Methods for the generation of identical symmetrical cryptographic keys
First Claim
1. A method for generating a symmetrical cryptographic key comprising:
- generating a first profile, the first profile comprising a series of data points collected over a first period of time;
identifying a start time of the first profile and dividing the first profile into a sequence of time-based segments, each time-based segment comprising at least one data point;
calculating a first symmetrical cryptographic key from the sequence of time-based segments; and
storing the first symmetrical cryptographic key for at least one of encrypting and decrypting data in cooperation with a second symmetrical cryptographic key identical to the first symmetrical cryptographic key.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and algorithms for generating identical symmetrical cryptographic keys. In a method for generating a symmetrical cryptographic key, a first profile is generated, the first profile comprising a series of data points collected over a first period of time. A start time of the first profile is identified and the first profile divided into a sequence of time-based segments, each time-based segment comprising at least one data point. A first symmetrical cryptographic key is calculated from the sequence of time-based segments, and the first symmetrical cryptographic key is stored for at least one of encrypting and decrypting data in cooperation with a second symmetrical cryptographic key substantially identical to the first symmetrical cryptographic key.
-
Citations
15 Claims
-
1. A method for generating a symmetrical cryptographic key comprising:
-
generating a first profile, the first profile comprising a series of data points collected over a first period of time; identifying a start time of the first profile and dividing the first profile into a sequence of time-based segments, each time-based segment comprising at least one data point; calculating a first symmetrical cryptographic key from the sequence of time-based segments; and storing the first symmetrical cryptographic key for at least one of encrypting and decrypting data in cooperation with a second symmetrical cryptographic key identical to the first symmetrical cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for generating a symmetrical cryptographic key comprising:
-
generating a first profile, the first profile comprising a series of data points collected over a first period of time; dividing the first profile into a plurality of time-based segments, each time-based segment comprising at least one data point; calculating a first symmetrical cryptographic key from at least a portion of the plurality of time-based segments, and storing the first symmetrical cryptographic key for at least one of encrypting and decrypting data in cooperation with a second symmetrical cryptographic key identical to the first symmetrical cryptographic key. - View Dependent Claims (10, 11, 12)
-
-
13. An algorithm for encrypting and decrypting data communications, the algorithm executed within each of at least two communication devices and comprising:
-
creating a data profile from a physical input during a period of time; identifying a start time of the period of time and segmenting the data profile into a plurality of time-based segments, each time-based segment comprising a data point related to the physical input; creating a first cryptographic key from the plurality of time-based segments; storing the first cryptographic key in a first communication device; encrypting data in the first communication device using the first cryptographic key; transmitting the encrypted data to a second communication device; and decrypting the encrypted data in the second communication device using a second cryptographic key identical to the first cryptographic key. - View Dependent Claims (14, 15)
-
Specification