`
`US 9,049,188 B1
`(10) Patent No.:
`a2) United States Patent
`Brown
`(45) Date of Patent:
`*Jun. 2, 2015
`
`
`(54) HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODSOF USE
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`(71) Applicant: Proxense, LLC, Bend, OR (US)
`
`4,759,060 A
`5,187,352 A
`
`7/1988 Hayashiet al.
`2/1993 Blair et al.
`
`(Continued)
`
`(72)
`
`Inventor: David L. Brown, Jupiter, FL (US)
`
`FOREIGN PATENT DOCUMENTS
`
`WO WO 00/62505 Al—10/2000
`
`WO
`WO 01/22724 Al
`3/2001
`(73) Assignee: Proxense, LLC, Bend, OR (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`This patent is subject to a terminal dis-
`claimer.
`
`(21) Appl. No.: 14/171,705
`
`(22)
`
`Filed:
`
`Feb. 3, 2014
`
`Related U.S. Application Data
`
`(63) Continuation of application No. 13/445,825, filed on
`Apr. 12, 2012, now Pat. No. 8,646,042, which is a
`continuation of application No. 12/329,329, filed on
`Dec. 5, 2008, now Pat. No. 8,171,528.
`
`(60) Provisional application No. 60/992,953, filed on Dec.
`6, 2007.
`
`(51)
`
`(2013.01)
`(2006.01)
`
`Int. Cl.
`GO6F 21/00
`HOAL 29/06
`(52) U.S. CL.
`CPC cicccssccsecteesseeecenecenees HOA4L 63/08 (2013.01)
`(58) Field of Classification Search
`USPC viecesssescscesceeseecscnsscseecerseneeanecassentes 726/3, 4
`See application file for complete search history.
`
`100
`
`(Continued)
`OTHER PUBLICATIONS
`
`“Alliance Activities: Publications: Identity—Smart Card Alliance,”
`Smart Card Alliance, 1997-2007, [online] [Retrieved on Jan. 7, 2007]
`Retrieved from the Internet <URL:http://www.smartcardalliance.
`org/pages/publications-identity>, 3 pages.
`(Continued)
`
`Primary Examiner — Jason Lee
`(74) Attorney, Agent, or Firm — Patent Law Works LLP
`
`(57)
`
`ABSTRACT
`
`A hybrid device includes a personaldigital key (PDK) anda
`receiver-decoder circuit (RDC). The PDK and RDC of the
`hybrid device are coupled for communication with each
`other. In one embodiment, the hybrid device also provides a
`physical interconnect for connecting to other devices to send
`and receive control signals and data, and receive power. The
`hybrid device operates in one of several modes including,
`PDKonly, RDC only, or PDK and RDC. This allowsa variety
`of system configurations for mixed operation including:
`PDK/RDC, RDC/RDC or PDK/PDK.The present invention
`also includes a numberof system configurations for use ofthe
`hybrid device including: use of the hybrid device in a cell
`phone; simultaneous use of the PDK and the RDC function-
`ality of hybrid device; use of multiple links of hybrid device
`to generate an authorization signal, use ofmultiple PDKlinks
`to the hybrid device to generate an authorization signal; and
`use of the hybrid device for authorization inheritance.
`
`20 Claims, 15 Drawing Sheets
`
`PDK 102
`
`Bik 112A
`
`Application 120A
`
`
`
`Sensor108
`
`Biometrics
`104
`
`Page 1 of 30
`
`GOOGLE EXHIBIT1011
`
`GOOGLE EXHIBIT 1011
`
`Page 1 of 30
`
`
`
`US 9,049,188 B1
`
`Page 2
`
`............ 235/382
`
`OTHER PUBLICATIONS
`
`FOREIGN PATENT DOCUMENTS
`
`7/2007 Miller
`7,249,177 Bl
`References Cited
`(56)
`7,305,560 B2=12/2007 Giobbi
`U.S. PATENT DOCUMENTS
`2002/0007456 Al
`1/2002 Peinadoet al.
`2002/0013772 Al
`1/2002 Peinado
`2002/0015494 Al
`2/2002 Nagai etal.
`3/1994 Stelzel
`5,296,641 A
`
`
`5,392,433 A 2002/0026424 Al—2/2002 Akashi2/1995 Hammersley etal.
`5,422,632 A
`6/1995 Bucholtz etal.
`2002/0073042 Al
`6/2002 Maritzenetal.
`5,450,489 A
`9/1995 Ostrover etal.
`2002/0104006 Al
`8/2002 Boateet al.
`5,619,251 A
`4/1997 Kuroiwaetal.
`2002/0108049 Al
`8/2002 Xuet al.
`5,629,980 A
`5/1997 Stefik etal.
`2002/0109580 Al
`8/2002 Shreve etal.
`5,644,354 A
`7/1997 Thompsonet al.
`2003/0055689 Al
`3/2003 Blocket al.
`5,666,412 A
`9/1997 Handelman etal.
`2003/0213840 Al
`11/2003 Livingstonet al.
`5,773,954 A
`6/1998 VanHorn
`2004/0129787 Al
`7/2004 Saito et al.
`5,784,464 A
`7/1998 Akiyamaetal.
`2005/0090200 Al
`4/2005 Karaoguz et al.
`5,825,876 A
`10/1998 Peterson,Jr.
`2005/0116020 Al
`6/2005 Smoluchaetal.
`5,857,020 A
`1/1999 Peterson,Jr.
`2006/0111955 Al
`5/2006 Winteretal.
`5,892,825 A
`4/1999 Magesetal.
`2006/0113381 Al*
`6/2006 Hochstein etal.
`5,894,551 A
`4/1999 Hugginset al.
`2006/0136742 Al
`6/2006 Giobbi
`5,898,880 A
`4/1999 Ryu
`2006/0208066 Al*
`9/2006 Finnetal. oe 235/380
`5,928,327 A
`7/1999 Wanget al.
`2007/0159994 Al
`7/2007 Brownetal.
`5,991,399 A
`11/1999 Graunkeet al.
`2007/0174809 Al
`7/2007 Brownetal.
`5,991,749 A
`11/1999 Morrill, Jr.
`2007/0271194 Al* 11/2007 Walkeretal. ..... 705/80
`6,035,038 A
`3/2000 Campinos et al.
`6,035,329 A
`3/2000 Mageset al.
`6,041,410 A
`3/2000 Hsuet al.
`10/2001
`WO 01/75876 Al
`Wo
`6,055,314 A
`4/2000 Spieset al.
`
`
`6,070,796 A WO 01/77790 Al—10/20016/2000 Sirbu wo
`
`6,088,730 A
`7/2000 Kato etal.
`WO
`WO 2005/050450 Al
`—-6/2005
`6,104,334 A
`8/2000 Allport
`WO
`WO 2005/086802 A2
`9/2005
`6,110,041 A
`8/2000 Walkeret al.
`6,148,142 A
`11/2000 Anderson
`6,161,179 A
`12/2000 Seidel
`Antonoff, Michael,“Visiting Video Valley,’ Sound & Vision,pp. 116
`6,209,089 Bl
`3/2001 Selitrennikoffet al.
`and 118-119, Nov. 2001.
`6,219,109 Bl
`4/2001 Raynesford et al.
`.
`.
`”
`«
`:
`:
`:
`6,247,130 Bl
`6/2001 Fritsch
`‘Applying Biometrics to Door Access,” Security Magazine, Sep. 26,
`6.266.415 Bl
`7/2001 Campinosetal.
`2002 [online] [Retrieved on Jan. 7, 2007] Retrieved from the Internet
`6,295,057 BI
`9/2001 Rosin etal.
`<URL-http://www.securitymagazine.comICDA/Articles/Technolo-
`6,336,121 Bl
`1/2002 Lysonetal.
`gies/3ae6 1Oceaa34d80 10VgnVCM100000f932a8cO-> 5 pages.
`6,336,142 Bl
`1/2002 Kato et al.
`Article, “In the Age of Napster, Protecting Copyright is a Digital
`6,367,019 Bl
`4/2002 Ansell et al.
`ArmsRace,” Wall Street Journal, Jul. 24, 2000, 2 pages.
`6,381,747 Bl
`4/2002 Wonforet al.
`Article, “Sound Waves Could Help Ease Web-Fraud Woes,” Wall
`6,385,596 Bl
`5/2002 Wiser et al.
`Street Journal, Aug. 14, 2000,2 pages.
`Oe30roon BI
`ae005 wateetal
`Blum,Jonathan,“Digital Rights Management MaySolve the Napster
`aan
`.
`«
`o> 0
`6,401,059 Bl
`6/2002 Shenetal.
`Problem”,” Technology Investor Industry Sector,
`(Oct. 2000),
`6.411.307 BI
`6/2002 Rosinet al.
`24-27.
`a
`6,424,715 BL
`7/2002 Saito
`Brown, D, Techniques for Privacy and Authentication in Personal
`6.425.084 Bl
`7/2002 Rallis et al.
`Communication Systems; Personal Communications, IEEE; vol. 2,
`6,434,535 Bl
`8/2002 Kupkaetal.
`Issue: 4 Publication Year: 1995, pp. 6-10.
`6,446,130 Bl
`9/2002 Grapes
`Dagan (Power over Ethernet (PoE) Midspan—The Smart Path to
`6,463,534 Bl
`10/2002 Geigeret al.
`Providing Power for IP Telephony Author: Sharon Dagan, Product
`6,480,188 Bl
`11/2002 Horsley
`
`6,490,443 BL=12/2002 Freeny, Jr. Manager, Systems Aug. 2005, PowerDsine Inc.), 28 pages.
`6,510,350 Bl
`1/2003 Steenetal.
`Debow,Credit/Debit Debuts in Midwest Smart Card Test, Computers
`6,523,113 Bl
`2/2003 Wehrenberg
`in Banking, v6, n11, p. 10, Nov. 1989, 4 pages.
`6,529,949 Bl
`3/2003 Getsin et al.
`Dennis, Digital Passports Need Not
`Infringe Civil Liberties,
`6,546,418 B2
`4/2003 Schenaetal.
`6,550,011 BI
`4/2003 Sims, III
`Newsbytes, Dec. 2, 1999, 2 pages.
`6,563,805 Bl
`5/2003 Ma et al.
`Fasca, Chad, “The Circuit,” Electronic News, 45(45) (Nov. 8, 1999),
`6,564,380 BL
`5/2003. Murphy
`20 pages.
`a
`6,628,302 B2
`9/2003 White et al.
`Firecrest Shows How Truly Commercially-Minded Companies Will
`6,632,992 B2
`10/2003 Hasegawa
`Exploit the Internet, Computergram International, Jan. 18, 1996, 2
`6,647,417 Bl
`11/2003 Hunteretal.
`pages.
`6,667,684 Bl
`12/2003 Waggamonetal.
`“Frequently Asked Questions (FAQs) About BioPay,” BioPay, LLC,
`6,683,954 Bl
`1/2004 Searle
`2007, [online] [Retrieved on Jan. 7, 2007] Retrieved from the Internet
`6,697,944 Bl
`2/2004 Joneset al.
`<URL:http://www.biopay.comlfaqs-lowes.asp>, 5 pages.
`6,711,464 Bl
`3/2004 Yapet al.
`Generation of keys for use with the digital signature standard
`Oeoreos BI
`ooood enaetal
`(DSS) ; Nel, J.J.; Kuhn, G.J.; Communications and Signal Process-
`6.806.887 B2
`10/2004 Chernocket al.
`ing, 1993., Proceedings ofthe 1993 IEEE South African Symposium
`6,850,147 B2
`2/2005 Prokoski etal.
`on Publication Year: 1993, pp. 6-11.
`encyclopedia,”
`free
`the
`6,873,975 Bl
`3/2005 Hatakeyamaetal.
`“TEEE
`802.15.4-2006-Wikipedia,
`6,879,567 B2
`4/2005 Callawayetal.
`Wikipedia®, Last Modified Mar. 21, 2009 [Online] [Retrieved on
`6,950,941 Bl
`9/2005 Lee etal.
`Apr. 30, 2009] Retrieved from the Internet <URL:http://en.
`6,957,086 B2
`10/2005 Bahlet al.
`wikipedia.org/wiki/TEEE__802.15.4-2006>, 4 pages.
`6,973,576 B2
`12/2005 Giobbi
`Lake, Matt, “Downloading for Dollars,’ Sound & Vision, (Nov.
`6,975,202 Bl
`12/2005 Rodriguez etal.
`2000), pp. 137-138.
`7,012,503 B2
`3/2006 Nielsen
`Lewis, Sony and Visa in On-Line Entertainment Venture, New York
`7,159,765 B2
`1/2007 Frerking
`Times, v145, Nov. 16, 1995, 1 page.
`Page 2 of 30
`
`Page 2 of 30
`
`
`
`US 9,049,188 B1
`Page 3
`
`(56)
`
`References Cited
`OTHER PUBLICATIONS
`
`Mclver, R.et al., “Identification and Verification Working Together,”
`Bioserypt™, Aug. 27, 2004, [online] [Retrieved on Jan. 7, 2007]
`Retrieved
`from the
`Internet
`<URL:http://www.ibia.org/
`membersadmin/whitepapers/pdf/15/
`Identification%20and%20Verification%20Working%20Together.
`pdf>, 5 pages.
`Nilsson,
`J. et al., “Match-On-Card for Java Cards,” Precise
`Biometrics, White Paper, Apr. 2004, [online] [Retrieved on Jan. 7,
`2007] Retrieved from the Internet <URL: http://www.ibia.org/
`membersadmin/whitepapers/pdf/17/Precise%20Match-
`onCard%20for%20Java%020Cards.pdf>, 5 pages.
`Nordin, B., “Match-On-Card Technology,” Precise™ Biometrics,
`White Paper, Apr. 2004,
`[online]
`[Retrieved on Jan. 7, 2007]
`Retrieved
`from the
`Internet
`<URL:http://www.ibia.org/
`Membersadmin/whitepapers/pdf/ 17
`TPrecise%20Match-
`onCard%20technology.pdf>, 7 pages.
`Notification of the International Search Report and Written Opinion,
`PCT/US04/38 124, Apr. 7, 2005, 10 pages.
`Paget, Paul, “The Security Behind Secure Extranets,” Enterprise
`Systems Journal, (Dec. 1999), 4 pgs.
`PCT International Search Report and Written Opinion, PCT/US07/
`11105, Oct. 20, 2008, 10 pages.
`PCT International Search Report and Written Opinion, PCT/US07/
`11103, Apr. 23, 2008, 9 pages.
`PCT International Search Report and Written Opinion, PCT/US05/
`43447, Feb. 22, 2007, 7 pages.
`PCT International Search Report and Written Opinion, PCT/US05/
`46843, Mar. 1, 2007, 10 pages.
`PCT International Search Report and Written Opinion, PCT/US07/
`00349, Mar. 19, 2008, 10 pages.
`Personal Servers as Digital Keys; Beaufour, A.; Bonnet, P.; Pervasive
`Computing and Communications, 2004. PerCom 2004. Proceedings
`of the Second IEEE Annual Conference on Publication Year: 2004,
`pp. 319-328.
`
`Press Release, “Micronas and Thomson Multimedia Showcase a
`New CopyProtection System that Will Drive the Future of Digital
`Television,” www.micronas.com, Jan. 8, 2002, 3 pages.
`Press Release, “Content Protection Plan Targets Wireless Home Net-
`works,” www.eetimes.com, Jan. 11, 2002, 2 pages.
`Press Release, “Thompson Bets on Smart Cards for Video Encryp-
`tion,” www.informationweek.com. Jun. 7, 2001, 1 page.
`Press Release, “Thompson Multimedia Unveils Copy Protection Pro-
`posal Designed to Provide Additional Layer of Digital Content Secu-
`rity,’ www.thompson-multimedia.com May 30, 2001, 2 pages.
`“SAFModule™: A LookInto Strong Authentication,”saflink Corpo-
`ration, [online]
`[Retrieved on Jan. 7, 2007] Retrieved from the
`Internet<URL :http://www.ibia.org/membersadmin/whitepapers/
`pdf/6/SAFmod_WP.pdf>, 8 pages.
`Sapsford, Jathon, “E-Business: Sound Waves Could Help Ease
`WebFraud Woes,” Wall Street Journal, (Aug. 14, 2000), B1, 2 pages.
`“Say Hello to Bluetooth,” Bluetooth Website, 5 pages [Last retrieved.
`on Mar. 25, 2008].
`“Smart Cards and Biometrics White Paper,’ Smart Card Alliance,
`May 2002, [online] [Retrieved on Jan. 7, 2007] Retrieved from the
`Internet
`<URL-http://www.securitymanagement.com/library/
`smartcard__faqtech0802.pdf>, 7 pages.
`Van Winkle, William, “Bluetooth, the King of Connectivity,’ Laptop
`Buyer’s Guide and. Handbook, (Jan. 2000), pp. 148-153.
`Wade, W., “Using Fingerprints to Make Payments at POS Slowly
`Gaining Popularity,” Credit Union Journal, International Biometric
`Group, Apr. 21, 2003, [online] [Retrieved on Jan. 7, 2007] Retrieved.
`from the Internet <URL: http://www.biometricgroup.comlin_the_
`news/04.21.03.-html>, 3 pages.
`Wallace, Bob,
`“The
`Internet Unplugged,’
`765(22), (Dec. 13, 1999), pp. 22-24.
`Weber, ThomasE., “In the Age of Napster, Protecting Copyrightis a
`Digital Arms Race,” Wall Street Journal, (Jul. 24, 2000), B1, 2 pages.
`Non-Final Office Action, U.S. Appl. No. 11/939,451, Dated: May 12,
`2010, 12 pages.
`
`InformationWeek,
`
`* cited by examiner
`
`Page 3 of 30
`
`Page 3 of 30
`
`
`
`US 9,049,188 B1
`
`|Old
`
`SOUeWolg
`
`vOl
`
`Jun. 2, 2015
`
`Sheet 1 of 15
`
`
`
`VOz)uoneoddy
`
`80}JosuesZOMd
`
`WELLAy
`
`SS800V.
`
`Q0IMaS
`
`VolbAIG
`
`QZb
`
`wan
`
`U.S. Patent
`
`Page 4 of 30
`
`Page 4 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 2 of 15
`
`US 9,049,188 B1
`
`
`
`JOAIBOSUBI|;SSOIM~BZZ
`OL¢uoneolddy
`
`092
`
`BLLASy
`
`pGz \dAsoeqadksouz
`
`CGC J0BIOS
`
`(99SgS)
`
`¢Ols
`
`aIdd
`
`O1zAiowey\
`
`cOL4dd
`
`Page 5 of 30
`
`Page 5 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 3 of 15
`
`US 9,049,188 B1
`
`WOoMaN
`
`OLL
`
`JOMJON
`
`Q0BLO}UI
`
`80€
`
`OU}OWOIg
`
`(sapeoy
`
`COE
`
`
`
`SO]JosueS
`
`
`
`JOSS80014
`
`(SN]e}S
`
`jouoD
`
`WOdO/|
`
`ole
`
`90€
`
`€Old
`
`Page 6 of 30
`
`Page 6 of 30
`
`
`
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 4 of 15
`
`US 9,049,188 B1
`
`
`
`
`
`OLSSdIA9qSUO|EPUE}S/Od80)Josues
`
`ZOlMd
`
`a8}
`
`KaySSo00yVelAey
`
`vols
`
`uoneoiddy
`
`WA!
`
`Ssa00y
`
`Q0IMaS
`
`VollAIG
`
`deb}
`
`Ocht
`
`Page 7 of 30
`
`Page 7 of 30
`
`
`
`US 9,049,188 B1
`
`GOls
`
`Jun. 2, 2015
`
`Sheet 5 of 15
`
`uoneoddy
`
`Al
`
`Asysseooy
`
`asl
`
`uoneoddy
`
`ssao0y
`
`WELLAey
`
`Josuas cht
`
`
`
`BOIAOS|BU9}XF
`
`
`
`ZLGBIASPOXOMJON/Od
`
`QQ]
`
`20)4dd
`
`Q0INOS
`
`Vell4d
`
`deb
`
`U.S. Patent
`
`Page 8 of 30
`
`Page 8 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 6 of 15
`
`US 9,049,188 B1
`
`LZ0¢|ddy
`
`VSLAey
`
`7Z0¢|ddy
`
`geLAey
`
`€202|.ddy
`
`gelAey
`
`ddy
`
`AWAD
`
`ddy
`
`LAOZL
`
`Ag}Aey
`9911Aey
`
`Z801
`
`COLHdd
`
`VollaS0IAI8S
`
`deb
`
`Iclh
`
`9Old
`
`XOzbddy
`
`Moz}ddy
`
`O81}Aey
`
`Adzddy
`
`O81)Aey
`
`9811Aey
`
`Page 9 of 30
`
`Page 9 of 30
`
`
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet7 of 15
`
`US 9,049,188 B1
`
`
`ie)
`
`=)
`
`
`Coordinator
`RFCell
`
`0¢2 WAS
`
`°oa
`
`cL=o
`
`Page 10 of 30
`
`
`FIG.7 Standalone
`ozKE
`
`O)oO
`
`Messaging 720B
`
`
`
`Alerts720C
`
`
`
`ThirdPartyApps720D
`
`RemoteApps 720E
`
`© x=
`2s><
`Lu ®
`
`Page 10 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 8 of 15
`
`US 9,049,188 B1
`
`
`
`
`FIG. 8
`
`FIG. 9
`
`Page 11 of 30
`
`Page 11 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 9 of 15
`
`US 9,049,188 B1
`
`
`
`JOS/)OLOL
`
`
`
`|.uonnqsesseid
`
`|uoyN
`
`OlSls
`
`
`sJe9}9Wd0901LSolOU)VHOTVY
`
`
`
`y0sueJOJEUIPIOO[AWS]uojeaddy
`
`4020120201
`
`g0SOl
`
`
`
`
`
`YOsol(|uonng)weepL|Leto$Je9|oJoyesadoOrOL
`
`SIMSOO!
`
`Page 12 of 30
`
`Page 12 of 30
`
`
`
`
`
`
`
`U.S. Patent
`
`Jun.2, 2015
`
`Sheet 10 of 15
`
`US 9,049,188 B1
`
`OTHER
`
`DEVICE
`
`1106
`
`FIG.11
`
`2 c
`
`No
`
`O=
`
`@2>@ O
`
`o
`oS—
`
`Page 13 of 30
`
`Page 13 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 11 of 15
`
`US 9,049,188 B1
`
`Aueneg9sjusuodwoy
`
`
`
`@u0Ud[8D
`
`
`
`COC}8UOUd
`
`®20lHdd
`
`élOlas
`
`[199
`ep0eOdyqz0lMdd
`
`PIEDWIS
`
`9021
`
`Page 14 of 30
`
`Page 14 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 12 of 15
`
`US 9,049,188 B1
`
`Qv0€Ody
`
`ebOld
`
`PUGAH
`
`
`
`COLLS91A8q
`
`&¢c0ldd
`
`er0eOCH
`
`OO€l
`
`Page 15 of 30
`
`qc0ldd
`
`Page 15 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 13 of 15
`
`US 9,049,188 B1
`
`qv0e9dY
`
`
`
`TWNOISATEVNA
`
`9071
`
`vlOld
`
`
`
`COL)S91A8q
`
`PUGAH
`
`OOrL
`
`Page 16 of 30
`
`qc0lMdd
`
`Page 16 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 14 of 15
`
`US 9,049,188 B1
`
`001
`
`&20ldd
`
`GbSls
`
`WNOIS
`
`41aVNA ey0EOGYUZOLMd
`
`
`/COLL891A9qPLQAH
`
`Ak
`
`qcOldd
`
`Page 17 of 30
`
`Page 17 of 30
`
`
`
`U.S. Patent
`
`Jun. 2, 2015
`
`Sheet 15 of 15
`
`US 9,049,188 B1
`
`qv0eOdy
`
`
`
`BIIAIBSI4-IM/O0Y
`
`
`QZOL|991A9q
`
`FIOTSOUPAYLSINeSsseo0yg‘dwo5
`
`JOYHEDPADZb9)SOURINOYU]SOINES
`SOULOyuAyEUOSIOd
`
`ZJUNOIDY[19D
`
`ey0eOdY
`
`PUGAH SOUP}
`
`JOYSsED0VI-AA|Junoasy
`
`11989|‘OYHEDWpslD
`
`EZOLWdd
`
`qz0ldd
`
`
`
`SOUCVSYU]GOIAIOS
`
`ZOOT
`
`sseo0yy“dwo9
`
`
`
`oyu]aimes
`
`Page18 of 30
`
`Page 18 of 30
`
`
`
`US 9,049,188 B1
`
`1
`HYBRID DEVICE HAVING A PERSONAL
`DIGITAL KEY AND RECEIVER-DECODER
`CIRCUIT AND METHODSOF USE
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`The present application claims priority under 35 U.S.C.
`$120 to U.S. patent application Ser. No. 13/445,825 entitles
`“Hybrid Device Having a Personal Digital Key and Receiver
`Decoder Circuit and Method of Use,” filed Apr. 12, 2012,
`which claimspriority under 35 U.S.C. §120 to US. patent
`application Ser. No. 12/329,329 entitled “Hybrid Device
`Having a Personal Digital Key and Receiver Decoder Circuit
`and Methodof Use,’filed Dec. 5, 2008, now U.S. Pat. No.
`8,171,528, which claims the benefit of priority under 35
`USS.C. §119(e) of U.S. Provisional Application No. 60/992,
`953 entitled “Reverse Prox,”filed on Dec. 6, 2007 by David L.
`Brown, John J. Giobbi and FredS. Hirt. The entire contents of
`all of the foregoing are incorporated by reference herein.
`
`BACKGROUND
`
`1. Field of Art
`Theinvention generally relates to personal digital keys and
`corresponding sensors, capable of proximity detection/loca-
`tion determination and auxiliary data services/application
`services. Still more particularly, the present invention relates
`to a hybrid device including a personal digital key (PDK) and
`a receiver-decoder circuit (RDC) and methods for using
`same.
`
`2. Description of the Related Art
`Proximity sensors and location tracking are technologies
`with many applications. For example, proximity sensors can
`be used to provide secure access to physical and/or digital
`assets, based on biometrics, passwords, PINS, or other types
`of authentication. Proximity sensors typically have advan-
`tages of being less cumbersome, easier to use, and more
`flexible in form factor and implementation. Proximity sensors
`can be used to control access to resources and/orto authenti-
`cate individuals, for example.
`Onepossible application that can take advantage of prox-
`imity sensors is location tracking RFID tracking is one
`example. In RFID, RFID tags are attached to objects to be
`tracked. RFID readers then interact with the RFID tags to
`determine the location of the tag. Regardless of how it is
`accomplished, location tracking (i.e., knowledge about the
`location of an object or person) is generally useful. For
`example, location tracking information can be used to track
`inventory andtrace the route of objects through various loca-
`tions. It can be used for time and motion studies. If tags are
`attached to people, then tracking of people can be used to
`better understand their behavior. Knowledge about a person’s
`location (and/ortheir past locations and projected future loca-
`tions) could be used to provide better services to that person.
`However, most proximity systems and location tracking
`systems have limited capabilities. Typically, the proximity
`sensor, RFID tag or similar device is a dumb device, in the
`sense that the device is designed andhasthe capability only to
`report its location. For example, such devices typically do not
`have the capabilities to run different applications or to even
`interact with different applications. Furthermore, these sys-
`tems typically are proprietary and narrowly tailored for a
`specific situation, thus preventing easy expandability to other
`situations or third party applications.
`
`SUMMARY
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Various drawbacksof the prior art are overcome by pro-
`viding a hybrid device including a personal digital key (PDK)
`Page 19 of 30
`
`2
`and a receiver-decoder circuit (RDC). The PDK and RDC of
`the hybrid device are coupled for communication with each
`other. In one embodiment, the hybrid device also provides a
`physical interconnect for connecting to other devices to send
`and receive control signals and data, and receive power. The
`hybrid device operates in one of several modes including,
`PDKonly, RDC only, or PDK and RDC. This allowsa variety
`of system configurations for mixed operation including:
`PDK/RDC, RDC/RDC or PDK/PDK.The present invention
`also includes a numberof system configurations for use ofthe
`hybrid device including: use of the hybrid device in a cell
`phone; simultaneous use of the PDK and the RDC function-
`ality of hybrid device; use of multiple links of hybrid device
`to generate an authorization signal, use ofmultiple PDKlinks
`to the hybrid device to generate an authorization signal; use of
`the hybrid device for authorization inheritance and use of the
`hybrid device for automatically disabling a service or feature.
`Other aspects of the invention include systems and com-
`ponents corresponding to the above, and methods corre-
`spondingto all of the foregoing.
`
`BRIEF DESCRIPTION OF THE FIGURES
`
`FIG.1 is a block diagram illustrating one embodimentof a
`system according to the invention.
`FIG.2 is a block diagram illustrating one embodimentof a
`Personal Digital Key (PDK).
`FIG.3 is a block diagram illustrating one embodimentof a
`sensor.
`
`FIGS. 4-6 are block diagramsillustrating further embodi-
`ments of systems accordingto the invention.
`FIG.7 is a block diagram illustrating one embodimentof a
`system with networked sensors.
`FIGS. 8-9 are block diagramsillustrating operation of the
`system in FIG. 7.
`FIG.10 is a diagram illustrating operation of the system in
`FIG.7.
`
`FIG. 11 is a block diagram of one embodimentof a hybrid
`device in accordance with the present invention.
`FIG. 12 is a block diagram of one embodimentof a system
`in which the hybrid device is part of a cell phone in accor-
`dance with the present invention.
`FIG. 13 is a block diagram of one embodimentof a system
`using the PDK and the RDC functionality of hybrid device in
`accordance with the present invention.
`FIG. 14 is a block diagram of one embodimentof a system
`using the multiple links ofhybrid device to generate an autho-
`rization signal in accordance with the present invention.
`FIG. 15 is a block diagram of one embodimentof a system
`using the multiple PDKlinks to the hybrid device to generate
`an authorization signal in accordance with the present inven-
`tion.
`
`FIG. 16 is a block diagram of one embodimentof a system
`using the hybrid device for authorization inheritance in accor-
`dance with the present invention.
`The figures depict various embodiments of the present
`invention for purposesofillustration only. One skilled in the
`art will readily recognize from the following discussion that
`alternative embodimentsof the structures and methodsillus-
`
`trated herein may be employed without departing from the
`principles of the invention described herein.
`
`DETAILED DESCRIPTION
`
`FIG.1 is a high level block diagram illustrating a system
`for allowing access to multiple applications(or services). The
`system 100 comprises a Personal Digital Key (PDK) 102, a
`
`Page 19 of 30
`
`
`
`US 9,049,188 B1
`
`3
`sensor 108, a network 110 and one or more applications 120
`(including services). The sensor 108 is coupled to the PDK
`102 by a wireless link 106 and coupled to a network 110 by
`either a wired or wireless link. In this example, the applica-
`tions 120 are also accessed over network 110. The sensor 108
`
`is also adapted to receive a biometric input 104 from a user
`and is capable of displaying status to a user. In alternative
`embodiments, different or additional resources and databases
`may be coupled to the network 110, including for example
`registries and databases used for validation or to check vari-
`ous registrations of the user. In another embodiment, the
`sensor 108 operates as a standalone device without a connec-
`tion to the network 110.
`The PDK 102 includes multiple service blocks 112A-N as
`described in moredetail in FIG. 2. Each service block 112 is
`accessed using a correspondingservice block access key 118.
`In this example, the sensor 108 contains three of the service
`block access keys 118A, D, F. The service block access keys
`118 allow the sensor 108 to unlock information stored in the
`
`corresponding service blocks 112, which information is used
`as local secured information.
`
`In one example, a biometric is required in order to access
`specific service blocks 112 in the PDK 102. Verification ofthe
`biometric is achieved by using service block 112A. The sen-
`sor 108 stores the corresponding service block access key
`118A and usesthis key to unlock the biometric service block
`112A, whichstores a valid biometric. A current biometric is
`received using biometric input 104. The sensor 108 then
`verifies the stored biometric (from service block 112A)
`against the recently acquired biometric (from input 104).
`Upon properverification, various applications 120 are per-
`mitted to connectto the PDK 102 via the sensor 108 and/or to
`gain access to other service blocks 112.
`The system 100 can be used to address applications 120
`where it is important to authenticate an individual for use.
`Generally, the sensor 108 wirelessly receives information
`stored in the PDK 102 that uniquely identifies the PDK 102
`and the individual carrying the PDK 102. The sensor 108 can
`also receive a biometric input 104 from the individual. Based
`on the received information, the sensor 108 determines if
`access to the application 120 should be granted. In this
`example, the system 100 provides authentication without the
`need for PINs or passwords (although PINs and passwords
`maybe used in other implementations). Moreover, personal
`biometric information need not be stored in any local or
`remote storage database andis only stored on the user’s own
`PDK(in one embodiment).
`Thecredibility of the system 100 is ensured by the use of a
`PDK 102 that stores trusted information. The PDK 102is a
`
`compact, portable uniquely identifiable wireless device typi-
`cally carried by an individual. The PDK 102 stores digital
`information in a tamper-proof format that uniquely associates
`the PDK 102 with an individual. Example embodiments of
`PDKsare described in more detail in U.S. patent application
`Ser. No. 11/292,330, entitled “Personal Digital Key And
`Receiver/Decoder Circuit System And Method”filed on Nov.
`30, 2005; U.S. patent application Ser. No. 11/620,581 entitled
`“Wireless Network Synchronization Of Cells And Client
`Devices On A Network”filed on Jan. 5, 2007; and U.S. patent
`application Ser. No. 11/620,577 entitled “Dynamic Real-
`Time Tiered Client Access”filed on Jan. 5, 2007, the entire
`contents of which are all incorporated herein by reference.
`The sensor 108 wirelessly communicates with the PDK
`102 when the PDK 102is within a proximity zone(i.e., within
`amicrocell) ofthe sensor 108. The proximity zone can be, for
`example, several meters in radius and preferably can be
`adjusted dynamically by the sensor 108. Thus, in contrast to
`Page 20 of 30
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`many conventional RF ID devices, the sensor 108 can detect
`and communicate with the PDK 102 without requiring the
`owner to remove the PDK 102 from his/her pocket, wallet,
`purse, etc. Generally, the sensor 108 receives uniquely iden-
`tifying information from the PDK 102 andinitiates an authen-
`tication process for the individual carrying the PDK 102. In
`one embodiment, the sensor 108 is adapted to receive a bio-
`metric input 104 from the individual. The biometric input 104
`comprises a representation of physical or behavioral charac-
`teristics unique to the individual. For example, the biometric
`input 104 can include a fingerprint, a palm print, a retinal
`scan,an iris scan, a photograph,a signature, a voice sample or
`any other biometric information such as DNA, RNA ortheir
`derivatives that can uniquely identify the individual. The sen-
`sor 108 compares the biometric input 104 to information
`received from the PDK 102 to determine authentication.
`
`Alternatively, the biometric input 104 can be obtained by a
`biometric sensor on the PDK 102 and transmitted to the
`sensor 108 for authentication.
`In additional alternative
`
`embodiment, someorall of the authentication process can be
`performed by the PDK 102 instead of the sensor 108.
`In this example, the sensor 108 is further communicatively
`coupledto the network 110 in orderto receive and/or transmit
`information to remote databases for remote authentication. In
`an alternative embodiment, the sensor 108 includes a non-
`volatile data storage that can be synchronized with one or
`more remote databases or registries. Such an embodiment
`alleviates the need for a continuous connection to the network
`
`110 and allowsthe sensor 108 to operate ina standalone mode
`and forthe local data storage to be updated when a connection
`is available. For example, a standalone sensor 108 can peri-
`odically download updated registry entries and perform
`authentication locally without any remote lookup.
`In yet another alternative, a standalone sensor 108 may
`have a pre-configured secure access key 118 and encryption
`algorithm, or a variable access key 118 that changes, for
`example based on time and sensor ID. One example applica-
`tion would be a sensor 108 located ina hotel room door, where
`the sensor could constantly compute a different access key
`118 based on time, and the PDK 102 could be associated with
`this key during the hotel registration process.
`The network 110 provides communication between the
`sensor 108 and various validation databases and/orregistries,
`in addition to the applications 120. In one embodiment, the
`network 110 uses standard communications technologies
`and/or protocols. Thus, the network 110 can include links
`using technologies such as Ethernet, 802.11, 802.16, inte-
`grated services digital network (ISDN), digital subscriberline
`(DSL), asynchronous transfer mode (ATM), etc. Similarly,
`the networking protocols used on the network 110 can include
`the transmission control protocol/Internet protocol (TCP/IP),
`the hypertext transport protocol (HTTP), the simple mail
`transfer protocol (SMTP), the file transfer protocol (FTP),
`etc. The data exchanged over the network 110 can be repre-
`sented using technologies and/or formats including the
`hypertext markup language (HTML), the extensible markup
`language (XML), etc. In addition, all or someoflinks can be
`encrypted using conventional encryption technologies such
`as the secure sockets layer (SSL), Secure HTTP and/orvirtual
`private networks (VPNs). In another embodiment, the entities
`can use custom and/or dedicated data communications tech-
`
`nologies instead of, or in addition to, the ones described
`above.
`
`In one aspect, the sensor 108 may connectto a validation
`database that stores additional information that may be used
`for authorizing a transaction to be processedat the sensor. For
`example, in purchase transactions, the sensor 108 may inter-
`
`Page 20 of 30
`
`
`
`US 9,049,188 B1
`
`5
`act with a credit card validation database that is separate from
`the merchant providing the sale. Alternatively, a different
`database may be usedto validate different types ofpurchasing
`means such as a debit card, ATM card, or bank account
`number.
`
`In another aspect, the sensor 108 may connectto various
`registries that store, among other items, PDK,notary, and/or
`sensor information. In one embodiment, a registry stores
`biometric or other types of information in an encoded format
`that can only be recovered using an algorithm or encoding key
`stored in the PDK.Information stored in the registries can be
`accessed by the sensor 108 via the network 110 for use in the
`authentication process. Two basic types of registries are pri-
`vate registries and a Central Registry. Private registries are
`generally established and administered by their controlling
`entities (e.g., a merchant, business authority, or other entity
`administering authentication). Private registries can be cus-
`tom configured to meet the specialized and independent
`needs of each controlling entity. A Central Registry is a
`highly-secured, centrally-located database administered by a
`trusted third-party organization. In one embodiment, all
`PDKs102 are registered with the Central Registry and may be
`optionally registered with one or more selected private regis-
`tries. In alternative embodiments, a different numberor dif-
`ferent types of registries may be coupled to the network 110.
`Theservice blocks 112 can be used for purposesother than
`user authentication. For example, information used or pro-
`duced by an application 120 can be transferred back and forth
`to the corresponding service block 112. That is, each service
`block 112 can be used as a local secure memory for the
`corresponding application 120. Thus, a service 120B may
`store certain sensitive information in service block 112B, and
`a separate service 120C will not be able to access that infor-
`mation without the corresponding access key 118B. In this
`example, the sensor 108 only holds access keys 118A, D, F
`and does not hold access key 118B. The application 120B
`may hold the access key 118B, thus allowing it to access
`service block 112B but preventing application 120C from
`accessing the service block 112B. Note that this implemen-
`tation would also prevent the sensor 108 acting alone from
`accessing the service block 112B.
`Turning now to FIG. 2, an example embodiment of a PDK
`102 is illustrated. The PDK 102 comprises a mem