This application generally relates to systems and methods for using sonic tones to communicate digitized information, and specifically the use of sonic tones in controlled access to a secure area or system.
Various proposals have been made to transmit sonic tones to convey digital information, either independently or with audio content that is transmitted or played back audibly in a public or private environment. For example, a sonic tone may be embedded in audio content that is received by a microphone of a device after transmission by an audio speaker within the proximity of the device.
Example systems and methods for embedding sonic tones into audio content are provided in the above-referenced PCT Application, as well as the following US patent applications, the entirety of which applications is hereby incorporated by reference in their entirety: U.S. patent application Ser. No. 13/286,613 entitled “SYSTEM EFFECTIVE TO MODULATE A CODE AND PROVIDE CONTENT TO A USER” filed Nov. 1, 2011, U.S. patent application Ser. No. 13/286,670 entitled “SYSTEM EFFECTIVE TO DEMODULATE A MODULATED CODE AND PROVIDE CONTENT TO A USER” filed September Nov. 1, 2011, U.S. patent application Ser. No. 13/286,727 entitled “DEVICE EFFECTIVE TO MODULATE A CODE AND TO PROVIDE CONTENT TO A USER” filed Nov. 1, 2011, U.S. patent application Ser. No. 15/081,158 entitled “LOCAL TONE GENERATION” filed Mar. 15, 2016, U.S. patent application Ser. No. 15/719,164 entitled “HIGH BANDWIDTH SONIC TONE GENERATION” filed Sep. 28, 2017, and U.S. patent application Ser. No. 15/847,205 entitled “PHASE SHIFT KEYED SIGNALING TONE” filed Dec. 19, 2017.
In some cases described in these filings, the sonic tones may be inaudible, i.e., signals that are outside the range of human hearing or other signals not otherwise detectable by humans. For example, in some embodiments, the sonic tone may be generated by frequencies near to 20,000 Hz or less than 20 Hz, or in a frequency band near to 20,000 Hz or near to 20 Hz which is generally sonic. The sonic tone may be the form of a modulated code, as described in the above-referenced patent applications, which is a series of logic 0s and 1s. The modulated code may be repeatedly and periodically output by the sound source, enabling the receiving device to identify and demodulate the modulated code in the sonic tone to determine the logical series of 0s and 1s associated with the sonic tone. In some embodiments, the logical series of 0s and 1s may be, for example, a coded identifier which can be transmitted to a content management system via various communications protocols.
As used herein, the term sonic tone is used to broadly refer to any type of acoustic signal, code, frequency, waveform, or otherwise that may be transmitted by an acoustic source and detected by a microphone or decoded by a sound processing device. The sonic tone may be processed by a process or routine passively running on the device or one which is activated manually by a user of the device.
In one application of the sonic tone described in U.S. patent application Ser. No. 14/398,675, the sonic tone enables unlocking of a door, such as a hotel room or private residence, in a contactless manner. It is an object of the present invention to provide a detailed routine for implementation of an ad-hoc networking process as described therein.
According to one aspect, access to a physical area or secured service is obtained by a user, by a method including storing a secret key in a user device and in a security system, and then when access is desired, using the secret key to generate a sonic tone encoding the secret key or a derivative thereof, and transmitting the sonic tone. The sonic tone is then received and decoded and its content compared to an expected content, and if there is a match, access is granted by the security system.
In specific disclosed embodiments, the secret key may be used to generate a one-time password based upon the secret key and a randomizing factor, such as the current time, and the one time password encoded into the sonic tone. The one-time password decoded from the sonic tone by the receiving security system can be compared to an expected one time password based upon the secret key and randomizing factor, to grant or deny access. In other embodiments the secret key may be one of several secret keys which are pre-shared between the user device and receiving security system, which are used one time or a limited number of times by the user device to obtain access.
In some embodiments, the sonic tone may be human-audible, or limited to a frequency range which is generally human-inaudible. Furthermore, the security system and user device may be connected to communicate over a network to obtain the secret key or keys or randomizing factor, e.g., to communicate with each other or with key servers or with one or more network time protocol servers to obtain the current time. To facilitate use of the security system by multiple users, each secret key may be stored in association with a user identity, and the sonic tone may embed a user identifier and one time password, so that the user identifier can be extracted from the sonic tone and used to obtain the secret key(s) for that user, which can then be used directly, or used to generate an expected one time password.
The secured service can include a server, workstation, entertainment system, or any other device which requires credentials, and the secured service may also be a subscription service which is authorized to a particular user. For example the security system may be in network communication with a remote server requiring authentication, which can be provided by the security system to the remote server in response to the receipt of the correct expected binary message by the security system. In one example the remote server may require authentication by the security system, e.g. by the delivery to the security system of a sonic tone embedding an expected binary message. In one use case the sonic tone may be delivered to the security system directly, and in alternate use cases the sonic tone may be recorded by a microphone at a user's device and then delivered as an audio file to the security system via a network connection. In other use cases, the remote server may require conventional authentication via a user name and password, and then require a second factor authentication by the security system in the manners described herein.
The invention includes the method of controlled access as well as a security system for providing controlled access by implementation of the described processes.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate various embodiments of the invention and, together with the general description of the invention given above, and the detailed description of the embodiments given below, explain the embodiments of the invention. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements.
Various non-limiting embodiments of the invention are described to provide an understanding of the principles of the structure, function, and use of the content delivery and management systems and processes disclosed herein. One or more examples of these non-limiting embodiments are illustrated in the accompanying drawings. Persons of ordinary skill in the art will understand that systems and methods specifically described herein and illustrated in the accompanying drawings are non-limiting embodiments. The features illustrated or described in connection with one non-limiting embodiment may be combined with the features of other non-limiting embodiments. Such modifications and variations are intended to be included within the scope of this disclosure.
Reference throughout the specification to “various embodiments,” “some embodiments,” “one embodiment,” “some example embodiments,” “one example embodiment,” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, appearances of the phrases “in various embodiments,” “in some embodiments,” “in one embodiment,” “some example embodiments,” “one example embodiment,” or “in an embodiment” in places throughout the specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner in one or more embodiments.
The embodiments disclosed herein are generally directed to the transmission of security information in a sonic tone, and the configuration of devices and security systems for generation, transmission, reception, decoding and evaluation of sonic tone tones that are thus transmitted. The devices and security systems may be configured to transmit a sonic tone to request access and/or to respond to reception of a sonic tone by providing or denying the requested access. Formats for sonic tones and the encoding of binary information into such tones is discussed in detail in the above-referenced patent filings.
In some embodiments, the system 100 may include a key server 130 for facilitating the generation of secret keys for use by device 100 and security system 120. Further, the system may include a network time protocol (NTP) server 140 for providing synchronized time information to user device 110 and security system 120. Furthermore, the system may include a secured server 150, which is network connected to the security system 120, and for which the security system 120 may provide a proxy security service, and/or two factor authentication, based upon an OTP 102 embedded in a sonic tone, as described above.
The user device 110 and security system 120 may be in communication with each other and/or servers 130, 140 and 150 via an electronic communications network 160, typically including one or more private networks and/or the public Internet. The communications network may include any number of computer and/or data networks, including the Internet, LANs, WANs, GPRS networks, etc., and may comprise wired and/or wireless communication links. The networkable devices and servers that communicate may be any type of device suitable for communication over the network, such as a server, workstation, personal computer, a laptop computer, or a notebook computer, for example.
In some example embodiments, the user device 110 may be one of many possible devices, such as a combination handheld computer and mobile telephone device, sometimes referred to as a smart phone, or another type of computing device such as a tablet computer, laptop or palmtop PC, or other mobile computing device. For the disclosed embodiment it is anticipated that the user device is portable and personal to the user or a small group of users, however, it can be appreciated that while these embodiments may be described in connection with user communication via a smart phone or laptop by way of example, the invention may be implemented for other types of user equipment or wireless computing devices such as a mobile telephone, personal digital assistant (PDA), combination mobile telephone/PDA, handheld gaming device or mobile gaming device, messaging device, media player, or other suitable mobile communications devices. Furthermore, the invention may also be implemented using generally stationary hardware such as a desktop computer, gaming console, or the like.
In some embodiments the user device 110 and/or security system 120 may support wireless wide area network (WWAN) data communications services including Internet access for performing identified networking functions. Examples of WWAN data communications services may include Evolution-Data Optimized or Evolution-Data only (EV-DO), Long Term Evolution (LTE), Evolution For Data and Voice (EV-DV), CDMA/1×RTT, GSM with General Packet Radio Service systems (GSM/GPRS), Enhanced Data Rates for Global Evolution (EDGE), High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), and others. In each of these cases the networkable devices 102 may connect to the public Internet directly to communicate with the servers 130, 140 and/or 150.
Networking by user device 110 and security system 120 can also proceed using any number of known local wireless protocols, such as in accordance with the Institute of Electrical and Electronics Engineers (IEEE) 802.xx series of protocols, such as the IEEE 802.11a/b/g/n series of standard protocols and variants (also referred to as “Wi-Fi”), the IEEE 802.16 series of standard protocols and variants (also referred to as “WiMAX”), the IEEE 802.20 series of standard protocols and variants, and others.
Network communication by user device 110 and security system 120 can also be in accordance with shorter range wireless networks, such as a wireless personal area network (PAN) offering Bluetooth® data communications services in accordance with the Bluetooth®. Special Interest Group (SIG) series of protocols, specifications, profiles, and so forth. Other examples of shorter range wireless networks may employ infrared (IR) techniques or near-field communication (NFC) techniques and protocols, such as electromagnetic induction (EMI) techniques including passive or active radio-frequency identification (RFID) protocols and devices.
The user device 110 may use a variety of applications for allowing a user to accomplish one or more specific tasks other than generation of a sonic tone for secure access. For example, the user device 110 may implement an operating system with functionality for searching for an establishing Wi-Fi communication and functionality for pairing to Bluetooth compliant hosts in a PAN. The operating system may further allow the installation of user-selected application software to provide computing capabilities of a wide variety. In addition to communication functions, operating system programs implemented by the user device 110 may include, without limitation, device drivers, programming tools, utility programs, software libraries, application programming interfaces (APIs), and so forth. As is to be appreciated, the user device 110 may include any suitable OS, such as a mobile OS (ANDROID, BLACKBERRY OS, iOS, SYMBIAN OS, WINDOWS PHONE, and so forth), a desktop OS (MAC OS X, LINUX, WINDOWS, GOOGLE CHROME OS, and so forth) or a television OS (GOOGLE TV, APPLE TV, or other Smart TV OS), for example.
Other networkable devices, such as stationary devices connected to AC mains power and wired networks, are also contemplated as potential users of the methods described herein with and are within the scope of principles of the invention.
The invention will now be described in greater detail in connection with a specific embodiment in which secure access is obtained by the use of a one-time password generated from a secret key. Other embodiments are also possible including an embodiment, as noted above, in which a group of secret keys are shared between the user device and receiving security system, and which are used either one time or a few times each to obtain access.
As illustrated in
Memory 112 also includes a library of code 115 for generating a sonic tone for binary content. In the particular illustrated use case, the library 115 includes additional code for generating a one-time password (OTP), and processor 111 uses this library code to generate a one-time password in response to a secret key for a particular user, and the current time (stored in the processor clock 116). The processor then uses the library code to encode that one-time password, and a user identity, into a sonic tone, using techniques such as those described in the Assignee's above-referenced patent filings. The sonic tone embedding this one-time password is typically represented as a sound file 117, which is delivered to a digital-to-analog conversion subsystem 118, for playback on a speaker 119 of the user device 110. The resulting sonic tone 102 radiates acoustically in the space surrounding the user device 110.
As shown in the embodiment of
Memory 122 also includes a library of code 125 for decoding a sonic tone for binary content, and, in the particular illustrated embodiment, for generating a one-time password (OTP). In this particular embodiment, processor 121 uses the library code 125 to decode a one-time password, and a user identity, from a sonic tone received by a microphone 129 via an analog to digital conversion subsystem 128. The decoding of the sonic tone uses techniques such as those described in the Assignee's above-referenced patent filings. Once the sonic tone has been decoded, the processor 121 may use the library code 125 to generate its own copy of a one-time password 127 for the identified user, using the identity of the user and the secret key 124 stored for that user. More specifically, the one-time password 127 is created in response to a secret key for the identified user, and the current time (stored in the processor clock 126).
Security system 120 generates signals to unlock, authorize or validate access, which are delivered directly or via networked connections, as appropriate, to permit or deny the requested access. These connections are generally represented at 131.
Turning now to
Once a secret key has been delivered to the user device, the secret key and the user identifier for that secret key needs to also be delivered to the security system. In one embodiment, in step 206, the key server 130 delivers the secret key and the username directly to the secure system. In this embodiment, for example, the secure system may routinely query the key server for new secret keys and usernames of users authorized by the key server to have access to the security system. In an alternative embodiment, in step 208 the user device may itself deliver the secret key and username to the security system, for example in a programming mode of the security system which is enabled using a master key. The user device may deliver the key using a sonic tone, or other protocols such as a two-dimensional bar code, near field communication (NFC), manual entry on a keyboard of the security system, or any other available method.
In an alternative embodiment shown in
Through the above steps, the configuration of the user device and security system can be completed, so that at step 214 the security system and user device are configured for interaction, each system having the user name for a user permitted access, and a secret key for the user.
Turning now to
After having developed an OTP, the user device then proceeds to step 306, and encodes the OTP and user identifier into a sonic tone, using the techniques described in the above-referenced patent filings of the assignee hereof. In step 308 the resulting sonic tone is then acoustically broadcast into the area near to the user device and secure system.
In step 310, the security system, having received the sonic tone, extracts the one-time password and user identity from the tone. Next, in step 312, the security system implements the OTP generation routine from the library code 125, to retrieve the secret key 124 for the user identity provided in the sonic tone, and then using the secret key and current time to create an expected one-time password. To facilitate this step, on a regular basis the processor updates its internal clock (step 314) to synchronize with the clock of an NTP (network time protocol) server such as server 140 (
Finally, in step 316, the expected OTP generated by the security system is compared to the OTP provided in the sonic tone, and if the two match, then the security system delivers an unlock, authorize or validation signal to the controlled system, door or device.
A number of available one-time password algorithms may be used in implementation of the present invention. In the above example a time-based one-time password algorithm (TOTP) is used, which has been adopted as an Internet Engineering Task Force standard under RFC 6238, available at https://tools.ietf.org/html/rfc6238, which is incorporated herein by reference.
It will be appreciated that users of the system need not necessarily have a secret key for the system, and not every secret key needs to be bound to a user. For example, an administrator of the system, capable of adding or deleting users or keys, or initiating an administrative mode of the system, would not necessarily have a key in addition to their user identity.
It will be further appreciated that a one-time password need not be used in all cases for accessing the secured system or facility
Referring to
In step 404, the security system, having received the key, initiates a listening routine, so that when the tone is broadcast by the device in step 408 it is received in step 410 by the security system, and the security system extracts the key from the tone. Next, in step 412, the security system retrieve the key obtained from the server and matches it to the key from the sonic tone, and if there is a match, then the security system delivers an unlock, authorize or validation signal to the controlled system, door or device, after which this transaction is confirmed to the server in step 414 by the security system, by the user in step 416, and/or by both.
A hardware implementation of the security system may use any of a number of platforms, such as a Raspberry Pi platform, including microphone input and using GPIO pins of the Raspberry Pi to provide electronic control of a lock.
In various embodiments, security device 120 may detect the sonic tone through a generally passive detection process. In other words, a user does not necessarily have to routinely initiate or activate the detection process. Instead, the detection process may be a background routine that operates in the random access memory (RAM) of a security device 120, for example. The background routine may periodically, or at least routinely, query signals received or generated by various on-board components of the security device 120 to detect if a sonic tone is present. These queries may be performed without additional input from the user. Components queried by the detection process may include, without limitation, on-board analog-to-digital converters, and other audio ports (such as a line-in input, for example).
The specific functions of the security device and user device are not limited to the embodiments described herein. For example, the host device may take any number of forms or be embedded in any number of devices that have a or microphone and secure functions or wired or wireless communication capability. For example, the host device may be a television, telephone, computer, smartphone, tablet, headphone/headset, smartwatch, vehicle infotainment system, Virtual Reality or Enhanced Reality goggle, helmet or system, Internet-of-Things devices or personal assistants such as the Amazon Echo™ and Echo Dot™, Google Home™, and/or other fixed, mobile or wearable devices capable of reception of sonic tones and delivery of secured access to content or a physical location. The user device may be any of these devices as well, provided the user device has a speaker and some form of user interface. In particular, smartphone or tablet user device may authorize playback of subscription content on a television by authorization of a user via a key, password or one-time password, according to principles of the present invention. Alternately, a smartphone or tablet may receive authorization for playback of subscription content by authorization of a user's presence in a home, vehicle or particular commercial area, via a one-time password delivered by a television in that home, vehicle or commercial area.
The invention is further applicable to wearable devices which may deliver authorizations to other devices using the methods of the invention. A smartwatch, for example, may act as a user device and delivery authorization to a personal computer workstation acting as the security device. A hearing aid or activity monitor equipped with a speaker or microphone can also serve as the user device or security device depending upon available capabilities of the devices and desired use cases.
In addition, it will be apparent to one of ordinary skill in the art that at least some of the embodiments described herein may be implemented in many different embodiments of software, firmware, and/or hardware. The software and firmware code may be executed by a processor or any other similar computing device. The software code or specialized control hardware that may be used to implement embodiments is not limiting. For example, embodiments described herein may be implemented in computer software using any suitable computer software language type, using, for example, conventional or object-oriented techniques. Such software may be stored on any type of suitable computer-readable medium or media, such as, for example, a magnetic or optical storage medium.
The operation and behavior of the embodiments may be described without specific reference to specific software code or specialized hardware components. The absence of such specific references is feasible, because it is clearly understood that artisans of ordinary skill would be able to design software and control hardware to implement the embodiments based on the specification with no more than reasonable effort and without undue experimentation.
Moreover, the processes associated with the disclosed embodiments may be executed by programmable equipment, such as computers or computer systems and/or processors. Software that may cause programmable equipment to execute processes may be stored in any storage device, such as, for example, a computer system (nonvolatile) memory, an optical disk, magnetic tape, or magnetic disk. Furthermore, at least some of the processes may be programmed when the computer system is manufactured or stored on various types of computer-readable media.
It can also be appreciated that certain process aspects described herein may be performed using instructions stored on a computer-readable medium or media that direct a computer system to perform the process steps. A computer-readable medium may include, for example, memory devices such as diskettes, compact discs (CDs), digital versatile discs (DVDs), optical disk drives, or hard disk drives. A computer-readable medium may also include memory storage that is physical, virtual, permanent, temporary, semi-permanent, and/or semi-temporary.
A “computer,” “computer system,” “host,” “server,” or “processor” may be, for example and without limitation, a processor, microcomputer, minicomputer, server, mainframe, laptop, personal data assistant (PDA), wireless e-mail device, cellular phone, pager, processor, fax machine, scanner, or any other programmable device configured to transmit and/or receive data over a network.
Computer systems and computer-based devices disclosed herein may include memory for storing certain software modules used in obtaining, processing, and communicating information. It can be appreciated that such memory may be internal or external with respect to operation of the disclosed embodiments. The memory may also include any means for storing software, including a hard disk, an optical disk, floppy disk, ROM (read only memory), RAM (random access memory), PROM (programmable ROM), EEPROM (electrically erasable PROM) and/or other computer-readable media.
In various embodiments disclosed herein, a single component may be replaced by multiple components and multiple components may be replaced by a single component to perform a given function or functions. Except where such substitution would not be operative, such substitution is within the intended scope of the embodiments. Any servers described herein, for example, may be replaced by a “server farm” or other grouping of networked servers (such as server blades) that are located and configured for cooperative functions. It can be appreciated that a server farm may serve to distribute workload between/among individual components of the farm and may expedite computing processes by harnessing the collective and cooperative power of multiple servers. Such server farms may employ load-balancing software that accomplishes tasks such as, for example, tracking demand for processing power from different machines, prioritizing and scheduling tasks based on network demand and/or providing backup contingency in the event of component failure or reduction in operability.
The computer systems may comprise one or more processors in communication with memory (e.g., RAM or ROM) via one or more data buses. The data buses may carry electrical signals between the processor(s) and the memory. The processor and the memory may comprise electrical circuits that conduct electrical current. Charge states of various components of the circuits, such as solid-state transistors of the processor(s) and/or memory circuit(s), may change during operation of the circuits.
Thus, generally, while various embodiments have been described herein, it should be apparent that various modifications, alterations, and adaptations to those embodiments may occur to persons skilled in the art with attainment of at least some of the advantages. The disclosed embodiments are therefore intended to include all such modifications, alterations, and adaptations without departing from the scope of the embodiments as set forth herein.
This application is a continuation-in-part of U.S. patent application Ser. No. 14/398,675, which was filed as PCT application Ser. No. U.S./2013/039079 on May 1, 2013, and published in the United States on Apr. 23, 2015 as Publication US2015-0113094, and claims benefit of U.S. Provisional Patent Application Ser. Nos. 61/781,107 filed Mar. 14, 2013 and 61/640,900 filed May 1, 2012, each of which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5159703 | Lowery | Oct 1992 | A |
5335250 | Dent et al. | Aug 1994 | A |
5485839 | Aida et al. | Jan 1996 | A |
5565921 | Sasaki et al. | Oct 1996 | A |
5764763 | Jensen et al. | Jun 1998 | A |
5889870 | Norris | Mar 1999 | A |
5923252 | Sizer et al. | Jul 1999 | A |
5995512 | Pogue, Jr. | Nov 1999 | A |
6301368 | Bolle et al. | Oct 2001 | B1 |
6511426 | Hossack et al. | Jan 2003 | B1 |
6570500 | Pieper | May 2003 | B1 |
6664913 | Craven et al. | Dec 2003 | B1 |
6891482 | Craven et al. | May 2005 | B2 |
6912319 | Barnes et al. | Jun 2005 | B1 |
6947893 | Iwaki et al. | Sep 2005 | B1 |
7334735 | Antebi et al. | Feb 2008 | B1 |
7904946 | Chu | Mar 2011 | B1 |
7995197 | Sikora et al. | Aug 2011 | B2 |
8140331 | Lou | Mar 2012 | B2 |
8401569 | Bell et al. | Mar 2013 | B1 |
8532644 | Bell et al. | Sep 2013 | B2 |
8544753 | Antebi et al. | Oct 2013 | B2 |
8711656 | Paulson | Apr 2014 | B1 |
8976959 | Duplan et al. | Mar 2015 | B2 |
8983089 | Chu et al. | Mar 2015 | B1 |
8989779 | Centore, III | Mar 2015 | B1 |
9024998 | Chu et al. | May 2015 | B2 |
9111326 | Worley, III et al. | Aug 2015 | B1 |
9213969 | Arentz | Dec 2015 | B2 |
9318166 | Sharon et al. | Apr 2016 | B2 |
9361444 | Antebi et al. | Jun 2016 | B2 |
9513861 | Lin et al. | Dec 2016 | B2 |
9766702 | Cieplinski et al. | Sep 2017 | B2 |
9912415 | Tsfaty et al. | Mar 2018 | B2 |
10044448 | Mufti | Aug 2018 | B2 |
10826623 | Prince et al. | Nov 2020 | B2 |
20010049788 | Shur | Dec 2001 | A1 |
20020008615 | Heide et al. | Jan 2002 | A1 |
20020152045 | Dowling | Oct 2002 | A1 |
20030206602 | Yamamoto | Nov 2003 | A1 |
20030217269 | Gantman | Nov 2003 | A1 |
20040018018 | Izadpanah | Jan 2004 | A1 |
20040111360 | Albanese | Jun 2004 | A1 |
20050008325 | Ollis et al. | Jan 2005 | A1 |
20050171649 | Adachi | Aug 2005 | A1 |
20050177361 | Srinivasan | Aug 2005 | A1 |
20050190768 | Cutler | Sep 2005 | A1 |
20060041759 | Kaliski, Jr. | Feb 2006 | A1 |
20060123239 | Martinian | Jun 2006 | A1 |
20060136544 | Atsmon et al. | Jun 2006 | A1 |
20060138231 | Elberbaum | Jun 2006 | A1 |
20070153091 | Watlington et al. | Jul 2007 | A1 |
20070220544 | Nash-Putnam | Sep 2007 | A1 |
20070272750 | Bjorklund | Nov 2007 | A1 |
20080071537 | Tamir | Mar 2008 | A1 |
20080134264 | Narendra et al. | Jun 2008 | A1 |
20080157938 | Sutardja | Jul 2008 | A1 |
20080165022 | Herz et al. | Jul 2008 | A1 |
20080173717 | Antebi et al. | Jul 2008 | A1 |
20080227436 | Gantman et al. | Sep 2008 | A1 |
20080228498 | Gasque | Sep 2008 | A1 |
20090019061 | Scannell, Jr. | Jan 2009 | A1 |
20090088133 | Orlassino | Apr 2009 | A1 |
20090210789 | Thakkar et al. | Aug 2009 | A1 |
20100034474 | Crucs | Feb 2010 | A1 |
20100053169 | Cook | Mar 2010 | A1 |
20100149022 | Fam et al. | Jun 2010 | A1 |
20100165879 | Gupta et al. | Jul 2010 | A1 |
20100280641 | Harkness et al. | Nov 2010 | A1 |
20100305449 | Wegener et al. | Dec 2010 | A1 |
20100331689 | Wegener | Dec 2010 | A1 |
20110029359 | Roeding et al. | Feb 2011 | A1 |
20110099295 | Wegener | Apr 2011 | A1 |
20110124399 | Dutilly et al. | May 2011 | A1 |
20110143677 | Jung et al. | Jun 2011 | A1 |
20110164595 | So et al. | Jul 2011 | A1 |
20110179182 | Vadla Ravnas | Jul 2011 | A1 |
20110295691 | Krieter | Dec 2011 | A1 |
20110301439 | Albert et al. | Dec 2011 | A1 |
20120051187 | Paulson | Mar 2012 | A1 |
20120064874 | Pierce, Jr. | Mar 2012 | A1 |
20120084131 | Bergel et al. | Apr 2012 | A1 |
20120089461 | Greenspan | Apr 2012 | A1 |
20120134238 | Surprenant et al. | May 2012 | A1 |
20120179525 | Seguin et al. | Jul 2012 | A1 |
20120197738 | Wakabayashi | Aug 2012 | A1 |
20120209949 | Deliyannis et al. | Aug 2012 | A1 |
20120214416 | Kent et al. | Aug 2012 | A1 |
20120232906 | Lindahl | Sep 2012 | A1 |
20120295560 | Mufti | Nov 2012 | A1 |
20130078988 | Bell et al. | Mar 2013 | A1 |
20130079057 | Bell et al. | Mar 2013 | A1 |
20130082850 | Takeshima | Apr 2013 | A1 |
20130106977 | Chu et al. | May 2013 | A1 |
20130176984 | Koezuka | Jul 2013 | A1 |
20130185137 | Shafi | Jul 2013 | A1 |
20130262539 | Wegener | Oct 2013 | A1 |
20130273968 | Rhoads et al. | Oct 2013 | A1 |
20130279300 | Iwase et al. | Oct 2013 | A1 |
20140039654 | Akiyama et al. | Feb 2014 | A1 |
20140045586 | Allen et al. | Feb 2014 | A1 |
20140050321 | Albert et al. | Feb 2014 | A1 |
20140101738 | Sama | Apr 2014 | A1 |
20140129232 | Jones et al. | May 2014 | A1 |
20140140503 | Duplan et al. | May 2014 | A1 |
20140172141 | Mangold | Jun 2014 | A1 |
20140369527 | Baldwin | Dec 2014 | A1 |
20150113094 | Williams et al. | Apr 2015 | A1 |
20150243163 | Shoemake | Aug 2015 | A1 |
20150297193 | Rothberg et al. | Oct 2015 | A1 |
20150309151 | Shibata et al. | Oct 2015 | A1 |
20160142157 | Jeong et al. | May 2016 | A1 |
20160373430 | Bhat | Dec 2016 | A1 |
20170279542 | Knauer et al. | Sep 2017 | A1 |
20170279571 | Melodia et al. | Sep 2017 | A1 |
20180132298 | Birnam | May 2018 | A1 |
20180167147 | Almada et al. | Jun 2018 | A1 |
20180329676 | Williams et al. | Nov 2018 | A1 |
20190096412 | Knauer et al. | Mar 2019 | A1 |
20190190621 | Prince et al. | Jun 2019 | A1 |
20190204409 | Booij et al. | Jul 2019 | A1 |
20190253101 | Kilian et al. | Aug 2019 | A1 |
20190268078 | Okunev et al. | Aug 2019 | A1 |
Number | Date | Country |
---|---|---|
103 023 583 | Apr 2015 | CN |
1758308 | Feb 2007 | EP |
2847984 | Mar 2015 | EP |
3207639 | Aug 2017 | EP |
3358811 | Aug 2018 | EP |
06-90296 | Mar 1994 | JP |
2001-320337 | Nov 2001 | JP |
2003-1744404 | Jun 2003 | JP |
2003-324491 | Nov 2003 | JP |
2007-164659 | Jun 2007 | JP |
2008-293393 | Dec 2008 | JP |
2011-141784 | Jul 2011 | JP |
2012-525655 | Oct 2012 | JP |
10-1136279 | Apr 2012 | KR |
2326495 | Jun 2008 | RU |
200245273 | Jun 2002 | WO |
2005122483 | Dec 2005 | WO |
2013129587 | Sep 2013 | WO |
2013166158 | Nov 2013 | WO |
2014069617 | May 2014 | WO |
2014104284 | Jul 2014 | WO |
2016061353 | Apr 2016 | WO |
2016123047 | Aug 2016 | WO |
2019067861 | Apr 2019 | WO |
Entry |
---|
QR Code Authentication with Embedded Message Authentication CodeChen, Changsheng. Mobile Networks and Applications 22.3: 383-394. New York: Springer Nature B.V. (Jun. 2017) (Year: 2017). |
Min, G. et al., “Performance Analysis of Different Phase Shift Keying Modulation Schemes in Aeronautical Channels”, Jun. 2009. |
Chitode, J.S. Communication Theory. 2002. Technical Publications. Prune. 5-28. Sec. 5-6 near 5-7 Source Coding Theorem Shannon's First Theorem). (Year: 2002). |
Lee et al.; Chirp Signal-Based Aerial Acoustic Communication for Smart Devices; 2015. |
Number | Date | Country | |
---|---|---|---|
20180329676 A1 | Nov 2018 | US |
Number | Date | Country | |
---|---|---|---|
61781107 | Mar 2013 | US | |
61640900 | May 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14398675 | US | |
Child | 16040762 | US |