GB0705342D0 - Environmental key generation - Google Patents

Environmental key generation

Info

Publication number
GB0705342D0
GB0705342D0 GBGB0705342.4A GB0705342A GB0705342D0 GB 0705342 D0 GB0705342 D0 GB 0705342D0 GB 0705342 A GB0705342 A GB 0705342A GB 0705342 D0 GB0705342 D0 GB 0705342D0
Authority
GB
United Kingdom
Prior art keywords
devices
data
representations
remote
local
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GBGB0705342.4A
Other versions
GB2447674A (en
GB2447674B (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lancaster University
Original Assignee
Lancaster University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lancaster University filed Critical Lancaster University
Priority to GB0705342A priority Critical patent/GB2447674B/en
Publication of GB0705342D0 publication Critical patent/GB0705342D0/en
Publication of GB2447674A publication Critical patent/GB2447674A/en
Application granted granted Critical
Publication of GB2447674B publication Critical patent/GB2447674B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • H04L29/06707
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

Secure communication between two paired electronic devices already in wireless communication is established by generating a cryptographic key based on environmental data measured independently in each of the devices via one or more sensors. A processed version of the data is exchanged securely between the devices using known techniques, and each device accesses local and remote representations of the environmental data to determine if it represents a shared experience, by comparing the local and remote representations. The local and remote representations of the data are then used independently in the two devices to generate a common cryptographic key. The environmental data may be obtained with microphones sensing the ambient sound field, cameras taking photographs of the same scene, sensing signal strength of radio frequency radiation, obtaining the users' biometric data, or moving the two devices together for example by shaking or colliding them.
GB0705342A 2007-03-21 2007-03-21 Generation of a cryptographic key from device motion Expired - Fee Related GB2447674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0705342A GB2447674B (en) 2007-03-21 2007-03-21 Generation of a cryptographic key from device motion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0705342A GB2447674B (en) 2007-03-21 2007-03-21 Generation of a cryptographic key from device motion

Publications (3)

Publication Number Publication Date
GB0705342D0 true GB0705342D0 (en) 2007-04-25
GB2447674A GB2447674A (en) 2008-09-24
GB2447674B GB2447674B (en) 2011-08-03

Family

ID=38008762

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0705342A Expired - Fee Related GB2447674B (en) 2007-03-21 2007-03-21 Generation of a cryptographic key from device motion

Country Status (1)

Country Link
GB (1) GB2447674B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970107A (en) * 2019-05-20 2020-11-20 诺基亚技术有限公司 Shared secret generation
CN115014696A (en) * 2022-08-08 2022-09-06 中国空气动力研究与发展中心高速空气动力研究所 Method for synchronous acquisition and integrated processing of wind tunnel multi-signal source data

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2034389A1 (en) 2007-09-07 2009-03-11 Nederlandse Organisatie voor toegepast- natuurwetenschappelijk onderzoek TNO Method and system for linking appliances
EP2226965A1 (en) * 2009-03-04 2010-09-08 Nederlandse Organisatie voor toegepast -natuurwetenschappelijk onderzoek TNO Method for generating cryptographic keys.
SE534384C2 (en) * 2009-07-03 2011-08-02 Kelisec Ab Method of generating an encryption / decryption key
WO2012161697A1 (en) 2011-05-24 2012-11-29 Empire Technology Development Llc Encryption using real-world objects
US8903315B2 (en) 2011-06-29 2014-12-02 Intel Corporation Secure context-based computing
US9307564B2 (en) * 2012-05-18 2016-04-05 Qualcomm Incorporated Automatic device-to-device connection control by environmental information
WO2014094862A1 (en) * 2012-12-20 2014-06-26 Telefonaktiebolaget L M Ericsson (Publ) Method and mobile device for generating a data authentication key
US20140324591A1 (en) * 2013-04-29 2014-10-30 Qualcomm Incorporated Selectively authenticating a group of devices as being in a shared environment based on locally captured ambient sound
US9818315B2 (en) 2013-06-04 2017-11-14 At&T Intellectual Property I, L.P. Secure multi-party device pairing using sensor data
US10574441B2 (en) 2014-05-26 2020-02-25 Nokia Technologies Oy Management of cryptographic keys
GB2528983A (en) * 2014-08-08 2016-02-10 Apply Mobile Ltd Improvements in and relating to random number generation apparatus
US9438417B2 (en) * 2014-08-12 2016-09-06 Robert Bosch Gmbh System and method for shared key agreement over untrusted communication channels
WO2019086969A1 (en) * 2017-11-01 2019-05-09 Abb Schweiz Ag Condition monitoring device and method for secure communication
US11190352B2 (en) * 2018-11-27 2021-11-30 Microsoft Technology Licensing, Llc Key pair generation based on environmental factors
GB202116900D0 (en) * 2021-11-24 2022-01-05 Smith & Nephew Device communication management in user activity monitoring systems

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6002770A (en) * 1995-07-28 1999-12-14 Mytec Technologies Inc. Method for secure data transmission between remote stations
TW541814B (en) * 2000-06-05 2003-07-11 Yang-Han Li Communication system with environmental dynamic encryption
US7177426B1 (en) * 2000-10-11 2007-02-13 Digital Authentication Technologies, Inc. Electronic file protection using location
US20040086115A1 (en) * 2002-11-06 2004-05-06 Chi-Sung Laih Image public key generation method
CN101951383B (en) * 2005-01-27 2013-06-19 美商内数位科技公司 Method and system for deriving an encryption key using joint randomness not shared by others
DE102005033228B4 (en) * 2005-07-15 2013-05-29 Siemens Enterprise Communications Gmbh & Co. Kg Method and security system for securing a data transmission in a communication system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111970107A (en) * 2019-05-20 2020-11-20 诺基亚技术有限公司 Shared secret generation
CN115014696A (en) * 2022-08-08 2022-09-06 中国空气动力研究与发展中心高速空气动力研究所 Method for synchronous acquisition and integrated processing of wind tunnel multi-signal source data
CN115014696B (en) * 2022-08-08 2022-10-25 中国空气动力研究与发展中心高速空气动力研究所 Method for synchronous acquisition and integrated processing of wind tunnel multi-signal source data

Also Published As

Publication number Publication date
GB2447674A (en) 2008-09-24
GB2447674B (en) 2011-08-03

Similar Documents

Publication Publication Date Title
GB2447674B (en) Generation of a cryptographic key from device motion
US20090167487A1 (en) Secure association between devices
US10146923B2 (en) Audiovisual associative authentication method, related system and device
CN103280009B8 (en) A kind of Multifunctional access device
CY1122317T1 (en) SYSTEM AND METHOD FOR USE IN A CELLULAR COMMUNICATION NETWORK
US20240039908A1 (en) Wireless Dongle for Communications with Wireless Earpieces
HUP0301343A2 (en) Use of communication equipment for authenticating of security sign on an item further method and unit and system for authenticating items, mainly for security documents
Choi et al. Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system
WO2012091888A8 (en) Electronic physical access control with remote authentication
WO2015168487A3 (en) Pairing devices using acoustic signals
JP2014044733A5 (en)
US20160352709A1 (en) Security system, method, and apparatus
WO2008018947A3 (en) Security system for handheld wireless devices using time-variable encryption keys
CN105009462B (en) Accessory detects
CN110598879A (en) Garbage recycling method, device and equipment based on block chain and storage medium
GB2463412A (en) Using an authentication ticket to initialize a computer
WO2016135437A3 (en) Biometric authentication device
Vu et al. Capacitive touch communication: A technique to input data through devices' touch screen
US20220020383A1 (en) Method for adding watermark information, method for extracting watermark information, and electronic device
TN2009000436A1 (en) Data survey device, integrated with a communication system, and related method
CN111935166B (en) Communication authentication method, system, electronic device, server, and storage medium
US20160162985A1 (en) Occupancy monitoring for a remote short term housing rental
CN107750365B (en) The correction of diffraction effect in ultrasonic sensor
KR101031450B1 (en) Secure association between devices
CN104363092B (en) The device authentication based on audio physical fingerprint under the conditions of spacing

Legal Events

Date Code Title Description
746 Register noted 'licences of right' (sect. 46/1977)

Effective date: 20130820

732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20131010 AND 20131016

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20190321