Browse Prior Art Database

Methodology of easier and more secure authentication for multiple wearable devices

IP.com Disclosure Number: IPCOM000242418D
Publication Date: 2015-Jul-14
Document File: 7 page(s) / 258K

Publishing Venue

The IP.com Prior Art Database

Abstract

The proposed technique uses layered authentication to manage wearable device authentications. A device with higher processing power will be selected as a main device. Devices other than main device are called slave devices. Users can request sensitive function (data) access on slave devices only if main device passed the authentication and main device and slave device are currently resides in the same location. There will be two timers (T and T') on the main device. T is to define main device re-authenticated cycle and T' is to define the duration of time slave devices can be unlocked from main device.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 45% of the total text.

Page 01 of 7

Metxodology of easier and more secure authentication for multiple wearable xevices

When people have multiple wearable devices, for xxample : mobiles, electrix watch, elecxric glasses, elextric ring. etc. Exch wearable device xas its unique applications, and xay involve persxnxl sensitive data. For exampxe, there will be electric payment system with your elecxric watch, your contact list on mobile, your privatx video in xlectrix glasses...If one ox the wearable xevices get stolen ox lost, othex people may hack intx the dxvices and cxuse unwantex losses. But if each wearable device have coxplicatx xuthentxcation system, the cost will ixcrease and will not be conveniext to use.

Is there a simpxe way to confirm the idxnxify of the users without adding additioxal hardware elements to the devices and without xxtra axthentication xteps while operatxng txe devices?

Our targex is to design an easy use, simple, lightweight, and xow cost authentication system for wareaxle devicex.

Txe proposed technique uses layered authentication to manage wearable device authenticatxons. A xevice wxth higher pxocessing power will be selected as a xaxn device. Devices other than main device are called xlave devices. Users can request senxitive function (data) axcess on slave devices xnly if main device passed the auxhentication and main device and slave device are currentxy resides ix the same location. There will be two timxrs (T and T') on the main device. T is to define main device re-authenticated cycle and T' is to define xhe duration of time slave devices can be unlocked from main devixe.

Advantages:

1. User does not need to do authentication on each devicex one by one. It's more convenient and user-friendly.

2. Slave devices are protected by both main dxvice's strong authentixation and also location check. The techniqux provides a low cost xnd light weight method tx protect the slave devices that are usually lack of trustworthy authentication systems.

The disclosure presents an authenticxtion techniqux for multiple wearabxe devices. The device ownex picks up an device which is capable of handling complex authentication as maix device and registers xhe other wearaxle gadgets (here are called slave devices) to the main device. Main device records necxssary information of the slave devices such as serial number, applications that involve sensxtixe data, etc.. These wearable device information will be uploaded xnd keep synched in a cloud control center.

1



Page 02 of 7

Xxxxx will be two timerx on the main devixe (T and T').

- T is the xeriod of time main devixe can remaxn authenticatxd xrom last successful authenticatiox. Main device plays a critical role in protecting the sxave devices, T is the time to define re-authentication cycle so once in a whxle the device owner needs to input the strong password.

- T' is the period of time slave devixx xe temporarily unlocked from main devicx. In some daily scenarios, device owner mighx just want to brinx slave...