CN115277194A - Product authentication method, wearable device, watchband and storage medium - Google Patents

Product authentication method, wearable device, watchband and storage medium Download PDF

Info

Publication number
CN115277194A
CN115277194A CN202210891356.3A CN202210891356A CN115277194A CN 115277194 A CN115277194 A CN 115277194A CN 202210891356 A CN202210891356 A CN 202210891356A CN 115277194 A CN115277194 A CN 115277194A
Authority
CN
China
Prior art keywords
watchband
authentication
data
wearable device
root key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210891356.3A
Other languages
Chinese (zh)
Inventor
李奇
李信超
顾延帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goertek Techology Co Ltd
Original Assignee
Goertek Techology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goertek Techology Co Ltd filed Critical Goertek Techology Co Ltd
Priority to CN202210891356.3A priority Critical patent/CN115277194A/en
Publication of CN115277194A publication Critical patent/CN115277194A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Abstract

The application discloses a product authentication method, wearable equipment, a watchband and a storage medium, wherein the method is applied to a wearable equipment main body, and the product authentication method comprises the following steps: detecting the access of a watchband, and sending root key configuration data to the watchband; receiving first authentication data sent by a watchband, wherein the first authentication data is obtained by the watchband through calculation based on the root key configuration data; and acquiring second authentication data, and if the first authentication data is the same as the second authentication data, determining that the watchband passes anti-counterfeiting authentication. This application carries out data coprocessing through watchband and wearing equipment main part to the realization is to the anti-fake authentication of watchband, makes intelligence dress type product and watchband possess anti-fake function, and then improves the equipment data security of intelligence dress type product.

Description

Product authentication method, wearable device, watchband and storage medium
Technical Field
The present application relates to the field of wearable devices, and in particular, to a product authentication method, a wearable device, a watch band, and a storage medium.
Background
Along with the rapid development of intelligent wearing class product, intelligent wrist-watch, intelligent bracelet etc. are popularized.
In order to meet the individual requirements of different user groups, the intelligent wearable product needs different matched watchband accessories so that the users can match according to their own preferences. At present, intelligent wearing class product and watchband do not possess anti-fake function, and this makes the equipment data security of intelligent wearing class product lower.
Disclosure of Invention
In view of this, the present application provides a product authentication method, a wearable device, a watchband, and a storage medium, and aims to improve device data security of an intelligent wearable product.
In order to achieve the above object, the present application provides a product authentication method applied to a wearable device main body, the product authentication method including the steps of:
detecting the access of a watchband, and sending root key configuration data to the watchband;
receiving first authentication data sent by a watchband, wherein the first authentication data is obtained by the watchband through calculation based on the root key configuration data;
and acquiring second authentication data, and if the first authentication data is the same as the second authentication data, determining that the watchband passes anti-counterfeiting authentication.
Illustratively, the obtaining the second authentication data includes:
acquiring a first graph key and generating random data; wherein the first graph key corresponds to the root key configuration data;
and carrying out hash operation on the first graph key and the random data to obtain second authentication data.
Illustratively, after determining that the watchband passes the anti-counterfeiting authentication, the method includes:
reading configuration information in the watchband;
and switching the working mode to the working mode corresponding to the configuration information so that the wearable device main body works in the switched working mode.
In order to achieve the above object, the present application further provides a product authentication method applied to a watchband, the method including the steps of:
receiving root key configuration data sent by a wearable device main body;
calculating the root key configuration data to obtain first authentication data;
and sending the first authentication data to the wearable device main body so that the wearable device main body authenticates the watchband.
For example, the operating the root key configuration data to obtain the first authentication data includes:
acquiring a root key, and performing hash operation on the root key and the root key configuration data to obtain a second graph key;
and receiving random data sent by the wearable device main body, and performing hash operation on the second graph key and the random data to obtain first authentication data.
For example, after the wearable device body determines that the watchband passes the anti-counterfeiting authentication, the method further includes:
and sending configuration information to the wearable device main body so that the wearable device main body can switch the working mode to be the working mode corresponding to the configuration information.
In addition, in order to achieve the above object, the present application further provides a wearable device, which includes a watchband and a wearable device main body;
the watchband is internally provided with an IC, and the wearable device main body is internally provided with an MCU;
the IC is electrically connected with the MCU;
the MCU is used for receiving the first authentication data sent by the IC and determining that the watchband passes anti-counterfeiting authentication when the first authentication data is the same as the acquired second authentication data.
Exemplarily, the IC is connected to the GPIO interface of the MCU and the GND interface of the wearable device main body through connectors, respectively, so that the IC and the MCU perform two-wire communication.
In addition, to achieve the above object, the present application further provides a watchband, where the watchband includes a memory, a processor, and a product authentication program stored in the memory and executable on the processor, and when the product authentication program is executed by the processor, the steps of the product authentication method as described above are implemented.
Further, to achieve the above object, the present application also provides a computer readable storage medium having stored thereon a product authentication program, which when executed by a processor, implements the steps of the product authentication method as described above.
Compared with the prior art that the intelligent wearable product and the watchband do not have an anti-counterfeiting function, and the equipment data safety of the intelligent wearable product is low, the product authentication method is applied to a wearable equipment main body and comprises the following steps: detecting the access of a watchband, and sending root key configuration data to the watchband; receiving first authentication data sent by a watchband, wherein the first authentication data is obtained by the watchband through calculation based on the root key configuration data; and acquiring second authentication data, and if the first authentication data is the same as the second authentication data, determining that the watchband passes anti-counterfeiting authentication. This application has realized after the watchband inserts wearing equipment main part, send root key configuration data to the watchband, can understand, this root key configuration data is relevant with the authentication, later receive the watchband and send carry out the first authentication data that obtains of calculating based on root key configuration data, and when first authentication data is the same with second authentication data, confirm the watchband and pass through anti-fake authentication, this application carries out data coprocessing together through watchband and wearing equipment main part promptly, thereby realize the anti-fake authentication to the watchband, make intelligent dress type product and watchband possess anti-fake function, and then improve the equipment data security of intelligent dress type product.
Drawings
FIG. 1 is a schematic flow chart diagram of a first embodiment of a product authentication method according to the present application;
FIG. 2 is a schematic flowchart of a second embodiment of the product authentication method of the present application;
FIG. 3 is a schematic view of the wearable device of the present application;
FIG. 4 is a schematic diagram of connection between an IC and an MCU according to an embodiment of the wearable device of the present application;
fig. 5 is a schematic structural diagram of a hardware operating environment of a watchband according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
The data encryption mode includes symmetric encryption, asymmetric encryption, encryption by a hash algorithm and the like, and the encryption by the hash algorithm is explained in the application.
The present application provides a product authentication method, and referring to fig. 1, fig. 1 is a schematic flowchart of a first embodiment of the product authentication method of the present application.
While embodiments of the product authentication method are provided in the present application, it should be noted that although a logical order is shown in the flow chart, in some cases, the steps shown or described may be performed in an order different from that shown or described herein. The product authentication method is applied to the wearable device main body, and for convenience of description, the description of the product authentication method by the execution main body is omitted below. The product authentication method comprises the following steps:
and S10, detecting the access of the watchband, and sending root key configuration data to the watchband.
For example, whether the watchband is accessed is periodically monitored, and after the watchband is inserted into the wearable device body, connectors on the watchband are respectively communicated with a General-purpose input/output (GPIO) interface and a Ground (GND) interface on an MCU (micro controller Unit) in the wearable device body, so that an IC (Integrated Circuit) on the watchband is communicated with the MCU, and at this time, the watchband access is detected. Specifically, when the watch band access is periodically monitored, the MCU pulls down the level of the GPIO interface and maintains the first preset time, if the watch band access exists, the IC in the watch band responds to the behavior of the MCU, namely, the level of the GPIO interface is also pulled down and maintains the second preset time, and when the MCU detects that the level of the GPIO interface is pulled down and is not actively pulled down, the watch band access is determined; if the watchband is not connected, the MCU does not detect that the level of the GPIO interface is pulled down beyond the time when the MCU actively pulls down the level of the GPIO interface. The first preset time and the second preset time may be set as needed, and this embodiment is not limited in particular. Monitoring for the presence of watchband access may also be accomplished by sensing circuitry, such as a hall sensor, near field communication module, and the like.
Illustratively, the connectors include pogo-pin connectors, dome connectors, wire connectors, and the like.
Illustratively, the IC has the following advantages: no extra power supply is needed, the design is simple, the encryption algorithm is difficult to break, the price is low, the cost performance is high, and the like. Therefore, the product upgrading can be completed on the basis of ensuring that the price is not greatly improved and the original design is changed.
Illustratively, the root key configuration data is data related to the root key, and specifically, the graph key is obtained after the root key configuration data and the root key are subjected to hash operation.
It should be noted that, the wearable device main body does not store the root key, but only stores the root key configuration data and the graph key, and during storage, the root key configuration data is stored in correspondence with the graph key, where the root key configuration data may be composed of random numbers. The root key is stored in the wristband, and, in order to improve the security of the root key, the memory in the wristband is set so as not to be read and written when the root key is stored in the wristband, that is, so as to be called only when the IC in the wristband needs to be used, and not to be read by the wearable device body in a communicative manner.
It should be noted that, although the hash operation is substantially irreversible, that is, the root key configuration data cannot be substantially deduced from the graph key in a backward direction, the root key configuration data and the graph key are not one set, but multiple sets, in order to make the data in the device more secure.
Note that, the conventional watchband has no IC for automatically identifying whether or not the watchband is inserted, and even if a part of the watchband has a function for automatically identifying whether or not the watchband is inserted, the function is realized by providing only a hall sensor, a resistor, or the like in the watchband. This makes the product identification differentiation of the conventional watchband low, and the IC in this embodiment can make the watchband store more configuration information, thereby improving the product identification differentiation.
Illustratively, after monitoring that the watchband is accessed, if data transmission fails when transmitting the root key configuration data to the watchband, the watchband can be determined to exit the access, at this time, the watchband is returned to the step of monitoring whether the watchband is accessed again, the root key configuration data is continuously transmitted to the watchband after monitoring that the watchband is accessed again, and the next step is started after the data is successfully transmitted.
And step S20, receiving first authentication data sent by a watchband, wherein the first authentication data is obtained by calculating the watchband based on the root key configuration data.
Illustratively, the first authentication data is obtained by performing hash operation on the root key configuration data and the root key, and performing hash operation on the hash operation result and the second graph key again. It will be appreciated that the process of the hash operation is performed by the IC in the watchband.
And step S30, second authentication data is obtained, and if the first authentication data is the same as the second authentication data, the watchband is determined to pass the anti-counterfeiting authentication.
If the first authentication data is the same as the second authentication data, the root key used for calculating the first authentication data and the second authentication data is the same root key, and at the moment, the watchband can be determined to pass the anti-counterfeiting authentication; if the first authentication data is different from the second authentication data, the root key used for calculating the first authentication data is different from the root key used for calculating the second authentication data, and the watchband can be determined not to pass the anti-counterfeiting authentication.
Exemplarily, if the watchband passes the anti-counterfeiting authentication, the next process is started; and if the watchband does not pass the anti-counterfeiting authentication, returning to the step of monitoring whether the watchband is accessed.
Illustratively, the obtaining the second authentication data includes:
step a, acquiring a first graph key and generating random data; wherein the first graph key corresponds to the root key configuration data.
Illustratively, the first graph key is obtained by performing a hash operation on the root key configuration data and the root key.
And b, carrying out hash operation on the first graph key and the random data to obtain second authentication data.
For example, since the second authentication data is calculated from random data, even if data leakage occurs during data transmission, the first graph key cannot be cracked reversely, so that the data security of the first graph key is further improved on the basis that the data security is improved by hash operation.
Illustratively, the determining that the watchband passes the anti-counterfeiting authentication comprises:
and c, reading the configuration information in the watchband.
Illustratively, the configuration information is used for configuring the working mode of the wearable device main body.
And d, switching the working mode to the working mode corresponding to the configuration information so that the wearable device main body works in the switched working mode.
Illustratively, the operation mode includes a sport mode, a joint mode, and the like. After the working modes are switched, the wearable device main body makes corresponding response so that the wearable device main body can adapt to the user requirements in the corresponding working modes. When the working mode is the movement mode, correspondingly, the watchband is the movement watchband, and after the configuration information is read, the movement mode is automatically entered from the current mode (generally, the standby mode), for example, the switching theme is the movement theme; when the working mode is the joint name mode, correspondingly, the watchband is the joint name watchband, and after the configuration information is read, the current mode automatically enters the joint name mode, for example, the theme is switched to be the joint name theme.
The automatic switching of the working modes is carried out according to the configuration information, the switching of the working modes manually carried out by a user is avoided, and the convenience of using the wearable equipment by the user is improved.
Compared with the prior art that the intelligent wearable product and the watchband do not have an anti-counterfeiting function, and the equipment data safety of the intelligent wearable product is low, the product authentication method is applied to a wearable equipment main body, and comprises the following steps: detecting the access of a watchband, and sending root key configuration data to the watchband; receiving first authentication data sent by a watchband, wherein the first authentication data is obtained by the watchband through calculation based on the root key configuration data; and acquiring second authentication data, and if the first authentication data is the same as the second authentication data, determining that the watchband passes anti-counterfeiting authentication. This application has realized after the watchband inserts wearing equipment main part, send root key configuration data to the watchband, can understand, this root key configuration data is relevant with the authentication, later receive the watchband and send carry out the first authentication data that obtains of calculating based on root key configuration data, and when first authentication data is the same with second authentication data, confirm the watchband and pass through anti-fake authentication, this application carries out data coprocessing together through watchband and wearing equipment main part promptly, thereby realize the anti-fake authentication to the watchband, make intelligent dress type product and watchband possess anti-fake function, and then improve the equipment data security of intelligent dress type product.
Referring to fig. 2, fig. 2 is a flowchart illustrating a product authentication method according to a second embodiment of the present application.
While embodiments of the product authentication method are provided in the present application, it should be noted that although a logical order is shown in the flow chart, in some cases, the steps shown or described may be performed in an order different from that shown or described herein. The product authentication method is applied to watchbands. The product authentication method comprises the following steps:
step A10, receiving root key configuration data sent by a wearable device main body;
exemplarily, after the watchband is inserted into the wearing device main body, the connector on the watchband can be respectively communicated with the GPIO interface and the GND interface on the MCU in the wearing device main body, so that the IC on the watchband is communicated with the MCU.
Illustratively, the connectors include pogo-pin connectors, dome connectors, wire connectors, and the like.
Illustratively, the IC has the following advantages: no extra power supply is needed, the design is simple, the encryption algorithm is difficult to break, the price is low, the cost performance is high, and the like. Therefore, the product upgrading can be completed on the basis of ensuring that the price is not greatly improved and the original design is changed.
Illustratively, the root key configuration data is data related to the root key, and specifically, the root key configuration data and the root key are subjected to hash operation to obtain the second graph key.
It should be noted that, the wearable device main body does not store the root key, but only stores the root key configuration data and the graph key, and during storage, the root key configuration data is stored in correspondence with the graph key, where the root key configuration data may be composed of random numbers. The root key is stored in the wristband, and, in order to improve the security of the root key, the memory in the wristband is set so as not to be read and written when the root key is stored in the wristband, that is, so as to be called only when the IC in the wristband needs to be used, and not to be read by the wearable device body in a communicative manner.
Note that, although the hash operation is substantially irreversible, that is, root key configuration data cannot be substantially reversely calculated from the graph key, in order to make data in the device more secure, the root key configuration data and the graph key in the wearable device main body are not one set, but multiple sets.
Note that, the conventional watchband has no IC for automatically identifying whether or not the watchband is inserted, and even if a part of the watchband has a function for automatically identifying whether or not the watchband is inserted, the function is realized by providing only a hall sensor, a resistor, or the like in the watchband. This makes the product identification differentiation of the conventional watchband low, and the IC in this embodiment can make the watchband store more configuration information, thereby improving the product identification differentiation.
Step A20, the root key configuration data is operated to obtain first authentication data.
For example, the first authentication data is obtained by performing hash operation on the root key configuration data and the root key, and performing hash operation on the hash operation result and the second graph key again. It will be appreciated that the process of the hash operation is performed by the IC in the watchband.
Step A30, sending the first authentication data to the wearable device main body so that the wearable device main body can authenticate the watchband.
After the first authentication data are sent to the wearable device main body, the wearable device main body can authenticate the watchband based on the first authentication data and the second authentication data. Specifically, if the first authentication data is the same as the second authentication data, it indicates that the root keys used for calculating the first authentication data and the second authentication data are the same root key, and at this time, the wearable device main body may determine that the watchband passes the anti-counterfeiting authentication; if the first authentication data is different from the second authentication data, it is indicated that the root key used for calculating the first authentication data is different from the root key used for calculating the second authentication data, and at this time, the wearable device main body may determine that the watchband does not pass the anti-counterfeiting authentication.
Illustratively, the operating the root key configuration data to obtain first authentication data includes:
step e, acquiring a root key, and performing hash operation on the root key and the root key configuration data to obtain a second graph key;
and f, receiving random data sent by the wearable device main body, and performing hash operation on the second graph key and the random data to obtain first authentication data.
Because the first authentication data is obtained by random data calculation, even if data leakage occurs in the data transmission process, the second graph key cannot be cracked reversely, and the data security of the second graph key is further improved on the basis that the data security is improved by Hash operation.
For example, after the wearable device body determines that the watchband passes the anti-counterfeiting authentication, the method further includes:
and g, sending configuration information to the wearable device main body so that the wearable device main body can switch the working mode to be the working mode corresponding to the configuration information.
Illustratively, the operation mode includes a sport mode, a joint mode, and the like.
It should be noted that, after the working mode is switched, the wearable device main body responds correspondingly, so that the wearable device main body is adapted to the user's requirements in the corresponding working mode. When the working mode is the movement mode, correspondingly, the watchband is the movement watchband, and after the configuration information is read, the movement mode is automatically entered from the current mode (generally, the standby mode), for example, the switching theme is the movement theme; when the working mode is the joint name mode, correspondingly, the watchband is the joint name watchband, and after the configuration information is read, the current mode automatically enters the joint name mode, for example, the theme is switched to be the joint name theme.
It can be understood that the working modes are automatically switched according to the configuration information, so that the switching of the working modes manually performed by a user is avoided, and the convenience of using the wearable equipment by the user is improved.
Compared with the prior art that the intelligent wearable product and the watchband do not have an anti-counterfeiting function, and the equipment data safety of the intelligent wearable product is low, the product authentication method is applied to the watchband, and comprises the following steps: receiving root key configuration data sent by a wearable device main body; performing hash operation on the root key configuration data to obtain first authentication data; and sending the first authentication data to the wearable device main body so that the wearable device main body can authenticate the watchband. This application has realized inserting wearing equipment main part at the watchband after, receive the root key configuration data that wearing equipment main part sent, can understand, this root key configuration data is relevant with the authentication, later to wearing equipment main part send carry out the first authentication data that the hash operation obtained based on root key configuration data, for supply wearing equipment main part to authenticate the watchband, this application carries out data coprocessing together through watchband and wearing equipment main part promptly, thereby realize the anti-fake authentication to the watchband, make intelligence dress type product and watchband possess anti-fake function, and then improve the equipment data security of intelligence dress type product.
In addition, referring to fig. 3, fig. 3 is a schematic structural diagram of the wearable device of the present application. The application also provides a wearable device, which comprises a watchband and a wearable device main body;
the watchband is internally provided with an IC, and the wearable device main body is internally provided with an MCU;
the IC is electrically connected with the MCU;
the MCU is used for receiving the first authentication data sent by the IC and determining that the watchband passes anti-counterfeiting authentication when the first authentication data is the same as the acquired second authentication data.
The product authentication method applied to the wearable device body is specifically applied to the MCU in this embodiment, and the product authentication method applied to the watchband is specifically applied to the IC in this embodiment.
Illustratively, the IC is connected to the GPIO interface of the MCU and the GND interface of the wearable device main body through connectors, respectively, so that the IC and the MCU perform two-wire communication.
Referring to fig. 4, fig. 4 is a schematic connection diagram of an IC and an MCU related to an embodiment of the wearable device of the present application. After the watchband inserted wearing equipment main part, the connector on the watchband can communicate with GPIO interface and GND interface on the MCU respectively to make IC and MCU be linked together, at this moment, detected the watchband and inserted. Specifically, when the watch band access is periodically monitored, the MCU pulls down the level of the GPIO interface and maintains the first preset time, if the watch band access exists, the IC in the watch band responds to the behavior of the MCU, namely, the level of the GPIO interface is also pulled down and maintains the second preset time, and when the MCU detects that the level of the GPIO interface is pulled down and is not actively pulled down, the watch band access is determined; if the watchband is not connected, the MCU does not detect that the level of the GPIO interface is pulled down beyond the time when the MCU actively pulls down the level of the GPIO interface. The first preset time and the second preset time may be set as needed, and this embodiment is not limited in particular. Monitoring for the presence of watchband access may also be accomplished by sensing circuitry, such as a hall sensor, near field communication module, and the like.
Illustratively, the connectors include pogo-pin connectors, dome connectors, wire connectors, and the like.
The wearable device in the embodiment comprises a watchband and a wearable device main body; the watchband is internally provided with an IC, and the wearable device main body is internally provided with an MCU; the IC is electrically connected with the MCU; the MCU is used for receiving first authentication data sent by the IC and determining that the watchband passes anti-counterfeiting authentication when the first authentication data is the same as the acquired second authentication data. This embodiment has realized carrying out data coprocessing through IC and MCU to the realization makes intelligence dress type product and watchband possess anti-fake function to the anti-fake authentication of watchband, and then improves the equipment data security of intelligence dress type product.
In addition, this application still provides a product authentication device, is applied to wearing equipment main part, the product authentication device includes:
the sending module is used for detecting the access of the watchband and sending the root key configuration data to the watchband;
the receiving module is used for receiving first authentication data sent by a watchband, and the first authentication data is obtained by the watchband through calculation based on the root key configuration data;
and the acquisition module is used for acquiring second authentication data, and if the first authentication data is the same as the second authentication data, the watchband is determined to pass the anti-counterfeiting authentication.
Illustratively, the obtaining module is specifically configured to:
acquiring a first graph key and generating random data; wherein the first graph key corresponds to the root key configuration data;
and carrying out hash operation on the first graph key and the random data to obtain second authentication data.
Illustratively, the product authentication apparatus further comprises:
the reading module is used for reading the configuration information in the watchband;
and the switching module is used for switching the working mode to the working mode corresponding to the configuration information so as to enable the wearable device main body to work in the switched working mode.
The specific implementation of the product authentication apparatus in the present application is substantially the same as that of the embodiments of the product authentication method described above, and is not described herein again.
In addition, this application still provides a product authentication device, is applied to the watchband, product authentication device includes:
the receiving module is used for receiving the root key configuration data sent by the wearable device main body;
the operation module is used for operating the root key configuration data to obtain first authentication data;
and the first sending module is used for sending the first authentication data to the wearable device main body so as to authenticate the watchband by the wearable device main body.
Illustratively, the operation module is specifically configured to:
acquiring a root key, and performing hash operation on the root key and the root key configuration data to obtain a second graph key;
and receiving random data sent by the wearable device main body, and performing hash operation on the second graph key and the random data to obtain first authentication data.
Illustratively, the product authentication apparatus further comprises:
and the second sending module is used for sending configuration information to the wearable device main body so that the wearable device main body can switch the working mode to the working mode corresponding to the configuration information.
In addition, this application still provides a watchband. As shown in fig. 5, fig. 5 is a schematic structural diagram of a hardware operating environment according to an embodiment of the present application (except for the master controller, the slave controller, and the cellular network module).
In one possible embodiment, fig. 5 is a schematic structural diagram of a hardware operating environment of the watchband.
As shown in fig. 5, the watchband may include a processor 501, a communication interface 502, a memory 503 and a communication bus 504, wherein the processor 501, the communication interface 502 and the memory 503 complete communication with each other through the communication bus 504, and the memory 503 is used for storing computer programs; the processor 501 is configured to implement the steps of the product authentication method when executing the program stored in the memory 503.
The communication bus 504 mentioned in the above-mentioned watchband may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus 504 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface 502 is used for communication between the watchband and other devices as described above.
The Memory 503 may include a Random Access Memory (RMD) and a Non-Volatile Memory (NM), such as at least one disk Memory. Optionally, the memory 503 may also be at least one storage device located remotely from the processor 501.
The Processor 501 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
The specific implementation of the watchband of the present application is substantially the same as that of the embodiments of the product authentication method described above, and is not described herein again.
Furthermore, an embodiment of the present application also provides a computer-readable storage medium, on which a product authentication program is stored, where the product authentication program, when executed by a processor, implements the steps of the product authentication method as described above.
The specific implementation of the computer-readable storage medium of the present application is substantially the same as the embodiments of the product authentication method described above, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, a device, or a network device) to execute the method according to the embodiments of the present application.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

1. A product authentication method is applied to a wearable device main body, and comprises the following steps:
detecting the access of a watchband, and sending root key configuration data to the watchband;
receiving first authentication data sent by a watchband, wherein the first authentication data is obtained by the watchband through calculation based on the root key configuration data;
and acquiring second authentication data, and if the first authentication data is the same as the second authentication data, determining that the watchband passes anti-counterfeiting authentication.
2. The method of claim 1, wherein said obtaining second authentication data comprises:
acquiring a first graph key and generating random data; wherein the first graph key corresponds to the root key configuration data;
and carrying out hash operation on the first graph key and the random data to obtain second authentication data.
3. The method of claim 1, wherein the determining that the watchband passes the anti-counterfeiting authentication comprises:
reading configuration information in the watchband;
and switching the working mode to be the working mode corresponding to the configuration information so as to enable the wearable device main body to work in the switched working mode.
4. A method of product authentication, applied to a watchband, the method comprising the steps of:
receiving root key configuration data sent by a wearable device main body;
calculating the root key configuration data to obtain first authentication data;
and sending the first authentication data to the wearable device main body so that the wearable device main body can authenticate the watchband.
5. The method of claim 4, wherein said operating on the root key configuration data to obtain first authentication data comprises:
acquiring a root key, and performing hash operation on the root key and the root key configuration data to obtain a second graph key;
and receiving random data sent by the wearable device main body, and performing hash operation on the second graph key and the random data to obtain first authentication data.
6. The method of claim 4, wherein after the wearable device body determines that the wristband is authenticated as counterfeit-proof, the method further comprises:
and sending configuration information to the wearable device main body so that the wearable device main body switches the working mode to be the working mode corresponding to the configuration information.
7. A wearable device is characterized by comprising a watchband and a wearable device main body;
the watchband is internally provided with an IC, and the wearable device main body is internally provided with an MCU;
the IC is electrically connected with the MCU;
the MCU is used for receiving first authentication data sent by the IC and determining that the watchband passes anti-counterfeiting authentication when the first authentication data is the same as the acquired second authentication data.
8. The device of claim 7, wherein the IC is connected with a GPIO interface of the MCU and a GND interface of the wearable device body through connectors, respectively, for two-wire communication between the IC and the MCU.
9. A watchband, characterized in that it comprises a memory, a processor and a product authentication program stored on said memory and executable on said processor, said product authentication program, when executed by said processor, implementing the steps of the product authentication method according to any one of claims 4 to 6.
10. A computer-readable storage medium, having stored thereon a product authentication program which, when executed by a processor, implements the steps of the product authentication method of any one of claims 1-3,4-6.
CN202210891356.3A 2022-07-27 2022-07-27 Product authentication method, wearable device, watchband and storage medium Pending CN115277194A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210891356.3A CN115277194A (en) 2022-07-27 2022-07-27 Product authentication method, wearable device, watchband and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210891356.3A CN115277194A (en) 2022-07-27 2022-07-27 Product authentication method, wearable device, watchband and storage medium

Publications (1)

Publication Number Publication Date
CN115277194A true CN115277194A (en) 2022-11-01

Family

ID=83771861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210891356.3A Pending CN115277194A (en) 2022-07-27 2022-07-27 Product authentication method, wearable device, watchband and storage medium

Country Status (1)

Country Link
CN (1) CN115277194A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101840592A (en) * 2010-05-18 2010-09-22 上海集成通信设备有限公司 IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof
EP2388949A1 (en) * 2010-05-20 2011-11-23 Oberthur Technologies Method of managing electronic devices, such as integrated circuits, with internal generation of a personal authentication key
CN103413159A (en) * 2013-08-15 2013-11-27 成都市易恒信科技有限公司 RFID electronic certificate off-line distinguishing and anti-counterfeiting implementation method and system based on CPK
CN106934262A (en) * 2015-12-30 2017-07-07 阿里巴巴集团控股有限公司 A kind of wearable device and its user authen method
CN108234501A (en) * 2018-01-11 2018-06-29 北京国电通网络技术有限公司 A kind of virtual plant safety communicating method based on quantum key fusion
CN109309566A (en) * 2017-07-28 2019-02-05 中国移动通信有限公司研究院 A kind of authentication method, device, system, equipment and storage medium
CN111758096A (en) * 2018-01-19 2020-10-09 奈米公司 Live user authentication apparatus, system and method
CN112367165A (en) * 2020-10-19 2021-02-12 珠海格力电器股份有限公司 Serial port communication method and device, electronic equipment and computer readable medium
WO2022001272A1 (en) * 2020-06-29 2022-01-06 华为技术有限公司 Method and apparatus for device anti-counterfeiting

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101840592A (en) * 2010-05-18 2010-09-22 上海集成通信设备有限公司 IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof
EP2388949A1 (en) * 2010-05-20 2011-11-23 Oberthur Technologies Method of managing electronic devices, such as integrated circuits, with internal generation of a personal authentication key
CN103413159A (en) * 2013-08-15 2013-11-27 成都市易恒信科技有限公司 RFID electronic certificate off-line distinguishing and anti-counterfeiting implementation method and system based on CPK
CN106934262A (en) * 2015-12-30 2017-07-07 阿里巴巴集团控股有限公司 A kind of wearable device and its user authen method
CN109309566A (en) * 2017-07-28 2019-02-05 中国移动通信有限公司研究院 A kind of authentication method, device, system, equipment and storage medium
CN108234501A (en) * 2018-01-11 2018-06-29 北京国电通网络技术有限公司 A kind of virtual plant safety communicating method based on quantum key fusion
CN111758096A (en) * 2018-01-19 2020-10-09 奈米公司 Live user authentication apparatus, system and method
WO2022001272A1 (en) * 2020-06-29 2022-01-06 华为技术有限公司 Method and apparatus for device anti-counterfeiting
CN112367165A (en) * 2020-10-19 2021-02-12 珠海格力电器股份有限公司 Serial port communication method and device, electronic equipment and computer readable medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贺章擎;李红;万美琳;吴铁洲;: "一种基于PUF的两方认证与会话密钥交换协议", 计算机工程与应用, no. 18 *

Similar Documents

Publication Publication Date Title
CN107944237B (en) Fingerprint unlocking method and related product
CN105549858A (en) Display method and user terminal
CN106412293B (en) Foreign matter detection method and device and terminal equipment
CN112996020B (en) Bluetooth-based automatic test method and device and Bluetooth test terminal
CN111694572A (en) Code format conversion method, device, computer equipment and storage medium
CN106339876A (en) Fingerprint identification method and device and terminal device
CN106453802A (en) Cipher verification method and device, and terminal
CN108932102A (en) Data processing method, device and mobile terminal
CN109164972B (en) Control method, control device and mobile terminal
CN104318185A (en) Application control method, application control equipment and mobile terminal
CN112165704A (en) Information sharing method, earphone box and computer readable storage medium
CN105809002B (en) A kind of user terminal charging method and user terminal
CN115277194A (en) Product authentication method, wearable device, watchband and storage medium
CN109032465A (en) Data processing method, device and mobile terminal
CN107563829A (en) A kind of lending locking means, lease terminal and lending system
CN106201930B (en) A kind of device port determining device, terminal and method
CN105025157B (en) A kind of private contact hidden method and user terminal
CN106778295A (en) File storage, display methods, device and terminal
CN109981873B (en) Address book permission opening method and device and electronic equipment
CN104615951A (en) Information processing method and mobile terminal
WO2018165341A1 (en) Contact information display method and device, and information display method and device
CN107463822A (en) Bio-identification mode control method and Related product
CN113704106A (en) Off-line detection system, method, equipment and medium for automobile digital key
CN106484107A (en) A kind of method of information exchange and virtual reality glasses
CN105786323A (en) Message prompting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination