Abstract: The present invention relates to a system and method for data entry from one mobile device to another using robust acoustic communication for one or more utility purpose.Atransmitting device transmits data to a receiving device over upper audio band in an encrypted form for secure data transmission. The data to be transmitted is tagged with an identity. At the receiving end the data is decrypted and the identity of the received and transmitted data is matched. The identity once being matched the received data is further processed for data entry and is further used for one or more utility purpose.
FORM 2
THE PATENTS ACT; 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See Section 10 and Rule 13)
Title of invention:
SYSTEM AND METHOD FOR INITIATING AND PROVIDING DATA ENRTY USING UPPER AUDIO BAND COMMUNICATION CHANNEL
Applicant
TATA Consultancy Services Limited A Company Incorporated in India under The Companies Act, 3956
Having address:
Nirmal Building, 9th Floor.
Nariman Point. Mumbai 400021,
Maharashtra, India
The following specification particularly describes the invention and the manner in which it is to be performed.
FIELD OF INVENTION
0001 The present invention relates to a system and method for short range data
communication over a particular frequency range (upper audio band). More particularly,
the present invention relates to a system and method to provide data entry by a
communication device by using an upper audio band communication channel.
BACKGROUND OF THE INVENTION
2 Wireless data communication enables the transfer of data without any physical medium effectively. Short range communication typically covers short distances ranging from 6 feet to 20 feet. A variety of new technologies have been implemented for short range communication which use radio frequencies, microwave or ultrasonic frequency range for transmission of data. Applications like infra-red, blue tooth are also widely used for transmitting data over short range. Devices with conventional Radio Frequency interfaces require significant power for communication and computation. This consumes energy and reduces the battery life of portable mobile devices.
3 NFC (Near Field Communication) systems are being deployed for providing an effective peer-to-peer communication. These NFC systems due to their simpler set up and more secured connection, are replacing connectivity via Bluetooth or similar applications. The conventional NFC devices have a constraint of functioning under a predefined range of distance. Hence, it's still a challenge to obtain constrained-free services through these conventional NFC devices.
4 A large number of methods and systems have been proposed that enable connectivity by using NFC short range technology. These systems are mostly used for instant payment, coupon delivery etc by simply using the mobile devices. However, in order to provide services like ticketing, payment and data entry, existing Near Field Communication (NFC) systems (handsets and infrastructure) need to work closely with service providers. The cost involved in deploying new hardware and infrastructure is very high for the NFC based applications which has to be installed on the mobile devices, data terminals, laptops or desktops used for data transfer. Moreover, the NFC
based devices do not provide a secure, selective and robust data entry for different IT applications.
5 One such methodology employs the ultrasonic band which is above 20 KHz frequency range for data communication. The speaker phone of a device transfers data over this almost inaudible range which is received by a microphone of a receiving device. This methodology has lot of advantages like faster data transmission, low cost infrastructure etc. Data could be transmitted very easily by using existing hardware components like microphone, speaker present in the smart phones by using a particular frequency range (just above 20 KHz). However, the method would not serve its best where the data is transmitted by using low cost speakers and microphones which may not have a good frequency response in this range. Although the prior art has engineered a relative short range for transmissions, with two devices within 6 inches of one another in order to complete a transaction. However, this operating distance may not be sufficient for deployment in crowded/congested areas with the need for larger distance between user mobile devices and receiving stations. Also, not all the users may possess mobile devices with the required speaker/microphone sensitivity for optimal performance. Moreover, the prior art remains silent on security protocols while data transmission and fails to disclose anything about robust data entry for some utility purpose.
6 Near sound data transfer technology is a popular technology used for contactless transaction. NSDT uses the mobile phone's microphone as a receiver and its audio channel as a transporter and offers immediate compatibility with any mobile device. Though it provides a simple way for data transaction, it is not optimized for enabling a context aware, secure and robust data entry application.
7 Therefore, there is a need of such type of short range data communication system which is independent of standard hardware interfaces and is portable with respect to different platforms. The system and method should involve low cost in terms of hardware support and should be capable of addressing security issues while transmitting the data for one or more utility purpose.
SUMMARY OF THE INVENTION
8 This summary is provided to introduce aspects related to systems and methods for initiating and providing data entry using upper audio band communication channel and the aspects are further described below in the detailed description. This summary is not intended to identify essential features of the claimed subject matter nor is it intended for use in determining or limiting the scope of the claimed subject matter.
9 The present invention discloses a transmitting system for initiating a data entry using an upper audio band communication channel. The transmitting system comprises of a processor and a memory coupled to the processor. The memory comprises of a data requesting module configured to transmit a request for receiving a template from a receiving station and a data requesting module configured to allow a user to fill predefined fields in the template in a selective mode by executing a security mechanism. The security mechanism enables a reception of a security key transmitted by the receiving station to encrypt the pre-defined fields of the template filled by the user. The pre-defined fields to be encrypted are selected by the receiving station. The transmitting system further comprises of a first communication module configured to transmit the template so filled by the user over the upper audio band communication channel to the receiving station. The first communication module is further configured to receive an acknowledgement message from the receiving station with respect to completion of the data entry in the template performed by the receiving station.
10 The present invention also discloses a receiving system for data entry using an upper audio band communication channel. The receiving system comprises of a processor and a memory coupled to the processor. The memory comprises of a data sharing module configured to transmit to a transmitting system a template and a security key with respect to a request received from a user of the transmitting system. The receiving system further comprises of a second communication module configured to receive from the transmitting system the template. The template contains pre-defined fields filled by a user, and wherein the pre-defined fields are filled in an encrypted form. The receiving system further comprises of a decoding module configured to decode and decrypt the encrypted data and an authentication module configured to authenticate the data so decoded and decrypted to check for authentication of the user and a data filling
module configured to complete the data entry in the template received from the transmitting system. Such that authentication module further transmits an acknowledgement message to the user of the transmitting system after the completion of the data entry irt the template,
11 The present invention also discloses a method for initiating a data entry using an upper audio band communication channel. The method comprises of transmitting a request for receiving a template from a receiving station and allowing a user to fill predefined fields in the template in a selective mode by executing a security mechanism. The security mechanism enables a reception of a security key transmitted by the receiving station to encrypt the pre-defined fields of the template filled by the user, wherein the pre-defined fields to be encrypted are selected by the receiving station. The method further comprises of transmitting the template so filled by the user over the upper audio band communication channel to the receiving station and receiving an acknowledgement message from the receiving station with respect to completion of the data entry in the template performed by the receiving station.
12 The present invention also discloses a method for data entry using an upper audio band communication channel. The method comprises of transmitting to a transmitting system a template and a security key with respect to a request received from a user of the transmitting system. The method further comprises of receiving from the transmitting system the template, wherein the template contains pre-defined fields filled by a user, and wherein the pre-defined fields are filled in an encrypted form and completing the data entry in the template received from the transmitting system.
BRIEF DESCRIPTION OF DRAWINGS
13 Figure I illustrates a communication environment for initiating a data entry in a communication network, in accordance with an embodiment of the invention.
14 Figure 2 schematically illustrates components of a transmitting system in accordance with an embodiment of the invention.
15 Figure 3 illustrates a communication environment to provide a data entry in a communication network, in accordance with an embodiment of the invention
16 Figure 4 schematically illustrates components of a receiving system in accordance with an embodiment of the invention.
17 Figure 5 illustrates a mechanism for initiating a data entry by a transmitting system in accordance with an embodiment of the invention.
18 Figure 6 illustrates a mechanism of data entry by a receiving system in accordance with an embodiment of the invention.
19 Figure 7 illustrates a method of initiating a data entry over an upper audio band communication channel in accordance with an embodiment of the invention.
20 Figure 8 illustrates a method to provide a data entry by using an upper audio band communication channel in accordance with an embodiment of the invention.
DETAILED DESCRIPTION OF THE INVENTION
21 Systems and methods for initiating a data entry by using an upper audio band communication channel are described. The present subject matter discloses transmitting a request to a receiving station for obtaining or receiving a template. One or more predefined fields of the template are filled by a user in a selective mode by executing a security mechanism. The security mechanism encrypts the pre-defined fields filled by the user. The template is then transmitted to the receiving station and an acknowledgement message is received upon completion of the data entry by the receiving station.
22 While aspects of described system and method for initiating a data entry using an upper audio band communication channel may be implemented in any number of different computing systems, environments, and/or configurations, the embodiments are described in the context of the following exemplary system.
23 Referring now to Figure 1, a network implementation 100 of a transmitting system 102 for initiating a data entry is illustrated, in accordance with an embodiment of the present subject matter. In one embodiment, the transmitting system transmits a request to a receiving system to obtain a template. The template is used to obtain plurality of services by using the transmitting system for which some data entry is required to perform by the user. The user transmits some useful data to the receiving system in a secured manner and obtains the service. The completion of the data entry is
then performed by the receiving system after authenticating the user by checking the data received from the transmitting system. An acknowledgement message is then received by the transmitting system and required services may then be obtained.
24 Although the present subject matter is explained considering that the transmitting system 102 is implemented as a communication device, it may be understood that the transmitting system 102 may also be consists of a variety of computing systems, such as a laptop computer, a desktop computer, a notebook, a workstation, a mainframe computer, a server, a network server, and the like. Transmitting system may also consist of a communication device such as mobile phone, a server and the like. Such type of transmitting system may have a radio interface (CDMA. GSM, Bluetooth etc) and an audio interface. The mobile phone with radio frequency based cellular interface and an audio interface may work as the transmitting system. It will be understood that the transmitting system 102 may be accessed by multiple users through one or more user devices 104-1, 104-2... 104-N, collectively referred to as user 104 hereinafter, or applications residing on the user devices 104. Examples of the user devices 104 may include, but are not limited to, a portable computer, a personal digital assistant, a handheld device, and a workstation. The user devices 104 are communicatively coupled to the transmitting system 102 through a network 106.
25 In one implementation, the network 106 may be a wireless network, a wired network or a combination thereof. The network 106 can be implemented as one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), the internet, and the like. The network 106 may either be a dedicated network or a shared network. The shared network represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further the network 106 may include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, and the like.
26 Referring now to Figure 2, the transmitting system 102 is illustrated in accordance with an embodiment of the present subject matter. In one embodiment the
transmitting system 102 may include at least one processor 202, an input/output (I/O) interface 204. and a memory 206. The at least one processor 202 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the at least one processor 202 is configured to fetch and execute computer-readable instructions stored in the memory 206.
27 The I/O interface 204 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, and the like. The I/O interface 204 may allow the transmitting system 102 to interact with a user directly or through the client devices 104. Further, the I/O interface 204 may enable the transmitting system 102 to communicate with other computing devices, such as web servers and external data servers (not shown). The I/O interface 204 can facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, LAN, cable, etc.. and wireless networks, such as WLAN, cellular, or satellite. The I/O interface 204 may include one or more ports for connecting a number of devices to one another or to another server.
28 The memory 206 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes. The memory 206 may include modules 208 and data 210.
29 The modules 208 include routines, programs, objects, components, data structures, etc., which perform particular tasks or implement particular abstract data types. In one implementation, the modules 208 may include a data requesting module 212, a data entering module 214. a first communication module 216and other modules 218. The other modules 218 may include programs or coded instructions that supplement applications and functions of the transmitting system 102.
30 The data 210, amongst other things, serves as a repository for storing data processed, received, and generated by one or more of the modules 208. The data 210 may also include other data 130. The other data 130 may include data generated as a result of the execution of one or more modules in the other module 218.
31 Referring now to Figure 3, a network implementation 300 of a receiving system 302 for providing a data entry is illustrated, in accordance with an embodiment of the present subject matter. In one embodiment, the receiving system receives a request from a transmitting system 302 to obtain a template and a security key. The template is used to obtain plurality of services by using the transmitting system 102 for which some data entry is required to perform by the user. The user transmits some useful data to the receiving system 302 in a secured manner and obtains the service. The completion of the data entry is then performed by the receiving system after authenticating the user by checking the data received from the transmitting system 102. An acknowledgement message is then received by the transmitting system 102 and required services may then be obtained by the receiving system 302.
32 Although the present subject matter is explained considering that the receiving system 302 is implemented as a communication device, it may be understood that the receiving system 302 may also be implemented as a variety of computing systems, such as a laptop computer, a desktop computer, a notebook, a workstation, a mainframe computer, a server, a network server, and the like. It will be understood that the receiving system 302 may be accessed by multiple users and consists of one or more user devices 304-1, 304-2...304-N, collectively referred to as user 304 hereinafter, or applications residing on the user devices 304. Examples of the user devices 304 may include, but are not limited to, a portable computer, a persona! digital assistant, a handheld device, and a workstation. The user devices 304 are communicatively coupled to the receiving system 302 through a network 306.
33 In one implementation, the network 306 may be a wireless network, a wired network or a combination thereof. The network 306 can be implemented as one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), the internet, and the like. The network 306 may either be a dedicated
network or a shared network. The shared network represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further the network 306 may include a variety of network devices, including routers. bridges, servers, computing devices, storage devices, and the like.
34 Referring now to Figure 4, the receiving system 302 is illustrated in accordance with an embodiment of the present subject matter. In one embodiment, the receiving system 302 may include at least one processor 402, an input/output (I/O) interface 404, and a memory 406. The at least one processor 402 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the at least one processor 402 is configured to fetch and execute computer-readable instructions stored in the memory 406.
35 The I/O interface 404 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, and the like. The I/O interface 404 may allow the receiving system 402 to interact with a user directly or through the client devices 404. Further, the I/O interface 404 may enable the receiving system 402 to communicate with other computing devices, such as web servers and external data servers (not shown). The I/O interface 404 can facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, LAN, cable, etc.. and wireless networks, such as WLAN, cellular, or satellite. The I/O interface 404 may include one or more ports for connecting a number of devices to one another or to another server.
36 The memory 406 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks,
optical disks, and magnetic tapes. The memory 406 may include modules 408 and data 410.
37 The modules 408 include routines, programs, objects, components, data structures, etc., which perform particular tasks or implement particular abstract data types. In one implementation, the modules 408 may include a data sharing module 412, a second communication module 414. a decoding module 415, an authentication module 416, a data filling 418 module and other modules 420. The other modules 420 may include programs or coded instructions that supplement applications and functions of the receiving system 202.
38 The data 410, amongst other things, serves as a repository for storing data processed, received, and generated by one or more of the modules 408. The data 410 may also include other data 424. The other data 424 may include data generated as a result of the execution of one or more modules in the other module 420.
39 In one implementation, referring to figure 5, the transmitting system 102 is used for fast, accurate and secure form filling for various applications using the audio channel. The data to be transmitted is modulated using waveforms with frequencies in the audio band. The forms here refer to templates. The transmitting system 102 initiates a mechanism for transfer of data into data entry forms on a computer terminal (receiving station) using upper audio band communication channel. The data entry may happen on a desktop, laptop, tablet or even another phone acting as the receiving station
40 To initiate the data entry the receiving system registers with a server via the Internet, and downloads XML form templates corresponding to applications intended for use. The fields in the form for acoustic data entry are tagged appropriately. The receiving system displays the form as a GUI interface displaying the fields for data entry. Fields for acoustic data entry are indicated using a speaker icon.
41 In accordance with an embodiment, the Transmitting system 102 may consist of:
42 Laptop/desktop/workstation to transmit the requested form templates and security keys. Such type of transmitting systems 102 have a radio/Ethernet/USB interface and are connected to the Internet
43 Mobile device that transmits requests for form templates, security keys. The mobile devices also transmit the filled form template to a receiving system, the mobile devices also have a radio/Ethemet/USB and audio interfaces.
44 In the next step, the transmitting system (the mobile device) initiates a registration process with a server via the Internet (wireless/wireline channel). The registration process includes:
45 Registering the mobile user Identity, Key exchange for establishing appropriate keys for encrypting data.
46 Requesting for a form template corresponding to an application on the receiver.
47 Receiving a form template from the server, for a requested application.
a. The mobile device (transmitting system) uses the form template to fill in the data in selected fields. The fields that are enabled for acoustic data input mode are selected and data is filled in. The filled in form in XML format is transmitted over the audio channel to the intended receiver. The receiving system receives the XML formatted data over acoustic channel, parses the field tags and fills the appropriate fields. Data received in encrypted form are decrypted using appropriate decryption methods.
48 The transmitting system 102 comprises of the data requesting module 212 to transmit a request for receiving the template or form from the receiving station (as shown in 502). The template is in an XML format.
49 The transmitting system 102 further comprises of the data entering module 214 to allow the user to fill the pre-defined fields in the template or form. The pre-defined fields may be filled in a selective mode. The form fields that can accept the data entry through audio mode may be specifically highlighted and a clickable button with suitable icon may be placed in the neighborhood of the field. The mode of data entry in the form may be selected by the user. The choice of acoustic mode may be made by clicking acoustic button near the form field (step 506).From a Graphical user interface
perspective, the user can select the acoustic entry mode by clicking a button with a microphone icon,
50 From an XML form perspective, the form fields to be filled in by the acoustic mode can be indicated by an appropriate XML tag identifier.
51 The form data consists of several fields. Each field has a unique identity. The transmitting system 102 can control which fields in the form can be filled using acoustic data. Fields in the form can be filled one at a time or several fields simultaneously.
52 The template or form received from the receiving system 302 further includes a standardized data dictionary where the unique identities of the data items may be published and distributed as part of the registration process of the transmitting system 102. so that the compatibility with multiple applications can be ensured.
53 The pre-defined fields so filled may be transmitted to the receiving system 302 in a secure manner, if chosen by applying a security mechanism. Under security mechanism, an Identity based encryption mechanism may be used for the secure data transfer. The identity of each field may be used to derive public/private key pairs and Identity based encryption may be enabled using Elliptic Curve cryptography. In addition to a single identity based key for the whole form, each of the fields may have additional security keys based on their respective identity codes. Here each data entry field in the form is assumed to have its own identity code. The choice of the data entry fields that need to be made secure are controlled by the receiving system.
54 The data frames in the pre-defined fields may be encoded by using a forward error correction (FEC) techniques including various erasure coding schemes. The Erasure codes to be applied on the data frames may be chosen so that if sufficient data packets are delivered to the receiving system, a complete recovery of data is possible in the presence of frame errors. This further enables the communication to work efficiently in a one way channel (half duplex mode).
55 During the registration process (step 504 and 506), the user by using the transmitting system 102obtains the form template from the receiving system 302. The user selects the form fields (pre-defined fields) to fill in, and encrypts the field data
based on the field ID. The user then transmits the entire/partial form to the receiving system 302. The receiving system 302 then fills in the form field elements/fields by parsing the received data. An audible acknowledgement is played by the receiving system 302 to indicate a successful reception of data.
56 The transmitting system 102 may be used to enable multiple applications such as airport check-in, conference registrations, secure logins, issuing database queries, tickets/gift voucher presentation etc using the readily available speakers and microphones on low cost mobile devices.
57 Data transmission using the upper audio band results in reduction in Cost of hardware on mobile devices for peer-to-peer communications. Cost of deployment of related infrastructure is reduced. It also increases Portability of applications for peer-to-peer communications across different platforms. By this present invention proposes a robust and secure way of communicating to IT applications that require user data entry.
58 The template or form is in XML format and is filled by the user. The form is then transmitted to the receiving system 302 where complete data is performed. XML Simplifies Data Sharing. In the real world, computer systems and databases contain data in incompatible formats.XML data is stored in ASCII format. This provides a software-and hardware-independent way of storing data. This makes it much easier to create data that can be shared by different applications using different systems, here transmitting and receiving system.
59 Upgrading to new systems (hardware or software platforms), is always time consuming. Large amounts of data must be converted and incompatible data is often lost. XML data is stored in ASCII format. This makes it easier to expand or upgrade to new operating systems, new applications, or new browsers, without losing data. With XML. data can be available to all kinds of "reading machines" (Handheld computers. voice machines, news feeds, etc).
60 Following are other Key benefits of XML:
61 Content identification - The most important aspect of XML is that text elements are identified, not on the basis of what they look like, but on the basis of what they are ~ that is, of their significance in the context of a document
62 Databasing - An XML tagged document can be viewed as fielded text. The fielding makes it possible to break documents down to their component parts to any degree of granularity for storage in a document management system. The documents can then be re-assembled in different ways, and for different audiences, without the need to track multiple document versions. This is particularly important in cases where different audiences may need to see different versions of a document.
63 Enforced structure
This "enforced structure" ensures that documents have uniformity ~ even when coming from diverse sources.
64 Merging materials from diverse suppliers - The uniform structure and lack of internal formatting makes it easy to merge documents into seamless document sets --even if they are coming in from different facilities. An XML compliant document management system can track the individual pieces by contributor, if necessary
65 International Standard - XML is an international standard that is maintained by an independent standards' committee, which means it enjoys widespread support across industry boundaries and gets extensive support from vendors. Being an international standard also means that there are a wide variety of XML editing, document management, validation, and publishing tools available at a range of price and quality levels.
66 Platform independent - Because "raw" XML consists only of ASCII and Unicode approved characters XML data can be moved freely between all hardware and operating system platforms that support these character sets. There are no hardware or operating systems that do not support the ASCII character set and Unicode is now widely supported. The Internet Explorer and Netscape browsers, for example, support it, as do most plain text editors.
67 Software independent - As noted, there are a wide variety of XML-compliant tools available from many vendors. Because XML is an independent standard, tool sets can be upgraded or changed without fear of data incompatibility.
68 Endurance - Appearance-based text representations are constantly changing — making conversion costly when migrating from one software package to another or even when upgrading an existing software package. There is also potential for data loss when performing such conversions. XML, however, is a "permanent" representation. Even as the standard evolves, there is no problem upgrading data.
69 Repurpose data for different publication media - With XML, formatting is done on a "just in time" basis. As noted, tags identify content, not appearance. Appearance decisions are therefore left until documents are actually published, which means they can easily be modified based on the publication platform. This is a big advantage because what looks good on paper won't look good on screen and vice-versa.
70 Every form to be filled may have a standard template with required field elements. Each of these field elements will have a unique identity. Data to be transmitted for every field is tagged with an identity. Once the receiving system 302 receives the data, it is able to match the identity and fill in the data appropriately.
71 A cryptographic cipher may be applied to enable an Identity based encryption for selected field
elements.
An example XML formatted form may be represented as follows:
Registration number> E392
Balamurali P
25***8
balamurali.p@abc.com
India
0990*****
audio
Registration number> E392
Balamurali P
25***
balamurali.p@abc.com
India
099******
Registration number>
a. <1D>F0245
b. audio
Balamurali P
00075 Example XML formatted form for keyboard entry:
Registration number>
a. F0245
b. keyboard
Baiamurali P
00076 Example XML formatted form for secure data entry via audio:
Registration number>F0245
a. audio
b. Encryptl
Balamurali P
c. audio
The form template received by the mobile device (transmitting system) from the server of the receiving system may include the following options a) Audio/keyboard entry b) Encryption options of selected data fields
The encryption methods may be indicated by the contents of the field tag.
This tag may also indicate the key strength depending on the level of security (encryption strength) desired. If the form template provided by the server does not consist of the tag, the form may be modified by the mobile user to enable an encryption on selected field elements. The encrypted data may then be transmitted to the receiving station.
77 It is up to the transmitting system 102 reading the XML formatted data to determine the entry for the field elements. Encryption may be applied selectively to chosen field elements. As an example,, the Registration number may be sent encrypted to the receiving workstation.
78 By clicking on the speaker icon, an audio entry can be enabled for the form.
79 Erasure coding may be used for a robust data transfer from the transmitting system to the receiving system 302 where there is no feedback/acknowledgement from the receiving system 302. Erasure coding can span multiple fields in the form data. Data
for all the fields in the form can be received correctly without retransmission, saving computational requirements and energy.
80 The first communication module 216 transmits the template with pre-defined fields filled by the user to the receiving system 302.
81 The key idea behind erasure codes is that k blocks of source data are encoded at the sender to produce n blocks of encoded data in such a way that any subset of k encoded blocks suffices to reconstruct the source data. Such a code allows the receiving system 302 to recover upto n-k losses in a group of n encoded blocks.
82 In the form filling scenario, due to obstructions, some field elements may not be received. To avoid the need for retransmission, the representation of field elements is broken into k blocks and encrypted to produce n blocks of encoded data. Hence any subset of k encoded blocks will suffice to reconstruct the field elements.
83 The transmitting system 102 then receives an acknowledgement message from the receiving system 302 after the data entry is completed. The acknowledgement message may also be played by the receiving system to alert the user regarding completion of the data entry (step 510).
84 In accordance with an embodiment, referring to figure 6, the present invention further provides a receiving system 302 to provide data entry by communicating with a transmitting system (mobile device 602. The mobile device 602 requests for a public and private key for ID. The receiving station 604 transmits the key by the receiving server 606. The receiving server by means of a key generator generates a public/private key to enable a secure data transfer amongst the transmitting system 102 and the receiving system (step 602). The receiving system further comprises of a server for Registration. key exchange and form template transfer. This server is connected to the Internet and uses appropriate protocols. The receiving system is also provided with a receiving station to receive the data transmitted by the transmitting system. The WKID (Public key) is used to encrypt the data. The transmitting system then transmits the encrypted data and the same is received by the receiving station 604. The receiving station 604 sends ACK tone as acknowledgement of safe data receipt and authentication of the user.
85 The server supplies the form template and the security key via the Internet and the receiving station is further provided with an audio interface, that hosts the form filling application, and is configured to receive data over the upper audio band.
86 A receiving system is provided with an audio interface. The receiving system may be connected to the Internet and uses appropriate protocols to connect to the server for key exchange.
87 Below is mentioned an example to provide data entry by using an upper audio band communication channel (step 604 and 606):
88 A user by using the transmitting system 102 and by using the receiving system's identity 'ID' and requests a public key from the receiving system 202.
89 The user initiates a connection with the receiving system 102 by sending a pilot tone.
90 The receiving system 302 supplies the template and a security key to the user of the transmitting system via the server.
91 The receiving system 302receives the template filled by the user along with some filled fields in an encrypted form through the data second communication module 414 via the receiving station.
92 The receiving system 302 then decodes and decrypts the fields of the template through the decoding module 416.
93 The receiving system 302 then authenticates the data so decoded and decrypted through the authentication module 416 to check for the authentication of the user.
94 The receiving system activates the form filling application through the data filling module 418.
95 The en crypted/n on -encrypted data of the template is transmitted to the receiving system 302 as follows:
a) The user transmits data corresponding to the field identities (FID) from the form. These identities correspond to the identities assigned by the XML formatting.
b) The mobile user combines the field identities (FID) and the public key corresponding to the receiving system ID to selectively encrypt a field (e.g. credit card number or a user registration number)
96 The receiving system uses the field identities (ID) and its system ID to request private keys for decrypting encrypted field elements.
97 After decryption, a form filling application executed by the data filling module selects the data corresponding to each field element and fills in the appropriate fields in the form for display.
98 After the form is filled, the authentication module 418 further transmits an acknowledgement message to the user of the transmitting system 102.
99 The receiving system 302 is configured to manage multiple services, such as payment, ticketing, access and loyalty, to be provided to the transmitting system, irrespective of the handset type or manufacturer, and the support infrastructure used.
100 The Services that may be retrieved by the transmitting system from the receiving system 302may be broken down into three categories of Core services:
101 Core services
Choice of products/Registration for applications (e.g. for Ticketing applications)
Payment
Access control
000102 Optional services
Procurement of product information (e.g. availability, price) General assistance (e.g. timing, location and process)
Use of a loyalty program (e.g. collection and redemption of awards)
Within the framework of the core and optional services. An airport check-in service may have the following offerings:
Ticket pricing
Travel information (departure times, terminals)
Location-Check-in gate information
Payment (cash/card/loyalty payment using frequent flyer miles membership identity)
Access to secure zones.
000103 For any of the Core or Optional services, a form may need to be filled out for
authentication and authorization by the receiving system. The form data may be filled in
by the user by using transmitting system and by transmitting data over the upper audio
band using a speaker.
Example:
104 In an airport environment, travelers experience delays in check-in procedures, requiring interaction with staff and providing proof of paper copies of identities and ticketing information.
105 With the proposed systems, a user can store relevant ticketing information (Booking reference numbers, passenger details, etc) which can be exchanged with a self check-in kiosk equipped with a microphone. This can speed up the process of check-in, access control at gates and boarding at the airport
106 It is assumed that the gated system (receiving system) at the airport is equipped with audio sensing and transmitting capabilities, allowing entry to passengers with valid tickets read from the transmitted data by the traveler. The traveler has a booking number which is stored in his Mobile device (transmitting system).
107 When the traveler enters the airport, he enters the gate by using his mobile device to transmit a valid identity to a service kiosk and is granted access.
108 Mobile phone service flow
109 The traveler can obtain a boarding pass at the check-in kiosk without going to a booth.
110 The traveler can purchase and download a new ticket booking number using his mobile device without going to a ticketing booth (payments can be made using frequent flyer miles or credit points)
111 While waiting for departure, the traveler can obtain updated flight information transferred to his mobile device. Travelers at the airport are notified of flight timings and potential delays or gate numbers via a broadcast. Typically some broadcasts are missed out. Existing airline systems also send text messages via the cellular network, to the travelers' mobile devices. This saturates the cellular network and may cause outages due to heavy data traffic.
112 With the proposed solution, passengers can receive broadcast information about their flights over their mobile devices equipped with microphones. There is no cost involved and the traditional wireless networks are not congested.
113 Referring now to Figure 7, a method 700 for initiating a data entry by using an upper audio band communication channel is shown, in accordance with an embodiment of the present subject matter. The method 700 may be described in the general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, functions, etc., that perform particular functions or implement particular abstract data types. The method 700 may also be practiced in a distributed computing environment where functions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, computer executable instructions may be located in both local and remote computer storage media, including memory storage devices.
114 The order in which the method 700 is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method 700 or alternate methods. Additionally, individual blocks may be deleted from the method 700 without departing from the spirit and scope of the subject matter described herein. Furthermore, the method can be implemented in any suitable hardware, software, firmware, or combination thereof. However, for ease of explanation, in the embodiments described below, the method 700 may be considered to be implemented in the above described transmitting system 102.
115 At block 702, a request is transmitted for receiving a template through a data requesting module.
116 At block 704. a user is allowed to fill pre-defined fields in a selective mode by executing a security mechanism through a data entering module.
117 At block 706, template so filled by the user is transmitted to the receiving system by the first communication module.
118 At block 708, an acknowledgement message is received by the first communication module from the receiving system.
119 The order in which the method 800 is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method 800 or alternate methods.
120 At block 802, a template and a security key is supplied to a transmitting system through a data sharing module,
121 At block 804, the receiving system receives a template with pre-filled fields from the transmitting system through a second communication module.
122 At block 806, the receiving system completes a data entry in the template so received from the transmitting system through a data filling module.
123 Various use cases/applications of invention are:
1. The system can be used by differently abled people to enter data into forms for several applications.
2. Conventional NFC based applications can be augmented with the audio based data transfer. An outage in the NFC based service in an emergency may require data communication via the audio interface.
3. The audio formatted data can be transmitted via several interfaces (USB, HDMI). This may be used for storage of audio codec formatted data in appropriate storage media.
4. An audio 'captcha' can be used to authenticate users and avoid spam messages. This can be used for spam filtering in banking transactions.
124 Advantages:
125 Cost of hardware on mobile devices for peer-to-peer communications is reduced.
126 Cost of deployment of related infrastructure is reduced.
127 Portability of applications for peer-to-peer communications across different platforms.
128 This present invention proposes a robust and secure way of communicating to IT applications that require user data entry.
129 There are various advantages of using the data in XML format:
130 XML (extensible Markup Language) is a means of representing text information so that:
131 Only standard text (both ASCII and Unicode) is used within a document
132 No formatting information is contained in the document. (A Document Type Definition, or DTD, can be set up to allow formatting information to be included in the XML tagging).
133 All document elements are clearly identified
134 Mechanisms are provided for linking text within a document to information within the same or other documents. The information being linked can be any XML structure including tables, figures, paragraphs, headings, and so on.
135 It is to be further understood for a person ordinarily skilled in the art that the above listed advantages are mere exemplary and the intent is not to limit the scope of other several advantages associated with the invention.
136 The written description and advantages describes the subject matter herein to enable any person skilled in the art to make and use the embodiments of the invention. The scope of the subject matter embodiments is defined by the claims and may include other modifications that occur to those skilled in the art. Such other modifications are intended to be within the scope of the claims if they have similar elements that do not differ from the literal language of the claims or if they include equivalent elements with insubstantial differences from the literal language of the claims.
WE CLAIM:
f. A transmitting system for initiating a data entry using an upper audio band communication channel, the transmitting system comprising: a processor; and
a memory coupled to the processor, wherein the memory comprising:
a data requesting module configured to transmit a request for receiving a template from a receiving system;
a data entering module configured to allow a user to fill pre-defined fields in the template in a selective mode by executing a security mechanism, the security mechanism enables a reception of a security key transmitted by the receiving system to encrypt the pre-defined fields of the template filled by the user, wherein the pre-defined fields to be encrypted are selected by the receiving system;
a first communication module configured to transmit the template so filled by the user over the upper audio band communication channel to the receiving system, the first communication module is further configured to receive an acknowledgement message from the receiving system with respect to completion of the data entry in the template performed by the receiving system.
2. The transmitting system of claim 1, wherein the template so received is in an XML (extensible Markup Language) format.
3. The transmitting system of claim 1, wherein the selective mode further comprises of a manual text entry mode or an audio mode or a combination thereof.
4. The transmitting system of claim 1, wherein the template received from the receiving system further includes a standardized data dictionary where unique identities of the predefined fields may be published and distributed as part of the a registration process of the transmitting system required for the data entry.
5. The transmitting system of claim 1. wherein the security key further comprises one or more of: a private key and a public key used to encrypt the pre-defined fields filled by the user by using identity based encryption based on Elliptic Curve cryptography.
6. The transmitting system of claim 1, wherein the acknowledgement message may also comprise of a message played by the receiving system to alert the user regarding completion of the data entry.
7. A receiving system for data entry using an upper audio band communication channel, the receiving system comprising:
a processor; and
a memory coupled to the processor, wherein the memory comprising:
a data sharing module configured to supply to a transmitting system a template and a security key with respect to a request received from a user of the transmitting system;
a second communication module configured to receive from the transmitting system the template, wherein the template contains pre-defined fields filled by the user, and wherein the pre-defined fields are filled in an encrypted form;
a decoding module configured to decode and decrypt the pre-defined fields so encrypted;
an authentication module configured to authenticate the data so decoded and decrypted to check for authentication of the user; and
a data filling module configured to complete the data entry in the template received from the transmitting system, such that authentication module further transmits an acknowledgement message to the user of the transmitting system after completion of the data entry in the template.
8. The receiving system of claim 7, wherein the template so received is in an XML format.
9. The receiving system of claim 7, wherein the template supplied to the transmitting system further includes a standardized data dictionary where unique identities of the predefined fields may be published and distributed as part of the a registration process of the transmitting system required for the data entry.
10. A method for initiating a data entry using an upper audio band communication channel, the method comprising:
transmitting a request for receiving a template from a receiving system;
allowing a user to fill pre-defined fields in the template in a selective mode by executing a security mechanism, the security mechanism enables encryption of predefined fields of the template by using one or more security keys transmitted by the receiving system, wherein the pre-defined fields to be encrypted are selected by the receiving system;
transmit the template so filled by the user over the upper audio band communication channel to the receiving system; and
receiving an acknowledgement message from the receiving system with respect to completion of the data entry in the template performed by the receiving system.
11. The method of claim 10, wherein receiving the template further comprises of receiving a standardized data dictionary where unique identities of the pre-defined fields may be published and distributed as part of the registration process of the transmitting system required for the data entry, wherein the pre-defined fields are encrypted by using an identity based encryption based on Elliptical curve cryptography.
12. The method of claim 10, wherein the method further comprises of applying Erasure codes on the data frames to ensure a robust error tolerant data packed delivery to the receiving system.
13. A method for data entry using an upper audio band communication channel, the method comprising:
supplying to a transmitting system a template and a security key with respect to a request received from a user of the transmitting system;
receiving from the transmitting system the template, wherein the template contains pre-defined fields filled by a user, and wherein the pre-defined fields are filled in an encrypted form;
decoding and decrypting the pre-defined fields so encrypted and authenticating the user; and
completing the data entry in the template received from the transmitting system. such that an acknowledgement message is further transmitted to the user of the transmitting system after the completion of the data entry in the template.
| # | Name | Date |
|---|---|---|
| 1 | ABSTRACT1.jpg | 2018-08-11 |
| 2 | 1819-MUM-2012-FORM 5(25-6-2013).pdf | 2018-08-11 |
| 3 | 1819-MUM-2012-FORM 3(25-6-2013).pdf | 2018-08-11 |
| 4 | 1819-MUM-2012-FORM 26(26-7-2012).pdf | 2018-08-11 |
| 5 | 1819-MUM-2012-FORM 2(TITLE PAGE)-(25-6-2013).pdf | 2018-08-11 |
| 6 | 1819-MUM-2012-FORM 2(25-6-2013).pdf | 2018-08-11 |
| 7 | 1819-MUM-2012-FORM 18(25-6-2013).pdf | 2018-08-11 |
| 8 | 1819-MUM-2012-FORM 1(26-7-2012).pdf | 2018-08-11 |
| 9 | 1819-MUM-2012-DRAWING(25-6-2013).pdf | 2018-08-11 |
| 10 | 1819-MUM-2012-DESCRIPTION(COMPLETE)-(25-6-2013).pdf | 2018-08-11 |
| 11 | 1819-MUM-2012-CORRESPONDENCE(26-7-2012).pdf | 2018-08-11 |
| 12 | 1819-MUM-2012-CORRESPONDENCE(25-6-2013).pdf | 2018-08-11 |
| 13 | 1819-MUM-2012-CLAIMS(25-6-2013).pdf | 2018-08-11 |
| 14 | 1819-MUM-2012-ABSTRACT(25-6-2013).pdf | 2018-08-11 |
| 15 | 1819-MUM-2012- FORM 2-(PROVISIONAL).pdf | 2019-06-21 |
| 16 | 1819-MUM-2012-FER.pdf | 2019-07-09 |
| 17 | 1819-MUM-2012-OTHERS [09-01-2020(online)].pdf | 2020-01-09 |
| 18 | 1819-MUM-2012-FER_SER_REPLY [09-01-2020(online)].pdf | 2020-01-09 |
| 19 | 1819-MUM-2012-COMPLETE SPECIFICATION [09-01-2020(online)].pdf | 2020-01-09 |
| 20 | 1819-MUM-2012-CLAIMS [09-01-2020(online)].pdf | 2020-01-09 |
| 21 | 1819-MUM-2012-FORM-26 [15-02-2021(online)].pdf | 2021-02-15 |
| 22 | 1819-MUM-2012-Correspondence to notify the Controller [15-02-2021(online)].pdf | 2021-02-15 |
| 23 | 1819-MUM-2012-Written submissions and relevant documents [03-03-2021(online)].pdf | 2021-03-03 |
| 24 | 1819-MUM-2012-PatentCertificate18-03-2021.pdf | 2021-03-18 |
| 25 | 1819-MUM-2012-IntimationOfGrant18-03-2021.pdf | 2021-03-18 |
| 26 | 1819-MUM-2012-US(14)-HearingNotice-(HearingDate-17-02-2021).pdf | 2021-10-03 |
| 27 | 1819-MUM-2012-RELEVANT DOCUMENTS [30-09-2022(online)].pdf | 2022-09-30 |
| 28 | 1819-MUM-2012-RELEVANT DOCUMENTS [28-09-2023(online)].pdf | 2023-09-28 |
| 1 | SearchPattern1819MUM2012_12-06-2019.pdf |