Spatially enabled secure communications

ABSTRACT

Spatially enabled secure communication technologies are disclosed. A proximity boundary can be defined by a communication range of one or more SRC devices configured to communicate using near field magnetic induction (NFMI) using at least two antennas to provide magnetic induction diversity. Secure data can be selected for NFMI communication on a spatially secure NFMI data link between the one or more SRC devices. Non-secure data can be selected for communication on one of a wireless local area network or a wireless wide area network.

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/683,155 filed Nov. 13, 2019 which is a continuation of U.S. patentapplication Ser. No. 16/259,741 filed Jan. 28, 2019, which is acontinuation of U.S. patent application Ser. No. 15/724,189 filed Oct.3, 2017, which is a continuation of U.S. patent application Ser. No.14/841,426 filed Aug. 31, 2015, which claims the benefit of U.S.Provisional Patent Application No. 62/044,125 filed Aug. 29, 2014, theentire specifications of which are hereby incorporated by reference intheir entirety for all purposes.

BACKGROUND

Wireless communication has revolutionized society in the 21^(st)century. The way in which people talk, correspond, work, shop, and areentertained has all been changed due to the near omnipresent ability towirelessly communicate. However, wireless communication is typically notconfined to a defined area. Even low power, short range wirelesscommunication standards can be detected over a radius of tens orhundreds of meters. The lack of ability to confine wirelesscommunications to a defined area has limited its use in certainapplications and reduced the overall security of wirelesscommunications.

BRIEF DESCRIPTION OF THE DRAWINGS

Features and advantages of the invention will be apparent from thedetailed description which follows, taken in conjunction with theaccompanying drawings, which together illustrate, by way of example,features of the invention; and, wherein:

FIG. 1a is an example illustration of a proximity boundary basedcommunication system in accordance with an example;

FIG. 1b illustrates another example of a proximity boundary basedcommunication system in accordance with an example;

FIG. 2 illustrates a block diagram of an example illustration of amobile computing device having an SRC device with an NFMI transceiver inaccordance with an example;

FIG. 3 illustrates a block diagram of a mobile computing device with theSRC device and an RF radio in accordance with an example;

FIG. 4 illustrates a block diagram of a mobile computing deviceconfigured for spatially secure multiple radio access technologycommunications in accordance with an example; and

FIG. 5 depicts a flow chart of a method for proximity based securecommunications in accordance with an example;

FIG. 6a illustrates a block diagram of a proximity based securecommunication system in accordance with an example;

FIG. 6b illustrates a block diagram of an SRC device with multipleorthogonal antennas to provide spatially defined security permissions inaccordance with an example; and

FIG. 7 depicts a flow chart of another method for proximity based securecommunications in accordance with an example.

Reference will now be made to the exemplary embodiments illustrated, andspecific language will be used herein to describe the same. It willnevertheless be understood that no limitation of the scope of theinvention is thereby intended.

DETAILED DESCRIPTION

Before the present invention is disclosed and described, it is to beunderstood that this invention is not limited to the particularstructures, process steps, or materials disclosed herein, but isextended to equivalents thereof as would be recognized by thoseordinarily skilled in the relevant arts. It should also be understoodthat terminology employed herein is used for the purpose of describingparticular embodiments only and is not intended to be limiting. Thefollowing definitions are provided for clarity of the overview andembodiments described below.

Definitions

As used herein, the term “substantially” refers to the complete ornearly complete extent or degree of an action, characteristic, property,state, structure, item, or result. For example, an object that is“substantially” enclosed would mean that the object is either completelyenclosed or nearly completely enclosed. The exact allowable degree ofdeviation from absolute completeness may in some cases depend on thespecific context. However, generally speaking the nearness of completionwill be so as to have the same overall result as if absolute and totalcompletion were obtained. The use of “substantially” is equallyapplicable when used in a negative connotation to refer to the completeor near complete lack of an action, characteristic, property, state,structure, item, or result.

As used herein, the term “about” is used to provide flexibility to anumerical range endpoint by providing that a given value may be “alittle above” or “a little below” the endpoint.

As used herein, the term “NFC compliant device” refers to a wirelesscommunication device that can be compliant with at least one of the ISOspecifications including ISO 14443A, ISO 14443B, ISO 18092, and ISO15693. At the time of writing, the most current ISO 14443 specificationfor parts A and B consists of four parts: (1) the ISO/IEC 14443-1:2008disclosing physical characteristics specifications; (2) the ISO/IEC14443-2:2001 disclosing radio frequency and signal interferencespecifications; (3) the ISO/IEC 14443-3:2001 disclosing initializationand anti-collision specifications; and (4) the ISO/IEC 14443-4:2001disclosing transmission protocol specifications. The ISO 15693specification consists of three parts: (1) ISO/IEC 15693-1:2000disclosing physical characteristics specifications; (2) ISO/IEC15693-2:2006 disclosing air interface and initialization specifications;and (3) ISO/IEC 15693-3:2009 disclosing anti-collision and transmissionprotocol specifications. An NFC compliant device is considered to becompliant if the device is substantially compliant, or expected to besubstantially compliant with an accepted version of the ISO 14443, ISO18092, or ISO 15693 specifications, whether the accepted date isprevious to the versions listed above or consists of a future acceptedversion of the specifications, or has evolved from similar technologyover time. The term NFC compliant device can also refer to other typesof close proximity communication devices that are not compliant with theISO 14443 specifications but are configured to communicate at a distanceof about 10 cm or less.

As used herein, the term “short range communication (SRC) device” isintended to refer to NFC compliant devices, as well as other types ofdevices that are configured to communicate using near field magneticinduction (NFMI) within a close proximity of less than about 3 metersfrom a receiver or transceiver.

As used herein, discussion of a communication from one device to anotherdevice may be provided as an example communication between devices butis not intended to be limited to a unidirectional communication. Forexample, embodiments where a first device sends a communication to asecond device are not-limited to a one-directional communication fromthe first to the second device, but can also include embodiments wherethe communication is sent from the second device to the first device, orwhere communications are bi-directionally exchanged from the firstdevice to the second device and from the second device to the firstdevice.

As used herein, the term “mobile computing device” refers to a deviceincluding a digital processor coupled to a digital memory. The mobilecomputing device may be a simple device operable to receive a signal andrespond. Alternatively, the mobile computing device can be a complexdevice having multiple processors and a display screen.

As used herein, the term “radio frequency” or “RF” is used to describenon-proximate far-field propagated electromagnetic radiation used tocommunicate information via an RF transceiver or RF radio. The powerroll-off for an RF electromagnetic signal is approximately one over thedistance squared (1/(dist²)), meaning that power density of the emittedRF signal will be one fourth (¼) as strong as the distance between theemitted RF signal and the RF transmitter is doubled.

As used herein, the term “pairing” refers to the communication ofsufficient information to one or more mobile computing devices to enablethe mobile computing device to form a data link with another mobilecomputing device. The data link can be a wireless link using NFMI and/orRF. The information used to establish the link can be communicated usingNFMI and/or RF to the mobile computing device.

As used herein, the terms customer and user are used synonymously unlessotherwise noted. As used herein, the term “cloud based storage” refersto digital storage at a remote location. The digital storage can be anytype of digital storage including, but not limited to, magnetic storage,optical storage, and solid state storage devices. The digital storagemay be located on a server. A local device, such as a mobile computingdevice or a proximity computing device can access the digital storage atthe remote location via a wireless or a wired connection through aprivate or public network including, but not limited to a local areanetwork, a personal area network, a wide area network, and an internetconnection.

Example Embodiments

An initial overview of technology embodiments is provided below and thenspecific technology embodiments are described in further detail later.This initial summary is intended to aid readers in understanding thetechnology more quickly but is not intended to identify key features oressential features of the technology nor is it intended to limit thescope of the claimed subject matter.

The wireless communication of proximity based information enables a userto send or receive content when the user is within a limited proximityof a location or object. The content may be related to or associatedwith the location or the object. Also, the sending or receiving of thecontent may be triggered by the user entering the limited proximity tothe location or the object. This may done to increase the security ofthe communication link or the data being communicated by limiting thelocation where data is transmitted or received. Knowing where certaindata is permitted to be communicated allows security protocols to beimplemented—such as shielding around a room, or limited access of peopleand or equipment that should not have access to the data or mayeavesdrop on the data communications. This may allow data to becommunicated more efficiently by limiting the communication of data to aspecific location. This can be used to prevent multiple systems fromcommunicated unexpectedly at the same time and place.

In one embodiment, the wireless communication of the proximity basedcontent can be accomplished by wirelessly communicating with a user'smobile computing device, such as a smart phone. While the mobilecomputing device is described herein as being mobile, the mobilecomputing device may be a fixed device. The mobile computing device canbe a handheld computing device, a portable multimedia device, a smartphone, a tablet computing device, a body worn device, a laptop computer,an embedded computing device or similar device. An embedded computingdevice is a computing device that is inlayed in a selected object suchas a vehicle, a watch, a bracelet, a key fob, a ring, a key card, amonitoring device, a remote sensor, a measurement device, a dispensingdevice, a clipboard, an implanted medical device, a token, a poker chip,a souvenir, a necklace amulet, an electronically enabled article ofclothing, an appliance, a tool, a weapon, and so forth. A computingdevice may be embedded in substantially any type of object. The mobilecomputing device can be a device that is user owned, rented, leased,associated with, or otherwise in the possession of the user. A userowned device can include mobile computing devices that are actuallyowned by relatives, friends, and employers of the user.

In one embodiment, wireless communications can be enhanced by the use ofspatially enabled communications. Spatially enabled communications, asused herein, is the enhancement of wireless communications based onproximity control, proximity based security, and/or a determination ofrelative spatial location. The spatially enabled communications can beaccomplished using short range communication (SRC) devices, as describedherein.

The ability to sharply define a desired proximity boundary can provide asignificant advantage for the spatially enabled wireless communications.If an edge of the proximity boundary is substantially variable, a usermay detect and/or receive content for locations or objects that may notbe visible or easily discovered by the user. Certain types of ubiquitouswireless standards may not be useful to sharply define the proximityedge. Standards such as Wi-Fi, also known by the 802.11 standard fromthe Institute of Electronic and Electrical Engineers (IEEE), utilizeRadio Frequency (RF) signals that can have a range of hundreds of feet.The RF signal may be detected in certain situations well outside of thedesired range. More localized standards, such as Bluetooth® can have thesame challenge, albeit for a smaller range. A typical range for aBluetooth device can be approximately 10 meters or about 30 feet.

In accordance with one embodiment of the present invention, an SRCdevice can include a short range transceiver that can be configured tocommunicate using Near Field Magnetic Induction (NFMI). Unlike RFsignals, which are created by modulating information onto anelectromagnetic plane wave and transmitting those signals into freespace, NFMI signals are created by modulating information onto amagnetic field. The magnetic field is localized around the transmittingantenna. The signal outside of this localized region is typicallyattenuated below the noise floor, thereby making it difficult orimpossible to receive the signal. The power roll-off for anelectromagnetic signal is one over the distance squared (1/(dist²)),meaning that every time the distance is doubled, the power is one fourth(¼) as strong. In contrast, the power roll-off for a NFMI signal isproportional to one over the distance to the sixth (1/(dist⁶)), meaningthat every time the distance is doubled, the power is one sixty-fourth (1/64) as strong. Thus, the use of NFMI can enable a signal that can betransmitted predictably within a well-defined area or distance.

However, the edge of the proximity boundary may be variable even whenNFMI is used. One challenge with communicating through the use ofmagnetic induction is the polarization of the signals relative to thetransmitter and receiver antennas. Maximum power in an NFMI signal canbe communicated between two NFMI antennas with axis that are parallel toone another. Minimum power is transmitted between two antennas withantenna axis that are perpendicular to one another. The difference intransmitted power can be significant.

For instance, at 1 meter, the power received in an NFMI signaltransmitted between two antennas that are substantially parallel to eachother can be 50 decibels (dB) greater than the power received when oneof the antennas is substantially perpendicular to the other.

The transmitter typically has no way of knowing the orientation of thereceiver antenna, therefore it must transmit at the maximum (worse case)power setting of +50 dB to ensure a link distance of 1 meter when theantennas are perpendicular with one another.

In an NFMI system, the power roll-off is 60 dB per decade. Therefore 50dB correlates to 0.833 decades (50 dB/60 dB) or an increased linkdistance of 6.8 times (10{circumflex over ( )}0.833). Thus, if thetransmitter and receiver antenna are optimally positioned (i.e.,parallel) while the transmitter is at full power (+50 dB), the linkdistance will reach out to 6.8 meters instead of 1 meter. This meansthat an NFMI link will have a range from approximately one to sevenmeters. This wide range, which depends on the orientation of thetransmitter and receiver antennas, substantially reduces the ability tosharply define a selected proximity around a location or object.

One way of dealing with the challenge of a variable proximity edgecaused by antenna misalignment is to design one or both of thetransmitter and receiver with multiple orthogonal antennas. This ensuresthat at least one of the receiving antennas will be substantiallyparallel to the transmitting antenna regardless of the relativealignment between the transmitter and the receiver. In one embodiment,the signal can be received at a receiver having multiple orthogonalantennas. A portion of the signal can be received on each of theorthogonal antennas and summed, thereby maximizing the signal no matterthe orientation. Alternatively, one or more of the antennas can beselected to transmit or receive based on strength of the signal.

The SRC device associated with the location or object can also includemultiple orthogonal antennas, enabling the device to receive NFMIsignals broadcast from the user's mobile computing device no matter whatthe orientation is between the two transceivers. In one embodiment, theantenna that is used to receive the signal can also be used to transmit.The antenna may be used to transmit on the assumption that it is thebest aligned antenna with the antenna on the receiving transceiver,thereby maximizing the link distance and minimizing the power needed tocommunicate between the two transceivers. This, in turn, reduces theemission levels of the transceiver.

In one embodiment, the use of multiple antennas to communicate a signalis referred to as antenna diversity. When the antennas are used tocommunicate a magnetic induction signal, antenna diversity refers to theuse of multiple orthogonal antennas that are directly connected to asingle transceiver. This is different than antenna diversity used intransmission schemes such as Multiple Input Multiple Output (MIMO),wherein multiple antennas are used to perform spatial multiplexing todecrease signal loss through channel fading. The use of multipleorthogonal antennas to receive a magnetic induction modulated signalwill be referred to as magnetic induction diversity. In one embodiment,the use of magnetic induction diversity can be used in combination withspatial diversity to allow the benefits of both spatial diversity andmagnetic induction diversity to be accomplished.

Magnetic induction diversity can be the selection of the best alignedantenna to receive or transmit with another transceiver. Alternatively,magnetic induction diversity can involve summing the signal on two ormore antennas. The use of magnetic induction diversity enables thevariability of the proximity boundary to be substantially reduced.Since, in a system with multiple receiver antennas positioned inorthogonal planes, a receive antenna can always be selected that issignificantly aligned (i.e., parallel) with a transmit antenna, itreduces the need to significantly increase the transmit power to ensurethat the signal can be received at a selected distance independent ofits relative orientation with the transmit antenna, and vice versa. Itshould be noted that the use of NFMI transceivers does not, by itself,constitute magnetic induction diversity. The distance over which amagnetic induction device can communicate (i.e. a range) when usingmagnetic induction diversity can depend on a number of factors,including but not limited to a communication range of a transmitter anda receive sensitivity of a receiver. A number of additional factors canalso contribute including the degree of orthogonality, the number oftransmit and receive antennas, the shape and size of the antennas, thetransmitter output power, the efficiency of the receiver, and so forth.

The transmit power in each of the NFMI transceivers can be set at alevel to define a desired radius of a proximity boundary. Thetransceivers may be designed so that the proximity boundary may besubstantially circular. Alternatively, the antennas on the short rangetransceiver associated with the product can be designed to provide aradiation pattern of a desired shape, such as a narrow arc or conicalpattern.

Proximity Boundary Based Communication

In one example embodiment, illustrated in FIG. 1a , a proximity boundary108 is illustrated. A proximity SRC (PSRC) device 104 can be configuredto communicate using NFMI within the range of the proximity boundary.The PSRC device can be a proximity computing device that includes atleast one NFMI transceiver coupled to a computing device. The PSRC istypically located at a fixed position, but may be configured as a mobiledevice. A user 112 can carry a computing device 110, such as a mobilecomputing device having an SRC device configured to receive an NFMIsignal broadcast by the PSRC device 104. While the term mobile computingdevice is used in this example, it is not intended to be limiting. TheSRC device can also be coupled to an immobile computing device, or to amobile computing device configured to be located at a fixed location.

If both the SRC device on the mobile computing device 110 and the PSRCdevice 104 include only a single antenna, then the power of the NFMIsignal transmitted from the PSRC device needs to be sufficient to ensurethat the signal can be received at the mobile computing device 110 atthe perimeter of the proximity boundary 108 even when the antenna of theSRC device at the mobile computing device 110 and the antenna of thePSRC device 104 are poorly aligned (i.e., substantially perpendicular).As previously discussed, the power needs to be increased approximately50 dB (i.e., 10,000 to 100,000 times) for this to be achieved.

However, when the antennas of the SRC device at the mobile computingdevice 110 and the PSRC device 104 are better aligned, and the power isincreased by 50 dB to accommodate the poorly aligned antennas, then theNFMI signal can be received anywhere within a radius that isapproximately seven times greater than the proximity boundary 108. Auser 114 having a mobile computing device 110 with an antenna that iscoaxial to or parallel with the antenna of the PSRC device 104 maydetect the NFMI signal a significant distance from the PSRC device. Infact, each person illustrated in FIG. 1 may be able to detect the signalbased on the alignment of the respective antennas.

If one or both of the PSRC device 104 and the SRC device on the mobilecomputing device 110 included multiple orthogonal antennas that usemagnetic induction diversity to receive and/or transmit the NFMI signal,it can be ensured that the receiver and transmitter antenna aresubstantially optimally aligned, thereby enabling a substantiallymaximum amount of the possible power to be received independent of theposition or orientation of the SRC antenna at the mobile computingdevice 110 relative to the antenna of the PSRC device 104. This enablesthe uncertainty area (i.e., the area between the outer circle 114 andthe inner circle 108) to be substantially reduced, thereby enabling thePSRC device to be designed with a desired proximity area with minimaluncertainty area.

The size of the proximity boundary 108 and the uncertainty area outsideof the proximity boundary is determined by the transmit power of eitherthe PSRC device 104 or the SRC device on mobile computing device 110,the receive sensitivity of either the PSRC device 104 or the SRC deviceon mobile computing device 110, and/or antenna alignment. These factors,individually or in combination, can facilitate optimal communicationcoupling which provides a well-defined edge of the proximity boundary.

The NFMI signal broadcast by the PSRC device 104 can be used to indicateto the mobile computing device 110 that the user 112 is located withinthe proximity boundary 108. In one embodiment, the NFMI signal can be aproximity signal which can provide information that indicates a securitypermission for the user to communicate selected data using the user'smobile computing device.

In one embodiment, the security permission can be communicated in asecure, encrypted format from the NFMI transceiver coupled to the PSRCdevice 104 to communicate with the NFMI transceiver coupled to themobile computing device 110. Alternatively, the security permission maybe sent in an unencrypted format, relying on the proximity security ofthe NFMI signal that is communicated substantially only in the proximityboundary 108.

In one embodiment, the selected data is communicated using the mobilecomputing device 110 only while the mobile computing device remainswithin the proximity boundary 108. If the NFMI signal broadcast by thePSRC device 104 is no longer received at the mobile computing device110, then the ability to communicate the selected data using the mobilecomputing device can be disabled.

In another embodiment, once the security permission is received at themobile computing device 110, the mobile computing device can beconfigured to communicate the selected information for a selected timeperiod, at a selected time period, or perpetually, irrespective of themobile computing device's location with respect to the PSRC device.

For example, in one embodiment, a mobile computing device 110 can moveto within a proximity boundary 108 of a PSRC device 104. The PSRC device104 may be located in a computing device in an automobile or a mobilecomputing device used by another person, or at a selected location. ThePSRC device can communicate selected data, comprising pairinginformation to allow the mobile device to pair with another computingdevice. The pairing may be a Bluetooth pairing to another device.Alternatively, pairing can comprise sending sufficient information tothe mobile device that the mobile device can connect with anothercomputing device using NFMI communication or an RF communicationstandard, such as WiFi or 3GPP LTE, as previously discussed. Just bybeing within proximity, the permissions to pair with another computingdevice can be set, thereby enabling pairing to occur passively based ona proximity to a specific location or another device. Alternatively, anadditional security measure can be implemented, such as requiring amanual operation by a user such as pressing a pairing button on themobile computing device to initiate a pairing process with anothercomputing device.

The security permission can grant permission at the mobile computingdevice 110 to transmit, receive, or transmit and receive the selecteddata. For instance, in example embodiments, the selected data can bereceived from the PSRC device 104, transmitted to the PSRC device, orreceived from and transmitted to the PSRC device.

The selected data may be communicated between the mobile computingdevices 110 using the NFMI transceivers to maintain spatial security ofthe selected data within the proximity boundary 108. In anotherembodiment, the selected data can be communicated using a radiofrequency communication standard, such as Bluetooth, IEEE 802.11-2012,802.11ac-2013, 802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, thirdgeneration partnership project (3GPP) long term evolution (LTE) Release8, 9, 10, 11, 12 or 13, an optical link, an acoustic link, a wired link,and so forth. This allows communication protocols that are inherentlynon-proximate in their communication behavior, such as Bluetooth, Wi-Fi,or 3GPP LTE, to function effectively in proximity based applications.Proximity applications can include, but are not limited to, marketing,medical monitoring, secure communications, localized intercoms,proximity payment systems, or other types of proximity basedapplications where the location of one device relative to another can beimportant.

FIG. 1b illustrates another example, wherein an NFMI signal can becommunicated between the NFMI transceivers of two mobile computingdevices 110. A separate proximity boundary 114, 116, 118, 120 isillustrated around each mobile computing device 110.

While the same diameter is illustrated for the proximity boundary ofeach mobile computing device, this is not intended to be limiting. Thediameter of a proximity boundary can be selected based on the systemdesign and needs of each mobile computing device. As previouslydiscussed, the distance over which a magnetic induction device cancommunicate (i.e. a range) when using magnetic induction diversity candepend on a number of factors, including but not limited to acommunication range of a transmitter and a receive sensitivity of areceiver. The NFMI transceiver coupled to a mobile computing device canbe designed to achieve a proximity boundary of a desired size. Apractical size can vary from several centimeters to several meters,depending on the design of the antennas, transmitter, and receiver.Larger proximity boundary sizes can be achieved with a relatively largeamount of power, as can be appreciated.

In the example of FIG. 1b , the proximity diameter can be approximately3 meters. When the user 112 in proximity boundary 116 is located withina distance of less than 1.5 meters from the user in proximity boundary118, an NFMI signal can be broadcast by one of the SRC devices coupledto the mobile computing devices 110. The NFMI signal can be used toindicate to the mobile computing device 110 that another user 112 islocated within the proximity boundary 116 or 118. As previouslydiscussed, the NFMI signal can include a security permission thatenables the mobile computing device to communicate selected data betweenthe mobile computing devices 110. The selected data can be communicatedbetween the mobile computing devices using NFMI transceivers or RFradios, as previously discussed.

The selected data can be communicated between the mobile communicationdevices once the security permission has been received (i.e. once themobile communication devices come within the proximity boundary radiusand the appropriate data/signal has been exchanged/received).Alternatively, the selected data may be communicated only when themobile communication devices remain within a proximity boundary radius.

In FIG. 1b , the user 112 within the proximity boundary 118 is locatedwithin the proximity boundary 116 and 120, thereby enabling the user toreceive security permissions from the users in the other proximityboundaries and communicate selected data with both users. Conversely,the user 112 in proximity boundary 114 is not located within theproximity boundary of any other user. Therefore, the user is not able tocommunicate the selected data with another SRC device or PSRC devicecoupled to a mobile computing device 110.

FIG. 2 illustrates an example block diagram of a system forcommunication based on a location of a proximity boundary, in accordancewith an embodiment of the present invention. While the proximityboundary based communication system 200 is illustrated in FIG. 2 anddescribed herein, the constituent elements and functions thereof may beequally applicable to other implementations of the wirelesscommunication of proximity based content.

Referring to FIG. 2, the proximity boundary based communication systemcomprises one or more mobile computing devices 202. As described in thepreceding paragraphs, each mobile computing device 202 can be a handheldcomputing device, a portable multimedia device, a smart phone, a bodyworn device, an implantable device, embedded in a medical device, amilitary communication system, a military weapons system, integrated inan automobile, a tablet computing device, a laptop computer, an embeddedcomputing device or similar device.

The mobile computing device 202 can be a mobile computing device that isowned by, or otherwise associated with, the location (i.e. a store, ahospital, a business, a military facility, etc.) in which the mobilecomputing device is used. Alternatively, the mobile computing device 202can be a mobile computing device that is not owned by the store in whichit is used. In other words, the mobile computing device 202 can be adevice that is customer/patient/user/operator owned, rented, leased,associated with, or otherwise in the possession of thecustomer/patient/user/operator. A customer owned device can includemobile computing devices that are actually owned by relatives, friends,employers, or other types of associates of the customer.

The mobile computing device 202 can include a digital storage 204. Thedigital storage 204 may be a magnetic digital storage such as a harddisk, an optical digital storage such as an optical disk, a solid statedigital storage such as a Dynamic Random Access Memory (RAM) or apersistent type digital storage such as a flash RAM. Other types ofdigital storage may also be used, as can be appreciated. The digitalstorage 204 may be integrated in the mobile computing device 202.Alternatively, the digital storage 204 may be located in a cloudcomputing storage site that is in wireless communication with the mobilecomputing device 202. Access to the cloud computing storage site can becontrolled by and limited by the user or owner of the mobile computingdevice 202. Access to the cloud computing storage site may be granted toothers by the user and/or owner. In one example embodiment, the cloudcomputing storage site can be accessed via a security permissionreceived from a proximity computing device 210 or another mobilecomputing device 202.

The mobile computing device 202 can include an SRC device 208 that iscoupled to the mobile computing device 202 and enables the mobilecomputing device 202 to transmit and receive information within adefined area using an NFMI transceiver 207. The SRC device 208 can beintegrated with the mobile computing device 202. Alternatively, theshort range communication device may be an external device, such as adongle, that can be plugged into the mobile computing device 202 toenable information to be sent from and received by the mobile computingdevice 202.

The mobile computing device 202 can also include a graphic display 209,such as a liquid crystal display (LCD) screen, organic light emittingdiode (OLED) display screen, or the like. The graphic display screen canbe used to display visual information regarding a location of the mobilecomputing device within the proximity boundary. While a graphic displayis illustrated in FIG. 2, it is not required. Certain types of mobilecomputing devices 202 may not include a graphic display, or may beconnected to an external graphic display device.

A PSRC device 214 can be disposed in a proximity computing device 210that is located at a selected location. The PSRC device is typicallyplaced at a fixed location and used to define a selected a selectedproximity boundary. The PSRC device can transmit a proximity signalwithin the selected proximity boundary of the fixed location using aproximity signal module 215. When a mobile computing device 202 with anSRC device enters the fixed location of the proximity boundary, andreceives the proximity signal, a security permission can be communicatedfrom a security permission module 217 at the PSRC device to the SRCdevice, thereby enabling the SRC device to transmit or receive selecteddata, as previously described. While the example has illustratedcommunication from the PSRC device to an SRC device, this is notintended to be limiting. The SRC device can also transmit proximitysignals and security permissions to the PSRC device. One or both of theSRC device or the PSRC device can then transmit or receive the selecteddata based on the security permission.

For example in a medical environment, the selected location may be ahospital room, a body-worn device on a patient, or a hospital bed. TheSRC device, operating with a mobile computing device, can be embedded ina doctor's or nurse's clipboard while the PSRC device can be embedded ina medical monitoring device. The SRC device in the mobile computingdevice can be a body-worn medical monitoring device or sensor.

In addition to uses in medical environments, the PSRC and SRC devicescan be located in any number of situations and locations. For example,the PSRC device can be located in a vehicle and the SRC device is asmart phone or car key. The PSRC may be a vehicle or an intercom and theSRC device can be in a portable radio on a soldier or in a weapon.

The system illustrated in the example of FIG. 2 is configured toestablish a short range wireless communication link 218 between the SRCdevice 208 and a PSRC device 214 or another SRC device 208 when themobile computing device 202 is within a selected distance 220 of theproximity computing device 210. In one embodiment, the short rangewireless communication channel may only communicate using near fieldmagnetic induction communication. The short range wireless communicationchannel can be referred to as a proximity communication channel. Atleast one of the SRC device 208 and the PSRC device 214 can have aplurality of antennas and use magnetic induction diversity to identifythe best antenna or a plurality of signals to transmit and/or receive asignal. In one embodiment, the selected distance 220 between the twodevices may be less than or equal to a near field distance, which isapproximately a wavelength of the carrier signal (λ) divided by 2 pi(λ/2π).

Proximity Boundary Based High Speed Communication

In one embodiment, a radio frequency communication standard fornon-proximate communications, such as Bluetooth (BT), can be used toform a communication link in a proximity-based application. Because ofthe physical properties of the Bluetooth energy (propagatingelectromagnetic wave), a mobile computing device using Bluetooth is notable to reliably ensure when the mobile computing device is within aspecific distance of another BT enabled device. However BT technology,or other types of RF communication standards, are typically capable oftransmitting information at a higher data rate than NFMI technology.Accordingly, the two radio access technologies can be integrated to forma multi-Radio Access Technology (MRAT) device that is configured toallow the NFMI link to determine when a proximity event occurs (i.e. thecomputing device with an SRC device is located within the proximityboundary of a PSRC device or another computing device with an SRCdevice) and then permit or signal the BT link to exchange the desiredinformation.

While an example of communicating via a BT RF radio link is provided, itis not intended to be limiting. Other types of RF communicationstandards that can be used to broadcast data when a proximity evenoccurs include, but are not limited to, IEEE 802.11-2012, 802.11ac-2013,802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, third generationpartnership project (3GPP) long term evolution (LTE) Release 8, 9, 10,11, 12 or 13, an optical link, an acoustic link, and so forth.

One example of a proximity event used to trigger a communication viaanother radio access technology is a proximity-based advertisingapplication. In order to effectively target a user for proximity basedadvertising, the system can be configured to be aware of when apotential customer or user is within a specified distance of thelocation, good, or service. Once this location has been verified viaNFMI technology, by receiving a proximity signal sent from an NFMItransceiver, as previously described, the system can use a differentradio access technology to enable higher data rates to transfer selecteddata, such as text, images, audio or video. The selected data can becommunicated for an advertisement or provide information for a productwithin the user's proximity. The selected data can be communicated usinga non-proximate radio frequency standard communication more quickly thanthe information typically can be communicated using only a proximitycommunication technology such as NFMI.

The ability to communicate desired information more quickly enables theuser to become aware (i.e. via an alert) of a promotion being offeredbefore the user has passed out of the target location. In addition, ifthere is a large amount of data being communicated (securityinformation, encrypted information, graphics, audio, video, or otherlarge data) the user may become frustrated if the interaction is slow.If the information is communicated slowly, then it may defeat the‘positive experience’ that a marketer typically desires to share with auser.

Another example of a proximity event used to trigger a communication viaa broadband radio access technology is a proximity data transfer device.In one embodiment, a user can download information on a mobile computingdevice while in proximity of a PSRC placed at a selected location andassociated with the location or an object at the location. For example,a PSRC device associated with an interactive movie poster can beconfigured to download or stream the contents of a movie or movietrailer. The system can be activated by a proximity event determined bythe NFMI link between the PSRC and an SRC device in the user's mobilecomputing device. However the NFMI link may not provide an adequate datarate to stream video. Therefore an additional radio access technologyoperable to use a high(er) data rate allows the information to beexchanged effectively.

In one embodiment, proximity events used to trigger broadbandcommunications, such as the interactive movie poster example, can beconfigured such that the user remains within the proximity location inorder to continue accessing the data (i.e. watching video, listening tomusic, accessing a database, participating in a wireless network, and soforth). The use of NFMI transceivers in the SRC device and the PSRCdevice can be configured to form a proximity boundary of a selectedsize, such as 1 to 3 meters. A user within the proximity boundary cancontinue to participate in the proximity event. Other types of shortrange protocols, such as near field communications (NFC), operate in anextremely small region, such as a few centimeters. Such a small area istoo constrictive for a user to continuously hold their mobile computingdevice within the same small location for any length of time.Conversely, an RF (non-proximate far-field) communication standard,which communicates tens to thousands of meters, does not provide thelocalization that the use of the NFMI technology can provide.

Proximity Based Event with Long Range Data Transfer

In another embodiment, the SRC device in the mobile computing device orthe PSRC device can be used to pair the mobile computing device to forma connection using a separate radio access technology with anotherwireless device to enable the mobile computing device to communicate viaa broadband and/or long range communication standard. When the mobilecomputing device enters a proximity boundary, the SRC device can beconfigured to communicate and/or receive sufficient information toestablish an RF radio link with the other wireless device using aselected radio access technology such as Bluetooth, WiFi, 3GPP LTE, andso forth.

The ability to pair with another wireless device to establish the RFradio link can provide significant advantages. While radio accesstechnologies configured to operate in licensed portions of the radiospectrum, such as cellular systems, are configured to operate with aknown group of trusted devices, systems operating in unlicensed portionsof the radio spectrum, such as WiFi and Bluetooth typically do not havethe ability to identify trusted devices. In addition, it can bedifficult to identify other unknown devices and establish the necessaryinformation to form a radio connection with those devices. Using theNFMI radios to communicate the necessary information to establish aWiFi, Bluetooth, or other desired radio link can provide security andreduce the amount of power used to attempt to access unknown devices.The pairing information can also allow the mobile computing devices totrust the data links that they are connected to.

Accordingly, a mobile computing device can be paired to a specificwireless system/network by bringing the device within the proximityboundary of the SRC device. The proximity boundary can be within thecoverage area of a longer range communication standard, such as WiFi orBluetooth.

As previously discussed, a short range system such as an NFC system hasa coverage area of only a few centimeters. It may not always beconvenient to limit this proximity range to a distance that is so smallor restrictive that the user is required to physical hold the wirelessdevice within a specified location. For example the device to beprogrammed may be a body-worn device on a patient, or an embedded devicewithin the patient's body, or a communication system that is not easilyremoved like a helmet or backpack.

Accordingly, the SRC device can be used to define a proximity boundarythat is limited in area relative to the non-proximate wirelesssystem/network, but large enough that it is conveniently accessible tothe user or device to be paired. In addition, the proximity area may belocated so that the user does not have to take any specific action ontheir part to initiate the pairing process.

For example, a PSRC device or an SRC device may be assigned to aspecific patient in a hospital. A caregiver can enter the patient's roomor stand next to the patient's bed with a mobile computing device(clipboard, smartphone, tablet . . . ). The SRC device in the mobilecomputing device can be within the localized proximity boundary createdby the NFMI system in the PSRC or SRC device assigned to the specificpatient in the hospital. A security permission can be communicated, viathe SRC device, to the mobile computing device. The security permissioncan be used to authenticate the mobile computing device to anotherwireless network, such as a WiFi or Bluetooth network, thereby enablingthe mobile computing device to be able to access data, even afterleaving the proximity boundary via a longer range wireless protocol suchas Wi-Fi.

For example, the caregiver can leave the patient's room and go back totheir work station while continuing to access the patient's data via aWi-Fi system. If the caregiver enters a different patient's room, themobile computing device can receive a security permission from an SRCdevice or a PSRC device associated with the different patient to allowthe caregiver to access information associated with the differentpatient via the WiFi system. Alternatively, each patient can beassociated with a different WiFi access point (AP). The securitypermission can provide information that enables the mobile computingdevice to access the WiFi system via the AP associated with a patient.

It should be noted that the proximity event may not just assign a mobiledevice to a wireless system, but may also be used to control permissionsto allow a mobile computing device to access data within the samewireless system.

For example a hospital may have one large wireless network accessible bya non-proximate wireless protocol such as Wi-Fi, and a mobile device canbe assigned specific permissions based on the proximity boundary thatthe mobile device is brought within. The mobile device remains pairedwith the same wireless system, but is able to access different databased on the device's proximity within the network, such as eachpatient's data.

To further clarify, a nurse may have an electronic application on amobile computing device such as a tablet that enables the nurse torecord patient notes. The security permissions received while thecomputing device is within a proximity boundary, using NFMI via the SRCor PSRC device, can enable the mobile computing device to only allowaccess to the patient records that the nurse is currently visiting, orhad previously visited. Patient access can also be based on a length oftime since the nurse visited the patient and was located within adefined proximity boundary created between SRC devices. When the nurseenters a different patient's room, and has left the proximity boundary,the security permission may no longer be received, thereby removingpermission to access the previous patient's data.

The ability to only access a patient's data only from within a definedproximity boundary can reduce errors by ensuring that data that isrecorded is for the patient within the proximity boundary.

Another example comprises a non-proximate wireless intercom systemconfigured to operate in an unlicensed portion of the radio spectrum(e.g. 900 MHz, 2.4 GHz . . . ) where wireless headsets (and microphonesfor bidirectional communication) can communicate to each other or to acentral communication device's hub. Each intercom device can be pairedto the communication network to prevent each intercom device fromcommunicating with or being interfered with by other wireless systemswithin range of the wireless RF signal. Typically, each intercom deviceis configured to undergo a pairing procedure to assign a device to aspecific network. This can be accomplished via software programming,hardware jumper settings (such as a dip-switch) to set the specifiedcode, or a wireless pair-over-air process.

When devices are paired wirelessly (over the air), proper care must betaken to ensure that the device pairs with the intended communicationnetwork—especially if a second communications network operating on thesame wireless standard is nearby. This problem can be resolved in someinstances by requiring a passcode to be entered by at least one of thenodes or devices being paired.

For example, when a Bluetooth device is paired, one node can be put intosearch mode to detect the presence of another Bluetooth enabled nodewith which to communicate. Often one node will have a passkey (0000 forexample) that is to be set on one device to authenticate thepair-over-air process.

Many recent inventions/products allow for devices to be pairedwirelessly through short range communication protocols to reduce thecomplexity of the pair-over-air process. Such systems may implement ashort range physical layer such as magnetic induction or NFC to reducethe probability of inadvertently pairing a device with other nearbynetworks by ensuring that the short-range physical layer link distanceis much more localized than the anticipated distance between othernetworks. These systems often require the device-to-be-paired to bebrought very close to a specific node or location in order to initiatethe pairing process. Many configurations require that the devices ‘bump’or ‘kiss’ each other as the short-range link distance is less than a fewcentimeters or even a few millimeters. While these solutions simplifythe process, they require a specific action on the user's part tocomplete the pairing routine.

In contrast, an NFMI equipped system, such as a mobile computing devicewith an SRC device, can be used to communicate sufficient informationwithin a defined proximity boundary to carry out the pairing processwithout the user being required to ‘bump’ devices. For example, avehicle intercom system only requires that a user enters the vehicle oris located within a close proximity to the vehicle. The NFMI equippedsystem can detect the presence of the device to be paired and can carryout the pairing process without any action on the part of the user. TheNFMI range (i.e. the proximity boundary), typically a few meters indiameter, can be designed to be long enough to allow the pairing processto occur passively (without a specific action by a user) but islocalized enough to prevent the device from pairing with anotherintercom system in the area. Once the device is paired, the user is freeto move away from the predetermined proximity location and is able tocommunicate via a ‘long-range’ wireless protocol, as previouslydiscussed.

Spatially Enabled Secure Communications

In another embodiment, illustrated in the example of FIG. 3, a mobilecomputing device 302 can be configured to provide spatially enabledsecure communications with other mobile computing devices 302 orproximity computing devices 310. In one example, the spatially enabledsecure communications can be implemented by sending secure data betweenSRC devices 308 using NFMI when the mobile computing devices are locatedwithin a selected distance 320. In one embodiment, the selected distance220 can be approximately less than or equal to a radius of the proximityboundary 108 (FIG. 1).

As previously discussed, the power roll-off for an NFMI signal isproportional to one over the distance to the sixth (1/(dist⁶)), meaningthat every time the distance is doubled, the power is one sixty-fourth (1/64) as strong. Accordingly, the power of an NFMI signal quickly fallsbelow a detectable level. Without the use of very specialized equipment,an NFMI signal that is intended to be received at a selected distance,such as three feet, typically cannot be detected at a significantlygreater distance. For example, at 4 times the expected distance, such as12 feet, the signal is 1/4⁶ ( 1/4096) times as strong. This can placethe signal power below the noise floor. Thus, data transmitted usingNFMI has a low probability of detection at a distance significantlyoutside of the proximity boundary. The SRC device can be designed tominimize detection of an NFMI signal outside of the proximity boundary.

Non-secure communication can be communicated using a radio frequency(RF) radio 311 configured to operate with a communication standard, suchas Bluetooth, IEEE 802.11-2012, 802.11ac-2013, 802.11ad, 802.11ax, IEEE802.15, IEEE 802.16, third generation partnership project (3GPP) longterm evolution (LTE) Release 8, 9, 10, 11, 12 or 13, an optical link, anacoustic link, a wired link, and so forth.

While the term “non-secure data” is used to refer to data that is notbroadcast on a spatially secure data link, such as an NFMI data link,the term is not intended to be limiting. The non-secure data can also beencrypted and/or scrambled and communicated on the radio frequencycommunications standards using additional security techniques, such ascommunication using a pseudo random noise (PRN) code or other scramblingor encryption techniques.

In one embodiment, the secure communications can be communicated on aspatially secure NFMI data link 318 between SRC devices 308 or PSRCdevices 314 as long as the secure communication is possible. The securecommunication can be possible when a sufficient signal to noise ratio(SNR) or signal to interference plus noise ratio (SINR) exists.Alternatively, secure communication using NFMI can be attempted as longas a security permission is received from another SRC device 308 or PSRCdevice 314.

In one embodiment, the secure communication can be encrypted using adesired encryption scheme, such as a public private key, datascrambling, a pseudo random noise code, and so forth. Alternatively,data can be sent via the spatially secure communication link using NFMIwithout encryption or scrambling.

The ability to communicate secure data using a spatially secure NFMIcommunication link 318 and non-secure data using a radio frequency datalink 313 provides significant advantages. The spatially secure NFMI datalink 318 between SRC 308 and/or PSRC devices 314 can be used to provideboth spatial security and, if desired, additional encryption andscrambling levels of security. However, the spatially secure NFMI datalink can be bandwidth limited. An NFMI data link may be configured toprovide data at rates from about 10 kilobits per second (Kbps) to onemegabit per second (Mbps). The radio frequency data link 313, using astandard such as Bluetooth, WiFi, or LTE, can provide a bandwidth oftens to hundreds or even thousands of megabits per second.

Thus, offloading non-secure data to a radio frequency data link 313 canenable a mobile computing device to transmit or receive relativelybroadband data, such as large data transfers or streaming audio orvideo, via the radio frequency data link. The spatially secure NFMI datalink 318 can be used to communicate data with a higher security risk,such as banking information, credit card information, personalidentification numbers (PIN), payment information, or other data that isdesired to be secure.

In addition, the spatially secure NFMI data link 318 can be used tosetup the radio frequency data link between two mobile computing devices302 or a proximity computing device 310. For example, the NFMI data linkcan be used to passively communicate pairing information between mobilecomputing devices or proximity computing devices. Rather than requiringa user to actively setup and pair two mobile computing devices, theinformation needed to setup the two mobile computing devices tocommunicate via the radio frequency data link 313 can be automaticallycommunicated via the NFMI data link when the two mobile computingdevices are within the selected distance 220.

While the term “pairing” is used, it is not intended to be limited to asetup of a radio frequency data link 313 between the mobile computingdevices 302 using the Bluetooth standard. Other standards such as WiFi,WiFi direct, Zigbee, 3GPP LTE, or other device to device data links canbe implemented by sharing the necessary information to establish theradio frequency links. Examples of pairing information include, but arenot limited to, identification information, a radio frequency centerfrequency, a channel, a channel frequency, packetization parameters, andso forth. Sufficient information to create the radio frequency data linkcan be communicated via the NFMI data link 318 to enable the radiofrequency data link to be established, thereby providing a relativelybroadband radio frequency data link and a spatially secure NFMI datalink without the need for active input by a user to setup the separatelink.

One area where spatially enabled secure communications can be used isduring a point of sale (POS) transaction. A POS transaction needs to beboth fast and secure. Secure information, such as a personalidentification number (PIN), a user's account, credit card, bankinginformation, balance, or other sensitive information can be sent via thespatially secure NFMI data link 318. Other data, such as reward points,coupons, purchasing history, tracking information and other types ofless secure transaction data can be communicated via the radio frequencydata link 311. The other data can be communicated on the radio frequencydata link in parallel with the secure information on the NFMI data link.Alternatively, the other data may be communicated after permission isreceived from the spatially NFMI data link. For example, after theidentity of a customer or user has been verified via the spatiallysecure NFMI data link, then the other data can be communicated on theradio frequency data link.

Medical information can also be communicated using both the spatiallysecure and radio frequency data links. For example, a patient'sconfidential information, such as social security information, financialinformation, PIN number, medical information, diagnosis, or othersensitive data can be communicated via the spatially secure NFMI datalink 318. Other types of data, such as raw sensor data, encrypted data,book keeping data (i.e. time stamps, nurse on duty information, mealschedule, sleep schedule, and so forth) could be communicated via theradio frequency data link 311.

The spatially enabled secure communication can also be used for militarycommunications. For example, encryption keys for pairing can betransmitted via the NFMI data link 318, while broadband data such asaudio data and video data can be encrypted with the encryption keys andthen communicated via the RF data link 311.

In one embodiment, a method for proximity based secure communications500 is disclosed, as depicted in the flow chart of FIG. 5. The methodcomprises the operation of defining a proximity boundary with dimensionsdefined by a communication range of one of a first Short RangeCommunication (SRC) device and a second SRC device, wherein each of thefirst and second SRC devices are configured to communicate using nearfield magnetic induction (NFMI). The first SRC device is configured tobe coupled to a first computing device and the second SRC device isconfigured to be coupled to a second computing device, as shown in block510. An additional operation involves communicating an NFMI proximitysignal in the proximity boundary between the first SRC device and thesecond SRC device, as shown in block 520. At least one of the first andsecond SRC devices can include at least two antennas to provide magneticinduction diversity, thereby enabling the proximity boundary to berelatively sharply defined, as previously discussed.

The method 500 can further comprise the operation of selecting securedata for NFMI communication on a spatially secure NFMI data link betweenthe first and second computing devices when the proximity signal isdetected between the first and second SRC devices, as shown in block530.

The method 500 can further comprise the operation of selectingnon-secure data for communication on a radio frequency (RF) data linkfrom at least one of the first and second computing devices using one ofa wireless local area network (WLAN) radio and a wireless wide areanetwork (WWAN) radio when the proximity signal is detected between thefirst and second SRC devices.

For example, the non-secure data can be communicated using a WLAN radiofrequency communication standard, such as Bluetooth, IEEE 802.11-2012,802.11ac-2013, 802.11ad, 802.11ax, or IEEE 802.15. Alternatively, thenon-secure data can be communicated using a WWAN standard such as IEEE802.16, or the third generation partnership project (3GPP) long termevolution (LTE) Release 8, 9, 10, 11, 12 or 13, or another desired WLANstandard or WWAN standard. In one embodiment, the non-secure data can becommunicated using both a WLAN and a WWAN.

The non-secure data can be communicated in an encoded or encrypted priorto transmission, as previously discussed. In addition, the selectedsecure data can also be encrypted. The secure data can comprise pairinginformation to allow at least one of the first computing device or thesecond computing device to pair with the other computing device, oranother desired computing device.

In other embodiment, the secure data selected for NFMI communication onthe spatially secure NFMI data link between the first SRC device and thesecond SRC device can comprise selected point of sale (POS) information.For example, selected POS information can be sent as secure data forNFMI communication on the spatially secure NFMI data link using thefirst and second SRC devices. In one example, the POS information cancomprise one or more of: a personal identification number (PIN), a useraccount number, a credit card number, a checking account number, bankinginformation, a banking account balance, personal health information, orprescription drug information. This exemplary list is not intended to belimiting. Any desired type of data that includes POS information can becommunicated on the spatially secure NFMI data link.

In addition, POS information can be selected as non-secure data andcommunicated on the FR data link using the WLAN radio or the WWAN radio.Non limiting examples of non-secure POS information can include rewardpoints, coupons, advertising information, purchasing history, trackinginformation, or other types of POS information that are selected asnon-secure data.

In another example, selected medical information can be communicated assecure data for NFMI communication on the spatially secure NFMI datalink using the first and second SRC devices. A non-limiting example ofmedical information that may be selected for transmission on thespatially secure NFMI data link can include: confidential medicalinformation, a social security number, and confidential financialinformation.

Certain types of medical information can also be selected as non-securedata for communication on the RF data link using the WLAN radio or theWWAN radio. Non-limiting examples of medical information that may beselected for transmission on the RF data link include: employee timestamp information, meal schedule information, sleep scheduleinformation, and raw sensor data. The types of medical information thatare selected for secure and non-secure communication may be determinedon a case by case, or hospital by hospital, or business by businessbasis.

FIG. 6a illustrates an example block diagram of a proximity based securecommunication system, in accordance with an example. While the proximityboundary based communication system 600 is illustrated in FIG. 6a anddescribed herein, the constituent elements and functions thereof may beequally applicable to other implementations of the wirelesscommunication of proximity based content.

Referring to FIG. 6a , the proximity boundary based communication systemcomprises one or more computing devices 602, 603. As described in thepreceding paragraphs, each computing device 602 can be a handheldcomputing device, a desktop computing device, a portable multimediadevice, a smart phone, a body worn device, an implantable device,embedded in a medical device, a military communication system, amilitary weapons system, integrated in an automobile, a tablet computingdevice, a laptop computer, an embedded computing device or similar typeof computing device.

The computing device 602, 603 can be a computing device or a mobilecomputing device that is owned by, or otherwise associated with, alocation (i.e. a store, a hospital, a business, a military facility,etc.) in which the computing device is used. Alternatively, thecomputing device 602, 603 can be a computing device that is not owned bythe store in which it is used. In other words, the computing device 602,603 can be a device that is customer/patient/user/operator owned,rented, leased, associated with, or otherwise in the possession of thecustomer/patient/user/operator. A customer owned device can includecomputing devices that are actually owned by relatives, friends,employers, or other types of associates of the customer.

The computing device 602, 603 can include a digital storage 604. Thedigital storage 604 may be a magnetic digital storage such as a harddisk, an optical digital storage such as an optical disk, a solid statedigital storage such as a Dynamic Random Access Memory (RAM) or apersistent type digital storage such as a flash RAM or Phase ChangeMemory. Other types of digital storage may also be used, as can beappreciated. The digital storage 604 may be integrated in the computingdevice 602, 603. Alternatively, the digital storage 604 may be locatedin a cloud computing storage site that is in wireless communication withthe computing device 602. Access to the cloud computing storage site canbe controlled by and limited by the user or owner of the computingdevice 602. Access to the cloud computing storage site may be granted toothers by the user and/or owner.

The computing device 602, 603 can include an SRC device 608 that iscoupled to the computing device 602, 603 and enables the computingdevice 602 to transmit and receive information within a defined areausing an NFMI transceiver 607. The SRC device 608 can be integrated withthe computing device 602, 603. Alternatively, the short rangecommunication device may be an external device, such as a dongle, thatcan be plugged into the computing device 602, 603 to enable informationto be sent from and received by the computing device 602, 603.

As illustrated in FIG. 6b , the SRC device 608 can include multipleorthogonal antennas 610, 611, 612. The multiple orthogonal antennas canbe used to provide magnetic induction diversity, thereby enabling theproximity boundary to be relatively sharply defined, as previouslydiscussed. In one embodiment, each SRC device 608 can include two ormore orthogonal antennas. In another embodiment, one SRC device may havea single antenna and another SRC device can include two or moreorthogonal antennas.

A communication range of one of a first SRC device and a second SRCdevice that includes at least two antennas, can be used to define one ormore dimensions of a proximity boundary, as previously discussed in thepreceding paragraphs. It should be noted that, the mere use of multipleorthogonal antennas does not guarantee the definition of a relativelysharply defined proximity boundary. Rather, the use of the multipleorthogonal antennas, combined with the selection of components withdesired tolerances can provide a relatively sharply defined proximityboundary. The tolerances of components in the SRC can be designed andselected to provide a desired proximity boundary that is relativelysharply defined. Components in both the transmit chain, receive chain,RF front end, and antennas can be selected to provide the desiredtolerance in the proximity boundary. The design and selection offilters, amplifiers, receivers, transmitters, antennas, and other RFcomponents can provide the desired tolerance of the proximity boundary.The desired tolerance of the boundary can depend upon its intended useand intended use location.

In one example, it can be desirable to select and design components ofthe SRC devices to define a proximity boundary of approximately 9 feetin diameter. It can be acceptable to have another SRC device detect aproximity signal within 3 feet of the designed 9 foot diameter boundary.Thus, an SRC device may be able to detect the proximity signal when 12feet from another SRC device or PSRC device.

In another example, it can be desirable to select and design componentsof the SRC devices to define a proximity boundary of approximately 3feet in diameter. The proximity boundary can be configured to operatenear other SRC devices with proximity boundaries. Accordingly, in orderto provide a relatively sharply defined proximity boundary, thecomponents of the SRC device can be selected so that the SRC devicecannot detect a proximity signal at a distance of greater than 4 feetfrom another SRC device or PSRC device. These examples are not intendedto be limiting. An SRC device, and the components of the SRC device, canbe selected and designed with components that are capable of providing aproximity boundary with desired dimensions and a sufficiently sharpboundary to allow the SRC device to function as desired. The use of NFMIcommunication, multiple orthogonal antennas, and components with desiredtolerances can enable the definition of a desired proximity boundary.

Returning to FIG. 6a , the computing device 602, 603 can also include agraphic display 609, such as a liquid crystal display (LCD) screen,organic light emitting diode (OLED) display screen, or the like. Thegraphic display screen can be used to display visual informationregarding a location of the computing device within the proximityboundary. While a graphic display is illustrated in FIG. 6a , it is notrequired. Certain types of computing devices 602 may not include agraphic display, or may be connected to an external graphic displaydevice.

The computing device 602, 603 can also include a WWAN radio and/or aWLAN radio 609 that can be used for form a radio frequency (RF) datalink. The WWAN radio and/or WLAN radio 609 can be coupled to thecomputing device and configured to transmit data from or receive datafor the computing device via an RF data link 622 with another computingdevice.

In accordance with one embodiment of the present invention, a proximitysignal module 615 can be coupled to a computing device, such ascomputing device 602. The proximity signal module can communicate aproximity signal within the proximity boundary between the SRC device608 of the computing device 602 and the SRC device 608 of the computingdevice 603.

A security data selection module 617 is configured to select secure datafor NFMI communication between a first computing device 602 and a secondcomputing device 603 using the SRC devices 608 to form a spatiallysecure NFMI data link 618 when the proximity signal is detected betweenthe SRC device of the first computing device 602 and the SRC device ofthe second computing device 603.

The security data selection module 617 can be further configured toselect non-secure data for communication on an RF data link 622 from oneor more of the first computing device 602 and the second computingdevice 603 using one of the WLAN radio and the WWAN radio when theproximity signal is detected between the first SRC device (i.e. the SRCdevice 608 of the first computing device 602) and the second SRC device(i.e. the SRC device 608 of the second computing device 603) on thespatially secure NFMI data link 618.

In one embodiment, the non-secure data can be data selected by thesecurity data selection module 617 for communication via a non-proximatefar-field propagated electromagnetic signal. The selection of the dataas secure or non-secure may be performed at a link level, such as theradio link layer or the MAC layer. Alternatively, the selection mayoccur at a higher layer, or may be predetermined prior to transmission.

In one embodiment, the non-secure data can be encrypted prior totransmission on the RF data link 622 using one or more of the WLAN radioor the WWAN radio.

In one embodiment, one of the SRC devices 608 can be a proximity SRC(PSRC) device that is in a substantially fixed location.

In another embodiment, at least one of the first SRC device and thesecond SRC device, or the PSRC device is configured to communicatepairing information to allow the first computing device 602 or thesecond computing device 603 to pair with another computing device whenthe computing device enters the proximity boundary. The pairinginformation can be selected as secure data (for transmission on thespatially secure NFMI data link 618) or non-secure data (fortransmission on the RF data link 622).

In one embodiment, a method for proximity based secure communications700 is disclosed, as depicted in the flow chart of FIG. 7. The methodcomprises the operation of defining a proximity boundary with dimensionsdefined, in part, by a communication range of one of a proximity ShortRange Communication (PSRC) device and an SRC device, wherein the PSRCdevice and the SRC device are configured to communicate using near fieldmagnetic induction (NFMI), wherein at least one of the PSRC device andthe SRC device include at least two antennas to provide magneticinduction diversity, as shown in block 710. The method further comprisesselecting secure data for NFMI communication on a spatially secure NFMIdata link between the PSRC device and the SRC device as shown in block720; and selecting non-secure data for communication on a radiofrequency (RF) data link using one of a wireless local area network(WLAN) radio and a wireless wide area network (WWAN) radio, as shown inblock 730.

In one embodiment, the secure data can comprise pairing information toallow a first computing device to pair with another computing device. Inanother embodiment, the secure data can comprise point of sale (POS)information. Secure POS information can be sent over the spatiallysecure NFMI data link, while data that is deemed to be non-secure POSinformation can be sent over the RF data link.

In another embodiment, medical information can be distributed intosecure medical information and non-secure medical information. Thesecure medical information can be communicated via the spatially secureNFMI data link between the SRC device and the PSRC device. Thenon-secure medical information can be communicated on the RF data link.

As previously discussed, while the term “secure” and “non-secure” datais used, this is not intended to be limiting. Any type of informationmay be deemed to be either secure, or non-secure and communicated viathe spatially secure NFMI data link, or the RF data link. In addition,both secure and non-secure data can be encrypted or encoded prior totransmission.

It should be understood that many of the functional units described inthis specification have been labeled as modules, in order to moreparticularly emphasize their implementation independence. For example, amodule may be implemented as a hardware circuit comprising customVery-Large-Scale Integration (VLSI) circuits or gate arrays, a customApplication-Specific Integrated Circuit (ASIC), off-the-shelfsemiconductors such as logic chips, transistors, or other discretecomponents. A module may also be implemented in programmable hardwaredevices such as field programmable gate arrays, programmable arraylogic, programmable logic devices or the like.

Modules may also be implemented in software for execution by varioustypes of processors. An identified module of executable code may, forinstance, comprise one or more physical or logical blocks of computerinstructions, which may, for instance, be organized as an object,procedure, or function. Nevertheless, the executables of an identifiedmodule need not be physically located together, but may comprisedisparate instructions stored in different locations which, when joinedlogically together, comprise the module and achieve the stated purposefor the module.

Indeed, a module of executable code may be a single instruction, or manyinstructions, and may even be distributed over several different codesegments, among different programs, and across several memory devices.Similarly, operational data may be identified and illustrated hereinwithin modules, and may be embodied in any suitable form and organizedwithin any suitable type of data structure. The operational data may becollected as a single data set, or may be distributed over differentlocations including over different storage devices, and may exist, atleast partially, merely as electronic signals on a system or network.The modules may be passive or active, including agents operable toperform desired functions.

Reference throughout this specification to “one embodiment” or “anembodiment” means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment of the present invention. Thus, appearancesof the phrases “in one embodiment” or “in an embodiment” in variousplaces throughout this specification are not necessarily all referringto the same embodiment.

As used herein, a plurality of items, structural elements, compositionalelements, and/or materials may be presented in a common list forconvenience. However, these lists should be construed as though eachmember of the list is individually identified as a separate and uniquemember. Thus, no individual member of such list should be construed as ade facto equivalent of any other member of the same list solely based ontheir presentation in a common group without indications to thecontrary. In addition, various embodiments and example of the presentinvention may be referred to herein along with alternatives for thevarious components thereof. It is understood that such embodiments,examples, and alternatives are not to be construed as defactoequivalents of one another, but are to be considered as separate andautonomous representations of the present invention.

Furthermore, the described features, structures, or characteristics maybe combined in any suitable manner in one or more embodiments. In thefollowing description, numerous specific details are provided, such asexamples of materials, fasteners, sizes, lengths, widths, shapes, etc.,to provide a thorough understanding of embodiments of the invention. Oneskilled in the relevant art will recognize, however, that the inventioncan be practiced without one or more of the specific details, or withother methods, components, materials, etc. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring aspects of the invention.

While the forgoing examples are illustrative of the principles of thepresent invention in one or more particular applications, it will beapparent to those of ordinary skill in the art that numerousmodifications in form, usage and details of implementation can be madewithout the exercise of inventive faculty, and without departing fromthe principles and concepts of the invention. Accordingly, it is notintended that the invention be limited, except as by the claims setforth below.

What is claimed is:
 1. A method for proximity based securecommunications, comprising: defining a proximity boundary withdimensions defined by a selected communication range of one of a firstShort Range Communication (SRC) device and a second SRC device, whereineach of the first and second SRC devices are configured to communicateusing near field magnetic induction (NFMI), and the first SRC device isconfigured to be coupled to a first computing device and the second SRCdevice is configured to be coupled to a second computing device;communicating an NFMI proximity signal in the proximity boundary betweenthe first SRC device and the second SRC device, wherein at least one ofthe first and second SRC devices includes at least two antennas toprovide magnetic induction diversity; selecting secure data for NFMIcommunication on a spatially secure NFMI data link between the first andsecond computing devices when the proximity signal is detected betweenthe first and second SRC devices; and selecting non-secure data forcommunication on a radio frequency (RF) data link from at least one ofthe first and second computing devices using one of a wireless localarea network (WLAN) radio and a wireless wide area network (WWAN) radiowhen the proximity signal is detected between the first and second SRCdevices.
 2. The method of claim 1, further comprising encrypting thenon-secure data for communication on the RF data link via the WLAN orthe WWAN from the first or second computing device.
 3. The method ofclaim 1, further comprising encrypting the secure data for NFMIcommunication on the spatially secure NFMI data link using the SRCdevice on the first computing device and the SRC device on the secondcomputing device.
 4. The method of claim 1, further comprising,selecting secure data for NFMI communication on the spatially secureNFMI data link using the first and second SRC devices, wherein thesecure data comprises pairing information to allow at least one of thefirst computing device and the second computing device to pair withanother computing device.
 5. The method of claim 1, further comprising,selecting secure data for NFMI communication on the spatially secureNFMI data link between the first SRC device and the second SRC device,wherein the secure data comprises selected point of sale (POS)information.
 6. The method of claim 5, further comprising sending theselected POS information as secure data for NFMI communication on thespatially secure NFMI data link using the first and second SRC devices,wherein the POS information comprises one or more of: a personalidentification number (PIN), a user account number, a credit cardnumber, a checking account number, banking information, a bankingaccount balance, personal health information, or prescription druginformation.
 7. The method of claim 1, further comprising sendingselected point of sale (POS) information as non-secure data forcommunication on the RF data link using the WLAN radio or the WWANradio, wherein the POS non-secure data comprises one or more of: rewardpoints, coupons, advertising information, purchasing history, ortracking information.
 8. The method of claim 1, further comprisingsending selected medical information as secure data for NFMIcommunication on the spatially secure NFMI data link using the first andsecond SRC devices, wherein the medical information comprises:confidential medical information, a social security number, andconfidential financial information.
 9. The method of claim 1, furthercomprising sending selected medical information as non-secure data forcommunication on the RF data link using the WLAN radio or the WWANradio, wherein the medical non-secure data comprises: employee timestamp information, meal schedule information, sleep scheduleinformation, and raw sensor data.
 10. A proximity based securecommunications system comprising: a first Short Range Communication(SRC) device including a near field magnetic (NFMI) transceiver that iscoupled to a first computing device; a second SRC device including anNFMI transceiver that is coupled to a second computing device, whereinone or more of the first SRC device or the second SRC device includes atleast two antennas to provide magnetic induction diversity, and whereina communication range of one of the first SRC device or the second SRCdevice, using the at least two antennas, defines one or more dimensionsof a proximity boundary; a proximity signal module coupled to the firstcomputing device and configured to communicate a proximity signal in theproximity boundary between the first SRC device and the second SRCdevice coupled to the second computing device; and a security dataselection module configured to select secure data for NFMI communicationbetween the first computing device and the second computing device usingthe first SRC device and the second SRC device to form a spatiallysecure NFMI data link when the proximity signal is detected between thefirst SRC device and the second SRC device.
 11. The proximity basedsecure communications system of claim 10, wherein the security dataselection module is further configured to select non-secure data forcommunication on a radio frequency (RF) data link from one or more ofthe first computing device and the second computing device using one ofa wireless local area network (WLAN) radio and a wireless wide areanetwork (WWAN) radio when the proximity signal is detected between thefirst SRC device and the second SRC device on the spatially secure NFMIdata link.
 12. The proximity based secure communications system of claim11, wherein the non-secure data is data selected by the security dataselection module for communication via a non-proximate far-fieldpropagated electromagnetic signal.
 13. The proximity based securecommunications system of claim 11, wherein the non-secure data isencrypted prior to transmission on the RF data link using one or more ofthe WLAN radio or the WWAN radio.
 14. The proximity based securecommunications system of claim 11, wherein one of the first SRC deviceand the second SRC device is a proximity SRC (PSRC) device in asubstantially fixed position.
 15. The proximity based securecommunications system of claim 14, wherein at least one of the first SRCdevice, the second SRC device, or the PSRC device is configured tocommunicate pairing information to allow the first computing device orthe second computing device to pair with another computing device whenthe computing device enters the proximity boundary, wherein the pairinginformation is selected as secure data or non-secure data.
 16. A methodfor proximity based secure communications, comprising: defining aproximity boundary with dimensions defined, in part, by a communicationrange of one of a proximity Short Range Communication (PSRC) device andan SRC device, wherein the PSRC device and the SRC device are configuredto communicate using near field magnetic induction (NFMI), wherein atleast one of the PSRC device and the SRC device include at least twoantennas to provide magnetic induction diversity; and selecting securedata for NFMI communication on a spatially secure NFMI data link betweenthe PSRC device and the SRC device; and selecting non-secure data forcommunication on a radio frequency (RF) data link using one of awireless local area network (WLAN) radio and a wireless wide areanetwork (WWAN) radio.
 17. The method of claim 16, further comprising,selecting secure data for NFMI communication on the spatially secureNFMI data link using the SRC device and the PSRC device, wherein thesecure data comprises pairing information to allow a first computingdevice to pair with another computing device.
 18. The method of claim16, further comprising, selecting secure data for NFMI communication onthe spatially secure NFMI data link between the first SRC device and thesecond SRC device, wherein the secure data comprises selected point ofsale (POS) information; and selecting non-secure data from the POSinformation for communication in the RF data link.
 19. The method ofclaim 16, further comprising: sending selected medical information assecure data for NFMI communication on the spatially secure NFMI datalink using SRC device and the PSRC device; and sending selected medicalinformation as non-secure data on the RF data link.
 20. The method ofclaim 16, further comprising encrypting the non-secure data forcommunication on the RF data link via the WLAN or the WWAN from thefirst or second computing device; and encrypting the secure data forNFMI communication on the spatially secure NFMI data link between theSRC device and the PSRC device.