CN117915317B - Data transmission method and system for intelligent wearable equipment - Google Patents

Data transmission method and system for intelligent wearable equipment Download PDF

Info

Publication number
CN117915317B
CN117915317B CN202410294935.9A CN202410294935A CN117915317B CN 117915317 B CN117915317 B CN 117915317B CN 202410294935 A CN202410294935 A CN 202410294935A CN 117915317 B CN117915317 B CN 117915317B
Authority
CN
China
Prior art keywords
data
sub
packet
key
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410294935.9A
Other languages
Chinese (zh)
Other versions
CN117915317A (en
Inventor
张贤
张威
徐杰
张小平
蔡晓平
蔡鸿辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN ALONG ELECTRONICS CO LTD
Original Assignee
SHENZHEN ALONG ELECTRONICS CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN ALONG ELECTRONICS CO LTD filed Critical SHENZHEN ALONG ELECTRONICS CO LTD
Priority to CN202410294935.9A priority Critical patent/CN117915317B/en
Publication of CN117915317A publication Critical patent/CN117915317A/en
Application granted granted Critical
Publication of CN117915317B publication Critical patent/CN117915317B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of data transmission, in particular to a data transmission method and system for intelligent wearable equipment. Firstly, acquiring transmission data and Bluetooth connection data of intelligent wearable equipment and receiving equipment; generating a key reference matrix by Bluetooth connection data; generating an encryption reference key by using the key reference matrix and the identity verification PIN code; the transmission data is subjected to sub-package processing to obtain sub-data packages and corresponding sub-package summaries; generating an encryption key of the sub-data packet by utilizing the sub-packet abstract, the packet head information of the sub-data packet and the encryption reference key; encrypting the sub-data packet by using an AES encryption algorithm and using an encryption key to obtain an encrypted data packet; forming a ciphertext data packet group by the encrypted data packet; and transmitting the ciphertext data packet group to the receiving device. According to the invention, the sub-data packets of the transmission data are encrypted by using different encryption keys, so that the encryption security of the traditional AES encryption algorithm during data transmission is improved.

Description

Data transmission method and system for intelligent wearable equipment
Technical Field
The invention relates to the technical field of data transmission, in particular to a data transmission method and system for intelligent wearable equipment.
Background
With the continuous popularization of intelligent wearable equipment in the fields of health monitoring and life assistance, the Bluetooth technology becomes one of the mainstream modes of data transmission. However, conventional bluetooth faces a series of challenges when applied to smart wearable devices. The operation of the intelligent wearable device is limited by the power consumption operation of the intelligent wearable device, the computing capacity of the intelligent wearable device using an encryption algorithm with a good encryption effect is limited, the transmission speed is relatively low, the Bluetooth connection stability of the intelligent wearable device is insufficient, and the data transmission communication is affected, so that the intelligent wearable device is more easily attacked. The transmission information of the intelligent wearable device is mainly health information of the body, the privacy is high, and how to better protect the information becomes an important research direction for the development of the current intelligent wearable device.
In the prior art, an AES symmetric encryption algorithm is generally adopted for Bluetooth data transmission in intelligent wearable equipment, and the AES symmetric encryption algorithm is made to be the preferred encryption method in Bluetooth transmission by high security and wide application. But AES encryption algorithm still has some potential drawbacks. Its higher computational complexity may occupy a large amount of computational resources, resulting in reduced performance, especially on resource-constrained devices. Furthermore, encryption operations have an impact on the power consumption of the device, which may shorten battery life, and in applications requiring real-time data transmission, transmission delay problems may arise. Low cost devices may lack hardware support, affecting encryption efficiency, and improper key management may also lead to potential security risks. With the development of quantum computing technology, AES may face the threat of quantum computing attacks.
Disclosure of Invention
In order to solve the technical problem of low safety when an AES encryption algorithm is adopted to encrypt Bluetooth data in intelligent wearable equipment, the invention aims to provide a data transmission method and a data transmission system for the intelligent wearable equipment, and the adopted technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a data transmission method for an intelligent wearable device, including the steps of:
Encrypting a Bluetooth data packet transmitted by the intelligent wearable equipment to obtain transmission data; acquiring Bluetooth connection data of the intelligent wearable device and the receiving device; the bluetooth connection data includes: verifying the PIN code;
Generating a key reference matrix by the Bluetooth connection data; generating an encryption reference key by using the key reference matrix and the authentication PIN code;
The transmission data is subjected to sub-packaging processing to obtain sub-data packets; obtaining sub-packet abstracts according to the sub-packet data of each sub-data packet; generating an encryption key of the sub-data packet by utilizing the sub-packet abstract, the packet head information of the sub-data packet and the encryption reference key;
encrypting the sub-data packet by using an AES encryption algorithm and using an encryption key to obtain an encrypted data packet; forming a ciphertext data packet group by the encrypted data packet; and transmitting the ciphertext data packet group to receiving equipment.
Preferably, the generating a key reference matrix from the bluetooth connection data includes:
The bluetooth connection data further includes: bluetooth MAC address;
The key reference matrix is:
; wherein J is a key reference matrix; bin is a decimal transfer function; /(I) The 1 st address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 2 nd address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 3 rd address bit of the Bluetooth MAC address of the intelligent wearable device; The 4 th address bit of the Bluetooth MAC address of the intelligent wearable device; /(I) The 5 th address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 6 th address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 6 th address bit of the bluetooth MAC address for the receiving device; /(I)The 5 th address bit of the bluetooth MAC address for the receiving device; The 4 th address bit of the bluetooth MAC address for the receiving device; /(I) The 3 rd address bit of the bluetooth MAC address for the receiving device; /(I)The 2 nd address bit of the bluetooth MAC address for the receiving device; /(I)The 1 st address bit of the bluetooth MAC address for the receiving device.
Preferably, the generating an encryption reference key by using the key reference matrix and the authentication PIN code includes:
wherein KEY is an encryption reference KEY; The corresponding characters are obtained by inquiring the ASCII table according to the decimal number; /(I) Is the 1 st element value in the first matrix K1; /(I)Is the 1 st element value in the second matrix K2; /(I)Is the m-th element value in the first matrix K1; /(I)Is the nth element value in the second matrix K2; /(I)Is the 6 th element value in the first matrix K1; /(I)Is the 16 th element value in the second matrix K2.
Preferably, the first matrix is:
; wherein/> Is a first matrix; /(I)Is a key reference matrix; /(I)A transpose of the key reference matrix; /(I)The PIN code matrix is verified for identity.
Preferably, the second matrix is:
; wherein/> Is a second matrix; /(I)Is a key reference matrix; /(I)Is the transpose of the authentication PIN code matrix.
Preferably, the authentication PIN code matrix is:
; wherein/> The 1 st digit of the PIN code is authenticated; /(I)The 2 nd digit of the PIN code is authenticated; /(I)The 3 rd digit of the PIN code is authenticated; /(I)The 4 th digit of the PIN code is authenticated; /(I)The 5 th digit of the PIN code is authenticated; /(I)The 6 th digit of the PIN code is authenticated.
Preferably, the generating the encryption key of the sub-packet by using the sub-packet digest, the packet header information of the sub-packet, and the encryption reference key includes:
The encryption key of the sub-data packet is:
;/> An encryption key for the sub-packet; /(I) The corresponding characters are obtained by inquiring the ASCII table according to the decimal number; bin is a decimal transfer function; /(I)Characters of the reference key are encrypted for the ith; /(I)The ith character of the sub-packet abstract; /(I)A preamble of the Bluetooth data packet; > is a right shift operation; /(I)Is a cyclic redundancy check code; /(I)Any byte of data is encoded using 10 ASCII printable characters.
Preferably, the obtaining the sub-packet summary according to the sub-packet data of each sub-packet includes:
And obtaining the sub-packet digest according to the sub-packet data of each sub-data packet by utilizing the hash function.
Preferably, the packetizing the transmission data to obtain a sub-packet includes:
The transmission data is divided into a plurality of sub-packets according to a maximum packet structure.
In a second aspect, an embodiment of the present invention provides a data transmission system for a smart wearable device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements a data transmission method for a smart wearable device as described above when the computer program is executed.
The embodiment of the invention has at least the following beneficial effects: when the data is encrypted, the invention does not encrypt the whole data packet by using a key and a single existing algorithm, but adopts the relevant basic characteristics of the intelligent wearable equipment data in the Bluetooth protocol to generate the unique encryption key for the sub-data packet of the transmission data during Bluetooth data transmission, thereby avoiding the condition of leakage of the transmission data caused by key leakage after the encryption by the public key. Firstly, bluetooth data packets are encrypted, and the encrypted data are used as transmission data, so that the transmission efficiency of the data is improved. And then, the encryption reference key is generated by combining the key reference matrix and the identity verification PIN code, the identity verification PIN code can play a role in randomly updating the key reference matrix while ensuring the stability of the key reference matrix, and the randomness and the flexibility of the encryption key are improved, so that the data transmission is safer. Further, the data packet characteristics of the Bluetooth transmission data are utilized to packetize the transmission data, and because the transmission data is easy to be attacked when the transmission data packet quantity is too large, the transmission data is required to be packetized before encryption, and related information is acquired, so that the effect of one packet of encryption is achieved, the transmission of data contents is safer and more reliable, the encryption key of each sub-data packet is generated through analysis, the purpose of encrypting different sub-data packets through the corresponding encryption key is achieved, the sub-data packets of the transmission data are encrypted through the use of different encryption keys, and the encryption security of a traditional AES encryption algorithm in data transmission is improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions and advantages of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments of the invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for data transmission of an intelligent wearable device according to an embodiment of the present invention.
Detailed Description
In order to further describe the technical means and effects adopted by the present invention to achieve the preset purposes, the following detailed description refers to a specific implementation, structure, characteristics and effects of a data transmission method and system for an intelligent wearable device according to the present invention with reference to the accompanying drawings and preferred embodiments. In the following description, different "one embodiment" or "another embodiment" means that the embodiments are not necessarily the same. Furthermore, the particular features, structures, or characteristics of one or more embodiments may be combined in any suitable manner.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
The embodiment of the invention provides a data transmission method and a specific implementation method of a system for intelligent wearable equipment. The technical problem that safety is low when Bluetooth data in intelligent wearable equipment is encrypted by adopting an AES encryption algorithm is solved. The invention encrypts the Bluetooth data packet generated during data transmission, thereby enhancing the safety of data transmission and protecting the safety of data.
The following specifically describes a specific scheme of a data transmission method and system for an intelligent wearable device provided by the invention with reference to the accompanying drawings.
Referring to fig. 1, a flowchart of steps of a data transmission method for an intelligent wearable device according to an embodiment of the present invention is shown, where the method includes the following steps:
Step S100, encrypting a Bluetooth data packet transmitted by intelligent wearable equipment to obtain transmission data; acquiring Bluetooth connection data of the intelligent wearable device and the receiving device; the bluetooth connection data includes: and (5) authenticating the PIN code.
When the data are encrypted, the embodiment of the invention does not encrypt the whole data packet by using a key and a single existing algorithm, but adopts the relevant basic characteristics of the intelligent wearable equipment data in the Bluetooth protocol to generate the unique encryption key corresponding to the transmission data in Bluetooth data transmission, so that the encryption key cannot be decrypted by using the existing symmetric encryption algorithm (Advanced Encryption Standard, AES) even if the key is leaked, the difficulty of decrypting the encryption key is great, the data are safer, the calculation amount of the encryption key can be reduced, and the calculation cost can be further reduced by embedding the encryption key into the hardware of the intelligent wearable equipment for calculation and storage in advance.
And acquiring transmission data which is originally required to be transmitted by Bluetooth and the public key by Bluetooth connection information, and preprocessing to obtain the transmission data.
The embodiment of the invention mainly encrypts the Bluetooth data packet, so that the transmission data to be transmitted needs to be obtained, and the embodiment is specific: and carrying out data encoding and compression processing on the data of the Bluetooth data packet before encryption to obtain encrypted data, and taking the obtained encrypted data as transmission data. And carrying out data coding and compression related preprocessing operation on the data so as to improve the transmission efficiency of the data and obtain the processed transmission data. In addition, the public key and the bluetooth connection related information of the intelligent wearable device, which are negotiated in advance by the data sender and the receiver, need to be acquired to perform the following encryption operation, and the bluetooth connection related information of the intelligent wearable device and the receiving device is recorded as bluetooth connection data.
Step S200, generating a key reference matrix by the Bluetooth connection data; and generating an encryption reference key by using the key reference matrix and the authentication PIN code.
Acquiring the bluetooth connection data obtained by preprocessing in the step S100, and extracting relevant protocol content of a bluetooth connection protocol to obtain relevant data used by the intelligent wearable device when performing bluetooth pairing, wherein the relevant data are recorded as bluetooth connection data, and for example, the bluetooth connection data comprise: the Bluetooth version information, bluetooth MAC addresses of the two-party equipment, an authentication PIN code and other relevant data, wherein the Bluetooth MAC addresses are unique 48-bit identifiers corresponding to each equipment, the unique 48-bit identifiers are generally represented by 16-bit systems, and the authentication PIN code is a 6-bit randomly generated number corresponding to each equipment.
The generation of the reference encryption key of the intelligent wearing data needs to be performed by using the related information, namely the generation of the reference encryption key of the intelligent wearing data needs to be performed by using the Bluetooth pairing data, and specific related operations are as follows:
generating a key reference matrix by the Bluetooth connection data; the Bluetooth connection data comprises a Bluetooth MAC address besides an identity verification PIN code;
The key reference matrix is:
; wherein J is a key reference matrix; bin is a decimal transfer function; /(I) The 1 st address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 2 nd address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 3 rd address bit of the Bluetooth MAC address of the intelligent wearable device; The 4 th address bit of the Bluetooth MAC address of the intelligent wearable device; /(I) The 5 th address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 6 th address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 6 th address bit of the bluetooth MAC address for the receiving device; /(I)The 5 th address bit of the bluetooth MAC address for the receiving device; The 4 th address bit of the bluetooth MAC address for the receiving device; /(I) The 3 rd address bit of the bluetooth MAC address for the receiving device; /(I)The 2 nd address bit of the bluetooth MAC address for the receiving device; /(I)The 1 st address bit of the bluetooth MAC address for the receiving device. The bluetooth MAC address is a 48-bit identifier, for example, when the bluetooth MAC address is represented by ABABABAB: CDCDCDCD: EFEFEFEF: GHGHGHGH: IJIJIJIJ: KLKLKLKL; six address bits in the key reference matrix, i.e., the six to which the colon is connected, such as ABABABAB is the first address bit of the bluetooth MAC address.
Wherein bin is a decimal conversion function, which can convert 16-ary numbers into decimal numbers. For two devices, namely the intelligent wearing device and the receiving device, when the two devices are paired, the pairing information of the two devices is kept unchanged, after the pairing, the information is permanently stored in the paired devices, the key reference matrix is obtained by using the pairing information, and for all Bluetooth transmission information of the two devices, the transmission key can keep a certain reference change rule while the transmission content is changed, so that the key operation amount of data encryption is reduced, and the reliability of the data is ensured.
Further, the key reference matrix and the authentication PIN code are utilized to generate an encryption reference key, and the method is characterized in that:
firstly, constructing an identity authentication PIN code matrix:
; wherein/> The 1 st digit of the PIN code is authenticated; /(I)The 2 nd digit of the PIN code is authenticated; /(I)The 3 rd digit of the PIN code is authenticated; /(I)The 4 th digit of the PIN code is authenticated; /(I)The 5 th digit of the PIN code is authenticated; /(I)The 6 th digit of the PIN code is authenticated.
Then, combining the identity verification PIN code matrix to construct a first matrix and a second matrix;
The first matrix is:
; wherein/> Is a first matrix; /(I)Is a key reference matrix; /(I)A transpose of the key reference matrix; /(I)The PIN code matrix is verified for identity.
The second matrix is:
; wherein/> Is a second matrix; /(I)Is a key reference matrix; /(I)Is the transpose of the authentication PIN code matrix.
Finally, the first matrix and the second matrix are combined to determine the encryption reference key.
The encryption reference key is:
wherein KEY is an encryption reference KEY; The corresponding characters are obtained by inquiring the ASCII table according to the decimal number; /(I) Is the 1 st element value in the first matrix K1; /(I)Is the 1 st element value in the second matrix K2; /(I)Is the m-th element value in the first matrix K1; /(I)Is the nth element value in the second matrix K2; /(I)Is the 6 th element value in the first matrix K1; /(I)Is the 16 th element value in the second matrix K2.
Because the equipment can randomly generate different identity verification PIN codes when being paired by Bluetooth, and other basic information can not change, wherein the PIN codes can be refreshed and reset only when a user initializes or reconnects the connection between two equipment, for Bluetooth communication of equipment time, the identity verification PIN codes can play a certain random updating role on a reference matrix while guaranteeing the stability of the key reference matrix, and the randomness and the flexibility of an encryption key can be greatly improved, so that the transmission of data is safer.
Thus, an encryption reference key is obtained.
Step S300, carrying out packetization processing on the transmission data to obtain sub-data packets; obtaining sub-packet abstracts according to the sub-packet data of each sub-data packet; and generating an encryption key of the sub-data packet by utilizing the sub-packet digest, the packet header information of the sub-data packet and the encryption reference key.
After the encryption reference key is obtained, unique standardized operation is required to be performed on the encryption key of the data packet by utilizing the characteristics of the data packet transmitted by Bluetooth, and the specific operation is as follows:
The method comprises the steps of carrying out packetizing processing on transmission data to be transmitted to obtain specific transmission quantity of information transmission and other related transmission information, specifically, because the data is transmitted by using a Bluetooth transmission protocol during transmission, the maximum data packet length is limited, and only 23 bytes of data can be transmitted, wherein 20 bytes of data and 3 bytes of headers are included, the transmission data is required to be packetized to obtain sub-data packets, and the sub-data packets are specifically: dividing transmission data into n=according to a maximum packet structure A sub-packet, wherein N is the byte length of the transmission data obtained by the preprocessing in step S100, and N is the number of sub-packets after division; /(I)To round the symbol up.
In the data transmission process, generally, encryption keys of a group of data are the same, and when a small amount of data is transmitted, the macro encryption methods can play a certain role in security protection, but when a large amount of data is transmitted, key analysis attack is easily suffered due to the fact that the number of transmitted data packets is too large, so that the data are required to be subjected to subpackaging simulation operation to obtain relevant information before encryption, the effect of one packet and one secret is achieved, and the transmission of data content is safer and more reliable.
Taking a bluetooth data packet as an example, the encryption reference key is subjected to unique processing by using packet information of the bluetooth data packet to obtain an encryption key of the data packet, and the specific steps are as follows:
Firstly, the sub-packet data of each sub-data packet is obtained, and a hash function is utilized to obtain a sub-packet abstract according to the sub-packet data of each sub-data packet.
Taking the first sub-packet as an example:
; wherein/> A sub-packet digest of the first sub-packet; /(I)Is a hash function; /(I)Is the packetized data of the first sub-packet. It should be noted that, the method for obtaining the sub-packet digest of the sub-packet by using the hash function and the method for obtaining the sub-packet data of the sub-packet are all known techniques to those skilled in the art, and will not be described herein. The hash function may convert the data within the sub-packet into a 128-bit unique digital digest.
After the sub-packet digest is obtained, the encryption key of the sub-packet is generated by using the sub-packet digest, the packet header information of the sub-packet, and the encryption reference key.
The encryption key of the sub-data packet is:
;/> An encryption key for the sub-packet; /(I) The corresponding characters are obtained by inquiring the ASCII table according to the decimal number; bin is a decimal transfer function; /(I)Characters of the reference key are encrypted for the ith; /(I)The ith character of the sub-packet abstract; /(I)A preamble of the Bluetooth data packet; > is a right shift operation; /(I)Is a cyclic redundancy check code; /(I)The method uses 10 ASCII printable characters to encode any byte data, and the 10 ASCII printable characters are numbers 0-9.
Wherein,In order to achieve the purpose of converting binary cyclic redundancy check codes into decimal numbers. The preamble of the bluetooth data packet is the header information of the sub data packet. The encryption key of the Bluetooth data packet is subjected to unique processing by utilizing the data summary information of the sub-data packet and the packet header information of the Bluetooth data packet, wherein the sub-packet summary is taken as a unique item measurement standard of the data, and the sub-packet summary generally only has the same data, so that for the sub-packet, the sub-packet is intercepted according to a certain length due to the existence of the sub-packet, and the unique representation effect of each sub-packet is given to a certain extent. And for the preamble, the preamble is used for positioning and synchronizing the data packet so as to facilitate the subsequent terminal to obtain the data reorganization of the data packet, so that the preamble is uniquely determined in a group of data packets, and similarly, the cyclic redundancy code can be used for guaranteeing the uniqueness of a generated key and the unique certainty of the generated key and also can be used for rapidly judging the problems of damage, modification and the like of the data packet when the data decryption is carried out, thereby guaranteeing the safety of the transmitted data.
And further obtains the encryption key of Bluetooth encryption.
Step S400, encrypting the sub-data packet by using an AES encryption algorithm and using an encryption key to obtain an encrypted data packet; forming a ciphertext data packet group by the encrypted data packet; and transmitting the ciphertext data packet group to receiving equipment.
And for each sub-data packet, encrypting the sub-data packet by using an AES encryption algorithm according to the encryption key corresponding to each sub-data packet to obtain an encrypted data packet.
The encrypted data packet is:
; wherein/> An encrypted packet that is an i-th sub-packet; /(I)Is an AES encryption algorithm; Data of the ith sub-data packet; /(I) Is the encryption key for the ith sub-packet.
And forming a ciphertext data packet group by the encrypted data packet.
The ciphertext data packet group is as follows:
; wherein/> Is a ciphertext data packet group; /(I)An encrypted packet that is the 1 st sub-packet; /(I)An encrypted packet that is the 2 nd sub-packet; /(I)An encrypted packet that is the nth sub-packet.
And obtaining a ciphertext data packet group, and encrypting the Bluetooth data packet. And transmitting the ciphertext data packet group corresponding to the intelligent wearable device to the receiving device, and sequentially transmitting the ciphertext data packet group to complete Bluetooth transmission.
After the data is finished, the receiving party can decrypt the data according to the ciphertext data packet group received by the receiving equipment, so as to obtain the transmission data of the intelligent wearable equipment and the corresponding Bluetooth data packet. The key is the encryption key obtained in step S300, the encryption key is managed by a third party, and the key corresponding to the current ciphertext data packet group can be obtained by a key distribution protocol of the third party.
In summary, the embodiments of the present invention relate to the technical field of data transmission. Firstly, encrypting a Bluetooth data packet transmitted by intelligent wearable equipment to obtain transmission data; acquiring Bluetooth connection data of the intelligent wearable device and the receiving device; the bluetooth connection data includes: verifying the PIN code; generating a key reference matrix by the Bluetooth connection data; generating an encryption reference key by using the key reference matrix and the authentication PIN code; the transmission data is subjected to sub-packaging processing to obtain sub-data packets; obtaining sub-packet abstracts according to the sub-packet data of each sub-data packet; generating an encryption key of the sub-data packet by utilizing the sub-packet abstract, the packet head information of the sub-data packet and the encryption reference key; encrypting the sub data packet by using an encryption key to obtain an encrypted data packet; forming a ciphertext data packet group by the encrypted data packet; and transmitting the ciphertext data packet group to receiving equipment. The invention improves the safety of data transmission of the intelligent wearable equipment.
The embodiment of the invention also provides a data transmission system for the intelligent wearable equipment, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor realizes the steps of the method when executing the computer program. Because a detailed description is given above for a data transmission method for the intelligent wearable device, the detailed description is omitted.
It should be noted that: the sequence of the embodiments of the present invention is only for description, and does not represent the advantages and disadvantages of the embodiments. The processes depicted in the accompanying drawings do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments.

Claims (10)

1. A data transmission method for an intelligent wearable device, the method comprising the steps of:
Encrypting a Bluetooth data packet transmitted by the intelligent wearable equipment to obtain transmission data; acquiring Bluetooth connection data of the intelligent wearable device and the receiving device; the bluetooth connection data includes: verifying the PIN code;
Generating a key reference matrix by the Bluetooth connection data; generating an encryption reference key by using the key reference matrix and the authentication PIN code;
The transmission data is subjected to sub-packaging processing to obtain sub-data packets; obtaining sub-packet abstracts according to the sub-packet data of each sub-data packet; generating an encryption key of the sub-data packet by utilizing the sub-packet abstract, the packet head information of the sub-data packet and the encryption reference key;
encrypting the sub-data packet by using an AES encryption algorithm and using an encryption key to obtain an encrypted data packet; forming a ciphertext data packet group by the encrypted data packet; and transmitting the ciphertext data packet group to receiving equipment.
2. The method for data transmission of a smart wearable device according to claim 1, wherein the generating a key reference matrix from the bluetooth connection data comprises:
The bluetooth connection data further includes: bluetooth MAC address;
The key reference matrix is:
; wherein J is a key reference matrix; bin is a decimal transfer function; /(I) The 1 st address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 2 nd address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 3 rd address bit of the Bluetooth MAC address of the intelligent wearable device; The 4 th address bit of the Bluetooth MAC address of the intelligent wearable device; /(I) The 5 th address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 6 th address bit of the Bluetooth MAC address of the intelligent wearable device; /(I)The 6 th address bit of the bluetooth MAC address for the receiving device; /(I)The 5 th address bit of the bluetooth MAC address for the receiving device; The 4 th address bit of the bluetooth MAC address for the receiving device; /(I) The 3 rd address bit of the bluetooth MAC address for the receiving device; /(I)The 2 nd address bit of the bluetooth MAC address for the receiving device; /(I)The 1 st address bit of the bluetooth MAC address for the receiving device.
3. The method for data transmission of a smart wearable device according to claim 1, wherein the generating an encrypted reference key using the key reference matrix and an authentication PIN code comprises:
,/>
wherein KEY is an encryption reference KEY; The corresponding characters are obtained by inquiring the ASCII table according to the decimal number; /(I) Is the 1 st element value in the first matrix K1; /(I)Is the 1 st element value in the second matrix K2; /(I)Is the m-th element value in the first matrix K1; /(I)Is the nth element value in the second matrix K2; /(I)Is the 6 th element value in the first matrix K1; is the 16 th element value in the second matrix K2.
4. A data transmission method for an intelligent wearable device according to claim 3, wherein the first matrix is:
; wherein/> Is a first matrix; /(I)Is a key reference matrix; /(I)A transpose of the key reference matrix; The PIN code matrix is verified for identity.
5. A data transmission method for an intelligent wearable device according to claim 3, wherein the second matrix is:
; wherein/> Is a second matrix; /(I)Is a key reference matrix; /(I)Is the transpose of the authentication PIN code matrix.
6. The data transmission method for an intelligent wearable device according to claim 4 or 5, wherein the authentication PIN code matrix is:
; wherein/> The 1 st digit of the PIN code is authenticated; /(I)The 2 nd digit of the PIN code is authenticated; /(I)The 3 rd digit of the PIN code is authenticated; /(I)The 4 th digit of the PIN code is authenticated; /(I)The 5 th digit of the PIN code is authenticated; /(I)The 6 th digit of the PIN code is authenticated.
7. The method for data transmission of the smart wearable device according to claim 1, wherein the generating the encryption key of the sub-packet using the sub-packet digest, the header information of the sub-packet, and the encryption reference key comprises:
The encryption key of the sub-data packet is:
;/> An encryption key for the sub-packet; /(I) The corresponding characters are obtained by inquiring the ASCII table according to the decimal number; bin is a decimal transfer function; characters of the reference key are encrypted for the ith; /(I) The ith character of the sub-packet abstract; /(I)A preamble of the Bluetooth data packet; > is a right shift operation; /(I)Is a cyclic redundancy check code; /(I)Any byte of data is encoded using 10 ASCII printable characters.
8. The method for data transmission of an intelligent wearable device according to claim 1, wherein the obtaining the sub-packet summary according to the sub-packet data of each sub-packet includes:
And obtaining the sub-packet digest according to the sub-packet data of each sub-data packet by utilizing the hash function.
9. The data transmission method for an intelligent wearable device according to claim 1, wherein the packetizing the transmission data to obtain the sub-data packet includes:
The transmission data is divided into a plurality of sub-packets according to a maximum packet structure.
10. A data transmission system for a smart wearable device, comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of a data transmission method for a smart wearable device according to any of claims 1-9 when the computer program is executed by the processor.
CN202410294935.9A 2024-03-15 2024-03-15 Data transmission method and system for intelligent wearable equipment Active CN117915317B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410294935.9A CN117915317B (en) 2024-03-15 2024-03-15 Data transmission method and system for intelligent wearable equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410294935.9A CN117915317B (en) 2024-03-15 2024-03-15 Data transmission method and system for intelligent wearable equipment

Publications (2)

Publication Number Publication Date
CN117915317A CN117915317A (en) 2024-04-19
CN117915317B true CN117915317B (en) 2024-05-31

Family

ID=90692641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410294935.9A Active CN117915317B (en) 2024-03-15 2024-03-15 Data transmission method and system for intelligent wearable equipment

Country Status (1)

Country Link
CN (1) CN117915317B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116033415A (en) * 2021-10-26 2023-04-28 千寻位置网络有限公司 Reference station data transmission method and device, reference station, server and medium
CN117240409A (en) * 2023-11-15 2023-12-15 深圳市阿龙电子有限公司 Data processing method for smart phone and smart wearable device
EP4333367A1 (en) * 2022-09-05 2024-03-06 Commissariat à l'énergie atomique et aux énergies alternatives Access control method with conditional authentication

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7398550B2 (en) * 2003-06-18 2008-07-08 Microsoft Corporation Enhanced shared secret provisioning protocol
CN110086609B (en) * 2019-03-27 2020-10-09 华为技术有限公司 Method for safely backing up and safely recovering data and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116033415A (en) * 2021-10-26 2023-04-28 千寻位置网络有限公司 Reference station data transmission method and device, reference station, server and medium
EP4333367A1 (en) * 2022-09-05 2024-03-06 Commissariat à l'énergie atomique et aux énergies alternatives Access control method with conditional authentication
CN117240409A (en) * 2023-11-15 2023-12-15 深圳市阿龙电子有限公司 Data processing method for smart phone and smart wearable device

Also Published As

Publication number Publication date
CN117915317A (en) 2024-04-19

Similar Documents

Publication Publication Date Title
CN111541677B (en) Safe hybrid encryption method based on narrowband Internet of things
CN107911354B (en) Composite parallel data encryption method
CN116321129B (en) Lightweight dynamic key-based power transaction private network communication encryption method
CN102469173A (en) IPv6 (Internet Protocol Version 6) network layer credible transmission method and system based on combined public key algorithm
CN102594842A (en) Device-fingerprint-based network management message authentication and encryption scheme
CN114826656A (en) Trusted data link transmission method and system
CN113312608B (en) Electric power metering terminal identity authentication method and system based on time stamp
CN117278324B (en) Message encryption transmission method and system
CN111224974A (en) Method, system, electronic device and storage medium for network communication content encryption
RU2459367C2 (en) Method to generate alternating key for unit coding and transfer of coded data
CN114003970B (en) Hash chain-based low-overhead message integrity protection method
CN111163108A (en) Electric power Internet of things security terminal chip composite encryption system and method
CN117098120B (en) Beidou short message data encryption and decryption method, equipment and storage medium
CN113795023A (en) Bluetooth data transmission encryption method based on chaotic sequence and block encryption
CN116996206B (en) Network communication information encryption transmission method and system
CN111800784A (en) Block chain cloud service system based on cloud computing
CN117915317B (en) Data transmission method and system for intelligent wearable equipment
Sehrawat et al. Ultra BRIGHT: a tiny and fast ultra lightweight block cipher for IoT
Ramtri et al. Secure banking transactions using RSA and two fish algorithms
CN113645616A (en) Ultra-lightweight encryption method suitable for WBAN data real-time encryption transmission
CN117544418B (en) Method and system for realizing mutual trust of different terminals based on message encryption and decryption
CN111709011A (en) Light-weight RFID (radio frequency identification device) bidirectional authentication method based on PUF (physical unclonable function)
CN113923029B (en) Internet of things information encryption method based on ECC (error correction code) hybrid algorithm
CN115242392B (en) Method and system for realizing industrial information safety transmission based on safety transmission protocol
AU2021102898A4 (en) Transmission Encryption Method, System, Device And Readable Storage Medium Of Function Parameter Data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant