WO2021051387A1 - 无线体域网及其密钥生成方法、分配方法和相关装置 - Google Patents
无线体域网及其密钥生成方法、分配方法和相关装置 Download PDFInfo
- Publication number
- WO2021051387A1 WO2021051387A1 PCT/CN2019/106987 CN2019106987W WO2021051387A1 WO 2021051387 A1 WO2021051387 A1 WO 2021051387A1 CN 2019106987 W CN2019106987 W CN 2019106987W WO 2021051387 A1 WO2021051387 A1 WO 2021051387A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- acceleration signal
- signal
- gait
- information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01P—MEASURING LINEAR OR ANGULAR SPEED, ACCELERATION, DECELERATION, OR SHOCK; INDICATING PRESENCE, ABSENCE, OR DIRECTION, OF MOVEMENT
- G01P15/00—Measuring acceleration; Measuring deceleration; Measuring shock, i.e. sudden change of acceleration
- G01P15/18—Measuring acceleration; Measuring deceleration; Measuring shock, i.e. sudden change of acceleration in two or more dimensions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3827—Portable transceivers
- H04B1/385—Transceivers carried on the body, e.g. in helmets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B13/00—Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
- H04B13/005—Transmission systems in which the medium consists of the human body
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/04—Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- This application belongs to the field of computer science and application technology, and in particular relates to a wireless body area network, a coordinator node, a wearable device, a key generation method, a distribution method and a computer-readable storage medium for the wireless body area network.
- the data collected and transmitted by the wearable device has the requirements of privacy and high security.
- traditional data transmission security methods are not suitable for wearable devices with limited resources; however, the security level of network security methods for large-scale sensor networks cannot meet the requirements of wearable devices.
- the security application requirements of the equipment are not limited to the wireless body area network.
- the embodiments of the present application provide a key generation method, distribution method, and computer-readable storage medium of a wireless body area network, a coordinator node, a wearable device, and a wireless body area network, aiming to solve the current wireless body area network key
- the security and consistency of the allocation is poor, and the problem of consuming more resources.
- an embodiment of the present application provides a wireless body area network.
- the wireless body area network includes a coordinator node and at least one wearable device communicatively connected to the coordinator node.
- the coordinator node and the Wearable devices are integrated with acceleration acquisition devices;
- the coordinator node is used to send a data collection synchronization message to the wearable device; collect the first-stage acceleration signal; extract the first-stage common information in the first-stage acceleration signal; according to the key to be distributed Sharing information with the first state to generate key encryption information; sending the key encryption information to the wearable device;
- the wearable device is configured to receive the data collection synchronization message, synchronously collect a second gait acceleration signal according to the data collection synchronization message; extract second gait common information in the second gait acceleration signal; Receiving the key encryption information; decrypting the key encryption information according to the second gait information to obtain the key to be distributed;
- the first step state common information is the position information of the peak value and the bottom value of the first step state acceleration signal
- the second gait common information is the peak value and the bottom value of the second gait acceleration signal Location information.
- the gait acceleration signal is synchronously collected through the acceleration acquisition device integrated by the coordinator and the wearable device, and the peak and valley position information in the gait acceleration signal is extracted accordingly as the gait common information, and the gait common information is used for
- the key distribution of the wireless body area network has high security and consistency, simple calculation, and is suitable for wearable devices with limited resources.
- the extraction process of the position information of the peak and valley values of the gait acceleration signal is simpler and more convenient, so that the key distribution process of the wireless body area network consumes less computing resources, and is suitable for resource-constrained wearable devices.
- the location information is used as the gait common information for encryption and decryption.
- the security is high, and only the coordinator node is required to generate the key, and the gait common information shared by the coordinator node and the wearable device is used for encryption and decryption. Key distribution, high consistency.
- the coordinator node is specifically configured to:
- the key to be distributed is generated according to the noise signal in the first-stage acceleration signal.
- the method of generating the key to be distributed can be arbitrary. Compared with other methods, the noise signal in the gait acceleration signal is used to generate the key to be distributed, which can improve the performance of the key. Randomness and information entropy.
- an embodiment of the present application provides a key distribution method for a wireless body area network, using a coordinator node of the wireless body area network, the coordinator node is integrated with an acceleration acquisition device, and the coordinator node is connected to at least one Wearable device communication connection; the method includes:
- Collect the first-stage acceleration signal extract the first-stage state common information in the first-stage state acceleration signal; generate key encryption information according to the key to be distributed and the first-stage state common information; send the Key encryption information to the wearable device to instruct the wearable device to decrypt the key encryption information according to the second gait common information extracted from the second gait acceleration signal to obtain the Describe the key to be distributed;
- the first step state common information is the position information of the peak value and the bottom value of the first step state acceleration signal
- the second gait common information is the peak value and the bottom value of the second gait acceleration signal Location information.
- the embodiments of the present application provide a key distribution method for a wireless body area network, which is applied to a wearable device of the wireless body area network.
- the wearable device is integrated with an acceleration acquisition device, and the wearable device cooperates with Device node communication connection; the method includes:
- the key encryption information sent by the coordinator node, the key encryption information is generated by the coordinator node based on the first-step state common information extracted from the collected first-step state acceleration signal and the key to be distributed ⁇ ; Decrypt the key encrypted information according to the second gait information to obtain the key to be distributed;
- the first step state common information is the position information of the peak value and the bottom value of the first step state acceleration signal
- the second gait common information is the peak value and the bottom value of the second gait acceleration signal Location information.
- an embodiment of the present application provides a key generation method for a wireless body area network, which is applied to a coordinator node of a wireless body area network, the coordinator node is integrated with an acceleration acquisition device, and the method includes:
- Collect the first-stage acceleration signal extract the noise signal in the first-stage acceleration signal; generate the key to be distributed according to the noise signal.
- an embodiment of the present application provides a coordinator node, including an acceleration acquisition device, a memory, a processor, and a computer program stored in the memory and running on the processor, and the processor executes all
- the computer program implements the method according to any one of the second aspect or the fourth aspect.
- an embodiment of the present application provides a wearable device, including an acceleration acquisition device, a memory, a processor, and a computer program stored in the memory and running on the processor, and the processor executes all
- the computer program implements the method described in any one of the above third aspects.
- an embodiment of the present application provides a computer-readable storage medium that stores a computer program that, when executed by a processor, implements any of the above-mentioned second aspect or the above-mentioned fourth aspect. The method described in one item.
- embodiments of the present application provide a computer program product, which when the computer program product runs on a coordinator node, causes the coordinator node to execute the method described in any one of the second aspect or the fourth aspect.
- an embodiment of the present application provides a computer program product that, when the computer program product runs on a wearable device, causes the wearable device to execute the method described in any one of the foregoing third aspects.
- the gait acceleration signal is synchronously collected through the acceleration acquisition device integrated by the coordinator and the wearable device, and the peak and valley position information in the gait acceleration signal are extracted accordingly as the gait common information, and the gait common information is used.
- Information is used for key distribution of wireless body area network, which has high security and consistency, simple calculation, and is suitable for wearable devices with limited resources.
- FIG. 1 is a schematic block diagram of a system architecture of a wireless body area network provided by an embodiment of this application;
- Figure 2 is a schematic diagram of a signed window coding provided by an embodiment of the application
- FIG. 3 is a schematic diagram of a zero-phase filtering process provided by an embodiment of the application.
- FIG. 4 is a schematic diagram of coding based on noise signals provided by an embodiment of the application.
- FIG. 5 is a schematic block diagram of the flow of a key distribution method for a wireless body area network according to an embodiment of the application
- FIG. 6 is a schematic block diagram of a process of generating a key to be distributed according to a noise signal according to an embodiment of the application
- FIG. 7 is a schematic block diagram of the flow of a key distribution method for a wireless body area network according to an embodiment of the application.
- FIG. 8 is a schematic block diagram of the flow of a method for generating a key for a wireless body area network according to an embodiment of the application
- FIG. 9 is a schematic diagram of interaction between a coordinator node and a wearable device provided by an embodiment of the application.
- FIG. 10 is a schematic block diagram of the structure of a key distribution device for a wireless body area network according to an embodiment of the application.
- FIG. 11 is a schematic block diagram of a structure of a key distribution device for a wireless body area network according to an embodiment of the application.
- FIG. 12 is a schematic block diagram of the structure of a key generation device for a wireless body area network according to an embodiment of the application.
- FIG. 13 is a schematic structural diagram of a coordinator node provided by an embodiment of the application.
- FIG. 14 is a schematic structural diagram of a wearable device provided by an embodiment of the application.
- Wireless Body Area Network is a communication network centered on the human body and composed of various network elements related to the human body. These network elements can be sensors deployed on various parts of the body, and/or wearable devices worn on various parts of the human body.
- Wearable device refers to a portable device that can be worn directly on the body or integrated into the user's clothes or accessories. For example, smart watches, smart glasses, smart bracelets or other wearable physical sign monitoring devices.
- FIG. 1 is a schematic block diagram of a system architecture of a wireless body area network according to an embodiment of the present application.
- the wireless body area network includes a coordinator node 11 and at least one wearable device 12 communicatively connected to the coordinator node. Both the coordinator node 11 and the wearable device 12 are integrated with acceleration collection devices.
- the acceleration collection device may be, but is not limited to, a three-axis acceleration sensor, and the coordinator node and the wearable device can collect the user's gait acceleration signal through the acceleration collection device.
- the coordinator node is used to send data acquisition synchronization messages to the wearable device; collect the first-stage acceleration signal; extract the first-stage state common information in the first-stage acceleration signal; according to the key to be distributed and the first step State common information, generate key encryption information; send the key encryption information to the wearable device.
- the common information of the first state is the position information of the peak and valley values of the acceleration signal of the first state.
- the wearable device is used to receive the data collection synchronization message, according to the data collection synchronization message, synchronously collect the second gait acceleration signal; extract the second gait common information in the second gait acceleration signal; receive the key encryption information; The two-gait shared information decrypts the key encrypted information to obtain the key to be distributed.
- the second gait common information is the position information of the peak and valley values of the second gait acceleration signal.
- the aforementioned coordinator node may also be referred to as a wearable gateway, and the coordinator node may function as a gateway in a wireless body area network.
- the coordinator node is wirelessly connected to at least one wearable device, and the wireless communication mode can be any.
- the coordinator node sends a broadcast data collection synchronization message to each wearable device. After the wearable device receives the data collection synchronization message, it completes the synchronization of the gait acceleration signal according to the data collection synchronization message.
- Synchronous collection of gait acceleration signals means that the coordinator node and the wearable device collect the gait acceleration information at the same time through their own acceleration collection devices. That is to say, the first step acceleration signal and the second gait acceleration signal are collected synchronously, which are the gait acceleration information at the same time. The first and second gait acceleration signals are only to distinguish which device collected the gait acceleration signal.
- the coordinator node and the wearable device synchronously collect the gait acceleration signal, the corresponding key distribution process can be carried out.
- the coordinator node After the coordinator node collects the first-stage acceleration signal, it can extract the gait common information according to the first-stage acceleration signal, and then encrypt the key to be distributed according to the extracted first-stage common information, and the encrypted key The encrypted information is sent to each wearable device.
- the wearable device collects the second gait acceleration signal, extract the second gait common information in the second gait acceleration signal; when the wearable device receives the key encryption information sent by the coordinator node, use the second step The state information is decrypted, and the key to be distributed is obtained.
- the key to be distributed generated by the coordinator node can be shared to each wearable device of the wireless body area network to realize the key distribution of the wireless body area network.
- the key can be used for data encryption transmission between the coordinator node and each wearable device.
- the above-mentioned gait common information is the position information of the peak and valley values of the gait acceleration signal. Specifically, on a gait acceleration signal curve, corresponding encoding is performed according to the position of the peak value and the time sequence position of the valley value to obtain the above-mentioned position information. For example, when extracting gait common information through a sliding window, use the sliding window to slide on the gait acceleration signal curve. When the peak value appears in the first sliding window, it is coded as 1, and when the valley value appears in the two sliding windows, Then the code is -1. Correspondingly, when there are no peaks and valleys in the third sliding window, no coding is performed, and the position information of the peaks and valleys on the gait acceleration signal curve is extracted accordingly.
- the coordinator node is specifically used to: perform low-pass filtering on the first-stage acceleration signal; perform a dimensionality reduction operation on the first-stage acceleration signal after the low-pass filtering, to obtain the first step after dimensionality reduction State acceleration signal; extract the first position information of the peak and valley value of the first step state acceleration signal after dimensional reduction in time domain and frequency domain respectively.
- the filtering operation performed on the acceleration signal of the first state may be specifically, but not limited to, Butterworth low-pass filtering.
- the dimensionality reduction operation can be, but is not limited to, principal components analysis (PCA), and subsequent analysis is performed based on the first-stage acceleration signal after the dimensionality reduction.
- PCA principal components analysis
- r_signal is the acceleration signal of the first state above
- x, y, and z respectively represent the x-axis, y-axis and z-axis of the three-axis acceleration
- pca_signal is the first principal component after dimensionality reduction using PCA.
- the dimensionality reduction algorithm can also be other algorithms, which are not limited here.
- the position information of the peak and valley values of the first-stage acceleration signal in the time domain and the peak and valley values of the first-stage acceleration signal in the frequency domain can be extracted Location information.
- the method of extracting location information can be arbitrary.
- a signed sliding coding algorithm can be used for extraction.
- the coordinator node is specifically used to extract the peak sum of the fast Fourier transform results of the first-stage acceleration signal after dimensionality reduction and the first-stage acceleration signal after dimensionality reduction based on the signed sliding window coding algorithm The first position information of the valley;
- the signed sliding window coding algorithm (Signed Sliding Window Coding, SSWC) process specifically includes:
- the window coding in the frequency domain is followed by the coding in the time domain.
- the size of the sliding window in the time domain and the frequency domain is W t and W f , respectively.
- the values of W t and W f are determined by the sampling frequency of the gait acceleration signal. Decided. Refer to the schematic diagram of signed window coding shown in Fig. 2, W t is set to 20 sampling points, W f is set to 1 Hz, and for the gait acceleration signal in the time domain, it is coded as ⁇ 1 according to the positions of the peak and valley values.
- the signed sliding window algorithm can further improve the convenience of extracting gait common information and reduce the amount of calculation.
- the peak value and the bottom value can be expressed by different symbol values, which can increase the coding rate.
- the process of extracting common gait information of wearable devices is similar to the process of extracting common gait information of coordinator nodes.
- the above-mentioned wearable device is specifically used to: perform low-pass filtering on the second gait acceleration signal; perform a dimensionality reduction operation on the low-pass filtered second gait acceleration signal to obtain the second dimensionality reduction Gait acceleration signal: extract the second position information of the peak and valley value of the second gait acceleration signal after dimension reduction in time domain and frequency domain respectively.
- the aforementioned dimensionality reduction operation may be, but not limited to, the PCA dimensionality reduction algorithm.
- the position information of the peak and valley of the second gait acceleration signal in the time domain and the position information of the peak and valley of the second gait acceleration signal in the frequency domain can be extracted respectively.
- the location information can be extracted by a signed sliding window coding algorithm.
- wearable device is specifically used for:
- the process of the signed sliding window coding algorithm specifically includes:
- the signed sliding window slides on the second gait acceleration signal after dimensionality reduction.
- the total information pool increases by i; when a valley appears in the i-th window, the total information pool increases by -i;
- i is an integer.
- the signed sliding window slides on the acceleration signal of the first step after dimensionality reduction.
- the i-th window has a peak value
- the total information pool increases by -i
- the i-th window has a valley value
- the total information pool increases i
- the window continues to slide, and i is an integer.
- the signed sliding window coding algorithm in the wearable device is the same as the signed sliding window coding algorithm in the coordinator node.
- the signed sliding window coding algorithm in the coordinator node please refer to the corresponding content above, which will not be repeated here.
- the signed sliding window coding algorithm can make the extraction process of gait common information simpler and more convenient, with less calculation, and suitable for wearable devices with limited computing resources.
- the coordinator node After the coordinator node extracts the first state common information from the first state acceleration signal, it can use the first state common information to encrypt the key to be distributed to obtain the encrypted key encryption information.
- a fuzzy safe can be constructed based on the fuzzy vault algorithm, using the first-step common information to encrypt the key to be distributed.
- the aforementioned coordinator node is specifically used to: divide the key to be distributed into N segments, each segment of the key to be distributed is a coefficient of an N-th order polynomial; according to the first-step state common information and the N-th order polynomial, Construct a fuzzy safe, and the fuzzy safe encrypts information with a key.
- the M-bit key to be distributed is key_M
- each segment is Is a coefficient of the N-order polynomial
- the coordinator node sends the vault set V to the wearable device.
- the way to obtain the key encryption information may not be limited to Fuzzy Vault.
- the wearable device After the wearable device extracts the second gait common information, it can always wait to receive the key encryption information sent by the coordinator node. After the wearable device receives the key encryption information, it can use the second gait common information to decrypt the key encryption information to obtain the key to be distributed.
- the wearable device is specifically used to unlock the fuzzy safe according to the second gait common information to obtain the key to be distributed.
- the wearable device After receiving the vault set V, the wearable device finds the set P from the set V according to the common information of the second gait, and solves the above polynomial f(x) according to the set P to obtain the polynomial coefficients C 0 , C 1 , C 2 ,...,C N , and then concatenate the polynomial coefficients to obtain the above-mentioned M-bit key to be distributed.
- the above-mentioned method of generating the key to be distributed can be arbitrary.
- the gait acceleration signal can be used to generate the key to be distributed.
- the key to be distributed can be generated by the noise signal superimposed on the gait acceleration signal.
- the aforementioned coordinator node is specifically configured to generate the key to be distributed according to the noise signal in the first-stage acceleration signal.
- the coordinator node After the coordinator node collects the acceleration signal of the first state, it can first extract the noise signal in the acceleration signal of the first state, and then generate the aforementioned key to be distributed based on the noise signal. That is, the aforementioned coordinator node can be specifically used to: extract the noise signal in the first-stage acceleration signal; encode the noise signal to obtain the key; perform key enhancement operations on the key to obtain the key to be distributed.
- Generating the key to be distributed according to the noise signal superimposed on the gait acceleration signal may include steps such as noise extraction, noise encoding, and key enhancement.
- the first-stage acceleration signal can be filtered first, and then the filtered first-stage acceleration signal and the first-stage acceleration signal before filtering are subtracted to obtain the noise information sum. That is, the above-mentioned coordinator node is specifically used to: perform zero-phase filtering on the acceleration signal of the first state to obtain the filtered first state acceleration signal; subtract the filtered first state acceleration signal from the first state acceleration signal , Get the noise signal.
- the above-mentioned zero-phase filtering process specifically includes: inputting the first-stage acceleration signal to the low-pass Butterworth filter to obtain the first-stage filtered output of the low-pass Butterworth filter. Acceleration signal; perform time reversal operation on the first-stage acceleration signal after the first filtering to obtain the first-stage acceleration signal after the first reversal; the first-stage acceleration after the first reversal The signal is input to the low-pass Butterworth filter to obtain the first-stage acceleration signal after the second filtering output from the low-pass Butterworth filter; the first-stage acceleration signal after the second filtering is time-reversed The first state acceleration signal after the second reversal is obtained by the turning operation, and the first-state acceleration signal after the second reversal is the filtered first-state acceleration signal.
- the first-step state acceleration signal f_sig x′ 1 ,x′ 2 ,x′ 3 ,...,x′ N-1 ,x′ N after the second filtering; then f_sig is time-reversed to obtain the first
- ff_sig is reversed in time for the second time to obtain the first-step
- n_sig r_sig-rev_ff_sig
- n_sig is the noise signal in the first-stage acceleration signal.
- the noise signal in the acceleration signal of the first state After the noise signal in the acceleration signal of the first state is extracted, the noise signal can be encoded.
- the acceleration collection device on the coordinator node is a three-axis acceleration sensor.
- the acceleration signals of the x-axis, y-axis and z-axis are collected by the three-axis acceleration sensor.
- the noise signal includes the first noise signal of the x-axis ,
- the aforementioned coordinator node is specifically used to: set the corresponding bit of the first binary random sequence to the corresponding value according to the value of each bit in the first noise signal , Get the first key; according to the value of each bit in the second noise signal, set the corresponding bit of the second binary random sequence to the corresponding value to get the second key; according to the value of each bit in the third noise signal, The corresponding bit of the third binary random sequence is set to the corresponding value, and the third key is obtained;
- k-th bit in the noise signal if the k-th bit in the noise signal is greater than or equal to 0, set the k-th bit of the binary random sequence to the first value; if the k-th bit in the noise signal is less than 0, set the k-th bit of the binary random sequence Set to the second value, and k is an integer.
- the above-mentioned first value may be 1, and correspondingly, the second value is 0.
- the above-mentioned first value can also be 0, and correspondingly, the second value is 1.
- the first bit in the first noise signal is greater than or equal to 0, then the first bit in the first binary random sequence is set to 1, and the second bit in the first noise signal is less than 0, then the first two The second bit of the binary random sequence is set to 0, and so on, according to the value of each bit in the first noise signal, the corresponding bit of the first binary random sequence is set to the corresponding value.
- the key enhancement operation is performed on the obtained key.
- the process of key enhancement may specifically include: performing an exclusive OR operation on the first key, the second key, and the third key to obtain the M-bit key to be distributed. which is
- the process of key enhancement further includes: XORing the first key, the second key, and the third key to obtain the XORed key; and for the XORed key Down-sampling is performed to obtain the key to be distributed.
- performing an exclusive OR operation on the key can further improve the randomness and information entropy of the generated key to be distributed. Further, after the exclusive OR operation, a down-sampling operation is also performed, which can further improve the randomness and information entropy of the key to be distributed.
- FIG. 5 is a schematic block diagram of the flow of a key distribution method for a wireless body area network according to an embodiment of this application.
- the method can be applied to a coordinator node of the wireless body area network, and the coordinator node is integrated with an acceleration collection device.
- the coordinator node is in communication connection with at least one wearable device.
- the above method may include the following steps:
- Step S501 Send a data collection synchronization message to the wearable device, and the data collection synchronization information is used to instruct the wearable device to synchronously collect the second gait acceleration signal.
- Step S502 Collect the acceleration signal of the first state.
- the extraction process of the first-stage state common information specifically includes: low-pass filtering the first-stage acceleration signal; performing a dimensionality reduction operation on the first-stage acceleration signal after the low-pass filtering to obtain the first-stage acceleration signal after dimensionality reduction.
- Gait acceleration signal extract the first position information of the peak and valley value of the first-step acceleration signal after dimensionality reduction in the time domain and frequency domain, respectively.
- the process of separately extracting the first position information of the peak and valley values of the first-stage acceleration signal after the dimensional reduction in the time domain and the frequency domain may include:
- the process of the signed sliding window coding algorithm specifically includes:
- the signed sliding window slides on the first-stage acceleration signal after dimensionality reduction.
- the total information pool increases by i; when a valley occurs in the i-th window, the total information pool increases by -i;
- i is an integer.
- Step S504 Generate key encryption information according to the key to be distributed and the shared information of the first step.
- Step S505 Send the key encryption information to the wearable device to instruct the wearable device to decrypt the key encryption information according to the second gait common information extracted from the second gait acceleration signal to obtain the key to be distributed;
- the first step state common information is the position information of the peak value and valley value of the first state acceleration signal;
- the second gait common information is the position information of the peak value and the bottom value of the second gait acceleration signal.
- the wearable device can interface according to the second gait common information extracted by itself to obtain the key to be distributed.
- the method of generating the key to be distributed can be arbitrary. However, in order to improve the randomness and information entropy of the key, the key can be generated based on the noise signal superimposed on the gait acceleration signal.
- FIG. 6 is a schematic block diagram of the process of generating the key to be distributed according to the noise signal.
- the process of generating the key to be distributed according to the noise signal superimposed on the acceleration signal of the first state specifically includes:
- Step S601 Extract a noise signal in the acceleration signal of the first state.
- the extraction process of the noise signal specifically includes: performing zero-phase filtering on the first-stage acceleration signal; then subtracting the filtered first-stage acceleration signal from the first-stage acceleration signal to obtain the first-stage acceleration The noise signal superimposed on the signal.
- the zero-phase filtering process can be referred to the relevant introduction corresponding to FIG. 3 above, and will not be repeated here.
- Step S602 Encode the noise signal to obtain a key.
- noise coding process can be referred to the corresponding content above, which will not be repeated here.
- Step S603 Perform a key enhancement operation on the key to obtain the key to be distributed.
- the first key, the second key, and the third key can be XORed to obtain the key to be distributed. It is also possible to perform an XOR operation on the first key, the second key, and the third key to obtain the XOR key; then down-sample the XOR key to obtain the key to be distributed.
- the process of generating the key to be distributed is specifically: generating the key to be distributed according to the noise signal in the first-stage acceleration signal.
- the above process of generating the key to be distributed according to the noise signal in the first-stage acceleration signal may specifically include: extracting the noise signal in the first-stage acceleration signal; encoding the noise signal to obtain the secret key; The key performs key enhancement operations to obtain the key to be distributed.
- the above-mentioned process of extracting the noise signal in the acceleration signal of the first state may include: performing zero-phase filtering on the acceleration signal of the first state to obtain the filtered acceleration signal of the first state; Subtract the filtered first-stage acceleration signal to obtain the noise signal.
- the zero-phase filtering process specifically includes: inputting the first-stage acceleration signal to the low-pass Butterworth filter to obtain the first-stage acceleration signal after the first filtering output by the low-pass Butterworth filter;
- the first step is the acceleration signal.
- the acceleration acquisition device is a three-axis acceleration sensor
- the noise signal includes a first noise signal on the x-axis, a second noise signal on the y-axis, and a third noise signal on the z-axis;
- the specific process of encoding the noise signal to obtain the key may include:
- the corresponding bit of the first binary random sequence is set to the corresponding value to obtain the first key
- the corresponding bit of the second binary random sequence is set to the corresponding value to obtain the second key
- k-th bit in the noise signal if the k-th bit in the noise signal is greater than or equal to 0, set the k-th bit of the binary random sequence to the first value; if the k-th bit in the noise signal is less than 0, set the k-th bit of the binary random sequence Set to the second value, and k is an integer.
- process of performing the key enhancement operation on the key to obtain the key to be distributed may include:
- the process of extracting the common information of the first state in the acceleration signal of the first state may include:
- the first position information of the peak value and the bottom value of the first-stage acceleration signal after the dimensional reduction in the time domain and the frequency domain are respectively extracted.
- the process of the signed sliding window coding algorithm specifically includes:
- the signed sliding window slides on the first-stage acceleration signal after dimensionality reduction.
- the total information pool increases by i; when a valley occurs in the i-th window, the total information pool increases by -i;
- i is an integer.
- the above-mentioned process of generating key encryption information according to the key to be distributed and the first-step state information specifically includes:
- a fuzzy safe is constructed, and the fuzzy safe is the key to encrypt the information.
- FIG. 7 a schematic block diagram of the flow of a key distribution method for a wireless body area network provided by an embodiment of this application.
- the method can be applied to a wearable device of a wireless body area network, and the wearable device is integrated with an acceleration collection device.
- the wearable device communicates with the coordinator node.
- the above method may include the following steps:
- Step S701 Receive a data collection synchronization message sent by the coordinator node.
- Step S702 Synchronously collect the second gait acceleration signal according to the data collection synchronization message.
- Step S703 Extract the second gait common information in the second gait acceleration signal.
- Step S705 Decrypt the key encrypted information according to the second gait common information to obtain the key to be distributed; wherein the first-step state common information is the position information of the peak and valley value of the acceleration signal of the first state; second The gait common information is the position information of the peak and valley of the second gait acceleration signal.
- the foregoing process of extracting the second gait common information in the second gait acceleration signal may include:
- the second position information of the peak value and the valley value of the second gait acceleration signal after the dimensional reduction in the time domain and the frequency domain are respectively extracted.
- the above-mentioned process of separately extracting the second position information of the peak and valley values of the second gait acceleration signal after the dimensional reduction in the time domain and the frequency domain may include:
- the process of the signed sliding window coding algorithm specifically includes:
- the signed sliding window slides on the second gait acceleration signal after dimensionality reduction.
- the total information pool increases by i; when a valley appears in the i-th window, the total information pool increases by -i;
- i is an integer.
- the key encryption information is a fuzzy safe
- the above-mentioned decryption of the key encryption information according to the second gait common information, and the specific process of obtaining the key to be distributed may include:
- the fuzzy safe is unlocked according to the common information of the second gait, and the key to be distributed is obtained.
- FIG. 8 shows a schematic block diagram of the flow of a key generation method of a wireless body area network
- the key generation method is applied to a coordinator node of the wireless body area network
- the coordinator node is integrated with an acceleration collection device.
- the above method can It includes the following steps:
- Step S801 Collect the first-stage acceleration signal.
- Step S802 Extract the noise signal in the acceleration signal of the first state.
- Step S803 Generate a key to be distributed according to the noise signal.
- zero-phase filtering can be performed on the first-stage acceleration signal, and then the filtered first-stage acceleration signal can be subtracted from the first-stage acceleration signal to extract Out the above-mentioned noise signal. Then, the noise signal is encoded again, and then the key enhancement operation is performed after encoding to generate the above-mentioned key to be distributed.
- the process of extracting the noise signal in the first-stage acceleration signal may include: performing zero-phase filtering on the first-stage acceleration signal to obtain the filtered first-stage acceleration signal; The first-step state acceleration signal after filtering is subtracted from the state acceleration signal to obtain a noise signal. Further, the above-mentioned process of performing zero-phase filtering on the first-stage acceleration signal to obtain the filtered first-stage acceleration signal may include: inputting the first-stage acceleration signal to a low-pass Butterworth filter to obtain a low-pass The first-stage acceleration signal after the first filtering output by the Butterworth filter; time-reverse operation is performed on the first-stage acceleration signal after the first filtering to obtain the first-stage acceleration signal after the first reversal.
- Gait acceleration signal input the first-stage acceleration signal after the first inversion to the low-pass Butterworth filter to obtain the first-stage acceleration after the second filtering output from the low-pass Butterworth filter Signal; time-reverse the acceleration signal of the first state after the second filtering, and get the acceleration signal of the first state after the second reversal, and the acceleration signal of the first state after the second reversal is The filtered first state acceleration signal.
- the above-mentioned process of generating the key to be distributed based on the noise signal may include: encoding the noise signal to obtain the key; performing a key enhancement operation on the key to obtain the key to be distributed.
- the acceleration acquisition device is a three-axis acceleration sensor
- the noise signal includes a first noise signal on the x-axis, a second noise signal on the y-axis, and a third noise signal on the z-axis;
- the process of encoding the noise signal to obtain the key may include: according to the value of each bit in the first noise signal, setting the corresponding bit of the first binary random sequence to the corresponding value to obtain the first key; For the value of each bit in the noise signal, the corresponding bit of the second binary random sequence is set to the corresponding value to obtain the second key; according to the value of each bit in the third noise signal, the corresponding bit of the third binary random sequence Set to the corresponding value to get the third key;
- k-th bit in the noise signal if the k-th bit in the noise signal is greater than or equal to 0, set the k-th bit of the binary random sequence to the first value; if the k-th bit in the noise signal is less than 0, set the k-th bit of the binary random sequence Set to the second value, and k is an integer.
- the process of performing the key enhancement operation on the key to obtain the key to be distributed may include: performing an exclusive OR operation on the first key, the second key, and the third key to obtain the key to be distributed. Key; or, the first key, the second key, and the third key are XORed to obtain the XORed key; the XORed key is down-sampled to obtain the key to be distributed.
- the interaction process between the coordinator node and the wearable device will be introduced and explained below in conjunction with the schematic diagram of the interaction between the coordinator node and the wearable device shown in FIG. 9.
- the interaction process can include:
- Step S901 The coordinator node sends a data collection synchronization message to the wearable device.
- Step S902 The coordinator node collects the first-stage acceleration signal.
- Step S903 The wearable device synchronously collects the second gait acceleration signal according to the data collection synchronization message.
- Step S904 The coordinator node extracts the noise signal in the first-stage acceleration signal.
- Step S905 After the coordinator node encodes the noise signal, the key enhancement operation is performed to generate the key to be distributed.
- the to-be-distributed key may also be generated through the first-stage acceleration signal or other methods.
- the randomness and information entropy of the key can be improved.
- Step S906 The coordinator node extracts the first-step state common information in the first-step state acceleration signal.
- the common information of the first state refers to the position information of the peak and valley values of the acceleration signal of the first state.
- the process of extracting gait common information can be referred to the corresponding content above, and will not be repeated here.
- Step S907 The coordinator node constructs a fuzzy safe according to the gait common information and the key to be distributed.
- Step S908 The coordinator node sends the fuzzy safe to the wearable device.
- Step S909 The wearable device extracts the second gait common information in the second gait acceleration signal.
- the second gait common information refers to the position information of the peak and valley values of the second gait acceleration signal.
- the process of extracting gait common information can be referred to the corresponding content above, and will not be repeated here.
- Step S910 After receiving the fuzzy safe, the wearable device unlocks the fuzzy safe according to the second gait common information to obtain the key to be distributed.
- FIG. 10 is a schematic block diagram of the structure of a wireless body area network key distribution device provided by an embodiment of this application.
- the coordinator node of the wireless body area network is applied.
- Communicatingly connected with at least one wearable device; the device may include:
- the synchronization message sending module 101 is configured to send a data collection synchronization message to the wearable device, and the data collection synchronization information is used to instruct the wearable device to synchronously collect the second gait acceleration signal;
- the first acquisition module 102 is used to acquire the acceleration signal of the first state
- the encrypted information generating module 104 is configured to generate key encrypted information according to the key to be distributed and the first-step state information;
- the encrypted information sending module 105 is used to send the key encrypted information to the wearable device to instruct the wearable device to decrypt the key encrypted information according to the second gait common information extracted from the second gait acceleration signal to obtain Key to be distributed;
- the first step state common information is the position information of the peak value and valley value of the first state acceleration signal
- the second gait common information is the position information of the peak value and the bottom value of the second gait acceleration signal.
- the key distribution device of the wireless body area network may be a software program in the coordinator node, and each module of the key distribution device of the wireless body area network is a corresponding software program module.
- the above-mentioned key generation module is specifically configured to: extract the noise signal in the first-stage acceleration signal; encode the noise signal to obtain the key; perform key enhancement operations on the key to obtain the key to be distributed.
- the above-mentioned key generation module is specifically used to: input the first-stage acceleration signal to the low-pass Butterworth filter to obtain the first-stage acceleration after the first filtering output by the low-pass Butterworth filter. signal;
- the acceleration acquisition device is a three-axis acceleration sensor
- the noise signal includes a first noise signal on the x-axis, a second noise signal on the y-axis, and a third noise signal on the z-axis;
- the above-mentioned key generation module is specifically used to: according to the value of each bit in the first noise signal, set the corresponding bit of the first binary random sequence to the corresponding value to obtain the first key; according to the value of each bit in the second noise signal , Set the corresponding bit of the second binary random sequence to the corresponding value to obtain the second key; according to the value of each bit in the third noise signal, set the corresponding bit of the third binary random sequence to the corresponding value to obtain Third key
- k-th bit in the noise signal if the k-th bit in the noise signal is greater than or equal to 0, set the k-th bit of the binary random sequence to the first value; if the k-th bit in the noise signal is less than 0, set the k-th bit of the binary random sequence Set to the second value, and k is an integer.
- the above-mentioned key generation module is specifically configured to: perform an exclusive OR operation on the first key, the second key, and the third key to obtain the key to be distributed;
- the first key, the second key, and the third key are XORed to obtain the XORed key; the XORed key is down-sampled to obtain the key to be distributed.
- the above-mentioned first extraction module is specifically configured to: perform low-pass filtering on the first-stage acceleration signal; perform a dimensionality reduction operation on the first-stage acceleration signal after the low-pass filtering to obtain the reduced-dimensional first state acceleration signal One-step acceleration signal; extract the first position information of the peak and valley value of the first-step acceleration signal after dimensional reduction in time domain and frequency domain respectively.
- the above-mentioned first extraction module is specifically used for:
- the process of the signed sliding window coding algorithm specifically includes:
- the signed sliding window slides on the first-stage acceleration signal after dimensionality reduction.
- the total information pool increases by i; when a valley occurs in the i-th window, the total information pool increases by -i;
- i is an integer.
- the aforementioned encrypted information generating module is specifically used for:
- a fuzzy safe is constructed, and the fuzzy safe is the key to encrypt the information.
- FIG. 11 is a schematic block diagram of the structure of a wireless body area network key distribution device provided by an embodiment of this application, which is applied to a wearable device of a wireless body area network.
- the wearable device integrates an acceleration collection device, and the wearable device Communication connection with the coordinator node; the device may include:
- the synchronization acquisition module 112 is configured to synchronously acquire the second gait acceleration signal according to the data acquisition synchronization message;
- the second receiving module 114 is configured to receive the key encryption information sent by the coordinator node.
- the key encryption information is the first-stage state common information and the to-be-distributed secret information extracted from the collected first-stage acceleration signal by the coordinator node Information generated by the key;
- the decryption module 115 is used to decrypt the key encrypted information according to the second gait common information to obtain the key to be distributed;
- the above-mentioned second extraction module is specifically configured to: perform low-pass filtering on the second gait acceleration signal; perform a dimensionality reduction operation on the low-pass filtered second gait acceleration signal to obtain the reduced-dimensionality first
- Two gait acceleration signals extract the second position information of the peak and valley values of the second gait acceleration signal after dimension reduction in the time domain and frequency domain respectively.
- the process of the signed sliding window coding algorithm specifically includes:
- the signed sliding window slides on the second gait acceleration signal after dimensionality reduction.
- the total information pool increases by i; when a valley appears in the i-th window, the total information pool increases by -i;
- i is an integer.
- the key encryption information is a fuzzy safe
- the decryption module is specifically used to unlock the fuzzy safe according to the second gait common information to obtain the key to be distributed.
- FIG. 12 a schematic block diagram of the structure of a key generation device for a wireless body area network provided by an embodiment of this application.
- the device is applied to a coordinator node of the wireless body area network, and the coordinator node is integrated with an acceleration collection device.
- the device may include:
- the second collection module 121 is used to collect the acceleration signal of the first state.
- the noise extraction module 122 is used to extract the noise signal in the first-stage acceleration signal.
- FIG. 10, FIG. 11, and FIG. 12 correspond to the above method one-to-one.
- FIG. 10 For related introduction, please refer to the corresponding content above, which will not be repeated here.
- the key generation device of the wireless body area network may be a software program in the coordinator node, and each module of the key generation device of the wireless body area network is a corresponding software program module.
- the aforementioned noise extraction module is specifically used for:
- the aforementioned noise extraction module is specifically used to: input the first-stage acceleration signal to the low-pass Butterworth filter to obtain the first-stage acceleration signal output by the low-pass Butterworth filter after the first filtering. ; Perform time reversal operation on the first-stage acceleration signal after the first filtering to obtain the first-stage acceleration signal after the first reversal; input the first-stage acceleration signal after the first reversal To the low-pass Butterworth filter, get the first-stage acceleration signal after the second filtering output from the low-pass Butterworth filter; perform the time reversal operation on the first-stage acceleration signal after the second filtering , The acceleration signal of the first state after the second reversal is obtained, and the acceleration signal of the first state after the second reversal is the filtered first-state acceleration signal.
- the above-mentioned key generation module is specifically configured to: encode the noise signal to obtain a key; perform a key enhancement operation on the key to obtain the key to be distributed.
- the above-mentioned key generation module is specifically used to: according to the value of each bit in the first noise signal, set the corresponding bit of the first binary random sequence to the corresponding value to obtain the first key; according to the value of each bit in the second noise signal , Set the corresponding bit of the second binary random sequence to the corresponding value to obtain the second key; according to the value of each bit in the third noise signal, set the corresponding bit of the third binary random sequence to the corresponding value to obtain Third key
- FIG. 13 is a schematic structural diagram of a coordinator node provided by an embodiment of this application.
- the coordinator node 13 of this embodiment includes: at least one processor 130, a memory 131, and a computer program 132 that is stored in the memory 131 and can run on the at least one processor 130, so When the processor 130 executes the computer program 132, the steps in any of the above-mentioned embodiments of the key distribution method of the wireless body area network or the embodiment of the key generation method of the wireless body area network are implemented.
- the coordinator node 13 may be a wearable gateway.
- the coordinator node may include, but is not limited to, a processor 130, a memory 131, and an acceleration acquisition device 133.
- FIG. 13 is only an example of the coordinator node 13, and does not constitute a limitation on the coordinator node 13. It may include more or less components than shown in the figure, or combine some components, or different The components of, for example, can also include input and output devices, network access devices, and so on.
- the so-called processor 130 may be a central processing unit (Central Processing Unit, CPU), and the processor 130 may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSPs), and application specific integrated circuits (Application Specific Integrated Circuits). , ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- FIG. 14 is a schematic structural diagram of a wearable device provided by an embodiment of this application.
- the wearable device 14 of this embodiment includes: at least one processor 140, a memory 141, and a computer program 142 that is stored in the memory 141 and can run on the at least one processor 140, so When the processor 140 executes the computer program 142, the steps in any of the foregoing wireless body area network key distribution method embodiments are implemented.
- the so-called processor 140 may be a central processing unit (Central Processing Unit, CPU), and the processor 140 may also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), and application specific integrated circuits (Application Specific Integrated Circuits). , ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the memory 141 may be an internal storage unit of the wearable device 14 in some embodiments, such as a hard disk or a memory of the wearable device 14. In other embodiments, the memory 141 may also be an external storage device of the wearable device 14, for example, a plug-in hard disk equipped on the wearable device 14, a smart media card (SMC), Secure Digital (SD) card, Flash Card, etc. Further, the memory 141 may also include both an internal storage unit of the wearable device 14 and an external storage device.
- the memory 141 is used to store an operating system, an application program, a boot loader (BootLoader), data, and other programs, such as the program code of the computer program. The memory 141 can also be used to temporarily store data that has been output or will be output.
- the embodiments of the present application also provide a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, it can realize the implementation of the key distribution method of each wireless body area network described above. Examples or steps in the embodiment of the key generation method of the wireless body area network.
- the embodiments of the present application provide a computer program product.
- the coordinator node realizes the key distribution method embodiments or wireless body domains that can realize the above-mentioned wireless body area network when the coordinator node is executed. Steps in the embodiment of the key generation method of the network. Or, when the computer program product runs on the wearable device, the steps in the above-mentioned key distribution method embodiments of the wireless body area network can be realized when the wearable device is executed.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the computer program can be stored in a computer-readable storage medium. When executed by the processor, the steps of the foregoing method embodiments can be implemented.
- the computer program includes computer program code, and the computer program code may be in the form of source code, object code, executable file, or some intermediate forms.
- the computer-readable medium may at least include: any entity or device capable of carrying the computer program code to the photographing device/terminal device, recording medium, computer memory, read-only memory (ROM, Read-Only Memory), and random access memory (RAM, Random Access Memory), electric carrier signal, telecommunications signal and software distribution medium.
- ROM read-only memory
- RAM random access memory
- electric carrier signal telecommunications signal and software distribution medium.
- U disk mobile hard disk, floppy disk or CD-ROM, etc.
- computer-readable media cannot be electrical carrier signals and telecommunication signals.
- the disclosed apparatus/network equipment and method may be implemented in other ways.
- the device/network device embodiments described above are only illustrative.
- the division of the modules or units is only a logical function division, and there may be other divisions in actual implementation, such as multiple units.
- components can be combined or integrated into another system, or some features can be omitted or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Selective Calling Equipment (AREA)
Abstract
Description
Claims (32)
- 一种无线体域网,所述无线体域网包括协调器节点以及与所述协调器节点通信连接的至少一个可穿戴设备,所述协调器节点和所述可穿戴设备上均集成有加速度采集装置,其特征在于:所述协调器节点用于发送数据采集同步消息至所述可穿戴设备;采集第一步态加速度信号;提取所述第一步态加速度信号中的第一步态共信息;根据待分配密钥和所述第一步态共信息,生成密钥加密信息;发送所述密钥加密信息至所述可穿戴设备;所述可穿戴设备用于接收所述数据采集同步消息,根据所述数据采集同步消息,同步采集第二步态加速度信号;提取所述第二步态加速度信号中的第二步态共信息;接收所述密钥加密信息;根据所述第二步态共信息对所述密钥加密信息进行解密,得到所述待分配密钥;其中,所述第一步态共信息为所述第一步态加速度信号的峰值和谷值的位置信息;所述第二步态共信息为所述第二步态加速度信号的峰值和谷值的位置信息。
- 根据权利要求1所述的无线体域网,其特征在于,所述协调器节点具体用于:根据所述第一步态加速度信号中的噪声信号生成所述待分配密钥。
- 根据权利要求2所述的无线体域网,其特征在于,所述协调器节点具体用于:提取所述第一步态加速度信号中的所述噪声信号;对所述噪声信号进行编码,得到密钥;对所述密钥进行密钥增强操作,得到所述待分配密钥。
- 根据权利要求3所述的无线体域网,其特征在于,所述协调器节点具体用于:对所述第一步态加速度信号进行零相位滤波,得到滤波后的第一步态加速度信号;将所述第一步态加速度信号减去所述滤波后的第一步态加速度信号,得到所述噪声信号。
- 根据权利要求4所述的无线体域网,其特征在于,所述协调器节点具体用于:将所述第一步态加速度信号输入至低通巴特沃斯滤波器,得到低通巴特沃斯滤波器输出的第一次滤波后的第一步态加速度信号;对所述第一次滤波后的第一步态加速度信号进行时间反转操作,得到第一次反转后的第一步态加速度信号;将所述第一次反转后的第一步态加速度信号输入至低通巴特沃斯滤波器,得到低通巴特沃斯滤波器输出的第二次滤波后的第一步态加速度信号;对所述第二次滤波后的第一步态加速度信号进行时间反转操作,得到第二次反转后的 第一步态加速度信号,所述第二次反转后的第一步态加速度信号为所述滤波后的第一步态加速度信号。
- 根据权利要求3所述的无线体域网,其特征在于,所述加速度采集装置为三轴加速度传感器,所述噪声信号包括x轴的第一噪声信号、y轴的第二噪声信号以及z轴的第三噪声信号;所述协调器节点具体用于:依据所述第一噪声信号中各位的数值,将第一二进制随机序列的对应位设为相应数值,得到第一密钥;依据所述第二噪声信号中各位的数值,将第二二进制随机序列的对应位设为相应数值,得到第二密钥;依据所述第三噪声信号中各位的数值,将第三二进制随机序列的对应位设为相应数值,得到第三密钥;其中,若噪声信号中的第k位大于或等于0时,将二进制随机序列的第k位设为第一数值;若噪声信号中的第k位小于0时,将二进制随机序列的第k位设为第二数值,k为整数。
- 根据权利要求6所述的无线体域网,其特征在于,所述协调器节点具体用于:将所述第一密钥、所述第二密钥以及所述第三密钥进行异或操作,得到所述待分配密钥;或者,将所述第一密钥、所述第二密钥以及所述第三密钥进行异或操作,得到异或后的密钥;对所述异或后的密钥进行下采样,得到所述待分配密钥。
- 根据权利要求1所述的无线体域网,其特征在于,所述协调器节点具体用于:对所述第一步态加速度信号进行低通滤波;对低通滤波后的第一步态加速度信号进行降维操作,得到降维后的第一步态加速度信号;分别提取时域和频域下所述降维后的第一步态加速度信号的峰值和谷值的第一位置信息。
- 根据权利要求8所述的无线体域网,其特征在于,所述协调器节点具体用于:基于有符号滑动窗口编码算法,提取所述降维后的第一步态加速度信号和所述降维后的第一步态加速度信号的快速傅里叶变换结果的峰值和谷值的第一位置信息;其中,所述有符号滑动窗口编码算法的过程具体包括:有符号滑动窗口在降维后的第一步态加速度信号上滑动,当第i个窗口出现峰值时, 共信息池增加i;当第i个窗口出现谷值时,共信息池增加-i;当第i个窗口没有出现峰值和/或谷值时,窗口继续滑动,i为整数。
- 根据权利要求1所述的无线体域网,其特征在于,所述可穿戴设备具体用于:对所述第二步态加速度信号进行低通滤波;对低通滤波后的第二步态加速度信号进行降维操作,得到降维后的第二步态加速度信号;分别提取时域和频域下所述降维后的第二步态加速度信号的峰值和谷值的第二位置信息。
- 根据权利要求10所述的无线体域网,其特征在于,所述可穿戴设备具体用于:基于有符号滑动窗口编码算法,提取所述降维后的第二步态加速度信号和所述降维后的第二步态加速度信号的快速傅里叶变换结果的峰值和谷值的第二位置信息;其中,所述有符号滑动窗口编码算法的过程具体包括:有符号滑动窗口在降维后的第二步态加速度信号上滑动,当第i个窗口出现峰值时,共信息池增加i;当第i个窗口出现谷值时,共信息池增加-i;当第i个窗口没有出现峰值和/或谷值时,窗口继续滑动,i为整数。
- 一种无线体域网的密钥分配方法,其特征在于,应用无线体域网的协调器节点,所述协调器节点集成有加速度采集装置,所述协调器节点与至少一个可穿戴设备通信连接;所述方法包括:发送数据采集同步消息至所述可穿戴设备,所述数据采集同步信息用于指示所述可穿戴设备同步采集第二步态加速度信号;采集第一步态加速度信号;提取所述第一步态加速度信号中的第一步态共信息;根据待分配密钥和所述第一步态共信息,生成密钥加密信息;发送所述密钥加密信息至所述可穿戴设备,以指示所述可穿戴设备根据从所述第二步态加速度信号中提取的第二步态共信息,对所述密钥加密信息进行解密,得到所述待分配密钥;其中,所述第一步态共信息为所述第一步态加速度信号的峰值和谷值的位置信息;所述第二步态共信息为所述第二步态加速度信号的峰值和谷值的位置信息。
- 根据权利要求12所述的无线体域网的密钥分配方法,其特征在于,所述待分配密钥的生成过程具体为:根据所述第一步态加速度信号中的噪声信号生成所述待分配密钥。
- 根据权利要求13所述的无线体域网的密钥分配方法,其特征在于,所述根据所 述第一步态加速度信号中的噪声信号生成所述待分配密钥,包括:提取所述第一步态加速度信号中的所述噪声信号;对所述噪声信号进行编码,得到密钥;对所述密钥进行密钥增强操作,得到所述待分配密钥。
- 根据权利要求14所述的无线体域网的密钥分配方法,其特征在于,所述提取所述第一步态加速度信号中的噪声信号,包括:对所述第一步态加速度信号进行零相位滤波,得到滤波后的第一步态加速度信号;将所述第一步态加速度信号减去所述滤波后的第一步态加速度信号,得到所述噪声信号。
- 根据权利要求15所述的无线体域网的密钥分配方法,其特征在于,所述对所述第一步态加速度信号进行零相位滤波,得到滤波后的第一步态加速度信号,包括:将所述第一步态加速度信号输入至低通巴特沃斯滤波器,得到低通巴特沃斯滤波器输出的第一次滤波后的第一步态加速度信号;对所述第一次滤波后的第一步态加速度信号进行时间反转操作,得到第一次反转后的第一步态加速度信号;将所述第一次反转后的第一步态加速度信号输入至低通巴特沃斯滤波器,得到低通巴特沃斯滤波器输出的第二次滤波后的第一步态加速度信号;对所述第二次滤波后的第一步态加速度信号进行时间反转操作,得到第二次反转后的第一步态加速度信号,所述第二次反转后的第一步态加速度信号为所述滤波后的第一步态加速度信号。
- 根据权利要求14所述的无线体域网的密钥分配方法,其特征在于,所述加速度采集装置为三轴加速度传感器,所述噪声信号包括x轴的第一噪声信号、y轴的第二噪声信号以及z轴的第三噪声信号;所述对所述噪声信号进行编码,得到密钥,包括:依据所述第一噪声信号中各位的数值,将第一二进制随机序列的对应位设为相应数值,得到第一密钥;依据所述第二噪声信号中各位的数值,将第二二进制随机序列的对应位设为相应数值,得到第二密钥;依据所述第三噪声信号中各位的数值,将第三二进制随机序列的对应位设为相应数值,得到第三密钥;其中,若噪声信号中的第k位大于或等于0时,将二进制随机序列的第k位设为第一数值;若噪声信号中的第k位小于0时,将二进制随机序列的第k位设为第二数值,k为 整数。
- 根据权利要求17所述的无线体域网的密钥分配方法,其特征在于,所述对所述密钥进行密钥增强操作,得到所述待分配密钥,包括:将所述第一密钥、所述第二密钥以及所述第三密钥进行异或操作,得到所述待分配密钥;或者,将所述第一密钥、所述第二密钥以及所述第三密钥进行异或操作,得到异或后的密钥;对所述异或后的密钥进行下采样,得到所述待分配密钥。
- 根据权利要求12所述的无线体域网的密钥分配方法,其特征在于,所述提取所述第一步态加速度信号中的第一步态共信息,包括:对所述第一步态加速度信号进行低通滤波;对低通滤波后的第一步态加速度信号进行降维操作,得到降维后的第一步态加速度信号;分别提取时域和频域下所述降维后的第一步态加速度信号的峰值和谷值的第一位置信息。
- 根据权利要求19所述的无线体域网的密钥分配方法,其特征在于,所述分别提取时域和频域下所述降维后的第一步态加速度信号的峰值和谷值的第一位置信息,包括:基于有符号滑动窗口编码算法,提取所述降维后的第一步态加速度信号和所述降维后的第一步态加速度信号的快速傅里叶变换结果的峰值和谷值的第一位置信息;其中,所述有符号滑动窗口编码算法的过程具体包括:有符号滑动窗口在降维后的第一步态加速度信号上滑动,当第i个窗口出现峰值时,共信息池增加i;当第i个窗口出现谷值时,共信息池增加-i;当第i个窗口没有出现峰值和/或谷值时,窗口继续滑动,i为整数。
- 一种无线体域网的密钥分配方法,其特征在于,应用于无线体域网的可穿戴设备,所述可穿戴设备集成有加速度采集装置,所述可穿戴设备与协调器节点通信连接;所述方法包括:接收所述协调器节点发送的数据采集同步消息;根据所述数据采集同步消息,同步采集第二步态加速度信号;提取所述第二步态加速度信号中的第二步态共信息;接收所述协调器节点发送的所述密钥加密信息,所述密钥加密信息为所述协调器节点根据从采集的第一步态加速度信号中提取的第一步态共信息和待分配密钥生成的信息;根据所述第二步态共信息对所述密钥加密信息进行解密,得到所述待分配密钥;其中,所述第一步态共信息为所述第一步态加速度信号的峰值和谷值的位置信息;所述第二步态共信息为所述第二步态加速度信号的峰值和谷值的位置信息。
- 根据权利要求21所述的无线体域网的密钥分配方法,其特征在于,所述提取所述第二步态加速度信号中的第二步态共信息,包括:对所述第二步态加速度信号进行低通滤波;对低通滤波后的第二步态加速度信号进行降维操作,得到降维后的第二步态加速度信号;分别提取时域和频域下所述降维后的第二步态加速度信号的峰值和谷值的第二位置信息。
- 根据权利要求22所述的无线体域网的密钥分配方法,其特征在于,所述分别提取时域和频域下所述降维后的第二步态加速度信号的峰值和谷值的第二位置信息,包括:基于有符号滑动窗口编码算法,提取所述降维后的第二步态加速度信号和所述降维后的第二步态加速度信号的快速傅里叶变换结果的峰值和谷值的第二位置信息;其中,所述有符号滑动窗口编码算法的过程具体包括:有符号滑动窗口在降维后的第二步态加速度信号上滑动,当第i个窗口出现峰值时,共信息池增加i;当第i个窗口出现谷值时,共信息池增加-i;当第i个窗口没有出现峰值和/或谷值时,窗口继续滑动,i为整数。
- 一种无线体域网的密钥生成方法,其特征在于,应用于无线体域网的协调器节点,所述协调器节点集成有加速度采集装置,所述方法包括:采集第一步态加速度信号;提取所述第一步态加速度信号中的噪声信号;根据所述噪声信号生成待分配密钥。
- 根据权利要求24所述的无线体域网的密钥生成方法,其特征在于,所述提取所述第一步态加速度信号中的噪声信号,包括:对所述第一步态加速度信号进行零相位滤波,得到滤波后的第一步态加速度信号;将所述第一步态加速度信号减去所述滤波后的第一步态加速度信号,得到所述噪声信号。
- 根据权利要求25所述的无线体域网的密钥生成方法,其特征在于,所述对所述第一步态加速度信号进行零相位滤波,得到滤波后的第一步态加速度信号,包括:将所述第一步态加速度信号输入至低通巴特沃斯滤波器,得到低通巴特沃斯滤波器输出的第一次滤波后的第一步态加速度信号;对所述第一次滤波后的第一步态加速度信号进行时间反转操作,得到第一次反转后的 第一步态加速度信号;将所述第一次反转后的第一步态加速度信号输入至低通巴特沃斯滤波器,得到低通巴特沃斯滤波器输出的第二次滤波后的第一步态加速度信号;对所述第二次滤波后的第一步态加速度信号进行时间反转操作,得到第二次反转后的第一步态加速度信号,所述第二次反转后的第一步态加速度信号为所述滤波后的第一步态加速度信号。
- 根据权利要求24所述的无线体域网的密钥生成方法,其特征在于,所述根据所述噪声信号生成待分配密钥,包括:对所述噪声信号进行编码,得到密钥;对所述密钥进行密钥增强操作,得到所述待分配密钥。
- 根据权利要求27所述的无线体域网的密钥生成方法,其特征在于,所述加速度采集装置为三轴加速度传感器,所述噪声信号包括x轴的第一噪声信号、y轴的第二噪声信号以及z轴的第三噪声信号;所述对所述噪声信号进行编码,得到密钥,包括:依据所述第一噪声信号中各位的数值,将第一二进制随机序列的对应位设为相应数值,得到第一密钥;依据所述第二噪声信号中各位的数值,将第二二进制随机序列的对应位设为相应数值,得到第二密钥;依据所述第三噪声信号中各位的数值,将第三二进制随机序列的对应位设为相应数值,得到第三密钥;其中,若噪声信号中的第k位大于或等于0时,将二进制随机序列的第k位设为第一数值;若噪声信号中的第k位小于0时,将二进制随机序列的第k位设为第二数值,k为整数。
- 根据权利要求28所述的无线体域网的密钥生成方法,其特征在于,所述对所述密钥进行密钥增强操作,得到所述待分配密钥,包括:将所述第一密钥、所述第二密钥以及所述第三密钥进行异或操作,得到所述待分配密钥;或者,将所述第一密钥、所述第二密钥以及所述第三密钥进行异或操作,得到异或后的密钥;对所述异或后的密钥进行下采样,得到所述待分配密钥。
- 一种协调器节点,包括加速度采集装置、存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序 时实现如权利要求12至20或24至29任一项所述的方法。
- 一种可穿戴设备,包括加速度采集装置、存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求21至23任一项所述的方法。
- 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求12至20或21至23或24至29任一项所述的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2020552721A JP7034327B2 (ja) | 2019-09-20 | 2019-09-20 | 無線ボディエリアネットワーク及びその鍵生成方法、割当方法及び関連装置 |
KR1020207027987A KR102477582B1 (ko) | 2019-09-20 | 2019-09-20 | 무선 신체 영역 네트워크의 키 분배 장치, 무선 신체 영역 네트워크의 키 생성 방법, 무선 신체 영역 네트워크의 분배 방법 및 관련 장치 |
PCT/CN2019/106987 WO2021051387A1 (zh) | 2019-09-20 | 2019-09-20 | 无线体域网及其密钥生成方法、分配方法和相关装置 |
US17/036,222 US11212672B2 (en) | 2019-09-20 | 2020-09-29 | Wireless body area network, key generation method and key distribution method in the wireless body area network, and related device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/106987 WO2021051387A1 (zh) | 2019-09-20 | 2019-09-20 | 无线体域网及其密钥生成方法、分配方法和相关装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/036,222 Continuation-In-Part US11212672B2 (en) | 2019-09-20 | 2020-09-29 | Wireless body area network, key generation method and key distribution method in the wireless body area network, and related device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021051387A1 true WO2021051387A1 (zh) | 2021-03-25 |
Family
ID=74880238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/106987 WO2021051387A1 (zh) | 2019-09-20 | 2019-09-20 | 无线体域网及其密钥生成方法、分配方法和相关装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US11212672B2 (zh) |
JP (1) | JP7034327B2 (zh) |
KR (1) | KR102477582B1 (zh) |
WO (1) | WO2021051387A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016087476A1 (en) * | 2014-12-04 | 2016-06-09 | Koninklijke Philips N.V. | System and method for providing connecting relationships between wearable devices |
CN105686833A (zh) * | 2016-01-13 | 2016-06-22 | 上海交通大学 | 基于无线体域网的可穿戴式多节点三维运动监测系统 |
WO2016165165A1 (zh) * | 2015-04-17 | 2016-10-20 | 宇龙计算机通信科技(深圳)有限公司 | 设备接入的处理方法、设备接入的处理装置和终端 |
US20160334218A1 (en) * | 2015-05-12 | 2016-11-17 | Invensense Incorporated | Systems and methods for determining a route traversed by a portable device |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102006027462B4 (de) | 2006-06-12 | 2009-06-18 | Nec Europe Ltd. | Verfahren zum Betreiben eines drahtlosen Sensornetzwerks |
CN101563884B (zh) | 2006-12-19 | 2013-03-27 | 日本电气株式会社 | 共同数据生成方法和用于该方法的设备 |
US8688986B2 (en) | 2006-12-27 | 2014-04-01 | Intel Corporation | Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN) |
US8295491B2 (en) | 2007-04-25 | 2012-10-23 | Nec Europe Ltd. | Method for aggregating data in a network |
WO2009014063A1 (ja) | 2007-07-20 | 2009-01-29 | Nec Corporation | 暗号通信方法及び暗号通信システム |
KR100906946B1 (ko) | 2008-04-24 | 2009-07-10 | 델파이코리아 주식회사 | Mems 가속도 센서를 이용한 시트벨트 리트렉터 및 그제어방법 |
KR101625857B1 (ko) * | 2009-03-30 | 2016-05-31 | 시게이트 테크놀로지 엘엘씨 | 난수 생성 장치 및 그 방법 |
JP2011130224A (ja) | 2009-12-18 | 2011-06-30 | Lenovo Singapore Pte Ltd | 通信端末装置における共有情報の作成方法 |
US9826400B2 (en) * | 2014-04-04 | 2017-11-21 | Qualcomm Incorporated | Method and apparatus that facilitates a wearable identity manager |
KR102280286B1 (ko) * | 2014-09-04 | 2021-07-22 | 삼성전자주식회사 | 마스터 노드 및 마스터 노드의 동작 방법 |
KR102478651B1 (ko) * | 2015-07-08 | 2022-12-16 | 삼성전자주식회사 | 생체 신호 분석 장치 및 방법 |
US9894471B1 (en) * | 2015-07-25 | 2018-02-13 | Gary M. Zalewski | Wireless coded communication (WCC) devices with power harvesting power sources for processing biometric identified functions |
US11398915B2 (en) * | 2016-08-26 | 2022-07-26 | Samsung Electronics Co., Ltd. | Apparatus and method for two-way authentication |
KR101866627B1 (ko) * | 2016-03-02 | 2018-07-04 | 한국해양대학교 산학협력단 | 헬스 케어 및 스마트 라이프 로거를 위한 데이터 수집 및 분석 장치 그리고 이를 위한 방법 |
US10716495B1 (en) * | 2016-03-11 | 2020-07-21 | Fortify Technologies, LLC | Accelerometer-based gait analysis |
KR102026375B1 (ko) * | 2017-12-18 | 2019-09-27 | 부산대학교 산학협력단 | 웨어러블 디바이스 통신 지원 장치 및 방법 |
KR102008932B1 (ko) * | 2017-12-22 | 2019-08-08 | 인천대학교 산학협력단 | 하둡 기반 지능형 의료 시스템 및 그 방법 |
US11147459B2 (en) * | 2018-01-05 | 2021-10-19 | CareBand Inc. | Wearable electronic device and system for tracking location and identifying changes in salient indicators of patient health |
EP3782547B1 (en) * | 2019-08-21 | 2024-04-10 | The Swatch Group Research and Development Ltd | Method and system for gait detection of a person |
-
2019
- 2019-09-20 JP JP2020552721A patent/JP7034327B2/ja active Active
- 2019-09-20 KR KR1020207027987A patent/KR102477582B1/ko active IP Right Grant
- 2019-09-20 WO PCT/CN2019/106987 patent/WO2021051387A1/zh active Application Filing
-
2020
- 2020-09-29 US US17/036,222 patent/US11212672B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016087476A1 (en) * | 2014-12-04 | 2016-06-09 | Koninklijke Philips N.V. | System and method for providing connecting relationships between wearable devices |
WO2016165165A1 (zh) * | 2015-04-17 | 2016-10-20 | 宇龙计算机通信科技(深圳)有限公司 | 设备接入的处理方法、设备接入的处理装置和终端 |
US20160334218A1 (en) * | 2015-05-12 | 2016-11-17 | Invensense Incorporated | Systems and methods for determining a route traversed by a portable device |
CN105686833A (zh) * | 2016-01-13 | 2016-06-22 | 上海交通大学 | 基于无线体域网的可穿戴式多节点三维运动监测系统 |
Non-Patent Citations (2)
Title |
---|
RAFFAELE GRAVINA;PARASTOO ALINIA;HASSAN GHASEMZADEH;GIANCARLO FORTINO: "Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges", INFORMATION FUSION, vol. 35, 1 May 2017 (2017-05-01), pages 68 - 80, XP029813302, ISSN: 1566-2535, DOI: 10.1016/j.inffus.2016.09.005 * |
WANG CAIHUA , CHEN YONG , SUN FANGMIN: "Wireless Body Area Network based on IPv6", GUANGDONG COMMUNICATION TECHNOLOGY, vol. 35, no. 12, 15 December 2015 (2015-12-15), pages 45 - 47+62, XP055793541, ISSN: 1006-6403, DOI: 10.3969/j.issn.1006-6403.2015.12.012 * |
Also Published As
Publication number | Publication date |
---|---|
US11212672B2 (en) | 2021-12-28 |
KR20210035076A (ko) | 2021-03-31 |
JP7034327B2 (ja) | 2022-03-11 |
KR102477582B1 (ko) | 2022-12-14 |
JP2022502874A (ja) | 2022-01-11 |
US20210092600A1 (en) | 2021-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kakkad et al. | Biometric authentication and image encryption for image security in cloud framework | |
Talhaoui et al. | A new fractional one dimensional chaotic map and its application in high-speed image encryption | |
Talhaoui et al. | Fast image encryption algorithm with high security level using the Bülban chaotic map | |
Chen et al. | Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption | |
Kumar et al. | IEHC: An efficient image encryption technique using hybrid chaotic map | |
CN107769910B (zh) | 一种基于Latch PUF的抗边信道攻击DES防护方法及电路 | |
Murillo-Escobar et al. | Pseudorandom number generator based on novel 2D Hénon-Sine hyperchaotic map with microcontroller implementation | |
Matsuda et al. | Fuzzy signatures: relaxing requirements and a new construction | |
CN111222645B (zh) | 基于物联网区块链量子算法人工智能的管理系统及方法 | |
Pande et al. | The secure wavelet transform | |
CN108696354A (zh) | 一种使用量子随机数的量子非对称加密设备 | |
CN110730453B (zh) | 无线体域网及其密钥生成方法、分配方法和相关装置 | |
CN116561787A (zh) | 视觉图像分类模型的训练方法、装置及电子设备 | |
Manikandan et al. | A novel random error approximate adder-based lightweight medical image encryption scheme for secure remote monitoring of health data | |
Li et al. | A image encryption algorithm based on coexisting multi-attractors in a spherical chaotic system | |
CN111950003A (zh) | 生成用户设备唯一识别信息的方法、装置、电子设备 | |
CN115913537A (zh) | 基于隐私保护的数据求交方法、系统及相关设备 | |
Raj et al. | Reconfigurable color medical image encryptor using hardware accelerated Chao (S)-box triplets | |
CN107248914B (zh) | 一种iOS设备上新型对称加密系统及加密方法 | |
WO2021051387A1 (zh) | 无线体域网及其密钥生成方法、分配方法和相关装置 | |
CN112906715A (zh) | 一种基于深度神经网络的安全图像特征提取与分类方法 | |
Wang et al. | Simultaneous encryption and compression of medical images based on optimized tensor compressed sensing with 3D Lorenz | |
Darwish et al. | Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding | |
Murillo-Escobar et al. | Biosignal encryption algorithm based on Ushio chaotic map for e-health | |
Chen et al. | Secure and resource-efficient communications for telemedicine systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2020552721 Country of ref document: JP Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19945823 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19945823 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 13/05/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19945823 Country of ref document: EP Kind code of ref document: A1 |