Data encryption/decryption using neuro and neuro-mechanical fingerprints
First Claim
Patent Images
1. A method of securing data, the method comprising:
- with at least one sensor, sensing multi-dimensional motion of a body part of a first authorized user to generate a first multi-dimensional signal;
in response to the first multi-dimensional signal and the first user calibration parameters, generating a first neuro-mechanical fingerprint;
encrypting data in a storage device with an encryption algorithm using the first neuro-mechanical fingerprint as an encryption key; and
accessing the encrypted data in the storage device that is encrypted with the first neuro-mechanical fingerprint as the encryption key includingsensing multi-dimensional motion of the body part of the first authorized user to generate a second multi-dimensional signal;
in response to the second multi-dimensional signal, regenerating the first neuro-mechanical fingerprint;
determining a match percentage in response to the first regenerated neuro-mechanical fingerprint and the first user calibration parameters; and
in response to the match percentage being greater than or equal to an access match level, decrypting data with the encryption algorithm using the first regenerated neuro-mechanical fingerprint representing the first encryption key.
2 Assignments
0 Petitions
Accused Products
Abstract
In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to generate a multi-dimensional signal; in response to the multi-dimensional signal and user calibration parameters, generating a neuro-mechanical fingerprint; and encrypting data with an encryption algorithm using the neuro-mechanical fingerprint as a key.
-
Citations
10 Claims
-
1. A method of securing data, the method comprising:
-
with at least one sensor, sensing multi-dimensional motion of a body part of a first authorized user to generate a first multi-dimensional signal; in response to the first multi-dimensional signal and the first user calibration parameters, generating a first neuro-mechanical fingerprint; encrypting data in a storage device with an encryption algorithm using the first neuro-mechanical fingerprint as an encryption key; and accessing the encrypted data in the storage device that is encrypted with the first neuro-mechanical fingerprint as the encryption key including sensing multi-dimensional motion of the body part of the first authorized user to generate a second multi-dimensional signal; in response to the second multi-dimensional signal, regenerating the first neuro-mechanical fingerprint; determining a match percentage in response to the first regenerated neuro-mechanical fingerprint and the first user calibration parameters; and in response to the match percentage being greater than or equal to an access match level, decrypting data with the encryption algorithm using the first regenerated neuro-mechanical fingerprint representing the first encryption key. - View Dependent Claims (2)
-
-
3. A method of securing data, the method comprising:
-
with at least one sensor, sensing multi-dimensional motion of a body part of a first authorized user to generate a first multi-dimensional signal; in response to the first multi-dimensional signal and the first user calibration parameters, generating a first neuro-mechanical fingerprint; encrypting data in a storage device with an encryption algorithm using the first neuro-mechanical fingerprint as an encryption key; storing the first neuro-mechanical fingerprint in a secured storage device associated with the first neuro-mechanical fingerprint and one or more secondary neuro-mechanical fingerprints, wherein the stored neuro-mechanical fingerprint is accessible from the secured storage device in response to the first neuro-mechanical fingerprint regenerated from the first authorized user, and wherein the stored neuro-mechanical fingerprint is further accessible from the secured storage device in response to the one or more secondary neuro-mechanical fingerprints generated from one or more secondary authorized users differing from the first authorized user. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10)
-
Specification