Cryptographic authentication for telemetry with an implantable medical device
First Claim
Patent Images
1. A system comprising:
- an implantable device including;
a first far field transceiver;
a first processor coupled to the first far field transceiver; and
a first memory coupled to the first processor; and
an electrical circuit coupled to the processor; and
an external device including;
a second far field transceiver;
a second processor coupled to the second far field transceiver;
a second memory coupled to the second processor; and
a data port coupled to the processor; and
wherein at least one of any combination of the first processor and second processor is adapted to execute instructions to implement an encryption algorithm configured to generate a ciphertext for communication between the implantable device and the external device based on a code generated by the first processor, a key stored in the first memory and the second memory, and a message; and
wherein at least one of any combination of the first processor and second processor is adapted to execute instructions to implement a decryption algorithm configured to decrypt the message from the ciphertext based on the code and the key.
0 Assignments
0 Petitions
Accused Products
Abstract
Integrity of a wirelessly telemetered message communicated between an implantable medical device and an external programmer is authenticated by encoding the message. The message is encrypted based on a random number or time stamp and a secret key. The message is authenticated by encryption and decryption or by executing a hash function.
-
Citations
22 Claims
-
1. A system comprising:
-
an implantable device including; a first far field transceiver; a first processor coupled to the first far field transceiver; and a first memory coupled to the first processor; and an electrical circuit coupled to the processor; and an external device including; a second far field transceiver; a second processor coupled to the second far field transceiver; a second memory coupled to the second processor; and a data port coupled to the processor; and wherein at least one of any combination of the first processor and second processor is adapted to execute instructions to implement an encryption algorithm configured to generate a ciphertext for communication between the implantable device and the external device based on a code generated by the first processor, a key stored in the first memory and the second memory, and a message; and wherein at least one of any combination of the first processor and second processor is adapted to execute instructions to implement a decryption algorithm configured to decrypt the message from the ciphertext based on the code and the key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving a code from a first device; storing a key in the first device and in a second device, wherein at least one of the first device and the second device is implantable; generating a ciphertext at the second device, the ciphertext generated as a function of the code, the key and a message; receiving the ciphertext at the first device; decrypting the ciphertext at the first device to receive the message, the message decrypted as a function of the code and the key; and authenticating the message at the first device. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification