`US009564952B2
`
`c12) United States Patent
`Etchegoyen et al.
`
`(IO) Patent No.:
`(45) Date of Patent:
`
`US 9,564,952 B2
`Feb.7,2017
`
`(54) NEAR FIELD AUTHENTICATION THROUGH
`COMMUNICATION OF ENCLOSED
`CONTENT SOUND WAVES
`
`(71) Applicant: UNILOC LUXEMBOURG S.A.,
`Luxembourg (LU)
`
`(72)
`
`Inventors: Craig S. Etchegoyen, Newport Beach,
`CA (US); Dono Harjanto, Irvine, CA
`(US); Sean D. Burdick, Dallas, TX
`(US)
`
`(73) Assignee: Uniloc Luxembourg S.A., Luxembourg
`(LU)
`
`( *) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by O days.
`
`(21) Appl. No.: 13/734,178
`
`(22) Filed:
`
`Jan. 4, 2013
`
`(65)
`
`Prior Publication Data
`
`Aug. 8, 2013
`US 2013/0203350 Al
`Related U.S. Application Data
`
`(60) Provisional application No. 61/595,599, filed on Feb.
`6, 2012.
`
`(30)
`
`Foreign Application Priority Data
`
`Apr. 24, 2012
`
`(AU) ................................ 2012100462
`
`(51)
`
`Int. Cl.
`H04B 7100
`H04B 5102
`H04B 5100
`(52) U.S. Cl.
`CPC .............. H04B 5102 (2013.01); H04B 510031
`(2013.01)
`
`(2006.01)
`(2006.01)
`(2006.01)
`
`( 58) Field of Classification Search
`CPC ....... H04B 1/034; H04B 1/205; H04B 5/0031;
`H04B 5/02
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,200,770 A
`4,218,582 A
`
`4/1980 Hellman et al.
`8/1980 Hellman et al.
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`GB
`
`9/2007
`1 903 518
`2/2004
`2391965
`(Continued)
`
`OTHER PUBLICATIONS
`
`Eisen, Ori, "Catching the Fraudulent Man-in-the-Middle and Man(cid:173)
`in-the-Browser," Network Security, Apr. 2010, pp. 11-12.
`(Continued)
`
`Primary Examiner - Ajibola Akinyemi
`(74) Attorney, Agent, or Firm - Sean D. Burdick
`
`(57)
`
`ABSTRACT
`
`A method for near field authentication of sources using an
`audio transceiver computing device includes scanning a
`plurality of predetermined frequencies for a free frequency,
`selecting the free frequency from the plurality of predeter(cid:173)
`mined frequencies, generating a periodic enclosed content
`message, generating a modulated carrier wave representing
`the periodic enclosed content message, and transmitting the
`modulated carrier wave at the free frequency. A method for
`near field authentication of sources using a microphone
`input of a receiving computing device includes scanning a
`plurality of predetermined frequencies to detect a signal
`using the microphone input, verifying, responsive to detect(cid:173)
`ing the signal, that the signal includes at least one enclosed
`content message, and extracting a content from the enclosed
`content message.
`
`(Continued)
`
`12 Claims, 9 Drawing Sheets
`
`216
`(------------/"----------~,\
`302a
`302n
`I
`~ - - -~ ~ - - - -
`
`/
`
`- - - - - · / \ . ____ _
`
`/
`
`i
`BEGIN
`I INDICATION
`
`CONTENT
`
`END
`
`I
`INDICATION i
`
`306
`
`308
`
`I 304
`I
`I
`
`I
`I
`I~
`I
`302
`
`Page 1 of 20
`
`GOOGLE EXHIBIT 1001
`
`
`
`US 9,564,952 B2
`Page 2
`
`(58) Field of Classification Search
`USPC ......................................................... 455/41.1
`See application file for complete search history.
`
`A0lK 11/006
`340/10.51
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,323,921 A
`4,337,483 A
`4,405,829 A
`4,450,535 A
`4,633,036 A
`4,652,990 A
`4,672,572 A
`4,747,139 A
`4,868,877 A
`4,977,594 A
`5,005,200 A
`5,019,813 A *
`
`4/1982 Guillou
`6/1982 Guillou
`9/1983 Rivest et al.
`5/1984 de Pommery et al.
`12/1986 Hellman et al.
`3/1987 Pailen et al.
`6/1987 Alsberg
`5/1988 Taafe
`9/1989 Fischer
`12/1990 Shear
`4/1991 Fischer
`5/1991 Kip
`
`5,048,085 A
`5,050,213 A
`5,123,045 A
`5,144,667 A
`5,148,481 A
`5,155,680 A
`5,162,638 A
`5,191,611 A
`5,204,901 A
`5,231,668 A
`5,239,648 A
`5,249,178 A
`5,313,637 A
`5,349,643 A
`5,418,854 A
`5,606,614 A
`6,098,053 A
`6,098,106 A
`6,163,843 A
`6,681,017 Bl
`6,791,982 B2
`6,880,079 B2
`6,999,461 B2
`7,032,110 Bl
`7,032,242 Bl
`7,310,813 B2
`7,444,508 B2
`7,506,056 B2
`7,599,303 B2
`7,600,039 B2
`7,739,401 B2
`7,739,402 B2
`7,818,573 B2
`7,852,861 B2
`7,965,843 Bl
`8,018,937 B2
`8,020,190 B2
`8,375,221 Bl
`8,966,657 B2
`2002/0010864 Al
`2002/0099952 Al
`2002/0112171 Al
`2002/0163889 Al
`2002/0178122 Al
`2003/00637 50 Al
`2003/0070067 Al
`2003/0131001 Al
`2003/0149777 Al
`2003/0182435 Al
`2003/0190046 Al
`2003/0204726 Al
`2003/0212892 Al
`2003/0217263 Al
`2003/0237004 Al
`2004/0003288 Al
`2004/0030912 Al
`
`9/1991 Abraham et al.
`9/1991 Shear
`6/1992 Ostrovsky et al.
`9/1992 Pogue, Jr. et al.
`9/1992 Abraham et al.
`10/1992 Wiedemer
`11/1992 Diehl et al.
`3/1993 Lang
`4/1993 Hershey et al.
`7/1993 Kravitz
`8/1993 Nukui
`9/1993 Kurano et al.
`5/1994 Rose
`9/1994 Cox et al.
`5/1995 Kaufman et al.
`2/1997 Brady et al.
`8/2000 Slater
`8/2000 Philyaw et al.
`12/2000 Inoue et al.
`1/2004 Matias et al.
`9/2004 Westberg
`4/2005 Kelford et al.
`2/2006 Li et al.
`4/2006 Su et al.
`4/2006 Grabel sky et al.
`12/2007 Lin et al.
`10/2008 Karjala et al.
`3/2009 Satish et al.
`10/2009 Nadeau et al.
`10/2009 Tang et al.
`6/2010 Goyal
`6/2010 Roese
`10/2010 Martin et al.
`12/2010 Wu et al.
`6/2011 Maino et al.
`9/2011 Epps et al.
`9/2011 Plununer
`2/2013 Thom et al.
`2/2015 Martinez et al.
`1/2002 Safa
`7/2002 Lambert et al.
`8/2002 Ginter et al.
`11/2002 Yemini et al.
`11/2002 Maes
`4/2003 Medvinsky et al.
`4/2003 Saito
`7/2003 Matsuo
`8/2003 Adler
`9/2003 Redlich et al.
`10/2003 Kamerman et al.
`10/2003 Kelford et al.
`11/2003 Oishi
`11/2003 Sakai
`12/2003 Okamura
`1/2004 Wiseman et al.
`2/2004 Merkle et al.
`
`2004/0038716 Al*
`
`2/2004 Gass
`
`2004/0143746 Al
`2004/0145773 Al
`2004/0187018 Al
`2005/0033957 Al
`2005/0169271 Al
`2005/0187890 Al
`2006/0075134 Al
`2006/0095454 Al
`2006/0130135 Al
`2006/0161914 Al
`2006/0253584 Al
`2006/0271485 Al
`2006/0280207 Al
`2007 /0005974 Al
`2007/0055853 Al
`2007 /0079365 Al
`2007/0153764 Al
`2007/0198850 Al*
`
`7/2004 Ligeti et al.
`7/2004 Oakeson et al.
`9/2004 Owen et al.
`2/2005 Enokida
`8/2005 Janneteau et al.
`8/2005 Sullivan
`4/2006 Aalto et al.
`5/2006 Shankar et al.
`6/2006 Krstulich et al.
`7/2006 Morrison et al.
`11/2006 Dixon et al.
`11/2006 McKenzie et al.
`12/2006 Guarini et al.
`1/2007 Kudou
`3/2007 Hatasaki et al.
`4/2007 Ito et al.
`7/2007 Thubert et al.
`8/2007 Martin
`
`2007/0219917 Al
`2007/0235525 Al
`2008/0022103 Al
`2008/0028114 Al
`2008/0040785 Al
`2008/0049779 Al
`2008/0052775 Al
`2008/0076572 Al
`2008/00807 50 Al *
`
`9/2007 Liu et al.
`10/2007 Murch
`1/2008 Brown et al.
`1/2008 Mun
`2/2008 Shimada
`2/2008 Hopmann et al.
`2/2008 Sandhu et al.
`3/2008 Nguyen et al.
`4/2008 Bee.
`
`H04M 1/6091
`455/569.1
`
`G07C 9/00087
`713/186
`
`G06K 9/00006
`382/124
`
`2008/0082813 Al
`2008/0097924 Al
`2008/0098471 Al
`2008/0114709 Al
`2008/0244739 Al
`2008/0282338 Al
`2008/0298595 Al
`2008/0311994 Al
`2009/0003600 Al
`2009/0006861 Al
`2009/0016264 Al
`2009/0099830 Al
`2009/0113088 Al
`2009/0158426 Al
`2010/0034207 Al
`2010/0100962 Al
`2010/0146589 Al
`2010/0164720 Al
`2010/0199188 Al
`2010/0208899 Al *
`
`2010/0211795 Al
`2010/0269168 Al
`2010/0281261 Al
`2011/0007901 Al
`2011/0026529 Al
`2011/0090896 Al
`2011/0215158 Al*
`
`2011/0295988 Al
`2012/0214416 Al*
`
`2012/0216262 Al*
`
`2012/0275354 Al
`2013/0159701 Al*
`
`4/2008 Chow et al.
`4/2008 Carper et al.
`4/2008 Ooi et al.
`5/2008 Dixon et al.
`10/2008 Liu et al.
`11/2008 Beer
`12/2008 Narayanan et al.
`12/2008 Amaitis et al.
`1/2009 Chen et al.
`1/2009 ven Bemmel
`1/2009 Hirano et al.
`4/2009 Gross et al.
`4/2009 Illowsky et al.
`6/2009 Yoon et al.
`2/2010 McGrew et al.
`4/2010 Boren
`6/2010 Safa
`7/2010 Kore
`8/2010 Abu-Hakima et al.
`8/2010 Kasargod ................ H04S 1/002
`381/1
`
`8/2010 Brown et al.
`10/2010 Hegli et al.
`11/2010 Razzell
`1/2011
`Ikeda et al.
`2/2011 Majumdar et al.
`4/2011 Bradley
`9/2011 Karg! ...................... H04L 27/04
`235/492
`
`12/2011 Le Jouan
`8/2012 Kent ....................... H04L 63/18
`455/41.2
`8/2012 Bardsley ............. H04L 63/0861
`726/5
`
`11/2012 Villain
`6/2013 Phillips ................. H04L 63/045
`713/155
`
`2013/0212389 Al
`
`8/2013 Mccreight et al.
`
`FOREIGN PATENT DOCUMENTS
`
`4 117 548
`JP
`5181734
`JP
`WO 01/09756
`WO
`WO WO 2006/102399
`
`4/1992
`7 /1993
`2/2001
`9/2006
`
`Page 2 of 20
`
`
`
`US 9,564,952 B2
`Page 3
`
`(56)
`
`References Cited
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`
`WO 2008/034900
`WO 2008/052310
`
`3/2008
`5/2008
`
`OTHER PUBLICATIONS
`
`Housley et al., "Internet x.509 Public Key Infracstructure Certificate
`and CRL Profile" The Internet Society, Network Working Group,
`Sep. 1999, 75 pages. [RFC 2459].
`Wikipedia: "Software Extension," May 28, 2009, Internet Article
`retrieved on Oct. 11, 2010. XP002604710.
`H. Williams, et al., "Web Database Applications with PHP &
`MySQL", Chapter 1, "Database Applications and the Web", ISBN
`0-596-00041-3, O'Reilly & Associates, Inc., Mar. 2002, avail. at:
`http://docstore.mik.ua/orelly/webprog/webdb/chO l_0 l .htm.
`XP002603488.
`Zhu, Yunpu, "A New Architecture for Secure Two-Party Mobile
`Payment Transactions," Submitted to the School of Graduate Stud(cid:173)
`ies of the University of Lethbridge, Master of Science, 2010, 240
`pages.
`Ylonen et al., "The Secure Shell (SSH) Authentication Protocol,"
`Network Working Group, Jan. 2006, 17 pages. RFC-4252.
`Nesi, et al., "A Protection Processor for MPEG-21 Players," In
`Proceedings of ICME, 2006, pp. 1357-1360.
`Harrington, D., et al., "An Architecture for Describing Simple
`Network Management Protocol (SNMP) Management Frame(cid:173)
`works," RFC 3411, IETF, Dec. 2002, pp. 1-64.
`Moshchuk, Alexander, et al., "SpyProxy: Execution-based Detec(cid:173)
`tion of Malicious Web Content," 2007, pp. 27-42.
`
`* cited by examiner
`
`Page 3 of 20
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb.7,2017
`Feb. 7, 2017
`
`Sheet 1 of 9
`Sheet 1 of 9
`
`US 9,564,952 B2
`US 9,564,952 B2
`
`100
`100
`
`J
`
`102
`
`102
`
`104
`104
`
`106
`
`FIG. 1
`FIG. 1
`
`Page 4 of 20
`
`Page 4 of 20
`
`
`
`U.S. Patent
`
`Feb.7,2017
`
`Sheet 2 of 9
`
`US 9,564,952 B2
`
`MEMORY 204
`
`NEAR FIELD
`AUTHENTICATION
`TRANSCEIVER
`LOGIC
`214
`
`PERIODIC
`ENCLOSED
`CONTENT
`MESSAGE
`216
`
`DEVICE ID
`GENERATION
`LOGIC
`214
`
`BIOMETRIC
`DATA INPUT
`LOGIC
`214
`
`, "
`
`fr
`
`INPUT
`208
`
`INTERCONNECT 206
`,,
`
`~,,
`
`OUTPUT
`210
`
`FIG. 2
`
`102
`
`f
`
`CPU 202
`
`t
`, "
`
`!
`
`w
`NETWORK
`ACCESS
`CIRCUITRY
`212
`
`Page 5 of 20
`
`
`
`U.S. Patent
`
`Feb.7,2017
`
`Sheet 3 of 9
`
`US 9,564,952 B2
`
`L.W
`
`z
`0
`0~ Zu
`-Cl z -
`f-z
`f-z
`0 u
`
`L.W
`
`z
`ZQ
`-
`f-
`(.!) <(
`UJ u
`co -0 z -
`
`z
`0 o.:=
`z <(
`UJ u
`ci
`z
`
`UJ
`
`f(cid:173)z
`f(cid:173)z
`0 u
`
`\.0
`rl _,,
`N
`
`rtl
`N
`0
`('I')
`
`;;;
`u
`"' 0..
`f-
`
`rn
`l9
`LL
`
`N
`
`('I')
`
`J 0
`----
`
`00
`0 m
`
`\.0
`0 m
`
`z
`ZQ
`-
`f(cid:173)
`t'.:) <(
`L.W u
`co ci
`z
`.__ _ _,__ - - - -
`
`Page 6 of 20
`
`
`
`U.S. Patent
`
`Feb.7,2017
`
`Sheet 4 of 9
`
`US 9,564,952 B2
`
`CONTENT 306
`
`BIOMETRIC
`DATA
`402
`
`DEVICE
`IDENTIFICATION
`DATA
`404
`
`FIG. 4
`
`Page 7 of 20
`
`
`
`U.S. Patent
`
`Feb.7,2017
`
`Sheet 5 of 9
`
`US 9,564,952 B2
`
`MEMORY 504
`
`NEAR FIELD
`AUTHENTICATION
`RECEIVER
`LOGIC
`514
`
`AUTHORIZED
`CONTENT
`516
`
`,~
`,,.
`
`INPUT
`508
`
`INTERCONNECT 506
`,h
`
`~~
`
`OUTPUT
`510
`
`104
`
`f
`
`!
`
`CPU 502
`
`t
`,~
`~,,
`NETWORK
`ACCESS
`CIRCUITRY
`512
`
`FIG. 5
`
`Page 8 of 20
`
`
`
`U.S. Patent
`
`Feb.7,2017
`
`Sheet 6 of 9
`
`US 9,564,952 B2
`
`600
`
`J
`602
`SCANNING A PLURALITY OF PREDETERMINED ~
`
`FREQUENCIES FOR A FREE FREQUENCY
`
`6 04
`SELECTING THE FREE FREQUENCY FROM THE PLURALITY OF ~
`PREDETERMINED FREQUENCIES
`
`GENERATING A PERIODIC ENCLOSED
`CONTENT MESSAGE
`
`~06
`
`,,
`6
`08
`GENERATING A MODULATED CARRIER WAVE REPRESENTIING ~
`THE PERIODIC ENCLOSED CONTENT MESSAGE
`
`,,,
`TRANSMITTING THE MODULATED CARRIER WAVE ~o
`AT THE FREE FREQUENCY
`
`FIG. 6
`
`Page 9 of 20
`
`
`
`U.S. Patent
`
`Feb.7,2017
`
`Sheet 7 of 9
`
`US 9,564,952 B2
`
`700
`
`f
`
`7 02
`DISPLAYING A USER INTERFACE ON THE AUDIO TRANSCEIVER ~
`COMPUTING DEVICE REQUESTING THE BIOMETRIC DATA
`FROM A USER
`
`,r
`
`RESPONSIVE TO RECEIVING THE BIOMETRIC DATA,
`7 04
`GENERATING THE PERIODIC ENCLOSED CONTENT MESSAGE, ~
`WHEREIN THE CONTENT IN EACH PERIOD OF THE PERIODIC
`ENCLOSED CONTENT MESSAGE INCLUDES THE BIOMETRIC
`DATA
`
`FIG. 7
`
`Page 10 of 20
`
`
`
`U.S. Patent
`
`Feb.7,2017
`
`Sheet 8 of 9
`
`US 9,564,952 B2
`
`800
`
`f
`
`802
`SCANNING A PLURALITY OF PREDETERMINED ~
`
`FREQUENCIES TO DETECT A SIGNAL USING THE
`MICROPHONE INPUT
`
`l
`VERIFYING, RESPONSIVE TO DETECTING THE SIGNAL, THAT THE ~
`
`SIGNAL INCLUDES AT LEAST ONE ENCLOSED CONTENT
`MESSAGE
`
`8 04
`
`t
`806
`EXTRACTING A CONTENT FROM THE ~
`ENCLOSED CONTENT MESSAGE
`
`FIG. 8
`
`Page 11 of 20
`
`
`
`U.S. Patent
`
`Feb.7,2017
`
`Sheet 9 of 9
`
`US 9,564,952 B2
`
`900
`
`f
`
`COMPARING THE EXTRACTED CONTENT TO AUTHORIZED
`
`9
`
`CONTENT TO AUTHENTICATE A TRANSCEIVER COMPUTING V 02
`
`DEVICE THAT TRANSMITTED THE ENCLOSED CONTENT
`MESSAGE
`
`"'
`
`PERFORMING A FINANCIAL TRANSACTION BASED ON THE V
`
`ENCLOSED CONTENT MESSAGE WHEN THE TRANSCEIVER
`COMPUTING DEVICE IS AUTHENTICATED
`
`9 04
`
`FIG. 9
`
`Page 12 of 20
`
`
`
`US 9,564,952 B2
`
`1
`NEAR FIELD AUTHENTICATION THROUGH
`COMMUNICATION OF ENCLOSED
`CONTENT SOUND WAVES
`
`This application claims priority to U.S. Provisional Appli(cid:173)
`cation No. 61/595,599, which was filed Feb. 6, 2012, and
`which is fully incorporated herein by reference.
`
`BACKGROUND OF THE INVENTION
`
`5
`
`2
`a mobile computing device transmits an authentication
`request by executing the following salient steps using an
`audio transceiver: scanning a plurality of predetermined
`frequencies for a free frequency, selecting the free frequency
`from the plurality of predetermined frequencies, generating
`a periodic enclosed content message, encoding a carrier
`wave with the periodic enclosed content message, and
`transmitting the modulated carrier wave at the free fre(cid:173)
`quency. The audio transceiver, in one example, may be a
`10 mobile phone having both a speaker and a microphone.
`The periodic enclosed content message includes an
`enclosed content message at each period. The enclosed
`content message comprises a beginning indication, a con(cid:173)
`tent, and an ending indication. The beginning indication
`15 indicates when the enclosed content message begins, while
`the ending indication indicates when the enclosed content
`ends. This allows for verification that the enclosed content
`message is completely instead of partially received. Further(cid:173)
`more, the content can include biometric data or device
`20 identification data, or both, which can be used to authenti(cid:173)
`cate the user or the mobile computing device. Furthermore,
`the content may also include financial information for the
`user, or other data which might be used for gaining access
`to a secure network for facilitating a transaction once the
`25 user or the mobile computing device, or both, have been
`authenticated.
`In another embodiment, the present invention includes a
`computer readable medium useful in association with an
`audio transceiving computing device that includes one or
`30 more processors and a memory, the computer readable
`medium including instructions configured to cause the audio
`transceiving computing device, by execution of the instruc(cid:173)
`tions in the one or more processors from the memory, to
`request authentication by executing the salient steps.
`In another embodiment, the present invention includes a
`mobile computer system including at least one processor, a
`computer readable medium that is operatively coupled to the
`processor, and a transmission logic that (i) executes in the
`processor from the computer readable medium and (ii) when
`40 executed by the processor causes the mobile computer
`system to request authentication by executing the salient
`steps.
`The invention also provides a method for receiving an
`authentication request using an audio or microphone input of
`45 a receiving computing device by executing the following
`second set of salient steps: scanning a plurality of predeter(cid:173)
`mined frequencies to detect a signal using the microphone
`input, verifying, responsive to detecting the signal, that the
`signal includes at least one enclosed content message, and
`50 extracting a content from the enclosed content message.
`Another embodiment of the invention comprises a com(cid:173)
`puter readable medium useful in association with an audio
`receiving computing device that includes one or more pro(cid:173)
`cessors, an audio or microphone input, and a memory, the
`55 computer readable medium including computer instructions
`which are configured to cause the audio receiving computing
`device, by execution of the computer instructions in the one
`or more processors from the memory, to receive an authen(cid:173)
`tication request by execution of the second set of salient
`60 steps.
`In another embodiment, a present invention is a computer
`system including at least one processor, an audio input that
`is operatively coupled to the processor, a computer readable
`medium that is operatively coupled to the processor, and a
`65 near field authentication receiver logic that (i) executes in
`the processor from the computer readable medium and (ii)
`when executed by the processor causes the computer system
`
`1. Field of the Invention
`The present invention relates generally to technology for
`near field authentication of users and their computing
`devices. More specifically, the invention relates to effecting
`near field authentication for digital communications by
`means of encoded sound waves.
`2. Description of the Related Art
`The use of a user's electronic device to complete a
`purchase has been suggested, for example, utilizing Blu(cid:173)
`etooth technology or a WiFi Internet connection to transmit
`the data to the register. However, such technology requires
`a transactional device such as a register or ATM machine to
`be upgraded and retrofitted with expensive equipment and
`software to securely receive the data and authenticate the
`user's electronic device. Thus, while it may be desirable for
`the user, it could be prohibitively expensive for the com(cid:173)
`mercial entity utilizing the transactional device, especially
`for small businesses.
`The use of other technology aside from the Internet or the
`Bluetooth may also require not only that the transactional
`device be upgraded and retrofitted, but also that the user's
`electronic device be similarly modified. In addition, alter(cid:173)
`native technology may also have range limitations which
`can degrade the user's experience when performing a trans(cid:173)
`action. For example, in a conventional near field commu- 35
`nication, radio communication is utilized to facilitate trans(cid:173)
`actions. However,
`the
`conventional
`near
`field
`communication requires that the two transacting devices be
`in extremely close proximity to each other, i.e., within about
`4 centimeters from each other to ensure reliable communi(cid:173)
`cation. This requirement for close proximity places a very
`restrictive limitation on practical applications for near field
`transactions in the real world. If one of the transacting
`devices is a cash register, and the other transacting device is
`a customer's mobile phone, the customer would need to
`extend the phone to within centimeters of the register and
`risk dropping the phone. The proximity limitation may also
`prevent the user from making further use of the phone while
`the transaction is taking place and while the phone is
`extended away from the customer. For example, should
`complications in the transaction arise, or if the user is
`required to provide a manual input, the customer may not be
`able to complete the transaction.
`Another drawback of the conventional near field commu(cid:173)
`nication is the lack of security, despite the close proximity
`of the two devices. That is, the conventional near field
`communication offers no protection against eavesdropping
`and can be vulnerable to data modifications. Needless to say,
`this is undesirable for financial transactions and other con(cid:173)
`fidential communications.
`Thus, there is a need for improved technology for effect(cid:173)
`ing near field communications.
`
`SUMMARY OF THE INVENTION
`
`The present invention provides a method for source
`authentication in network communications. A source such as
`
`Page 13 of 20
`
`
`
`US 9,564,952 B2
`
`3
`to receive an authentication request via the audio input by
`execution of the second set of salient steps.
`In an embodiment, the near field authentication of sources
`using audio waves can be used in conjunction with a
`conventional online transaction to provide enhanced secu-
`rity for transactions, such as payments and electronic or
`personal access to confidential files or secure locations.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`5
`
`4
`device 102 can transmit data to the audio receiving com(cid:173)
`puting device 104 as a modulated carrier wave 106. The
`modulated carrier wave 106 can be, for example, a sound
`wave. Sound waves can transmit information accurately
`over a very short distance (near field communications) using
`inexpensive equipment. In different embodiments, the sound
`wave can have a frequency that is substantially below,
`within, or above the audible frequencies, such as below 20
`Hz, between 20 Hz and 20 kHz, or above 20 kHz. For
`10 example, the sound wave could be an ultrasonic wave.
`The audio transceiver computing device 102 can be, for
`example, a mobile phone, a personal digital assistant, a
`tablet, a laptop, a music player, or any other device having
`a processor operatively coupled to memory and capable of
`15 transmitting the modulated carrier wave 106 responsive to
`operation of the processor. As seen in FIG. 2, the audio
`transceiver computing device 102 can include, for example
`one or more microprocessors, which are collectively shown
`as CPU 202. The audio transceiver computing device 102
`20 also includes, for example, a memory 204, an interconnect
`206, an input 208, an output 210, and/or a network access
`circuitry 212. The CPU 202 can retrieve data and/or instruc(cid:173)
`tions from the memory 204 and execute the retrieved
`instructions. The memory 204 can include generally any
`25 computer-readable medium including, for example, persis(cid:173)
`tent memory such as magnetic and/or optical disks, ROM,
`and PROM and volatile memory such as RAM.
`The CPU 202 and the memory 204 are connected to one
`another through the interconnect 206, which is a bus in this
`30 illustrative embodiment. The interconnect 206 connects the
`CPU 202 and the memory 204 to the input devices 208, the
`output devices 210, and the network access circuitry 212.
`The input devices 208 can include, for example, a keyboard,
`a keypad, a touch-sensitive screen, a mouse, a microphone,
`35 and/or one or more cameras. The output devices 210 can
`include, for example, a display-such as a liquid crystal
`display (LCD)-and/or one or more speakers. The network
`access circuitry 212 sends and receives data through com-
`puter networks such an intranet or the Internet.
`A number of components of the audio transceiver com-
`puting device 102 are stored in the memory 204. In particu(cid:173)
`lar, a near field authentication transceiver logic 214 is part of
`one or more computer processes executed within the CPU
`202 from the memory 204 in this illustrative embodiment,
`45 but can also be implemented using digital logic circuitry. As
`used herein, "logic" refers to (i) logic implemented as
`computer instructions and/or data within one or more com(cid:173)
`puter processes and/or (ii) logic implemented in electronic
`circuitry.
`In an embodiment, the near field authentication trans-
`ceiver logic 214 is executable software stored within the
`memory 204. For example, when the audio transmitting
`computing device 102 receives a request from the user to
`transmit the modulated carrier wave 106, the audio trans-
`55 ceiver computing device 102 executes the near field authen(cid:173)
`tication transceiver logic 214 to transmit the modulated
`carrier wave 106 to the audio receiving computing device
`104. As previously noted the modulate carrier wave 106 can
`be an analog signal, such as a sound signal. Advantageously,
`60 an analog signal has an infinite amount of signal resolution.
`Furthermore, the use of sound signals increases the permis(cid:173)
`sible transmission distance. That is, the theoretical and
`practical working distance for completing a transaction
`using the present invention is increased and can be mea-
`65 sured, for example, in feet or meters instead of centimeters.
`This allows the user to utilize the audio transceiver com(cid:173)
`puting device 102 for additional functions simultaneously
`
`Other systems, methods, features and advantages of the
`invention will be or will become apparent to one with skill
`in the art upon examination of the following figures and
`detailed description. It is intended that all such additional
`systems, methods, features and advantages be included
`within this description, be within the scope of the invention,
`and be protected by the accompanying claims. Component
`parts shown in the drawings are not necessarily to scale, and
`may be exaggerated to better illustrate the important features
`of the invention. In the drawings, like reference numerals
`may designate like parts throughout the different views,
`wherein:
`FIG. 1 is a block diagram showing an audio transceiving
`computing device transmitting data to an audio receiving
`computing device in accordance with one embodiment of
`the present invention.
`FIG. 2 is a block diagram showing functional components
`that make up an audio transceiving computing device
`according to an embodiment of the present invention.
`FIG. 3 depicts a periodic enclosed content message
`according to an embodiment of the present invention.
`FIG. 4 is a block diagram depicting message content in an
`enclosed content message according to an embodiment of
`the present invention.
`FIG. 5 is a block diagram showing functional components
`of an audio receiving computing device according to an
`embodiment of the present invention.
`FIG. 6 is a process flow diagram showing steps for an
`audio transceiving computing device to request authentica(cid:173)
`tion from an audio receiving computing device according to 40
`an embodiment of the present invention.
`FIG. 7 depicts additional process steps for inputting
`content for an enclosed content message into an audio
`transceiving computing device in advance of requesting
`authentication according to an embodiment of the present
`invention.
`FIG. 8 is a process flow diagram showing steps for
`receiving an audio transmission of enclosed content data
`using a microphone input of a receiving computing device
`according to an embodiment of the present invention.
`FIG. 9 depicts additional process steps for authenticating
`an audio transceiving device according to an embodiment of
`the present invention.
`
`50
`
`DETAILED DESCRIPTION
`
`The present invention relates to a method and system for
`near field authentication of users and computing devices
`using sound waves. Such users and computing devices may
`be referred to collectively herein as "sources". Authenticat(cid:173)
`ing a source according to the present invention may involve
`authenticating only a user, only a computing device, or both
`a user and a computing device.
`As seen in FIG. 1, a system 100 for authenticating sources
`using sounds waves can include, for example, an audio
`transceiving computing device 102, and an audio receiving
`computing device 104. The audio transceiving computing
`
`Page 14 of 20
`
`
`
`US 9,564,952 B2
`
`10
`
`5
`while completing a transaction. It also reduces a likelihood
`that the user will be prone to dropping or otherwise dam(cid:173)
`aging the audio transceiver computing device 102 by mov(cid:173)
`ing the audio transceiver computing device 102 into very
`close proximity with the audio receiving computing device 5
`104.
`When the near field authentication transceiver logic 214 is
`executed, the audio transceiver computing device 102 scans
`a plurality of predetermined frequencies for a free frequency.
`The predetermined frequencies can be, for example, fre-
`quencies for which the audio transceiver computing device
`102 is authorized to transmit the modulated carrier wave or
`which are known to the audio receiving computing device
`104. In an embodiment, the predetermined frequencies can
`be selected to be outside the audible frequencies. From the
`predetermined frequencies, the near field authentication
`transceiver logic 214 can select a free frequency. The free
`frequency can be, for example, a frequency which has a
`noise level below a predetermined noise level threshold or a
`frequency that has an interference level below a predeter(cid:173)
`mined interference level threshold.
`The near field authentication transceiver logic 214 can
`also generate a periodic enclosed content message 216 as
`shown in FIG. 2. To generate the periodic enclosed content
`message 216, the near field authentication transceiver logic
`214 can utilize a device ID generation logic 218 or a
`biometric data input logic 220, or both. The device ID
`generation logic 218 can generate, for example, device
`identification data of the audio transceiver computing device
`102. In an embodiment, the device ID generation logic 218
`can utilize known techniques for generating a device fin(cid:173)
`gerprint. The biometric data input logic 220 can display, for
`example, a user interface for requesting and receiving a
`voice or image input representing biometric data. The device
`identification data or the biometric data, or both, can be
`included in a content of the periodic enclosed content
`message 216, which will be described later.
`The near field authentication transceiver logic 214 can
`also generate a modulated carrier wave 106 representing the
`periodic enclosed content message. The modulated carrier
`wave 106 can be transmitted at the free frequency to the
`audio receiving computing device 104. Preferably, the peri(cid:173)
`odic enclosed content message is generated initially in
`digital format, and is then converted into an analog signal
`and used to modulate the carrier wave. In an embodiment,
`the digital form of the periodic enclosed content message
`216 can be encrypted using standard RSA (PKI) keys. Key
`exchanges may occur out-of-band, such as during registra(cid:173)
`tion of the audio transceiver computing device 102, or may
`be built-in to the near field authentication transceiver logic 50
`214.
`As can be seen in FIG. 3, the periodic enclosed content
`message 216 includes, for example, multiple periods with
`each period including an enclosed content message 302.
`Thus, the periodic enclosed content message 216 includes a
`plurality of enclosed content messages 302 such as enclosed
`content messages 302a-302n for a total of N enclosed
`content messages. Each of the enclosed content messages
`includes a begin indication 304, a content 306, and an end
`indication 308. The begin indication 304 can be any type of
`signal that uniquely indicates the beginning of the enclosed
`content message, for example, a specified sequence of
`binary bits. Similarly, the end indication 308 can be any type
`of signal that indicates the ending of the enclosed content
`message. In one embodiment, the begin indication 304 and
`the end indication 308 comprise different signals. In another
`embodiment, the begin indication 304 and the end indication
`
`6
`308 comprise identical signals, i.e. two of the same signals
`in sequence. In another embodiment, an end indication
`308(n-1) and the next begin indication 304(n) may be one
`and the same signal.
`Referring to FIG. 4, the content 306 can include, for
`example, biometric data 402 or a device identification data
`404 or a combination of both. The biometric data 402 can
`include, for example, the data corresponding to a voice of a
`user, a fingerprint of the user, an image of the user, or any
`other physiological data of the user which can be used to
`verify an identity of the user. The device identification data
`404 can include, for example, a MAC address of the audio
`transceiver computing device 102, a hard disk serial number
`15 of the audio transceiver computing device 102, a device ID
`number of the audio transceiver computing device 102, a
`device phone number of the audio transceiver computing
`device 102, a device fingerprint of the audio transceiver
`computing device 102, or any other information which could
`20 be used to identify and verify the authenticity of the audio
`transceiver computing device 102.
`A device fingerprint comprises binary data that identifies
`the audio transceiver computing device 102 by deriving a
`unique data string from multiple portions of indicia stored