WO2013142740A1 - Peripheral device and method of its operation - Google Patents

Peripheral device and method of its operation Download PDF

Info

Publication number
WO2013142740A1
WO2013142740A1 PCT/US2013/033388 US2013033388W WO2013142740A1 WO 2013142740 A1 WO2013142740 A1 WO 2013142740A1 US 2013033388 W US2013033388 W US 2013033388W WO 2013142740 A1 WO2013142740 A1 WO 2013142740A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
peripheral device
mobile device
peripheral
Prior art date
Application number
PCT/US2013/033388
Other languages
French (fr)
Inventor
Nunuparov MARTYN
Original Assignee
Qmodule Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qmodule Inc. filed Critical Qmodule Inc.
Publication of WO2013142740A1 publication Critical patent/WO2013142740A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • H04M1/0274Details of the structure or mounting of specific components for an electrical connector module
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances

Definitions

  • peripheral carrier- means of information as an example of a convenient care of information about payments or discount card, the login/password information that must be entered in a variety of applications at mobile device, or as a separate storage of confidential information, which is downloaded from the "cloud" server 14 (Fig. 3).
  • carrier-means can work with NFC devices, it will be sufficient to bring it to the NFC reader of mobile device running the appropriate software at this device.
  • the carrier-means is a peripheral device with plug, it should be connected to the appropriate connector of mobile device to initiate data communication or data communication should be started manually after plug insertion.
  • the loss of the carrier-means is not dangerous because it is protected by a password authentication on a particular mobile device and it won't work with other devices without proper authorization.
  • Fig.6 schematically shows right and left telephone channels and microphone channel, serving for signal exchange between the peripheral device and the user's mobile device, according to the invention
  • Fig.8 schematically shows the peripheral device disposed in an audio input of the user's mobile device, an electronic lock exchanging information with the peripheral device, the "cloud” server and the second mobile device, according to the invention.
  • a simple peripheral device can play the function of the hardware interface interaction with the access control or authentication system, while having powerful support from the processor, software and other resources of the mobile device.
  • the performance of the power supply unit 6 can be varied and is determined by the required technical and price characteristics of the peripheral devices.
  • Peripheral device 2 that is designed to interact with external objects, such as access control systems and/or the user identification, should comprise an interface unit 9 that corresponds to technical specs (Fig. 5).
  • Electronic key consisting of a mobile device 1 and peripheral transceiver 2 (or

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

A peripheral device is disclosed, said device being configured to extend the functionality of a user's mobile device by coupling the peripheral device to an audio/digital connector of the user's mobile device, said peripheral device comprising: a body in which there are placed: a power supply unit; an electronic means configured to exchange electrical signals with the user's mobile device through an audio/digital connector and to process user's information; a memory unit coupled to the electronic means and configured to store at least a portion of the user's information; and a connector communicated with the electronic means and configured to connect the peripheral device to the user's mobile device. The peripheral device further comprises an interface electrically connected to the electronic means and configured to exchange information with external device(s) and/or physically interact with environmental objects, said interface being coupled to the electronic means.

Description

PERIPHERAL DEVICE AND METHOD OF ITS OPERATION
Field of invention
The present invention relates to the field of mobile devices, and more particularly concerns with a peripheral device and a method for operation thereof. Background of the invention
Mobile devices such as cell phone or tablet PC are becoming universal gadgets that replace the market of multiple separate devices by integrating its functions into the hardware and/or software at the mobile device. For example, camera or GPS -navigators have already been implemented in the mobile devices and it is saving users from the need for additional carrying these devices.
The processing power of mobile devices is growing, which allows the software to solve complex problems. However, in contrast to the application software additional hardware features at mobile devices are expensive and often related with an increase of their size and cost.
For a relatively simple and rapid expansion of the mobile device hardware resources a variety of peripheral devices are connected to the base mobile device through its analog and digital functional plugs or connectors.
Known are multiple peripheral devices connected to the digital connector on a cell phone, for example, a digital thermometer iCelsius (www.icelsius.com), FM-radio iTripDA (http://www.griffintechnology.com/itrip), radio-dosimeter
(http:/www.scosche.com/consumer-tech/product/2254) and remote control toy (www.iHelicopters.net).
The peripheral devices are also being developed that are connect to the analog audio plug of mobile device, such as reader codes of bank cards with a magnetic strip (US7,810,729), IR remote control of external media devices (http://thinkflood.eom/products/redeye-mini/# overview). Moreover, these devices do not contain batteries, for example, a peripheral IR uses alternating electrical audio signal from the mobile device to generate electrical power for its functional electronics.
In the present application, most attention is paid to the peripheral devices which will allow mobile devices to be applied at the variety of IT security systems and access control systems. Along with the well-known contactless technology NFC (http://en.wikipedia.org/wiki/Near_field_communication), which is already integrated in the basic structure of the hardware of mobile devices claimed following peripheral devices can also add solutions to problems of NFC such as long-range identification of objects or wireless remote management at frequencies other than 13.56 MHz.
The development of access control systems that use plastic cards, electronic tags and key fobs, led to development of special USB-peripherals for desktop computers that can read and program these electronic keys. There are also USB-devices, such as fingerprint readers, that allow reading personal identity. Highly sought peripherals are the means to protect the information and software on a computing device - for example, HASP keys (http://www.aladdin-rd.ru/catalog/hasp/models), which also use the universal digital USB connectors.
Peripheral devices with similar functions are in demand on the mobile devices, too.
However, mobile devices from different manufacturers are provided with structurally different digital plugs and connectors for communication with external peripheral devices, they have different operating systems and thus different drivers, protocols and programs for this exchange. Many mobile devices do not have USB connectors.
Universalization and standardization requirements for ergonomics of mobile device connectors have led to only two external connectors that are now on the most of mobile devices - base digital connector for connection to external digital devices and TRRS -connector (audio jack) for audio headset.
Base digital connector is usually located on the bottom of mobile device and is combined with an external power supply bus. This socket is not deep; it contains small contact pads and has a predetermined orientation of the external plug-connector, which does not allow an arbitrary oriented plug installation in this connector (socket) of mobile device.
Besides this digital connector is often busy occupied by battery charger or installed on a deck.
Practice shows that the connection of various peripheral devices to the small digital connector is inconvenient for the user and often leads to the failures when one tries to insert a plug of the external cable or peripheral device.
These external digital connections are the weak point of the mobile devices and often got broken when using. TRRS (or TRS) audio jack of mobile device 1 is sufficiently durable, reliable, and easy to connect peripherals 2 for any user. Long cylindrical plug 3 of peripheral devices 2 is rather deep, that makes it possible to fully insert and secure it in the female cylindrical socket of TRRS connector 4 of the base mobile device 1 , see Fig. 1. In this case no orientation plug 3 is required; the length of the plug is much larger than its diameter, so this keeps the plug firmly enough peripheral device 2 from the loosening.
TRRS connector, as stated above, has become a universal element of virtually all mobile devices and is usually located in a convenient place for the user, because of its frequent to use for external headset - phone and microphone.
Unfortunately, the direct use of audio communication over TRRS connection for digital peripherals is impossible because audio connection is usually provided with a high-resistance output or galvanically isolated from the peripheral devices and also has a low (sound) information bandwidth.
So, in contrast to, for example, USB-Link in computers, audio connector cannot furnish large enough current to power the peripheral devices, and the speed of information exchange through the audio channel is relatively low.
However, the growing need for extending the functionality of mobile devices and an attractive easy to use universal TRRS audio jack lead, as stated above, to numerous digital peripheral devices that use audio jack to mobile base unit.
The following describes these peripheral devices and how they could be used to allow the user to extend base mobile device functionality for the new software and hardware applications, and in particular for security applications and confidential information.
Indeed, due to the compact size mobile devices can easily be accessible by the third parties by the oversight of the owner. As a result, the mobile device owner can lose much more value associated with the confidential information stored on the mobile device, than the cost of the mobile device.
With the increasing number of payment or banking software applications, secure corporate applications, and other applications in which the mobile device works with the data of a confidential nature, such as login/password, digital signatures, personal user data or corporate secrets, the need to protect these confidential data from unauthorized access is steadily increasing.
A similar problem is also in the tasks using proprietary software to be installed on mobile devices, where the software should be protected from unauthorized copying.
In some applications, the communication process needs protection against "eavesdropping" or other interference in open communication channels of a mobile device with the outside world, such as other mobile devices, or "cloud" corporate server. Such a process of encryption or scrambling the information flow is performed using special hidden digital keys and cryptographic procedures to arrange protection of information.
Thus, the value of confidential information, digital keys necessary for access to personal, corporate or licensing information, in the above examples of mobile applications is very high. Protection of such confidential information stored on the mobile device, requires a sophisticated programmer art, but, as every know, is not stable enough to be cracked by the other skilled programmers.
Therefore, it is often necessary to store this key confidential information separately from the base computing device. For example at the peripheral device or other carrier of information means that can be carried separately from the mobile device and that can quickly communicate with a mobile device.
In addition, one may often change mobile devices or simultaneously use multiple mobile devices, so that a separate standalone peripheral carrier of information means, containing confidential data will be a useful gadget for him.
As an example, Fig.3 shows a preferred embodiment of such peripheral devices that can be used as a standalone means to store confidential information. There is means 2 that is connected to the audio jack, and also it can be means 2a, which is connected to a digital connector 1 or a means 2b that exchange information with the mobile device through the NFC interface.
Summary of the invention
It is an object of the present invention to provide a cost effective and simple peripheral device that allows saving the indicated problems.
A further object of the claimed invention is to provide a method of operation of the claimed peripheral device.
According to one aspect of the claimed invention, it is provided a peripheral device configured to extend the functionality of a user's mobile device by coupling the peripheral device to an audio/digital connector of the user's mobile device, said peripheral device comprising:
a body in which there are placed:
a power supply unit;
an electronic means configured to exchange electrical signals with the user's mobile device through an audio/digital connector and to process user's information; a memory unit coupled to the electronic means and configured to store at least a portion of the user's information; and
a connector communicated with the electronic means and configured to connect the peripheral device to the user's mobile device.
Preferably, the peripheral device further comprises an interface electrically connected to the electronic means and configured to exchange information with external device(s) and/or physically interact with environmental objects, said interface being coupled to the electronic means.
Preferably, said interface is configured to exchange information with plastic cards or tags or objects with transceivers being digital information carriers.
Preferably, said interface is configured to fingerprint.
Preferably, said interface is configured to exchange information with domestic, industrial or medical instruments and gadget interfaces.
Preferably, said interface is configured to exchange information with electronic lock and/or electronic access control system interfaces.
Preferably, said interface is configured to measure environmental parameters selected from the group consisting of a temperature, a pressure, humidity, radioactive background, illumination intensity.
Preferably, a battery is used as the power supply unit.
Preferably, the power supply unit is configured to convert electrical energy inputted through a telephone channel from the user's mobile device.
Preferably, the power supply unit is configured to convert electrical energy inputted through a microphone channel from the user's mobile device.
Preferably, the connector is a TRRS connector designed for connection to an audio connector of the user's mobile device. Preferably, the connector is configured for coupling to a digital connector of the user's mobile device.
Preferably, the electronic means is configured to receive, decode and transmit electrical signals through an audio communication channel in the form of harmonic oscillations or sound sequences or in the form of DTMF codes.
Preferably, the electronic means is configured to encrypt/decrypt and transmit the user's information in an encrypted form.
Preferably, the electronic means is configured to generate key codes for encryption of the user's information.
Preferably, the peripheral device is configured as a part of an information storage and processing system consisting of the user's mobile device to which the peripheral device is connected, and a "cloud" server or other mobile device to which the user's mobile device has the established information communication channels.
According to the other aspect of the claimed invention it is provided a method of operating a peripheral device, comprising the steps of:
entering at least a portion of a user's information into a memory of the peripheral device,
connecting the peripheral device to a user's mobile device by placing a connector of the peripheral device in an audio/digital connector of the user's mobile device;
running user's software in the user's mobile device, said software initializing receiving/transmitting electrical signals between the user's mobile device and the peripheral device;
by means of the peripheral device and in accordance with signals from the user's mobile device, processing information stored in the memory of the peripheral device and comprising at least a portion of the user's information as well as information inputted from the user's mobile device; and
transmitting the information processed in the user's mobile device to provide further use thereof in user's software application.
Preferably, the method comprises the steps of:
configuring the peripheral device and its interface to exchange information with external device(s) and/or physically interact with environmental objects; making information exchange between the peripheral device and the external device(s) and/or physical interaction with environmental objects;
transmitting information resulted from the information exchange with external device(s) and/or from the physical interaction with environmental objects to the user's mobile device for further use of said information by user's software application.
Preferably, there is the step of transmitting control command between the user's mobile device and access control systems and/or electronic locks.
Preferably, there is the step of encrypting/decrypting the user's information by an electronic means of the peripheral device.
Preferably, there are the steps of storing and processing at a "cloud" server at least a portion of the user's information, and storing and processing at the mobile device to which the peripheral device is coupled thereby to provide division of the user's information at least into three portions stored separately at the peripheral device, the mobile device and the "cloud" server thereby to provide protection of complete user's information against an unauthorized access.
Preferably, there is the step of making, by the interface of the peripheral device, information exchange with the external device(s) and/or physical interaction with the environmental objects.
Preferably, there is the step of making mobile device information exchange with plastic cards, tags or transceivers which serve as digital information carriers.
Preferably, there is the step of fingerprinting by the interface of the peripheral device.
Preferably, there is the step of exchanging information, through the interface of the peripheral device, with domestic, industrial or medical instruments and gadget interfaces.
Preferably, there is the step of exchanging information, through the interface of the peripheral device, with electronic lock and/or electronic access control system interfaces.
Preferably, there is the step of measuring, through the interface, environmental parameters selected from the group consisting of a temperature, a pressure, humidity, radioactive background, illumination intensity.
Preferably, there is the step of converting, in the power supply unit, electrical energy inputted through a telephone channel from the user's mobile device.
Preferably, there is the step of converting, in the power supply unit, electrical energy inputted through a microphone channel from the user's mobile device.
Preferably, there are the steps of receiving, decoding and transmitting electrical signals through an audio communication channel in the form of harmonic oscillations or sound sequences or in the form of DTMF codes.
Preferably, there is the step of generating key codes for the procedure of encrypting the user's information.
Preferably, there is the step of exchanging information of the user's mobile device to which the peripheral device is connected, with the "cloud" server or other mobile device to which the user's mobile device has the established information communication channels.
The following below describes one possible way to use the peripheral carrier- means of information as an example of a convenient care of information about payments or discount card, the login/password information that must be entered in a variety of applications at mobile device, or as a separate storage of confidential information, which is downloaded from the "cloud" server 14 (Fig. 3).
One of the user's problems, which can be solved by the claimed invention, is associated with a very uncomfortable process, when the user needs to enter into the mobile device confidential data stored on a credit card or such as logins/passwords for access to the software applications. The credit card may be absent or login/password information can be often forgotten in the moment. The keyboard of mobile devices is small and users with the visual impairments or other disabilities have difficulties with the correct data input into the mobile device. Such situations are quite frequent and the proposed method of using the peripheral carrier-means of information reduces the above disadvantages to a simple user action, i.e. setting the data communication between mobile devices and the carrier-means.
The description of input of confidential information into mobile device by the claimed method can be divided into three steps:
a). Registration of the carrier-means at the mobile device and assigning a password to the carrier-means for its further authorization;
b). Recording of the confidential information (e.g. data of credit cards or login/password information) to the carrier-means. Carrier-means should be in contact with the mobile device or this record can be accomplished on a different computing device;
c). Usage the carrier-means to automatically fill in the confidential information in the software applications at the mobile device during the brief informational interaction of mobile devices and the carrier-means by the corresponding communication channel.
For example, if a user has previously recorded data related credit card (card number, user name, expiration date, and CVV-code) at the registered standalone carrier- means, then user only needs to initiate automatic readout the data from the carrier- means to the payment application on a mobile device.
In the case when carrier-means can work with NFC devices, it will be sufficient to bring it to the NFC reader of mobile device running the appropriate software at this device. In the case when the carrier-means is a peripheral device with plug, it should be connected to the appropriate connector of mobile device to initiate data communication or data communication should be started manually after plug insertion.
This simple and easy method of storage and input of confidential information does not make it necessary to carry plastic cards, not to remember login/password information or other confidential information that is not inconvenient to be placed by the small keypad of mobile device.
The loss of the carrier-means is not dangerous because it is protected by a password authentication on a particular mobile device and it won't work with other devices without proper authorization.
As mentioned above, there is known a magnetic card-reader (US 7,810,729), which has an output TRRS connector, which transmits the data to the mobile device through its audio jack 4.
Our opinion is that such and other types of compact identity readers which can send this information to a mobile device should be added with the hardware for storing the user's confidential information that allows keeping this information at the reader outside of the mobile device.
Readers with embedded memory for storing of confidential information at the gadget outside of the mobile device can be accomplished in a wide group of devices, for example - readers for plastic cards with a magnetic stripe, reader for contact chip or RFID-Inlet, reader of the iButton family, readers for RFID tablets and tags, fingerprint readers, retina pattern readers, or other readers for biometric parameters of users.
These and other aspects of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter.
Brief description of the drawings
Further details, features and advantages of the invention are disclosed in the following description of exemplary and preferred embodiments in connection with the drawings, wherein:
Fig.l schematically shows a peripheral device and a user's mobile device, an embodiment according to the invention;
Fig.2 schematically shows a perspective view of the peripheral device disposed on a key ring, according to the invention;
Fig.3 schematically shows a system configured as an information storage and processing system consisting of the user's mobile device to which the peripheral device is connected, and also a "cloud" server, NFC devices, code carrier to be connected to the digital input, according to the invention;
Fig.4 schematically shows the peripheral device disposed in an audio input of the user's mobile device, and also a "cloud" server, according to the invention;
Fig.5 schematically shows components of the peripheral device, according to the invention;
Fig.6 schematically shows right and left telephone channels and microphone channel, serving for signal exchange between the peripheral device and the user's mobile device, according to the invention;
Fig.7 schematically shows the peripheral device disposed in the audio input of the user's mobile device, wherein said peripheral device is exchanging information with a digital information carrier, and the "cloud" server, according to the invention;
Fig.8 schematically shows the peripheral device disposed in an audio input of the user's mobile device, an electronic lock exchanging information with the peripheral device, the "cloud" server and the second mobile device, according to the invention.
Detailed description of the embodiments
A peripheral device, configured to extend the functionality of a user's mobile device by coupling the peripheral device to an audio/digital connector of the user's mobile device, comprises a body in which there are placed: a power supply unit; an electronic means configured to exchange electrical signals with the user's mobile device through the audio/digital connector and to process user's information; a memory unit coupled to the electronic means and configured to store at least a portion of the user's information; and a connector communicated with the electronic means and configured to connect the peripheral device to the user's mobile device.
The carrier-means of confidential information 2 (2a, 2b) is functionally similar to the key to access the user information. It can also be adapted to mount on a bunch of a metal user's keys, which is very convenient and usually always with him (Fig. 2).
As it was described peripheral devices can add new hardware features to mobile devices.
There is another important and necessary type of peripheral device for mobile devices that we would like to focus on - a peripheral device that allows one to turn a base mobile device into a powerful intelligent electronic key for multiple electronic locks, access control systems and other systems of objects identification that will be discussed below at Fig. 7.8. Indeed, why one should equip door or safe electronic lock by the digital keypad, if the user always has a keyboard at the user's mobile device. User can input the code into mobile keyboard and then mobile device should only send this digital code to the electronic lock.
Hardware interface for mobile devices that make it possible to interact with the electronic lock is now virtually undeveloped.
At the same time, electronic locks or other access control systems have a large variety of hardware interfaces, such as a reader/programmer of contact/contactless electronic keys, remote user authentication via radio, infrared or audio channel.
In many cases, a simple peripheral device can play the function of the hardware interface interaction with the access control or authentication system, while having powerful support from the processor, software and other resources of the mobile device.
For example, when a peripheral device designed in the form of a transmitter/transceiver, which has direct data communication with the mobile device it will allow mobile device to exchange information with a remote access control system, built on this special channel of user authorization. The functioning of such a composite mobile electronic key can be maintained also with the assistance of the authorization process from the corporate "cloud" or other servers that can be employed in real-time by the mobile device through mobile communication with those servers.
Authorization method that uses the three separate devices: a peripheral interface device, the mobile base device and the "cloud" server will allow one to create a very secure means of authentication and access control, since the key confidential information can be distributed between multiple mentioned storage devices.
For example, confidential information may be in general absent on the user's mobile device, which performs a function of flow control of confidential information between the "cloud" servers, peripheral device and an access control system. In this case, the mobile device is of little value if it is lost by the user.
The use of "cloud" servers and mobile communication channels allows one to add convenient and secure means to create various methods of payments for access control and identification services.
For example, we can provide new type of mobile service, replacing one-time SMS messages used by the banks to authorize transactions by mobile device (Figure 4):
- The Bank sends to the user's mobile device quasi-random number, which is calculated according to the Bank secret algorithm.
- The mobile device sends this number or the convolution with the other parameters of mobile device (for example, variable time, date, or a constant parameters of mobile device) to the peripheral device.
- The peripheral device processes received information in accordance with the secret algorithm specified by the Bank and returns a result to the mobile device.
- The Mobile device automatically transmits this accepted information or its function to the Bank server.
- The Bank then makes an authorization decision in accordance with algorithm that process sent and responded information. For the user, this long and complex procedure is invisible - it is enough for him to insert a peripheral device into the corresponding socket of the mobile device.
Operator that provides mobile communications traffic, got paid, the Bank got secure access to banking services and a customer get convenience - all are satisfied. Various hardware design and information algorithms for the peripheral device and flow information can be defined by the system requirements.
Figures 4-8 below describe peripheral devices 2 that use reliable TRRS connector, allowing them to compete with other similar devices for mobile applications, such as devices 2a that connects to not so reliable digital connector 4a.
However, the following peripheral devices, their design and functions can also be accomplished in the variants where these devices are equipped with a digital connector 4 for the information communication with a mobile device.
As already noted peripheral device 2 can be a removable storage of passwords, personal information, digital keys for protection of license or other valuable information on the mobile device. The electric power supply of a peripheral device 2 can be harvested from the mobile device. This peripheral device can be programmed to perform not only storage, but also computational procedures with the information from the mobile. For example, it can modify (e.g. form convolution) confidential information using the current date and time on a mobile device, the parameters coming from the "cloud" server 14 or other variable data system user authorization.
Thus, the main functions of the peripheral device can be reduced to the storage, processing and exchange of confidential or other key information with the mobile device.
In fact, such a peripheral device looks like a security key for the confidential information, which makes the software installed on the mobile device 1 inactive or restricted without this key.
Said peripheral device 2 (Fig. 5) comprises the body 5 with TRRS connector 3, it includes power supply unit 6 with the buffer capacitor, memory means 7 to store information and functional electronic (microprocessor) means 8 that is designed for the information exchange with the mobile device and the processing of incoming information from the mobile device.
A peripheral device can work with all types of mobile or stationary computer devices with TRRS (TRS) connector under the corresponding drivers. It, for example, can be programmed at the PC or laptop with TRRS (TRS) connector.
Peripheral device 2 that is designed to interact with access control systems and/or other type of user identification systems (Figure 7, 8) will also contain a hardware interface 9, performing the functions of communication with an external devices or an objects of these systems. These hardware interfaces can be designed as, for example, a reader for electronic ID (electronic keys, cards) or a fingerprint reader. It could also be designed as a transceiver for wireless remote interaction with the access control system via various communication channels, such as the radio channel, the light channel or the audio communication channel transmission.
Due to the fact that the audio interface of the mobile device 1 does not supply sufficient electric current from the mobile device to power up the peripheral device, the power supply 6 of peripheral device may comprise a self-contained power source, such as a battery. However, the most interesting case will be the battery-free embodiment of the peripheral device, when its power supply is designed to utilize of AC electric signal supplied by the one or both of the telephone audio channels 10, 11 of the mobile device (Fig. 5, 6).
Another possible source of electrical power for the peripheral 2 connected to TR S jack, can be a microphone input of a mobile device 13. Contact 12 is at a positive potential with respect to ground contact 13 (sleeve), which is necessary for passive external microphone of headset, but the electric current, which can be obtained from it is very small, due to the high internal resistance of the microphone input of mobile device. However, the cases when peripheral devices allows relatively slow accumulation of electrical energy on the buffer capacitor 6 of a power supply unit, which then can provide a short-term boost power supply for the functional means 8, will be sufficiently demanded.
Thus, the performance of the power supply unit 6 can be varied and is determined by the required technical and price characteristics of the peripheral devices.
One of the embodiments for the battery-free peripheral key can be described as follows:
When peripheral device 2 is connected to the mobile device 1 and the corresponding software application is running, the power supply unit 6 is pumped by the electric power of the signals that comes to peripheral device by the communication channels 10, 11 or 12 from a mobile device. The power accumulated in this process support the action of the functional electronic means 8 and peripheral device can autonomously perform receiving and processing of information from the mobile device by the same output (telephone) channels 10, 11 and/or transmit the stored or processed information from the peripheral device to the mobile device by the input (microphone) channel 13. Information received from a peripheral device, e.g. confidential information or the part of it can be later used by the software applications at mobile device.
Another embodiments of such a peripheral device 2 as a carrier-means for confidential information has been described at Fig.3. The information transmitted by the communication channels 10, 11 and 12 may be formed as an electric impulses of different shape and duration, like digital code, but it can also be a formed as a set of harmonic or multi-tone oscillations which is most suitable for transmission by the audio channel of the mobile device. In this case, the software of mobile device should contain the conversion module to convert audio signal into a digital format and back. An example of such a method of transmitting digital information is a method of DTMF encoding, in which the digital code transmitted by the sequence of multi-tone sound signals.
It is also attractive to direct use of analog audio information files to generate the digital solutions on the mobile or peripheral devices, for example, by the analog superposition of these files with the files stored or synthesized at these devices. In these cases, one should to manufacture special ASIC processor to work with audio file sequences on a peripheral device.
It is possible to design software that control the information exchange by the mobile device 1 and the "cloud" server 14, where the confidential information can be shared between the peripheral device (key) 2 and the server 14. In this case, the software of a mobile device only compares the results of requests for confidential information from the peripheral device and the server. Such kind of confidential information protection on the mobile device cannot be compromised because at this scenario mobile device contains no confidential information or its derivatives.
In addition, the server 14 may act as a source of variable random codes that are periodically written to the peripheral device. This is important, for example, to change the confidential information without changing the structure of a software application on a mobile device. This method can effectively replacing single-use one-time codes, such as Kellogg as described above. This method can also replace the modern method of the user authorization and transactions through SMS one-time password that must be entered using the keyboard.
Peripheral device 2 that is designed to interact with external objects, such as access control systems and/or the user identification, should comprise an interface unit 9 that corresponds to technical specs (Fig. 5).
Different versions of mentioned peripheral device 2 can be designed:
The peripheral device for reading/programming of electronic keys or other coded user objects 15:
- It could be the reader/programmer for contact or contactless electronic key: smart card or RFID keys or iButton keys;
- The fingerprint or other biometric information reader;
It is also possible to design peripheral device 2 as a transceiver (Figure 8) to communicate with the access control system 16, by the following channels - radio, optical or acoustic communication channel.
The advantage of this design realized if the fact that computation function, input of information and display of results that is needed to communicate with the access control system will be performed on the powerful means of mobile devices, CPU, display, keyboard.
Operation of such a system can be described by the example of an electronic lock with a radio interface used to authenticate the user's electronic key (Fig. 8).
Electronic key, consisting of a mobile device 1 and peripheral transceiver 2 (or
2a) connected with TR S connector (or digital connector 4a), exchange key confidential information with an electronic lock 16. The keyboard of mobile device 1 can be used to enter the digital user ID, which is converted by special software in the required format to be transmitted to the peripheral device 2 (2a) and by the radio interface of peripheral device 2 (2a) to an electronic lock 16. The display of the mobile device can show the status of the electronic lock and/or its dynamic response to user requests at the two-way radio communications of mobile devices and the electronic lock. In addition, thanks to the significant resources of mobile device two-way exchange of devices 1 and 16 can be used to implement encryption procedures to protect flow of information between devices 1, 16. At the same time crypto keys may be stored at the removable peripheral device 2 (2a).
It should be noted again that the concept when the electronic key implemented as a peripheral device 2, which can be stored separately from the mobile device is very important. This key is compact and can be carried on a bunch of other person's keys. It can be connected to other mobile devices when main mobile device is not available, although it may require additional registration at the new mobile device and at the access control system 16.
The simplest version of such system will be following:
- The key 2 which is designed as a peripheral device for communication with the access control system 16 is inserted into the mobile device 1;
- The user runs on the mobile device software for authorization at the access control system 16, and if necessary enters a password or other confidential information by the keyboard;
- Access control system 16, through interaction with a combined electronic key: peripheral device 2 + mobile device 1 + software manages the flow of information, makes a decision on the user's authorization.
In this version, the mobile device 1 contains no confidential information and has the only function to control action of the peripheral key 2, which stores basic confidential information for the user authentication in the system 16.
To add additional protection to the interaction of the mobile device 1 with access control 16, it is possible to add interaction of the mobile device 1 with "cloud" server 14.
So that the user authentication in access control systems 16 and/or online notification of events related the user authorization can be supported by two-way flow of information between the mobile device 1 and the "cloud" server 14. "Cloud" server at this system brings all the advantages described above - where confidential information that is circulating in the system may be partially processed or stored on the server 14.
In particular, the server 14 may store the distribution package of software for a variety of mobile devices, store sensitive information that may be requested by the system 16 at the process of user's authorization, record and store the log of events associated with authorization process, notify the third party services concerned about the events and the results of the authorization at the access control system 16.
Peripheral Device 2 (2a) may not contain any confidential information and in combination with the mobile device 1 would be a simple compiler of information from the server 14 to the access control system 16, which manage the user authorization process. This version of the access control system can, for example, be applied in such cases the user and the mobile device 1 do not have enough rights to be authorized at the access control system 16. To access protected system 16 whenever required it is necessary to request rights from the server 14, which makes a decision for the access authorization.
In another embodiment, when the mobile device has a built-in hardware interface to the access control system 16, for example NFC interface, peripheral device 2 can act as a stand-alone storage of confidential information - a unique digital user key, which should be used the server 14 to authorize the user.
Access control system 16, which requires authorization by the server 14 is in high demand for the corporate access control systems, at the offices and factories, and for the realtors access control systems, etc.
Due to the possibility of establishing a voice or modem (digital) communication between mobile devices, there is one more embodiment of the user's authorization at the access control system 16, which involves at least two mobile devices.
Figure 8 shows a situation when a user with a mobile device 1 wants to enter the access control system 16, while the portion or all of the key confidential information he has to get from the another user with the mobile device 17. For example, when the user of the mobile device 1 must be authorized to access the premises owned by another person with the mobile device 17, which is far from the said premises.
Such dual authorization system is highly important, for example, for realtors, carriers, service personnel, i.e. in situations where the rights of access to third parties with restricted access should be transmitted remotely.
If the voice connection is established between two or more mobile devices then it is possible to transfer the sound messages or play audio files, audible to all connected devices.
This feature allows you to send confidential information encoded in the audio sequence from one mobile device to another.
For example, if the user of the mobile device 17 types digital code at the keyboard the user of a mobile device 1 will get the DTMF sound codes corresponding to the digits of the initial code and the peripheral device 2 (2a) will be able to transfer this code to the access control system 16.
The other case can be implemented when user of the mobile device 17 sends the digital information to the mobile device 1 in the form of SMS, MMS or other digital format, which can be automatically processed by the software of mobile device 1 without the user participation and transmitted to the peripheral device 2.
Described above embodiments of the peripheral device and the method its operation do not restrict a large variety of other possible embodiments for their designs and working methods.

Claims

1. A peripheral device configured to extend the functionality of a user's mobile device by coupling the peripheral device to an audio/digital connector of the user's mobile device, said peripheral device comprising:
a body in which there are placed:
a power supply unit;
an electronic means configured to exchange electrical signals with the user's mobile device through an audio/digital connector and to process user's information; a memory unit coupled to the electronic means and configured to store at least a portion of the user's information; and
a connector communicated with the electronic means and configured to connect the peripheral device to the user's mobile device.
2. The peripheral device according to claim 1, further comprising an interface electrically connected to the electronic means and configured to exchange information with external device(s) and/or physically interact with environmental objects, said interface being coupled to the electronic means.
3. The peripheral device according to claim 2, wherein said interface is configured to exchange information with plastic cards or tags or objects with transceivers being digital information carriers.
4. The peripheral device according to claim 2, wherein said interface is configured to fingerprint.
5. The peripheral device according to claim 2, wherein said interface is configured to exchange information with domestic, industrial or medical instruments and gadget interfaces.
6. The peripheral device according to claim 2, wherein said interface is configured to exchange information with electronic lock and/or electronic access control system interfaces.
7. The peripheral device according to claim 2, wherein said interface is configured to measure environmental parameters selected from the group consisting of a temperature, a pressure, humidity, radioactive background, illumination intensity.
8. The peripheral device according to claim 1, wherein a battery is used as the power supply unit.
9. The peripheral device according to claim 1, wherein the power supply unit is configured to convert electrical energy inputted through a telephone channel from the user's mobile device.
10. The peripheral device according to claim 1, wherein the power supply unit is configured to convert electrical energy inputted through a microphone channel from the user's mobile device.
11. The peripheral device according to claim 1 , wherein the connector is a TR S connector designed for connection to an audio connector of the user's mobile device.
12. The peripheral device according to claim 1, wherein the connector is configured for coupling to a digital connector of the user's mobile device.
13. The peripheral device according to claim 1, wherein the electronic means is configured to receive, decode and transmit electrical signals through an audio communication channel in the form of harmonic oscillations or sound sequences or in the form of DTMF codes.
14. The peripheral device according to claim 1, wherein the electronic means is configured to encrypt/decrypt and transmit the user's information in an encrypted form.
15. The peripheral device according to claim 1, wherein the electronic means is configured to generate key codes for encryption of the user's information.
16. The peripheral device according to claim 1, said device being configured as a part of an information storage and processing system consisting of the user's mobile device to which the peripheral device is connected, and a "cloud" server or other mobile device to which the user's mobile device has the established information communication channels.
17. A method of operating the peripheral device according to claim 1 , comprising the steps of:
entering at least a portion of a user's information into a memory of the peripheral device;
connecting the peripheral device to a user's mobile device by placing a connector of the peripheral device in an audio/digital connector of the user's mobile device;
running user's software in the user's mobile device, said software initializing receiving/transmitting electrical signals between the user's mobile device and the peripheral device;
by means of the peripheral device and in accordance with signals from the user's mobile device, processing information stored in the memory of the peripheral device and comprising at least a portion of the user's information as well as information inputted from the user's mobile device; and
transmitting the information processed in the user's mobile device to provide further use thereof in user's software application.
18. The method according to claim 17, comprising the steps of:
configuring the peripheral device and its interface to exchange information with external device(s) and/or physically interact with environmental objects;
making information exchange between the peripheral device and the external device(s) and/or physical interaction with environmental objects;
transmitting information resulted from the information exchange with external device(s) and/or from the physical interaction with environmental objects to the user's mobile device for further use of said information by user's software application.
19. The method according to claim 17 or 18, comprising the step of there is the step of encrypting/decrypting the user's information by an electronic means of the peripheral device.
20. The method according to claim 17, further comprising the steps of storing and processing at a "cloud" server at least a portion of the user's information, and storing and processing at the mobile device to which the peripheral device is coupled thereby to provide division of the user's information at least into three portions stored separately at the peripheral device, the mobile device and the "cloud" server thereby to provide protection of complete user's information against an unauthorized access.
PCT/US2013/033388 2012-03-22 2013-03-21 Peripheral device and method of its operation WO2013142740A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261614340P 2012-03-22 2012-03-22
US61/614,340 2012-03-22

Publications (1)

Publication Number Publication Date
WO2013142740A1 true WO2013142740A1 (en) 2013-09-26

Family

ID=49223358

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/033388 WO2013142740A1 (en) 2012-03-22 2013-03-21 Peripheral device and method of its operation

Country Status (1)

Country Link
WO (1) WO2013142740A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2195020C2 (en) * 2000-01-11 2002-12-20 Многопрофильное предприятие ООО "Элсис" Method and device for user identification
WO2007027060A1 (en) * 2005-08-31 2007-03-08 Samsung Electronics Co., Ltd. Accessory apparatus of mobile terminal for receiving and reproducing dmb data and method thereof
US20090180643A1 (en) * 2008-01-14 2009-07-16 Sander Wendell B Electronic device circuitry for communicating with accessories
US20100108762A1 (en) * 2009-06-10 2010-05-06 Morley Jr Robert E Card reader device for a cell phone and method of use
RU95854U1 (en) * 2010-03-03 2010-07-10 Общество с ограниченной ответственностью "ЭнергоПромЭлектроника" ACCOUNTING DEVICE FOR THE AUTOMATED INFORMATION-MEASURING AND CONTROL SYSTEM (AIIUS) (OPTIONS) AND OBJECT CONTROL DEVICE FOR AIIUS

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2195020C2 (en) * 2000-01-11 2002-12-20 Многопрофильное предприятие ООО "Элсис" Method and device for user identification
WO2007027060A1 (en) * 2005-08-31 2007-03-08 Samsung Electronics Co., Ltd. Accessory apparatus of mobile terminal for receiving and reproducing dmb data and method thereof
US20090180643A1 (en) * 2008-01-14 2009-07-16 Sander Wendell B Electronic device circuitry for communicating with accessories
US20100108762A1 (en) * 2009-06-10 2010-05-06 Morley Jr Robert E Card reader device for a cell phone and method of use
RU95854U1 (en) * 2010-03-03 2010-07-10 Общество с ограниченной ответственностью "ЭнергоПромЭлектроника" ACCOUNTING DEVICE FOR THE AUTOMATED INFORMATION-MEASURING AND CONTROL SYSTEM (AIIUS) (OPTIONS) AND OBJECT CONTROL DEVICE FOR AIIUS

Similar Documents

Publication Publication Date Title
US10735391B2 (en) Instruction information transmission and reception methods and devices thereof
US11392927B2 (en) Multi-function data key
US9690916B2 (en) Multi-function identification system and operation method thereof
CN101159551B (en) Multifunctional information safety equipment and method of use thereof
US20090141896A1 (en) Processing module operating methods, processing modules, and communications systems
EP2696306A1 (en) System and device for authenticating a user
CN112750242B (en) Dynamic coded lock unlocking method and system and dynamic coded lock circuit
WO2013123453A1 (en) Data storage devices, systems, and methods
KR20140007251A (en) Digital system and providing method thereof
WO2017076270A1 (en) Smart card having function of one time password (otp), and work method therefor
EP2774401B1 (en) Device for mobile communication
CN104123644B (en) A kind of IC-card that can communicate with capacitance touch screen and system and method thereof
CN201150068Y (en) Multifunctional information safety equipment
WO2005122689A2 (en) A method and system for securing a device
CN108780476A (en) Method for verifying personnel identity
KR101437049B1 (en) Secure Digital system using Near Field Communication, pair system making a pair with the secure digital system, and providing method thereof
WO2013142740A1 (en) Peripheral device and method of its operation
CN214202481U (en) Dynamic coded lock circuit
KR101226918B1 (en) Pairing digital system and providing method thereof
KR101426223B1 (en) Method for checking confidential information using smartcard and smart terminal, and computer-readable recording medium for the same
KR20110005616A (en) System and method for managing wireless otp using biometric, wireless terminal and recording medium
KR20110005615A (en) System and method for managing wireless otp using user's media, wireless terminal and recording medium
KR101592897B1 (en) Secure Digital system using Near Field Communication, pair system making a pair with the secure digital system, and providing method thereof
US10810296B2 (en) Communication apparatus, communication method, and communication system
JP2003085150A (en) Individual authenticating system, individual authenticating method, portable information terminal, portable authenticating medium, authenticating device and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13765122

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13765122

Country of ref document: EP

Kind code of ref document: A1