small mechanical electronic parts, and is like a head-mounted display (HMD), so that the computer is more portable, and researches on combining clothes with the computer are carried out at present. Such technologies have been developed to support general or special purpose information technology and media development. Wearable computers are useful for applications requiring more complex computational support in addition to hardware encoded logic. The computer is commonly called computer, and is a modern electronic computing machine for high-speed computation, which can perform numerical computation, logic computation and memory function. The intelligent electronic device can be operated according to a program, and can automatically process mass data at a high speed. A computer that is composed of a hardware system and a software system and does not have any software installed is called a bare metal. The computer can be divided into a super computer, an industrial control computer, a network computer, a personal computer and an embedded computer, and more advanced computers comprise a biological computer, a photon computer, a quantum computer and the like. However, the existing wearable computer has slow starting speed and poor reliability; meanwhile, the security of the memory data is poor.
In summary, the problems of the prior art are as follows: the existing wearable computer has slow starting speed and poor reliability; meanwhile, the security of the memory data is poor.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a wearable computer control method, a wearable computer control system, a wearable computer control storage medium and a wearable computer control terminal.
The invention is realized in such a way that the wearable computer control method comprises the following steps:
firstly, a lithium battery is used for supplying power to a wearable computer through a power supply module; performing touch operation on the wearable computer by using a touch screen through a touch module; scanning the human face by using a scanning camera through a scanning module; the camera adopts an UcenteHome open source architecture for secondary development, when a user uploads a picture, picture blocks are added, attribute value assignment and connection information-based hierarchical encryption are carried out, and the average pixel value of the whole image _ id picture is calculated; generating a picture block; carrying out block encryption by judging the link value of each picture block; if the link is 3, the link represents that the person information is in a strong connection relation with the stored identity information, and the block is not encrypted; if link is 2, the link represents that the person information is in a general connection relation with the stored identity information, the block adopts a medium-level encryption algorithm, and a medium-level decryption key2 is needed for decryption; covering the encryption result into the corresponding patch _ face _ id; if the link is 1, the link represents that the person information is in a weak connection relation with the stored identity information, the block adopts a high-level encryption algorithm, and a high-level decryption key3 is required to decrypt the block during decryption; covering the encryption result into the corresponding patch _ face _ id;
secondly, the central control module starts the wearable computer by a starting program through a starting module; calculating the local link quality from the node to a neighbor node corresponding to the sliding window, and communicating the network through a wireless network communication module by using a wireless chip to perform network communication; protecting the memory data of the wearable computer by using a data protection program through a data protection module; after receiving the Hello broadcast packet from the neighbor node, the node extracts source node item information and link quality information Hello _ qos in the data packet; if the source node item is the MAC address of the node, the Hello broadcast packet is sent out by the source node, and the corresponding position of the maintained sliding window of the neighbor node is filled with 1; otherwise, the Hello packet is from other nodes, and the corresponding position of the sliding window is filled with 0; finally, counting the number of 1 and 0 in the sliding window, thereby calculating the local link quality from the node to the neighbor node corresponding to the sliding window;
thirdly, storing and encrypting the wearable computer data by using a memory through a data storage module; the encryption comprises the following steps: inputting: x, y, N are represented under two groups of radicals and under a redundancy radical Mr, M ═ (M '1, M' 2,.., M 'k) B', Mr ═ mmmmmr; and (3) outputting: r xyM-1(modN) under two sets of radicals and redundancy groups, r < (k +2x) N;
1:zi=(xi×yi)modmi;
(q1,q2,…,qk)B→(q′1,q′2,…,q′k)B′andqr;
rr=(xr×yr+qr×Nr)×Mr(modmr);
r′i=(x′i×y′i+q′i×N′i)×M′i(modm′i)(i=1,2,…,k);
z′i=(x′i×y′i)modm′i;
w′i=(z′i+q′i×N′i)modm′i;
r′i=(w′i×M′i)modm′i;
(r '1, r' 2, …, r 'k) B' → (r1, r2, …, rk) B; wherein, the first step and the third step are simple modular multiplication and modular addition operations and are executed in parallel;
and fourthly, displaying the data information of the wearable computer by using the display through the display module.
Further, the method for controlling the wearable computer by using the start program includes:
(1) storing the BIOS by a starting program in a three-redundancy FLASH storage mode, and self-loading three codes and checking when starting;
(2) detecting the environment variable parameters by adopting a triple redundancy storage mode and based on redundant BIOS loading check;
(3) performing segmented loading check on the operating system mirror image by adopting redundancy-based BIOS loading check;
(4) and (3) loading exceptions, performing a loading exception handling mechanism, and then performing the step (1).
Further, in the step (1), the master BIOS code is loaded first when the power is turned on, the other two backup codes are read after the master code is decompressed, the backup codes are compared, the code with the same check is executed when the three codes are identical or the two codes are checked to be identical, and if the three codes are not identical, the corresponding exception handling process is started.
Further, in the step (2), three identical environment variables are stored in the storage device, the BIOS performs validity detection on the master environment variable after starting, and when the three environment variables are identical or two of the environment variables are identical, the environment variables that are identical in check are adopted.
Further, in the step (3), two identical operating system images and MD5 check codes are prepared, and if the setting of the environment variable is valid, the BIOS performs segment loading on the primary operating system image to which the environment variable points; the BIOS loads each section of data of the operating system mirror image into a memory respectively, and MD5 verification is carried out while loading; and comparing the MD5 check code calculated in real time with a check code stored in advance.
Further, the method for controlling the wearable computer to protect the memory data of the wearable computer by using the data protection program comprises the following steps:
1) creating a data structure including an encryption data class and an encryption method class by a protection program;
the encrypted data class comprises the following fields:
a Data field for storing encrypted Data;
the DataType field is used for storing the unencrypted data type and restoring the data type when the encrypted data is restored;
a Key field for representing a decrypted Key;
the encryption method class includes the following methods:
an enFunc method for representing an encryption method and returning encrypted data;
deFunc means for representing the method of decryption and returning the decrypted data;
the newIndex method is used for representing the rewritten assignment statement and executing assignment operation;
the index method is used for representing the rewritten value-taking statement and executing value-taking operation;
2) confirming memory Data needing protection, writing the Data into a Data field, filling a DataType field according to the Data type, and calling an enFunc method to encrypt the Data;
3) and when the Data operation using the encrypted Data is determined, the Data field is taken out from the Data structure by using the index method, the deffunc method is called according to the Key to decrypt the Data, and the plain text result is output to finish the Data operation.
Further, if the data operation includes an assignment operation, step 3) includes: and when the assignment operation is determined, the Data field is taken out from the Data structure, the deFunc method is called according to Key to decrypt the Data, the output plaintext result and the constant are evaluated to obtain a primary result, then the enFunc method is called to encrypt the primary result, and then the newIndex method is used for executing the assignment operation.
It is another object of the present invention to provide a program storage medium for receiving user input, the stored computer program causing an electronic device to perform the steps comprising:
firstly, a lithium battery is used for supplying power to a wearable computer through a power supply module; performing touch operation on the wearable computer by using a touch screen through a touch module; scanning the human face by using a scanning camera through a scanning module;
secondly, the central control module starts the wearable computer by a starting program through a starting module; the wireless chip is connected with the network through the wireless network communication module to carry out network communication; protecting the memory data of the wearable computer by using a data protection program through a data protection module;
thirdly, storing the wearable computer data by using a memory through a data storage module;
and fourthly, displaying the data information of the wearable computer by using the display through the display module.
Another object of the present invention is to provide a wearable computer control system implementing the wearable computer control method, the wearable computer control system including:
the power supply module is connected with the central control module and used for supplying power to the wearable computer through the lithium battery;
the touch control module is connected with the central control module and is used for performing touch control operation on the wearable computer through the touch control screen;
the scanning module is connected with the central control module and is used for scanning the human face through the scanning camera;
the central control module is connected with the power supply module, the touch module, the scanning module, the starting module, the wireless network communication module, the data protection module, the data storage module and the display module and is used for controlling each module to normally work through the central processing unit;
the starting module is connected with the central control module and used for starting the wearable computer through a starting program;
the wireless network communication module is connected with the central control module and is used for connecting a network through a wireless chip to carry out network communication;
the data protection module is connected with the central control module and used for protecting the memory data of the wearable computer through a data protection program;
the data storage module is connected with the central control module and used for storing the wearable computer data through the memory;
and the display module is connected with the central control module and used for displaying the data information of the wearable computer through the display.
Another object of the present invention is to provide a terminal, which is equipped with the wearable computer control system.
The invention has the advantages and positive effects that: the invention realizes the high reliability of the data loaded by the BIOS through the starting module, and can ensure the reliable loading of the BIOS; meanwhile, the redundancy-based BIOS loading and checking mode is adopted to realize the high reliability of data of the environment variable check, the reliability and the accuracy of environment variable parameters can be ensured, and the high reliability of the data of the operation system mirror image is realized by carrying out segmented loading and checking on the operation system mirror image, so that the program loaded into the memory of the computer to run is ensured to be real and reliable data, the loading target is flexible, the loading success rate is high, and the reliable and rapid running of the computer can be ensured; meanwhile, when the Data protection module modifies the memory address, for example, the type of the original Data is int, the modified Data becomes class and the Data is encrypted Data, because the encryption algorithm is confused, if the source code is cracked, no correct decryption mode which can be obtained by any memory tool exists, the Data can be directly damaged by falsely modifying the Data, and thus the Data security is ensured.
Drawings
Fig. 1 is a schematic structural diagram of a wearable computer control system according to an embodiment of the present invention;
in the figure: 1. a power supply module; 2. a touch module; 3. a scanning module; 4. a central control module; 5. a starting module; 6. a wireless network communication module; 7. a data protection module; 8. a data storage module; 9. and a display module.
Fig. 2 is a flowchart of a wearable computer control method according to an embodiment of the present invention.
Fig. 3 is a flowchart of a starting method of a starting module according to an embodiment of the present invention.
Fig. 4 is a flowchart of a protection method of a data protection module according to an embodiment of the present invention.
Detailed Description
In order to further understand the contents, features and effects of the present invention, the following embodiments are illustrated and described in detail with reference to the accompanying drawings.
The structure of the present invention will be described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the wearable computer control system provided in the embodiment of the present invention includes: the device comprises a power supply module 1, a touch module 2, a scanning module 3, a central control module 4, a starting module 5, a wireless network communication module 6, a data protection module 7, a data storage module 8 and a display module 9.
The power supply module 1 is connected with the central control module 4 and used for supplying power to the wearable computer through the lithium battery;
the touch module 2 is connected with the central control module 4 and is used for performing touch operation on the wearable computer through the touch screen;
the scanning module 3 is connected with the central control module 4 and is used for scanning the human face through the scanning camera;
the central control module 4 is connected with the power supply module 1, the touch module 2, the scanning module 3, the starting module 5, the wireless network communication module 6, the data protection module 7, the data storage module 8 and the display module 9 and is used for controlling the normal work of each module through a central processing unit;
the starting module 5 is connected with the central control module 4 and used for starting the wearable computer through a starting program;
the wireless network communication module 6 is connected with the central control module 4 and is used for connecting a network through a wireless chip to carry out network communication;
the data protection module 7 is connected with the central control module 4 and used for protecting the memory data of the wearable computer through a data protection program;
the data storage module 8 is connected with the central control module 4 and used for storing the wearable computer data through the memory;
and the display module 9 is connected with the central control module 4 and is used for displaying the wearable computer data information through a display.
As shown in fig. 2, the wearable computer control method provided by the present invention includes the following steps:
s201: the wearable computer is powered by the lithium battery through the power supply module; performing touch operation on the wearable computer by using a touch screen through a touch module; scanning the human face by using a scanning camera through a scanning module;
s202: the central control module starts the wearable computer by a starting program through a starting module; the wireless chip is connected with the network through the wireless network communication module to carry out network communication; protecting the memory data of the wearable computer by using a data protection program through a data protection module;
s203: storing the wearable computer data by the data storage module by using the memory;
s204: and displaying the data information of the wearable computer by using the display through the display module.
The wearable computer is powered by the lithium battery through the power supply module; performing touch operation on the wearable computer by using a touch screen through a touch module; scanning the human face by using a scanning camera through a scanning module; the camera adopts an UcenteHome open source architecture for secondary development, when a user uploads a picture, picture blocks are added, attribute value assignment and connection information-based hierarchical encryption are carried out, and the average pixel value of the whole image _ id picture is calculated; generating a picture block; carrying out block encryption by judging the link value of each picture block; if the link is 3, the link represents that the person information is in a strong connection relation with the stored identity information, and the block is not encrypted; if link is 2, the link represents that the person information is in a general connection relation with the stored identity information, the block adopts a medium-level encryption algorithm, and a medium-level decryption key2 is needed for decryption; covering the encryption result into the corresponding patch _ face _ id; if the link is 1, the link represents that the person information is in a weak connection relation with the stored identity information, the block adopts a high-level encryption algorithm, and a high-level decryption key3 is required to decrypt the block during decryption; and overwrites the encrypted result in its corresponding patch _ face _ id.
The central control module of the invention starts the wearable computer by the starting module by using the starting program; calculating the local link quality from the node to a neighbor node corresponding to the sliding window, and communicating the network through a wireless network communication module by using a wireless chip to perform network communication; protecting the memory data of the wearable computer by using a data protection program through a data protection module; after receiving the Hello broadcast packet from the neighbor node, the node extracts source node item information and link quality information Hello _ qos in the data packet; if the source node item is the MAC address of the node, the Hello broadcast packet is sent out by the source node, and the corresponding position of the maintained sliding window of the neighbor node is filled with 1; otherwise, the Hello packet is from other nodes, and the corresponding position of the sliding window is filled with 0; and finally, counting the number of 1 and 0 in the sliding window, thereby calculating the local link quality from the node to the neighbor node corresponding to the sliding window.
The wearable computer data is stored and encrypted by the data storage module and the memory; the encryption comprises the following steps: inputting: x, y, N are represented under two groups of radicals and under a redundancy radical Mr, M ═ (M '1, M' 2,.., M 'k) B', Mr ═ mmmmmr; and (3) outputting: r xyM-1(modN) under two sets of radicals and redundancy groups, r < (k +2x) N;
1:zi=(xi×yi)modmi;
(q1,q2,…,qk)B→(q′1,q′2,…,q′k)B′andqr;
rr=(xr×yr+qr×Nr)×Mr(modmr);
r′i=(x′i×y′i+q′i×N′i)×M′i(modm′i)(i=1,2,…,k);
z′i=(x′i×y′i)modm′i;
w′i=(z′i+q′i×N′i)modm′i;
r′i=(w′i×M′i)modm′i;
(r '1, r' 2, …, r 'k) B' → (r1, r2, …, rk) B; wherein, the first step and the third step are simple modular multiplication and modular addition operation and are executed in parallel.
As shown in fig. 3, the starting method of the starting module 5 provided by the present invention is as follows:
s301: storing the BIOS by a starting program in a three-redundancy FLASH storage mode, and self-loading three codes and checking when starting;
s302: detecting the environment variable parameters by a triple redundancy storage mode based on redundant BIOS loading check;
s303: performing segmented loading check on the operating system mirror image by adopting redundancy-based BIOS loading check;
s304: step S303 loads an exception, performs a load exception handling mechanism, and then step S301.
In step S301 provided by the present invention, the master BIOS code is loaded first when the power is turned on, the other two backup codes are read after the master code is decompressed, and compared, when the three codes are consistent or the two codes are verified to be consistent, the code with the consistent verification is executed, and if the three codes are not consistent, the corresponding exception handling process is entered.
In step S302, three identical environment variables are stored in the storage device, the BIOS performs validity detection on the master environment variable after starting, and when the three environment variables are identical or two of the environment variables are identical, the environment variables that are identical in verification are used.
In step S303, two identical operating system images and MD5 check codes are prepared, and if the setting of the environment variable is valid, the BIOS performs a segment loading on the primary operating system image to which the environment variable points; the BIOS loads each section of data of the operating system mirror image into a memory respectively, and MD5 verification is carried out while loading; and comparing the MD5 check code calculated in real time with a check code stored in advance.
As shown in fig. 4, the protection method of the data protection module 7 provided by the present invention is as follows:
s401: creating a data structure including an encryption data class and an encryption method class by a protection program;
the encrypted data class comprises the following fields:
a Data field for storing encrypted Data;
the DataType field is used for storing the unencrypted data type and restoring the data type when the encrypted data is restored;
a Key field for representing a decrypted Key;
the encryption method class includes the following methods:
an enFunc method for representing an encryption method and returning encrypted data;
deFunc means for representing the method of decryption and returning the decrypted data;
the newIndex method is used for representing the rewritten assignment statement and executing assignment operation;
the index method is used for representing the rewritten value-taking statement and executing value-taking operation;
s402: confirming memory Data needing protection, writing the Data into a Data field, filling a DataType field according to the Data type, and calling an enFunc method to encrypt the Data;
s403: and when the Data operation using the encrypted Data is determined, the Data field is taken out from the Data structure by using the index method, the deffunc method is called according to the Key to decrypt the Data, and the plain text result is output to finish the Data operation.
If the data operation provided by the present invention includes a value assignment operation, step S403 includes: and when the assignment operation is determined, the Data field is taken out from the Data structure, the deFunc method is called according to Key to decrypt the Data, the output plaintext result and the constant are evaluated to obtain a primary result, then the enFunc method is called to encrypt the primary result, and then the newIndex method is used for executing the assignment operation.
The method in the encryption method class provided by the invention can be realized by rewriting the index and newIndex of the element table in the lua.
The method in the encryption method class provided by the invention can be realized by using a heavy load operation operator in C + + and combining with generic programming.
When the wearable computer works, firstly, the power supply module 1 supplies power to the wearable computer by utilizing the lithium battery; the wearable computer is subjected to touch operation by using the touch screen through the touch module 2; scanning the human face by using a scanning camera through a scanning module 3; secondly, the central control module 4 starts the wearable computer by a starting program through the starting module 5; the wireless chip is connected with the network through the wireless network communication module 6 to carry out network communication; protecting the memory data of the wearable computer by using a data protection program through a data protection module 7; then, the wearable computer data is stored by the data storage module 8 by using the memory; finally, the wearable computer data information is displayed by the display module 9 using the display.
It should be noted that the embodiments of the present invention can be realized by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided on a carrier medium such as a disk, CD-or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier, for example. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications, equivalent changes and modifications made to the above embodiment according to the technical spirit of the present invention are within the scope of the technical solution of the present invention.

Claims (10)

1. A wearable computer control method, comprising:
firstly, a lithium battery is used for supplying power to a wearable computer through a power supply module; performing touch operation on the wearable computer by using a touch screen through a touch module; scanning the human face by using a scanning camera through a scanning module; the camera adopts an UcenteHome open source architecture for secondary development, when a user uploads a picture, picture blocks are added, attribute value assignment and connection information-based hierarchical encryption are carried out, and the average pixel value of the whole image _ id picture is calculated; generating a picture block; carrying out block encryption by judging the link value of each picture block; if the link is 3, the link represents that the person information is in a strong connection relation with the stored identity information, and the block is not encrypted; if link is 2, the link represents that the person information is in a general connection relation with the stored identity information, the block adopts a medium-level encryption algorithm, and a medium-level decryption key2 is needed for decryption; covering the encryption result into the corresponding patch _ face _ id; if the link is 1, the link represents that the person information is in a weak connection relation with the stored identity information, the block adopts a high-level encryption algorithm, and a high-level decryption key3 is required to decrypt the block during decryption; covering the encryption result into the corresponding patch _ face _ id;
secondly, the central control module starts the wearable computer by a starting program through a starting module; calculating the local link quality from the node to a neighbor node corresponding to the sliding window, and communicating the network through a wireless network communication module by using a wireless chip to perform network communication; protecting the memory data of the wearable computer by using a data protection program through a data protection module; after receiving the Hello broadcast packet from the neighbor node, the node extracts source node item information and link quality information Hello _ qos in the data packet; if the source node item is the MAC address of the node, the Hello broadcast packet is sent out by the source node, and the corresponding position of the maintained sliding window of the neighbor node is filled with 1; otherwise, the Hello packet is from other nodes, and the corresponding position of the sliding window is filled with 0; finally, counting the number of 1 and 0 in the sliding window, thereby calculating the local link quality from the node to the neighbor node corresponding to the sliding window;
thirdly, storing and encrypting the wearable computer data by using a memory through a data storage module; the encryption comprises the following steps: inputting: x, y, N are represented under two groups of radicals and under a redundancy radical Mr, M ═ (M '1, M' 2,.., M 'k) B', Mr ═ mmmmmr; and (3) outputting: r xyM-1(modN) under two sets of radicals and redundancy groups, r < (k +2x) N;
1:zi=(xi×yi)modmi;
(q1,q2,…,qk)B→(q′1,q′2,…,q′k)B′andqr;
rr=(xr×yr+qr×Nr)×Mr(modmr);
r′i=(x′i×y′i+q′i×N′i)×M′i(modm′i)(i=1,2,…,k);
z′i=(x′i×y′i)modm′i;
w′i=(z′i+q′i×N′i)modm′i;
r′i=(w′i×M′i)modm′i;
(r '1, r' 2, …, r 'k) B' → (r1, r2, …, rk) B; wherein, the first step and the third step are simple modular multiplication and modular addition operations and are executed in parallel;
and fourthly, displaying the data information of the wearable computer by using the display through the display module.
2. The wearable computer control method according to claim 1, wherein starting the wearable computer with a start program comprises:
(1) storing the BIOS by a starting program in a three-redundancy FLASH storage mode, and self-loading three codes and checking when starting;
(2) detecting the environment variable parameters by adopting a triple redundancy storage mode and based on redundant BIOS loading check;
(3) performing segmented loading check on the operating system mirror image by adopting redundancy-based BIOS loading check;
(4) and (3) loading exceptions, performing a loading exception handling mechanism, and then performing the step (1).
3. The wearable computer control method according to claim 2, wherein in step (1), the master BIOS code is loaded first at power-on start, the master code reads the other two backup codes after self-decompression and performs comparison, when three codes are consistent or two of the codes are consistent, the code with the consistent check is executed, and if the three codes are not consistent, the corresponding exception handling process is entered.
4. The wearable computer control method according to claim 2, wherein in step (2), three identical environment variables are stored in the storage device, the BIOS performs validity check on the master environment variable after starting, and when the three environment variables are identical or two of the environment variables are identical, the environment variable with the identical check is used.
5. The wearable computer control method of claim 2, wherein in step (3), two identical operating system images and MD5 check codes are prepared, and if the setting of the environment variable is valid, the BIOS performs a segment loading on the primary operating system image pointed to by the environment variable; the BIOS loads each section of data of the operating system mirror image into a memory respectively, and MD5 verification is carried out while loading; and comparing the MD5 check code calculated in real time with a check code stored in advance.
6. The wearable computer control method according to claim 1, wherein the wearable computer control method protecting the wearable computer memory data with a data protection program comprises:
1) creating a data structure including an encryption data class and an encryption method class by a protection program;
the encrypted data class comprises the following fields:
a Data field for storing encrypted Data;
the DataType field is used for storing the unencrypted data type and restoring the data type when the encrypted data is restored;
a Key field for representing a decrypted Key;
the encryption method class includes the following methods:
an enFunc method for representing an encryption method and returning encrypted data;
deFunc means for representing the method of decryption and returning the decrypted data;
the newIndex method is used for representing the rewritten assignment statement and executing assignment operation;
the index method is used for representing the rewritten value-taking statement and executing value-taking operation;
2) confirming memory Data needing protection, writing the Data into a Data field, filling a DataType field according to the Data type, and calling an enFunc method to encrypt the Data;
3) and when the Data operation using the encrypted Data is determined, the Data field is taken out from the Data structure by using the index method, the deffunc method is called according to the Key to decrypt the Data, and the plain text result is output to finish the Data operation.
7. The wearable computer controlled method of claim 6 wherein the data operations comprise assignment operations, then step 3) comprises: and when the assignment operation is determined, the Data field is taken out from the Data structure, the deFunc method is called according to Key to decrypt the Data, the output plaintext result and the constant are evaluated to obtain a primary result, then the enFunc method is called to encrypt the primary result, and then the newIndex method is used for executing the assignment operation.
8. A program storage medium for receiving user input, the stored computer program causing an electronic device to perform the steps comprising:
firstly, a lithium battery is used for supplying power to a wearable computer through a power supply module; performing touch operation on the wearable computer by using a touch screen through a touch module; scanning the human face by using a scanning camera through a scanning module;
secondly, the central control module starts the wearable computer by a starting program through a starting module; the wireless chip is connected with the network through the wireless network communication module to carry out network communication; protecting the memory data of the wearable computer by using a data protection program through a data protection module;
thirdly, storing the wearable computer data by using a memory through a data storage module;
and fourthly, displaying the data information of the wearable computer by using the display through the display module.
9. A wearable computer control system that implements the wearable computer control method according to any one of claims 1 to 7, the wearable computer control system comprising:
the power supply module is connected with the central control module and used for supplying power to the wearable computer through the lithium battery;
the touch control module is connected with the central control module and is used for performing touch control operation on the wearable computer through the touch control screen;
the scanning module is connected with the central control module and is used for scanning the human face through the scanning camera;
the central control module is connected with the power supply module, the touch module, the scanning module, the starting module, the wireless network communication module, the data protection module, the data storage module and the display module and is used for controlling each module to normally work through the central processing unit;
the starting module is connected with the central control module and used for starting the wearable computer through a starting program;
the wireless network communication module is connected with the central control module and is used for connecting a network through a wireless chip to carry out network communication;
the data protection module is connected with the central control module and used for protecting the memory data of the wearable computer through a data protection program;
the data storage module is connected with the central control module and used for storing the wearable computer data through the memory;
and the display module is connected with the central control module and used for displaying the data information of the wearable computer through the display.
10. A terminal characterized in that it carries the wearable computer control system of claim 9.
CN202010442535.XA 2020-05-22 2020-05-22 Wearable computer control method, wearable computer control system, storage medium and terminal Pending CN111679865A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010442535.XA CN111679865A (en) 2020-05-22 2020-05-22 Wearable computer control method, wearable computer control system, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010442535.XA CN111679865A (en) 2020-05-22 2020-05-22 Wearable computer control method, wearable computer control system, storage medium and terminal

Publications (1)

Publication Number Publication Date
CN111679865A true CN111679865A (en) 2020-09-18

Family

ID=72453679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010442535.XA Pending CN111679865A (en) 2020-05-22 2020-05-22 Wearable computer control method, wearable computer control system, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN111679865A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231102A (en) * 2011-06-16 2011-11-02 天津大学 Method for processing RSA password based on residue number system and coprocessor
CN106453385A (en) * 2016-11-01 2017-02-22 西安电子科技大学 Fine-granularity face privacy protection method in social network
CN108874111A (en) * 2018-05-31 2018-11-23 维沃移动通信有限公司 A kind of battery over-discharge protection control method and mobile terminal
CN109068342A (en) * 2018-08-20 2018-12-21 河南省通信建设监理有限公司 Automatic monitoring system of mobile wireless network, monitoring method, the information processing terminal
CN109558341A (en) * 2018-11-19 2019-04-02 广州火舞软件开发股份有限公司 Calculator memory data guard method and computer
CN109933374A (en) * 2019-01-23 2019-06-25 西安微电子技术研究所 A kind of computer starting method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231102A (en) * 2011-06-16 2011-11-02 天津大学 Method for processing RSA password based on residue number system and coprocessor
CN106453385A (en) * 2016-11-01 2017-02-22 西安电子科技大学 Fine-granularity face privacy protection method in social network
CN108874111A (en) * 2018-05-31 2018-11-23 维沃移动通信有限公司 A kind of battery over-discharge protection control method and mobile terminal
CN109068342A (en) * 2018-08-20 2018-12-21 河南省通信建设监理有限公司 Automatic monitoring system of mobile wireless network, monitoring method, the information processing terminal
CN109558341A (en) * 2018-11-19 2019-04-02 广州火舞软件开发股份有限公司 Calculator memory data guard method and computer
CN109933374A (en) * 2019-01-23 2019-06-25 西安微电子技术研究所 A kind of computer starting method

Similar Documents

Publication Publication Date Title
CN109831298B (en) Method for safely updating key in block chain, node and storage medium
KR102594031B1 (en) Cryptographic ASIC for enforcing key hierarchy
US11562075B2 (en) Secure booting method, apparatus, device for embedded program, and storage medium
US9514285B2 (en) Creating stack position dependent cryptographic return address to mitigate return oriented programming attacks
US10303884B2 (en) Countersigning updates for multi-chip devices
CN100530096C (en) Method and apparatus for securely updating and boot code image
EP2367133B1 (en) Method for checking data consistency in a system on chip
CN100562859C (en) The method and apparatus of the operational scheme of test procedure
CN111898156A (en) Method, node and storage medium for realizing contract calling in block chain
US20070150755A1 (en) Microcomputer, method for writing program to microcomputer, and writing system
US20160147586A1 (en) Device and method for executing a program, and method for storing a program
CN110008715B (en) Method for realizing privacy protection in block chain, node and storage medium
CN108280035A (en) Safety guiding sequencer and secure booting apparatus
CN102347834A (en) Trusted mobile platform architecture
CN103649964A (en) Secure hosted execution architecture
CN107704730B (en) Self-encryption method for embedded software of electronic equipment
US20220405404A1 (en) Protecting cryptographic keys stored in non-volatile memory
CN210776693U (en) System on chip and electronic device
US11960608B2 (en) Fast secure booting method and system
CN111679865A (en) Wearable computer control method, wearable computer control system, storage medium and terminal
CN113542303B (en) Software importing system and method for secret key in non-trusted environment
CN109643352A (en) Across safety guidance, which updates, retains protected secret
CN112989291A (en) Decryption method, encryption method and decryption device for dynamic link library file
US20210266158A1 (en) System and method for generation of a disposable software module for cryptographic material protection
US20200076593A1 (en) Systems and methods for encryption of virtual function table pointers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination