`US010073960Bl
`
`c12) United States Patent
`Brown
`
`(10) Patent No.: US 10,073,960 Bl
`*Sep.11,2018
`(45) Date of Patent:
`
`(54) HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODS OF USE
`
`(71) Applicant: Proxense, LLC, Bend, OR (US)
`
`(72)
`
`Inventor: David L. Brown, Jupiter, FL (US)
`
`(73) Assignee: Proxense, LLC, Bend, OR (US)
`
`H04L 63/0861 (2013.01); H04L 63/10
`(2013.01); H04L 67110 (2013.01); H04W
`41029 (2018.02); H04W 4180 (2018.02);
`H04W 12106 (2013.01); H04W 12108
`(2013.01)
`
`(58) Field of Classification Search
`USPC .............................................................. 726/3
`See application file for complete search history.
`
`( *) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by O days.
`
`This patent is subject to a terminal dis(cid:173)
`claimer.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,623,552 A
`6,325,285 Bl
`
`4/1997 Lane
`12/2001 Baratelli
`(Continued)
`
`(21) Appl. No.: 15/595,739
`
`(22) Filed:
`
`May 15, 2017
`Related U.S. Application Data
`
`(63)
`
`(51)
`
`(52)
`
`Continuation of application No. 14/961,645, filed on
`Dec. 7, 2015, now Pat. No. 9,679,289, which is a
`continuation of application No. 14/677,893, filed on
`Apr. 2, 2015, now Pat. No. 9,235,700, which is a
`continuation of application No. 14/171,705, filed on
`(Continued)
`
`(2006.01)
`(2013.01)
`(2013.01)
`(2009.01)
`(2009.01)
`(2006.01)
`(2018.01)
`(2018.01)
`
`Int. Cl.
`H04L 29106
`G06F 21132
`G06F 21135
`H04W 12106
`H04W 12108
`H04L 29108
`H04W 41029
`H04W 4180
`U.S. Cl.
`CPC .............. G06F 21132 (2013.01); G06F 21135
`(2013.01); H04L 63/0492 (2013.01); H04L
`63/08 (2013.01); H04L 63/0853 (2013.01);
`
`Primary Examiner - David J Pearson
`(74) Attorney, Agent, or Firm - Patent Law Works LLP
`
`ABSTRACT
`(57)
`A hybrid device includes a personal digital key (PDK) and
`a receiver-decoder circuit (RDC). The PDK and RDC of the
`hybrid device are coupled for communication with each
`other. In one embodiment, the hybrid device also provides a
`physical interconnect for connecting to other devices to send
`and receive control signals and data, and receive power. The
`hybrid device operates in one of several modes including,
`PDK only, RDC only, or PDK and RDC. This allows a
`variety of system configurations for mixed operation includ(cid:173)
`ing: PDK/RDC, RDC/RDC or PDK/PDK. The present
`invention also includes a number of system configurations
`for use of the hybrid device including: use of the hybrid
`device in a cell phone; simultaneous use of the PDK and the
`RDC functionality of hybrid device; use of multiple links of
`hybrid device to generate an authorization signal, use of
`multiple PDK links to the hybrid device to generate an
`authorization signal; and use of the hybrid device for autho(cid:173)
`rization inheritance.
`
`20 Claims, 15 Drawing Sheets
`
`1200 \
`
`Cell Phone 1202
`
`Cell Phone
`Components & Battery
`1204
`
`1104
`
`POK 102a
`
`1102
`
`Page 1 of 29
`
`GOOGLE EXHIBIT 1001
`
`
`
`US 10,073,960 Bl
`Page 2
`
`Related U.S. Application Data
`
`Feb. 3, 2014, now Pat. No. 9,049,188, which is a
`continuation of application No. 13/445,825, filed on
`Apr. 12, 2012, now Pat. No. 8,646,042, which is a
`continuation of application No. 12/329,329, filed on
`Dec. 5, 2008, now Pat. No. 8,171,528.
`
`(60)
`
`Provisional application No. 60/992,953, filed on Dec.
`6, 2007.
`
`(56)
`
`References Cited
`
`7,314,164 B2
`7,349,557 B2
`7,565,329 B2
`8,171,528 Bl
`8,646,042 Bl
`8,678,273 B2
`8,856,539 B2
`9,049,188 Bl
`9,235,700 Bl
`2004/0254837 Al
`2005/0116020 Al
`2006/0113381 Al*
`
`1/2008 Bonalle et al.
`3/2008 Tibor
`7/2009 Lapsley et al.
`5/2012 Brown
`2/2014 Brown
`3/2014 McNeal
`10/2014 Weiss
`6/2015 Brown
`1/2016 Brown
`12/2004 Roshkoff
`6/2005 Smolucha et al.
`6/2006 Hochstein .
`
`U.S. PATENT DOCUMENTS
`
`2006/0208066 Al *
`
`9/2006 Finn.
`
`6,728,397 B2
`6,879,966 Bl
`7,159,765 B2
`7,231,068 B2
`
`4/2004 McNeal
`4/2005 Lapsley et al.
`1/2007 Frerking
`6/2007 Tibor
`
`2007 /0271194 Al*
`
`11/2007 Walker.
`
`* cited by examiner
`
`G06K 19/0718
`235/382
`G06K 7/0004
`235/380
`G06Q 30/02
`705/80
`
`Page 2 of 29
`
`
`
`U.S. Patent
`
`Sep.11,2018
`
`Sheet 1 of 15
`
`US 10,073,960 Bl
`
`(.)
`0
`N
`
`~
`
`CJ
`LL
`
`(/) <(
`(/) 00 0 LL
`<l.) . . - 00 00
`u..- ..- ..-
`u >- ..- ..-
`<( <l.)
`:::0::
`
`(/) u
`E~
`<1.)0
`E ..(cid:173)
`o
`iii
`
`00
`
`0 ..(cid:173),_
`
`0
`(/)
`C:
`<l.)
`Cf)
`
`co
`0
`
`N
`0
`
`:::0::
`0
`0..
`
`<l.) <(
`.2~ CCl
`i::..- N ..-
`<l.)_.:,,,:: ..-
`Cf) -CCl
`
`(.)
`N ..-
`..-
`
`Page 3 of 29
`
`
`
`U.S. Patent
`
`Sep.11,2018
`
`Sheet 2 of 15
`
`US 10,073,960 Bl
`
`r
`
`N
`0
`
`~
`
`~
`0
`Q_
`
`0
`LO
`N
`
`<D
`..
`N
`t,
`<D
`<i3
`(/)
`co
`(/)
`
`~
`
`ID
`>
`·a3 0
`Ur--
`~ N
`cu
`t=
`
`"'\
`
`<(
`
`C:
`(/) 0
`en :Q
`<D CU 0
`l!: .!::? ~
`s §:
`N
`N
`~
`0
`v9l idAl:>aa.4dAJ:>U3
`I
`l9l Jopa1as
`
`co
`..-
`..-
`ai
`::,,:::
`
`:;:::;-
`u
`<D
`<i3
`(/)
`co
`~
`
`N
`.
`(9
`LL
`
`0
`N
`<D <(
`i::" uN co
`~2: ;:: N
`..-
`0
`..-
`<D _;.:::
`E
`(/')i:i:i
`<D
`~
`
`u
`N
`..-
`..-
`
`I
`
`I
`
`I
`
`\.
`
`--
`z
`N
`..-
`..-
`
`-----
`
`~
`
`,I
`
`Page 4 of 29
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep.11,2018
`Sep. 11, 2018
`
`Sheet 3 of 15
`Sheet 3 of 15
`
`US 10,073,960 Bl
`US 10,073,960 B1
`
`JOMION
`
`~
`I....
`O o
`:s ..-
`OLL
`ID ..-
`z
`
`~ I.
`
`(Sn}e}g
`
`U) 0
`::::,~
`CU C
`Cf) u
`...... 0
`
`jo.UO.)
`
`~ I.
`
`t
`ON
`CLE
`a....-
`
`0dO/|
`
`QC"")
`
`CV')
`
`CJ
`LL
`
`I....
`
`JOSS8901q
`
`0 en
`en co
`90€
`Q.) 0
`(.) C"") e
`a..
`
`I
`
`u -.;:J-
`00
`0::: C"")
`
`OUJaWOIg
`
`(.) ..........
`-;::~
`ID ID N
`COE
`E -o o
`o
`ro M
`- - Q.)
`co 0:::
`
`(s)sapeay
`
`'I.
`
`,,
`
`~N
`00
`a.. ...--
`
`|ld|
`
`HOMJON
`
`~ Q.)
`I....
`(.)
`o
`ro oo
`80€
`~ ' t :o
`Q.) 2 C"")
`Z
`C
`
`90eLO}U
`
`POS
`
`00
`0 ...-
`I.....
`0
`Cf)
`C:
`Q)
`CJ)
`
`Page 5 of 29
`
`Page 5 of 29
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep.11,2018
`Sep. 11, 2018
`
`Sheet 4 of 15
`Sheet 4 of 15
`
`US 10,073,960 Bl
`US 10,073,960 B1
`
`
`
`OLSBdIN9qBUO|EPUE}S/Od
`
`Cf) u a..
`
`>-
`C
`Q.)
`0
`:::.:::: co
`:;:::;
`ast
`ro o
`Oc
`en oo
`·a.~ ~ ......
`U N
`en ..-
`
`uoneoiddy
`
`c..
`<(
`
`Kaysseooy
`
`(.)
`<(
`
`- o
`0.... N
`<( L.C)
`
`VEL}Aey
`
`SS900Y7
`
`en <(
`en oo 0 LL
`Q.) ..- 00 00
`(.) ..- ..- ..-
`(.) >- ..- ..-
`<( Q.)
`:::.::::
`
`yOla
`
`~
`CJ
`LL
`
`9018S
`
`co u
`Och
`del
`N N
`..- ..-
`..- ..-
`Q.) ~
`
`Q.) <(
`U N
`·2: ;:::
`Cf) -co
`
`0 ..-
`
`L.C)
`Q.)
`(.)
`·5
`Q.)
`0
`Q.)
`C
`0
`ro
`"O
`C ro
`......
`
`COLMdd
`
`I....
`
`
`
`QQ)Josue
`
`00
`0 ..-
`0 en
`C
`Q.)
`Cf)
`
`(0
`0
`
`Page 6 of 29
`
`N
`0
`
`:::.::::
`0 a..
`
`Volt4G
`
`Page 6 of 29
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep.11,2018
`Sep. 11, 2018
`
`Sheet 5 of 15
`Sheet 5 of 15
`
`US 10,073,960 Bl
`US 10,073,960 B1
`
`>
`C:
`Q.)
`0
`~o :::.::: Cl'.l
`ast
`<n 00
`UN
`·;;_ ~ ~..-
`<n ..-
`
`
`
`Keyssaoo0y
`
`c.;,
`<(
`
`GOld
`
`Auogeoiddy
`
`C2..
`<(
`
`Q.)
`
`c.;, w2:
`
`Q.)
`(./)
`"'ffi
`C:
`
`a3 >< w
`
`)
`j
`
`N
`~
`Q.)
`c.;,
`·5
`Q.)
`Cl
`""O
`Q.)
`-c:
`
`0
`
`~ Q.) z u 0..
`
`
`
`
`
`SdESJBUIA]XyZG80IKaqPAYOMON/Od90)sosuag
`
`0 ..-
`..-
`-c:
`
`0
`
`~ Q.) V
`uoneoyddy
`
`C:
`0
`~
`.S!
`"ci
`C2..
`<(
`
`-o
`0.. N
`<( I.(')
`
`LO
`(9
`LL
`
`<n <(
`<n 00 Cl LL
`Q.) ..- 00 00
`c.;, ..- ..- ..-
`c.;, > ..- ..-
`<( Q.)
`:::.:::
`
`00
`0 ..-
`0 <n
`
`C:
`Q.)
`(./)
`
`<D
`0
`
`20Md
`
`N
`0
`:::.:::
`Cl
`0..
`
`Page 7 of 29
`
`YellWd
`
`..:.:::
`
`Q.) <(
`B0MEas
`Cl'.l u
`ehh
`abl
`.!=? ~
`2: ..-
`N N
`..- ..-
`(./) -Cl'.l
`..- ..-
`
`Q.)
`
`Page 7 of 29
`
`
`
`
`
`
`
`0--, = = "'""'
`"'""' = = -....l w
`d r.,;_
`
`\0
`
`Ul
`
`....
`0 ....
`O'I
`.....
`rJJ =-
`
`('D
`('D
`
`....
`.... ~
`'? ....
`
`QO
`0
`N
`
`('D
`rJJ
`
`= ~
`
`~
`~
`~
`~
`
`00 .
`e .
`
`1 1 Key 118A 1 1
`
`/
`
`I
`
`IApp120Z1I
`
`510Z1
`
`11 Key 118B 11
`
`\.11 App 120Z3
`
`I
`
`510Z3
`
`I
`
`"'
`
`~ 11 Key 118B 11
`I App 12oz2 I
`
`510Z2
`
`108Z
`
`Key 118F
`
`Key 118C
`
`120Y2
`App
`
`510Y
`
`App
`
`11
`
`......
`
`I
`
`510X
`
`App 120X 11 ~ ~ 120Y1
`
`FIG. 6
`
`j
`I
`
`112N
`
`.
`
`Blk 112A
`Service
`PDK 102
`
`112C
`112B
`
`l
`I
`
`I
`
`Key 118C
`
`App 120V I
`
`I
`
`510V
`
`Key 118C 11
`
`App 120W 11 ~ I
`
`I
`
`I
`
`510W
`
`Key 118C 11
`
`Page 8 of 29
`
`
`
`U.S. Patent
`
`Sep.11,2018
`
`Sheet 7 of 15
`
`US 10,073,960 Bl
`
`C:
`(I)
`- -0
`
`0 co =
`°E LL g n:::
`
`(.)
`
`(I)
`C:
`~.:t::
`-0 C:
`C: :::::>
`.$
`(f)
`
`r-(cid:173)
`(9
`LL
`
`OU 1/111/11S
`
`OvL sn9
`
`~
`C: N or-
`~ C:
`u ·-
`0
`..><::
`....Ju
`~
`I-
`
`C,
`C:
`.0) en
`co C>
`<I) N
`~r--
`~
`
`(.)
`C>
`N r--
`~
`(I)
`<(
`
`eo
`co C>
`a.. ~
`-0 (/)
`-~ a.
`.s::::. 0.
`I- <(
`
`(/)
`c..
`c..
`<( w
`(I) C>
`-N
`~r--
`(1) n:::
`
`cu..;.::
`E 0
`2
`:s:;
`>< -w (I)
`oZ
`I-
`
`Page 9 of 29
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep. 11, 2018
`Sep.11,2018
`
`Sheet 8 of 15
`Sheet 8 of 15
`
`US 10,073,960 B1
`US 10,073,960 Bl
`
`830
`
`
`
`
`FIG. 8
`FIG. 8
`
`FIG. 9
`FIG. 9
`
`Page 10 of 29
`
`Page 10 of 29
`
`
`
`0--, = = "'""'
`"'""' = = -....l w
`d r.,;_
`
`\0
`
`Ul
`
`....
`0 ....
`.....
`rJJ =(cid:173)
`
`1,0
`
`('D
`('D
`
`0 .... QO
`....
`'? ....
`
`N
`
`('D
`rJJ
`
`FIG.10
`
`button 1
`
`1 060 PD K clears
`
` I ALOHA {Button 1 Alert}! I
`
`14
`
`I
`
`B
`
`, :. x.-x~
`
`1040 Operator clears 114 ___ 14
`
`I 1050A I
`
`alert (button 1)
`
`request displayed
`
`1030 Service
`
`~ = ~
`
`~
`~
`~
`
`00 .
`e .
`
`presses button 1
`
`1010 User
`
`I
`
`PD.!l:J
`
`ensor
`
`oordinator
`
`A12.Qhcati on
`
`Page 11 of 29
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep. 11, 2018
`Sep.11,2018
`
`Sheet 10 of 15
`Sheet 10 of 15
`
`US 10,073,960 B1
`US 10,073,960 Bl
`
`ti OxPi
`
`lu
`0::: LJ.J
`LJ.J (..)
`I>
`I- LJ.J
`Oo
`ono
`
`'<:I"
`0
`.,...
`.,...
`
`B~
`
`0... .,...
`
`'°I
`o""'"
`o::::g
`0
`
`~
`
`~ .
`(9
`LL
`
`FIG.11
`
`N
`0
`
`~
`
`~
`(])
`(.)
`">
`(])
`0
`""O
`·;:::
`..c
`:r:
`
`Page 12 of 29
`
`Page 12 of 29
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep.11,2018
`Sep. 11, 2018
`
`Sheet 11 of 15
`Sheet 11 of 15
`
`US 10,073,960 Bl
`US 10,073,960 B1
`
`N
`0
`N ...--
`
`(1)
`C
`0
`..c
`o._
`
`
`
`
`
`COC)SU0Ud[19D
`
`(1)
`0
`
`"<:I"
`0 ..-
`_..-(
`
`-
`
`BOLNd
`
`m
`N
`0 ..-
`::.:::
`0
`a..
`
`~
`
`__.. t:l
`..-
`..-
`
`clOld
`
`-
`(9
`LL
`
`Asayyeg9sjuauodwo5
`
`c:-
`Jg
`m
`Q.) cc
`§ o6 "-I"
`.s:::.
`(J) 0
`Q.. C: N
`Q.) ~
`=
`Q.) C:
`(.)O
`a.
`E
`0 u
`
`aud[18D
`
`c.o
`0 ..-
`
`..-?
`
`-
`
`(X)
`0
`N
`
`pleDWIS
`
`9021
`
`m
`"<:I"
`0
`CV)
`u
`0
`0:::
`
`sJ
`
`~
`
`Bp0eO0Yq201¥dd
`
`.0
`N
`0
`::.:::
`0
`a..
`
`00z1
`
`Page 13 of 29
`
`Page 13 of 29
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep.11,2018
`Sep. 11, 2018
`
`Sheet 12 of 15
`Sheet 12 of 15
`
`US 10,073,960 Bl
`US 10,073,960 B1
`
`sq-
`0
`
`~
`
`ev0€OGY
`
`ro
`-.::t
`0
`(")
`0
`Cl
`0:::
`
`elOld
`
`(V)
`.
`~
`(9
`LL
`
`qvoeOdd
`
`.0
`-.::t
`0
`(")
`0
`Cl
`0:::
`
`eZOLWdd
`
`ro
`N
`0
`::.::::
`Cl
`0..
`
`N
`0
`
`~
`
`~
`(I)
`(.)
`">
`(I)
`0
`""'O ·c
`..0
`I
`
`OOEL
`
`Page 14 of 29
`
`Page 14 of 29
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep.11,2018
`Sep. 11, 2018
`
`Sheet 13 of 15
`Sheet 13 of 15
`
`US 10,073,960 Bl
`US 10,073,960 B1
`
`.0
`
`""'" 0
`
`Gv0€O0Y
`
`("")
`(.)
`Cl
`a:::
`
`....I
`
`
`
`TWNOISFTEVNA
`
`<( z
`CJ
`CJ)
`w
`....I
`aJ
`
`<( z
`w
`
`ro v
`
`ep0eOdy
`
`0
`("")
`(.)
`Cl
`0::::
`
`vlOld
`
`"""" ~ .
`(9
`LL
`
`'<:l"
`0
`'<:l"
`...-
`
`N
`0 ...--
`...--
`(l)
`(.)
`">
`(l)
`0
`-0
`·c:
`..0
`I
`
`oorlL
`
`'<:l"
`0 ...-
`...-
`
`BOLMd
`
`ro
`N
`0
`:..:::
`Cl a..
`
`N
`0
`'<:l"
`...-
`
`42014dd
`
`.0
`N
`0
`:..:::
`Cl a..
`
`Page 15 of 29
`
`Page 15 of 29
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep.11,2018
`Sep. 11, 2018
`
`Sheet 14 of 15
`Sheet 14 of 15
`
`US 10,073,960 Bl
`US 10,073,960 B1
`
`...J
`
`
`
`WNOIS31EdVNA
`
`<{ z
`Q
`(/)
`w
`...J co
`<{ z
`w
`
`~
`0
`0..
`
`m
`N
`0
`
`
`
`e201Wd2051
`
`Gl)Old
`
`LO
`...--
`-
`(9
`LL
`
`<.O
`0
`I.!)
`.,.-
`
`m
`s::l"
`0
`(V")
`u
`0
`0::::
`
`ep0eOdyUZOLddTeSeem
`
`C:
`N
`0 ..-
`
`~
`0
`CL
`
`s::!"
`0
`.,.-
`.,.-
`
`vOSl
`
`• • •
`
`0OSl
`
`N
`0
`
`~
`
`~
`Q)
`(_)
`">
`Q)
`0
`-0
`·c
`..a
`:r:
`
`/i\
`
`G20lWad
`
`..0
`N
`0 ..-
`~
`0
`CL
`
`Page 16 of 29
`
`Page 16 of 29
`
`
`
`
`
`....
`0 ....
`Ul
`....
`.....
`=- ('D
`
`('D
`
`rJJ
`
`Ul
`
`.... QO
`....
`....
`'?
`('D
`rJJ
`
`0
`N
`
`= ~
`
`~
`~
`~
`~
`
`00 .
`e .
`
`1652
`
`I :::
`
`~DC/Wi-Fi Service
`
`1600
`
`I
`/
`~7 RDC304b
`I
`
`I 'f-l_
`I
`
`Cell Account 2
`Credit Cart Acct. 2
`
`Service Inheritance 1612
`
`I ::J
`
`1104
`
`POK 102a
`
`\
`
`1650
`
`Feruure Inheritance I I
`
`1604
`
`I ''t'
`
`I I '\.
`
`Comp. A Access
`
`Wi-Fi Access Acct
`Cell Account 1
`Credit Cart Acct. 1
`
`~ervii;.e lnheritani;.e
`
`1602
`
`Hybrid Device 1102b
`
`I
`
`'¥..
`
`I
`
`POK 102b
`
`0--, = = "'""'
`= -....l w
`"'""' =
`d r.,;_
`
`\0
`
`FIG.16
`
`Personalitl Inheritance I I
`
`1616
`
`I
`
`I
`
`Feature Inheritance 1614
`
`I
`
`1/1
`
`_,,/
`
`T'--,.
`1' I .. ".
`
`I
`Personali~ Inheritance I I
`
`1606
`
`-
`
`Page 17 of 29
`
`
`
`US 10,073,960 Bl
`
`1
`HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODS OF USE
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`2
`sors can be used to control access to resources and/or to
`authenticate individuals, for example.
`One possible application that can take advantage of
`proximity sensors is location tracking. RFID tracking is one
`5 example. In RFID, RFID tags are attached to objects to be
`tracked. RFID readers then interact with the RFID tags to
`determine the location of the tag. Regardless of how it is
`accomplished, location tracking (i.e., knowledge about the
`location of an object or person) is generally useful. For
`10 example, location tracking information can be used to track
`inventory and trace the route of objects through various
`locations. It can be used for time and motion studies. If tags
`are attached to people, then tracking of people can be used
`15 to better understand their behavior. Knowledge about a
`person's location (and/or their past locations and projected
`future locations) could be used to provide better services to
`that person.
`However, most proximity systems and location tracking
`20 systems have limited capabilities. Typically, the proximity
`sensor, RFID tag or similar device is a dumb device, in the
`sense that the device is designed and has the capability only
`to report its location. For example, such devices typically do
`not have the capabilities to run different applications or to
`25 even interact with different applications. Furthermore, these
`systems typically are proprietary and narrowly tailored for a
`specific situation, thus preventing easy expandability to
`other situations or third party applications.
`
`SUMMARY
`
`The present application is a continuation and claims
`priority to U.S. application Ser. No. 14/961,645, entitled
`"Hybrid Device Having a Personal Digital Key and
`Receiver-Decoder Circuit and Methods of Use," filed Dec.
`7, 2015, whichclaimspriorityunder35 U.S.C. § 120to U.S.
`patent application Ser. No. 14/677,893 entitled "Hybrid
`Device Having a Personal Digital Key and Receiver
`Decoder Circuit and Method of Use," filed Apr. 2, 2015,
`which claims priority under 35 U.S.C. § 120 to U.S. patent
`application Ser. No. 14/171,705 entitled "Hybrid Device
`Having a Personal Digital Key and Receiver Decoder Cir(cid:173)
`cuit and Method of Use," filed Feb. 3, 2014, now U.S. Pat.
`No. 9,049,188, which claims priority under 35 U.S.C. § 120
`to U.S. patent application Ser. No. 13/445,825 entitled
`"Hybrid Device Having a Personal Digital Key and Receiver
`Decoder Circuit and Method of Use," filed Apr. 12, 2012,
`now U.S. Pat. No. 8,646,042, which claims priority under 35
`U.S.C. § 120 to U.S. patent application Ser. No. 12/329,329
`entitled "Hybrid Device Having a Personal Digital Key and
`Receiver Decoder Circuit and Method of Use," filed Dec. 5,
`2008, now U.S. Pat. No. 8,171,528, which claims the benefit
`of priority under 35 U.S.C. § 119(e) of U.S. Provisional
`Application No. 60/992,953 entitled "Reverse Prox," filed 30
`on Dec. 6, 2007 by David L. Brown, John J. Giobbi and
`Fred S. Hirt. The entire contents of all of the foregoing are
`incorporated by reference herein.
`Applicants hereby notify the USPTO that the claims of the
`present application are different from those of the aforemen- 35
`tioned related applications. Therefore, Applicant rescinds
`any disclaimer of claim scope made in the parent applica(cid:173)
`tion, grandparent application or any other predecessor appli(cid:173)
`cation in relation to the present application. The Examiner is
`therefore advised that any such disclaimer and the cited 40
`reference that it was made to avoid may need to be revisited
`at this time. Furthermore, the Examiner is also reminded that
`any disclaimer made in the present application should not be
`read into or against the parent application, the grandparent
`application or any other related application.
`
`Various drawbacks of the prior art are overcome by
`providing a hybrid device including a personal digital key
`(PDK) and a receiver-decoder circuit (RDC). The PDK and
`RDC of the hybrid device are coupled for communication
`with each other. In one embodiment, the hybrid device also
`provides a physical interconnect for connecting to other
`devices to send and receive control signals and data, and
`receive power. The hybrid device operates in one of several
`modes including, PDK only, RDC only, or PDK and RDC.
`This allows a variety of system configurations for mixed
`operation including: PDK/RDC, RDC/RDC or PDK/PDK.
`The present invention also includes a number of system
`configurations for use of the hybrid device including: use of
`45 the hybrid device in a cell phone; simultaneous use of the
`PDK and the RDC functionality of hybrid device; use of
`multiple links of hybrid device to generate an authorization
`signal, use of multiple PDK links to the hybrid device to
`generate an authorization signal; use of the hybrid device for
`50 authorization inheritance and use of the hybrid device for
`automatically disabling a service or feature.
`Other aspects of the invention include systems and com(cid:173)
`ponents corresponding to the above, and methods corre(cid:173)
`sponding to all of the foregoing.
`
`BACKGROUND
`
`1. Field of Art
`
`The invention generally relates to personal digital keys
`and corresponding sensors, capable of proximity detection/
`location determination and auxiliary data services/applica(cid:173)
`tion services. Still more particularly, the present invention
`relates to a hybrid device including a personal digital key 55
`(PDK) and a receiver-decoder circuit (RDC) and methods
`for using same.
`
`2. Description of the Related Art
`
`60
`
`Proximity sensors and location tracking are technologies
`with many applications. For example, proximity sensors can
`be used to provide secure access to physical and/or digital
`assets, based on biometrics, passwords, PINs, or other types
`of authentication. Proximity sensors typically have advan- 65
`tages of being less cumbersome, easier to use, and more
`flexible in form factor and implementation. Proximity sen-
`
`BRIEF DESCRIPTION OF THE FIGURES
`
`FIG. 1 is a block diagram illustrating one embodiment of
`a system according to the invention.
`FIG. 2 is a block diagram illustrating one embodiment of
`a Personal Digital Key (PDK).
`FIG. 3 is a block diagram illustrating one embodiment of
`a sensor.
`FIGS. 4-6 are block diagrams illustrating further embodi(cid:173)
`ments of systems according to the invention.
`FIG. 7 is a block diagram illustrating one embodiment of
`a system with networked sensors.
`
`Page 18 of 29
`
`
`
`3
`FIGS. 8-9 are block diagrams illustrating operation of the
`system in FIG. 7.
`FIG. 10 is a diagram illustrating operation of the system
`in FIG. 7.
`FIG. 11 is a block diagram of one embodiment of a hybrid
`device in accordance with the present invention.
`FIG. 12 is a block diagram of one embodiment of a system
`in which the hybrid device is part of a cell phone in
`accordance with the present invention.
`FIG. 13 is a block diagram of one embodiment of a system
`using the PDK and the RDC functionality of hybrid device
`in accordance with the present invention.
`FIG. 14 is a block diagram of one embodiment of a system
`using the multiple links of hybrid device to generate an
`authorization signal in accordance with the present inven(cid:173)
`tion.
`FIG. 15 is a block diagram of one embodiment of a system
`using the multiple PDK links to the hybrid device to
`generate an authorization signal in accordance with the 20
`present invention.
`FIG. 16 is a block diagram of one embodiment of a system
`using the hybrid device for authorization inheritance in
`accordance with the present invention.
`The figures depict various embodiments of the present 25
`invention for purposes of illustration only. One skilled in the
`art will readily recognize from the following discussion that
`alternative embodiments of the structures and methods illus(cid:173)
`trated herein may be employed without departing from the
`principles of the invention described herein.
`
`DETAILED DESCRIPTION
`
`FIG. 1 is a high level block diagram illustrating a system
`for allowing access to multiple applications ( or services).
`The system 100 comprises a Personal Digital Key (PDK)
`102, a sensor 108, a network 110 and one or more applica(cid:173)
`tions 120 (including services). The sensor 108 is coupled to
`the PDK 102 by a wireless link 106 and coupled to a network
`110 by either a wired or wireless link. In this example, the 40
`applications 120 are also accessed over network 110. The
`sensor 108 is also adapted to receive a biometric input 104
`from a user and is capable of displaying status to a user. In
`alternative embodiments, different or additional resources
`and databases may be coupled to the network 110, including 45
`for example registries and databases used for validation or to
`check various registrations of the user. In another embodi(cid:173)
`ment, the sensor 108 operates as a standalone device without
`a connection to the network 110.
`The PDK 102 includes multiple service blocks 112A-N as 50
`described in more detail in FIG. 2. Each service block 112
`is accessed using a corresponding service block access key
`118. In this example, the sensor 108 contains three of the
`service block access keys 118A, D, F. The service block
`access keys 118 allow the sensor 108 to unlock information
`stored in the corresponding service blocks 112, which infor(cid:173)
`mation is used as local secured information.
`In one example, a biometric is required in order to access
`specific service blocks 112 in the PDK 102. Verification of
`the biometric is achieved by using service block 112A. The 60
`sensor 108 stores the corresponding service block access key
`118A and uses this key to unlock the biometric service block
`112A, which stores a valid biometric. A current biometric is
`received using biometric input 104. The sensor 108 then
`verifies the stored biometric (from service block 112A) 65
`against the recently acquired biometric (from input 104).
`Upon proper verification, various applications 120 are per-
`
`US 10,073,960 Bl
`
`4
`mitted to connect to the PDK 102 via the sensor 108 and/or
`to gain access to other service blocks 112.
`The system 100 can be used to address applications 120
`where it is important to authenticate an individual for use.
`Generally, the sensor 108 wirelessly receives information
`stored in the PDK 102 that uniquely identifies the PDK 102
`and the individual carrying the PDK 102. The sensor 108 can
`also receive a biometric input 104 from the individual.
`Based on the received information, the sensor 108 deter-
`10 mines if access to the application 120 should be granted. In
`this example, the system 100 provides authentication with(cid:173)
`out the need for PINs or passwords (although PINs and
`passwords may be used in other implementations). More(cid:173)
`over, personal biometric information need not be stored in
`15 any local or remote storage database and is only stored on
`the user's own PDK (in one embodiment).
`The credibility of the system 100 is ensured by the use of
`a PDK 102 that stores trusted information. The PDK 102 is
`a compact, portable uniquely identifiable wireless device
`typically carried by an individual. The PDK 102 stores
`digital information in a tamper-proof format that uniquely
`associates the PDK 102 with an individual. Example
`embodiments of PD Ks are described in more detail in U.S.
`patent application Ser. No. 11/292,330, entitled "Personal
`Digital Key And Receiver/Decoder Circuit System And
`Method" filed on Nov. 30, 2005; U.S. patent application Ser.
`No. 11/620,581 entitled "Wireless Network Synchronization
`Of Cells And Client Devices On A Network" filed on Jan. 5,
`2007; and U.S. patent application Ser. No. 11/620,577
`30 entitled "Dynamic Real-Time Tiered Client Access" filed on
`Jan. 5, 2007, the entire contents of which are all incorporated
`herein by reference.
`The sensor 108 wirelessly communicates with the PDK
`102 when the PDK 102 is within a proximity zone (i.e.,
`35 within a microcell) of the sensor 108. The proximity zone
`can be, for example, several meters in radius and preferably
`can be adjusted dynamically by the sensor 108. Thus, in
`contrast to many conventional RF ID devices, the sensor 108
`can detect and communicate with the PDK 102 without
`requiring the owner to remove the PDK 102 from his/her
`pocket, wallet, purse, etc. Generally, the sensor 108 receives
`uniquely identifying information from the PDK 102 and
`initiates an authentication process for the individual carrying
`the PDK 102. In one embodiment, the sensor 108 is adapted
`to receive a biometric input 104 from the individual. The
`biometric input 104 comprises a representation of physical
`or behavioral characteristics unique to the individual. For
`example, the biometric input 104 can include a fingerprint,
`a palm print, a retinal scan, an iris scan, a photograph, a
`signature, a voice sample or any other biometric information
`such as DNA, RNA or their derivatives that can uniquely
`identify the individual. The sensor 108 compares the bio(cid:173)
`metric input 104 to information received from the PDK 102
`to determine authentication. Alternatively, the biometric
`55 input 104 can be obtained by a biometric sensor on the PDK
`102 and transmitted to the sensor 108 for authentication. In
`additional alternative embodiment, some or all of the
`authentication process can be performed by the PDK 102
`instead of the sensor 108.
`In this example, the sensor 108 is further communica(cid:173)
`tively coupled to the network 110 in order to receive and/or
`transmit information to remote databases for remote authen(cid:173)
`tication. In an alternative embodiment, the sensor 108
`includes a non-volatile data storage that can be synchronized
`with one or more remote databases or registries. Such an
`embodiment alleviates the need for a continuous connection
`to the network 110 and allows the sensor 108 to operate in
`
`Page 19 of 29
`
`
`
`US 10,073,960 Bl
`
`5
`a standalone mode and for the local data storage to be
`updated when a connection is available. For example, a
`standalone sensor 108 can periodically download updated
`registry entries and perform authentication locally without
`any remote lookup.
`In yet another alternative, a standalone sensor 108 may
`have a pre-configured secure access key 118 and encryption
`algorithm, or a variable access key 118 that changes, for
`example based on time and sensor ID. One example appli(cid:173)
`cation would be a sensor 108 located in a hotel room door,
`where the sensor could constantly compute a different access
`key 118 based on time, and the PDK 102 could be associated
`with this key during the hotel registration process.
`The network 110 provides communication between the
`sensor 108 and various validation databases and/or regis- 15
`tries, in addition to the applications 120. In one embodiment,
`the network 110 uses standard communications technologies
`and/or protocols. Thus, the network 110 can include links
`using technologies such as Ethernet, 802.11, 802.16, inte(cid:173)
`grated services digital network (ISDN), digital subscriber
`line (DSL), asynchronous transfer mode (ATM), etc. Simi(cid:173)
`larly, the networking protocols used on the network 110 can
`include the transmission control protocol/Internet protocol
`(TCP/IP), the hypertext transport protocol (HTTP), the
`simple mail transfer protocol (SMTP), the file transfer
`protocol (FTP), etc. The data exchanged over the network
`110 can be represented using technologies and/or formats
`including the hypertext markup language (HTML), the
`extensible markup language (XML), etc. In addition, all or
`some of links can be encrypted using conventional encryp(cid:173)
`tion technologies such as the secure sockets layer (SSL),
`Secure HTTP and/or virtual private networks (VPNs). In
`another embodiment, the entities can use custom and/or
`dedicated data communications technologies instead of, or
`in addition to, the ones described above.
`In one aspect, the sensor 108 may connect to a validation
`database that stores additional information that may be used
`for authorizing a transaction to be processed at the sensor.
`For example, in purchase transactions, the sensor 108 may
`interact with a credit card validation database that is separate
`from the merchant providing the sale. Alternatively, a dif(cid:173)
`ferent database may be used to validate different types of
`purchasing means such as a debit card, ATM card, or bank
`account number.
`In another aspect, the sensor 108 may connect to various
`registries that store, among other items, PDK, notary, and/or
`sensor information. In one embodiment, a registry stores
`biometric or other types of information in an encoded format
`that can only be recovered using an algorithm or encoding
`key stored in the PDK. Information stored in the registries 50
`can be accessed by the sensor 108 via the network 110 for
`use in the authentication process. Two basic types of regis(cid:173)
`tries are private registries and a Central Registry. Private
`registries are generally established and administered by their
`controlling entities ( e.g., a merchant, business authority, or 55
`other entity administering authentication). Private registries
`can be custom configured to meet the specialized and
`independent needs of each controlling entity. A Central
`Registry is a highly-secured, centrally-located database
`administered by a trusted third-party organization. In one 60
`embodiment, all PDKs 102 are registered with the Central
`Registry and may be optionally registered with one or more
`selected private registries. In alternative embodiments, a
`different number or different types of registries may be
`coupled to the network 110.
`The service blocks 112 can be used for purposes other
`than user authentication. For example, information used or
`
`6
`produced by an application 120 can be transferred back and
`forth to the corresponding service block 112. That is, each
`service block 112 can be used as a local secure memory for
`the corresponding application 120. Thus, a service 120B
`may store certain sensitive information in service block
`112B, and a separate service 120C will not be able to access
`that information without the corresponding access key 118B.
`In this example, the sensor 108 only holds access keys 118A,
`D, F and does not hold access key 118B. The application
`10 120B may hold the access key 118B, thus allowing it to
`access service block 112B but preventing application 120C
`from accessing the service block 112B. Note that this
`implementation would also prevent the sensor 108 acting
`alone from accessing the service block 112B.
`Turning now to FIG. 2, an example embodiment of a PDK
`102 is illustrated. The PDK 102 comprises a memory 210,
`control logic 250, wireless application 260 and a transceiver
`270. The PDK 102 can be standalone as a portable, physical
`device or can be integrated into commonly carried items. For
`20 example, a PDK 102 can be integrated into a portable
`electronic device such as a cell phone, Personal Digital
`Assistant (PDA), or GPS unit, an employee identification
`tag, clothing, or jewelry items such as watches, rings,
`necklaces or bracelets. In one embodiment, the PD K 102 can
`25 be, for example, about the size of a Subscriber Identity
`Module (SIM) card and be as small as a square inch in area
`or less. In another embodiment, the PDK 102 can be easily
`contained in a pocket, on a keychain, or in a wallet. The
`PDK can also contain other components not shown, for
`30 example various other inputs, outputs and/or interfaces
`(serial or parallel).
`The memory 210 can be a read-only memory, a once(cid:173)
`programmable memory, a read/write memory or any com(cid:173)
`bination of memory types, including physical access secured
`35 and tamperproof memories. The memory 210 typically
`stores a unique PDK ID 212. The PDK ID 212 comprises a
`public section and a private section of information, each of
`which can be used for identification and authentication. In
`one embodiment, the PDK ID 212 is stored in a read-only
`40 format that cannot be changed subsequent to manufacture.
`The PDK ID 212 is used as an identifying feature of a PDK
`102 and distinguishes betw