Wearable data transmission device and method

ABSTRACT

The present disclosure relates to a wearable radio device for access control. The radio device has an inside portion and an outside portion. The inside portion includes a first transponder and a second transponder. A first barrier is located between the first transponder and the second transponder. A second barrier is located between the first transponder and the second transponder in an outside portion of the wearable device.

RELATED APPLICATIONS

The present patent document claims the benefit of the filing date under35 U.S.C. § 119(e) of Provisional U.S. Patent Application Ser. No.61/863,141 filed Aug. 7, 2013, which is hereby incorporated byreference.

BACKGROUND OF THE INVENTION Field of the Invention

The present disclosure relates generally to security devices andmethods, and more particularly, to cell phone and digital door lockcommunication. A wearable device transfers information/data and/orprovides access control to limited access areas and/or/data.

Description of Related Art

Standard door keys are frequently lost and can be difficult to operateif one struggles with physical motor control. Traditional door lock andaccess control technologies lack reliability, security and simplicity.Traditional door locks have many major faults. For example, a) it isincredibly easy to replicate a key and to use that on a current doorlock, b) traditional door keys are cumbersome and often uncomfortable tokeep on your person, c) if you lose your traditional door key it isnecessary to change the entire locking mechanism to ensure security.

While there are numerous iterations of access control tools from thetraditional metal key to card keys and key fobs, such tools are prone tobeing lost or misplaced. Traditional keys including the examples abovehave several major faults. They can be easily replicated, easilymisplaced or lost, and are cumbersome to store on your person. In thecase of metal keys, other accessories they are stored with may bescratched or otherwise harmed. If a traditional key is lost, misplacedor stolen, it is often a security necessity to change the entire lockingmechanism.

SUMMARY OF THE INVENTION

The present disclosure relates to a wearable accessory that utilizes aradio frequency (RF) tag to perform the transfer of information betweendigital devices. A wearable accessory may also function as an accesscontrol mechanism for digital locks.

In accordance with the present disclosure, wearable radio devices may beused for gaining access to secured locations. In one example, thepresent disclosure provides an apparatus and method for public andprivate transponder access through a wearable device such as a ring.

Furthermore, the use of radio frequency identification tags inlaidwithin a wearable accessory that has distinct public and privatefunctions which allow the wearer to share or transfer information aswell as provide access control to digital locks.

In one example, the present disclosure relates to a wearable radiodevice for access control. In one embodiment, the radio device has aninside portion and an outside portion. The inside portion may include afirst transponder and a second transponder. A first barrier is locatedbetween the first transponder and the second transponder. A secondbarrier is located between the first transponder and the secondtransponder in an outside portion of the wearable device.

In another embodiment, an apparatus for access control including a ringand a digital lock is disclosed. The ring may include a privatecomponent and a public component, an RFID public transponder locatedinside the ring, an RFID private transponder located inside the ring, aninner barrier located on an inner layer of the ring between the publictransponder and the private transponder, an outer barrier on an outsidelayer of the ring between the public transponder and the privatetransponder and a first hand gesture and a second hand gesture. The ringmay be configured to unlock the digital lock. A first hand gesture maybe used for access to the public transponder and a second hand gestureis used for access to the private transponder.

In another embodiment, a Smartphone system is disclosed. The Smartphonesystem includes a processor and a memory for communicating with awearable device comprising, an action generator operating on theSmartphone system and configured to write a plurality of actions to apublic transponder and a private transponder, a scanning componentoperating on the action generator and configured to scan a QR code froma web application and write an action. The scanning component writes theaction to the wearable device.

It should be noted that this disclosure is not limited to accessoriesworn but includes other embodiments including clothing, accessories suchas handbags, for example, transient accessories, or any item having thepotential to become wearable technology. Thus, all embodiments that usethe concepts disclosed herein are also included.

BRIEF DESCRIPTION OF THE DRAWINGS (NON-LIMITING EMBODIMENTS OF THEDISCLOSURE)

FIG. 1 illustrates a Back View of a private gesture (open palmed) forproviding access to private data transmitted from a wearable device inthe form of a ring, in accordance with an embodiment of the presentinvention;

FIG. 2 illustrates a Side View of a private gesture (open palmed)interacting with a target device in accordance with an embodiment of thepresent invention;

FIG. 3 illustrates a Front View of the embodiment of FIGS. 1 and 2;

FIG. 4 illustrates a Back View of a public gesture (closed handed) forproviding access to public data transmitted from one embodiment of awearable device;

FIG. 5 illustrates a Side View of a public gesture interacting with atarget device of FIG. 4;

FIG. 6 illustrates a Front View of a public gesture of FIGS. 4 and 5;

FIG. 7 is a front view illustration of an embodiment of internalcomponents of a wearable device in the form of a ring that communicatesaccess data;

FIG. 8 is a side view illustration of an embodiment of internalcomponents a wearable device in the form of a ring that communicatesaccess data;

FIG. 9 is a side view of the internal components of an embodiment of awearable device;

FIG. 10 illustrates the welcome screen of the mobile/tablet applicationin accordance with an embodiment of the present invention;

FIG. 11 illustrates the write screen of the mobile/tablet application inaccordance with an embodiment of the present invention; and

FIG. 12 illustrates how a wearer may interact with a target device inaccordance with an embodiment of the present invention.

DETAILED DESCRIPTION OF THE DRAWINGS AND THE PRESENTLY PREFERREDEMBODIMENTS

Reference will now be made to the accompanying drawings, which form apart hereof, and which show, by way of illustration, specific exemplaryembodiments. The principles described herein may, however, be embodiedin many different forms. The components in the figures are notnecessarily to scale, emphasis instead being placed upon illustratingthe principles of the invention. Moreover, in the figures, likereferenced numerals may be placed to designate corresponding partsthroughout the different views.

Wearing this device provides the wearer with a “key” that is alwaysavailable and extremely difficult to lose. However, if the device islost, access may be immediately removed through configuration such asconfiguring the master system (i.e. a system capable of communicatingwith the wearable device) such as a Smartphone, computer, a device witha processor and a memory, etc. Additionally, if security is breached,the wearable device may be reset or reconfigured with new/differentaccess configuration. For example. A wearable device 110 (shown as aring) may require no charge so it is completely sustainable. Traditionaldoor lock and access control technology lack this reliability, securityand simplicity. In a version, the wearable device 110 interacts with adigital door lock 120 (target) providing an unlock mechanism. In anotherversion, the wearable device may be used to unlock a cell phone or otherportable device by holding one's hand under a section of theirelectronic device (target) the wearer is able to unlock their electronicdevice and gain access without any requirements of additionalauthentication mechanisms.

Common technical tasks such as providing WIFI information, UniversalResource Locators (“URLs”), GeoLocation and other social media is oftena problematic task that requires a form of communication that is moreoften than not, a third party service such as e-mail. This disclosure isintended to resolve this issue, among others, by providing a simplemechanism to sham data “over the air.”

To accomplish these tasks the wearer utilizes a specific location on thetarget device defined as a (“Sweet spot”). Utilizing a sweet spotprovides a different mechanism for sharing data as the user has to be intouch distance of the target device. Common sharing methods such asWIFI/UHF RFID are capable of reading the data from distant places. Inone example, the “Sweet Spot” approach means the wearer must have thedevice properly oriented and be within a <10 mm range.

In one embodiment, the wearer is able to easily tap their device to aspecific surface area on the target device where the device will createinduction (“Sweet Spot”) on a Near Field Communication (“NFC”) enabledcell phone or tablet device (“target”). Upon tapping, the target deviceis notified and takes actions that are target device specific. This“Sweet Spot” is preferably limited to an area where the wearers hand isnot usually placed during standard use such as in the middle of a cellphone. This is to prevent unexpected induction and communication. The“Sweet Spot” can be identified and located by a “Sweet Spot” sticker forexample. If a device is held up to a target device's “Sweet Spot” thencoupling occurs and the communication process begins. A target devicemanufacturer may decide where the “Sweet Spot” is located during targetdevice antenna design: the wearer locates the “Sweet Spot” and uses the“Sweet Spot” when using the device. The “Sweet Spot” will vary in sizeand shape depending on the antenna design implemented on the targetdevice and the device worn by the wearer.

Private gestures are designed to be used in higher security applicationssuch as authentication or any other situation that requires a higherlevel of security/screening, the device achieves this by ensuring theprivate portion of the device is difficult for a third party to accesswithout the consent of the wearer. Public gestures are used in lowersecurity applications such as sharing of non-sensitive information, thepublic portion of the device is designed to be relatively easy for athird party to access.

Referring now to FIG. 1, an exemplary back view of a private gesture(open palmed) for providing access to private data transmitted from awearable device in the form of a ring is illustrated. A device 110functions in accordance with a private gesture 100 for transferring dataor the exchange of private/secure information in combination with targetdevice 120 (shown in FIG. 2). As described herein, this combination maybe configured by a user of device 110. In FIG. 1, the device 110 may beworn on any finger or on the wrist.

In an embodiment, the wearable ring communicates with NFC Enableddevices such as digital door locks, cell phones and tablet computers andcan be used for several tasks. Each task has a different levelof“security” depending on the wearer's preference. If a task is “highsecurity” such as unlocking a door or providing other means of accesscontrol, it is likely that the wearer will choose to keep this taskprivate. To accomplish privacy the wearer will write the “action” orassign the action to a bottom portion of the ring, or another portion ofthe ring designated for high security. This portion of the ring may be asmaller portion, the same size, or larger than other portions. In thiscase the bottom portion of the ring will be the “Private” portion and isworn at the bottom of the hand requiring an open hand gesture to sharethe information. An invention is “assigned” to a target device if thetarget device does not require an action to be written but instead pairswith the device through using the devices Unique Identifier (“ID”) orUnique Text String Value. If a task is “low security” such as sharing apublic social network address then the wearer may store this “action” onthe “Public” portion of the device. The public portion of the device isfrequently exposed to public viewing and can be accessed much easier.The hand gesture for sharing public information is to use a clenchedfist and do a “punch” or “fist bump” style action.

One example of the device will have two Radio Frequency Identifiers(“RFID”) transponders with a standard of ISO14443A operating at afrequency of 13.56 Mhz. In this example, the transponders will conformto the NFC standard ergo including NFC Data Exchange Format (“NDEF”)records that can be used to read/write data. Here, the read distance ispreferably between 0 mm and 5 mm. The device will have to be touched ona specific portion of the target device. The ring will have a public andprivate portion. In one example, wearers will be able to write data tothe public and private portions of the device using a cell phoneapplication (FIG. 9) or NFC reader/writer. The application may be usedon a number of mobile devices such as standard smart phones and tabletsand can easily be modified to be compatible with new technologies. Theapplication is not limited purely to mobile devices. Physical gesturesmay be used for data access. For example, wearers may use an open handgesture to share private information (FIG. 1) and a closed hand gestureto share public information (FIG. 4). The disclosure is not limited tophysical gestures. Other options are also possible to share data/dataaccess depending on the device and technologies available. In oneembodiment of the device, two metal bands and a shielding layer (FIG. 7)act as shields between the public and private sections, these shields,serve the purpose of blocking any potential radio leaks and negate anyinduction from a target device trying to induct the metal at the core ofthe device. In other embodiments, materials other than metal may beappropriate. For example, ceramic may be used.

FIG. 2 illustrates a Side View of a private gesture (open palmed/openhand) 200 for sharing private information, interacting with a targetdevice 120. The open palm gesture 200 allows access to the privateportion of the device 110. A target device 120 such as a digital doorlock or cell phone could be unlocked using this gesture.

FIG. 3 illustrates a front view of the embodiment of FIGS. 1 and 2; i.e.the open palm/hand gesture used for sharing private information. Theopen palm gesture 300 allows access to the private portion of the device110. A target device 120 such as a digital door lock or cell phone couldbe unlocked using this gesture.

FIG. 4 illustrates a back view of a public gesture 400 (closed handed)for providing access to public data transmitted from the wearabledevice. In this example, the public gesture 400 used for sharing publicinformation is a clenched fist. A fist bump, pump or touch gesture iswhen a wearer clenches their fist, holds their extended arm at shoulderheight and projects the public portion of their device at a targetdevice. In one example, a closed hand, fist bump, pump or touch gestureallows access to the public portion of the device 110. A target device120 such as a cell phone, laptop or tablet would use the device toaccess information such as a URL, WIFI key, Latitude/Longitude etc.

FIG. 5 illustrates a Side View of a public gesture 500 interacting withthe target device of FIG. 4. Here, the side view of the closedhand/clenched first gesture is used for sharing Public information. Theclosed hand, fist bump, pump or touch gesture allows access to thepublic portion of the device 110. A target device 120 such as a cellphone, laptop or tablet would use the device to access information suchas a URL, WIFI key, Latitude/Longitude etc.

FIG. 6 illustrates a Front View of a public gesture (illustrated by aclenched fist gesture) of FIGS. 4 and 5. In this example, the Closedhand/clenched fist gesture 500 is used for sharing Public information.The closed hand, fist bump, pump or touch gesture 500 allows access tothe public portion of the device 110. A target device 120 such as a cellphone, laptop or tablet would use the device to access information suchas a URL, WIFI key, Latitude/Longitude etc.

FIG. 7 is a front view illustration of an embodiment of the internalcomponents 700 of one example of a wearable device in the form of a ringthat communicates access data. The internal components 700 includepublic transponder 710, shielding material 720 and 760, metal 730 and750, and private transponder 770. The shielding material may be flexiblegraphite or polymer or any other suitable material. The shieldingmaterial may prevent failed induction and radio interference. In oneembodiment, RFID signals can not pass from one side of the ring to theother (i.e. through the middle). In another embodiment, shieldingmaterial 720 and 760 are not necessary. Additionally, metal 730 and 750can be of different material such as ceramic. In another embodiment,metal is replaced by ceramic and the shielding material is unnecessary.Various combinations of the above are also possible.

In a version of the device, the transponders 710 and 770 are 0.13 mmthick slightly set into the inlay cover and passive RFID layer at thepoint of contact with the public transponder Chip 710 and the publictransponder Chip 770 (in one embodiment, the public transponder chip 770is an NTAG 203 Chip). In another embodiment, the transponder chip is anNTAG 216 or any other applicable chip. The Inlay cover may be anaesthetic colored layer designed to provide customization for thedevice. Referring briefly to FIG. 9, layers 910 and 920 may also bemerged. In that case, instead of having a cover and a clear coat, acolor pigment may be used in the clear coat. This method could savespace. In this embodiment, an NT AG 216 chip may be used, but again, anyother applicable chip such as the NTAG203 may be used. The inlay coveris either printed paper, a carbon fiber replica material or in someinstances not required.

The Shielding 720 and 760 is 0.15 mm thick. The Metal 740 is 0.7 mmthick at the core and 1.5 mm thick on the outer rim of the device. Theliving being or void is >5 mm. The Metal 730 & 750 portion runs from theinside to the outside of the device between the two inlays 710 & 770.The living being is represented here as a human's finger because thedevice may be worn around the finger. The metal in this embodiment isrepresented by Titanium. However, ceramic aswell or another appropriatematerial may be used as an alternative to metal 730 and 750.

FIG. 8 is a side view illustration of one embodiment of internalcomponents 800 of a wearable device in the form of a ring thatcommunicates access data. In this example, the Public and PrivateTransponder 710 and 770 respectively are covered by a clear passive RFIDmaterial and also potentially an inlay cover. In a version of thedevice, the clear passive RFID layer is ˜0.5 mm thick, the inlay coveranother 0.5 mm, the transponders 710 and 770 are 0.13 mm thick slightlyset into the inlay cover and passive RFID layer at the point of contactwith the transponder Chip 710 & 770 (In this case an NTAG 203 chip). TheShielding 760 is 0.15 mm thick. The Metal 730 & 750 is 1 mm thick at thecore and 1.5 mm thick on the outer rim of the device. The living beingor void 740 is >5 mm. The Metal 730 and 750 portion runs from the insideto the outside of the device between the two inlays 710 & 770. Themeasurements above are merely an example for illustrative purpose. Othermeasurements are also possible.

FIG. 9 is a side view of the internal components of the device. In thisexample, the Public and Private Transponder 770 is covered by a clearpassive RFID material 910 and also potentially an inlay cover 920. In aversion of the device, the clear passive RFID material 910 is ˜0.5 mmthick, the inlay cover another 0.5 mm, the transponders 770 are 0.13 mmthick slightly set into the inlay cover and passive RFID layer 910 atthe point of contact with the transponder Chip (in this case an NTAG 203Chip) 770. The Shielding/Reflective Material 760 is 0.15 mm thick. TheMetal 730 is 1 mm thick at the core and 1.5 mm thick on the outer rim ofthe device. The living being or void is >5 mm. In this example, themetal portion 730 runs from the inside to the outside of the devicebetween the two inlays 770 this portion is not exclusive to metal, othermaterials such as ceramics may be used. Once again, the measurementsabove are merely an example for illustrative purpose. Other measurementsare also possible.

FIG. 10 illustrates the welcome screen of the mobile/tablet application900. The write screen is used to write information or settings to thedevice. Screenshot 1000 illustrates action options of a cell phone and atablet application used to read and write actions to the device. Thedevice is capable of working with new radio enabled target devices andnew software applications as they are made available. The write screen1000 is user friendly and a display that includes a guidance 1010 suchas “what do you want your ring to do.” In the embodiment in FIG. 10, theavailable actions are facebook 1020, website 1030, etherpad 1040, clonering 1050, and twitter 1060. In one example, the device is designed towork with the ISO 14443 Protocol which provides a standard forcommunicating between RFID enabled devices. If data has already beenwritten to a ring, clone ring 1050 may be used to to copy the data fromthat ring to another ring. Referring briefly to FIG. 11, a sweet spotlocation representation is displayed as a heatmap 1170, the heatmap 1170may be a colored visual representation that shows where a user caninteract with the device 1140. By interacting with the locationspecified with the action the user will be interacting with the device1040 sweet spot. The heatmap 1170 of the sweet spot location isdisplayed on the screen of the device 1140.

The guidance 1130 provides potential actions a user can write to thedevice 1140. For example, guidance 1130 may guide the user to hold theNFC Ring 1150 to the back of their device 1140 in a specific location1170.

The mobile/tablet or other Smartphone/system (“system”) with a processorand a memory is capable of communicating with a wearable device andconfiguration of the wearable device through a software application,programmable code, media such as a CDROM or a USB drive. The system mayinclude an action generator that is configured to write a plurality ofactions to a public transponder and a private transponder. The systemmay also include a scanning component that may operate on the actiongenerator and be configured to scan a QR code (or other code) from a webapplication and write an action. The scanning component may write theactions to the wearable device.

FIG. 11 illustrates a write screen/how a device interacts with a target.Screenshot 1100 illustrating a prompt 1030 and device 1140 to the wearerto hold their device up to of the cell Phone and tablet application usedto read and write actions to the device. Heatmap 1070 represents thesweet spot on the target device.

FIG. 12 illustrates an example of flow diagram of using a device (here,a ring). The process begins S1201 by the user wearing a ring inaccordance with this disclosure. Next, at the alignment step S1202, thewearer aligns their ring with private portion to the base of his/herhand and the public portion to the top of his/her hand. Next, at stepS1203, the wearer decides if the security action requires the privateportion S1204 a or the public portion S1204 b of the device. If thepublic portion 1204 a is required, the wearer moves to step S1205 a andclinches/closes their fist. If the private portion 1204 b is required,the wearer moves to step S1205 b and opens their hand or exposes theirpalm. Finally, at step S206, the wearer moves the device to the targetdevice and exposes the correct portion of the device to the target, i.e.either by clenching/closing their fist or an open hand gesture.

While various embodiments of the invention have been described, it willbe apparent to those of ordinary skill in the art that many moreembodiments and implementations are possible within the scope of theinvention. Accordingly, the invention is not to be restricted.

The invention claimed is:
 1. A wearable radio device comprising: a firsttransponder and a second transponder; and a barrier having a firstportion and a second portion, wherein the first barrier portion islocated between the first transponder and the second transponder in aninside portion of the device; wherein the second barrier portion islocated between the first transponder and the second transponder in anoutside portion of the device, and wherein the barrier extends from aninside surface of the device to an outside surface of the device.
 2. Thewearable device of claim 1 further comprising: shielding material;wherein the shielding material, the first transponder, and the secondtransponder are located in the inside portion of the device; wherein theshielding material is flexible graphite or polymer; and wherein thebarrier is made of metal.
 3. The wearable device of claim 1 wherein thefirst transponder is a public transponder and the second transponder isa private transponder.
 4. The wearable device of claim 3 wherein a firsthand gesture is used in combination with the public transponder and asecond hand gesture is used with the private transponder.
 5. Anapparatus for access control comprising: a ring comprising: a privatecomponent and a public component; an RFID public transponder locatedinside the ring; an RFID private transponder located inside the ring; abarrier extending from inside the ring to outside the ring and having:an inner barrier portion located on an inner layer of the ring betweenthe public transponder and the private transponder; and an outer barrierportion on an outside layer of the ring between the public transponderand the private transponder; a first hand gesture and a second handgesture; and a digital lock; wherein the ring is configured to unlockthe digital lock; wherein the first hand gesture is used for access tothe public transponder and the second hand gesture is used for access tothe private transponder.
 6. The apparatus of claim 5 further comprising:flexible graphite or polymer shielding material located inside the ring;wherein the flexible graphite or polymer shielding material preventsfailed induction and radio interference; and wherein the barrier is madeof either ceramics or metal.
 7. The apparatus of claim 5 wherein thedigital lock is NFC enabled.
 8. The apparatus of claim 7 wherein thepublic transponder and the private transponder are covered by an inlaycover.
 9. The apparatus of claim 8 wherein the digital lock furthercomprises: a sweet spot.
 10. The apparatus of claim 8 wherein the publictransponder and the private transponder are NTAG 203 chips.
 11. Theapparatus of claim 8 wherein the public transponder and the privatetransponder are NTAG 216 chips.
 12. The apparatus of claim 9 wherein thedigital lock is within touch distance from the wearable device.
 13. Theapparatus of claim 12 wherein the RFID public transponder and the RFIDprivate transponder comprise ISO14443A standard and operate at afrequency of 13.56 Mhz.
 14. A ring for access control comprising: afirst transponder and a second transponder; and a barrier having a firstportion and a second portion, wherein the first barrier portion islocated between the first transponder and the second transponder on aninner layer of the ring; wherein the second barrier portion is locatedbetween the first transponder and the second transponder on an outsidelayer of the ring, and wherein the barrier extends from inside the ringto outside the ring.