Tactile binary coded communication

ABSTRACT

A mobile device, computer program recording medium and method support surreptitious communication with a user via a mobile device via binary tactile inputs and outputs. A communication module of the mobile devices receives a first alphanumeric message that is converted to a first binary coded message that is rendered as first and second vibration outputs that are humanly distinguishable. A touch input component of one of a touch screen and a motion sensor detects a sequential pattern of user touches. Distinguished first and second tactile inputs in the sequential pattern identify a second binary coded message that is converted into a second alphanumeric message. First and second alphanumeric messages are comprised of a combination of characters selected from one or more of: (i) letters; (ii) numerals; and (iii) symbols.

BACKGROUND

The present application relates to systems and methods forsurreptitiously haptic communicating with a user of a mobile device.

Users have access to wide arrange of services and resources via userdevices such as laptops, desktop workstations, smartphones, smartwatches, etc. With this increased reliance and ubiquitous nature of userdevices, vulnerabilities have also increased. Many techniques are usedto intercept user online identities to commit malicious activities suchas fraud and espionage. To safeguard important online resources,businesses have added additional features for fraud detection and userauthentication. Users are often asked to input identifying informationfor authentication.

However, such safeguards are compromised by the increasing mobility andnumber of mobile devices. Mobile devices are frequently in proximity tothird parties and devices that capture audio and images. Sensitiveinformation needs additional safeguards to preclude being intercepted bythird parties. Safeguarding sensitive information is made morechallenging when interacting with users who have visual limitations.Increasing the font size of a display or verbalizing the informationmakes interception easier.

BRIEF DESCRIPTION

This brief description is provided to introduce a selection of conceptsin a simplified form that are described below in the detaileddescription. This brief description is not intended to be an extensiveoverview of the claimed subject matter, identify key factors oressential features of the claimed subject matter, nor is it intended tobe used to limit the scope of the claimed subject matter.

The present disclosure contemplates that a binary coded tactilecommunication can be facilitated through a mobile device in one or bothof: (i) communication to a user; and (ii) communication from the user.Unlike customized gestures, binary code lends itself to standardizeteaching. The simplified interaction with the mobile device, such asreceiving a vibrated binary code message or sending a tap-based binarycode message, enables users to securely and conveniently communicate. Atactile binary code, such as Morse code, is readily translatable withalphanumeric text. Unlike spoken communication and interacting with agraphical interface, inputting or outputting a tactile communication canbe done in a surreptitious manner, avoiding interception by bad actors.Conversion of the tactile binary code into an alphanumeric message canalso be done within an encrypted component of the mobile device,avoiding key logging malware that monitors text inputs via hard or softkeys.

In one aspect of the present disclosure, a method is provided ofsurreptitious communication to a user via a mobile device. In one ormore embodiments, the method includes receiving, by a mobile device, afirst alphanumeric message comprised of a combination of charactersselected from one or more of: (i) letters; (ii) numerals; and (iii)symbols. The method includes converting the first alphanumeric messageto a first binary coded message. The method includes rendering the firstbinary coded message via a vibration-inducing component of the mobiledevice as a sequence of first and second vibration outputs correspondingto the binary coded message. The first vibration output is humanlydistinguishable from the second vibration output.

In one aspect of the present disclosure, a method is provided ofsurreptitious communication from a user via a mobile device. In one ormore embodiments, the method includes monitoring a selected one of: (i)a motion sensor; and (ii) a touchscreen of a mobile device for asequential pattern of user touches. The method includes distinguishingfirst and second tactile inputs from the sequential pattern of usertouches to identify a binary coded message contained in the sequentialpattern. The method includes converting the binary coded message to analphanumeric message comprised of a combination of characters selectedfrom one or more of: (i) letters; (ii) numerals; and (iii) symbols.

In one aspect of the present disclosure, a mobile device is providedthat enables surreptitious communication with a user. In one or moreembodiments, the mobile device includes a controller in communicationwith a vibration-inducing component and a communication module. Thecontroller executes a binary tactile communication utility that causesthe mobile device to receive, via the communication module, a firstalphanumeric message comprised of a combination of characters selectedfrom one or more of: (i) letters; (ii) numerals; and (iii) symbols. Thecontroller executes the binary tactile communication utility to convertthe alphanumeric message to a first binary coded message. The controllerexecutes the binary tactile communication utility to render the binarycoded message via the vibration-inducing component as a sequence offirst and second vibration outputs corresponding to the first binarycoded message. The first vibration output is humanly distinguishablefrom the second vibration output.

In one aspect of the present disclosure, a computer-readable storagemedium comprises computer-executable instructions, which when executedvia a processing unit on a computer performs acts. The acts includesreceiving a first alphanumeric message comprised of a combination ofcharacters selected from one or more of: (i) letters; (ii) numerals; and(iii) symbols. The acts include converting the alphanumeric message to afirst binary coded message. The acts include rendering the first binarycoded message via the vibration-inducing component as a sequence offirst and second vibration outputs corresponding to the binary codedmessage. The first vibration output is humanly distinguishable from thesecond vibration output.

The following description and annexed drawings set forth certainillustrative aspects and implementations. These are indicative of but afew of the various ways in which one or more aspects may be employed.Other aspects, advantages, or novel features of the disclosure willbecome apparent from the following detailed description when consideredin conjunction with the annexed drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Aspects of the disclosure are understood from the following detaileddescription when read with the accompanying drawings. Elements,structures, etc. of the drawings may not necessarily be drawn to scale.Accordingly, the dimensions of the same may be arbitrarily increased orreduced for clarity of discussion, for example.

FIG. 1 illustrates a block diagram of a system for surreptitious tactilebinary communication via a mobile device, according to one or moreembodiments;

FIG. 2 illustrates a front view of a mobile device that is performingtwo-way surreptitious tactile binary communication, according to one ormore embodiments;

FIG. 3 illustrates a block diagram of a computing device that performstactile authentication of a user via a mobile device, according to oneor more embodiments;

FIG. 4 illustrates a flow diagram of a method of communicating a binarycoded message to a user by vibrating a mobile device, according to oneor more embodiments;

FIG. 5 illustrates a flow diagram of a method of receiving a binarycoded message as a pattern of user touches of a mobile device, accordingto one or more embodiments;

FIG. 6 illustrates a block diagram of a system having a computing devicethat performs two-way binary coded communication with a userrespectively by vibrations and discrete touches, according to one ormore embodiments; and

FIG. 7 illustrates a block diagram of example computer-readable mediumor computer-readable device including processor-executable instructionsconfigured to embody one or more of the provisions set forth herein,according to one or more embodiments.

DETAILED DESCRIPTION

In one or more embodiments, the present disclosure provides a mobiledevice, computer program recording medium and method of surreptitiouscommunication with a user via a mobile device using binary tactileinputs and/or outputs. A communication module of the mobile devicesreceives a first alphanumeric message. The mobile device converts thefirst alphanumeric message to a first binary coded message that isrendered as first and second vibration outputs that are humanlydistinguishable. A touch input component of one of a touch screen and amotion sensor detects a sequential pattern of user touches as aresponse. Mobile device distinguishes first and second tactile inputs inthe sequential pattern to identify a second binary coded message. Mobiledevice converts the second binary coded message into a secondalphanumeric message. First and second alphanumeric messages arecomprised of a combination of characters selected from one or more of:(i) letters; (ii) numerals; and (iii) symbols. In one or moreembodiments, the first and second binary coded messages are based onMorse code.

Embodiments or examples, illustrated in the drawings are disclosed belowusing specific language. It will nevertheless be understood that theembodiments or examples are not intended to be limiting. Any alterationsand modifications in the disclosed embodiments, and any furtherapplications of the principles disclosed in this document arecontemplated as would normally occur to one of ordinary skill in thepertinent art.

The following terms are used throughout the disclosure, the definitionsof which are provided herein to assist in understanding one or moreaspects of the disclosure.

As used herein, the term “infer” or “inference” generally refer to theprocess of reasoning about or inferring states of a system, a component,an environment, a user from one or more observations captured via eventsor data, etc. Inference may be employed to identify a context or anaction or may be employed to generate a probability distribution overstates, for example. An inference may be probabilistic. For example,computation of a probability distribution over states of interest basedon a consideration of data or events. Inference may also refer totechniques employed for composing higher-level events from a set ofevents or data. Such inference may result in the construction of newevents or new actions from a set of observed events or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources.

Turning to the Drawings, FIG. 1 illustrates a system 100 having thatenables surreptitious communication between a remote entity 102 and auser 104 via a mobile device 106. Remote entity 102 has an authenticator108 that utilizes user data 110 to generate and transmit firstalphanumeric message 112 to mobile device 106. Remote entity 106 awaitssecond alphanumeric message 114 from mobile device 106 that isresponsive to first alphanumeric message 112.

Mobile device 106 includes communication module 116 that receives andtransmits respectively first and second alphanumeric messages 112, 114that are comprised of a combination of characters selected from one ormore of: (i) letters; (ii) numerals; and (iii) symbols. Controller 118of mobile device 106 has a binary tactile communication utility 120 thatprocesses first alphanumeric message 112 and generates secondalphanumeric message 114. In particular, a text-to-binary converter 122of binary tactile communication utility 120 converts first alphanumericmessage 112 to first binary coded message 124. Vibration driver 126 ofbinary tactile communication utility 120 modulates a vibration drivesignal with first binary coded message 124. vibration-inducing component128 such as a vibrator motor with first binary coded message 124.Vibration-inducing component 128 renders the first binary coded messageas a sequence of first and second vibration outputs 130 corresponding tothe first binary coded message 124. First vibration output is humanlydistinguishable from the second vibration output, such as by duration.

User 104 manually taps, shakes or squeezes touch input component 132 ofmobile device 106 with sequential pattern of user touches 134. Inparticular, touch input component 132 can be a selected one of: (i) amotion sensor 136; and (ii) touchscreen 138 for receiving sequentialpattern of user touches 134 in response to the rendered sequence offirst and second vibration outputs 130. Touchscreen can be repurposedmanual controls of mobile device 106. Touch pattern recognition engine140 of binary tactile communication utility 120 distinguishes any firstand second tactile inputs from the sequential pattern of user touches134 to identify a second binary coded message 142 contained in thesequential pattern of user touches 134. In one or more embodiments,controller 118 distinguishes first and second tactile inputs from thesequential pattern of user touches 134 based on a selected one of: (i) anumber of taps; (ii) an interval of time between user touches; and (iii)a magnitude of impact of each user touch to identify second binary codedmessage 114 contained in sequential pattern of user touches 134.Text-to-binary code converter 122 converts second binary coded message142 to second alphanumeric message 114 comprised of a combination ofcharacters selected from one or more of: (i) letters; (ii) numerals; and(iii) symbols for transmitting by communication module 116.

FIG. 2 illustrates a front view of mobile device 200 that is performingtwo-way surreptitious tactile binary communication for user 202,according to one or more embodiments. Mobile device 200 includes agraphical touchscreen 204 that presents authentication view 206 on userinterface 208. In selected modes, visually-presented authentication orpass code 210 is rendered on graphical touchscreen 204. Mobile device200 can require primary or secondary vibrational output type ofcommunication. For example, mobile device 200 can be one of: (i) withina pocket of a user garment; (ii) configured for a visually-challengeduser; and (iii) in a mode of operation to avoid cameras or third partiesfrom intercepting the authentication code 210. Pass code 210 “0453” isoutput as a binary coded vibrational output 212 using Morse code as“▬▬▬▬▬ ●●●●▬●●●●● ●●●▬▬”. For clarity, user 202 inputs the same Morsecode pass code as a double tap code 214: “●● ●● ●● ●● ●● ●●●●●● ●●●●●●●● ●● ●●”. User 202 can also modulate a depth of pressing ontouchscreen 204 between hard and soft touches 216, 218 instead of usingsingle and double taps. In one or more embodiments, user can swipe right220 to confirm recognized Morse code 222 on touchscreen 204 or sweepleft 224 to clear incorrectly recognized Morse code 222.

In one or more embodiments, a binary code for user inputs is based onMorse code, adapted to sensing capabilities of a mobile device orabilities of a user. User input does not require traditional interactionwith a user interface. For example, the mobile device can be tappedwhile in a pocket or a touchscreen can be tapped without seeing anythingdisplayed on the touch screen. For another example, user input can bemade by shaking or impacting the case of a mobile device that is sensedby a motion sensor. Depending on the capabilities of the mobile deviceand the user, a distinction between binary states can be made based ondifference in number of user inputs such as single and double taps,either sensed by a touch screen or a motion sensor.

TABLE 1 provides examples of binary codes that are based on Morse code.For example, a single-double tap code replaces the long symbols with adouble tap. For another example, soft and hard taps are detected forshort and long symbols. For an additional example, single taps are usedfor both short and long with a duration of time following the tapindicating whether short or long. An end tap or a screen swipe “S” canbe added so that the duration of the last symbol is indicated before anew character is input.

Character Morse Code Single-Double Tap Hard-Soft Pause Code A • — • •• •

• • S B — • • • •• • • •

 • • • • ••S C — • — • •• • •• •

 •

 • • •• S D — • • •• • •

 • • • ••S E • • • •S F • • — • • • •• • • •

 • ••• •S G — — • •• •• •

 

 • • • •S H • • • • • • • • • • • • ••••S I • • • • • • ••S J • — — — ••• •• •• •

 

 

•• • • S K — • — •• • ••

•

• •• S L • — • • • •• • • •

 • • • •• S M — — •• ••

 

•• ••S N — • •• •

 • • •S O — — — •• •• ••

 

 

• • • S P • — — • • •• •• • •

 

 • •• • •S Q — — • — •• •• • ••

 •

• • •• S R • — • • •• • •

 • •• •S S • • • • • • • • • •••S T — ••

• S U • • — • • •• • •

••• S V • • • — • • • •• • • •

•••• S W • — — • •• •• •

 

•• • S X — • • — •• • • ••

 • •

• ••• S Y — • — — •• • •• ••

 •

 

• •• • S Z — — • • •• •• • •

 

 • • • • ••S 1 • — — — — • •• •• •• •• •

 

 

 

•• • • • S 2 • • — —— • • •• •• •• • •

 

 

••• • • S 3 • • • — — • • • •• •• • • •

 

•••• • S 4 • • • • — • • • • •• • • • •

••••• S 5 • • • • • • • • • • • • • • • •••••S 6 — • • • • •• • • • •

 • • • • • ••••S 7 — — • • • •• •• • • •

 

 • • • • • •••S 8 — — — • • •• •• •• • •

 

 

 • • • • • ••S 9 — — — — • •• •• •• •• •

 

 

 

 • • • • • •• S 0 — — — — — •• •• •• •• ••

 

 

 

 

• • • • • • S . • — • — • — • •• • •• • •• •

 •

 •

•• •• •• • S , — — • • — — •• •• • • •• ••

 

 • •

 

• • ••• •• S : — — — • • •• •• •• • •

 

 

 • • • • • • ••S ? • • — — • • • • •• •• • • • •

 

 • • ••• • •••S

FIG. 3 illustrates a block diagram of a communication system 300 thatperforms tactile authentication with a user 302 via a mobile device 304.User 302 is within interception proximity with audio visual interceptors306, such as third party person 308, microphone 310 and camera 312. User302 is communicating with a remote entity 314 that has data repository316 accessed by authentication engine 318 to query or answer user 302.In an illustrative scenario, user 302 invokes a voice-activatedapplication on mobile device 304 by verbalizing a command 320: “My bank. . . account balance . . . discreet.” The command 320 is relayed via anaccess node 322 over network 324 to remote entity 314. Remote entity 314causes mobile device 304 to respond with a vibration output 326: “●▬▬●●▬ ●●● ●●● ▬●▬● ▬▬▬ ▬●● ● ●●▬▬●●”, which translated to “Passcode?”. User302 taps on his pocketed mobile device 304 to respond with double tapcode 328: “οο οο οο οο οο ο ο ο ο οο ο ο ο ο ο ο ο ο οο οο”, whichtranslates to “0453”. Remote entity 314 causes mobile device 304 todiscreetly provide user's sensitive information 330: “●▬▬▬▬ ●●●●● ▬▬●●●574 ●●●● ▬▬▬▬▬” that translates to “1575.50”.

FIG. 4 illustrates a flow diagram of a method 400 of communicatingbinary coded messages to a user by vibrating a mobile device. Method 400enables surreptitious communication with a user via a mobile device.Binary vibrational output of the mobile device is difficult for thirdparties to notice or intercept. Method 400 begins receiving, by a mobiledevice, a first alphanumeric message comprised of a combination ofcharacters selected from one or more of: (i) letters; (ii) numerals; and(iii) symbols (block 402). Method 400 includes converting the firstalphanumeric message to a first binary coded message such as based onMorse code (block 404). Method 400 includes rendering the first binarycoded message via a vibration-inducing component of the mobile device asa sequence of first and second vibration outputs corresponding to thebinary coded message (block 406). The first vibration output is humanlydistinguishable from the second vibration output. In one or moreembodiments, the first vibration output the first and second vibrationoutputs are of a different duration. In one or more embodiments, avibration motor is capable of vibrating at a different speed orintensity. Then method 400 ends.

FIG. 5 illustrates a flow diagram of a method of 500 receiving a binarycoded message as a pattern of user touches of a mobile device. In anillustrative embodiment, a remote entity interacts with the user of themobile device as part of multi-factor authentication. Method 500 beginspresenting a user prompt on a selected one or more of: (i) a visualdisplay; (ii) an audio output transducer; and (iii) avibration-producing component of the mobile device (block 502). Method500 includes monitoring a selected one of: (i) a motion sensor; and (ii)a touchscreen of a mobile device for a sequential pattern of usertouches (block 504). A determination is made as to whether a sequentialpattern of user touches is detected by the selected one of the motionsensor and the touchscreen (decision block 506). In response todetermining that a sequential pattern of user touches is not detected,method 500 returns to block 504 to continue monitoring. In response todetermining that a sequential pattern of user touches is detected,method 500 includes distinguishing first and second tactile inputs fromthe sequential pattern of user touches to identify a binary codedmessage contained in the sequential pattern (block 508). Method 500includes converting the binary coded message to an alphanumeric messagecomprised of a combination of characters selected from one or more of:(i) letters; (ii) numerals; and (iii) symbols (block 510). Thealphanumeric message is transmitted to the remote entity (block 512).Then method 500 ends.

In one or more embodiments, the binary coded message can be based onMorse code. In addition, distinguishing the first and second tactileinputs from the sequential pattern of user touches can be based on aselected one of: (i) a number of taps; (ii) an interval of time betweenuser touches; and (iii) a magnitude of impact of each user touch toidentify a second binary coded message contained in the sequentialpattern.

Generally, embodiments are described in the general context of “computerreadable instructions” being executed by one or more computing devices.Computer readable instructions may be distributed via computer readablemedia as will be discussed below. Computer readable instructions may beimplemented as program modules, such as functions, objects, ApplicationProgramming Interfaces (APIs), data structures, and the like, thatperform one or more tasks or implement one or more abstract data types.Typically, the functionality of the computer readable instructions arecombined or distributed as desired in various environments.

FIG. 6 illustrates a system 600 including a computing device 602configured to implement one or more embodiments provided herein. In oneconfiguration, computing device 602 includes at least one processingunit 604 and memory 606. Depending on the exact configuration and typeof computing device, memory 606 may be volatile, such as random accessmemory (RAM), non-volatile, such as random operating memory (ROM), flashmemory, etc., or a combination of the two. In other embodiments,computing device 602 includes additional features or functionality. Forexample, device 602 may include additional storage such as removablestorage or non-removable storage, including, but not limited to,magnetic storage, optical storage, etc. Such additional storage isillustrated in FIG. 6 by storage 608. In one or more embodiments,computer readable instructions to implement one or more embodimentsprovided herein are in storage 608. Storage 608 may store other computerreadable instructions to implement an operating system, an applicationprogram, etc. Computer readable instructions may be loaded in memory 606for execution by processing unit 604, for example.

The term “computer readable media” as used herein includes computerstorage media. Computer storage media includes volatile and nonvolatile,removable and non-removable media implemented in any method ortechnology for storage of information such as computer readableinstructions or other data. Memory 606 and storage 608 are examples ofcomputer storage media. Computer storage media includes, but is notlimited to, RAM, ROM, EEPROM, flash memory or other memory technology,CD-ROM, Digital Versatile Disks (DVDs) or other optical storage,magnetic cassettes, magnetic tape, magnetic disk storage or othermagnetic storage devices, or any other medium which may be used to storethe desired information and which may be accessed by computing device602. Any such computer storage media is part of computing device 602.

Computing device 602 includes input device(s) 610 such as keyboard,mouse, pen, voice input device, touch input device, infrared cameras,video input devices, or any other input device. Output device(s) 612such as one or more displays, speakers, printers, or any other outputdevice may be included with computing device 602. Input device(s) 610and output device(s) 612 may be connected to computing device 602 via awired connection, wireless connection, or any combination thereof. Inone or more embodiments, an input device 610 or an output device 612from another computing device may be used as input device(s) 610 oroutput device(s) 612 for computing device 602. Computing device 602 mayinclude communication connection(s) 614 that includes network interface615 to facilitate communications via a network 616 with one or moreother computing devices 618 that communicate for authentication engine620. Certain functionalities can be performed by software applicationsresident in memory 606, such as binary tactile communication utility 622that includes text-to-binary converter 624, vibration driver 626, andtouch pattern recognition engine 628.

Referring now to an example specific component makeup and the associatedfunctionality of the presented components, computing device 602 canincorporate a wide range of functionality increasingly typical of mobiledevices. Processor unit 604 can be an integrated circuit (IC) thatconnects, via a plurality of bus interconnects 630, to a plurality offunctional components of computing device 602. Processor unit 604 caninclude one or more programmable microprocessors, such as data processor632 and digital signal processor (DSP) 634 of processor unit 604, whichmay both be integrated into a single processing device, in someembodiments. Processor unit 604 controls the communication, userinterface, and other functions and/or operations of computing device602. These functions and/or operations thus include, but are not limitedto including, application data processing and signal processing.Computing device 602 may use hardware component equivalents such asspecial purpose hardware, dedicated processors, general purposecomputers, microprocessor-based computers, micro-controllers, opticalcomputers, analog computers, dedicated processors and/or dedicated hardwired logic. Connected to processor unit 604 is memory 606, which caninclude volatile memory and/or non-volatile memory. Memory 606 storessoftware, such as operating system 636, as well as firmware 638. One ormore other executable applications 640 can be stored within memory 606for execution by processor unit 604. Memory 606 may be augmented byon-device data storage, such as storage drive 642. Also connected toprocessor unit 604 is removable storage device (RSD) input/output (I/O)interface 644 that receives a RSD 646 for additional storage.

According to the illustrative embodiment, computing device 602 supportswireless communication via a communication module 648. Communicationmodule 648 directs and power modulates a transmission beam at selectedfrequencies over an antenna array 650. For example, computing device 602may support communication protocols and transceiver radio frequenciesappropriate for a wireless local area network (WLAN), illustrated asnode 652. Computing device 602 can communicate over a personal accessnetwork (PAN) with devices such as a smart watch 654. Computing device602 can communicate with a radio access network (RAN) 656 that is partof a wireless wide area network (WWAN). In certain embodiments,computing device 602 may also support a hardwired local access network(LAN) (not shown) or peripheral devices 658 via an I/O controller 660.

Input devices 610 includes microphone(s) 662 that receive user audibleinputs. Motion sensor 664 can detect contextual motion of computingdevice 602 as well as intentional user inputs according to aspects ofthe present disclosure. Image capturing device, such as a camera 667,can receive gestures and other image data. Haptic control 668 canprovide an interface such as for braille reading or manual inputs. Othermanual or keys 670 can have dedicated or programmed capabilities.

Output devices 612 includes audio speaker(s) 672 that can augment orprovide alternate presentation of the visual or tactile outputs orprovide playback. Display 674 presents graphical or alphanumericinformation in a visual form. Vibration motor 676 provides alerts andmore detailed information according to aspects of the presentdisclosure. Computing device 602 can utilize touchscreen 680 and/ormotion sensor 664 as a touch input component 682 for aspects of thepresent disclosure.

User interface device 678 such as, or including, a touch screen 680,represents a component acting as both an input device 610 and an outputdevice 612. Computing device 602 can be wholly or substantiallyencompassed by an enclosure 684. In one or more embodiments, computingdevice 602 can be a distributed system of wireless or wired links or acomponent subsystem incorporated into a larger assembly or system.

Still another embodiment involves a computer-readable medium includingprocessor-executable instructions configured to implement one or moreembodiments of the techniques presented herein. An embodiment of acomputer-readable medium or a computer-readable device devised in theseways is illustrated in FIG. 7, wherein an implementation 700 includes acomputer-readable medium 708, such as a CD-R, DVD-R, flash drive, aplatter of a hard disk drive, etc., on which is encodedcomputer-readable data 706. This computer-readable data 706, such asbinary data including a plurality of zero's and one's as shown in 706,in turn includes a set of computer instructions 704 configured tooperate according to one or more of the principles set forth herein. Inone such embodiment 700, the processor-executable computer instructions704 may be configured to perform a method, such as method 400 of FIG. 4,or method 500 of FIG. 5. In another embodiment, the processor-executableinstructions 704 may be configured to implement a system, such as thesystem 100 or mobile device 106 of FIG. 1 or computing device 602 ofFIG. 6. Many such computer-readable media may be devised by those ofordinary skill in the art that are configured to operate in accordancewith the techniques presented herein.

One or more embodiments may employ various artificial intelligence (AI)based schemes for carrying out various aspects thereof. One or moreaspects may be facilitated via an automatic classifier system orprocess. A classifier is a function that maps an input attribute vector,x=(x1, x2, x3, x4, xn), to a confidence that the input belongs to aclass. In other words, f(x) =confidence (class). Such classification mayemploy a probabilistic or statistical-based analysis (e.g., factoringinto the analysis utilities and costs) to prognose or infer an actionthat a user desires to be automatically performed.

A support vector machine (SVM) is an example of a classifier that may beemployed. The SVM operates by finding a hypersurface in the space ofpossible inputs, which the hypersurface attempts to split the triggeringcriteria from the non-triggering events. Intuitively, this makes theclassification correct for testing data that may be similar, but notnecessarily identical to training data. Other directed and undirectedmodel classification approaches (e.g., naive Bayes, Bayesian networks,decision trees, neural networks, fuzzy logic models, and probabilisticclassification models) providing different patterns of independence maybe employed. Classification as used herein, may be inclusive ofstatistical regression utilized to develop models of priority.

One or more embodiments may employ classifiers that are explicitlytrained (e.g., via a generic training data) as well as classifiers whichare implicitly trained (e.g., via observing user behavior, receivingextrinsic information). For example, SVMs may be configured via alearning or training phase within a classifier constructor and featureselection module. Thus, a classifier may be used to automatically learnand perform a number of functions, including but not limited todetermining according to a predetermined criteria.

As used in this application, the terms “component”, “module,” “system”,“interface”, and the like are generally intended to refer to acomputer-related entity, either hardware, a combination of hardware andsoftware, software, or software in execution. For example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,or a computer. By way of illustration, both an application running on acontroller and the controller may be a component. One or more componentsresiding within a process or thread of execution and a component may belocalized on one computer or distributed between two or more computers.

Further, the claimed subject matter is implemented as a method,apparatus, or article of manufacture using standard programming orengineering techniques to produce software, firmware, hardware, or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. Of course, manymodifications may be made to this configuration without departing fromthe scope or spirit of the claimed subject matter.

Although the subject matter has been described in language specific tostructural features or methodological acts, it is to be understood thatthe subject matter of the appended claims is not necessarily limited tothe specific features or acts described above. Rather, the specificfeatures and acts described above are disclosed as example embodiments.

Various operations of embodiments are provided herein. The order inwhich one or more or all of the operations are described should not beconstrued as to imply that these operations are necessarily orderdependent. Alternative ordering will be appreciated based on thisdescription. Further, not all operations may necessarily be present ineach embodiment provided herein.

As used in this application, “or” is intended to mean an inclusive “or”rather than an exclusive “or”. Further, an inclusive “or” may includeany combination thereof (e.g., A, B, or any combination thereof). Inaddition, “a” and “an” as used in this application are generallyconstrued to mean “one or more” unless specified otherwise or clear fromcontext to be directed to a singular form. Additionally, at least one ofA and B and/or the like generally means A or B or both A and B. Further,to the extent that “includes”, “having”, “has”, “with”, or variantsthereof are used in either the detailed description or the claims, suchterms are intended to be inclusive in a manner similar to the term“comprising”.

Further, unless specified otherwise, “first”, “second”, or the like arenot intended to imply a temporal aspect, a spatial aspect, an ordering,etc. Rather, such terms are merely used as identifiers, names, etc. forfeatures, elements, items, etc. For example, a first channel and asecond channel generally correspond to channel A and channel B or twodifferent or two identical channels or the same channel. Additionally,“comprising”, “comprises”, “including”, “includes”, or the likegenerally means comprising or including, but not limited to.

Although the disclosure has been shown and described with respect to oneor more implementations, equivalent alterations and modifications willoccur based on a reading and understanding of this specification and theannexed drawings. The disclosure includes all such modifications andalterations and is limited only by the scope of the following claims.

What is claimed is:
 1. A method of surreptitious communication with auser via a mobile device, the method comprising: receiving, by a mobiledevice, a first alphanumeric message comprised of a combination ofcharacters selected from one or more of: (i) letters; (ii) numerals; and(iii) symbols; converting the first alphanumeric message to a firstbinary coded message; rendering the first binary coded message via avibration-inducing component of the mobile device as a sequence of firstand second vibration outputs corresponding to the binary coded message,the first vibration output being humanly distinguishable from the secondvibration output; receiving a sequential pattern of user touches inresponse to the rendered sequence of first and second vibration outputs;distinguishing any first and second tactile inputs from the sequentialpattern of user touches to identify a second binary coded messagecontained in the sequential pattern, wherein distinguishing the firstand second tactile inputs from the sequential pattern of user touches isbased on a selected one of: (i) a number of taps; (ii) an interval oftime between user touches; and (iii) a magnitude of impact of each usertouch to identify a second binary coded message contained in thesequential pattern; and converting the second binary coded message to asecond alphanumeric message comprised of a combination of charactersselected from one or more of: (i) letters; (ii) numerals; and (iii)symbols.
 2. The method of claim 1, wherein: the first binary codedmessage is based on Morse code; and the first vibration output has afirst duration and the second vibration output has a second durationthat is different from the first duration.
 3. A mobile device thatenables surreptitious communication with a user, the mobile devicecomprising: a vibration-inducing engine; a communication module using aprocessor; and a controller, using the processor, in communication withthe vibration-inducing engine and the communication module and thatexecutes a binary tactile communication utility that causes the mobiledevice to: receive, via the communication module, a first alphanumericmessage comprised of a combination of characters selected from one ormore of: (i) letters; (ii) numerals; and (iii) symbols; convert thefirst alphanumeric message to a first binary coded message; and renderthe first binary coded message via the vibration-inducing engine as asequence of first and second vibration outputs corresponding to thefirst binary coded message, the first vibration output being humanlydistinguishable from the second vibration output; and a touch inputcomponent comprising a selected one of: (i) a motion sensor; and (ii) atouchscreen for receiving a sequential pattern of user touches inresponse to the rendered sequence of first and second vibration outputs;wherein the controller executes the binary tactile communication utilitythat causes the mobile device to: distinguish any first and secondtactile inputs from the sequential pattern of user touches to identify asecond binary coded message contained in the sequential pattern, whereindistinguishing the first and second tactile inputs from the sequentialpattern of user touches is based on a selected one of: (i) a number oftaps; (ii) an interval of time between user touches; and (iii) amagnitude of impact of each user touch to identify a second binary codedmessage contained in the sequential pattern; and convert the secondbinary coded message to a second alphanumeric message comprised of acombination of characters selected from one or more of: (i) letters;(ii) numerals; and (iii) symbols.
 4. The mobile device of claim 3,wherein: the first binary coded message comprises Morse code; and thefirst vibration output has a first duration and the second vibrationoutput has a second duration that is different from the first duration.5. The mobile device of claim 3, wherein the first and second binarycoded messages are based on Morse code.
 6. The mobile device of claim 3,wherein the communication module: receives the first alphanumericmessage from an authentication engine for authenticating the user of themobile device; and transmits the second alphanumeric message to theauthentication engine.
 7. A non-transitory computer-readable storagemedium comprising computer-executable instructions, which when executedvia a processing unit on a computer performs acts, comprising: receivinga first alphanumeric message comprised of a combination of charactersselected from one or more of: (i) letters; (ii) numerals; and (iii)symbols; converting the first alphanumeric message to a first binarycoded message; rendering the first binary coded message via avibration-inducing component as a sequence of first and second vibrationoutputs corresponding to the first binary coded message, the firstvibration output being humanly distinguishable from the second vibrationoutput; receiving a sequential pattern of user touches in response tothe rendered sequence of first and second vibration outputs;distinguishing any first and second tactile inputs from the sequentialpattern of user touches to identify a second binary coded messagecontained in the sequential pattern, wherein distinguishing the firstand second tactile inputs from the sequential pattern of user touches isbased on a selected one of: (i) a number of taps; (ii) an interval oftime between user touches; and (iii) a magnitude of impact of each usertouch to identify a second binary coded message contained in thesequential pattern; and converting the second binary coded message to asecond alphanumeric message comprised of a combination of charactersselected from one or more of: (i) letters; (ii) numerals; and (iii)symbols.
 8. The non-transitory computer-readable storage medium of claim7, wherein: the first binary coded message is based on Morse code; andthe computer-executable instructions performs acts further comprisingrendering the first vibration output with a first duration and renderingthe second vibration output with a second duration that is differentfrom the first duration.
 9. The non-transitory computer-readable storagemedium of claim 7, wherein the computer-executable instructions performsacts further comprising: receiving the first alphanumeric message froman authentication engine for authenticating the user of the mobiledevice; and transmitting the second alphanumeric message to theauthentication engine.