Digital authentication over acoustic channel
First Claim
1. A non-transitory machine readable medium having one or more instructions that, in response to execution, cause a computing device to perform operations, comprising:
- storing a cryptographic key and a look up table (LUT);
generating an access code using the cryptographic key;
generating multiple parallel binary phase shift keying (BPSK) symbols based on the access code;
converting the multiple parallel BPSK symbols into multiple tones encoded with the access code using the LUT;
outputting the multiple tones;
receiving a personal identification number (PIN);
creating other multiple tones based on the PIN; and
outputting the other multiple tones.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
-
Citations
18 Claims
-
1. A non-transitory machine readable medium having one or more instructions that, in response to execution, cause a computing device to perform operations, comprising:
-
storing a cryptographic key and a look up table (LUT); generating an access code using the cryptographic key; generating multiple parallel binary phase shift keying (BPSK) symbols based on the access code; converting the multiple parallel BPSK symbols into multiple tones encoded with the access code using the LUT; outputting the multiple tones; receiving a personal identification number (PIN); creating other multiple tones based on the PIN; and outputting the other multiple tones. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory machine readable medium having one or more instructions that, in response to execution, cause a computing device to perform operations, comprising:
-
storing a cryptographic key; generating an access code using the cryptographic key; generating multiple parallel binary phase shift keying (BPSK) symbols based on the access code; repeating the multiple parallel BPSK symbols a selected number of times to obtain repeated BPSK symbols; performing an inverse fast fourier transform (IFFT) on the repeated BPSK symbols to generate IFFT symbols; modulating the IFFT symbols into multiple tones encoded with the access code and a personal identification number (PIN); outputting the multiple tones; and in response to the outputting the multiple tones, receiving a grant of access associated with at least one of an application, a system, or a network. - View Dependent Claims (9)
-
-
10. A non-transitory machine readable medium having one or more instructions that, in response to execution, cause a computing device to perform operations, comprising:
-
receiving multiple tones encoded with an access code and a personal identification number (PIN); generating multiple parallel binary phase shift keying (BPSK) symbols from the multiple tones; converting the multiple parallel BPSK symbols into an encoded interleaved bit stream; de-interleaving the encoded interleaved bit stream to obtain a de-interleaved bit stream; recovering the access code and the PIN from the de-interleaved bit stream; and in response to verifying the access code and the PIN, granting access to at least one of an application, a system, or a network. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. An apparatus, comprising:
-
an audio input unit configured to receive multiple tones encoded with an access code and a personal identification number (PIN); a binary phase shift keying (BPSK) module configured to generate multiple parallel BPSK symbols from the multiple tones and convert the multiple parallel BPSK symbols into an encoded interleaved bit stream; a de-interleaving component configured to de-interleave the encoded interleaved bit stream to obtain a de-interleaved bit stream; a decoding module configured to recover the access code and the PIN from the deinterleaved bit stream; and a processing module configured to, in response to the access code and the PIN being verified, grant access to at least one of an application, a system, or a network.
-
-
17. An apparatus, comprising:
-
means for storing a cryptographic key; means for generating an access code using the cryptographic key; means for generating multiple parallel binary phase shift keying (BPSK) symbols based on the access code; means for repeating the multiple parallel BPSK symbols a selected number of times to obtain repeated BPSK symbols; means for performing an inverse fast fourier transform (IFFT) on the repeated BPSK symbols to generate IFFT symbols; means for modulating the IFFT symbols into multiple tones encoded with the access code and a personal identification number (PIN); means for outputting the multiple tones; and means for receiving a grant of access associated with at least one of an application, a system, or a network based on the multiple tones.
-
-
18. A method, comprising:
-
storing a cryptographic key and a look up table (LUT); generating an access code using the cryptographic key; generating multiple parallel binary phase shift keying (BPSK) symbols based on the access code; converting the multiple parallel BPSK symbols into multiple tones encoded with the access code using the LUT; outputting the multiple tones; receiving a personal identification number (PIN); creating other multiple tones based on the PIN; and outputting the other multiple tones.
-
Specification