Devices and methods for transferring data through a human body
First Claim
1. A method comprising:
- modulating, by a first device, an authentication credential with a signal;
providing, by the first device, the signal to an electro-acoustic transducer that is in physical contact with an individual; and
causing, by the first device, the electro-acoustic transducer to transmit the signal through a bone of a body of the individual to a second device with which the individual is also in physical contact, so that the second device can authenticate the individual for access to the second device based upon the authentication credential.
1 Assignment
0 Petitions
Accused Products
Abstract
An illustrative method for transferring data to a device includes identifying the data that is to be transferred to the device, modulating the data with a signal, providing the signal to a contact microphone that is in physical contact with an individual, and transmitting the signal through a body of the individual to the device using the contact microphone. An illustrative method for authenticating the individual includes transmitting a signal through a body of the individual in response to the individual physically contacting an authentication device, receiving a modified signal including the signal as modified by the body of the individual, removing the signal from the modified signal to identify a unique body signature of the individual, comparing the unique body signature to a database to determine if the database includes the unique body signature, and selectively authenticating the individual based upon whether the database includes the unique body signature.
-
Citations
19 Claims
-
1. A method comprising:
-
modulating, by a first device, an authentication credential with a signal; providing, by the first device, the signal to an electro-acoustic transducer that is in physical contact with an individual; and causing, by the first device, the electro-acoustic transducer to transmit the signal through a bone of a body of the individual to a second device with which the individual is also in physical contact, so that the second device can authenticate the individual for access to the second device based upon the authentication credential. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
in response to an individual touching a sensor associated with an authentication device, transmitting, by the sensor associated with the authentication device, a signal through a body of the individual; receiving, by the sensor associated with the authentication device, a modified signal from the body of the individual, the modified signal comprising the signal as modified by the body of the individual; identifying, by the authentication device, a unique body signature of the individual by removing the signal from the modified signal; comparing, by the authentication device, the unique body signature of the individual to a plurality of unique body signatures stored in a database to determine if the database comprises the unique body signature; if the authentication device determines that the database comprises the unique body signature, authenticating, by the authentication device, the individual; and if the authentication device determines that the database does not comprise the unique body signature, denying authentication of the individual. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An authentication device comprising:
-
a processor; and a memory that stores instructions which, when executed by the processor, cause the processor to perform operations comprising in response to an individual touching a sensor associated with the authentication device, causing the sensor associated with the authentication device to transmit a signal through a body of the individual, receiving a modified signal from the body of the individual, the modified signal comprising the signal as modified by the body of the individual, identifying a unique body signature of the individual by removing the signal from the modified signal, comparing the unique body signature of the individual to a plurality of unique body signatures stored in a database to determine if the database comprises the unique body signature, if the database comprises the unique body signature, authenticating the individual, and if the database does not comprise the unique body signature, denying authentication of the individual. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification