Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ACOUSTIC SECURE TRANSMISSION (AST)
Document Type and Number:
WIPO Patent Application WO/2018/191498
Kind Code:
A1
Abstract:
Device, system and method of securely transmitting information from a mobile device or application or a user device to a mobile phone or other acoustic aware devices using audio frequency encoded data and security token transmission.

Inventors:
WALLNER GEORGE (US)
GRAYLIN WILLIAM (US)
Application Number:
PCT/US2018/027305
Publication Date:
October 18, 2018
Filing Date:
April 12, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SAMSUNG ELECTRONICS CO LTD (KR)
International Classes:
A61B8/00
Foreign References:
US20120221859A12012-08-30
US5051799A1991-09-24
US20160162883A12016-06-09
US20040264713A12004-12-30
US20120051187A12012-03-01
Other References:
See also references of EP 3600060A4
Attorney, Agent or Firm:
SHIN, Maeng-Ho (US)
Download PDF:
Claims:
What is claimed is:

1. A transmitter for securely transmitting data, comprising:

an actuator configured to generate electrical impulses, the electrical impulses including user credentials;

an encoder encoding the user credentials and including an electronic token; and a transducer configured to sonically transmit the electrical impulses including the user credentials and electronic token in response to actuation of the actuator.

2. The transmitter of claim 1 wherein the electrical impulses comprise baseband or modulated audio frequency carrier signals.

3. The transmitter of claim 1 wherein the transducer comprises a linear transducer or a non-linear piezo sounder.

4. A system for securely transmitting data, comprising:

a transmitter configured to securely transmit the data, the transmitter comprising: an actuator configured to generate electrical impulses, the electrical impulses including user credentials from the data and a token; and

a transducer configured to sonically transmit the electrical impulses as sound signals; and

a user device configured to securely receive the sound signals, the user device comprising a data processing module.

5. The system of claim 4 wherein the user device includes a tablet or a kiosk.

6. The system of claim 4 wherein the user device further comprises a microphone configured to sonically receive the sound signals.

7. A method of securely transmitting data, the method comprising:

providing user credentials including an electronic token;

generating electrical impulses representing the user credentials;

converting, using a transducer, the electrical impulses representing the user credentials into sound signals representing the user credentials;

transmitting the sound signals representing the user credentials sonically to an acceptance module; and

decoding the sound signals representing the user credentials and sending decoded credentials, including the electronic token, to a processing network.

8. The method of claim 7 wherein the decoding the sound signals representing the user credentials is done at a remote terminal having the transducer receiving the sound signals representing the user credentials.

9. The method of claim 7 wherein the user credentials provided including the electronic token includes identifying information of a user as at least one of name, billing address, shipping address, email, or phone number.

10. The method of claim 7 wherein at least one of the generating and converting steps involves encoding the user credentials, including the electronic token, using asynchronous encoding with start and stop bits.

1 1. The method of claim 10 wherein the encoding follows at least one of IS0781 1 and IS07813 character allocations.

12. The method of claim 7 wherein the step of transmitting the sound signals representing the user credentials sonically uses a Frequency Shift Keying (FSK) modulation scheme.

13. The method of claim 12 wherein the Frequency Shift Keying (FSK) modulation scheme uses a frequency change to represent a change from zero to one, or one to zero.

14. The method of claim 12 wherein the Frequency Shift Keying (FSK) modulation scheme uses to two discrete frequencies (F0 and F l) to represent zeros and ones in binary.

15. The method of claim 14 wherein the Frequency Shift Keying (FSK) modulation scheme uses a frequency of 6.0 kHz to represent zero in binary and a frequency of 7.2 kHz to represent one in binary.

16. The method of claim 14 wherein frequency shift keying frequencies are chosen to coincide with resonant frequencies of a non-linear transducer.

17. The method of claim 14 wherein a frequency shift modulation rate is chosen such that it is sub-harmonically related to carrier frequencies to provide continuous phase frequency shift keying related to resonant frequencies of the transducer.

18. The method of claim 7 further including a step of error detection and correction implemented with a secure audio transmission that includes token information.

19. The method of claim 18 wherein the step of error detection and correction implemented with the secure audio transmission is implemented using a parity bit added to each character.

20. The method of claim 18 wherein the step of error detection and correction implemented with the secure audio transmission is implemented using a parity bit added to each character and a Longitudinal Redundancy Check (LRC) character.

Description:
ACOUSTIC SECURE TRANSMISSION (AST)

CROSS REFERENCE TO RELATED APPLICATION DATA

[0001] This application claims the benefit of U.S. Provisional Patent Application No. 62/485,603 filed on April 14, 2017 the contents of which are incorporated herein by reference in its entirety.

BACKGROUND

[0002] Electronic transmission devices are becoming increasingly available. Mobile device electronic transmissions rely on electronic equipment to read electronic data transmitted by a handset, contactless card or electronic device of a user. The most commonly supported methods for transmitting electronic transmissions are Near Field Communication (NFC), Magnetic Secure Transmission (MST) and 2D Barcodes. As electronic transmissions gain wider adoption, and intelligent connected transmission devices proliferate, the need is arising to expand acceptance to more types of devices and entities that receive transmissions, including smaller entities and even individuals, and voice assistant devices like Amazon Echo or Google Home.

[0003] Fraud is causing traditional identifying information (e.g. card numbers) to be replaced by one-time tokens, which, unlike traditional numbers, codes or other identifying information, cannot be delivered by voice over the phone. Tokens need electronic delivery to be secure.

[0004] Using sound to transmit transaction information to a terminal is known, {See e.g., U.S. Patent No. 8,976,959). However, such implementations are costly and generally limited to mobile phone applications. Also, such known applications have limited security.

[0005] Small entities and individuals often do not have equipment capable of reading electronic data, e.g. transmission information and especially tokens. Although some smartphones have NFC capability, many are locked like iPhones. Smartphones generally do not have magnetic stripe reading capability and external readers are not justified or available. While smartphones can read barcodes, traditional cards and low cost intelligent connected transmission devices cannot display barcodes.

SUMMARY

[0006] The present disclosure describes a device, system and method that enables any mobile handset, tablet or even acoustic enabled voice assistant devices like Amazon Alexa/ECHO and Google Home devices to accept tokenized data (e.g., user identification data, such as from credit cards, debit cards or the like) from other handsets or intelligent connected transmission devices without the need for external hardware. The system employs specially encoded sound transmission in the high audio frequency range to transmit the data. The device, system and method enables both mobile handsets and low cost devices to transmit to virtually all mobile handsets, tablets and voice assistants.

[0007] The implementation according to the present disclosure provides sound transmission of secure identifying information (Acoustic Secure Transmission - AST) for low cost intelligent connected transmission devices to transmit data (e.g., not just a phone application). The present disclosure provides for the data to be tokenized data as opposed to static data with limited or no security. The present disclosure also provides for mobile phones to become receivers of transmitted data, and it provides for voice assistants or voice enabled kiosks and devices, and telephone operating systems to become receivers of the tokenized data.

[0008] This has outlined the features and technical advantages of the present disclosure in order that the detailed description that follows may be better understood. Additional features and advantages of the disclosure will be described below. The novel features, which are believed to be characteristic of the disclosure, both as to its organization and method of operation, together with further objects and advantages, will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

[0100] For a more complete understanding of the present disclosure, reference is now made to the following description taken in conjunction with the accompanying drawings.

[0009] Fig. 1 illustrates a block diagram of the acoustic secure transmission implementation according to the disclosure.

[0010] Fig. 2 illustrates a flow diagram of an acceptance program/module receiving acoustic secure transmissions according to the disclosure.

[0011] Fig. 3 illustrates a flow diagram of an acceptance application/module receiving decoded user credentials from the acceptance program/module according to the disclosure.

[0012] Fig. 4 illustrates an implementation of an acceptance program of the acoustic secure transmission implementation according to the disclosure hosted on the cloud and interacting with the user through a voice assistant device.

DETAILED DESCRIPTION

[0013] As illustrated in Fig. 1, an intelligent connected transmission device (e.g., a transmitter) (10) or handset (e.g., a user device) contains a microprocessor 1 1 and/or other electronics implementing the functionality as described herein. The device (10) also includes a battery (13) and a button or actuator (12). The microprocessor and/or electronics (such as memory) is programmed (or programmable) to provide a special purpose processor implementing acoustic secure transmission as described. When a secure transmission is being made, the user presses the button (12) or authenticates using a fingerprint reader (not shown), which in turn generates a stream of electrical impulses representing the user's credentials. Such user credentials can include electronic tokens, simulated credit card information or other identifying information such as at least one of name, billing address, shipping address, email, or phone number. The information may also include a transaction amount.

[0014] The electrical impulses can be baseband or can include a modulated audio frequency carrier. A transducer (15) converts the electrical impulses into sound signals which are emitted through a suitable opening in the housing. The transducer may be a linear transducer, such as a speaker, or a low cost non-linear piezo sounder.

[0015] A handset or tablet (18) is acting as a mobile terminal (e.g., a remote terminal) receiving the acoustic secure transmission in that it contains a memory with a transmission acceptance application program (26) that has access to the handset's (18) microphone (17) receiving the acoustic secure transmission. The handset (18) may have access to, or include, electronics and/or related software that processes the received acoustic secure transmission, such as for analog to digital conversion.

[0016] A flow diagram of the transmission acceptance program or module operation (e.g., a method of securely transmitting/receiving data) is illustrated in Fig. 2. When the transmission acceptance program (26) (e.g., a data processing module) is activated (28), it waits for the suitably encoded audio frequency signal to appear on the handset's microphone (30). The received audio signals are converted by the microphone (7) into electrical signals (32), which are then processed or decoded (34) by the application's decoder software. The decoded user credentials, and other data (e.g. contact information of the user), are then used as input (36) to a transmission acceptance application or module. The decoded user credentials for input to the transmission acceptance application/module may be encrypted for communication to the transmission acceptance application/module.

[0017] Operation of the transmission acceptance application or module (40), illustrated in Fig. 3, prompts a transmission acceptor for any additional transmission data (42), for example, transaction amount as necessary. Any portion of the decoded user credentials input to the transmission acceptance application/module that may have been encrypted for communication to the transmission acceptance application/module are decrypted (44) by the transmission acceptance application/module. Then, the transmission acceptance application/module sends the transmission to a hosted application server (45) that then sends the transmission data to a transmission gateway or transmission processor (46). Again, the transmission data can also include additional data such as transaction amount, and contact information of the user as an option (e.g., one or more of name, billing/shipping address, email, phone number).

[0018] As illustrated in Fig. 4, the transmission acceptance program (44.1) can also be hosted on the cloud and interacts with the user through a voice assistant device connected to a processing network. An offer from the voice assistant or voice enabled kiosk (42) having a microphone (42.2), or a request to transmit by the user may be communicated between the voice assistant and the user, when a transmission is requested by the voice assistant (e.g., on behalf of a merchant, with a merchant ID), instead of using user information on file, the transmission acceptance program can prompt user to transact with the AST enabled device (41) and listens for the acoustic transmission (transmitting information which can include user data, name, billing, shipping information). The device (41) includes a processor/audio driver (41.1) and a transducer (41.2). When the transmission is received through a communications link (43) by the AST acceptance program (44.1), it decodes the data and sends the tokenized payment data through another communications link (45) to a gateway or processor (46) to complete the transmission on behalf of that entity. When the transmission is authorized or declined, the voice assistant server (44) relays the information to the user via voice assistant (42) and completes the order for the user.

[0019] This type of acoustic tokenized transmission method can also be added to telephone order transmission systems. Instead of having operators receive static Personal Account

Numbers that can be copied and reused, the operator can leverage a PC, Tablet or mobile phone based AST Card Acceptance Program in front of him/her and prompt the user to transmit their

AST data through the phone and process the transmission as illustrated in Fig 1. In a "Voice

First" world, the ability for a user to transmit his/her transaction, contract and shipping information all via a short AST sound wave to someone face to face, over the phone or via Voice Assistants and Kiosk, provides a powerful, fast and secure way to conduct transactions.

[0020] The acoustic secure transmission involves information encoding prior to transmission. The transmission information data, including one or more tokens, is first serialized and then encoded using one of many possible data encoding methods, such as Hex, ASCII, etc. In one possible embodiment of the encoding, the data may be transmitted asynchronously and encoded in a hex format with start, stop and parity bits added. In other implementations, data character encoding may follow at least one of IS0781 1 and IS07813 character allocations. Other encoding methods may also be used.

[0021] In one embodiment, the serialized and encoded data is sent to a modulator that uses the data to modulate a carrier in the audio or high audio frequency range. Given that the transmission and electronic token information is transmitted using sound waves, the audio frequency signals may use a number of modulation schemes. For example, Frequency Shift Keying modulation may be used for transmitting the transmission information as sound waves. Frequency Shift Keying (FSK) (e.g., a Frequency Shift Keying (FSK) modulation scheme) uses to two discrete frequencies (F0 and Fl) to represent binary zeros and ones. The two frequencies are transmitted alternatingly at the rate of the bit rate. In one implementation of the method the frequency of 6.0 kHz represents the binary value of zero and the frequency of 7.2 kHz represents the binary value of one. Alternatively, a frequency change could represent a change from zero to 1, or one to zero.

[0022] The frequency shift keying frequencies can be chosen to coincide with approximate resonant frequencies of a non- linear transducer (i.e. a transducer used for sonically transmitting the data or information). The frequency shift modulation rate may also be chosen such that it is sub-harmonically related to the carrier frequencies to provide continuous phase frequency shift keying related to the resonant frequencies of the transducer.

[0023] As another example for transmitting the transmission and token information using sound waves, the audio frequency signals may be transmitted using modulation schemes involving multi-frequency FSK and multiple transmissions. To overcome the variances in the audio transmission path, multiple FSK frequency pairs may be used in a sequence of transmissions. For example, data would be transmitted first using the frequency pair of 6.0 and

7.2 kHz. Followed by the same data being transmitted using a second frequency pair, such as

6.8 and 8.4 kHz, and then transmitted a third time using yet a different frequency pair. The frequency shift could also change between segments. To further improve delivery reliability, data in a sequence may be transmitted at different data rates. For example, data could be transmitted first at 1200 bps, then at 600 bps, followed by 300 bps.

[0024] In another implementation of data transmission and token information transmission using sound waves, the audio frequency signals may be transmitted using phase shift keying in conjunction with either asynchronous or Frequency to Frequency (F2F) synchronous encoding with phase shifts indicating a bit level change or the F2F polarity change.

[0025] Error detection and correction may be implemented with the secure audio transmission of token information. Because the audio path is subject to external noise and distortions, error checking can be implemented using a parity bit added to each character and a Longitudinal Redundancy Check (LRC) character. Other error detection methods, such as CRC-16 or CRC- 32 may also be used. For detected data errors, error correction such as Reed-Solomon or Forward Error Correction (FEC) or channel coding may be added to further improve audio data transmission reliability.

[0026] In another implementation of transmission and token information using sound waves, Token Payment Devices (TPDs) may be used in conjunction with point of sale (POS) devices/programs/procedures to securely transmit payment information.

[0027] Although distinct acceptance program or module and acceptance application or module are described herein, it should be appreciated by those skilled in the art that functionality of the respective modules may be combined into a single module, or the functionality may be separate as described or in alternative arrangements of functionality.

[0028] The detailed description set forth above, in connection with the appended drawings, is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of the various concepts. It will be apparent to those skilled in the art, however, that these concepts may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form in order to avoid obscuring such concepts.

[0029] Based on the teachings, one skilled in the art should appreciate that the scope of the present disclosure is intended to cover any aspect of the present disclosure, whether implemented independently of or combined with any other aspect of the present disclosure.

For example, an apparatus may be implemented or a method may be practiced using any number of the aspects set forth. In addition, the scope of the present disclosure is intended to cover such an apparatus or method practiced using other structure, functionality, or structure and functionality in addition to, or other than the various aspects of the present disclosure set forth. It should be understood that any aspect of the present disclosure disclosed may be embodied by one or more elements of a claim.

[0030] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any aspect described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other aspects.

[0031] Although particular aspects are described herein, many variations and permutations of these aspects fall within the scope of the present disclosure. Although some benefits and advantages of preferred aspects are mentioned, the scope of the present disclosure is not intended to be limited to particular benefits, uses or objectives. Rather, aspects of the present disclosure are intended to be broadly applicable to different technologies, system configurations, networks and protocols, some of which are illustrated by way of example in the figures and in the following description of the preferred aspects. The detailed description and drawings are merely illustrative of the present disclosure rather than limiting, the scope of the present disclosure being defined by the appended claims and equivalents thereof.

[0032] Those skilled in the art should appreciate that all parameters and configurations described herein are meant to be exemplary and that actual parameters and configurations will depend upon the specific application for which the systems and methods of the present disclosure are used. Those skilled in the art should appreciate that there are equivalents to the specific embodiments described herein. It is, therefore, to be understood that the foregoing embodiments are presented by way of example only and that the claimed system and methods of the disclosure may be practiced otherwise than as specifically described.