Acoustic authentication for recording in wireless network

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to acoustic authentication devices for recording in a wireless network. An unauthorised wireless device emits an audible acoustic secret code of unique identification (for example a personal identification number (PIN code)). In some implementations the user hears an acoustic code and enters it manually through the user interface for recording in the network. In other implementations a network authorisation device automatically receives the acoustic code and checks the code authenticity. If authenticity check is successful, the wireless device is recorded in the wireless network.

EFFECT: technical result consists in the improvement of ergonomic recording in a protected wireless network.

15 cl, 3 dwg

 

The level of technology

Wireless local area network (WLAN) become more widespread and are used not only personal computers. For consumer devices there is an increasing tendency to have the wireless connection and connect to the WLAN. With the growth of connectivity and availability to more devices and users are also increasing security threats from inadmissible to regard the intruders. However, the increased security countermeasures often confuse inexperienced users of wireless networks.

Fortunately, some traditional, user-friendly approaches to security, suitable for communication with a WLAN. For example, devices certified in accordance with the standard certification Wi-Fi Alliance (e.g., WT-FI CERTIFIED™) that can interact with each other (regardless of the device manufacturer). In addition, the Wi-Fi Alliance introduced Wi-Fi Protected Setup™ (WPS) that describes how can be arranged protected WLAN and certified as new wireless devices can be added to this WLAN secure and user-friendly way. For more information, please refer to the document "Wi-Fi Protected Setup" on the website of the Wi-Fi Alliance: .

Using a standard, simplified and convenient for user�La procedures for installation of the device (for example, WPS) user can add a new device in a secure WLAN by entering provided with a device personal identification number (PIN) via the interface (UI) of the user to authenticate on the network. Supplied with a device PIN, acting as a key shared by the new device and the existing protected WLAN.

However, some devices have a PIN code printed on the devices themselves (e.g., on the label). These PIN codes is less secure than PIN codes that are dynamically generated by other types of devices. Like a key in a lock, which never changes, printed PIN is a threat to security. In addition, one of the goals of the standard registration procedures in the protected network (e.g., WPS) is ease of use for the user. Unfortunately, standard procedures still require the user to manually perform the critical stages. For example, using WPS, the user must detect and count the PIN code of the new device (which typically has a length of 8 characters), and then manually enter this 8-digit PIN code in the UI, implementing authorization for an existing secure network.

Brief description of the drawings

A detailed description is given with reference to the accompanying drawings. In the drawings, the leftmost digit (s) of the reference position indicating�t the drawing where this reference position appears for the first time. The same reference positions are used in the drawings to refer to similar features and components.

Fig.1 is an example network environment with a secure wireless network, which can be implemented methods described herein.

Fig.2 and 3 is a flowchart of sequences of operations described here sound ways of authentication for logging into the network.

Detailed description

Described herein is one or more ways to use sound authentication of the wireless device to register to a secure wireless network. By using one or more of the described methods, an unauthorized wireless device emits an audible signal, a uniquely identifying secret code (e.g., personal identification number or PIN). In some implementations, the sound the user hears the code and manually enter it via the user interface for network registration. In other implementations, the authentication device in the network (e.g., wireless access point) automatically receives a beep code and checks the correctness of this code. If the correct code is confirmed, the wireless device is registered with a secure wireless network.

Describes how act as part of approaches to Ryougi�the ations in a secure network for wireless local area networks (WLAN) and improve the usability of existing and future user-friendly and interactive approaches. An example of an existing approach, which is suitable for use with one or more implementations, described herein is Wi-Fi Protected Setup™ Protocol to Wi-Fi Alliance (WPS).

Under standard approaches (similar to WPS) the user confirms the registration of a new wireless device to an existing protected WLAN by entering provided with the device PIN. When a new device (e.g. digital camcorder) has a visual display device shows the user on the display of a dynamically generated PIN. For devices without displays, the standard approach contains the PIN code printed on the label attached to the device. Printed pins are usually pre-generated and pre-printed by the device manufacturer. Though dynamically generated PIN codes more secure than statically generated PIN codes, no standard approach does not offer the devices without displays method of providing a dynamically generated PIN codes to users during the registration processes in a secure network (like WPS offers). In addition, standard approaches are inappropriate or inapplicable for users with low vision.

Under standard approaches once the user finds and reads the PIN code on the label or on a visual display device, the user enters the PIN via the user interface (UI) device user authorization (e.g., a wireless access point) or UI already registered devices (e.g., personal computer), acting on behalf of the authorisation device. After registering on new WLAN device communicates via WLAN in a secure way. Provided with a device PIN, acting as a key shared by a new device and a secure WLAN, and manual input of the PIN code is an action that shares the key.

Unlike standard approaches, one or more implementations of the methods described herein provides for devices without displays a method of producing a dynamically generated PIN codes that ensure their accessibility for people with low vision, and/or user-friendly approaches that are suitable for interaction with network registration in a secure network and destined for a protected wireless networks. By using one or more of the methods described herein, devices without displays emit audible dynamically generated PIN codes as part of the process of network registration. For example, a device can reproduce your PIN through loudspeakers. In addition, an authorisation device (e.g., network access point) is equipped with a microphone to receive and interpret the emitted audible PIN of the device. After interpreting the device autorizat�and can continue the process of network registration for the device which radiate sound PIN. Thus, the user can avoid manual, error-prone process of detecting and reading the PIN code of the device and subsequent manual entry of the PIN for the device, which must be recorded in a secure WLAN.

An example of a wireless network environment

Fig.1 shows an example environment 100 of a wireless network. The example network environment 100 includes a wireless local area network (WLAN) 102, which may means of communication (wired, wireless, through cellular communication, satellite communication, etc.) to connect with other networks such as the Internet or other WLAN. Network environment 100 also contains at least one point 104 access (AR) and many other wireless stations (STA) 106-122.

AR 104 functions as the authenticator for WLAN 102 and AR can act as a bridge to other networks through communications means (not shown). AP 104 may be a dedicated network device. Alternatively, it can be a universal device or General purpose computing device. For example, the AP 104 may be a bridge, router, repeater, server, client, or other network device that can also function as a wireless device authorization to the WLAN 102. In some implementations, the network authentication function for WLAN 02 can be shared between AP 104 and other network devices. Also, alternatively, AP 104 may delegate the network authentication function to other devices on a network.

As shown in the drawing, the station or STA (e.g., wireless devices) contain the laptop 106, a tablet computer 108, the network printer 110, network television 112, a telephone 114 VoIP (voice over networks based on Internet Protocol), wireless set 116 speakers, digital video camera 118, the mobile phone 120 and the personal computer 122 (shown with the user). Of course, STA 106-122 are just an illustration of the types of wireless devices that can be used in the context of the example environment 100 of a wireless network. Other suitable wireless devices are (for example and without limitation): personal digital assistants (PDA), digital music players, digital cameras, office projectors, digital photo frames, smart phones, audio equipment, navigation systems, calculators, video equipment, telephones, household appliances, heating and/or cooling, consumer electronics, medical equipment, security system, custom broadcast equipment, access equipment on demand, etc.

In the example environment 100 wireless set 116 loudspeakers are not currently registered as cha�you protected WLAN 102. Wireless set 116 speaker seeking the opportunity to register or to join the WLAN 102. The device seeking network check the wireless set 116 speakers, here called "contenders".

Just like any other relevant wireless device and AP 104, each STA 106-122 intended for use in existing or future user-friendly approaches that are suitable for interaction when you register on a secure network and destined for a protected wireless networks WLAN such as the WLAN 102. For example, STA 106-122 are for use of the Protocol Wi-Fi Protected Setup™ (WPS) Wi-Fi Alliance to register your device in a secure WLAN. Similarly, the AP 104 is intended for use WPS for the registration of new STA in the WLAN 102. Although in Fig.1 not explicitly shown, each STA 106-122 may include hardware security, firmware, software or a combination thereof, is capable of implementing, at least partially, the methods described herein.

Example of WLAN 102 may be a wireless network infrastructure, but may use other implementations of WLAN, such as the so-called "specialized" ("ad-hoc") or personal area network (PAN). WLAN 102 corresponds to one of susestudio future network standards for wireless LANs. The standards of the Institute of electrical and electronics engineers and electronics engineers (IEEE) 802.11 (e.g., IEEE 802.11 a, 802.11 b, 802.11 g, and 802.11 n) are examples of relevant network standards for wireless local area networks used for methods described herein. In General, the corresponding wireless network is a network having network devices intended for use by existing or future user-friendly approaches that are suitable for interaction when you register on a secure network and destined for a protected wireless networks.

As shown in Fig.1, the AP 104 has components to implement at least part of the ways described here. AR 104 includes one or more processors 124, memory 126 and microphone 128. In the memory 126 contains one or more component, which include Manager 130 interface (UI) of the user Manager 132 of the audio input and the authorizer 134.

Typically, the microphone 128 is an integral part of the AP 104. Alternatively, the microphone 128 may be external and connect wires to AP 104. Also alternatively, the microphone 128 may communicate with AP 104 via wireless technologies, and may already be registered by the device or part of an already registered device on the WLAN 102. The microphone 128 is intended for the perception of audio frequencies, which is expected and�to localisa. These frequencies may be within, above and/or below the hearing range of a normal person.

Manager UI 130 controls the interface (UI) of a user for network registration, submitted to the user, which is involved in the process of registering a new device. If the AP 104 is capable of receiving input data from a user and generating a UI, the UI may be provided at the AP 104. Typically, a UI is provided through a separate and already registered in the network device, such as a personal computer 122. Manager UI 128 controls the input from the user UI in a personal computer 122 and helps to generate an output signal on this computer.

Manager 132 audio controls analog input audio signal coming from the microphone 128. In particular, the dispatcher 132 audio input accepts and recognizes the input audio signal, which coincides with the audio PIN key emitted by a device seeking to register on the network. Manager 132 translates the audio input analog audio PIN code encoded in a computer form that you can use the authenticator 134. Here the encoded computer PIN-code is stored and processed in such a way that the meaning and content of the PIN code is available and can be used computer components. For example, coded to�newterm form of a PIN "13442GR3UT9" can be a literal string, or it may be stored as a floating point value.

The authorizer 134 receives the encoded computer PIN from the controller to the audio input 132. The PIN acts as a key that is shared between the applicant and AR 104 (and/or some of the other existing devices in a secure WLAN). The authorizer 134 (e.g., network Registrar) confirms the validity of the PIN code. The authorizer 134 may perform validation through cryptographic calculations, lookup tables, consultation with a trusted third party (e.g., Internet connection) or other known processes validation. The applicant denied registration, if the PIN cannot pass validation. Once the PIN has passed the validation, the authorizer 134 network initiates the procedure of registration of the applicant, who called the audio PIN. This procedure network registration may be made, for example, in accordance with the WPS Protocol or other user-friendly approaches that are suitable for interaction with network registration in a secure network and destined for a protected wireless networks. An example of the applicant is the set 116 of wireless speakers, which is a device that has no display. Of course, the set 116 of wireless speakers is only one example of a device type that does not have e�e output mechanism for visually presenting information to the user (especially when such information is provided by an electric signal). Here, such devices are called "headless". Examples of various types of visual displays that do not have a headless device, are (for example, but not restricted to): electroluminescent displays (ELD); led displays (LED); displays on a cathode ray tube (CRT); liquid crystal displays (LCD); plasma display panels (PDPs), organic led displays (OLED); setprocessor displays (DLP); electronic documents and non-visual displays type of Electromechanical displays.

As shown in Fig.1, wireless set 116 speaker has components to implement at least part of the ways described here. Wireless set 116 of speakers includes one or more processors 136 and memory 138. In memory 138 are one or more components, which include Manager 140 PIN code, audioadapter Manager 142 and 144 on the Desk. As shown in the drawing, the wireless set 116 loudspeakers emit sound code personal identification number (PIN) 146, shown in the callout label.

Components of the wireless set 116 of the speakers and components AR 104 can be modules of computer-executable commands, and these commands can be executed on the computer, you�misliteljnom device, or the processors of such devices. Although the components shown here as separate modules, components can be implemented as hardware components, firmware, software or any combination thereof. The methods described herein may be implemented fully or partially in the form of hardware, software, firmware or any combination thereof.

Manager 140 PIN controls unique PIN codes for network registration (e.g. secret code the registration in the network) that need to be understood and accepted by the network authorizer to identify and register the applicant in a secure WLAN 102. Manager 140 PIN also provides supply these pins to audiodirectory 142 so that the wireless set 116 speaker may declare the PIN out loud. Manager 140 PIN can dynamically generate a PIN-code, based on manufacturer-supplied formula. Alternatively, the Manager 140 PIN code can simply access the static PIN in the memory 138.

Unique network registering PIN code associated with the applicant (e.g., a wireless set 116 loudspeakers), as part of the interactive approach to online registration used WLAN 102 (e.g., WPS). The PIN code for network registration can �be unique to a particular network (for example, WLAN 102) to which the applicant is trying to connect. In addition, the PIN code for network registration may be globally unique ID (that is, no other wireless device, there are no code anywhere else). The PIN code for network registration is usually a multi-valued number (e.g., 4 to 8 digits). Alternatively, the PIN code for network registration may be an alphanumeric string. In addition, alternative, PIN-code for network registration may contain symbols and other codes associated with specific sounds, tones, or music.

Audioadapter 142 receives the encoded computer PIN from the controller 140 of the PIN. Audioadapter 142 converts the PIN code into his computer-coded format into an electrical signal that controls the wireless speakers set 116 speakers. As a result wireless set 116 speaker emits audible sound, which is shown as "PIN" 146 the callout label.

Audio PIN 146 can be any repeatable sound, tone, music, etc. sound Examples PIN 146 are examples only and not for limitation, the spoken words, letters and/or numbers (possibly in user-selectable languages), tones, clicks, intermittent beeps, comments and music. Audio PIN 146 may be generated by computer AU�jdispatcher 142. Alternatively, the audio PIN code can be one or more stored files (e.g., digital audio file) received from the memory 138 or the storage memory and then reproducible. Audio PIN 146 may be within the inside and/or outside the range of normal hearing person. The nature of sound sound PIN 146 is limited by the ability of the AP 104 to receive audio PIN 146 with a microphone 128, and Manager for audio input 132 AR - the ability to detect coincidence with original, unique PIN code for network registration, which is provided by the Manager 140 PIN code of the wireless set 116 of the speakers.

An example of the applicant (for example, a wireless set 116 speakers), shown in Fig.1 essentially has a speaker to emit an audible PIN. However, in other implementations can use other types of applicants. In other implementations, the Applicants have audio capabilities built into them by the manufacturer. For example, the manufacturer of the wireless device may intentionally embed integrated loudspeaker, can insert the headphone Jack, can offer the network connection for a short distance (e.g., BLUETOOTH™) to connect to another audio device (e.g., mobile phone or telephone), or may provide an option tie� Challenger over wireless network 102 is a network device with a loudspeaker.

Manager 144 registration manages the network registration procedure with the AP 104 when the authorizer 134 confirmed for network registration, the validity of the PIN code received from the audio PIN 146. Manager 144 registration manages the delivery of network credentials, so that wireless set 116 speakers became part of a secure WLAN 102. Overall, the Manager 144 performs registration procedures for network registration in accordance with WPS or with other user-interactive secure network approaches registration for secure wireless networks.

Examples of processes

Fig.2 and 3 presents a flowchart of the sequence of operations illustrating example processes 200 and 300, which implement the methods described here for audio authentication when registering in wireless networks. Each of these processes is represented as a set of stages in the logical block diagram that represents the sequence of operations that can be implemented by hardware, software or a combination thereof. In the context of software, the blocks represent computer commands that, when executed by one or more processors of the computer, perform the above operations. Note that by�of Adak, describing the process, no means considered as a limitation, and any number of the described process steps can be combined in any order to implement the process or alternative process. Additionally, individual blocks may be deleted from the process without departing from the nature and context of the subject matter described herein of the invention.

Fig.2 shows a process 200 for network of the applicant (for example, a wireless set 116 loudspeakers in Fig.1) to share a secret code with the network authenticator (e.g., AP 104), facilitating registration in a secure wireless network (e.g., WLAN 102). An example of the process in example 200 begins in step 202 with the receipt by bidder instructions to create a unique secret code that identifies the applicant for network authenticators participating in the General standard/approach to interaction with network registration in a secure wireless network. The secret code is unique across a secure wireless network and, thus, uniquely identifies the applicant for the network authenticator. Additionally, the secret can be globally unique and identifying. This means that no other bidder never has the same secret code. A unique secret code also known as Persian�national identification number (PIN).

When the user activates the applicant, the applicant can search for wireless networks. When the applicant finds the network, he wants to register for it, that is, the Offeror may seek to join the network. In fact, unregistered network may specify that the bidder must provide your PIN code. Alternatively, the user can click on the applicant a button that instructs the applicant to provide his PIN code.

In step 204, the applicant receives a computer-encoded version of the PIN code, which uniquely identifies the applicant in a secure network or, alternatively, identifies it globally. Here the applicant may dynamically generate a PIN code based on the manufacturer's formula and other well-known approaches to create distinct secret key. Alternatively, the candidate can simply access the static PIN key from memory (e.g., memory 138) or the storage subsystem (e.g., disk or flash memory cards).

In step 206 the applicant converts the received, encoded with computer PIN into an electrical signal that can create an audible version of the PIN-key. For example, an electrical signal may initiate the wireless speakers set 116 speakers. Conversion soderzhatrazlichnye digits received PIN in concrete sounds. Sounds resulting from the conversion, may be obtained by direct conversion stored in the computer of numbers or letters to their corresponding sounds in a particular language. By doing this, the bidder can dynamically generate the appropriate sounds for each digit. Alternatively, the bidder may obtain access to the data stored in the memory or storage of sounds, based on predetermined relationships between the digits and the stored sounds. For example, for the PIN code "123", the bidder may obtain access to three audio files, one for each digit "1", "2" and "3". Alternatively, the PIN may contain understand human words, and possibly sentences.

In addition, the applicant may have multiple sound sets, where each set has sounds in a specific language. The user can select a specific language (e.g. French), selecting certain options on the device of the applicant (for example, clicking a button and/or toggle switches). The default language can be set by the manufacturer based on where the applicant is sold. Instead of human-readable numbers, letters and words, sounds, resulting from the conversion may not be part of normal human language. For example, the digits of the PIN code may be converted to tones, clicks, beeps, comments�Oia, music, explosions, animals, sound effects or other sounds that are not part of normal human language.

Alternatively, instead of converting encoded version of the PIN-key (e.g., "134RG34FF2W99") to the audible version of the PIN-key, the Challenger can extract from the memory the previously generated audio versions of the PIN-key1or parts of the PIN-key. For example, the applicant could preserve the memory of the digital audio file that, when played, creates the woman's voice saying "Red, green, blue, eight, nine, thirty-one, alpha, tango, ninety-one, orange". The sounds of this record may correspond to a respective PIN key for network registration, send to the network authenticator who hears this sound, or this takes input from the user, using the UI for network registration.

In step 208, the Challenger creates a sound PIN through the speakers, similar to those found in the wireless set P6 speakers. It shows the message "PIN" 146 callout text in Fig.1. When the applicant does not have a built-in feature of creating sound, the bidder can perform the intermediate stage, to package and send an audio PIN device with a loudspeaker. This can be done through a network communication scheme for a short distance to soedinilis� with another audio device (e.g., mobile phone or telephone), or this can be done by linking the applicant with the network device with a loudspeaker through some kind of unsecured network.

In step 210 the applicant is waiting for confirmation that the network authenticator (e.g., AP 104) received and/or confirmed audio PIN. Network authenticator can receive PIN code via the microphone to have an audio PIN. Alternatively, the authenticator may receive the PIN via the user hears the audio PIN and manually enters the PIN code received by the user. In some implementations there may be no specific confirmation. Instead, the initiation of a network of registration acts as an indirect confirmation that the PIN code has been accepted and confirmed that it is correct.

In step 212, the applicant joins a secure wireless network. This process may include obtaining a candidate network credential from the network authenticator. After completing the registration process, the applicant is an established wireless device to a secure wireless network.

Fig.3 shows an example process 300 receiving network authenticator (e.g., AP 104) secret code from the network of the applicant (for example, from the wireless set 116 of the loudspeakers shown in Fig.1) to facilitate re�istratio the applicant in a protected wireless network (for example, WLAN 102). The example process 300 begins in step 302 by the authenticator, receiving a unique secret code that identifies the candidate authenticator for participating in the General standard/interaction approach for network registration in a secure wireless network. A unique secret code also known as personal identification number (PIN).

When the user enables the authenticator or selects the search option, the authenticator can search candidates. When the authenticator detects the Challenger, the authenticator asks the applicant whether he wants to join a secure network. Of course, the authenticator may specifically request the applicant to provide his PIN. Alternatively, the authenticator may respond to the request of the applicant on joining the network, or specify that the applicant will send him your PIN. Also, alternatively, the authenticator may receive over the network a signal or some beep code indicating that the PIN code appears. Additionally, in some implementations, the authenticator can always be ready to receive audio PIN.

In step 304 the authenticator receives via the microphone (e.g., microphone 128) analog electric sound signal PIN radiated by the applicant. It shows the inscription 146 "PIN" shown in the callout text for� in Fig.1, coming from the wireless set 116 of speakers near the microphone 128. The distance of proximity depends on many acoustic factors, such as the volume of the audio PIN, microphone sensitivity 128 and possible interference from other sound sources (e.g., noise). Typically, the authenticator (e.g., AP 104) and the applicant (for example, wireless set 116 of speakers) are placed together in the same room when it becomes audible audio PIN.

In step 306 the authenticator sends the applicant a confirmation that the authenticator has taken the audio PIN from the applicant. In some implementations, the authenticator may send a special confirmation. Instead, the initiation of a network of registration acts as an indirect confirmation that the PIN code has been received and verified.

On stage, the authenticator 308 converts the analog electrical signal into a computer-encoded version of the PIN. Converting the authenticator contains the inverse transformation of the transformation performed by the applicant when creating audio PIN and discussed above, for example, in relation to the stage 206 of process 200. Sounds sound PIN code is converted into a computer-encoded version of the PIN code.

Alternatively, instead of taking to convert the audio PIN the authenticator may receive a computer-encoded version of the PIN through the person as an intermediary. In this situation, the user hears the audio PIN given by the applicant, and manually enters the PIN code on the UI authenticator. This UI can be part of the authenticator, or may be provided via another device on the network.

In step 310 the authenticator confirms the validity of the PIN code for registration in a digital network. The authenticator can make it through cryptographic calculations, lookup tables, consultation with a trusted third party (e.g., Internet connection) or other known processes validation. Instead of or in addition to the confirmation stage of the authenticator 308 may send the applicant a confirmation that the authenticator has confirmed the authenticity of the audio PIN that you received from the applicant. In some implementations, the authenticator may send a special confirmation. Instead, the initiation of a network of registration acts as an indirect confirmation that the PIN code has been accepted and verified.

When the correct PIN code is verified, the authenticator initiates in step 312, the network procedure of registration of the tenderer, which according to the audio PIN. The procedure may include sending the authenticator over the network set�'s credentials to the applicant. After completing the registration process, the applicant is an established wireless device to a secure wireless network. If the correct code cannot be verified, the authenticator shall refuse the applicant access to the entrance to the protected wireless network. The authenticator may send the applicant an indication of denying access through the network.

Concluding remarks

The terms "component," "module," "system," "interface," etc. as used in this application, usually means linked to the computer object on the hardware and software, a combination of hardware and software, software, or executable software. For example, a component can be, in particular, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and/or computer. For example, the application running on the controller, and the controller can be a component. One or more components can be part of the process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.

Furthermore, the claimed subject of the invention can be implemented as a method, apparatus, or manufacturing� product using standard programming and/or engineering techniques to create software, firmware, hardware components, or any combination thereof to control a computer to implement the disclosed subject matter of the invention. The term "industrial product", as used here, means containing a computer program accessible from any computer readable device, service provider, or carrier. For example, computer readable media may include, in particular, a magnetic storage device (e.g. hard disk, floppy disk, magnetic strips...), optical disks (e.g., compact disk (CD), digital versatile disk (DVD)...), smart cards, and flash memory devices (e.g., card, memory card, miniature storage device...). Of course, specialists in the art should understand that in the above configuration can be made numerous changes without departing from the scope or essence of the claimed subject invention.

The term "or", as used in this application, is intended to mean containing "or" not exclusive "or". That is, unless specified otherwise or not should be clear from the context, the expression "X employs A or b" implies Luba� from contained natural permutations. That is, if X employs A; X employs b; or X employs both A and b, then "X employs A or b" is satisfied in any of the preceding cases. Moreover, the indefinite articles are used in the present application and the appended claims should generally be construed to mean "one or more" unless specified otherwise or unless the context clearly does not follow that they belong to a single number. Although the subject invention has been described in language specifically defined for structural features and/or methodological acts, it should be understood that the subject invention as defined in the appended claims is not necessarily limited to the specific features or actions described. The specific features and steps are disclosed rather in the form of an example implementation of the invention.

1. The way the sound of authorization for registration in a wireless network, comprising stages on which:
requesting registration in a wireless network using a wireless device seeking to enroll in a wireless network, wherein the wireless device is still unauthorized wireless network;
take in response to the request, the refusal of registration;
in response to receiving the refusal of registration:
receive a secret code that is unique about�time identifies the wireless device;
acoustically emit a secret code using the wireless device;
in response to the acoustic emission accepting the approval of the registration request via a wireless network using a wireless device;
in response to reception of approval of registration register a wireless device on a wireless network;
determine the language among the many languages that are available on the wireless device;
transform a computer-encoded version of the secret in the audio version of the secret code in which an audio version of the secret code is executed on a human readable language that corresponds to the selection of a specific language.

2. A method according to claim 1, wherein the step of obtaining includes obtaining the encoded version of the secret code stored in the memory of unauthorized wireless devices.

3. A method according to claim 1, wherein the step of obtaining includes dynamically generated by a computer-encoded version of the secret.

4. A method according to claim 1, wherein the step of obtaining includes obtaining the encoded version of the secret code and the method further comprises
the transform coded computer version secret in the audio version of the secret code.

5. A method according to claim 1, further comprising receiving one or more network credentials to register in the wireless�the same network.

6. A method according to claim 1, wherein the secret code is a globally identifies a wireless device.

7. The way the sound of authorization for registration in a wireless network, comprising stages on which:
receive a secret code that uniquely identifies a wireless device seeking to enroll in a wireless network, wherein the wireless device is still unauthorized wireless network;
acoustically emit a secret code using the wireless device;
in response to the acoustic emission accepting the approval of the registration request via a wireless network using a wireless device;
in response to reception of approval of registration register a wireless device on a wireless network, and
determine the language based on the user input;
transform a computer-encoded version of the secret in the audio version of the secret code in which an audio version of the secret code is executed on a human readable language that corresponds to the selection of a specific language.

8. The way the sound of authorization for registration in a wireless network, comprising stages on which:
get the audio version of the personal identification number (PIN) that uniquely identifies a wireless device seeking to zaregistrirovat�camping in a wireless network, while the wireless device is still neautorizovane wireless network;
convert audible version of the PIN code in a computer-encoded version of the PIN code;
confirm that the encoded version of the PIN code;
in response to confirmation that the correct PIN is confirmed, initiate registration of the wireless device in a wireless network, and
determine the language among the many languages that are available on the wireless device;
transform a computer-encoded version of the PIN of the audio version of the PIN, in which the audible version of the PIN is made in a human readable language that corresponds to the selection of a specific language.

9. A method according to claim 8, before receiving further containing a stage at which accept the indication that the audible version of the PIN code.

10. A method according to claim 8, after receiving further comprising a stage on which to send the ACK to the audible version of the PIN code.

11. A method according to claim 8, further comprising after the confirmation stage on which to send the confirmation that the audible version of the PIN code has been audited.

12. A method according to claim 8, in which receiving includes receiving the audible sound emitted by the unauthorized wireless device, and storing the sound as the audible version of the PIN code.

13. Wireless device DL� registration in a wireless network, contains:
a memory configured to store encoded computer version of a personal identification number (PIN) that uniquely identifies the wireless device when the wireless device tries to log into the wireless network;
one or more loudspeakers, made with the possibility of acoustic radiation of sound;
Manager PIN, configured to obtain the encoded version of the PIN code stored in memory and determine the choice of language among the many languages that are available on the wireless device;
convert encoded version of the PIN of the audio version of the PIN, in which the audible version of the PIN is made in a human readable language that corresponds to the choice of a particular language
audioadapter, made with the possibility of converting coded computer version of the PIN of the audio version of the PIN, while the audio version is made in a human readable language that corresponds to the choice of a certain language, and radiation control an audio version of a PIN through one or more loudspeakers;
the Manager on reception, made with the ability to manage the registration of the wireless device in the wireless network and additionally performed with the opportunity to:
request Ryougi�the ations in the wireless network using the wireless device;
receiving in response to the inquiry of refusal of registration;
in response to the receipt of the refusal to register Manager startup PIN for receiving the PIN and audioadapter to convert the encoded version of the PIN of the audio version of the PIN and control of acoustic radiation of an audio version of a PIN through one or more loudspeakers;
in response to the acoustic radiation receiving approval of the registration request via a wireless network using a wireless device;
in response to reception of approval of registration the registration of a wireless device in a wireless network.

14. The device according to claim 13, in which the Manager PIN codes are further configured to create the encoded version of the PIN code.

15. The device according to claim 13, in which the wireless device is no visual display to display the PIN code on the screen for the user.



 

Same patents:

FIELD: measurement equipment.

SUBSTANCE: invention relates to portable field tools for maintenance. A tool (52, 102) comprises, without limitation, a module (121) of protocol of wireless communication of a technological process configured with the possibility to maintain communication in accordance with the protocol of wireless communication of technological process. The tool (52, 102) also includes a display (120) and an input device (122). A controller (130) is connected with a module of protocol of wireless communication of technological process, the display (120) and the input device (122). The controller (130) is configured with the possibility of processing a map on a display (120), showing the position of the portable field device (52, 102) relative to at least one facility, such as a field device (22, 23, 104). The controller (130) is additionally configured as capable to determine position of the portable field device (52, 102) for maintenance by means of triangulation using wireless communication of technological process with a row of available field devices (104) with fixed position.

EFFECT: more accurate determination of location of a field device due to mutual use of GPS and triangulation.

32 cl, 8 dwg

FIELD: radio engineering, communication.

SUBSTANCE: in a wireless transmission system 100, a first device 101 and a second device 102 perform wireless data transmission via a wireless transmission channel which uses a plurality of physical links in parallel. In each device, input/output ports 111-113 input and output data. A plurality of wireless signal processing means 141-143 controls different physical links. The wireless signal processing means 141-143 measure the signal strength level of the physical links and notify a peer-side device of the same. Link aggregation control means 130 determines the priority for each of the physical links based on the signal strength level for each physical link. Packet transfer processing means 141-143 select, among physical links configuring the wireless transmission path, a physical link which has a usable band of a predetermined capacity and which is of a high priority as a data receiver.

EFFECT: providing predetermined communication quality during wireless communication using link aggregation techniques.

10 cl, 4 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to radio engineering, namely to digital cellular radio communication and can be used for creation of digital radio telephone networks of new generation. The invention proposes an addressing method of correspondents of mobile radio network, which is based on a principle of code separation of channels, and a dynamic addressing device of radio aids of mobile radio network. The device consists of Transmitted Command Register, Received Command Register, Dynamic Transmitter Addressing Register, Dynamic Receiver Addressing Register, Generator of Pseudorandom Code Sequences of Transmitter, Generator of Pseudorandom Code Sequences of Receiver, Modulator and Demodulator of Radiofrequency Signals, and Code Calculator-Converter Unit.

EFFECT: creation of a radio circuit with a digital (numbered) method for calling and addressing correspondents, which provides information transfer confidentiality.

6 cl, 3 dwg

FIELD: radio engineering, communication.

SUBSTANCE: method includes a service control function (SCF) module receiving a session initiation protocol (SIP) re-invitation while the mobile device is receiving a MBMS download in a content delivery session including DASH formatted content, wherein the SCF module can send a SIP invitation to an HTTP/SIP adapter to select an HTTP server for an HTTP-based delivery. The SCF module can receive a SIP acknowledgement from the HTTP/SIP adapter indicating a selection of the HTTP server for the content delivery session. The SCF module can forward the SIP acknowledgement to the mobile device indicating a switch to the HTTP server for the content delivery session.

EFFECT: providing a method for switching from a multimedia broadcast multicast services download to a hypertext transfer protocol (HTTP)-based delivery of dynamic adaptive streaming over HTTP (DASH) formatted content in an Internet protocol multimedia subsystem network.

30 cl, 8 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to mobile communication. A Mobility Management Entity receives a service type indicator from a gateway node. The service type indicator indicates a type of service for the session and is associated with bearers used for the session. The Mobility Management Entity subsequently receives, from an eNodeB, an indication that the session is to be transferred from the packet switched network to the circuit switched access network. The Mobility Management Entity determines the bearers associated with the session using the service type indicator, and initiates transfer of the session using those bearers.

EFFECT: performing session transfer from a packet switched access network to a circuit switched access network while ensuring that the correct bearers are transferred regardless of whether or not identifiers such as Quality of Service Class Identifier (QCI) values have been assigned to other types of service.

13 cl, 8 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to data transmission networks. A networking system comprising a virtual group controller in an information-oriented network configured to enable mobility and security for a plurality of users groups of the information-oriented network, a plurality of user groups connected to the virtual group controller and associated with the users, a plurality of agents that are each associated with one of the user groups, and a database for trusted service profile connected to the virtual group controller, wherein the virtual group controller is configured to interact with the agents to enable mobility for the user groups using a server-less domain-based naming scheme.

EFFECT: providing global routing on a network.

24 cl, 11 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to communication. A method and device for changing a transmission/reception setting of a base station (BS) in a communication network to another transmission/reception setting (for example, using fewer transmitting antennae and/or a narrower channel bandwidth), without affecting communication with user equipment, includes "replacing" the existing BS with a "virtual" BS having the other transmission/reception setting. Replacement can be carried out, for example, by reducing the power of the existing or the first BS, having the corresponding identification (ID) of a first cell or a first node, and simultaneously increasing the power of the virtual or second BS, having the corresponding ID of a second cell or a second node.

EFFECT: improved BS efficiency.

18 cl, 6 dwg

FIELD: radio engineering, communication.

SUBSTANCE: result is achieved by dividing a geographical area into a plurality of geographical bins, setting up a plurality of zones for a cell based on a plurality of boundary thresholds, receiving a plurality of signal measurements from a plurality of user devices across the geographical bins, classifying the geographical bins into the different zones by comparing the signal measurements to the boundary thresholds of the zones, calculating a plurality of gain adjustments for the corresponding geographical bins in the zones and generating a beam pattern based on the gain adjustments.

EFFECT: optimising the antenna beam pattern of a base station.

23 cl, 10 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to data transmission. The method enables a femtocell access point to automatically establish communication with a communication network provider; enable said access point to automatically download a personal configuration from an initialisation server belonging to said communication network provider and a domain name system server is automatically used to obtain the address of the initialisation server.

EFFECT: improved femtocell initialisation method.

19 cl, 4 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention discloses, in particular, a method of detecting a preamble, which includes the following: chips of a preamble are divided into a plurality of chip blocks, and correlative accumulation is performed on the plurality of chip blocks to obtain multiple groups of partial products of signature components; compensation of positive frequency offset is performed on each group of the multiple groups of partial products of signature components to obtain multiple groups of compensation results of positive frequency offset, and compensation of negative frequency offset is performed on each group of the multiple groups of partial products of signature components to obtain multiple groups of compensation results of negative frequency offset; coherent accumulation, phase rotation, signature matching and complex modulus calculation, and dual-antenna merging are performed on the multiple groups of compensation results of positive frequency offset, and the coherent accumulation, the phase rotation, the signature matching and the complex modulus calculation, and the dual-antenna merging are performed on the multiple groups of compensation results of negative frequency offset.

EFFECT: high efficiency of detecting preamble in a wideband code division multiple access system.

14 cl, 4 dwg

FIELD: information technologies.

SUBSTANCE: client device visualises a reflection, which includes at least one multimodal element of reflection, for which input data is accepted by means of visual modality and voice modality. When a client detects a fragment of a user's speech via voice modality, the client sends audio data of the uplink that represents a speech fragment to the voice recognition module. The application server receives the result of voice recognition generated by the voice recognition module and sends a response to the request of a voice event to the client. The response to the voice event request is sent as a response to an asynchronous HTTP-request of a voice event sent before by the client to the application server. Then the client may send another request of the voice event to the application server in response to reception of the response to the voice event request.

EFFECT: reduced time for finding the required content.

21 cl, 6 dwg

FIELD: information technology.

SUBSTANCE: parameters of the input speech signal of the speaker in form of a pass phrase is compared with given accuracy e with stored standard parameters of input speech signals in form of the same pass phrase uttered by speakers known in advance, followed by authentication. Said parameters are the low-frequency part of the wavelet for conversion from the normalised distribution function of special points along the audio file corresponding to the input speech signal of the speaker in form of a pass phrase, selected by comparing the reading in that point in the audio file with preceding and next readings through generalised coefficients of linear prediction and a threshold T. Normalisation of the distribution function amounts to reducing it to standard length Len, obtained when calculating standard parameters of input speech signals in form of a pass phrase uttered by known speakers.

EFFECT: high reliability of speaker recognition when using a pass phrase with a limited length.

1 dwg

FIELD: information technology.

SUBSTANCE: input speech signal of a speaker undergoes segment-by-segment comparison with stored standard parameters of standard phrases uttered by speakers known in advance, for which parametric descriptions of successive segments of the input speech signal are compared with parametric descriptions of successive segments from those selected for comparison with said standard with subsequent authentication of the speaker. The parametric descriptions used is a transition matrix, for which is constructed a sequence of special points selected by comparing the reading in the segment with the surrounding of the reading determined through generalised coefficients of linear prediction and a threshold T. Further, the sequences of special points are merged into blocks with length L. A transition matrix similar to the transition matrix in a Markovian chain is constructed based on the number of special points in the block and the obtained matrix is compared with the model of the standard matrix with given accuracy ε and a decision is made on correct authentication of the speaker.

EFFECT: high reliability of speaker recognition when using a pass phrase with a limited length.

1 dwg

FIELD: information technology.

SUBSTANCE: invention discloses accessing methods and a system, based on using a collection of personal information with application of a dynamic component to obtain an audible response and on combined analysis of content of the said voice profile response.

EFFECT: high protection from unauthorised access.

39 cl, 6 dwg

FIELD: information technology.

SUBSTANCE: parametres of the input speech signal of a speaker are compared with parametres of a standard speaker selected for comparison by calculating disparity measures - weighted Euclidean distance between parametres of the input and verified speech signals, and the speaker is accepted or rejected based on the calculated disparity measure. For this purpose, values of coefficients of correlation of the input speech signal are determined, values of coefficients of correlation of the mathematical model of the speech signal in form of a multiple carrier frequency pulse of an amplitude-modulated oscillation are calculated, and the minimum distance between coefficients of correlation of the input speech signal and its mathematical mode is calculated, where base frequency is determined and amplitude values of harmonics at the base frequency and overtones of the speech signal, which are the said parametres, are evaluated. Parametres of the input speech signal and the standard can be normalised by dividing the amplitude of carrier harmonics by the standard amplitude-frequency characteristic of the microphone while taking into account the noise level.

EFFECT: higher potential reliability of identity verification with high noise immunity when there is noise and when using low-quality microphones.

4 cl, 3 dwg

FIELD: physics; communication.

SUBSTANCE: invention relates to identification of a calling subscriber. Each CFG grammar contains an indicator for highly probable calling subscribers, and probability weight coefficients in each CFG grammar vary accordingly. When receiving subscriber receives a call, the relevant CFG grammar is applied together with a speech recognition application to provide at least preliminary identification of the calling subscriber. The calling subscriber can confirm identification data. If possible, standard apparatus for identifying a calling subscriber is used at least for assisting in the identification process. Improved calling subscriber identification based on speech recognition can also be used to provide functional possibility of intellectual call routing.

EFFECT: invention ensures reliable identification based on speech recognition; contex-free grammar (CFG) is created for each potential receiving subscriber, which is configured to support calling subscriber identification using speech recognition.

17 cl, 5 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to human biometric systems by individual characteristics of his voice for authorised access, for example, to an operating system, computer resources, bank account or physical access to rooms and in situations which require authorised access. The essence of the invention lies in the fact that the user verification method in systems of authorised access includes creation of a referral base of speaker data, creation of a user database, for user verification. The user enters their identifier and says the password from a random sequence of words from a vocabulary user database. After obtaining the sound signals of the pronounced password the probability of the pronounced password to the voice of the user is calculated and the decision to allow or deny access is taken.

EFFECT: reduction of the probability of mistaken admission of an impostor or rejection of a valid user using individual characteristics of the human voice in application to authorised access.

9 dwg

FIELD: transport.

SUBSTANCE: proposed system incorporates a microcontroller connected to the control unit, a voice signal processing unit, a voice identification unit, a memory and, via an interface, connected to the car electronic hardware. Note that the system additionally incorporates a modem, a mobile communication module allowing a voice and text exchange with the car owner mobile phone, a voice message formation unit, a text message formation unit and a switcher providing for sending the activating signals from the microcontroller to the aforesaid units.

EFFECT: increased stealthiness of audio dialogs between system owner staying outside car.

2 cl, 1 dwg

FIELD: safety and control systems.

SUBSTANCE: as main mechanism, detection of living human face and detection of unsanctioned users present closely to registered user, are used. In invention, methods for tracking a three-dimensional object are used, where object is brought to first normalized face shape, while fast method is used for measuring and comparing facial mimics to a template, and also methods are used for detection of local features and representation of face in three different normalized forms. Also, fast method for measuring and comparing to a template is used for such a behavioral biometric characteristic as phonemic signature, produced as a result of execution of system commands by the user.

EFFECT: increased reliability and speed when detecting an attempt of unsanctioned access to an object.

2 cl, 8 dwg

FIELD: automatic voice recognition technologies.

SUBSTANCE: acoustic signal, observed at a point of person body, unknown to unauthorized personnel, is inputted to computing device, values of parameters of acoustic signal are determined, values of estimates of statistical characteristics of parameters of acoustic signal are determined and standards are formed on basis of these, grade of difference between acoustic signal and standards is determined, on basis of aforementioned grade decision is taken whether acoustic signal belongs to person, whose values of statistical characteristics were used during forming of standards.

EFFECT: higher resistance to interference, higher efficiency, higher trustworthiness.

6 dwg

FIELD: automatic voice recognition technologies.

SUBSTANCE: acoustic signal, observed at a point of person body, unknown to unauthorized personnel, is inputted to computing device, values of parameters of acoustic signal are determined, values of estimates of statistical characteristics of parameters of acoustic signal are determined and standards are formed on basis of these, grade of difference between acoustic signal and standards is determined, on basis of aforementioned grade decision is taken whether acoustic signal belongs to person, whose values of statistical characteristics were used during forming of standards.

EFFECT: higher resistance to interference, higher efficiency, higher trustworthiness.

6 dwg

Up!