Cryptographic authentication for telemetry with an implantable medical device
First Claim
Patent Images
1. An implantable device comprising:
- a receiver configured to receive data corresponding to a message and a first hash value generated as a function of the message;
a memory coupled to the receiver and configured to store a key and the message;
a hash value generator coupled to the memory and configured to generate a second hash value as a function of the key and the message; and
a comparator coupled to the hash value generator and configured to determine if the first hash value differs from the second hash value.
1 Assignment
0 Petitions
Accused Products
Abstract
Integrity of a wirelessly telemetered message communicated between an implantable medical device and an external programmer is authenticated by encoding the message. The message is encrypted based on a random number or time stamp and a secret key. The message is authenticated by encryption and decryption or by executing a hash function.
262 Citations
37 Claims
-
1. An implantable device comprising:
-
a receiver configured to receive data corresponding to a message and a first hash value generated as a function of the message; a memory coupled to the receiver and configured to store a key and the message; a hash value generator coupled to the memory and configured to generate a second hash value as a function of the key and the message; and a comparator coupled to the hash value generator and configured to determine if the first hash value differs from the second hash value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving data at an implantable device, the data corresponding to a message and a first hash value generated as a function of the message; storing a key and the message in a memory of the implantable device; generating a second hash value as a function of the key and the message; and comparing the first hash value and the second hash value. - View Dependent Claims (11, 12, 13)
-
-
14. A device comprising:
-
a non-implantable transceiver configured to receive data from an implantable device corresponding to a message and a first hash value generated as a function of the message; a memory coupled to the transceiver and configured to store a key and the message; a hash value generator coupled to the memory and configured to generate a second hash value as a function of the key and the message; and a comparator coupled to the hash value generator and configured to determine if the first hash value differs from the second hash value. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A system comprising:
-
an implantable device including; a first far field transceiver; a first processor coupled to the first far field transceiver; and a first memory coupled to the first processor; and an electrical circuit coupled to the processor; and an external device including; a second far field transceiver; a second processor coupled to the second far field transceiver; a second memory coupled to the second processor; and a data port coupled to the second processor; and wherein at least one of any combination of the first processor and second processor are adapted to execute instructions to generate a first hash value based on a code generated by the first processor, a key stored in the first memory and the second memory and a message; and wherein at least one of any combination of the first processor and second processor are adapted to execute instructions to generate a second hash value based on the message, the code and the key and adapted to compare the first hash value and the second hash value. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A method comprising:
-
receiving a code from a first device; storing a key in the first device and in a second device, wherein at least one of the first device and the second device is implantable; generating a first hash value at the second device, the first hash value generated as a function of the code, the key and a message; receiving the message and the first hash value at the first device; generating a second hash value at the first device, the second hash value generated as a function of the code, the key and the message; and comparing the first hash value and the second hash value at the first device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification