Devices and methods for transferring data through a human body
First Claim
1. A device comprising:
- a processor; and
a memory that stores instructions which, when executed by the processor, cause the processor to perform operations comprising;
modulating an authentication credential with a signal,providing the signal to an electro-acoustic transducer that is in physical contact with an individual, andcausing the electro-acoustic transducer to transmit the signal through a bone of a body of the individual to a further device with which the individual is also in physical contact, so that the further device can authenticate the individual for access to the further device based upon the authentication credential.
1 Assignment
0 Petitions
Accused Products
Abstract
An illustrative method for transferring data to a device includes identifying the data that is to be transferred to the device, modulating the data with a signal, providing the signal to a contact microphone that is in physical contact with an individual, and transmitting the signal through a body of the individual to the device using the contact microphone. An illustrative method for authenticating the individual includes transmitting a signal through a body of the individual in response to the individual physically contacting an authentication device, receiving a modified signal including the signal as modified by the body of the individual, removing the signal from the modified signal to identify a unique body signature of the individual, comparing the unique body signature to a database to determine if the database includes the unique body signature, and selectively authenticating the individual based upon whether the database includes the unique body signature.
184 Citations
20 Claims
-
1. A device comprising:
-
a processor; and a memory that stores instructions which, when executed by the processor, cause the processor to perform operations comprising; modulating an authentication credential with a signal, providing the signal to an electro-acoustic transducer that is in physical contact with an individual, and causing the electro-acoustic transducer to transmit the signal through a bone of a body of the individual to a further device with which the individual is also in physical contact, so that the further device can authenticate the individual for access to the further device based upon the authentication credential. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable storage medium that stores computer-executable instructions which, when executed by a processor of a device, cause the device to perform operations comprising:
-
modulating an authentication credential with a signal; providing the signal to an electro-acoustic transducer that is in physical contact with an individual; and causing the electro-acoustic transducer to transmit the signal through a bone of a body of the individual to a further device with which the individual is also in physical contact, so that the further device can authenticate the individual for access to the further device based upon the authentication credential. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable storage medium that stores computer-executable instructions which, when executed by a processor of an authentication device, cause the authentication device to perform operations comprising:
-
in response to an individual touching a sensor associated with the authentication device; causing the sensor associated with the authentication device to transmit a signal through a body of the individual; receiving a modified signal from the body of the individual, the modified signal comprising the signal as modified by the body of the individual; identifying a unique body signature of the individual by removing the signal from the modified signal; comparing the unique body signature of the individual to a plurality of unique body signatures stored in a database to determine if the database comprises the unique body signature; if the database comprises the unique body signature, authenticating the individual; and if the database does not comprise the unique body signature, denying authentication of the individual. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification