This application claims priority to U.S. Provisional Patent Application No. 63/050,230 entitled “Contact Tracing Solution to Combat the Spread of Infectious Diseases using Near Field Communications” to Thorkild Hansen et al. and filed on Jul. 10, 2020.
This disclosure relates to Near Field Communication (“NFC”). More particularly, the disclosure relates to a method and apparatus for determining the distance between two NFC devices, storing the information in encrypted format on the device, and relaying this information securely to a central database.
Near Field Communication (NFC) is a set of short-range wireless technologies that operate within the globally available and unlicensed radio frequency ISM band of 13.56 MHz. The air interface for NFC is standardized in ISO/IEC 18092/ECMA-340, “Near Field Communication Interface and Protocol-1 (NFCIP-1)” and ISO/IEC 21481/ECMA-352 “Near Field Communication Interface and Protocol-2 (NFCIP-2)”, available from www.ecma-international.org. NFC is an extension to Radio Frequency Identification (RFID), and the standards governing NFC originated in RFID.
NFC has a wide range of applications such as the following possibilities:
Mobile ticketing for public transport, movies, concerts, and sporting events.
Mobile payment where users can pay for goods using NFC-enabled devices, either NFC-enabled phones with stored data that act as a debit/credit payment card or NFC-powered contactless payment cards placed in proximity of readers.
Smart posters and objects: NFC-enabled phones can be used to read RFID tags on commercial establishments' signs for information or promotions or scan outdoor billboards.
Bluetooth pairing: in the future, pairing of Bluetooth 2.1 devices with NFC support will be as easy as bringing them close together and accepting the pairing.
Peer to peer (P2P) payment: users can make payment to each other by tapping phones together and entering the amount of money to be transferred; identity documents: governments, employers, and other organizations will use NFC to power contactless identity cards. The typical range for P2P transitions is 1 meter.
Electronic keys: NFC-enabled phones can serve as replacements for physical car keys, house/office keys, and hotel room keys.
Health and safety applications, such as water monitoring; diet, diabetes, blood pressure, and alcohol consumption monitoring.
Home healthcare visits and campus safety check-ins.
Social networking: users can exchange contacts, resumes, and location-based personal networks using NFC-enabled phones or smart business cards and P2P file exchange.
Smart mobility: consumers can obtain access to shared car and bicycle services and search for rides with carpoolers; entertainment: consumers can use NFC-enabled phones to participate in multiplayer games, create and track athletic challenges and participate in urban games.
P2P communication in gaming.
Infectious diseases can spread from person to person through respiratory droplets produced when an infected person coughs or sneezes. These droplets can land in the mouths or noses of people who are nearby or possibly be inhaled into the lungs. Spread is more likely when people are in close contact with one another. Contact tracing is a strategy to prevent a virus from spreading freely. With this strategy, one must identify and contact every individual who has been within a short distance of an infected person (typically about 2 meters or 6 feet).
Radio signals carrying the data to be transferred between NFC transceivers (a transceiver is a device such as a cell phone that can both transmit and receive) are not confined to the immediate vicinity of these transceivers. Studies have revealed that NFC communications can have a range of at least 5 meters which is sufficient to allow NFC transceivers to be used in close-contact tracing.
Seknion Inc. has developed technology related to security in wireless communications and radio frequency identification (RFID) disclosed in U.S. Pat. Nos. 7,398,078, 7,751,799, 7,456,726, 7,889,054, 7,605,684, and 8,909,141. This technology includes the use of NFC signals for the precise location of RFID tags and the use of advanced coil systems for achieving desired decay rates of NFC signals.
Cell phones with NFC capabilities, inertial motion sensors, such as three-axis accelerometers and three-axis gyroscopes, and magnetometers (magnetic compasses) are ubiquitous, thereby making them capable of recording and relaying the information that is required for widespread precision contact tracing. This disclosure describes a reliable system that takes into account both the coil orientations and the vector nature and decay rate of the NFC signals emitted by cell phones. Such a system is better than methods that rely on GPS, cell-phone positioning, and Bluetooth—which due to scattering and blockages of their high-frequency signals are prone to produce many false positives and false negatives. The NFC solution is less susceptible to scattering and blockages due to its much lower operating frequency. This solution can be designed to work in a local coordinate system that does not require tracking precise absolute locations of the NFC devices, thereby helping to guard privacy.
The distance between two NFC devices may be estimated to high accuracy by analyzing the recorded output of one device due to an NFC signal transmitted by the second device, provided that auxiliary information about the relative orientations of the two devices and about the direction vector from one device to the other is known from data supplied by other (non-NFC) sensors, such as accelerometers and gyroscopes (collectively known as internal motion sensors) and magnetometers. In fact, the auxiliary data supplied by these non-NFC sensors can under certain conditions be used to estimate the distance between the two devices directly, without the use of NFC signals, but such estimates are subject to systematic errors (“drift”) which can significantly degrade their accuracy. Exchanging NFC signals between the two devices improves the robustness and accuracy of the estimation algorithm and maintains accuracy. There are myriad ways to obtain and process the auxiliary information from other sensors. In one embodiment, inertial motion sensors are used to obtain this information. In another embodiment, magnetometer data are used. In other embodiments, various combinations of accelerometer, gyroscopic, and magnetometer data are used. In yet another embodiment, the distances between multiple devices are determined simultaneously by encoding transmitted signals so that a receiver can distinguish between multiple transmitters. In other embodiments: distance may be estimated using an upper threshold for the received field to determine whether or not two devices have been in close proximity, and distance may be estimated directly from the NFC signal when the two devices are in a special relative orientation. All of these embodiments and modes of operation are available in modern smartphones. The methods described in this disclosure operate in a local coordinate system that relies only on relative positioning information and does not require the tracking and storage of precise absolute positioning, thereby helping to guard privacy. In all of the embodiments, the two NFC devices have the option to exchange unique identifiers, such as a MAC address, allowing proximity data to be tagged to particular pairs of devices; the proximity information can be encrypted and stored on the individual devices and can be uploaded securely to a central database using standard network communications protocols. The methods described in this disclosure can be used in applications outside of contract tracing for infectious diseases such as gaming where keeping track of contacts between participants is useful.
For a more complete understanding of the present disclosure, reference is now made to the following descriptions taken in conjunction with the accompanying drawings.
The distance between two NFC devices may be estimated according to one embodiment by analyzing the recorded output of one device due to the known signal transmitted by the other. In another embodiment, accelerometer data are used. In another embodiment, gyroscopic data are used. In another embodiment, accelerometer, gyroscopic, and magnetometer data are used. In yet another embodiment, the distances between multiple devices are determined simultaneously by encoding transmitted signals so that a receiver can distinguish between multiple transmitters. Distance may further be estimated by another embodiment using an upper threshold for the received field as an estimation of whether or not two devices have been in close contact and by an embodiment using a simple formula that holds when the two devices are in a special relative orientation.
where K is a known scalar determined by the transmitter current and the known specifications of both the transmitter and receiver; r is the distance between the transmitter and receiver reference points; and {circumflex over (r)} is the unit vector pointing from the reference point of the transmitter to the reference point of the receiver.
The unit vectors {circumflex over (m)}T and {circumflex over (m)}R can be expressed in terms of spherical coordinates (r, θ, φ) as
{circumflex over (m)}T={circumflex over (x)} cos φT sin θT+ŷ sin φT sin θT+{circumflex over (z)} cos θT
and
{circumflex over (m)}R={circumflex over (x)} cos φR sin θR+ŷ sin φR sin θR+{circumflex over (z)} cos θR
where {circumflex over (x)}, ŷ, and {circumflex over (z)} are the unit vectors of the rectangular (x, y, z) coordinate system.
where
where
where IR(tn,
Optimization of the cost function (E4) can be accomplished by standard methods of nonlinear optimization known to those skilled in the art. Such methods include but are not limited to nonlinear least-squares optimization by Gauss-Newton iteration, by Marquardt-Levenberg iteration, by Kalman filtering, and by gradient and conjugate gradient descent.
A special case of (E1) occurs when either one of the magnetic moments {circumflex over (m)}T or {circumflex over (m)}R is perpendicular to the direction vector {circumflex over (r)} pointing from one device to the other (so that either {circumflex over (m)}T·{circumflex over (r)}=0 or {circumflex over (m)}R·{circumflex over (r)}=0). In this special case, the output of the receiver IR is sufficient to determine the distance from
This direct formula can be used as a check on the results of the optimization of the cost function (E4).
The methods described in this disclosure require the exchange of information between NFC devices, which can be accomplished using standard NFC communications protocols. A minimum of information can be exchanged in order to ensure that privacy is protected. Privacy is further enhanced by the limited broadcast range of NFC devices, which typically extends to at most 10 meters. The information exchanged includes: a unique identifier (UI) for each device, such as the device's MAC address and the most recent information about its orientation and position necessary to solve the optimization problem (E4). The exchange of UIs between devices allows an individual device to solve the optimization problem (E4) for each device in its vicinity separately. Once a particular device, call it D1, has solved the optimization problem for other devices in its vicinity and determined the distances from itself to the other devices, the information stored on device D1 can consist of the UI of each device that came within a prescribed distance (e.g., 2 meters or 6 feet) of D1 and a time stamp of when such close approach occurred. This information can be transmitted securely to a central database, using standard protocols for secure transmission; this same information can also be encrypted and stored securely on the device itself. All other information is securely deleted from the device's memory.
The methods described in this disclosure can be further enhanced by using the methods described in the following U.S. patents: U.S. Pat. Nos. 7,398,078, 7,751,799, 7,456,726, 7,889,054, 7,605,684, and 8,909,141. This technology includes the use of advanced coil systems for achieving desired decay rates of NFC signals and broadcasting a combination of information signals and scramble or cloaking signals designed to limit the range at which NFC signals are decodable and thereby enhance the security of communications.
Number | Name | Date | Kind |
---|---|---|---|
9344436 | Sheng | May 2016 | B1 |
9432361 | Mahaffey | Aug 2016 | B2 |
9538336 | Rudow | Jan 2017 | B2 |
9716964 | Sheng | Jul 2017 | B1 |
9824248 | Sheng | Nov 2017 | B2 |
10083319 | Wilmes | Sep 2018 | B2 |
10094663 | Kesäniemi | Oct 2018 | B2 |
10852917 | Zurek | Dec 2020 | B2 |
11159932 | Meyer | Oct 2021 | B1 |
20130002489 | Erad | Jan 2013 | A1 |
20160198300 | Rothschild | Jul 2016 | A1 |
20180052216 | Vered | Feb 2018 | A1 |
20210136600 | Le | May 2021 | A1 |
20220038883 | Meyer | Feb 2022 | A1 |