User "nowhere", wearable device vulnerability and solution analysis

In the early morning of September 10, Apple officially launched its first new product, the wearable smart device Watch, in its four-year new product launch in the fall of 2014. This new product, which records heartbeat, calorie consumption, exercise time and distance, is a new and intimate way to communicate through your wrists. It is a comprehensive health fitness device. ". Once successful, it can even subvert the entire mobile medical market in the United States.

Indeed, next-generation technologies such as wearable devices, mobile internet, and big data are rapidly subverting traditional medical models from the aspects of diagnosis, monitoring, treatment, drug delivery, and payment. In China, Internet giants such as Tencent, Alibaba and Baidu have all entered the mobile medical industry in various modes. According to the public information, the Zero2IPO Research Center found that the scale of China's mobile medical market in 2013 was 2.25 billion yuan, and it is expected to reach 12 billion yuan in 2017. An intelligent medical era is about to open. Whether it is the identity characteristics and consumer preferences of wearable device users, or the marketing information of the device manufacturer for the user, or even the record of the life of others through the wearable device, it becomes storable, processable and integrateable. You can dig deeper and even resell data information.

Recently, American advertising and marketing company AcquityGoup investigated the use of wearable devices by 2,000 adult American users. 40% of users are willing to share personal information collected by wearable devices in order to obtain discounts or coupons; 60% of users say they are willing to share their in-car information to get a similar return. However, users are happy to share information does not mean they do not care about the security of privacy. According to the survey, 80% of users expressed concern about the privacy of networked wearable devices, and 57% said that hacker intrusions and privacy leaks prevented them from using wearable devices.

Wearables have long been considered as a disruptive product after tablets and smartphones. In the face of the increasingly large industrial chain, wearable devices also release an increasingly large amount of data through the Internet of Things. Whether it is the identity characteristics and consumer preferences of wearable device users, or the marketing information of the device manufacturer for the user, or even the record of the life of others through the wearable device, it becomes storable, processable and integrateable. You can dig deeper and even resell data information.

Integrate user information, the wearer has nowhere to shape

"The wearable device is currently a trend in the industry. Technology giants are launching the latest products in the wearable device market. However, in the current wide range of wearable devices, almost every kind of privacy leaks. The hidden dangers." Professor Yuan Jian from the China Merchants Information Industry Research Institute told reporters in an interview that "wearable technology can capture and collect personal details such as lifestyle, health, location, sports and daily life information. Lack of correctness With privacy controls, these data may eventually be applied in ways that people have never imagined, and generate personal identity theft, tracking, fraud and other criminal acts."

According to reports, wearable devices can integrate the user's personal information. Due to the user's dependence on the network, personal information engraved with user health index, behavioral habits, consumption preferences, and work history is arbitrarily floating in the virtual cyberspace. In the face of huge data, the user's daily life is exposed nakedly in an open network platform, allowing people to sneak, analyze, integrate or research at will. Everyone becomes transparent and has nowhere to go.

So, when using wearable devices, how is personal privacy leaked out?

Yuan Jian said that in current wearable devices, information transmission can be divided into three stages. Taking the motion monitoring device as an example, the motion monitoring device first collects personal sports and health information; then, the information is synchronized with the data transmission and network between the smart phone and the network through the Bluetooth connection; finally, the uploaded information is stored in the cloud server. in. These three links are huge personal information databases, which are vulnerable to hackers.

Specifically, among the currently popular wearable devices, wearable devices applied in the fields of exercise, fitness, and health care can easily integrate large user privacy information, and there is a large amount of economic interest behind such large amounts of data.

User "nowhere", wearable device vulnerability and solution analysis

Wearable medical devices pose a huge risk of privacy breaches. The healthcare sector is a major branch of current wearable technology, with many wearable medical devices, such as insulin pumps, glucose monitors, and pacemakers, with wireless support that are vulnerable to hackers.

The health wristband used in the field of motion monitoring can directly measure the user's heart rate, skin moisture, temperature, and track the user's daily exercise level and health. However, the user information collected by this type of motion monitor can easily attract the attention of insurance and health care companies, and they will eventually use this data to link insurance premiums to personal lifestyles.

Smart clothing is also a hot area for wearable technology applications. It remotely monitors the wearer's heart rate, breathing and other vital signs. In addition to helping athletes identify and resolve performance issues, such garments can also be used to monitor postoperative vital signs in older or patients, or signs of life in situations of danger for soldiers and firefighters. These personal health data are usually transmitted through protocols such as Bluetooth or wireless personal area networks during the collection process, and are vulnerable to interception and infringement.

Four Burner Gas Cooker

Four Burner Gas Cooker,Stainless Steel Gas Stove,Ce Table Outside Gas Cooker,4 Burner Glasstop Gas Cooker

xunda science&technology group co.ltd , https://www.gasstove.be