ELECTRONIC DEVICE IDENTIFICATION
20210406861 · 2021-12-30
Inventors
- Sean Anthony Edmiston (Tintenbar, NSW, AU)
- Carl Norman (Glenmore Park, NSW, AU)
- Michael John Wilson (Coogee, NSW, AU)
Cpc classification
G06Q20/208
PHYSICS
G06Q20/206
PHYSICS
H04L63/0853
ELECTRICITY
H04L63/0876
ELECTRICITY
International classification
Abstract
A system and method to identify an electronic device 5, by detecting spurious emissions 4 in the form of electromagnetic waves which are radiated from the device 5. Once identified, the device 5 may be used to authorise an action associated with the device, such as, a financial transaction conducted at a user terminal 3 in a retail outlet.
Claims
1. A system to authenticate the identity of an electronic device being used in a financial transaction, and, if validated, then authorise the financial transaction, the system including: a spectral emission detector, incorporated in or associated with a point-of-sale (POS) terminal for a user to conduct a financial transaction, the detector being configured to detect any near-field spurious emissions over a spectral frequency range emanating from said electronic device positioned proximal to said detector; a memory, containing a stored signature, the stored signature being representative of the spurious emission profile of a respective electronic device; and, a processor, configured to compare said detected spurious emission with said stored signature, and, if the identity of said electronic device is validated, authorise the financial transaction.
2. The system as claimed in claim 1, wherein said electronic device includes a mobile phone, an electronic watch, an electronic key, a computer, or any other electronic device which is carried by, implanted in, used by or otherwise typically associated with a particular user; wherein said POS terminal is a POS terminal in a retail outlet, a financial institution, a restaurant, or any other service industry; and wherein the system is used in combination with another authentication apparatus or method such as but not limited to: a bCODE scanner; a QR code scanner; a PIN device; a biometric apparatus; an image scanner; a temperature scanner; and, a signal sniffer detector.
3. (canceled)
4. (canceled)
5. The system as claimed in claim 1, wherein the system uses a plurality of detectors for detection of spurious emissions from a plurality of electronic devices.
6. The system as claimed in claim 1, wherein said detector is adapted to detect spurious electromagnetic waves emanating from a user's electronic device and thereby produce said detected spurious emission profile: wherein said electromagnetic waves includes any one or combination of radio waves, microwaves, or other high-frequency waves; wherein the detector includes at least one antenna to detect characteristics of electromagnetic waves emitted from at least one electronic device, the characteristics including any one or combination of: frequency, frequency range, or sets of frequencies; intensity; modulation; signal shape; and, change in emission characteristics; and wherein said processor uses an algorithm based on a combination of characteristics of the spurious emissions to determine if the identity of said electronic device is validated.
7. (canceled)
8. (canceled)
9. (canceled)
10. The system as claimed in claim 1, wherein said memory or said processor is located remote from the detector(s), and communication therebetween is via a dedicated or public communication channel or via the internet.
11. The system as claimed in claim 1, wherein said memory is in the form of a database, which is adapted to store a plurality of stored signatures, each representative of a respective user's electronic device.
12. The system as claimed in claim 1, wherein a predetermined variance is permitted in determining whether the detected spurious emission matches the stored signature.
13. The system as claimed in claim 1, wherein the detected spurious emission includes a primary peak and two secondary peaks smaller than the primary peak, wherein one secondary peak has a lower frequency than the primary peak, and the other secondary peak has a higher frequency than the primary peak, and wherein the processor is configured to compare the two secondary peaks with the stored signature to validate the identity of the electronic device; wherein the processor is optionally configured to ignore the primary peak when comparing the detected spurious emission with the stored signature.
14. (canceled)
15. The system as claimed in claim 1, wherein the detector is configured to detect spurious emissions emanating from the electronic device while the electronic device is not being operated by the user.
16. A method to authenticate the identity of an electronic device being used in a financial transaction, and, if validated, then authorise the financial transaction, the method including the steps of: detecting any near-field spurious emissions over a spectral frequency range emanating from said electronic device positioned proximal to a spectral emission detector, wherein the detector is incorporated in or associated with a point-of-sale terminal for a user to conduct a financial transaction; comparing the detected spurious emissions with a stored signature which is representative of a spurious emission profile of the electronic device; and, authorising the financial transaction if the identity of said electronic device is validated.
17. The method as claimed in claim 16, wherein, in said comparing step, said detected spurious emissions from said electronic device are compared with a plurality of stored signatures stored in a database; wherein an algorithm is used which is based on a combination of characteristics of the spurious emissions to determine if the identity of said electronic device is verified; and wherein a predetermined variance is permitted in determining whether the detected spurious emissions matches the stored signature.
18. (canceled)
19. (canceled)
20. The method as claimed in claim 16, wherein the detected spurious emission includes a primary peak and two secondary peaks smaller than the primary peak, wherein one secondary peak has a lower frequency than the primary peak, and the other secondary peak has a higher frequency than the primary peak, and wherein, in said comparing step, the two secondary peaks are compared with the stored signature to validate the identity of the electronic device.
21. The method as claimed in claim 20, wherein, in said comparing step, the primary peak is ignored when comparing the detected spurious emission with the stored signature.
22. The method as claimed in claim 16, wherein, in said detecting step, the spurious emissions emanating from the electronic device are detected while the electronic device is not being operated by the user.
23. (canceled)
24. (canceled)
25. (canceled)
26. (canceled)
27. (canceled)
28. (canceled)
29. (canceled)
30. A system for authorising a financial transaction, including: a point-of-sale (POS) terminal, for a user to initiate a financial transaction; a spectral emission detector, associated with said POS terminal, adapted to detect any near-field spurious emissions over a spectral frequency range emanating from a user's electronic device, the user's electronic device positioned proximal to said detector, and to define a detected signature representative of the user's electronic device; a memory, containing a plurality of stored signatures, each stored signature being representative of the spurious emission profile of a respective user's electronic device; and a processor, adapted to compare said detected signature with said stored signatures, and, when a match is identified, provide an authorisation signal to the POS terminal to authorise the financial transaction.
31. The system for authorising a financial transaction as claimed in claim 30, further including a plurality of POS terminals and detectors associated therewith.
32. The system for authorising a financial transaction as claimed in claim 30, wherein each POS terminal is a POS terminal in a retail outlet, a financial institution, a restaurant, or any other service industry; and wherein each POS terminal and detector optionally includes another authentication apparatus such as but not limited to: a bCODE scanner; a QR code scanner; a PIN device; a biometric apparatus; an image scanner; a heat scanner; and a signal sniffing detector.
33. (canceled)
34. The system for authorising a financial transaction as claimed in claim 30, wherein said memory and processor are located remotely from each POS terminal and associated detector.
35. The system for authorising a financial transaction as claimed in claim 30, wherein the system operates by: receiving a request to initiate a financial transaction by a user at a point-of-sale (POS) terminal for the user to conduct a financial transaction; detecting any near-field spurious emissions over a spectral frequency range emanating from an electronic device presented by the user and positioned proximal to a spectral emission detector associated with said POS terminal; comparing said detected spurious emissions or a detected signature representative thereof with a stored signature profile for the respective user's electronic device; and, authorising the financial transaction by providing an authorisation signal to the POS terminal when the detected emissions or signature matches said stored signature profile.
36. (canceled)
37. (canceled)
38. (canceled)
39. (canceled)
40. The system for authorising a financial transaction as claimed in claim 30, wherein said processor is adapted to: receive an input signal representative of a near-field spurious emission over a spectral frequency range emanated from an electronic device presented to a point-of-sale (POS) terminal by a user and positioned proximal to a spectral emission detector to conduct a financial transaction; compare said detected spurious emissions with at least one stored signature, each stored signature being representative of a spurious emission profile of a respective electronic device; validate the identity of said electronic device; and, provide an authorisation signal to the POS terminal to authorise the financial transaction; and wherein said processor is located remotely from said POS terminal.
41. (canceled)
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0087] The present invention will become more fully understood from the following detailed description of preferred but non-limiting embodiments thereof, described in connection with the accompanying drawings, wherein:
[0088]
[0089]
[0090]
[0091]
[0092]
[0093]
[0094]
[0095]
[0096]
[0097]
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
[0098] Throughout the drawings, like numerals will be used to identify like features, except where expressly otherwise indicated.
[0099]
[0100] The system 1, includes a detector 3, a memory 6, and, a processor 7. The detector 3 is adapted to detect a ‘spurious’ emission 4 of electromagnetic waves from the electronic device 5.
[0101] The electronic device 5 may be any electronic device, such as a mobile phone, an electronic watch, an electronic key, a computer, or any other electronic device which is carried by, implanted in, used, or otherwise typically associated with a particular user.
[0102] Throughout this specification, the term ‘spurious’ emission is used to define any unintended, unwanted, or out of band emission, which is inherent in any electronic device. That is, a ‘spurious’ emission should be understood to include any electromagnetic radiation or signal which emanates from an electronic device, which, when powered, is not deliberately or intentionally created or transmitted from the device. This may include, without limitation, any electromagnetic signal emission of any frequency, a harmonic or other signal, a parasitic emission, and intermodulation product, a frequency conversion product, or noise, etc. which may be outside the intended emissions of the electronic device.
[0103] The inventor has identified that the ‘spurious’ emission profile from each electronic device is unique to that particular device. This unique ‘spurious’ emission profile, is somewhat analogous to a ‘fingerprint’ for that particular device, and will herein be referred to as the unique ‘signature’ for that device. The ‘signature’ for each electronic device can therefore, in accordance with the present invention, be captured and stored, and thereafter, be compared with a ‘detected’ or measured ‘signature’ to determine whether it matches and therefore authenticates the measured ‘signature’.
[0104] As will however be appreciated by persons skilled in the art, all physical electronic components have a natural variation or tolerance. Modern manufacturing techniques can minimise but not eliminate this tolerance, since it is inherent to the physical construction of each component. The unintentional, or spurious radio emissions, given off by all electronic devices is sensitive to the tolerances of the various electronic components used.
[0105] Throughout this specification, the term ‘user’ also is intended to have broad definition, and may include, without limitation, any person initiating an action. This may include, for example, a transaction of a buyer, a seller, a merchant, a customer, a vendor, a purchaser, etc. Likewise, the term ‘user terminal’ should also have broad definition, and should include any terminal or like apparatus which a user may use to conduct the transaction, whether or not owned by the user, a vendor, or otherwise. Similarly, the term ‘user's device’, ‘user's electronic device’, and like terms should also be construed broadly to include any electronic device which may be used by a person to conduct an action, including a transaction, and may include a mobile phone, smart phone or cell phone, an electronic watch, or any other device which may be carried by or implanted in a person which may be capable of being used to conduct a transaction.
[0106] Referring back to
[0107] The processor 7 of the system 1 is then adapted to compare the spurious emission detected by the detector 3, and, determine if the identity of the electronic device 5 is validated.
[0108]
[0109]
[0110]
[0111] The user terminal 2 may include an input/output device, including, for example, a keypad 8, and display device 9, for a user to initiate a transaction, and, to display information back to the user in relation to the progress of the transaction.
[0112] Once a transaction is initiated by, for example, a user providing input information via the keypad 8, the detector 3 may be activated. The detector 3 may include an antenna 10 which can detect electromagnetic waves 4 spuriously emitted from a user's electronic device 5.
[0113] A processor 11 may then generate a signature which is representative of the electromagnetic waves spuriously emitted from the user's electronic device 5.
[0114] A system processor 6 may include a comparator 12 which compares this detected signature with a signature which is previously stored in a memory 7 of the system processor 6. When the detected signature matches the stored signature, the processor 6 provides an authentication signal back to the user terminal to thereby authenticate a transaction.
[0115] As such, it will be understood that the present invention therefore provides authentication that the particular user's electronic device 5 is being used, determined by validating that the electromagnetic waves emitted from the electronic device 5 and substantially identical to a predetermined signature of that particular device 5.
[0116] As will be understood by persons skilled in the art, the detector 3 and/or processor 7 used in the present invention preferably detect and/or process ‘near field’ signals.
[0117] That is, the system of the present invention is preferably implemented to detect only the spurious emission signals which emanate from the phone or other electronic device which is held in close proximity to the scanner or user terminal 3, using an appropriate antenna, detection circuit and/or processing circuitry.
[0118] This is important such that only the spurious emissions signals which are coming from the relevant phone/electronic device, and not from other nearby ‘noise’ sources, are detected and processed. As will be appreciated by persons skilled in the art, ‘spurious emissions’ are given off by any electronic device, so, by using a ‘near field’ detector, this will ensure that any extraneous ‘noise’ signals emanating from other electronic devices, etc. which happen to be in the vicinity of the particular electronic device which is desired to be detected, will not cause interference with the signals which are desired to be detected. Therefore, by using a ‘near field’ detector, and by positioning the phone or other electronic device in close proximity to the detector, this problem is minimised.
[0119] Furthermore, from a fraud prevention perspective, this is ensures that only the particular phone conducting the transaction, and not a nearby phone, is being detected.
[0120]
[0121] As shown in
[0122] As will be understood by persons skilled in the art, the electronic device may be any one from a large group of devices. These devices are preferably portable in nature, such as, but not limited to a user's smart phone, smart watch, laptops or tablet computer, etc. The electronic device could also be a device which is implanted in a user, for example under the users skin on or near their hand or wrist, for convenience of use.
[0123] The user terminal may take a variety of forms, but may typically be a point-of-sale (POS) terminal in a retail outlet, a financial institution, a restaurant, etc.
[0124] The electromagnetic waves spuriously emitted from the electronic device and thereafter detected by the detector, may be any one or combination of a variety of different frequency waves, including, for example, radio waves, microwaves or other high frequency waves.
[0125] The electromagnetic waves may have a number of different characteristics which may, in the present invention be used separately or in any combination. These may typically include frequency, a frequency range and/or sets of frequencies, intensity, signal shape and/or change in emission characteristics, etc.
[0126] For example, the Applicant has been monitoring frequencies of electromagnetic waves less than about 200 kHz, however, it will be understood by persons skilled in the art that other frequency signals may be alternatively or additionally monitored in implementing the invention.
[0127] Once the electromagnetic signals are detected, the processor may provide a signature which is uniquely representative of the particular device. This may be obtained using an algorithm which uses any combination of the detected characteristics of the electromagnetic waves. It will be appreciated by persons skilled in the art that the specifics of any algorithm will be variable depending upon the frequencies, strengths, and other characteristic of the electromagnetic waves which are spuriously emitted from the particular device(s) to be detected, and the detection circuitry used to detect these spurious emissions. As such, persons skilled in the art will appreciate that a wide variety of algorithms may be used, and the specifics of the algorithms will be apparent to persons skilled in the art.
[0128] One such algorithm may determine a match of location (frequency) and height (amplitude) of the prominent peaks in the waveform. The matching may be performed by calculating a score based on how close each of these peaks are (where 1 is a perfect match and anything less than a perfect match is less than 1).
[0129] An alternative algorithm may be used when the signature consists of the 2 dimensional image such as
[0130] An alternative algorithm may focus on secondary peaks.
[0131] Various other algorithms or signal processing techniques will become apparent to persons skilled in the art.
[0132] The present invention is preferably embodied using a plurality of user terminals, each of which is capable of detecting the waves emanating from a plurality of user's electronic devices.
[0133] Each user terminal is preferably located remotely from the central processor and adapted to communicate via any known communications channel, either hard-wired or wireless, and/or via the internet.
[0134] The processor is preferably able to store a plurality of stored signatures, each representative of a respective user's electronic device.
[0135] Whilst a high level of accuracy is preferred in the authentication apparatus and method of the present invention, a certain amount of variance may be permitted as to whether a stored signature is determined to match a detected signature. This may typically allow for variances due to changes in the usual electromagnetic waves which may emanate from the same device, due to, for example, using a different number of apps in the device.
[0136] The authentication apparatus and method of the present invention may be utilised on its own, or in conjunction with other known authentication method, such as, but not limited to, a bCODE scanner, a QR code scanner, a PIN device, and/or a biometric authentication device.
[0137] As will be appreciated, the present invention utilises some known components, such as, user point-of-sale terminals, the internet as a communication channel, and the user's existing electronic devices, such as smart phones, smart watches etc. Some of these components, and their interaction will now be briefly described.
[0138] The antenna 10 intercepts at least some of the electromagnetic waves radiated by an electronic device and produces an electric current at its terminals. The antenna may be an individual antenna or a collection of antennas operating as an array.
[0139] A front-end processor 3 may connect the antenna to the receiver user terminal 2. The front-end processor may condition the signal for improved reception by the receiver user terminal 2, by providing signal filtering, signal amplification and impedance matching, etc.
[0140] The receiver user terminal 2 may typically sample and process the signals received from the antenna 10 and front-end processor 3. The receiver user terminal may typically include an analog-to-digital converter, a computer for processing the signals, data storage and input and output interfaces.
[0141] An algorithm may typically run in the processor 2, to process the received signals. The algorithm thereby produces a “signature” for the mobile device based on the received signals (the mobile device's “signature”).
[0142] The processor 6 may then check if the electronic device's signature matches the stored or reference signature. This check could additionally be associated with a bCODE transaction.
[0143] The electronic device may typically be any portable device used for any transaction, and may include smart phones, mobile phones, cell phones, smart watches, tablets, computers etc. or any other electronic device for conducting a transaction.
[0144] When referring to a ‘transaction’, this term should also be construed broadly, and may include, but is not limited to; any form of financial or commercial transaction; including payments, ticketing, vouchers, marketing coupons and loyalty transactions; building assess control; parking entry/exit; airline, bus, rail or other transportation ticketing and/or check-in; goods, parcel, courier and/or postal collection; government services such as food stamps, vouchers for immunisations; etc.
[0145] The antenna 10 senses the signal provided by the electronic device and produces a signal.
[0146] The front-end processor 2 then receives the signal from the antenna 10 and conditions the signal with the aim of providing improved reception and processing by the receiver 2 and algorithm.
[0147] The receiver 2 is the system that is used to sample and process the signals received from the antenna and front-end processor 2.
[0148] The algorithm may typically be implemented in software. This software is executed on the computing subsystem of the receiver 2. The algorithm produces the electronic device's signature that is used for security verification.
[0149] The processor may then check if the mobile device's signature matches the stored 1 reference signature, which may be held in a database 2 on a remote server 6.
[0150] Users may change the particular electronic device that they use. The overall system will then be capable of managing the different signatures associated with a single user.
[0151] It will be appreciated that the system of the present invention uses a different method of verifying a transaction from traditional approaches.
[0152] The present invention may be used alone, or, in conjunction with other known mobile transaction methods, such as bCODE transaction verification, to support and therefore provide an increased level of security in a transaction.
[0153] It will be understood by persons shown in the art that various modifications may be made to the invention which may optimise the invention.
[0154] For example the frequency range of the signals measured can be changed to maximise performance.
[0155] The Antenna may be optimised to improve sensitivity.
[0156] The receiver and algorithm may be varied and optimised to improve or alter the signature derived from the measurements.
[0157] Increasing the available computing power will to enable more and finer-detailed information to be extracted for identification.
[0158] Improving the algorithm's ability to extract a mobile device's signature will lead to improved identification.
[0159] It will therefore be appreciated that the present invention provides an additional layer of security for transactions, particularly using smart phones and like mobile electronic devices.
[0160] The invention may be used alone, or in conjunction with other technology to support bCODE transactions, which include payments, ticketing, vouchers and loyalty transactions, or uses the apparatus in association with a QR code scanner.
[0161] Mobile device identification can provide enhanced transaction security that is seamless for the customer. When a bCODE is scanned the mobile device's signature can also be captured. No other action is required by the customer.
[0162] The Applicant's early test results show that various levels of identification may be possible. The simplest level of identification is being able to recognise the make and the model of a mobile device (e.g. mobile phone). One issue is that many people can have a phone of the same make and model.
[0163] A second level of identification is being able to recognise individual mobile devices. Early testing results show that individual phones can be identified even when multiple phones of the same make and model are present.
[0164] The mobile device identification system will have a relatively low-cost when compared with the equipment used in compliance testing laboratories. The system will also operate in uncontrolled environments, unlike the tightly controlled test environments.
[0165] Relatively low-cost means that the mobile device identification system can be deployed in large numbers.
[0166] The mobile device identification system does not rely on personal or biometric information. This provides many security advantages ranging from the point of sale right through the supporting network infrastructure.
[0167] One convenient aspect of mobile device identification is that the mobile device that holds the bCODE is also the device whose signature is measured. This can be contrasted with, for example, scanning a bCODE and then trying to photograph the customer in a retail environment.
[0168]
[0169] Both the detector 30 and secondary authentication apparatus 31 may be integrated in a single user terminal to which the user's device 35 is presented for identification. The spurious emissions 36 from the user's device 35 will be detected by the detector 30 as hereinbefore described, whilst, the additional authentication shown by arrow 37 may, for example, scan a QR code the code or other code shown on the display of the user's device 35.
[0170]
[0171] In
[0172] In
[0173] Another range of interest is 2-5 GHz. This is more difficult and therefore more costly. However it has the benefit that the radio wavelengths are now smaller than the size of the phone. This allows even better localization of the signal to remove external noise sources.
[0174] Frequencies between 0 and 1 MHz over a period of 1 second as shown in
[0175] In
[0176] In particular,
[0177] These signals may be compared, to determine whether or not they match, using ‘peak scoring’ techniques, that is, by careful observation and comparison of the ‘peaks’ of the spurious emissions which are measured. That is, they may be compared using traditional signal processing techniques and/or algorithmic techniques based on the location and height of peaks in the signals. The peaks are marked in the graphs with a small ‘x’, for ease of identification.
[0178]
[0179]
[0180]
[0181] Whilst this example shows the detection of spurious emissions within the particular frequency of 1 to 2 MHz, persons skilled in the art will appreciate that a wide variety of frequency ranges may be utilised. Selection of the frequency ranges and other characteristics of the spurious emissions sought to be detected will depend on the particular electronic devices, etc. that are to be measured/detected.
[0182]
[0183] The present invention therefore provides a system to identify an electronic device based on the detection of spurious emissions radiated from the electronic device. When a particular electronic device is identified or authenticated, an action is thereafter authorised the action may include a financial transaction or any other action.
[0184] In the preferred implementation of the invention hereinbefore described, the ‘action’ is associated with a financial transaction, and the apparatus is embodied in the form of a user terminal typically provided in a retail outlet.
[0185] The authentication method as hereinbefore described may be utilised on its own as a sole form of identification of the electronic device to authorise a transaction. Alternatively, the system and method of the present invention can be utilised in combination with another authentication apparatus. This may include a B code scanner, a QR code scanner, a pin device, a biometric apparatus, etc.
[0186] Alternatively, the electronic device may be used for a different form of ‘action’ other than a financial transaction. For example, the electronic device, may alternatively be used to operate a lock on, for example, a door. Once authorised or validated, the door may be opened for access by a user. Other similar actions may likewise be authorised, as will become apparent to persons skilled in the art.
[0187] As hereinbefore described, the system of the present invention is adapted to detect spurious emissions of electromagnetic waves emanating from a user's device to be processed and then authenticated. As will be understood by person skilled in the art, electromagnetic waves have a variety of characteristics which may be utilised either alone or in any combination stop such characteristics include frequency, frequency range and/or sets of frequencies, intensities, modulation, signal shape, and changing emission characteristics. The system of the present invention may optimally utilise an algorithm based on any desired combination of these characteristics, as will be readily understood by person skilled in the art.
[0188] Where ever it is used, the word “comprising” is to be understood in its “open” sense, that is, in the sense of “including”, and thus not limited to its “closed” sense, that is the sense of “consisting only of”. A corresponding meaning is to be attributed to the corresponding words “comprise”, “comprised” and “comprises” where they appear.
[0189] It will be understood that the invention disclosed and defined herein extends to all alternative combinations of two or more of the individual features mentioned or evident from the text. All of these different combinations constitute various alternative aspects of the invention.
[0190] While particular embodiments of this invention have been described, it will be evident to those skilled in the art that the present invention may be embodied in other specific forms without departing from the essential characteristics thereof. The present embodiments and examples are therefore to be considered in all respects as illustrative and not restrictive, and all modifications which would be obvious to those skilled in the art are therefore intended to be embraced therein.