throbber
I 1111111111111111 11111 lllll lllll lllll lllll lllll lllll lllll 111111111111111111
`US009564952B2
`
`c12) United States Patent
`Etchegoyen et al.
`
`(IO) Patent No.:
`(45) Date of Patent:
`
`US 9,564,952 B2
`Feb.7,2017
`
`(54) NEAR FIELD AUTHENTICATION THROUGH
`COMMUNICATION OF ENCLOSED
`CONTENT SOUND WAVES
`
`(71) Applicant: UNILOC LUXEMBOURG S.A.,
`Luxembourg (LU)
`
`(72)
`
`Inventors: Craig S. Etchegoyen, Newport Beach,
`CA (US); Dono Harjanto, Irvine, CA
`(US); Sean D. Burdick, Dallas, TX
`(US)
`
`(73) Assignee: Uniloc Luxembourg S.A., Luxembourg
`(LU)
`
`( *) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by O days.
`
`(21) Appl. No.: 13/734,178
`
`(22) Filed:
`
`Jan. 4, 2013
`
`(65)
`
`Prior Publication Data
`
`Aug. 8, 2013
`US 2013/0203350 Al
`Related U.S. Application Data
`
`(60) Provisional application No. 61/595,599, filed on Feb.
`6, 2012.
`
`(30)
`
`Foreign Application Priority Data
`
`Apr. 24, 2012
`
`(AU) ................................ 2012100462
`
`(51)
`
`Int. Cl.
`H04B 7100
`H04B 5102
`H04B 5100
`(52) U.S. Cl.
`CPC .............. H04B 5102 (2013.01); H04B 510031
`(2013.01)
`
`(2006.01)
`(2006.01)
`(2006.01)
`
`( 58) Field of Classification Search
`CPC ....... H04B 1/034; H04B 1/205; H04B 5/0031;
`H04B 5/02
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,200,770 A
`4,218,582 A
`
`4/1980 Hellman et al.
`8/1980 Hellman et al.
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`GB
`
`9/2007
`1 903 518
`2/2004
`2391965
`(Continued)
`
`OTHER PUBLICATIONS
`
`Eisen, Ori, "Catching the Fraudulent Man-in-the-Middle and Man(cid:173)
`in-the-Browser," Network Security, Apr. 2010, pp. 11-12.
`(Continued)
`
`Primary Examiner - Ajibola Akinyemi
`(74) Attorney, Agent, or Firm - Sean D. Burdick
`
`(57)
`
`ABSTRACT
`
`A method for near field authentication of sources using an
`audio transceiver computing device includes scanning a
`plurality of predetermined frequencies for a free frequency,
`selecting the free frequency from the plurality of predeter(cid:173)
`mined frequencies, generating a periodic enclosed content
`message, generating a modulated carrier wave representing
`the periodic enclosed content message, and transmitting the
`modulated carrier wave at the free frequency. A method for
`near field authentication of sources using a microphone
`input of a receiving computing device includes scanning a
`plurality of predetermined frequencies to detect a signal
`using the microphone input, verifying, responsive to detect(cid:173)
`ing the signal, that the signal includes at least one enclosed
`content message, and extracting a content from the enclosed
`content message.
`
`(Continued)
`
`12 Claims, 9 Drawing Sheets
`
`216
`(------------/"----------~,\
`302a
`302n
`I
`~ - - -~ ~ - - - -
`
`/
`
`- - - - - · / \ . ____ _
`
`/
`
`i
`BEGIN
`I INDICATION
`
`CONTENT
`
`END
`
`I
`INDICATION i
`
`306
`
`308
`
`I 304
`I
`I
`
`I
`I
`I~
`I
`302
`
`Page 1 of 20
`
`GOOGLE EXHIBIT 1001
`
`

`

`US 9,564,952 B2
`Page 2
`
`(58) Field of Classification Search
`USPC ......................................................... 455/41.1
`See application file for complete search history.
`
`A0lK 11/006
`340/10.51
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,323,921 A
`4,337,483 A
`4,405,829 A
`4,450,535 A
`4,633,036 A
`4,652,990 A
`4,672,572 A
`4,747,139 A
`4,868,877 A
`4,977,594 A
`5,005,200 A
`5,019,813 A *
`
`4/1982 Guillou
`6/1982 Guillou
`9/1983 Rivest et al.
`5/1984 de Pommery et al.
`12/1986 Hellman et al.
`3/1987 Pailen et al.
`6/1987 Alsberg
`5/1988 Taafe
`9/1989 Fischer
`12/1990 Shear
`4/1991 Fischer
`5/1991 Kip
`
`5,048,085 A
`5,050,213 A
`5,123,045 A
`5,144,667 A
`5,148,481 A
`5,155,680 A
`5,162,638 A
`5,191,611 A
`5,204,901 A
`5,231,668 A
`5,239,648 A
`5,249,178 A
`5,313,637 A
`5,349,643 A
`5,418,854 A
`5,606,614 A
`6,098,053 A
`6,098,106 A
`6,163,843 A
`6,681,017 Bl
`6,791,982 B2
`6,880,079 B2
`6,999,461 B2
`7,032,110 Bl
`7,032,242 Bl
`7,310,813 B2
`7,444,508 B2
`7,506,056 B2
`7,599,303 B2
`7,600,039 B2
`7,739,401 B2
`7,739,402 B2
`7,818,573 B2
`7,852,861 B2
`7,965,843 Bl
`8,018,937 B2
`8,020,190 B2
`8,375,221 Bl
`8,966,657 B2
`2002/0010864 Al
`2002/0099952 Al
`2002/0112171 Al
`2002/0163889 Al
`2002/0178122 Al
`2003/00637 50 Al
`2003/0070067 Al
`2003/0131001 Al
`2003/0149777 Al
`2003/0182435 Al
`2003/0190046 Al
`2003/0204726 Al
`2003/0212892 Al
`2003/0217263 Al
`2003/0237004 Al
`2004/0003288 Al
`2004/0030912 Al
`
`9/1991 Abraham et al.
`9/1991 Shear
`6/1992 Ostrovsky et al.
`9/1992 Pogue, Jr. et al.
`9/1992 Abraham et al.
`10/1992 Wiedemer
`11/1992 Diehl et al.
`3/1993 Lang
`4/1993 Hershey et al.
`7/1993 Kravitz
`8/1993 Nukui
`9/1993 Kurano et al.
`5/1994 Rose
`9/1994 Cox et al.
`5/1995 Kaufman et al.
`2/1997 Brady et al.
`8/2000 Slater
`8/2000 Philyaw et al.
`12/2000 Inoue et al.
`1/2004 Matias et al.
`9/2004 Westberg
`4/2005 Kelford et al.
`2/2006 Li et al.
`4/2006 Su et al.
`4/2006 Grabel sky et al.
`12/2007 Lin et al.
`10/2008 Karjala et al.
`3/2009 Satish et al.
`10/2009 Nadeau et al.
`10/2009 Tang et al.
`6/2010 Goyal
`6/2010 Roese
`10/2010 Martin et al.
`12/2010 Wu et al.
`6/2011 Maino et al.
`9/2011 Epps et al.
`9/2011 Plununer
`2/2013 Thom et al.
`2/2015 Martinez et al.
`1/2002 Safa
`7/2002 Lambert et al.
`8/2002 Ginter et al.
`11/2002 Yemini et al.
`11/2002 Maes
`4/2003 Medvinsky et al.
`4/2003 Saito
`7/2003 Matsuo
`8/2003 Adler
`9/2003 Redlich et al.
`10/2003 Kamerman et al.
`10/2003 Kelford et al.
`11/2003 Oishi
`11/2003 Sakai
`12/2003 Okamura
`1/2004 Wiseman et al.
`2/2004 Merkle et al.
`
`2004/0038716 Al*
`
`2/2004 Gass
`
`2004/0143746 Al
`2004/0145773 Al
`2004/0187018 Al
`2005/0033957 Al
`2005/0169271 Al
`2005/0187890 Al
`2006/0075134 Al
`2006/0095454 Al
`2006/0130135 Al
`2006/0161914 Al
`2006/0253584 Al
`2006/0271485 Al
`2006/0280207 Al
`2007 /0005974 Al
`2007/0055853 Al
`2007 /0079365 Al
`2007/0153764 Al
`2007/0198850 Al*
`
`7/2004 Ligeti et al.
`7/2004 Oakeson et al.
`9/2004 Owen et al.
`2/2005 Enokida
`8/2005 Janneteau et al.
`8/2005 Sullivan
`4/2006 Aalto et al.
`5/2006 Shankar et al.
`6/2006 Krstulich et al.
`7/2006 Morrison et al.
`11/2006 Dixon et al.
`11/2006 McKenzie et al.
`12/2006 Guarini et al.
`1/2007 Kudou
`3/2007 Hatasaki et al.
`4/2007 Ito et al.
`7/2007 Thubert et al.
`8/2007 Martin
`
`2007/0219917 Al
`2007/0235525 Al
`2008/0022103 Al
`2008/0028114 Al
`2008/0040785 Al
`2008/0049779 Al
`2008/0052775 Al
`2008/0076572 Al
`2008/00807 50 Al *
`
`9/2007 Liu et al.
`10/2007 Murch
`1/2008 Brown et al.
`1/2008 Mun
`2/2008 Shimada
`2/2008 Hopmann et al.
`2/2008 Sandhu et al.
`3/2008 Nguyen et al.
`4/2008 Bee.
`
`H04M 1/6091
`455/569.1
`
`G07C 9/00087
`713/186
`
`G06K 9/00006
`382/124
`
`2008/0082813 Al
`2008/0097924 Al
`2008/0098471 Al
`2008/0114709 Al
`2008/0244739 Al
`2008/0282338 Al
`2008/0298595 Al
`2008/0311994 Al
`2009/0003600 Al
`2009/0006861 Al
`2009/0016264 Al
`2009/0099830 Al
`2009/0113088 Al
`2009/0158426 Al
`2010/0034207 Al
`2010/0100962 Al
`2010/0146589 Al
`2010/0164720 Al
`2010/0199188 Al
`2010/0208899 Al *
`
`2010/0211795 Al
`2010/0269168 Al
`2010/0281261 Al
`2011/0007901 Al
`2011/0026529 Al
`2011/0090896 Al
`2011/0215158 Al*
`
`2011/0295988 Al
`2012/0214416 Al*
`
`2012/0216262 Al*
`
`2012/0275354 Al
`2013/0159701 Al*
`
`4/2008 Chow et al.
`4/2008 Carper et al.
`4/2008 Ooi et al.
`5/2008 Dixon et al.
`10/2008 Liu et al.
`11/2008 Beer
`12/2008 Narayanan et al.
`12/2008 Amaitis et al.
`1/2009 Chen et al.
`1/2009 ven Bemmel
`1/2009 Hirano et al.
`4/2009 Gross et al.
`4/2009 Illowsky et al.
`6/2009 Yoon et al.
`2/2010 McGrew et al.
`4/2010 Boren
`6/2010 Safa
`7/2010 Kore
`8/2010 Abu-Hakima et al.
`8/2010 Kasargod ................ H04S 1/002
`381/1
`
`8/2010 Brown et al.
`10/2010 Hegli et al.
`11/2010 Razzell
`1/2011
`Ikeda et al.
`2/2011 Majumdar et al.
`4/2011 Bradley
`9/2011 Karg! ...................... H04L 27/04
`235/492
`
`12/2011 Le Jouan
`8/2012 Kent ....................... H04L 63/18
`455/41.2
`8/2012 Bardsley ............. H04L 63/0861
`726/5
`
`11/2012 Villain
`6/2013 Phillips ................. H04L 63/045
`713/155
`
`2013/0212389 Al
`
`8/2013 Mccreight et al.
`
`FOREIGN PATENT DOCUMENTS
`
`4 117 548
`JP
`5181734
`JP
`WO 01/09756
`WO
`WO WO 2006/102399
`
`4/1992
`7 /1993
`2/2001
`9/2006
`
`Page 2 of 20
`
`

`

`US 9,564,952 B2
`Page 3
`
`(56)
`
`References Cited
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`
`WO 2008/034900
`WO 2008/052310
`
`3/2008
`5/2008
`
`OTHER PUBLICATIONS
`
`Housley et al., "Internet x.509 Public Key Infracstructure Certificate
`and CRL Profile" The Internet Society, Network Working Group,
`Sep. 1999, 75 pages. [RFC 2459].
`Wikipedia: "Software Extension," May 28, 2009, Internet Article
`retrieved on Oct. 11, 2010. XP002604710.
`H. Williams, et al., "Web Database Applications with PHP &
`MySQL", Chapter 1, "Database Applications and the Web", ISBN
`0-596-00041-3, O'Reilly & Associates, Inc., Mar. 2002, avail. at:
`http://docstore.mik.ua/orelly/webprog/webdb/chO l_0 l .htm.
`XP002603488.
`Zhu, Yunpu, "A New Architecture for Secure Two-Party Mobile
`Payment Transactions," Submitted to the School of Graduate Stud(cid:173)
`ies of the University of Lethbridge, Master of Science, 2010, 240
`pages.
`Ylonen et al., "The Secure Shell (SSH) Authentication Protocol,"
`Network Working Group, Jan. 2006, 17 pages. RFC-4252.
`Nesi, et al., "A Protection Processor for MPEG-21 Players," In
`Proceedings of ICME, 2006, pp. 1357-1360.
`Harrington, D., et al., "An Architecture for Describing Simple
`Network Management Protocol (SNMP) Management Frame(cid:173)
`works," RFC 3411, IETF, Dec. 2002, pp. 1-64.
`Moshchuk, Alexander, et al., "SpyProxy: Execution-based Detec(cid:173)
`tion of Malicious Web Content," 2007, pp. 27-42.
`
`* cited by examiner
`
`Page 3 of 20
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb.7,2017
`Feb. 7, 2017
`
`Sheet 1 of 9
`Sheet 1 of 9
`
`US 9,564,952 B2
`US 9,564,952 B2
`
`100
`100
`
`J
`
`102
`
`102
`
`104
`104
`
`106
`
`FIG. 1
`FIG. 1
`
`Page 4 of 20
`
`Page 4 of 20
`
`

`

`U.S. Patent
`
`Feb.7,2017
`
`Sheet 2 of 9
`
`US 9,564,952 B2
`
`MEMORY 204
`
`NEAR FIELD
`AUTHENTICATION
`TRANSCEIVER
`LOGIC
`214
`
`PERIODIC
`ENCLOSED
`CONTENT
`MESSAGE
`216
`
`DEVICE ID
`GENERATION
`LOGIC
`214
`
`BIOMETRIC
`DATA INPUT
`LOGIC
`214
`
`, "
`
`fr
`
`INPUT
`208
`
`INTERCONNECT 206
`,,
`
`~,,
`
`OUTPUT
`210
`
`FIG. 2
`
`102
`
`f
`
`CPU 202
`
`t
`, "
`
`!
`
`w
`NETWORK
`ACCESS
`CIRCUITRY
`212
`
`Page 5 of 20
`
`

`

`U.S. Patent
`
`Feb.7,2017
`
`Sheet 3 of 9
`
`US 9,564,952 B2
`
`L.W
`
`z
`0
`0~ Zu
`-Cl z -
`f-z
`f-z
`0 u
`
`L.W
`
`z
`ZQ
`-
`f-
`(.!) <(
`UJ u
`co -0 z -
`
`z
`0 o.:=
`z <(
`UJ u
`ci
`z
`
`UJ
`
`f(cid:173)z
`f(cid:173)z
`0 u
`
`\.0
`rl _,,
`N
`
`rtl
`N
`0
`('I')
`
`;;;
`u
`"' 0..
`f-
`
`rn
`l9
`LL
`
`N
`
`('I')
`
`J 0
`----
`
`00
`0 m
`
`\.0
`0 m
`
`z
`ZQ
`-
`f(cid:173)
`t'.:) <(
`L.W u
`co ci
`z
`.__ _ _,__ - - - -
`
`Page 6 of 20
`
`

`

`U.S. Patent
`
`Feb.7,2017
`
`Sheet 4 of 9
`
`US 9,564,952 B2
`
`CONTENT 306
`
`BIOMETRIC
`DATA
`402
`
`DEVICE
`IDENTIFICATION
`DATA
`404
`
`FIG. 4
`
`Page 7 of 20
`
`

`

`U.S. Patent
`
`Feb.7,2017
`
`Sheet 5 of 9
`
`US 9,564,952 B2
`
`MEMORY 504
`
`NEAR FIELD
`AUTHENTICATION
`RECEIVER
`LOGIC
`514
`
`AUTHORIZED
`CONTENT
`516
`
`,~
`,,.
`
`INPUT
`508
`
`INTERCONNECT 506
`,h
`
`~~
`
`OUTPUT
`510
`
`104
`
`f
`
`!
`
`CPU 502
`
`t
`,~
`~,,
`NETWORK
`ACCESS
`CIRCUITRY
`512
`
`FIG. 5
`
`Page 8 of 20
`
`

`

`U.S. Patent
`
`Feb.7,2017
`
`Sheet 6 of 9
`
`US 9,564,952 B2
`
`600
`
`J
`602
`SCANNING A PLURALITY OF PREDETERMINED ~
`
`FREQUENCIES FOR A FREE FREQUENCY
`
`6 04
`SELECTING THE FREE FREQUENCY FROM THE PLURALITY OF ~
`PREDETERMINED FREQUENCIES
`
`GENERATING A PERIODIC ENCLOSED
`CONTENT MESSAGE
`
`~06
`
`,,
`6
`08
`GENERATING A MODULATED CARRIER WAVE REPRESENTIING ~
`THE PERIODIC ENCLOSED CONTENT MESSAGE
`
`,,,
`TRANSMITTING THE MODULATED CARRIER WAVE ~o
`AT THE FREE FREQUENCY
`
`FIG. 6
`
`Page 9 of 20
`
`

`

`U.S. Patent
`
`Feb.7,2017
`
`Sheet 7 of 9
`
`US 9,564,952 B2
`
`700
`
`f
`
`7 02
`DISPLAYING A USER INTERFACE ON THE AUDIO TRANSCEIVER ~
`COMPUTING DEVICE REQUESTING THE BIOMETRIC DATA
`FROM A USER
`
`,r
`
`RESPONSIVE TO RECEIVING THE BIOMETRIC DATA,
`7 04
`GENERATING THE PERIODIC ENCLOSED CONTENT MESSAGE, ~
`WHEREIN THE CONTENT IN EACH PERIOD OF THE PERIODIC
`ENCLOSED CONTENT MESSAGE INCLUDES THE BIOMETRIC
`DATA
`
`FIG. 7
`
`Page 10 of 20
`
`

`

`U.S. Patent
`
`Feb.7,2017
`
`Sheet 8 of 9
`
`US 9,564,952 B2
`
`800
`
`f
`
`802
`SCANNING A PLURALITY OF PREDETERMINED ~
`
`FREQUENCIES TO DETECT A SIGNAL USING THE
`MICROPHONE INPUT
`
`l
`VERIFYING, RESPONSIVE TO DETECTING THE SIGNAL, THAT THE ~
`
`SIGNAL INCLUDES AT LEAST ONE ENCLOSED CONTENT
`MESSAGE
`
`8 04
`
`t
`806
`EXTRACTING A CONTENT FROM THE ~
`ENCLOSED CONTENT MESSAGE
`
`FIG. 8
`
`Page 11 of 20
`
`

`

`U.S. Patent
`
`Feb.7,2017
`
`Sheet 9 of 9
`
`US 9,564,952 B2
`
`900
`
`f
`
`COMPARING THE EXTRACTED CONTENT TO AUTHORIZED
`
`9
`
`CONTENT TO AUTHENTICATE A TRANSCEIVER COMPUTING V 02
`
`DEVICE THAT TRANSMITTED THE ENCLOSED CONTENT
`MESSAGE
`
`"'
`
`PERFORMING A FINANCIAL TRANSACTION BASED ON THE V
`
`ENCLOSED CONTENT MESSAGE WHEN THE TRANSCEIVER
`COMPUTING DEVICE IS AUTHENTICATED
`
`9 04
`
`FIG. 9
`
`Page 12 of 20
`
`

`

`US 9,564,952 B2
`
`1
`NEAR FIELD AUTHENTICATION THROUGH
`COMMUNICATION OF ENCLOSED
`CONTENT SOUND WAVES
`
`This application claims priority to U.S. Provisional Appli(cid:173)
`cation No. 61/595,599, which was filed Feb. 6, 2012, and
`which is fully incorporated herein by reference.
`
`BACKGROUND OF THE INVENTION
`
`5
`
`2
`a mobile computing device transmits an authentication
`request by executing the following salient steps using an
`audio transceiver: scanning a plurality of predetermined
`frequencies for a free frequency, selecting the free frequency
`from the plurality of predetermined frequencies, generating
`a periodic enclosed content message, encoding a carrier
`wave with the periodic enclosed content message, and
`transmitting the modulated carrier wave at the free fre(cid:173)
`quency. The audio transceiver, in one example, may be a
`10 mobile phone having both a speaker and a microphone.
`The periodic enclosed content message includes an
`enclosed content message at each period. The enclosed
`content message comprises a beginning indication, a con(cid:173)
`tent, and an ending indication. The beginning indication
`15 indicates when the enclosed content message begins, while
`the ending indication indicates when the enclosed content
`ends. This allows for verification that the enclosed content
`message is completely instead of partially received. Further(cid:173)
`more, the content can include biometric data or device
`20 identification data, or both, which can be used to authenti(cid:173)
`cate the user or the mobile computing device. Furthermore,
`the content may also include financial information for the
`user, or other data which might be used for gaining access
`to a secure network for facilitating a transaction once the
`25 user or the mobile computing device, or both, have been
`authenticated.
`In another embodiment, the present invention includes a
`computer readable medium useful in association with an
`audio transceiving computing device that includes one or
`30 more processors and a memory, the computer readable
`medium including instructions configured to cause the audio
`transceiving computing device, by execution of the instruc(cid:173)
`tions in the one or more processors from the memory, to
`request authentication by executing the salient steps.
`In another embodiment, the present invention includes a
`mobile computer system including at least one processor, a
`computer readable medium that is operatively coupled to the
`processor, and a transmission logic that (i) executes in the
`processor from the computer readable medium and (ii) when
`40 executed by the processor causes the mobile computer
`system to request authentication by executing the salient
`steps.
`The invention also provides a method for receiving an
`authentication request using an audio or microphone input of
`45 a receiving computing device by executing the following
`second set of salient steps: scanning a plurality of predeter(cid:173)
`mined frequencies to detect a signal using the microphone
`input, verifying, responsive to detecting the signal, that the
`signal includes at least one enclosed content message, and
`50 extracting a content from the enclosed content message.
`Another embodiment of the invention comprises a com(cid:173)
`puter readable medium useful in association with an audio
`receiving computing device that includes one or more pro(cid:173)
`cessors, an audio or microphone input, and a memory, the
`55 computer readable medium including computer instructions
`which are configured to cause the audio receiving computing
`device, by execution of the computer instructions in the one
`or more processors from the memory, to receive an authen(cid:173)
`tication request by execution of the second set of salient
`60 steps.
`In another embodiment, a present invention is a computer
`system including at least one processor, an audio input that
`is operatively coupled to the processor, a computer readable
`medium that is operatively coupled to the processor, and a
`65 near field authentication receiver logic that (i) executes in
`the processor from the computer readable medium and (ii)
`when executed by the processor causes the computer system
`
`1. Field of the Invention
`The present invention relates generally to technology for
`near field authentication of users and their computing
`devices. More specifically, the invention relates to effecting
`near field authentication for digital communications by
`means of encoded sound waves.
`2. Description of the Related Art
`The use of a user's electronic device to complete a
`purchase has been suggested, for example, utilizing Blu(cid:173)
`etooth technology or a WiFi Internet connection to transmit
`the data to the register. However, such technology requires
`a transactional device such as a register or ATM machine to
`be upgraded and retrofitted with expensive equipment and
`software to securely receive the data and authenticate the
`user's electronic device. Thus, while it may be desirable for
`the user, it could be prohibitively expensive for the com(cid:173)
`mercial entity utilizing the transactional device, especially
`for small businesses.
`The use of other technology aside from the Internet or the
`Bluetooth may also require not only that the transactional
`device be upgraded and retrofitted, but also that the user's
`electronic device be similarly modified. In addition, alter(cid:173)
`native technology may also have range limitations which
`can degrade the user's experience when performing a trans(cid:173)
`action. For example, in a conventional near field commu- 35
`nication, radio communication is utilized to facilitate trans(cid:173)
`actions. However,
`the
`conventional
`near
`field
`communication requires that the two transacting devices be
`in extremely close proximity to each other, i.e., within about
`4 centimeters from each other to ensure reliable communi(cid:173)
`cation. This requirement for close proximity places a very
`restrictive limitation on practical applications for near field
`transactions in the real world. If one of the transacting
`devices is a cash register, and the other transacting device is
`a customer's mobile phone, the customer would need to
`extend the phone to within centimeters of the register and
`risk dropping the phone. The proximity limitation may also
`prevent the user from making further use of the phone while
`the transaction is taking place and while the phone is
`extended away from the customer. For example, should
`complications in the transaction arise, or if the user is
`required to provide a manual input, the customer may not be
`able to complete the transaction.
`Another drawback of the conventional near field commu(cid:173)
`nication is the lack of security, despite the close proximity
`of the two devices. That is, the conventional near field
`communication offers no protection against eavesdropping
`and can be vulnerable to data modifications. Needless to say,
`this is undesirable for financial transactions and other con(cid:173)
`fidential communications.
`Thus, there is a need for improved technology for effect(cid:173)
`ing near field communications.
`
`SUMMARY OF THE INVENTION
`
`The present invention provides a method for source
`authentication in network communications. A source such as
`
`Page 13 of 20
`
`

`

`US 9,564,952 B2
`
`3
`to receive an authentication request via the audio input by
`execution of the second set of salient steps.
`In an embodiment, the near field authentication of sources
`using audio waves can be used in conjunction with a
`conventional online transaction to provide enhanced secu-
`rity for transactions, such as payments and electronic or
`personal access to confidential files or secure locations.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`5
`
`4
`device 102 can transmit data to the audio receiving com(cid:173)
`puting device 104 as a modulated carrier wave 106. The
`modulated carrier wave 106 can be, for example, a sound
`wave. Sound waves can transmit information accurately
`over a very short distance (near field communications) using
`inexpensive equipment. In different embodiments, the sound
`wave can have a frequency that is substantially below,
`within, or above the audible frequencies, such as below 20
`Hz, between 20 Hz and 20 kHz, or above 20 kHz. For
`10 example, the sound wave could be an ultrasonic wave.
`The audio transceiver computing device 102 can be, for
`example, a mobile phone, a personal digital assistant, a
`tablet, a laptop, a music player, or any other device having
`a processor operatively coupled to memory and capable of
`15 transmitting the modulated carrier wave 106 responsive to
`operation of the processor. As seen in FIG. 2, the audio
`transceiver computing device 102 can include, for example
`one or more microprocessors, which are collectively shown
`as CPU 202. The audio transceiver computing device 102
`20 also includes, for example, a memory 204, an interconnect
`206, an input 208, an output 210, and/or a network access
`circuitry 212. The CPU 202 can retrieve data and/or instruc(cid:173)
`tions from the memory 204 and execute the retrieved
`instructions. The memory 204 can include generally any
`25 computer-readable medium including, for example, persis(cid:173)
`tent memory such as magnetic and/or optical disks, ROM,
`and PROM and volatile memory such as RAM.
`The CPU 202 and the memory 204 are connected to one
`another through the interconnect 206, which is a bus in this
`30 illustrative embodiment. The interconnect 206 connects the
`CPU 202 and the memory 204 to the input devices 208, the
`output devices 210, and the network access circuitry 212.
`The input devices 208 can include, for example, a keyboard,
`a keypad, a touch-sensitive screen, a mouse, a microphone,
`35 and/or one or more cameras. The output devices 210 can
`include, for example, a display-such as a liquid crystal
`display (LCD)-and/or one or more speakers. The network
`access circuitry 212 sends and receives data through com-
`puter networks such an intranet or the Internet.
`A number of components of the audio transceiver com-
`puting device 102 are stored in the memory 204. In particu(cid:173)
`lar, a near field authentication transceiver logic 214 is part of
`one or more computer processes executed within the CPU
`202 from the memory 204 in this illustrative embodiment,
`45 but can also be implemented using digital logic circuitry. As
`used herein, "logic" refers to (i) logic implemented as
`computer instructions and/or data within one or more com(cid:173)
`puter processes and/or (ii) logic implemented in electronic
`circuitry.
`In an embodiment, the near field authentication trans-
`ceiver logic 214 is executable software stored within the
`memory 204. For example, when the audio transmitting
`computing device 102 receives a request from the user to
`transmit the modulated carrier wave 106, the audio trans-
`55 ceiver computing device 102 executes the near field authen(cid:173)
`tication transceiver logic 214 to transmit the modulated
`carrier wave 106 to the audio receiving computing device
`104. As previously noted the modulate carrier wave 106 can
`be an analog signal, such as a sound signal. Advantageously,
`60 an analog signal has an infinite amount of signal resolution.
`Furthermore, the use of sound signals increases the permis(cid:173)
`sible transmission distance. That is, the theoretical and
`practical working distance for completing a transaction
`using the present invention is increased and can be mea-
`65 sured, for example, in feet or meters instead of centimeters.
`This allows the user to utilize the audio transceiver com(cid:173)
`puting device 102 for additional functions simultaneously
`
`Other systems, methods, features and advantages of the
`invention will be or will become apparent to one with skill
`in the art upon examination of the following figures and
`detailed description. It is intended that all such additional
`systems, methods, features and advantages be included
`within this description, be within the scope of the invention,
`and be protected by the accompanying claims. Component
`parts shown in the drawings are not necessarily to scale, and
`may be exaggerated to better illustrate the important features
`of the invention. In the drawings, like reference numerals
`may designate like parts throughout the different views,
`wherein:
`FIG. 1 is a block diagram showing an audio transceiving
`computing device transmitting data to an audio receiving
`computing device in accordance with one embodiment of
`the present invention.
`FIG. 2 is a block diagram showing functional components
`that make up an audio transceiving computing device
`according to an embodiment of the present invention.
`FIG. 3 depicts a periodic enclosed content message
`according to an embodiment of the present invention.
`FIG. 4 is a block diagram depicting message content in an
`enclosed content message according to an embodiment of
`the present invention.
`FIG. 5 is a block diagram showing functional components
`of an audio receiving computing device according to an
`embodiment of the present invention.
`FIG. 6 is a process flow diagram showing steps for an
`audio transceiving computing device to request authentica(cid:173)
`tion from an audio receiving computing device according to 40
`an embodiment of the present invention.
`FIG. 7 depicts additional process steps for inputting
`content for an enclosed content message into an audio
`transceiving computing device in advance of requesting
`authentication according to an embodiment of the present
`invention.
`FIG. 8 is a process flow diagram showing steps for
`receiving an audio transmission of enclosed content data
`using a microphone input of a receiving computing device
`according to an embodiment of the present invention.
`FIG. 9 depicts additional process steps for authenticating
`an audio transceiving device according to an embodiment of
`the present invention.
`
`50
`
`DETAILED DESCRIPTION
`
`The present invention relates to a method and system for
`near field authentication of users and computing devices
`using sound waves. Such users and computing devices may
`be referred to collectively herein as "sources". Authenticat(cid:173)
`ing a source according to the present invention may involve
`authenticating only a user, only a computing device, or both
`a user and a computing device.
`As seen in FIG. 1, a system 100 for authenticating sources
`using sounds waves can include, for example, an audio
`transceiving computing device 102, and an audio receiving
`computing device 104. The audio transceiving computing
`
`Page 14 of 20
`
`

`

`US 9,564,952 B2
`
`10
`
`5
`while completing a transaction. It also reduces a likelihood
`that the user will be prone to dropping or otherwise dam(cid:173)
`aging the audio transceiver computing device 102 by mov(cid:173)
`ing the audio transceiver computing device 102 into very
`close proximity with the audio receiving computing device 5
`104.
`When the near field authentication transceiver logic 214 is
`executed, the audio transceiver computing device 102 scans
`a plurality of predetermined frequencies for a free frequency.
`The predetermined frequencies can be, for example, fre-
`quencies for which the audio transceiver computing device
`102 is authorized to transmit the modulated carrier wave or
`which are known to the audio receiving computing device
`104. In an embodiment, the predetermined frequencies can
`be selected to be outside the audible frequencies. From the
`predetermined frequencies, the near field authentication
`transceiver logic 214 can select a free frequency. The free
`frequency can be, for example, a frequency which has a
`noise level below a predetermined noise level threshold or a
`frequency that has an interference level below a predeter(cid:173)
`mined interference level threshold.
`The near field authentication transceiver logic 214 can
`also generate a periodic enclosed content message 216 as
`shown in FIG. 2. To generate the periodic enclosed content
`message 216, the near field authentication transceiver logic
`214 can utilize a device ID generation logic 218 or a
`biometric data input logic 220, or both. The device ID
`generation logic 218 can generate, for example, device
`identification data of the audio transceiver computing device
`102. In an embodiment, the device ID generation logic 218
`can utilize known techniques for generating a device fin(cid:173)
`gerprint. The biometric data input logic 220 can display, for
`example, a user interface for requesting and receiving a
`voice or image input representing biometric data. The device
`identification data or the biometric data, or both, can be
`included in a content of the periodic enclosed content
`message 216, which will be described later.
`The near field authentication transceiver logic 214 can
`also generate a modulated carrier wave 106 representing the
`periodic enclosed content message. The modulated carrier
`wave 106 can be transmitted at the free frequency to the
`audio receiving computing device 104. Preferably, the peri(cid:173)
`odic enclosed content message is generated initially in
`digital format, and is then converted into an analog signal
`and used to modulate the carrier wave. In an embodiment,
`the digital form of the periodic enclosed content message
`216 can be encrypted using standard RSA (PKI) keys. Key
`exchanges may occur out-of-band, such as during registra(cid:173)
`tion of the audio transceiver computing device 102, or may
`be built-in to the near field authentication transceiver logic 50
`214.
`As can be seen in FIG. 3, the periodic enclosed content
`message 216 includes, for example, multiple periods with
`each period including an enclosed content message 302.
`Thus, the periodic enclosed content message 216 includes a
`plurality of enclosed content messages 302 such as enclosed
`content messages 302a-302n for a total of N enclosed
`content messages. Each of the enclosed content messages
`includes a begin indication 304, a content 306, and an end
`indication 308. The begin indication 304 can be any type of
`signal that uniquely indicates the beginning of the enclosed
`content message, for example, a specified sequence of
`binary bits. Similarly, the end indication 308 can be any type
`of signal that indicates the ending of the enclosed content
`message. In one embodiment, the begin indication 304 and
`the end indication 308 comprise different signals. In another
`embodiment, the begin indication 304 and the end indication
`
`6
`308 comprise identical signals, i.e. two of the same signals
`in sequence. In another embodiment, an end indication
`308(n-1) and the next begin indication 304(n) may be one
`and the same signal.
`Referring to FIG. 4, the content 306 can include, for
`example, biometric data 402 or a device identification data
`404 or a combination of both. The biometric data 402 can
`include, for example, the data corresponding to a voice of a
`user, a fingerprint of the user, an image of the user, or any
`other physiological data of the user which can be used to
`verify an identity of the user. The device identification data
`404 can include, for example, a MAC address of the audio
`transceiver computing device 102, a hard disk serial number
`15 of the audio transceiver computing device 102, a device ID
`number of the audio transceiver computing device 102, a
`device phone number of the audio transceiver computing
`device 102, a device fingerprint of the audio transceiver
`computing device 102, or any other information which could
`20 be used to identify and verify the authenticity of the audio
`transceiver computing device 102.
`A device fingerprint comprises binary data that identifies
`the audio transceiver computing device 102 by deriving a
`unique data string from multiple portions of indicia stored

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket