US9270452B2 - Encryption using real-world objects - Google Patents

Encryption using real-world objects Download PDF

Info

Publication number
US9270452B2
US9270452B2 US14/517,094 US201414517094A US9270452B2 US 9270452 B2 US9270452 B2 US 9270452B2 US 201414517094 A US201414517094 A US 201414517094A US 9270452 B2 US9270452 B2 US 9270452B2
Authority
US
United States
Prior art keywords
electronic device
encryption key
quantization
characteristic vector
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US14/517,094
Other versions
US20150063566A1 (en
Inventor
Yutaka Arakawa
Naoaki Yamanaka
Eiji Oki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Empire Technology Development LLC
Original Assignee
Empire Technology Development LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Empire Technology Development LLC filed Critical Empire Technology Development LLC
Priority to US14/517,094 priority Critical patent/US9270452B2/en
Assigned to EMPIRE TECHNOLOGY DEVELOPMENT LLC reassignment EMPIRE TECHNOLOGY DEVELOPMENT LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ARAKAWA, YUTAKA, YAMANAKA, NAOAKI, OKI, EIJI
Publication of US20150063566A1 publication Critical patent/US20150063566A1/en
Application granted granted Critical
Publication of US9270452B2 publication Critical patent/US9270452B2/en
Assigned to CRESTLINE DIRECT FINANCE, L.P. reassignment CRESTLINE DIRECT FINANCE, L.P. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data

Definitions

  • User authentication provides an individual with secure access to confidential or personal information or services.
  • authentication of the communication counterpart prevents eavesdropping by a third party.
  • a method may include capturing, by a first electronic device, an external object, generating an object signal associated with the external object, generating an encryption key based on the object signal, and transmitting data encrypted by the encryption key to a second electronic device.
  • a method may include detecting, by a first electronic device, an external object, detecting, by a second electronic device, the external object, generating, by the first electronic device, a first encryption key based on the external object, and generating, by the second electronic device, a second encryption key based on the external object.
  • a computer-readable storage medium whose contents, in response to execution by a first electronic device, may cause the processor to perform operations including capturing an external object, generating an object signal associated with the external object, generating an encryption key based on the object signal, and transmitting data encrypted by the encryption key to a second electronic device.
  • a data encryption device may include a capture unit configured to capture an external object, a key generation unit configured to generate an encryption key based on the external object, and a transmitter configured to transmit data encrypted by the encryption key to a data decryption device.
  • the external object may be made known, identified or indicated to the data encryption device and the data decryption device.
  • a data decryption device may include a capture unit configured to capture an external object, a key generation unit configured to generate an encryption key based on the external object, and a receiver configured to receive data encrypted by the encryption key from a data encryption device. Information identifying the external object is made accessible to the data encryption device and the data decryption device.
  • FIG. 1 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on a real-world object;
  • FIG. 2 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on an external sound output from an external sound source around the multiple electronic devices;
  • FIG. 3 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on a sound output from one of the multiple electronic devices;
  • FIG. 4 shows a schematic block diagram of an illustrative example of an electronic device for generating an encryption key based on an external sound
  • FIG. 5 shows an example flow diagram of a method for generating an encryption key based on an external sound
  • FIG. 6 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on an external image
  • FIG. 7 shows a schematic block diagram of an illustrative example of an electronic device for generating an encryption key based on an external image
  • FIG. 8 shows an example flow diagram of a method for generating an encryption key based on an external image
  • FIG. 9 illustrates a computer program product that can be utilized to provide an encryption scheme using real-world objects.
  • FIG. 10 is a block diagram illustrating an example computing device that can be utilized to provide an encryption scheme using real-world objects, all arranged in accordance with at least some embodiments described herein.
  • This disclosure is generally drawn, inter alia, to methods, apparatus, systems, devices, and computer program products related to an encryption technique using real-world objects.
  • an encryption key based on an external object such as an external sound or an external image.
  • the external object may be made known, identified or indicated to a first electronic device and a second electronic device, and the first and second electronic devices may respectively generate a first encryption key and a second encryption key based on the external object.
  • the first and second electronic devices may store the generated first and second encryption keys, respectively, and use them for encrypting or decrypting the data to be transmitted therebetween.
  • the external object may refer to an object or phenomenon existing in the real world, such as an object in the background or ambient sound heard in the vicinity.
  • These types of information i.e., the object in the background or ambient sound heard in the vicinity
  • the encryption key can be re-used later for encryption of files attached to e-mails or to encrypt a communication channel.
  • the encryption key can be re-used later for encryption of files attached to e-mails or to encrypt a communication channel.
  • by encrypting material distributed at a certain meeting with an encryption key generated at the time of the meeting only those who actually participated in the meeting (i.e., those who share the key) can read the distributed material and materials that are subsequently exchanged via e-mails. In contrast, a third party who receives such materials, via mail forwarding, etc., is not able to read such materials.
  • an expiration date may be set for the key so that the key can be used only up to the expiration date.
  • the parties are then able to achieve secure communication by generating an encryption key using the external object information that is shared or known only to the parties present at the location, and superposing the encryption key on data to be sent between the parties.
  • the encryption keys generated for a given exchange can also be saved remotely in a network store, or by a web service, and the encryption keys can be retrieved and re-used by a same party, but from a different device.
  • an encryption key may be established based on an image of a bench in a park for an exchange of a file in the park between two parties with their cell phones, but later one of the parties wishes to review the content of the file from that party's personal computer.
  • the encryption key can be re-used by the first electronic device (or second electronic device) to encrypt subsequent communications with the second electronic device via an alternate communication channel.
  • the exchange in the park may have been via a short range wireless protocol such as Bluetooth
  • later communications between the first and second electronic devices can be secured with the encryption key via an alternate channel, such as a data network, wireless fidelity network, telecommunications network, etc.
  • FIG. 1 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on a real-world object arranged in accordance with at least some embodiments described herein.
  • Electronic devices 100 and 110 may be located in a same environment so that electronic devices 100 and 110 can obtain same information from an external object.
  • two users e.g., people
  • Each user can then use his or her respective electronic device 100 or 110 to capture an ambient sound thereabouts or nearby, such as, for example, music being broadcast from the loudspeaker in the park, animal noise, etc., and generate an encryption key, respectively, based on the captured sound.
  • one of the users can cause his or her electronic device 100 or 110 to output a sound. Both users can then capture the output sound using his or her respective electronic device 100 and 110 , and generate an encryption key based on the sound output from the one of electronic devices 100 and 110 (that is, the sound captured by electronic devices 100 and 110 ).
  • each user can use his or her respective electronic device 100 or 110 to capture an image of an external object thereabouts or nearby, such as, for example, an image of scenery in the park around both users, or a separate image of one of the pond, tree, bench or loudspeaker located in the park, and generate an encryption key, respectively, based on the captured image.
  • electronic devices 100 and 110 may include a portable electronic device, such as, for example, a mobile phone, a smart phone, a personal digital assistant (PDA), a tablet computer, a netbook computer, or a laptop computer.
  • PDA personal digital assistant
  • FIG. 1 illustrates that two electronic devices, e.g., electronic devices 100 and 110 , located in a same environment generate an encryption key based on an external object in the same environment
  • two electronic devices e.g., electronic devices 100 and 110
  • any number of electronic devices located in the same environment can participate in the encryption scheme arranged in accordance with at least some embodiments described herein.
  • the environment is not limited to a park as illustrated in FIG. 1 , and any location having a real-world object will suffice for encryption of the various embodiments described herein.
  • FIG. 2 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on an external sound output from an external sound source around or near the multiple electronic devices arranged in accordance with at least some embodiments described herein.
  • an electronic device 200 including a microphone 210 and an electronic device 220 including a microphone 230 may be located in the vicinity of an external sound source 240 .
  • Respective microphones 210 and 230 of electronic devices 200 and 220 may then be used to capture or record a sound output by external sound source 240 .
  • Electronic devices 200 and 220 may then generate encryption keys, respectively, based on the captured sound.
  • external sound source 240 may be a loudspeaker, a horn, a public address system, a radio, a television set, a tape player, a stereo system, a musical instrument, a siren, a vehicle engine, a vehicle tire, or an animal, etc.
  • microphones 210 and 230 may include an internal microphone or an external microphone operatively connected to each of electronic devices 200 and 220 .
  • FIG. 3 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on a sound output from one of the multiple electronic devices arranged in accordance with at least some embodiments described herein.
  • electronic devices 200 and 220 are shown also including speakers 315 and 335 , respectively, and may be in the same location or vicinity.
  • one of the electronic devices e.g., electronic device 200
  • Respective microphones 210 and microphone 230 of electronic devices 200 and 220 may be used to capture or record the sound output by one of the electronic devices, e.g., electronic device 200 .
  • Electronic devices 200 and 220 may then generate encryption keys, respectively, based on the captured sound.
  • the sound output by one of the electronic devices and used to generate the encryption key may be a weak sound, or a high-frequency sound, e.g., which attenuates considerably.
  • FIG. 4 shows a schematic block diagram of an illustrative example of an electronic device for generating an encryption key based on an external sound arranged in accordance with at least some embodiments described herein.
  • an electronic device 400 may include a capture unit such as a sound capture unit 410 , a normalization unit 420 , a quantization unit 430 , a matching unit 440 , a key generation unit 450 , an encryption unit 460 , a transceiver 470 , and storage 480 .
  • a capture unit such as a sound capture unit 410 , a normalization unit 420 , a quantization unit 430 , a matching unit 440 , a key generation unit 450 , an encryption unit 460 , a transceiver 470 , and storage 480 .
  • a capture unit such as a sound capture unit 410 , a normalization unit 420 , a quantization unit 430 , a matching unit 440 , a key generation unit 450
  • Sound capture unit 410 may be configured to capture an external sound.
  • the external sound may include an ambient sound in the vicinity of electronic device 400 , a sound output from a speaker (not shown) of electronic device 400 , or a sound output from a counterpart or another electronic device (not shown) near or in the vicinity of electronic device 400 .
  • the counterpart electronic device may be used to decrypt encrypted data received from electronic device 400 using the encryption key generated using the captured external sound.
  • sound capture unit 410 may include a microphone, an acoustic-to-electric transducer, or a sound sensor.
  • Normalization unit 420 may be configured to normalize or perform normalization of the external sound captured by sound capture unit 410 . Such normalization of the external sound may be helpful due to the difference between the sounds captured by electronic device 400 and the counterpart electronic device (not shown), which is caused by the difference in the sensitivity of sound capture unit 410 of electronic device 400 and the sound capture unit (not shown) of the counterpart electronic device (not shown), and/or the type of operating systems of electronic device 400 and the counterpart electronic device (not shown).
  • normalization unit 420 may perform normalization of the external sound based on one or more normalization parameters shared between electronic device 400 and the counterpart electronic device (not shown). In some embodiments, normalization unit 420 may detect a maximum magnitude and a minimum magnitude of the external sound captured by sound capture unit 410 , and designate the detected maximum magnitude and minimum magnitude of the external sound as the normalization parameters. Electronic device 400 may send/receive to/from the counterpart electronic device (not shown) the normalization parameters, as will be further described below.
  • Quantization unit 430 may be configured to quantize or perform quantization of the normalized external sound and generate at least one quantization pattern. In some embodiments, quantization unit 430 may perform quantization of the normalized external sound for at least a part of the available quantization bit depths up to a maximum available quantization bit depth. In some embodiments, quantization unit 430 may perform quantization of the normalized external sound for the available quantization bit depths up to the maximum available quantization bit depth. In some embodiments, the maximum available quantization bit depth may be determined in advance and shared between electronic device 400 and the counterpart electronic device (not shown). Table 1 below illustrates an example list of quantization patterns in cases where quantization unit 430 quantizes the normalized external sound for all of the available quantization bit depths (where the minimum available quantization bit depth is 2) up to the maximum available quantization bit depth of 16.
  • Quantization bit depth Quantization pattern 2 0101011110010 3 00010101011 4 1100101010011 . . . . . 16 1101001010101
  • Matching unit 440 may be configured to identify, among the generated at least one quantization pattern, at least one matching quantization pattern, which matches at least one counterpart quantization pattern generated by the counterpart electronic device (not shown). By way of example, but not limitation, matching unit 440 may determine whether each of the at least one counterpart quantization pattern generated by the quantization unit of the counterpart electronic device (not shown) matches the at least one quantization pattern generated by quantization unit 430 , thereby identifying at least one matching quantization pattern. If one of the at least one counterpart quantization pattern matches one of the at least one quantization pattern generated by quantization unit 430 , electronic device 400 may store or record the one of the at least one quantization pattern as a matching quantization pattern, for example, in storage 480 (described below).
  • Key generation unit 450 may be configured to generate an encryption key by selecting one of the identified at least one matching quantization pattern as the encryption key. In some embodiments, key generation unit 450 may select the encryption key based on a quantization bit depth. By way of example, but not limitation, key generation unit 450 may select one matching quantization pattern whose quantization bit is largest among the at least one matching quantization pattern.
  • Encryption unit 460 may be configured to encrypt data to be sent or transmitted by electronic device 400 , for example, to the counterpart electronic device (not shown), with the encryption key generated by key generation unit 450 .
  • Transceiver 470 may be configured to transmit and receive data that is being sent and received, respectively, by electronic device 400 .
  • the data may include, without limitation, the encrypted data, normalization parameters, or quantization patterns.
  • transceiver 470 may transmit the encrypted data that is being sent or transmitted by electronic device 400 , for example, to the counterpart electronic device (not shown), and receive data that is being received by electronic device 400 , for example, from the counterpart electronic device (not shown).
  • transceiver 470 may transmit the normalization parameters designated by normalization unit 420 , for example, to the counterpart electronic device (not shown), or receive normalization parameters from another electronic device (e.g., normalization parameters designated by a normalization unit (not shown) of the counterpart electronic device (not shown)).
  • transceiver 470 may transmit the quantization pattern generated by quantization unit 430 , for example, to the counterpart electronic device (not shown), or receive a quantization pattern from another electronic device (e.g., quantization pattern generated by the quantization unit (not shown) of the counterpart electronic device (not shown)).
  • Storage 480 may be configured to store the encryption key generated by key generation unit 450 .
  • Storage 480 may provide the stored encryption key to encryption unit 460 , so that encryption unit 460 can encrypt data to be sent to the counterpart electronic device (not shown) with the encryption key stored in storage 480 .
  • storage 480 may store the generated encryption key in association with an identifier of the counterpart electronic device (not shown).
  • storage 480 may store the generated encryption key in association with its expiration date information. Table 2 below illustrates an example list of the generated encryption keys stored in storage 480 together with the identifier of the corresponding counterpart device and the expiration date information associated with the generated encryption keys.
  • FIG. 5 shows an example flow diagram of a method for generating an encryption key based on an external sound arranged in accordance with at least some embodiments described herein.
  • the method in FIG. 5 could be implemented using, for example, two electronic devices, such as the electronic devices discussed above with reference to FIG. 4 .
  • the blocks in the left side may be implemented by a first electronic device, while the blocks in the right side may be implemented by a second electronic device.
  • An example method may include one or more operations, actions, or functions as illustrated by one or more of blocks S 500 , S 505 , S 510 , S 515 , S 520 , S 525 , S 530 , S 535 , S 540 , S 545 , S 550 , S 555 , S 560 , S 565 , S 570 and/or S 575 .
  • blocks S 500 , S 505 , S 510 , S 515 , S 520 , S 525 , S 530 , S 535 , S 540 , S 545 , S 550 , S 555 , S 560 , S 565 , S 570 and/or S 575 Although illustrated as discrete blocks, various blocks may be divided into additional blocks, combined into fewer blocks, or eliminated, depending on the desired implementation. Further, some blocks illustrated as being implemented by the first electronic device may be implemented by the second electronic device, and some blocks illustrated as being implemented by the second electronic device may be implemented by the first
  • the first electronic device may detect an external object, such as, for example, an external sound selected from a group consisting of an ambient sound in the vicinity of the first and second electronic devices and a sound output from one of the first and second electronic devices.
  • the second electronic device may also detect the external object, which is substantially the same external object detected by the first electronic device at block S 500 .
  • the detecting at block S 500 and the detecting at block S 505 may be performed simultaneously or at slightly different times. Processing may continue from block S 500 to block S 510 in the first electronic device, and from block S 505 to block S 515 in the second electronic device.
  • the first electronic device may generate a first object signal associated with the external object.
  • the second electronic device may generate a second object signal associated with the external object. Processing may continue from block S 510 to block S 520 in the first electronic device, and from block S 515 to block S 525 in the second electronic device.
  • the first electronic device may send, to the second electronic device, information to be commonly used by the first and second electronic devices for generating encryption keys.
  • the information to be commonly used may include at least one normalization parameter and a maximum available quantization bit depth.
  • the at least one normalization parameter may include a maximum magnitude and a minimum magnitude of the object signal.
  • the first electronic device may detect the maximum and minimum magnitudes of the first object signal, and designate the maximum and minimum magnitudes of the first object signal as the normalization parameters.
  • the second electronic device may receive from the first electronic device the information to be commonly used by the first and second electronic devices for generating encryption keys, such as, for example, the at least one normalization parameter and the maximum available quantization bit depth. Then, at block S 530 , the second electronic device may perform normalization of the second object signal based on the received at least one normalization parameter.
  • the first electronic device designates the at least one normalization parameter and the second electronic device normalizes the second object signal based on the at least one normalization parameter designated by the first electronic device
  • the second electronic device designates the at least one normalization parameter and the first electronic device normalizes the first object signal based on the at least one normalization parameter designated by the second electronic device, or both of the first electronic device and the second electronic device respectively normalize the first object signal and the second object signal based on at least one normalization parameter previously shared between the first and second electronic devices.
  • Processing may continue from block S 520 to block S 540 in the first electronic device, and from block S 530 to block S 535 in the second electronic device.
  • the second electronic device may quantize or perform quantization of the normalized second object signal, thereby generating at least one second quantization pattern.
  • the second electronic device may quantize the normalized second object signal for all of available quantization bit depths up to the maximum available quantization bit depth, to generate at least one second quantization pattern corresponding to the respective available quantization bit depths.
  • the second electronic device may store or record the generated at least one second quantization pattern in a storage.
  • the first electronic device may perform quantization of the first object signal, thereby generating at least one first quantization pattern.
  • the first electronic device may quantize the first object signal for at least a part of the available quantization bit depths up to the maximum available quantization bit depth gradually one by one.
  • the initially generated one of the at least one first quantization pattern may be quantized for a quantization bit depth corresponding to the intermediate value of the maximum available quantization bit depth and the minimum available quantization bit depth.
  • the initially generated one of the at least one first quantization pattern may have a quantization bit depth corresponding to the maximum or minimum available quantization bit depth. For example, the minimum available quantization bit depth may be two. Processing may continue from block S 540 to block S 545 in the first electronic device, and from block S 535 to block S 550 in the second electronic device.
  • the first electronic device may send to the second electronic device the generated at least one first quantization pattern. In some embodiments, the first electronic device may send to the second electronic device all of the generated at least one first quantization pattern at once. In some embodiments, the first electronic device may send to the second electronic device the at least one first quantization pattern gradually one by one. Then, at block S 550 , the second electronic device may receive from the first electronic device the at least one first quantization pattern. Processing may continue from block S 550 to block S 555 in the second electronic device.
  • the second electronic device may determine whether each of the received at least one first quantization pattern matches one of the at least one second quantization pattern, thereby identifying at least one matching quantization pattern. If one of the received at least one first quantization pattern matches one of the at least one second quantization pattern, the second electronic device may store or record the quantization pattern as a matching quantization pattern. Processing may continue from block S 555 to block S 560 in the second electronic device.
  • the second electronic device may select one of the at least one matching quantization pattern as the second encryption key. In some embodiments, the second electronic device may select the second encryption key based on a quantization bit depth. In some embodiments, the second electronic device may select one matching quantization pattern whose quantization bit is largest among the at least one matching quantization pattern.
  • the quantization of the first object signal (block S 540 ) through the selection of the one of the at least one matching quantization pattern (block S 560 ) may be performed via an iterative process.
  • the second electronic device may generate in advance the second quantization patterns for bit depths of 2 bits (i.e., the minimum available quantization bit depth) to 16 bits (i.e., the maximum available quantization bit depth).
  • the first electronic device may quantize the first object signal for an initial quantization bit depth, thereby generating an initial first quantization pattern. Then, the first electronic device may send the initial first quantization pattern to the second electronic device.
  • the second electronic device may then check for a match between the received initial first quantization pattern and the corresponding second quantization pattern, which is quantized by the second electronic device for the same quantization bit depth as the initial quantization bit depth. If the received initial first quantization pattern matches the corresponding second quantization pattern, the second electronic device may send to the first electronic device a request for increase in the quantization bit depth. On the other hand, if the received initial first quantization pattern does not match the corresponding second quantization pattern, the second electronic device may send to the first electronic device a request for decrease in the quantization bit depth. Then, the first electronic device may send to the second electronic device another first quantization pattern quantized at the increased or decreased quantization bit depth. Such a process may be repeated iteratively until finding out the one matching quantization pattern whose quantization bit is largest among the at least one matching quantization pattern.
  • the maximum available quantization bit depth or the minimum available quantization bit depth may be used as the initial quantization bit depth.
  • the intermediate value of the maximum available quantization bit depth and the minimum available quantization bit depth may be used as the initial quantization bit depth.
  • the request for increase or decrease in the quantization bit depth may be a request for one-bit increase or one-bit decrease, or a request for multi-bit increase or multi-bit decrease. Processing may continue from block S 560 to block S 565 in the second electronic device.
  • the second electronic device may send to the first electronic device the selected one of the at least one matching quantization pattern. Then, at block S 570 , the first electronic device may receive the one of the at least one matching quantization pattern. At block S 575 , the first electronic device may select the received one of the at least one matching quantization pattern as the first encryption key.
  • FIG. 6 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on an external image arranged in accordance with at least some embodiments described herein.
  • electronic device 200 including a camera 610 and electronic device 220 including a camera 630 are located near or next to each other in the same environment.
  • electronic device 200 may capture, using camera 610 , an external image near or thereabout, and generate an encryption key based on the captured image.
  • electronic device 220 may capture, using camera 630 , an external image near or thereabout, which is identical or similar to the external image captured by electronic device 200 , and generate an encryption key based on the captured image.
  • the encryption key can then be used to encrypt or decrypt data to provide secure communication.
  • FIG. 7 shows a schematic block diagram of an illustrative example of an electronic device for generating an encryption key based on an external image arranged in accordance with at least some embodiments described herein.
  • an electronic device 700 may include a capture unit such as an image capture unit 710 , a characteristic extraction unit 720 , a key generation unit 730 , an encryption unit 740 , a transceiver 750 and storage 760 .
  • a capture unit such as an image capture unit 710
  • a characteristic extraction unit 720 such as an image capture unit 710
  • a key generation unit 730 such as an image capture unit 710
  • an encryption unit 740 such as an image capture unit 710
  • storage 760 such as an image capture unit 710 , a transceiver 750 and storage 760 .
  • various components may be divided into additional components, combined into fewer components, or eliminated, depending on the desired implementation.
  • Image capture unit 710 may be configured to capture an external image.
  • the external image is an image surrounding electronic device 700 .
  • electronic device 700 may further include an object extraction unit configured to extract a specific object image from the external image captured by image capture unit 710 .
  • the object extraction unit may extract an object image of a pond or a bench.
  • the object extraction unit may extract the object image based on an input of user of electronic device 700 .
  • the object extraction unit may extract an object image of the bench.
  • Characteristic extraction unit 720 may be configured to extract a characteristic vector value corresponding to the external image captured by image capture unit 710 or the object image extracted from the external image by the object extraction unit (not shown). Characteristic extraction unit 720 may employ any existing algorithm for extracting image characteristics, such as, for example, speeded up robust features (SURF) algorithm.
  • SURF speeded up robust features
  • Key generation unit 730 may be configured to generate an encryption key based on the characteristic vector value extracted by characteristic extraction unit 720 .
  • key generation unit 730 may generate the encryption key by searching a codebook.
  • the codebook may be included in key generation unit 730 or another component, such as storage 760 (described below).
  • the codebook may store multiple vector-key pairs each including a sample characteristic vector value and a key associated with the sample characteristic vector value.
  • each of the sample characteristic vector values in the codebook may be associated with sample images, including, for example, an image of a pond or a bench, or a combination thereof.
  • the codebook may be in a format shown in Table 3 below.
  • key generation unit 730 may generate the encryption key based on the similarities between the extracted characteristic vector value and multiple sample characteristic vector values of sample images included in the codebook, e.g., similarities between the extracted characteristic vector value and each of the multiple sample characteristic vector values. In some embodiments, the similarities between the extracted characteristic vector value and the sample characteristic vector values may be calculated based on angular differences therebetween.
  • key generation unit 730 may generate the encryption key based on a key generation function.
  • the key generation function may include any existing hash function, such as, for example, MD5 hash function, or SHA1 hash function.
  • Encryption unit 740 may be configured to encrypt data to be sent or transmitted by electronic device 700 , for example, to the counterpart electronic device (not shown) with the encryption key generated by key generation unit 730 .
  • Transceiver 750 may be configured to transmit data to the counterpart electronic device (not shown), and receive data from the counterpart electronic device (not shown).
  • transceiver 750 may be connected to encryption unit 740 , and transmit to the data encrypted by encryption unit 740 that is being sent or transmitted by electronic device 700 , for example, to the counterpart electronic device (not shown), and receive data that is being received by electronic device 700 , for example, from the counterpart electronic device (not shown).
  • Storage 760 may be configured to store the encryption key generated by key generation unit 730 .
  • Storage 760 may provide the stored encryption key to encryption unit 740 , so that encryption unit 740 can encrypt data to be sent to the counterpart electronic device (not shown) with the encryption key stored in storage 760 .
  • storage 760 may store the encryption key with further information, such as weather or time, when image capture unit 710 captures an external image.
  • FIG. 8 shows an example flow diagram of a method for generating an encryption key based on an external image arranged in accordance with at least some embodiments described herein.
  • the method in FIG. 8 could be implemented using, for example, an electronic device and a counterpart electronic device, each of which is discussed above with reference to FIG. 7 .
  • An example method may include one or more operations, actions, or functions as illustrated by one or more of blocks S 800 , S 810 , S 820 , and/or S 830 . Although illustrated as discrete blocks, various blocks may be divided into additional blocks, combined into fewer blocks, or eliminated, depending on the desired implementation. Processing may begin at block S 800 .
  • the electronic device may detect an external object, such as, for example, an external image.
  • an external object such as, for example, an external image.
  • the external image is an image surrounding the electronic device or a specific object image extracted from the image surrounding the electronic device.
  • the electronic device may generate an object signal associated with the external object. Processing may continue from block S 810 to block S 820 .
  • the electronic device may extract a characteristic vector value corresponding to the object signal.
  • the characteristic vector value may correspond to at least a part of the external object.
  • any existing algorithm for extracting image characteristics such as speeded up robust features (SURF) algorithm, may be employed for extracting the characteristic vector value. Processing may continue from block S 820 to block S 830 .
  • SURF speeded up robust features
  • the electronic device may generate an encryption key based on the extracted characteristic vector value.
  • the electronic device may generate the encryption key by searching a codebook.
  • the codebook may store multiple vector-key pairs each including a sample characteristic vector value and a key associated with the sample characteristic vector value.
  • each of the sample characteristic vector values in the codebook may be associated with a sample image, including, for example, an image of a pond or a bench, or a combination thereof.
  • the electronic device may generate the encryption key based on the similarity between the extracted characteristic vector value and each of multiple sample characteristic vector values of sample images included in the codebook.
  • the similarity between the extracted characteristic vector value and each of the sample characteristic vector values may be calculated based on angular difference therebetween.
  • the electronic device may generate the encryption key based on a key generation function, which is shared between the electronic device and the counterpart electronic device.
  • the key generation function may include any existing hash function, such as, for example, MD5 hash function, or SHA1 hash function.
  • FIG. 9 illustrates a computer program product 900 that can be utilized to provide an encryption scheme using real-world objects in accordance with at least some embodiments described herein.
  • Program product 900 may include a signal bearing medium 902 .
  • Signal bearing medium 902 may include one or more instructions 904 that, when executed by, for example, a processor, may provide the functionality described above with respect to FIGS. 1-8 .
  • instructions 904 may include: one or more instructions for generating an object signal associated with an external object; one or more instructions for generating an encryption key based on the object signal; or one or more instructions for transmitting data encrypted by the encryption key to a second electronic device.
  • electronic devices 200 and 220 may undertake one or more of the blocks shown in FIG. 5 in response to instructions 904 .
  • signal bearing medium 902 may encompass a computer-readable medium 906 , such as, but not limited to, a hard disk drive, a Compact Disc (CD), a Digital Video Disk (DVD), a digital tape, memory, etc.
  • signal bearing medium 902 may encompass a recordable medium 908 , such as, but not limited to, memory, read/write (R/W) CDs, R/W DVDs, etc.
  • signal bearing medium 902 may encompass a communications medium 910 , such as, but not limited to, a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communications link, a wireless communication link, etc.).
  • program product 900 may be conveyed to one or more modules of mobile device 110 a by an RF signal bearing medium 902 , where the signal bearing medium 902 is conveyed by a wireless communications medium 910 (e.g., a wireless communications medium conforming with the IEEE 802.11 standard).
  • a wireless communications medium 910 e.g., a wireless communications medium conforming with the IEEE 802.11 standard.
  • FIG. 10 is a block diagram illustrating an example computing device 1000 that can be utilized to provide an encryption scheme using real-world objects in accordance with at least some embodiments described herein.
  • computing device 1000 In a very basic configuration 1002 , computing device 1000 typically includes one or more processors 1004 and a system memory 1006 .
  • a memory bus 1008 may be used for communicating between processor 1004 and system memory 1006 .
  • processor 1004 may be of any type including but not limited to a microprocessor ( ⁇ P), a microcontroller ( ⁇ C), a digital signal processor (DSP), or any combination thereof.
  • Processor 1004 may include one more levels of caching, such as a level one cache 1010 and a level two cache 1012 , a processor core 1014 , and registers 1016 .
  • An example processor core 1014 may include an arithmetic logic unit (ALU), a floating point unit (FPU), a digital signal processing core (DSP Core), or any combination thereof.
  • An example memory controller 1018 may also be used with processor 1004 , or in some implementations memory controller 1018 may be an internal part of processor 1004 .
  • system memory 1006 may be of any type including but not limited to volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.) or any combination thereof.
  • System memory 1006 may include an operating system 1020 , one or more applications 1022 , and program data 1024 .
  • Application 1022 may include an encryption algorithm 1026 that is arranged to perform the functions as described herein including those described previously with respect to FIGS. 1-7 .
  • Program data 1024 may include any data that may be useful for providing the encryption scheme using real-world objects as is described herein.
  • application 1022 may be arranged to operate with program data 1024 on operating system 1020 such that the encryption scheme using real-world objects may be provided.
  • This described basic configuration 1002 is illustrated in FIG. 10 by those components within the inner dashed line.
  • Computing device 1000 may have additional features or functionality, and additional interfaces to facilitate communications between basic configuration 1002 and any required devices and interfaces.
  • a bus/interface controller 1030 may be used to facilitate communications between basic configuration 1002 and one or more data storage devices 1032 via a storage interface bus 1034 .
  • Data storage devices 1032 may be removable storage devices 1036 , non-removable storage devices 1038 , or a combination thereof. Examples of removable storage and non-removable storage devices include magnetic disk devices such as flexible disk drives and hard-disk drives (HDD), optical disk drives such as compact disk (CD) drives or digital versatile disk (DVD) drives, solid state drives (SSD), and tape drives to name a few.
  • Example computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which may be used to store the desired information and which may be accessed by computing device 1000 . Any such computer storage media may be part of computing device 1000 .
  • Computing device 1000 may also include an interface bus 1040 for facilitating communication from various interface devices (e.g., output devices 1042 , peripheral interfaces 1044 , and communication devices 1046 ) to basic configuration 1002 via bus/interface controller 1030 .
  • Example output devices 1042 include a graphics processing unit 1048 and an audio processing unit 1050 , which may be configured to communicate to various external devices such as a display or speakers via one or more A/V ports 1052 .
  • Example peripheral interfaces 1044 include a serial interface controller 1054 or a parallel interface controller 1056 , which may be configured to communicate with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device, etc.) or other peripheral devices (e.g., printer, scanner, etc.) via one or more I/O ports 1058 .
  • An example communication device 1046 includes a network controller 1060 , which may be arranged to facilitate communications with one or more other computing devices 1062 over a network communication link via one or more communication ports 1064 .
  • the network communication link may be one example of a communication media.
  • Communication media may typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and may include any information delivery media.
  • a “modulated data signal” may be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), microwave, infrared (IR) and other wireless media.
  • RF radio frequency
  • IR infrared
  • the term computer readable media as used herein may include both storage media and communication media.
  • Computing device 1000 may be implemented as a portion of a small-form factor portable (or mobile) electronic device such as a cell phone, a personal data assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset device, an application specific device, or a hybrid device that include any of the above functions.
  • a small-form factor portable (or mobile) electronic device such as a cell phone, a personal data assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset device, an application specific device, or a hybrid device that include any of the above functions.
  • PDA personal data assistant
  • Computing device 1000 may also be implemented as a personal computer including both laptop computer and non-laptop computer configurations.
  • a range includes each individual member.
  • a group having 1-3 cells refers to groups having 1, 2, or 3 cells.
  • a group having 1-5 cells refers to groups having 1, 2, 3, 4, or 5 cells, and so forth.

Abstract

Technologies are generally described for providing an encryption method using real-world objects. In some examples, a method may include capturing, by a first electronic device, an external object, generating an object signal associated with the external object, generating an encryption key based on the object signal, and transmitting data encrypted by the encryption key to a second electronic device.

Description

CROSS REFERENCE TO RELATED APPLICATIONS
This application is a continuation under 35 U.S.C. §120 of, and claims priority to, U.S. National Stage patent application Ser. No. 13/395,119, filed on Jul. 20, 2012, now U.S. Pat. No. 8,938,070, entitled “ENCRYPTION USING REAL-WORLD OBJECTS”, which is a U.S. National Stage filing under 35 U.S.C. §371 of PCT Patent Application No. PCT/US2011/037788, filed on May 24, 2011, entitled “ENCRYPTION USING REAL-WORLD OBJECTS”. The entireties of the foregoing applications listed herein are hereby incorporated by reference.
BACKGROUND
User authentication provides an individual with secure access to confidential or personal information or services. In particular, in an environment where two devices are connected to each other via an ad-hoc or other communication network, authentication of the communication counterpart prevents eavesdropping by a third party.
SUMMARY
In an example, a method may include capturing, by a first electronic device, an external object, generating an object signal associated with the external object, generating an encryption key based on the object signal, and transmitting data encrypted by the encryption key to a second electronic device.
In an example, a method may include detecting, by a first electronic device, an external object, detecting, by a second electronic device, the external object, generating, by the first electronic device, a first encryption key based on the external object, and generating, by the second electronic device, a second encryption key based on the external object.
In an example, a computer-readable storage medium whose contents, in response to execution by a first electronic device, may cause the processor to perform operations including capturing an external object, generating an object signal associated with the external object, generating an encryption key based on the object signal, and transmitting data encrypted by the encryption key to a second electronic device.
In an example, a data encryption device may include a capture unit configured to capture an external object, a key generation unit configured to generate an encryption key based on the external object, and a transmitter configured to transmit data encrypted by the encryption key to a data decryption device. The external object may be made known, identified or indicated to the data encryption device and the data decryption device.
In an example, a data decryption device may include a capture unit configured to capture an external object, a key generation unit configured to generate an encryption key based on the external object, and a receiver configured to receive data encrypted by the encryption key from a data encryption device. Information identifying the external object is made accessible to the data encryption device and the data decryption device.
The foregoing summary is illustrative only and is not intended to be in any way limiting. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features will become apparent by reference to the drawings and the following detailed description.
BRIEF DESCRIPTION OF THE FIGURES
The foregoing and other features of this disclosure will become more fully apparent from the following description and appended claims, taken in conjunction with the accompanying drawings. Understanding that these drawings depict only several embodiments in accordance with the disclosure and are, therefore, not to be considered limiting of its scope, the disclosure will be described with additional specificity and detail through use of the accompanying drawings, in which:
FIG. 1 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on a real-world object;
FIG. 2 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on an external sound output from an external sound source around the multiple electronic devices;
FIG. 3 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on a sound output from one of the multiple electronic devices;
FIG. 4 shows a schematic block diagram of an illustrative example of an electronic device for generating an encryption key based on an external sound;
FIG. 5 shows an example flow diagram of a method for generating an encryption key based on an external sound;
FIG. 6 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on an external image;
FIG. 7 shows a schematic block diagram of an illustrative example of an electronic device for generating an encryption key based on an external image;
FIG. 8 shows an example flow diagram of a method for generating an encryption key based on an external image;
FIG. 9 illustrates a computer program product that can be utilized to provide an encryption scheme using real-world objects; and
FIG. 10 is a block diagram illustrating an example computing device that can be utilized to provide an encryption scheme using real-world objects, all arranged in accordance with at least some embodiments described herein.
DETAILED DESCRIPTION
In the following detailed description, reference is made to the accompanying drawings, which form a part hereof. In the drawings, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, drawings, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented herein. It will be readily understood that the aspects of the present disclosure, as generally described herein, and illustrated in the Figures, can be arranged, substituted, combined, separated, and designed in a wide variety of different configurations, all of which are explicitly contemplated herein.
This disclosure is generally drawn, inter alia, to methods, apparatus, systems, devices, and computer program products related to an encryption technique using real-world objects.
Briefly stated, technologies are generally described for generating an encryption key based on an external object, such as an external sound or an external image. In some examples, the external object may be made known, identified or indicated to a first electronic device and a second electronic device, and the first and second electronic devices may respectively generate a first encryption key and a second encryption key based on the external object. The first and second electronic devices may store the generated first and second encryption keys, respectively, and use them for encrypting or decrypting the data to be transmitted therebetween.
The external object may refer to an object or phenomenon existing in the real world, such as an object in the background or ambient sound heard in the vicinity. These types of information (i.e., the object in the background or ambient sound heard in the vicinity) can be shared or known only to the parties (e.g., two or more parties) present at the location.
Also, by caching the shared encryption key in the sender's and recipient's terminals, it is possible to re-use the encryption key in subsequent remote communication. For example, the encryption key can be re-used later for encryption of files attached to e-mails or to encrypt a communication channel. For another example, by encrypting material distributed at a certain meeting with an encryption key generated at the time of the meeting, only those who actually participated in the meeting (i.e., those who share the key) can read the distributed material and materials that are subsequently exchanged via e-mails. In contrast, a third party who receives such materials, via mail forwarding, etc., is not able to read such materials. Furthermore, an expiration date may be set for the key so that the key can be used only up to the expiration date. The parties are then able to achieve secure communication by generating an encryption key using the external object information that is shared or known only to the parties present at the location, and superposing the encryption key on data to be sent between the parties. In one non-limiting embodiment, the encryption keys generated for a given exchange can also be saved remotely in a network store, or by a web service, and the encryption keys can be retrieved and re-used by a same party, but from a different device. For instance, an encryption key may be established based on an image of a bench in a park for an exchange of a file in the park between two parties with their cell phones, but later one of the parties wishes to review the content of the file from that party's personal computer. By retrieving the encryption key from the network store, or web service, greater versatility and use of the various embodiments can be made with respect to a wide variety of devices. Thus, the encryption key can be re-used by the first electronic device (or second electronic device) to encrypt subsequent communications with the second electronic device via an alternate communication channel. For instance, while the exchange in the park may have been via a short range wireless protocol such as Bluetooth, later communications between the first and second electronic devices can be secured with the encryption key via an alternate channel, such as a data network, wireless fidelity network, telecommunications network, etc.
FIG. 1 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on a real-world object arranged in accordance with at least some embodiments described herein. Electronic devices 100 and 110 may be located in a same environment so that electronic devices 100 and 110 can obtain same information from an external object. By way of example, but not limitation, two users (e.g., people) may be at a same location, such as a park, where a pond, a tree, a bench, and a loudspeaker, etc. exist. Each user can then use his or her respective electronic device 100 or 110 to capture an ambient sound thereabouts or nearby, such as, for example, music being broadcast from the loudspeaker in the park, animal noise, etc., and generate an encryption key, respectively, based on the captured sound. In some embodiments, one of the users can cause his or her electronic device 100 or 110 to output a sound. Both users can then capture the output sound using his or her respective electronic device 100 and 110, and generate an encryption key based on the sound output from the one of electronic devices 100 and 110 (that is, the sound captured by electronic devices 100 and 110). In some embodiments, each user can use his or her respective electronic device 100 or 110 to capture an image of an external object thereabouts or nearby, such as, for example, an image of scenery in the park around both users, or a separate image of one of the pond, tree, bench or loudspeaker located in the park, and generate an encryption key, respectively, based on the captured image. By way of example, but not limitation, electronic devices 100 and 110 may include a portable electronic device, such as, for example, a mobile phone, a smart phone, a personal digital assistant (PDA), a tablet computer, a netbook computer, or a laptop computer.
Although FIG. 1 illustrates that two electronic devices, e.g., electronic devices 100 and 110, located in a same environment generate an encryption key based on an external object in the same environment, one skilled in the art will appreciate that any number of electronic devices located in the same environment can participate in the encryption scheme arranged in accordance with at least some embodiments described herein. Moreover, the environment is not limited to a park as illustrated in FIG. 1, and any location having a real-world object will suffice for encryption of the various embodiments described herein.
FIG. 2 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on an external sound output from an external sound source around or near the multiple electronic devices arranged in accordance with at least some embodiments described herein. As depicted in FIG. 2, an electronic device 200 including a microphone 210 and an electronic device 220 including a microphone 230 may be located in the vicinity of an external sound source 240. Respective microphones 210 and 230 of electronic devices 200 and 220 may then be used to capture or record a sound output by external sound source 240. Electronic devices 200 and 220 may then generate encryption keys, respectively, based on the captured sound.
By way of example, but not limitation, external sound source 240 may be a loudspeaker, a horn, a public address system, a radio, a television set, a tape player, a stereo system, a musical instrument, a siren, a vehicle engine, a vehicle tire, or an animal, etc. By way of example, but not limitation, microphones 210 and 230 may include an internal microphone or an external microphone operatively connected to each of electronic devices 200 and 220.
FIG. 3 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on a sound output from one of the multiple electronic devices arranged in accordance with at least some embodiments described herein. As depicted in FIG. 3, electronic devices 200 and 220 are shown also including speakers 315 and 335, respectively, and may be in the same location or vicinity. In some embodiments, one of the electronic devices, e.g., electronic device 200, may then be used to output a sound through its speaker, e.g., speaker 315. Respective microphones 210 and microphone 230 of electronic devices 200 and 220 may be used to capture or record the sound output by one of the electronic devices, e.g., electronic device 200. Electronic devices 200 and 220 may then generate encryption keys, respectively, based on the captured sound. In some embodiments, the sound output by one of the electronic devices and used to generate the encryption key may be a weak sound, or a high-frequency sound, e.g., which attenuates considerably.
FIG. 4 shows a schematic block diagram of an illustrative example of an electronic device for generating an encryption key based on an external sound arranged in accordance with at least some embodiments described herein. As depicted, an electronic device 400 may include a capture unit such as a sound capture unit 410, a normalization unit 420, a quantization unit 430, a matching unit 440, a key generation unit 450, an encryption unit 460, a transceiver 470, and storage 480. Although illustrated as discrete components, various components may be divided into additional components, combined into fewer components, or eliminated, depending on the desired implementation.
Sound capture unit 410 may be configured to capture an external sound. By way of example, but not limitation, the external sound may include an ambient sound in the vicinity of electronic device 400, a sound output from a speaker (not shown) of electronic device 400, or a sound output from a counterpart or another electronic device (not shown) near or in the vicinity of electronic device 400. The counterpart electronic device may be used to decrypt encrypted data received from electronic device 400 using the encryption key generated using the captured external sound. By way of example, but not limitation, sound capture unit 410 may include a microphone, an acoustic-to-electric transducer, or a sound sensor.
Normalization unit 420 may be configured to normalize or perform normalization of the external sound captured by sound capture unit 410. Such normalization of the external sound may be helpful due to the difference between the sounds captured by electronic device 400 and the counterpart electronic device (not shown), which is caused by the difference in the sensitivity of sound capture unit 410 of electronic device 400 and the sound capture unit (not shown) of the counterpart electronic device (not shown), and/or the type of operating systems of electronic device 400 and the counterpart electronic device (not shown).
In some embodiments, normalization unit 420 may perform normalization of the external sound based on one or more normalization parameters shared between electronic device 400 and the counterpart electronic device (not shown). In some embodiments, normalization unit 420 may detect a maximum magnitude and a minimum magnitude of the external sound captured by sound capture unit 410, and designate the detected maximum magnitude and minimum magnitude of the external sound as the normalization parameters. Electronic device 400 may send/receive to/from the counterpart electronic device (not shown) the normalization parameters, as will be further described below.
Quantization unit 430 may be configured to quantize or perform quantization of the normalized external sound and generate at least one quantization pattern. In some embodiments, quantization unit 430 may perform quantization of the normalized external sound for at least a part of the available quantization bit depths up to a maximum available quantization bit depth. In some embodiments, quantization unit 430 may perform quantization of the normalized external sound for the available quantization bit depths up to the maximum available quantization bit depth. In some embodiments, the maximum available quantization bit depth may be determined in advance and shared between electronic device 400 and the counterpart electronic device (not shown). Table 1 below illustrates an example list of quantization patterns in cases where quantization unit 430 quantizes the normalized external sound for all of the available quantization bit depths (where the minimum available quantization bit depth is 2) up to the maximum available quantization bit depth of 16.
TABLE 1
Quantization bit depth Quantization pattern
2 0101011110010
3 0001010101011
4 1100101010011
. . . . . .
16 1101001010101
Matching unit 440 may be configured to identify, among the generated at least one quantization pattern, at least one matching quantization pattern, which matches at least one counterpart quantization pattern generated by the counterpart electronic device (not shown). By way of example, but not limitation, matching unit 440 may determine whether each of the at least one counterpart quantization pattern generated by the quantization unit of the counterpart electronic device (not shown) matches the at least one quantization pattern generated by quantization unit 430, thereby identifying at least one matching quantization pattern. If one of the at least one counterpart quantization pattern matches one of the at least one quantization pattern generated by quantization unit 430, electronic device 400 may store or record the one of the at least one quantization pattern as a matching quantization pattern, for example, in storage 480 (described below).
Key generation unit 450 may be configured to generate an encryption key by selecting one of the identified at least one matching quantization pattern as the encryption key. In some embodiments, key generation unit 450 may select the encryption key based on a quantization bit depth. By way of example, but not limitation, key generation unit 450 may select one matching quantization pattern whose quantization bit is largest among the at least one matching quantization pattern.
Encryption unit 460 may be configured to encrypt data to be sent or transmitted by electronic device 400, for example, to the counterpart electronic device (not shown), with the encryption key generated by key generation unit 450.
Transceiver 470 may be configured to transmit and receive data that is being sent and received, respectively, by electronic device 400. The data may include, without limitation, the encrypted data, normalization parameters, or quantization patterns. For example, transceiver 470 may transmit the encrypted data that is being sent or transmitted by electronic device 400, for example, to the counterpart electronic device (not shown), and receive data that is being received by electronic device 400, for example, from the counterpart electronic device (not shown). In another example, transceiver 470 may transmit the normalization parameters designated by normalization unit 420, for example, to the counterpart electronic device (not shown), or receive normalization parameters from another electronic device (e.g., normalization parameters designated by a normalization unit (not shown) of the counterpart electronic device (not shown)). In a further example, transceiver 470 may transmit the quantization pattern generated by quantization unit 430, for example, to the counterpart electronic device (not shown), or receive a quantization pattern from another electronic device (e.g., quantization pattern generated by the quantization unit (not shown) of the counterpart electronic device (not shown)).
Storage 480 may be configured to store the encryption key generated by key generation unit 450. Storage 480 may provide the stored encryption key to encryption unit 460, so that encryption unit 460 can encrypt data to be sent to the counterpart electronic device (not shown) with the encryption key stored in storage 480. In some embodiments, storage 480 may store the generated encryption key in association with an identifier of the counterpart electronic device (not shown). In some embodiments, storage 480 may store the generated encryption key in association with its expiration date information. Table 2 below illustrates an example list of the generated encryption keys stored in storage 480 together with the identifier of the corresponding counterpart device and the expiration date information associated with the generated encryption keys.
TABLE 2
Encryption key Identifier of counterpart Expiration date
01010101001 FF:FF:FF:CC:CC:DD 2011/05/01 10:23:45
11010110101 AA:BB:CC:DD:FF 2011/05/02 00:09:52
10010101001 AA:AA:BB:DD:FF:FF 2011/06/30 21:32:43
10100101010 BB:CC:CC:DD:FF 2011/07/11 09:18:38
FIG. 5 shows an example flow diagram of a method for generating an encryption key based on an external sound arranged in accordance with at least some embodiments described herein. The method in FIG. 5 could be implemented using, for example, two electronic devices, such as the electronic devices discussed above with reference to FIG. 4. In FIG. 5, the blocks in the left side may be implemented by a first electronic device, while the blocks in the right side may be implemented by a second electronic device. An example method may include one or more operations, actions, or functions as illustrated by one or more of blocks S500, S505, S510, S515, S520, S525, S530, S535, S540, S545, S550, S555, S560, S565, S570 and/or S575. Although illustrated as discrete blocks, various blocks may be divided into additional blocks, combined into fewer blocks, or eliminated, depending on the desired implementation. Further, some blocks illustrated as being implemented by the first electronic device may be implemented by the second electronic device, and some blocks illustrated as being implemented by the second electronic device may be implemented by the first electronic device. Processing may begin at block S500 and/or block S505.
At block S500, the first electronic device may detect an external object, such as, for example, an external sound selected from a group consisting of an ambient sound in the vicinity of the first and second electronic devices and a sound output from one of the first and second electronic devices. At block S505, the second electronic device may also detect the external object, which is substantially the same external object detected by the first electronic device at block S500. The detecting at block S500 and the detecting at block S505 may be performed simultaneously or at slightly different times. Processing may continue from block S500 to block S510 in the first electronic device, and from block S505 to block S515 in the second electronic device.
At block S510, the first electronic device may generate a first object signal associated with the external object. Similarly, at block S515, the second electronic device may generate a second object signal associated with the external object. Processing may continue from block S510 to block S520 in the first electronic device, and from block S515 to block S525 in the second electronic device.
At block S520, the first electronic device may send, to the second electronic device, information to be commonly used by the first and second electronic devices for generating encryption keys. In some embodiments, the information to be commonly used may include at least one normalization parameter and a maximum available quantization bit depth. By way of example, but not limitation, the at least one normalization parameter may include a maximum magnitude and a minimum magnitude of the object signal. In such a case, the first electronic device may detect the maximum and minimum magnitudes of the first object signal, and designate the maximum and minimum magnitudes of the first object signal as the normalization parameters. Then, at block S525, the second electronic device may receive from the first electronic device the information to be commonly used by the first and second electronic devices for generating encryption keys, such as, for example, the at least one normalization parameter and the maximum available quantization bit depth. Then, at block S530, the second electronic device may perform normalization of the second object signal based on the received at least one normalization parameter. Although FIG. 5 illustrates that the first electronic device designates the at least one normalization parameter and the second electronic device normalizes the second object signal based on the at least one normalization parameter designated by the first electronic device, it is noted that it is also possible that the second electronic device designates the at least one normalization parameter and the first electronic device normalizes the first object signal based on the at least one normalization parameter designated by the second electronic device, or both of the first electronic device and the second electronic device respectively normalize the first object signal and the second object signal based on at least one normalization parameter previously shared between the first and second electronic devices. Processing may continue from block S520 to block S540 in the first electronic device, and from block S530 to block S535 in the second electronic device.
At block S535, the second electronic device may quantize or perform quantization of the normalized second object signal, thereby generating at least one second quantization pattern. In some embodiments, the second electronic device may quantize the normalized second object signal for all of available quantization bit depths up to the maximum available quantization bit depth, to generate at least one second quantization pattern corresponding to the respective available quantization bit depths. In such a case, the second electronic device may store or record the generated at least one second quantization pattern in a storage. Similarly, at block S540, the first electronic device may perform quantization of the first object signal, thereby generating at least one first quantization pattern. In some embodiments, the first electronic device may quantize the first object signal for at least a part of the available quantization bit depths up to the maximum available quantization bit depth gradually one by one. In some embodiments, the initially generated one of the at least one first quantization pattern may be quantized for a quantization bit depth corresponding to the intermediate value of the maximum available quantization bit depth and the minimum available quantization bit depth. In some embodiments, the initially generated one of the at least one first quantization pattern may have a quantization bit depth corresponding to the maximum or minimum available quantization bit depth. For example, the minimum available quantization bit depth may be two. Processing may continue from block S540 to block S545 in the first electronic device, and from block S535 to block S550 in the second electronic device.
At block S545, the first electronic device may send to the second electronic device the generated at least one first quantization pattern. In some embodiments, the first electronic device may send to the second electronic device all of the generated at least one first quantization pattern at once. In some embodiments, the first electronic device may send to the second electronic device the at least one first quantization pattern gradually one by one. Then, at block S550, the second electronic device may receive from the first electronic device the at least one first quantization pattern. Processing may continue from block S550 to block S555 in the second electronic device.
At block S555, the second electronic device may determine whether each of the received at least one first quantization pattern matches one of the at least one second quantization pattern, thereby identifying at least one matching quantization pattern. If one of the received at least one first quantization pattern matches one of the at least one second quantization pattern, the second electronic device may store or record the quantization pattern as a matching quantization pattern. Processing may continue from block S555 to block S560 in the second electronic device.
At block S560, the second electronic device may select one of the at least one matching quantization pattern as the second encryption key. In some embodiments, the second electronic device may select the second encryption key based on a quantization bit depth. In some embodiments, the second electronic device may select one matching quantization pattern whose quantization bit is largest among the at least one matching quantization pattern.
In some embodiments, the quantization of the first object signal (block S540) through the selection of the one of the at least one matching quantization pattern (block S560) may be performed via an iterative process. In an example where the maximum available quantization bit depth and the minimum available quantization bit depth are 16 and 2, respectively, the second electronic device may generate in advance the second quantization patterns for bit depths of 2 bits (i.e., the minimum available quantization bit depth) to 16 bits (i.e., the maximum available quantization bit depth). The first electronic device may quantize the first object signal for an initial quantization bit depth, thereby generating an initial first quantization pattern. Then, the first electronic device may send the initial first quantization pattern to the second electronic device. The second electronic device may then check for a match between the received initial first quantization pattern and the corresponding second quantization pattern, which is quantized by the second electronic device for the same quantization bit depth as the initial quantization bit depth. If the received initial first quantization pattern matches the corresponding second quantization pattern, the second electronic device may send to the first electronic device a request for increase in the quantization bit depth. On the other hand, if the received initial first quantization pattern does not match the corresponding second quantization pattern, the second electronic device may send to the first electronic device a request for decrease in the quantization bit depth. Then, the first electronic device may send to the second electronic device another first quantization pattern quantized at the increased or decreased quantization bit depth. Such a process may be repeated iteratively until finding out the one matching quantization pattern whose quantization bit is largest among the at least one matching quantization pattern.
In some embodiments, the maximum available quantization bit depth or the minimum available quantization bit depth may be used as the initial quantization bit depth. In some embodiments, alternatively, the intermediate value of the maximum available quantization bit depth and the minimum available quantization bit depth may be used as the initial quantization bit depth. Further, in some embodiments, the request for increase or decrease in the quantization bit depth may be a request for one-bit increase or one-bit decrease, or a request for multi-bit increase or multi-bit decrease. Processing may continue from block S560 to block S565 in the second electronic device.
Referring to FIG. 5 again, at block S565, the second electronic device may send to the first electronic device the selected one of the at least one matching quantization pattern. Then, at block S570, the first electronic device may receive the one of the at least one matching quantization pattern. At block S575, the first electronic device may select the received one of the at least one matching quantization pattern as the first encryption key.
It is noted that, for this and other processes and methods disclosed herein, the functions performed in the processes and methods may be implemented in differing order. Furthermore, the outlined steps and operations are only provided as examples, and some of the steps and operations may be optional, combined into fewer steps and operations, or expanded into additional steps and operations without detracting from the essence of the disclosed embodiments.
Further, although the embodiments disclosed herein illustrate that two electronic devices share an environment to generate encryption keys for having a secure communication with each other, it is noted that any number of electronic devices located in a same environment can participate in the encryption scheme in accordance with at least some embodiments described herein.
FIG. 6 schematically shows an illustrative example of an environment where multiple electronic devices may generate an encryption key based on an external image arranged in accordance with at least some embodiments described herein. In FIG. 6, electronic device 200 including a camera 610 and electronic device 220 including a camera 630 are located near or next to each other in the same environment. In some embodiments, electronic device 200 may capture, using camera 610, an external image near or thereabout, and generate an encryption key based on the captured image. Similarly, electronic device 220 may capture, using camera 630, an external image near or thereabout, which is identical or similar to the external image captured by electronic device 200, and generate an encryption key based on the captured image. The encryption key can then be used to encrypt or decrypt data to provide secure communication.
FIG. 7 shows a schematic block diagram of an illustrative example of an electronic device for generating an encryption key based on an external image arranged in accordance with at least some embodiments described herein. As depicted, an electronic device 700 may include a capture unit such as an image capture unit 710, a characteristic extraction unit 720, a key generation unit 730, an encryption unit 740, a transceiver 750 and storage 760. Although illustrated as discrete components, various components may be divided into additional components, combined into fewer components, or eliminated, depending on the desired implementation.
Image capture unit 710 may be configured to capture an external image. By way of example, but not limitation, the external image is an image surrounding electronic device 700.
Although not illustrated in FIG. 7, electronic device 700 may further include an object extraction unit configured to extract a specific object image from the external image captured by image capture unit 710. By way of example, but not limitation, in cases where the external image captured by image capture unit 710 is an image of a park, where a pond, a tree, a bench, and a loudspeaker, etc. exist, the object extraction unit may extract an object image of a pond or a bench. In some embodiments, the object extraction unit may extract the object image based on an input of user of electronic device 700. By way of example, but not limitation, when electronic device 700 receives a user input through a user interface (not shown) that the user chooses to use an object image of a bench for generating an encryption key, the object extraction unit may extract an object image of the bench.
Characteristic extraction unit 720 may be configured to extract a characteristic vector value corresponding to the external image captured by image capture unit 710 or the object image extracted from the external image by the object extraction unit (not shown). Characteristic extraction unit 720 may employ any existing algorithm for extracting image characteristics, such as, for example, speeded up robust features (SURF) algorithm.
Key generation unit 730 may be configured to generate an encryption key based on the characteristic vector value extracted by characteristic extraction unit 720.
In some embodiments, key generation unit 730 may generate the encryption key by searching a codebook. By way of example, but not limitation, the codebook may be included in key generation unit 730 or another component, such as storage 760 (described below).
By way of example, but not limitation, the codebook may store multiple vector-key pairs each including a sample characteristic vector value and a key associated with the sample characteristic vector value. By way of example, but not limitation, each of the sample characteristic vector values in the codebook may be associated with sample images, including, for example, an image of a pond or a bench, or a combination thereof. By way of example, but not limitation, the codebook may be in a format shown in Table 3 below.
TABLE 3
Sample characteristic vector value Key
{1, 2, 3, 7, 1, 5, . . . , x} aiaojrnmfi1
{4, 6, x, 8, 1, 3, . . . , s} adfjo0234fa@k
{3, 8, 0, 7, 1, y, . . . , z} padivgahdjf
{9, 2, w, t, 3, 4, . . . , 0} kgfvjl@voihg
In some embodiments, key generation unit 730 may generate the encryption key based on the similarities between the extracted characteristic vector value and multiple sample characteristic vector values of sample images included in the codebook, e.g., similarities between the extracted characteristic vector value and each of the multiple sample characteristic vector values. In some embodiments, the similarities between the extracted characteristic vector value and the sample characteristic vector values may be calculated based on angular differences therebetween.
In some embodiments, key generation unit 730 may generate the encryption key based on a key generation function. The key generation function may include any existing hash function, such as, for example, MD5 hash function, or SHA1 hash function.
Encryption unit 740 may be configured to encrypt data to be sent or transmitted by electronic device 700, for example, to the counterpart electronic device (not shown) with the encryption key generated by key generation unit 730.
Transceiver 750 may be configured to transmit data to the counterpart electronic device (not shown), and receive data from the counterpart electronic device (not shown). In some embodiments, transceiver 750 may be connected to encryption unit 740, and transmit to the data encrypted by encryption unit 740 that is being sent or transmitted by electronic device 700, for example, to the counterpart electronic device (not shown), and receive data that is being received by electronic device 700, for example, from the counterpart electronic device (not shown).
Storage 760 may be configured to store the encryption key generated by key generation unit 730. Storage 760 may provide the stored encryption key to encryption unit 740, so that encryption unit 740 can encrypt data to be sent to the counterpart electronic device (not shown) with the encryption key stored in storage 760. In some embodiments, storage 760 may store the encryption key with further information, such as weather or time, when image capture unit 710 captures an external image.
FIG. 8 shows an example flow diagram of a method for generating an encryption key based on an external image arranged in accordance with at least some embodiments described herein. The method in FIG. 8 could be implemented using, for example, an electronic device and a counterpart electronic device, each of which is discussed above with reference to FIG. 7. An example method may include one or more operations, actions, or functions as illustrated by one or more of blocks S800, S810, S820, and/or S830. Although illustrated as discrete blocks, various blocks may be divided into additional blocks, combined into fewer blocks, or eliminated, depending on the desired implementation. Processing may begin at block S800.
At block S800, the electronic device may detect an external object, such as, for example, an external image. By way of example, but not limitation, the external image is an image surrounding the electronic device or a specific object image extracted from the image surrounding the electronic device. Then, at block S810, the electronic device may generate an object signal associated with the external object. Processing may continue from block S810 to block S820.
At block S820, the electronic device may extract a characteristic vector value corresponding to the object signal. The characteristic vector value may correspond to at least a part of the external object. By way of example, but not limitation, any existing algorithm for extracting image characteristics, such as speeded up robust features (SURF) algorithm, may be employed for extracting the characteristic vector value. Processing may continue from block S820 to block S830.
At block S830, the electronic device may generate an encryption key based on the extracted characteristic vector value. In some embodiments, the electronic device may generate the encryption key by searching a codebook. By way of example, but not limitation, the codebook may store multiple vector-key pairs each including a sample characteristic vector value and a key associated with the sample characteristic vector value. By way of example, but not limitation, each of the sample characteristic vector values in the codebook may be associated with a sample image, including, for example, an image of a pond or a bench, or a combination thereof. In some embodiments, the electronic device may generate the encryption key based on the similarity between the extracted characteristic vector value and each of multiple sample characteristic vector values of sample images included in the codebook. In some embodiments, the similarity between the extracted characteristic vector value and each of the sample characteristic vector values may be calculated based on angular difference therebetween. In some embodiments, the electronic device may generate the encryption key based on a key generation function, which is shared between the electronic device and the counterpart electronic device. The key generation function may include any existing hash function, such as, for example, MD5 hash function, or SHA1 hash function.
FIG. 9 illustrates a computer program product 900 that can be utilized to provide an encryption scheme using real-world objects in accordance with at least some embodiments described herein. Program product 900 may include a signal bearing medium 902. Signal bearing medium 902 may include one or more instructions 904 that, when executed by, for example, a processor, may provide the functionality described above with respect to FIGS. 1-8. By way of example, instructions 904 may include: one or more instructions for generating an object signal associated with an external object; one or more instructions for generating an encryption key based on the object signal; or one or more instructions for transmitting data encrypted by the encryption key to a second electronic device. Thus, for example, referring to the system of FIG. 2, electronic devices 200 and 220 may undertake one or more of the blocks shown in FIG. 5 in response to instructions 904.
In some implementations, signal bearing medium 902 may encompass a computer-readable medium 906, such as, but not limited to, a hard disk drive, a Compact Disc (CD), a Digital Video Disk (DVD), a digital tape, memory, etc. In some implementations, signal bearing medium 902 may encompass a recordable medium 908, such as, but not limited to, memory, read/write (R/W) CDs, R/W DVDs, etc. In some implementations, signal bearing medium 902 may encompass a communications medium 910, such as, but not limited to, a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communications link, a wireless communication link, etc.). Thus, for example, program product 900 may be conveyed to one or more modules of mobile device 110 a by an RF signal bearing medium 902, where the signal bearing medium 902 is conveyed by a wireless communications medium 910 (e.g., a wireless communications medium conforming with the IEEE 802.11 standard).
FIG. 10 is a block diagram illustrating an example computing device 1000 that can be utilized to provide an encryption scheme using real-world objects in accordance with at least some embodiments described herein. In a very basic configuration 1002, computing device 1000 typically includes one or more processors 1004 and a system memory 1006. A memory bus 1008 may be used for communicating between processor 1004 and system memory 1006.
Depending on the desired configuration, processor 1004 may be of any type including but not limited to a microprocessor (μP), a microcontroller (μC), a digital signal processor (DSP), or any combination thereof. Processor 1004 may include one more levels of caching, such as a level one cache 1010 and a level two cache 1012, a processor core 1014, and registers 1016. An example processor core 1014 may include an arithmetic logic unit (ALU), a floating point unit (FPU), a digital signal processing core (DSP Core), or any combination thereof. An example memory controller 1018 may also be used with processor 1004, or in some implementations memory controller 1018 may be an internal part of processor 1004.
Depending on the desired configuration, system memory 1006 may be of any type including but not limited to volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.) or any combination thereof. System memory 1006 may include an operating system 1020, one or more applications 1022, and program data 1024.
Application 1022 may include an encryption algorithm 1026 that is arranged to perform the functions as described herein including those described previously with respect to FIGS. 1-7. Program data 1024 may include any data that may be useful for providing the encryption scheme using real-world objects as is described herein. In some embodiments, application 1022 may be arranged to operate with program data 1024 on operating system 1020 such that the encryption scheme using real-world objects may be provided. This described basic configuration 1002 is illustrated in FIG. 10 by those components within the inner dashed line.
Computing device 1000 may have additional features or functionality, and additional interfaces to facilitate communications between basic configuration 1002 and any required devices and interfaces. For example, a bus/interface controller 1030 may be used to facilitate communications between basic configuration 1002 and one or more data storage devices 1032 via a storage interface bus 1034. Data storage devices 1032 may be removable storage devices 1036, non-removable storage devices 1038, or a combination thereof. Examples of removable storage and non-removable storage devices include magnetic disk devices such as flexible disk drives and hard-disk drives (HDD), optical disk drives such as compact disk (CD) drives or digital versatile disk (DVD) drives, solid state drives (SSD), and tape drives to name a few. Example computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
System memory 1006, removable storage devices 1036 and non-removable storage devices 1038 are examples of computer storage media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which may be used to store the desired information and which may be accessed by computing device 1000. Any such computer storage media may be part of computing device 1000.
Computing device 1000 may also include an interface bus 1040 for facilitating communication from various interface devices (e.g., output devices 1042, peripheral interfaces 1044, and communication devices 1046) to basic configuration 1002 via bus/interface controller 1030. Example output devices 1042 include a graphics processing unit 1048 and an audio processing unit 1050, which may be configured to communicate to various external devices such as a display or speakers via one or more A/V ports 1052. Example peripheral interfaces 1044 include a serial interface controller 1054 or a parallel interface controller 1056, which may be configured to communicate with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device, etc.) or other peripheral devices (e.g., printer, scanner, etc.) via one or more I/O ports 1058. An example communication device 1046 includes a network controller 1060, which may be arranged to facilitate communications with one or more other computing devices 1062 over a network communication link via one or more communication ports 1064.
The network communication link may be one example of a communication media. Communication media may typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and may include any information delivery media. A “modulated data signal” may be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), microwave, infrared (IR) and other wireless media. The term computer readable media as used herein may include both storage media and communication media.
Computing device 1000 may be implemented as a portion of a small-form factor portable (or mobile) electronic device such as a cell phone, a personal data assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset device, an application specific device, or a hybrid device that include any of the above functions. Computing device 1000 may also be implemented as a personal computer including both laptop computer and non-laptop computer configurations.
The present disclosure is not to be limited in terms of the particular embodiments described in this application, which are intended as illustrations of various aspects. Many modifications and variations can be made without departing from its spirit and scope, as will be apparent to those skilled in the art. Functionally equivalent methods and apparatuses within the scope of the disclosure, in addition to those enumerated herein, will be apparent to those skilled in the art from the foregoing descriptions. Such modifications and variations are intended to fall within the scope of the appended claims. The present disclosure is to be limited only by the terms of the appended claims, along with the full scope of equivalents to which such claims are entitled. It is to be understood that this disclosure is not limited to particular methods, reagents, compounds, compositions or biological systems, which can, of course, vary. It is also to be understood that the terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting.
With respect to the use of substantially any plural and/or singular terms herein, those having skill in the art can translate from the plural to the singular and/or from the singular to the plural as is appropriate to the context and/or application. The various singular/plural permutations may be expressly set forth herein for sake of clarity.
It will be understood by those within the art that, in general, terms used herein, and especially in the appended claims (e.g., bodies of the appended claims) are generally intended as “open” terms (e.g., the term “including” should be interpreted as “including but not limited to,” the term “having” should be interpreted as “having at least,” the term “includes” should be interpreted as “includes but is not limited to,” etc.). It will be further understood by those within the art that if a specific number of an introduced claim recitation is intended, such an intent will be explicitly recited in the claim, and in the absence of such recitation no such intent is present. For example, as an aid to understanding, the following appended claims may contain usage of the introductory phrases “at least one” and “one or more” to introduce claim recitations. However, the use of such phrases should not be construed to imply that the introduction of a claim recitation by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim recitation to embodiments containing only one such recitation, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an” (e.g., “a” and/or “an” should be interpreted to mean “at least one” or “one or more”); the same holds true for the use of definite articles used to introduce claim recitations. In addition, even if a specific number of an introduced claim recitation is explicitly recited, those skilled in the art will recognize that such recitation should be interpreted to mean at least the recited number (e.g., the bare recitation of “two recitations,” without other modifiers, means at least two recitations, or two or more recitations). Furthermore, in those instances where a convention analogous to “at least one of A, B, and C, etc.” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., “a system having at least one of A, B, and C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). In those instances where a convention analogous to “at least one of A, B, or C, etc.” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., “a system having at least one of A, B, or C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase “A or B” will be understood to include the possibilities of “A” or “B” or “A and B.”
In addition, where features or aspects of the disclosure are described in terms of Markush groups, those skilled in the art will recognize that the disclosure is also thereby described in terms of any individual member or subgroup of members of the Markush group.
As will be understood by one skilled in the art, for any and all purposes, such as in terms of providing a written description, all ranges disclosed herein also encompass any and all possible subranges and combinations of subranges thereof. Any listed range can be easily recognized as sufficiently describing and enabling the same range being broken down into at least equal halves, thirds, quarters, fifths, tenths, etc. As a non-limiting example, each range discussed herein can be readily broken down into a lower third, middle third and upper third, etc. As will also be understood by one skilled in the art all language such as “up to,” “at least,” and the like include the number recited and refer to ranges which can be subsequently broken down into subranges as discussed above. Finally, as will be understood by one skilled in the art, a range includes each individual member. Thus, for example, a group having 1-3 cells refers to groups having 1, 2, or 3 cells. Similarly, a group having 1-5 cells refers to groups having 1, 2, 3, 4, or 5 cells, and so forth.
From the foregoing, it will be appreciated that various embodiments of the present disclosure have been described herein for purposes of illustration, and that various modifications may be made without departing from the scope and spirit of the present disclosure. Accordingly, the various embodiments disclosed herein are not intended to be limiting, with the true scope and spirit being indicated by the following claims.

Claims (17)

What is claimed is:
1. A method, comprising:
generating, by a system comprising a hardware processor, a signal based on information associated with an image;
determining by the system, a characteristic vector value corresponding to the signal;
transmitting, by the system, a normalization parameter for the signal associated with the image to a device; and
generating, by the system, an encryption key based on quantization information comprising at least one quantization pattern that is associated with the normalization parameter and is received by the device, the generating comprising comparing the characteristic vector value to a set of sample characteristic vector values associated with a set of vector-key pairs for a set of sample images.
2. The method of claim 1, further comprising:
quantizing by the system, the signal to generate a quantization pattern associated with the information.
3. The method of claim 2, wherein the generating the encryption key comprises generating the encryption key based on comparing the quantization pattern to another quantization pattern associated with the image.
4. The method of claim 1, further comprising:
searching, by the system, a data storage that stores of vector-key pairs, the set of vector-key pairs comprising the set of sample characteristic vector values and a set of keys associated with the set of sample characteristic vector values.
5. The method of claim 1, further comprising:
capturing, by the system, the information associated with the image.
6. The method of claim 1, further comprising:
transmitting, by the system, data encrypted by the encryption key to the device.
7. The method of claim 6, further comprising:
storing, by the system, the encryption key in association with an identifier of the device.
8. A system, comprising:
a memory that stores computer-executable components; and
a hardware processor, communicatively coupled to the memory, that executes or facilitates execution of the computer-executable components, the computer-executable components comprising:
a capture component configured to capture information associated with an image;
a characteristic extraction component configured to determine a characteristic vector value associated with the information;
a transceiver component configured to transmit a normalization parameter for the information associated with the image to a device; and
a key generation component configured to generate an encryption key based on a quantization pattern that is associated with the normalization parameter and is received by the device and a comparison between the characteristic vector value and a set of sample characteristic vector values associated with a set of vector-key pairs for a set of images associated with a data storage.
9. The system of claim 8, wherein the computer-executable components further comprise:
a quantization component configured to quantize the information to generate another quantization pattern.
10. The system of claim 9, wherein the key generation component is further configured to generate the encryption key based on another comparison between the quantization pattern and the other quantization pattern.
11. The system of claim 8, wherein the key generation component is further configured to search the data storage or another data storage that stores the set of vector-key pairs, and wherein a vector-key pair from the set of vector-key pairs comprise a sample characteristic vector value and a key associated with the sample characteristic vector value.
12. The system of claim 8, wherein the transceiver component is configured to transmit data encrypted by the encryption key to the device, wherein the device provides another encryption key based on other information associated with the image.
13. The system of claim 12, wherein the computer-executable components further comprise:
a storage component configured to store the encryption key in association with an identifier of the device.
14. A computer-readable storage device comprising computer-executable instructions that, in response to execution, cause a device comprising a processor to perform operations, comprising:
generating information associated with an image;
extracting a characteristic vector value corresponding to the information;
transmitting a normalization parameter for the information associated with the image to a computing device; and
generating an encryption key based on a quantization pattern that is associated with the normalization parameter and is received by the computer device, and similarities between the characteristic vector value and a set of sample characteristic vector values associated with a set of vector-key pairs for a set of other images.
15. The computer-readable storage device of claim 14, wherein the operations further comprise:
searching a data structure that stores the set of vector-key pairs, a vector-key from the set of vector-key pairs comprising a sample characteristic vector value and a key associated with the sample characteristic vector value.
16. The computer-readable storage device of claim 14, wherein the generating the encryption key comprises generating the encryption key based on the quantization pattern.
17. The computer-readable storage device of claim 16, wherein the generating the encryption key comprises comparing the quantization pattern and another quantization pattern associated with the image.
US14/517,094 2011-05-24 2014-10-17 Encryption using real-world objects Expired - Fee Related US9270452B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/517,094 US9270452B2 (en) 2011-05-24 2014-10-17 Encryption using real-world objects

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
PCT/US2011/037788 WO2012161697A1 (en) 2011-05-24 2011-05-24 Encryption using real-world objects
US201213395119A 2012-07-20 2012-07-20
US14/517,094 US9270452B2 (en) 2011-05-24 2014-10-17 Encryption using real-world objects

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/US2011/037788 Continuation WO2012161697A1 (en) 2011-05-24 2011-05-24 Encryption using real-world objects
US13/395,119 Continuation US8938070B2 (en) 2011-05-24 2011-05-24 Encryption using real-world objects

Publications (2)

Publication Number Publication Date
US20150063566A1 US20150063566A1 (en) 2015-03-05
US9270452B2 true US9270452B2 (en) 2016-02-23

Family

ID=47217543

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/395,119 Expired - Fee Related US8938070B2 (en) 2011-05-24 2011-05-24 Encryption using real-world objects
US14/517,094 Expired - Fee Related US9270452B2 (en) 2011-05-24 2014-10-17 Encryption using real-world objects

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/395,119 Expired - Fee Related US8938070B2 (en) 2011-05-24 2011-05-24 Encryption using real-world objects

Country Status (4)

Country Link
US (2) US8938070B2 (en)
JP (1) JP2014512154A (en)
KR (1) KR101497386B1 (en)
WO (1) WO2012161697A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11030903B2 (en) 2018-05-30 2021-06-08 Ford Global Technologies, Llc Vehicle-to-infrastructure communication

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9224000B1 (en) * 2011-06-14 2015-12-29 Ionic Security, Inc. Systems and methods for providing information security using context-based keys
EP3149883B1 (en) 2014-05-26 2019-04-24 Nokia Technologies OY Management of cryptographic keys
CN105471575B (en) 2014-09-05 2020-11-03 创新先进技术有限公司 Information encryption and decryption method and device
US9608810B1 (en) 2015-02-05 2017-03-28 Ionic Security Inc. Systems and methods for encryption and provision of information security using platform services
DE102015210537A1 (en) * 2015-06-09 2016-12-15 Robert Bosch Gmbh Method and device for generating a secret key
US10503730B1 (en) 2015-12-28 2019-12-10 Ionic Security Inc. Systems and methods for cryptographically-secure queries using filters generated by multiple parties
US10740474B1 (en) 2015-12-28 2020-08-11 Ionic Security Inc. Systems and methods for generation of secure indexes for cryptographically-secure queries
US10411888B2 (en) 2016-07-08 2019-09-10 Microsoft Technology Licensing, Llc Cryptography method
US10433166B2 (en) 2016-07-08 2019-10-01 Microsoft Technology Licensing, Llc Cryptography using RF power measurement
US10469260B2 (en) * 2016-07-08 2019-11-05 Microsoft Technology Licensing, Llc Multiple cryptographic key generation for two-way communication
US10560264B2 (en) 2016-11-08 2020-02-11 Microsoft Technology Licensing, Llc Cryptographic key creation using optical parameters
TWI757001B (en) * 2020-12-21 2022-03-01 緯創資通股份有限公司 Data protection method
WO2024065605A1 (en) * 2022-09-30 2024-04-04 Orange Method for sharing data

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4809067A (en) 1986-05-26 1989-02-28 Mitsubishi Denki Kabushiki Kaisha Method and apparatus for encoding transmitting and receiving image by pulse code modulation
JP2001036638A (en) 1999-07-15 2001-02-09 Sharp Corp Devices provided with communication function, their grouping method and recording medium used for it
US20040044824A1 (en) 2002-08-30 2004-03-04 Naoya Haneda Information processing method, information processing apparatus, and program therefor
US20040086115A1 (en) 2002-11-06 2004-05-06 Chi-Sung Laih Image public key generation method
US20040141612A1 (en) 2002-08-28 2004-07-22 Kyoya Tsutsui Code-string encryption method and apparatus, decryption method and apparatus, and recording medium
US20050123138A1 (en) * 2002-02-28 2005-06-09 Katsuaki Abe Communication apparatus and communication system
US20070174633A1 (en) * 2004-12-07 2007-07-26 Draper Stark C Biometric Based User Authentication and Data Encryption
US7308099B1 (en) 1999-02-24 2007-12-11 Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V. Device and method for producing an encoded audio and/or video data stream
US20080184375A1 (en) 2006-05-09 2008-07-31 Masao Nonaka Confidential data protection apparatus, autonomous mobile robot, confidential data protection method, computer program, and integrated circuit
JP2008199263A (en) 2007-02-13 2008-08-28 Doshisha Secret key generation method in radio communication and radio communication device
US20090046860A1 (en) 2007-08-17 2009-02-19 Infineon Technologies Ag Integrated data transceiver and sensor for the generation of a symmetrical cryptographic key
US20090117883A1 (en) 2006-07-20 2009-05-07 Dan Coffing Transaction system for business and social networking
JP2009194602A (en) 2008-02-14 2009-08-27 Kddi R & D Laboratories Inc Encryption protocol generating device, encryption protocol generating method, and program
US20090240947A1 (en) 2008-01-07 2009-09-24 Arvind Goyal System and method for securely accessing mobile data
US20100017618A1 (en) 2006-12-28 2010-01-21 Telecom Italia S.P.A. Method and system for biometric authentication and encryption
WO2010087797A1 (en) 2009-01-30 2010-08-05 Hewlett-Packard Development Company, L.P. Methods and systems for establishing collaborative communications between devices using ambient audio
US20110135144A1 (en) 2009-07-01 2011-06-09 Hand Held Products, Inc. Method and system for collecting voice and image data on a remote device and coverting the combined data
GB2447674B (en) 2007-03-21 2011-08-03 Lancaster University Generation of a cryptographic key from device motion
US7996683B2 (en) 2001-10-01 2011-08-09 Genkey As System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
US20130114811A1 (en) 2011-11-08 2013-05-09 Petros T. Boufounos Method for Privacy Preserving Hashing of Signals with Binary Embeddings

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR910000707B1 (en) 1986-05-26 1991-01-31 미쓰비시덴기 가부시기가이샤 Method and apparatus for encoding transmitting
US4809067A (en) 1986-05-26 1989-02-28 Mitsubishi Denki Kabushiki Kaisha Method and apparatus for encoding transmitting and receiving image by pulse code modulation
US7308099B1 (en) 1999-02-24 2007-12-11 Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V. Device and method for producing an encoded audio and/or video data stream
JP2001036638A (en) 1999-07-15 2001-02-09 Sharp Corp Devices provided with communication function, their grouping method and recording medium used for it
US6807226B1 (en) 1999-07-15 2004-10-19 Sharp Kabushiki Kaisha Apparatus having communication function, method for grouping such apparatuses, and recording medium for use with such method
US7996683B2 (en) 2001-10-01 2011-08-09 Genkey As System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
US20050123138A1 (en) * 2002-02-28 2005-06-09 Katsuaki Abe Communication apparatus and communication system
US20040141612A1 (en) 2002-08-28 2004-07-22 Kyoya Tsutsui Code-string encryption method and apparatus, decryption method and apparatus, and recording medium
US20040044824A1 (en) 2002-08-30 2004-03-04 Naoya Haneda Information processing method, information processing apparatus, and program therefor
US20040086115A1 (en) 2002-11-06 2004-05-06 Chi-Sung Laih Image public key generation method
US20070174633A1 (en) * 2004-12-07 2007-07-26 Draper Stark C Biometric Based User Authentication and Data Encryption
US20080184375A1 (en) 2006-05-09 2008-07-31 Masao Nonaka Confidential data protection apparatus, autonomous mobile robot, confidential data protection method, computer program, and integrated circuit
US20090117883A1 (en) 2006-07-20 2009-05-07 Dan Coffing Transaction system for business and social networking
US20100017618A1 (en) 2006-12-28 2010-01-21 Telecom Italia S.P.A. Method and system for biometric authentication and encryption
JP2008199263A (en) 2007-02-13 2008-08-28 Doshisha Secret key generation method in radio communication and radio communication device
GB2447674B (en) 2007-03-21 2011-08-03 Lancaster University Generation of a cryptographic key from device motion
US20090046860A1 (en) 2007-08-17 2009-02-19 Infineon Technologies Ag Integrated data transceiver and sensor for the generation of a symmetrical cryptographic key
US20090240947A1 (en) 2008-01-07 2009-09-24 Arvind Goyal System and method for securely accessing mobile data
JP2009194602A (en) 2008-02-14 2009-08-27 Kddi R & D Laboratories Inc Encryption protocol generating device, encryption protocol generating method, and program
WO2010087797A1 (en) 2009-01-30 2010-08-05 Hewlett-Packard Development Company, L.P. Methods and systems for establishing collaborative communications between devices using ambient audio
US20110135144A1 (en) 2009-07-01 2011-06-09 Hand Held Products, Inc. Method and system for collecting voice and image data on a remote device and coverting the combined data
US20130114811A1 (en) 2011-11-08 2013-05-09 Petros T. Boufounos Method for Privacy Preserving Hashing of Signals with Binary Embeddings

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
"For authentication by voice or image," accessed at http://web.archive.org/web/20101130181635/http://help.yahoo.co.jp/help/jp/edit/edit-57.html, accessed on Sep. 25, 2014, pp. 1-4.
"Research Survey and Memo," accessed at http://www.netaro.info/~zetaka/burogu/archives/000020.html, Aug. 3, 2006, pp. 1-2.
"Research Survey and Memo," accessed at http://www.netaro.info/˜zetaka/burogu/archives/000020.html, Aug. 3, 2006, pp. 1-2.
Anil K. Jain; An Introduction to Biometric Recognition; IEE vol. 14, No. 1, Jan. 2004. *
Bay, H., et al., "SURF: Speeded Up Robust Features," Lecture Notes in Computer Science, vol. 3951, pp. 404-417 (2006).
Bergadano, F., et al., "User Authentication Through Keystroke Dynamics," ACM Transactions on Information and System Security (TISSEC), vol. 5, Issue 4, pp. 367-397 (Nov. 2002).
International Search Report and written opinion for International Application No. PCT/US2011/037788, mailed on Jan. 9, 2012.
Liddell, J., et al., "Using a Combination of Sound and Images to Authenticate Web Users," 17th Annual Human Computer Interaction Conference: Designing for Society, pp. 1-4 (2003).

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11030903B2 (en) 2018-05-30 2021-06-08 Ford Global Technologies, Llc Vehicle-to-infrastructure communication

Also Published As

Publication number Publication date
US8938070B2 (en) 2015-01-20
KR101497386B1 (en) 2015-03-02
US20120300923A1 (en) 2012-11-29
US20150063566A1 (en) 2015-03-05
WO2012161697A1 (en) 2012-11-29
JP2014512154A (en) 2014-05-19
KR20130124566A (en) 2013-11-14

Similar Documents

Publication Publication Date Title
US9270452B2 (en) Encryption using real-world objects
US9991970B2 (en) Transferring data via audio link
CN106850220B (en) Data encryption method, data decryption method and device
KR102379068B1 (en) communication method and electronic devices thereof
EP3180887B1 (en) System and method for shared key agreement over untrusted communication channels
TW201546642A (en) Methods and apparatus to enhance security of authentication
US9191208B2 (en) Schemes for signcryption
US20130125212A1 (en) Remote displaying
US11308185B1 (en) System and method for determining modifications of media files
WO2020073633A1 (en) Conference loudspeaker box, conference recording method, device and system, and computer storage medium
CN108243481A (en) Document transmission method and device
JP6996501B2 (en) Information processing equipment and methods
US20130178964A1 (en) Audio system with adaptable audio output
WO2017020437A1 (en) Information encryption method and terminal device
Nguyen et al. Using ambient audio in secure mobile phone communication
US20130178963A1 (en) Audio system with adaptable equalization
Huang et al. A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme
US20160309205A1 (en) System and method for transmitting digital audio streams to attendees and recording video at public events
CN114127775A (en) Media provenance authentication through fragile watermarks
US20220053123A1 (en) Method and apparatus for independent authentication of video
JP6930280B2 (en) Media capture / processing system
Shafi et al. A novel audio steganography scheme using amplitude differencing
JP2021005745A (en) Confidential data communication method, Confidential data communication program and Confidential data communication system
WO2017078003A1 (en) Content reproduction system, authentication method, and medium
CN114662064A (en) Method for embedding and extracting zero watermark in database and electronic equipment

Legal Events

Date Code Title Description
AS Assignment

Owner name: EMPIRE TECHNOLOGY DEVELOPMENT LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ARAKAWA, YUTAKA;YAMANAKA, NAOAKI;OKI, EIJI;SIGNING DATES FROM 20110518 TO 20110520;REEL/FRAME:034730/0660

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
AS Assignment

Owner name: CRESTLINE DIRECT FINANCE, L.P., TEXAS

Free format text: SECURITY INTEREST;ASSIGNOR:EMPIRE TECHNOLOGY DEVELOPMENT LLC;REEL/FRAME:048373/0217

Effective date: 20181228

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20200223