REMOTE CONTROLLED LED BASED ID EMITTER AND DEPLOYMENT, AND APPLICATION OF SAME TO MULTI-FACTOR AUTHENTICATION
20170339561 · 2017-11-23
Inventors
Cpc classification
H04L67/125
ELECTRICITY
G08C2201/42
PHYSICS
H10K59/00
ELECTRICITY
H04L67/025
ELECTRICITY
G06F9/226
PHYSICS
H04W64/00
ELECTRICITY
H04W12/02
ELECTRICITY
G06F9/223
PHYSICS
G08C2201/93
PHYSICS
H04L67/10
ELECTRICITY
G06F7/588
PHYSICS
International classification
H04W64/00
ELECTRICITY
H04W12/04
ELECTRICITY
Abstract
An apparatus includes a luminaire; power input for the luminaire; a modulation circuit for modulating the power input so that light output includes an identifier of the luminaire; and a programmable memory for storing at least one of the identifier of the luminaire and a modulation scheme for modulation of the luminaire to place a signal on the light. A method for modulating light includes storing in programmable memory an identifier for the luminaire, the identifier being used to modulate the light, and/or a modulation scheme for modulation of the luminaire; and changing content of programmable memory to change the identifier and/or the modulation scheme. A method of efficiently deploying the luminaires and identifying their locations to a network is disclosed. A method of multi-factor authentication using authentication data transmitted by modulating the light emitted by a luminaire is also disclosed.
Claims
1. A method of mapping the locations of a plurality of visible light communication devices capable of attaching to a network, comprising: deploying the plurality of devices by networking the devices and assigning to each of the plurality of devices a network addresses; registering the plurality of devices with and connecting the plurality of devices to a remote computing system from which the plurality of devices is controlled; placing the plurality of devices in physical locations; utilizing the remote system to instruct the plurality of devices to emit modulated light with an identification corresponding to the network address; using a light receiver to receive the modulated light from each of the plurality of devices; converting the modulated light from each of the plurality of devices to a plurality of digital signals; processing each of the plurality of the digital signals to determine the identity of each of the plurality of devices; associating each identity with the physical location of a corresponding device; and storing the identities, and locations corresponding to the identities, in a memory.
2. The method of claim, 1 further comprising associating each of the physical locations with a place on a map containing the physical locations.
3. The method of claim 1, wherein the light receiver is a camera.
4. The method of claim 3, wherein the camera is located in a mobile telephone, further comprising using an application on the mobile telephone to associate positions on a map with the physical locations.
5. The method of claim 4, wherein the map is displayed on the mobile telephone.
6. The method of claim 1, wherein the light receiver is an optical sensor.
7. The method of claim 1, where the plurality of devices are manufactured without specific identifications and without specific network addresses.
8. The method of claim 1, further comprising exchanging security credentials between the plurality of devices and the remote system.
9. The method of claim 1, further comprising disposing and orienting the light receiver to successively receive identities from a series of devices.
10. The method of claim 1, further comprising providing the devices with identifiers before the devices are deployed.
11. The method of claim 1, further comprising providing the devices with identifiers after the devices are deployed.
12. A method for authenticating a user of a device or system, comprising: receiving, from the user, first authentication data; receiving from a luminaire providing modulated light, second authentication data represented by modulation of the modulated light; recovering from the modulated light the second authentication data; and authenticating the user only when the first authentication data and the second authentication data are recognized as being authentic.
13. The method of claim 12, wherein the second authentication data is generated by a first code calculating engine associated with the device or system and a second code calculating engine associated with the luminaire.
14. The method of claim 13, wherein the second authentication data is considered to be authentic when the authentication data generated by the first code calculating engine and the authentication data generated by the second code calculating engine are identical.
15. The method of claim 13, further comprising sharing secret data between the first code generating engine and the second code generating engine to generate the second authentication data.
16. The method of claim 13, further comprising using time as an input to at least one of the first code generating engine and the second code generating engine in generating the second authentication data.
17. The method of claim 12, wherein new second authentication data is generated at predetermined time intervals.
18. The method of claim 12, wherein the second authentication data is generated by a first code calculating engine associated with the device or system.
19. The method of claim 12, wherein the second authentication data is delivered to the luminaire whose emission is adapted at that time to represent the received data, considered to be authentic when the authentication data generated by the first code calculating engine and the authentication data emitted by the luminaire are identical.
20. The method of claim 12, wherein the device or system is continuously in communication with the luminaire.
21. The method of claim 12, wherein the device or system is intermittently in communication with the luminaire.
22. The method of claim 12, wherein the second authentication data is generated by a first code calculating engine associated with the device or system, and the first code generating engine includes a random number generator.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054] A component or a feature that is common to more than one drawing is indicated with the same reference number in each of the drawings.
DESCRIPTION OF THE EMBODIMENTS
[0055] In
[0056] It possible to utilize non-visible spectra (infrared or ultraviolet) for transmitting the VLC ID and other information. Similarly, it is not strictly necessary for the emission of light to be carried out from a light fixture; it could be any container of circuitry and a light-emitting diode. The receiver 104 need not be in the form of a mobile phone, but could be any light-sensitive device capable of demodulating the emitted signal, whether or not connected to a larger network.
[0057] In
[0058] A user driving the device management platform 108, via a computer 210 can view the sensor readings and the status of the luminaire devices and associated sensors, and can exercise control of all or a subset of the luminaire devices 202A, 202B, 202C . . . 202N, acting on the subset as a whole. A user can also determine status of and exercise control over the gateway devices 206A, 206B. The ability to control the luminaire devices 202A, 202B, 202C . . . 202N includes replacing the software on them remotely, and to deliver security tokens used for secure communications to the luminaire devices 202A, 202B, 202C . . . 202N, as also described in application Ser. No. 14/671,694 filed on Mar. 27, 2015, and published as United States Patent Publication No. 2015/0281337. Replacing the software is discussed below.
[0059] In
[0060] In the embodiments described below, the communication module is of a particular variety, and the decision and modulation-capable components a combination of two microcontrollers. These specifics are merely examples, and may be replaced by components that perform equivalent tasks. The workings of the circuitry may be replaced by circuitry that performs the basic functions of receiving updates from a remote agent, delivering those updates to the circuit components, and modifying the modulation scheme and VLC ID accordingly.
[0061] In
[0062] Modulation is accomplished by controlling from the same MCU-regulated output voltage the current through these components with the combination of two MOSFET transistors 410A and 410B. However, the input voltage to transistor 410A is controlled by an inverter 412. Inverter 412 acts to switch the voltage at the gate of MOSFET transistor 410A high when the output of an Atmel MCU 416 is low, and low when the output of the MCU 416 is high. Accordingly, the gate voltages at transistors 410A and 410B will always be opposite high and low at any one time, allowing current to flow through either one of the two legs attached to driver 406. Current flowing through power resistor 418 is dissipated in the form of heat. A small leakage current may flow through LED 402 when transistor 410B is otherwise off.
[0063] The external agent (
[0064] MCU 411, having an associated BLE chip, is programmed with software to manage communication interaction and logic, and to communicate control signals to the Atmel MCU 416. The purpose of the latter microcontroller, which is provided with a crystal quartz oscillator 420 to provide a stable clock cycle, is to run software dedicated to outputting the desired modulation in a stable fashion by generating a voltage output to the gate of transistor 410B. The exact types and combination of two microcontrollers is merely exemplary, and may be replaced by components that perform equivalent tasks using single, multiple or other microcontroller and/or microprocessor chips that manage communication and the modulation of the signal, chosen according to various performance requirements such as the frequency at which modulation is to occur.
[0065] The type of driver and exact circuitry to mediate control of the LED according to the instructions within the MCU is merely exemplary. What is important is the capacity to replace the VLC ID in real-time. When the latter is desired, a communication is made to the MCU or MCUs that regulates or changes the nature of the signal modulation, upon which it alters its output accordingly.
[0066] An important aspect of the disclosed embodiment is that when an incoming signal via the communication chip (BLE) is sent to replace the programming, or part of the programming, on the MCU or MCUs, it acts to replace the VLC ID emitted with a new VLC ID. It is also possible to replace or alter the method by which the signal is modulated by this same mechanism.
[0067]
[0068] In
[0069] In
[0070] At any time, a managerial user of the cloud platform may control the IDs to clear them all (i.e. setting the IDs to all 0s or 1s), to cease transmission altogether, or to commence transmission of IDs. There are no additional costs related to initiation or ending of the service provided to an end customer. Light fixture VLC IDs may be controlled individually, in groups, or en masse. Similarly, should there be a perceived benefit from emitting IDs from only subsets of luminaire devices, this can be accomplished as readily.
[0071] Replacement of malfunctioning luminaire devices presents no significant burden, as the old ID can be reused by pushing it down to the luminaire device within the new light fixture.
[0072] As luminaires are moved from one location to another, or if for some other reason it is perceived beneficial to re-ID the luminaires (for example to easily distinguish between data related to the luminaire collected before and after the manipulation of the ID), it is possible to do so with little effort.
[0073] Deployment
[0074] A specific approach to the use of a VLC ID is to improve the efficiency with which the network addresses of networked light-emitting devices can be recognized during a deployment. During deployment this can be used to understand which device, as defined by its address on a mesh network, is located where, physically. Alternate ways this could be achieved, for instance, is by printing an identifier on the device hardware, or by displaying it in a digital display; however, this and other similar methods typically require immediate access to the device, and accordingly have short-comings in many settings where the placement of the device is within anything but immediate reach; for example on a pole, tower or high ceiling.
[0075] While it is theoretically possible to provide this feature with static VLC IDs, the coordination effort required to map the network node addresses and the VLC IDs is significant, and in some cases, where secure addressing is not assigned to meshed network nodes during manufacture but during the subsequent deployment phase, altogether impossible. Malleable and remote controllable VLC IDs make this possible.
[0076] With reference to
[0077] There are variations to this scenario that build on the same idea. For example, instead of emitting the network address, any unique ID for which there is a 1:1 mapping of the ID to the networked node address can be used. A mapping application can in that case instead of directly using the networked node address, first look up that address in a database that contains mappings of all networked nodes and VLC IDs. Further, the type of network connecting the devices together may not be a mesh but of some other topology. Other modes of communication can be used. It is possible to assign IDs during manufacturing instead of during the deployment phase. The primary function of the devices themselves may be as lights or luminaires, but they can also be some other type of device, while including a light capable of emitting a VLC ID. It is possible for the devices 802 to be connected directly to the remote computing system 803, as shown in
[0078] It is not only the ID that can be passed down but also the modulation (including any encoding and/or encryption) scheme applied to the signal. Alternatively, the modulation scheme can be altered by pushing down a new modulation scheme in the form of microcontroller software to the circuitry within the luminaire devices. When this is the case, applications at the receiving end will need to be updated as well, which can be performed the next time the luminaire devices connect with the platform.
[0079] LED Based ID Emitters Used For Multifactor Authentication
[0080] Authentication factors describe a category of credentials intended to verify that the identity of an individual or a system is what they declare themselves to be. Knowledge factors represent something a user or a system “knows”, while possession factors represent something one “has”, such as a mobile phone; other types include inherence factors, things one “are” such as a fingerprint. The purpose of all such factors is to ultimately deliver one or more “authentication data”, pieces of information, to an authenticating system. Authentication accomplished by a combination of multiple factors, and in particular multiple factors of different types, is more secure than single-factor authentication. The present disclosure presents a new type of possession authentication factor: a VLC ID-emitting LED light source. The receiver of the VLC ID may be a camera-based mobile phone or other device, or a device equipped with a light sensitive sensor of a different type. The VLC ID in this context constitutes the authentication data, or an encrypted and/or encoded version thereof.
[0081] A light as an authentication factor include some characteristics differentiating it from existing factors: [0082] Remote delivery of the corresponding authenticating data (as far as the emitted light can be discerned by the receiver); [0083] Authenticating data delivery over a channel whose reach is intuitively grasped by a human (wherever the light reaches); [0084] Authenticating data delivery over a location that usually can be easily secured (by limiting the reach of the light); [0085] Authenticating data delivery over a channel that can be shared among multiple users or limited to a single user; [0086] Authenticating data delivery over a fixed physical location reaching a large area or as a narrowly focused beam, or as a small portable device; [0087] Authenticating data delivery that in many cases require no human interaction.
[0088] With these unique features of unobtrusiveness, ease of use, security, flexibility with respect to size of the delivery mechanism, and ability to be shared with others in a controlled manner, application of multi-factor authentication can be broadened, and in many cases simplified. In a simple scenario of logging in to an email account, instead of a user transferring authentication data delivered to their mobile phone as a text message from the authentication management system (a method which indicates that the user also “has” the phone to which the text was delivered), the transfer of VLC ID authentication data emitted from a light can proceed without user intervention, thus simplifying the process. Multiple users, for instance workers belonging to the same company, can simultaneously share the light emanating from a single luminaire to which their group of identities has been tied, each user authenticating unobtrusively and automatically to the same system, each individual considered to “have” the light by being in its presence. Similarly, an easily portable “pen-light” LED can be used as a second factor when authenticating secure connections made by mobile phones or other devices where dongles, a possible multi-authentication factor alternative with specific physical port types, may not be supported by the receiving device, or where shining the pen-light into the device is considered preferable for other reasons such as ease of use. Android phones and iOS phones with dissimilar physical ports may all use the same authenticating device where the camera on the phones is all that is required to receive the authentication data.
[0089] The luminaire device may be connected to a network or operate without a network connection, with implications for how the authentication data to be delivered is calculated and distributed. On a network, it may be connected to the same or a different network from which other identification factors are delivered to the authenticating system. These two types, in-band and out-of-band authentication, have different security implications, but their use may be mandated by circumstances or considerations of best practice and is not a choice relevant to the present disclosure.
[0090] The authentication data itself may be delivered from a remote server that synchronizes information, or be calculated on-board the controlling electronics of the luminaire device itself using shared secret data (exchanged during manufacturing or deployment) and a counter (or time value), or an equivalent method.
[0091]
[0092] At 914, software logic 910 tests whether the user ID and password entered by the user are correct. If the user ID and password are not correct, the user is not connected, as represented by the connection being closed at 914. If the user ID and password are correct, at 916, a determination is made as to whether the authentication data from the VLC 900 is correct. If the authentication data is correct, the connection is made and the user can proceed with the application at 918. If the authentication data is not correct, the user is not connected, as represented by the connection being closed at 914.
[0093] Below, two possible scenarios describe how the system may be designed so that the VLC ID-emitted authentication data can be known to have been emitted from a particular luminaire. Variations on these two scenarios exist, including more elaborate features that augment the security of the system.
[0094]
[0095] The authentication management system 1002 includes a code calculating engine 1008 and an authentication data store 1010. The code calculating engine 1008 generates the same authentication data as that calculated by code calculating engine 1006 of luminaire device 1000. Known algorithms may be used for the calculating engine. For example, Google uses an algorithm called “Time-based One-time Password Algorithm”, constructed such that without the secret (which is an arbitrary byte string) a “code” or authentication data cannot be calculated. A reason for why it is continually updated is to reduce the time window for “guesses” and the time during which transfer of the code must occur if it is “gleaned” by other means (for example, looking over someone's shoulder surreptitiously).
[0096]
[0097] It is noted that when a persistent and secure delivery mechanism from the authenticating system exists, there is no need for a code calculating engine on the luminaire, as in that case the authenticating data is sent directly from the authenticating system to the luminaire in real time. In that case the code generating engine could be as simple as a random number generator, or similar generator, of any complexity.
[0098] The techniques described herein are exemplary, and should not be construed as implying any particular limitation on the present disclosure. It should be understood that various alternatives, combinations and modifications could be devised by those skilled in the art. For example, steps associated with the processes described herein can be performed in any order, unless otherwise specified or dictated by the steps themselves. The present disclosure is intended to embrace all such alternatives, modifications and variances that fall within the scope of the appended claims.
[0099] The terms “comprises” or “comprising” are to be interpreted as specifying the presence of the stated features, integers, steps or components, but not precluding the presence of one or more other features, integers, steps or components or groups thereof.