Proximity Boundary Based Communication Using Radio Frequency (RF) Communication Standards

ABSTRACT

Technology is described for proximity based communications. A proximity boundary can be defined with dimensions defined by a communication range of one of a first Short Range Communication (SRC) device and a second SRC device. The first SRC device and the second SRC device can be configured to communicate using near field magnetic induction (NFMI). A proximity signal can be communicated in the proximity boundary between the first SRC device and the second SRC device. A security permission can be provided to enable selected data to be communicated from one or more of the first SRC device or the second SRC device in the proximity boundary when the proximity signal is detected between the first SRC device and the second SRC device. The selected data can be communicated from one or more of the first SRC device or the second SRC device using a radio frequency (RF) communication standard.

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/933,992, filed Jul. 20, 2020, which is a continuation of U.S. patentapplication Ser. No. 16/560,676 filed Sep. 4, 2019 which is acontinuation of U.S. patent application Ser. No. 16/048,066 filed Jul.27, 2018 which is a continuation of U.S. patent application Ser. No.15/485,116 filed Apr. 11, 2017 which is a continuation of U.S. patentapplication Ser. No. 14/841,408 filed Aug. 31, 2015 which claims thebenefit of U.S. Provisional Patent Application No. 62/044,125, filedAug. 29, 2014, the entire specifications of which are herebyincorporated by reference in their entirety for all purposes.

BACKGROUND

Wireless communication has revolutionized society in the 21st century.The way in which people talk, correspond, work, shop, and areentertained has all been changed due to the near omnipresent ability towirelessly communicate. However, wireless communication is typically notconfined to a defined area. Even low power, short range wirelesscommunication standards can be detected over a radius of tens orhundreds of meters. The lack of ability to confine wirelesscommunications to a defined area has limited its use in certainapplications and reduced the overall security of wirelesscommunications.

BRIEF DESCRIPTION OF THE DRAWINGS

Features and advantages of the invention will be apparent from thedetailed description which follows, taken in conjunction with theaccompanying drawings, which together illustrate, by way of example,features of the invention; and, wherein:

FIG. 1a is an example illustration of a proximity boundary basedcommunication system in accordance with an embodiment of the presentinvention;

FIG. 1B illustrates another example of a proximity boundary basedcommunication system in accordance with an embodiment of the presentinvention;

FIG. 2a illustrates a block diagram of an example illustration of amobile computing device having an SRC device with an NFMI transceiver inaccordance with an embodiment of the present invention;

FIG. 2b illustrates a block diagram of an SRC device with multipleorthogonal antennas to provide spatially defined security permissions inaccordance with an embodiment of the present invention;

FIG. 3 illustrates a flow chart of a method for proximity basedcommunications in accordance with an embodiment of the presentinvention;

FIG. 4 illustrates a proximity based communications system in accordancewith an embodiment of the present invention; and

FIG. 5 illustrates a flow chart of a method for proximity basedcommunications in accordance with an embodiment of the presentinvention.

Reference will now be made to the exemplary embodiments illustrated, andspecific language will be used herein to describe the same. It willnevertheless be understood that no limitation of the scope of theinvention is thereby intended.

DETAILED DESCRIPTION

Before the present invention is disclosed and described, it is to beunderstood that this invention is not limited to the particularstructures, process steps, or materials disclosed herein, but isextended to equivalents thereof as would be recognized by thoseordinarily skilled in the relevant arts. It should also be understoodthat terminology employed herein is used for the purpose of describingparticular embodiments only and is not intended to be limiting. Thefollowing definitions are provided for clarity of the overview andembodiments described below.

Definitions

As used herein, the term “substantially” refers to the complete ornearly complete extent or degree of an action, characteristic, property,state, structure, item, or result. For example, an object that is“substantially” enclosed would mean that the object is either completelyenclosed or nearly completely enclosed. The exact allowable degree ofdeviation from absolute completeness may in some cases depend on thespecific context. However, generally speaking the nearness of completionwill be so as to have the same overall result as if absolute and totalcompletion were obtained. The use of “substantially” is equallyapplicable when used in a negative connotation to refer to the completeor near complete lack of an action, characteristic, property, state,structure, item, or result.

As used herein, the term “about” is used to provide flexibility to anumerical range endpoint by providing that a given value may be “alittle above” or “a little below” the endpoint.

As used herein, the term “NFC compliant device” refers to a wirelesscommunication device that can be compliant with at least one of the ISOspecifications including ISO 14443A, ISO 14443B, ISO 18092, and ISO15693. At the time of writing, the most current ISO 14443 specificationfor parts A and B consists of four parts: (1) the ISO/IEC 14443-1:2008disclosing physical characteristics specifications; (2) the ISO/IEC14443-2:2001 disclosing radio frequency and signal interferencespecifications; (3) the ISO/IEC 14443-3:2001 disclosing initializationand anti-collision specifications; and (4) the ISO/IEC 14443-4:2001disclosing transmission protocol specifications. The ISO 15693specification consists of three parts: (1) ISO/IEC 15693-1:2000disclosing physical characteristics specifications; (2) ISO/IEC15693-2:2006 disclosing air interface and initialization specifications;and (3) ISO/IEC 15693-3:2009 disclosing anti-collision and transmissionprotocol specifications. An NFC compliant device is considered to becompliant if the device is substantially compliant, or expected to besubstantially compliant with an accepted version of the ISO 14443, ISO18092, or ISO 15693 specifications, whether the accepted date isprevious to the versions listed above or consists of a future acceptedversion of the specifications, or has evolved from similar technologyover time. The term NFC compliant device can also refer to other typesof close proximity communication devices that are not compliant with theISO 14443 specifications but are configured to communicate at a distanceof about 10 cm or less.

As used herein, the term “short range communication (SRC) device” isintended to refer to NFC compliant devices, as well as other types ofdevices that are configured to communicate using near field magneticinduction (NFMI) within a close proximity of less than about 3 metersfrom a receiver or transceiver.

As used herein, discussion of a communication from one device to anotherdevice may be provided as an example communication between devices butis not intended to be limited to a unidirectional communication. Forexample, embodiments where a first device sends a communication to asecond device are not-limited to a one-directional communication fromthe first to the second device, but can also include embodiments wherethe communication is sent from the second device to the first device, orwhere communications are bi-directionally exchanged from the firstdevice to the second device and from the second device to the firstdevice.

As used herein, the term “mobile computing device” refers to a deviceincluding a digital processor coupled to a digital memory. The mobilecomputing device may be a simple device operable to receive a signal andrespond. Alternatively, the mobile computing device can be a complexdevice having multiple processors and a display screen.

As used herein, the term “radio frequency” or “RF” is used to describenon-proximate far-field propagated electromagnetic radiation used tocommunicate information via an RF transceiver or RF radio. The powerroll-off for an RF electromagnetic signal is approximately one over thedistance squared (1/(dist²)), meaning that power density of the emittedRF signal will be one fourth (¼) as strong as the distance between theemitted RF signal and the RF transmitter is doubled.

As used herein, the term “pairing” refers to the communication ofsufficient information to one or more mobile computing devices to enablethe mobile computing device to form a data link with another mobilecomputing device. The data link can be a wireless link using NFMI and/orRF. The information used to establish the link can be communicated usingNFMI and/or RF to the mobile computing device.

As used herein, the terms customer and user are used synonymously unlessotherwise noted. As used herein, the term “cloud based storage” refersto digital storage at a remote location. The digital storage can be anytype of digital storage including, but not limited to, magnetic storage,optical storage, and solid state storage devices. The digital storagemay be located on a server. A local device, such as a mobile computingdevice or a proximity computing device can access the digital storage atthe remote location via a wireless or a wired connection through aprivate or public network including, but not limited to a local areanetwork, a personal area network, a wide area network, and an internetconnection.

Example Embodiments

An initial overview of technology embodiments is provided below and thenspecific technology embodiments are described in further detail later.This initial summary is intended to aid readers in understanding thetechnology more quickly but is not intended to identify key features oressential features of the technology nor is it intended to limit thescope of the claimed subject matter.

The wireless communication of proximity based information enables a userto send or receive content when the user is within a limited proximityof a location or object. The content may be related to or associatedwith the location or the object. Also, the sending or receiving of thecontent may be triggered by the user entering the limited proximity tothe location or the object. This may be done to increase the security ofthe communication link or the data being communicated by limiting thelocation where data is transmitted or received. Knowing where certaindata is permitted to be communicated allows security protocols to beimplemented—such as shielding around a room, or limited access of peopleand or equipment that should not have access to the data or mayeavesdrop on the data communications. This may allow data to becommunicated more efficiently by limiting the communication of data to aspecific location. This can be used to prevent multiple systems fromcommunicated unexpectedly at the same time and place.

In one embodiment, the wireless communication of the proximity basedcontent can be accomplished by wirelessly communicating with a user'smobile computing device, such as a smart phone. While the mobilecomputing device is described herein as being mobile, the mobilecomputing device may be a fixed device. The mobile computing device canbe a handheld computing device, a portable multimedia device, a smartphone, a tablet computing device, a body worn device, a laptop computer,an embedded computing device or similar device. An embedded computingdevice is a computing device that is inlayed in a selected object suchas a vehicle, a watch, a bracelet, a key fob, a ring, a key card, amonitoring device, a remote sensor, a measurement device, a dispensingdevice, a clipboard, an implanted medical device, a token, a poker chip,a souvenir, a necklace amulet, an electronically enabled article ofclothing, an appliance, a tool, a weapon, and so forth. A computingdevice may be embedded in substantially any type of object. The mobilecomputing device can be a device that is user owned, rented, leased,associated with, or otherwise in the possession of the user. A userowned device can include mobile computing devices that are actuallyowned by relatives, friends, and employers of the user.

In one embodiment, wireless communications can be enhanced by the use ofspatially enabled communications. Spatially enabled communications, asused herein, is the enhancement of wireless communications based onproximity control, proximity based security, and/or a determination ofrelative spatial location. The spatially enabled communications can beaccomplished using short range communication (SRC) devices, as describedherein.

The ability to sharply define a desired proximity boundary can provide asignificant advantage for the spatially enabled wireless communications.If an edge of the proximity boundary is substantially variable, a usermay detect and/or receive content for locations or objects that may notbe visible or easily discovered by the user. Certain types of ubiquitouswireless standards may not be useful to sharply define the proximityedge. Standards such as Wi-Fi, also known by the 802.11 standard fromthe Institute of Electronic and Electrical Engineers (IEEE), utilizeRadio Frequency (RF) signals that can have a range of hundreds of feet.The RF signal may be detected in certain situations well outside of thedesired range. More localized standards, such as Bluetooth can have thesame challenge, albeit for a smaller range. A typical range for aBluetooth device can be approximately 10 meters or about 30 feet.

In accordance with one embodiment of the present invention, an SRCdevice can include a short range transceiver that can be configured tocommunicate using Near Field Magnetic Induction (NFMI). Unlike RFsignals, which are created by modulating information onto anelectromagnetic plane wave and transmitting those signals into freespace, NFMI signals are created by modulating information onto amagnetic field. The magnetic field is localized around the transmittingantenna. The signal outside of this localized region is typicallyattenuated below the noise floor, thereby making it difficult orimpossible to receive the signal. The power roll-off for anelectromagnetic signal is one over the distance squared (1/(dist²)),meaning that every time the distance is doubled, the power is one fourth(¼) as strong. In contrast, the power roll-off for a NFMI signal isproportional to one over the distance to the sixth (1/(dist⁶)), meaningthat every time the distance is doubled, the power is one sixty-fourth (1/64) as strong. Thus, the use of NFMI can enable a signal that can betransmitted predictably within a well-defined area or distance.

However, the edge of the proximity boundary may be variable even whenNFMI is used. One challenge with communicating through the use ofmagnetic induction is the polarization of the signals relative to thetransmitter and receiver antennas. Maximum power in an NFMI signal canbe communicated between two NFMI antennas with axis that are parallel toone another. Minimum power is transmitted between two antennas withantenna axis that are perpendicular to one another. The difference intransmitted power can be significant.

For instance, at 1 meter, the power received in an NFMI signaltransmitted between two antennas that are substantially parallel to eachother can be 50 decibels (dB) greater than the power received when oneof the antennas is substantially perpendicular to the other.

The transmitter typically has no way of knowing the orientation of thereceiver antenna, therefore it must transmit at the maximum (worse case)power setting of +50 dB to ensure a link distance of 1 meter when theantennas are perpendicular with one another.

In an NFMI system, the power roll-off is 60 dB per decade. Therefore 50dB correlates to 0.833 decades (50 dB/60 dB) or an increased linkdistance of 6.8 times (10{circumflex over ( )}0.833). Thus, if thetransmitter and receiver antenna are optimally positioned (i.e.,parallel) while the transmitter is at full power (+50 dB), the linkdistance will reach out to 6.8 meters instead of 1 meter. This meansthat an NFMI link will have a range from approximately one to sevenmeters. This wide range, which depends on the orientation of thetransmitter and receiver antennas, substantially reduces the ability tosharply define a selected proximity around a location or object.

One way of dealing with the challenge of a variable proximity edgecaused by antenna misalignment is to design one or both of thetransmitter and receiver with multiple orthogonal antennas. This ensuresthat at least one of the receiving antennas will be substantiallyparallel to the transmitting antenna regardless of the relativealignment between the transmitter and the receiver. In one embodiment,the signal can be received at a receiver having multiple orthogonalantennas. A portion of the signal can be received on each of theorthogonal antennas and summed, thereby maximizing the signal no matterthe orientation. Alternatively, one or more of the antennas can beselected to transmit or receive based on strength of the signal.

The SRC device associated with the location or object can also includemultiple orthogonal antennas, enabling the device to receive NFMIsignals broadcast from the user's mobile computing device no matter whatthe orientation is between the two transceivers. In one embodiment, theantenna that is used to receive the signal can also be used to transmit.The antenna may be used to transmit on the assumption that it is thebest aligned antenna with the antenna on the receiving transceiver,thereby maximizing the link distance and minimizing the power needed tocommunicate between the two transceivers. This, in turn, reduces theemission levels of the transceiver.

In one embodiment, the use of multiple antennas to communicate a signalis referred to as antenna diversity. When the antennas are used tocommunicate a magnetic induction signal, antenna diversity refers to theuse of multiple orthogonal antennas that are directly connected to asingle transceiver. This is different than antenna diversity used intransmission schemes such as Multiple Input Multiple Output (MIMO),wherein multiple antennas are used to perform spatial multiplexing todecrease signal loss through channel fading. The use of multipleorthogonal antennas to receive a magnetic induction modulated signalwill be referred to as magnetic induction diversity. In one embodiment,the use of magnetic induction diversity can be used in combination withspatial diversity to allow the benefits of both spatial diversity andmagnetic induction diversity to be accomplished.

Magnetic induction diversity can be the selection of the best alignedantenna to receive or transmit with another transceiver. Alternatively,magnetic induction diversity can involve summing the signal on two ormore antennas. The use of magnetic induction diversity enables thevariability of the proximity boundary to be substantially reduced.Since, in a system with multiple receiver antennas positioned inorthogonal planes, a receive antenna can always be selected that issignificantly aligned (i.e., parallel) with a transmit antenna, itreduces the need to significantly increase the transmit power to ensurethat the signal can be received at a selected distance independent ofits relative orientation with the transmit antenna, and vice versa. Itshould be noted that the use of NFMI transceivers does not, by itself,constitute magnetic induction diversity. The distance over which amagnetic induction device can communicate (i.e. a range) when usingmagnetic induction diversity can depend on a number of factors,including but not limited to a communication range of a transmitter anda receive sensitivity of a receiver. A number of additional factors canalso contribute including the degree of orthogonality, the number oftransmit and receive antennas, the shape and size of the antennas, thetransmitter output power, the efficiency of the receiver, and so forth.

The transmit power in each of the NFMI transceivers can be set at alevel to define a desired radius of a proximity boundary. Thetransceivers may be designed so that the proximity boundary may besubstantially circular. Alternatively, the antennas on the short rangetransceiver associated with the product can be designed to provide aradiation pattern of a desired shape, such as a narrow arc or conicalpattern.

Proximity Boundary Based Communication

In one example embodiment, illustrated in FIG. 1a , a proximity boundary108 is illustrated. A proximity SRC (PSRC) device 104 can be configuredto communicate using NFMI within the range of the proximity boundary.The PSRC device can be a proximity computing device that includes atleast one NFMI transceiver coupled to a computing device. The PSRC istypically located at a fixed position, but may be configured as a mobiledevice. A user 112 can carry a computing device 110, such as a mobilecomputing device having an SRC device configured to receive an NFMIsignal broadcast by the PSRC device 104. While the term mobile computingdevice is used in this example, it is not intended to be limiting. TheSRC device can also be coupled to an immobile computing device, or to amobile computing device configured to be located at a fixed location.

If both the SRC device on the mobile computing device 110 and the PSRCdevice 104 include only a single antenna, then the power of the NFMIsignal transmitted from the PSRC device needs to be sufficient to ensurethat the signal can be received at the mobile computing device 110 atthe perimeter of the proximity boundary 108 even when the antenna of theSRC device at the mobile computing device 110 and the antenna of thePSRC device 104 are poorly aligned (i.e., substantially perpendicular).As previously discussed, the power needs to be increased approximately50 dB (i.e., 10,000 to 100,000 times) for this to be achieved.

However, when the antennas of the SRC device at the mobile computingdevice 110 and the PSRC device 104 are better aligned, and the power isincreased by 50 dB to accommodate the poorly aligned antennas, then theNFMI signal can be received anywhere within a radius that isapproximately seven times greater than the proximity boundary 108. Auser 114 having a mobile computing device 110 with an antenna that iscoaxial to or parallel with the antenna of the PSRC device 104 maydetect the NFMI signal a significant distance from the PSRC device. Infact, each person illustrated in FIG. 1 may be able to detect the signalbased on the alignment of the respective antennas.

If one or both of the PSRC device 104 and the SRC device on the mobilecomputing device 110 included multiple orthogonal antennas that usemagnetic induction diversity to receive and/or transmit the NFMI signal,it can be ensured that the receiver and transmitter antenna aresubstantially optimally aligned, thereby enabling a substantiallymaximum amount of the possible power to be received independent of theposition or orientation of the SRC antenna at the mobile computingdevice 110 relative to the antenna of the PSRC device 104. This enablesthe uncertainty area (i.e., the area between the outer circle 114 andthe inner circle 108) to be substantially reduced, thereby enabling thePSRC device to be designed with a desired proximity area with minimaluncertainty area.

The size of the proximity boundary 108 and the uncertainty area outsideof the proximity boundary is determined by the transmit power of eitherthe PSRC device 104 or the SRC device on mobile computing device 110,the receive sensitivity of either the PSRC device 104 or the SRC deviceon mobile computing device 110, and/or antenna alignment. These factors,individually or in combination, can facilitate optimal communicationcoupling which provides a well-defined edge of the proximity boundary.

The NFMI signal broadcast by the PSRC device 104 can be used to indicateto the mobile computing device 110 that the user 112 is located withinthe proximity boundary 108. In one embodiment, the NFMI signal can be aproximity signal which can provide information that indicates a securitypermission for the user to communicate selected data using the user'smobile computing device.

In one embodiment, the security permission can be communicated in asecure, encrypted format from the NFMI transceiver coupled to the PSRCdevice 104 to communicate with the NFMI transceiver coupled to themobile computing device 110. Alternatively, the security permission maybe sent in an unencrypted format, relying on the proximity security ofthe NFMI signal that is communicated substantially only in the proximityboundary 108.

In one embodiment, the selected data is communicated using the mobilecomputing device 110 only while the mobile computing device remainswithin the proximity boundary 108. If the NFMI signal broadcast by thePSRC device 104 is no longer received at the mobile computing device110, then the ability to communicate the selected data using the mobilecomputing device can be disabled.

In another embodiment, once the security permission is received at themobile computing device 110, the mobile computing device 110 can beconfigured to communicate the selected information for a selected timeperiod, at a selected time period, or perpetually, irrespective of themobile computing device's location with respect to the PSRC device 104.

For example, in one embodiment, a mobile computing device 110 can moveto within a proximity boundary 108 of a PSRC device 104. The PSRC device104 may be located in a computing device in an automobile or a mobilecomputing device used by another person, or at a selected location. ThePSRC device can communicate selected data, comprising pairinginformation to allow the mobile device to pair with another computingdevice. The pairing may be a Bluetooth pairing to another device.Alternatively, pairing can comprise sending sufficient information tothe mobile device that the mobile device can connect with anothercomputing device using NFMI communication or an RF communicationstandard, such as WiFi or 3GPP LTE, as previously discussed. Just bybeing within proximity, the permissions to pair with another computingdevice can be set, thereby enabling pairing to occur passively based ona proximity to a specific location or another device. Alternatively, anadditional security measure can be implemented, such as requiring amanual operation by a user such as pressing a pairing button on themobile computing device to initiate a pairing process with anothercomputing device.

The security permission can grant permission at the mobile computingdevice 110 to transmit, receive, or transmit and receive the selecteddata. For instance, in example embodiments, the selected data can bereceived from the PSRC device 104, transmitted to the PSRC device, orreceived from and transmitted to the PSRC device.

The selected data may be communicated between the mobile computingdevices 110 using the NFMI transceivers to maintain spatial security ofthe selected data within the proximity boundary 108. In anotherembodiment, the selected data can be communicated using a radiofrequency communication standard, such as Bluetooth, IEEE 802.11-2012,802.11ac-2013, 802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, thirdgeneration partnership project (3GPP) long term evolution (LTE) Release8, 9, 10, 11, 12 or 13, an optical link, an acoustic link, a wired link,and so forth. This allows communication protocols that are inherentlynon-proximate in their communication behavior, such as Bluetooth, Wi-Fi,or 3GPP LTE, to function effectively in proximity based applications.Proximity applications can include, but are not limited to, marketing,medical monitoring, secure communications, localized intercoms,proximity payment systems, or other types of proximity basedapplications where the location of one device relative to another can beimportant.

FIG. 1B illustrates another example, wherein an NFMI signal can becommunicated between the NFMI transceivers of two mobile computingdevices 110. A separate proximity boundary 114, 116, 118, 120 isillustrated around each mobile computing device 110.

While the same diameter is illustrated for the proximity boundary ofeach mobile computing device, this is not intended to be limiting. Thediameter of a proximity boundary can be selected based on the systemdesign and needs of each mobile computing device. As previouslydiscussed, the distance over which a magnetic induction device cancommunicate (i.e. a range) when using magnetic induction diversity candepend on a number of factors, including but not limited to acommunication range of a transmitter and a receive sensitivity of areceiver. The NFMI transceiver coupled to a mobile computing device canbe designed to achieve a proximity boundary of a desired size. Apractical size can vary from several centimeters to several meters,depending on the design of the antennas, transmitter, and receiver.Larger proximity boundary sizes can be achieved with a relatively largeamount of power, as can be appreciated.

In the example of FIG. 1B, the proximity diameter can be approximately 3meters. When the user 112 in proximity boundary 116 is located within adistance of less than 1.5 meters from the user in proximity boundary118, an NFMI signal can be broadcast by one of the SRC devices coupledto the mobile computing devices 110. The NFMI signal can be used toindicate to the mobile computing device 110 that another user 112 islocated within the proximity boundary 116 or 118. As previouslydiscussed, the NFMI signal can include a security permission thatenables the mobile computing device to communicate selected data betweenthe mobile computing devices 110. The selected data can be communicatedbetween the mobile computing devices using NFMI transceivers or RFradios, as previously discussed.

The selected data can be communicated between the mobile communicationdevices once the security permission has been received (i.e. once themobile communication devices come within the proximity boundary radiusand the appropriate data/signal has been exchanged or received).Alternatively, the selected data may be communicated only when themobile communication devices remain within a proximity boundary radius.

In FIG. 1B, the user 112 within the proximity boundary 118 is locatedwithin the proximity boundary 116 and 120, thereby enabling the user toreceive security permissions from the users in the other proximityboundaries and communicate selected data with both users. Conversely,the user 112 in proximity boundary 114 is not located within theproximity boundary of any other user. Therefore, the user is not able tocommunicate the selected data with another SRC device or PSRC devicecoupled to a mobile computing device 110.

FIG. 2a illustrates an example block diagram of a system forcommunication based on a location of a proximity boundary, in accordancewith an embodiment of the present invention. While the proximityboundary based communication system 200 is illustrated in FIG. 2a anddescribed herein, the constituent elements and functions thereof may beequally applicable to other implementations of the wirelesscommunication of proximity based content.

Referring to FIG. 2a , the proximity boundary based communication systemcomprises one or more mobile computing devices 202. As described in thepreceding paragraphs, each mobile computing device 202 can be a handheldcomputing device, a portable multimedia device, a smart phone, a bodyworn device, an implantable device, embedded in a medical device, amilitary communication system, a military weapons system, integrated inan automobile, a tablet computing device, a laptop computer, an embeddedcomputing device or similar device.

The mobile computing device 202 can be a mobile computing device that isowned by, or otherwise associated with, the location (i.e. a store, ahospital, a business, a military facility, etc.) in which the mobilecomputing device is used. Alternatively, the mobile computing device 202can be a mobile computing device that is not owned by the store in whichit is used. In other words, the mobile computing device 202 can be adevice that is customer/patient/user/operator owned, rented, leased,associated with, or otherwise in the possession of thecustomer/patient/user/operator. A customer owned device can includemobile computing devices that are actually owned by relatives, friends,employers, or other types of associates of the customer.

The mobile computing device 202 can include a digital storage 204. Thedigital storage 204 may be a magnetic digital storage such as a harddisk, an optical digital storage such as an optical disk, a solid statedigital storage such as a Dynamic Random Access Memory (RAM) or apersistent type digital storage such as a flash RAM. Other types ofdigital storage may also be used, as can be appreciated. The digitalstorage 204 may be integrated in the mobile computing device 202.Alternatively, the digital storage 204 may be located in a cloudcomputing storage site that is in wireless communication with the mobilecomputing device 202. Access to the cloud computing storage site can becontrolled by and limited by the user or owner of the mobile computingdevice 202. Access to the cloud computing storage site may be granted toothers by the user and/or owner. In one example embodiment, the cloudcomputing storage site can be accessed via a security permissionreceived from a proximity computing device 210 or another mobilecomputing device 202.

The mobile computing device 202 can include an SRC device 208 that iscoupled to the mobile computing device 202 and enables the mobilecomputing device 202 to transmit and receive information within adefined area using an NFMI transceiver 207. The SRC device 208 can beintegrated with the mobile computing device 202. Alternatively, theshort range communication device may be an external device, such as adongle, that can be plugged into the mobile computing device 202 toenable information to be sent from and received by the mobile computingdevice 202.

The mobile computing device 202 can also include a graphic display 209,such as a liquid crystal display (LCD) screen, organic light emittingdiode (OLED) display screen, or the like. The graphic display screen canbe used to display visual information regarding a location of the mobilecomputing device within the proximity boundary. While a graphic displayis illustrated in FIG. 2a , it is not required. Certain types of mobilecomputing devices 202 may not include a graphic display, or may beconnected to an external graphic display device.

A PSRC device 214 can be disposed in a proximity computing device 210that is located at a selected location. The PSRC device is typicallyplaced at a fixed location and used to define a selected a selectedproximity boundary. The PSRC device can transmit a proximity signalwithin the selected proximity boundary of the fixed location using aproximity signal module 215. When a mobile computing device 202 with anSRC device enters the fixed location of the proximity boundary, andreceives the proximity signal, a security permission can be communicatedfrom a security permission module 217 at the PSRC device to the SRCdevice, thereby enabling the SRC device to transmit or receive selecteddata, as previously described. While the example has illustratedcommunication from the PSRC device to an SRC device, this is notintended to be limiting. The SRC device can also transmit proximitysignals and security permissions to the PSRC device. One or both of theSRC device or the PSRC device can then transmit or receive the selecteddata based on the security permission.

For example in a medical environment, the selected location may be ahospital room, a body-worn device on a patient, or a hospital bed. TheSRC device, operating with a mobile computing device, can be embedded ina doctor's or nurse's clipboard while the PSRC device can be embedded ina medical monitoring device. The SRC device in the mobile computingdevice can be a body-worn medical monitoring device or sensor.

In addition to uses in medical environments, the PSRC and SRC devicescan be located in any number of situations and locations. For example,the PSRC device can be located in a vehicle and the SRC device is asmart phone or car key. The PSRC may be a vehicle or an intercom and theSRC device can be in a portable radio on a soldier or in a weapon.

The system illustrated in the example of FIG. 2a is configured toestablish a short range wireless communication link 218 between the SRCdevice 208 and a PSRC device 214 or another SRC device 208 when themobile computing device 202 is within a selected distance 220 of theproximity computing device 210. In one embodiment, the short rangewireless communication channel may only communicate using near fieldmagnetic induction communication. The short range wireless communicationchannel can be referred to as a proximity communication channel Δt leastone of the SRC device 208 and the PSRC device 214 can have a pluralityof antennas and use magnetic induction diversity to identify the bestantenna or a plurality of signals to transmit and/or receive a signal.In one embodiment, the selected distance 220 between the two devices maybe less than or equal to a near field distance, which is approximately awavelength of the carrier signal (λ) divided by 2pi (λ/2π).

As illustrated in FIG. 2b , the SRC device 208 can include multipleorthogonal antennas 230, 232, 234. The multiple orthogonal antennas canbe used to provide magnetic induction diversity, thereby enabling theproximity boundary to be relatively sharply defined, as previouslydiscussed. In one embodiment, each SRC device 208 can include two ormore orthogonal antennas. In another embodiment, one SRC device may havea single antenna and another SRC device can include two or moreorthogonal antennas.

A communication range of one of a first SRC device and a second SRCdevice that includes at least two antennas, can be used to define one ormore dimensions of a proximity boundary, as previously discussed in thepreceding paragraphs. It should be noted that, the mere use of multipleorthogonal antennas does not guarantee the definition of a relativelysharply defined proximity boundary. Rather, the use of the multipleorthogonal antennas, combined with the selection of components withdesired tolerances can provide a relatively sharply defined proximityboundary. The tolerances of components in the SRC can be designed andselected to provide a desired proximity boundary that is relativelysharply defined. Components in both the transmit chain, receive chain,RF front end, and antennas can be selected to provide the desiredtolerance in the proximity boundary. The design and selection offilters, amplifiers, receivers, transmitters, antennas, and other RFcomponents can provide the desired tolerance of the proximity boundary.The desired tolerance of the boundary can depend upon its intended useand intended use location.

In one example, it can be desirable to select and design components ofthe SRC devices to define a proximity boundary of approximately 9 feetin diameter. It can be acceptable to have another SRC device detect aproximity signal within 3 feet of the designed 9 foot diameter boundary.Thus, an SRC device may be able to detect the proximity signal when 12feet from another SRC device or PSRC device.

In another example, it can be desirable to select and design componentsof the SRC devices to define a proximity boundary of approximately 3feet in diameter. The proximity boundary can be configured to operatenear other SRC devices with proximity boundaries. Accordingly, in orderto provide a relatively sharply defined proximity boundary, thecomponents of the SRC device can be selected so that the SRC devicecannot detect a proximity signal at a distance of greater than 4 feetfrom another SRC device or PSRC device. These examples are not intendedto be limiting. An SRC device, and the components of the SRC device, canbe selected and designed with components that are capable of providing aproximity boundary with desired dimensions and a sufficiently sharpboundary to allow the SRC device to function as desired. The use of NFMIcommunication, multiple orthogonal antennas, and components with desiredtolerances can enable the definition of a desired proximity boundary.

Proximity Boundary Based High Speed Communication

In one embodiment, a radio frequency communication standard fornon-proximate communications, such as Bluetooth (BT), can be used toform a communication link in a proximity-based application. Because ofthe physical properties of the Bluetooth energy (propagatingelectromagnetic wave), a mobile computing device using Bluetooth is notable to reliably ensure when the mobile computing device is within aspecific distance of another BT enabled device. However BT technology,or other types of RF communication standards, is typically capable oftransmitting information at a higher data rate than NFMI technology.Accordingly, the two radio access technologies can be integrated to forma multi-Radio Access Technology (MRAT) device that is configured toallow the NFMI link to determine when a proximity event occurs (i.e. thecomputing device with an SRC device is located within the proximityboundary of a PSRC device or another computing device with an SRCdevice) and then permit or signal the BT link to exchange the desiredinformation. If the computing device with the SRC device exits theproximity boundary of the PSRC device or another computing device withthe SRC device, then the BT link can be unpermitted to exchange thedesired information. In other words, a permission to exchange thedesired information can be revoked.

While an example of communicating via a BT RF radio link is provided, itis not intended to be limiting. Other types of RF communicationstandards that can be used to broadcast data when a proximity evenoccurs include, but are not limited to, IEEE 802.11-2012, 802.11ac-2013,802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, third generationpartnership project (3GPP) long term evolution (LTE) Release 8, 9, 10,11, 12 or 13, an optical link, an acoustic link, and so forth.

One example of a proximity event used to trigger a communication viaanother radio access technology is a proximity-based advertisingapplication. In order to effectively target a user for proximity basedadvertising, the system can be configured to be aware of when apotential customer or user is within a specified distance of thelocation, good, or service. Once this location has been verified viaNFMI technology, by receiving a proximity signal sent from an NFMItransceiver, as previously described, the system can use a differentradio access technology to enable higher data rates to transfer selecteddata, such as text, images, audio or video. The selected data can becommunicated for an advertisement or provide information for a productwithin the user's proximity. The selected data can be communicated usinga non-proximate radio frequency standard communication more quickly thanthe information typically can be communicated using only a proximitycommunication technology such as NFMI.

The ability to communicate desired information more quickly enables theuser to become aware (i.e. via an alert) of a promotion being offeredbefore the user has passed out of the target location. In addition, ifthere is a large amount of data being communicated (securityinformation, encrypted information, graphics, audio, video, or otherlarge data) the user may become frustrated if the interaction is slow.If the information is communicated slowly, then it may defeat the‘positive experience’ that a marketer typically desires to share with auser.

Another example of a proximity event used to trigger a communication viaa broadband radio access technology is a proximity data transfer device.In one embodiment, a user can download information on a mobile computingdevice while in proximity of a PSRC placed at a selected location andassociated with the location or an object at the location. For example,a PSRC device associated with an interactive movie poster can beconfigured to download or stream the contents of a movie or movietrailer. The system can be activated by a proximity event determined bythe NFMI link between the PSRC and an SRC device in the user's mobilecomputing device. However the NFMI link may not provide an adequate datarate to stream video. Therefore an additional radio access technologyoperable to use a high(er) data rate allows the information to beexchanged effectively.

In one embodiment, proximity events used to trigger broadbandcommunications, such as the interactive movie poster example, can beconfigured such that the user remains within the proximity location inorder to continue accessing the data (i.e. watching video, listening tomusic, accessing a database, participating in a wireless network, and soforth). The use of NFMI transceivers in the SRC device and the PSRCdevice can be configured to form a proximity boundary of a selectedsize, such as 1 to 3 meters. A user within the proximity boundary cancontinue to participate in the proximity event. Other types of shortrange protocols, such as near field communications (NFC), operate in anextremely small region, such as a few centimeters. Such a small area istoo constrictive for a user to continuously hold their mobile computingdevice within the same small location for any length of time.Conversely, an RF (non-proximate far-field) communication standard,which communicates tens to thousands of meters, does not provide thelocalization that the use of the NFMI technology can provide.

Proximity Based Event with Long Range Data Transfer

In another embodiment, the SRC device in the mobile computing device orthe PSRC device can be used to pair the mobile computing device to forma connection using a separate radio access technology with anotherwireless device to enable the mobile computing device to communicate viaa broadband and/or long range communication standard. When the mobilecomputing device enters a proximity boundary, the SRC device can beconfigured to communicate and/or receive sufficient information toestablish an RF radio link with the other wireless device using aselected radio access technology such as Bluetooth, WiFi, 3GPP LTE, andso forth.

The ability to pair with another wireless device to establish the RFradio link can provide significant advantages. While radio accesstechnologies configured to operate in licensed portions of the radiospectrum, such as cellular systems, are configured to operate with aknown group of trusted devices, systems operating in unlicensed portionsof the radio spectrum, such as WiFi and Bluetooth typically do not havethe ability to identify trusted devices. In addition, it can bedifficult to identify other unknown devices and establish the necessaryinformation to form a radio connection with those devices. Using theNFMI radios to communicate the necessary information to establish aWiFi, Bluetooth, or other desired radio link can provide security andreduce the amount of power used to attempt to access unknown devices.The pairing information can also allow the mobile computing devices totrust the data links that they are connected to.

Accordingly, a mobile computing device can be paired to a specificwireless system/network by bringing the device within the proximityboundary of the SRC device. The proximity boundary can be within thecoverage area of a longer range communication standard, such as WiFi orBluetooth.

As previously discussed, a short range system such as an NFC system hasa coverage area of only a few centimeters. It may not always beconvenient to limit this proximity range to a distance that is so smallor restrictive that the user is required to physical hold the wirelessdevice within a specified location. For example the device to beprogrammed may be a body-worn device on a patient, or an embedded devicewithin the patient's body, or a communication system that is not easilyremoved like a helmet or backpack.

Accordingly, the SRC device can be used to define a proximity boundarythat is limited in area relative to the non-proximate wirelesssystem/network, but large enough that it is conveniently accessible tothe user or device to be paired. In addition, the proximity area may belocated so that the user does not have to take any specific action ontheir part to initiate the pairing process.

For example, a PSRC device or an SRC device may be assigned to aspecific patient in a hospital. A caregiver can enter the patient's roomor stand next to the patient's bed with a mobile computing device(clipboard, smartphone, tablet . . . ). The SRC device in the mobilecomputing device can be within the localized proximity boundary createdby the NFMI system in the PSRC or SRC device assigned to the specificpatient in the hospital. A security permission can be communicated, viathe SRC device, to the mobile computing device. The security permissioncan be used to authenticate the mobile computing device to anotherwireless network, such as a WiFi or Bluetooth network, thereby enablingthe mobile computing device to be able to access data, even afterleaving the proximity boundary via a longer range wireless protocol suchas Wi-Fi.

For example, the caregiver can leave the patient's room and go back totheir work station while continuing to access the patient's data via aWi-Fi system. If the caregiver enters a different patient's room, themobile computing device can receive a security permission from an SRCdevice or a PSRC device associated with the different patient to allowthe caregiver to access information associated with the differentpatient via the WiFi system. Alternatively, each patient can beassociated with a different WiFi access point (AP). The securitypermission can provide information that enables the mobile computingdevice to access the WiFi system via the AP associated with a patient.

It should be noted that the proximity event may not just assign a mobiledevice to a wireless system, but may also be used to control permissionsto allow a mobile computing device to access data within the samewireless system.

For example a hospital may have one large wireless network accessible bya non-proximate wireless protocol such as Wi-Fi, and a mobile device canbe assigned specific permissions based on the proximity boundary thatthe mobile device is brought within. The mobile device remains pairedwith the same wireless system, but is able to access different databased on the device's proximity within the network, such as eachpatient's data.

To further clarify, a nurse may have an electronic application on amobile computing device such as a tablet that enables the nurse torecord patient notes. The security permissions received while thecomputing device is within a proximity boundary, using NFMI via the SRCor PSRC device, can enable the mobile computing device to only allowaccess to the patient records that the nurse is currently visiting, orhad previously visited. Patient access can also be based on a length oftime since the nurse visited the patient and was located within adefined proximity boundary created between SRC devices. When the nurseenters a different patient's room, and has left the proximity boundary,the security permission may no longer be received, thereby removingpermission to access the previous patient's data.

The ability to only access a patient's data only from within a definedproximity boundary can reduce errors by ensuring that data that isrecorded is for the patient within the proximity boundary.

Another example comprises a non-proximate wireless intercom systemconfigured to operate in an unlicensed portion of the radio spectrum(e.g. 900 MHz, 2.4 GHz . . . ) where wireless headsets (and microphonesfor bidirectional communication) can communicate to each other or to acentral communication device's hub. Each intercom device can be pairedto the communication network to prevent each intercom device fromcommunicating with or being interfered with by other wireless systemswithin range of the wireless RF signal. Typically, each intercom deviceis configured to undergo a pairing procedure to assign a device to aspecific network. This can be accomplished via software programming,hardware jumper settings (such as a dip-switch) to set the specifiedcode, or a wireless pair-over-air process.

When devices are paired wirelessly (over the air), proper care must betaken to ensure that the device pairs with the intended communicationnetwork—especially if a second communications network operating on thesame wireless standard is nearby. This problem can be resolved in someinstances by requiring a passcode to be entered by at least one of thenodes or devices being paired.

For example, when a Bluetooth device is paired, one node can be put intosearch mode to detect the presence of another Bluetooth enabled nodewith which to communicate. Often one node will have a passkey (0000 forexample) that is to be set on one device to authenticate thepair-over-air process.

Many recent inventions/products allow for devices to be pairedwirelessly through short range communication protocols to reduce thecomplexity of the pair-over-air process. Such systems may implement ashort range physical layer such as magnetic induction or NFC to reducethe probability of inadvertently pairing a device with other nearbynetworks by ensuring that the short-range physical layer link distanceis much more localized than the anticipated distance between othernetworks. These systems often require the device-to-be-paired to bebrought very close to a specific node or location in order to initiatethe pairing process. Many configurations require that the devices ‘bump’or ‘kiss’ each other as the short-range link distance is less than a fewcentimeters or even a few millimeters. While these solutions simplifythe process, they require a specific action on the user's part tocomplete the pairing routine.

In contrast, an NFMI equipped system, such as a mobile computing devicewith an SRC device, can be used to communicate sufficient informationwithin a defined proximity boundary to carry out the pairing processwithout the user being required to ‘bump’ devices. For example, avehicle intercom system only requires that a user enters the vehicle oris located within a close proximity to the vehicle. The NFMI equippedsystem can detect the presence of the device to be paired and can carryout the pairing process without any action on the part of the user. TheNFMI range (i.e. the proximity boundary), typically a few meters indiameter, can be designed to be long enough to allow the pairing processto occur passively (without a specific action by a user) but islocalized enough to prevent the device from pairing with anotherintercom system in the area. Once the device is paired, the user is freeto move away from the predetermined proximity location and is able tocommunicate via a ‘long-range’ wireless protocol, as previouslydiscussed.

In one example, the power roll-off for an NFMI signal is proportional toone over the distance to the sixth (1/(dist⁶)), meaning that every timethe distance is doubled, the power is one sixty-fourth ( 1/64) asstrong. Accordingly, the power of an NFMI signal quickly falls below adetectable level. Without the use of very specialized equipment, an NFMIsignal that is intended to be received at a selected distance, such asthree feet, typically cannot be detected at a significantly greaterdistance. For example, at 4 times the expected distance, such as 12feet, the signal is ¼⁶ ( 1/4096) times as strong. This can place thesignal power below the noise floor. Thus, data transmitted using NFMIhas a low probability of detection at a distance significantly outsideof the proximity boundary. The SRC device can be designed to minimizedetection of an NFMI signal outside of the proximity boundary.

FIG. 3 illustrates an exemplary method 300 for proximity basedcommunications. The method can include the operation of defining aproximity boundary with dimensions defined, in part, by a communicationrange of one of a first Short Range Communication (SRC) device and asecond SRC device, wherein the first SRC device and the second SRCdevice are configured to communicate using near field magnetic induction(NFMI), as in block 310. The method can include the operation ofcommunicating a proximity signal in the proximity boundary between thefirst SRC device and the second SRC device using NFMI, wherein at leastone of the first and second SRC devices includes at least two antennasto provide magnetic induction diversity, as in block 320. The method caninclude the operation of providing a security permission to enableselected data to be communicated from one or more of the first SRCdevice or the second SRC device in the proximity boundary when theproximity signal is detected between the first SRC device and the secondSRC device, wherein the selected data is communicated from one or moreof the first SRC device or the second SRC device using a radio frequency(RF) communication standard, as in block 330.

In one example, the method can include the operation of communicatingthe selected data in the proximity boundary using a first multi-RadioAccess Technology (MRAT) transceiver associated with the first SRCdevice and a second MRAT transceiver associated with the second SRCdevice. In one example, the method can include the operation ofcommunicating the selected data in the proximity boundary using the RFcommunication standard to achieve increased data rates with respect totypical data rates achieved using NFMI. In one example, the RFcommunication standard is Bluetooth.

In one example, the RF communication standard is Institute of Electronicand Electrical Engineers (IEEE) 802.11-2012, 802.11ac-2013, 802.11ad,802.11ax, IEEE 802.15, IEEE 802.16, or Third Generation PartnershipProject (3GPP) Long Term Evolution (LTE) Release 8, 9, 10, 11, 12 or 13.In one example, the method can include the operation of communicatingthe proximity signal in the proximity boundary as an NFMI signal using afirst NFMI transceiver associated with the first SRC device and a secondNFMI transceiver associated with the second SRC device. In one example,the proximity signal includes information to indicate the securitypermission for one or more of the first SRC device and the second SRCdevice to communicate the selected data.

In one example, the security permission is provided for one or more ofthe first SRC device and the second SRC device to communicate theselected data using the RF communication standard for: a selected timeperiod; or at a selected time period. In one example, the securitypermission further enables the selected data to be communicated: fromone or more of the first SRC device or the second SRC device in theproximity boundary to another computing device in the proximityboundary; from the first SRC device in the proximity boundary to thesecond SRC device in the proximity boundary; or from the second SRCdevice in the proximity boundary to the first SRC device in theproximity boundary.

In one example, the method can include the operation of providing thesecurity permission in an encrypted format. In one example, the methodcan include the operation of providing the security permission in anunencrypted format when the proximity signal is communicatedsubstantially only in the proximity boundary. In one example, the methodcan include the operation of defining a size of the proximity boundarybased on at least one of: a transmit power of the first SRC device orthe second SRC device, a receive sensitivity of the first SRC device orthe second SRC device, or an antenna alignment of the first SRC deviceor the second SRC device.

In one example, the method can include the operation of revoking apermission in order to terminate a communication of the selected datausing the RF communication standard when at least one of the first SRCdevice or the second SRC device exits the proximity boundary. In oneexample, the first SRC device and the second SRC device are coupled tomobile computing devices.

FIG. 4 illustrates an exemplary proximity based communications system400. The proximity based communications system 400 can include aproximity Short Range Communication (PSRC) device 412 including a firstnear field magnetic induction (NFMI) transceiver 414. The PSRC device412 can be in a substantially fixed position and coupled to a firstcomputing device 410. The proximity based communications system 400 caninclude a SRC device 422 including a second NFMI transceiver 424. TheSRC device 422 can be coupled to a second computing device 420. At leastone of the PSRC device 412 and the SRC device 422 includes at least twoantennas to provide magnetic induction diversity, wherein a proximityboundary 430 with dimensions is defined, in part, by a communicationrange of one or more of the PSRC device 412 or the SRC device 422. Aproximity signal module 416, coupled to the PSRC device 412, can beconfigured to communicate a proximity signal to the SRC device 422within the proximity boundary 430 using NFMI to indicate that the PSRCdevice 412 and the SRC device 422 are located within the proximityboundary 430. A security permission module 418, coupled to the PSRCdevice 412, can be operable to provide a security permission to the SRCdevice 422 when the proximity signal is detected between the PSRC device412 and the SRC device 422. The security permission can enable the SRCdevice 422 to communicate selected data from within the proximityboundary 430 using a radio frequency (RF) communication standard.

In one example, the selected data is communicated from within theproximity boundary 430 using at least one of: a first multi-Radio AccessTechnology (MRAT) transceiver associated with the PSRC device 412 or asecond MRAT transceiver associated with the SRC device 422. In oneexample, the selected data is communicated from within the proximityboundary 430 using the RF communication standard to achieve increaseddata rates with respect to typical data rates achieved using NFMI. Inone example, the RF communication standard is Bluetooth, Institute ofElectronic and Electrical Engineers (IEEE) 802.11-2012, 802.11ac-2013,802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, or Third GenerationPartnership Project (3GPP) Long Term Evolution (LTE) Release 8, 9, 10,11, 12 or 13.

In one example, at least one of the PSRC device 412 or the SRC device422 is configured to communicate pairing information to allow at leastone of the first computing device 410 or the second computing device 420to pair with another computing device using one of: NFMI, Bluetooth orthe RF communication standard. In one example, the proximity signalmodule 416 is configured to broadcast the proximity signal for detectionat the SRC device 422, wherein the proximity signal is broadcasted usingthe first NFMI transceiver associated with the PSRC device 412 and theproximity signal is detected using the second NFMI transceiverassociated with the SRC device 422.

In one example, the security permission module is configured to: providethe security permission in an encrypted format; or provide the securitypermission in an unencrypted format since the proximity signal iscommunicated substantially only in the proximity boundary 430. In oneexample, a permission is revoked in order to terminate a communicationof the selected data using the RF communication standard when at leastone of the PSRC device 412 or the SRC device 422 exits the proximityboundary 430.

FIG. 5 illustrates an exemplary method 500 for proximity basedcommunications. The method can include the operation of defining aproximity boundary with dimensions defined, in part, by a communicationrange of one of a proximity Short Range Communication (PSRC) device anda SRC device, wherein the PSRC device and the SRC device are configuredto communicate using near field magnetic induction (NFMI), wherein atleast one of the PSRC device and the SRC device include at least twoantennas to provide magnetic induction diversity, as in block 510. Themethod can include the operation of broadcasting a proximity signal fromthe PSRC device to the SRC device using NFMI to indicate that the PSRCdevice and the SRC device are located within the proximity boundary,wherein the proximity signal includes a security permission for the SRCdevice to communicate selected data form within the proximity boundaryusing a radio frequency (RF) communication standard, as in block 520.

In one example, the method can include the operation of defining a sizeof the proximity boundary based on at least one of: a transmit power ofthe PSRC device or the SRC device, a receive sensitivity of the PSRCdevice or the SRC device, or an antenna alignment of the PSRC device orthe SRC device. In one example, the selected data is communicated fromwithin the proximity boundary using at least one of: a first multi-RadioAccess Technology (MRAT) transceiver associated with the PSRC device ora second MRAT transceiver associated with the SRC device.

In one example, the selected data is communicated from within theproximity boundary using the RF communication standard to achieveincreased data rates with respect to typical data rates achieved usingNFMI. In one example, the RF communication standard is Bluetooth,Institute of Electronic and Electrical Engineers (IEEE) 802.11-2012,802.11ac-2013, 802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, or ThirdGeneration Partnership Project (3GPP) Long Term Evolution (LTE) Release8, 9, 10, 11, 12 or 13.

It should be understood that many of the functional units described inthis specification have been labeled as modules, in order to moreparticularly emphasize their implementation independence. For example, amodule may be implemented as a hardware circuit comprising customVery-Large-Scale Integration (VLSI) circuits or gate arrays, a customApplication-Specific Integrated Circuit (ASIC), off-the-shelfsemiconductors such as logic chips, transistors, or other discretecomponents. A module may also be implemented in programmable hardwaredevices such as field programmable gate arrays, programmable arraylogic, programmable logic devices or the like.

Modules may also be implemented in software for execution by varioustypes of processors. An identified module of executable code may, forinstance, comprise one or more physical or logical blocks of computerinstructions, which may, for instance, be organized as an object,procedure, or function. Nevertheless, the executables of an identifiedmodule need not be physically located together, but may comprisedisparate instructions stored in different locations which, when joinedlogically together, comprise the module and achieve the stated purposefor the module.

Indeed, a module of executable code may be a single instruction, or manyinstructions, and may even be distributed over several different codesegments, among different programs, and across several memory devices.Similarly, operational data may be identified and illustrated hereinwithin modules, and may be embodied in any suitable form and organizedwithin any suitable type of data structure. The operational data may becollected as a single data set, or may be distributed over differentlocations including over different storage devices, and may exist, atleast partially, merely as electronic signals on a system or network.The modules may be passive or active, including agents operable toperform desired functions.

Reference throughout this specification to “one embodiment” or “anembodiment” means that a particular feature, structure, orcharacteristic described in connection with the embodiment is includedin at least one embodiment of the present invention. Thus, appearancesof the phrases “in one embodiment” or “in an embodiment” in variousplaces throughout this specification are not necessarily all referringto the same embodiment.

As used herein, a plurality of items, structural elements, compositionalelements, and/or materials may be presented in a common list forconvenience. However, these lists should be construed as though eachmember of the list is individually identified as a separate and uniquemember. Thus, no individual member of such list should be construed as ade facto equivalent of any other member of the same list solely based ontheir presentation in a common group without indications to thecontrary. In addition, various embodiments and example of the presentinvention may be referred to herein along with alternatives for thevarious components thereof. It is understood that such embodiments,examples, and alternatives are not to be construed as defactoequivalents of one another, but are to be considered as separate andautonomous representations of the present invention.

Furthermore, the described features, structures, or characteristics maybe combined in any suitable manner in one or more embodiments. In thefollowing description, numerous specific details are provided, such asexamples of materials, fasteners, sizes, lengths, widths, shapes, etc.,to provide a thorough understanding of embodiments of the invention. Oneskilled in the relevant art will recognize, however, that the inventioncan be practiced without one or more of the specific details, or withother methods, components, materials, etc. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring aspects of the invention.

While the forgoing examples are illustrative of the principles of thepresent invention in one or more particular applications, it will beapparent to those of ordinary skill in the art that numerousmodifications in form, usage and details of implementation can be madewithout the exercise of inventive faculty, and without departing fromthe principles and concepts of the invention. Accordingly, it is notintended that the invention be limited, except as by the claims setforth below.

What is claimed is:
 1. A method for proximity based communications,comprising: defining a proximity boundary with dimensions defined, inpart, by a communication range of one of a first Short RangeCommunication (SRC) device and a second SRC device, wherein the firstSRC device and the second SRC device are configured to communicate usingnear field magnetic induction (NFMI); communicating a proximity signalin the proximity boundary between the first SRC device and the secondSRC device using NFMI, wherein at least one of the first and second SRCdevices includes at least two antennas to provide magnetic inductiondiversity; and providing a security permission to enable selected datato be communicated from one or more of the first SRC device or thesecond SRC device in the proximity boundary when the proximity signal isdetected between the first SRC device and the second SRC device, whereinthe selected data is communicated from one or more of the first SRCdevice or the second SRC device using a radio frequency (RF)communication standard.
 2. The method of claim 1, further comprisingcommunicating the selected data in the proximity boundary using a firstmulti-Radio Access Technology (MRAT) transceiver associated with thefirst SRC device and a second MRAT transceiver associated with thesecond SRC device.
 3. The method of claim 1, further comprisingcommunicating the selected data in the proximity boundary using the RFcommunication standard to achieve increased data rates with respect totypical data rates achieved using NFMI.
 4. The method of claim 1,wherein the RF communication standard is Bluetooth.
 5. The method ofclaim 1, wherein the RF communication standard is Institute ofElectronic and Electrical Engineers (IEEE) 802.11-2012, 802.11ac-2013,802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, or Third GenerationPartnership Project (3GPP) Long Term Evolution (LTE) Release 8, 9, 10,11, 12 or
 13. 6. The method of claim 1, further comprising communicatingthe proximity signal in the proximity boundary as an NFMI signal using afirst NFMI transceiver associated with the first SRC device and a secondNFMI transceiver associated with the second SRC device.
 7. The method ofclaim 1, wherein the proximity signal includes information to indicatethe security permission for one or more of the first SRC device and thesecond SRC device to communicate the selected data.
 8. The method ofclaim 1, wherein the security permission is provided for one or more ofthe first SRC device and the second SRC device to communicate theselected data using the RF communication standard for: a selected timeperiod; or at a selected time period.
 9. The method of claim 1, whereinthe security permission further enables the selected data to becommunicated: from one or more of the first SRC device or the second SRCdevice in the proximity boundary to another computing device in theproximity boundary; from the first SRC device in the proximity boundaryto the second SRC device in the proximity boundary; or from the secondSRC device in the proximity boundary to the first SRC device in theproximity boundary.
 10. The method of claim 1, further comprisingproviding the security permission in an encrypted format.
 11. The methodof claim 1, further comprising providing the security permission in anunencrypted format when the proximity signal is communicatedsubstantially only in the proximity boundary.
 12. The method of claim 1,further comprising defining a size of the proximity boundary based on atleast one of: a transmit power of the first SRC device or the second SRCdevice, a receive sensitivity of the first SRC device or the second SRCdevice, or an antenna alignment of the first SRC device or the secondSRC device.
 13. The method of claim 1, further comprising revoking apermission in order to terminate a communication of the selected datausing the RF communication standard when at least one of the first SRCdevice or the second SRC device exits the proximity boundary.
 14. Themethod of claim 1, wherein the first SRC device and the second SRCdevice are coupled to mobile computing devices.
 15. A proximity basedcommunications system, comprising: a proximity Short Range Communication(PSRC) device including a first near field magnetic induction (NFMI)transceiver, the PSRC device in a substantially fixed position andcoupled to a first computing device; a SRC device including a secondNFMI transceiver, the SRC device coupled to a second computing device,wherein at least one of the PSRC device and the SRC device includes atleast two antennas to provide magnetic induction diversity, wherein aproximity boundary with dimensions is defined, in part, by acommunication range of one or more of the PSRC device or the SRC device;a proximity signal module, coupled to the PSRC device, configured tocommunicate a proximity signal to the SRC device within the proximityboundary using NFMI to indicate that the PSRC device and the SRC deviceare located within the proximity boundary; and a security permissionmodule, coupled to the PSRC device, operable to provide a securitypermission to the SRC device when the proximity signal is detectedbetween the PSRC device and the SRC device, the security permissionenabling the SRC device to communicate selected data from within theproximity boundary using a radio frequency (RF) communication standard.16. The proximity based communications system of claim 15, wherein theselected data is communicated from within the proximity boundary usingat least one of: a first multi-Radio Access Technology (MRAT)transceiver associated with the PSRC device or a second MRAT transceiverassociated with the SRC device.
 17. The proximity based communicationssystem of claim 15, wherein the selected data is communicated fromwithin the proximity boundary using the RF communication standard toachieve increased data rates with respect to typical data rates achievedusing NFMI.
 18. The proximity based communications system of claim 15,wherein the RF communication standard is Bluetooth, Institute ofElectronic and Electrical Engineers (IEEE) 802.11-2012, 802.11ac-2013,802.11ad, 802.11ax, IEEE 802.15, IEEE 802.16, or Third GenerationPartnership Project (3GPP) Long Term Evolution (LTE) Release 8, 9, 10,11, 12 or
 13. 19. The proximity based communications system of claim 15,wherein at least one of the PSRC device or the SRC device is configuredto communicate pairing information to allow at least one of the firstcomputing device or the second computing device to pair with anothercomputing device using one of: NFMI, Bluetooth or the RF communicationstandard.
 20. The proximity based communications system of claim 15,wherein the proximity signal module is configured to broadcast theproximity signal for detection at the SRC device, wherein the proximitysignal is broadcasted using the first NFMI transceiver associated withthe PSRC device and the proximity signal is detected using the secondNFMI transceiver associated with the SRC device.