Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

AI Biotech/Diagnostics: Cardio

Search All Applications in AI Biotech/Diagnostics: Cardio


Application US20210058257


Published 2021-02-25

Security And Identity Verification For Neuromodulation Therapy Implant Device Programming

Methods and systems are provided for securing communications with a neuromodulation-therapy implant device. A first subject-specific encryption-key value may be loaded onto a neuromodulation-therapy implant device, the first subject-specific encryption-key value being configured to generate a signature that may be included in data packets transmitted by the implant device. The signature may be generated by generating a hash value of the data of the data packet and encrypting the hash value. A request may be received from a mobile device for a second subject-specific encryption-key value that is different than but corresponds to the first subject-specific encryption-key value. The second subject-specific encryption-key value may be retrieved from a data store upon authenticating the request. The second encryption-key value corresponding to the first subject-specific encryption-key value may be transmitted to the mobile device.



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

3 Independent Claims

  • 1. A method comprising: determining a first subject-specific encryption-key value to be loaded onto a neuromodulation-therapy implant device, the first subject-specific encryption-key value being configured to generate a signature that is to be included in at least some of a plurality of data packets that are to be transmitted by the neuromodulation-therapy implant device, wherein the signature for each data packet of the at least some data packets is generated by: generating, using the first subject-specific encryption-key value, a hash value of data of the data packet; and encrypting, using the first subject-specific encryption-key value, the hash value; receiving a request from a mobile device for a second subject-specific encryption-key value, the request including a subject identifier; authenticating the request from the mobile device, said authenticating comprising comparing the subject identifier and one or more additional characteristics of the request, to subject data records stored in an authentication data store; retrieving from a data store, the second subject-specific encryption-key value associated with the subject identifier, wherein second encryption-key value is different than but corresponds to the first subject-specific encryption-key value; and transmitting, to the mobile device, the second encryption-key value corresponding to the first subject-specific encryption-key value.

  • 9. A system comprising: one or more data processors; and a non-transitory computer-readable storage medium containing instructions which, when executed by the one or more data processors, cause the one or more data processors to perform operations including: determining a first subject-specific encryption-key value to be loaded onto a neuromodulation-therapy implant device, the first subject-specific encryption-key value being configured to generate a signature that is to be included in at least some of a plurality of data packets that are transmitted by the neuromodulation-therapy implant device, wherein the signature for each data packet of the at least some data packets is generated by: generating, using the first subject-specific encryption-key value, a hash value of data of the data packet; and encrypting, using the first subject-specific encryption-key value, the hash value; receiving a request from a mobile device for a second subject-specific encryption-key value, the request including a subject identifier; authenticating the request from the mobile device, said authenticating comprising comparing the subject identifier and one or more additional characteristics of the request, to subject data records stored in an authentication data store; retrieving from a data store, the second subject-specific encryption-key value associated with the subject identifier, wherein second encryption-key value is different than but corresponds to the first subject-specific encryption-key value; and transmitting, to the mobile device, the second encryption-key value corresponding to the first subject-specific encryption-key value.

  • 15. A non-transitory computer-readable storage medium containing instructions which, when executed by one or more data processors, cause the one or more data processors to perform operations including: determining a first subject-specific encryption-key value to be loaded onto a neuromodulation-therapy implant device, the first subject-specific encryption-key value being configured to generate a signature that is to be included in at least some of a plurality of data packets that are transmitted by the neuromodulation-therapy implant device, wherein the signature for each data packet of the at least some data packets is generated by: receiving a request from a mobile device for a second subject-specific encryption-key value, the request including a subject identifier; authenticating the request from the mobile device, said authenticating comprising comparing the subject identifier and one or more additional characteristics of the request, to subject data records stored in an authentication data store; retrieving from a data store, the second subject-specific encryption-key value associated with the subject identifier, wherein second encryption-key value is different than but corresponds to the first subject-specific encryption-key value; and transmitting, to the mobile device, the second encryption-key value corresponding to the first subject-specific encryption-key value.