Method for secure data transmission between remote stations
First Claim
1. A method for permitting the secure passing of data between two remote stations, comprising the steps of:
- obtaining from a user of a first of two remote stations, a first characteristic information signal;
obtaining from a user of a second of two remote stations, a second characteristic information signal;
generating a sequence of random characters to obtain a random key;
obtaining a key function which represents said key;
obtaining a Fourier transform of said key representing function;
obtaining at least one encrypted version of said key based on said Fourier transform of said key representing function, and a least one of said first characteristic information signal and said second characteristic information signal such that said key may be recovered by writing said at least one encrypted version of said encrypted key to a correlator and inputting either one of said first characteristic information signal and said second characteristic information signal to said correlator;
storing said at least one encrypted version of said key at each of said first station and said second station, whereby thereafter any message encrypted in such a way that it may be decrypted by said key may be decrypted at either of said two remote stations by retrieving said stored encrypted key, writing said at least one encrypted version of said encrypted key to a correlator and inputting either one of said first characteristic information signal and said second characteristic information signal to said correlator.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for permitting the secure handling of data between two remote stations firstly involves the generation of an encrypted decryption key which is based on a fingerprint information signal from a user of a first station, a fingerprint information signal from a user of a second station, and a key representing function derived from a random key. The encrypted decryption key is of the type with the property that when it is written to a spatial light modulator (SLM) of an optical correlator, the output of the correlator is similar when input with either one of the fingerprint information signals. The encrypted key is then stored at both stations. Thereafter a message encrypted with the key may be decrypted at either station by retrieving the encrypted key, writing the encrypted key to a filter of an optical correlator, inputting one of the fingerprint information signals to the correlator in order to allow recovery of the decryption key, and applying the decryption key to the encrypted message.
67 Citations
13 Claims
-
1. A method for permitting the secure passing of data between two remote stations, comprising the steps of:
-
obtaining from a user of a first of two remote stations, a first characteristic information signal; obtaining from a user of a second of two remote stations, a second characteristic information signal; generating a sequence of random characters to obtain a random key; obtaining a key function which represents said key; obtaining a Fourier transform of said key representing function; obtaining at least one encrypted version of said key based on said Fourier transform of said key representing function, and a least one of said first characteristic information signal and said second characteristic information signal such that said key may be recovered by writing said at least one encrypted version of said encrypted key to a correlator and inputting either one of said first characteristic information signal and said second characteristic information signal to said correlator; storing said at least one encrypted version of said key at each of said first station and said second station, whereby thereafter any message encrypted in such a way that it may be decrypted by said key may be decrypted at either of said two remote stations by retrieving said stored encrypted key, writing said at least one encrypted version of said encrypted key to a correlator and inputting either one of said first characteristic information signal and said second characteristic information signal to said correlator. - View Dependent Claims (2, 3, 4, 5, 6, 10, 11)
-
-
7. A method for the secure handling of data between two remote stations, comprising the steps of:
-
at a base station, encrypting a message such that said message may be decrypted by a decryption key; passing said message to a remote station; at said remote station, obtaining from a user of said remote station a remote station user optical characteristic information signal; retrieving from storage an encrypted version of said decryption key, said encrypted decryption key having the property that when it is written to a correlator, the output of said correlator is similar when input with either one of said remote station user characteristic information signal or a base station user optical characteristic information signal; writing a remote station correlator with said encrypted decryption key; inputting said remote station correlator with a Fourier transform of said remote station user optical characteristic information signal; regenerating said decryption key from an output of said remote station correlator; and decrypting said message with said decryption key. - View Dependent Claims (8, 9, 12, 13)
-
Specification