POCKET DIGITAL WIRELESS DEVICE FOR THE PERSONAL INFORMATION MANAGEMENT AND FOR THE AUTHENTICATION OF THE COMMUNICATION AND THE INFORMATION EXCHANGE WITH OTHER DIGITAL DEVICES
The present invention refers to a pocket digital wireless device for the personal information management and for the authentication of the communication and the information exchange with other digital devices in Personal Area Network environment, enabling and allowing the personal security, the communication and the information exchange for multitasking activities. One of the most significant recent developments in wireless teclinologies is the emergence of wireless personal area networking, known as WPAN. Developed at the end of the 20th century, WPAN is based on a new technology called bluetooth, which uses short-range radio frequencies to transmit both voice and data. This cable-replacement technology wirelessly and transparently synchronizes data across devices and creates access to networks and internet within a range often meters. The bluetooth specification is ideal for mobile professionals who need to link notebooks, computers, mobile phones, PDAs, PUvfs, digital cameras, and other handheld devices to do business at home, on the road, or in the office.
These technologies, ideal substrate to anywhere protected access to information and electronic transactions, use a worldwide coverage radiof equence band, enabling an easy information exchange between devices, indipendently from the access point, with low-cost and with an user friendly interface. Wireless personal area networking completes the spectrum of wireless connectivity, extending from home and small office settings to campus-wide local area networks (LAN) and wide area networks (WAN) connected via cell phone towers. Regarding bluetooth specification and features, bluetootli is a global specification for a small foπn-factor, low-cost radio solution providing links and integration between mobile computers, mobile phones, and other portable handheld devices, as well as connectivity to the Internet. It was developed by the Bluetooth Special Interest Group
(BSIG), established in 1998. The Group's intent is to form a de facto standard for the bluetooth air interface and the controlling software. Bluetooth radios operate in the unlicensed Industrial Scientific Medical (ISM) band at 2.4 GHz (range 2400 - 2483.5) and employ frequency-hopping (FH) spread spectrum technology to reduce interference and fading. A Time-Division Duplex (TDD) scheme is used for full-duplex transmission. Bluetootli' s main strength is its ability to simultaneously handle both data and voice transmissions. A mobile computer equipped with Bluetootli technology, for example, could link to a similarly equipped
mobile phone to connect to the Internet, to receive or to send phone calls, to send SMS/MMS messages, to syncronize PLM data with the device. The bluetooth WPAN consists of up to eight active devices, with one hub and up to seven client devices. A bluetootli WPAN is capable of supporting an asynchronous data link with each client and synchronous voice links with up to three client devices. It provides a range of up to 10m at a transmit power of 1 mwatt. The range can be extended to 100m if the transmit power is increased to 100 mwatt. Bluetooth has a data rate of 1 Mbps. Bluetootli is designed to be low cost - eventually under 10 USD per unit. Concerning bluetooth network topology multiple bluetootli units form a Wireless Personal Area Network, called a piconet. A piconet consists of one hub device and up to seven client devices. It is possible to support more devices in a piconet by placing one or more of the clients into what is referred to as park "mode". In order to exchange information with the parked client, the hub must take it out of parked mode and return it to active mode. Only seven clients can be in active mode at any given time. When two piconets are in close proximity, they have overlapping coverage areas, a scenario referred to as a scatternet. Clients in one piconet can participate in another piconet as either a hub or client. This is accomplished through time division on multiplexing. In a scatternet, the two or more piconets are not
synchronized in either time or frequency. It is to be noted, however, that a bluetootli device can only be a hub in one piconet, since tlie piconet is defined by the hub's bluetootli address. Each of tlie piconets operates in its own frequency- hopping channel, while any devices in multiple piconets participate at tlie appropriate time via tune division multiplexing. In the Personal Networking Hardware, tlie Radio
Frequency channels used for Bluetooth are from 2402 to 2480
MHz, with a channel spacing of 1 MHz. The Bluetootli radio hops from channel to channel at 1600 hops per second, wliich means every 625 ms. Each piconet has a unique hopping sequence, wliich is determined using an algorithm based on tl e address of the
Bluetooth hub. All Bluetooth units in tlie piconet are synchronized to this hopping sequence. Bluetootli radio modules use Gaussian Frequency Shift Keying (GFSK) for modulation.
The data is transmitted at a data rate of 1 Mb/second. The Bluetootli Baseband Layer. The baseband layer performs functions like Bluetooth packet assembly, forward error correction (FEC), automatic repeat request (ARQ), data whitening, Bluetooth clock synchronization, and frequency hopping control. The Bluetooth Link Manager Layer forms tlie piconet by inquiring what other Bluetooth radios are in tl e area, establishing connection and mamtaining tlie piconet. Tlie Bluetooth Link
Manager also handles security issues like authentication and
encryption. Bluetooth provides for three low power modes to conserve battery life: sniff mode, hold mode, and park mode. While in tlie sniff mode, a device listens to the piconet at a reduced rate. The sniff interval is programmable, providing flexibility for different applications. In hold mode, only an internal timer is running, and data transfer restarts when units transition out of tlie hold mode. Park mode is used to handle more than seven cliente, since only seven clients can be "active" at any time, one client can be "parked" and anotlier one activated. In tlie park mode, tl e device's clock continues to run and remains synchronized to the hub, but tlie device does not participate in any way. Concerning tlie Privacy and tl e Infomation Security, tl e emerging electronic markets require secure partner identification for trading on open communication networks like the Internet. The tools and methods consist of cryptographic algorithms which were invented in the seventies. The methods are well known and international standards have been developed. In a few years most companies and many people will use a Digital Identity Card offering a wide range of secure Internet applications. Services and products provided by suppliers on the Internet today usually require password systems and credit card numbers. By using Digital Identity Cards tlie communication partners are securely identified by presenting their card electronically, passwords, PIN, etc. Thus, existing Electronic Commerce services can be enhanced and new ones, wliich
require more security can be introduced. A Digital Identity Card is actually a smart card with a computer chip. The user inserts the card via a card-reader linked to tlie computer to access his private key (only accessible by himself) when he wants to open a transaction/communication session. The smart card also contains a certificate wliich verifies the identity of the owner when he or she communicates with partners. This certificate is sent to tlie partner together with the signed document. By tins certificate tlie addressee can verify the digital signature on the document and tlie identity of tlie partner. Thus the digital signature fullfils tl e following requirements: - the recipient of tlie document can make sure that the sender is really the person he supports to be; - tl e integrity of the document can be checked by tlie recipient; - tlie sender can never deny having sent tlie document; - the transaction/commumcation process can be successfully checked. The device according tlie present invention has on board a Digital Identity Card medium able to identify univocally throughout biometric teclinologies tlie owner, opening in a protected mode the access, tlie communication and the fruition of a service or tlie functions and applications of a linked device in tlie neighbourhood. Moreover, in the last years, tl e major handset suppliers began incorporating more functionality into their high-end
handset models with what we call tlie "all in one" design approach. The trend was to put on board of these devices a built- in camera, Personal Information Management (PLM) applications, larger color screens and special keyboard. Such handsets support and incorporate some application development platforms. The tendency is that to design and manifacture devices able to do anything, in spite of the great size and tlie high cost, too complicate to use and manage. The purpose of tl e present invention is that to realize a wireless self powered device equipped inside with a SLM Card for tlie mobile communication, a Smart Id Card for tlie authentication and secure protected access, a Bluetooth chip, a processor and a storage area for tlie software (Operating System, PLM, SYNC) and tl e data storage functions. Whether you're in the office or on the road, you can now enjoy a whole new level of freedom and hassle-free connection to personal, corporate and public data. The device give to tlie users, in any bluetooth enabled area, tlie ability to connect and synchronize wirelessly with corporate and personal data, and Internet-based content. The device sniffs and discovers tlie presence of access points, personal computers, mobile phones, PDA and any other Bluetooth enabled device with wliich it is authorized to connect. The connection will be carried out as through a very fast modem, but wirelessly. The embedded applications can be used, after tlie personal identity authentication phase, to access and
browse Internet ed Intranet information content, to check and send messages and e-mails, to syncronize and exchange data with desktops, PDA directly or through a corporate LAN. The built-in radio has an enhanced receiver, maximizing wireless range, and the device is a Bluetootli one to maximize compatibility and interoperability witli other products and devices. The connection is cable-free and since Bluetooth does not require a line of sight connection, all tlie devices can be in tlie pocket or briefcase, tlie user no longer have to juggle with multiple devices to get connected. This device, moreover, through its features, wirelessly coupled witli a bluetootli enabled mobile phone in tl e neighbourhood, has tlie capability to enable tlie mobile to use tlie internal SLM card of device, with tlie optimization and automatic management of the mobile to utilize more than one network provider SLM cards, so to reduce significantly tlie phone rates and to setup personal criteria and profiles of selection of the SLM cards (one plugged in the mobile phone and the other on the device of tlie present invention). The invention presents itself as a wireless portable secure bridge of personal network communication, clearly and easily authenticated. The device in its basic configuration includes a Bluetootli chip, a SLM Card, a Smart LD Card, and also a CPU, enougli memory for O.S. and SW, witli a biometric circuit to identify tl e owner. The invention has tlie purpose to offer an
alternate and innovative distributed solution to heavy and expensive PDA or handsets. A single, pocket, thiny and personal device which actively interacts wiressly with tlie several digital devices in the neighbourhood, with a plurality of functions and tasks, with a very low cost in respect of traditional devices. The present device comunicates worldwide anyway anywhere acting as hub and gateway in a easy and user friendly mode. Several and rilevant are tlie advantages of tlie invention:
- faster time to market for new wireless devices designed and maifactured for a single and original function;
- low cost of the devices in respect to tlie current situation, characterised in higher costs for tlie interaction of several functions and hardware integration problems in a stand alone device; - benefits to tlie mobile operators, freed to dedicate tlieirselves to the service and to their quality/performance;
- advantages to tlie end user who can freely choice simple devices and access contemprarely/alternatively to new and distributed services and providers (2 or more SLM Card's network providers);
- introdution of new satellite and light devices with a new ergonomic design and applications, new form factors wearable by tl e nomad man;
- upgrading of traditional services to tlie new wireless technology as ATM/Bancomat points, POS, Kiosks, e- commerce, e-mobile, e-government;
- only one device biometricalfy enabled where store, manage and syncronize tlie user's personal and sensibile data/information (PLM) in a secure and protected way. Examples of tlie present invention will now be described in detail with reference to the accompanying drawings: Fig. 1 is a schematic diagram of a pocket digital wireless device N witli tlie methodology according to tlie present invention in tlie stand-alone pocket Smart Id Card sized version. Fig. 2 is a schematic diagram of tl e device N integrated in a traditional handset acting as gateway between a mobile network and all the set of processing and communication devices cooperating through Bluetooth with the claimed device. All tlie current and future satellite devices will be configured for the management of specific applications and functions (Bluetooth Digital cameras, Notebooks, mobile phones, handsets, PDAs, printer, etc.) Fig. 3 is a schematic diagram of tlie device N where tlie modular version includes a Bluetootli chip, a GSM/GPRS module GGM, enough memory allocation for the Operating System Software and tlie Software to manage tlie routing between tl e personal-area network (PAN) and tl e wide-area network (WAN), and at the same time act as an application server, able to manage tlie satellite devices as distributed clients of tlie device; globally the system provide additional functions such as tl e device enabling and authentication, tl e personal information data storage with tlie application optimization.
Fig. 4 shows a key with tlie digital finge rint, in tlie case of Fingerprint Biometry. FIG. 5 shows tlie use of an extended keyboard for tlie tradictional activities and functions of a mobile phone ( coming and Outcoming Calls, Messaging, etc). The invention is formed by an stand alone device and a specific methodology to give to tlie user tl e full protection and security in the personal access/connection/communication activities, multifunctional activities and interoperability with other current and future wireless and wireless-wired devices. The pocket portable and self powered device N contains on board a Bluetooth chip with multiple functions and features: - connect without wires, whether at home, on tlie road or in the office; - access email, calendar, contacts, Intranet and browse tl e Internet from anywhere - quickly compose and send SMS messages from an handheld - autodial contacts from tlie Address Book of an handheld - communicate witli other Bluetooth-enabled devices for sharing data and game playing - connect to multi-user Bluetooth in-building networks - save and manage PLM data - give protected access, witli a Smart Card to services, POS, ATM allowing automatic login to systems, desktop, notebook, PDA.
The device according tlie present invention act as a Wireless Digital Identity & Communicatio Module, working as a bridge between mobile phones, PDA, Digital cameras, MP3 Players, Notebooks, PCs and all the Bluetooth and Wi-Fi enabled devices who partecipate to tlie next generation information and communication technology's revolution. The access and communication device interface with tlie claimed device N is separated from tlie standalone devices and assigned to a unique mobile gateway. All tl e piconet devices can comunicate with tlie device N via Bluetooth and through it witli other devices. This layout and methodology will greatly low tlie related costs of tlie single peripherals and shorten tlie time to market of tlie new devices, with clear benefits to tlie mobile operators and full advantages to tl e user/owner of tlie device N to access for tlie communications to more than one service provider in a sure and protected way, widening the diffusion of e-mobile and e-commerce through authentication processes. Since the device N includes on board one or more SLM card, tlie mobile network operators can directly offer tlie device N to tlie user with their services without busying theirselves with tlie expensive promotion of specific manifacturer products. Until now tlie major handset suppliers are working to incorporate more ftmtionality into high-end handset models ' according tlie "All in One" approach with a much higher price, extra size and weight device; but separating tl e functions and tlie
parts, these can be designed and manifactured witli an higher functionality and specific quality, these parts can be very inexpensive witli a good design and tailored to perform specific and dedicated applications and task, easy to use and extremely small, such to fit the user needs, to respect and help peoples in their daily life. Only tlie device N takes tlie charge of tlie use/activation of the oilier cooperative and linked devices granting tlie access and tlie digital security. The network service providers (electronic transactions, user identification, content providing) so freed can fully devote tlieir attention to their core business offering more quality and performance in a more competitive and flexible framework. The health of tlie users can be, therefore, granted by very low radiation emission and lower energy consumption systems. These specifications can be accomplished only by these last wireless teclinologies. Fig.l and Fig.2 show tl e following specifications of the device:
- a small sized case 1 such to allow tlie insertion of a. Smart Id Card;
- a slot SI to allocate a Smart Id Card SIC;
- a slot S2 to allocate a SLM Card SC;
- a plug PP to charge a battery and to connect die device witli a PC/PDA/Notebook in setup mode; - a display LCD to show and browse tlie information content of tl e device and to monitor tlie interaction's states witli tlie oilier
active piconet devices;
- a keypad K witli browsing arrow keys (Up, Down, Left, Right), tlie Cancel/Abort key and tlie e Menu key;
- a rechargeable power battery B; - a Bluetootli Radio Frequency Chip BC;
- a microprocessor CPU;
- a Read Only Memory ROM and a Random Access Memory RAM;
- a mass storage memory BSA; - a biometric authentication means FingerPrint BDA to power up/down tlie device and, particularly, to function as Carriage Return Key RK. The device N will be set up and customized with a connection, wireless and/or wired, through any PC/Notebook/PDA. In the first Setup/Inizialize session will be required confidential and owner's informations needed to custom the device to tl e biometrical technology (PIN, FingerPrint Image,
These data will be stored in d e device N with a proprietary procedure to define tlie unique access key to use die device and tl e specific functions and features. All along d e steady state will be possibile to do a sure backup to external support for recovery o reset. The device N can be reconfigured for other owner witli die lost of all the previous stored data. All d e od er data/infoπnation concerning die SLM Card
and Smart LD Card, such as PIN, passwords and other dedicated digital keys will be automatically read by die device N, when inserted, and stored in a special internal security encrypted database of said device N. These peculiar functions, witii die otiier below described, are all biometrically at die user/owner disposal. During d e phases and activities requiring logins and autiientications of the user/owner, such as the syncronization's activities of PLM data and information exchange (Contacts, Agenda, Bookmarks, etc) widi other linked bluetooth devices, a specific software will take charge of die security management, requiring on die contest die intervention of die user/owner tiirough the key BDA. All die deteπninant and critical phases will be under the control of d e user/owner via said key BDA. The device N of Fig. 4 can have integrated on board, as
HW/SW extension, the new biometric technology of digital identity control that will be further available, being die system opened to software programmability and upgrading hardware modules. Same opportunities of development and variation concern die device supply battery. The current teclinologies allow a full operational autonomy widi a small pocket size and weight. The proposed variation of Fig.2 of d e device N, coupled wid a GSM/GPRS module GGM, continues to have die previous levels in die configuration and use. Said GSM/GPRS module witii its HW/SW maintains its full autonomy witii die exception
of the display. The physical coupling obeys to ergonomic and functional criteria only, tiie overlap of botii devices, widi a vertical sliding, opens in tiie lower part tiie utilization of tlie extended keyboard EK for the traditional activities/functions of a mobile phone concerning phone calls, receiving calls, messaging, etc. The extended functions, relative to tlie easy links and interactions witii tlie enabled Bluetooth devices of the piconet, are managed by the device N and technology of die present invention, by ti e software and firmware on board of said device N. Specific software plug-ins of die device N are dedicated and cooperate to these functions with ti e file transfer and application sharing in the piconet:
- auto login on personal computers, desktops and notebooks, as soon these equipment enter in said device piconet range, with ti e thumbprint TP authentication process;
- utilization of the SLM of tiie device N to access in switching mode to another mobile operator, a specific DualSLM management software and technology will transfer to a Bluetooth mobile phone new and extended functionalities and features, such as: • Selection of die best network signal coverage in d e local current environment • SLM usage programming according user custom time ranges profiles • SLM Network automatic selection programming for tiie
outgoing calls according best/lower phone rates.
• Number Portability management
• SLM Phonebooks Backup, Duplication, Duplicate Check and Merging. • SLM Card SMS Polling
• SLM Card International Roaming Bypass
• Full reachability for die incoming calls on both SLM cards tiirough tiie diverting call function.
• User profile setup and programming of automatic switching from a SLM to die otiier.
• Country Codes management for die No Roaming.
• Selection criteria of tiie SLM card to access Internet and WWW, for WAP and similar devices.