GB2447674B - Generation of a cryptographic key from device motion - Google Patents
Generation of a cryptographic key from device motionInfo
- Publication number
- GB2447674B GB2447674B GB0705342A GB0705342A GB2447674B GB 2447674 B GB2447674 B GB 2447674B GB 0705342 A GB0705342 A GB 0705342A GB 0705342 A GB0705342 A GB 0705342A GB 2447674 B GB2447674 B GB 2447674B
- Authority
- GB
- United Kingdom
- Prior art keywords
- devices
- data
- representations
- remote
- cryptographic key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H04L29/06707—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/65—Environment-dependent, e.g. using captured environmental data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Selective Calling Equipment (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Secure communication between two paired electronic devices already in wireless communication is established by generating a cryptographic key based on environmental data measured independently in each of the devices via one or more sensors. A processed version of the data is exchanged securely between the devices using known techniques, and each device accesses local and remote representations of the environmental data to determine if it represents a shared experience, by comparing the local and remote representations. The local and remote representations of the data are then used independently in the two devices to generate a common cryptographic key. The environmental data may be obtained with microphones sensing the ambient sound field, cameras taking photographs of the same scene, sensing signal strength of radio frequency radiation, obtaining the users' biometric data, or moving the two devices together for example by shaking or colliding them.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0705342A GB2447674B (en) | 2007-03-21 | 2007-03-21 | Generation of a cryptographic key from device motion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0705342A GB2447674B (en) | 2007-03-21 | 2007-03-21 | Generation of a cryptographic key from device motion |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0705342D0 GB0705342D0 (en) | 2007-04-25 |
GB2447674A GB2447674A (en) | 2008-09-24 |
GB2447674B true GB2447674B (en) | 2011-08-03 |
Family
ID=38008762
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0705342A Expired - Fee Related GB2447674B (en) | 2007-03-21 | 2007-03-21 | Generation of a cryptographic key from device motion |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2447674B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014094862A1 (en) * | 2012-12-20 | 2014-06-26 | Telefonaktiebolaget L M Ericsson (Publ) | Method and mobile device for generating a data authentication key |
US20140359272A1 (en) * | 2013-06-04 | 2014-12-04 | At&T Intellectual Property I, L.P. | Secure multi-party device pairing using sensor data |
US8938070B2 (en) * | 2011-05-24 | 2015-01-20 | Empire Technology Development Llc | Encryption using real-world objects |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2034389A1 (en) | 2007-09-07 | 2009-03-11 | Nederlandse Organisatie voor toegepast- natuurwetenschappelijk onderzoek TNO | Method and system for linking appliances |
EP2226965A1 (en) * | 2009-03-04 | 2010-09-08 | Nederlandse Organisatie voor toegepast -natuurwetenschappelijk onderzoek TNO | Method for generating cryptographic keys. |
SE534384C2 (en) * | 2009-07-03 | 2011-08-02 | Kelisec Ab | Method of generating an encryption / decryption key |
US8903315B2 (en) * | 2011-06-29 | 2014-12-02 | Intel Corporation | Secure context-based computing |
US9307564B2 (en) | 2012-05-18 | 2016-04-05 | Qualcomm Incorporated | Automatic device-to-device connection control by environmental information |
US20140324591A1 (en) * | 2013-04-29 | 2014-10-30 | Qualcomm Incorporated | Selectively authenticating a group of devices as being in a shared environment based on locally captured ambient sound |
CN106416120B (en) | 2014-05-26 | 2019-12-27 | 诺基亚技术有限公司 | Apparatus, method and computer readable medium for processing information |
GB2528983A (en) * | 2014-08-08 | 2016-02-10 | Apply Mobile Ltd | Improvements in and relating to random number generation apparatus |
US9438417B2 (en) * | 2014-08-12 | 2016-09-06 | Robert Bosch Gmbh | System and method for shared key agreement over untrusted communication channels |
WO2019086969A1 (en) * | 2017-11-01 | 2019-05-09 | Abb Schweiz Ag | Condition monitoring device and method for secure communication |
US11190352B2 (en) * | 2018-11-27 | 2021-11-30 | Microsoft Technology Licensing, Llc | Key pair generation based on environmental factors |
EP3742663B1 (en) * | 2019-05-20 | 2024-02-07 | Nokia Technologies Oy | Shared secret generation |
GB202116900D0 (en) * | 2021-11-24 | 2022-01-05 | Smith & Nephew | Device communication management in user activity monitoring systems |
CN115014696B (en) * | 2022-08-08 | 2022-10-25 | 中国空气动力研究与发展中心高速空气动力研究所 | Method for synchronous acquisition and integrated processing of wind tunnel multi-signal source data |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6002770A (en) * | 1995-07-28 | 1999-12-14 | Mytec Technologies Inc. | Method for secure data transmission between remote stations |
TW541814B (en) * | 2000-06-05 | 2003-07-11 | Yang-Han Li | Communication system with environmental dynamic encryption |
US20040086115A1 (en) * | 2002-11-06 | 2004-05-06 | Chi-Sung Laih | Image public key generation method |
WO2006081122A2 (en) * | 2005-01-27 | 2006-08-03 | Interdigital Technology Corporation | Method and system for deriving an encryption key using joint randomness not shared by others |
DE102005033228A1 (en) * | 2005-07-15 | 2007-01-25 | Siemens Ag | Data transmission securing method for use in communication system, involves generating private and public keys based on biometric characteristic data and coding data with private key or notching data, which is to be verified with public key |
US7177426B1 (en) * | 2000-10-11 | 2007-02-13 | Digital Authentication Technologies, Inc. | Electronic file protection using location |
-
2007
- 2007-03-21 GB GB0705342A patent/GB2447674B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6002770A (en) * | 1995-07-28 | 1999-12-14 | Mytec Technologies Inc. | Method for secure data transmission between remote stations |
TW541814B (en) * | 2000-06-05 | 2003-07-11 | Yang-Han Li | Communication system with environmental dynamic encryption |
US7177426B1 (en) * | 2000-10-11 | 2007-02-13 | Digital Authentication Technologies, Inc. | Electronic file protection using location |
US20040086115A1 (en) * | 2002-11-06 | 2004-05-06 | Chi-Sung Laih | Image public key generation method |
WO2006081122A2 (en) * | 2005-01-27 | 2006-08-03 | Interdigital Technology Corporation | Method and system for deriving an encryption key using joint randomness not shared by others |
DE102005033228A1 (en) * | 2005-07-15 | 2007-01-25 | Siemens Ag | Data transmission securing method for use in communication system, involves generating private and public keys based on biometric characteristic data and coding data with private key or notching data, which is to be verified with public key |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8938070B2 (en) * | 2011-05-24 | 2015-01-20 | Empire Technology Development Llc | Encryption using real-world objects |
US9270452B2 (en) | 2011-05-24 | 2016-02-23 | Empire Technology Development Llc | Encryption using real-world objects |
WO2014094862A1 (en) * | 2012-12-20 | 2014-06-26 | Telefonaktiebolaget L M Ericsson (Publ) | Method and mobile device for generating a data authentication key |
US20140359272A1 (en) * | 2013-06-04 | 2014-12-04 | At&T Intellectual Property I, L.P. | Secure multi-party device pairing using sensor data |
US9818315B2 (en) * | 2013-06-04 | 2017-11-14 | At&T Intellectual Property I, L.P. | Secure multi-party device pairing using sensor data |
US10217381B2 (en) | 2013-06-04 | 2019-02-26 | At&T Intellectual Property I, L.P. | Secure multi-party device pairing using sensor data |
US10559229B2 (en) | 2013-06-04 | 2020-02-11 | At&T Intellectual Property I, L.P. | Secure multi-party device pairing using sensor data |
Also Published As
Publication number | Publication date |
---|---|
GB0705342D0 (en) | 2007-04-25 |
GB2447674A (en) | 2008-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2447674B (en) | Generation of a cryptographic key from device motion | |
US20090167487A1 (en) | Secure association between devices | |
US10146923B2 (en) | Audiovisual associative authentication method, related system and device | |
CN103280009B8 (en) | A kind of Multifunctional access device | |
US10021079B2 (en) | Security system, method, and apparatus | |
WO2015062320A1 (en) | Human body coupled intelligent information input system and method | |
WO2017074564A1 (en) | Authenticity-assured data gathering apparatus and method | |
CN110598879A (en) | Garbage recycling method, device and equipment based on block chain and storage medium | |
US11363372B2 (en) | Systems and methods for minimizing vibration sensitivity for protected microphones | |
US20100035648A1 (en) | Earplug with alarm and electronic device system with same | |
RU2015133100A (en) | METHOD FOR PERFORMING ANALOG-DIGITAL SIGNATURE IN A TRUSTED ENVIRONMENT AND ITS IMPLEMENTING DEVICE | |
Vu et al. | Capacitive touch communication: A technique to input data through devices' touch screen | |
US20220020383A1 (en) | Method for adding watermark information, method for extracting watermark information, and electronic device | |
CN107885987A (en) | A kind of unlocking method, terminal and computer-readable recording medium | |
KR101031450B1 (en) | Secure association between devices | |
US20140300467A1 (en) | System for Locating Tagged Objects | |
CN104363092B (en) | The device authentication based on audio physical fingerprint under the conditions of spacing | |
CN109767482A (en) | Image processing method, device, electronic equipment and storage medium | |
Bâce et al. | HandshakAR: wearable augmented reality system for effortless information sharing | |
CN114117461A (en) | Data protection method, electronic equipment and storage medium | |
Guo et al. | Secure device pairing via handshake detection | |
Lin et al. | Poster: Automatic key generation using motion energy harvesters | |
CN109743289A (en) | A kind of data verification method neural network based, device and electronic equipment | |
GB2544257A (en) | Greeting gesture device | |
JP2019153877A (en) | Method and apparatus for authenticating mobile terminal equipped with acceleration sensor as legitimate communication partner |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
746 | Register noted 'licences of right' (sect. 46/1977) |
Effective date: 20130820 |
|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20131010 AND 20131016 |
|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20190321 |