throbber
US009049188B1
`
`US 9,049,188 B1
`(10) Patent No.:
`a2) United States Patent
`Brown
`(45) Date of Patent:
`*Jun. 2, 2015
`
`
`(54) HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODSOF USE
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`(71) Applicant: Proxense, LLC, Bend, OR (US)
`
`4,759,060 A
`5,187,352 A
`
`7/1988 Hayashiet al.
`2/1993 Blair et al.
`
`(Continued)
`
`(72)
`
`Inventor: David L. Brown, Jupiter, FL (US)
`
`FOREIGN PATENT DOCUMENTS
`
`WO WO 00/62505 Al—10/2000
`
`WO
`WO 01/22724 Al
`3/2001
`(73) Assignee: Proxense, LLC, Bend, OR (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`This patent is subject to a terminal dis-
`claimer.
`
`(21) Appl. No.: 14/171,705
`
`(22)
`
`Filed:
`
`Feb. 3, 2014
`
`Related U.S. Application Data
`
`(63) Continuation of application No. 13/445,825, filed on
`Apr. 12, 2012, now Pat. No. 8,646,042, which is a
`continuation of application No. 12/329,329, filed on
`Dec. 5, 2008, now Pat. No. 8,171,528.
`
`(60) Provisional application No. 60/992,953, filed on Dec.
`6, 2007.
`
`(51)
`
`(2013.01)
`(2006.01)
`
`Int. Cl.
`GO6F 21/00
`HOAL 29/06
`(52) U.S. CL.
`CPC cicccssccsecteesseeecenecenees HOA4L 63/08 (2013.01)
`(58) Field of Classification Search
`USPC viecesssescscesceeseecscnsscseecerseneeanecassentes 726/3, 4
`See application file for complete search history.
`
`100
`
`(Continued)
`OTHER PUBLICATIONS
`
`“Alliance Activities: Publications: Identity—Smart Card Alliance,”
`Smart Card Alliance, 1997-2007, [online] [Retrieved on Jan. 7, 2007]
`Retrieved from the Internet <URL:http://www.smartcardalliance.
`org/pages/publications-identity>, 3 pages.
`(Continued)
`
`Primary Examiner — Jason Lee
`(74) Attorney, Agent, or Firm — Patent Law Works LLP
`
`(57)
`
`ABSTRACT
`
`A hybrid device includes a personaldigital key (PDK) anda
`receiver-decoder circuit (RDC). The PDK and RDC of the
`hybrid device are coupled for communication with each
`other. In one embodiment, the hybrid device also provides a
`physical interconnect for connecting to other devices to send
`and receive control signals and data, and receive power. The
`hybrid device operates in one of several modes including,
`PDKonly, RDC only, or PDK and RDC. This allowsa variety
`of system configurations for mixed operation including:
`PDK/RDC, RDC/RDC or PDK/PDK.The present invention
`also includes a numberof system configurations for use ofthe
`hybrid device including: use of the hybrid device in a cell
`phone; simultaneous use of the PDK and the RDC function-
`ality of hybrid device; use of multiple links of hybrid device
`to generate an authorization signal, use ofmultiple PDKlinks
`to the hybrid device to generate an authorization signal; and
`use of the hybrid device for authorization inheritance.
`
`20 Claims, 15 Drawing Sheets
`
`PDK 102
`
`Bik 112A
`
`Application 120A
`
`
`
`Sensor108
`
`Biometrics
`104
`
`Page 1 of 30
`
`GOOGLE EXHIBIT1011
`
`GOOGLE EXHIBIT 1011
`
`Page 1 of 30
`
`

`

`US 9,049,188 B1
`
`Page 2
`
`............ 235/382
`
`OTHER PUBLICATIONS
`
`FOREIGN PATENT DOCUMENTS
`
`7/2007 Miller
`7,249,177 Bl
`References Cited
`(56)
`7,305,560 B2=12/2007 Giobbi
`U.S. PATENT DOCUMENTS
`2002/0007456 Al
`1/2002 Peinadoet al.
`2002/0013772 Al
`1/2002 Peinado
`2002/0015494 Al
`2/2002 Nagai etal.
`3/1994 Stelzel
`5,296,641 A
`
`
`5,392,433 A 2002/0026424 Al—2/2002 Akashi2/1995 Hammersley etal.
`5,422,632 A
`6/1995 Bucholtz etal.
`2002/0073042 Al
`6/2002 Maritzenetal.
`5,450,489 A
`9/1995 Ostrover etal.
`2002/0104006 Al
`8/2002 Boateet al.
`5,619,251 A
`4/1997 Kuroiwaetal.
`2002/0108049 Al
`8/2002 Xuet al.
`5,629,980 A
`5/1997 Stefik etal.
`2002/0109580 Al
`8/2002 Shreve etal.
`5,644,354 A
`7/1997 Thompsonet al.
`2003/0055689 Al
`3/2003 Blocket al.
`5,666,412 A
`9/1997 Handelman etal.
`2003/0213840 Al
`11/2003 Livingstonet al.
`5,773,954 A
`6/1998 VanHorn
`2004/0129787 Al
`7/2004 Saito et al.
`5,784,464 A
`7/1998 Akiyamaetal.
`2005/0090200 Al
`4/2005 Karaoguz et al.
`5,825,876 A
`10/1998 Peterson,Jr.
`2005/0116020 Al
`6/2005 Smoluchaetal.
`5,857,020 A
`1/1999 Peterson,Jr.
`2006/0111955 Al
`5/2006 Winteretal.
`5,892,825 A
`4/1999 Magesetal.
`2006/0113381 Al*
`6/2006 Hochstein etal.
`5,894,551 A
`4/1999 Hugginset al.
`2006/0136742 Al
`6/2006 Giobbi
`5,898,880 A
`4/1999 Ryu
`2006/0208066 Al*
`9/2006 Finnetal. oe 235/380
`5,928,327 A
`7/1999 Wanget al.
`2007/0159994 Al
`7/2007 Brownetal.
`5,991,399 A
`11/1999 Graunkeet al.
`2007/0174809 Al
`7/2007 Brownetal.
`5,991,749 A
`11/1999 Morrill, Jr.
`2007/0271194 Al* 11/2007 Walkeretal. ..... 705/80
`6,035,038 A
`3/2000 Campinos et al.
`6,035,329 A
`3/2000 Mageset al.
`6,041,410 A
`3/2000 Hsuet al.
`10/2001
`WO 01/75876 Al
`Wo
`6,055,314 A
`4/2000 Spieset al.
`
`
`6,070,796 A WO 01/77790 Al—10/20016/2000 Sirbu wo
`
`6,088,730 A
`7/2000 Kato etal.
`WO
`WO 2005/050450 Al
`—-6/2005
`6,104,334 A
`8/2000 Allport
`WO
`WO 2005/086802 A2
`9/2005
`6,110,041 A
`8/2000 Walkeret al.
`6,148,142 A
`11/2000 Anderson
`6,161,179 A
`12/2000 Seidel
`Antonoff, Michael,“Visiting Video Valley,’ Sound & Vision,pp. 116
`6,209,089 Bl
`3/2001 Selitrennikoffet al.
`and 118-119, Nov. 2001.
`6,219,109 Bl
`4/2001 Raynesford et al.
`.
`.
`”

`:
`:
`:
`6,247,130 Bl
`6/2001 Fritsch
`‘Applying Biometrics to Door Access,” Security Magazine, Sep. 26,
`6.266.415 Bl
`7/2001 Campinosetal.
`2002 [online] [Retrieved on Jan. 7, 2007] Retrieved from the Internet
`6,295,057 BI
`9/2001 Rosin etal.
`<URL-http://www.securitymagazine.comICDA/Articles/Technolo-
`6,336,121 Bl
`1/2002 Lysonetal.
`gies/3ae6 1Oceaa34d80 10VgnVCM100000f932a8cO-> 5 pages.
`6,336,142 Bl
`1/2002 Kato et al.
`Article, “In the Age of Napster, Protecting Copyright is a Digital
`6,367,019 Bl
`4/2002 Ansell et al.
`ArmsRace,” Wall Street Journal, Jul. 24, 2000, 2 pages.
`6,381,747 Bl
`4/2002 Wonforet al.
`Article, “Sound Waves Could Help Ease Web-Fraud Woes,” Wall
`6,385,596 Bl
`5/2002 Wiser et al.
`Street Journal, Aug. 14, 2000,2 pages.
`Oe30roon BI
`ae005 wateetal
`Blum,Jonathan,“Digital Rights Management MaySolve the Napster
`aan
`.

`o> 0
`6,401,059 Bl
`6/2002 Shenetal.
`Problem”,” Technology Investor Industry Sector,
`(Oct. 2000),
`6.411.307 BI
`6/2002 Rosinet al.
`24-27.
`a
`6,424,715 BL
`7/2002 Saito
`Brown, D, Techniques for Privacy and Authentication in Personal
`6.425.084 Bl
`7/2002 Rallis et al.
`Communication Systems; Personal Communications, IEEE; vol. 2,
`6,434,535 Bl
`8/2002 Kupkaetal.
`Issue: 4 Publication Year: 1995, pp. 6-10.
`6,446,130 Bl
`9/2002 Grapes
`Dagan (Power over Ethernet (PoE) Midspan—The Smart Path to
`6,463,534 Bl
`10/2002 Geigeret al.
`Providing Power for IP Telephony Author: Sharon Dagan, Product
`6,480,188 Bl
`11/2002 Horsley
`
`6,490,443 BL=12/2002 Freeny, Jr. Manager, Systems Aug. 2005, PowerDsine Inc.), 28 pages.
`6,510,350 Bl
`1/2003 Steenetal.
`Debow,Credit/Debit Debuts in Midwest Smart Card Test, Computers
`6,523,113 Bl
`2/2003 Wehrenberg
`in Banking, v6, n11, p. 10, Nov. 1989, 4 pages.
`6,529,949 Bl
`3/2003 Getsin et al.
`Dennis, Digital Passports Need Not
`Infringe Civil Liberties,
`6,546,418 B2
`4/2003 Schenaetal.
`6,550,011 BI
`4/2003 Sims, III
`Newsbytes, Dec. 2, 1999, 2 pages.
`6,563,805 Bl
`5/2003 Ma et al.
`Fasca, Chad, “The Circuit,” Electronic News, 45(45) (Nov. 8, 1999),
`6,564,380 BL
`5/2003. Murphy
`20 pages.
`a
`6,628,302 B2
`9/2003 White et al.
`Firecrest Shows How Truly Commercially-Minded Companies Will
`6,632,992 B2
`10/2003 Hasegawa
`Exploit the Internet, Computergram International, Jan. 18, 1996, 2
`6,647,417 Bl
`11/2003 Hunteretal.
`pages.
`6,667,684 Bl
`12/2003 Waggamonetal.
`“Frequently Asked Questions (FAQs) About BioPay,” BioPay, LLC,
`6,683,954 Bl
`1/2004 Searle
`2007, [online] [Retrieved on Jan. 7, 2007] Retrieved from the Internet
`6,697,944 Bl
`2/2004 Joneset al.
`<URL:http://www.biopay.comlfaqs-lowes.asp>, 5 pages.
`6,711,464 Bl
`3/2004 Yapet al.
`Generation of keys for use with the digital signature standard
`Oeoreos BI
`ooood enaetal
`(DSS) ; Nel, J.J.; Kuhn, G.J.; Communications and Signal Process-
`6.806.887 B2
`10/2004 Chernocket al.
`ing, 1993., Proceedings ofthe 1993 IEEE South African Symposium
`6,850,147 B2
`2/2005 Prokoski etal.
`on Publication Year: 1993, pp. 6-11.
`encyclopedia,”
`free
`the
`6,873,975 Bl
`3/2005 Hatakeyamaetal.
`“TEEE
`802.15.4-2006-Wikipedia,
`6,879,567 B2
`4/2005 Callawayetal.
`Wikipedia®, Last Modified Mar. 21, 2009 [Online] [Retrieved on
`6,950,941 Bl
`9/2005 Lee etal.
`Apr. 30, 2009] Retrieved from the Internet <URL:http://en.
`6,957,086 B2
`10/2005 Bahlet al.
`wikipedia.org/wiki/TEEE__802.15.4-2006>, 4 pages.
`6,973,576 B2
`12/2005 Giobbi
`Lake, Matt, “Downloading for Dollars,’ Sound & Vision, (Nov.
`6,975,202 Bl
`12/2005 Rodriguez etal.
`2000), pp. 137-138.
`7,012,503 B2
`3/2006 Nielsen
`Lewis, Sony and Visa in On-Line Entertainment Venture, New York
`7,159,765 B2
`1/2007 Frerking
`Times, v145, Nov. 16, 1995, 1 page.
`Page 2 of 30
`
`Page 2 of 30
`
`

`

`US 9,049,188 B1
`Page 3
`
`(56)
`
`References Cited
`OTHER PUBLICATIONS
`
`Mclver, R.et al., “Identification and Verification Working Together,”
`Bioserypt™, Aug. 27, 2004, [online] [Retrieved on Jan. 7, 2007]
`Retrieved
`from the
`Internet
`<URL:http://www.ibia.org/
`membersadmin/whitepapers/pdf/15/
`Identification%20and%20Verification%20Working%20Together.
`pdf>, 5 pages.
`Nilsson,
`J. et al., “Match-On-Card for Java Cards,” Precise
`Biometrics, White Paper, Apr. 2004, [online] [Retrieved on Jan. 7,
`2007] Retrieved from the Internet <URL: http://www.ibia.org/
`membersadmin/whitepapers/pdf/17/Precise%20Match-
`onCard%20for%20Java%020Cards.pdf>, 5 pages.
`Nordin, B., “Match-On-Card Technology,” Precise™ Biometrics,
`White Paper, Apr. 2004,
`[online]
`[Retrieved on Jan. 7, 2007]
`Retrieved
`from the
`Internet
`<URL:http://www.ibia.org/
`Membersadmin/whitepapers/pdf/ 17
`TPrecise%20Match-
`onCard%20technology.pdf>, 7 pages.
`Notification of the International Search Report and Written Opinion,
`PCT/US04/38 124, Apr. 7, 2005, 10 pages.
`Paget, Paul, “The Security Behind Secure Extranets,” Enterprise
`Systems Journal, (Dec. 1999), 4 pgs.
`PCT International Search Report and Written Opinion, PCT/US07/
`11105, Oct. 20, 2008, 10 pages.
`PCT International Search Report and Written Opinion, PCT/US07/
`11103, Apr. 23, 2008, 9 pages.
`PCT International Search Report and Written Opinion, PCT/US05/
`43447, Feb. 22, 2007, 7 pages.
`PCT International Search Report and Written Opinion, PCT/US05/
`46843, Mar. 1, 2007, 10 pages.
`PCT International Search Report and Written Opinion, PCT/US07/
`00349, Mar. 19, 2008, 10 pages.
`Personal Servers as Digital Keys; Beaufour, A.; Bonnet, P.; Pervasive
`Computing and Communications, 2004. PerCom 2004. Proceedings
`of the Second IEEE Annual Conference on Publication Year: 2004,
`pp. 319-328.
`
`Press Release, “Micronas and Thomson Multimedia Showcase a
`New CopyProtection System that Will Drive the Future of Digital
`Television,” www.micronas.com, Jan. 8, 2002, 3 pages.
`Press Release, “Content Protection Plan Targets Wireless Home Net-
`works,” www.eetimes.com, Jan. 11, 2002, 2 pages.
`Press Release, “Thompson Bets on Smart Cards for Video Encryp-
`tion,” www.informationweek.com. Jun. 7, 2001, 1 page.
`Press Release, “Thompson Multimedia Unveils Copy Protection Pro-
`posal Designed to Provide Additional Layer of Digital Content Secu-
`rity,’ www.thompson-multimedia.com May 30, 2001, 2 pages.
`“SAFModule™: A LookInto Strong Authentication,”saflink Corpo-
`ration, [online]
`[Retrieved on Jan. 7, 2007] Retrieved from the
`Internet<URL :http://www.ibia.org/membersadmin/whitepapers/
`pdf/6/SAFmod_WP.pdf>, 8 pages.
`Sapsford, Jathon, “E-Business: Sound Waves Could Help Ease
`WebFraud Woes,” Wall Street Journal, (Aug. 14, 2000), B1, 2 pages.
`“Say Hello to Bluetooth,” Bluetooth Website, 5 pages [Last retrieved.
`on Mar. 25, 2008].
`“Smart Cards and Biometrics White Paper,’ Smart Card Alliance,
`May 2002, [online] [Retrieved on Jan. 7, 2007] Retrieved from the
`Internet
`<URL-http://www.securitymanagement.com/library/
`smartcard__faqtech0802.pdf>, 7 pages.
`Van Winkle, William, “Bluetooth, the King of Connectivity,’ Laptop
`Buyer’s Guide and. Handbook, (Jan. 2000), pp. 148-153.
`Wade, W., “Using Fingerprints to Make Payments at POS Slowly
`Gaining Popularity,” Credit Union Journal, International Biometric
`Group, Apr. 21, 2003, [online] [Retrieved on Jan. 7, 2007] Retrieved.
`from the Internet <URL: http://www.biometricgroup.comlin_the_
`news/04.21.03.-html>, 3 pages.
`Wallace, Bob,
`“The
`Internet Unplugged,’
`765(22), (Dec. 13, 1999), pp. 22-24.
`Weber, ThomasE., “In the Age of Napster, Protecting Copyrightis a
`Digital Arms Race,” Wall Street Journal, (Jul. 24, 2000), B1, 2 pages.
`Non-Final Office Action, U.S. Appl. No. 11/939,451, Dated: May 12,
`2010, 12 pages.
`
`InformationWeek,
`
`* cited by examiner
`
`Page 3 of 30
`
`Page 3 of 30
`
`

`

`US 9,049,188 B1
`
`|Old
`
`SOUeWolg
`
`vOl
`
`Jun. 2, 2015
`
`Sheet 1 of 15
`
`
`
`VOz)uoneoddy
`
`80}JosuesZOMd
`
`WELLAy
`
`SS800V.
`
`Q0IMaS
`
`VolbAIG
`
`QZb
`
`wan
`
`U.S. Patent
`
`Page 4 of 30
`
`Page 4 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 2 of 15
`
`US 9,049,188 B1
`
`
`
`JOAIBOSUBI|;SSOIM~BZZ
`OL¢uoneolddy
`
`092
`
`BLLASy
`
`pGz \dAsoeqadksouz
`
`CGC J0BIOS
`
`(99SgS)
`
`¢Ols
`
`aIdd
`
`O1zAiowey\
`
`cOL4dd
`
`Page 5 of 30
`
`Page 5 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 3 of 15
`
`US 9,049,188 B1
`
`WOoMaN
`
`OLL
`
`JOMJON
`
`Q0BLO}UI
`
`80€
`
`OU}OWOIg
`
`(sapeoy
`
`COE
`
`
`
`SO]JosueS
`
`
`
`JOSS80014
`
`(SN]e}S
`
`jouoD
`
`WOdO/|
`
`ole
`
`90€
`
`€Old
`
`Page 6 of 30
`
`Page 6 of 30
`
`
`
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 4 of 15
`
`US 9,049,188 B1
`
`
`
`
`
`OLSSdIA9qSUO|EPUE}S/Od80)Josues
`
`ZOlMd
`
`a8}
`
`KaySSo00yVelAey
`
`vols
`
`uoneoiddy
`
`WA!
`
`Ssa00y
`
`Q0IMaS
`
`VollAIG
`
`deb}
`
`Ocht
`
`Page 7 of 30
`
`Page 7 of 30
`
`

`

`US 9,049,188 B1
`
`GOls
`
`Jun. 2, 2015
`
`Sheet 5 of 15
`
`uoneoddy
`
`Al
`
`Asysseooy
`
`asl
`
`uoneoddy
`
`ssao0y
`
`WELLAey
`
`Josuas cht
`
`
`
`BOIAOS|BU9}XF
`
`
`
`ZLGBIASPOXOMJON/Od
`
`QQ]
`
`20)4dd
`
`Q0INOS
`
`Vell4d
`
`deb
`
`U.S. Patent
`
`Page 8 of 30
`
`Page 8 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 6 of 15
`
`US 9,049,188 B1
`
`LZ0¢|ddy
`
`VSLAey
`
`7Z0¢|ddy
`
`geLAey
`
`€202|.ddy
`
`gelAey
`
`ddy
`
`AWAD
`
`ddy
`
`LAOZL
`
`Ag}Aey
`9911Aey
`
`Z801
`
`COLHdd
`
`VollaS0IAI8S
`
`deb
`
`Iclh
`
`9Old
`
`XOzbddy
`
`Moz}ddy
`
`O81}Aey
`
`Adzddy
`
`O81)Aey
`
`9811Aey
`
`Page 9 of 30
`
`Page 9 of 30
`
`
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet7 of 15
`
`US 9,049,188 B1
`
`
`ie)
`
`=)
`
`
`Coordinator
`RFCell
`
`0¢2 WAS
`
`°oa
`
`cL=o
`
`Page 10 of 30
`
`
`FIG.7 Standalone
`ozKE
`
`O)oO
`
`Messaging 720B
`
`
`
`Alerts720C
`
`
`
`ThirdPartyApps720D
`
`RemoteApps 720E
`
`© x=
`2s><
`Lu ®
`
`Page 10 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 8 of 15
`
`US 9,049,188 B1
`
`
`
`
`FIG. 8
`
`FIG. 9
`
`Page 11 of 30
`
`Page 11 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 9 of 15
`
`US 9,049,188 B1
`
`
`
`JOS/)OLOL
`
`
`
`|.uonnqsesseid
`
`|uoyN
`
`OlSls
`
`
`sJe9}9Wd0901LSolOU)VHOTVY
`
`
`
`y0sueJOJEUIPIOO[AWS]uojeaddy
`
`4020120201
`
`g0SOl
`
`
`
`
`
`YOsol(|uonng)weepL|Leto$Je9|oJoyesadoOrOL
`
`SIMSOO!
`
`Page 12 of 30
`
`Page 12 of 30
`
`
`
`
`
`

`

`U.S. Patent
`
`Jun.2, 2015
`
`Sheet 10 of 15
`
`US 9,049,188 B1
`
`OTHER
`
`DEVICE
`
`1106
`
`FIG.11
`
`2 c
`
`No
`
`O=
`
`@2>@ O
`
`o
`oS—
`
`Page 13 of 30
`
`Page 13 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 11 of 15
`
`US 9,049,188 B1
`
`Aueneg9sjusuodwoy
`
`
`
`@u0Ud[8D
`
`
`
`COC}8UOUd
`
`®20lHdd
`
`élOlas
`
`[199
`ep0eOdyqz0lMdd
`
`PIEDWIS
`
`9021
`
`Page 14 of 30
`
`Page 14 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 12 of 15
`
`US 9,049,188 B1
`
`Qv0€Ody
`
`ebOld
`
`PUGAH
`
`
`
`COLLS91A8q
`
`&¢c0ldd
`
`er0eOCH
`
`OO€l
`
`Page 15 of 30
`
`qc0ldd
`
`Page 15 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 13 of 15
`
`US 9,049,188 B1
`
`qv0e9dY
`
`
`
`TWNOISATEVNA
`
`9071
`
`vlOld
`
`
`
`COL)S91A8q
`
`PUGAH
`
`OOrL
`
`Page 16 of 30
`
`qc0lMdd
`
`Page 16 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 14 of 15
`
`US 9,049,188 B1
`
`001
`
`&20ldd
`
`GbSls
`
`WNOIS
`
`41aVNA ey0EOGYUZOLMd
`
`
`/COLL891A9qPLQAH
`
`Ak
`
`qcOldd
`
`Page 17 of 30
`
`Page 17 of 30
`
`

`

`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 15 of 15
`
`US 9,049,188 B1
`
`qv0eOdy
`
`
`
`BIIAIBSI4-IM/O0Y
`
`
`QZOL|991A9q
`
`FIOTSOUPAYLSINeSsseo0yg‘dwo5
`
`JOYHEDPADZb9)SOURINOYU]SOINES
`SOULOyuAyEUOSIOd
`
`ZJUNOIDY[19D
`
`ey0eOdY
`
`PUGAH SOUP}
`
`JOYSsED0VI-AA|Junoasy
`
`11989|‘OYHEDWpslD
`
`EZOLWdd
`
`qz0ldd
`
`
`
`SOUCVSYU]GOIAIOS
`
`ZOOT
`
`sseo0yy“dwo9
`
`
`
`oyu]aimes
`
`Page18 of 30
`
`Page 18 of 30
`
`

`

`US 9,049,188 B1
`
`1
`HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODSOF USE
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`The present application claims priority under 35 U.S.C.
`$120 to U.S. patent application Ser. No. 13/445,825 entitles
`“Hybrid Device Having a Personal Digital Key and Receiver
`Decoder Circuit and Method of Use,” filed Apr. 12, 2012,
`which claimspriority under 35 U.S.C. §120 to US. patent
`application Ser. No. 12/329,329 entitled “Hybrid Device
`Having a Personal Digital Key and Receiver Decoder Circuit
`and Methodof Use,’filed Dec. 5, 2008, now U.S. Pat. No.
`8,171,528, which claims the benefit of priority under 35
`USS.C. §119(e) of U.S. Provisional Application No. 60/992,
`953 entitled “Reverse Prox,”filed on Dec. 6, 2007 by David L.
`Brown, John J. Giobbi and FredS. Hirt. The entire contents of
`all of the foregoing are incorporated by reference herein.
`
`BACKGROUND
`
`1. Field of Art
`Theinvention generally relates to personal digital keys and
`corresponding sensors, capable of proximity detection/loca-
`tion determination and auxiliary data services/application
`services. Still more particularly, the present invention relates
`to a hybrid device including a personal digital key (PDK) and
`a receiver-decoder circuit (RDC) and methods for using
`same.
`
`2. Description of the Related Art
`Proximity sensors and location tracking are technologies
`with many applications. For example, proximity sensors can
`be used to provide secure access to physical and/or digital
`assets, based on biometrics, passwords, PINS, or other types
`of authentication. Proximity sensors typically have advan-
`tages of being less cumbersome, easier to use, and more
`flexible in form factor and implementation. Proximity sensors
`can be used to control access to resources and/orto authenti-
`cate individuals, for example.
`Onepossible application that can take advantage of prox-
`imity sensors is location tracking RFID tracking is one
`example. In RFID, RFID tags are attached to objects to be
`tracked. RFID readers then interact with the RFID tags to
`determine the location of the tag. Regardless of how it is
`accomplished, location tracking (i.e., knowledge about the
`location of an object or person) is generally useful. For
`example, location tracking information can be used to track
`inventory andtrace the route of objects through various loca-
`tions. It can be used for time and motion studies. If tags are
`attached to people, then tracking of people can be used to
`better understand their behavior. Knowledge about a person’s
`location (and/ortheir past locations and projected future loca-
`tions) could be used to provide better services to that person.
`However, most proximity systems and location tracking
`systems have limited capabilities. Typically, the proximity
`sensor, RFID tag or similar device is a dumb device, in the
`sense that the device is designed andhasthe capability only to
`report its location. For example, such devices typically do not
`have the capabilities to run different applications or to even
`interact with different applications. Furthermore, these sys-
`tems typically are proprietary and narrowly tailored for a
`specific situation, thus preventing easy expandability to other
`situations or third party applications.
`
`SUMMARY
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Various drawbacksof the prior art are overcome by pro-
`viding a hybrid device including a personal digital key (PDK)
`Page 19 of 30
`
`2
`and a receiver-decoder circuit (RDC). The PDK and RDC of
`the hybrid device are coupled for communication with each
`other. In one embodiment, the hybrid device also provides a
`physical interconnect for connecting to other devices to send
`and receive control signals and data, and receive power. The
`hybrid device operates in one of several modes including,
`PDKonly, RDC only, or PDK and RDC. This allowsa variety
`of system configurations for mixed operation including:
`PDK/RDC, RDC/RDC or PDK/PDK.The present invention
`also includes a numberof system configurations for use ofthe
`hybrid device including: use of the hybrid device in a cell
`phone; simultaneous use of the PDK and the RDC function-
`ality of hybrid device; use of multiple links of hybrid device
`to generate an authorization signal, use ofmultiple PDKlinks
`to the hybrid device to generate an authorization signal; use of
`the hybrid device for authorization inheritance and use of the
`hybrid device for automatically disabling a service or feature.
`Other aspects of the invention include systems and com-
`ponents corresponding to the above, and methods corre-
`spondingto all of the foregoing.
`
`BRIEF DESCRIPTION OF THE FIGURES
`
`FIG.1 is a block diagram illustrating one embodimentof a
`system according to the invention.
`FIG.2 is a block diagram illustrating one embodimentof a
`Personal Digital Key (PDK).
`FIG.3 is a block diagram illustrating one embodimentof a
`sensor.
`
`FIGS. 4-6 are block diagramsillustrating further embodi-
`ments of systems accordingto the invention.
`FIG.7 is a block diagram illustrating one embodimentof a
`system with networked sensors.
`FIGS. 8-9 are block diagramsillustrating operation of the
`system in FIG. 7.
`FIG.10 is a diagram illustrating operation of the system in
`FIG.7.
`
`FIG. 11 is a block diagram of one embodimentof a hybrid
`device in accordance with the present invention.
`FIG. 12 is a block diagram of one embodimentof a system
`in which the hybrid device is part of a cell phone in accor-
`dance with the present invention.
`FIG. 13 is a block diagram of one embodimentof a system
`using the PDK and the RDC functionality of hybrid device in
`accordance with the present invention.
`FIG. 14 is a block diagram of one embodimentof a system
`using the multiple links ofhybrid device to generate an autho-
`rization signal in accordance with the present invention.
`FIG. 15 is a block diagram of one embodimentof a system
`using the multiple PDKlinks to the hybrid device to generate
`an authorization signal in accordance with the present inven-
`tion.
`
`FIG. 16 is a block diagram of one embodimentof a system
`using the hybrid device for authorization inheritance in accor-
`dance with the present invention.
`The figures depict various embodiments of the present
`invention for purposesofillustration only. One skilled in the
`art will readily recognize from the following discussion that
`alternative embodimentsof the structures and methodsillus-
`
`trated herein may be employed without departing from the
`principles of the invention described herein.
`
`DETAILED DESCRIPTION
`
`FIG.1 is a high level block diagram illustrating a system
`for allowing access to multiple applications(or services). The
`system 100 comprises a Personal Digital Key (PDK) 102, a
`
`Page 19 of 30
`
`

`

`US 9,049,188 B1
`
`3
`sensor 108, a network 110 and one or more applications 120
`(including services). The sensor 108 is coupled to the PDK
`102 by a wireless link 106 and coupled to a network 110 by
`either a wired or wireless link. In this example, the applica-
`tions 120 are also accessed over network 110. The sensor 108
`
`is also adapted to receive a biometric input 104 from a user
`and is capable of displaying status to a user. In alternative
`embodiments, different or additional resources and databases
`may be coupled to the network 110, including for example
`registries and databases used for validation or to check vari-
`ous registrations of the user. In another embodiment, the
`sensor 108 operates as a standalone device without a connec-
`tion to the network 110.
`The PDK 102 includes multiple service blocks 112A-N as
`described in moredetail in FIG. 2. Each service block 112 is
`accessed using a correspondingservice block access key 118.
`In this example, the sensor 108 contains three of the service
`block access keys 118A, D, F. The service block access keys
`118 allow the sensor 108 to unlock information stored in the
`
`corresponding service blocks 112, which information is used
`as local secured information.
`
`In one example, a biometric is required in order to access
`specific service blocks 112 in the PDK 102. Verification ofthe
`biometric is achieved by using service block 112A. The sen-
`sor 108 stores the corresponding service block access key
`118A and usesthis key to unlock the biometric service block
`112A, whichstores a valid biometric. A current biometric is
`received using biometric input 104. The sensor 108 then
`verifies the stored biometric (from service block 112A)
`against the recently acquired biometric (from input 104).
`Upon properverification, various applications 120 are per-
`mitted to connectto the PDK 102 via the sensor 108 and/or to
`gain access to other service blocks 112.
`The system 100 can be used to address applications 120
`where it is important to authenticate an individual for use.
`Generally, the sensor 108 wirelessly receives information
`stored in the PDK 102 that uniquely identifies the PDK 102
`and the individual carrying the PDK 102. The sensor 108 can
`also receive a biometric input 104 from the individual. Based
`on the received information, the sensor 108 determines if
`access to the application 120 should be granted. In this
`example, the system 100 provides authentication without the
`need for PINs or passwords (although PINs and passwords
`maybe used in other implementations). Moreover, personal
`biometric information need not be stored in any local or
`remote storage database andis only stored on the user’s own
`PDK(in one embodiment).
`Thecredibility of the system 100 is ensured by the use of a
`PDK 102 that stores trusted information. The PDK 102is a
`
`compact, portable uniquely identifiable wireless device typi-
`cally carried by an individual. The PDK 102 stores digital
`information in a tamper-proof format that uniquely associates
`the PDK 102 with an individual. Example embodiments of
`PDKsare described in more detail in U.S. patent application
`Ser. No. 11/292,330, entitled “Personal Digital Key And
`Receiver/Decoder Circuit System And Method”filed on Nov.
`30, 2005; U.S. patent application Ser. No. 11/620,581 entitled
`“Wireless Network Synchronization Of Cells And Client
`Devices On A Network”filed on Jan. 5, 2007; and U.S. patent
`application Ser. No. 11/620,577 entitled “Dynamic Real-
`Time Tiered Client Access”filed on Jan. 5, 2007, the entire
`contents of which are all incorporated herein by reference.
`The sensor 108 wirelessly communicates with the PDK
`102 when the PDK 102is within a proximity zone(i.e., within
`amicrocell) ofthe sensor 108. The proximity zone can be, for
`example, several meters in radius and preferably can be
`adjusted dynamically by the sensor 108. Thus, in contrast to
`Page 20 of 30
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`many conventional RF ID devices, the sensor 108 can detect
`and communicate with the PDK 102 without requiring the
`owner to remove the PDK 102 from his/her pocket, wallet,
`purse, etc. Generally, the sensor 108 receives uniquely iden-
`tifying information from the PDK 102 andinitiates an authen-
`tication process for the individual carrying the PDK 102. In
`one embodiment, the sensor 108 is adapted to receive a bio-
`metric input 104 from the individual. The biometric input 104
`comprises a representation of physical or behavioral charac-
`teristics unique to the individual. For example, the biometric
`input 104 can include a fingerprint, a palm print, a retinal
`scan,an iris scan, a photograph,a signature, a voice sample or
`any other biometric information such as DNA, RNA ortheir
`derivatives that can uniquely identify the individual. The sen-
`sor 108 compares the biometric input 104 to information
`received from the PDK 102 to determine authentication.
`
`Alternatively, the biometric input 104 can be obtained by a
`biometric sensor on the PDK 102 and transmitted to the
`sensor 108 for authentication.
`In additional alternative
`
`embodiment, someorall of the authentication process can be
`performed by the PDK 102 instead of the sensor 108.
`In this example, the sensor 108 is further communicatively
`coupledto the network 110 in orderto receive and/or transmit
`information to remote databases for remote authentication. In
`an alternative embodiment, the sensor 108 includes a non-
`volatile data storage that can be synchronized with one or
`more remote databases or registries. Such an embodiment
`alleviates the need for a continuous connection to the network
`
`110 and allowsthe sensor 108 to operate ina standalone mode
`and forthe local data storage to be updated when a connection
`is available. For example, a standalone sensor 108 can peri-
`odically download updated registry entries and perform
`authentication locally without any remote lookup.
`In yet another alternative, a standalone sensor 108 may
`have a pre-configured secure access key 118 and encryption
`algorithm, or a variable access key 118 that changes, for
`example based on time and sensor ID. One example applica-
`tion would be a sensor 108 located ina hotel room door, where
`the sensor could constantly compute a different access key
`118 based on time, and the PDK 102 could be associated with
`this key during the hotel registration process.
`The network 110 provides communication between the
`sensor 108 and various validation databases and/orregistries,
`in addition to the applications 120. In one embodiment, the
`network 110 uses standard communications technologies
`and/or protocols. Thus, the network 110 can include links
`using technologies such as Ethernet, 802.11, 802.16, inte-
`grated services digital network (ISDN), digital subscriberline
`(DSL), asynchronous transfer mode (ATM), etc. Similarly,
`the networking protocols used on the network 110 can include
`the transmission control protocol/Internet protocol (TCP/IP),
`the hypertext transport protocol (HTTP), the simple mail
`transfer protocol (SMTP), the file transfer protocol (FTP),
`etc. The data exchanged over the network 110 can be repre-
`sented using technologies and/or formats including the
`hypertext markup language (HTML), the extensible markup
`language (XML), etc. In addition, all or someoflinks can be
`encrypted using conventional encryption technologies such
`as the secure sockets layer (SSL), Secure HTTP and/orvirtual
`private networks (VPNs). In another embodiment, the entities
`can use custom and/or dedicated data communications tech-
`
`nologies instead of, or in addition to, the ones described
`above.
`
`In one aspect, the sensor 108 may connectto a validation
`database that stores additional information that may be used
`for authorizing a transaction to be processedat the sensor. For
`example, in purchase transactions, the sensor 108 may inter-
`
`Page 20 of 30
`
`

`

`US 9,049,188 B1
`
`5
`act with a credit card validation database that is separate from
`the merchant providing the sale. Alternatively, a different
`database may be usedto validate different types ofpurchasing
`means such as a debit card, ATM card, or bank account
`number.
`
`In another aspect, the sensor 108 may connectto various
`registries that store, among other items, PDK,notary, and/or
`sensor information. In one embodiment, a registry stores
`biometric or other types of information in an encoded format
`that can only be recovered using an algorithm or encoding key
`stored in the PDK.Information stored in the registries can be
`accessed by the sensor 108 via the network 110 for use in the
`authentication process. Two basic types of registries are pri-
`vate registries and a Central Registry. Private registries are
`generally established and administered by their controlling
`entities (e.g., a merchant, business authority, or other entity
`administering authentication). Private registries can be cus-
`tom configured to meet the specialized and independent
`needs of each controlling entity. A Central Registry is a
`highly-secured, centrally-located database administered by a
`trusted third-party organization. In one embodiment, all
`PDKs102 are registered with the Central Registry and may be
`optionally registered with one or more selected private regis-
`tries. In alternative embodiments, a different numberor dif-
`ferent types of registries may be coupled to the network 110.
`Theservice blocks 112 can be used for purposesother than
`user authentication. For example, information used or pro-
`duced by an application 120 can be transferred back and forth
`to the corresponding service block 112. That is, each service
`block 112 can be used as a local secure memory for the
`corresponding application 120. Thus, a service 120B may
`store certain sensitive information in service block 112B, and
`a separate service 120C will not be able to access that infor-
`mation without the corresponding access key 118B. In this
`example, the sensor 108 only holds access keys 118A, D, F
`and does not hold access key 118B. The application 120B
`may hold the access key 118B, thus allowing it to access
`service block 112B but preventing application 120C from
`accessing the service block 112B. Note that this implemen-
`tation would also prevent the sensor 108 acting alone from
`accessing the service block 112B.
`Turning now to FIG. 2, an example embodiment of a PDK
`102 is illustrated. The PDK 102 comprises a mem

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket