WO2001086556A1 - Wireless interactive system and methodology using low-power-rf-transceiver, secure pervasive computing networks - Google Patents

Wireless interactive system and methodology using low-power-rf-transceiver, secure pervasive computing networks Download PDF

Info

Publication number
WO2001086556A1
WO2001086556A1 PCT/US2001/014809 US0114809W WO0186556A1 WO 2001086556 A1 WO2001086556 A1 WO 2001086556A1 US 0114809 W US0114809 W US 0114809W WO 0186556 A1 WO0186556 A1 WO 0186556A1
Authority
WO
WIPO (PCT)
Prior art keywords
access controllers
access
consumer
consumer touchpoint
touchpoint device
Prior art date
Application number
PCT/US2001/014809
Other languages
French (fr)
Inventor
Cuong D. Do
David Nguyen
Lan Nguyen
Tudo D. Do
Frankie C. Ho
Dinh Dung
Original Assignee
Consumer Direct Link Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Consumer Direct Link Inc. filed Critical Consumer Direct Link Inc.
Priority to AU2001261273A priority Critical patent/AU2001261273A1/en
Publication of WO2001086556A1 publication Critical patent/WO2001086556A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present invention relates to methods and apparatus for communicating electronically, and, more particularly, relates to consumer touchpoint devices for performing electronic functions and transactions.
  • Portable electronic communication systems have existed in the prior art.
  • a portable electronic communication system typically permits a user to conduct certain electronic transactions away from a desktop computer, which substantially improves efficiency and convenience to the user.
  • the broad term "electronic transactions" can include transactions conducted via computer networks, automated teller machines (ATM's), automated point-of- sale systems, and the like.
  • Transactions conducted via computer networks may encompass a wide range of transactions, including exchanging information and data via a computer network popularly known as the Internet, e.g., to make a purchase from a vendor on the network.
  • ATM's typically permit users to conduct financial transactions (such as withdrawals, transfers, deposits, and the like) vis-a-vis a financial institution in an electronic manner.
  • Merchants may employ automated point-of-sale systems, for example, to permit users to purchase products or services using the users ' electronic account.
  • the above and perhaps other examples of portable electronic communication systems can be found in popular literature .
  • Electronic transaction systems typically request the user to provide identification data to authenticate herself as the user authorized to approve the proposed transaction or transactions.
  • the identification data may be required with each transaction, or the identification data may be entered by the user at the start of a session to authenticate herself and enable that user to subsequently perform any number of transactions without further authentication or identification.
  • users are typically required to manually enter the identification data into the electronic transaction system for authentication.
  • the entry of identification data involves typing in a password on a numeric keypad or on a keyboard.
  • the identification data is then compared with data previously stored within the electronic transaction system, and authentication is satisfied when there is a match.
  • the electronic transaction system comprises an automated teller machine (ATM)
  • ATM automated teller machine
  • a user will typically insert a data card, such as a bank card or a credit card, into a card reader.
  • the data card often includes a magnetic stripe that contains the account number and other information related to the user, which may then be read by card reader.
  • the data stored in the data card enables the electronic transaction system to ascertain the account with which the user wishes to transact business. Via a keypad on the ATM, the user can then enter her identification data, e.g., her personal identification number (PIN), to authenticate herself. If the entered identification data matches the identification data stored in connection with the electronic transaction system, the user is authenticated and granted access to her account. If there is no match, authentication fails. After authentication, the user may be able to, for example, employ a combination of the keypad and a screen to withdraw cash from her account, which results in cash being dispensed from the ATM and the balance in her account within database being reduced.
  • PIN personal
  • the identification data Since the identification data is not encrypted before being entered into the ATM, the identification data is vulnerable to unauthorized access and procurement. Encryption of the identification data has not been practical in the mentioned prior- art devices due to the complexity and/or inconvenience to the user of performing encryption or memorizing the encrypted identification data.
  • Such an apparatus should be portable and capable of maintaining geographic and other unique user information to permit the user to conveniently and comfortably perform electronic transaction authentications in a variety of environments .
  • the portable electronic communication devices are capable of maintaining geographic and other unique user information, and of permitting the user to conveniently and comfortably perform electronic transactions in a variety of environments, thus enhancing user convenience, productivity, security and safety.
  • a pervasive computing network including a group of first access controllers connected together on a first local area network, with each of the first access controllers including a radio frequency transceiver constructed to transmit and receive radio frequency signals within a range less than about 100 meters and wherein at least two of the ranges of the first access controllers overlap one another and the first access controllers are constructed to communicate with a consumer touchpoint device.
  • the pervasive computing network further includes a group of second access controllers connected together on a second local area network, each of the second access controllers including a radio frequency transceiver constructed to transmit and receive radio frequency signals within a range less than about 100 meters, with at least two of the ranges of the second access controllers overlapping one another and the second access controllers being constructed to communicate with the consumer touchpoint device.
  • the pervasive computing device is further provided with both a first communication line connecting the first group of access controllers to a wide area network; a second communication line connecting the second group of access controllers to the wide area network; and a knowledge center connected to the wide area network in communication with the group of first access controllers and the group of second access controllers, the knowledge center being configured to communicate with the consumer touchpoint device by pushing unrequested data to the consumer touchpoint device when the consumer touchpoint device is within one of the ranges of the group of first access controllers and the group of second access controllers .
  • Figure la is a schematic diagram illustrating a consumer touchpoint device geographically disposed about a plurality of consumer touchpoints, in accordance with a presently preferred embodiment of the present invention
  • Figure lb is a schematic diagram illustrating other consumer touchpoint devices, also displayed in a field of consumer touchpoints, in accordance with other preferred embodiments of the present invention
  • Figure 2 is a generalized block diagram of the functional components which comprise the consumer touchpoint device in accordance with a preferred embodiment of the present invention
  • Figures 3a and 3b are generalized block diagrams illustrating the consumer touchpoint device in accordance with a presently preferred embodiment
  • Figure 4 is a generalized block diagram of a modem access controller and the corresponding connections with interactive devices in accordance with an embodiment of the present invention
  • Figure 5 is a schematic representation illustrating a plurality of access zones defined by a corresponding plurality of access controllers in accordance with the presently preferred embodiment
  • Figure 6 is another schematic diagram illustrating a knowledge center in accordance with a presently preferred embodiment.
  • Figure 7 is yet another schematic diagram showing further features of the knowledge center in accordance with the presently preferred embodiment. DETAILED DESCRIPTION OF THE PRESENTLY PREFERRED EMBODIMENTS
  • Figure la illustrates an external view of a consumer touchpoint device 10 in accordance with a presently preferred embodiment of the present invention.
  • the consumer touchpoint device 10 is preferably implemented as a small, self-containing package that is sufficiently ruggedized for daily use in the field.
  • the consumer touchpoint device 10 is small enough to be comfortably carried with the user at all times, e.g., as a key chain attachment or a small package that can easily fit inside a purse or a wallet.
  • the consumer touchpoint device 10 comprises a display and input device such as a touchscreen 12, a biometric sensor 13, navigation buttons 15, an antenna 16 for wireless communication with a cellular tower 20, and a low power radio frequency (RF) transceiver 60 (Figure 2) for communicating with at least one access controller 81 ( Figure 5) .
  • the touchscreen 12 is preferably disposed on an upper portion of the consumer touchpoint device 10, and preferably comprises a display screen such as a liquid crystal display (LCD) .
  • the display screen preferably comprises a 16 level grayscale, 320 x 240 pixel LCD with a backlight, but alternatively may comprise a gas plasma display or other type of suitable display.
  • the touchscreen 12 facilitates input via a user's finger or an attached stylus.
  • the consumer touchpoint device 10 preferably comprises an integrated personal digital assistant (PDA) .
  • PDA personal digital assistant
  • Figure lb illustrates a consumer touchpoint device 10' having a similar construction to that of Figure la and further including a ke'ypad 14.
  • the display 12 is the display on the portable phone and the keypad 14 serves as the keypad for the wireless phone.
  • the touchscreen 12 of the consumer touchpoint device 10 is similarly constructed, with the touchscreen 12 serving as the keypad for the wireless phone.
  • FIG. lb Another consumer touchpoint device 10" is illustrated in Figure lb having a size comparable to that of several stacked credit cards.
  • the consumer touchpoint device 10" in the illustrated embodiment is similar to that described in connection with Figure 1, but preferably does not comprise a cellar phone.
  • the consumer touchpoint device 10" may comprise a cellular phone as well.
  • Each access controller 81 ( Figure 5) comprises a corresponding low power RF transceiver for communicating with the low power RF transceiver 60 ( Figure 2) of the consumer touchpoint device 10, and further comprises a network connection for communicating with a back-end knowledge center 121 ( Figure 5) .
  • a key element of the access controllers of the present invention is their relatively low energy usage (e.g., for compactness and portability) and their relatively low cost (for quantity) . Since the invention works best with a large number of access controllers, it is preferred in accordance with one aspect of the present invention that relatively low-power transmissions be used. This feature will help to promote the transition to a large number of access zones . One intuitively might select an RF technology utilizing high power transmissions.
  • one exemplary embodiment it is presently preferred for one exemplary embodiment to have RF transmissions that range in radius from about 100 m in range or less, and more preferably, less than about 15 m radius RF transmissions.
  • the access controllers are integrated into or connected to a variety of electronic devices to allow the consumer touchpoint device 10 to communicate with the knowledge center 121 over a relatively large range of transactional and geographical applications .
  • access controllers e.g., Figure 4 or 81 of Figure 5 are incorporated into or connected to numerous electronic devices to thereby form an automated teller machine (ATM) access controller 25, a point of sale (POS) access controller 27 placed at a physical location at which goods are sold to consumers, a boarding gate access controller 30, a home/hotel telephone access controller 33, a bank teller access controller 35a, a laptop or other portable computer access controller 37, and a personal computer (PC) access controller 39.
  • ATM automated teller machine
  • POS point of sale
  • PC personal computer
  • the PC access controller 39 comprises a free standing access controller 41, which can be connected to the PC via a USB, serial, PC card, or other input/output (I/O) port of the PC.
  • free standing access controllers may be connected to I/O ports of any of the above-mentioned or other electronic devices as a convenient, inexpensive conversion of those electronic devices into access controllers .
  • Each of the access controllers is either directly or indirectly connected to the knowledge center 121 via a telephone line, communications cable, or other communications link, via (1) another access controller, or (2) a computer, e.g., a PC or laptop, which in turn is connected to a telephone line, communications cable, or communications link.
  • the access controllers in a certain geographical vicinity are all connected together via, for example, their low power RF transceivers to form a Local Area Network (LAN) , and at least one of the access controllers in the LAN is in turn connected to a telephone line, communications cable, or other communications link for providing all of the access controllers on the LAN with access to the knowledge center 121.
  • LAN Local Area Network
  • the access controllers of a LAN are connected together via a hub to form an Ethernet, and one of the access controllers on the Ethernet is connected in turn to a communications cable for accessing the knowledge center 121.
  • the one access controller in addition to serving as a gateway to the knowledge center 121, is configured to coordinate the operations of the other access controllers on that Ethernet.
  • each access controller is configured to support up to 30 consumer touchpoint devices and to accordingly perform intra-networking functions among the various consumer touchpoint devices being supported at any given time.
  • each access controller regularly reports to the knowledge center 121 the identifications (y-TINs, defined infra) of the particular consumer touchpoint devices with which the access controller is presently in communication.
  • the knowledge center is thus able to track the location of each consumer touchpoint device 10 by monitoring the access controller (s) with which the consumer touchpoint device 10 is presently in communication.
  • the access controllers of each access zone regularly report to the coordinating access controller of the access zone the identifications (y-TINs) of the particular consumer touchpoint devices with which the access controllers in that access zone are presently in communication, and the coordinating access controllers regularly report the information to the knowledge center 121.
  • the knowledge center is thus able to track the location of each consumer touchpoint device 10 by monitoring the access zone with which the consumer touchpoint device 10 is presently in communication.
  • the one access controller is connected to the knowledge center 121 via the Internet.
  • the access controllers preferably can be managed remotely, over for example the knowledge center 121 network, from a management center via, for example, SNMP interfaces.
  • the access controllers may further be monitored and managed through the knowledge center 121.
  • the Ethernet connecting the access controllers may comprise, for example, an Ethernet 802.3 (10/100Base T) connection using RJ 45 connectors, or may comprise a wireless Ethernet 802.11 system utilizing moderate range RF wireless connections.
  • a plurality of the access controllers in a vicinity are networked together via moderate range RF connections using a HomeRF protocol, which is sponsored by the HomeRF Working Group, Inc. and which may be implemented using, inter alia, BB160 PC Adapter cards and related components manufactured by Motorola, Inc.
  • connections can include wireless modems, other wireless LANs, wireless Personal Area Networks (PANs), cellular telephone networks, digital communication systems, etc. connecting the access controllers to one another.
  • the one access controller in the LAN that is connected to the telephone line, communications cable, or other communications link may comprise, for example, a modem, a USB connection, or a serial port connection (e.g., RS-232) for providing a communication link of the access controller to the knowledge center 121.
  • the bank teller access controller 35a may be connected to a serial port connection of a PC, and the PC may comprise a modem for providing a connection to the knowledge center 121.
  • a number of other access controllers, such as a second bank teller access controller 35b and a third bank teller access controller 35c, are then connected to the bank teller access controller 35a via, for example, on an Ethernet.
  • Each access controller may be formed within the electronic device or may comprise a configuration similar to the free-standing access controller 41.
  • Free standing access controllers may be connected to, for example, an ATM, POS, boarding gate, telephone, bank teller, laptop computer or PC, to thereby form an ATM access controller 25, POS access controller 27, boarding gate access controller 30, telephone access controller 33, bank teller access controller 35a, laptop computer access controller 37, and PC access controller 39.
  • a single access controller In applications wherein only a single access controller is used, i.e., the access controller is not provided on a LAN with other access controllers, the single access controller itself will of course need to be connected to the telephone line, communications cable, or other communications link (directly or via a computer) .
  • a single access controller may comprise, for example, a modem, a USB connection, or a serial port connection (e.g., RS-232) for providing a communication link of the access controller to the knowledge center 121.
  • a modem access controller can be integrated into any of the above access controllers and, further, is provided in accordance with the present invention in a separate housing as a simple low cost unit.
  • the modem access controller preferably comprises a high-speed V.90 secured Public Switched Telephone Network (PSTN) dial-up device for providing access to the knowledge center 121.
  • PSTN Public Switched Telephone Network
  • POTS plain old telephone service
  • the modem access controller further comprises a Bluetooth protocol RF Transceiver for communicating with consumer touchpoint devices 10. The modem access controller is thus able to interface with consumer touchpoint devices at one end using for example Bluetooth technology, and to interface with the PSTN through modem dial-up at the other end.
  • the above discussed access controllers can be deployed into existing commerce systems such as set forth in Figure 1 and further including, for example, computer terminals in a network, portable devices, and other electronic devices used in connection with the financial industry (e.g., securities trading), medical (e.g., hospitals), transportation, food (e.g., vending machines), petroleum (e.g., gas pumps), retailing, gaming (e.g., casinos), entertainment (e.g., convention centers), manufacturing (e.g., supply-chain management), educational (e.g., universities), telecom and mobile suppliers, media entertainment, law enforcement, government (e.g., automated library check-out terminals), and other industry sectors .
  • financial industry e.g., securities trading
  • medical e.g., hospitals
  • transportation e.g., food (e.g., vending machines), petroleum (e.g., gas pumps), retailing, gaming (e.g., casinos), entertainment (e.g., convention centers), manufacturing (e.g., supply-chain management), educational (e
  • the access zones are particularly suited for residential, working, and densely populated areas where transactions are likely to occur. Businesses using the access controllers of the present invention can realize advantages such as expediting payment processing, reducing errors, tracking item-level movements and providing sales and promotion analyses.
  • Access controllers may be placed in free-standing form at various locations, as well.
  • one or more free standing access controllers similar to the freestanding controller 41 may be placed, for example, in a sitting area of the boarding gate 30, or may be placed throughout the aisles of a department store, warehouse, or supermarket in combination with, for example, a point of sale 27 access controller.
  • the above-discussed access devices, and their configurations and connections, may be used in whole or in part with the other illustrated and discussed embodiments of the present invention.
  • a unifying principle in accordance with one aspect of the present invention is to provide a pervasive computer network of interconnected access devices for communicating with low-power consumer touchpoint devices via relatively low-power, short range RF transmissions .
  • FIG. 2 illustrates, in a simplified manner and in accordance with one aspect of the present invention, the hardware for implementing a consumer touchpoint device 10.
  • a high level hardware implementation of the consumer touchpoint device 10 may comprise combinations of, discrete logic, programmable logic, one or more application-specific integrated circuits (ASICs), or the like.
  • the random access memory may comprise some form of random access memory (RAM) such as static RAM and/or dynamic RAM, and the flash memory 56 comprises some form of read only memory (ROM) which does not lose information, even when the power is turned off.
  • RAM random access memory
  • ROM read only memory
  • the flash memory 56 can be implemented using other forms of nonvolatile memory (NVM) such as electrically programmable read-only memory (EPROM) , electrically erasable, programmable read-only memory (EEPROM) , or the like.
  • NVM nonvolatile memory
  • EPROM electrically programmable read-only memory
  • EEPROM electrically erasable, programmable read-only memory
  • the ROM of course comprises comprises a ROM BIOS, which is used to store information for, inter alia, starting up the consumer touch point device 10.
  • other types of optical memory or magnetic memory may be employed in addition to or as an alternative to the mentioned memory components .
  • a battery 52 provides power to the circuitry of the consumer touchpoint device 10.
  • a microprocessor 54 executes codes stored in flash memory 56 and employs random access memory 58 for the execution.
  • the microprocessor 54 preferably operates on a Linux operating system.
  • the random access memory may comprise static RAM or dynamic RAM, both of which are known in the art.
  • the microprocessor 54, flash memory 56, random access memory 58, LAN and serial communication ports (not shown), display circuitry 64, and encryption module 68, for example, are implemented on a single chip.
  • the cellular chipset 62 is configured to support voice and secure data communications via cellular and similar networks including GSM, CDMA and PHS .
  • a short-range RF Transceiver such as the Bluetooth module 60, and an optional cell phone chipset 62 are both coupled to microprocessor 54. Communication of the consumer touchpoint device 10 to and from cellular towers and access controllers is accomplished under control of microprocessor 54 via the Bluetooth module 60 and the cell phone chipset 62, respectively. As presently embodied, the consumer touchpoint device 10 can access the Internet and the knowledge center 121 through either the cellular or Bluetooth channels.
  • the flash memory 56 preferably comprises an HTML browser for accessing the Internet and reading E-mail, stock quotes, weather, scores, etc.
  • computer languages such as Java by Sun Microsystems Inc. of Mountain View, Calif, or ActiveX by Microsoft Corp. of Redmond, Wash, or HDML
  • the display circuitry 64 controls the display 12 of Figure 1, and the user input circuitry 66 controls and corresponds functionally to the keypad 14 of Figure 1.
  • the knowledge center 121 is configured to dynamically transform any standard HTML web page and to deliver the converted content as either HTML, or CHTML (Compact HTML) for HTTP devices or as WML for WAP
  • the Bluetooth module 60 in accordance with the present invention utilizes Bluetooth technology, which is a low-powered, short-range, cable replacement, radio technology system that allows products containing Bluetooth technology (see www.bluetooth.com) to be interconnected via wireless communication.
  • Bluetooth uses the 2.4 GHz Instrumentation, Science, Medical (ISM) unlicensed band.
  • the RF transceivers of the consumer touchpoint devices and the access controllers are preferably set to a nominal range of 10 meters. In accordance with a preferred embodiment, they are set to have a range of 15 meters, for a resulting 30 m radius of coverage for each access controller.
  • a spectrum of hop frequencies are utilized beginning at the lowest frequency which is 2402 MHz and each of the hop frequencies is 1 MHz above the next lower frequency.
  • a connection may be made between the two RF transceivers by sending a page message.
  • a page message can include a train of 16 identical page messages on 16 different hop frequencies.
  • Packet data transmitted is preferably TCP/IP based.
  • the system may use a Synchronous Connection Oriented (SCO) link for point-to-point, full duplex links, normally used in voice communication.
  • SCO Synchronous Connection Oriented
  • ACL Asynchronous Connectionless Link
  • ACL provides one frame duration links with full duplex communications .
  • ACL communications use a time division duplex scheme.
  • a first slot provides a transmission from the master to the slave and a second slot provides a transmission from the slave to the master. Each slot is transmitted on a different hop frequency.
  • the device initializing the transmission is designated the master and the device receiving the transmission is designated the slave.
  • the Bluetooth module 60 will allow the consumer touch point 10 to communicate with other
  • Bluetooth enabled peripheral devices including modems, printers and the like.
  • both the consumer touchpoint devices and access controllers are preferably constructed with hardware encryption technologies for secure identification, authentication and content protection.
  • the encryption module 68 implements system-on-chip cryptographic ASIC and customized security software, including FIPS and X9 Financial approved algorithms including Triple-DES, Diffie-Hellman, a Digital Signature Standard (DSS), a Secure Hash Algorithm (SHA-1) and a Non-deterministic Random number generator.
  • the consumer touchpoint device 10 may require the user to enter a password or PIN via the touchscreen display 12, and further to furnish a fingerprint or a voice print, or other biometrics and/or identifying characteristics specific to the authorized user, such as the user's signature, user's facial image, DNA coding sequence through a tissue sample, before the consumer touchpoint device 10 can be activated and employed for conducting certain transactions.
  • the password or other identifying information/characteristics may in modified embodiments include any of the above items and user's name, birth date and social security number, used alone or in various combinations .
  • the biometric sensor 13 of the present invention allows the user to voluntarily submit her fingerprint in a non- invasive manner.
  • the biometric unit 70 of Figure 2 is thus provided for working in combination with the other components including the encryption module 68 to provide secured transactions.
  • the biometric sensor 13 and biometric module 68 comprise an AES4000 EntrePad from AuthenTec, Inc.
  • the AES4000 is based on low-cost CMOS (0.6 micron) semiconductor technology and comprises a small 20 mm by 20 mm by 1.4 mm surface mount package.
  • the consumer touchpoint device 10 is rugged and, importantly, in keeping with a requirement of one aspect of the present invention, has a relatively low power consumption.
  • the AES4000 projects an array of low-power signals, which is focused just below the skin surface, beneath any finger surface contaminations (such as dirt, oil, water and chemicals) and dried, worn-out cuts or abrasions to the skin, to create an electronic image of the finger.
  • the biometric unit 70 then process the scanned information and extracts relevant information including ridge patterns and minutia points. An extraction algorithm is used to produce a reduced data set or template.
  • the biometric sensor 13 may comprise a thermal silicon fingerprint sensor or a capacitive silicon finger print sensor.
  • the biometric sensor 13 and biometric unit 70 provide a high level of protection of consumers' identification information within the consumer touchpoint device 10 and during transit of information from the consumer touchpoint device 10 for authentication.
  • users of the consumer touchpoint device 10 need not memorize a PIN, password or pass phrase to gain access to secure financial services, and are provided with fast, easy and accurate fingerprint entry procedure with Triple-DES hardware encryption prior to transmission.
  • the fingerprint scan, and the reduced data set or template are preferably not stored in the consumer touchpoint device 10, but are stored only at a secure server.
  • the encryption module 68 encrypts the reduced data set or template, along with authentication data, and transmits the resulting encrypted information via the Bluetooth module 60, for example, for processing. Since the information is encrypted, transmitted and processed, and not stored, replay, tampering, stolen identity and fraud are attenuated or eliminated.
  • the secure server is connected behind the knowledge center 121. Thus, a fingerprint cannot be lifted, stolen and/or appropriated by another person from a lost or reverse-engineered consumer touchpoint device.
  • the physical enclosure of the consumer touchpoint device 10 can be arranged in one embodiment such that the content will be tamper-proof, i.e., if it is opened in an unauthorized manner any private information (e.g., the y-TIN, discussed infra) of the user will be destroyed and/or the consumer touchpoint device 10 will no longer be able to routinely function.
  • the enclosure may be arranged such that if it is opened, a change in the flow of current in a current path occurs, e.g., either the existing current flow is interrupted or a current path that has been idle starts to flow. The change in the flow of current may then send a distress or alert signal and/or reset the circuitry, including erasing any proprietary information within the memory.
  • An approach for addressing the concern of unauthorized alteration of configuration or other sensitive data may be addressed by implementing within the consumer touchpoint device 10 memory that can be written only once such as PROM (programmable read-only memory) , WORM (write once, read many) , or the like, the security consideration associated with unauthorized alteration of configuration data is substantially eliminated.
  • PROM programmable read-only memory
  • WORM write once, read many
  • FIG. 5 is a schematic representation illustrating a first set of access controllers 81 defining a first access zone 91, a second set of access controllers 83 defining a second access zone 93, and an Nth set of access controllers 85 defining an Nth access zone 95.
  • Each of the access zones 91, 93, 95 may comprise, for example, from one to about 30 access controllers, and is defined by the cumulative coverage area of low power RF (e.g., Bluetooth) signal from the access controllers in that access zone.
  • the access zones 91, 93, 95 may have circular or oval shapes for example, and may be configured to overlap one another for reasons including tighter or more complete coverage of a given area. For example, access zones may be placed in overlapping disposition to substantially cover the consumer walkways through the aisles of a grocery or department store.
  • each of the access zones comprises a plurality of networked access controllers 81, 83, 85 that are connected via single access controllers 81', 83', 85' to the knowledge center 121 via a WAN. Since the access zones are defined by the presence of access controllers, the access zones are thus provided at homes, work, and within public areas, preferably public areas of commerce which include POSs, ATMs, airports and shopping centers. The access zones are networked through the knowledge center 121 back to, for example, existing web applications and sites 125, including those of businesses and other entities 127 in the categories of financial, services (e.g., transportation) 129, retail 131, and other existing transaction systems 134 .
  • financial, services e.g., transportation
  • Figure 6 is another schematic diagram illustrating the knowledge center 121 of the presently preferred embodiment, connected at its front end to a plurality of consumer touchpoint devices 10 via at least one access zone 91 and further connected to at least one consumer touchpoint device 10 via a cellular carrier station 20.
  • the knowledge center may also be accessed by other conventional consumer devices 136, such as handhelds and PDAs, and by PC browsers 137, for example, via a WAN such as the Internet 139.
  • the knowledge center 121 provides, inter alia, a gateway to the businesses 127 at its back end, and further provides a central management administration console for maintaining a central configuration repository to control and monitor all processes of the entire network of access zones, including processes of the web server, application server, database server and the access controllers (e.g., 81', 83', 85').
  • the knowledge center 121 is preferably constructed using distributed object architectures, for providing language and platform neutral solutions for implementation of business logic.
  • the knowledge center 121 supports open Internet standards, such as Java, XML, EJB, CORBA and relational databases thus enabling the developer to interface with a wide variety of technology platforms.
  • Preferably comprises a distributed objects 141 module for storing information such as biometrics and/or PIN profiles, a meta-data repository 143, data feeds 145, a mainframe 147, an open financial exchange (OFX) module 149, an XML module 151, document storage 153, and a customization module 154.
  • OFX open financial exchange
  • the knowledge center 121 further comprises personalization operations 155, content organization operations 157, other data areas 159, content management 161, process workflow operations 163, other applications 165, event operations 167, security operations 169, publishing operations 171, and integration adapters 173.
  • the knowledge center 121 provides personalized information delivery, device management, subscriber management, security, intelligent content adaptation and location awareness. Businesses at 127 can thus be closer to their customers, allowing the customers a secured, personalized, seamless integration of content and mobile commerce .
  • Figure 7 is yet another schematic diagram showing further features of the knowledge center 121. Recognizing that optimal customer service entails the delivery of the appropriate information at the opportune time, rules engines and tightly integrated content management of the knowledge center 121 allow the knowledge center 121 to carefully and effectively tailor each customer's experience in accordance with the customer's activities the relevant businesses 127.
  • the knowledge center 121 provides modular and customizable transactions with automatic content transcoding, easy manageability, and scalability.
  • the knowledge center 121 is positioned as a secure bridge between consumer users and the relevant businesses 127, providing consumers with limited access to the businesses 127, the Internet, and other applications via cell towers 20.
  • a Location-versus-ID mapping table for tracking each consumer touchpoint device is illustrated in Figure 7, with the x-axis (x- TIN) identifying a geographical location in terms of access zones and the y-axis (y-TIN) identifying the consumer identification in terms of consumer touchpoint device identification numbers.
  • the x-axis may be defined in terms of, for example, a Terminal Identification Number (TIN) of a particular access controller (e.g., 81') corresponding to the access zone that is presently in RF communication with the consumer touchpoint device of interest.
  • the TIN of the controlling access controller e.g., 81', 83', 85'
  • the x-TIN comprises the TIN of the access controller 85' .
  • the x-TIN may comprise the TIN of the particular access controller (e.g., 85) that is under the control of the controlling access controller (e.g., 85') of the access zone (e.g., 95) in communication with the consumer touchpoint device of interest.
  • a unique y-TIN is assigned to each consumer touchpoint device during the initial device activation, and this unique y-TIN is used by the knowledge center 121 to identify the consumer touchpoint device of interest.
  • the knowledge center 121 each time a consumer touchpoint device communicates with an access zone, the knowledge center 121 identifies the consumer touchpoint device by its y-TIN and the corresponding locational x-TIN. Once the knowledge center 121 discerns the WHO (y-TIN) and the WHERE (x-TIN) personalized authentication agents and transactional agents are activated to provide relevant (e.g., previously learned) personalized information concerning the consumer. The knowledge center 121 further activates logistic agents and learning agents to learn new information concerning the consumer' s transactional, geographical, and other activities. This learned information is then stored in the personalized authentication agents and transactional agents for future reference.
  • the WHO and WHERE of the consumer is tracked in realtime in accordance with a preferred embodiment of the present invention.
  • Content delivery from the modular, flexible, and scalable knowledge center 121, and through the associated business 125, can be tailored to users, groups, location, and time.
  • the businesses 125 are thus provided with the ability to extend their reach to consumers, allowing for a secured, personalized, seamless integration of content for mobile commerce and allowing for the unique personalization of the consumer's experience and services based on parameters including who, what, when and where.
  • time/location specific services provided by the knowledge center 121 businesses are able to obtain additional revenue while enhancing loyalty in the competition for customer ownership.
  • consumers are further provided with unlimited access to the same features, e.g., the businesses 125, the Internet, and other applications, when the consumers are within the access zones. Equally important perhaps is the fact that, in accordance with one aspect of the present invention, the businesses 125 are likewise provided with access to the consumers. Recognizing the low-power nature of the Bluetooth technology, the present inventors have discovered a way to harness this wireless technology to generate a pervasive computing network formed of smaller access zones. The pervasive computing network by its nature will perhaps never provide full geographical coverage to the user, since each access controller is configured in the illustrated embodiment to have a diameter of coverage of about 30 m.
  • Access controllers can be distributed and positioned 30 m apart throughout an entire covered shopping mall, for example, to thereby provide the consumer with full access-zone coverage, and free Internet access, throughout the covered shopping mall.
  • a fully functional, credit-card sized consumer touchpoint device 10" (or a device 10) can be carried in the wallet or hand of a consumer as the consumer walks throughout the mall. This small size of the consumer touchpoint device renders the device convenient and non-burdensome.
  • the consumer touchpoint device 10 serving as virtual credit cards and virtual membership cards, will largely due away with many or all of the cards in the consumer's wallet, leaving room in the wallet for the credit-card sized consumer touchpoint device 10".
  • Many consumers may elect to no longer carry wallets, in which case they can carry the consumer touchpoint device 10 in place of their wallets and cell phones.
  • the consumer touchpoint device comprises dimensions of about 127 mm by 76 mm by 25 mm, which dimensions are about the size of a wallet.
  • a unique appeal of the present invention is to provide consumers with a free pervasive, interactive, communications device which the customers will actually use.
  • Business on the other hand, will be able to purchase the consumer touchpoint devices and access controllers for relatively small amounts.
  • a few key businesses will purchase the consumer touchpoint devices at a discounted rate of, for example, $100 per device.
  • a retail bank or other financial institution may be able to save $100 per customer per year if it were able to have the customer perform all of its banking functions on line. In exchange for taking the free consumer touchpoint device, the customer will agree to perform her banking functions thereon.
  • the consumer will utilize applications for home banking, online bank statement reconciliation, on-line payments, and management of accounts using her consumer touchpoint device.
  • the applications will also enable financial services institutions to push (defined, infra) other services or special promotions to their customers to enhance their business.
  • the bank can save additional money on credit cards by issuing the consumer touchpoint devices as virtual credit cards, wherein a transaction is achieved by the user entering her PIN number on the touchscreen and/or touching the biometric.
  • the real-time authorization information is transmitted from the consumer touchpoint device to the knowledge center through the relevant access controller (s) and, subsequently, it is approved and the amount debited from the user's credit card account.
  • a virtual credit card is used at a physical point of sale to perform a real-time transaction, all in the hand of the user.
  • the consumer touchpoint devices can also be licensed to wireless communication services (e.g., cellular). The above approach can enable a large population area, such as Asia, to be provided with pervasive computers whereas many of the people would not otherwise even have computers .
  • the geographical positioning of a majority of the access zone is advantageousc for the businesses 125 to "push" information to the consumer via the consumer touchpoint device.
  • the information pushed to the consumer is preferably provided to have a content and format that is beneficial to the consumer. For example, a consumer within an access zone of a grocery store can enter and transmit the word "soda" on the consumer touchpoint device and seconds later receive a (pulled) message "end of aisle 5" back from the knowledge center 121.
  • the knowledge center 121 can push a discount coupon on a brand of soda to the consumer touchpoint device.
  • a key principle of the present invention is the ability to provide "virtual" information to the consumer, while the consumer is physically present at the relevant physical location (e.g., a point of sale) .
  • Prior art cell-phone technologies for example, would not provide, inter alia, adequate air time and/or sufficient geographical locating capabilities, and a Global Positioning System (GPS) would not be functional within, for example, a shopping mall.
  • GPS Global Positioning System
  • Providing the consumer with "virtual" information e.g., a coupon over the Internet
  • the consumer is browsing the Internet at her residence, for example, is not nearly as effective as providing the virtual information to the consumer while the consumer is physically present at relevant physical location to readily use the virtual information.
  • a synergistic effect is achieved in maintaining an open channel of communication (via, for example, free Internet Access) between the business 125 and the consumer, while the consumer is physically present at the business location.
  • the present invention thus utilizes the principle that sales can be maximized only through proper timing and presentation to the consumer.
  • a consumer who has just had to stop at a toll booth and is about to pay the toll would be most open to applying for a toll-booth debit card at that time, feeling the imposition of having just been stopped and recognizing that the debit card would in the future enable her to drive right through the booth without stopping.
  • the consumer is not afforded the opportunity to acquire the debit card at the time of being stopped, it will generally be much more difficult for the consumer to find the time and motivation to fill out the application form even if the form is provided on the Internet.
  • the consumer is further encouraged to carry and use the compact, consumer touchpoint device to take advantage of free E-mail aggregation and the immediate “pushing" of new E-mails, urgent messages and alerts to the consumer touchpoint device.
  • messages are pushed and instantly made available to the consumer touchpoint device by the knowledge center 121, as distinguished from prior art systems which wait for the consumer to pull or to search for the data as is the case with traditional desktop applications.
  • the consumer is encouraged to carry the consumer touchpoint device 10 for use of the integral cell phone.
  • the access zones support voice transmissions
  • the consumer is provided with free voice communications within the access zones.
  • a consumer within an access zone of an ATM machine can enter a transaction from her consumer touchpoint device, and the ATM under the control of the knowledge center will comply accordingly.
  • the consumer can enter with a single stroke (e.g., with a touch of the biometric sensor 13) a pre-set "quick $50" instruction from the consumer touchpoint device in which case the ATM under the control of the knowledge center will within seconds output $50 thus relieving lines at ATM machines.
  • payments at other commercial outlets will be timely facilitated to reduce lines.
  • the consumer touchpoint device is enabled to provide information (e.g., to push the information) relating to questions such as "Where am I,” “Where am I going,” “How do I get there,” “How is the traffic,” and "What can I find in this neighborhood.”
  • information e.g., to push the information
  • questions such as "Where am I,” “Where am I going,” “How do I get there,” “How is the traffic,” and "What can I find in this neighborhood.”
  • the consumer touchpoint device may suggest (push) the same restaurant based upon the consumer's response to the question.
  • the consumer touchpoint device may recommend (push) a list of Italian restaurants to the consumer, based upon the fact that the consumer tends to eat at Italian restaurants.
  • the knowledge center not only tracks the user's geographical travels and geographical transactions with respect to time, but also tracks the user' s Internet browsing and transactions with respect to time.
  • the knowledge center may suggest (push) ski resorts and lift ticket discounts, for example, when the user enters a resort town of Colorado, U.S.A., without the user ever having asked for the information or informed the knowledge center of the fact that the user likes to ski.
  • Similar examples may apply to a user who regularly review movie-review web pages and travels to an adjacent city for the weekend - the knowledge center may push information to the user regarding movies that are playing at nearby theatres.
  • a user in the grocery store example above who has been determined by the knowledge center to have somewhat of a sweet tooth based on various candy purchases made with the device, may walk through the aisles of a shopping mall (or the aisles of another food store) with the consumer touchpoint device remaining relatively passive until the consumer comes within range of a candy store (or section) .
  • the consumer touchpoint device would immediately notify the consumer of the presence of the candy store when the user merely enters the mall.
  • User modes are contemplated by which the user can adjust the behavior and helpfulness of the consumer touchpoint device.

Abstract

A pervasive computing network is disclosed including a group of first access controllers connected together on a first local area network, with each of the first access controllers including a radio frequency transceiver (60) constructed to transmit and receive radio frequency signals within a range less than about 100 meters and wherein at least two of the ranges of the first access controllers overlap one another and the first access controllers are constructed to communicate with a consumer touchpoint (66) device. The pervasive computing network further includes a group of second access controllers connected together on a second local area network. The pervasive computing device is further provided with both a first communication line connecting the first group of access controllers to a wide area network; a second communication line connecting the second group of access controllers to the wide area network; and a knowlegde center connected to the wide area network in communication with the group of first access controllers and the group of second access controllers.

Description

WIRELESS INTERACTIVE SYSTEM AND METHODOLOGY USING
LOW-POWER-RF-TRANSCEIVER, SECURE PERVASIVE COMPUTING NETWORKS
PRIORITY INFORMATION
This application claims the benefit of U.S. Provisional Application No. 60/202,362, filed May 5, 2000 and entitled Pervasive Computing Network; U.S. Provisional Application No. 60/225,185, filed August 14, 2000 and entitled Pervasive Computing Network Architecture; and U.S. Provisional Application No. 60/226,252, filed August 17, 2000 and entitled Credit-Card Sized PC Card and Communication Device.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to methods and apparatus for communicating electronically, and, more particularly, relates to consumer touchpoint devices for performing electronic functions and transactions.
2. Description of Related Art
Portable electronic communication systems have existed in the prior art. A portable electronic communication system typically permits a user to conduct certain electronic transactions away from a desktop computer, which substantially improves efficiency and convenience to the user. The broad term "electronic transactions" can include transactions conducted via computer networks, automated teller machines (ATM's), automated point-of- sale systems, and the like. Transactions conducted via computer networks may encompass a wide range of transactions, including exchanging information and data via a computer network popularly known as the Internet, e.g., to make a purchase from a vendor on the network. ATM's typically permit users to conduct financial transactions (such as withdrawals, transfers, deposits, and the like) vis-a-vis a financial institution in an electronic manner. Merchants may employ automated point-of-sale systems, for example, to permit users to purchase products or services using the users ' electronic account. The above and perhaps other examples of portable electronic communication systems can be found in popular literature .
Electronic transaction systems typically request the user to provide identification data to authenticate herself as the user authorized to approve the proposed transaction or transactions. The identification data may be required with each transaction, or the identification data may be entered by the user at the start of a session to authenticate herself and enable that user to subsequently perform any number of transactions without further authentication or identification. In the prior art, users are typically required to manually enter the identification data into the electronic transaction system for authentication. Typically, the entry of identification data involves typing in a password on a numeric keypad or on a keyboard. The identification data is then compared with data previously stored within the electronic transaction system, and authentication is satisfied when there is a match.
When the electronic transaction system comprises an automated teller machine (ATM) , a user will typically insert a data card, such as a bank card or a credit card, into a card reader. The data card often includes a magnetic stripe that contains the account number and other information related to the user, which may then be read by card reader. The data stored in the data card enables the electronic transaction system to ascertain the account with which the user wishes to transact business. Via a keypad on the ATM, the user can then enter her identification data, e.g., her personal identification number (PIN), to authenticate herself. If the entered identification data matches the identification data stored in connection with the electronic transaction system, the user is authenticated and granted access to her account. If there is no match, authentication fails. After authentication, the user may be able to, for example, employ a combination of the keypad and a screen to withdraw cash from her account, which results in cash being dispensed from the ATM and the balance in her account within database being reduced.
Since the identification data is not encrypted before being entered into the ATM, the identification data is vulnerable to unauthorized access and procurement. Encryption of the identification data has not been practical in the mentioned prior- art devices due to the complexity and/or inconvenience to the user of performing encryption or memorizing the encrypted identification data.
There are desired apparatus and methods for conducting electronic transactions with portable electronic communication systems that will enhance convenience and substantially attenuate risks of unauthorized access to users' accounts and identification data. Preferably, such an apparatus should be portable and capable of maintaining geographic and other unique user information to permit the user to conveniently and comfortably perform electronic transaction authentications in a variety of environments .
SUMMARY OF THE INVENTION
Portable electronic communication devices and methods of using such devices have been discovered. The portable electronic communication devices are capable of maintaining geographic and other unique user information, and of permitting the user to conveniently and comfortably perform electronic transactions in a variety of environments, thus enhancing user convenience, productivity, security and safety.
In accordance with one aspect of the present invention, a pervasive computing network is disclosed including a group of first access controllers connected together on a first local area network, with each of the first access controllers including a radio frequency transceiver constructed to transmit and receive radio frequency signals within a range less than about 100 meters and wherein at least two of the ranges of the first access controllers overlap one another and the first access controllers are constructed to communicate with a consumer touchpoint device. The pervasive computing network further includes a group of second access controllers connected together on a second local area network, each of the second access controllers including a radio frequency transceiver constructed to transmit and receive radio frequency signals within a range less than about 100 meters, with at least two of the ranges of the second access controllers overlapping one another and the second access controllers being constructed to communicate with the consumer touchpoint device.
The pervasive computing device is further provided with both a first communication line connecting the first group of access controllers to a wide area network; a second communication line connecting the second group of access controllers to the wide area network; and a knowledge center connected to the wide area network in communication with the group of first access controllers and the group of second access controllers, the knowledge center being configured to communicate with the consumer touchpoint device by pushing unrequested data to the consumer touchpoint device when the consumer touchpoint device is within one of the ranges of the group of first access controllers and the group of second access controllers .
These and other advantages of the present invention will become apparent upon reading the following detailed descriptions and studying the various figures of the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure la is a schematic diagram illustrating a consumer touchpoint device geographically disposed about a plurality of consumer touchpoints, in accordance with a presently preferred embodiment of the present invention;
Figure lb is a schematic diagram illustrating other consumer touchpoint devices, also displayed in a field of consumer touchpoints, in accordance with other preferred embodiments of the present invention; Figure 2 is a generalized block diagram of the functional components which comprise the consumer touchpoint device in accordance with a preferred embodiment of the present invention;
Figures 3a and 3b are generalized block diagrams illustrating the consumer touchpoint device in accordance with a presently preferred embodiment;
Figure 4 is a generalized block diagram of a modem access controller and the corresponding connections with interactive devices in accordance with an embodiment of the present invention;
Figure 5 is a schematic representation illustrating a plurality of access zones defined by a corresponding plurality of access controllers in accordance with the presently preferred embodiment;
Figure 6 is another schematic diagram illustrating a knowledge center in accordance with a presently preferred embodiment; and
Figure 7 is yet another schematic diagram showing further features of the knowledge center in accordance with the presently preferred embodiment. DETAILED DESCRIPTION OF THE PRESENTLY PREFERRED EMBODIMENTS
Referring more particularly to the drawings, Figure la illustrates an external view of a consumer touchpoint device 10 in accordance with a presently preferred embodiment of the present invention. The consumer touchpoint device 10 is preferably implemented as a small, self-containing package that is sufficiently ruggedized for daily use in the field. Preferably, the consumer touchpoint device 10 is small enough to be comfortably carried with the user at all times, e.g., as a key chain attachment or a small package that can easily fit inside a purse or a wallet.
The consumer touchpoint device 10 comprises a display and input device such as a touchscreen 12, a biometric sensor 13, navigation buttons 15, an antenna 16 for wireless communication with a cellular tower 20, and a low power radio frequency (RF) transceiver 60 (Figure 2) for communicating with at least one access controller 81 (Figure 5) . As shown in Figure la, the touchscreen 12 is preferably disposed on an upper portion of the consumer touchpoint device 10, and preferably comprises a display screen such as a liquid crystal display (LCD) . The display screen preferably comprises a 16 level grayscale, 320 x 240 pixel LCD with a backlight, but alternatively may comprise a gas plasma display or other type of suitable display. Although gas plasma displays may produce very sharp monochrome images, they require much more power than the presently preferred low power LCD displays. As presently embodied, the touchscreen 12 facilitates input via a user's finger or an attached stylus. The consumer touchpoint device 10 preferably comprises an integrated personal digital assistant (PDA) .
Figure lb illustrates a consumer touchpoint device 10' having a similar construction to that of Figure la and further including a ke'ypad 14. In the illustrated embodiment wherein the consumer touchpoint device 10' is integrated into a PDA and a wireless phone, the display 12 is the display on the portable phone and the keypad 14 serves as the keypad for the wireless phone. The touchscreen 12 of the consumer touchpoint device 10 is similarly constructed, with the touchscreen 12 serving as the keypad for the wireless phone.
Another consumer touchpoint device 10" is illustrated in Figure lb having a size comparable to that of several stacked credit cards. The consumer touchpoint device 10" in the illustrated embodiment is similar to that described in connection with Figure 1, but preferably does not comprise a cellar phone. In a modified embodiment with advanced components, the consumer touchpoint device 10" may comprise a cellular phone as well.
Each access controller 81 (Figure 5) comprises a corresponding low power RF transceiver for communicating with the low power RF transceiver 60 (Figure 2) of the consumer touchpoint device 10, and further comprises a network connection for communicating with a back-end knowledge center 121 (Figure 5) . A key element of the access controllers of the present invention is their relatively low energy usage (e.g., for compactness and portability) and their relatively low cost (for quantity) . Since the invention works best with a large number of access controllers, it is preferred in accordance with one aspect of the present invention that relatively low-power transmissions be used. This feature will help to promote the transition to a large number of access zones . One intuitively might select an RF technology utilizing high power transmissions. It is presently preferred for one exemplary embodiment to have RF transmissions that range in radius from about 100 m in range or less, and more preferably, less than about 15 m radius RF transmissions. In the presently preferred embodiment, the access controllers are integrated into or connected to a variety of electronic devices to allow the consumer touchpoint device 10 to communicate with the knowledge center 121 over a relatively large range of transactional and geographical applications . In the illustrated embodiment of Figure 1, access controllers (e.g., Figure 4 or 81 of Figure 5) are incorporated into or connected to numerous electronic devices to thereby form an automated teller machine (ATM) access controller 25, a point of sale (POS) access controller 27 placed at a physical location at which goods are sold to consumers, a boarding gate access controller 30, a home/hotel telephone access controller 33, a bank teller access controller 35a, a laptop or other portable computer access controller 37, and a personal computer (PC) access controller 39.
In the illustrated embodiment, the PC access controller 39 comprises a free standing access controller 41, which can be connected to the PC via a USB, serial, PC card, or other input/output (I/O) port of the PC. Similarly formed free standing access controllers may be connected to I/O ports of any of the above-mentioned or other electronic devices as a convenient, inexpensive conversion of those electronic devices into access controllers .
Each of the access controllers is either directly or indirectly connected to the knowledge center 121 via a telephone line, communications cable, or other communications link, via (1) another access controller, or (2) a computer, e.g., a PC or laptop, which in turn is connected to a telephone line, communications cable, or communications link. As presently embodied, the access controllers in a certain geographical vicinity are all connected together via, for example, their low power RF transceivers to form a Local Area Network (LAN) , and at least one of the access controllers in the LAN is in turn connected to a telephone line, communications cable, or other communications link for providing all of the access controllers on the LAN with access to the knowledge center 121. In a preferred embodiment, the access controllers of a LAN are connected together via a hub to form an Ethernet, and one of the access controllers on the Ethernet is connected in turn to a communications cable for accessing the knowledge center 121. In this embodiment, the one access controller, in addition to serving as a gateway to the knowledge center 121, is configured to coordinate the operations of the other access controllers on that Ethernet. As presently embodied, each access controller is configured to support up to 30 consumer touchpoint devices and to accordingly perform intra-networking functions among the various consumer touchpoint devices being supported at any given time.
In the illustrated embodiment, each access controller regularly reports to the knowledge center 121 the identifications (y-TINs, defined infra) of the particular consumer touchpoint devices with which the access controller is presently in communication. The knowledge center is thus able to track the location of each consumer touchpoint device 10 by monitoring the access controller (s) with which the consumer touchpoint device 10 is presently in communication. In another embodiment, the access controllers of each access zone regularly report to the coordinating access controller of the access zone the identifications (y-TINs) of the particular consumer touchpoint devices with which the access controllers in that access zone are presently in communication, and the coordinating access controllers regularly report the information to the knowledge center 121. The knowledge center is thus able to track the location of each consumer touchpoint device 10 by monitoring the access zone with which the consumer touchpoint device 10 is presently in communication.
An a preferred embodiment, the one access controller is connected to the knowledge center 121 via the Internet. In any event, the access controllers preferably can be managed remotely, over for example the knowledge center 121 network, from a management center via, for example, SNMP interfaces. The access controllers may further be monitored and managed through the knowledge center 121.
The Ethernet connecting the access controllers may comprise, for example, an Ethernet 802.3 (10/100Base T) connection using RJ 45 connectors, or may comprise a wireless Ethernet 802.11 system utilizing moderate range RF wireless connections. In another embodiment, a plurality of the access controllers in a vicinity are networked together via moderate range RF connections using a HomeRF protocol, which is sponsored by the HomeRF Working Group, Inc. and which may be implemented using, inter alia, BB160 PC Adapter cards and related components manufactured by Motorola, Inc. In alternative embodiments, connections can include wireless modems, other wireless LANs, wireless Personal Area Networks (PANs), cellular telephone networks, digital communication systems, etc. connecting the access controllers to one another.
The one access controller in the LAN that is connected to the telephone line, communications cable, or other communications link (directly or via a computer) may comprise, for example, a modem, a USB connection, or a serial port connection (e.g., RS-232) for providing a communication link of the access controller to the knowledge center 121. The bank teller access controller 35a, for example, may be connected to a serial port connection of a PC, and the PC may comprise a modem for providing a connection to the knowledge center 121. A number of other access controllers, such as a second bank teller access controller 35b and a third bank teller access controller 35c, are then connected to the bank teller access controller 35a via, for example, on an Ethernet. Each access controller may be formed within the electronic device or may comprise a configuration similar to the free-standing access controller 41. Free standing access controllers may be connected to, for example, an ATM, POS, boarding gate, telephone, bank teller, laptop computer or PC, to thereby form an ATM access controller 25, POS access controller 27, boarding gate access controller 30, telephone access controller 33, bank teller access controller 35a, laptop computer access controller 37, and PC access controller 39.
In applications wherein only a single access controller is used, i.e., the access controller is not provided on a LAN with other access controllers, the single access controller itself will of course need to be connected to the telephone line, communications cable, or other communications link (directly or via a computer) . Such a single access controller may comprise, for example, a modem, a USB connection, or a serial port connection (e.g., RS-232) for providing a communication link of the access controller to the knowledge center 121. A modem access controller can be integrated into any of the above access controllers and, further, is provided in accordance with the present invention in a separate housing as a simple low cost unit.
The modem access controller, as illustrated in Figure 4, preferably comprises a high-speed V.90 secured Public Switched Telephone Network (PSTN) dial-up device for providing access to the knowledge center 121. The term PSTN refers to the international telephone system based on copper wires carrying analog voice data. This is in contrast to newer telephone networks base on digital technologies, such as ISDN and FDDI. Telephone service carried by the PSTN is often referred to as plain old telephone service (POTS) . The modem access controller further comprises a Bluetooth protocol RF Transceiver for communicating with consumer touchpoint devices 10. The modem access controller is thus able to interface with consumer touchpoint devices at one end using for example Bluetooth technology, and to interface with the PSTN through modem dial-up at the other end.
The above discussed access controllers, including modem access controllers, can be deployed into existing commerce systems such as set forth in Figure 1 and further including, for example, computer terminals in a network, portable devices, and other electronic devices used in connection with the financial industry (e.g., securities trading), medical (e.g., hospitals), transportation, food (e.g., vending machines), petroleum (e.g., gas pumps), retailing, gaming (e.g., casinos), entertainment (e.g., convention centers), manufacturing (e.g., supply-chain management), educational (e.g., universities), telecom and mobile suppliers, media entertainment, law enforcement, government (e.g., automated library check-out terminals), and other industry sectors . In accordance with one aspect of the present invention, the access zones are particularly suited for residential, working, and densely populated areas where transactions are likely to occur. Businesses using the access controllers of the present invention can realize advantages such as expediting payment processing, reducing errors, tracking item-level movements and providing sales and promotion analyses.
Other electronic devices in addition to those illustrated in Figure 1 may be configured to accommodate or be connected to access controllers 81, 83, 85. Access controllers may be placed in free-standing form at various locations, as well. For example, one or more free standing access controllers similar to the freestanding controller 41 may be placed, for example, in a sitting area of the boarding gate 30, or may be placed throughout the aisles of a department store, warehouse, or supermarket in combination with, for example, a point of sale 27 access controller. The above-discussed access devices, and their configurations and connections, may be used in whole or in part with the other illustrated and discussed embodiments of the present invention. In addition, all combinations of the presently disclosed consumer touchpoint devices, access devices, and electronic devices of the preceding paragraphs which are not mutually inconsistent or incompatible are also included within the scope of the present invention. A unifying principle in accordance with one aspect of the present invention is to provide a pervasive computer network of interconnected access devices for communicating with low-power consumer touchpoint devices via relatively low-power, short range RF transmissions .
Figure 2 illustrates, in a simplified manner and in accordance with one aspect of the present invention, the hardware for implementing a consumer touchpoint device 10. Although illustrated in block diagram form, a high level hardware implementation of the consumer touchpoint device 10 may comprise combinations of, discrete logic, programmable logic, one or more application-specific integrated circuits (ASICs), or the like. The random access memory may comprise some form of random access memory (RAM) such as static RAM and/or dynamic RAM, and the flash memory 56 comprises some form of read only memory (ROM) which does not lose information, even when the power is turned off. The flash memory 56 can be implemented using other forms of nonvolatile memory (NVM) such as electrically programmable read-only memory (EPROM) , electrically erasable, programmable read-only memory (EEPROM) , or the like. The ROM of course comprises comprises a ROM BIOS, which is used to store information for, inter alia, starting up the consumer touch point device 10. Moreover, other types of optical memory or magnetic memory may be employed in addition to or as an alternative to the mentioned memory components .
A battery 52 provides power to the circuitry of the consumer touchpoint device 10. A microprocessor 54 executes codes stored in flash memory 56 and employs random access memory 58 for the execution. The microprocessor 54 preferably operates on a Linux operating system. The random access memory may comprise static RAM or dynamic RAM, both of which are known in the art. In a preferred embodiment, the microprocessor 54, flash memory 56, random access memory 58, LAN and serial communication ports (not shown), display circuitry 64, and encryption module 68, for example, are implemented on a single chip. The cellular chipset 62 is configured to support voice and secure data communications via cellular and similar networks including GSM, CDMA and PHS . A short-range RF Transceiver, such as the Bluetooth module 60, and an optional cell phone chipset 62 are both coupled to microprocessor 54. Communication of the consumer touchpoint device 10 to and from cellular towers and access controllers is accomplished under control of microprocessor 54 via the Bluetooth module 60 and the cell phone chipset 62, respectively. As presently embodied, the consumer touchpoint device 10 can access the Internet and the knowledge center 121 through either the cellular or Bluetooth channels. The flash memory 56 preferably comprises an HTML browser for accessing the Internet and reading E-mail, stock quotes, weather, scores, etc. By way of example, computer languages such as Java by Sun Microsystems Inc. of Mountain View, Calif, or ActiveX by Microsoft Corp. of Redmond, Wash, or HDML
(Handheld Device Markup Language) by Unwired Planet, Inc. of Redwood City, Calif., may be employed as well. The display circuitry 64 controls the display 12 of Figure 1, and the user input circuitry 66 controls and corresponds functionally to the keypad 14 of Figure 1. As presently embodied, the knowledge center 121 is configured to dynamically transform any standard HTML web page and to deliver the converted content as either HTML, or CHTML (Compact HTML) for HTTP devices or as WML for WAP
(Wireless Application Protocol) devices, thereby reducing the need to create device specific pages or web sites for the consumer touchpoint device 10.
The Bluetooth module 60 in accordance with the present invention utilizes Bluetooth technology, which is a low-powered, short-range, cable replacement, radio technology system that allows products containing Bluetooth technology (see www.bluetooth.com) to be interconnected via wireless communication. Bluetooth uses the 2.4 GHz Instrumentation, Science, Medical (ISM) unlicensed band. The RF transceivers of the consumer touchpoint devices and the access controllers are preferably set to a nominal range of 10 meters. In accordance with a preferred embodiment, they are set to have a range of 15 meters, for a resulting 30 m radius of coverage for each access controller. A spectrum of hop frequencies are utilized beginning at the lowest frequency which is 2402 MHz and each of the hop frequencies is 1 MHz above the next lower frequency. A connection may be made between the two RF transceivers by sending a page message. Such a page message can include a train of 16 identical page messages on 16 different hop frequencies. Packet data transmitted is preferably TCP/IP based. The system may use a Synchronous Connection Oriented (SCO) link for point-to-point, full duplex links, normally used in voice communication. For the application described herein, the Asynchronous Connectionless Link (ACL) may be used. ACL provides one frame duration links with full duplex communications . ACL communications use a time division duplex scheme. A first slot provides a transmission from the master to the slave and a second slot provides a transmission from the slave to the master. Each slot is transmitted on a different hop frequency. The device initializing the transmission is designated the master and the device receiving the transmission is designated the slave. Of course, the Bluetooth module 60 will allow the consumer touch point 10 to communicate with other
Bluetooth enabled peripheral devices, including modems, printers and the like.
Strong end-to-end security protection between the consumer touchpoint device, access controllers, and the knowledge center 121, is preferably harnessed to insure maximum privacy and security for consumers and businesses. Accordingly, both the consumer touchpoint devices and access controllers are preferably constructed with hardware encryption technologies for secure identification, authentication and content protection. In accordance with the illustrated embodiment of Figure 2 , the encryption module 68 implements system-on-chip cryptographic ASIC and customized security software, including FIPS and X9 Financial approved algorithms including Triple-DES, Diffie-Hellman, a Digital Signature Standard (DSS), a Secure Hash Algorithm (SHA-1) and a Non-deterministic Random number generator.
The consumer touchpoint device 10 may require the user to enter a password or PIN via the touchscreen display 12, and further to furnish a fingerprint or a voice print, or other biometrics and/or identifying characteristics specific to the authorized user, such as the user's signature, user's facial image, DNA coding sequence through a tissue sample, before the consumer touchpoint device 10 can be activated and employed for conducting certain transactions. The password or other identifying information/characteristics may in modified embodiments include any of the above items and user's name, birth date and social security number, used alone or in various combinations .
It is noted that the public at large has generally accepted the fingerprint to be a proven and simple method of positive identification. The biometric sensor 13 of the present invention allows the user to voluntarily submit her fingerprint in a non- invasive manner. The biometric unit 70 of Figure 2 is thus provided for working in combination with the other components including the encryption module 68 to provide secured transactions. As presently embodied, the biometric sensor 13 and biometric module 68 comprise an AES4000 EntrePad from AuthenTec, Inc. The AES4000 is based on low-cost CMOS (0.6 micron) semiconductor technology and comprises a small 20 mm by 20 mm by 1.4 mm surface mount package.
The consumer touchpoint device 10 is rugged and, importantly, in keeping with a requirement of one aspect of the present invention, has a relatively low power consumption. The AES4000 projects an array of low-power signals, which is focused just below the skin surface, beneath any finger surface contaminations (such as dirt, oil, water and chemicals) and dried, worn-out cuts or abrasions to the skin, to create an electronic image of the finger. The biometric unit 70 then process the scanned information and extracts relevant information including ridge patterns and minutia points. An extraction algorithm is used to produce a reduced data set or template. In modified embodiments, the biometric sensor 13 may comprise a thermal silicon fingerprint sensor or a capacitive silicon finger print sensor.
In accordance with an aspect of the present invention, the biometric sensor 13 and biometric unit 70 provide a high level of protection of consumers' identification information within the consumer touchpoint device 10 and during transit of information from the consumer touchpoint device 10 for authentication. Thus, users of the consumer touchpoint device 10 need not memorize a PIN, password or pass phrase to gain access to secure financial services, and are provided with fast, easy and accurate fingerprint entry procedure with Triple-DES hardware encryption prior to transmission.
The fingerprint scan, and the reduced data set or template, are preferably not stored in the consumer touchpoint device 10, but are stored only at a secure server. For instance, the encryption module 68 encrypts the reduced data set or template, along with authentication data, and transmits the resulting encrypted information via the Bluetooth module 60, for example, for processing. Since the information is encrypted, transmitted and processed, and not stored, replay, tampering, stolen identity and fraud are attenuated or eliminated. In a preferred embodiment, the secure server is connected behind the knowledge center 121. Thus, a fingerprint cannot be lifted, stolen and/or appropriated by another person from a lost or reverse-engineered consumer touchpoint device.
The physical enclosure of the consumer touchpoint device 10 can be arranged in one embodiment such that the content will be tamper-proof, i.e., if it is opened in an unauthorized manner any private information (e.g., the y-TIN, discussed infra) of the user will be destroyed and/or the consumer touchpoint device 10 will no longer be able to routinely function. By way of example, the enclosure may be arranged such that if it is opened, a change in the flow of current in a current path occurs, e.g., either the existing current flow is interrupted or a current path that has been idle starts to flow. The change in the flow of current may then send a distress or alert signal and/or reset the circuitry, including erasing any proprietary information within the memory. An approach for addressing the concern of unauthorized alteration of configuration or other sensitive data may be addressed by implementing within the consumer touchpoint device 10 memory that can be written only once such as PROM (programmable read-only memory) , WORM (write once, read many) , or the like, the security consideration associated with unauthorized alteration of configuration data is substantially eliminated.
Figure 5 is a schematic representation illustrating a first set of access controllers 81 defining a first access zone 91, a second set of access controllers 83 defining a second access zone 93, and an Nth set of access controllers 85 defining an Nth access zone 95. Each of the access zones 91, 93, 95 may comprise, for example, from one to about 30 access controllers, and is defined by the cumulative coverage area of low power RF (e.g., Bluetooth) signal from the access controllers in that access zone. The access zones 91, 93, 95 may have circular or oval shapes for example, and may be configured to overlap one another for reasons including tighter or more complete coverage of a given area. For example, access zones may be placed in overlapping disposition to substantially cover the consumer walkways through the aisles of a grocery or department store.
In the illustrated embodiment of Figure 5, each of the access zones comprises a plurality of networked access controllers 81, 83, 85 that are connected via single access controllers 81', 83', 85' to the knowledge center 121 via a WAN. Since the access zones are defined by the presence of access controllers, the access zones are thus provided at homes, work, and within public areas, preferably public areas of commerce which include POSs, ATMs, airports and shopping centers. The access zones are networked through the knowledge center 121 back to, for example, existing web applications and sites 125, including those of businesses and other entities 127 in the categories of financial, services (e.g., transportation) 129, retail 131, and other existing transaction systems 134 .
Figure 6 is another schematic diagram illustrating the knowledge center 121 of the presently preferred embodiment, connected at its front end to a plurality of consumer touchpoint devices 10 via at least one access zone 91 and further connected to at least one consumer touchpoint device 10 via a cellular carrier station 20. As shown in Figure 6, the knowledge center may also be accessed by other conventional consumer devices 136, such as handhelds and PDAs, and by PC browsers 137, for example, via a WAN such as the Internet 139. The knowledge center 121 provides, inter alia, a gateway to the businesses 127 at its back end, and further provides a central management administration console for maintaining a central configuration repository to control and monitor all processes of the entire network of access zones, including processes of the web server, application server, database server and the access controllers (e.g., 81', 83', 85').
The knowledge center 121 is preferably constructed using distributed object architectures, for providing language and platform neutral solutions for implementation of business logic. The knowledge center 121 supports open Internet standards, such as Java, XML, EJB, CORBA and relational databases thus enabling the developer to interface with a wide variety of technology platforms. Preferably comprises a distributed objects 141 module for storing information such as biometrics and/or PIN profiles, a meta-data repository 143, data feeds 145, a mainframe 147, an open financial exchange (OFX) module 149, an XML module 151, document storage 153, and a customization module 154. E-mail aggregation of all of the consumer's E-mail accounts, for example, is provided by the knowledge center 121 in accordance with one aspect of the present invention. In the illustrated embodiment, the knowledge center 121 further comprises personalization operations 155, content organization operations 157, other data areas 159, content management 161, process workflow operations 163, other applications 165, event operations 167, security operations 169, publishing operations 171, and integration adapters 173. The knowledge center 121 provides personalized information delivery, device management, subscriber management, security, intelligent content adaptation and location awareness. Businesses at 127 can thus be closer to their customers, allowing the customers a secured, personalized, seamless integration of content and mobile commerce .
Figure 7 is yet another schematic diagram showing further features of the knowledge center 121. Recognizing that optimal customer service entails the delivery of the appropriate information at the opportune time, rules engines and tightly integrated content management of the knowledge center 121 allow the knowledge center 121 to carefully and effectively tailor each customer's experience in accordance with the customer's activities the relevant businesses 127. The knowledge center 121 provides modular and customizable transactions with automatic content transcoding, easy manageability, and scalability. In accordance with a preferred embodiment of the present invention, the knowledge center 121 is positioned as a secure bridge between consumer users and the relevant businesses 127, providing consumers with limited access to the businesses 127, the Internet, and other applications via cell towers 20.
A Location-versus-ID mapping table for tracking each consumer touchpoint device is illustrated in Figure 7, with the x-axis (x- TIN) identifying a geographical location in terms of access zones and the y-axis (y-TIN) identifying the consumer identification in terms of consumer touchpoint device identification numbers. The x-axis may be defined in terms of, for example, a Terminal Identification Number (TIN) of a particular access controller (e.g., 81') corresponding to the access zone that is presently in RF communication with the consumer touchpoint device of interest. Put another way, the TIN of the controlling access controller (e.g., 81', 83', 85') of the access zone that is in communication with the consumer touchpoint device is used. As an example, if the consumer touchpoint device of interest is in an access zone 95, then the x-TIN comprises the TIN of the access controller 85' . For greater accuracy, the x-TIN may comprise the TIN of the particular access controller (e.g., 85) that is under the control of the controlling access controller (e.g., 85') of the access zone (e.g., 95) in communication with the consumer touchpoint device of interest. As presently embodied, a unique y-TIN is assigned to each consumer touchpoint device during the initial device activation, and this unique y-TIN is used by the knowledge center 121 to identify the consumer touchpoint device of interest.
In accordance with the presently preferred embodiment, each time a consumer touchpoint device communicates with an access zone, the knowledge center 121 identifies the consumer touchpoint device by its y-TIN and the corresponding locational x-TIN. Once the knowledge center 121 discerns the WHO (y-TIN) and the WHERE (x-TIN) personalized authentication agents and transactional agents are activated to provide relevant (e.g., previously learned) personalized information concerning the consumer. The knowledge center 121 further activates logistic agents and learning agents to learn new information concerning the consumer' s transactional, geographical, and other activities. This learned information is then stored in the personalized authentication agents and transactional agents for future reference.
Thus, the WHO and WHERE of the consumer is tracked in realtime in accordance with a preferred embodiment of the present invention. Content delivery from the modular, flexible, and scalable knowledge center 121, and through the associated business 125, can be tailored to users, groups, location, and time. The businesses 125 are thus provided with the ability to extend their reach to consumers, allowing for a secured, personalized, seamless integration of content for mobile commerce and allowing for the unique personalization of the consumer's experience and services based on parameters including who, what, when and where. With the time/location specific services provided by the knowledge center 121, businesses are able to obtain additional revenue while enhancing loyalty in the competition for customer ownership.
Importantly, consumers are further provided with unlimited access to the same features, e.g., the businesses 125, the Internet, and other applications, when the consumers are within the access zones. Equally important perhaps is the fact that, in accordance with one aspect of the present invention, the businesses 125 are likewise provided with access to the consumers. Recognizing the low-power nature of the Bluetooth technology, the present inventors have discovered a way to harness this wireless technology to generate a pervasive computing network formed of smaller access zones. The pervasive computing network by its nature will perhaps never provide full geographical coverage to the user, since each access controller is configured in the illustrated embodiment to have a diameter of coverage of about 30 m.
However, the low-power requirements for the commensurate short-range transmissions of the Bluetooth technology render the access zones of the present invention ideal for miniaturization of the consumer touchpoint devices 10. Access controllers can be distributed and positioned 30 m apart throughout an entire covered shopping mall, for example, to thereby provide the consumer with full access-zone coverage, and free Internet access, throughout the covered shopping mall. A fully functional, credit-card sized consumer touchpoint device 10" (or a device 10) can be carried in the wallet or hand of a consumer as the consumer walks throughout the mall. This small size of the consumer touchpoint device renders the device convenient and non-burdensome. It is quite possible that the consumer touchpoint device 10", serving as virtual credit cards and virtual membership cards, will largely due away with many or all of the cards in the consumer's wallet, leaving room in the wallet for the credit-card sized consumer touchpoint device 10". Many consumers may elect to no longer carry wallets, in which case they can carry the consumer touchpoint device 10 in place of their wallets and cell phones. As presently embodied, the consumer touchpoint device comprises dimensions of about 127 mm by 76 mm by 25 mm, which dimensions are about the size of a wallet.
In accordance with a method of the present invention, a unique appeal of the present invention is to provide consumers with a free pervasive, interactive, communications device which the customers will actually use. Business, on the other hand, will be able to purchase the consumer touchpoint devices and access controllers for relatively small amounts. In one embodiment, a few key businesses will purchase the consumer touchpoint devices at a discounted rate of, for example, $100 per device. A retail bank or other financial institution may be able to save $100 per customer per year if it were able to have the customer perform all of its banking functions on line. In exchange for taking the free consumer touchpoint device, the customer will agree to perform her banking functions thereon. For example, the consumer will utilize applications for home banking, online bank statement reconciliation, on-line payments, and management of accounts using her consumer touchpoint device. The applications will also enable financial services institutions to push (defined, infra) other services or special promotions to their customers to enhance their business. Moreover, the bank can save additional money on credit cards by issuing the consumer touchpoint devices as virtual credit cards, wherein a transaction is achieved by the user entering her PIN number on the touchscreen and/or touching the biometric. The real-time authorization information is transmitted from the consumer touchpoint device to the knowledge center through the relevant access controller (s) and, subsequently, it is approved and the amount debited from the user's credit card account. In effect, a virtual credit card is used at a physical point of sale to perform a real-time transaction, all in the hand of the user. When other businesses license the touchpoint devices and access to the knowledge center (and perhaps pay a portion of the cost for the consumer touchpoint devices) , similarly to that discussed above in connections with financial instructions, costs are reduced further with the other businesses realizing similar benefits. As more and more businesses join, costs are reduced and all entities realize greater profits. The consumer touchpoint devices can also be licensed to wireless communication services (e.g., cellular). The above approach can enable a large population area, such as Asia, to be provided with pervasive computers whereas many of the people would not otherwise even have computers .
Of particular importance is the fact that the consumer is encouraged to spend time within the access zones of, for example, shopping malls in order to attain the free Internet access, E-mail aggregation, and other features. The geographical positioning of a majority of the access zone, however, is idyllic for the businesses 125 to "push" information to the consumer via the consumer touchpoint device. The information pushed to the consumer (in addition to regular information pulled by the consumer) is preferably provided to have a content and format that is beneficial to the consumer. For example, a consumer within an access zone of a grocery store can enter and transmit the word "soda" on the consumer touchpoint device and seconds later receive a (pulled) message "end of aisle 5" back from the knowledge center 121. At that time, or when the consumer gets to aisle 5, the knowledge center 121 can push a discount coupon on a brand of soda to the consumer touchpoint device. A variety of examples and applications will be readily apparent from this example, when taken in context with the present detailed description of this present invention.
A key principle of the present invention is the ability to provide "virtual" information to the consumer, while the consumer is physically present at the relevant physical location (e.g., a point of sale) . Prior art cell-phone technologies, for example, would not provide, inter alia, adequate air time and/or sufficient geographical locating capabilities, and a Global Positioning System (GPS) would not be functional within, for example, a shopping mall. Providing the consumer with "virtual" information (e.g., a coupon over the Internet) while the consumer is browsing the Internet at her residence, for example, is not nearly as effective as providing the virtual information to the consumer while the consumer is physically present at relevant physical location to readily use the virtual information.
The degree to which businesses have been permitted access to consumers, by way of traditional desktop applications, has been somewhat limited. Generally, a business could send an Email and hope it would be read, and not deleted, by the consumer. The Email sent by the business may not be read for days or weeks. The other option that has been available to business has been for the businesses to place promotional and other information on the businesses web page, in which case the business is again left hoping that the consumer will take the initiative to visit the web page. Thus, traditional prior art business promotional activities have been limited by, for example, timing (e.g., the consumer may not read the message until it is old or stale) and volume (e.g., few messages are effectively delivered to the consumer) .
A synergistic effect is achieved in maintaining an open channel of communication (via, for example, free Internet Access) between the business 125 and the consumer, while the consumer is physically present at the business location. The present invention thus utilizes the principle that sales can be maximized only through proper timing and presentation to the consumer. As an example, a consumer who has just had to stop at a toll booth and is about to pay the toll would be most open to applying for a toll-booth debit card at that time, feeling the imposition of having just been stopped and recognizing that the debit card would in the future enable her to drive right through the booth without stopping. On the other hand, if the consumer is not afforded the opportunity to acquire the debit card at the time of being stopped, it will generally be much more difficult for the consumer to find the time and motivation to fill out the application form even if the form is provided on the Internet.
In addition to the provision of relevant "pulled" and "pushed" information in accordance with the present invention, the consumer is further encouraged to carry and use the compact, consumer touchpoint device to take advantage of free E-mail aggregation and the immediate "pushing" of new E-mails, urgent messages and alerts to the consumer touchpoint device. Anytime a consumer is within an access zone, messages are pushed and instantly made available to the consumer touchpoint device by the knowledge center 121, as distinguished from prior art systems which wait for the consumer to pull or to search for the data as is the case with traditional desktop applications. Moreover, the consumer is encouraged to carry the consumer touchpoint device 10 for use of the integral cell phone. In an embodiment wherein the access zones support voice transmissions, the consumer is provided with free voice communications within the access zones.
As another example, a consumer within an access zone of an ATM machine can enter a transaction from her consumer touchpoint device, and the ATM under the control of the knowledge center will comply accordingly. For example, the consumer can enter with a single stroke (e.g., with a touch of the biometric sensor 13) a pre-set "quick $50" instruction from the consumer touchpoint device in which case the ATM under the control of the knowledge center will within seconds output $50 thus relieving lines at ATM machines. Similarly, payments at other commercial outlets will be timely facilitated to reduce lines. As yet another example, the consumer touchpoint device is enabled to provide information (e.g., to push the information) relating to questions such as "Where am I," "Where am I going," "How do I get there," "How is the traffic," and "What can I find in this neighborhood." if a business traveler arrives in a foreign city, she can use her consumer touchpoint device to receive the names of Italian restaurants close to her hotel (a pull communication) and, subsequently, the knowledge center may generate coupons (a push communication) for one or more of the restaurants. The next day the consumer touchpoint device may push the question "How was your dinner at the Restaurante' ?" The following year, when the consumer arrives in the same city, the touchpoint device may suggest (push) the same restaurant based upon the consumer's response to the question. When the consumer arrives in a different city the consumer touchpoint device may recommend (push) a list of Italian restaurants to the consumer, based upon the fact that the consumer tends to eat at Italian restaurants.
In accordance with another aspect of the present invention, the knowledge center not only tracks the user's geographical travels and geographical transactions with respect to time, but also tracks the user' s Internet browsing and transactions with respect to time. Thus,' in the above example, if the is known or has been learned by the knowledge center to regularly check the skiing conditions via the Internet with the consumer touchpoint device during winter months, the knowledge center may suggest (push) ski resorts and lift ticket discounts, for example, when the user enters a resort town of Colorado, U.S.A., without the user ever having asked for the information or informed the knowledge center of the fact that the user likes to ski. Similar examples may apply to a user who regularly review movie-review web pages and travels to an adjacent city for the weekend - the knowledge center may push information to the user regarding movies that are playing at nearby theatres. A user in the grocery store example above, who has been determined by the knowledge center to have somewhat of a sweet tooth based on various candy purchases made with the device, may walk through the aisles of a shopping mall (or the aisles of another food store) with the consumer touchpoint device remaining relatively passive until the consumer comes within range of a candy store (or section) . In another embodiment, the consumer touchpoint device would immediately notify the consumer of the presence of the candy store when the user merely enters the mall. User modes are contemplated by which the user can adjust the behavior and helpfulness of the consumer touchpoint device.
The many features and advantages of the present invention are apparent from the written description, and thus, it is intended by the appended claims to cover all such features and advantages of the invention. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation as illustrated and described. Hence, all suitable modifications and equivalents may be resorted to as falling within the scope of the invention.

Claims

CLAIMS :
1. A pervasive computing network, comprising: a plurality of first access controllers connected together on a first local area network, each of the first access controllers including a radio frequency transceiver constructed to transmit and receive radio frequency signals within a range less than about 100 meters, wherein at least two of the ranges of the first access controllers overlap one another and the first access controllers are constructed to communicate with a consumer touchpoint device ; a first communication line connecting the first plurality of access controllers to a wide area network; a plurality of second access controllers connected together on a second local area network, each of the second access controllers including a radio frequency transceiver constructed to transmit and receive radio frequency signals within a range less than about 100 meters, wherein at least two of the ranges of the second access controllers overlap one another and the second access controllers are constructed to communicate with the consumer touchpoint device; a second communication line connecting the second plurality of access controllers to the wide area network; and a knowledge center connected to the wide area network in communication with the plurality of first access controllers and the plurality of second access controllers, the knowledge center being configured to communicate with the consumer touchpoint device by pushing unrequested data to the consumer touchpoint device when the consumer touchpoint device is within one of the ranges of the plurality of first access controllers and the plurality of second access controllers.
2. The pervasive computing network as set forth in Claim 1, wherein the plurality of first access controllers and the plurality of second access controllers are constructed to communicate with the consumer touchpoint device using Bluetooth technology.
PCT/US2001/014809 2000-05-05 2001-05-07 Wireless interactive system and methodology using low-power-rf-transceiver, secure pervasive computing networks WO2001086556A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001261273A AU2001261273A1 (en) 2000-05-05 2001-05-07 Wireless interactive system and methodology using low-power-rf-transceiver, secure pervasive computing networks

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US20236200P 2000-05-05 2000-05-05
US60/202,362 2000-05-05
US22518500P 2000-08-14 2000-08-14
US60/225,185 2000-08-14
US22625200P 2000-08-17 2000-08-17
US60/226,252 2000-08-17

Publications (1)

Publication Number Publication Date
WO2001086556A1 true WO2001086556A1 (en) 2001-11-15

Family

ID=27394413

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/014809 WO2001086556A1 (en) 2000-05-05 2001-05-07 Wireless interactive system and methodology using low-power-rf-transceiver, secure pervasive computing networks

Country Status (2)

Country Link
AU (1) AU2001261273A1 (en)
WO (1) WO2001086556A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198932A (en) * 2005-04-29 2008-06-11 雷曼兄弟有限公司 Appointment scheduling system and method
US9697505B2 (en) 2014-09-19 2017-07-04 International Business Machines Corporation Automated financial transactions

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5918213A (en) * 1995-12-22 1999-06-29 Mci Communications Corporation System and method for automated remote previewing and purchasing of music, video, software, and other multimedia products
US5991737A (en) * 1996-03-11 1999-11-23 Connexus Corporation Automated consumer response to publicly broadcast information
US6026375A (en) * 1997-12-05 2000-02-15 Nortel Networks Corporation Method and apparatus for processing orders from customers in a mobile environment
US6038545A (en) * 1997-03-17 2000-03-14 Frankel & Company Systems, methods and computer program products for generating digital multimedia store displays and menu boards
US6055513A (en) * 1998-03-11 2000-04-25 Telebuyer, Llc Methods and apparatus for intelligent selection of goods and services in telephonic and electronic commerce
US6055514A (en) * 1992-03-20 2000-04-25 Wren; Stephen Corey System for marketing foods and services utilizing computerized centraland remote facilities

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6055514A (en) * 1992-03-20 2000-04-25 Wren; Stephen Corey System for marketing foods and services utilizing computerized centraland remote facilities
US5918213A (en) * 1995-12-22 1999-06-29 Mci Communications Corporation System and method for automated remote previewing and purchasing of music, video, software, and other multimedia products
US5991737A (en) * 1996-03-11 1999-11-23 Connexus Corporation Automated consumer response to publicly broadcast information
US6038545A (en) * 1997-03-17 2000-03-14 Frankel & Company Systems, methods and computer program products for generating digital multimedia store displays and menu boards
US6026375A (en) * 1997-12-05 2000-02-15 Nortel Networks Corporation Method and apparatus for processing orders from customers in a mobile environment
US6055513A (en) * 1998-03-11 2000-04-25 Telebuyer, Llc Methods and apparatus for intelligent selection of goods and services in telephonic and electronic commerce

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198932A (en) * 2005-04-29 2008-06-11 雷曼兄弟有限公司 Appointment scheduling system and method
US9697505B2 (en) 2014-09-19 2017-07-04 International Business Machines Corporation Automated financial transactions
US10121128B2 (en) 2014-09-19 2018-11-06 International Business Machines Corporation Automated financial transactions
US10535048B2 (en) 2014-09-19 2020-01-14 International Business Machines Corporation Automated financial transactions

Also Published As

Publication number Publication date
AU2001261273A1 (en) 2001-11-20

Similar Documents

Publication Publication Date Title
US20020136214A1 (en) Pervasive computing network architecture
US7003495B1 (en) Portable electronic authorization system and method
KR100953232B1 (en) Electronic transaction methods therefor
US6327570B1 (en) Personal business service system and method
AU2007261072B2 (en) Consumer authentication system and method
AU2004203589B2 (en) System and method for processing financial transactions
US7080037B2 (en) Portable electronic authorization system and method
US20030220876A1 (en) Portable electronic authorization system and method
US20050108096A1 (en) Portable electronic authorization system and method
US20090212909A1 (en) Portable electronic authorization system and method
US8348155B2 (en) All in one card
CN106936587A (en) Consumer authentication system and method
KR20060008900A (en) Payment apparatus and method
US20120323710A1 (en) Method and system for storing and using identifying account information on an electronic device
US20050068190A1 (en) Personal retail tool and server system
WO2001086556A1 (en) Wireless interactive system and methodology using low-power-rf-transceiver, secure pervasive computing networks
KR20020004891A (en) System and Method of targeted advertisement in a card-joined store using Internet
US10078850B2 (en) Personal business service system and method
KR200209604Y1 (en) PC-integrated cyber money settlement and charging system
WO2005043438A1 (en) Portable electronic authorization system and method
KR20050006628A (en) System and method for processing an electronic-receipt
US20070118473A1 (en) Close proximity transactional mobile system
MXPA01008234A (en) System and method for processing financial transactions

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP