US20240021036A1 - Wearable data transmission device and method - Google Patents

Wearable data transmission device and method Download PDF

Info

Publication number
US20240021036A1
US20240021036A1 US18/473,735 US202318473735A US2024021036A1 US 20240021036 A1 US20240021036 A1 US 20240021036A1 US 202318473735 A US202318473735 A US 202318473735A US 2024021036 A1 US2024021036 A1 US 2024021036A1
Authority
US
United States
Prior art keywords
emotion
electronic message
data structure
graphical representations
recipient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/473,735
Inventor
Edward John McLEAR
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
McLEAR Ltd
Original Assignee
McLEAR Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by McLEAR Ltd filed Critical McLEAR Ltd
Priority to US18/473,735 priority Critical patent/US20240021036A1/en
Publication of US20240021036A1 publication Critical patent/US20240021036A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/04Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the shape
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07758Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
    • G06K19/07762Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag the adhering arrangement making the record carrier wearable, e.g. having the form of a ring, watch, glove or bracelet
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07766Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card comprising at least a second communication arrangement in addition to a first non-contact communication arrangement
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/385Transceivers carried on the body, e.g. in helmets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/385Transceivers carried on the body, e.g. in helmets
    • H04B2001/3861Transceivers carried on the body, e.g. in helmets carried in a hand or on fingers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces

Definitions

  • the present disclosure relates generally to security devices and methods, and more particularly, to cell phone and digital door lock communication.
  • a wearable device transfers information/data and/or provides access control to limited access areas and/or/data.
  • Standard door keys are frequently lost and can be difficult to operate if one struggles with physical motor control.
  • Traditional door lock and access control technologies lack reliability, security and simplicity.
  • Traditional door locks have many major faults. For example, a) it is incredibly easy to replicate a key and to use that on a current door lock, b) traditional door keys are cumbersome and often uncomfortable to keep on your person, c) if you lose your traditional door key it is necessary to change the entire locking mechanism to ensure security.
  • the present disclosure relates to a wearable accessory that utilizes a radio frequency (RF) tag to perform the transfer of information between digital devices.
  • a wearable accessory may also function as an access control mechanism for digital locks.
  • wearable radio devices may be used for gaining access to secured locations.
  • the present disclosure provides an apparatus and method for public and private transponder access through a wearable device such as a ring.
  • radio frequency identification tags inlaid within a wearable accessory that has distinct public and private functions which allow the wearer to share or transfer information as well as provide access control to digital locks.
  • the present disclosure relates to a wearable radio device for access control.
  • the radio device has an inside portion and an outside portion.
  • the inside portion may include a first transponder and a second transponder.
  • a first barrier is located between the first transponder and the second transponder.
  • a second barrier is located between the first transponder and the second transponder in an outside portion of the wearable device.
  • an apparatus for access control including a ring and a digital lock
  • the ring may include a private component and a public component, an RFID public transponder located inside the ring, an RFID private transponder located inside the ring, an inner barrier located on an inner layer of the ring between the public transponder and the private transponder, an outer barrier on an outside layer of the ring between the public transponder and the private transponder and a first hand gesture and a second hand gesture.
  • the ring may be configured to unlock the digital lock.
  • a first hand gesture may be used for access to the public transponder and a second hand gesture is used for access to the private transponder.
  • a Smartphone system in another embodiment, includes a processor and a memory for communicating with a wearable device comprising, an action generator operating on the Smartphone system and configured to write a plurality of actions to a public transponder and a private transponder, a scanning component operating on the action generator and configured to scan a QR code from a web application and write an action. The scanning component writes the action to the wearable device.
  • FIG. 1 illustrates a Back View of a private gesture (open palmed) for providing access to private data transmitted from a wearable device in the form of a ring, in accordance with an embodiment of the present invention
  • FIG. 2 illustrates a Side View of a private gesture (open palmed) interacting with a target device in accordance with an embodiment of the present invention
  • FIG. 3 illustrates a Front View of the embodiment of FIGS. 1 and 2 ;
  • FIG. 4 illustrates a Back View of a public gesture (closed handed) for providing access to public data transmitted from one embodiment of a wearable device
  • FIG. 5 illustrates a Side View of a public gesture interacting with a target device of FIG. 4 ;
  • FIG. 6 illustrates a Front View of a public gesture of FIGS. 4 and 5 ;
  • FIG. 7 is a front view illustration of an embodiment of internal components of a wearable device in the form of a ring that communicates access data;
  • FIG. 8 is a side view illustration of an embodiment of internal components a wearable device in the form of a ring that communicates access data;
  • FIG. 9 is a side view of the internal components of an embodiment of a wearable device.
  • FIG. 10 illustrates the welcome screen of the mobile/tablet application in accordance with an embodiment of the present invention
  • FIG. 11 illustrates the write screen of the mobile/tablet application in accordance with an embodiment of the present invention.
  • FIG. 12 illustrates how a wearer may interact with a target device in accordance with an embodiment of the present invention.
  • Wearing this device provides the wearer with a “key” that is always available and extremely difficult to lose. However, if the device is lost, access may be immediately removed through configuration such as configuring the master system (i.e. a system capable of communicating with the wearable device) such as a Smartphone, computer, a device with a processor and a memory, etc. Additionally, if security is breached, the wearable device may be reset or reconfigured with new/different access configuration. For example.
  • a wearable device 110 (shown as a ring) may require no charge so it is completely sustainable. Traditional door lock and access control technology lack this reliability, security and simplicity.
  • the wearable device 110 interacts with a digital door lock 120 (target) providing an unlock mechanism.
  • the wearable device may be used to unlock a cell phone or other portable device by holding one's hand under a section of their electronic device (target) the wearer is able to unlock their electronic device and gain access without any requirements of additional authentication mechanisms.
  • the wearer utilizes a specific location on the target device defined as a (“Sweet spot”). Utilizing a sweet spot provides a different mechanism for sharing data as the user has to be in touch distance of the target device. Common sharing methods such as WIFI/UHF RFID are capable of reading the data from distant places.
  • the “Sweet Spot” approach means the wearer must have the device properly oriented and be within a ⁇ 10 mm range.
  • the wearer is able to easily tap their device to a specific surface area on the target device where the device will create induction (“Sweet Spot”) on a Near Field Communication (“NFC”) enabled cell phone or tablet device (“target”).
  • the target device Upon tapping, the target device is notified and takes actions that are target device specific.
  • This “Sweet Spot” is preferably limited to an area where the wearers hand is not usually placed during standard use such as in the middle of a cell phone. This is to prevent unexpected induction and communication.
  • the “Sweet Spot” can be identified and located by a “Sweet Spot” sticker for example. If a device is held up to a target device's “Sweet Spot” then coupling occurs and the communication process begins.
  • a target device manufacturer may decide where the “Sweet Spot” is located during target device antenna design; the wearer locates the “Sweet Spot” and uses the “Sweet Spot” when using the device.
  • the “Sweet Spot” will vary in size and shape depending on the antenna design implemented on the target device and the device worn by the wearer.
  • Private gestures are designed to be used in higher security applications such as authentication or any other situation that requires a higher level of security/screening, the device achieves this by ensuring the private portion of the device is difficult for a third party to access without the consent of the wearer.
  • Public gestures are used in lower security applications such as sharing of non-sensitive information, the public portion of the device is designed to be relatively easy for a third party to access.
  • FIG. 1 an exemplary back view of a private gesture (open palmed) for providing access to private data transmitted from a wearable device in the form of a ring is illustrated.
  • a device 110 functions in accordance with a private gesture 100 for transferring data or the exchange of private/secure information in combination with target device 120 (shown in FIG. 2 ). As described herein, this combination may be configured by a user of device 110 .
  • the device 110 may be worn on any finger or on the wrist.
  • the wearable ring communicates with NFC Enabled devices such as digital door locks, cell phones and tablet computers and can be used for several tasks. Each task has a different level of“security” depending on the wearer's preference. If a task is “high security” such as unlocking a door or providing other means of access control, it is likely that the wearer will choose to keep this task private. To accomplish privacy the wearer will write the “action” or assign the action to a bottom portion of the ring, or another portion of the ring designated for high security. This portion of the ring may be a smaller portion, the same size, or larger than other portions.
  • the bottom portion of the ring will be the “Private” portion and is worn at the bottom of the hand requiring an open hand gesture to share the information.
  • An invention is “assigned” to a target device if the target device does not require an action to be written but instead pairs with the device through using the devices Unique Identifier (“ID”) or Unique Text String Value. If a task is “low security” such as sharing a public social network address then the wearer may store this “action” on the “Public” portion of the device. The public portion of the device is frequently exposed to public viewing and can be accessed much easier.
  • the hand gesture for sharing public information is to use a clenched fist and do a “punch” or “fist bump” style action.
  • the device will have two Radio Frequency Identifiers (“RFID”) transponders with a standard of ISO14443A operating at a frequency of 13.56 Mhz.
  • RFID Radio Frequency Identifiers
  • the transponders will conform to the NFC standard ergo including NFC Data Exchange Format (“NDEF”) records that can be used to read/write data.
  • NDEF NFC Data Exchange Format
  • the read distance is preferably between 0 mm and 5 mm.
  • the device will have to be touched on a specific portion of the target device.
  • the ring will have a public and private portion.
  • wearers will be able to write data to the public and private portions of the device using a cell phone application ( FIG. 9 ) or NFC reader/writer.
  • the application may be used on a number of mobile devices such as standard smart phones and tablets and can easily be modified to be compatible with new technologies.
  • the application is not limited purely to mobile devices.
  • Physical gestures may be used for data access. For example, wearers may use an open hand gesture to share private information ( FIG. 1 ) and a closed hand gesture to share public information ( FIG. 4 ).
  • the disclosure is not limited to physical gestures.
  • Other options are also possible to share data/data access depending on the device and technologies available.
  • two metal bands and a shielding layer FIG. 7
  • materials other than metal may be appropriate. For example, ceramic may be used.
  • FIG. 2 illustrates a Side View of a private gesture (open palmed/open hand) 200 for sharing private information, interacting with a target device 120 .
  • the open palm gesture 200 allows access to the private portion of the device 110 .
  • a target device 120 such as a digital door lock or cell phone could be unlocked using this gesture.
  • FIG. 3 illustrates a front view of the embodiment of FIGS. 1 and 2 ; i.e. the open palm/hand gesture used for sharing private information.
  • the open palm gesture 300 allows access to the private portion of the device 110 .
  • a target device 120 such as a digital door lock or cell phone could be unlocked using this gesture.
  • FIG. 4 illustrates a back view of a public gesture 400 (closed handed) for providing access to public data transmitted from the wearable device.
  • the public gesture 400 used for sharing public information is a clenched fist.
  • a fist bump, pump or touch gesture is when a wearer clenches their fist, holds their extended arm at shoulder height and projects the public portion of their device at a target device.
  • a closed hand, fist bump, pump or touch gesture allows access to the public portion of the device 110 .
  • a target device 120 such as a cell phone, laptop or tablet would use the device to access information such as a URL, WIFI key, Latitude/Longitude etc.
  • FIG. 5 illustrates a Side View of a public gesture 500 interacting with the target device of FIG. 4 .
  • the side view of the closed hand/clenched first gesture is used for sharing Public information.
  • the closed hand, fist bump, pump or touch gesture allows access to the public portion of the device 110 .
  • a target device 120 such as a cell phone, laptop or tablet would use the device to access information such as a URL, WIFI key, Latitude/Longitude etc.
  • FIG. 6 illustrates a Front View of a public gesture (illustrated by a clenched fist gesture) of FIGS. 4 and 5 .
  • the Closed hand/clenched fist gesture 500 is used for sharing Public information.
  • the closed hand, fist bump, pump or touch gesture 500 allows access to the public portion of the device 110 .
  • a target device 120 such as a cell phone, laptop or tablet would use the device to access information such as a URL, WIFI key, Latitude/Longitude etc.
  • FIG. 7 is a front view illustration of an embodiment of the internal components 700 of one example of a wearable device in the form of a ring that communicates access data.
  • the internal components 700 include public transponder 710 , shielding material 720 and 760 , metal 730 and 750 , and private transponder 770 .
  • the shielding material may be flexible graphite or polymer or any other suitable material. The shielding material may prevent failed induction and radio interference. In one embodiment, RFID signals can not pass from one side of the ring to the other (i.e. through the middle). In another embodiment, shielding material 720 and 760 are not necessary. Additionally, metal 730 and 750 can be of different material such as ceramic. In another embodiment, metal is replaced by ceramic and the shielding material is unnecessary. Various combinations of the above are also possible.
  • the transponders 710 and 770 are 0.13 mm thick slightly set into the inlay cover and passive RFID layer at the point of contact with the public transponder Chip 710 and the public transponder Chip 770 (in one embodiment, the public transponder chip 770 is an NTAG 203 Chip). In another embodiment, the transponder chip is an NTAG 216 or any other applicable chip.
  • the Inlay cover may be an aesthetic colored layer designed to provide customization for the device. Referring briefly to FIG. 9 , layers 910 and 920 may also be merged. In that case, instead of having a cover and a clear coat, a color pigment may be used in the clear coat. This method could save space. In this embodiment, an NT AG 216 chip may be used, but again, any other applicable chip such as the NTAG 203 may be used.
  • the inlay cover is either printed paper, a carbon fiber replica material or in some instances not required.
  • the Shielding 720 and 760 is 0.15 mm thick.
  • the Metal 740 is 0.7 mm thick at the core and 1.5 mm thick on the outer rim of the device.
  • the living being or void is >5 mm.
  • the Metal 730 & 750 portion runs from the inside to the outside of the device between the two inlays 710 & 770 .
  • the living being is represented here as a human's finger because the device may be worn around the finger.
  • the metal in this embodiment is represented by Titanium. However, ceramic aswell or another appropriate material may be used as an alternative to metal 730 and 750 .
  • FIG. 8 is a side view illustration of one embodiment of internal components 800 of a wearable device in the form of a ring that communicates access data.
  • the Public and Private Transponder 710 and 770 respectively are covered by a clear passive RFID material and also potentially an inlay cover.
  • the clear passive RFID layer is ⁇ 0.5 mm thick
  • the inlay cover another 0.5 mm
  • the transponders 710 and 770 are 0.13 mm thick slightly set into the inlay cover and passive RFID layer at the point of contact with the transponder Chip 710 & 770 (In this case an NTAG 203 chip).
  • the Shielding 760 is 0.15 mm thick.
  • the Metal 730 & 750 is 1 mm thick at the core and 1.5 mm thick on the outer rim of the device.
  • the living being or void 740 is >5 mm.
  • the Metal 730 and 750 portion runs from the inside to the outside of the device between the two inlays 710 & 770 .
  • the measurements above are merely an example for illustrative purpose. Other measurements are also possible.
  • FIG. 9 is a side view of the internal components of the device.
  • the Public and Private Transponder 770 is covered by a clear passive RFID material 910 and also potentially an inlay cover 920 .
  • the clear passive RFID material 910 is ⁇ 0.5 mm thick
  • the transponders 770 are 0.13 mm thick slightly set into the inlay cover and passive RFID layer 910 at the point of contact with the transponder Chip (in this case an NTAG 203 Chip) 770 .
  • the Shielding/Reflective Material 760 is 0.15 mm thick.
  • the Metal 730 is 1 mm thick at the core and 1.5 mm thick on the outer rim of the device.
  • the living being or void is >5 mm.
  • the metal portion 730 runs from the inside to the outside of the device between the two inlays 770 this portion is not exclusive to metal, other materials such as ceramics may be used.
  • the measurements above are merely an example for illustrative purpose. Other measurements are also possible.
  • FIG. 10 illustrates the welcome screen of the mobile/tablet application 900 .
  • the write screen is used to write information or settings to the device.
  • Screenshot 1000 illustrates action options of a cell phone and a tablet application used to read and write actions to the device.
  • the device is capable of working with new radio enabled target devices and new software applications as they are made available.
  • the write screen 1000 is user friendly and a display that includes a guidance 1010 such as “what do you want your ring to do.”
  • the available actions are facebook 1020 , website 1030 , etherpad 1040 , clone ring 1050 , and twitter 1060 .
  • the device is designed to work with the ISO 14443 Protocol which provides a standard for communicating between RFID enabled devices.
  • clone ring 1050 may be used to copy the data from that ring to another ring.
  • a sweet spot location representation is displayed as a heatmap 1170
  • the heatmap 1170 may be a colored visual representation that shows where a user can interact with the device 1140 . By interacting with the location specified with the action the user will be interacting with the device 1040 sweet spot.
  • the heatmap 1170 of the sweet spot location is displayed on the screen of the device 1140 .
  • the guidance 1130 provides potential actions a user can write to the device 1140 .
  • guidance 1130 may guide the user to hold the NFC Ring 1150 to the back of their deice 1140 in a specific location 1170 .
  • the mobile/tablet or other Smartphone/system (“system”) with a processor and a memory is capable of communicating with a wearable device and configuration of the wearable device through a software application, programmable code, media such as a CDROM or a USB drive.
  • the system may include an action generator that is configured to write a plurality of actions to a public transponder and a private transponder.
  • the system may also include a scanning component that may operate on the action generator and be configured to scan a QR code (or other code) from a web application and write an action. The scanning component may write the actions to the wearable device.
  • FIG. 11 illustrates a write screen/how a device interacts with a target.
  • Screenshot 1100 illustrating a prompt 1030 and device 1140 to the wearer to hold their device up to of the cell Phone and tablet application used to read and write actions to the device.
  • Heatmap 1070 represents the sweet spot on the target device.
  • FIG. 12 illustrates an example of flow diagram of using a device (here, a ring).
  • the process begins S 1201 by the user wearing a ring in accordance with this disclosure.
  • the wearer aligns their ring with private portion to the base of his/her hand and the public portion to the top of his/her hand.
  • the wearer decides if the security action requires the private portion S 1204 a or the public portion S 1204 b of the device. If the public portion 1204 a is required, the wearer moves to step S 1205 a and clinches/closes their fist.
  • step S 1205 b the wearer moves to step S 1205 b and opens their hand or exposes their palm.
  • step S 1206 the wearer moves the device to the target device and exposes the correct portion of the device to the target, i.e. either by clenching/closing their fist or an open hand gesture.

Abstract

The present disclosure relates to a wearable radio device for access control. The radio device has an inside portion and an outside portion. The inside portion includes a first transponder and a second transponder. A first barrier is located between the first transponder and the second transponder. A second barrier is located between the first transponder and the second transponder in an outside portion of the wearable device.

Description

    RELATED APPLICATIONS
  • The present patent document claims the benefit of the filing date under 35 U.S.C. § 119(e) of Provisional U.S. Patent Application Ser. No. 61/863,141 filed Aug. 7, 2013, which is hereby incorporated by reference.
  • BACKGROUND OF THE INVENTION Field of the Invention
  • The present disclosure relates generally to security devices and methods, and more particularly, to cell phone and digital door lock communication. A wearable device transfers information/data and/or provides access control to limited access areas and/or/data.
  • Description of Related Art
  • Standard door keys are frequently lost and can be difficult to operate if one struggles with physical motor control. Traditional door lock and access control technologies lack reliability, security and simplicity. Traditional door locks have many major faults. For example, a) it is incredibly easy to replicate a key and to use that on a current door lock, b) traditional door keys are cumbersome and often uncomfortable to keep on your person, c) if you lose your traditional door key it is necessary to change the entire locking mechanism to ensure security.
  • While there are numerous iterations of access control tools from the traditional metal key to card keys and key fobs, such tools are prone to being lost or misplaced. Traditional keys including the examples above have several major faults. They can be easily replicated, easily misplaced or lost, and are cumbersome to store on your person. In the case of metal keys, other accessories they are stored with may be scratched or otherwise harmed. If a traditional key is lost, misplaced or stolen, it is often a security necessity to change the entire locking mechanism.
  • SUMMARY OF THE INVENTION
  • The present disclosure relates to a wearable accessory that utilizes a radio frequency (RF) tag to perform the transfer of information between digital devices. A wearable accessory may also function as an access control mechanism for digital locks.
  • In accordance with the present disclosure, wearable radio devices may be used for gaining access to secured locations. In one example, the present disclosure provides an apparatus and method for public and private transponder access through a wearable device such as a ring.
  • Furthermore, the use of radio frequency identification tags inlaid within a wearable accessory that has distinct public and private functions which allow the wearer to share or transfer information as well as provide access control to digital locks.
  • In one example, the present disclosure relates to a wearable radio device for access control. In one embodiment, the radio device has an inside portion and an outside portion. The inside portion may include a first transponder and a second transponder. A first barrier is located between the first transponder and the second transponder. A second barrier is located between the first transponder and the second transponder in an outside portion of the wearable device.
  • In another embodiment, an apparatus for access control including a ring and a digital lock is disclosed. The ring may include a private component and a public component, an RFID public transponder located inside the ring, an RFID private transponder located inside the ring, an inner barrier located on an inner layer of the ring between the public transponder and the private transponder, an outer barrier on an outside layer of the ring between the public transponder and the private transponder and a first hand gesture and a second hand gesture. The ring may be configured to unlock the digital lock. A first hand gesture may be used for access to the public transponder and a second hand gesture is used for access to the private transponder.
  • In another embodiment, a Smartphone system is disclosed. The Smartphone system includes a processor and a memory for communicating with a wearable device comprising, an action generator operating on the Smartphone system and configured to write a plurality of actions to a public transponder and a private transponder, a scanning component operating on the action generator and configured to scan a QR code from a web application and write an action. The scanning component writes the action to the wearable device.
  • It should be noted that this disclosure is not limited to accessories worn but includes other embodiments including clothing, accessories such as handbags, for example, transient accessories, or any item having the potential to become wearable technology. Thus, all embodiments that use the concepts disclosed herein are also included.
  • BRIEF DESCRIPTION OF THE DRAWINGS (NON-LIMITING EMBODIMENTS OF THE DISCLOSURE)
  • FIG. 1 illustrates a Back View of a private gesture (open palmed) for providing access to private data transmitted from a wearable device in the form of a ring, in accordance with an embodiment of the present invention;
  • FIG. 2 illustrates a Side View of a private gesture (open palmed) interacting with a target device in accordance with an embodiment of the present invention;
  • FIG. 3 illustrates a Front View of the embodiment of FIGS. 1 and 2 ;
  • FIG. 4 illustrates a Back View of a public gesture (closed handed) for providing access to public data transmitted from one embodiment of a wearable device;
  • FIG. 5 illustrates a Side View of a public gesture interacting with a target device of FIG. 4 ;
  • FIG. 6 illustrates a Front View of a public gesture of FIGS. 4 and 5 ;
  • FIG. 7 is a front view illustration of an embodiment of internal components of a wearable device in the form of a ring that communicates access data;
  • FIG. 8 is a side view illustration of an embodiment of internal components a wearable device in the form of a ring that communicates access data;
  • FIG. 9 is a side view of the internal components of an embodiment of a wearable device;
  • FIG. 10 illustrates the welcome screen of the mobile/tablet application in accordance with an embodiment of the present invention;
  • FIG. 11 illustrates the write screen of the mobile/tablet application in accordance with an embodiment of the present invention; and
  • FIG. 12 illustrates how a wearer may interact with a target device in accordance with an embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE DRAWINGS AND THE PRESENTLY PREFERRED EMBODIMENTS
  • Reference will now be made to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific exemplary embodiments. The principles described herein may, however, be embodied in many different forms. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention. Moreover, in the figures, like referenced numerals may be placed to designate corresponding parts throughout the different views.
  • Wearing this device provides the wearer with a “key” that is always available and extremely difficult to lose. However, if the device is lost, access may be immediately removed through configuration such as configuring the master system (i.e. a system capable of communicating with the wearable device) such as a Smartphone, computer, a device with a processor and a memory, etc. Additionally, if security is breached, the wearable device may be reset or reconfigured with new/different access configuration. For example. A wearable device 110 (shown as a ring) may require no charge so it is completely sustainable. Traditional door lock and access control technology lack this reliability, security and simplicity. In a version, the wearable device 110 interacts with a digital door lock 120 (target) providing an unlock mechanism. In another version, the wearable device may be used to unlock a cell phone or other portable device by holding one's hand under a section of their electronic device (target) the wearer is able to unlock their electronic device and gain access without any requirements of additional authentication mechanisms.
  • Common technical tasks such as providing WIFI information, Universal Resource Locators (“URLs”), GeoLocation and other social media is often a problematic task that requires a form of communication that is more often than not, a third party service such as e-mail. This disclosure is intended to resolve this issue, among others, by providing a simple mechanism to sham data “over the air.”
  • To accomplish these tasks the wearer utilizes a specific location on the target device defined as a (“Sweet spot”). Utilizing a sweet spot provides a different mechanism for sharing data as the user has to be in touch distance of the target device. Common sharing methods such as WIFI/UHF RFID are capable of reading the data from distant places. In one example, the “Sweet Spot” approach means the wearer must have the device properly oriented and be within a <10 mm range.
  • In one embodiment, the wearer is able to easily tap their device to a specific surface area on the target device where the device will create induction (“Sweet Spot”) on a Near Field Communication (“NFC”) enabled cell phone or tablet device (“target”). Upon tapping, the target device is notified and takes actions that are target device specific. This “Sweet Spot” is preferably limited to an area where the wearers hand is not usually placed during standard use such as in the middle of a cell phone. This is to prevent unexpected induction and communication. The “Sweet Spot” can be identified and located by a “Sweet Spot” sticker for example. If a device is held up to a target device's “Sweet Spot” then coupling occurs and the communication process begins. A target device manufacturer may decide where the “Sweet Spot” is located during target device antenna design; the wearer locates the “Sweet Spot” and uses the “Sweet Spot” when using the device. The “Sweet Spot” will vary in size and shape depending on the antenna design implemented on the target device and the device worn by the wearer.
  • Private gestures are designed to be used in higher security applications such as authentication or any other situation that requires a higher level of security/screening, the device achieves this by ensuring the private portion of the device is difficult for a third party to access without the consent of the wearer. Public gestures are used in lower security applications such as sharing of non-sensitive information, the public portion of the device is designed to be relatively easy for a third party to access.
  • Referring now to FIG. 1 , an exemplary back view of a private gesture (open palmed) for providing access to private data transmitted from a wearable device in the form of a ring is illustrated. A device 110 functions in accordance with a private gesture 100 for transferring data or the exchange of private/secure information in combination with target device 120 (shown in FIG. 2 ). As described herein, this combination may be configured by a user of device 110. In FIG. 1 , the device 110 may be worn on any finger or on the wrist.
  • In an embodiment, the wearable ring communicates with NFC Enabled devices such as digital door locks, cell phones and tablet computers and can be used for several tasks. Each task has a different level of“security” depending on the wearer's preference. If a task is “high security” such as unlocking a door or providing other means of access control, it is likely that the wearer will choose to keep this task private. To accomplish privacy the wearer will write the “action” or assign the action to a bottom portion of the ring, or another portion of the ring designated for high security. This portion of the ring may be a smaller portion, the same size, or larger than other portions. In this case the bottom portion of the ring will be the “Private” portion and is worn at the bottom of the hand requiring an open hand gesture to share the information. An invention is “assigned” to a target device if the target device does not require an action to be written but instead pairs with the device through using the devices Unique Identifier (“ID”) or Unique Text String Value. If a task is “low security” such as sharing a public social network address then the wearer may store this “action” on the “Public” portion of the device. The public portion of the device is frequently exposed to public viewing and can be accessed much easier. The hand gesture for sharing public information is to use a clenched fist and do a “punch” or “fist bump” style action.
  • One example of the device will have two Radio Frequency Identifiers (“RFID”) transponders with a standard of ISO14443A operating at a frequency of 13.56 Mhz. In this example, the transponders will conform to the NFC standard ergo including NFC Data Exchange Format (“NDEF”) records that can be used to read/write data. Here, the read distance is preferably between 0 mm and 5 mm. The device will have to be touched on a specific portion of the target device. The ring will have a public and private portion. In one example, wearers will be able to write data to the public and private portions of the device using a cell phone application (FIG. 9 ) or NFC reader/writer. The application may be used on a number of mobile devices such as standard smart phones and tablets and can easily be modified to be compatible with new technologies. The application is not limited purely to mobile devices. Physical gestures may be used for data access. For example, wearers may use an open hand gesture to share private information (FIG. 1 ) and a closed hand gesture to share public information (FIG. 4 ). The disclosure is not limited to physical gestures. Other options are also possible to share data/data access depending on the device and technologies available. In one embodiment of the device, two metal bands and a shielding layer (FIG. 7 ) act as shields between the public and private sections, these shields, serve the purpose of blocking any potential radio leaks and negate any induction from a target device trying to induct the metal at the core of the device. In other embodiments, materials other than metal may be appropriate. For example, ceramic may be used.
  • FIG. 2 illustrates a Side View of a private gesture (open palmed/open hand) 200 for sharing private information, interacting with a target device 120. The open palm gesture 200 allows access to the private portion of the device 110. A target device 120 such as a digital door lock or cell phone could be unlocked using this gesture.
  • FIG. 3 illustrates a front view of the embodiment of FIGS. 1 and 2 ; i.e. the open palm/hand gesture used for sharing private information. The open palm gesture 300 allows access to the private portion of the device 110. A target device 120 such as a digital door lock or cell phone could be unlocked using this gesture.
  • FIG. 4 illustrates a back view of a public gesture 400 (closed handed) for providing access to public data transmitted from the wearable device. In this example, the public gesture 400 used for sharing public information is a clenched fist. A fist bump, pump or touch gesture is when a wearer clenches their fist, holds their extended arm at shoulder height and projects the public portion of their device at a target device. In one example, a closed hand, fist bump, pump or touch gesture allows access to the public portion of the device 110. A target device 120 such as a cell phone, laptop or tablet would use the device to access information such as a URL, WIFI key, Latitude/Longitude etc.
  • FIG. 5 illustrates a Side View of a public gesture 500 interacting with the target device of FIG. 4 . Here, the side view of the closed hand/clenched first gesture is used for sharing Public information. The closed hand, fist bump, pump or touch gesture allows access to the public portion of the device 110. A target device 120 such as a cell phone, laptop or tablet would use the device to access information such as a URL, WIFI key, Latitude/Longitude etc.
  • FIG. 6 illustrates a Front View of a public gesture (illustrated by a clenched fist gesture) of FIGS. 4 and 5 . In this example, the Closed hand/clenched fist gesture 500 is used for sharing Public information. The closed hand, fist bump, pump or touch gesture 500 allows access to the public portion of the device 110. A target device 120 such as a cell phone, laptop or tablet would use the device to access information such as a URL, WIFI key, Latitude/Longitude etc.
  • FIG. 7 is a front view illustration of an embodiment of the internal components 700 of one example of a wearable device in the form of a ring that communicates access data. The internal components 700 include public transponder 710, shielding material 720 and 760, metal 730 and 750, and private transponder 770. The shielding material may be flexible graphite or polymer or any other suitable material. The shielding material may prevent failed induction and radio interference. In one embodiment, RFID signals can not pass from one side of the ring to the other (i.e. through the middle). In another embodiment, shielding material 720 and 760 are not necessary. Additionally, metal 730 and 750 can be of different material such as ceramic. In another embodiment, metal is replaced by ceramic and the shielding material is unnecessary. Various combinations of the above are also possible.
  • In a version of the device, the transponders 710 and 770 are 0.13 mm thick slightly set into the inlay cover and passive RFID layer at the point of contact with the public transponder Chip 710 and the public transponder Chip 770 (in one embodiment, the public transponder chip 770 is an NTAG 203 Chip). In another embodiment, the transponder chip is an NTAG 216 or any other applicable chip. The Inlay cover may be an aesthetic colored layer designed to provide customization for the device. Referring briefly to FIG. 9 , layers 910 and 920 may also be merged. In that case, instead of having a cover and a clear coat, a color pigment may be used in the clear coat. This method could save space. In this embodiment, an NT AG 216 chip may be used, but again, any other applicable chip such as the NTAG 203 may be used. The inlay cover is either printed paper, a carbon fiber replica material or in some instances not required.
  • The Shielding 720 and 760 is 0.15 mm thick. The Metal 740 is 0.7 mm thick at the core and 1.5 mm thick on the outer rim of the device. The living being or void is >5 mm. The Metal 730 & 750 portion runs from the inside to the outside of the device between the two inlays 710 & 770. The living being is represented here as a human's finger because the device may be worn around the finger. The metal in this embodiment is represented by Titanium. However, ceramic aswell or another appropriate material may be used as an alternative to metal 730 and 750.
  • FIG. 8 is a side view illustration of one embodiment of internal components 800 of a wearable device in the form of a ring that communicates access data. In this example, the Public and Private Transponder 710 and 770 respectively are covered by a clear passive RFID material and also potentially an inlay cover. In a version of the device, the clear passive RFID layer is ˜0.5 mm thick, the inlay cover another 0.5 mm, the transponders 710 and 770 are 0.13 mm thick slightly set into the inlay cover and passive RFID layer at the point of contact with the transponder Chip 710 & 770 (In this case an NTAG 203 chip). The Shielding 760 is 0.15 mm thick. The Metal 730 & 750 is 1 mm thick at the core and 1.5 mm thick on the outer rim of the device. The living being or void 740 is >5 mm. The Metal 730 and 750 portion runs from the inside to the outside of the device between the two inlays 710 & 770. The measurements above are merely an example for illustrative purpose. Other measurements are also possible.
  • FIG. 9 is a side view of the internal components of the device. In this example, the Public and Private Transponder 770 is covered by a clear passive RFID material 910 and also potentially an inlay cover 920. In a version of the device, the clear passive RFID material 910 is ˜0.5 mm thick, the inlay cover another 0.5 mm, the transponders 770 are 0.13 mm thick slightly set into the inlay cover and passive RFID layer 910 at the point of contact with the transponder Chip (in this case an NTAG 203 Chip) 770. The Shielding/Reflective Material 760 is 0.15 mm thick. The Metal 730 is 1 mm thick at the core and 1.5 mm thick on the outer rim of the device. The living being or void is >5 mm. In this example, the metal portion 730 runs from the inside to the outside of the device between the two inlays 770 this portion is not exclusive to metal, other materials such as ceramics may be used. Once again, the measurements above are merely an example for illustrative purpose. Other measurements are also possible.
  • FIG. 10 illustrates the welcome screen of the mobile/tablet application 900. The write screen is used to write information or settings to the device. Screenshot 1000 illustrates action options of a cell phone and a tablet application used to read and write actions to the device. The device is capable of working with new radio enabled target devices and new software applications as they are made available. The write screen 1000 is user friendly and a display that includes a guidance 1010 such as “what do you want your ring to do.” In the embodiment in FIG. 10 , the available actions are facebook 1020, website 1030, etherpad 1040, clone ring 1050, and twitter 1060. In one example, the device is designed to work with the ISO 14443 Protocol which provides a standard for communicating between RFID enabled devices. If data has already been written to a ring, clone ring 1050 may be used to copy the data from that ring to another ring. Referring briefly to FIG. 11 , a sweet spot location representation is displayed as a heatmap 1170, the heatmap 1170 may be a colored visual representation that shows where a user can interact with the device 1140. By interacting with the location specified with the action the user will be interacting with the device 1040 sweet spot. The heatmap 1170 of the sweet spot location is displayed on the screen of the device 1140.
  • The guidance 1130 provides potential actions a user can write to the device 1140. For example, guidance 1130 may guide the user to hold the NFC Ring 1150 to the back of their deice 1140 in a specific location 1170.
  • The mobile/tablet or other Smartphone/system (“system”) with a processor and a memory is capable of communicating with a wearable device and configuration of the wearable device through a software application, programmable code, media such as a CDROM or a USB drive. The system may include an action generator that is configured to write a plurality of actions to a public transponder and a private transponder. The system may also include a scanning component that may operate on the action generator and be configured to scan a QR code (or other code) from a web application and write an action. The scanning component may write the actions to the wearable device.
  • FIG. 11 illustrates a write screen/how a device interacts with a target. Screenshot 1100 illustrating a prompt 1030 and device 1140 to the wearer to hold their device up to of the cell Phone and tablet application used to read and write actions to the device. Heatmap 1070 represents the sweet spot on the target device.
  • FIG. 12 illustrates an example of flow diagram of using a device (here, a ring). The process begins S1201 by the user wearing a ring in accordance with this disclosure. Next, at the alignment step S1202, the wearer aligns their ring with private portion to the base of his/her hand and the public portion to the top of his/her hand. Next, at step S1203, the wearer decides if the security action requires the private portion S1204 a or the public portion S1204 b of the device. If the public portion 1204 a is required, the wearer moves to step S1205 a and clinches/closes their fist. If the private portion 1204 b is required, the wearer moves to step S1205 b and opens their hand or exposes their palm. Finally, at step S1206, the wearer moves the device to the target device and exposes the correct portion of the device to the target, i.e. either by clenching/closing their fist or an open hand gesture.
  • While various embodiments of the invention have been described, it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible within the scope of the invention. Accordingly, the invention is not to be restricted.

Claims (6)

1. A system for assessment of emotional state comprising:
a non-transitory computer readable medium storing an emotion journaling application that causes a computer device to execute a method, the method comprising:
communicating with a database storing a list of names that part of an enterprise and obtain the list of names;
providing a user interface configured to allow creation of an electronic message, wherein the user interface is configured to:
allow selection of a message recipient from the list of employee names;
provide a list of emotion graphical representations;
allow selection of one or more emotion graphical representations or an odd number of emotion graphical representations greater than three from the list of emotion graphical representations;
provide a text area allowing a user of the computer device to input an entry in his or her own words;
make an electronic message transmittable to an electronic message processing system or the selected recipient when at least one message recipient has been selected, one or more emotion graphical representations have been selected, and a text entry has been inputted; and
make an electronic message available to the selected recipient, wherein the selected recipient can access the electronic message through an emotion journaling application on his or her computer device mobile device;
an electronic message processing system configured to receive messages created through the user interface and messages created through the user interfaces of the computer devices with the emotion journaling application, the electronic message processing system comprising:
a post data structure configured to convey information in the created message;
an emotion icon data structure configured to convey emotion icon-related information;
a post and emotion mapping data structure configured to convey emotional state information based information in the post-data structure and information in the emotion-icon data structure, wherein the emotional state information is communicated to the computer device and used by the emotion journaling application to present individual, group-wide, or company-wide emotional state information over a period of time; and
a post-access data structure configured to make the electronic message available to the elected recipients based on information in the post-data structure, wherein the post-access data structure is used by recipient's emotion journaling application to make the electronic message available to the selected recipient.
2. A non-transitory computer readable medium storing an emotion journaling application that causes a computer system including a mobile device to execute a method, the method comprising:
providing a user interface configured to allow creation of an electronic message, wherein the providing comprising:
allowing selection of a message recipient from a list of individual names of an enterprise;
providing a list of emotion graphical representations;
allowing selection of one or more emotion graphical representations;
providing a text area allowing user of the mobile device input an entry in his own words;
making an electronic message transmittable to an electronic message processing system or the selected recipient when at least one message recipient has been selected, three or more emotion graphical representations have been selected, and a text entry has been inputted; and
making an electronic message available to the selected recipient, wherein the selected recipient can access the electronic message through an emotion journaling application on his mobile device; and
presenting individual, group-wide, or company-wide emotional state information over a period of time that includes the three selections of emotion graphical representations in the messages.
3. The non-transitory computer medium of claim 2, wherein the method further comprising:
providing an electronic message processing system configured to receive messages created through the user interface, wherein the providing comprising:
implementing a post and emotion mapping data structure configured to convey emotional state information based on information in a database storing electronic messages created through the user interface and information in a database storing emotion icons, wherein the emotional state information is communicated to the mobile device and used to present individual, group-wide, or company-wide emotional state information over a period of time; and
implementing a post access data structure configured to make the electronic message available to the selected recipients based on information in the database storing electronic messages created through the user interface, wherein the post access data structure is used by recipient's emotion journaling application to make the electronic message available to the selected recipient.
4. The system of claim 1, wherein the emotion graphical representations include a group of positive emotion graphical representations and a group of negative emotion graphical representations, wherein each representation in the positive group is associated with a positive numerical value and each representation in the negative group is associated with an equivalent negative numerical value.
5. The system of claim 2, wherein the emotion graphical representations include a group of positive emotion graphical representations and a group of negative emotion graphical representations, wherein each representation in the positive group is associated with a positive numerical value and each representation in the negative group is associated with an equivalent negative numerical value.
6. A computer-implemented method comprising:
communicating with a database storing a list of individual names that are part of enterprise and obtain the list of names;
providing a user interface configured to allow creation of an electronic message, wherein the user interface is configured to:
allow selection of a message recipient from the list of names;
provide a list of emotion graphical representations;
allow selection of one or more emotion graphical representations or an odd number of emotion graphical representations greater than three from the list of emotion graphical representations;
provide a text area allowing a user of the mobile device to input an entry in his own words;
make an electronic message transmittable to an electronic message processing system or the selected recipient when at least one message recipient has been selected, one or more of the emotion graphical representations have been selected, and a text entry has been inputted;
make an electronic message available to the selected recipient, wherein the selected recipient can access the electronic message through an emotion journaling application on his mobile device; and
present individual, group-wide, or company-wide emotional state information over a period of time based on messages created through the user interface and messages created through user interfaces of the other mobile devices with the emotion journaling application;
communicating with or establishing a system including:
a post data structure configured to convey information in the created message;
an emotion icon data structure configured to convey emotion icon-related information;
a post and emotion mapping data structure configured to convey emotional state information based information in the post-data structure and information in the emotion-icon data structure, wherein the emotional state information is communicated to the mobile device and used by the emotion journaling application to present individual, group-wide, and company-wide emotional state information over a period of time; and
a post-access data structure configured to make the electronic message available to the selected recipients based on information in the post-data structure, wherein the post-access data structure is used by recipient's emotion journaling application to make the electronic message available to the selected recipient.
US18/473,735 2013-08-07 2023-09-25 Wearable data transmission device and method Pending US20240021036A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/473,735 US20240021036A1 (en) 2013-08-07 2023-09-25 Wearable data transmission device and method

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US201361863141P 2013-08-07 2013-08-07
US14/319,151 US9805530B2 (en) 2013-08-07 2014-06-30 Wearable data transmission device and method
US15/795,950 US10553048B2 (en) 2013-08-07 2017-10-27 Wearable data transmission device and method
US16/780,786 US11100740B2 (en) 2013-08-07 2020-02-03 Wearable data transmission device and method
US17/409,392 US11769361B2 (en) 2013-08-07 2021-08-23 Wearable data transmission device and method
US18/473,735 US20240021036A1 (en) 2013-08-07 2023-09-25 Wearable data transmission device and method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US17/409,392 Continuation US11769361B2 (en) 2013-08-07 2021-08-23 Wearable data transmission device and method

Publications (1)

Publication Number Publication Date
US20240021036A1 true US20240021036A1 (en) 2024-01-18

Family

ID=52448140

Family Applications (5)

Application Number Title Priority Date Filing Date
US14/319,151 Active 2035-11-23 US9805530B2 (en) 2013-08-07 2014-06-30 Wearable data transmission device and method
US15/795,950 Active US10553048B2 (en) 2013-08-07 2017-10-27 Wearable data transmission device and method
US16/780,786 Active US11100740B2 (en) 2013-08-07 2020-02-03 Wearable data transmission device and method
US17/409,392 Active 2034-10-04 US11769361B2 (en) 2013-08-07 2021-08-23 Wearable data transmission device and method
US18/473,735 Pending US20240021036A1 (en) 2013-08-07 2023-09-25 Wearable data transmission device and method

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US14/319,151 Active 2035-11-23 US9805530B2 (en) 2013-08-07 2014-06-30 Wearable data transmission device and method
US15/795,950 Active US10553048B2 (en) 2013-08-07 2017-10-27 Wearable data transmission device and method
US16/780,786 Active US11100740B2 (en) 2013-08-07 2020-02-03 Wearable data transmission device and method
US17/409,392 Active 2034-10-04 US11769361B2 (en) 2013-08-07 2021-08-23 Wearable data transmission device and method

Country Status (1)

Country Link
US (5) US9805530B2 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102302350B1 (en) * 2014-06-02 2021-09-15 삼성전자 주식회사 Method and apparatus for providing the security function
US10108900B2 (en) 2014-10-18 2018-10-23 Chi Huynh Jewelry with security bezel for regulating near field communication with an embedded near field communication chip
EP3228019A4 (en) 2014-12-02 2018-08-08 Chi Huynh Purchasing, sharing and transferring ownership of digital music using authenticated data files from near field communication chips
CN104750396B (en) * 2015-03-09 2019-03-29 联想(北京)有限公司 A kind of control method and electronic equipment
USD786119S1 (en) * 2015-06-05 2017-05-09 Chi Huynh Ring with near field communication (NFC) technology
US11394377B2 (en) 2016-02-18 2022-07-19 The Johns Hopkins University Pulse ratio modulation
CN105809783A (en) * 2016-03-03 2016-07-27 陈健强 Automobile unlocking realization method based on gestures of intelligent bracelet and automobile unlocking realization system based on gestures of intelligent bracelet
GB2552654A (en) 2016-07-29 2018-02-07 Fifth Dimension Digital Ltd Near field communication ring
US10366220B2 (en) 2016-09-07 2019-07-30 Tokenize, Inc. System and method for supplying security information
EP3685314B1 (en) * 2017-09-20 2023-10-25 Avery Dennison Retail Information Services LLC Rfid wristband
EP3502835A1 (en) * 2017-12-20 2019-06-26 Nokia Technologies Oy Gesture control of a data processing apparatus
US10509994B1 (en) 2019-05-08 2019-12-17 Chi Huynh Ring for use in near field communication (NFC) and method of making same
DE102019130012A1 (en) * 2019-11-07 2021-05-12 Egf - Eduard G. Fidel Gmbh Ring-shaped jewelry item with RFID transponder
US11763288B2 (en) * 2020-05-18 2023-09-19 Galatea Technology LLC NFC-ring-based terminal-less payment system
DE102021107263A1 (en) * 2021-03-23 2022-09-29 Jochen Kuhn Jewelery with RFID transponders

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3881990A (en) 1971-11-24 1975-05-06 Waters Instr Inc Method of transporting and storing organs while retaining the organs in a viable condition
US7270353B2 (en) * 2003-02-24 2007-09-18 The European Community Multiple transponder seal device
US6970092B2 (en) * 2003-04-15 2005-11-29 Koninklijke Philips Electronics,N.V. Short range communication system
US8127984B2 (en) * 2003-06-13 2012-03-06 Varia Holdings Llc Emulated radio frequency identification
US7907732B2 (en) * 2004-03-29 2011-03-15 Intel Corporation Radio frequency identification tag lock and key
SG130071A1 (en) * 2005-08-31 2007-03-20 St Logitrack Pte Ltd Rf identification and security system
US20070204238A1 (en) * 2006-02-27 2007-08-30 Microsoft Corporation Smart Video Presentation
US9082117B2 (en) * 2008-05-17 2015-07-14 David H. Chin Gesture based authentication for wireless payment by a mobile electronic device
US8272281B2 (en) * 2008-11-11 2012-09-25 Fisher Controls International, Llc Remotely readable valve position indicators
KR20100109686A (en) * 2009-04-01 2010-10-11 삼성전자주식회사 Method for providing gui and multimedia device using the same
KR101332816B1 (en) * 2010-07-26 2013-11-27 주식회사 팬택 Augmented Reality Method and Apparatus for Providing Private Tag
EP2495690B1 (en) * 2011-03-01 2015-05-13 Nxp B.V. Transponder and method for monitoring access to application data in the transponder
US10223743B2 (en) * 2011-03-29 2019-03-05 Blackberry Limited Communication system providing near field communication (NFC) transaction features and related methods
WO2012135861A1 (en) * 2011-04-01 2012-10-04 Tony Lam Battery powered passive keyless entry system for premise entry
FR2976393B1 (en) * 2011-06-10 2013-08-30 Jw Jean UNIVERSAL LABELING SYSTEM INTEGRATING AT LEAST TWO LABELS
GB2504357B (en) * 2012-07-27 2016-03-02 Kiroco Ltd Jewellery with tag
US9495537B2 (en) * 2012-08-15 2016-11-15 Qualcomm Incorporated Adaptive observation of behavioral features on a mobile device
US8881990B2 (en) * 2012-09-07 2014-11-11 Endevr Llc System and method for quickly obtaining medical information
US10185416B2 (en) * 2012-11-20 2019-01-22 Samsung Electronics Co., Ltd. User gesture input to wearable electronic device involving movement of device
US9058550B2 (en) * 2013-01-04 2015-06-16 Google Technology Holdings LLC Mobile devices with RFID capabilities and corresponding memory write methods
US9460573B1 (en) * 2014-02-27 2016-10-04 Sprint Communications Company, L.P. Autonomous authentication of a reader by a radio frequency identity (RFID) device

Also Published As

Publication number Publication date
US9805530B2 (en) 2017-10-31
US20150042450A1 (en) 2015-02-12
US20180211459A1 (en) 2018-07-26
US20200349788A1 (en) 2020-11-05
US11100740B2 (en) 2021-08-24
US20210383630A1 (en) 2021-12-09
US10553048B2 (en) 2020-02-04
US11769361B2 (en) 2023-09-26

Similar Documents

Publication Publication Date Title
US20240021036A1 (en) Wearable data transmission device and method
US8995960B2 (en) Mobile device authentication
CN104156651B (en) Access control method and device for terminal
US10185883B2 (en) Mobile terminal and method for controlling same
TWI557628B (en) Method, electronic devices and computer readable medium for operating electronic device
US9467859B2 (en) Virtual key ring
Coskun et al. Near field communication (NFC): From theory to practice
CN103699825B (en) Display apparatus and method for operating the same
EP3065098A1 (en) Mobile terminal and method for controlling the same
CN105830013B (en) The task configuration method of electronic device and electronic device
US9881322B2 (en) Data transfer between mobile computing devices using short-range communication systems
KR102352391B1 (en) Mobile terminal and method for controlling the same
Bhushan et al. Security challenges for designing wearable and IoT solutions
CN107256353A (en) Possesses the display methods of privacy protection function
Voas et al. Human tagging
US20160364135A1 (en) Display device and controlling method thereof
CN107423585A (en) The concealed application method and system of a kind of application
CN107085678A (en) A kind of display methods and its terminal
CN107404484A (en) A kind of method, apparatus and system of mechanical release authority
CN107924446A (en) Secure computing system record transfer control
US9965661B2 (en) Sensory totem badge capable of transmitting individualized information
CN107592398A (en) A kind of intelligent information storage method and system
Jeong et al. An effective locking scheme of smart multimedia devices with convenience and enhanced security
CN107563162A (en) A kind of concealed unlocking method and system
CN205485778U (en) Protective housing of built -in card reader

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION