CRYPTOGRAPHIC AUTHENTICATION FOR TELEMETRY WITH AN IMPLANTABLE MEDICAL DEVICE
0 Assignments
0 Petitions
Accused Products
Abstract
Integrity of a wirelessly telemetered message communicated between an implantable medical device and an external programmer is authenticated by encoding the message. The message is encrypted based on a random number or time stamp and a secret key. The message is authenticated by encryption and decryption or by executing a hash function.
117 Citations
47 Claims
-
1-18. -18. (canceled)
-
19. A system comprising:
-
an implantable device including;
a first far field transceiver;
a first processor coupled to the first far field transceiver; and
a first memory coupled to the first processor; and
an electrical circuit coupled to the processor; and
an external device including;
a second far field transceiver;
a second processor coupled to the second far field transceiver;
a second memory coupled to the second processor; and
a data port coupled to the processor; and
wherein at least one of any combination of the first processor and second processor are adapted to execute instructions to implement an encryption algorithm configured to generate a ciphertext based on a code generated by the first processor, a key stored in the first memory and the second memory and a message; and
wherein at least one of any combination of the first processor and second processor are adapted to execute instructions to implement a decryption algorithm configured to decrypt the message from the ciphertext based on the code and the key. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25-30. -30. (canceled)
-
31. A method comprising:
-
receiving a code from a first device;
storing a key in the first device and in a second device, wherein at least one of the first device and the second device is implantable;
generating a ciphertext at the second device, the ciphertext generated as a function of the code, the key and a message;
receiving the ciphertext at the first device;
decrypting the ciphertext at the first device to receive the message, the message decrypted as a function of the code and the key; and
authenticating the message at the first device. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47-59. -59. (canceled)
Specification