DIGITAL AUTHENTICATION OVER ACOUSTIC CHANNEL
First Claim
1. A machine readable medium having one or more instructions for use in authentication, which when executed by a processor causes the processor to:
- store a cryptographic key and a look up table (LUT);
generate an access code using the cryptographic key;
generate multiple parallel binary phase shift keying kBPSK) symbols based upon the access code;
convert the BPSK symbols into multiple tones encoded with the access code using the LUT; and
output the multiple tones encoded with the access code for authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
-
Citations
17 Claims
-
1. A machine readable medium having one or more instructions for use in authentication, which when executed by a processor causes the processor to:
-
store a cryptographic key and a look up table (LUT); generate an access code using the cryptographic key; generate multiple parallel binary phase shift keying kBPSK) symbols based upon the access code; convert the BPSK symbols into multiple tones encoded with the access code using the LUT; and output the multiple tones encoded with the access code for authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A machine readable medium having one or more instructions for use in authentication, which when executed by a processor causes the processor to:
-
store a cryptographic key; generate an access code using the cryptographic key; generate multiple parallel binary phase shift keying (BPSK) symbols based upon the access code; repeat the BPSK symbols a selected number of times before converting the BPSK symbols; perform inverse fast fourier transform (IFFT) on the repeated BPSK symbols to generate IFFT symbols; modulate the IFFT symbols into the multiple tones encoded with the accesscode; and output the multiple tones encoded with the access code for authentication. - View Dependent Claims (10)
-
-
11. A machine readable medium having one or more instructions for use in verification, which when executed by a processor causes the processor to:
-
receive multiple tones encoded with an access code; generate multiple parallel BPSK symbols from the multiple tones; convert the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleave the encoded interleaved bit stream; and recover the access code from the encoded de-interleaved bit stream. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification