throbber
I 1111111111111111 11111 1111111111 111111111111111 11111 11111 1111111111 11111111
`US009679289B 1
`
`c12) United States Patent
`Brown
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,679,289 Bl
`*Jun. 13, 2017
`
`(52) U.S. Cl.
`CPC ........... G06Q 201363 (2013.01); G06F 21132
`(2013.01); G06F 21135 (2013.01); G06Q
`20/40145 (2013.01); H04L 63/0492 (2013.01);
`H04L 63/0861 (2013.01); H04L 63/10
`(2013.01); H04W 12104 (2013.01); H04W
`12108 (2013.01); H04W 88102 (2013.01)
`(58) Field of Classification Search
`USPC .............................................................. 726/3
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,623,552 A
`6,728,397 B2
`
`4/1997 Lane
`4/2004 McNeal
`(Continued)
`Jason Lee
`Primary Examiner -
`(74) Attorney, Agent, or Firm - Patent Law Works LLP
`
`ABSTRACT
`(57)
`A hybrid device includes a personal digital key (PDK) and
`a receiver-decoder circuit (RDC). The PDK and RDC of the
`hybrid device are coupled for communication with each
`other. In one embodiment, the hybrid device also provides a
`physical interconnect for connecting to other devices to send
`and receive control signals and data, and receive power. The
`hybrid device operates in one of several modes including,
`PDK only, RDC only, or PDK and RDC. This allows a
`variety of system configurations for mixed operation includ(cid:173)
`ing: PDK/RDC, RDC/RDC or PDK/PDK. The present
`invention also includes a number of system configurations
`for use of the hybrid device including: use of the hybrid
`device in a cell phone; simultaneous use of the PDK and the
`RDC functionality of hybrid device; use of multiple links of
`hybrid device to generate an authorization signal, use of
`multiple PDK links to the hybrid device to generate an
`authorization signal; and use of the hybrid device for autho(cid:173)
`rization inheritance.
`20 Claims, 15 Drawing Sheets
`
`120C
`
`Application 120A
`
`(54) HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODS OF USE
`
`(71) Applicant: Proxense, LLC, Bend, OR (US)
`
`(72)
`
`Inventor: David L. Brown, Jupiter, FL (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by O days.
`
`This patent is subject to a terminal dis(cid:173)
`claimer.
`
`(21) Appl. No.: 14/961,645
`
`(22) Filed:
`
`Dec. 7, 2015
`
`(63)
`
`(51)
`
`Related U.S. Application Data
`
`Continuation of application No. 14/677,893, filed on
`Apr. 2, 2015, now Pat. No. 9,235,700, which is a
`continuation of application No. 14/171,705, filed on
`Feb. 3, 2014, now Pat. No. 9,049,188, which is a
`continuation of application No. 13/445,825, filed on
`Apr. 12, 2012, now Pat. No. 8,646,042, which is a
`continuation of application No. 12/329,329, filed on
`Dec. 5, 2008, now Pat. No. 8,171,528.
`(Continued)
`
`Int. Cl.
`H04L 29106
`G06Q 20136
`H04W 12104
`H04W 12108
`G06F 21132
`G06F 21135
`G06Q 20140
`H04W88/02
`
`(2006.01)
`(2012.01)
`(2009.01)
`(2009.01)
`(2013.01)
`(2013.01)
`(2012.01)
`(2009.01)
`
`100
`
`POK 102
`
`Service
`Blk 112A
`112B
`112C
`
`112N
`
`106
`
`---=zb--
`
`Sensor 108
`
`Access
`Kev 118A
`118D
`118F
`
`Biometrics
`104
`
`Page 1 of 29
`
`GOOGLE EXHIBIT 1001
`
`

`

`US 9,679,289 Bl
`Page 2
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/992,953, filed on Dec.
`6, 2007.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`6,879,966 Bl
`7,159,765 B2
`7,231,068 B2
`7,349,557 B2
`7,565,329 B2
`8,678,273 B2
`2005/0116020 Al
`2007 /0271194 Al*
`
`4/2005 Lapsley et al.
`1/2007 Frerking
`6/2007 Tibor
`3/2008 Tibor
`7/2009 Lapsley et al.
`3/2014 McNeal
`6/2005 Smolucha et al.
`11/2007 Walker .
`
`* cited by examiner
`
`G06Q 30/02
`705/80
`
`Page 2 of 29
`
`

`

`U.S. Patent
`
`Jun.13,2017
`
`Sheet 1 of 15
`
`US 9,679,289 Bl
`
`<(
`0
`N
`
`u
`
`0
`N
`
`sir-
`
`CJ
`LL
`
`00
`0
`
`I....
`
`0 en
`C
`Q.)
`Cf)
`
`en <(
`en oo
`Q.) ..-
`(.) ..-
`(.) >-
`<( Q.)
`:::.::::
`
`0 LL
`00 00
`..- ..-
`..- ..-
`
`en
`(.) :s -.;:J(cid:173)
`Q.) 0 E ..(cid:173)
`a
`a5
`
`(0
`0
`
`N
`0
`
`:::.::::
`0 a..
`
`Q.) <(
`.!:! ~ co
`2:: ..- N ..-
`Q.) ~ ..-
`Cf) -co
`
`u
`N ..-
`..-
`
`Page 3 of 29
`
`

`

`U.S. Patent
`
`Jun.13,2017
`
`Sheet 2 of 15
`
`US 9,679,289 Bl
`
`~
`
`~
`
`I....
`Q.)
`>
`·cvo
`(.) r--
`~N
`ro
`I-
`
`I....
`
`C
`en o
`en :;::;
`ro o
`a.>
`~ .!:!~
`~ §:
`<(
`
`<D
`..
`N
`......
`
`(.)
`Q.)
`Q.)
`Cf)
`co
`Cf)
`
`..,._,
`00
`..-
`N
`..-
`N
`m
`...::.
`ro
`:::.::::
`0
`v9c ldAl::iaofldAJ:lU:J
`I
`c9c Jopa1as
`
`:;:::;-
`(.)
`Q.)
`Q.)
`Cf)
`co
`~
`
`N
`CJ
`LL
`
`Q.) <(
`co
`U N
`-- ..-
`2:: ..-
`N
`..-
`Q.) ~ ..-
`Cf) co
`
`u
`N
`..-
`..-
`
`I
`
`I
`
`I
`
`z
`N
`..-
`..-
`
`~
`
`.)
`
`r
`
`N
`0 ...---
`~
`0
`0....
`
`0
`L.C)
`N
`
`0
`..-
`N
`c:-
`0
`E
`Q.)
`~
`
`\...
`
`Page 4 of 29
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun.13,2017
`Jun. 13, 2017
`
`Sheet 3 of 15
`Sheet 3 of 15
`
`US 9,679,289 Bl
`US 9,679,289 B1
`
`~
`I....
`O o
`:s ..-
`ID ..-
`z
`
`~ I.
`
`OLL80€
`
`
`
`OMAN908COE}J0}U|
`
`(Sn}e}g
`
`U) 0
`::::,~
`CU C
`Cf) u
`...... 0
`
`jo.UO.)
`
`~ I.
`
`t
`ON
`a....-
`
`QC"")
`
`CV')
`
`€Old
`
`CJ
`LL
`
`I....
`
`JOSS8901q
`
`0 en
`en co
`90€
`Q.) 0
`(.) C"") e
`a..
`
`I
`
`u -.;:J-
`00
`0::: C"")
`
`,,
`
`~N
`00
`a.. ...--
`
`
`
`
`HOMISN(s)iapeoy
`
`(.) ..........
`-;::~
`ID ID N
`E -o o
`o
`ro M
`- - Q.)
`co 0:::
`
`~ Q.)
`I....
`(.)
`o
`ro oo
`~ ' t :o
`Q.) 2 C"")
`Z
`C
`
`
`
`90]JosueS
`
`00
`0 ...-
`I.....
`0
`Cf)
`C:
`Q)
`CJ)
`
`ouOWolg
`
`'I.
`
`Page 5 of 29
`
`Page 5 of 29
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun.13,2017
`Jun. 13, 2017
`
`Sheet 4 of 15
`Sheet 4 of 15
`
`US 9,679,289 Bl
`US 9,679,289 B1
`
`
`
`Cf) u a..
`
`I....
`
`00
`0 ..-
`0 en
`C
`Q.)
`Cf)
`
`01¢a0Inaqauojepuels/oq80},Josuag
`
`COLAdd
`
`0 ..-
`
`L.C)
`Q.)
`(.)
`·5
`Q.)
`0
`Q.)
`C
`0
`ro
`"O
`C ro
`......
`
`
`
`
`
`>-
`C
`Q.)
`0
`:::.:::: co
`:;:::;
`ast
`ro o
`Oc
`en oo
`·a.~ ~ ......
`U N
`en ..-
`
`uoneoiddy
`
`c..
`<(
`
`Kaysseooy
`
`(.)
`<(
`
`- o
`0.... N
`<( L.C)
`
`en <(
`en oo 0 LL
`Q.) ..- 00 00
`(.) ..- ..- ..-
`(.) >- ..- ..-
`<( Q.)
`:::.::::
`
`yOla
`
`~
`CJ
`LL
`
`(0
`0
`
`N
`0
`
`:::.::::
`0 a..
`
`Page 6 of 29
`
`VellAIG
`
`9019S
`
`co u
`Chl
`deb
`N N
`..- ..-
`..- ..-
`Q.) ~
`
`Q.) <(
`U N
`·2: ;:::
`Cf) -co
`
`Page 6 of 29
`
`

`

`Jun.13,2017
`Jun. 13, 2017
`
`Sheet 5 of 15
`Sheet 5 of 15
`
`Q) u -~
`
`Q)
`(./)
`
`
`
`BIIAIGS|BUIS]X4
`
`C'O
`,._
`c::
`Q)
`
`>< w
`
`US 9,679,289 Bl
`US 9,679,289 B1
`
`LC')
`
`GOld
`
`(9
`LL
`
`uogeoddy
`
`>,
`c::
`Q)
`0
`~o ~ (Cl
`ash
`0c}
`en oo
`UN
`·a_ -r-
`en ..-
`~ ......
`u
`Cl.
`<(
`<(
`
`Keysseooy
`
`)
`I
`
`0 ..-
`..-
`-c:
`0
`~ I
`Q) z
`
`uoneoddy
`
`c::
`0
`~
`.S:2
`Cl.
`Cl.
`<(
`
`-o
`0... N
`<( L.O
`
`N u=;
`u ">
`
`Q)
`
`
`
`Josuas Iebh
`
`CLGBIABPOHOMPN/Od
`
`Q)
`0
`"'C
`Q)
`,._
`.:,,::
`0
`~
`z
`u
`
`Q)
`
`0...
`
`VELLAey
`
`ssa00y
`
`en <(
`en oo 0 LL
`Q) ..- 00 00
`u..- ..- ..-
`u >- ..- ..-
`<( Q)
`~
`
`9Q|
`
`00
`0 ..-
`0
`en
`c::
`Q)
`(./)
`
`<D
`0
`
`N
`0
`
`cOl¥dd
`
`~
`0
`0...
`
`S0IMOS
`
`Q)
`
`Q) <(
`(Cl u
`gcbh
`.S:2 ~
`2'.: ..-
`N N
`..- ..-
`..- ..-
`(./) -(Cl
`
`Welt4d
`
`.:,,::
`
`U.S. Patent
`U.S. Patent
`
`Page 7 of 29
`
`Page 7 of 29
`
`

`

`Ul
`
`....
`0 ....
`O'I
`.....
`=- ('D
`
`('D
`
`rJJ
`
`....
`~ = ? ....
`
`-....J
`0
`N
`~~
`
`= ~
`
`~
`~
`~
`~
`
`00 .
`e .
`
`'\.11 App 120Z3
`
`I
`
`510Z3
`
`I
`
`"
`
`11 Key 118B 11
`
`I App 120Z2
`I 510Z2 I I
`
`~'\
`
`108Z
`
`/
`
`11
`
`11 Key 118A
`
`/
`
`I
`
`I App 120Z1 I
`
`510Z1
`
`Key 11 SF
`
`Key 118C
`
`120Y2
`App
`
`App
`
`510Y
`
`\0 = """'
`
`00
`'N
`\0
`-....l
`O'I
`\0
`d r.,;_
`
`1 1 Key 118B 11
`
`FIG. 6
`
`j
`I I
`
`112N
`
`■
`
`l
`I
`
`Key 118C
`
`App 120V I
`I
`
`510V
`
`I I 112B I I
`App 120W 11 ~ I I Service I
`POK 102 µ
`
`Key 118C 11
`
`I
`
`510W
`
`112C
`
`Blk 112A
`
`~ 120Y1
`....
`
`I
`
`I
`
`Key 118C 11
`App 120X 11 ~
`
`I
`
`510X
`
`Page 8 of 29
`
`

`

`U.S. Patent
`
`Jun.13,2017
`
`Sheet 7 of 15
`
`US 9,679,289 Bl
`
`C: Q.)
`
`0 cu =
`·- u
`~ LL 8 0:::
`u
`
`Q.)
`C:
`
`~:!=
`"O C:
`C: :::J
`.m
`
`(./")
`
`r-(cid:173)
`C)
`LL
`
`0£L 1/\ll/\JS
`
`Ovl sng
`
`~
`C: N
`r--= 0)
`0
`ro c:
`c:.., · -
`0 ~
`c:.., ro
`_J
`~
`
`0)
`C:
`·a, co
`ro o
`U> N
`:g r--
`2
`
`u
`0
`N r--
`~
`Q.)
`<(
`
`~o
`ro o
`o....~
`"O U)
`.!:::: 0..
`..s:::: 0..
`I- <(
`
`U)
`0..
`0..
`<( w
`Q.) 0
`+-'N Or--
`E
`Q.)
`0:::
`
`ro
`,..._
`,..._
`C: ~
`Q.) 0 x~
`w Q.)
`oZ
`I-
`
`Page 9 of 29
`
`

`

`U.S. Patent
`
`Jun.13,2017
`
`Sheet 8 of 15
`
`US 9,679,289 Bl
`
`830~
`
`830~
`
`FIG. 8
`
`FIG. 9
`
`Page 10 of 29
`
`

`

`\0 = "'"'
`
`00
`'N
`\0
`-....l
`O'I
`\0
`d r.,;_
`
`FIG. 10
`
`N
`~~
`
`0 ....
`? ....
`2'
`
`-....J
`
`~ = ~
`
`~
`~
`~
`
`00 .
`e .
`
`presses button 1
`
`1010 User
`
`I
`
`PD!tj
`
`Beacon (no Aux. Data
`
`I Sensor I
`
`oordinator
`
`AQQlication
`
`button 1
`
`1060 POK clears
`
`ALOHA (no Alerts
`
`Beacon(Button
`
`I• I ALOHA ,Button 1 Alertl I I
`
`I
`
`1050B
`
`I•
`
`B
`
`I 1 0S0A I
`1040 Operator clears 11 • .........,...~-
`
`alert (button 1)
`
`request displayed
`
`1 030 Service
`
`Ul
`
`....
`0 ....
`.....
`rJJ =(cid:173)
`
`1,0
`
`('D
`('D
`
`Page 11 of 29
`
`

`

`U.S. Patent
`
`Jun.13,2017
`
`Sheet 10 of 15
`
`US 9,679,289 Bl
`
`a::: w
`wU
`I>
`I- w
`Oo
`
`<.D
`0 ...--(cid:173)
`...---
`
`-.;:I'"
`0
`...---
`...---
`
`rol
`0N
`::::s::::
`a..~
`
`rol
`u
`0
`0::: g
`
`-.;:J-
`
`sir-
`
`sir-.
`CJ
`LL
`
`N
`0
`...---
`...---
`Q) u
`">
`Q)
`0
`"O
`·c
`..0
`:r:
`
`Page 12 of 29
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun.13,2017
`Jun. 13, 2017
`
`Sheet 11 of 15
`Sheet 11 of 15
`
`US 9,679,289 Bl
`US 9,679,289 B1
`
`
`
`COC)9UOUdIl9D
`
`<D
`0 ..--
`..--
`
`C'il v
`
`C)
`CV)
`
`u
`0
`0:::
`
`Asayeg9sjuasuodwo)
`
`
`
`BU0Ud[9D
`
`c:-
`£:l
`C'il
`a> en
`5 od v
`..s:::: en o
`0... t: N
`Q) .,....
`a3
`C:
`u 0
`Cl.
`E
`0 u
`
`.._,.
`0 ..--
`
`..--(
`
`C'il
`N
`C)
`:::.:::
`0
`0...
`
`N
`0 ..--
`..--
`
`N
`
`~
`
`chOld
`
`■ CJ
`LL
`
`N
`0
`N
`
`
`
`~
`Q)
`C:
`0
`...c:
`0....
`
`Q)
`0
`
`BOLNdd EOEOdY42014d
`
`(X)
`0
`N ..--
`
`PIEDWIS
`
`9021
`
`.0
`N
`C)
`:::.:::
`0
`0...
`
`Page 13 of 29
`
`Page 13 of 29
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun.13,2017
`Jun. 13, 2017
`
`Sheet 12 of 15
`Sheet 12 of 15
`
`US 9,679,289 Bl
`US 9,679,289 B1
`
`.0
`
`("")
`
`qv0€OdY
`
`"'-'" 0
`u
`0
`0:::
`
` elOld
`
`"<:j'"
`
`0 ..--
`..--
`
`ec0ldd
`
`ro
`N
`0
`:::.:::
`0
`0..
`
`ey0eOdY
`
`ro
`"'-'"
`0
`("")
`u
`0
`0:::
`
`("')
`sir-
`.
`(9
`LL
`
`N
`0
`CV)
`..--
`
`"<:j'"
`0
`CV)
`..--
`
`N
`0
`
`~
`
`~
`Q)
`0
`">
`Q)
`0
`"'O
`·c
`..0
`:r:
`
`OOEL
`
`Page 14 of 29
`
`Page 14 of 29
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun.13,2017
`Jun. 13, 2017
`
`Sheet 13 of 15
`Sheet 13 of 15
`
`US 9,679,289 Bl
`US 9,679,289 B1
`
`....J
`
`<( z
`C,
`Cl)
`w
`....J
`l'.lJ
`
`
`
`TWNOISATEaVN3
`
`<( z
`w
`
`9071
`
`<.O
`0
`s;j""
`..--
`
`evOeOCH
`
`m
`-.::I"
`0
`("")
`u
`0
`0::::
`
`~
`~
`
`vbOls
`
`■
`
`(9
`LL
`
`qv0eOdy
`
`.0
`-.::I"
`0
`("")
`u
`0
`0::::
`
`EOLdd
`
`m
`N
`0
`::.:::
`0 a..
`
`s;j""
`
`0 ..--
`..--
`
`N
`0
`s;j""
`..--
`
`
`
`COLLS9lAeq
`
`N
`0 ...---
`...---
`Q)
`(..)
`">
`Q)
`0
`"'O
`·c
`..0
`:r:
`
`Oorl
`
`Page 15 of 29
`
`G20)4dd
`
`.0
`N
`0
`::.:::
`0 a..
`
`PHQAH
`
`Page 15 of 29
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun.13,2017
`Jun. 13, 2017
`
`Sheet 14 of 15
`Sheet 14 of 15
`
`US 9,679,289 Bl
`US 9,679,289 B1
`
`
`
`TWNOISAT8VNA
`
`....J
`<(
`z
`C,
`(f)
`w
`....J
`((l
`<(
`z
`w
`
`<D
`0
`I.()
`...----
`
`LO
`sir-
`
`SlSls
`
`■
`
`(9
`LL
`
`e2OlAdd UZOLdd
`
`OOS1
`
`N
`0 ...---
`...---
`Q)
`(.)
`">
`Q)
`0
`"O
`·c
`.0
`:r:
`
`s;:t
`0
`...----
`...----
`
`ro
`N
`0
`:::.:::
`0 n.
`
`("')
`
`ep0eOY
`
`ro
`""" 0
`u
`0 a:::
`
`G014dd
`
`.c
`N
`0
`:::.:::
`0 n.
`
`• • •
`
`C
`N
`0
`:::.:::
`0 n.
`
`Page 16 of 29
`
`Page 16 of 29
`
`

`

`\0 = """'
`
`00
`'N
`\0
`-....l
`O'I
`\0
`r.,;_
`d
`
`....
`....
`0
`Ul
`....
`.....
`rJJ =-
`
`('D
`('D
`
`Ul
`
`~
`
`~ = ~
`
`~
`~
`~
`
`.
`.
`e
`
`00
`
`0 ....
`....
`= ?
`
`--....J
`
`N
`~~
`
`1652
`
`I
`
`I ---
`
`RDC/Wi-Fi Service
`
`1600
`
`~ 7 ::: RDC 304b
`I
`
`__,___
`
`I
`
`I
`
`I ''t'
`
`1104
`
`POK 102a
`
`H~brid Device 1102b
`
`I
`
`'¥:
`
`I
`
`POK 102b
`
`FIG.16
`
`I I
`
`1616
`
`Personality Inheritance
`
`I
`
`I
`
`Feature Inheritance 1614
`
`/I
`
`I
`
`I
`
`'\.I
`
`Cell Account 2
`Credit Cart Acct. 2
`
`Service Inheritance 1612
`
`l"'-..1 Comp. B Access _.,, I I
`I
`I ~ /
`
`I I
`
`I
`
`I
`
`1606
`
`Personality Inheritance
`
`\
`
`1650
`
`Feature Inheritance I I
`
`1604
`
`I I "
`
`Comp. A Access
`
`Wi-Fi Access Acct
`Cell Account 1
`Credit Cart Acct. 1
`
`16il2
`
`Service Inheritance
`
`Page 17 of 29
`
`

`

`US 9,679,289 Bl
`
`1
`HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODS OF USE
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`5
`
`2
`accomplished, location tracking (i.e., knowledge about the
`location of an object or person) is generally useful. For
`example, location tracking information can be used to track
`inventory and trace the route of objects through various
`locations. It can be used for time and motion studies. If tags
`are attached to people, then tracking of people can be used
`to better understand their behavior. Knowledge about a
`person's location (and/or their past locations and projected
`future locations) could be used to provide better services to
`10 that person.
`However, most proximity systems and location tracking
`systems have limited capabilities. Typically, the proximity
`sensor, RFID tag or similar device is a dumb device, in the
`15 sense that the device is designed and has the capability only
`to report its location. For example, such devices typically do
`not have the capabilities to run different applications or to
`even interact with different applications. Furthermore, these
`systems typically are proprietary and narrowly tailored for a
`20 specific situation, thus preventing easy expandability to
`other situations or third party applications.
`
`SUMMARY
`
`pnonty under
`claims
`application
`present
`The
`35 U.S.C. §120 to U.S. patent application Ser. No. 14/677,
`893 entitled "Hybrid Device Having a Personal Digital Key
`and Receiver Decoder Circuit and Method of Use," filed
`Apr. 2, 2015, which claims priority under 35 U.S.C. § 120 to
`U.S. patent application Ser. No. 14/171,705 entitled "Hybrid
`Device Having a Personal Digital Key and Receiver
`Decoder Circuit and Method of Use," filed Feb. 3, 2014,
`now U.S. Pat. No. 9,049,188, which claims priority under 35
`U.S.C. §120 to U.S. patent application Ser. No. 13/445,825
`entitled "Hybrid Device Having a Personal Digital Key and
`Receiver Decoder Circuit and Method of Use," filed Apr. 12,
`2012, now U.S. Pat. No. 8,646,042, which claims priority
`under 35 U.S.C. §120 to U.S. patent application Ser. No.
`12/329,329 entitled "Hybrid Device Having a Personal
`Digital Key and Receiver Decoder Circuit and Method of
`Use," filed Dec. 5, 2008, now U.S. Pat. No. 8,171,528,
`which claims the benefit of priority under 35 U.S.C. § 119( e) 25
`of U.S. Provisional Application No. 60/992,953 entitled
`"Reverse Prox," filed on Dec. 6, 2007 by David L. Brown,
`John J. Giobbi and Fred S. Hirt. The entire contents of all of
`the foregoing are incorporated by reference herein.
`Applicants hereby notify the USPTO that the claims of the
`present application are different from those of the aforemen(cid:173)
`tioned related applications. Therefore, Applicant rescinds
`any disclaimer of claim scope made in the parent applica(cid:173)
`tion, grandparent application or any other predecessor appli(cid:173)
`cation in relation to the present application. The Examiner is
`therefore advised that any such disclaimer and the cited
`reference that it was made to avoid may need to be revisited
`at this time. Furthermore, the Examiner is also reminded that
`any disclaimer made in the present application should not be
`read into or against the parent application, the grandparent
`application or any other related application.
`
`Various drawbacks of the prior art are overcome by
`providing a hybrid device including a personal digital key
`(PDK) and a receiver-decoder circuit (RDC). The PDK and
`RDC of the hybrid device are coupled for communication
`with each other. In one embodiment, the hybrid device also
`30 provides a physical interconnect for connecting to other
`devices to send and receive control signals and data, and
`receive power. The hybrid device operates in one of several
`modes including, PDK only, RDC only, or PDK and RDC.
`This allows a variety of system configurations for mixed
`35 operation including: PDK/RDC, RDC/RDC or PDK/PDK.
`The present invention also includes a number of system
`configurations for use of the hybrid device including: use of
`the hybrid device in a cell phone; simultaneous use of the
`40 PDK and the RDC functionality of hybrid device; use of
`multiple links of hybrid device to generate an authorization
`signal, use of multiple PDK links to the hybrid device to
`generate an authorization signal; use of the hybrid device for
`authorization inheritance and use of the hybrid device for
`45 automatically disabling a service or feature.
`Other aspects of the invention include systems and com(cid:173)
`ponents corresponding to the above, and methods corre(cid:173)
`sponding to all of the foregoing.
`
`BACKGROUND
`
`1. Field of Art
`The invention generally relates to personal digital keys
`and corresponding sensors, capable of proximity detection/
`location determination and auxiliary data services/applica(cid:173)
`tion services. Still more particularly, the present invention
`relates to a hybrid device including a personal digital key 50
`(PDK) and a receiver-decoder circuit (RDC) and methods
`for using same.
`2. Description of the Related Art
`Proximity sensors and location tracking are technologies
`with many applications. For example, proximity sensors can 55
`be used to provide secure access to physical and/or digital
`assets, based on biometrics, passwords, PINs, or other types
`of authentication. Proximity sensors typically have advan(cid:173)
`tages of being less cumbersome, easier to use, and more
`flexible in form factor and implementation. Proximity sen- 60
`sors can be used to control access to resources and/or to
`authenticate individuals, for example.
`One possible application that can take advantage of
`proximity sensors is location tracking. RFID tracking is one
`example. In RFID, RFID tags are attached to objects to be 65
`tracked. RFID readers then interact with the RFID tags to
`determine the location of the tag. Regardless of how it is
`
`BRIEF DESCRIPTION OF THE FIGURES
`
`FIG. 1 is a block diagram illustrating one embodiment of
`a system according to the invention.
`FIG. 2 is a block diagram illustrating one embodiment of
`a Personal Digital Key (PDK).
`FIG. 3 is a block diagram illustrating one embodiment of
`a sensor.
`FIGS. 4-6 are block diagrams illustrating further embodi(cid:173)
`ments of systems according to the invention.
`FIG. 7 is a block diagram illustrating one embodiment of
`a system with networked sensors.
`FIGS. 8-9 are block diagrams illustrating operation of the
`system in FIG. 7.
`FIG. 10 is a diagram illustrating operation of the system
`in FIG. 7.
`FIG. 11 is a block diagram of one embodiment of a hybrid
`device in accordance with the present invention.
`
`Page 18 of 29
`
`

`

`US 9,679,289 Bl
`
`3
`FIG. 12 is a block diagram of one embodiment of a system
`in which the hybrid device is part of a cell phone in
`accordance with the present invention.
`FIG. 13 is a block diagram of one embodiment of a system
`using the PDK and the RDC functionality of hybrid device
`in accordance with the present invention.
`FIG. 14 is a block diagram of one embodiment of a system
`using the multiple links of hybrid device to generate an
`authorization signal in accordance with the present inven(cid:173)
`tion.
`FIG. 15 is a block diagram of one embodiment of a system
`using the multiple PDK links to the hybrid device to
`generate an authorization signal in accordance with the
`present invention.
`FIG. 16 is a block diagram of one embodiment of a system 15
`using the hybrid device for authorization inheritance in
`accordance with the present invention.
`The figures depict various embodiments of the present
`invention for purposes of illustration only. One skilled in the
`art will readily recognize from the following discussion that 20
`alternative embodiments of the structures and methods illus(cid:173)
`trated herein may be employed without departing from the
`principles of the invention described herein.
`
`10
`
`4
`also receive a biometric input 104 from the individual.
`Based on the received information, the sensor 108 deter(cid:173)
`mines if access to the application 120 should be granted. In
`this example, the system 100 provides authentication with(cid:173)
`out the need for PINs or passwords (although PINs and
`passwords may be used in other implementations). More(cid:173)
`over, personal biometric information need not be stored in
`any local or remote storage database and is only stored on
`the user's own PDK (in one embodiment).
`The credibility of the system 100 is ensured by the use of
`a PDK 102 that stores trusted information. The PDK 102 is
`a compact, portable uniquely identifiable wireless device
`typically carried by an individual. The PDK 102 stores
`digital information in a tamper-proof format that uniquely
`associates the PDK 102 with an individual. Example
`embodiments of PD Ks are described in more detail in U.S.
`patent application Ser. No. 11/292,330, entitled "Personal
`Digital Key And Receiver/Decoder Circuit System And
`Method" filed on Nov. 30, 2005; U.S. patent application Ser.
`No. 11/620,581 entitled "Wireless Network Synchronization
`Of Cells And Client Devices On A Network" filed on Jan. 5,
`2007; and U.S. patent application Ser. No. 11/620,577
`entitled "Dynamic Real-Time Tiered Client Access" filed on
`Jan. 5, 2007, the entire contents of which are all incorporated
`25 herein by reference.
`The sensor 108 wirelessly communicates with the PDK
`102 when the PDK 102 is within a proximity zone (i.e.,
`within a microcell) of the sensor 108. The proximity zone
`can be, for example, several meters in radius and preferably
`30 can be adjusted dynamically by the sensor 108. Thus, in
`contrast to many conventional RF ID devices, the sensor 108
`can detect and communicate with the PDK 102 without
`requiring the owner to remove the PDK 102 from his/her
`pocket, wallet, purse, etc. Generally, the sensor 108 receives
`uniquely identifying information from the PDK 102 and
`initiates an authentication process for the individual carrying
`the PDK 102. In one embodiment, the sensor 108 is adapted
`to receive a biometric input 104 from the individual. The
`biometric input 104 comprises a representation of physical
`or behavioral characteristics unique to the individual. For
`example, the biometric input 104 can include a fingerprint,
`a palm print, a retinal scan, an iris scan, a photograph, a
`signature, a voice sample or any other biometric information
`such as DNA, RNA or their derivatives that can uniquely
`45 identify the individual. The sensor 108 compares the bio(cid:173)
`metric input 104 to information received from the PDK 102
`to determine authentication. Alternatively, the biometric
`input 104 can be obtained by a biometric sensor on the PDK
`102 and transmitted to the sensor 108 for authentication. In
`50 additional alternative embodiment, some or all of the
`authentication process can be performed by the PDK 102
`instead of the sensor 108.
`In this example, the sensor 108 is further communica(cid:173)
`tively coupled to the network 110 in order to receive and/or
`transmit information to remote databases for remote authen(cid:173)
`tication. In an alternative embodiment, the sensor 108
`includes a non-volatile data storage that can be synchronized
`with one or more remote databases or registries. Such an
`embodiment alleviates the need for a continuous connection
`to the network 110 and allows the sensor 108 to operate in
`a standalone mode and for the local data storage to be
`updated when a connection is available. For example, a
`standalone sensor 108 can periodically download updated
`registry entries and perform authentication locally without
`65 any remote lookup.
`In yet another alternative, a standalone sensor 108 may
`have a pre-configured secure access key 118 and encryption
`
`DETAILED DESCRIPTION
`
`FIG. 1 is a high level block diagram illustrating a system
`for allowing access to multiple applications ( or services).
`The system 100 comprises a Personal Digital Key (PDK)
`102, a sensor 108, a network 110 and one or more applica(cid:173)
`tions 120 (including services). The sensor 108 is coupled to
`the PDK 102 by a wireless link 106 and coupled to a network
`110 by either a wired or wireless link. In this example, the
`applications 120 are also accessed over network 110. The
`sensor 108 is also adapted to receive a biometric input 104 35
`from a user and is capable of displaying status to a user. In
`alternative embodiments, different or additional resources
`and databases may be coupled to the network 110, including
`for example registries and databases used for validation or to
`check various registrations of the user. In another embodi- 40
`ment, the sensor 108 operates as a standalone device without
`a connection to the network 110.
`The PDK 102 includes multiple service blocks 112A-N as
`described in more detail in FIG. 2. Each service block 112
`is accessed using a corresponding service block access key
`118. In this example, the sensor 108 contains three of the
`service block access keys 118A, D, F. The service block
`access keys 118 allow the sensor 108 to unlock information
`stored in the corresponding service blocks 112, which infor(cid:173)
`mation is used as local secured information.
`In one example, a biometric is required in order to access
`specific service blocks 112 in the PDK 102. Verification of
`the biometric is achieved by using service block 112A. The
`sensor 108 stores the corresponding service block access key
`118A and uses this key to unlock the biometric service block 55
`112A, which stores a valid biometric. A current biometric is
`received using biometric input 104. The sensor 108 then
`verifies the stored biometric (from service block 112A)
`against the recently acquired biometric (from input 104).
`Upon proper verification, various applications 120 are per- 60
`mitted to connect to the PDK 102 via the sensor 108 and/or
`to gain access to other service blocks 112.
`The system 100 can be used to address applications 120
`where it is important to authenticate an individual for use.
`Generally, the sensor 108 wirelessly receives information
`stored in the PDK 102 that uniquely identifies the PDK 102
`and the individual carrying the PDK 102. The sensor 108 can
`
`Page 19 of 29
`
`

`

`US 9,679,289 Bl
`
`5
`algorithm, or a variable access key 118 that changes, for
`example based on time and sensor ID. One example appli(cid:173)
`cation would be a sensor 108 located in a hotel room door,
`where the sensor could constantly compute a different access
`key 118 based on time, and the PDK 102 could be associated
`with this key during the hotel registration process.
`The network 110 provides communication between the
`sensor 108 and various validation databases and/or regis(cid:173)
`tries, in addition to the applications 120. In one embodiment,
`the network 110 uses standard communications technologies
`and/or protocols. Thus, the network 110 can include links
`using technologies such as Ethernet, 802.11, 802.16, inte(cid:173)
`grated services digital network (ISDN), digital subscriber
`line (DSL), asynchronous transfer mode (ATM), etc. Simi(cid:173)
`larly, the networking protocols used on the network 110 can
`include the transmission control protocol/Internet protocol
`(TCP/IP), the hypertext transport protocol (HTTP), the
`simple mail transfer protocol (SMTP), the file transfer
`protocol (FTP), etc. The data exchanged over the network
`110 can be represented using technologies and/or formats
`including the hypertext markup language (HTML), the
`extensible markup language (XML), etc. In addition, all or
`some of links can be encrypted using conventional encryp(cid:173)
`tion technologies such as the secure sockets layer (SSL),
`Secure HTTP and/or virtual private networks (VPNs). In 25
`another embodiment, the entities can use custom and/or
`dedicated data communications technologies instead of, or
`in addition to, the ones described above.
`In one aspect, the sensor 108 may connect to a validation
`database that stores additional information that may be used
`for authorizing a transaction to be processed at the sensor.
`For example, in purchase transactions, the sensor 108 may
`interact with a credit card validation database that is separate
`from the merchant providing the sale. Alternatively, a dif(cid:173)
`ferent database may be used to validate different types of
`purchasing means such as a debit card, ATM card, or bank
`account number.
`In another aspect, the sensor 108 may connect to various
`registries that store, among other items, PDK, notary, and/or
`sensor information. In one embodiment, a registry stores
`biometric or other types of information in an encoded format
`that can only be recovered using an algorithm or encoding
`key stored in the PDK. Information stored in the registries
`can be accessed by the sensor 108 via the network 110 for
`use in the authentication process. Two basic types of regis- 45
`tries are private registries and a Central Registry. Private
`registries are generally established and administered by their
`controlling entities ( e.g., a merchant, business authority, or
`other entity administering authentication). Private registries
`can be custom configured to meet the specialized and 50
`independent needs of each controlling entity. A Central
`Registry is a highly-secured, centrally-located database
`administered by a trusted third-party organization. In one
`embodiment, all PDKs 102 are registered with the Central
`Registry and may be optionally registered with one or more 55
`selected private registries. In alternative embodiments, a
`different number or different types of registries may be
`coupled to the network 110.
`The service blocks 112 can be used for purposes other
`than user authentication. For example, information used or 60
`produced by an application 120 can be transferred back and
`forth to the corresponding service block 112. That is, each
`service block 112 can be used as a local secure memory for
`the corresponding application 120. Thus, a service 120B
`may store certain sensitive information in service block 65
`112B, and a separate service 120C will not be able to access
`that information without the corresponding access key 118B.
`
`6
`In this example, the sensor 108 only holds access keys 118A,
`D, F and does not hold access key 118B. The application
`120B may hold the access key 118B, thus allowing it to
`access service block 112B but preventing application 120C
`from accessing the service block 112B. Note that this
`implementation would also prevent the sensor 108 acting
`alone from accessing the service block 112B.
`Turning now to FIG. 2, an example embodiment of a PDK
`102 is illustrated. The PDK 102 comprises a memory 210,
`10 control logic 250, wireless application 260 and a transceiver
`270. The PDK 102 can be standalone as a portable, physical
`device or can be integrated into commonly carried items. For
`example, a PDK 102 can be integrated into a portable
`electronic device such as a cell phone, Personal Digital
`15 Assistant (PDA), or GPS unit, an employee identification
`tag, clothing, or jewelry items such as watches, rings,
`necklaces or bracelets. In one embodiment, the PD K 102 can
`be, for example, about the size of a Subscriber Identity
`Module (SIM) card and be as small as a square inch in area
`20 or less. In another embodiment, the PDK 102 can be easily
`contained in a pocket, on a keychain, or in a wallet. The
`PDK can also contain other components not shown, for
`example various other inputs, outputs and/or interfaces
`(serial or parallel).
`The memory 210 can be a read-only memory, a once-
`programmable memory, a read/write memory or any com(cid:173)
`bination of memory types, including physical access secured
`and tamperproof memories. The memory 210 typically
`stores a unique PDK ID 212. The PDK ID 212 comprises a
`30 public section and a private section of information, each of
`which can be used for identification and authentication. In
`one embodiment, the PDK ID 212 is stored in a read-only
`format that cannot be changed subsequent to manufacture.
`The PDK ID 212 is used as an identifying feature of a PDK
`35 102 and distinguishes between PDKs 102 in private or
`Central registry entries. In an alternative embodiment, the
`registries can identify a PDK 102 by a different ID than the
`PDK ID 212 stored in the PDK 102, or may use both the
`PDK ID 212 and the different ID in conjunction. The PDK
`40 ID 212 can also be used in basic PDK authentication to
`ensure that the PDK 102 is a valid device.
`The memory 210 also stores the various service blocks
`112A-N. Whether a particular service block 112 is stored in
`volatile or non-volatile memory may be determined by the
`specific application. In one approach, the original issuer of
`the PDK defines how the internal memory 210 may be used
`for service b

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket