METHODS FOR CREATING SECRET KEYS BASED UPON ONE OR MORE SHARED CHARACTERISTICS AND SYSTEMS THEREOF
First Claim
Patent Images
1. A method for independently generating one or more keys, the method comprising:
- obtaining at two or more devices data based on movement of at least one of the devices with the respect to the other device; and
generating one or more keys based on the obtained data at each of the devices for use in securing communications between the devices, wherein the one or more keys at each of the devices is substantially the same.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for generating one or more keys includes obtaining at two or more devices data based on movement of at least one of the devices with the respect to the other device. At least one key is generated based on the obtained data at each of the devices for use in securing communications between the devices. The key at each of the devices is substantially the same.
40 Citations
72 Claims
-
1. A method for independently generating one or more keys, the method comprising:
-
obtaining at two or more devices data based on movement of at least one of the devices with the respect to the other device; and generating one or more keys based on the obtained data at each of the devices for use in securing communications between the devices, wherein the one or more keys at each of the devices is substantially the same. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for independently generating one or more keys, the system comprising:
-
a data acquisition system at each of two or more devices, each of the data acquisition systems obtains data based on movement of at least one of the devices with the respect to the other device; and a key generation system that generates one or more keys based on the obtained data from each of the data acquisition systems for use in securing communications between the devices, wherein the one or more keys at each of the devices are substantially the same. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for securing communications by independently generating one or more keys, the method comprising:
-
obtaining data based on one or more shared characteristics between two or more devices; generating one or more keys based on the obtained data on the one or more shared characteristic independently at one or more of the devices; and using the one or more generated keys for securing communications without transmitting the one or more generated keys between the devices. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A system for securing communications by independently generating one or more keys, the system comprising:
-
one or more data acquisition systems that obtain data based on one or more shared characteristics between two or more devices; a key generation system that generates one or more keys based on the obtained data on the one or more shared characteristic independently at one or more of the devices; and one or more communication systems that use the one or more generated keys for securing communications without transmitting the one or more generated keys between the devices. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72)
-
Specification