Methods for the generation of identical symmetrical cryptographic keys
First Claim
1. A method for exchanging cryptographically encoded data comprising:
- obtaining a data profile by a sensing element integrated with a transceiver in each of a plurality of devices;
calculating an identical symmetrical cryptographic key from the data profile by the transceiver in each of the plurality of devices bydividing the data profile into a plurality of sements,determining a plurality of weight factors, one for each of the plurality of segments, by comparing, the plurality of segments with at least one sample,providing the plurality of weight factors to a hash function,combining the plurality of weight factors into a plurality of groups,assigning a number to each of the plurality of groups, andcreating the identical symmetrical cryptographic key from the number assigned to each of the plurality of groups; and
using the identical symmetrical cryptographic key to encrypt and decrypt data in the transceiver in each of the plurality of devices, in communications among the plurality of devices.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and algorithms for generating identical symmetrical cryptographic keys. In a method for generating a symmetrical cryptographic key, a first profile is generated, the first profile comprising a series of data points collected over a first period of time. A start time of the first profile is identified and the first profile divided into a sequence of time-based segments, each time-based segment comprising at least one data point. A first symmetrical cryptographic key is calculated from the sequence of time-based segments, and the first symmetrical cryptographic key is stored for at least one of encrypting and decrypting data in cooperation with a second symmetrical cryptographic key substantially identical to the first symmetrical cryptographic key.
24 Citations
9 Claims
-
1. A method for exchanging cryptographically encoded data comprising:
-
obtaining a data profile by a sensing element integrated with a transceiver in each of a plurality of devices; calculating an identical symmetrical cryptographic key from the data profile by the transceiver in each of the plurality of devices by dividing the data profile into a plurality of sements, determining a plurality of weight factors, one for each of the plurality of segments, by comparing, the plurality of segments with at least one sample, providing the plurality of weight factors to a hash function, combining the plurality of weight factors into a plurality of groups, assigning a number to each of the plurality of groups, and creating the identical symmetrical cryptographic key from the number assigned to each of the plurality of groups; and using the identical symmetrical cryptographic key to encrypt and decrypt data in the transceiver in each of the plurality of devices, in communications among the plurality of devices. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An algorithm encrypting and decrypting data communications, the algorithm executed within a transceiver and comprising:
-
creating, by a sensor integrated with the transceiver, a data profile front a physical input; segmenting the data profile into a plurality of segments; determining a plurality of weight factors, one for each of the plurality of segments, by comparing the plurality of segments with at least one sample; providing the plurality of weight factors to a hash function executed within the transceiver; combining the plurality or weight factors into a plurality of groups; assigning a number to each of the plurality of groups; creating a cryptographic key from the number assigned to each of the plurality of groups; and encrypting data by the transceiver using the cryptographic key. - View Dependent Claims (9)
-
Specification