WIRELESS COMMUNICATION
20180131408 ยท 2018-05-10
Assignee
Inventors
Cpc classification
H04W4/80
ELECTRICITY
H04L63/18
ELECTRICITY
H04W12/04
ELECTRICITY
H04B5/20
ELECTRICITY
H04W12/37
ELECTRICITY
G06F21/606
PHYSICS
International classification
H04B5/00
ELECTRICITY
Abstract
A method of transferring data between a first device and a second device comprises: bringing a first object into an activation zone of a near-field communication module so as thereby to establish a near-field communication link between the module and the first object. The near-field communication module sends a control signal to at least one of the first and second devices to begin a second communication session through a second, different channel between the first and second devices and the data is transferred between the first device and the second device in the second communication session. The second communication session is ended if the first object is removed from the activation zone.
Claims
1. A method of transferring data between a first device and a second device comprising: bringing a first object into an activation zone of a near-field communication module so as thereby to establish a near-field communication link between said module and said first object; said near-field communication module sending a control signal to at least one of said first and second device to begin a second communication session through a second, different channel between said first and second devices; transferring said data between said first device and said second device in said second communication session; and ending said second communication session if said first object is removed from said activation zone.
2. The method of claim 1, wherein beginning said second communication session comprises activating a communication link on the second channel.
3. A method of transferring data between a first device and a second device comprising: bringing a first object into an activation zone of a near-field communication module so as thereby to establish a near-field communication link between said module and said first object; said near-field communication module sending a control signal to at least one of said first and second device to change a second communication session through a second, different channel between said first and second devices from a first state to a second state; transferring said data between said first device and said second device in said second communication session; and changing said second communication session from the second state to the first state if said first object is removed from said activation zone.
4. The method as claimed in claim 3, comprising adjusting an output power associated with said second communication session according to a sensed proximity between said first object and said near-field communication module.
5. The method as claimed in claim 3, comprising adjusting a data transfer rate associated with said second communication session according to a sensed proximity between said first object and said near-field communication module.
6. The method as claimed in claim 3, comprising sending a status check signal on said near-field communication link to confirm that said first object is within the activation zone of said near-field communication module.
7. The method as claimed in claim 6, comprising sending the status check signal periodically.
8. The method as claimed in claim 3, comprising sending a compatibility check signal on said near-field communication link to confirm that said first and second devices support said second channel.
9. The method as claimed in claim 3, comprising sending an object identity check signal on said near-field communication link to confirm an identity of said first object and activating said second communication channel only if the identity of said first object is approved.
10. The method as claimed in claim 3, comprising sending an object identity check signal or a further object identity check signal on said near-field communication link to confirm the identity of said first object while the second communication channel is active.
11. The method as claimed in claim 3, comprising sending a near-field communication module identity check signal on said near-field communication link to confirm the identity of said near-field communication module and activating said second communication channel only if the identity of said near-field communication module is approved.
12. The method as claimed in claim 3, comprising sending a near-field communication module identity check signal or a further near field communication module identity check signal on said near-field communication link to confirm the identity of said near field communication module while the second communication channel is active.
13. The method as claimed in claim 3, wherein said second communication session has a greater level of security than other communication links on said second channel.
14. The method as claimed in claim 3, wherein said second communication session comprises an encrypted connection between said first and second devices.
15. The method as claimed in claim 14, wherein the encrypted connection utilises an Advanced Encryption Standard (AES) cipher.
16. The method as claimed in claim 15, wherein the AES cipher comprises a stream cipher.
17. The method as claimed in claim 15, wherein the AES cipher is operated in a counter mode.
18. The method as claimed in claim 14, wherein the encrypted connection comprises a cipher block chaining message authentication code (CBC-MAC).
19. The method as claimed in claim 3, comprising sending one or more challenge-response parameters automatically over either of said first or second communication channels.
20. The method as claimed in claim 3, comprising utilising a near-field communication link to transfer a response to a challenge initiated on said second communication session.
21. The method as claimed in claim 3, comprising generating a first encryption key.
22. The method as claimed in claim 21, comprising transferring further encryption keys over said encrypted connection.
23. The method as claimed in claim 22, comprising transferring said further encryption keys periodically.
24. The method as claimed in claim 22, comprising transferring said further encryption keys upon request.
25. The method as claimed in claim 3, wherein said first device comprises said first object.
26. The method as claimed in claim 3, wherein the near-field communication module comprises a standalone device that enables communications between the first and second devices.
27. The method as claimed in claim 3, wherein said second device comprises said near-field communication module.
28. The method as claimed in claim 3, wherein said second channel is wireless.
29. The method as claimed in claim 28, wherein said second channel is one selected from the group comprising: Bluetooth?, Bluetooth? Low Energy, wireless local area network and ZigBee?.
30. A system comprising a first device and a second device arranged to: establish a near-field communication link between a near-field communication module and a first object when said first object is brought into an activation zone of said module; send a control signal from said near-field communication module to at least one of said first and second device to begin a second communication session through a second, different channel between said first and second devices; transfer data between said first device and said second device in said second communication session; and end said second communication session if said first object is removed from said activation zone.
31. A near-field communication module arranged to: establish a near-field communication link with a first object when said first object is brought into an activation zone of said module; send a control signal to at least one of a first and second device to begin a second communication session through a second, different channel between said first and second devices; and end said second communication session if said first object is removed from said activation zone.
32. A device comprising a near-field communication module arranged to: establish a near-field communication link with a first object when said first object is brought into an activation zone of said module; send a control signal to begin a second communication session through a second, different channel between said device and a further device; and end said second communication session if said first object is removed from said activation zone.
Description
[0044] Certain embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings in which:
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053] The first NFC module 106 and first WLAN module 108 communicate with one another via a series of control signals 114. Similarly, the second NFC module 110 and second WLAN module 112 communicate with one another via a series of control signals 116.
[0054] When the devices 102, 104 are brought sufficiently close to one another such that they are within the NFC activation zone (not shown), an NFC communication link 118 is established between them. The NFC modules 106, 110 send control signals 114, 116 to their respective WLAN modules 108, 112 in order to instruct them to initiate a WLAN communication session between the two devices 102, 104. Data 120 is then transferred between the devices 102, 104 via this WLAN communication system.
[0055] If the devices 102, 104 are separated such that they are no longer within range of the NFC activation zone, the NFC 118 and WLAN 120 communication sessions are terminated.
[0056]
[0057] In this particular embodiment, the first device 202 again comprises an NFC module 206 and a WLAN module 208. The first NFC module 106 and first WLAN module 108 communicate with one another via a series of control signals 114.
[0058] The second device 216 comprises a WLAN module 212. A standalone NFC unit 204 comprises an NFC module 210. Note that there are no control signals sent between the second device and the NFC unit as they are separate devices.
[0059] When the first device 202 and NFC unit 204 are brought into each other's NFC activation zone, an NFC communication link 218 is established between the first device 202 and the NFC unit 204. Once this link 218 is established, the NFC module 206 sends control signals 214 to the first device's WLAN module 208 in order to instruct it to begin establishing a WLAN communication session with the second device 216. Data is then transferred via a WLAN communication session 220 between the first and second devices 202, 216.
[0060] If the first device 202 and the NFC unit 204 are separated, the NFC 218 and WLAN 220 communication sessions are terminated, thus severing the connection between the first and second devices 202, 216.
[0061]
[0062] With reference to
[0063] With reference to
[0064] Once the devices have authenticated with one another, a Bluetooth? connection 408 is established between the first and second devices 402, 404. The NFC connection 406 may then be used for Secure Simple Pairing (SSP), as defined in the Bluetooth? specification, to exchange a new key between the devices to provide an encrypted communication link. Bluetooth? v4.0 supports Advanced Encryption Standard (AES), a symmetric encryption protocol (i.e. the same key is used for both encryption and decryption), typically operated in AES-CCM mode. This Bluetooth? connection 408 then provides encrypted communication between the first and second devices 402, 404. For as long as the Bluetooth? connection 408 remains active, the first and second devices 402, 404 can periodically exchange encryption keys for future use. In order to establish encrypted communication using AES-CCM, the devices exchange: master and slave Session Key Diversifier (SKDm, SKDs) parameters, and master and slave Initialization Vectors (IVm, IVs).
[0065] This arrangement then allows for refreshing the encrypted session using either the existing key or alternatively using a new key. When using a new key, the authentication or pairing procedure using NFC is repeated.
[0066] This connection will persist until the NFC connection 406 is terminated by physically separating the devices beyond the NFC activation zone (not shown), or until the Bluetooth? connection 408 is manually terminated by the user.
[0067]
[0068] At an initial time 512, the devices are sufficiently far apart that the distance 506 between them is greater than the proximity threshold 508. The devices transmit data to one another at an upper transmission power level 514.
[0069] The two devices are then brought closer to one another until such a time 518 that the distance 506 between the two devices is brought below the proximity threshold 508. At this point 518, the devices are determined to be sufficiently close that less power is required to successfully send data via the Bluetooth? communication link and the transmission power 510 is reduced from the upper transmission power level 514 to a lower transmission power level 516 accordingly. The devices are then kept stationary and within the NFC activation from time 520 onwards.
[0070]
[0071] At an initial time 612, the devices are sufficiently far apart that the distance between them is greater than the proximity threshold 608. The devices transmit data to one another at a lower data rate 614.
[0072] The two devices are then brought closer to one another until such a time 618 that the distance between the two devices is brought below the proximity threshold 608. At this point, the devices are determined to be sufficiently close that data can be sent via the Bluetooth? communication link at a higher rate without unacceptable errors and the data rate 610 is increased from the lower data rate 614 to a higher data rate 616 accordingly. The devices are then kept stationary and within the NFC activation from time 620 onwards.
[0073]
[0074] This system is particularly advantageous to provide parental controls to prevent children accessing the internet without supervision. In order to access the internet via the WLAN network, an NFC token possessed only by a responsible adult is required. In
[0075] With reference to
[0076]
[0077] Once the smartphone 806 is within the activation zone of the computer 802, an authentication procedure is carried out via the NFC connection 808 in order to establish a secure communication link 810 with the network storage device 804. All data transferred via the secure communication link 810 is encrypted to ensure that the content is unusable to unauthorised third parties. The secure communication link 810 exists only as long as the NFC connection 808 remains active, and so removing the smartphone 806 from the NFC activation zone causes the secure communication link 810 to be terminated immediately.
[0078] Thus it will be seen that a wireless communication system has been described in which NFC can be used to enable or modify the nature of the wireless communication. Although particular embodiments have been described in detail, it will be appreciated by those skilled in the art that many variations and modifications are possible using the principles of the invention set out herein.