METHODS FOR THE GENERATION OF IDENTICAL SYMMETRICAL CRYPTOGRAPHIC KEYS
First Claim
1. A method for generating a symmetrical cryptographic key comprising the steps of:
- generating a first profile, the first profile comprising a series of data points collected over a first period of time;
identifying a start time of the first profile and dividing the first profile into a sequence of time-based segments, each time-based segment comprising at least one data point;
calculating a first symmetrical cryptographic key from the sequence of time-based segments; and
storing the first symmetrical cryptographic key for at least one of encrypting and decrypting data in cooperation with a second symmetrical cryptographic key substantially identical to the first symmetrical cryptographic key.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and algorithms for generating identical symmetrical cryptographic keys. In a method for generating a symmetrical cryptographic key, a first profile is generated, the first profile comprising a series of data points collected over a first period of time. A start time of the first profile is identified and the first profile divided into a sequence of time-based segments, each time-based segment comprising at least one data point. A first symmetrical cryptographic key is calculated from the sequence of time-based segments, and the first symmetrical cryptographic key is stored for at least one of encrypting and decrypting data in cooperation with a second symmetrical cryptographic key substantially identical to the first symmetrical cryptographic key.
-
Citations
25 Claims
-
1. A method for generating a symmetrical cryptographic key comprising the steps of:
-
generating a first profile, the first profile comprising a series of data points collected over a first period of time; identifying a start time of the first profile and dividing the first profile into a sequence of time-based segments, each time-based segment comprising at least one data point; calculating a first symmetrical cryptographic key from the sequence of time-based segments; and storing the first symmetrical cryptographic key for at least one of encrypting and decrypting data in cooperation with a second symmetrical cryptographic key substantially identical to the first symmetrical cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for exchanging cryptographically encoded data comprising the steps of:
-
obtaining a data profile by a sensing element integrated with a transceiver in each of a plurality of devices; calculating an identical symmetrical cryptographic key from the data profile by the transceiver in each of the plurality of devices; and using the identical symmetrical cryptographic key to encrypt and decrypt data in the transceiver in each of the plurality of devices, in communications among the plurality of devices. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for generating a symmetrical cryptographic key comprising the steps of:
-
generating a first profile, the first profile comprising a series of data points collected over a first period of time; dividing the first profile into a plurality of time-based segments, each time-based segment comprising at least one data point; calculating a first symmetrical cryptographic key from at least a portion of the plurality of time-based segments, and storing the first symmetrical cryptographic key for at least one of encrypting and decrypting data in cooperation with a second symmetrical cryptographic key substantially identical to the first symmetrical cryptographic key. - View Dependent Claims (18, 19, 20)
-
-
21. An algorithm for encrypting and decrypting data communications, the algorithm executed within each of at least two communication devices and comprising the steps of:
-
creating a data profile from a physical input during a period of time; identifying a start time of the period of time and segmenting the data profile into a plurality of time-based segments; creating a first cryptographic key from the plurality of time-based segments; storing the first cryptographic key in a first communication device; encrypting data in the first communication device using the first cryptographic key; transmitting the encrypted data to a second communication device; and decrypting the encrypted data in the second communication device using a second cryptographic key substantially identical to the first cryptographic key. - View Dependent Claims (22, 23)
-
-
24. An algorithm for encrypting and decrypting data communications, the algorithm executed within a transceiver and comprising the steps of:
-
creating, by a sensor integrated with the transceiver, a data profile from a physical input; segmenting the data profile into a plurality of segments; determining a plurality of weight factors, one for each of the plurality of segments, by comparing the plurality of segments with at least one sample; providing the plurality of weight factors to a hash function executed within the transceiver; combining the plurality of weight factors into a plurality of groups; assigning a number to each of the plurality of groups; creating a cryptographic key from the number assigned to each of the plurality of groups; and encrypting data by the transceiver using the cryptographic key. - View Dependent Claims (25)
-
Specification