Data sent by the Epoc is crypted, but it is preent a software to read
it: http://github.com/qdot/emokit
It is available a Python software to read the primary data, using 3
possible decrypting keys: the correct one for the available consumer
key under test is another one, extra1_key
consumer_key = ’\x31\x00\x35\x54\x38\x10\x37\x42\x31\x00\x35\x48\x38\x00\x37\x50’
research_key = ’\x31\x00\x39\x54\x38\x10\x37\x42\x31\x00\x39\x48\x38\x00\x37\x50’
special_key = ’\x31\x00\x35\x48\x31\x00\x35\x54\x38\x10\x37\x42\x38\x00\x37\x50’
extra1_key = ’\x4D\x00\x47\x54\x38\x10\x31\x42\x4D\x00\x47\x48\x38\x00\x31\x50’
found at http://https://github.com/qdot/emokit/issues/4.
The used program is almost the standard emokit: just added the new
decryption key on emotiv.py, while the test program has been rewritten
as rawread.py:
#!/usr/bin/python
import sys, time, logging
from emotiv import Emotiv
emotiv = None
def main(debug=False):
print ’Starting MAIN’
while True:
for packet in emotiv.dequeue():
print ’{0:4d},{2:4d},{3:4d},{4:4d},{5:4d},\
{6:4d},{7:4d},{8:4d},{9:4d},{10:4d},{11:4d},{12:4d},{13:4d},{14:4d},\
{15:4d},{16:4d},{17:4d};’.format(packet.counter, packet.sync,
packet.gyroX, packet.gyroY,
packet.F3[0], packet.FC6[0],
packet.P7[0], packet.T8[0],
packet.F7[0], packet.F8[0],
packet.T7[0], packet.P8[0],
packet.AF4[0], packet.F4[0],
packet.AF3[0], packet.O2[0],
packet.O1[0], packet.FC5[0])
#sys.stdout.flush()
#time.sleep(1.0/128.0)
try:
logger = logging.getLogger(’emotiv’)
logger.setLevel(logging.INFO)
log_handler = logging.StreamHandler()
logger.addHandler(log_handler)
emotiv = Emotiv()
main(*sys.argv[1:])
finally:
if emotiv:
emotiv.close()
--
Gianluca Moro
N.s.A - Note su Android http://www.giammy.com/nsa
Medical Brain Computer Interface https://groups.google.com/group/medical-bci/