`
`a2) United States Patent
`US 8,646,042 B1
`(0) Patent No.:
`*Feb. 4, 2014
`(45) Date of Patent:
`Brown
`
`(54) HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODSOF USE
`
`(75)
`
`Inventor: David L. Brown, Jupiter, FL (US)
`
`5,422,632 A
`5,450,489 A
`5,619,251 A
`5,629,980 A
`5,644,354 A
`
`6/1995 Bucholtz etal.
`9/1995 Ostroveret al.
`4/1997 Kuroiwaetal.
`5/1997 Stefik etal.
`7/1997 Thompsonet al.
`
`(Continued)
`
`(73) Assignee: Proxense, LLC, Bend, OR (US)
`
`FOREIGN PATENT DOCUMENTS
`
`(*) Notice:
`Subject to any disclaimer, the term ofthis
`WO WO 00/62505 Al—10/2000
`
`WO
`WO 01/22724 Al
`3/2001
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`This patent is subject to a terminal dis-
`claimer.
`
`(Continued)
`OTHER PUBLICATIONS
`
`(21) Appl. No.: 13/445,825
`
`(22)
`
`Filed:
`
`Apr. 12, 2012
`
`“Alliance Activities: Publications: Identity—Smart Card Alliance,”
`Smart Card Alliance, 1997-2007, [online] [Retrieved on Jan. 7, 2007]
`Retrived from the Internet <URL:http://www.smartcardalliance.org/
`publications-identity>, 3 pages.
`
`Related U.S. Application Data
`
`(Continued)
`
`(63) Continuation of application No. 12/329,329, filed on
`Dec. 5, 2008, now Pat. No. 8,171,528.
`
`Primary Examiner — Morshed Mehedi
`(74) Attorney, Agent, or Firm — Patent Law Works LLP
`
`(60) Provisional application No. 60/992,953, filed on Dec.
`6, 2007.
`
`(57)
`
`ABSTRACT
`
`(51)
`
`Int. CL.
`GO6F 21/00
`(52) US.CL
`USPC veececcsssseeee 726/3; 726/32; 713/171; 713/176;
`380/255; 380/280; 380/282; 709/229; 455/15;
`455/456
`
`(2013.01)
`
`(58) Field of Classification Search
`USPC icccsccsessectsteseescnseesessescsenssarsenseesensensees 726/3
`
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`4,759,060 A
`5,187,352 A
`5,296,641 A
`5,392,433 A
`
`7/1988 Hayashiet al.
`2/1993 Blair et al.
`3/1994 Stelzel
`2/1995 Hammersley etal.
`
`A hybrid device includes a personaldigital key (PDK) anda
`receiver-decoder circuit (RDC). In one embodiment,
`the
`hybrid device also provides a physical interconnect for con-
`necting to other devices to send and receive control signals
`and data, and receive power. The hybrid device operates in
`one of several modes including, PDK only, RDC only, or
`PDK and RDC. This allowsa variety of system configurations
`for mixed operation including: PDK/RDC, RDC/RDC or
`PDK/PDK.Thedisclosure also includes a number of system
`configurations for use of the hybrid device including: use of
`the hybrid device in a cell phone; simultaneous use of the
`PDK and the RDC functionality of hybrid device; use of
`multiple links of hybrid device to generate an authorization
`signal, use of multiple PDK links to the hybrid device to
`generate an authorization signal; and use of the hybrid device
`for authorization inheritance.
`
`20 Claims, 15 Drawing Sheets
`
`
`
`PDK 102
`
`Bik 112A
`
`Sensor 108
`
`Key 118A
`
`Biometrics
`104
`
`Application 120A
`
`Page 1 of 30
`
`GOOGLE EXHIBIT1001
`
`GOOGLE EXHIBIT 1001
`
`Page 1 of 30
`
`
`
`US 8,646,042 B1
`
`Page 2
`
`2002/0104006 Al
`2002/0108049 Al
`2002/0109580 Al
`2003/0055689 Al
`2003/0213840 Al
`2004/0129787 Al
`2005/0090200 Al
`2005/0116020 Al
`2006/0111955 Al
`2006/0136742 Al
`2006/0208066 Al
`2007/0159994 Al
`2007/0174809 Al
`
`8/2002 Boate etal.
`8/2002 Xu etal.
`8/2002 Shreve etal.
`3/2003 Blocketal.
`11/2003 Livingstonet al.
`7/2004 Saito et al.
`4/2005 Karaoguz et al.
`6/2005 Smoluchaetal.
`5/2006 Winteretal.
`6/2006 Giobbi
`9/2006 Finn etal.
`7/2007 Brownetal.
`7/2007 Brownetal.
`
`FOREIGN PATENT DOCUMENTS
`
`OTHER PUBLICATIONS
`
`Handelman et al.
`9/1997
`5,666,412
`VanHorn
`6/1998
`5,773,954
`T/N998
`5,784,464
`Akiyamaetal.
`10/1998
`Peterson,Jr.
`5,825,876
`1/1999
`Peterson,Jr.
`5,857,020
`4/1999
`5,892,825
`Magesetal.
`4/1999
`5,894,551
`Hugginsetal.
`4/1999
`5,898,880
`Ryu
`7/1999
`5,928,327
`Wanget al.
`Graunkeet al.
`11/1999
`5,991,399
`11/1999
`5,991,749
`Morrill, Jr.
`3/2000
`6,035,038
`Campinos etal.
`3/2000
`10/2001
`WO 01/75876 Al
`WO
`6,035,329
`Magesetal.
`Hsuet al.
`3/2000
`
`WO WO 01/77790 Al—10/2001
`6,041,410
`4/2000
`WO
`WO 2005/050450 Al
`6/2005
`6,055,314
`Spieset al.
`6/2000
`Sirbu
`WO
`WO 2005/086802 A2
`9/2005
`6,070,796
`7/2000
`Katoet al.
`6,088,730
`8/2000
`6,104,334
`Allport
`8/2000
`Walker etal.
`6,110,041
`11/2000
`Anderson
`6,148,142
`12/2000
`Seidel
`6,161,179
`3/2001
`Selitrennikoffet al.
`6,209,089
`4/2001
`6,219,109
`Raynesford etal.
`6/2001
`Fritsch
`6,247,130
`7/2001
`6,266,415
`Campinos etal.
`9/2001
`Rosin et al.
`6,295,057
`1/2002
`6,336,121
`Lysonetal.
`1/2002
`Katoet al.
`6,336,142
`4/2002
`Ansell et al.
`6,367,019
`4/2002
`Wonforet al.
`6,381,747
`5/2002
`Wiseret al.
`6,385,596
`5/2002
`White et al.
`6,392,664
`5/2002
`Rosin et al.
`6,397,387
`6/2002
`Shenet al.
`6,401,059
`6/2002
`Rosin et al.
`6,411,307
`7/2002
`Saito
`6,424,715
`7/2002
`Rallis et al.
`6,425,084
`8/2002
`6,434,535
`Kupkaet al.
`9/2002
`6,446,130
`Grapes
`10/2002
`6,463,534
`Geigeret al.
`11/2002
`6,480,188
`Horsley
`12/2002
`6,490,443
`Freeny,Jr.
`1/2003
`Steenet al.
`6,510,350
`2/2003
`6,523,113
`Wehrenberg
`3/2003
`Getsin et al.
`6,529,949
`4/2003
`Schenaet al.
`6,546,418
`4/2003
`6,550,011
`Sims,III
`5/2003
`Maetal.
`6,563,805
`5/2003
`6,564,380
`Murphy
`9/2003
`White et al.
`6,628,302
`10/2003
`6,632,992
`Hasegawa
`11/2003
`Hunteret al.
`6,647,417
`12/2003
`6,667,684
`Waggamonetal.
`1/2004
`Searle
`6,683,954
`2/2004
`Jonesetal.
`6,697,944
`3/2004
`6,711,464
`Yapet al.
`8/2004
`Peinadoet al.
`6,775,655
`10/2004
`White et al.
`6,804,825
`10/2004
`Chernocket al.
`6,806,887
`2/2005
`Prokoskiet al.
`6,850,147
`3/2005
`6,873,975
`Hatakeyamaetal.
`4/2005
`6,879,567
`Callawayet al.
`9/2005
`Lee etal.
`6,950,941
`10/2005
`Bahletal.
`6,957,086
`12/2005
`Giobbi
`6,973,576
`12/2005
`6,975,202
`Rodriguez etal.
`3/2006
`Nielsen
`7,012,503
`1/2007
`7,159,765
`Frerking
`7/2007
`Miller
`7,249,177
`12/2007
`Giobbi
`7,305,560
`2002/0007456
`1/2002
`Peinadoet al.
`2002/0013772
`1/2002
`Peinado
`2002/0015494
`2/2002
`Nagaiet al.
`2002/0026424
`2/2002
`Akashi
`2002/0073042
`6/2002
`Maritzenet al.
`
`Antonoff, Michael, “Visiting Video Valley,” Sound & Vision, pp. 116
`and 118-119, Nov. 2001.
`“Applying Biometrics to Door Access,” Security Magazine, Sep. 26,
`2002 [online] [Retrieved on Jan. 7, 2007] Retrieved from the Internet
`<URL-http://www.securitymagazine.comICDA/Articles/Technolo-
`gies/3ae6 100eaa34d80 1OVgnVCM 10000093 2a8cO-> 5 pages.
`Article, “In the Age of Napster, Protecting Copyright is a Digital
`ArmsRace,” Wall Street Journal, Jul. 24, 2000, 2 pages.
`Article, “Sound Waves Could Help Ease Web-Fraud Woes,” Wall
`Street Journal, Aug. 14, 2000, 2 pages.
`Blum,Jonathan,“Digital Rights Management MaySolve the Napster
`“Problem’,” Technology Investor Industry Sector,
`(Oct. 2000),
`24-27,
`Brown, D, Techniques for Privacy and Authentication in Personal
`Communication Systems; Personal Communications, IEEE; vol. 2,
`Issue: 4 Publication Year: 1995, pp. 6-10.
`Dagan (Power over Ethernet (PoE) Midspan—The Smart Path to
`Providing Power for IP Telephony Author: Sharon Dagan, Product
`Manager, Systems Aug. 2005, PowerDsineInc.), 28 pages.
`Debow,Credit/Debit Debuts in Midwest Smart Card Test, Computers
`in Banking, v6, n11, p. 10, Nov. 1989, 4 pages.
`Dennis, Digital Passports Need Not
`Infringe Civil Liberties,
`Newsbytes, Dec. 2, 1999, 2 pages.
`Fasca, Chad,“The Circuit,” Electronic News, 45(45) (Nov.8, 1999),
`20 pages.
`Firecrest Shows How Truly Commercially-Minded Companies Will
`Exploit the Internet, Computergram International, Jan. 18, 1996, 2
`pages.
`“Frequently Asked Questions (FAQs) About BioPay,” BioPay, LLC,
`2007, [online] [Retrieved on Jan. 7, 2007] Retrieved from the Internet
`<URL: http://www.biopay.comlfaqs-lowes.asp>, 5 pages.
`Generation of keys for use with the digital signature standard (DSS)
`; Nel, J.J; Kuhn, GJ.; Communications and Signal Processing,
`1993., Proceedings of the 1993 IEEE South African Symposium on
`Publication Year: 1993, pp. 6-11.
`encyclopedia,”
`free
`the
`“TEEE
`802.15.4-2006-Wikipedia,
`Wikipedia®, Last Modified Mar. 21, 2009 [Online] [Retrieved on
`Apr. 30, 2009] Retrieved from the Internet <URL:http://en.
`wikipedia.org/wiki/TIEEE__802.15.4-2006>, 4 pages .
`Lake, Matt, “Downloading for Dollars,’ Sound & Vision, (Nov.
`2000), pp. 137-138.
`Lewis, Sony and Visa in On-Line Entertainment Venture, New York
`Times, v145, Nov. 16, 1995, 1 page.
`Mclver, R.et al., “Identification and Verification Working Together,”
`Bioscrypt™, Aug. 27, 2004, [online] [Retrieved on Jan. 7, 2007]
`Retrieved
`from the
`Internet
`<URL:http://www.ibia.org/
`membersadmin/whitepapers/pdf/15/
`Identification%20and%20Verification%20Working%20Together.
`pdf>, 5 pages.
`Nilsson,
`J. et al., “Match-On-Card for Java Cards,” Precise
`Biometrics, White Paper, Apr. 2004, [online] [Retrieved on Jan. 7,
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`PPPrPPrPPrPEEEPEPrrPS
`
`Al
`
`Page 2 of 30
`
`Page 2 of 30
`
`
`
`US 8,646,042 B1
`Page 3
`
`(56)
`
`References Cited
`OTHER PUBLICATIONS
`
`2007] Retrieved from the Internet <URL: http://www.ibia.org/
`membersadmin/whitepapers/pdf/17/Precise%20Match-
`onCard%20for%20Java%20Cards.pdf>, 5 pages.
`Nordin, B., “Match-On-Card Technology,” Precise™ Biometrics,
`White Paper, Apr. 2004,
`[online]
`[Retrieved on Jan. 7, 2007]
`Retrieved
`from the
`Internet
`<URL:http://www.ibia.org/
`Membersadmin/whitepapers/pdf/ 17
`TPrecise%20Match-
`onCard%20technology.pdf>, 7 pages.
`Notification of the International Search Report and Written Opinion,
`PCT/US04 138124, Apr. 7, 2005, 10 pages.
`Paget, Paul, “The Security Behind Secure Extranets,” Enterprise
`Systems Journal, (Dec. 1999), 4 pgs.
`PCT International Search Report and Written Opinion, PCT/US07/
`11105, Oct. 20, 2008, 9 pages.
`PCT International Search Report and Written Opinion, PCT/US07/
`11103, Apr. 23, 2008, 8 pages.
`PCT International Search Report and Written Opinion, PCT/US05/
`43447, Feb. 22, 2007, 7 pages.
`PCT International Search Report and Written Opinion, PCT/US05/
`46843, Mar. 1, 2007, 10 pages.
`PCT International Search Report and Written Opinion, PCT/US07/
`00349, Mar. 19, 2008, 10 pages.
`Personal Servers as Digital Keys; Beaufour, A.; Bonnet, P.; Pervasive
`Computing and Communications, 2004. PerCom 2004. Proceedings
`of the Second IEEE Annual Conference on Publication Year: 2004,
`pp. 10 pages.
`Press Release, ““Micronas and Thomson Multimedia Showcase a
`New CopyProtection System that Will Drive the Future of Digital
`Television,” www.micronas.com, Jan. 8, 2002, 3 pages.
`
`Press Release, “Content Protection Plan Targets Wireless Home Net-
`works,” www.eetimes.com, Jan. 11, 2002, 2 pages.
`Press Release, “Thompson Bets on Smart Cards for Video Encryp-
`tion,” www.informationweek.com. Jun. 7, 2001, 1 page.
`Press Release, “Thompson Multimedia Unveils Copy Protection Pro-
`posal Designed to Provide Additional Layer of Digital Content Secu-
`rity,’ www.thompson-multimedia.com May 30, 2001, 2 pages.
`“SAFModule™: A LookInto Strong Authentication,”saflink Corpo-
`ration, [online]
`[Retrieved on Jan. 7, 2007] Retrieved from the
`Internet<URL :http://www.ibia.org/membersadmin/whitepapers/
`pdf/6/SAFmod_WP.pdf>, 8 pages.
`Sapsford, Jathon, “E-Business: Sound Waves Could Help Ease
`WebFraud Woes,” Wall Street Journal, (Aug. 14, 2000), B1, 2 pages.
`“Say Hello to Bluetooth,” Bluetooth Website, 5 pages.
`“Smart Cards and Biometrics White Paper,’ Smart Card Alliance,
`May 2002, [online] [Retrieved on Jan. 7, 2007] Retrieved from the
`Internet
`<URL-http://www.securitymanagement.com/library/
`smartcard__faqtech0802.pdf>, 7 pages.
`Van Winkle, William, “Bluetooth, the King of Connectivity,’ Laptop
`Buyer’s Guide and. Handbook, (Jan. 2000), pp. 148-153.
`Wade, W., “Using Fingerprints to Make Payments at POS Slowly
`Gaining Popularity,” Credit Union Journal, International Biometric
`Group, Apr. 21, 2003, [online] [Retrieved on Jan. 7, 2007] Retrieved.
`from the Internet <URL: http://www.biometricgroup.comlin_the_
`news/04.21.03.-html>, 3 pages.
`Wallace, Bob,
`“The
`Internet Unplugged,’
`765(22), (Dec. 13, 1999), pp. 22-24.
`Weber, ThomasE., “In the Age of Napster, Protecting Copyrightis a
`Digital Arms Race,” Wall Street Journal, (Jul. 24, 2000), B1, 2 pages.
`Non-Final Office Action, U.S. Appl. No. 11/939,451, Dated: May 12,
`2010, 12 pages.
`
`InformationWeek,
`
`Page 3 of 30
`
`Page 3 of 30
`
`
`
`US 8,646,042 B1
`
`|Old
`
`SOUJeWolg
`
`p01
`
`Feb. 4, 2014
`
`Sheet 1 of 15
`
`Oz}uoneoiddy
`
`A8bb
`
`80}JosussZOMd
`
`U.S. Patent
`
`Page 4 of 30
`
`BdIAJ8S
`
`Velbld
`
`Page 4 of 30
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 2 of 15
`
`US 8,646,042 B1
`
`JOAISOSUBL]
`
`092
`
`O1zZMowe)
`
`
`
`OL¢uoneoddy
`
`Sil
`
`ya|sSgs):
`
`yz }dAloeqndAuouz
`
`EGC 10}99/8S
`
`¢Ols
`
`cOL4dd
`
`9eF9819SaS
`
`BIAS
`
`Page 5 of 30
`
`Page 5 of 30
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 3 of 15
`
`US 8,646,042 B1
`
`
`
`JO1JUODZLE
`
`[SNYEYSWOdO/|
`
`JOSS9001q
`
`90€
`
`€Old
`
`
`
`90]JosuaS
`
`80¢
`
`
`
`0eL3]UIz0¢
`
`
`
`OMEN(s)apeoy
`
`ujawolg
`
`Page 6 of 30
`
`Page 6 of 30
`
`
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 4 of 15
`
`US 8,646,042 B1
`
`uoneoiddy
`
`WA!
`
`
`
`Koysseooy
`
`ast
`
`ssa00y
`
`WELLAy
`
`vols
`
`ZOlMd
`
`
`
`OLSSdIA9qSUO|EPUE}S/Od
`
`
`
`QQ}Josuas
`
`Q0IMaS
`
`VollAIG
`
`dcll
`
`Ocht
`
`Page 7 of 30
`
`Page 7 of 30
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 5 of 15
`
`US 8,646,042 B1
`
`uoneolddy
`
`021
`
`Keyssaooy
`
`asl
`
`uoneaddy
`
`GOld
`
`
`
`SOINIAS|BUIAIXI
`
`ZbGSISPAYOMON/Od
`
`
`
`9Q|sosues
`
`201Md
`
`DOINIaS
`
`Vell4d
`
`ach
`
`Jbl.
`
`Lnzii]
`
`Page 8 of 30
`
`Page 8 of 30
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 6 of 15
`
`US 8,646,042 B1
`
`LZ0Z1ddy
`
`WELLAey
`
`2Z0z1ddy
`
`agi)Aey
`
`€Z0z1ddy
`
`agi)Aey
`
`Z801
`
`ddy
`
`LAL
`
`201Mdd
`
`BIOS
`
`Vell4G
`
`gel
`
`QEll
`
`g:
`JIS
`
`X0z/ddy
`
`9811Aey
`
`Moz)ddy
`
`9811fey
`
`Adzlddy
`
`O91)Aey
`
`Page 9 of 30
`
`Page 9 of 30
`
`
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 7 of 15
`
`US8,646,042 B1
`
`
`Coordinator RFCell
`
`Standalone Unit
`
`
`0&2 WS
`
`FIG.7
`
`
`
`
`
`
`Tracking720A
` Location
`RemoteApps 720E
`
`Alerts720C
`Messaging 7208
`
`
`
`
`ThirdPartyApps720D
`
`Sxof
`2s><
`Lu ®
`ozE
`
`Page 10 of 30
`
`Page 10 of 30
`
`
`
`U.S. Patent
`
`Feb.4, 2014
`
`Sheet 8 of 15
`
`US 8,646,042 B1
`
`
`
`
`FIG. 8
`
`FIG. 9
`
`Page 11 of 30
`
`Page 11 of 30
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 9 of 15
`
`US 8,646,042 B1
`
`4887OL0L
`
`|YoyNG
`
`SJE9[9Md0901
`
`|,uoyngsasseid
`
`LSHolyOU)VHOTY7
`
`|(e}eq“xnOu)Uddka
`TOSUSJO}eUIPIOOTWws!§—[_woneyddy
`
`
`OlSls
`90201]|J0¢01
`
`oso!(|uoyng)weePB|ae$199JojeiadgOrOl
`gOSOl
`
`BdIMBSNEO)
`
`Page 12 of 30
`
`Page 12 of 30
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Feb.4, 2014
`
`Sheet 10 of 15
`
`US 8,646,042 B1
`
`OTHER
`
`DEVICE
`
`co
`Oo—
`—
`
`FIG.11
`
`Page 13 of 30
`
`Page 13 of 30
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 11 of 15
`
`US 8,646,042 B1
`
`Aayyeg9sjusuodwo9
`
`
`
`QU0Ud||9D
`
`PIEDWIS
`
`9021
`
`&cOLdd ey0EOdyqc0ldd
`
`COC)U0[IPD
`
`Page 14 of 30
`
`¢bOld
`
`Page 14 of 30
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 12 of 15
`
`US 8,646,042 B1
`
`qv0e90Y
`
`PUGAH
`
`
`
`COLLS9lAeq
`
`BOLMdd
`
`Bp0eOdd
`
`tbOld
`
`OOEL
`
`Page 15 of 30
`
`G20Mdd
`
`Page 15 of 30
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 13 of 15
`
`US 8,646,042 B1
`
`qv0eOCY
`
`
`
`TWNOISATEaVNA
`
`90F|
`
`&ZOLdd
`
`ep0e20H
`
`
`
`COLL891A8q
`
`PLIQAH
`
`vlOld
`
`OO0rl
`
`Page 16 of 30
`
`qc0l4dd
`
`Page 16 of 30
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 14 of 15
`
`US 8,646,042 B1
`
`00S1
`
`B20Md
`
`GbOls
`
`TWNOIS
`
`ATEVNA By0¢OCUUZOlMOd
`
`
`/COLL891A8qPLQAH
`
`A
`
`G20)Mad
`
`Page 17 of 30
`
`Page 17 of 30
`
`
`
`PUGAH BOUPVOUU]
`
`
`
`
`
`U.S. Patent
`
`Feb. 4, 2014
`
`Sheet 15 of 15
`
`US 8,646,042 B1
`
`qy0€90y
`
`
`
`BABSI4-IW/Odd
`
`PIO)SoUeyNeuu]aIMeo.
`
`AZOS91A9q
`
`&cOL4d
`
`By0e9du
`
`
`
`CLOSQURINSBYU]SOIAJES
`
`
`
`ZJUNODY[19DZJOYHEDJIpAUD
`
`sseo0ygqdwog
`
`Gc0ldd
`
`
`
`SOULTNOYU]SOINOS
`
`JOOYSSB00V|4-IM|JUNODIDY
`
`||8O|oYWDIpIAD
`
`C091
`
`ssaooyy‘diw09
`
`SIMea-]
`
`Page 18 of 30
`
`Page 18 of 30
`
`
`
`US 8,646,042 B1
`
`1
`HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODSOF USE
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`The present application claims priority under 35 U.S.C.
`§120 to U.S. patent application Ser. No. 12/329,329 entitled
`“Hybrid Device Having a Personal Digital Key and Receiver
`Decoder Circuit and Method of Use,” filed Dec. 5, 2008,
`which claimsthe benefit of priority under 35 U.S.C. §119(e)
`of U.S. Provisional Application No. 60/992,953 entitled
`“Reverse Prox,”filed on Dec. 6, 2007 by David L. Brown,
`John J. Giobbi and Fred S. Hirt. The entire contentsof all of
`
`the foregoing are incorporated by reference herein.
`
`BACKGROUND
`
`1. Field of Art
`Theinvention generally relates to personal digital keys and
`corresponding sensors, capable of proximity detection/loca-
`tion determination and auxiliary data services/application
`services. Still more particularly, the present invention relates
`to a hybrid device including a personal digital key (PDK) and
`a receiver-decoder circuit (RDC) and methods for using
`same.
`
`2. Description of the Related Art
`Proximity sensors and location tracking are technologies
`with many applications. For example, proximity sensors can
`be used to provide secure access to physical and/or digital
`assets, based on biometrics, passwords, PINs, or other types
`of authentication. Proximity sensors typically have advan-
`tages of being less cumbersome, easier to use, and more
`flexible in form factor and implementation. Proximity sensors
`can be used to control access to resources and/orto authenti-
`
`cate individuals, for example.
`Onepossible application that can take advantage of prox-
`imity sensors is location tracking RFID tracking is one
`example. In RFID, RFID tags are attached to objects to be
`tracked. RFID readers then interact with the RFID tags to
`determine the location of the tag. Regardless of how it is
`accomplished, location tracking (i.e., knowledge about the
`location of an object or person) is generally useful. For
`example, location tracking information can be used to track
`inventory andtrace the route of objects through various loca-
`tions. It can be used for time and motion studies. If tags are
`attached to people, then tracking of people can be used to
`better understand their behavior. Knowledge about a person’s
`location (and/ortheir past locations and projected future loca-
`tions) could be used to provide better services to that person.
`However, most proximity systems and location tracking
`systems have limited capabilities. Typically, the proximity
`sensor, RFID tag or similar device is a dumb device, in the
`sense that the device is designed andhasthe capability only to
`report its location. For example, such devices typically do not
`have the capabilities to run different applications or to even
`interact with different applications. Furthermore, these sys-
`tems typically are proprietary and narrowly tailored for a
`specific situation, thus preventing easy expandability to other
`situations or third party applications.
`
`SUMMARY
`
`Various drawbacksof the prior art are overcome by pro-
`viding a hybrid device including a personal digital key (PDK)
`and a receiver-decodercircuit (RDC). The PDK and RDC of
`Page 19 of 30
`
`2
`the hybrid device are coupled for communication with each
`other. In one embodiment, the hybrid device also provides a
`physical interconnect for connecting to other devices to send
`and receive control signals and data, and receive power. The
`hybrid device operates in one of several modes including,
`PDKonly, RDC only, or PDK and RDC. This allowsa variety
`of system configurations for mixed operation including:
`PDK/RDC, RDC/RDC or PDK/PDK.The present invention
`also includes a numberof system configurations for use ofthe
`hybrid device including: use of the hybrid device in a cell
`phone; simultaneous use of the PDK and the RDC function-
`ality of hybrid device; use of multiple links of hybrid device
`to generate an authorization signal, use ofmultiple PDKlinks
`to the hybrid device to generate an authorization signal; use of
`the hybrid device for authorization inheritance and use of the
`hybrid device for automatically disabling a service or feature.
`Other aspects of the invention include systems and com-
`ponents corresponding to the above, and methods corre-
`spondingto all of the foregoing.
`
`BRIEF DESCRIPTION OF THE FIGURES
`
`FIG.1 is a block diagram illustrating one embodimentof a
`system according to the invention.
`FIG.2 is a block diagram illustrating one embodimentof a
`Personal Digital Key (PDK).
`FIG.3 is a block diagram illustrating one embodimentof a
`sensor.
`
`FIGS. 4-6 are block diagramsillustrating further embodi-
`ments of systems accordingto the invention.
`FIG.7 is a block diagram illustrating one embodimentof a
`system with networked sensors.
`FIGS. 8-9 are block diagramsillustrating operation of the
`system in FIG. 7.
`FIG.10 is a diagram illustrating operation of the system in
`FIG.7.
`
`FIG. 11 is a block diagram of one embodimentof a hybrid
`device in accordance with the present invention.
`FIG. 12 is a block diagram of one embodimentof a system
`in which the hybrid device is part of a cell phone in accor-
`dance with the present invention.
`FIG. 13 is a block diagram of one embodimentof a system
`using the PDK and the RDC functionality of hybrid device in
`accordance with the present invention.
`FIG. 14 is a block diagram of one embodimentof a system
`using the multiple links ofhybrid device to generate an autho-
`rization signal in accordance with the present invention.
`FIG. 15 is a block diagram of one embodimentof a system
`using the multiple PDKlinks to the hybrid device to generate
`an authorization signal in accordance with the present inven-
`tion.
`FIG. 16 is a block diagram of one embodimentof a system
`using the hybrid device for authorization inheritance in accor-
`dance with the present invention.
`The figures depict various embodiments of the present
`invention for purposesofillustration only. One skilled in the
`art will readily recognize from the following discussion that
`alternative embodimentsof the structures and methodsillus-
`trated herein may be employed without departing from the
`principles of the invention described herein.
`
`DETAILED DESCRIPTION
`
`FIG.1 is a high level block diagram illustrating a system
`for allowing access to multiple applications(or services). The
`system 100 comprises a Personal Digital Key (PDK) 102, a
`sensor 108, a network 110 and one or more applications 120
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Page 19 of 30
`
`
`
`US 8,646,042 B1
`
`3
`(including services). The sensor 108 is coupled to the PDK
`102 by a wireless link 106 and coupled to a network 110 by
`either a wired or wireless link. In this example, the applica-
`tions 120 are also accessed over network 110. The sensor 108
`is also adapted to receive a biometric input 104 from a user
`and is capable of displaying status to a user. In alternative
`embodiments, different or additional resources and databases
`may be coupled to the network 110, including for example
`registries and databases used for validation or to check vari-
`ous registrations of the user. In another embodiment, the
`sensor 108 operates as a standalone device without a connec-
`tion to the network 110.
`
`The PDK 102 includes multiple service blocks 112A-N as
`described in moredetail in FIG. 2. Each service block 112 is
`
`accessed using a correspondingservice block access key 118.
`In this example, the sensor 108 contains three of the service
`block access keys 118A, D, F. The service block access keys
`118 allow the sensor 108 to unlock information stored in the
`corresponding service blocks 112, which information is used
`as local secured information.
`In one example, a biometric is required in order to access
`specific service blocks 112 in the PDK 102. Verification ofthe
`biometric is achieved by using service block 112A. The sen-
`sor 108 stores the corresponding service block access key
`118A and usesthis key to unlock the biometric service block
`112A, whichstores a valid biometric. A current biometric is
`received using biometric input 104. The sensor 108 then
`verifies the stored biometric (from service block 112A)
`against the recently acquired biometric (from input 104).
`Upon properverification, various applications 120 are per-
`mitted to connectto the PDK 102 via the sensor 108 and/or to
`
`gain access to other service blocks 112.
`The system 100 can be used to address applications 120
`where it is important to authenticate an individual for use.
`Generally, the sensor 108 wirelessly receives information
`stored in the PDK 102 that uniquely identifies the PDK 102
`and the individual carrying the PDK 102. The sensor 108 can
`also receive a biometric input 104 from the individual. Based
`on the received information, the sensor 108 determines if
`access to the application 120 should be granted. In this
`example, the system 100 provides authentication without the
`need for PINs or passwords (although PINs and passwords
`maybe used in other implementations). Moreover, personal
`biometric information need not be stored in any local or
`remote storage database andis only stored on the user’s own
`PDK(in one embodiment).
`Thecredibility of the system 100 is ensured by the use of a
`PDK 102 that stores trusted information. The PDK 102is a
`compact, portable uniquely identifiable wireless device typi-
`cally carried by an individual. The PDK 102 stores digital
`information in a tamper-proof format that uniquely associates
`the PDK 102 with an individual. Example embodiments of
`PDKsare described in more detail in U.S. patent application
`Ser. No. 11/292,330, entitled “Personal Digital Key And
`Receiver/Decoder Circuit System And Method”filed on Nov.
`30, 2005; U.S. patent application Ser. No. 11/620,581 entitled
`“Wireless Network Synchronization Of Cells And Client
`Devices On A Network”filed on Jan. 5, 2007; and U.S. patent
`application Ser. No. 11/620,577 entitled “Dynamic Real-
`Time Tiered Client Access”filed on Jan. 5, 2007, the entire
`contents of which are all incorporated herein by reference.
`The sensor 108 wirelessly communicates with the PDK
`102 when the PDK 102is within a proximity zone(i.e., within
`amicrocell) ofthe sensor 108. The proximity zone can be, for
`example, several meters in radius and preferably can be
`adjusted dynamically by the sensor 108. Thus, in contrast to
`many conventional RF ID devices, the sensor 108 can detect
`Page 20 of 30
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`and communicate with the PDK 102 without requiring the
`owner to remove the PDK 102 from his/her pocket, wallet,
`purse, etc. Generally, the sensor 108 receives uniquely iden-
`tifying information from the PDK 102 andinitiates an authen-
`tication process for the individual carrying the PDK 102. In
`one embodiment, the sensor 108 is adapted to receive a bio-
`metric input 104 from the individual. The biometric input 104
`comprises a representation of physical or behavioral charac-
`teristics unique to the individual. For example, the biometric
`input 104 can include a fingerprint, a palm print, a retinal
`scan,an iris scan, a photograph,a signature, a voice sample or
`any other biometric information such as DNA, RNA ortheir
`derivatives that can uniquely identify the individual. The sen-
`sor 108 compares the biometric input 104 to information
`received from the PDK 102 to determine authentication.
`Alternatively, the biometric input 104 can be obtained by a
`biometric sensor on the PDK 102 and transmitted to the
`sensor 108 for authentication.
`In additional alternative
`embodiment, someorall of the authentication process can be
`performed by the PDK 102 instead of the sensor 108.
`In this example, the sensor 108 is further communicatively
`coupledto the network 110 in orderto receive and/or transmit
`information to remote databases for remote authentication. In
`an alternative embodiment, the sensor 108 includes a non-
`volatile data storage that can be synchronized with one or
`more remote databases or registries. Such an embodiment
`alleviates the need for a continuous connection to the network
`110 and allowsthe sensor 108 to operate ina standalone mode
`and forthe local data storage to be updated when a connection
`is available. For example, a standalone sensor 108 can peri-
`odically download updated registry entries and perform
`authentication locally without any remote lookup.
`In yet another alternative, a standalone sensor 108 may
`have a pre-configured secure access key 118 and encryption
`algorithm, or a variable access key 118 that changes, for
`example based on time and sensor ID. One example applica-
`tion would be a sensor 108 located ina hotel room door, where
`the sensor could constantly compute a different access key
`118 based on time, and the PDK 102 could be associated with
`this key during the hotel registration process.
`The network 110 provides communication between the
`sensor 108 and various validation databases and/orregistries,
`in addition to the applications 120. In one embodiment, the
`network 110 uses standard communications technologies
`and/or protocols. Thus, the network 110 can include links
`using technologies such as Ethernet, 802.11, 802.16, inte-
`grated services digital network (ISDN), digital subscriberline
`(DSL), asynchronous transfer mode (ATM), etc. Similarly,
`the networking protocols used on the network 110 can include
`the transmission control protocol/Internet protocol (TCP/IP),
`the hypertext transport protocol (HTTP), the simple mail
`transfer protocol (SMTP), the file transfer protocol (FTP),
`etc. The data exchanged over the network 110 can be repre-
`sented using technologies and/or formats including the
`hypertext markup language (HTML), the extensible markup
`language (XML), etc. In addition, all or someoflinks can be
`encrypted using conventional encryption technologies such
`as the secure sockets layer (SSL), Secure HTTP and/orvirtual
`private networks (VPNs). In another embodiment, the entities
`can use custom and/or dedicated data communications tech-
`nologies instead of, or in addition to, the ones described
`above.
`In one aspect, the sensor 108 may connectto a validation
`database that stores additional information that may be used
`for authorizing a transaction to be processedat the sensor. For
`example, in purchase transactions, the sensor 108 may inter-
`act with a credit card validation database that is separate from
`
`Page 20 of 30
`
`
`
`US 8,646,042 B1
`
`5
`the merchant providing the sale. Alternatively, a different
`database may be usedto validate different types ofpurchasing
`means such as a debit card, ATM card, or bank account
`number.
`In another aspect, the sensor 108 may connectto various
`registries that store, among other items, PDK,notary, and/or
`sensor information. In one embodiment, a registry stores
`biometric or other types of information in an encoded format
`that can only be recovered using an algorithm or encoding key
`stored in the PDK.Information stored in the registries can be
`accessed by the sensor 108 via the network 110 for use in the
`authentication process. Two basic types of registries are pri-
`vate registries and a Central Registry. Private registries are
`generally established and administered by their controlling
`entities (e.g., a merchant, business authority, or other entity
`administering authentication). Private registries can be cus-
`tom configured to meet the specialized and independent
`needs of each controlling entity. A Central Registry is a
`highly-secured, centrally-located database administered by a
`trusted third-party organization. In one embodiment, all
`PDKs102 are registered with the Central Registry and may be
`optionally registered with one or more selected private regis-
`tries. In alternative embodiments, a different numberor dif-
`ferent types of registries may be coupled to the network 110.
`Theservice blocks 112 can be used for purposesother than
`user authentication. For example, information used or pro-
`duced by an application 120 can be transferred back and forth
`to the corresponding service block 112. That is, each service
`block 112 can be used as a local secure memory for the
`corresponding application 120. Thus, a service 120B may
`store certain sensitive information in service block 112B, and
`a separate service 120C will not be able to access that infor-
`mation without the corresponding access key 118B. In this
`example, the sensor 108 only holds access keys 118A, D, F
`and does not hold access key 118B. The application 120B
`may hold the access key 118B, thus allowing it to access
`service block 112B but preventing application 120C from
`accessing the service block 112B. Note that this implemen-
`tation would also prevent the sensor 108 acting alone from
`accessing the service block 112B.
`Turning now to FIG. 2, an example embodiment of a PDK
`102 is illustrated. The PDK 102 comprises a memory 210,
`control logic 250, wireless application 260 and a transceiver
`270. The PDK 102 can be standaloneas a portable, physical
`device or can be integrated into commonlycarried items. For
`example, a PDK 102 can be integrated into a portable elec-
`tronic device such as a cell phone, Personal Digital Assistant
`(PDA), or GPS unit, an employee identification tag, clothing,
`or jewelry items such as watches, rings, necklaces or brace-
`lets. In one embodiment, the PDK 102 can be, for example,
`aboutthe size of a Subscriber Identity Module (SIM)card and
`be as small as a square inch in area orless. In another embodi-
`ment, the PDK 102 can be easily contained in a pocket, on a
`keychain, or in a wallet. The PDK can also contain other
`components not shown, for example various other inputs,
`outputs and/or interfaces (serialor parallel).
`The memo