WO2018007925A1 - A method of generating an audio visual identification utilising randomly generated audio tones - Google Patents

A method of generating an audio visual identification utilising randomly generated audio tones Download PDF

Info

Publication number
WO2018007925A1
WO2018007925A1 PCT/IB2017/053996 IB2017053996W WO2018007925A1 WO 2018007925 A1 WO2018007925 A1 WO 2018007925A1 IB 2017053996 W IB2017053996 W IB 2017053996W WO 2018007925 A1 WO2018007925 A1 WO 2018007925A1
Authority
WO
WIPO (PCT)
Prior art keywords
audio
identification
data
generating
sound wave
Prior art date
Application number
PCT/IB2017/053996
Other languages
French (fr)
Inventor
Terrence Keith Ashwin
Original Assignee
Terrence Keith Ashwin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Terrence Keith Ashwin filed Critical Terrence Keith Ashwin
Publication of WO2018007925A1 publication Critical patent/WO2018007925A1/en

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3272Short range or proximity payments by means of M-devices using an audio code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R3/00Circuits for transducers, loudspeakers or microphones
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R2499/00Aspects covered by H04R or H04S not otherwise provided for in their subgroups
    • H04R2499/10General applications
    • H04R2499/11Transducers incorporated or for use in hand-held devices, e.g. mobile phones, PDA's, camera's

Definitions

  • the present invention relates to a method of generating an audio visual identification by combining a randomly generated audio tone sequence with data.
  • the aforementioned data is typically transmitted via the internet in digital format. It would however be greatly beneficial were the data able to be transmitted in either analogue or digital format across the internet or GSM cellular networks. This would greatly facilitate the identification and monitoring of people, animals, objects and transactions.
  • the invention seeks to provide method of generating an audio identification that at least partially ameliorates the abovementioned disadvantages associated with the prior art.
  • a method of generating an audio visual identification comprising the steps of: Extracting an audio sequence from a randomly generated noise generator, such as a white or pink noise generator, and saving the sequence as an audio tone;
  • the method includes coding the audio tone with a data file combination from a binary value into an audio tone, whereby the resulting sound wave configuration corresponds to data embedded within the audio tone and data file.
  • the sound wave is decoded to reveal the data embedded in the sound wave thereby enabling verification of the data.
  • the audio tone may be either audible or inaudible.
  • At least one other randomly generated audio sequence extract is attached when the data file is accessed, alternately modified. Identifying details of a device accessing, alternately modifying the data file are thereby incorporated with the accessed, alternately modified data file.
  • the method of generating the audio identification comprises the steps of incorporating into the audio tone and at least one authentication process to verify and authenticate data incorporated in the audio identification.
  • the method of generating an audio identification comprises the steps of:
  • the second audio tone is generated by using two different sound wave frequencies; allocating each frequency a binary value which value is recorded each time a sound wave passes a fixed point about the sound wave oscillation to create a sound wave signal which comprises audio identification data; coding the sound wave frequencies to create varying sound wave configurations, whereby the identification data embedded in the code is associated with and reflected as corresponding sound waves configurations;
  • the second audio tone wave frequencies each have an equal duty cycle.
  • the creation of harmonics is thereby avoided.
  • the method of generating the second audio tone comprises the steps of selecting the lower frequency range of at least 5KHz and the upper frequency range of not more than 10KHz.
  • the method of generating the second audio tone comprises the steps of decoding the sound wave at its centre point.
  • the method of generating the second audio tone comprises the steps of using a capacitor to bring the sound wave up to the sound wave centre point, whereafter the centre point is amplified to form a square wave which is digitised.
  • An analogue sound wave is thereby converted to a digital format through time intervals and not sample rates along the sound wave oscillation.
  • the method of generating the second audio tone comprises the steps of incorporating into the embedded second audio tone identification data having at least one of a unique alpha-numeric sequence, date of sound wave creation, time of sound wave creation, environmental information at time of creation.
  • the method of generating the second audio tone comprises the steps of attaching to or incorporating the second audio tone identification into a data file thereby providing identity verification of the person transmitting the file.
  • the method of generating the audio identification comprises the steps of recording, with a receiver, an audio tone comprising the random audio sequence, the data file and the second audio tone - collectively being the audio identification, whereafter a suitably enabled receiver decodes and processes the identification data contained within the sound wave configuration.
  • a phone having an audio identification can broadcast the audio tone and a second phone can record the audio tone, decode the identification data and process its identification data.
  • the method of generating the audio identification comprises the steps of incorporating into the audio tone, at least one authentication process to verify and authenticate data incorporated in the audio identification.
  • the method of generating the audio identification comprises the steps of incorporating the unique variable encryption key with criteria that are programmable and data associated therewith is allocated non-sequentially. Accordingly, an unauthorised third party interception of the data transmitted would not disclose significant details of the encrypted data.
  • a method of generating an audio identification comprising the steps of: - coding the audio identification with programmable output data in combination with an extracted sequence from a randomly generated noise generator, the extracted sequence being an audio tone, wherein
  • the output data comprises an instruction set, which when processed by a suitably enabled receiver, determines how the receiver processes the output data.
  • the receiver may be instructed to transmit the data to a remote authentication server for transmitter detail verification prior to being able to view or process data associated with the audio identification.
  • the method of generating the audio identification comprises the steps of coding the audio identification with programmable output data having an instruction set comprising at least one of:
  • a data address being a destination to where the reader needs to transfer data processed from the audio signal, for communication with said data address, whereby the data addresses identifies a specific user, device or virtual address where data can be transferred to about communication networks such as the internet or GSM cellular networks;
  • identification information pertaining to an individual or object identified, including a national identification number, passport number and social security number in the case of an individual or serial number in the case of objects;
  • a method of generating an audio visual identification comprising the steps of:
  • a binary value is allocated to the combined visual signature, audio tone and data file, alternately the combined visual signature and data file, whereafter the combined binary value enables the verification of the data file content at time of audio tone, alternately visual signature attachment.
  • the method of generating the audio visual identification comprises the steps of:
  • the method of generating the audio visual identification comprises the steps of integrating the identification data into a limited display area of the visual signature, the identification data being at least one of a pattern, image colouration, and image display sequence.
  • the method of generating the audio visual identification comprises the steps of generating the visual signature in response to an audio visual identification request prompt.
  • the method of generating the audio visual identification comprises the steps of randomly generating identification data.
  • the method of generating an audio, alternately audio visual identification comprising the steps of coding the audio identification with programmable output data and wherein the audio identification generates at least one data key directly on to an electronic device.
  • These keys can be used as a deep root of trust, generated directly on an electronic device. The desired keys can be regenerated as often as required using this method.
  • the method of generating the audio visual identification comprises the steps of integrating the visual signature with an externally supplied image. Accordingly, where an audio visual identification is transmitted to a specific recipient - the visual signature is integrated with an image associated with the recipient thereby verifying the identity of the intended transmission recipient.
  • the invention provides a method of generating a unique audio identification by combining a randomly generated audio tone sequence with a data file.
  • the method involves the steps of: - extracting an audio sequence from a randomly generated noise generator, such as a white or pink noise generator, and saving the sequence as an audio tone.;
  • the random sequence extract will be preferably be at least 32 bit in size but may be modified in accordance with identity verification sequences.
  • the data file may be comprised of text, audio, image or the combination thereof.
  • the audio tone-data file combination is coded from a binary value into an audio tone, whereby the resulting sound wave configuration corresponds to data embedded within the audio tone and data file.
  • the audio tone may be either analogue or digital and modifiable between these two formats.
  • the audio tone is audible to facilitate detection by common place AV receivers integral with cellular phones and voice recorders.
  • non- audible frequencies may be used although this would necessitate the use of suitably enables receivers to receive the audio tone.
  • the sound wave is decoded to reveal the data embedded therein and consequently enables verification of the data.
  • at least one other randomly generated audio sequence extract is attached when the data file is modified. Identifying details of a device accessing, alternately modifying the data file are thereby incorporated with the accessed, alternately modified data file.
  • the user will authorise a payment transaction from his account to a recipient, which will result in a transaction data file request being generated.
  • a randomly generated audio tone sequence will be attached to the data file and the audio tone and data file will be converted into an audio tone having a unique binary value.
  • This unique audio tone will be transmitted to the beneficiary and the banking institution and reflected against the account holder's account for redemption by the payment beneficiary.
  • the beneficiary will need to provide the audio tone to the banking institution who will decode the audio tone for redemption of the payment.
  • the banking institution would attach a second randomly generated audio sequence extract to the initial payment authorisation and transmit the modified audio tone to both the user and payment beneficiary.
  • the modified audio tone may comprise output data which creates a prompt on the device which the user is transacting.
  • the user may thereafter be required to input further authorisation data to which a further randomly generated audio sequence extract is attached.
  • the payment beneficiary may similarly be required to provide authentication of his identity before being credited with the payment amount. Accordingly a randomly generated audio sequence extract is released and attached to the data file each time the audio tone is transmitted.
  • the beneficiary can transfer rights to the authorised transaction to another third party beneficiary which transfer can be repeated on numerous occasions before being redeemed from the banking institution.
  • the authorised transaction serves as cash without the need to be processed by an intermediate user bank account - rather only at time of redeeming the payment from the banking institution. Since this process is achieved through the transfer and recording of an audio tone - the transfer transaction can be achieved by two suitably enabled devices having an AV input and output and being in proximity of one another. This can be achieved without the need to route the transaction through the internet, telephone networks or any other communication network.
  • the banking institution can identify the number of transfers and levy a transaction charge against the payment amount at each occasion a transfer occurs. Consequently, while payment serves as a cash type method, the bank institution is able to apply a transaction charge.
  • the invention may be used to verify the contents of a document and verify modifications.
  • parties seeking to execute an agreement may independently sign the agreement in counter parts, which counterpart is then reduced to digital format and a randomly generated audio sequence extract is attached to the document data file.
  • the sequence extract and data file are then coded into an audio tone and transmitted to the relevant parties.
  • a final randomly generated audio sequence extract is attached to the counterparts of the completed document, coded and converted to an audio tone.
  • the audio tone is transmitted to the relevant parties as verification of the agreement having been duly executed.
  • the chronology of document completion enables the chronological sequencing and cataloguing of the individual component documents by using suitably enabled cataloguing software applications.
  • the randomly generated audio tone sequences comprise identification elements to identify the moment of sequence generation. These elements include at least one of date, time, geographical location, altitude and environmental conditions such as temperature, air pressure and humidity.
  • the identification elements data results in a corresponding sound wave frequency and sound wave combination to be generated thereby resulting in a unique sound wave configuration. Accordingly, when forming part of the sound wave configuration, these details are combined with data to be transmitted.
  • the data may be transmitted in the form of an analogue transmission through a speaker and detected by an AV input such as a microphone.
  • the audio transmission is converted into a digital format by suitably enabling software.
  • the receiver is a digital communication device having a software application capable of recording the analogue audio transmission and converting the sound wave signal into a digital format, whereafter the information coded into the sound wave signal is decoded.
  • a second audio identification is coupled with the randomly generated audio sequence extract.
  • the second audio identification is comprised of two frequencies, namely a 10 KHz and a 5 KHz frequency.
  • the 10 KHz frequency is allocated a "1 " binary value and the 5 KHz is allocated a "0" binary value.
  • a binary code of the sound wave is generated. Accordingly the time periods that co-exist between sound waves crossing the centre point are measured. This obviates the need for recording sample rates as used for codex readings. Analogue sound waves are thereby converted to digital through time and not sample rates.
  • the frequency range of 5KHz to 10 KHz ensures adequate broadcast and receiving quality of the audio by standard AV receivers and transmitter.
  • specialised equipment can be used to detect frequencies beyond the aforementioned ranges.
  • the frequencies use equal duty cycles to avoid harmonics being created by alternating or unequal duty cycles. This differs from the recording of normal audio which does not use equal duty cycles between frequencies.
  • one or more encryption types may be incorporated into the audio identification and the authentication thereof.
  • a unique audio visual identification is created by generating a visual signature and coding said visual signature with identification data corresponding to the data file.
  • the identification data embedded in the code which when received by a suitably enabled receiver, is decoded to reveal the identification data contained within the visual signature configuration.
  • the visual signature is transmitted by the visual display sequence of light which flicker pattern sequence comprises and determines the data transmitted therewith.
  • the method of generating an audio visual identification as comprises the steps of allocating a binary value to the combined visual signature, audio tone and data file, alternately the combined visual signature and data file, whereafter the combined binary value enables the verification of the data file content at time of audio tone, alternately visual signature attachment.
  • the method of generating the audio visual identification further comprises the steps of integrating the identification data into a limited display area of the visual signature, the identification data being at least one of a pattern, image colouration, and image display sequence.
  • a deep root of trust key or keys is generated using the same method of generating an audio identification as described in this specification.
  • the keys can be generated directly on the electronic device at start-up and can be regenerated using the same method on a regular basis as and when required during the life of the electronic device. This enables totally unique keys on every device.
  • the keys can be generated in various sizes as required by the application.
  • audio visual identification is defined as either an audio identification, a visual identification or a combination of audio and visual identification.

Abstract

A method of generating an audio visual identification comprising the steps of extracting an audio sequence from a randomly generated noise generator, such as a white or pink noise generator, and saving the sequence as an audio tone; attaching the audio tone to a data file, which data file has a binary value; allocating a binary value to the combined audio tone and data file, whereafter the combined binary value enables the verification of the data file content at time of audio tone attachment. Where data file modification, alternately a different audio tone is attached to the data file – the binary value would not correspond to the binary value of the initial combined audio tone with data file. Data verification is thereby confirmed where binary values correspond.

Description

A METHOD OF GENERATING AN AUDIO VISUAL IDENTIFICATION UTILISING RANDOMLY GENERATED AUDIO TONES
The present invention relates to a method of generating an audio visual identification by combining a randomly generated audio tone sequence with data.
BACKGOUND
When transferring information and conducting digital transactions, it is of great benefit to verify the identities of the parties involved. In particular, it is desirable to ensure the person transmitting information is indeed who is being portrayed and the recipient of the information is the intended recipient.
By extension, it is similarly important that the content of the data being transmitted as genuine and verifiable. In particular, that both the sender transmitted such data and that the receiver did in fact receive the data.
The aforementioned data is typically transmitted via the internet in digital format. It would however be greatly beneficial were the data able to be transmitted in either analogue or digital format across the internet or GSM cellular networks. This would greatly facilitate the identification and monitoring of people, animals, objects and transactions.
Of particular relevance to the invention is the use of audio to verifiably identify the identity of a user and the origins of data sent by the user. Where standard non-customised audio equipment having an AV output and AV input can be used for transmission and recording of the audio identification - improved usability and ease of technology deployment is achievable Of particular relevance to the invention is the audio sequences generated by random noise generators. These sequences typically repeat every 150 million years. As will be appreciated, the sequence length will affect the frequency of sequence repetition.
Due to the amount of time required for sequence repetition - the sequences are effectively unique. By example, a 32 bit extract of a randomly generated white or pink noise sequence combined with data - will effectively provide the data with a unique noise sequence. Where the data and unique noise sequence combination are associated with an author of the combination - the identity of the author and details associated with its creation become verifiable. The description of the invention will more fully explain the verification method. Further prior art relevant to the invention pertains to data keys which are embedded in microprocessors at manufacturing or programmed into the device to encrypt data for transfer or storage. Managing the keys is a cumbersome process and when compromised the security on all the devices using the key is compromised. This disadvantage associated with prior data keys enable hackers to copy or recreate devices without much effort.
The invention seeks to provide method of generating an audio identification that at least partially ameliorates the abovementioned disadvantages associated with the prior art.
SUMMARY OF INVENTION
According to the invention there is provided a method of generating an audio visual identification comprising the steps of: Extracting an audio sequence from a randomly generated noise generator, such as a white or pink noise generator, and saving the sequence as an audio tone;
Attaching the audio tone to a data file, which data file has a binary value;
Allocating a binary value to the combined audio tone and data file, whereafter the combined binary value enables the verification of the data file content at time of audio tone attachment. Where data file modification, alternately a different audio tone is attached to the data file - the binary value would not correspond to the binary value of the initial combined audio tone with data file. Data verification is thereby confirmed where binary values correspond.
Conveniently, the method includes coding the audio tone with a data file combination from a binary value into an audio tone, whereby the resulting sound wave configuration corresponds to data embedded within the audio tone and data file.
Conveniently the sound wave is decoded to reveal the data embedded in the sound wave thereby enabling verification of the data.
Conveniently, the audio tone may be either audible or inaudible.
Conveniently at least one other randomly generated audio sequence extract is attached when the data file is accessed, alternately modified. Identifying details of a device accessing, alternately modifying the data file are thereby incorporated with the accessed, alternately modified data file.
Conveniently the method of generating the audio identification comprises the steps of incorporating into the audio tone and at least one authentication process to verify and authenticate data incorporated in the audio identification. According to another aspect of the invention, the method of generating an audio identification comprises the steps of:
- Combing the audio sequence from a randomly generated noise generator with at least a second audio tone;
- the second audio tone is generated by using two different sound wave frequencies; allocating each frequency a binary value which value is recorded each time a sound wave passes a fixed point about the sound wave oscillation to create a sound wave signal which comprises audio identification data; coding the sound wave frequencies to create varying sound wave configurations, whereby the identification data embedded in the code is associated with and reflected as corresponding sound waves configurations;
Conveniently the second audio tone wave frequencies each have an equal duty cycle. The creation of harmonics is thereby avoided.
Conveniently the method of generating the second audio tone comprises the steps of selecting the lower frequency range of at least 5KHz and the upper frequency range of not more than 10KHz.
Conveniently the method of generating the second audio tone comprises the steps of decoding the sound wave at its centre point.
Conveniently the method of generating the second audio tone comprises the steps of using a capacitor to bring the sound wave up to the sound wave centre point, whereafter the centre point is amplified to form a square wave which is digitised. An analogue sound wave is thereby converted to a digital format through time intervals and not sample rates along the sound wave oscillation.
Conveniently the method of generating the second audio tone comprises the steps of incorporating into the embedded second audio tone identification data having at least one of a unique alpha-numeric sequence, date of sound wave creation, time of sound wave creation, environmental information at time of creation. Conveniently the method of generating the second audio tone comprises the steps of attaching to or incorporating the second audio tone identification into a data file thereby providing identity verification of the person transmitting the file. Conveniently the method of generating the audio identification comprises the steps of recording, with a receiver, an audio tone comprising the random audio sequence, the data file and the second audio tone - collectively being the audio identification, whereafter a suitably enabled receiver decodes and processes the identification data contained within the sound wave configuration. By example, a phone having an audio identification can broadcast the audio tone and a second phone can record the audio tone, decode the identification data and process its identification data.
Conveniently the method of generating the audio identification comprises the steps of incorporating into the audio tone, at least one authentication process to verify and authenticate data incorporated in the audio identification.
Conveniently the method of generating the audio identification comprises the steps of incorporating the unique variable encryption key with criteria that are programmable and data associated therewith is allocated non-sequentially. Accordingly, an unauthorised third party interception of the data transmitted would not disclose significant details of the encrypted data.
According to another aspect of the invention there is provided a method of generating an audio identification comprising the steps of: - coding the audio identification with programmable output data in combination with an extracted sequence from a randomly generated noise generator, the extracted sequence being an audio tone, wherein
- the output data comprises an instruction set, which when processed by a suitably enabled receiver, determines how the receiver processes the output data. By example, the receiver may be instructed to transmit the data to a remote authentication server for transmitter detail verification prior to being able to view or process data associated with the audio identification.
Conveniently the method of generating the audio identification comprises the steps of coding the audio identification with programmable output data having an instruction set comprising at least one of:
- a data address, being a destination to where the reader needs to transfer data processed from the audio signal, for communication with said data address, whereby the data addresses identifies a specific user, device or virtual address where data can be transferred to about communication networks such as the internet or GSM cellular networks;
- GPS co-ordinates related to a specific location;
- identification information pertaining to an individual or object identified, including a national identification number, passport number and social security number in the case of an individual or serial number in the case of objects;
- notification information to be transmitted;
- a unique variable encryption key;
- output data variables that will be processed by the receiver enabling the receiver to perform various functions; output data variables that relate to security and privacy settings pertaining of the data stored contained in the audio visual identification. According to a further aspect of the invention there is provided a method of generating an audio visual identification comprising the steps of:
- Extracting an audio sequence from a randomly generated noise generator and saving the sequence as an audio tone;
- Attaching the audio tone to a data file, which data file has a binary value;
- Allocating a binary value to the combined audio tone and data file; and
- Generating a visual signature and coding said visual signature with identification data corresponding to the audio tone and data file. The identification data embedded in the code, which when received by a suitably enabled receiver, is decoded to reveal the identification data contained within the visual signature configuration.
- Conveniently a binary value is allocated to the combined visual signature, audio tone and data file, alternately the combined visual signature and data file, whereafter the combined binary value enables the verification of the data file content at time of audio tone, alternately visual signature attachment.
Conveniently the method of generating the audio visual identification comprises the steps of:
- Generating the audio tone from at least two different sound wave frequencies;
- Allocating each frequency a binary value which value is recorded each time a sound wave passes a fixed point about the sound wave oscillation to create a sound wave signal which comprises the audio identification data;
- Coding the sound wave frequencies to create varying sound wave configurations, whereby the identification data embedded in the code is associated with and reflected as corresponding sound waves configurations. Conveniently the method of generating the audio visual identification comprises the steps of integrating the identification data into a limited display area of the visual signature, the identification data being at least one of a pattern, image colouration, and image display sequence.
Conveniently the method of generating the audio visual identification comprises the steps of generating the visual signature in response to an audio visual identification request prompt.
Conveniently the method of generating the audio visual identification comprises the steps of randomly generating identification data.
Conveniently the method of generating an audio, alternately audio visual identification comprising the steps of coding the audio identification with programmable output data and wherein the audio identification generates at least one data key directly on to an electronic device. These keys can be used as a deep root of trust, generated directly on an electronic device. The desired keys can be regenerated as often as required using this method.
Conveniently the method of generating the audio visual identification comprises the steps of integrating the visual signature with an externally supplied image. Accordingly, where an audio visual identification is transmitted to a specific recipient - the visual signature is integrated with an image associated with the recipient thereby verifying the identity of the intended transmission recipient.
Further features, variants and/or advantages of the invention will emerge from the following non-limiting description of an example of the invention.
DETAILED DESCRIPTION OF THE INVENTION The invention provides a method of generating a unique audio identification by combining a randomly generated audio tone sequence with a data file. The method involves the steps of: - extracting an audio sequence from a randomly generated noise generator, such as a white or pink noise generator, and saving the sequence as an audio tone.;
- attaching the audio tone to a data file, which data file has a binary value;
- Allocating a binary value to the combined audio tone and data file, whereafter the combined binary value enables the verification of the exact data file content at time of audio tone attachment. Where data file modification, alternately a different audio tone is attached to the data file - the binary value would not correspond to the binary value of the initial combined audio tone with data file. Accordingly, the integrity and authenticity of the data file can readily be established. The random sequence extract will be preferably be at least 32 bit in size but may be modified in accordance with identity verification sequences. The data file may be comprised of text, audio, image or the combination thereof.
Thereafter the audio tone-data file combination is coded from a binary value into an audio tone, whereby the resulting sound wave configuration corresponds to data embedded within the audio tone and data file. The audio tone may be either analogue or digital and modifiable between these two formats.
In a preferred embodiment of the invention, the audio tone is audible to facilitate detection by common place AV receivers integral with cellular phones and voice recorders. In other embodiments of the invention, non- audible frequencies may be used although this would necessitate the use of suitably enables receivers to receive the audio tone. Upon a receiver receiving the audio tone of the invention - the sound wave is decoded to reveal the data embedded therein and consequently enables verification of the data. In a preferred embodiment of the invention at least one other randomly generated audio sequence extract is attached when the data file is modified. Identifying details of a device accessing, alternately modifying the data file are thereby incorporated with the accessed, alternately modified data file.
By example, when used in a banking transaction the following steps will occur:
The user will authorise a payment transaction from his account to a recipient, which will result in a transaction data file request being generated. A randomly generated audio tone sequence will be attached to the data file and the audio tone and data file will be converted into an audio tone having a unique binary value. This unique audio tone will be transmitted to the beneficiary and the banking institution and reflected against the account holder's account for redemption by the payment beneficiary. The beneficiary will need to provide the audio tone to the banking institution who will decode the audio tone for redemption of the payment.
To improve the beneficiary verification security levels - multiple layers of authentication processes can be incorporated. For purposes of illustration, the banking institution would attach a second randomly generated audio sequence extract to the initial payment authorisation and transmit the modified audio tone to both the user and payment beneficiary. The modified audio tone may comprise output data which creates a prompt on the device which the user is transacting. The user may thereafter be required to input further authorisation data to which a further randomly generated audio sequence extract is attached. The payment beneficiary may similarly be required to provide authentication of his identity before being credited with the payment amount. Accordingly a randomly generated audio sequence extract is released and attached to the data file each time the audio tone is transmitted. In another application of the invention, the beneficiary can transfer rights to the authorised transaction to another third party beneficiary which transfer can be repeated on numerous occasions before being redeemed from the banking institution. Accordingly the authorised transaction serves as cash without the need to be processed by an intermediate user bank account - rather only at time of redeeming the payment from the banking institution. Since this process is achieved through the transfer and recording of an audio tone - the transfer transaction can be achieved by two suitably enabled devices having an AV input and output and being in proximity of one another. This can be achieved without the need to route the transaction through the internet, telephone networks or any other communication network.
Each time the payment authorisation is transferred, an additional randomly generated audio sequence extract is attached to the authorisation. Accordingly, the banking institution can identify the number of transfers and levy a transaction charge against the payment amount at each occasion a transfer occurs. Consequently, while payment serves as a cash type method, the bank institution is able to apply a transaction charge. According to a further embodiment of the invention, the invention may be used to verify the contents of a document and verify modifications. By example, parties seeking to execute an agreement may independently sign the agreement in counter parts, which counterpart is then reduced to digital format and a randomly generated audio sequence extract is attached to the document data file. The sequence extract and data file are then coded into an audio tone and transmitted to the relevant parties. Similarly, once all the parties have executed the agreement - a final randomly generated audio sequence extract is attached to the counterparts of the completed document, coded and converted to an audio tone. The audio tone is transmitted to the relevant parties as verification of the agreement having been duly executed.
Where multiple documents are compiled into a single document file, the chronology of document completion enables the chronological sequencing and cataloguing of the individual component documents by using suitably enabled cataloguing software applications.
The randomly generated audio tone sequences comprise identification elements to identify the moment of sequence generation. These elements include at least one of date, time, geographical location, altitude and environmental conditions such as temperature, air pressure and humidity. The identification elements data results in a corresponding sound wave frequency and sound wave combination to be generated thereby resulting in a unique sound wave configuration. Accordingly, when forming part of the sound wave configuration, these details are combined with data to be transmitted. The data may be transmitted in the form of an analogue transmission through a speaker and detected by an AV input such as a microphone. To process the analogue audio file, the audio transmission is converted into a digital format by suitably enabling software. In one embodiment of the invention, the receiver is a digital communication device having a software application capable of recording the analogue audio transmission and converting the sound wave signal into a digital format, whereafter the information coded into the sound wave signal is decoded.
In a still further aspect of the invention, a second audio identification is coupled with the randomly generated audio sequence extract. The second audio identification is comprised of two frequencies, namely a 10 KHz and a 5 KHz frequency. The 10 KHz frequency is allocated a "1 " binary value and the 5 KHz is allocated a "0" binary value. Each time the sound wave passes through its centre point, a "1 " or "0" is allocated to the signal code. In doing, a binary code of the sound wave is generated. Accordingly the time periods that co-exist between sound waves crossing the centre point are measured. This obviates the need for recording sample rates as used for codex readings. Analogue sound waves are thereby converted to digital through time and not sample rates. The frequency range of 5KHz to 10 KHz ensures adequate broadcast and receiving quality of the audio by standard AV receivers and transmitter. As will be appreciated, specialised equipment can be used to detect frequencies beyond the aforementioned ranges. The frequencies use equal duty cycles to avoid harmonics being created by alternating or unequal duty cycles. This differs from the recording of normal audio which does not use equal duty cycles between frequencies.
Where data security is required, one or more encryption types may be incorporated into the audio identification and the authentication thereof.
According to a further embodiment of the invention a unique audio visual identification is created by generating a visual signature and coding said visual signature with identification data corresponding to the data file. The identification data embedded in the code, which when received by a suitably enabled receiver, is decoded to reveal the identification data contained within the visual signature configuration. In a preferred embodiment, the visual signature is transmitted by the visual display sequence of light which flicker pattern sequence comprises and determines the data transmitted therewith.
The method of generating an audio visual identification as comprises the steps of allocating a binary value to the combined visual signature, audio tone and data file, alternately the combined visual signature and data file, whereafter the combined binary value enables the verification of the data file content at time of audio tone, alternately visual signature attachment. The method of generating the audio visual identification further comprises the steps of integrating the identification data into a limited display area of the visual signature, the identification data being at least one of a pattern, image colouration, and image display sequence.
In accordance with a further embodiment of the invention pertaining to data keys - a deep root of trust key or keys is generated using the same method of generating an audio identification as described in this specification. The keys can be generated directly on the electronic device at start-up and can be regenerated using the same method on a regular basis as and when required during the life of the electronic device. This enables totally unique keys on every device. The keys can be generated in various sizes as required by the application.
The invention is not limited to the precise details described above. Modifications may be made and other embodiments developed without departing from the spirit of the invention.
In the invention, the term audio visual identification is defined as either an audio identification, a visual identification or a combination of audio and visual identification.
The summary of invention and claims form an integral aspect of the description of the invention.

Claims

CLAIMS:
1 . A method of generating an audio visual identification comprising the steps of:
- Extracting an audio sequence from a randomly generated noise generator, such as a white or pink noise generator, and saving the sequence as an audio tone;
- Attaching the audio tone to a data file, which data file has a binary value;
Allocating a binary value to the combined audio tone and data file, whereafter the combined binary value enables the verification of the data file content at time of audio tone attachment.
2. The method of generating an audio visual identification as claimed in claim 1 includes coding the audio tone with a data file combination from a binary value into an audio tone, whereby the resulting sound wave configuration corresponds to data embedded within the audio tone and data file.
3. The method of generating an audio visual identification as claimed in claim 1 or 2 wherein the sound wave is decoded to reveal the data embedded in the sound wave thereby enabling verification of the data.
4. The method of generating an audio visual identification as claimed in any one of claims 1 to 3, wherein the audio tone may be either audible or inaudible.
5. The method of generating an audio visual identification as claimed in any one of claims 1 to 4, wherein at least one other randomly generated audio sequence extract is attached when the data file is accessed, alternately modified.
6. The method of generating an audio visual identification as claimed in any one of claims 1 to 5 comprises the steps of incorporating into the audio tone and at least one authentication process to verify and authenticate data incorporated in the audio identification.
7. A method of generating an audio identification comprises the steps of:
- Combing the audio sequence from a randomly generated noise generator with at least a second audio tone;
- the second audio tone is generated by using two different sound wave frequencies; allocating each frequency a binary value which value is recorded each time a sound wave passes a fixed point about the sound wave oscillation to create a sound wave signal which comprises audio identification data; coding the sound wave frequencies to create varying sound wave configurations, whereby the identification data embedded in the code is associated with and reflected as corresponding sound waves configurations.
8. The method of generating an audio identification as claimed in claim 7, wherein the second audio tone wave frequencies each have an equal duty cycle.
9. The method of generating an audio identification as claimed in claim 8, wherein the second audio tone comprises the steps of selecting the lower frequency range of at least 5KHz and the upper frequency range of not more than 10KHz.
10. The method of generating an audio identification as claimed in any one of claims 7 to 9, wherein the sound waves are decoded at their respective centre points.
1 1 . The method of generating an audio identification as claimed in claim 10, wherein a capacitor is utilised to bring the sound wave up to the sound wave centre point, whereafter the centre point is amplified to form a square wave which is digitised.
12. The method of generating an audio identification as claimed in any one of claims 7 to 1 1 comprises the steps of incorporating into the embedded second audio tone identification data having at least one of a unique alpha-numeric sequence, date of sound wave creation, time of sound wave creation, environmental information at time of creation.
13. The method of generating an audio identification as claimed in any one of claims 7 to 12 comprises the steps of attaching to or incorporating the second audio tone identification into a data file.
14. The method of generating an audio identification as claimed in any one of claims 7 to 13 comprises the steps of recording, with a receiver, an audio tone comprising the random audio sequence, the data file and the second audio tone - collectively being the audio identification, whereafter a suitably enabled receiver decodes and processes the identification data contained within the sound wave configuration.
15. The method of generating an audio identification as claimed in any one of claims 7 to 14 comprises the steps of incorporating into the audio tone, at least one authentication process to verify and authenticate data incorporated in the audio identification.
16. The method of generating an audio identification as claimed in any one of claims 7 to 15 comprises the steps of incorporating the unique variable encryption key with criteria that are programmable and data associated therewith is allocated non-sequentially.
17. The method of generating an audio identification as claimed in any one of claims 7 to 16 comprising the steps of:
- coding the audio identification with programmable output data in combination with an extracted sequence from a randomly generated noise generator, the extracted sequence being an audio tone, wherein - the output data comprises an instruction set, which when processed by a suitably enabled receiver, determines how the receiver processes the output data.
18. The method of generating an audio identification as claimed in any one of claims 7 to 17 comprises the steps of coding the audio identification with programmable output data having an instruction set comprising at least one of:
- a data address, being a destination to where the reader needs to transfer data processed from the sound wave, for communication with said data address, whereby the data addresses identifies a specific user, device or virtual address where data can be transferred to about communication networks such as the internet or GSM cellular networks;
- GPS co-ordinates related to a specific location;
- identification information pertaining to an individual or object identified, including a national identification number, passport number and social security number in the case of an individual or serial number in the case of objects;
- notification information to be transmitted;
- a unique variable encryption key;
- output data variables that will be processed by the receiver enabling the receiver to perform various functions;
output data variables that relate to security and privacy settings pertaining of the data stored contained in the audio visual identification.
19. The method of generating an audio identification as claimed in any one of claims 7 to 18 comprising the steps of coding the audio identification with programmable output data and wherein the audio identification generates at least one data key directly on to an electronic device.
20. A method of generating an audio visual identification comprising the steps of: - Extracting an audio sequence from a randomly generated noise generator and saving the sequence as an audio tone;
- Attaching the audio tone to a data file, which data file has a binary value;
- Allocating a binary value to the combined audio tone and data file; and
- Generating a visual signature and coding said visual signature with identification data corresponding to the audio tone and data file. The identification data embedded in the code, which when received by a suitably enabled receiver, is decoded to reveal the identification data contained within the visual signature configuration.
21 . The method of generating an audio visual identification as claimed in claim 20 comprising the steps of allocating a binary value to the combined visual signature, audio tone and data file, alternately the combined visual signature and data file, whereafter the combined binary value enables the verification of the data file content at time of audio tone, alternately visual signature attachment.
22. The method of generating an audio visual identification as claimed in claim 20 or 21 comprises the steps of:
- Generating the audio tone from at least two different sound wave frequencies;
- Allocating each frequency a binary value which value is recorded each time a sound wave passes a fixed point about the sound wave oscillation to create a sound wave signal which comprises the audio identification data;
- Coding the sound wave frequencies to create varying sound wave configurations, whereby the identification data embedded in the code is associated with and reflected as corresponding sound waves configurations.
23. The method of generating an audio visual identification as claimed in any one of claims 20 to 22 comprises the steps of integrating the identification data into a limited display area of the visual signature, the identification data being at least one of a pattern, image colouration, and image display sequence.
24. The method of generating an audio visual identification as claimed in any one of claims 20 to 23 comprises the steps of generating the visual signature in response to an audio visual identification request prompt.
25. The method of generating an audio visual identification as claimed in any one of claims 20 to 24 comprises the steps of randomly generating identification data.
26. The method of generating an audio visual identification as claimed in any one of claims 20 to 25 comprises the steps of integrating the visual signature with an externally supplied image.
27. The method of generating an audio visual identification as claimed in any one of claims 20 to 26 comprising the steps of coding the audio visual identification with programmable output data and wherein the audio visual identification generates at least one data key directly on to an electronic device
PCT/IB2017/053996 2016-07-05 2017-07-02 A method of generating an audio visual identification utilising randomly generated audio tones WO2018007925A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2016/00057A ZA201600057B (en) 2016-07-05 2016-07-05 A method of generating an audio visual identification utilising randomly generated audio tones
ZA2016/00057 2016-07-05

Publications (1)

Publication Number Publication Date
WO2018007925A1 true WO2018007925A1 (en) 2018-01-11

Family

ID=60912406

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2017/053996 WO2018007925A1 (en) 2016-07-05 2017-07-02 A method of generating an audio visual identification utilising randomly generated audio tones

Country Status (2)

Country Link
WO (1) WO2018007925A1 (en)
ZA (1) ZA201600057B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5748763A (en) * 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
CN103985389A (en) * 2014-05-30 2014-08-13 武汉大学 Steganalysis method for AMR audio files

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5748763A (en) * 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
CN103985389A (en) * 2014-05-30 2014-08-13 武汉大学 Steganalysis method for AMR audio files

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
CLAYCOMB W. R. ET AL.: "Secure device pairing using audio", IN: 43RD ANNUAL 2009 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY , 2009. PROCEEDINGS, 5 October 2009 (2009-10-05), pages 77 - 84, XP003156821, ISBN: 978-1-4244-4169-3 *
GHOUTI L. ET AL.: "A Robust Perceptual Audio Hashing using Balanced Multiwavelets", 2006 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, 2006 . TOULOUSE, FRANCE . ICASSP 2006 PROCEEDINGS, 14 May 2006 (2006-05-14), pages 209 - 212, XP031016001 *
GROUTI L. ET AL.: "A Fingerprinting System for Musical Content", IN: 2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME 2006 , TORONTO, ONTARIO, CANADA . ICME 2006 PROCEEDINGS, 9 July 2006 (2006-07-09), pages 1989 - 1992, XP032965161 *
LIAN S. ET AL.: "Traceable content protection based on chaos and neural networks", APPLIED SOFT COMPUTING, 30 May 2010 (2010-05-30), pages 4293 - 4301, XP028256852 *
PUNETHA M. ET AL.: "Safe Transmission of Text Files through a New Audio Steganography Technique", IN: 2ND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE. 2014. PROCEEDINGS, 7 December 2014 (2014-12-07), pages 58 - 62, XP032783334 *

Also Published As

Publication number Publication date
ZA201600057B (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US20200177377A1 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
US20180160255A1 (en) Nfc tag-based web service system and method using anti-simulation function
CN108028001B (en) System and method for audio signal mediated interaction
JP2020038659A (en) Electronic ticket admission verification anti-counterfeiting system and method thereof
CN105868970B (en) authentication method and electronic equipment
CN104392353A (en) Payment method and system of voice recognition terminal
CN107231331A (en) Obtain, issue the implementation method and device of electronic certificate
KR20130131327A (en) Data communication system
CN106709280A (en) Method, client and server for processing information
CN107181714A (en) Verification method and device, the generation method of service code and device based on service code
JP6594349B2 (en) Method and apparatus for identifying or authenticating humans and / or objects with dynamic acoustic security information
JP2010536055A5 (en)
EP2943944A1 (en) Audio-based electronic transaction authorization system and method
WO2020170685A1 (en) Information processing device, information processing method, and program
WO2019010669A1 (en) Method, apparatus and system for identity validity verification
JP2015162694A (en) Article authentication system, authentication server and article authentication method
CN107483190B (en) Electronic qualification certificate generation method, verification method, generation device and verification device
JP5386294B2 (en) Electronic stamping system using mobile phone
EP2922010A2 (en) Digital voucher authentication
CN111147248A (en) Encrypted transmission method, device and system of face feature library and storage medium
CN104518880B (en) A kind of big data Trusting eBusiness method and system based on random sampling detection
WO2018007925A1 (en) A method of generating an audio visual identification utilising randomly generated audio tones
CN108875437A (en) A kind of ID card information querying method and system
JP2013157777A (en) Information processing system and information processing method
Alchekov et al. Inaudible Attack on AI Speakers

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17823731

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17823731

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17823731

Country of ref document: EP

Kind code of ref document: A1