Spatially enabled secure communications

ABSTRACT

Spatially Enabled Communication technologies are disclosed. A proximity boundary can be defined by a communication range of one or more SRC devices configured to communicate using near field magnetic induction (NFMI) using at least two antennas to provide magnetic induction diversity. A data block can be securely communicated by interspersing the data between an short range communication (SRC) device for near field magnetic induction (NFMI) communication within the proximity boundary and a radio frequency (RF) radio for RF communication. Data received on the SRC device and the RF radio can be reassembled to form the data block.

RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 16/673,848 filed Nov. 4, 2019, which is a continuation of U.S.patent application Ser. No. 16/182,494 filed Nov. 6, 2018, which is acontinuation of U.S. patent application Ser. No. 15/645,915 filed Jul.10, 2017, which is a continuation of U.S. patent application Ser. No.14/841,435 filed Aug. 31, 2015, which claims the benefit of and priorityto U.S. Provisional Patent Application No. 62/044,125, filed Aug. 29,2014, the entire specifications of which are hereby incorporated byreference in their entirety for all purposes.

BACKGROUND

Wireless communication has revolutionized society in the 21^(st)century. The way in which people talk, correspond, work, shop, and areentertained has all been changed due to the near omnipresent ability towirelessly communicate. However, wireless communication is typically notconfined to a defined area. Even low power, short range wirelesscommunication standards can be detected over a radius of tens orhundreds of meters. The lack of ability to confine wirelesscommunications to a defined area has limited its use in certainapplications and reduced the overall security of wirelesscommunications.

BRIEF DESCRIPTION OF THE DRAWINGS

Features and advantages of the invention will be apparent from thedetailed description which follows, taken in conjunction with theaccompanying drawings, which together illustrate, by way of example,features of the invention; and, wherein:

FIG. 1a is an example illustration of a proximity boundary basedcommunication system in accordance with an embodiment of the presentinvention;

FIG. 1b illustrates another example of a proximity boundary basedcommunication system in accordance with an embodiment of the presentinvention;

FIG. 2 illustrates a block diagram of an example illustration of amobile computing device having an SRC device with an NFMI transceiver inaccordance with an embodiment of the present invention;

FIG. 3 illustrates a block diagram of a mobile computing device with theSRC device and an RF radio in accordance with an embodiment of thepresent invention;

FIG. 4a illustrates a block diagram of a mobile computing deviceconfigured for spatially secure multiple radio access technologycommunications in accordance with an embodiment of the presentinvention;

FIG. 4b illustrates a block diagram of an SRC device with multipleorthogonal antennas to provide spatially defined security permissions inaccordance with an example;

FIG. 5 depicts a flow chart of a method for proximity based securecommunications in accordance with an embodiment of the presentinvention;

FIG. 6 depicts a flow chart of a method for spatially enabled securecommunication in accordance with an embodiment of the present invention.

Reference will now be made to the exemplary embodiments illustrated, andspecific language will be used herein to describe the same. It willnevertheless be understood that no limitation of the scope of theinvention is thereby intended.

DETAILED DESCRIPTION

Before the present invention is disclosed and described, it is to beunderstood that this invention is not limited to the particularstructures, process steps, or materials disclosed herein, but isextended to equivalents thereof as would be recognized by thoseordinarily skilled in the relevant arts. It should also be understoodthat terminology employed herein is used for the purpose of describingparticular embodiments only and is not intended to be limiting. Thefollowing definitions are provided for clarity of the overview andembodiments described below.

Definitions

As used herein, the term “substantially” refers to the complete ornearly complete extent or degree of an action, characteristic, property,state, structure, item, or result. For example, an object that is“substantially” enclosed would mean that the object is either completelyenclosed or nearly completely enclosed. The exact allowable degree ofdeviation from absolute completeness may in some cases depend on thespecific context. However, generally speaking the nearness of completionwill be so as to have the same overall result as if absolute and totalcompletion were obtained. The use of “substantially” is equallyapplicable when used in a negative connotation to refer to the completeor near complete lack of an action, characteristic, property, state,structure, item, or result.

As used herein, the term “about” is used to provide flexibility to anumerical range endpoint by providing that a given value may be “alittle above” or “a little below” the endpoint.

As used herein, the term “NFC compliant device” refers to a wirelesscommunication device that can be compliant with at least one of the ISOspecifications including ISO 14443A, ISO 14443B, ISO 18092, and ISO15693. At the time of writing, the most current ISO 14443 specificationfor parts A and B consists of four parts: (1) the ISO/IEC 14443-1:2008disclosing physical characteristics specifications; (2) the ISO/IEC14443-2:2001 disclosing radio frequency and signal interferencespecifications; (3) the ISO/IEC 14443-3:2001 disclosing initializationand anti-collision specifications; and (4) the ISO/IEC 14443-4:2001disclosing transmission protocol specifications. The ISO 15693specification consists of three parts: (1) ISO/IEC 15693-1:2000disclosing physical characteristics specifications; (2) ISO/IEC15693-2:2006 disclosing air interface and initialization specifications;and (3) ISO/IEC 15693-3:2009 disclosing anti-collision and transmissionprotocol specifications. An NFC compliant device is considered to becompliant if the device is substantially compliant, or expected to besubstantially compliant with an accepted version of the ISO 14443, ISO18092, or ISO 15693 specifications, whether the accepted date isprevious to the versions listed above or consists of a future acceptedversion of the specifications, or has evolved from similar technologyover time. The term NFC compliant device can also refer to other typesof close proximity communication devices that are not compliant with theISO 14443 specifications but are configured to communicate at a distanceof about 10 cm or less.

As used herein, the term “short range communication (SRC) device” isintended to refer to NFC compliant devices, as well as other types ofdevices that are configured to communicate using near field magneticinduction (NFMI) within a close proximity of less than about 3 metersfrom a receiver or transceiver.

As used herein, discussion of a communication from one device to anotherdevice may be provided as an example communication between devices butis not intended to be limited to a unidirectional communication. Forexample, embodiments where a first device sends a communication to asecond device are not-limited to a one-directional communication fromthe first to the second device, but can also include embodiments wherethe communication is sent from the second device to the first device, orwhere communications are bi-directionally exchanged from the firstdevice to the second device and from the second device to the firstdevice.

As used herein, the term “mobile computing device” refers to a deviceincluding a digital processor coupled to a digital memory. The mobilecomputing device may be a simple device operable to receive a signal andrespond. Alternatively, the mobile computing device can be a complexdevice having multiple processors and a display screen.

As used herein, the term “radio frequency” or “RF” is used to describenon-proximate far-field propagated electromagnetic radiation used tocommunicate information via an RF transceiver or RF radio. The powerroll-off for an RF electromagnetic signal is approximately one over thedistance squared (1/(dist²)), meaning that power density of the emittedRF signal will be one fourth (¼) as strong as the distance between theemitted RF signal and the RF transmitter is doubled.

As used herein, the term “pairing” refers to the communication ofsufficient information to one or more mobile computing devices to enablethe mobile computing device to form a data link with another mobilecomputing device. The data link can be a wireless link using NFMI and/orRF. The information used to establish the link can be communicated usingNFMI and/or RF to the mobile computing device.

As used herein, the terms customer and user are used synonymously unlessotherwise noted. As used herein, the term “cloud based storage” refersto digital storage at a remote location. The digital storage can be anytype of digital storage including, but not limited to, magnetic storage,optical storage, and solid state storage devices. The digital storagemay be located on a server. A local device, such as a mobile computingdevice or a proximity computing device can access the digital storage atthe remote location via a wireless or a wired connection through aprivate or public network including, but not limited to a local areanetwork, a personal area network, a wide area network, and an internetconnection.

Example Embodiments

An initial overview of technology embodiments is provided below and thenspecific technology embodiments are described in further detail later.This initial summary is intended to aid readers in understanding thetechnology more quickly but is not intended to identify key features oressential features of the technology nor is it intended to limit thescope of the claimed subject matter.

The wireless communication of proximity based information enables a userto send or receive content when the user is within a limited proximityof a location or object. The content may be related to or associatedwith the location or the object. Also, the sending or receiving of thecontent may be triggered by the user entering the limited proximity tothe location or the object. This may be done to increase the security ofthe communication link or the data being communicated by limiting thelocation where data is transmitted or received. Knowing where certaindata is permitted to be communicated allows security protocols to beimplemented—such as shielding around a room, or limited access of peopleand or equipment that should not have access to the data or mayeavesdrop on the data communications. This may allow data to becommunicated more efficiently by limiting the communication of data to aspecific location. This can be used to prevent multiple systems fromcommunicated unexpectedly at the same time and place.

In one embodiment, the wireless communication of the proximity basedcontent can be accomplished by wirelessly communicating with a user'smobile computing device, such as a smart phone. While the mobilecomputing device is described herein as being mobile, the mobilecomputing device may be a fixed device. The mobile computing device canbe a handheld computing device, a portable multimedia device, a smartphone, a tablet computing device, a body worn device, a laptop computer,an embedded computing device or similar device. An embedded computingdevice is a computing device that is inlayed in a selected object suchas a vehicle, a watch, a bracelet, a key fob, a ring, a key card, amonitoring device, a remote sensor, a measurement device, a dispensingdevice, a clipboard, an implanted medical device, a token, a poker chip,a souvenir, a necklace amulet, an electronically enabled article ofclothing, an appliance, a tool, a weapon, and so forth. A computingdevice may be embedded in substantially any type of object. The mobilecomputing device can be a device that is user owned, rented, leased,associated with, or otherwise in the possession of the user. A userowned device can include mobile computing devices that are actuallyowned by relatives, friends, and employers of the user.

In one embodiment, wireless communications can be enhanced by the use ofspatially enabled communications. Spatially enabled communications, asused herein, is the enhancement of wireless communications based onproximity control, proximity based security, and/or a determination ofrelative spatial location. The spatially enabled communications can beaccomplished using short range communication (SRC) devices, as describedherein.

The ability to sharply define a desired proximity boundary can provide asignificant advantage for the spatially enabled wireless communications.If an edge of the proximity boundary is substantially variable, a usermay detect and/or receive content for locations or objects that may notbe visible or easily discovered by the user. Certain types of ubiquitouswireless standards may not be useful to sharply define the proximityedge. Standards such as Wi-Fi, also known by the 802.11 standard fromthe Institute of Electronic and Electrical Engineers (IEEE), utilizeRadio Frequency (RF) signals that can have a range of hundreds of feet.The RF signal may be detected in certain situations well outside of thedesired range. More localized standards, such as Bluetooth® can have thesame challenge, albeit for a smaller range. A typical range for aBluetooth device can be approximately 10 meters or about 30 feet.

In accordance with one embodiment of the present invention, an SRCdevice can include a short range transceiver that can be configured tocommunicate using Near Field Magnetic Induction (NFMI). Unlike RFsignals, which are created by modulating information onto anelectromagnetic plane wave and transmitting those signals into freespace, NFMI signals are created by modulating information onto amagnetic field. The magnetic field is localized around the transmittingantenna. The signal outside of this localized region is typicallyattenuated below the noise floor, thereby making it difficult orimpossible to receive the signal. The power roll-off for anelectromagnetic signal is one over the distance squared (1/(dist²)),meaning that every time the distance is doubled, the power is one fourth(¼) as strong. In contrast, the power roll-off for a NFMI signal isproportional to one over the distance to the sixth (1/(dist⁶)), meaningthat every time the distance is doubled, the power is one sixty-fourth (1/64) as strong. Thus, the use of NFMI can enable a signal that can betransmitted predictably within a well-defined area or distance.

However, the edge of the proximity boundary may be variable even whenNFMI is used. One challenge with communicating through the use ofmagnetic induction is the polarization of the signals relative to thetransmitter and receiver antennas. Maximum power in an NFMI signal canbe communicated between two NFMI antennas with axis that are parallel toone another. Minimum power is transmitted between two antennas withantenna axis that are perpendicular to one another. The difference intransmitted power can be significant.

For instance, at 1 meter, the power received in an NFMI signaltransmitted between two antennas that are substantially parallel to eachother can be 50 decibels (dB) greater than the power received when oneof the antennas is substantially perpendicular to the other.

The transmitter typically has no way of knowing the orientation of thereceiver antenna. Therefore it must transmit at the maximum (worse case)power setting of +50 dB to ensure a link distance of 1 meter when theantennas are perpendicular with one another.

In an NFMI system, the power roll-off is 60 dB per decade. Therefore 50dB correlates to 0.833 decades (50 dB/60 dB) or an increased linkdistance of 6.8 times (10{circumflex over ( )}0.833). Thus, if thetransmitter and receiver antenna are optimally positioned (i.e.,parallel) while the transmitter is at full power (+50 dB), the linkdistance will reach out to 6.8 meters instead of 1 meter. This meansthat an NFMI link will have a range from approximately one to sevenmeters. This wide range, which depends on the orientation of thetransmitter and receiver antennas, substantially reduces the ability tosharply define a selected proximity around a location or object.

One way of dealing with the challenge of a variable proximity edgecaused by antenna misalignment is to design one or both of thetransmitter and receiver with multiple orthogonal antennas. This ensuresthat at least one of the receiving antennas will be substantiallyparallel to the transmitting antenna regardless of the relativealignment between the transmitter and the receiver. In one embodiment,the signal can be received at a receiver having multiple orthogonalantennas. A portion of the signal can be received on each of theorthogonal antennas and summed, thereby maximizing the signal no matterthe orientation. Alternatively, one or more of the antennas can beselected to transmit or receive based on strength of the signal.

The SRC device associated with the location or object can also includemultiple orthogonal antennas, enabling the device to receive NFMIsignals broadcast from the user's mobile computing device no matter whatthe orientation is between the two transceivers. In one embodiment, theantenna that is used to receive the signal can also be used to transmit.The antenna may be used to transmit on the assumption that it is thebest aligned antenna with the antenna on the receiving transceiver,thereby maximizing the link distance and minimizing the power needed tocommunicate between the two transceivers. This, in turn, reduces theemission levels of the transceiver.

In one embodiment, the use of multiple antennas to communicate a signalis referred to as antenna diversity. When the antennas are used tocommunicate a magnetic induction signal, antenna diversity refers to theuse of multiple orthogonal antennas that are directly connected to asingle transceiver. This is different than antenna diversity used intransmission schemes such as Multiple Input Multiple Output (MIMO),wherein multiple antennas are used to perform spatial multiplexing todecrease signal loss through channel fading. The use of multipleorthogonal antennas to receive a magnetic induction modulated signalwill be referred to as magnetic induction diversity. In one embodiment,the use of magnetic induction diversity can be used in combination withspatial diversity to allow the benefits of both spatial diversity andmagnetic induction diversity to be accomplished.

Magnetic induction diversity can be the selection of the best alignedantenna to receive or transmit with another transceiver. Alternatively,magnetic induction diversity can involve summing the signal on two ormore antennas. The use of magnetic induction diversity enables thevariability of the proximity boundary to be substantially reduced.Since, in a system with multiple receiver antennas positioned inorthogonal planes, a receive antenna can always be selected that issignificantly aligned (i.e., parallel) with a transmit antenna, itreduces the need to significantly increase the transmit power to ensurethat the signal can be received at a selected distance independent ofits relative orientation with the transmit antenna, and vice versa. Itshould be noted that the use of NFMI transceivers does not, by itself,constitute magnetic induction diversity. The distance over which amagnetic induction device can communicate (i.e. a range) when usingmagnetic induction diversity can depend on a number of factors,including but not limited to a communication range of a transmitter anda receive sensitivity of a receiver. A number of additional factors canalso contribute including the degree of orthogonality, the number oftransmit and receive antennas, the shape and size of the antennas, thetransmitter output power, the efficiency of the receiver, and so forth.

The transmit power in each of the NFMI transceivers can be set at alevel to define a desired radius of a proximity boundary. Thetransceivers may be designed so that the proximity boundary may besubstantially circular. Alternatively, the antennas on the short rangetransceiver associated with the product can be designed to provide aradiation pattern of a desired shape, such as a narrow arc or conicalpattern.

Proximity Boundary Based Communication

In one example embodiment, illustrated in FIG. 1a , a proximity boundary108 is illustrated. A proximity SRC (PSRC) device 104 can be configuredto communicate using NFMI within the range of the proximity boundary.The PSRC device can be a proximity computing device that includes atleast one NFMI transceiver coupled to a computing device. The PSRC istypically located at a fixed position, but may be configured as a mobiledevice. A user 112 can carry a computing device 110, such as a mobilecomputing device having an SRC device configured to receive an NFMIsignal broadcast by the PSRC device 104. While the term mobile computingdevice is used in this example, it is not intended to be limiting. TheSRC device can also be coupled to an immobile computing device, or to amobile computing device configured to be located at a fixed location.

If both the SRC device on the mobile computing device 110 and the PSRCdevice 104 include only a single antenna, then the power of the NFMIsignal transmitted from the PSRC device needs to be sufficient to ensurethat the signal can be received at the mobile computing device 110 atthe perimeter of the proximity boundary 108 even when the antenna of theSRC device at the mobile computing device 110 and the antenna of thePSRC device 104 are poorly aligned (i.e., substantially perpendicular).As previously discussed, the power needs to be increased approximately50 dB (i.e., 10,000 to 100,000 times) for this to be achieved.

However, when the antennas of the SRC device at the mobile computingdevice 110 and the PSRC device 104 are better aligned, and the power isincreased by 50 dB to accommodate the poorly aligned antennas, then theNFMI signal can be received anywhere within a radius that isapproximately seven times greater than the proximity boundary 108. Auser 114 having a mobile computing device 110 with an antenna that iscoaxial to or parallel with the antenna of the PSRC device 104 maydetect the NFMI signal a significant distance from the PSRC device. Infact, each person illustrated in FIG. 1 may be able to detect the signalbased on the alignment of the respective antennas.

If one or both of the PSRC device 104 and the SRC device on the mobilecomputing device 110 included multiple orthogonal antennas that usemagnetic induction diversity to receive and/or transmit the NFMI signal,it can be ensured that the receiver and transmitter antenna aresubstantially optimally aligned, thereby enabling a substantiallymaximum amount of the possible power to be received independent of theposition or orientation of the SRC antenna at the mobile computingdevice 110 relative to the antenna of the PSRC device 104. This enablesthe uncertainty area (i.e., the area between the outer circle 114 andthe inner circle 108) to be substantially reduced, thereby enabling thePSRC device to be designed with a desired proximity area with minimaluncertainty area.

The size of the proximity boundary 108 and the uncertainty area outsideof the proximity boundary is determined by the transmit power of eitherthe PSRC device 104 or the SRC device on mobile computing device 110,the receive sensitivity of either the PSRC device 104 or the SRC deviceon mobile computing device 110, and/or antenna alignment. These factors,individually or in combination, can facilitate optimal communicationcoupling which provides a well-defined edge of the proximity boundary.

The NFMI signal broadcast by the PSRC device 104 can be used to indicateto the mobile computing device 110 that the user 112 is located withinthe proximity boundary 108. In one embodiment, the NFMI signal can be aproximity signal which can provide information that indicates a securitypermission for the user to communicate selected data using the user'smobile computing device.

In one embodiment, the security permission can be communicated in asecure, encrypted format from the NFMI transceiver coupled to the PSRCdevice 104 to communicate with the NFMI transceiver coupled to themobile computing device 110. Alternatively, the security permission maybe sent in an unencrypted format, relying on the proximity security ofthe NFMI signal that is communicated substantially only in the proximityboundary 108.

In one embodiment, the selected data is communicated using the mobilecomputing device 110 only while the mobile computing device remainswithin the proximity boundary 108. If the NFMI signal broadcast by thePSRC device 104 is no longer received at the mobile computing device110, then the ability to communicate the selected data using the mobilecomputing device can be disabled.

In another embodiment, once the security permission is received at themobile computing device 110, the mobile computing device can beconfigured to communicate the selected information for a selected timeperiod, at a selected time period, or perpetually, irrespective of themobile computing device's location with respect to the PSRC device.

For example, in one embodiment, a mobile computing device 110 can moveto within a proximity boundary 108 of a PSRC device 104. The PSRC device104 may be located in a computing device in an automobile or a mobilecomputing device used by another person, or at a selected location. ThePSRC device can communicate selected data, comprising pairinginformation to allow the mobile device to pair with another computingdevice. The pairing may be a Bluetooth pairing to another device.Alternatively, pairing can comprise sending sufficient information tothe mobile device that the mobile device can connect with anothercomputing device using NFMI communication or an RF communicationstandard, such as WiFi or 3GPP LTE, as previously discussed. Just bybeing within proximity, the permissions to pair with another computingdevice can be set, thereby enabling pairing to occur passively based ona proximity to a specific location or another device. Alternatively, anadditional security measure can be implemented, such as requiring amanual operation by a user such as pressing a pairing button on themobile computing device to initiate a pairing process with anothercomputing device.

The security permission can grant permission at the mobile computingdevice 110 to transmit, receive, or transmit and receive the selecteddata. For instance, in example embodiments, the selected data can bereceived from the PSRC device 104, transmitted to the PSRC device, orreceived from and transmitted to the PSRC device.

The selected data may be communicated between the mobile computingdevices 110 using the NFMI transceivers to maintain spatial security ofthe selected data within the proximity boundary 108. In anotherembodiment, the selected data can be communicated using a radiofrequency communication standard, such as Bluetooth, IEEE 802.11-2012,802.11ac-2013, 802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, thirdgeneration partnership project (3GPP) long term evolution (LTE) Release8, 9, 10, 11, 12 or 13, an optical link, an acoustic link, a wired link,and so forth. This allows communication protocols that are inherentlynon-proximate in their communication behavior, such as Bluetooth, Wi-Fi,or 3GPP LTE, to function effectively in proximity based applications.Proximity applications can include, but are not limited to, marketing,medical monitoring, secure communications, localized intercoms,proximity payment systems, or other types of proximity basedapplications where the location of one device relative to another can beimportant.

FIG. 1b illustrates another example, wherein an NFMI signal can becommunicated between the NFMI transceivers of two mobile computingdevices 110. A separate proximity boundary 114, 116, 118, 120 isillustrated around each mobile computing device 110.

While the same diameter is illustrated for the proximity boundary ofeach mobile computing device, this is not intended to be limiting. Thediameter of a proximity boundary can be selected based on the systemdesign and needs of each mobile computing device. As previouslydiscussed, the distance over which a magnetic induction device cancommunicate (i.e. a range) when using magnetic induction diversity candepend on a number of factors, including but not limited to acommunication range of a transmitter and a receive sensitivity of areceiver. The NFMI transceiver coupled to a mobile computing device canbe designed to achieve a proximity boundary of a desired size. Apractical size can vary from several centimeters to several meters,depending on the design of the antennas, transmitter, and receiver.Larger proximity boundary sizes can be achieved with a relatively largeamount of power, as can be appreciated.

In the example of FIG. 1b , the proximity diameter can be approximately3 meters. When the user 112 in proximity boundary 116 is located withina distance of less than 1.5 meters from the user in proximity boundary118, an NFMI signal can be broadcast by one of the SRC devices coupledto the mobile computing devices 110. The NFMI signal can be used toindicate to the mobile computing device 110 that another user 112 islocated within the proximity boundary 116 or 118. As previouslydiscussed, the NFMI signal can include a security permission thatenables the mobile computing device to communicate selected data betweenthe mobile computing devices 110. The selected data can be communicatedbetween the mobile computing devices using NFMI transceivers or RFradios, as previously discussed.

The selected data can be communicated between the mobile communicationdevices once the security permission has been received (i.e. once themobile communication devices come within the proximity boundary radiusand the appropriate data/signal has been exchanged/received).Alternatively, the selected data may be communicated only when themobile communication devices remain within a proximity boundary radius.

In FIG. 1b , the user 112 within the proximity boundary 118 is locatedwithin the proximity boundary 116 and 120, thereby enabling the user toreceive security permissions from the users in the other proximityboundaries and communicate selected data with both users. Conversely,the user 112 in proximity boundary 114 is not located within theproximity boundary of any other user. Therefore, the user is not able tocommunicate the selected data with another SRC device or PSRC devicecoupled to a mobile computing device 110.

FIG. 2 illustrates an example block diagram of a system forcommunication based on a location of a proximity boundary, in accordancewith an embodiment of the present invention. While the proximityboundary based communication system 200 is illustrated in FIG. 2 anddescribed herein, the constituent elements and functions thereof may beequally applicable to other implementations of the wirelesscommunication of proximity based content.

Referring to FIG. 2, the proximity boundary based communication systemcomprises one or more mobile computing devices 202. As described in thepreceding paragraphs, each mobile computing device 202 can be a handheldcomputing device, a portable multimedia device, a smart phone, a bodyworn device, an implantable device, embedded in a medical device, amilitary communication system, a military weapons system, integrated inan automobile, a tablet computing device, a laptop computer, an embeddedcomputing device or similar device.

The mobile computing device 202 can be a mobile computing device that isowned by, or otherwise associated with, the location (i.e. a store, ahospital, a business, a military facility, etc.) in which the mobilecomputing device is used. Alternatively, the mobile computing device 202can be a mobile computing device that is not owned by the store in whichit is used. In other words, the mobile computing device 202 can be adevice that is customer/patient/user/operator owned, rented, leased,associated with, or otherwise in the possession of thecustomer/patient/user/operator. A customer owned device can includemobile computing devices that are actually owned by relatives, friends,employers, or other types of associates of the customer.

The mobile computing device 202 can include a digital storage 204. Thedigital storage 204 may be a magnetic digital storage such as a harddisk, an optical digital storage such as an optical disk, a solid statedigital storage such as a Dynamic Random Access Memory (RAM) or apersistent type digital storage such as a flash RAM. Other types ofdigital storage may also be used, as can be appreciated. The digitalstorage 204 may be integrated in the mobile computing device 202.Alternatively, the digital storage 204 may be located in a cloudcomputing storage site that is in wireless communication with the mobilecomputing device 202. Access to the cloud computing storage site can becontrolled by and limited by the user or owner of the mobile computingdevice 202. Access to the cloud computing storage site may be granted toothers by the user and/or owner. In one example embodiment, the cloudcomputing storage site can be accessed via a security permissionreceived from a proximity computing device 210 or another mobilecomputing device 202.

The mobile computing device 202 can include an SRC device 208 that iscoupled to the mobile computing device 202 and enables the mobilecomputing device 202 to transmit and receive information within adefined area using an NFMI transceiver 207. The SRC device 208 can beintegrated with the mobile computing device 202. Alternatively, theshort range communication device may be an external device, such as adongle, that can be plugged into the mobile computing device 202 toenable information to be sent from and received by the mobile computingdevice 202.

The mobile computing device 202 can also include a graphic display 209,such as a liquid crystal display (LCD) screen, organic light emittingdiode (OLED) display screen, or the like. The graphic display screen canbe used to display visual information regarding a location of the mobilecomputing device within the proximity boundary. While a graphic displayis illustrated in FIG. 2, it is not required. Certain types of mobilecomputing devices 202 may not include a graphic display, or may beconnected to an external graphic display device.

A PSRC device 214 can be disposed in a proximity computing device 210that is located at a selected location. The PSRC device is typicallyplaced at a fixed location and used to define a selected a selectedproximity boundary. The PSRC device can transmit a proximity signalwithin the selected proximity boundary of the fixed location using aproximity signal module 215. When a mobile computing device 202 with anSRC device enters the fixed location of the proximity boundary, andreceives the proximity signal, a security permission can be communicatedfrom a security permission module 217 at the PSRC device to the SRCdevice, thereby enabling the SRC device to transmit or receive selecteddata, as previously described. While the example has illustratedcommunication from the PSRC device to an SRC device, this is notintended to be limiting. The SRC device can also transmit proximitysignals and security permissions to the PSRC device. One or both of theSRC device or the PSRC device can then transmit or receive the selecteddata based on the security permission.

For example in a medical environment, the selected location may be ahospital room, a body-worn device on a patient, or a hospital bed. TheSRC device, operating with a mobile computing device, can be embedded ina doctor's or nurse's clipboard while the PSRC device can be embedded ina medical monitoring device. The SRC device in the mobile computingdevice can be a body-worn medical monitoring device or sensor.

In addition to uses in medical environments, the PSRC and SRC devicescan be located in any number of situations and locations. For example,the PSRC device can be located in a vehicle and the SRC device is asmart phone or car key. The PSRC may be a vehicle or an intercom and theSRC device can be in a portable radio on a soldier or in a weapon.

The system illustrated in the example of FIG. 2 is configured toestablish a short range wireless communication link 218 between the SRCdevice 208 and a PSRC device 214 or another SRC device 208 when themobile computing device 202 is within a selected distance 220 of theproximity computing device 210. In one embodiment, the short rangewireless communication channel may only communicate using near fieldmagnetic induction communication. The short range wireless communicationchannel can be referred to as a proximity communication channel. Atleast one of the SRC device 208 and the PSRC device 214 can have aplurality of antennas and use magnetic induction diversity to identifythe best antenna or a plurality of signals to transmit and/or receive asignal. In one embodiment, the selected distance 220 between the twodevices may be less than or equal to a near field distance, which isapproximately a wavelength of the carrier signal (λ) divided by 2 pi(λ/2π).

Proximity Boundary Based High Speed Communication

In one embodiment, a radio frequency communication standard fornon-proximate communications, such as Bluetooth (BT), can be used toform a communication link in a proximity-based application. Because ofthe physical properties of the Bluetooth energy (propagatingelectromagnetic wave), a mobile computing device using Bluetooth is notable to reliably ensure when the mobile computing device is within aspecific distance of another BT enabled device. However BT technology,or other types of RF communication standards, are typically capable oftransmitting information at a higher data rate than NFMI technology.Accordingly, the two radio access technologies can be integrated to forma multi-Radio Access Technology (MRAT) device that is configured toallow the NFMI link to determine when a proximity event occurs (i.e. thecomputing device with an SRC device is located within the proximityboundary of a PSRC device or another computing device with an SRCdevice) and then permit or signal the BT link to exchange the desiredinformation.

While an example of communicating via a BT RF radio link is provided, itis not intended to be limiting. Other types of RF communicationstandards that can be used to broadcast data when a proximity evenoccurs include, but are not limited to, IEEE 802.11-2012, 802.11ac-2013,802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, third generationpartnership project (3GPP) long term evolution (LTE) Release 8, 9, 10,11, 12 or 13, an optical link, an acoustic link, and so forth.

One example of a proximity event used to trigger a communication viaanother radio access technology is a proximity-based advertisingapplication. In order to effectively target a user for proximity basedadvertising, the system can be configured to be aware of when apotential customer or user is within a specified distance of thelocation, good, or service. Once this location has been verified viaNFMI technology, by receiving a proximity signal sent from an NFMItransceiver, as previously described, the system can use a differentradio access technology to enable higher data rates to transfer selecteddata, such as text, images, audio or video. The selected data can becommunicated for an advertisement or provide information for a productwithin the user's proximity. The selected data can be communicated usinga non-proximate radio frequency standard communication more quickly thanthe information typically can be communicated using only a proximitycommunication technology such as NFMI.

The ability to communicate desired information more quickly enables theuser to become aware (i.e. via an alert) of a promotion being offeredbefore the user has passed out of the target location. In addition, ifthere is a large amount of data being communicated (securityinformation, encrypted information, graphics, audio, video, or otherlarge data) the user may become frustrated if the interaction is slow.If the information is communicated slowly, then it may defeat the‘positive experience’ that a marketer typically desires to share with auser.

Another example of a proximity event used to trigger a communication viaa broadband radio access technology is a proximity data transfer device.In one embodiment, a user can download information on a mobile computingdevice while in proximity of a PSRC placed at a selected location andassociated with the location or an object at the location. For example,a PSRC device associated with an interactive movie poster can beconfigured to download or stream the contents of a movie or movietrailer. The system can be activated by a proximity event determined bythe NFMI link between the PSRC and an SRC device in the user's mobilecomputing device. However the NFMI link may not provide an adequate datarate to stream video. Therefore an additional radio access technologyoperable to use a high(er) data rate allows the information to beexchanged effectively.

In one embodiment, proximity events used to trigger broadbandcommunications, such as the interactive movie poster example, can beconfigured such that the user remains within the proximity location inorder to continue accessing the data (i.e. watching video, listening tomusic, accessing a database, participating in a wireless network, and soforth). The use of NFMI transceivers in the SRC device and the PSRCdevice can be configured to form a proximity boundary of a selectedsize, such as 1 to 3 meters. A user within the proximity boundary cancontinue to participate in the proximity event. Other types of shortrange protocols, such as near field communications (NFC), operate in anextremely small region, such as a few centimeters. Such a small area istoo constrictive for a user to continuously hold their mobile computingdevice within the same small location for any length of time.Conversely, an RF (non-proximate far-field) communication standard,which communicates tens to thousands of meters, does not provide thelocalization that the use of the NFMI technology can provide.

Proximity Based Event with Long Range Data Transfer

In another embodiment, the SRC device in the mobile computing device orthe PSRC device can be used to pair the mobile computing device to forma connection using a separate radio access technology with anotherwireless device to enable the mobile computing device to communicate viaa broadband and/or long range communication standard. When the mobilecomputing device enters a proximity boundary, the SRC device can beconfigured to communicate and/or receive sufficient information toestablish an RF radio link with the other wireless device using aselected radio access technology such as Bluetooth, WiFi, 3GPP LTE, andso forth.

The ability to pair with another wireless device to establish the RFradio link can provide significant advantages. While radio accesstechnologies configured to operate in licensed portions of the radiospectrum, such as cellular systems, are configured to operate with aknown group of trusted devices, systems operating in unlicensed portionsof the radio spectrum, such as WiFi and Bluetooth typically do not havethe ability to identify trusted devices. In addition, it can bedifficult to identify other unknown devices and establish the necessaryinformation to form a radio connection with those devices. Using theNFMI radios to communicate the necessary information to establish aWiFi, Bluetooth, or other desired radio link can provide security andreduce the amount of power used to attempt to access unknown devices.The pairing information can also allow the mobile computing devices totrust the data links that they are connected to.

Accordingly, a mobile computing device can be paired to a specificwireless system/network by bringing the device within the proximityboundary of the SRC device. The proximity boundary can be within thecoverage area of a longer range communication standard, such as WiFi orBluetooth.

As previously discussed, a short range system such as an NFC system hasa coverage area of only a few centimeters. It may not always beconvenient to limit this proximity range to a distance that is so smallor restrictive that the user is required to physical hold the wirelessdevice within a specified location. For example the device to beprogrammed may be a body-worn device on a patient, or an embedded devicewithin the patient's body, or a communication system that is not easilyremoved like a helmet or backpack.

Accordingly, the SRC device can be used to define a proximity boundarythat is limited in area relative to the non-proximate wirelesssystem/network, but large enough that it is conveniently accessible tothe user or device to be paired. In addition, the proximity area may belocated so that the user does not have to take any specific action ontheir part to initiate the pairing process.

For example, a PSRC device or an SRC device may be assigned to aspecific patient in a hospital. A caregiver can enter the patient's roomor stand next to the patient's bed with a mobile computing device(clipboard, smartphone, tablet . . . ). The SRC device in the mobilecomputing device can be within the localized proximity boundary createdby the NFMI system in the PSRC or SRC device assigned to the specificpatient in the hospital. A security permission can be communicated, viathe SRC device, to the mobile computing device. The security permissioncan be used to authenticate the mobile computing device to anotherwireless network, such as a WiFi or Bluetooth network, thereby enablingthe mobile computing device to be able to access data, even afterleaving the proximity boundary via a longer range wireless protocol suchas Wi-Fi.

For example, the caregiver can leave the patient's room and go back totheir work station while continuing to access the patient's data via aWi-Fi system. If the caregiver enters a different patient's room, themobile computing device can receive a security permission from an SRCdevice or a PSRC device associated with the different patient to allowthe caregiver to access information associated with the differentpatient via the WiFi system. Alternatively, each patient can beassociated with a different WiFi access point (AP). The securitypermission can provide information that enables the mobile computingdevice to access the WiFi system via the AP associated with a patient.

It should be noted that the proximity event may not just assign a mobiledevice to a wireless system, but may also be used to control permissionsto allow a mobile computing device to access data within the samewireless system.

For example a hospital may have one large wireless network accessible bya non-proximate wireless protocol such as Wi-Fi, and a mobile device canbe assigned specific permissions based on the proximity boundary thatthe mobile device is brought within. The mobile device remains pairedwith the same wireless system, but is able to access different databased on the device's proximity within the network, such as eachpatient's data.

To further clarify, a nurse may have an electronic application on amobile computing device such as a tablet that enables the nurse torecord patient notes. The security permissions received while thecomputing device is within a proximity boundary, using NFMI via the SRCor PSRC device, can enable the mobile computing device to only allowaccess to the patient records that the nurse is currently visiting, orhad previously visited. Patient access can also be based on a length oftime since the nurse visited the patient and was located within adefined proximity boundary created between SRC devices. When the nurseenters a different patient's room, and has left the proximity boundary,the security permission may no longer be received, thereby removingpermission to access the previous patient's data.

The ability to only access a patient's data only from within a definedproximity boundary can reduce errors by ensuring that data that isrecorded is for the patient within the proximity boundary.

Another example comprises a non-proximate wireless intercom systemconfigured to operate in an unlicensed portion of the radio spectrum(e.g. 900 MHz, 2.4 GHz . . . ) where wireless headsets (and microphonesfor bidirectional communication) can communicate to each other or to acentral communication device's hub. Each intercom device can be pairedto the communication network to prevent each intercom device fromcommunicating with or being interfered with by other wireless systemswithin range of the wireless RF signal. Typically, each intercom deviceis configured to undergo a pairing procedure to assign a device to aspecific network. This can be accomplished via software programming,hardware jumper settings (such as a dip-switch) to set the specifiedcode, or a wireless pair-over-air process.

When devices are paired wirelessly (over the air), proper care must betaken to ensure that the device pairs with the intended communicationnetwork—especially if a second communications network operating on thesame wireless standard is nearby. This problem can be resolved in someinstances by requiring a passcode to be entered by at least one of thenodes or devices being paired.

For example, when a Bluetooth device is paired, one node can be put intosearch mode to detect the presence of another Bluetooth enabled nodewith which to communicate. Often one node will have a passkey (0000 forexample) that is to be set on one device to authenticate thepair-over-air process.

Many recent inventions/products allow for devices to be pairedwirelessly through short range communication protocols to reduce thecomplexity of the pair-over-air process. Such systems may implement ashort range physical layer such as magnetic induction or NFC to reducethe probability of inadvertently pairing a device with other nearbynetworks by ensuring that the short-range physical layer link distanceis much more localized than the anticipated distance between othernetworks. These systems often require the device-to-be-paired to bebrought very close to a specific node or location in order to initiatethe pairing process. Many configurations require that the devices ‘bump’or ‘kiss’ each other as the short-range link distance is less than a fewcentimeters or even a few millimeters. While these solutions simplifythe process, they require a specific action on the user's part tocomplete the pairing routine.

In contrast, an NFMI equipped system, such as a mobile computing devicewith an SRC device, can be used to communicate sufficient informationwithin a defined proximity boundary to carry out the pairing processwithout the user being required to ‘bump’ devices. For example, avehicle intercom system only requires that a user enters the vehicle oris located within a close proximity to the vehicle. The NFMI equippedsystem can detect the presence of the device to be paired and can carryout the pairing process without any action on the part of the user. TheNFMI range (i.e. the proximity boundary), typically a few meters indiameter, can be designed to be long enough to allow the pairing processto occur passively (without a specific action by a user) but islocalized enough to prevent the device from pairing with anotherintercom system in the area. Once the device is paired, the user is freeto move away from the predetermined proximity location and is able tocommunicate via a long-range' wireless protocol, as previouslydiscussed.

Spatially Enabled Secure Communications

In another embodiment, illustrated in the example of FIG. 3, a mobilecomputing device 302 can be configured to provide spatially enabledsecure communications with other mobile computing devices 302 orproximity computing devices 310. In one example, the spatially enabledsecure communications can be implemented by sending secure data betweenSRC devices 308 using NFMI when the mobile computing devices are locatedwithin a selected distance 320. In one embodiment, the selected distance220 can be approximately less than or equal to a radius of the proximityboundary 108 (FIG. 1).

As previously discussed, the power roll-off for an NFMI signal isproportional to one over the distance to the sixth (1/(dist⁶)), meaningthat every time the distance is doubled, the power is one sixty-fourth (1/64) as strong. Accordingly, the power of an NFMI signal quickly fallsbelow a detectable level. Without the use of very specialized equipment,an NFMI signal that is intended to be received at a selected distance,such as three feet, typically cannot be detected at a significantlygreater distance. For example, at four times the expected distance, suchas 12 feet, the signal is 1/4⁶ ( 1/729) times as strong. This can placethe signal power below the noise floor. Thus, data transmitted usingNFMI has a low probability of detection outside of the proximityboundary. The SRC device can be designed to minimize detection of anNFMI signal outside of the proximity boundary by designing the NFMIsignal strength at the proximity boundary to be near the noise floor(i.e. detectability level of an SRC device using magnetic inductiondiversity).

Non-secure communication can be communicated using a radio frequency(RF) radio 311 configured to operate with a communication standard, suchas Bluetooth, IEEE 802.11-2012, 802.11ac-2013, 802.11ad, 802.11ax, IEEE802.15, IEEE 802.16, third generation partnership project (3GPP) longterm evolution (LTE) Release 8, 9, 10, 11, 12 or 13, an optical link, anacoustic link, a wired link, and so forth.

While the term “non-secure data” is used to refer to data that is notbroadcast on a spatially secure data link, such as an NFMI data link,the term is not intended to be limiting. The non-secure data can also beencrypted and/or scrambled and communicated on the radio frequencycommunications standards using additional security techniques, such ascommunication using a pseudo random noise (PRN) code or other scramblingor encryption techniques.

In one embodiment, the secure communications can be communicated on aspatially secure NFMI data link 318 between SRC devices 308 or PSRCdevices 314 as long as the secure communication is possible. The securecommunication can be possible when a sufficient signal to noise ratio(SNR) or signal to interference plus noise ratio (SINR) exists.Alternatively, secure communication using NFMI can be attempted as longas a security permission is received from another SRC device 308 or PSRCdevice 314.

In one embodiment, the secure communication can be encrypted using adesired encryption scheme, such as a public private key, datascrambling, a pseudo random noise code, and so forth. Alternatively,data can be sent via the spatially secure communication link using NFMIwithout encryption or scrambling.

The ability to communicate secure data using a spatially secure NFMIcommunication link 318 and non-secure data using a radio frequency datalink 313 provides significant advantages. The spatially secure NFMI datalink 318 between SRC 308 and/or PSRC devices 314 can be used to provideboth spatial security and, if desired, additional encryption andscrambling levels of security. However, the spatially secure NFMI datalink can be bandwidth limited. An NFMI data link may be configured toprovide data at rates from about 10 kilobits per second (Kbps) to onemegabit per second (Mbps). The radio frequency data link 313, using astandard such as Bluetooth, WiFi, or LTE, can provide a bandwidth oftens to hundreds or even thousands of megabits per second.

Thus, offloading non-secure data to a radio frequency data link 313 canenable a mobile computing device to transmit or receive relativelybroadband data, such as large data transfers or streaming audio orvideo, via the radio frequency data link. The spatially secure NFMI datalink 318 can be used to communicate data with a higher security risk,such as banking information, credit card information, personalidentification numbers (PIN), payment information, or other data that isdesired to be secure.

In addition, the spatially secure NFMI data link 318 can be used tosetup the radio frequency data link between two mobile computing devices302 or a proximity computing device 310. For example, the NFMI data linkcan be used to passively communicate pairing information between mobilecomputing devices or proximity computing devices. Rather than requiringa user to actively setup and pair two mobile computing devices, theinformation needed to setup the two mobile computing devices tocommunicate via the radio frequency data link 313 can be automaticallycommunicated via the NFMI data link when the two mobile computingdevices are within the selected distance 220.

While the term “pairing” is used, it is not intended to be limited to asetup of a radio frequency data link 313 between the mobile computingdevices 302 using the Bluetooth standard. Other standards such as WiFi,WiFi direct, Zigbee, 3GPP LTE, or other device to device data links canbe implemented by sharing the necessary information to establish theradio frequency links. Examples of pairing information include, but arenot limited to, identification information, a radio frequency centerfrequency, a channel, a channel frequency, packetization parameters, andso forth. Sufficient information to create the radio frequency data linkcan be communicated via the NFMI data link 318 to enable the radiofrequency data link to be established, thereby providing a relativelybroadband radio frequency data link and a spatially secure NFMI datalink without the need for active input by a user to setup the separatelink.

One area where spatially enabled secure communications can be used isduring a point of sale (POS) transaction. A POS transaction needs to beboth fast and secure. Secure information, such as a personalidentification number (PIN), a user's account, credit card, bankinginformation, balance, or other sensitive information can be sent via thespatially secure NFMI data link 318. Other data, such as reward points,coupons, purchasing history, tracking information and other types ofless secure transaction data can be communicated via the radio frequencydata link 311. The other data can be communicated on the radio frequencydata link in parallel with the secure information on the NFMI data link.Alternatively, the other data may be communicated after permission isreceived from the spatially NFMI data link. For example, after theidentity of a customer or user has been verified via the spatiallysecure NFMI data link, then the other data can be communicated on theradio frequency data link.

Medical information can also be communicated using both the spatiallysecure and radio frequency data links. For example, a patient'sconfidential information, such as social security information, financialinformation, PIN number, medical information, diagnosis, or othersensitive data can be communicated via the spatially secure NFMI datalink 318. Other types of data, such as raw sensor data, encrypted data,book keeping data (i.e. time stamps, nurse on duty information, mealschedule, sleep schedule, and so forth) could be communicated via theradio frequency data link 311.

The spatially enabled secure communication can also be used for militarycommunications. For example, encryption keys for pairing can betransmitted via the NFMI data link 318, while broadband data such asaudio data and video data can be encrypted with the encryption keys andthen communicated via the RF data link 311.

Spatially Enabled Multi Radio Access Technology Secure Communications

In another embodiment, a mobile computing device 402 with multiple radioaccess technologies (MRATs), illustrated in the example of FIG. 4a , canbe configured to provide additional data communication securitymeasures. Each mobile computing device 402 can include an NFMItransceiver, such as the SRC device 408, and a radio frequencytransceiver 411. The radio frequency transceiver can be configured tooperate using a WLAN or wireless personal area network (WPAN) radiofrequency communication standard, such as Bluetooth, IEEE 802.11-2012,802.11ac-2013, 802.11ad, 802.11ax, or IEEE 802.15. In addition, one ormore additional transceivers can be configured to operate using a WWANstandard such as IEEE 802.16, or the third generation partnershipproject (3GPP) long term evolution (LTE) Release 8, 9, 10, 11, 12 or 13,or another desired WLAN standard or WWAN standard.

The NFMI transceiver can be configured to communicate within a selecteddistance 420. The selected distance can be approximately equal to theproximity boundary 108 (FIG. 1). One or more radio frequencytransceivers 411 can be coupled to the mobile computing device 402. Eachradio frequency transceiver can use a selected RF communicationstandard, such as the standards described in the preceding paragraphs.

As illustrated in FIG. 4b , the SRC device 408 can include multipleorthogonal antennas 422, 424, 426. The multiple orthogonal antennas canbe used to provide magnetic induction diversity, thereby enabling theproximity boundary to be relatively sharply defined, as previouslydiscussed. In one embodiment, each SRC device 608 can include two ormore orthogonal antennas. In another embodiment, one SRC device may havea single antenna and another SRC device can include two or moreorthogonal antennas.

A communication range of one of a first SRC device and a second SRCdevice that includes at least two antennas can be used to define one ormore dimensions of a proximity boundary, as previously discussed in thepreceding paragraphs. It should be noted that, the mere use of multipleorthogonal antennas does not guarantee the definition of a relativelysharply defined proximity boundary. Rather, the use of the multipleorthogonal antennas, combined with the selection of components withdesired tolerances can provide a relatively sharply defined proximityboundary. The tolerances of components in the SRC can be designed andselected to provide a desired proximity boundary that is relativelysharply defined. Components in both the transmit chain, the receivechain, the RF front end, and the antennas can be selected to provide thedesired tolerance in the proximity boundary. The design and selection offilters, amplifiers, receivers, transmitters, antennas, and other RFcomponents can provide the desired tolerance of the proximity boundary.The desired tolerance of the boundary can depend upon its intended useand intended use location.

In one example, it can be desirable to select and design components ofthe SRC devices to define a proximity boundary of approximately 9 feetin diameter. It can be acceptable to have another SRC device detect aproximity signal within 3 feet of the designed 9 foot diameter boundary.Thus, an SRC device may be able to detect the proximity signal when 12feet from another SRC device or PSRC device.

In another example, it can be desirable to select and design componentsof the SRC devices to define a proximity boundary of approximately 3feet in diameter. The proximity boundary can be configured to operatenear other SRC devices with proximity boundaries. Accordingly, in orderto provide a relatively sharply defined proximity boundary, thecomponents of the SRC device can be selected so that the SRC devicecannot detect a proximity signal at a distance of greater than 4 feetfrom another SRC device or PSRC device. These examples are not intendedto be limiting. An SRC device, and the components of the SRC device, canbe selected and designed with components that are capable of providing aproximity boundary with desired dimensions and a sufficiently sharpboundary to allow the SRC device to function as desired. The use of NFMIcommunication, multiple orthogonal antennas, and components with desiredtolerances can enable the definition of a desired proximity boundary.

In one example, when a mobile computing device 402, illustrated in FIG.4a , is within the selected distance 420 (i.e. within a proximityboundary) of another mobile computing device 402 or a proximitycomputing device 410, data in a data block can be synchronously orasynchronously communicated between the two mobile computing devicesusing both the spatially secure NFMI data link 418 and one or more radiofrequency data links 413. The data can be interspersed, using theinterspersing module 415, between the two or more data links (includingat least one spatially secure NFMI data link) to provide additionalsecurity. An algorithm can be used to intersperse the data in the datablock between the data links 413, 418 based on the capability of themobile computing devices and the desired security level.

The data at the receiving mobile computing device 402 can be received onthe two data links 413, 418 and reassembled via the reassembling moduleto enable the data block to be correctly received and interpreted at thereceiving mobile computing device. Without a knowledge of the timing ofthe two data links, and the algorithm used to intersperse the data inthe data block between the two data links, it is substantially difficultto correctly receive the data block.

Even if all of the data transmitted by the RF radio(s) 411 and the SRCdevice 408 on the spatially secure NFMI data link 418 and the RF datalink 413 were received by an interloper, the data could not bereassembled without an understanding of the algorithm used tointersperse and reassemble the data between the data links. In addition,in order for an interloper to correctly receive the data communicated onthe two data links, the interloper would also have to be approximatelywithin the proximity boundary to receive the data communicated by theSRC device 408 on the spatially secure NFMI data link 418. Since theproximity boundary can be relatively small, it can be difficult for aninterloper or interloping device (i.e. an unintended device) to receivethe spatially secure NFMI signal. The algorithm used to intersperse thedata can be designed to make it difficult to interpret the data whenonly data from the RF radio 411 is received.

The interspersing module 415 can include an algorithm used tointersperse the data between the MRAT transceivers 408, 411 in themobile communication device 402 can be simple or complex. For instance,the data in the data block can be split based on a ratio of thebandwidth of the MRAT transceivers. If the NFMI transceiver in the SRCdevice 408 has approximately twenty percent of the bandwidth of the RFtransceiver in the RF radio 411, then 80 percent of the data in the datablock can be communicate via the radio frequency data link 413 and 20percent of the data in the data block can be communicated via thespatially secure NFMI data link 418. In this example, two bits in every10 bits communicated can be sent via the spatially secure NFMI data link418.

Alternatively, a more complex algorithm, such as a rotating code or apseudo random code can be used to select data bits for transmission viaone of the spatially secure NFMI data link 418 and the radio frequencydata link 413. The algorithm used to intersperse the data at thetransmitting mobile computing device can also be used at the receivingmobile computing device at the reassembling module 417 to reassemble thedata in the same order as the transmitted data block.

In one embodiment, the data interspersing module can be configured tointersperse the data using a selected algorithm to form RF data fortransmission on the RF data link and NFMI data for transmission on thespatially secure NFMI data link within the proximity boundary. The datareassembling module can be configured to reassemble data received on thespatially secure NFMI data link and the RF data link based on theselected algorithm. The RF data link can comprise one or more of a WLANradio or a WWAN radio. The RF data link and the spatially secure NFMIdata link can be configured to communicate the RF data and the NFMI datasynchronously or asynchronously.

The proximity based secure communications system of claim 13, whereinthe data reassembling module is further configured to reassemble datareceived on the spatially secure NFMI data link and the RF data linkbased on the selected algorithm.

A graphic display 409 at the mobile computing device 402 can be used todetermine when the mobile computing device is within the selecteddistance 420 of another mobile computing device or the proximitycomputing device 414. However, it is not necessary to have a graphicaldisplay. Other types of visual indicators, such as a light emittingdiode, or an audible indicator, such as a piezoelectric speaker or othertype of audible source can be used to identify when the mobile computingdevice is within the selected distance of the proximity boundary ofanother mobile computing device or the proximity computing device. Theproximity computing device can also be a MRAT device, with both a PSRCdevice 414 using an NFMI transceiver to communicate with an SRC device408 and one or more RF radios 411 that can be used to communicate withthe RF radio(s) in the mobile computing device(s).

In one embodiment, data in the data block can be packetized fortransmission via one of the spatially secure NFMI data link 418 and theradio frequency data link 413. The bits and/or packets can be ordered orlabeled prior to transmission. The labeling and/or ordering can be usedto reassemble the bits when they are received. In addition, each bitand/or packet can have an acknowledgement/non-acknowledgement (ACK-NACK)scheme that can be used to verify, on each of the data links, thattransmitted bits are received or retransmitted.

The data block can be transmitted via the spatially secure NFMI datalink 418 and the radio frequency data link 413 with a desired quality ofservice (QOS). The QOS requirements can be determined by a systemoperator. The QOS requirements can vary depending on the type of datatransmitted. Data transmitted for pictures or files can be more delaytolerant than data communicated for streaming audio or video. Data witha higher QOS can be communicated with a greater number of bitstransmitted on the MRAT data link with a higher capacity, a fastertransmission time, a lower error rate, or other desired channel qualityindicators that can be used to provide a desired QOS level.

In one embodiment, a user can select a proximity security level at whichsecure information is to be communicated within the proximity boundary.An algorithm can be selected to intersperse the data between thespatially secure NFMI data link 418 and the radio frequency data link413 based on the selected proximity security level. In addition, ahigher security level (i.e. more secure communication) can require ahigher percentage of data to be transmitted on the spatially secure datalink to reduce the risk that an interloper can interpret the data basedonly on data received on the RF data link received outside of theproximity boundary.

In one embodiment, the data in the data block can be interspersedbetween the transceivers in the SRC device 408 and the RF radio 411,using a selected algorithm, at a selected layer based on the OpenSystems Interconnection model. For example, the data may be interspersedat the physical layer, the data link layer, the network layer, or higherlayers. In one example, the data can be interspersed at the mediumaccess control (MAC) layer to enable the data to be communicated basedon real time feedback of radio link conditions on each of the spatiallysecure NFMI data link 418 and the radio frequency data link 413. Forexample, channel quality indication measurements can be performed oneach of the spatially secure NFMI data link and the RF data link(s). Thechannel state information measurements for each data link can includeinformation such as channel quality indications, reference signalmeasurements, signal to noise ratio measurements, signal to interferenceplus noise measurements, and so forth.

Alternatively, the data may be interspersed at the transport layer ofeach data link to provide procedural means of transferringvariable-length data sequences from the transmitter to the receiver,while maintaining the desired QOS functions. The actual layer selectedto intersperse the data depends on system design and customer or userneeds.

The ability to intersperse data in a data block between NFMItransceivers and RF radio transceivers provides significant advantages.Some types of RF radio communication standards can provide significantlygreater bandwidth than a typical NFMI data link. For example, a 3GPP LTERel. 12 data link can provide 100 Mbps. A WiFi 802.11AC data link canprovide 1.3 gigabits per second (Gbps). A typical NFMI data link mayonly provide 10 Kbps to 10 Mbps, depending on the design and usecharacteristics of the NFMI transceivers. Thus, the RF radio data link418 can be used to provide much greater bandwidth. However, the spatialsecurity of the spatially secure NFMI data link 418 can be maintained bytransmitting a selected number of bits in a data block using thespatially secure NFMI data link. Anyone that was outside of the selecteddistance 420 (i.e. the proximity boundary) would only be able to receivethe data transmitted via the RF data link. Even if only ten percent ofthe bits were transmitted using the spatially secure NFMI data link, apotential interloper located outside of the proximity boundary wouldonly receive ninety percent of the data, thereby making it verydifficult for the interloper to properly receive and interpret the datablock.

Thus, interspersing the data between the spatially secure NFMI data link418 and the RF data link 413 can provide the additional bandwidthadvantages of the RF data link and the spatial security advantages ofthe NFMI data link. The use of multiple antennas to provide magneticinduction diversity, thereby defining a relatively sharp proximityboundary enables the ability to provide the spatial security. Aspreviously discussed, without the use of magnetic induction diversity,the proximity boundary dimensions can vary widely, over a perimetermultiple times larger than an intended boundary, depending on anorientation of antennas coupled to the NFMI transceivers in the two SRCdevices 408. By defining a relatively sharp boundary, a user can beensured that a potential interloper positioned outside of theapproximate size of the proximity boundary, will not be able to receivedata communicated via the spatially secure NFMI data link 418.

In one embodiment, a method for proximity based secure communications isdisclosed 500, as depicted in the flow chart of FIG. 5. The methodcomprises the operation of defining a proximity boundary with dimensionsdefined by a selected communication range of one of a first Short RangeCommunication (SRC) device and a second SRC device, wherein each of thefirst and second SRC devices are configured to communicate using nearfield magnetic induction (NFMI), the first SRC device and a first radiofrequency (RF) radio are configured to be coupled to a first mobilecomputing device and the second SRC device and a second RF radio areconfigured to be coupled to a second mobile computing device, as shownin block 510. An additional operation involves communicating a proximitysignal in the proximity boundary between the first SRC device and thesecond SRC device, as shown in block 520. At least one of the first andsecond SRC devices can include at least two antennas to provide magneticinduction diversity, thereby enabling the proximity boundary to berelatively sharply defined, as previously discussed.

The method 500 can further comprise the operation of identifying a datablock to be communicated from within the proximity boundary, as shown inblock 530. Data in the data block can then be interspersed between thefirst RF radio and the first SRC device of the first mobile computingdevice for transmission to the second RF radio and the second SRCdevice, respectively, of the second mobile computing device on aspatially secure NFMI data link and a RF data link, as shown in block540. In one embodiment, the data in the data block can be interspersedbetween the spatially secure NFMI data link and the RF data link basedon a selected security level. Data with a higher security level can havemore data directed towards the spatially secure NFMI data link.

The method 500 can further comprise interspersing the data in the datablock using a selected algorithm to form RF data and NFMI data. The NFMIdata can be transmitted on the spatially secure NFMI data link. The RFdata can be transmitted on the RF data link. The RF data link cancomprise one or more WLAN radios or WWAN radios, as previouslydiscussed. The RF data can be transmitted on the RF data linksynchronously with the NFMI data transmitted on the spatially secureNFMI data link. Synchronous data transmission can reduce the complexityof reception and reassembly of the interspersed data at a receiver.

However, synchronous data transmission can significantly reduce theamount of data transmitted on the RF data link, since the RF data linkcan transmit at significantly higher data rates than the NFMI data link.Accordingly, the interspersed data can also be transmittedasynchronously on the spatially secure NFMI data link and the RF datalink. Buffers can be used to receive the NFMI data and the RF data andreassemble the data. The data can be reassembled using the algorithmthat was selected to intersperse the data.

The method 500 can further comprise selecting the algorithm tointersperse the data, at least in part, based on a quality of service(QOS) selected for the data. The QOS may be selected manually.Alternatively, the QOS may be predetermined or selected based on thetype of data that is transmitted. Data that is less delay tolerant canbe communicated with a higher QOS. In one embodiment, the interspersingof the data in the data block between the spatially secure NFMI datalink and the RF data link can be changed based on a feedback of channelquality indications for the spatially secure NFMI data link and the RFdata link to provide a selected quality of service.

The method 500 can further comprise transmitting the data on thespatially secure NFMI data link and the RF data link using anacknowledgement, non-acknowledgement (ACK-NACK) scheme to verify thatthe data transmitted is received for each data link. Data that is notreceived can be retransmitted based on the ACK-NACK scheme.

The method 500 can further comprise determining a bandwidth ratio of thefirst RF radio to the first SRC device or the second RF radio to thesecond SRC device; and interspersing selected data in the data blockbetween the spatially secure NFMI data link and the RF data link,wherein the selected data is interspersed based on the bandwidth ratio.

The method 500 can further comprise interspersing the data in the datablock to the spatially secure NFMI data link and the RF data link at oneor more of a physical layer, a medium access control layer, a data linklayer, or a network layer.

In another embodiment, a method 600 for spatially enabled securecommunications is disclosed. The method comprises the operation ofdefining a proximity boundary with dimensions defined, in part, by acommunication range of one of a proximity Short Range Communication(PSRC) device and an SRC device, wherein the PSRC device and the SRCdevice are configured to communicate using near field magnetic induction(NFMI) and each include a radio frequency (RF) radio, wherein at leastone of the PSRC device and the SRC device include at least two antennasto provide magnetic induction diversity, as shown in block 610. Themethod further comprises interspersing data in a data block as RF dataand NFMI data for transmission of NFMI data within the proximityboundary via the SRC device or the PSRC device and transmission of RFdata via the RF radio, as shown in block 620; and reassembling RF datareceived on the RF radio and NFMI data received on the SRC device or thePSRC device, as shown in block 630.

The method 600 further comprises interspersing the data in the datablock using a selected algorithm to form the RF data and the NFMI data;transmitting the NFMI data on the spatially secure NFMI data link; andtransmitting the RF data on the RF data link.

The method 600 can further comprise transmitting the RF data using theRF radio and the NFMI data on a spatially secure NFMI data linksynchronously or asynchronously.

In another embodiment, the method 600 can comprise determining abandwidth ratio of the RF radio to the SRC device or the PSRC device;and interspersing selected data for communication from the RF radio andthe SRC device or PSRC device, wherein the selected data is interspersedbased on the bandwidth ratio.

It should be understood that many of the functional units described inthis specification have been labeled as modules, in order to moreparticularly emphasize their implementation independence. For example, amodule may be implemented as a hardware circuit comprising customVery-Large-Scale Integration (VLSI) circuits or gate arrays, a customApplication-Specific Integrated Circuit (ASIC), off-the-shelfsemiconductors such as logic chips, transistors, or other discretecomponents. A module may also be implemented in programmable hardwaredevices such as field programmable gate arrays, programmable arraylogic, programmable logic devices or the like.

Modules may also be implemented in software for execution by varioustypes of processors. An identified module of executable code may, forinstance, comprise one or more physical or logical blocks of computerinstructions, which may, for instance, be organized as an object,procedure, or function. Nevertheless, the executables of an identifiedmodule need not be physically located together, but may comprisedisparate instructions stored in different locations which, when joinedlogically together, comprise the module and achieve the stated purposefor the module.

Indeed, a module of executable code may be a single instruction, or manyinstructions, and may even be distributed over several different codesegments, among different programs, and across several memory devices.Similarly, operational data may be identified and illustrated hereinwithin modules, and may be embodied in any suitable form and organizedwithin any suitable type of data structure. The operational data may becollected as a single data set, or may be distributed over differentlocations including over different storage devices, and may exist, atleast partially, merely as electronic signals on a system or network.The modules may be passive or active, including agents operable toperform desired functions.

Reference throughout this specification to “one embodiment” or “anembodiment” means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment of the present invention. Thus, appearancesof the phrases “in one embodiment” or “in an embodiment” in variousplaces throughout this specification are not necessarily all referringto the same embodiment.

As used herein, a plurality of items, structural elements, compositionalelements, and/or materials may be presented in a common list forconvenience. However, these lists should be construed as though eachmember of the list is individually identified as a separate and uniquemember. Thus, no individual member of such list should be construed as ade facto equivalent of any other member of the same list solely based ontheir presentation in a common group without indications to thecontrary. In addition, various embodiments and example of the presentinvention may be referred to herein along with alternatives for thevarious components thereof. It is understood that such embodiments,examples, and alternatives are not to be construed as defactoequivalents of one another, but are to be considered as separate andautonomous representations of the present invention.

Furthermore, the described features, structures, or characteristics maybe combined in any suitable manner in one or more embodiments. In thefollowing description, numerous specific details are provided, such asexamples of materials, fasteners, sizes, lengths, widths, shapes, etc.,to provide a thorough understanding of embodiments of the invention. Oneskilled in the relevant art will recognize, however, that the inventioncan be practiced without one or more of the specific details, or withother methods, components, materials, etc. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring aspects of the invention.

While the forgoing examples are illustrative of the principles of thepresent invention in one or more particular applications, it will beapparent to those of ordinary skill in the art that numerousmodifications in form, usage and details of implementation can be madewithout the exercise of inventive faculty, and without departing fromthe principles and concepts of the invention. Accordingly, it is notintended that the invention be limited, except as by the claims setforth below.

What is claimed is:
 1. A method for proximity based securecommunications, comprising defining a proximity boundary with dimensionsdefined by a selected communication range of one of a first Short RangeCommunication (SRC) device and a second SRC device, wherein each of thefirst and second SRC devices are configured to communicate using nearfield magnetic induction (NFMI), the first SRC device and a first radiofrequency (RF) radio are configured to be coupled to a first mobilecomputing device and the second SRC device and a second RF radio areconfigured to be coupled to a second mobile computing device;communicating a proximity signal in the proximity boundary between thefirst SRC device and the second SRC device, wherein at least one of thefirst and second SRC devices includes at least two antennas to providemagnetic induction diversity; identifying a data block to becommunicated within the proximity boundary; and interspersing data inthe data block between the first RF radio and the first SRC device ofthe first mobile computing device for transmission to the second RFradio and the second SRC device, respectively, of the second mobilecomputing device on a spatially secure NFMI data link and a RF datalink.
 2. The method of claim 1, further comprising: interspersing thedata in the data block using a selected algorithm to form RF data andNFMI data; transmitting the NFMI data on the spatially secure NFMI datalink; and transmitting the RF data on the RF data link.
 3. The method ofclaim 2, further comprising transmitting the RF data on the RF datalink, wherein the RF data link comprises one or more of a wireless localarea network (WLAN) radio or a wireless wide area network (WWAN) radio.4. The method of claim 2, further comprising transmitting the RF data onthe RF data link and the NFMI data on the spatially secure NFMI datalink synchronously or asynchronously.
 5. The method of claim 2, furthercomprising receiving, at the second mobile computing device, the NFMIdata on the spatially secure NFMI data link and the RF data on the RFdata link and reassembling the data based on the selected algorithm usedto intersperse the data.
 6. The method of claim 2, further comprisingselecting the algorithm to intersperse the data, at least in part, basedon a quality of service (QOS) for the data.
 7. The method of claim 1,further comprising transmitting the data on the spatially secure NFMIdata link and the RF data link using an acknowledgement,non-acknowledgement (ACK-NACK) scheme to verify that the datatransmitted is received.
 8. The method of claim 1, further comprising:determining a bandwidth ratio of the first RF radio to the first SRCdevice or the second RF radio to the second SRC device; andinterspersing selected data in the data block between the spatiallysecure NFMI data link and the RF data link, wherein the selected data isinterspersed based on the bandwidth ratio.
 9. The method of claim 1,further comprising interspersing the data in the data block to thespatially secure NFMI data link and the RF data link at one or more of aphysical layer, a medium access control layer, a data link layer, or anetwork layer.
 10. The method of claim 1, further comprising changingthe interspersing of the data in the data block between the spatiallysecure NFMI data link and the RF data link based on a feedback ofchannel quality indications for the spatially secure NFMI data link andthe RF data link to provide a selected quality of service.
 11. Themethod of claim 1, further comprising selecting the interspersing of thedata in the data block between the spatially secure NFMI data link andthe RF data link based on a selected security level.
 12. A proximitybased secure communications system comprising: a Short RangeCommunication (SRC) device including a near field magnetic (NFMI)transceiver that is coupled to a first computing device; a second SRCdevice including an NFMI transceiver that is coupled to a secondcomputing device and configured to form a spatially secure NFMI datalink with the first SRC device, wherein one or more of the first SRCdevice or the second SRC device includes at least two antennas toprovide magnetic induction diversity, and wherein a communication rangeof one of the first SRC device or the second SRC device, using the atleast two antennas, defines one or more dimensions of a proximityboundary; a first radio frequency (RF) radio coupled to the firstcomputing device; a second RF radio coupled to the second computingdevice and configured to form an RF data link with the first RF radio; adata interspersing module configured to intersperse data fortransmission of the interspersed data on the spatially secure NFMI datalink and the RF data link; and a data reassembling module configured toreassemble the interspersed data that is received on the spatiallysecure NFMI data link and the RF data link.
 13. The proximity basedsecure communications system of claim 12, wherein the data interspersingmodule is configured to intersperse the data using a selected algorithmto form RF data for transmission on the RF data link and NFMI data fortransmission on the spatially secure NFMI data link within the proximityboundary.
 14. The proximity based secure communications system of claim12, wherein the RF data link comprises one or more of a wireless localarea network (WLAN) radio or a wireless wide area network (WWAN) radio.15. The proximity based secure communications system of claim 13,wherein the RF data link and the spatially secure NFMI data link areconfigured to communicate the RF data and the NFMI data synchronously orasynchronously.
 16. The proximity based secure communications system ofclaim 13, wherein the data reassembling module is further configured toreassemble data received on the spatially secure NFMI data link and theRF data link based on the selected algorithm.
 17. A method for spatiallyenabled secure communications, comprising: defining a proximity boundarywith dimensions defined, in part, by a communication range of one of aproximity Short Range Communication (PSRC) device and an SRC device,wherein the PSRC device and the SRC device are configured to communicateusing near field magnetic induction (NFMI) and each include a radiofrequency (RF) radio, wherein at least one of the PSRC device and theSRC device include at least two antennas to provide magnetic inductiondiversity; and interspersing data in a data block as RF data and NFMIdata for transmission of NFMI data within the proximity boundary via theSRC device or the PSRC device and transmission of RF data via the RFradio; and reassembling RF data received on the RF radio and NFMI datareceived on the SRC device or the PSRC device.
 18. The method of claim17, further comprising: interspersing the data in the data block using aselected algorithm to form the RF data and the NFMI data; andtransmitting the NFMI data on the spatially secure NFMI data link; andtransmitting the RF data on the RF data link.
 19. The method of claim17, further comprising transmitting the RF data using the RF radio andthe NFMI data on a spatially secure NFMI data link synchronously orasynchronously.
 20. The method of claim 17, further comprising:determining a bandwidth ratio of the RF radio to the SRC device or thePSRC device; and interspersing selected data for communication from theRF radio and the SRC device or PSRC device, wherein the selected data isinterspersed based on the bandwidth ratio.