Establishing secure communication between an implantable medical device and an external device
First Claim
Patent Images
1. A non-transitory computer readable storage medium having stored thereon, computer-executable instructions that, when executed by a computer, cause the computer to perform a method for establishing secure communication between an implantable medical device and an external device, the method comprising:
- accessing, at an implantable medical device, biological data;
utilizing the biological data, at the implantable medical device, to generate a public cryptographic key, wherein the public cryptographic key corresponds to a portion of a random number culled directly from a representation of the biological data; and
utilizing the public cryptographic key, at the implantable medical device, to generate a private cryptographic key.
3 Assignments
0 Petitions
Accused Products
Abstract
Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device, biological data; utilizing the biological data, at the implantable medical device, to generate a public cryptographic key; and utilizing the public cryptographic key, at the implantable medical device, to generate a private cryptographic key.
23 Citations
32 Claims
-
1. A non-transitory computer readable storage medium having stored thereon, computer-executable instructions that, when executed by a computer, cause the computer to perform a method for establishing secure communication between an implantable medical device and an external device, the method comprising:
-
accessing, at an implantable medical device, biological data; utilizing the biological data, at the implantable medical device, to generate a public cryptographic key, wherein the public cryptographic key corresponds to a portion of a random number culled directly from a representation of the biological data; and utilizing the public cryptographic key, at the implantable medical device, to generate a private cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable storage medium having stored thereon, computer-executable instructions that, when executed by a computer, cause the computer to perform a method for establishing secure communication between an implantable medical device and an external device, the method comprising:
-
generating a random number by a first device without requiring computational input from the first device, the random number culled directly from a representation of biological signals sensed by the implantable medical device; generating a public cryptographic key utilizing the random number; sending the public cryptographic key to a second device; receiving an encrypted message from the second device; decrypting the encrypted message using a private cryptographic key, the private cryptographic key being generated using the public cryptographic key and a predetermined cryptographic key generation protocol; and based on the decrypting, determining an authentication status of the second device. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method for establishing secure communication between an implantable medical device and an external device, the method comprising:
-
accessing, at the implantable medical device, biological signals; and generating, at the implantable medical device, a public cryptographic key wherein the public cryptographic key corresponds to a portion of a random number culled directly from a representation of the biological signals. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for establishing secure communication between devices, the system comprising:
-
a set of sensors configured for sensing dynamic biometric activity; a converting module coupled with the set of sensors, the converting module configured for converting a portion of sensed dynamic biometric activity to a digital representation; and a cryptographic key generator coupled with the converting module, the cryptographic key generator configured for generating a cryptographic key utilizing the digital representation, wherein the cryptographic key corresponds to a portion of a random number culled directly from the digital representation. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification