US20220058249A1 - Authenticating and authorizing users regarding physical goods - Google Patents

Authenticating and authorizing users regarding physical goods Download PDF

Info

Publication number
US20220058249A1
US20220058249A1 US17/390,459 US202117390459A US2022058249A1 US 20220058249 A1 US20220058249 A1 US 20220058249A1 US 202117390459 A US202117390459 A US 202117390459A US 2022058249 A1 US2022058249 A1 US 2022058249A1
Authority
US
United States
Prior art keywords
user
passcode
voice
communication device
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/390,459
Inventor
Paul Atkinson
Jack Donner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chromera Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US17/390,459 priority Critical patent/US20220058249A1/en
Publication of US20220058249A1 publication Critical patent/US20220058249A1/en
Assigned to CHROMERA, INC. reassignment CHROMERA, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ATKINSON, PAUL, DONNER, JOHN
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/016Input arrangements with force or tactile feedback as computer generated output to the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/16Sound input; Sound output
    • G06F3/167Audio in a user interface, e.g. using voice commands for navigating, audio feedback
    • G06K9/00926
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/50Maintenance of biometric data or enrolment thereof
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Definitions

  • the field of the present invention is portable electronic devices having a processor for determining what user is proximate the device, and authenticating or authorizing that user.
  • IoT Internet of Things
  • smart devices desirable outcomes often depend on the participation of a specific user (or one or more specific users, or a group of specific users) in the presence of, or proximate to, a specific “thing”.
  • things or “goods” that are transportable or mobile, or otherwise have multiple custodians or users.
  • a portable intelligent device has an audio input for receiving a voice input from a user and an event manager for detecting that an event has occurred.
  • the intelligent device also stores a passcode and a voice-code indicative of the passcode that is unique to a particular user.
  • the intelligent device presents the passcode to a user, for example, from a display on the device, or from smart phone or tablet wirelessly connected to the intelligent device.
  • the user speaks the passcode into an input transducer (microphone) on the intelligent device, and a processor generates a voiceprint that reflects the spoken passcode.
  • the processor then can use the stored voice-code and the generated voiceprint to determine if a specific user was speaking, and if the user spoke the correct passcode. In this way the intelligent device is able to authenticate or authorize a remote user simply by having the user anonymously speak a passcode into the intelligent device.
  • the intelligent device is integrated into a prescription pill bottle.
  • the bottle has been filled by the pharmacist for a specific patient, and the pharmacist loaded the passcode, the patient's voice-code and the patient's prescription into the intelligent device before mailing the pill bottle to the patient.
  • the patient speaks the passcode into the integrated microphone of the intelligent device.
  • the processor in the intelligent device then authenticates the patient by evaluating the spoken passcode with the stored voice-code. If the evaluation is successful, the pill bottle stores a record of the results and resets the display. If the evaluation isn't successful, the pill bottle may present a visible alert and wirelessly transmit an alarm message.
  • the intelligent device may communicate back to the pharmacist that the intended patient has received the medication. Or if wrong user speaks the passcode, then the pill bottle may generate an alert or alarm and transmit a message to the pharmacist.
  • the intelligent device is able to confidently determine if a specific user was in the presence of a good, such as a pill bottle, and they were taking a correct action (e.g. opening or closing the pill bottle). Further, since the events are time-stamped, a complete history of how the user interacted with the good may be constructed.
  • a good such as a pill bottle
  • a correct action e.g. opening or closing the pill bottle
  • FIG. 1 is a block diagram representing a simple authentication and authorization ecosystem
  • FIG. 2 is a block diagram showing generation of a native voice-code.
  • FIG. 3 is a block diagram showing generation of a synthetic voice-code.
  • FIG. 4A is a block diagram representing an exemplary application comprising an intelligent pill bottle and local evaluation of a voiceprint and a voice-code.
  • FIG. 4B is a process block diagram representing an exemplary application comprising an intelligent pill bottle and local evaluation of a voiceprint and a voice-code.
  • FIG. 5A is a block diagram representing an exemplary application comprising an intelligent pill bottle, a user communication device and local evaluation.
  • FIG. 5B is a process block diagram representing an exemplary application comprising an intelligent pill bottle, a user communication device and local evaluation.
  • FIG. 6A is a block diagram representing an exemplary application comprising an intelligent pill bottle, user communication device and remote evaluation.
  • FIG. 6B is a process block diagram representing an exemplary application comprising an intelligent pill bottle, user communication device and remote evaluation.
  • FIG. 7 is a block diagram of an exemplary application comprising an intelligent pill bottle, ePRO user communication device and local evaluation.
  • FIG. 8 is a block diagram of an exemplary application comprising an intelligent pharmaceutical container system and remote evaluation.
  • things are physical items or “goods” (the term used here forward) that are the focus of local user actions and/or remote transactions.
  • Goods may be consumables, disposable or durable; raw materials, components, sub-assemblies or finished goods; single/multi-use; perishable or non-perishable; tools, items of equipment, appliances, machines, dispensers (e.g. liquids, foods, tickets, products), vending machines, conditional use/access systems, (e.g. parking meters, rental scooters or bicycles) locks and locking (and unlocking) systems; vehicles (e.g., autonomous delivery vehicles or drones) etc.
  • Intelligent devices are attached or coupled to, embedded within, or otherwise bound to goods.
  • exemplary intelligent devices include smart labels, tags, containers, packaging, stored value and security cards, containers etc.
  • intelligent “hardware agents” and related systems as described in U.S. patent applications Ser. No. 15/228,270 Transaction Agents and Systems and Ser. No. 15/602,885 Agents and Systems for Rights Management. Unless stated otherwise, the term intelligent device shall be understood to encompass hardware agents.
  • Intelligent devices generally comprise: a processor, a memory, a clock/timer, communication circuitry (typically wireless), a source of power (e.g. a battery or capacitor, or RF, optical, thermal or mechanical harvested energy), a user message medium (e.g. visual, acoustic or haptic) and an audio input transducer (e.g. a microphone) for capturing a user's voice.
  • a source of power e.g. a battery or capacitor, or RF, optical, thermal or mechanical harvested energy
  • a user message medium e.g. visual, acoustic or haptic
  • an audio input transducer e.g. a microphone
  • They may also include one or more sensors (e.g. temperature sensor, a shock sensor, a vibration sensor, a motion sensor, a pressure sensor, a strain sensor, a chemical sensor, a radiation sensor, a humidity sensor, an acoustic sensor, or a light sensor) or actuators.
  • Intelligent devices comprise an event manager: functions or operations performed by the processor and circuitry coupled to clocks/timers, sensors, circuitry (e.g. location circuitry and communication circuitry), actuators etc. that collectively monitor and take actions in response to events during the lifecycle of the intelligent device/good.
  • Exemplary events include local communications and interactions (e.g. mechanical, electrical, optical communications with users), actuation, elapsed time, changes in sensed or monitored environmental or internal conditions including mechanical action, detected sound or light, or heat, changes in location, tampering, malfunction, and loss of power.
  • Intelligent devices operate autonomously according to stored or embedded instructions (rules) that govern the device's operation. And further in the case of hardware agents, enforce individual sets of instructions for each of a plurality of stakeholders in the good or its outcomes, according to the respective rights of the stakeholders.
  • Intelligent devices may also include message verification circuitry such as that disclosed in U.S. Pat. No. 10,152,905 Symbol Verification for an Intelligent Label Device, U.S. Pat. No. 10,078,977 Optically Determining Messages on a Display, U.S. Pat. No. 10,147,098 Symbol Verification for an intelligent Label Device and U.S. Pat. No. 10,168,298 Electrically Determining Messages on an Electrophoretic Display, and U.S. patent applications No. 15/668,482 Verifying Messages Projected From an Intelligent Audible Device and U.S. provisional patent application 62/890,479 Autonomous Multi-medium IoT Devices and Systems.
  • Message verification circuitry can be used to increase confidence that passcodes and other information presented by user message mediums (e.g. those responsive to evaluations as described below) are as intended, and if not, what messages were actually presented. Similarly, and cooperatively, verification circuitry can increase confidence in wireless communications (e.g. the broadcast of alerts and alarms responsive to evaluations).
  • a user may use a user communication device cooperatively with an intelligent device.
  • a user communication device is typically configured to capture a user's voice (voice-data) and (1) accept input from a user (e.g. via a keyboard, keypad, touchscreen, microphone or camera), (2) wirelessly communicate with appropriately configured local intelligent devices (e.g. via RFID, Bluetooth/BLE, Wi-Fi, IR) and/or (3) communicate with remote entities via the internet/wide area networks.
  • Exemplary user communication devices are mobile phones, tablets, notebooks as well as internet connectable appliances. In certain applications a stationary, always connected/connectable variant of the user communication device may be advantageous.
  • User communication devices generally do not need to be associated with a specific individual.
  • the configuration of the intelligent device may vary depending on the role, if any, of a user communication device in a particular implementation. For example, an intelligent device may not need a microphone or a user message medium if they are provided by a user communication device.
  • FIG. 1 The following is an example ( FIG. 1 ) of a simplified user authentication and authorization system 100 and method where:
  • a passcode is any code that may be visibly or audibly (or haptically) presented to a user by a user message medium (e.g. display or indicator, speaker (e.g., audio output transducer) or vibrator or surface fluctuating device) of an intelligent device, or a user communication device (e.g., a mobile phone or tablet) communicatively coupled to the intelligent device and configured to acquire the passcode and present it to the user via its own message mediums.
  • a user message medium e.g. display or indicator, speaker (e.g., audio output transducer) or vibrator or surface fluctuating device
  • a user communication device e.g., a mobile phone or tablet
  • Passcodes may be fixed or variable, static or dynamic, public or private, single or multi-use, encrypted or unencrypted. Passcodes may be used in different combinations or series or randomly rotated. Passcodes may be pre-printed (e.g. bar code or text string) on the intelligent device, packaging or good. One passcode may have multiple corresponding voice-codes (e.g. to authenticate/authorize a group). A single voice-code may have multiple passcodes. A visually presented passcode may be persistent, temporary (stable, volatile); switchable, self-switching, non-switchable, or a combination thereof.
  • Passcodes may be symbolic and associated with a plain text “key word” that can be spoken (e.g., an image of a “cat”, a shape “square” or color “blue”). Passcodes may also comprise a series of symbols or alphanumeric characters presented concurrently or sequentially, and by different combinations of message mediums (e.g. audible or visual). An intelligent device may instruct a user as to what combination of symbols or their attributes (shape, color, quantity, etc.) they should vocalize, and what order.
  • Passcodes are typically generated and managed by a certificate authority. In some implementations stakeholders and users may however generate their own passcodes. Passcodes are then loaded/stored (provisioned) into intelligent devices, typically by a 3rd party that binds the intelligent device, and the passcode(s) and corresponding voice-code(s), to the good (e.g., a manufacturer, product packager, distributor, seller, transporter).
  • a certificate authority In some implementations stakeholders and users may however generate their own passcodes. Passcodes are then loaded/stored (provisioned) into intelligent devices, typically by a 3rd party that binds the intelligent device, and the passcode(s) and corresponding voice-code(s), to the good (e.g., a manufacturer, product packager, distributor, seller, transporter).
  • certificate authority shall refer to the entity that creates and manages the passcodes (and voice-codes, user voice-profiles etc.).
  • entity that generates the passcodes also typically manages the lifecycle of the passcodes (expiration, renewal, use count etc.) and either independently or in cooperation with other parties, tracks user actions and transactions based on the passcodes (authorization, denial of service or access etc.)
  • a stakeholder is any entity that has a stake in any outcome of a good or related systems, actions or transactions.
  • a stakeholder may perform some or all of the functions of a certificate authority.
  • exemplary stakeholders include healthcare professionals, professional offices/groups, clinics and hospitals (and larger organizations comprising them), pharmacies, pharmaceutical manufacturers and distributors, insurance providers, employers, regulatory agencies and patients and their families, caregivers etc. Stakeholders may or may not be custodial and may or not be directly involved in local actions or remote transactions involving or related to the good, intelligent device or other stakeholders.
  • a voice-code is an analog or digital signature of a passcode vocalized (spoken) by a specific user, or, machine generated using a user's voice-profile.
  • FIG. 2 illustrates a voice-code generated from a user-vocalized passcode referred to herein as a native voice-code.
  • FIG. 3 illustrates a voice-code generated using a voice-profile, and referred to herein as a synthetic voice-code.
  • Native voice-codes and synthetic voice-codes are private and generated, stored and otherwise managed by secure parties and systems (e.g. certificate authorities).
  • a voice-profile is a model of a user's vocal characteristics determined from user voice-data that can be used to generate user-specific voice-codes without the concurrent participation of the user.
  • a user's voice-profile can also be used to obtain the passcode underlying a user's voiceprint (described below).
  • a voiceprint is an analog or digital signature (analogous to a fingerprint) of a user-vocalized passcode, where the passcode is presented to the user in-situ by an intelligent device or a user communication device (described below).
  • a voiceprint may be evaluated in a variety of ways to authenticate or authorize a specific user and take actions accordingly.
  • One exemplary method of evaluating a voiceprint is pattern matching (e.g. comparing and evaluating a previously generated voice-code with the locally generated voiceprint). This approach implicitly takes into account differences in languages and regional dialects as well as differences in speech patterns and the vocal characteristics of the users.
  • the evaluation rules and systems may further employ systems and methods for determining and evaluating the level of confidence in the results of the voiceprint evaluation.
  • Evaluation at the site of the user and good can be performed in response to a locally presented passcode, using a locally generated voiceprint and a previously generated, locally stored or remotely accessible, voice-code.
  • the intelligent device generates and stores the voiceprint, then performs the evaluation using a voice-code previously stored in its memory.
  • the voiceprint is generated and stored in a user communication device that can access a previously generated voice-code stored in the intelligent device (or from the certificate authority e.g., using an identifier from the intelligent device) and accordingly, perform the evaluation.
  • the location of the intelligent device as self-determined with integrated location circuitry (e.g. cellular, local area; location-based services, geo-fencing) can increase confidence that a user, is an intended user. For example, that the location of the intelligent device is consistent with the expected location of the user: e.g. the delivery location of a good to a specific buyer or consumer; the care facility of a prescribed medication for a specific patient (e.g. their home address), or the facility where permission to access is to be granted, or equipment is to be used.
  • integrated location circuitry e.g. cellular, local area; location-based services, geo-fencing
  • the intelligent device will dynamically generate the passcode (e.g. in response to life-cycle events). Evaluation of a related voiceprint (described below) requires having access to the passcode as well as the user's voice-profile (described below) and a way to associate them. Since the passcode may be public for only a short period, and in an adequately private environment, it may be sufficient to digitally encrypt the passcode (and voiceprint) for communication to the device or entity performing the evaluation, e.g., a user communication device or certificate authority respectively.
  • Evaluation at a location remote from the user and good can be performed by a remote evaluation system, e.g., that operated by a stakeholder or a certificate authority.
  • the user communication device sends from the user's location, a voiceprint (or voice-data) and an “identifier” (ID) to the remote evaluation system.
  • the remote evaluation system uses the identifier to retrieve a previously generated voice-code that corresponds to the received voiceprint, then evaluates the voiceprint with the voice-code.
  • the user communication device also sends the passcode corresponding to the voiceprint from the user's location, to the remote evaluation system.
  • the remote evaluation system uses the identifier to
  • the passcode could alternatively be retrieved by the remote evaluation system from a database of passcodes using the identifier. Note that multiple parties, e.g. a stakeholder and certificate authority) could collaboratively performed the functions just described.
  • the identifier is generated by a stakeholder or a certificate authority and accompanies the intelligent device or companion good to the user's location.
  • the identifier is used to determine and retrieve the previously generated voice-code to be used in the evaluation.
  • the identifier can be private or public (e.g., visibly—including printed, acoustically or wirelessly presented).
  • an association with a user's identity is not required.
  • a valuable aspect of the authentication and authorization systems and methods described herein is that the user can remain anonymous (the user isn't identified or identifiable), incognito (an alias is used—typically for single or limited use) or identifiable (the user can be identified but their identity is not necessarily public), or identified as a member of a group of authorized users.
  • evaluation circuitry located where the evaluation is performed (e.g. in the intelligent device or user communication device if the evaluation is local to the good and user). Circuitry/software for generating voiceprints (“voiceprint circuitry”) is similarly required.
  • the results of an evaluation may authorize or initiate actions by the intelligent device or depending on the implementation, an application on a user communication device.
  • Exemplary actions by the such devices in response to an authorized user voiceprint include enabling access to stored information, building a history of user specific interactions, sensing conditions, presenting messages (e.g. access codes, alerts/alarms, financial or other transactional information, enabling access to functions of, or operation of, a good etc.
  • the results of evaluations may also affect specific users' behaviors, e.g. taking actions or effectuating transactions regarding goods. For example, in response to previously described actions of an intelligent device. More expansively, the results of an evaluation that successfully authenticates specific user proximate a good, and at a particular moment in time, can be used to improve user compliance (see below) and optimize user behaviors that affect the outcomes of goods (and corresponding transactions). Knowledge of a specific user's presence with a good at a particular moment in, or period of, time can be advantageously combined with knowledge of the coincident actions taken by the intelligent device, e.g. visual, audible or wireless messaging presented the user and the corresponding actions taken (or not taken) by the specific user in response. And further, the results of an evaluation can be used to authorize a specific user—grant them permissions, without having to identify them.
  • the user's actions may be determined by an intelligent device (or user communication device). They may also be determined by correlating data received from an intelligent device and user-initiated transaction data from external system. An example of the latter being a decrement to an inventory system of a replacement good when the current one is no longer fit-for use. Another example is a caregiver reporting (or not reporting) a message presented by an intelligent container containing opioids or other dangerous drugs that was generated because the container had been opened without an authorized user being present.
  • Patience compliance in healthcare can be improved by offering incentives (or disincentives) for acting appropriately to the messaging presented by the bottle containing their drugs of when, and when not, to take them. And further, encouraging their proper storage/safety—e.g., to make sure that any access by anyone other than the authorized patient is acted upon.
  • incentives or disincentives
  • Exemplary performance/outcome-based incentives include:
  • a user using an audio enabled internet connected computing device establishes a secure communication 203 with a certificate authority.
  • the certificate authority generates passcodes 205 and sends them to the user.
  • the user vocalizes the passcodes (creating voice-data) 207 which are sent to a certificate authority.
  • the certificate authority receives the vocalized passcodes and creates and stores corresponding native voice-codes 209 .
  • a user using an audio enabled internet connected computing device establishes a secure communication with a certificate authority 308 .
  • the user In response to the certificate authority, the user generates voice-data 312 (e.g. the user vocalizes sample words and phrases prompted by the certificate authority) that is captured and used by the certificate authority to create a user voice-profile 314 .
  • the voice-profile can be later used to generate synthetic voice-codes based on then or later, the certificate authority generates passcodes 316 that it uses to generate synthetic voice-codes 318 when needed.
  • voice-codes can be created simply by recording, and advantageously refining/processing, and storing the user's vocalization of specific passcodes.
  • Various adaptive noise filtering/cancelling schemes can be used to compensate for variations in the acoustics of the user's environment and system used to create the voice-data.
  • Voice-codes and voice-profiles can be generated remotely via a secure process like the authorization of credit cards via internet or voice activation. Note that the process described above depends on an appropriate for the use, level of confidence that the person generating the voice-data is correctly identified and authorized. In other words, that person generating the voice-data is authenticated. Various processes may be used for this purpose including two-factor authentication, pre-defined voiceprints, or PINs.
  • a trusted facility of a stakeholder or a certificate authority e.g. a doctor's office, pharmacy, retail clinic, hospital, or employer's human resource office; the office of a bank or other financial institution, or government office.
  • the stakeholder or certificate authority distributes passcodes, and voice-codes according to the implementation, to the relevant elements of the ecosystem, e.g. for loading into intelligent devices or communication to appropriate user communication devices or authorized stakeholders).
  • a certificate authority may provide services on behalf of multiple stakeholders (e.g. a patient, the patient's doctor, hospital, pharmacy, insurance company and regulatory agencies), thereby simplifying administration, maintaining a higher level of trust.
  • a certificate authority may perform some or all of the processes for creating, storing, distributing and otherwise managing passcodes, voice-codes, voice-profiles, and evaluations etc. on behalf of the stakeholders.
  • a passcode may be presented to a user(s) for generating a voiceprint for limited duration, number of times or time periods, or for specific times or locations or other factors to encourage compliance and discourage misuse and tampering.
  • a passcode may only be presented consistent with a patient prescription loaded in an intelligent pill bottle/container such as that described in U.S. patent application Ser. No. 16/010,485, An Intelligent Container System.
  • the evaluation may be limited to a number of attempts or require secondary actions.
  • a single intelligent device/good may have multiple authorized users and accordingly multiple passcodes, multiple authorized voice-codes per passcode or various combinations thereof.
  • an intelligent pill bottle might support an authorized patient, a family member, and/or healthcare provider.
  • a single intelligent device/good may also have different instructions/rules conditioned on the determination of specific user or users.
  • adaptive noise cancellation or other signal processing techniques may be used to improve performance when creating voiceprints (e.g. to compensate for ambient sounds, or characteristics of the devices used, e.g. microphones/speakers).
  • acoustic watermarks and steganographic marks can be employed to increase confidence in the determination of a specific user's proximity to a good, and local actions and global actions that depend on them.
  • appropriate enabled hardware/devices intelligent devices, mobile phones with specific/appropriately configured software/vocoders.
  • machine discernible, inaudible (to humans) acoustic marks Of particular interest are machine discernible, inaudible (to humans) acoustic marks. And further, those optimized for particular appliances/vocoders (e.g. mobile phones).
  • a voiceprint can be used to screen a user for being ‘fit-to-consume’ or “fit-to-use”. For example, is a patient awake and cognizant of the decision/action to be taken?
  • a user's voice can be used to mark or otherwise secure the collection/transmission of data/information to a ‘trusted’ stakeholder.
  • This approach has the benefits of being device agnostic and the user doesn't need to remember, look-up or safely store a security code. And importantly, it gives the user control over the securitization and downstream use of their personal information.
  • an intelligent device's memory cannot be accessed externally (e.g. the portion that stores voice-codes or voice-profiles).
  • voiceprints, voice-codes and especially voice-profiles are self-erased (forgotten) by the intelligent device.
  • an intelligent pill bottle comprising:
  • FIGS. 4A and 4B illustrate an exemplary healthcare application 400 , 450 .
  • the solution is to determine if the patient is in the immediate presence of their medication (an intelligent pill bottle when it was prescribed to be taken and took an action indicative of compliance, e.g. the patient opened the pill bottle when visibly prompted to do so.
  • FIGS. 4A and 4B illustrate an exemplary healthcare application 400 , 450 .
  • the intelligent pill bottle maintains a secure log of all events (actions, prompts, alerts, alarms etc.) and the times of them, for later review.
  • the visual messaging mediums described in these examples, and elsewhere herein are capable of presenting polymodal visible information (e.g. a polymodal display apparatus or a polymorphic display as described in U.S. patent application Ser. No. 15/890,312 Polymorphic Electro-optic Displays).
  • polymodal visible information e.g. a polymodal display apparatus or a polymorphic display as described in U.S. patent application Ser. No. 15/890,312 Polymorphic Electro-optic Displays.
  • the intelligent pill bottles described herein are related to intelligent container apparatuses, systems and methods described in U.S. patent application Ser. No. 16/010,485 Intelligent Container System and U.S. patent application 62,760,534 Fail-safe Intelligent Label and Container Systems.
  • This healthcare exemplary application 500 , 550 ( FIGS. 5A and 5B ) illustrates how functions can be distributed between an intelligent device (the intelligent pill bottle of this example) and a user communication device communicatively coupled to the intelligent device.
  • the intelligent pill bottle 515 in this example is similar to that in the first example ( FIG. 4A ), however it is not configured with a microphone, voiceprint circuitry or a visible messaging medium for presenting passcodes.
  • a pharmacy (stakeholder) 555 receives a passcode and voice-code from a certificate authority, and provisions the intelligent pill bottle with the passcode, voice-code and the patient's prescription 560 .
  • the intelligent pill bottle 515 according to the provisioned prescription (instructions) manages timing, duration and sequencing steps in the authentication processes.
  • the user communication device 530 (a tablet in this example), is configured with an appropriate app (or access to a webservice) visual message medium (display) for presenting passcodes, an acoustic message medium (speaker), microphone, input interface (acoustic or tactile—keypad, keyboard, touchscreen etc.) and voiceprint circuitry.
  • the wireless communication circuitry in both the intelligent pill bottle and the user communication device is BLE (Bluetooth Low Energy).
  • intelligent pill bottle 515 when, according to the instructions operating in the intelligent pill bottle 515 (the prescription), it's time for the patient 520 to take their medication, the patient is prompted via the intelligent pill bottle's messaging medium (not shown) 565 .
  • intelligent pill bottle is opened:
  • an intelligent device intelligent pill bottle
  • the user could open the intelligent pill bottle, take their medication and close the pill bottle, and the authentication process continue without interrupting the desired patient behavior.
  • the user communication device could be synchronized such that the authentication process was implemented immediately prior to, during, or immediately after the patient takes their medicine.
  • the intelligent device and user communication device together or individually, maintain logs of all events (actions, prompts, alerts, alarms etc.) and their respective times for later, secure access.
  • the user communication device can also be used in cooperation with an intelligent device (and optionally a local or remote wirelessly connected third party) to implement two-factor authentication processes.
  • This exemplary healthcare application 600 , 660 ( FIGS. 6A and 6B ) illustrates how functions can be distributed between an intelligent device (the intelligent pill bottle of this example) and a communicatively coupled user communication device (in this example an internet connected, BLE and acoustically enabled appliance analogous to an Amazon Alexa or Apple Home Pod ‘smart speaker’), and a remote stakeholder or certificate authority (or other parties).
  • the intelligent pill bottle is configured with BLE communications, an ID (e.g. a prescription number printed on a label of the intelligent pill bottle), and visual message mediums for presenting passcodes alerts/alarms and other messages.
  • the intelligent pill bottle in this example is not configured with evaluation circuitry; the evaluation is performed by a remote stakeholder.
  • a pharmacy receives a passcode and voice-code from a certificate authority 655 , and provisions the intelligent pill bottle with the passcode, voice-code and the patient's prescription 660 .
  • the intelligent pill bottle 615 according to the provisioned prescription (instructions) manages timing, duration and sequencing steps in the authentication processes.
  • a visual prompt is generated when it's time for the patient to take a pill 665 .
  • the intelligent pill bottle presents a visual passcode 633 , 668 .
  • This example illustrates a system 700 ( FIG. 7 ) comprising a simplified intelligent device and user communication device, where the user communication device performs the evaluation locally.
  • the specific system illustrated is characteristic of ePRO (electronic patient-reported outcomes) systems used in healthcare, and in particular clinical trials, that rely on dedicated user communication devices. Authenticating the user proximate the medication as the intended patient, improves accountability and compliance with the ePRO system and the prescribed trial protocol.
  • the intelligent pill bottle in the above example includes an internal battery.
  • the intelligent pill bottle could be configured to harvest RF energy to power the circuitry (e.g. in cooperation with the RF communication circuity and RF signals transmitted by the tablet).
  • the certificate authority encrypts the voice-code (and optionally the PC) and provides the key to decrypt the encrypted voice-code directly to the table.
  • This example is of a system 800 comprising an intelligent container 810 (intelligent device) similar to the intelligent pill bottle 415 in example 1, however in this case, constructed to be reusable, and further to include wide-area communication circuitry (e.g. cellular) and support for geolocation services.
  • the wide area network enables remote evaluation (akin to example 3) and the geolocation services establish the location of the intelligent container and proximity of the user/patient.
  • the intelligent container 810 does not however, need evaluation circuitry nor local area wireless communication circuitry. The latter however would be advantageous for provisioning the intelligent container, although that could be accomplished with the wide area communication circuitry.
  • the stakeholder is a healthcare service provider 805 that provides in-home patient care
  • the intelligent container 810 is:
  • Applications such as those described above, may be designed for multiple authorized users. For example, with voice-codes for family members and healthcare providers in addition to those for the patient. With multiple voice-codes for example, an alternate authorized user can substitute for the primary one (e.g. a pre-authorized healthcare provider can substitute for the patient).
  • Multiple voice-codes can also be used in applications benefiting from the presence of both or two different parties (e.g. both a patient and a caregiver) have to be authenticated within a short period of time of each other.
  • Users upon whose participation, compliance and actions desired outcomes depend, can be incentivized according to actual their actions or outcomes (performance or outcome-based systems) with financial payments, credits, rebates, waivers or refunds of deductibles, insurance premiums and the like.
  • Deviations from prescribed actions can be identified and associated with specific users and corresponding actions (or lack thereof) or other events related to user (e.g. patient) behavior.
  • a “prescription” is an example of a set of rules set in the intelligent device.
  • the events are related to time. More generally, those rules are typically conditional on local events.
  • the local events being related to changes in internal or external conditions to the intelligent device. E.g., environmental conditions, elapsed time (or actual time), user actions (e.g. I/O), changes in location, custody etc.
  • the authentication and authorization systems and methods described herein may be strengthened with audible and inaudible acoustic watermarks generated and locally propagated concurrent with presentation of passcode.
  • Authentication and authorization systems and methods comprising intelligent devices can be optimized/fit-for-purpose in a variety of ways.
  • An intelligent device can evaluate voiceprints of what was spoken in context of the action taken. For example: evaluate a voiceprint as “left” instead of “lift” depending on the context (e.g. the good, the user or location).
  • An intelligent device can verify the proximity of person (audible input) relative to action taken (using for example sensing such as Bluetooth proximity).
  • An intelligent device can determine the number of respondents relative to action taken. For example, a loading dock with multiple workers and the handling of a good or delivery vehicle.
  • An intelligent device can match conditions (time, temperature, motion, . . . ) to audible input(s) and action(s) taken.
  • the authentication or authorization systems and methods described herein can be used to authorize access to or use of physical or digital assets, based on voice, proximity of a user to an intelligent device and associate good, or a secure input (by an authenticated or authorized user).
  • Other uses include providing/authorizing rights based on predetermined series of audible inputs (from the same or a plurality of different users), e.g. security guard making his rounds or shipper (delivery) and customer (acceptance); limit rights by detecting attempts at (or actual) unauthorized use/access by via voice input, or limit presented audible or visual information based on voices detected in a room.
  • Voice-codes, voiceprints or voice-profiles can be secured as any type of digital object.
  • security methods and processes are:

Abstract

Briefly, a portable intelligent device is provided that has an audio input for receiving a voice input from a user and an event manager for detecting that an event has occurred. The intelligent device also stores a passcode and a voice-code indicative of the passcode that is unique to a particular user. The intelligent device presents the passcode to a user, for example, from a display on the device, or from smart phone or tablet wirelessly connected to the intelligent device. The user speaks the passcode into an input transducer (microphone) on the intelligent device, and a processor generates a voiceprint that reflects the spoken passcode. The processor then can use the stored voice-code and the generated voiceprint to determine if a specific user was speaking, and if the user spoke the correct passcode. In this way the intelligent device is able to authenticate or authorize a remote user simply by having the user anonymously speak a passcode into the intelligent device.

Description

    RELATED APPLICATIONS
  • This application is a continuation of U.S. application Ser. No. 16/575,156, filed Sep. 18, 2019 and entitled “Authenticating and Authorizing Users Regarding Physical Goods”, which claims priority to U.S. provisional patent application No. 62/732,660, filed Sep. 18, 2018, and entitled “User Specific Actions Regarding Physical Goods.,” both of which are incorporated by reference. This application is related to U.S. Pat. No. 10,152,905, entitled “Symbol Verification for an Intelligent Label Device” and to U.S. Pat. No. 10,078,977, entitled “Optically Determining Messages on a Display,” both of which are incorporated herein by reference. This application is also related to U.S. patent application Ser. No. 15/228,270, entitled “Transaction Agents and Systems.” to U.S. patent application Ser. No. 15/668,482, entitled “Verifying Messages Projected From an Intelligent Audible Device,” to U.S. patent application Ser. No. 15/602,885, entitled “Agents and Systems for Rights Management,” to U.S. patent application Ser. No. 15/890,312, entitled “Polymorphic Electro-optic Displays,” to U.S. patent application Ser. No. 16/010,485, entitled “Intelligent Container System,” to U.S. patent application No. 62/760,534, entitled “Fail-safe Intelligent Label and Container System,” and to U.S. patent application No. 62/890,479, entitled “Autonomous Multi-medium IoT Devices and Systems,” all of which are incorporated herein by reference.
  • FIELD OF THE INVENTION
  • The field of the present invention is portable electronic devices having a processor for determining what user is proximate the device, and authenticating or authorizing that user.
  • BACKGROUND
  • In the world of IoT (Internet of Things) and smart devices, desirable outcomes often depend on the participation of a specific user (or one or more specific users, or a group of specific users) in the presence of, or proximate to, a specific “thing”. Of particular interest are things or “goods” that are transportable or mobile, or otherwise have multiple custodians or users.
  • Determining, and appropriate to the use, authenticating or authorizing (granting permissions) that a specific user (“user”) in proximity of a particular good is important in many applications and to their outcomes, e.g.,
      • Adapting instructions regarding a thing to a specific user, and monitoring a user's compliance with them (e.g. patient prescriptions and compliance with them)
      • Providing one-time or limited authorization to enter or exit a secure facility, use an item, or access information or rights
      • Confirming delivery of a particular item to, and acceptance by, a particular individual
  • In general, such applications involve one or more of the following regarding a particular thing:
      • authenticating specific users (proximate the thing)
      • authorizing, affecting, or effectuating local actions or transactions by specific users
      • associating specific users with local actions or remote transactions
  • Of particular interest are user authentication or authorization activities that relate to locally determined conditions or circumstances of a good, a user or their location. And further, that preferably are not dependent on
      • A password/code or other information that needs to be remembered, stored or retrieved by the user
      • A specific appliance (e.g., a registered mobile phone or notebook or tablet)
      • Limitation to a particular location (e.g. due to ‘fixed’ user communication device or IP address)
      • An always-on internet/remote connection
      • Foregoing privacy or security
  • Accordingly, disclosed herein are novel systems and methods for authenticating and authorizing specific users proximate a good using their vocal characteristics without comprising their privacy.
  • SUMMARY
  • A portable intelligent device is provided that has an audio input for receiving a voice input from a user and an event manager for detecting that an event has occurred. The intelligent device also stores a passcode and a voice-code indicative of the passcode that is unique to a particular user. The intelligent device presents the passcode to a user, for example, from a display on the device, or from smart phone or tablet wirelessly connected to the intelligent device. The user speaks the passcode into an input transducer (microphone) on the intelligent device, and a processor generates a voiceprint that reflects the spoken passcode. The processor then can use the stored voice-code and the generated voiceprint to determine if a specific user was speaking, and if the user spoke the correct passcode. In this way the intelligent device is able to authenticate or authorize a remote user simply by having the user anonymously speak a passcode into the intelligent device.
  • In one example, the intelligent device is integrated into a prescription pill bottle. The bottle has been filled by the pharmacist for a specific patient, and the pharmacist loaded the passcode, the patient's voice-code and the patient's prescription into the intelligent device before mailing the pill bottle to the patient. In response to a passcode presented by the intelligent device (for example when it is time to open the pill bottle and take their medication), the patient speaks the passcode into the integrated microphone of the intelligent device. The processor in the intelligent device then authenticates the patient by evaluating the spoken passcode with the stored voice-code. If the evaluation is successful, the pill bottle stores a record of the results and resets the display. If the evaluation isn't successful, the pill bottle may present a visible alert and wirelessly transmit an alarm message. In another example, the intelligent device may communicate back to the pharmacist that the intended patient has received the medication. Or if wrong user speaks the passcode, then the pill bottle may generate an alert or alarm and transmit a message to the pharmacist.
  • Advantageously, the intelligent device is able to confidently determine if a specific user was in the presence of a good, such as a pill bottle, and they were taking a correct action (e.g. opening or closing the pill bottle). Further, since the events are time-stamped, a complete history of how the user interacted with the good may be constructed.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram representing a simple authentication and authorization ecosystem
  • FIG. 2. is a block diagram showing generation of a native voice-code.
  • FIG. 3. is a block diagram showing generation of a synthetic voice-code.
  • FIG. 4A. is a block diagram representing an exemplary application comprising an intelligent pill bottle and local evaluation of a voiceprint and a voice-code.
  • FIG. 4B. is a process block diagram representing an exemplary application comprising an intelligent pill bottle and local evaluation of a voiceprint and a voice-code.
  • FIG. 5A. is a block diagram representing an exemplary application comprising an intelligent pill bottle, a user communication device and local evaluation.
  • FIG. 5B. is a process block diagram representing an exemplary application comprising an intelligent pill bottle, a user communication device and local evaluation.
  • FIG. 6A is a block diagram representing an exemplary application comprising an intelligent pill bottle, user communication device and remote evaluation.
  • FIG. 6B. is a process block diagram representing an exemplary application comprising an intelligent pill bottle, user communication device and remote evaluation.
  • FIG. 7 is a block diagram of an exemplary application comprising an intelligent pill bottle, ePRO user communication device and local evaluation.
  • FIG. 8 is a block diagram of an exemplary application comprising an intelligent pharmaceutical container system and remote evaluation.
  • DESCRIPTION
  • As the term is used herein “things” are physical items or “goods” (the term used here forward) that are the focus of local user actions and/or remote transactions. Goods may be consumables, disposable or durable; raw materials, components, sub-assemblies or finished goods; single/multi-use; perishable or non-perishable; tools, items of equipment, appliances, machines, dispensers (e.g. liquids, foods, tickets, products), vending machines, conditional use/access systems, (e.g. parking meters, rental scooters or bicycles) locks and locking (and unlocking) systems; vehicles (e.g., autonomous delivery vehicles or drones) etc.
  • Intelligent devices (or the functions thereof) are attached or coupled to, embedded within, or otherwise bound to goods. Exemplary intelligent devices include smart labels, tags, containers, packaging, stored value and security cards, containers etc. Of particular interest are intelligent “hardware agents” and related systems as described in U.S. patent applications Ser. No. 15/228,270 Transaction Agents and Systems and Ser. No. 15/602,885 Agents and Systems for Rights Management. Unless stated otherwise, the term intelligent device shall be understood to encompass hardware agents.
  • Intelligent devices generally comprise: a processor, a memory, a clock/timer, communication circuitry (typically wireless), a source of power (e.g. a battery or capacitor, or RF, optical, thermal or mechanical harvested energy), a user message medium (e.g. visual, acoustic or haptic) and an audio input transducer (e.g. a microphone) for capturing a user's voice. They may also include one or more sensors (e.g. temperature sensor, a shock sensor, a vibration sensor, a motion sensor, a pressure sensor, a strain sensor, a chemical sensor, a radiation sensor, a humidity sensor, an acoustic sensor, or a light sensor) or actuators.
  • Intelligent devices comprise an event manager: functions or operations performed by the processor and circuitry coupled to clocks/timers, sensors, circuitry (e.g. location circuitry and communication circuitry), actuators etc. that collectively monitor and take actions in response to events during the lifecycle of the intelligent device/good. Exemplary events include local communications and interactions (e.g. mechanical, electrical, optical communications with users), actuation, elapsed time, changes in sensed or monitored environmental or internal conditions including mechanical action, detected sound or light, or heat, changes in location, tampering, malfunction, and loss of power.
  • Intelligent devices operate autonomously according to stored or embedded instructions (rules) that govern the device's operation. And further in the case of hardware agents, enforce individual sets of instructions for each of a plurality of stakeholders in the good or its outcomes, according to the respective rights of the stakeholders.
  • Intelligent devices may also include message verification circuitry such as that disclosed in U.S. Pat. No. 10,152,905 Symbol Verification for an Intelligent Label Device, U.S. Pat. No. 10,078,977 Optically Determining Messages on a Display, U.S. Pat. No. 10,147,098 Symbol Verification for an intelligent Label Device and U.S. Pat. No. 10,168,298 Electrically Determining Messages on an Electrophoretic Display, and U.S. patent applications No. 15/668,482 Verifying Messages Projected From an Intelligent Audible Device and U.S. provisional patent application 62/890,479 Autonomous Multi-medium IoT Devices and Systems. Message verification circuitry can be used to increase confidence that passcodes and other information presented by user message mediums (e.g. those responsive to evaluations as described below) are as intended, and if not, what messages were actually presented. Similarly, and cooperatively, verification circuitry can increase confidence in wireless communications (e.g. the broadcast of alerts and alarms responsive to evaluations).
  • In certain embodiments of the inventions described herein, a user may use a user communication device cooperatively with an intelligent device. A user communication device is typically configured to capture a user's voice (voice-data) and (1) accept input from a user (e.g. via a keyboard, keypad, touchscreen, microphone or camera), (2) wirelessly communicate with appropriately configured local intelligent devices (e.g. via RFID, Bluetooth/BLE, Wi-Fi, IR) and/or (3) communicate with remote entities via the internet/wide area networks. Exemplary user communication devices are mobile phones, tablets, notebooks as well as internet connectable appliances. In certain applications a stationary, always connected/connectable variant of the user communication device may be advantageous. User communication devices generally do not need to be associated with a specific individual.
  • Note that the configuration of the intelligent device may vary depending on the role, if any, of a user communication device in a particular implementation. For example, an intelligent device may not need a microphone or a user message medium if they are provided by a user communication device.
  • The following is an example (FIG. 1) of a simplified user authentication and authorization system 100 and method where:
      • A certificate authority 120 generates one or more passcodes and voice-codes indicative of the passcodes
      • A distributor 110 (1) provisions an intelligent device 130 with the passcodes and corresponding voice-codes, (2) binds the intelligent device to a good (or the good's packaging or container) and (3) distributes the good
      • intelligent device 130, responsive to an event, presents a passcode 155 stored in its memory to a user 140 proximate the good via a visual user message medium
      • The user 140 vocalizes the passcode 165
      • The intelligent device 130 (1) creates a voiceprint of the user-vocalized passcode and (2) evaluates the voiceprint with the voice-code to authenticate or authorize the user
  • A passcode is any code that may be visibly or audibly (or haptically) presented to a user by a user message medium (e.g. display or indicator, speaker (e.g., audio output transducer) or vibrator or surface fluctuating device) of an intelligent device, or a user communication device (e.g., a mobile phone or tablet) communicatively coupled to the intelligent device and configured to acquire the passcode and present it to the user via its own message mediums.
  • Passcodes may be fixed or variable, static or dynamic, public or private, single or multi-use, encrypted or unencrypted. Passcodes may be used in different combinations or series or randomly rotated. Passcodes may be pre-printed (e.g. bar code or text string) on the intelligent device, packaging or good. One passcode may have multiple corresponding voice-codes (e.g. to authenticate/authorize a group). A single voice-code may have multiple passcodes. A visually presented passcode may be persistent, temporary (stable, volatile); switchable, self-switching, non-switchable, or a combination thereof. Passcodes may be symbolic and associated with a plain text “key word” that can be spoken (e.g., an image of a “cat”, a shape “square” or color “blue”). Passcodes may also comprise a series of symbols or alphanumeric characters presented concurrently or sequentially, and by different combinations of message mediums (e.g. audible or visual). An intelligent device may instruct a user as to what combination of symbols or their attributes (shape, color, quantity, etc.) they should vocalize, and what order.
  • Passcodes are typically generated and managed by a certificate authority. In some implementations stakeholders and users may however generate their own passcodes. Passcodes are then loaded/stored (provisioned) into intelligent devices, typically by a 3rd party that binds the intelligent device, and the passcode(s) and corresponding voice-code(s), to the good (e.g., a manufacturer, product packager, distributor, seller, transporter).
  • For the purposes of simplicity and clarity, the term certificate authority shall refer to the entity that creates and manages the passcodes (and voice-codes, user voice-profiles etc.). The entity that generates the passcodes also typically manages the lifecycle of the passcodes (expiration, renewal, use count etc.) and either independently or in cooperation with other parties, tracks user actions and transactions based on the passcodes (authorization, denial of service or access etc.)
  • A stakeholder is any entity that has a stake in any outcome of a good or related systems, actions or transactions. A stakeholder may perform some or all of the functions of a certificate authority.
  • In healthcare/patientcare, exemplary stakeholders include healthcare professionals, professional offices/groups, clinics and hospitals (and larger organizations comprising them), pharmacies, pharmaceutical manufacturers and distributors, insurance providers, employers, regulatory agencies and patients and their families, caregivers etc. Stakeholders may or may not be custodial and may or not be directly involved in local actions or remote transactions involving or related to the good, intelligent device or other stakeholders.
  • A voice-code is an analog or digital signature of a passcode vocalized (spoken) by a specific user, or, machine generated using a user's voice-profile. FIG. 2 illustrates a voice-code generated from a user-vocalized passcode referred to herein as a native voice-code. FIG. 3 illustrates a voice-code generated using a voice-profile, and referred to herein as a synthetic voice-code. Native voice-codes and synthetic voice-codes are private and generated, stored and otherwise managed by secure parties and systems (e.g. certificate authorities).
  • A voice-profile is a model of a user's vocal characteristics determined from user voice-data that can be used to generate user-specific voice-codes without the concurrent participation of the user. A user's voice-profile can also be used to obtain the passcode underlying a user's voiceprint (described below).
  • A voiceprint is an analog or digital signature (analogous to a fingerprint) of a user-vocalized passcode, where the passcode is presented to the user in-situ by an intelligent device or a user communication device (described below). A voiceprint may be evaluated in a variety of ways to authenticate or authorize a specific user and take actions accordingly.
  • One exemplary method of evaluating a voiceprint is pattern matching (e.g. comparing and evaluating a previously generated voice-code with the locally generated voiceprint). This approach implicitly takes into account differences in languages and regional dialects as well as differences in speech patterns and the vocal characteristics of the users. The evaluation rules and systems may further employ systems and methods for determining and evaluating the level of confidence in the results of the voiceprint evaluation.
  • Evaluation at the site of the user and good can be performed in response to a locally presented passcode, using a locally generated voiceprint and a previously generated, locally stored or remotely accessible, voice-code. In one preferred embodiment, the intelligent device generates and stores the voiceprint, then performs the evaluation using a voice-code previously stored in its memory. In other implementations the voiceprint is generated and stored in a user communication device that can access a previously generated voice-code stored in the intelligent device (or from the certificate authority e.g., using an identifier from the intelligent device) and accordingly, perform the evaluation.
  • The location of the intelligent device, as self-determined with integrated location circuitry (e.g. cellular, local area; location-based services, geo-fencing) can increase confidence that a user, is an intended user. For example, that the location of the intelligent device is consistent with the expected location of the user: e.g. the delivery location of a good to a specific buyer or consumer; the care facility of a prescribed medication for a specific patient (e.g. their home address), or the facility where permission to access is to be granted, or equipment is to be used.
  • In some implementations, the intelligent device will dynamically generate the passcode (e.g. in response to life-cycle events). Evaluation of a related voiceprint (described below) requires having access to the passcode as well as the user's voice-profile (described below) and a way to associate them. Since the passcode may be public for only a short period, and in an adequately private environment, it may be sufficient to digitally encrypt the passcode (and voiceprint) for communication to the device or entity performing the evaluation, e.g., a user communication device or certificate authority respectively.
  • Evaluation at a location remote from the user and good can be performed by a remote evaluation system, e.g., that operated by a stakeholder or a certificate authority. In a typical embodiment, the user communication device sends from the user's location, a voiceprint (or voice-data) and an “identifier” (ID) to the remote evaluation system. The remote evaluation system uses the identifier to retrieve a previously generated voice-code that corresponds to the received voiceprint, then evaluates the voiceprint with the voice-code. Alternatively, the user communication device also sends the passcode corresponding to the voiceprint from the user's location, to the remote evaluation system. The remote evaluation system uses the identifier to
  • retrieve the voice-profile corresponding to the voiceprint and contemporaneously generate a synthetic voice-code using the passcode and voice-profile, which it then uses to evaluate the voiceprint. In a variation of the latter embodiment, the passcode could alternatively be retrieved by the remote evaluation system from a database of passcodes using the identifier. Note that multiple parties, e.g. a stakeholder and certificate authority) could collaboratively performed the functions just described.
  • Typically, the identifier is generated by a stakeholder or a certificate authority and accompanies the intelligent device or companion good to the user's location. In the simplest implementation, the identifier is used to determine and retrieve the previously generated voice-code to be used in the evaluation. The identifier can be private or public (e.g., visibly—including printed, acoustically or wirelessly presented). Importantly, an association with a user's identity (or alias) is not required.
  • A valuable aspect of the authentication and authorization systems and methods described herein is that the user can remain anonymous (the user isn't identified or identifiable), incognito (an alias is used—typically for single or limited use) or identifiable (the user can be identified but their identity is not necessarily public), or identified as a member of a group of authorized users.
  • Note here and elsewhere, the evaluation process requires appropriate circuitry/software (“evaluation circuitry”) located where the evaluation is performed (e.g. in the intelligent device or user communication device if the evaluation is local to the good and user). Circuitry/software for generating voiceprints (“voiceprint circuitry”) is similarly required.
  • The results of an evaluation (e.g. authentication a user present a good) may authorize or initiate actions by the intelligent device or depending on the implementation, an application on a user communication device. Exemplary actions by the such devices in response to an authorized user voiceprint include enabling access to stored information, building a history of user specific interactions, sensing conditions, presenting messages (e.g. access codes, alerts/alarms, financial or other transactional information, enabling access to functions of, or operation of, a good etc.
  • The results of evaluations may also affect specific users' behaviors, e.g. taking actions or effectuating transactions regarding goods. For example, in response to previously described actions of an intelligent device. More expansively, the results of an evaluation that successfully authenticates specific user proximate a good, and at a particular moment in time, can be used to improve user compliance (see below) and optimize user behaviors that affect the outcomes of goods (and corresponding transactions). Knowledge of a specific user's presence with a good at a particular moment in, or period of, time can be advantageously combined with knowledge of the coincident actions taken by the intelligent device, e.g. visual, audible or wireless messaging presented the user and the corresponding actions taken (or not taken) by the specific user in response. And further, the results of an evaluation can be used to authorize a specific user—grant them permissions, without having to identify them.
  • The user's actions (or lack thereof) may be determined by an intelligent device (or user communication device). They may also be determined by correlating data received from an intelligent device and user-initiated transaction data from external system. An example of the latter being a decrement to an inventory system of a replacement good when the current one is no longer fit-for use. Another example is a caregiver reporting (or not reporting) a message presented by an intelligent container containing opioids or other dangerous drugs that was generated because the container had been opened without an authorized user being present.
  • User compliance with the above processes can be optimized via various performance or outcome-based incentives (or disincentives). Patience compliance in healthcare for example, can be improved by offering incentives (or disincentives) for acting appropriately to the messaging presented by the bottle containing their drugs of when, and when not, to take them. And further, encouraging their proper storage/safety—e.g., to make sure that any access by anyone other than the authorized patient is acted upon. Exemplary performance/outcome-based incentives include:
      • Waiving of fees such as insurance copays, reducing insurance deductibles
      • Discounts on future prescription purchases
      • Automatic reordering of prescriptions (or rejection of refill requests without consultation)
      • Multiple prescription dosage management at a discount
  • In one exemplary process 200 for generating a native voice-code (FIG. 2) a user using an audio enabled internet connected computing device (e.g. computer, notebook, tablet or mobile phone), establishes a secure communication 203 with a certificate authority. The certificate authority generates passcodes 205 and sends them to the user. The user vocalizes the passcodes (creating voice-data) 207 which are sent to a certificate authority. The certificate authority receives the vocalized passcodes and creates and stores corresponding native voice-codes 209.
  • In an exemplary process 300 for generating a synthetic voice-code (FIG. 3), a user using an audio enabled internet connected computing device establishes a secure communication with a certificate authority 308. In response to the certificate authority, the user generates voice-data 312 (e.g. the user vocalizes sample words and phrases prompted by the certificate authority) that is captured and used by the certificate authority to create a user voice-profile 314. The voice-profile can be later used to generate synthetic voice-codes based on then or later, the certificate authority generates passcodes 316 that it uses to generate synthetic voice-codes 318 when needed.
  • Advantageously such processes benefit from AI and in particular generative adversarial networks (GANs). In another process, voice-codes can be created simply by recording, and advantageously refining/processing, and storing the user's vocalization of specific passcodes. Various adaptive noise filtering/cancelling schemes can be used to compensate for variations in the acoustics of the user's environment and system used to create the voice-data.
  • Voice-codes and voice-profiles can be generated remotely via a secure process like the authorization of credit cards via internet or voice activation. Note that the process described above depends on an appropriate for the use, level of confidence that the person generating the voice-data is correctly identified and authorized. In other words, that person generating the voice-data is authenticated. Various processes may be used for this purpose including two-factor authentication, pre-defined voiceprints, or PINs.
  • To achieve a high level of confidence in the system, and higher quality voice-data, similar processes for generating voice-profiles and voice-codes can be performed in a trusted facility of a stakeholder or a certificate authority (e.g. a doctor's office, pharmacy, retail clinic, hospital, or employer's human resource office; the office of a bank or other financial institution, or government office).
  • The stakeholder or certificate authority distributes passcodes, and voice-codes according to the implementation, to the relevant elements of the ecosystem, e.g. for loading into intelligent devices or communication to appropriate user communication devices or authorized stakeholders).
  • A certificate authority may provide services on behalf of multiple stakeholders (e.g. a patient, the patient's doctor, hospital, pharmacy, insurance company and regulatory agencies), thereby simplifying administration, maintaining a higher level of trust. For example, a certificate authority may perform some or all of the processes for creating, storing, distributing and otherwise managing passcodes, voice-codes, voice-profiles, and evaluations etc. on behalf of the stakeholders.
  • A passcode may be presented to a user(s) for generating a voiceprint for limited duration, number of times or time periods, or for specific times or locations or other factors to encourage compliance and discourage misuse and tampering. For example, a passcode may only be presented consistent with a patient prescription loaded in an intelligent pill bottle/container such as that described in U.S. patent application Ser. No. 16/010,485, An Intelligent Container System. Advantageously, the evaluation may be limited to a number of attempts or require secondary actions.
  • A single intelligent device/good may have multiple authorized users and accordingly multiple passcodes, multiple authorized voice-codes per passcode or various combinations thereof. For example, an intelligent pill bottle might support an authorized patient, a family member, and/or healthcare provider. A single intelligent device/good may also have different instructions/rules conditioned on the determination of specific user or users.
  • As with previously described processes for generating voice-data, voice-codes and voice-profiles, adaptive noise cancellation or other signal processing techniques may be used to improve performance when creating voiceprints (e.g. to compensate for ambient sounds, or characteristics of the devices used, e.g. microphones/speakers).
  • Advantageously, acoustic watermarks and steganographic marks can be employed to increase confidence in the determination of a specific user's proximity to a good, and local actions and global actions that depend on them. For example, during the creation and evaluation of a voiceprint, or linked to specific, appropriate enabled hardware/devices (intelligent devices, mobile phones with specific/appropriately configured software/vocoders). Of particular interest are machine discernible, inaudible (to humans) acoustic marks. And further, those optimized for particular appliances/vocoders (e.g. mobile phones).
  • In one application of the systems and methods described herein, a voiceprint can be used to screen a user for being ‘fit-to-consume’ or “fit-to-use”. For example, is a patient awake and cognizant of the decision/action to be taken?
  • In another application of the systems and methods described herein, a user's voice can be used to mark or otherwise secure the collection/transmission of data/information to a ‘trusted’ stakeholder. This approach has the benefits of being device agnostic and the user doesn't need to remember, look-up or safely store a security code. And importantly, it gives the user control over the securitization and downstream use of their personal information.
  • For security and privacy reasons, it is preferable that at least a portion of an intelligent device's memory cannot be accessed externally (e.g. the portion that stores voice-codes or voice-profiles).
  • Also, for security and privacy reasons, it may be preferable that after their useful life, or in the event of failed evaluations or tampering, that some or all of stored voiceprints, voice-codes and especially voice-profiles, are self-erased (forgotten) by the intelligent device.
  • Exemplary Applications
  • The following examples illustrate the application of user authentication and authorization systems and methods regarding a good. It is to be understood that only the salient elements are described and that many other variations are possible consistent with the inventions described herein. Each of the following examples are healthcare applications, however it should be understood that the inventions described are applicable to a wide range of other uses.
  • Except as noted, central to each of the following example applications is an intelligent pill bottle (intelligent device) comprising:
      • A processor, a memory, a clock/timer and a battery
      • BLE, (or other local area wireless communication circuitry
      • Sensors/circuits for determining whether the pill bottle is open or closed
      • A visual messaging medium(s)
      • A microphone for capturing the user-vocalized passcodes
      • Event and evaluation circuitry
      • A passcode and a voice-code stored in the memory
  • In the following examples, only one passcode and one voice-code are illustrated. In practice a single passcode could be reused, however a more secure option is to use multiple passcodes and voice-codes for the same user (e.g. a patient in the following examples). Depending the condition of the user (patient) and the presence of a trusted at-home care provider, it may be advantageous to have one set of passcodes and two sets of corresponding voice-codes.
  • In that way either the patient or the care provider can be authenticated or authorized as appropriate to the current circumstances. Note that a patient identifier is not require.
  • Exemplary Healthcare Application 1—Intelligent Pill Bottle and Local Evaluation
  • The goals of this application are to (1) encourage compliance (take medicines as prescribed), and (2) to discourage accidental, unintentional or intentional misuse. The solution is to determine if the patient is in the immediate presence of their medication (an intelligent pill bottle when it was prescribed to be taken and took an action indicative of compliance, e.g. the patient opened the pill bottle when visibly prompted to do so. FIGS. 4A and 4B illustrate an exemplary healthcare application 400, 450. In summary:
      • A pharmacy (stakeholder) 405
        • Obtains a passcode and corresponding patient voice-code from a certificate authority 410 (using an anonymous ID) associated with the patient 455
        • Wirelessly provisions the intelligent pill bottle 415 with the patient's prescription (prescribed actions and timing thereof) and the passcode and voice-code 460, and sets the clock/timer
      • The patient 420 or a caregiver picks-up the intelligent pill bottle and takes it home
      • When, according to the instructions operating in the intelligent pill bottle (the prescription), it's time for the patient to take their medication, the patient is visibly prompted (not shown) via the intelligent pill bottle's visual messaging medium 465
        • When/if the pill bottle 415 is opened, the stored passcode is visually presented 430 on its integrated visual message medium 470
        • The patient 420 speaks (vocalizes) the passcode 435 to the microphone in the intelligent pill bottle 475
      • The intelligent pill bottle generates and stores a voiceprint of the user-vocalized passcode 480, and evaluates the voiceprint with the voice-code stored in memory 485
        • If the voiceprint matches the voice-code (indicating that the patient is present and complying with the prescription) the intelligent pill bottle, erases the visual passcode from the display
        • If the voiceprint does not match the voice-code, and
          • It's a near miss (likely to be the patient's voice, but the evaluation isn't definitive), the agent generates a visual prompt for the patient to try again
          • It's a clear miss (not likely to be the patient's voice) the agent generates a visual alert and a wireless alarm indicating use by someone other than the patient
      • If a valid voiceprint is not generated (or no vocalized pattern is presented) within X minutes of the pill bottle having been opened (indicating the possibility of unauthorized use), the intelligent pill bottle generates visual alert and a wireless alarm
      • If the intelligent pill bottle is not opened during the prescribed time period, it generates a visual and optionally wireless alert (e.g., to notify a caregiver)
      • When a valid voiceprint is generated, or if no valid voiceprint is generated within X minutes (or Y attempts) of the passcode being presented, the passcode is erased from the visual messaging medium.
  • In all cases, the intelligent pill bottle maintains a secure log of all events (actions, prompts, alerts, alarms etc.) and the times of them, for later review.
  • Preferably the visual messaging mediums described in these examples, and elsewhere herein are capable of presenting polymodal visible information (e.g. a polymodal display apparatus or a polymorphic display as described in U.S. patent application Ser. No. 15/890,312 Polymorphic Electro-optic Displays). The intelligent pill bottles described herein are related to intelligent container apparatuses, systems and methods described in U.S. patent application Ser. No. 16/010,485 Intelligent Container System and U.S. patent application 62,760,534 Fail-safe Intelligent Label and Container Systems.
  • Exemplary Healthcare Application 2—Intelligent Pill Bottle, User Communication Device and Local Evaluation
  • This healthcare exemplary application 500, 550 (FIGS. 5A and 5B) illustrates how functions can be distributed between an intelligent device (the intelligent pill bottle of this example) and a user communication device communicatively coupled to the intelligent device. The intelligent pill bottle 515 in this example, is similar to that in the first example (FIG. 4A), however it is not configured with a microphone, voiceprint circuitry or a visible messaging medium for presenting passcodes.
  • As in the first example, a pharmacy (stakeholder) 555 receives a passcode and voice-code from a certificate authority, and provisions the intelligent pill bottle with the passcode, voice-code and the patient's prescription 560. The intelligent pill bottle 515 according to the provisioned prescription (instructions) manages timing, duration and sequencing steps in the authentication processes.
  • The user communication device 530 (a tablet in this example), is configured with an appropriate app (or access to a webservice) visual message medium (display) for presenting passcodes, an acoustic message medium (speaker), microphone, input interface (acoustic or tactile—keypad, keyboard, touchscreen etc.) and voiceprint circuitry. The wireless communication circuitry in both the intelligent pill bottle and the user communication device is BLE (Bluetooth Low Energy).
  • As with the first example, when, according to the instructions operating in the intelligent pill bottle 515 (the prescription), it's time for the patient 520 to take their medication, the patient is prompted via the intelligent pill bottle's messaging medium (not shown) 565. When intelligent pill bottle is opened:
      • The tablet (user communication device) 530:
        • Wirelessly acquires the passcode 541 from the intelligent pill bottle 515 and visually presents (and subsequently erases) the passcode 543 for the patient 520 to vocalize 573
        • “Listens” to the patient vocalize (speak) the displayed passcode 545, 577
        • Generates a voiceprint corresponding to the vocalized passcode, and transmits it 547 to the intelligent pill bottle 583
      • The intelligent pill bottle 515:
        • Wirelessly receives and stores the voiceprint transmitted by the tablet
        • Evaluates the voiceprint against the voice-code stored in its memory and stores the results of the evaluation 585
        • Generates and transmits alerts, alarms or messages 549 appropriate to the results of the evaluation to the tablet 530 (and/or another monitoring device or a remote entity not shown).
  • Note that a variety of combinations and sequences of steps can be employed in cooperation with the stored instructions (prescription) and operation of an intelligent device (intelligent pill bottle). For example, the user could open the intelligent pill bottle, take their medication and close the pill bottle, and the authentication process continue without interrupting the desired patient behavior. In other words, the user communication device could be synchronized such that the authentication process was implemented immediately prior to, during, or immediately after the patient takes their medicine.
  • As appropriate to the application, the intelligent device and user communication device, together or individually, maintain logs of all events (actions, prompts, alerts, alarms etc.) and their respective times for later, secure access. The user communication device can also be used in cooperation with an intelligent device (and optionally a local or remote wirelessly connected third party) to implement two-factor authentication processes.
  • Exemplary Healthcare Application 3—Intelligent Pill Bottle, User Communication Device and Remote Evaluation
  • This exemplary healthcare application 600, 660 (FIGS. 6A and 6B) illustrates how functions can be distributed between an intelligent device (the intelligent pill bottle of this example) and a communicatively coupled user communication device (in this example an internet connected, BLE and acoustically enabled appliance analogous to an Amazon Alexa or Apple Home Pod ‘smart speaker’), and a remote stakeholder or certificate authority (or other parties). In this example, the intelligent pill bottle, is configured with BLE communications, an ID (e.g. a prescription number printed on a label of the intelligent pill bottle), and visual message mediums for presenting passcodes alerts/alarms and other messages. Unlike the previous examples, the intelligent pill bottle in this example is not configured with evaluation circuitry; the evaluation is performed by a remote stakeholder.
  • As in the previous examples, a pharmacy (stakeholder) receives a passcode and voice-code from a certificate authority 655, and provisions the intelligent pill bottle with the passcode, voice-code and the patient's prescription 660. The intelligent pill bottle 615 according to the provisioned prescription (instructions) manages timing, duration and sequencing steps in the authentication processes.
  • According to the prescription provisioned in the intelligent pill bottle, a visual prompt is generated when it's time for the patient to take a pill 665. And as described above, according to the instructions set in the intelligent pill bottle, the intelligent pill bottle presents a visual passcode 633, 668. When the intelligent pill bottle 615 is opened:
      • The patient 620 “wakes up” 635 the user communication device 630, 672, enabling the appropriate voice-based application and processes (i.e. Alexa skill). The voice-based application prompts the patient to “speak” the passcode and ID 637 to the user communication device 630, 676. The user communication device then transmits the vocalized passcode and ID 643 to the remote stakeholder or certificate authority 610.
      • The remote stakeholder/certificate authority 610
        • Receives 643 and converts the ID into text (speech-to-text) or other machine processible code, and the vocalized passcode into a voiceprint 682
        • Uses the text ID to determine (look-up) the appropriate voice-code 682, and
        • Evaluates the voiceprint with the voice-code 685, and according to the results of the evaluation executes one or more transactions e.g., transmit instructions/data 645 to the user communication device 630 or updates patient records, flags abuse, low or high levels of compliance, risky behavior, notifies other stakeholders (e.g. doctors, hospitals, pharmacies)
    Exemplary Healthcare Application 4—Intelligent Pill Bottle, ePRO User Communication Device and Local Evaluation
  • This example illustrates a system 700 (FIG. 7) comprising a simplified intelligent device and user communication device, where the user communication device performs the evaluation locally. The specific system illustrated is characteristic of ePRO (electronic patient-reported outcomes) systems used in healthcare, and in particular clinical trials, that rely on dedicated user communication devices. Authenticating the user proximate the medication as the intended patient, improves accountability and compliance with the ePRO system and the prescribed trial protocol.
  • In this example:
      • The stakeholder is a clinical trial operator 705
      • The intelligent pill bottle (intelligent device) 715 is configured with
        • A processor, a memory, a clock/timer and a battery
        • Local area wireless communication circuitry (compatible with that supported by the user communication device)
      • The intelligent pill bottle is not configured with a user message medium or evaluation circuitry
      • The user communication device 730 is an internet connectable tablet (in this example, provided by the clinical trial operator and configured to support ePRO) configured with local area wireless compatible with the intelligent pill bottles, a visual user message medium, microphone (and in this example a speaker) and evaluation circuitry.
  • As illustrated in FIG. 7:
      • A certificate authority 710 generates a passcode and a voice-code
      • The clinical trial operator 705
        • Acquires the passcode and voice-code from the certificate authority
        • Encrypts the voice-code (and optionally the passcode)
        • Provisions the intelligent pill bottle 715 with a passcode and encrypted voice-code, and patient's prescription 741
        • Provides the tablet 730 (provisions or sends to the tablet) the key to decrypt the encrypted voice code 743
      • At the patient's home, the tablet 730 wirelessly connects to the intelligent pill bottle 715 and retrieves the prescription, passcode and encrypted voice-code 744
      • The tablet
        • Audibly prompts 746 the patient when it is time to take their medication
        • Visually presents 747 the passcode when the pill bottle is opened (detected by the intelligent pill bottle and wirelessly communicated to the tablet)
        • Listens to the patient vocalize the passcode 748 and generates a corresponding voiceprint
        • Decrypts the encrypted voice-code using the key stored in its memory
        • Evaluates the voiceprint with the decrypted voice-code to authenticate the user as the intended patient (and includes updates the ePRO system accordingly)
  • The intelligent pill bottle in the above example includes an internal battery. Alternatively, the intelligent pill bottle could be configured to harvest RF energy to power the circuitry (e.g. in cooperation with the RF communication circuity and RF signals transmitted by the tablet). In another variant, the certificate authority encrypts the voice-code (and optionally the PC) and provides the key to decrypt the encrypted voice-code directly to the table. There are of course many other secure-data handling variations.
  • Exemplary Healthcare Application 5—Intelligent Pharmaceutical Container and Remote Evaluation
  • This example is of a system 800 comprising an intelligent container 810 (intelligent device) similar to the intelligent pill bottle 415 in example 1, however in this case, constructed to be reusable, and further to include wide-area communication circuitry (e.g. cellular) and support for geolocation services. The wide area network enables remote evaluation (akin to example 3) and the geolocation services establish the location of the intelligent container and proximity of the user/patient. Unlike the intelligent pill bottle 415, the intelligent container 810 does not however, need evaluation circuitry nor local area wireless communication circuitry. The latter however would be advantageous for provisioning the intelligent container, although that could be accomplished with the wide area communication circuitry.
  • In this example the stakeholder is a healthcare service provider 805 that provides in-home patient care, and the intelligent container 810 is:
      • Constructed for shipping/storing preformulated/prefilled syringes and to be reusable
      • Configured with a processor, a memory, a clock/timer and a battery, a visual user message medium, a speaker, a microphone, sensors/circuits for determining whether the intelligent container is open or closed, and cellular communication circuitry
  • As illustrated in FIG. 8:
      • The healthcare service provider 805
        • Generates a passcode and a set of voice-codes indicative of the passcode and plurality of authorized care givers (e.g. staff of the healthcare service provider), and a container ID, and further associates the container ID with the voice-codes of the set of voice-codes
        • Activates the cellular service, and geolocation service
        • Provisions the intelligent container with the passcode and prescription (stores the voice-code in a database) 831
        • Ships the intelligent container to a patient's home
      • The patient receives the connected intelligent container
      • The intelligent container 810
        • Audibly prompts the user when it is time to inject the pharmaceutical 833
        • Visually presents the passcode to the user when the intelligent container is closed 835
        • Listens to the on-site user vocalize the passcode and generates a corresponding voiceprint 837
        • Wirelessly transmits over the cellular network, the voiceprint and container ID to the healthcare service provider 839
      • The healthcare service provider 805
        • Uses a location service (not shown) to determine the location of the intelligent container and its proximity to the patient's home
        • Identifies the set of voice-codes using the container ID
        • Evaluates the voiceprint with the voice-codes in the set of voice-codes, and the determined geolocation, and authenticate the specific caregiver on-site and their proximity to the intelligent container
  • Note the above example, could be easily extended to also authenticate the patient, their presence and being awake using a second user-vocalized passcode (the same or different passcode than the one presented to the caregiver) and corresponding voice-print, and second voice-code for the patient.
  • In the all the previous examples, and in general all of the inventions described herein, applications, various forms of data security can be employed.
  • Variations
  • Applications such as those described above, may be designed for multiple authorized users. For example, with voice-codes for family members and healthcare providers in addition to those for the patient. With multiple voice-codes for example, an alternate authorized user can substitute for the primary one (e.g. a pre-authorized healthcare provider can substitute for the patient). Multiple voice-codes (and preferably in combination with multiple passcodes) can also be used in applications benefiting from the presence of both or two different parties (e.g. both a patient and a caregiver) have to be authenticated within a short period of time of each other.
  • Users (e.g. patients), upon whose participation, compliance and actions desired outcomes depend, can be incentivized according to actual their actions or outcomes (performance or outcome-based systems) with financial payments, credits, rebates, waivers or refunds of deductibles, insurance premiums and the like.
  • Deviations from prescribed actions can be identified and associated with specific users and corresponding actions (or lack thereof) or other events related to user (e.g. patient) behavior.
  • Note that a “prescription” is an example of a set of rules set in the intelligent device. In the case of a prescription, the events are related to time. More generally, those rules are typically conditional on local events. The local events being related to changes in internal or external conditions to the intelligent device. E.g., environmental conditions, elapsed time (or actual time), user actions (e.g. I/O), changes in location, custody etc.
  • Outcomes that benefit or depend on authenticating and authorizing users (and thus their proximity to a good) can be strengthened with the use of voiceprint activated electro-mechanical locking mechanism and touch sensors. It is more likely for example, that a patient/user was actually present holding/opening/closing the pill bottle (and thus more likely to complying with the prescription) if the intelligent device/bottle was touched consistent with the prescription (and correlated with successful authentication and/or authorization of the user). As noted before neither authentication nor authorization depends on user identifiable data.
  • The authentication and authorization systems and methods described herein may be strengthened with audible and inaudible acoustic watermarks generated and locally propagated concurrent with presentation of passcode.
  • Authentication and authorization systems and methods comprising intelligent devices can be optimized/fit-for-purpose in a variety of ways. An intelligent device can evaluate voiceprints of what was spoken in context of the action taken. For example: evaluate a voiceprint as “left” instead of “lift” depending on the context (e.g. the good, the user or location). An intelligent device can verify the proximity of person (audible input) relative to action taken (using for example sensing such as Bluetooth proximity). An intelligent device can determine the number of respondents relative to action taken. For example, a loading dock with multiple workers and the handling of a good or delivery vehicle. An intelligent device can match conditions (time, temperature, motion, . . . ) to audible input(s) and action(s) taken.
  • The authentication or authorization systems and methods described herein can be used to authorize access to or use of physical or digital assets, based on voice, proximity of a user to an intelligent device and associate good, or a secure input (by an authenticated or authorized user). Other uses include providing/authorizing rights based on predetermined series of audible inputs (from the same or a plurality of different users), e.g. security guard making his rounds or shipper (delivery) and customer (acceptance); limit rights by detecting attempts at (or actual) unauthorized use/access by via voice input, or limit presented audible or visual information based on voices detected in a room.
  • Voice-codes, voiceprints or voice-profiles can be secured as any type of digital object. Among the different security methods and processes are:
      • Encrypting the digital objects; breaking them into pieces and storing in a distributed system, then reassembling when/where and by what device as needed
      • Converting the voiceprint data to a token or secure code that references the voiceprint; adding a watermark to voiceprint. This is an extension of audio watermarking which is used to identify if part or all of a voiceprint (or other audio) has been stolen or inappropriately reused.
      • Adding a time-bomb to voiceprint so it becomes unusable after a set time, or time or event-based auto-erase (“forgetting”) processes
      • Utilizing hardware IDs of intelligent devices to associate voiceprints with single device or group of devices.
  • While particular preferred and alternative embodiments of the present intention have been disclosed, it will be appreciated that many various modifications and extensions of the above described technology may be implemented using the teaching of this invention. All such modifications and extensions are intended to be included within the true spirit and scope of the appended claims.

Claims (23)

What is claimed, is:
1. A user communication device, comprising:
a processor and a memory;
a user message medium;
an audio input transducer;
voiceprint circuitry;
evaluation circuitry;
communication circuitry;
wherein the user communication device performs the steps of:
a) storing an identifier for an intelligent device, and a passcode and a voice-code, the voice-code indicative of the passcode vocalized by a user to be authenticated or authorized;
(b) presenting the passcode to the user using the user message medium;
(c) capturing, using the audio input transducer, the passcode as vocalized by the user;
(d) generating, using the voiceprint circuitry, a voiceprint of the captured vocalized passcode,
(e) evaluating, using the evaluation circuitry and the voice-code, the voiceprint; and
(f) authenticating or authorizing the user.
2. The user communication device of claim 1, wherein the passcode or the voice-code are received from the intelligent device.
3. The user communication device of claim 1, wherein the passcode or voice-code are received from a remote system in response to the user communication device communicating the identifier to the remote system.
4. The user communication device of claim 1, wherein the remote authority receives the passcode or voice-code from a certificate authority by providing the identifier of the user communication device.
5. The user communication device of claim 1, wherein the voice-code is either a native voice-code or a synthetic voice-code.
6. The user communication device of according to claim 1, wherein the processor performs an action in response to the evaluation step.
7. The user communication device according to claim 6, where the action includes storing, presenting, or transmitting the results of the evaluation or its determinants.
8. The user communication device according to claim 6, wherein the actions include generating an alarm or alert signal, presenting or transmitting a message, or modifying a message presented by a user message medium of the use communication device.
9. The user communication device according to claim 6, where the action includes generating or erasing a passcode or voice-code.
10. The user communication device according to claim 6, where the action includes granting, terminating, or modifying a permission.
11. The user communication device according to claim 6, where the action includes transmitting the voiceprint or information associated with the voiceprint to an intelligent device, a remote system, or a certificate authority.
12. The user communication device of claim 11, where the information with the voiceprint includes an identifier, a passcode or a voice-code, event information input by the user or generated by the user communication device or received from an intelligent device or remote system, or the results of the evaluation.
13. The user communication device of claim 2, wherein the passcode was generated by the intelligent device responsive to a monitored event.
14. The user communication device of claim 13, wherein the events monitored by the intelligent device include (1) local communications and interactions, (2) actuation, (3) elapsed time, (4) changes in environmental or internal conditions.
15. The user communication device of claim 13, further receiving event information provided by the intelligent device.
16. The user communication device or the intelligent device according to claim 1, further being a hardware agent.
17. A user communication device, comprising:
a processor and a memory;
a user message medium;
an audio input transducer;
voiceprint circuitry;
communication circuitry;
wherein the user communication device performs the steps of:
(a) storing an identifier received from an intelligent device, and a passcode;
(b) presenting the passcode using the user message medium;
(c) capturing, using the audio input transducer, the presented passcode as vocalized by the user;
(d) generating, using the voiceprint circuitry, a voiceprint of the captured vocalized passcode,
(e) communicating, using the communication circuitry, the identifier or the passcode, and the voiceprint to a remote evaluation system, and
(f) receiving from the remote evaluation system information as to whether the user is authenticated or authorized.
18. The user communication device of claim 17, wherein the passcode is received from the intelligent device or from the remote evaluation system.
19. The user communication device of claim 18, wherein the passcode was retrieved by the remote evaluation system using the identifier.
20. The user communication device of claim 19, wherein the passcode received from the remote evaluation system, was retrieved by the remote evaluation system from a certificate authority.
21. The user communication device of claim 17, further storing a voice-code received from the intelligent device, the voice-code indicative of the passcode vocalized by a user to be authenticated or authorized.
22. The user communication device of claim 21, wherein the voice-code is communicated to the remote evaluation system, and the remote evaluation system uses the voice-code to evaluate the voiceprint and authenticate or authorize the user.
23. The user communication device of claim 17, wherein the voice-code is either a native voice-code or a synthetic voice-code.
US17/390,459 2018-09-18 2021-07-30 Authenticating and authorizing users regarding physical goods Abandoned US20220058249A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/390,459 US20220058249A1 (en) 2018-09-18 2021-07-30 Authenticating and authorizing users regarding physical goods

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201862732660P 2018-09-18 2018-09-18
US16/575,156 US11216545B2 (en) 2018-09-18 2019-09-18 Authenticating and authorizing users regarding physical goods
US17/390,459 US20220058249A1 (en) 2018-09-18 2021-07-30 Authenticating and authorizing users regarding physical goods

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/575,156 Continuation US11216545B2 (en) 2018-09-18 2019-09-18 Authenticating and authorizing users regarding physical goods

Publications (1)

Publication Number Publication Date
US20220058249A1 true US20220058249A1 (en) 2022-02-24

Family

ID=79166205

Family Applications (2)

Application Number Title Priority Date Filing Date
US16/575,156 Active 2039-09-23 US11216545B2 (en) 2018-09-18 2019-09-18 Authenticating and authorizing users regarding physical goods
US17/390,459 Abandoned US20220058249A1 (en) 2018-09-18 2021-07-30 Authenticating and authorizing users regarding physical goods

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US16/575,156 Active 2039-09-23 US11216545B2 (en) 2018-09-18 2019-09-18 Authenticating and authorizing users regarding physical goods

Country Status (1)

Country Link
US (2) US11216545B2 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11216545B2 (en) * 2018-09-18 2022-01-04 Paul Atkinson Authenticating and authorizing users regarding physical goods
US20220392650A1 (en) * 2019-09-18 2022-12-08 Walgreen Co. Communication mode selection based upon user context for prescription processes
US11537800B1 (en) 2020-05-08 2022-12-27 Walgreen Co. Automated sig code translation using machine learning

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120245941A1 (en) * 2011-03-21 2012-09-27 Cheyer Adam J Device Access Using Voice Authentication
US20160354283A1 (en) * 2015-06-03 2016-12-08 Nuvizen Sensor-based medication systems
US20180280243A1 (en) * 2017-04-04 2018-10-04 Laila Velani Smart vial interactive medication dosage dispensing system and method
US11216545B2 (en) * 2018-09-18 2022-01-04 Paul Atkinson Authenticating and authorizing users regarding physical goods

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120245941A1 (en) * 2011-03-21 2012-09-27 Cheyer Adam J Device Access Using Voice Authentication
US20160354283A1 (en) * 2015-06-03 2016-12-08 Nuvizen Sensor-based medication systems
US20180280243A1 (en) * 2017-04-04 2018-10-04 Laila Velani Smart vial interactive medication dosage dispensing system and method
US11216545B2 (en) * 2018-09-18 2022-01-04 Paul Atkinson Authenticating and authorizing users regarding physical goods

Also Published As

Publication number Publication date
US11216545B2 (en) 2022-01-04
US20210081517A1 (en) 2021-03-18

Similar Documents

Publication Publication Date Title
US20220058249A1 (en) Authenticating and authorizing users regarding physical goods
US10152582B2 (en) System and method for securing, and providing secured access to encrypted global identities embedded in a QR code
US20120109829A1 (en) Method and system for processing transactions using a token
US20200213302A1 (en) Providing verified claims of user identity
US20130124226A1 (en) Method and Apparatus for Coordinating Healthcare of Patients
US20140039912A1 (en) Controlled Communications Mobile Digital System for Physician-Healthcare System Integration
US20170213010A1 (en) Method and apparatus for a management system for user authentication and prescription refill verification
EP2788926A1 (en) System and method for verifying and managing distribution of products
US20160203527A1 (en) Authentication system and method to improve trust in public reviews
US20160162660A1 (en) Medication management
CN113316782A (en) Identity document verification
US11342054B2 (en) System using NFC-enabled medicine packaging to establish a no-login, authenticated and contextualized two-ways data flow between a patient and a pharmaceutical manufacturer
US20160188838A1 (en) Tracking device for audio playback
CN101707572A (en) Method and system for providing a customized network
Ajagbe et al. Design and development of an access control based electronic medical record (EMR)
US8612749B2 (en) Medical device rights and recall management system
JP2023524237A (en) Systems and methods for medical injectors and injection management platforms
US20230376581A1 (en) Systems and methods for a connected computing resource and event/activity identification information infrastructure using near existential or existential biometric identification of humans
WO2020061212A1 (en) Authenticating and authorizing users regarding physical goods
US20220301667A1 (en) Computer system, method, and device for verifying an immunization status
US10847258B2 (en) System, methods, and apparatuses for medication records tracking
US20160188714A1 (en) Tracking device for audio playback
CN100543695C (en) The method and system of customized network is provided
US20160189567A1 (en) Tracking device for audio playback
Rudin et al. Defining and evaluating patient-empowered approaches to improving record matching

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: CHROMERA, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ATKINSON, PAUL;DONNER, JOHN;SIGNING DATES FROM 20210808 TO 20220502;REEL/FRAME:062665/0575

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE