U.S. patent application number 14/492846 was filed with the patent office on 2015-06-11 for pairing electronic devices using body area network.
The applicant listed for this patent is Sony Corporation. Invention is credited to Henrik Bengtsson, Aleksandar Rodzevski, Carl-Johan Weiderstrand.
Application Number | 20150162994 14/492846 |
Document ID | / |
Family ID | 50486924 |
Filed Date | 2015-06-11 |
United States Patent
Application |
20150162994 |
Kind Code |
A1 |
Rodzevski; Aleksandar ; et
al. |
June 11, 2015 |
PAIRING ELECTRONIC DEVICES USING BODY AREA NETWORK
Abstract
A wireless device, such as a mobile device, for example, pairs
with a peripheral device, such as a wristlet, for example, worn by
the user. One or both of the wireless device and the peripheral
device, each of which contact the user's skin, determine whether
the other is in contact with the body of the same user. If both
devices are in contact with the same body, the devices will pair
with each other.
Inventors: |
Rodzevski; Aleksandar;
(Malmo, SE) ; Weiderstrand; Carl-Johan; (Lomma,
SE) ; Bengtsson; Henrik; (Lund, SE) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
Sony Corporation |
Tokyo |
|
JP |
|
|
Family ID: |
50486924 |
Appl. No.: |
14/492846 |
Filed: |
September 22, 2014 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
61912223 |
Dec 5, 2013 |
|
|
|
61942753 |
Feb 21, 2014 |
|
|
|
Current U.S.
Class: |
455/39 |
Current CPC
Class: |
B60R 25/2027 20130101;
H04W 4/80 20180201; H04L 9/0827 20130101; G06F 21/34 20130101; H04W
12/06 20130101; H04L 63/0853 20130101; G06F 21/35 20130101; H04L
63/18 20130101; H04M 1/7253 20130101; H04L 2209/88 20130101; H04W
8/005 20130101; G07C 9/00309 20130101; H04L 43/10 20130101; H04L
2209/805 20130101; H04L 9/3215 20130101; H04L 63/0861 20130101;
H04B 7/26 20130101; H04W 76/14 20180201; G06F 21/32 20130101; H04B
13/005 20130101; H04W 12/003 20190101; H04W 12/0608 20190101; G07C
9/28 20200101; G07C 2009/00809 20130101 |
International
Class: |
H04B 13/00 20060101
H04B013/00; H04B 7/26 20060101 H04B007/26 |
Claims
1. A method for pairing a wireless communication device with a
peripheral device using a Body Area Network (BAN), the method
performed at the wireless communication device and comprising:
detecting that a peripheral device is proximate a wireless
communication device; determining whether both the wireless
communication device and the peripheral device are in contact with
a user's body; and pairing with the peripheral device using a BAN
if both the wireless communication device and the peripheral device
are in contact with the user's body.
2. The method of claim 1 wherein pairing with the peripheral device
using a BAN if both the wireless communication device and the
peripheral device are in contact with the user's body comprises:
generating a key based on a unique identifier received over a first
communication link from the peripheral device; transmitting the
generated key to the peripheral device over the first communication
link; receiving the key from the peripheral device over a second
communication link; and pairing with the peripheral device if the
key received over the second communication link is a valid key.
3. The method of claim 2 wherein the second communication link
comprises a Body Area Network (BAN) link that uses the user's body
as a transmission medium.
4. The method of claim 2 further comprising: activating a receiver
associated with the BAN link responsive to transmitting the key to
the peripheral device over the first communication link; listening
on the BAN link to receive the key from the peripheral device; and
determining that both the wireless communication device and the
peripheral device are in contact with the body of the user
responsive to receiving the key over the BAN link during a
predetermined time interval.
5. The method of claim 1 further comprising requesting the unique
identifier from the peripheral device if both the wireless
communication device and the peripheral device are in contact with
the user's body.
6. The method of claim 2 wherein the unique identifier comprises a
hardware identifier associated with the peripheral device, and
wherein generating the key comprises: inputting the hardware
identifier into a predefined hash function; and storing a hash code
output by the hash function as the key in a memory circuit at the
wireless communication device.
7. The method of claim 1 wherein the second communication link
comprises a Body Area Network (BAN) link that uses the user's body
as a transmission medium, and wherein determining whether both the
wireless communication device and the peripheral device are in
contact with a user's body comprises: sending a request to the
peripheral device to ping the wireless communication device over
the BAN link; receiving the ping from the peripheral device over
the BAN link; and determining that both the wireless communication
device and the peripheral device are in contact with the user's
body responsive to receiving the ping.
8. The method of claim 7 further comprising: prompting the user to
indicate whether to BAN pair with the peripheral device responsive
to receiving the ping; and sending the key to the peripheral device
if the user indicates to BAN pair with the peripheral device.
9. The method of claim 1 further comprising sending one or more
commands over the BAN link to selectively enable and disable a BAN
transmitter at the peripheral device.
10. The method of claim 1 wherein the wireless communication device
is configured to display a passcode lock screen to the user, and
further comprising bypassing the passcode lock screen responsive to
determining that both the wireless communication device and the
peripheral device are in contact with the user's body.
11. A wireless communication device comprising: a communications
interface circuit configured to communicate data and signals with a
peripheral device disposed proximate the wireless communication
device; and a processor circuit configured to: determine whether
both the wireless communication device and the peripheral device
are in contact with a user's body; and pair with the peripheral
device using a Body Area Network (BAN) if both the wireless
communication device and the peripheral device are in contact with
the user's body.
12. The wireless communication device of claim 11 wherein to pair
with the peripheral device using BAN, the processor circuit is
configured to: generate a key based on a unique identifier received
over a first communication link from the peripheral device;
transmit the generated key to the peripheral device over the first
communication link; receive the key from the peripheral device over
a second communication link; and pair with the peripheral device if
the key received over the second communication link is a valid
key.
13. The wireless communication device of claim 12 wherein the
second communication link comprises a Body Area Network (BAN) link
that uses the user's body as a transmission medium.
14. The wireless communication device of claim 12 wherein the
processor circuit is further configured to: activate a receiver
associated with the BAN link responsive to transmitting the key to
the peripheral device over the first communication link; listen on
the BAN link to receive the key from the peripheral device 0); and
determine that both the wireless communication device and the
peripheral device are in contact with the body of the user
responsive to receiving the key over the BAN link during a
predetermined time interval.
15. The wireless communication device of claim 11 wherein the
processor circuit is further configured to request the unique
identifier from the peripheral device if both the wireless
communication device and the peripheral device are in contact with
the user's body.
16. The wireless communication device of claim 12 further
comprising a memory circuit operatively coupled to the processor
circuit, and wherein to generate the key, the processor circuit is
further configured to: input a hardware identifier received from
the peripheral device into a predefined hash function; and store a
hash code output by the hash function as the key in the memory
circuit.
17. The wireless communication device of claim 11 wherein the
second communication link comprises a Body Area Network (BAN) link
that uses the user's body as a transmission medium, and wherein the
processor circuit is further configured to: send a request to the
peripheral device to ping the wireless communication device over
the BAN link; receive the ping from the peripheral device over the
BAN link; and determine that both the wireless communication device
and the peripheral device are in contact with the user's body
responsive to receiving the ping.
18. The wireless communication device of claim 17 wherein the
processor circuit is further configured to: prompt the user to
indicate whether to pair with the peripheral device responsive to
receiving the ping; and send the key to the peripheral device if
the user indicates to pair with the peripheral device using the
BAN.
19. The wireless communication device of claim 11 wherein the
processor circuit is further configured to send one or more
commands over the BAN link to selectively enable and disable a BAN
transmitter at the peripheral device.
20. The wireless communication device of claim 11 further
comprising a display, and wherein the processor circuit is further
configured to: display a passcode lock screen to the user; and
bypass the passcode lock screen responsive to determining that both
the wireless communication device and the peripheral device are in
contact with the user's body.
21. A method for pairing a wireless communication device with a
peripheral device, the method performed at the peripheral device
and comprising: determining whether both a wireless communication
device and a peripheral device are in contact with a user's body;
and pairing with the wireless communication device using a Body
Area Network (BAN) if both the wireless communication device and
the peripheral device are in contact with the user's body.
22. The method of claim 21 further comprising pinging the wireless
communication device over a second communication link responsive to
receiving a request for the ping from the wireless communication
device over a first communication link.
23. The method of claim 21 further comprising: transmitting a
unique identifier to the wireless communication device over the
first communication link; receiving a key from the wireless
communication device over the first communication link, wherein the
key is based on the unique identifier; storing the key in a memory
circuit at the peripheral device; and transmitting the key to the
wireless communication device over the second communication
link.
24. The method of claim 21 wherein the second communication link
comprises a Body Area Network (BAN) link that uses the user's body
as a transmission medium.
25. The method of claim 22 further comprising activating a BAN
transmitter associated with the BAN link, and wherein transmitting
the key to the wireless communication device over the second
communication link comprises transmitting the key over the BAN link
at predetermined intervals.
26. The method of claim 25 further comprising enabling or disabling
the BAN transmitter responsive to receiving one or more commands
from the wireless communication device.
27. A peripheral device comprising: a communications interface
circuit configured to communicate with a wireless communication
device proximate the peripheral device; a processor circuit
configured to: determine whether both a wireless communication
device and a peripheral device are in contact with a user's body;
and pair with the wireless communication device using a Body Area
Network (BAN) if both the wireless communication device and the
peripheral device are in contact with the user's body.
28. The peripheral device of claim 27 wherein the processor circuit
is further configured to ping the wireless communication device
over a second communication link responsive to receiving a request
for the ping from the wireless communication device over a first
communication link.
29. The peripheral device of claim 27 further comprising a memory
circuit, and wherein the processor circuit is further configured
to: transmit a unique identifier to the wireless communication
device over the first communication link; receive a key from the
wireless communication device over the first communication link,
wherein the key is based on the unique identifier; store the key in
the memory circuit; and transmit the key to the wireless
communication device over the second communication link.
30. The peripheral device of claim 27 wherein the second
communication link comprises a Body Area Network (BAN) link that
uses the user's body as a transmission medium.
31. The peripheral device of claim 28 further comprising a BAN
transmitter associated with the BAN link, and wherein the processor
circuit is further configured to: activate the BAN transmitter; and
transmit the key to the wireless communication device over the BAN
link at predetermined intervals.
32. The method of claim 1 wherein the wireless communication
devices comprises a passcode input device, and further comprising
bypassing the passcode input device responsive to determining that
both the wireless communication device and the peripheral device
are in contact with the user's body.
33. The method of claim 7 further comprising prompting the user by
using a voice interface to indicate whether to BAN pair with the
peripheral device responsive to receiving the ping; and sending the
key to the peripheral device if the user indicates to BAN pair with
the peripheral device.
34. The wireless communication device of claim 11 further
comprising a passcode input device, and wherein the processor
circuit is further configured to: bypass the passcode input device
responsive to determining that both the wireless communication
device and the peripheral device are in contact with the user's
body.
35. The wireless communication device of claim 34 wherein the
wireless communication device is a door comprising a handle and a
pass code input device.
36. The wireless communication device of claim 34 wherein the door
comprises a capacitive sensor device configured for detecting the
user's body.
37. The wireless communication device of claim 34 wherein the
handle comprises a capacitive sensor device configured for
detecting the user's body.
Description
RELATED APPLICATION DATA
[0001] This application claims the benefit of U.S. Provisional
Patent Application Nos. 61/912,223, filed Dec. 5, 2013, and
61/942,753, filed Feb. 21, 2014, the disclosures of which are
incorporated herein by reference in their entireties.
TECHNICAL FIELD
[0002] The present disclosure relates generally to wireless
communication devices, and particularly to wireless communication
devices configured to communicate with a consumer electronic device
worn on a user's wrist or hand using the user's own body as a
communications medium.
BACKGROUND ART
[0003] There is an emerging consumer market for certain devices
that are used as companion products to smartphone devices. Their
popularity can be traced, in part, to the variety of features they
provide to a user. For example, one such device is a wearable
device, such as a ring worn on the user's finger, a necklace,
glasses, or a "wristlet" (e.g., a watch or wristband) that is worn
around a user's wrist. Typically, such wearable devices may provide
different features, such as a logging function that monitors the
user's motion and resting activities, and then sends a report on
the detected motion and activities to the user's smartphone for
storage in memory. Another feature allows the wearable devices to
be used as a personal token to automatically gain access to a
smartphone that has been locked. Particularly, a wearable device
worn by the user may communicate with the user's smartphone,
thereby permitting the user to bypass the manual entry of a
predetermined unlock sequence associated with the smartphone.
[0004] Such features are already present on commercial products.
However, a common issue associated with these devices is that they
either need a physical interface (e.g., 3.5 mm audio plug, a
Universal Serial Bus (USB), etc.), or some sort of wireless "local
connectivity" (e.g., BLUETOOTH, WiFi, Near Field Communication
(NFC), etc.), in order to transmit data between the devices. Such
methods for communicating, however, can be cumbersome.
Additionally, these types of communication may be a limiting factor
that could constrain new features waiting to be implemented on such
devices.
[0005] There are existing solutions utilizing such local
connectivity technologies such as BLUETOOTH/BLE and WiFi in order
to detect a wristlet in close proximity to a smartphone. However,
these methods are not able to accurately measure a distance and
establish a deterministic distance between the wristlet and the
smartphone. Typically, different materials positioned near the
wristlet and the smartphone can interfere with (i.e., signal
attenuation) and reflect (i.e., signal gain) the wireless
communications between the two devices. Similarly, under some
extreme conditions, other transmitting devices or signals can also
interfere with the communications. Thus, such solutions are not
able to provide accurate distance detection making it difficult for
a smartphone to determine if a wristlet or other wearable device is
or is not within a predetermined, preferably short-range,
distance.
[0006] Most doors have physical keys, which can get lost. Some
doors have cards that can open doors, as in hotels, but they can
get lost and be stolen, and does not suit for private purpose.
SUMMARY OF THE INVENTION
[0007] The present disclosure provides wireless devices (e.g., a
wearable device such as a wristlet and a smartphone, tablet, door,
computer etc) and a corresponding method for initializing and
pairing a short-range Body Area Network (BAN) communications link
between the wireless devices. More specifically, the wireless
devices are associated with a user, and are configured to employ
the user's own body as a transmission medium to communicate at
least some of the signals and data required to "BAN pair" the
wireless devices (i.e., pair the two devices using the user's own
body as a communications medium). The devices and method described
herein provide a secure and reliable manner in which to transmit
the sometimes sensitive data required to BAN pair the wireless
devices that are in physical contact with the user's body, but are
separated from each other by a short distance (e.g., wrist-to-hand
distance). Particularly, with the method disclosed herein, the
wireless devices can more accurately detect each other's presence
when both devices are in physical contact with the body of the same
user. That is, each wireless device, when in contact with a user's
body, is able to accurately determine whether the other wireless
device is also currently contacting the user's body (e.g., the same
user is wearing the wristlet and holding the smartphone). So
informed, the wireless devices begin BAN pairing and
initializations operations with each other.
[0008] Accordingly, in one embodiment, the present disclosure
provides a method for pairing a wireless communication device with
a peripheral device using a Body Area Network (BAN). In this
embodiment, the method performed at the wireless communication
device and comprises detecting that a peripheral device is
proximate a wireless communication device, determining whether both
the wireless communication device and the peripheral device are in
contact with a user's body, and pairing with the peripheral device
using a BAN if both the wireless communication device and the
peripheral device are in contact with the user's body.
[0009] In one embodiment, pairing with the peripheral device using
a BAN if both the wireless communication device and the peripheral
device are in contact with the user's body comprises generating a
key based on a unique identifier received over a first
communication link from the peripheral device, transmitting the
generated key to the peripheral device over the first communication
link, receiving the key from the peripheral device over a second
communication link, and pairing with the peripheral device if the
key received over the second communication link is a valid key.
[0010] In some embodiments, the second communication link comprises
a Body Area Network (BAN) link that uses the user's body as a
transmission medium.
[0011] In one embodiment, the method further comprises activating a
receiver associated with the BAN link responsive to transmitting
the key to the peripheral device over the first communication link,
listening on the BAN link to receive the key from the peripheral
device, and determining that both the wireless communication device
and the peripheral device are in contact with the body of the user
responsive to receiving the key over the BAN link during a
predetermined time interval.
[0012] In one embodiment, the method further comprises requesting
the unique identifier from the peripheral device if both the
wireless communication device and the peripheral device are in
contact with the user's body.
[0013] Additionally, in one embodiment, the unique identifier
comprises a hardware identifier associated with the peripheral
device. In such cases, generating the key comprises inputting the
hardware identifier into a predefined hash function, and storing a
hash code output by the hash function as the key in a memory
circuit at the wireless communication device.
[0014] In one embodiment, the second communication link comprises a
Body Area Network (BAN) link that uses the user's body as a
transmission medium. In these cases, determining whether both the
wireless communication device and the peripheral device are in
contact with a user's body further comprises sending a request to
the peripheral device to ping the wireless communication device
over the BAN link, receiving the ping from the peripheral device
over the BAN link, and determining that both the wireless
communication device and the peripheral device are in contact with
the user's body responsive to receiving the ping.
[0015] In some embodiments, the method further comprises prompting
the user to indicate whether to BAN pair with the peripheral device
responsive to receiving the ping, and sending the key to the
peripheral device if the user indicates to BAN pair with the
peripheral device.
[0016] In one embodiment, the method further comprises sending one
or more commands over the BAN link to selectively enable and
disable a BAN transmitter at the peripheral device.
[0017] In one embodiment, the wireless communication device is
configured to display a passcode lock screen to the user. In these
cases, the method further comprises bypassing the passcode lock
screen responsive to determining that both the wireless
communication device and the peripheral device are in contact with
the user's body.
[0018] According to another embodiment, the present disclosure also
provides a wireless communication device comprising a
communications interface circuit and a processor circuit. The
communications interface circuit communicates data and signals with
a peripheral device disposed proximate the wireless communication
device. The processor circuit determines whether both the wireless
communication device and the peripheral device are in contact with
a user's body, and pairs with the peripheral device using a Body
Area Network (BAN) if both the wireless communication device and
the peripheral device are in contact with the user's body.
[0019] In one embodiment, the processor circuit is configured to
generate a key based on a unique identifier received over a first
communication link from the peripheral device, transmit the
generated key to the peripheral device over the first communication
link, receive the key from the peripheral device over a second
communication link, and pair with the peripheral device if the key
received over the second communication link is a valid key.
[0020] In one embodiment, the second communication link comprises a
Body Area Network (BAN) link that uses the user's body as a
transmission medium.
[0021] In one embodiment, the processor circuit is further
configured to activate a receiver associated with the BAN link
responsive to transmitting the key to the peripheral device over
the first communication link, listen on the BAN link to receive the
key from the peripheral device, and determine that both the
wireless communication device and the peripheral device are in
contact with the body of the user responsive to receiving the key
over the BAN link during a predetermined time interval.
[0022] In one embodiment, the processor circuit is further
configured to request the unique identifier from the peripheral
device if both the wireless communication device and the peripheral
device are in contact with the user's body.
[0023] In one embodiment, the wireless communication device also
comprises a memory circuit (30) operatively coupled to the
processor circuit. To generate the key, the processor circuit is
further configured to input a hardware identifier received from the
peripheral device into a predefined hash function, and store a hash
code output by the hash function as the key in the memory
circuit.
[0024] In one embodiment, the second communication link comprises a
Body Area Network (BAN) link that uses the user's body as a
transmission medium, and the processor circuit is further
configured to send a request to the peripheral device to ping the
wireless communication device over the BAN link, receive the ping
from the peripheral device over the BAN link, and determine that
both the wireless communication device and the peripheral device
are in contact with the user's body responsive to receiving the
ping.
[0025] In one embodiment, the processor circuit is further
configured to prompt the user to indicate whether to pair with the
peripheral device responsive to receiving the ping, and send the
key to the peripheral device if the user indicates to pair with the
peripheral device using the BAN.
[0026] In one embodiment, the processor circuit is further
configured to send one or more commands over the BAN link to
selectively enable and disable a BAN transmitter at the peripheral
device.
[0027] In one embodiment, the wireless communication device further
comprises a display. In such embodiments, the processor circuit is
further configured to display a passcode lock screen to the user,
and bypass the passcode lock screen responsive to determining that
both the wireless communication device and the peripheral device
are in contact with the user's body.
[0028] In addition to the above, the present disclosure also
provides a method for pairing a wireless communication device with
a peripheral device using a Body Area Network (BAN). The method is
performed at the peripheral device and comprises determining (64)
whether both a wireless communication device and a peripheral
device are in contact with a user's body, and pairing with the
wireless communication device using a Body Area Network (BAN) if
both the wireless communication device and the peripheral device
are in contact with the user's body.
[0029] In one embodiment, the method further comprises pinging the
wireless communication device over a second communication link
responsive to receiving a request for the ping from the wireless
communication device over a first communication link.
[0030] In one embodiment, the method further comprises transmitting
a unique identifier to the wireless communication device over the
first communication link, receiving a key from the wireless
communication device over the first communication link, wherein the
key is based on the unique identifier, storing the key in a memory
circuit at the peripheral device, and transmitting the key to the
wireless communication device over the second communication
link.
[0031] In one embodiment, the second communication link comprises a
Body Area Network (BAN) link that uses the user's body as a
transmission medium.
[0032] In one embodiment, the method further comprises activating a
BAN transmitter associated with the BAN link. In these cases,
transmitting the key to the wireless communication device over the
second communication link comprises transmitting the key over the
BAN link at predetermined intervals.
[0033] In one embodiment, the method further comprises enabling or
disabling the BAN transmitter responsive to receiving one or more
commands from the wireless communication device.
[0034] The present disclosure also provides a peripheral device
comprising a communications interface circuit and a processor
circuit. In one embodiment, the communications interface circuit
communicates with a wireless communication device proximate the
peripheral device. The processor circuit determines whether both a
wireless communication device and a peripheral device are in
contact with a user's body, and pairs with the wireless
communication device using a Body Area Network (BAN) if both the
wireless communication device and the peripheral device are in
contact with the user's body.
[0035] In one embodiment, the processor circuit is further
configured to ping the wireless communication device over a second
communication link responsive to receiving a request for the ping
from the wireless communication device over a first communication
link. In another embodiment, the peripheral device further
comprises a memory circuit. In these cases, the processor circuit
is further configured to transmit a unique identifier to the
wireless communication device over the first communication link,
receive a key from the wireless communication device over the first
communication link, wherein the key is based on the unique
identifier, store the key in the memory circuit, and transmit the
key to the wireless communication device over the second
communication link.
[0036] In one embodiment, the second communication link comprises a
Body Area Network (BAN) link that uses the user's body as a
transmission medium.
[0037] In one embodiment further includes a BAN transmitter
associated with the BAN link. In such cases, the processor circuit
is further configured to activate the BAN transmitter, and transmit
the key to the wireless communication device over the BAN link at
predetermined intervals.
[0038] Accordingly, in one embodiment, the present disclosure
provides a method for pairing a door comprising a wireless
communication unit with a peripheral device using a Body Area
Network (BAN). In this embodiment, the method performed at the door
and comprises detecting that a peripheral device is proximate the
door, determining whether both the wireless communication unit of
the door and the peripheral device are in contact with a user's
body, and pairing with the peripheral device using a BAN if both
the wireless communication unit of the door and the peripheral
device are in contact with the user's body.
[0039] The benefits of pairing a door with a peripheral device,
e.g. a wristlet is to safely enable the BAN enabled wristlet to
unlock the door on a house, without pin code and without the need
for internet connection, and still being sure that there is no risk
of losing the wristlet by detecting when the wristlet is moved from
the body of the owner, since if the wristlet is lost it does not
work anymore.
[0040] Of course, those skilled in the art will appreciate that the
present invention is not limited to the above contexts or examples,
and will recognize additional features and advantages upon reading
the following detailed description and upon viewing the
accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0041] FIG. 1 is a perspective view illustrating two wireless
devices configured to be BAN paired according to one embodiment of
the present disclosure.
[0042] FIGS. 2A-2B are perspective views illustrating two wireless
devices being BAN paired according to embodiments of the present
disclosure.
[0043] FIGS. 3A-3D are flow diagrams illustrating a method for BAN
pairing two wireless devices according to embodiment of the present
disclosure.
[0044] FIG. 4 is a block diagram illustrating some component
circuits that comprise two wireless devices configured to be BAN
paired according to one embodiment.
[0045] FIGS. 5A-5D are perspective views illustrating other types
of wireless devices configured to be BAN paired according to one or
more embodiments of the present disclosure.
[0046] FIG. 6A-6C is perspective views illustrating other types of
wearable devices configured to be BAN paired according to one or
more embodiments of the present disclosure.
[0047] FIG. 7 is a flow diagram illustrating a method for BAN
pairing a door and a wireless wearable device according to an
embodiment of the present disclosure.
[0048] FIG. 8A-8B are perspective views illustrating BAN paired
door and wristlet, where the wristlet is being used as a key
according to embodiment of the present disclosure.
DETAILED DESCRIPTION
[0049] The present disclosure provides a method for initializing
and BAN pairing a user's wireless device with a peripheral device
by employing the user's own body as a transmission medium for the
signals and data required for pairing the devices. More
particularly, the devices described herein can accurately detect
whether each is in contact with the same user's body, and initiate
BAN pairing with each other based on that determination. In doing
so, the present disclosure provides a secure and reliable method in
which to transmit the sometimes sensitive data required to BAN pair
two devices.
[0050] Turning to the drawings, FIG. 1 is a perspective view of a
system 10 configured according to one embodiment. As seen in FIG.
1, system 10 comprises a pair of wireless devices 20, 40 associated
with a user. The two devices are configured to pair with one
another, and in this embodiment, comprise a cellular telephone 20
held in the user's hand 12, and a wearable device, such as a
wristlet 40 worn around the wrist of the hand 12 that is holding
the cellular telephone 20. As described in more detail later, both
the cellular telephone 20 and the wristlet 40 comprise
communication circuitry and corresponding software that enables the
devices to establish communications links within, on, or in close
proximity to the user's body, and to communicate the data and
signals needed for pairing over those links.
[0051] More particularly, the cellular telephone 20 and the
wristlet 40 (collectively, "devices 20, 40") establish
communications links between them that allow the devices 20, 40 to
communicate signals and data. Although the communications links may
comprise an air interface that is external to, but proximate, the
user's body, at least one communication link utilizes the user's
own body as a transmission medium to carry the signals and data
between the devices 20, 40. Such links--i.e., those links that are
within or on the user's body--are referred to herein as "Body Area
Network" (BAN) communication links or BAN links.
[0052] Body Area Networks (BANs), which may also be referred to as
a "Wireless Body Area Networks" (WBANs), is a technology that
utilizes low-power sensor circuitry disposed in and on a user's
body to provide real-time monitoring of the user. Conventionally,
this technology has been utilized for the real-time health
monitoring patients and diagnosing their conditions and illnesses
(e.g., diabetes monitoring, and the like); however, in this
disclosure, the ability to communicate using a BAN link is utilized
to securely communicate the signals and data that are needed to
pair the devices 20, 40. More particularly, the user's own body
(e.g., the user's hand) functions as a "connector" between the two
devices 20, 40. So-connected, the devices 20, 40 will be able to
detect one another's presence, as well as to transmit and receive
tokens used in their pairing.
[0053] For the interested reader, BANs are fully described in the
IEEE standard P802.15.6/D01 entitled, "Wireless Medium Access
Control (MAC) and Physical Layer (PHY) Specifications for Wireless
Personal Area Networks (WPANs) Used in or Around a Body." That
standard, which was published in May, 2010, is incorporated herein
for reference in its entirety.
[0054] The present disclosure provides different methods for
pairing the cellular telephone 20 with the wristlet 40; however, as
those of ordinary skill in the art will appreciate, other methods
not specifically described herein are also possible. Further, all
methods employ bi-directional communications between the wristlet
40 and the cellular telephone 20. For example, as seen in FIG. 2A,
the devices 20, 40 employ the user's body as a transmission medium
for only one of the communication links, and another wireless
technology (e.g., BLUETOOTH/BLE, WiFi, NFC, etc.) as a transmission
medium for the other link. In such cases, the wristlet 40 may
represent a BAN transmitter, while the cellular telephone 20
represents a BAN receiver. Only certain signals and data might be
transmitted through the user's own body via a BAN communications
link 14, while other signals and data are transmitted externally
to, but proximate, the user's body via an air interface link 16.
However in other embodiments, such as that seen in FIG. 2B, devices
20, 40 employ the user's body as the transmission medium two-way
communications. Thus, BAN link 14 may, in some embodiments,
comprise a bi-directional BAN link.
[0055] FIG. 3A illustrates a method 60 by which the cellular
telephone 20 and the wristlet 40 seen in FIG. 2A are configured to
BAN pair with each other according to one embodiment. Method 60
begins with the cellular telephone 20 and the wristlet 40 detecting
each other as being proximate to each other (box 62). Such
detection methods are well-known in the art of local connectivity,
and as such, are not described in detail here. Once the two devices
20, 40 detect each other, one or both of the devices 20, 40
determines whether the other of the devices 20, 40 is currently in
contact with the body of the same user (box 64). If it is
determined that both devices 20, 40 are not currently in contact
with the body of the same user (box 66), the method ends. If it is
determined that both devices 20, 40 are currently in contact with
the body of the user (e.g., the user that is wearing the wristlet
40 is also holding the cellular telephone 20 in his or her hand)
(box 66), the devices 20, 40 will BAN pair with each other (box
68).
[0056] FIGS. 3B-3C illustrates a method 80 for BAN pairing the two
devices 20, 40 in greater detail. As seen in FIG. 3B, method 80
begins with the user placing the wristlet 40 onto his/her wrist. In
one embodiment, the wristlet 40 is configured to self-detect when
it is secured to the user's wrist, and in response, activate its
Near Field Communications (NFC) transceiver (box 82). Such
self-detection for the wristlet 40 is described, for example, in
co-pending U.S. application Ser. No. 61/912,223 entitled "A
Wearable Device and a Method for Storing Credentials Associated
with at least One Electronic Device." The '223 application was
filed on Dec. 5, 2013, and is incorporated herein by reference in
its entirety and in co-pending U.S. application No. 61/942,753
entitled "Pairing consumer electronic devices using a cross-body
communication protocol". The '753 application was filed on Feb. 21,
2014, and is incorporated herein by reference in its entirety.
[0057] By way of example, the wristlet 40 may comprise a sensor
that contacts the user's skin when the wristlet 40 is placed on the
user's wrist. Since it may be difficult to distinguish whether the
wristlet 40 is on the user's wrist or on some other part of the
user's body, the sensor may comprise a component configured to
detect tremors in the user's body. Particularly, human muscles have
a tremor commonly referred to as "the 8-12 Hz component."
Therefore, the sensor utilized for wristlet 40 may comprise an
accelerometer configured to detect such tremors within this
frequency range. Note, however, that the wristlet 40 is not limited
to the use of accelerometers for the sensor.
[0058] Rather, other methods of self-detection are also possible.
For example, wristlets 40 in other embodiments of the present
disclosure utilize sensors configured to detect the user's pulse,
blood flow, temperature, and the like.
[0059] Once the wristlet 40 activates its NFC transceiver, a
corresponding NFC transceiver at the cellular telephone 20 can
establish an NFC link (i.e., air interface link 16) with the NFC
transceiver at wristlet 40. Particularly, the user may place the
cellular telephone 20 within close proximity of the wristlet 40
(e.g., within a few millimeters distance) to tag the wristlet (box
84).
[0060] Tagging the wristlet 40 "BT/BLE pairs" the devices 20,
40--that is, the tagging causes the two devices 20, 40 to pair with
each other over the air interface link 16, as opposed to BAN
pairing which occurs over the BAN link 14.
[0061] Once the devices 20, 40 are BT/BLE paired and the air
interface link 16 is established, the cellular telephone 20 can
determine whether the wristlet 40 is also in contact with the same
user's body. In this embodiment, the cellular telephone 20 sends a
request to the wristlet 40 over the air interface link 16
requesting that the wristlet 40 indicate its BAN capabilities, if
any, to the cellular telephone 20 (box 86), to which the wristlet
40 responds (box 88). As seen in FIG. 3C, if the wristlet 40
indicates that it is not capable of BAN communications (box 90),
the method 80 ends. However, if the wristlet 40 indicates (box 90)
that it is capable of communicating with the cellular telephone 20
over the user's body (i.e., using the BAN link 14), the cellular
telephone 20 sends an activation request to the wristlet 40 via the
air interface link 16 requesting that the wristlet 40 activate its
BAN transceiver (box 92).
[0062] The cellular telephone 20 then sends another request to the
wristlet 40, again via the air interface link 16, requesting that
the wristlet 40 provide the cellular telephone 20 with a unique
identifier (box 94). The cellular telephone 20 may then activate
its own BAN receiver. Upon receipt of the request, wristlet 40
obtains a unique identifier from its memory, for example, and sends
that identifier to the cellular telephone 20 over the BAN link 16
(box 96). The unique identifier sent by the wristlet 40 may be any
unique indicator needed or desired. However, in one embodiment, the
unique identifier comprises a hardware identifier for the wristlet
40.
[0063] Upon receiving the unique identifier from wristlet 40,
cellular telephone 20 uses the identifier to generate a unique key
that will be shared between the cellular telephone 20 and the
wristlet 40 and used for communications between the two devices 20,
40 (box 98). For example, in one embodiment, cellular telephone 20
inputs the hardware identifier received from wristlet 40 into a
hash function. The output of the hash function is the unique key
that both the cellular telephone 20 and the wristlet 40 will
utilize to communicate with each other over one or both of the BAN
link 14 and the air interface link 16.
[0064] Once generated, the cellular telephone 20 stores the key in
its memory circuit and sends the key back to the wristlet 40 via
the air interface link 16 (box 100). The wristlet 40 stores the key
in its memory circuit and transmits the key it just received over
the air interface link 16 to cellular telephone 20 over BAN link 14
(box 102). After receiving the key from wristlet 40 over BAN link
14, cellular telephone 20 may validate the key (box 104). For
example, if the BAN receiver at cellular telephone 20 receives the
key on the BAN link 14 within a predefined time period, the
cellular telephone 20 may compare the received key to the key it
previously stored in its memory circuit. If the two keys match (box
106), the key received from the wristlet 40 over BAN link 14 is
deemed valid, and the cellular telephone 20 and wristlet 40 can BAN
pair (box 108). Otherwise, if the cellular telephone does not
receive the key on the BAN link 14 within the predefined time
period or if the keys do not match, the method 60 ends without the
devices being BAN paired.
[0065] It should be noted that in some embodiments, the cellular
telephone 20 may activate its BAN receiver only when needed to
conserve energy resources. For example, in one embodiment, the
cellular telephone 20 may be configured to activate its BAN
receiver responsive to sending the key to the wristlet 40 over the
first communication link. Once activated, the cellular telephone 20
will listen to receive the key over the BAN link from the wristlet
40. If the key is received within a predetermined time, the
cellular telephone 20 can validate the key.
[0066] FIG. 3D illustrates a method 110 in which the cellular
telephone 20 can determine whether the wristlet 40 is in contact
with the body of the same user in accordance with one embodiment.
Method 110 assumes that the cellular telephone 20 has detected the
presence of the wristlet 40.
[0067] Method 110 begins with the cellular telephone 20 sending a
request to the wristlet 40 to request that the wristlet 40 "ping"
the cellular telephone 20 over a BAN link (box 112). Such a ping
may comprise, for example, any signal or data sent by the wristlet
40. The cellular telephone 20 listens on the BAN link for the ping
(box 114). If the cellular telephone 20 does not receive the ping
over the specified BAN link (box 116), the cellular telephone can
determine that the wristlet 40 is not in contact with the body of
the same user that is holding the cellular telephone 20 (box 118)
and the method ends. If the cellular telephone 20 does receive the
ping over the specified BAN link, however (box 116), the cellular
telephone determines that the wristlet 40 is in contact with the
same user that is holding the cellular telephone 20 (box 120).
[0068] The cellular telephone 20, in one embodiment, then displays
a prompt to the user prompting him/her to indicate whether the
cellular telephone should or should not BAN pair with the wristlet
40 (box 122). If the user indicates that the cellular telephone 20
should not BAN pair with the wristlet 40 (box 124), the method
ends. Otherwise, the mobile phone sends a key to the wristlet 40
(box 126). The wristlet 40, upon request, will then send the key
back to the cellular telephone 20, as previously described. By way
of example only, consider a cellular telephone 20 that displays a
passcode screen to a user whenever the user wishes to access the
cellular telephone functions.
[0069] Conventionally, a user would have to manually input a
predefined passcode to unlock the cellular telephone 20 each time
the user wanted to unlock the cellular telephone 20. With the
method described above, however, wristlet 40 would BAN pair with
the cellular telephone 20, and would simply send the key to the
cellular telephone 20 responsive to a request for the key. A valid
key would cause the cellular telephone 20 simply unlock, thereby
allowing the user of the cellular telephone 20 to bypass the
passcode screen. Alternatively, the method of the present
disclosure may be configured to allow the user to bypass the
passcode screen based on the determination that both devices 20, 40
are in contact with the body of the same user, and on the
determination that the wristlet 40 has provided the cellular
telephone 20 the proper key via the BAN link 14.
[0070] Once the cellular telephone 20 and the wristlet 40 are BAN
paired, the two devices 20, 40 may communicate any type of data
needed or desired. For example, in one embodiment, the cellular
telephone 20 can control the transmission of data by the wristlet
40 by selectively enabling and disabling a BAN transmitter at the
wristlet 40 (box 128). Particularly, the cellular telephone 20 can
be configured to generate and send signals or commands to the
wristlet 40 via the air interface link 16 or the BAN link 14. Upon
receipt, the wristlet 40 would either enable or disable its
transmitter in accordance with the received signals. In this
manner, the cellular telephone 20 can help to conserve power
resources at wristlet 40.
[0071] Such functions are beneficial, for example, whenever
communications between the two devices 20, 40 are completed or have
been idle for some predetermined time. However, those of ordinary
skill in the art should appreciate that sending explicit commands
or signals are not required for the present disclosure. In another
embodiment, for example, the wristlet 40 is configured to detect
when a communications function has been completed, such as when a
user has successfully logged onto cellular telephone 20. Upon such
detection, the wristlet 40 may be configured to autonomously
disable its transmitter(s), thereby stopping communications with
cellular telephone 20. To re-establish communications, the wristlet
40 need only to provide the key it stored in its memory to the
cellular telephone 20. If valid, the cellular telephone 30 can once
again communicate with the wristlet 40. Alternatively, the process
of establishing the BAN links 14, 16 and pairing the two devices
20, 40, as previously described, may be repeated.
[0072] It should be noted that the previously described embodiments
illustrate only one of the links as using the user's body as a
transmission medium. However, this is for illustrative purposes
only. Any of the embodiments described herein may be configured to
employ the user's body as a transmission medium for communication
in both directions (i.e., a b-directional BAN link 14). In such
embodiments, both the cellular telephone 20 and the wristlet 40
could comprise corresponding BAN transceivers, and thus,
communicate all signals and data via a bi-directional BAN link
14.
[0073] FIG. 4 is a block diagram illustrating some of the
components of the two devices that comprise system 10--i.e., the
cellular telephone 20 and the wristlet 40. Cellular telephone 20
comprises a processor circuit 22, a BAN communications interface
circuit 24, a memory 30, a communications interface circuit 32, and
a User Input/Output interface 36.
[0074] Processor circuit 22 comprises an electronics circuit
configured to generally control the operation of the cellular
telephone 20 according to programs and data stored in memory
30.
[0075] Such programs and data include, but are not limited to,
logic and instructions that, when executed by the processor circuit
22, control the establishment of BAN link 14 and air interface link
16. The programs and data may also configure the processing circuit
22 to generate the unique keys from the identifiers sent by the
wristlet 40, whether and how the cellular telephone 20 pairs with
the wristlet 40, and how the cellular telephone 20 can enable
and/or disable the transmitter(s) at wristlet 40. Processing
circuit 22 may be implemented, for example, in a single
microprocessor, or in multiple microprocessors. Suitable
microprocessors may include general purpose and special purpose
microprocessors, as well as digital signal processors.
[0076] The BAN communications interface circuit 24 comprises a
first BAN interface circuit 26 and a second BAN interface circuit
28. Each of these circuits 26, 28 may comprise, for example, a
transmitter, a receiver, or both (i.e., a transceiver) controlled
to communicate with a corresponding circuit 46, 48 at the wristlet
40. In one embodiment, both circuits 26, 28 are configured to
transmit signals and data using the user's own body as a
transmission medium.
[0077] In other embodiments, one of the circuits 24, 26 comprises
an NFC transmitter/receiver (or a transmitter/receiver operating
according to some other protocol such as BLUETOOTH), for example,
while the other of two circuits 26, 28 comprises a
transmitter/receiver that communicates signals and data via the BAN
link 14 within or on the user's body.
[0078] Memory circuit 30 is a computer readable medium representing
the entire hierarchy of memory in, or accessible to, cellular
telephone 20. Memory 30 may comprise both random access memory
(RAM) and read-only memory (ROM), and may be implemented, for
example, as one or more discrete devices, stacked devices, or
removable devices, such as a flash drive or memory stick. In one
embodiment, the memory 30 may be integrated with processor circuit
22. As previously stated, memory circuit 30 may store programs 36
responsible for controlling the operation of cellular telephone 20,
as well as the unique identifiers received from wristlet 40 and the
unique keys generated based on those unique identifiers.
[0079] The communications interface circuit 32 may comprise any
transceiver for transmitting and receiving data, such as downloaded
video and/or audio content, for example, to and from a base station
in a wireless communications network. Thus, in one embodiment, the
communications interface circuit 32 comprises a fully functional
cellular radio transceiver that operates according to any known
standard. Such standards include, but are not limited to, the
Global System for Mobile Communications (GSM), TIA/EIA-136,
cdmaOne, cdma2000, UMTS, WiFi, and Wideband CDMA.
[0080] The User I/O interface 34 provides a user with the necessary
components to interact with the cellular telephone 20. Typically,
the UI 34 includes a display, a speaker, a microphone, and a
variety of controls, which may include, but is not limited to, a
keypad or buttons. In one embodiment, the processing circuit 22
controls the UI 34 to display a prompt to the user to indicate
whether the user wishes to pair the cellular telephone 20 to
wristlet 40. Wristlet 40 also comprises a variety of components
including, but not limited to, a processor circuit 42, a BAN
communications interface circuit 44, a memory circuit 50, and a
sensor 52. The processor circuit 42 may also comprise an
electronics circuit configured to generally control the operation
of the wristlet 40 according to programs and data stored in memory
50. Such programs and data include, but are not limited to, logic
and instructions that, when executed by the processor circuit 42,
control the establishment of BAN link 14 or air interface link 16.
The programs and data may also configure the processing circuit 42
to retrieve and send the unique identifier (e.g., the hardware
identifier of wristlet 40) to the cellular telephone 20, as well as
to store the key generated by the cellular telephone 20 in memory
50, and send the key to the cellular telephone 20 via BAN link 14
or air interface link 16. As above, the processing circuit 42 may
be implemented, for example, in a single microprocessor, or in
multiple microprocessors. Suitable microprocessors may include
general purpose and special purpose microprocessors, as well as
digital signal processors.
[0081] The BAN communications interface 44 also comprises a pair of
BAN interface circuits 46, 48. Like circuits 26, 28 in cellular
telephone 20, one or both of the BAN interface circuits 46, 48 may
comprise, for example, a transmitter, a receiver, or both (i.e., a
transceiver).
[0082] Further, the circuits 46, 48 may be controlled to
communicate with the corresponding circuits 26, 28 at the cellular
telephone 20. In one embodiment, both circuits 46, 48 are
configured to transmit signals and data using the user's own body
as a transmission medium. In other embodiments, however, one of the
circuits 46, 48 comprises an NFC transmitter/receiver (or a
transmitter/receiver operating according to some other protocol
such as BLUETOOTH or WiFi), for example, while the other of the two
circuits 46, 48 comprises a transmitter/receiver that communicates
signals and data via the BAN link 14 within or on the user's body.
Memory circuit 50 is a computer readable medium representing the
entire hierarchy of memory in, or accessible to, wristlet 40.
Memory 50 may comprise both random access memory (RAM) and
read-only memory (ROM), and may be implemented, for example, as one
or more discrete devices, stacked devices, or removable devices,
such as a flash drive or memory stick. In one embodiment, the
memory 50 may be integrated with processor circuit 42.
[0083] As previously stated, memory circuit 50 may store the logic
and instructions responsible for controlling the operation of
wristlet 40, as well as for storing the unique keys generated based
on the unique identifiers associated with wristlet 40.
[0084] The sensor 52 can be any sensor known in the art configured
to detect when the wristlet is secured to the user's wrist. In one
embodiment, such a sensor may comprise a "tremor sensor" configured
to detect the tremors present in human muscles. As stated
previously, such sensors are able to sense tremors within the 8-12
Hz range. However, other sensors are also possible, such as those
that are configured to detect body temperature, blood flow, and
pulse, for example. As stated above, signals coming from sensor 52
may be received at the processor circuit 42, and used as a trigger
to activate one or both of the BAN interface circuits 46, 48 and
establish BAN link 14 and/or 16.
[0085] Those of ordinary skill in the art should readily appreciate
that the present disclosure is not limited to pairing a cellular
telephone 20 and a wristlet 40, but rather, may be implemented to
pair other devices in addition to, or in lieu of, devices 20, 40.
For example, the wristlet 40 need not comprise a wristlet, but
rather, may be embodied as any wearable device, such as a ring, a
necklace or a coin in the pocket of the user, for example, as shown
in FIG. 6A-6C.
[0086] FIG. 5A illustrates a system 120 in which the wristlet 40
allows the user to communicate with a computing device 122, and
more particularly, the keyboard 124, via one or both of the BAN
links 14, 16. In this embodiment, the wristlet 40 and the computing
device 122 pair with each other upon detecting that the user
wearing the wristlet 40 is also touching the keyboard 124. In
accordance with the methods described above, the user could unlock
the keyboard using the wristlet 40, and once unlocked, utilize the
computing device to perform any known function. The wristlet 40,
however, could be used so as to restrict use of the computing
device to certain users having a wristlet 40 identified by a given
identifier.
[0087] FIG. 5B illustrates another embodiment in which the wristlet
40 is configured to allow a user to access and use a game system
130 having a display 132. Particularly, the wristlet 40 BAN pairs
with the hand held controller 134, and as a result of the pairing,
permits the user to access and use the game system 130. In one
embodiment, the user wearing wristlet 40 may automatically log into
a game or on-line system, for example, whenever the controller 134
and the wristlet 40 are in contact with the body of the same user,
as described in the previous embodiments.
[0088] Similarly, as seen with the system 140 in FIG. 5C, the
wristlet 40 may be configured to facilitate access for a user into
a locked room. In these embodiments, the wristlet 40 could be
configured to BAN pair with the door handle 142, for example, when
the user grabs the handle to gain entry. Provided entry is
permitted, the door would be unlocked to allow the user in the
room. Otherwise, the door would remain locked and the user would be
denied entry.
[0089] FIG. 8A-8B illustrates another embodiment in which the
wristlet 40 could be configured to BAN pair with a BAN enabled door
140 provided with a wireless communication unit. The unit may be
provided within the door or in a handle 142 on the door with a lock
(not shown), for example, when the user grabs the handle to gain
entry. The handle 142 may be a handle to private homes, workplaces,
rooms etc.. The lock may be a pin code input device 143. Further
the door may also be provided with a voice output 144. The door may
be provided with a capacitive sensor to detect when the user grabs
the handle on the door. The capacitive sensor may be provided in
the handle or within the door near the handle.
[0090] The method will now be described starting from FIG. 7
disclosing method steps, performed in a first wearable BAN enabled
communication device 40, such as a wristlet, ring, bracelet, watch,
tag, which may be connected to a second wearable BAN enabled
communication device, such as a mobile phone, tablet, pad or may be
connected to a cloud service through BAN, BLE, WiFi, for pairing of
the wearable BAN enabled communication device 40 and a BAN enabled
door 140 with a handle 142, to be touched, and a lock or a pin code
input device 143. The described steps are not dependent on each
other, these steps may be implemented in any combination.
[0091] In the first steps S1, the wristlet 40 establish a
connection S1 with the BAN enabled door 140 when detecting each
other as being proximate to each other.
[0092] In the second step S2, the door 140 and/or the wristlet 40
determine whether each device is currently in contact with the body
of the same user.
[0093] In the third step S3, the door 140 and the wristlet 40 are
paired if both the devices are contacting the same user's body.
[0094] The method will now be described starting from FIG. 8A-8B,
where the wristlet and the door are paired according to the above
described methods.
[0095] In the first steps, S4-S6, as shown in FIG. 8A, a key is
sent to the wristlet.
[0096] In step S4 the user enters a pin code to the pin code input
device 143 and puts the hand on the handle 142 of the door, in step
S5. In one aspect the door 140 or the handle of the door detects
the hand by using a capacitive sensor provided on the handle 142 or
in the door close to the handle, and pings the wristlet through
BAN. In one aspect, where no capacitive sensor is provided, the
door or handle sends BAN signals directly when the pin code is
entered, for a few seconds.
[0097] In step S6, if the BAN wristlet is on the body (arm, pocket,
ring or other), the wristlet receives the BAN signal and responds
with a confirmation over BAN. The user will be asked e.g. through a
voice interface 144 of the door or through a display interface, not
shown, provided on the door "would you like to transfer a key to
the wristlet, confirm with hash key (#)". If the user wants to send
a key to the wristlet the user confirms by pressing the hash key
(#), and a key (e.g. long hash word) will be sent to the wristlet
through BAN. This key will be kept on the wristlet as long as the
wristlet is on the body. In one aspect, the display interface or
the voice interface may be provided in the second wearable BAN
enabled communication device connected to the wristlet 40.
[0098] In step S7, as shown in FIG. 8B, the door is opened.
[0099] Next time the user puts the hand on the handle, the handle
will detect the hand, if a capacitive sensor is provided, and send
a BAN signal (e.g. at 4 Hz) to the BAN wristlet and request the
key. In one aspect, when no capacitive sensor is provided, the lock
continuously sends BAN signals (e.g. at 4 Hz) and if the signal is
received by the wristlet, the wristlet will respond with the key,
and if the key is valid the door will open. Keys can be sent to
several wristlets, when there are several people in the family.
[0100] If wristlet is taken off, it is detected by a capacitive
sensor on the back of the wristlet. The key will be removed from
the wristlet. Thereafter the wristlet can't be used to open the
door. Thus by removing of the key from the wristband will prevent
that the wristband can be used to open the door if the wristlet is
stolen.
[0101] In one aspect the user may want the key to stay in the
wristlet when removed, thus the removal or not of the key can be a
setting, e.g. through an application in a mobile phone paired with
the wristlet.
[0102] In yet another embodiment, seen in FIG. 5D, the wristlet 40
may be used to facilitate a payment by the user. In this
embodiment, a credit card 150 or similar financial vehicle would
only be validated for use by a downstream server, for example, if
the person "swiping" the card to effect payment is the person that
owns the card. In one embodiment, such "ownership" may be
determined responsive to detecting that the user swiping the card
140 is also the user wearing the wristlet 40. Thus, the wristlet
40, in this embodiment, would communicate and pair with the card
150 so long as the user wore the wristlet 40 on his/her wrist and
touched the card.
[0103] The present invention may, of course, be carried out in
other ways than those specifically set forth herein without
departing from essential characteristics of the invention. As
described above, the present disclosure is not limited to BAN
pairing a cellular telephone 20 and a wristlet 40, but rather, may
be implemented to pair other devices as well. Accordingly, the
present embodiments are to be considered in all respects as
illustrative and not restrictive, and all changes coming within the
meaning and equivalency range of the appended claims are intended
to be embraced therein.
* * * * *