US20150082034A1 - Method and apparatus for transmitting data using encoded patterns of changing colors - Google Patents

Method and apparatus for transmitting data using encoded patterns of changing colors Download PDF

Info

Publication number
US20150082034A1
US20150082034A1 US14/028,380 US201314028380A US2015082034A1 US 20150082034 A1 US20150082034 A1 US 20150082034A1 US 201314028380 A US201314028380 A US 201314028380A US 2015082034 A1 US2015082034 A1 US 2015082034A1
Authority
US
United States
Prior art keywords
message
challenge
color
challenge response
transmitting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/028,380
Inventor
Jeffrey Thomas CESNIK
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CLUTCH AUTHENTICATION SYSTEMS LLC
Original Assignee
CLUTCH AUTHENTICATION SYSTEMS LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CLUTCH AUTHENTICATION SYSTEMS LLC filed Critical CLUTCH AUTHENTICATION SYSTEMS LLC
Priority to US14/028,380 priority Critical patent/US20150082034A1/en
Assigned to CLUTCH AUTHENTICATION SYSTEMS, LLC reassignment CLUTCH AUTHENTICATION SYSTEMS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CESNIK, JEFFREY T
Priority to US14/578,331 priority patent/US9787404B2/en
Priority to US14/578,307 priority patent/US20150155937A1/en
Priority to US14/578,328 priority patent/US20150155938A1/en
Priority to US14/578,335 priority patent/US20150256522A1/en
Priority to US14/578,325 priority patent/US20150104184A1/en
Priority to US14/578,337 priority patent/US20150156186A1/en
Priority to US14/578,315 priority patent/US9548814B2/en
Publication of US20150082034A1 publication Critical patent/US20150082034A1/en
Priority to US14/680,072 priority patent/US20150215312A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/4508Management of client data or end-user data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/44008Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/812Monomedia components thereof involving advertisement data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark

Definitions

  • the present invention relates generally to a method of transmitting, receiving and decoding data using a stream of patterns of changing colors. Specifically, the data is used together with a two factor authentication system and method.
  • the CIE xyz color space contains all perceivable colors (or gamut) that the human eye can detect.
  • Most computer monitors, televisions and other similar devices use an RGB (red/green/blue) color space model, which is a subset of the CIE xyz color space due to the fact that these devices cannot recreate every possible human perceptible color.
  • RGB red/green/blue
  • any color within the RGB color space gamut can be created. Not to be overlooked, white is the combination of all three primary colors and black is the absence of any color.
  • the sequential presentation of colors representing encoded data must be presented as a video stream, or alternatively, presented via dedicated software to mimic a video stream—at a frame rate that can be reproduced reliably on a given display device.
  • the refresh rate of a given display device will dictate the highest achievable video frame rate, with 60 Hz being a common baseline on desktop computer displays. 15-30 frames per second video can be reliably displayed on such devices, meaning that raw data transfer rates on the order of a few tens to a few hundred bits per second could be achieved assuming a data encoding density of 3 to 8 bits per distinct color.
  • the data transfer rate can be increased accordingly.
  • an imaging sensor that you would find in a digital camera consists of thousands (or millions) of pixels, with each individual pixel being behind a red, green, or blue color filter. By counting the number of photons hitting the sensor over a given period of time (integration), a relative digital count of each red, green and blue pixel can be ascertained—the combination of which would yield a digital representation of the sensed color.
  • TAOS Texas Advanced Optoelectronic Solutions
  • Similar sensors are also manufactured by Avago Technologies as well as others. These are generally available in very small packages (approximately 2 mm ⁇ 2 mm square) and at very low price points (a few dollars each). These sensors are used in industry for a number of purposes including industrial process control, instrumentation (colorimeters), consumer toys, etc.
  • a method for transmitting encoded data comprises the steps of:
  • the method for transmitting encoded data is incorporated into a two factor authentication method comprising the steps of:
  • the method for transmitting encoded data may also be incorporated into other methods such as for interactive consumer toys, advertising incentives (interactive coupons) and in-field firmware or software updates.
  • a two factor authentication system which comprises a transmitter configured to display a plurality of bit patterns in a predetermined color combination of red, green and blue channels; an implementing device having a microprocessor and a display; said microprocessor configured to decode and decrypt said plurality of bit patterns displayed by said transmitter into a challenge; whereby said challenge is displayed on said display of said implementing device, to provide a security system that allows a user to respond to said transmitter with a decoded and decrypted challenge to pass a two factor authentication test.
  • FIG. 1 is the CIE xy chromacity diagram, showing the human perceptible color region and the colors that can be represented in video and in desktop computing (RGB color space).
  • FIG. 2 is an example digital color sensor graph of normalized sensitivity, demonstrating the un-equal response of the individual color channels.
  • FIG. 4 is the example palette from FIG. 3 plotted against the CIE chromacity diagram, illustrating their even distribution within the sRGB color space (cb ⁇ black ⁇ and cr ⁇ grey ⁇ not shown).
  • FIG. 5 is an example of an encoded message, with colors shaded according to convention.
  • FIG. 6 is a front view of a video monitor showing Step 1 of authentication.
  • FIG. 7 is a front view of a video monitor showing Step 2 of authentication.
  • FIG. 8 is an isometric view of a user holding an example implementing device (a two-factor authentication token) in front of a video monitor.
  • FIG. 9 is an isometric view of a user holding a smart phone device in front of a video monitor.
  • FIG. 10 is an isometric view of a an example implementing device (a two-factor authentication token).
  • FIG. 11 is block diagram showing the interconnections of an implementing device.
  • FIG. 1 a CIE xy chromacity diagram is shown.
  • the “horseshoe” 10 encloses all human perceptible colors while the triangle 12 encloses colors that can be represented in video and in desktop computing (RGB color space).
  • the implementing device and method transmit and receive data in the form of color selected from within the triangle 12 enclosed area of the CIE xy chromacity diagram.
  • FIG. 2 an example digital color sensor graph of normalized sensitivity, demonstrating the unequal response of the individual color channels.
  • the blue channel shown in the graph as line 24 is generally less sensitive than the green channel 26 or the red channel 28 , while the green channel 26 is less sensitive than the red channel 28 .
  • the binary bit pattern is defined by assigning a given color (combination of red, green and blue channels).
  • the number of distinct colors able to be reliably and repeatedly detected dictates the bit density of the encoding. While an electronic display device may be capable of generating 16.7 million distinct colors, the probability of accurate detection of that many distinct values is significantly reduced based not only on sensor sensitivity, but also environmental conditions such as detection distance, ambient lighting, brightness of the display source, presence of any interference, noise sources, etc.
  • an 8-bit number could be represented as the sequential presentation of 3 colors (the extra encoded bit could be used as a parity check bit within a given protocol implementation or for other purposes).
  • Pad M so its length is the next multiple of (d*r). This ensures that M's encoding ends on an exact frame boundary.
  • the subsequence (cw, cb) serves as a frame delimiter within the protocol as well as max/min calibration values used for value normalization and color detection.
  • FIG. 3 illustrates an example of encoding 10 colors, including white (cw) and black (cb).
  • the bit density for the example in FIG. 3 is 3 bits/color, which results in 10 colors.
  • FIG. 4 shows the example palette from FIG. 3 plotted against the CIE chromacity diagram.
  • the plot in FIG. 4 illustrates that the colors used for encoding 50 , 50 a , 50 b, 50 c, 50 d, 50 e, 50 f, 50 g are not closely spaced, are distinct, and are generally completely contained within the sRGB color space 12 .
  • Cb (black) and Cr (grey) are not clearly depicted, as they both represent different intensities of white and both Cb (black) and Cr (grey) map to the same 2D point within the diagram shown in FIG. 4 .
  • d 3 bits per color.
  • r 3 data encoding colors per frame, yielding 9 encoded bits per frame—enough to encode a single 8-bit character with a single bit left over, in this example used as an even parity bit.
  • ASCII characters here; however any arbitrary binary data could just as well be encoded and framed using these methods.
  • the ‘$’ character was specifically chosen to illustrate the optional use of the cr reserved color to indicate a repeating binary sequence (the binary sequence 001 appears twice in this character encoding).
  • Decoding is somewhat more complicated than the encoding algorithm steps due to the differences in color sensor devices, display devices, varying ambient lighting conditions and noise sources. Note that we use the terms “maxima” and “minima” below with respect to the magnitude of the RGB tuples when treated as 3-vectors.
  • a packet-based protocol could be easily implemented by layering additional protocol building block elements on top of the example described above to identify, for example, message start, message length, etc. Additionally, a cyclic redundancy check element, or even a forward error correcting code could be added to a message packet to ensure (with reasonable certainty) that the message packet was received without error and decoded properly. Note that the use of the parity check bit encoding described in the example above is arbitrary—the extra bit could just as well have been used for data encoding.
  • FIGS. 6-11 illustrate the inventive two factor authentication system and method.
  • two factor authentication schemes have relied on the principles of something you have, and something you know.
  • a user wishing to authenticate with a given web site or software package is presented with a standard username/password login screen where their username is entered along with their password (something you know).
  • a changing number appearing on a small handheld device is appended to their password—this number is cryptographically unique, and identifies that the user actually has the implementing device on their person (something you have).
  • the implementing device can be in the form of a small dedicated hardware token implementing a single-pixel RGB color sensor (for example, the TAOS TCS3414 or similar device, shown in FIGS. 8 and 10 as item 34 ), with the implementing device shown in FIGS. 8 and 10 as item 30 , together with a small 6-12 character electronic display device element 32 in FIGS. 8 and 10 .
  • a small dedicated hardware token implementing a single-pixel RGB color sensor (for example, the TAOS TCS3414 or similar device, shown in FIGS. 8 and 10 as item 34 ), with the implementing device shown in FIGS. 8 and 10 as item 30 , together with a small 6-12 character electronic display device element 32 in FIGS. 8 and 10 .
  • the implementing device can alternatively be implemented as software running on a smart device such as a cell phone with video capability (as shown in FIG. 9 ) or similar.
  • a smart device such as a cell phone with video capability (as shown in FIG. 9 ) or similar.
  • block 31 is described as an RGB color sensor or video camera, which may be implemented in the user's device 30 ( FIGS. 8 and 10 ) or 31 ( FIG. 9 ).
  • the encrypted and encoded challenge phrase is presented to the user through a computer screen 33 or similar device (“transmitter”) as a sequence of flashing colors ( 40 ).
  • the user holds the implementing device ( 30 or 31 ) up to the transmitter in order to receive the transmitted message.
  • the samples are collected by the microprocessor 41 , filtered and processed via the decoding algorithm steps (shown as element 42 in FIG. 11 ) described above, yielding the originally transmitted but encrypted message.
  • the message is decrypted 44 using the implementing device's unique cryptographic key.
  • the challenge phrase is displayed to the user on the implementing device's electronic display ( 32 or 32 a ). If unsuccessful, a message indicating so (or optionally some other sequence of characters, or nothing at all) is displayed to the user on the implementing device's electronic display ( 32 or 32 a ).
  • the user enters their password in the password field 36 , and also enters the decoded/decrypted challenge phrase displayed on the implementing device in the challenge field 38 .
  • the software or web site makes a determination that the challenge phrase matches what was originally generated and encrypted/encoded, and therefore determines whether or not the identity of the user is valid.
  • the algorithms may be used with interactive consumer toys.
  • a “command message” is to be transmitted to affect a response from a toy via a child's favorite video, television program, computer game, etc.
  • the message would be encoded and transmitted as per steps 4 and 5 above (the “command message” would replace the concept of a human-readable challenge phrase described therein).
  • the toy would implement steps 6 through 9 as a receiver (again with encryption considered optional) to decode the transmitted command message.
  • the toy Upon successful decoding the toy would perform some action based on the command message, to then elicit joy and happiness from the participating children.
  • the algorithms may also be used with advertising incentives (interactive coupons).
  • advertising incentives interactive coupons
  • a product manufacturer or an advertiser wishes to provide purchase incentives and to track market response for a given consumer product television commercial campaign.
  • a unique human-readable “coupon code” (replacing the concept of a challenge phrase described above) is encoded into the television commercial (via steps 4 and 5 above, again with the use of encryption considered optional).
  • Consumers within that geographic area would then be able to decode the human-readable “coupon code” via steps 6 through 10 described above, and use it to generate a coupon (via computer) to receive a purchase rebate.
  • the advertiser would be able to identify the market response based on the collected data.
  • the algorithms may also be used with in-field firmware and software updates. Assume that a device needs to have its firmware or software updated in the field.
  • the binary firmware or software is encoded and transmitted via steps 4 and 5 above (the binary firmware or software would replace the concept of a human-readable challenge phrase described therein).
  • the device implements a receiver as per steps 6 through 9 described above to receive, decode and subsequently update the firmware or software running on the device.

Abstract

A system and method for encoding, transmitting and decoding data is described which defines a plurality of bit patterns into a predetermined color combination of RGB values. A message is formed from the plurality of bit patterns and the message is then arranged into a recognizable format with a message protocol. The message is transmitted to a decoder, which decodes the message and displays the message on a display. A use is provided to establish a two factor authentication mechanism to authenticate a user by a requester.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation of and claims the benefit of U.S. application Ser. No. 13/216,433 filed Aug. 24, 2011, and is incorporated herein by reference in its entirety.
  • FIELD OF THE INVENTION
  • The present invention relates generally to a method of transmitting, receiving and decoding data using a stream of patterns of changing colors. Specifically, the data is used together with a two factor authentication system and method.
  • BACKGROUND
  • In the 1920's, a series of experiments were conducted on human sight which led to the specification of what is called the CIE xyz color space. This color space contains all perceivable colors (or gamut) that the human eye can detect. Most computer monitors, televisions and other similar devices use an RGB (red/green/blue) color space model, which is a subset of the CIE xyz color space due to the fact that these devices cannot recreate every possible human perceptible color. By combining different values of three primary colors (red, green, and blue), any color within the RGB color space gamut can be created. Not to be overlooked, white is the combination of all three primary colors and black is the absence of any color. Most electronic displays in use today represent color with 8 bits of precision; that is, the intensity of each color channel (red, green, or blue) can be represented as an 8-bit number (0-255 decimal, or 0x00-0xFF hex). A modern electronic display is capable of producing on the order of 16.7 million distinct colors using this method.
  • In order to transmit data through a display device, the sequential presentation of colors representing encoded data must be presented as a video stream, or alternatively, presented via dedicated software to mimic a video stream—at a frame rate that can be reproduced reliably on a given display device. The refresh rate of a given display device will dictate the highest achievable video frame rate, with 60 Hz being a common baseline on desktop computer displays. 15-30 frames per second video can be reliably displayed on such devices, meaning that raw data transfer rates on the order of a few tens to a few hundred bits per second could be achieved assuming a data encoding density of 3 to 8 bits per distinct color. By increasing either or both data encoding density and number of frames displayed per second, the data transfer rate can be increased accordingly.
  • Many different electronic sensors are capable of detecting colors, and most work off of the same principle—a photo-sensitive device behind one or more color filters. For example, an imaging sensor that you would find in a digital camera consists of thousands (or millions) of pixels, with each individual pixel being behind a red, green, or blue color filter. By counting the number of photons hitting the sensor over a given period of time (integration), a relative digital count of each red, green and blue pixel can be ascertained—the combination of which would yield a digital representation of the sensed color.
  • Other than common multi-pixel imaging sensors, there also exists a class of device which is basically a dedicated “single-pixel” color sensor; that is, a sensor that is only able to detect a single color at a time. An example of such a sensor is the TCS3414 digital color sensor manufactured by Texas Advanced Optoelectronic Solutions (TAOS). Similar sensors are also manufactured by Avago Technologies as well as others. These are generally available in very small packages (approximately 2 mm×2 mm square) and at very low price points (a few dollars each). These sensors are used in industry for a number of purposes including industrial process control, instrumentation (colorimeters), consumer toys, etc.
  • Most electronic sensors described above do not respond equally to a given primary (red, green or blue) color; that is, the blue channel in such sensors is generally less sensitive than the red and green channels, while the green channel is less sensitive than the red channel. This unequal channel response, together with potential inconsistent repeatability and overall sensitivity characteristics can create challenges if such single pixel sensors were to be used to sense and decode a stream of encoded “video” data. What is needed is a novel method considering such challenges inherent in the single pixel sensor that will allow the sensor to operate at relatively high frequencies of 15-30 frames per second or more to decode a single-color “video stream”, and effectively to become a single-pixel video camera.
  • SUMMARY
  • A method for transmitting encoded data is provided which comprises the steps of:
      • defining a plurality of bit patterns, each bit pattern corresponds to a predetermined color combination of red, green and blue channels;
      • forming a message from the plurality of bit patterns;
      • arranging the message into a recognizable format with a message protocol;
      • transmitting the message to a decoder;
      • decoding the message by the decoder; and
      • displaying the message on a display.
  • The method for transmitting encoded data is incorporated into a two factor authentication method comprising the steps of:
      • a. Entering a user name to a requester by a user wishing to be authenticated;
      • b. Looking up a cryptographic key by requester, the key corresponding to a user's implementing device;
      • c. encoding a challenge phrase or set of characters as changing colors that only the user's device can successfully decode;
      • d. presenting the encoded challenge to the user as a sequence of flashing colors on a display screen;
      • e. holding the implementing device up to the display screen by the user;
      • f. decoding the challenge by the implementing device;
      • g. decrypting the challenge by the implementing device;
      • h. submitting the password and successfully decoded and decrypted challenge by the user to the requester;
      • i. determining whether or not the challenge corresponds to the encoded challenge by the requester and therefore whether or not the identity and validity of the user corresponds to a stored record.
  • The method for transmitting encoded data may also be incorporated into other methods such as for interactive consumer toys, advertising incentives (interactive coupons) and in-field firmware or software updates.
  • A two factor authentication system is provided which comprises a transmitter configured to display a plurality of bit patterns in a predetermined color combination of red, green and blue channels; an implementing device having a microprocessor and a display; said microprocessor configured to decode and decrypt said plurality of bit patterns displayed by said transmitter into a challenge; whereby said challenge is displayed on said display of said implementing device, to provide a security system that allows a user to respond to said transmitter with a decoded and decrypted challenge to pass a two factor authentication test.
  • Applicant has successfully tested the system and method and the results are both surprising and unexpected. Because of the relatively low sensitivity of existing sensors to red, green, blue channels, it is surprising that the inventive system and method are able to successfully encode and decode the video data.
  • These aspects of the invention are not meant to be exclusive. Furthermore, some features may apply to certain versions of the invention, but not others. Other features, aspects, and advantages of the present invention will be readily apparent to those of ordinary skill in the art when read in conjunction with the following description, and accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is the CIE xy chromacity diagram, showing the human perceptible color region and the colors that can be represented in video and in desktop computing (RGB color space).
  • FIG. 2 is an example digital color sensor graph of normalized sensitivity, demonstrating the un-equal response of the individual color channels.
  • FIG. 3 is an example palette of colors to be used to encode data with a bit density of d=3 bits, with their corresponding RGB tuple values and an example binary mapping.
  • FIG. 4 is the example palette from FIG. 3 plotted against the CIE chromacity diagram, illustrating their even distribution within the sRGB color space (cb {black} and cr {grey} not shown).
  • FIG. 5 is an example of an encoded message, with colors shaded according to convention.
  • FIG. 6 is a front view of a video monitor showing Step 1 of authentication.
  • FIG. 7 is a front view of a video monitor showing Step 2 of authentication.
  • FIG. 8 is an isometric view of a user holding an example implementing device (a two-factor authentication token) in front of a video monitor.
  • FIG. 9 is an isometric view of a user holding a smart phone device in front of a video monitor.
  • FIG. 10 is an isometric view of a an example implementing device (a two-factor authentication token).
  • FIG. 11 is block diagram showing the interconnections of an implementing device.
  • DETAILED DESCRIPTION
  • In FIG. 1 a CIE xy chromacity diagram is shown. The “horseshoe” 10 encloses all human perceptible colors while the triangle 12 encloses colors that can be represented in video and in desktop computing (RGB color space). The implementing device and method transmit and receive data in the form of color selected from within the triangle 12 enclosed area of the CIE xy chromacity diagram.
  • Most electronic color sensors do not respond equally to a given primary color (i.e. red, green, blue). In FIG. 2 an example digital color sensor graph of normalized sensitivity, demonstrating the unequal response of the individual color channels. The blue channel shown in the graph as line 24 is generally less sensitive than the green channel 26 or the red channel 28, while the green channel 26 is less sensitive than the red channel 28.
  • The binary bit pattern is defined by assigning a given color (combination of red, green and blue channels). The number of distinct colors able to be reliably and repeatedly detected dictates the bit density of the encoding. While an electronic display device may be capable of generating 16.7 million distinct colors, the probability of accurate detection of that many distinct values is significantly reduced based not only on sensor sensitivity, but also environmental conditions such as detection distance, ambient lighting, brightness of the display source, presence of any interference, noise sources, etc.
  • As an example, consider a goal of being able to detect reliably 10 distinct colors (including white and black) with a given sensor, taking into account sensor channel sensitivity variations across all environmental and ambient lighting conditions. This would yield a data encoding density of 3 bits using 8 of the available colors, with 2 colors reserved for protocol overhead. These extra colors are necessary for calibration and protocol data synchronization as described below.
  • Based on this bit density, an 8-bit number could be represented as the sequential presentation of 3 colors (the extra encoded bit could be used as a parity check bit within a given protocol implementation or for other purposes). Consider that if one were able to reliably detect 66 distinct colors, this would yield a data encoding density of 6 bits—thereby increasing the data transfer rate accordingly.
  • Encoding and Decoding Algorithm
  • The following encoding and decoding algorithms are used to perform the inventive method.
  • Definitions:
      • Let M be an n-bit message that we want to transmit and receive, defined by a bit sequence M=(b1, b2, . . . , bn).
      • Let C be the set of k colors reserved for data encoding, defined as C=(c1, c2, . . . , ck), with each ci defined as an RGB tuple (ri, gi, bi) and where k is a power of two.
      • Let cb be the color BLACK, which may appear in C.
      • Let cw be the reserved color WHITE, not appearing in C.
      • Let cr be the optional reserved color indicating a sequence of two repeating colors, also not appearing in C.
      • Let d=log2(k), the number of data bits represented per color.
      • Let r be the number of data encoding colors per frame, where a frame is an (r+2) block of sequential colors transmitted in group succession (the “payload”).
      • Let f: [0, k−1]→C be a function defined by f(i)=ci+1. This mapping is used to encode any d-bit value as a color.
      • Let f−1: C→[0, k−1] be a function defined by f−1(ci)=i−1. This mapping is the inverse off and is used to decode colors to d-bit values.
      • Let j=n/d, this will be the length of the color sequence to encode M.
  • Encoding Algorithm Steps
  • 1. Pad M so its length is the next multiple of (d*r). This ensures that M's encoding ends on an exact frame boundary.
  • 2. Divide M into j sequential and distinct d-bit subsequences (M1, M2, . . . , Mj) such that M=M1M2 . . . Mj.
  • 3. Encode the subsequences using f into a color sequence E=(e1, e2, . . . , ej) where ei=f(Mi).
  • 4. Starting at M1, insert the subsequence (cw, cb) every r-th color in E. The subsequence (cw, cb) serves as a frame delimiter within the protocol as well as max/min calibration values used for value normalization and color detection.
  • 5. Optionally, replace each repeating pair of colors (ei, ei+1) where ei=ei+1 with (ei, cr). This optional step ensures that repeating colors are encoded with a color transition which is more likely to be detected and decoded properly.
  • FIG. 3 illustrates an example of encoding 10 colors, including white (cw) and black (cb). The bit density for the example in FIG. 3 is 3 bits/color, which results in 10 colors. In practice, the inventor has achieved a bit density>=6 bits/color, which results in the reliable detection of at least 66 available colors.
  • FIG. 4 shows the example palette from FIG. 3 plotted against the CIE chromacity diagram. The plot in FIG. 4 illustrates that the colors used for encoding 50,50 a,50 b, 50 c, 50 d, 50 e, 50 f, 50 g are not closely spaced, are distinct, and are generally completely contained within the sRGB color space 12. As anyone skilled in the colorimetry art would understand, Cb (black) and Cr (grey) are not clearly depicted, as they both represent different intensities of white and both Cb (black) and Cr (grey) map to the same 2D point within the diagram shown in FIG. 4.
  • Example Encoded Message:
  • For purposes of illustration, the following hypothetical message will be encoded: “A B C 1 2 $”
  • Using the binary encoding illustrated in FIG. 3, d=3 bits per color. We define r=3 data encoding colors per frame, yielding 9 encoded bits per frame—enough to encode a single 8-bit character with a single bit left over, in this example used as an even parity bit. Note that we are using ASCII characters here; however any arbitrary binary data could just as well be encoded and framed using these methods. Also note that the ‘$’ character was specifically chosen to illustrate the optional use of the cr reserved color to indicate a repeating binary sequence (the binary sequence 001 appears twice in this character encoding).
  • Note that the choice of d=3 bits and r=3 were chosen for simplicity and convenience; in practice any reasonable values of d and r could be used. The inventor has achieved reliable transmission and decoding with values of d>=6 bits.
  • Decoding Algorithm Steps:
  • Decoding is somewhat more complicated than the encoding algorithm steps due to the differences in color sensor devices, display devices, varying ambient lighting conditions and noise sources. Note that we use the terms “maxima” and “minima” below with respect to the magnitude of the RGB tuples when treated as 3-vectors.
  • 1. Assume we have received a filtered stream of n numeric samples S=((r1, g1, b1), (r2, g2, b2), . . . , (rn, gn, bn)), with each (ri, gi, bi) corresponding to the transmitted color ei in the color sequence E. Note that while each (ri, gi, bi) corresponds to the ei transmitted, the actual numerical values will be very different as they are un-normalized and will include a noise component. This precludes us from directly mapping samples in S to their correspondents in E.
  • 2. Divide S into subsequences, or frames, (S1, S2, . . . , Sn) bounded by local maxima (corresponding to cw, which will naturally be the highest occurring values) and of length equal to the number of colors per frame (r), plus the framing delimiters (cw, cb). Recall that cw is only used as a frame delimiter, never as part of a message encoding; therefore there should never be an issue with identifying false frame boundaries. Conversely, since cb is a valid color for data encoding, it may appear as one or more colors within the rest of the sequence. This is perfectly acceptable since all we require is that cb appear at least once in each frame, hence the (cw, cb) sequence denoting a frame delimiter and guaranteeing one occurrence of each.
  • 3. Within each frame Si, use the local maxima's and minima's r, g, b values corresponding to the transmitted (cw, cb) values to calibrate and transform all values within Si, yielding the original transmitted sequence E. The exact details of this transformation is color sensor device-dependent and implementation-specific.
  • 4. Optionally, restore duplicate symbols by replacing each ei=cr in E with its predecessor ei−1.
  • 5. Restore the original Mi subsequences of M by applying f−1 to each element of E: (f−1(e1), f−1(e2) . . . , f−1(ej))=(f−1(f(M1)), f−1(f(M2)), . . . , f−1(f(Mj))=(M1, M2, . . . , Mj)
  • 6. Finally, concatenate each Mi to obtain M: M=M1M2 . . . Mj
  • While the above example protocol would work well for transmitting a continuous stream of character data, a packet-based protocol could be easily implemented by layering additional protocol building block elements on top of the example described above to identify, for example, message start, message length, etc. Additionally, a cyclic redundancy check element, or even a forward error correcting code could be added to a message packet to ensure (with reasonable certainty) that the message packet was received without error and decoded properly. Note that the use of the parity check bit encoding described in the example above is arbitrary—the extra bit could just as well have been used for data encoding.
  • Two Factor Authentication System and Method:
  • Refer now to FIGS. 6-11, which illustrate the inventive two factor authentication system and method. Traditionally, two factor authentication schemes have relied on the principles of something you have, and something you know. In practice, a user wishing to authenticate with a given web site or software package is presented with a standard username/password login screen where their username is entered along with their password (something you know). A changing number appearing on a small handheld device is appended to their password—this number is cryptographically unique, and identifies that the user actually has the implementing device on their person (something you have).
  • The implementing device can be in the form of a small dedicated hardware token implementing a single-pixel RGB color sensor (for example, the TAOS TCS3414 or similar device, shown in FIGS. 8 and 10 as item 34), with the implementing device shown in FIGS. 8 and 10 as item 30, together with a small 6-12 character electronic display device element 32 in FIGS. 8 and 10.
  • The implementing device can alternatively be implemented as software running on a smart device such as a cell phone with video capability (as shown in FIG. 9) or similar. In FIG. 11, block 31 is described as an RGB color sensor or video camera, which may be implemented in the user's device 30 (FIGS. 8 and 10) or 31 (FIG. 9).
  • Referring still to FIGS. 6-11, the following steps would fulfill this use case:
      • 1. A user wishing to authenticate enters and submits their username in the username field 34 to the requesting software or web site.
      • 2. The software “looks up” a unique cryptographic key corresponding to the user's device 30 (FIG. 8 and 10) or 31 (FIG. 9), and generates a challenge phrase (or set of characters) to be presented to the user.
      • 3. The challenge phrase or set of characters is encrypted using the cryptographic key identified in step 2, which only the users' device (30 or 31) should be able to successfully decrypt.
      • 4. The encrypted challenge phrase is encoded via the encoding algorithm steps described above.
  • 5. The encrypted and encoded challenge phrase is presented to the user through a computer screen 33 or similar device (“transmitter”) as a sequence of flashing colors (40).
  • 6. The user holds the implementing device (30 or 31) up to the transmitter in order to receive the transmitted message.
  • 7. An RGB color sensor or video camera within the implementing device (30 or 31), connected to a microprocessor 41, is sampled periodically by software running on the microprocessor 41.
  • 8. The samples are collected by the microprocessor 41, filtered and processed via the decoding algorithm steps (shown as element 42 in FIG. 11) described above, yielding the originally transmitted but encrypted message.
  • 9. The message is decrypted 44 using the implementing device's unique cryptographic key.
  • 10. If decoding/decryption are successful, the challenge phrase is displayed to the user on the implementing device's electronic display (32 or 32 a). If unsuccessful, a message indicating so (or optionally some other sequence of characters, or nothing at all) is displayed to the user on the implementing device's electronic display (32 or 32 a).
  • 11. Assuming decoding/decryption success, the user enters their password in the password field 36, and also enters the decoded/decrypted challenge phrase displayed on the implementing device in the challenge field 38.
  • 12. The software or web site makes a determination that the challenge phrase matches what was originally generated and encrypted/encoded, and therefore determines whether or not the identity of the user is valid.
  • The inventor envisions additional uses for the data encoding and decoding algorithms. For example, the algorithms may be used with interactive consumer toys. Assume that a “command message” is to be transmitted to affect a response from a toy via a child's favorite video, television program, computer game, etc. Considering that the use of encryption could be considered optional, the message would be encoded and transmitted as per steps 4 and 5 above (the “command message” would replace the concept of a human-readable challenge phrase described therein). The toy would implement steps 6 through 9 as a receiver (again with encryption considered optional) to decode the transmitted command message. Upon successful decoding the toy would perform some action based on the command message, to then elicit joy and happiness from the participating children.
  • The algorithms may also be used with advertising incentives (interactive coupons). Assume that a product manufacturer or an advertiser wishes to provide purchase incentives and to track market response for a given consumer product television commercial campaign. For each geographic area in which the campaign is to be aired, a unique human-readable “coupon code” (replacing the concept of a challenge phrase described above) is encoded into the television commercial (via steps 4 and 5 above, again with the use of encryption considered optional). Consumers within that geographic area would then be able to decode the human-readable “coupon code” via steps 6 through 10 described above, and use it to generate a coupon (via computer) to receive a purchase rebate. Depending upon the specific coupon code entered (and also any optional demographic information entered at the time of coupon generation), the advertiser would be able to identify the market response based on the collected data.
  • The algorithms may also be used with in-field firmware and software updates. Assume that a device needs to have its firmware or software updated in the field. The binary firmware or software is encoded and transmitted via steps 4 and 5 above (the binary firmware or software would replace the concept of a human-readable challenge phrase described therein). The device implements a receiver as per steps 6 through 9 described above to receive, decode and subsequently update the firmware or software running on the device.
  • Although the present invention has been described in considerable detail with reference to certain preferred versions thereof, other versions would be readily apparent to those of ordinary skill in the art. Therefore, the spirit and scope of the appended claims should not be limited to the description of the preferred versions contained herein.

Claims (18)

What is claimed is:
1. A method for transmitting encoded data, said method comprising:
encoding a challenge response within a code series composed of a bit pattern sequence of color images, each of said images constructed from a combination of red, green, and blue color values ranging from a minimum value corresponding to black to a maximum value corresponding to white;
arranging said challenge response into a recognizable format with a message protocol;
transmitting said challenge response to a physical decoder adapted to decode said message into a challenge response; and
applying said challenge response to a challenge query.
2. The method of claim 1 wherein said minimum value is greater than or equal to 0.
3. The method of claim 2 wherein said maximum value is less than or equal to 255.
4. The method of claim 1 wherein said transmitting step includes decrypting said challenge response.
5. The method of claim 4 wherein said encoding step further includes encrypting said challenge response within said code series.
6. The method of claim 1 wherein said defining step comprises a calibration sequence of at least one image adapted to normalize said color values.
7. The method of claim 1 wherein said challenge response includes a challenge message comprising alphanumerics.
8. The method of claim 7 wherein said decoder displays said alphanumerics.
9. The method of claim 8 wherein a user manually inputs said alphanumerics as said challenge response.
10. A method for transmitting encoded data, said method comprising:
defining a code series composed of a bit pattern sequence of color images, each of said images constructed from a combination of red, green, and blue color values consisting of a value corresponding to white;
encoding a message within said code series;
arranging said message within into a recognizable format with a message protocol;
transmitting said message to a physical decoder, with a sensor adapted to detect characteristics of said images, including intensity, adapted to decode said message into a unique challenge response; and
applying said challenge response to a challenge query.
11. The method of claim 10 wherein said transmitting step includes transmitting said message to multiple physical decoders adapted to decode said message into a challenge response.
12. A system for providing a light based token response, said system comprising:
an electronic visual display adapted to, and with a frame rate sufficient to, transmit a series of sequential color flashes corresponding to information in a recognizable format with an information protocol, said color flashes constructed from red, green, and blue color values ranging from a minimum value corresponding to black to a maximum value corresponding to white; and
a physical decoder, with a sensor adapted to detect a characteristic of said color flashes, configured to decode said information based on said series of sequential color flashes and convey said information as decoded.
13. The system of claim 12 wherein said information includes a challenge response token component.
14. The system of claim 13 further comprising a secured device bearing a challenge query.
15. The system of claim 14 wherein said secured device includes said electronic visual display.
16. The system of claim 15 wherein said decoder is adapted to convey and apply said challenge response to said challenge query.
17. The system of claim 14 wherein said decoder is adapted to convey and apply said challenge response to said challenge query.
18. The system of claim 12 wherein said sequential color flashes include a calibration sequence of at least one flash adapted to normalize color values of said color flashes.
US14/028,380 2011-08-24 2013-09-16 Method and apparatus for transmitting data using encoded patterns of changing colors Abandoned US20150082034A1 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
US14/028,380 US20150082034A1 (en) 2011-08-24 2013-09-16 Method and apparatus for transmitting data using encoded patterns of changing colors
US14/578,315 US9548814B2 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,335 US20150256522A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,307 US20150155937A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,328 US20150155938A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,331 US9787404B2 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,325 US20150104184A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,337 US20150156186A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/680,072 US20150215312A1 (en) 2013-09-16 2015-04-07 System and method for secure single or multi-factor authentication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/216,433 US8555065B2 (en) 2011-08-24 2011-08-24 Method and apparatus for transmitting, receiving and decoding data using encoded patterns of changing colors
US14/028,380 US20150082034A1 (en) 2011-08-24 2013-09-16 Method and apparatus for transmitting data using encoded patterns of changing colors

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/578,307 Continuation-In-Part US20150155937A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns

Related Child Applications (8)

Application Number Title Priority Date Filing Date
US14/578,328 Continuation-In-Part US20150155938A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,331 Continuation-In-Part US9787404B2 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,337 Continuation-In-Part US20150156186A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,307 Continuation-In-Part US20150155937A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,315 Continuation-In-Part US9548814B2 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,335 Continuation-In-Part US20150256522A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/578,325 Continuation-In-Part US20150104184A1 (en) 2013-09-16 2014-12-19 System and method for communication over color encoded light patterns
US14/680,072 Continuation-In-Part US20150215312A1 (en) 2013-09-16 2015-04-07 System and method for secure single or multi-factor authentication

Publications (1)

Publication Number Publication Date
US20150082034A1 true US20150082034A1 (en) 2015-03-19

Family

ID=47743755

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/216,433 Expired - Fee Related US8555065B2 (en) 2011-08-24 2011-08-24 Method and apparatus for transmitting, receiving and decoding data using encoded patterns of changing colors
US14/028,380 Abandoned US20150082034A1 (en) 2011-08-24 2013-09-16 Method and apparatus for transmitting data using encoded patterns of changing colors

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/216,433 Expired - Fee Related US8555065B2 (en) 2011-08-24 2011-08-24 Method and apparatus for transmitting, receiving and decoding data using encoded patterns of changing colors

Country Status (1)

Country Link
US (2) US8555065B2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150104187A1 (en) * 2013-09-16 2015-04-16 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20150104184A1 (en) * 2013-09-16 2015-04-16 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20150104183A1 (en) * 2013-09-16 2015-04-16 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20150155937A1 (en) * 2013-09-16 2015-06-04 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20150155938A1 (en) * 2013-09-16 2015-06-04 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20170033868A1 (en) * 2015-07-28 2017-02-02 Research & Business Foundation Sungkyunkwan University Method of outputting color code for data communication to display screen and method of transmitting data using color code

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9818315B2 (en) 2013-06-04 2017-11-14 At&T Intellectual Property I, L.P. Secure multi-party device pairing using sensor data
US9900091B2 (en) * 2014-06-24 2018-02-20 Samsung Electronics Co., Ltd. Method and apparatus for pairing electronic device and lighting device
WO2016055781A1 (en) * 2014-10-06 2016-04-14 Time And Data Systems International Limited Access control apparatus
WO2016111823A2 (en) * 2014-12-19 2016-07-14 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
DE102015106730A1 (en) * 2015-04-30 2016-11-03 Kobil Systems Gmbh Color-angle-based symbol transmission and symbol failure compensation
US10366674B1 (en) * 2016-12-27 2019-07-30 Facebook Technologies, Llc Display calibration in electronic displays
JP6897389B2 (en) * 2017-07-25 2021-06-30 富士通株式会社 Discrimination computer program, discriminating device and discriminating method, and communication system
CN111787526A (en) * 2020-07-10 2020-10-16 岭南师范学院 Data transmission system through color rhythm and application method thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4833533A (en) * 1985-05-03 1989-05-23 Ing. C. Olivetti & C., S.P.A. Color image reacting apparatus having a non-uniformity correction ROM with sections corresponding to red, green, and blue color separation filters
US5729361A (en) * 1995-06-30 1998-03-17 Logitech, Inc. Color scanner using both variable led exposure time and photo detector output compensation
US5900943A (en) * 1997-08-29 1999-05-04 Hewlett-Packard Company Page identification by detection of optical characteristics
US20050146626A1 (en) * 2004-01-05 2005-07-07 Jung-Chiao Chang Image chromatism compensation method
US20070133839A1 (en) * 2005-11-22 2007-06-14 Berner Fachhochschule Technik Und Informatik Method to transmit a coded information and device therefore
US8024576B2 (en) * 2008-03-31 2011-09-20 International Business Machines Corporation Method and system for authenticating users with a one time password using an image reader
US8478990B2 (en) * 2011-06-02 2013-07-02 Cryptite LLC Mobile transaction methods and devices with three-dimensional colorgram tokens

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BE504631A (en) 1950-07-28
US5361261A (en) 1992-11-02 1994-11-01 National Semiconductor Corporation Frame-based transmission of data
US5636292C1 (en) * 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US6590996B1 (en) * 2000-02-14 2003-07-08 Digimarc Corporation Color adaptive watermarking
US6965697B1 (en) 1998-07-15 2005-11-15 Sony Corporation Coding apparatus and method, decoding apparatus and method, data processing system, storage medium, and signal
US7020327B2 (en) 2000-05-09 2006-03-28 Colorzip Media, Inc. Machine readable code image and method of encoding and decoding the same
US7516325B2 (en) 2001-04-06 2009-04-07 Certicom Corp. Device authentication in a PKI
US6722567B2 (en) 2001-06-07 2004-04-20 Hewlett-Packard Development Company, L.P. Generating and decoding graphical bar codes
EP1271403B1 (en) 2001-06-26 2005-03-09 Nokia Corporation Method and device for character location in images from digital camera
US7093298B2 (en) 2001-08-30 2006-08-15 International Business Machines Corporation Apparatus and method for security object enhancement and management
US7188778B2 (en) 2001-09-17 2007-03-13 Codemagic Machine-readable symbol and related method
US6655592B2 (en) 2001-10-10 2003-12-02 Hewlett-Packard Development Company, L.P. Graphically demodulating graphical bar codes without foreknowledge of the original unmodulated base image
US6915020B2 (en) 2001-12-19 2005-07-05 Hewlett-Packard Development Company, L.P. Generating graphical bar codes by halftoning with embedded graphical encoding
US7370200B2 (en) 2004-01-30 2008-05-06 Hewlett-Packard Development Company, L.P. Validation for secure device associations
US7698556B2 (en) 2005-02-25 2010-04-13 Hewlett-Packard Development Company, L.P. Secure spontaneous associations between networkable devices
US20070297612A1 (en) 2005-10-21 2007-12-27 Meir Feder Method, device and system of encrypted wireless communication
DE602006014594D1 (en) 2005-12-01 2010-07-08 Koninkl Philips Electronics Nv LIGHTING SYSTEM AND METHOD FOR CONTROLLING A LIGHTING SYSTEM
US7840028B2 (en) 2007-01-30 2010-11-23 Hewlett-Packard Development Company, L.P. Authentication system and method
US20090256922A1 (en) 2008-04-10 2009-10-15 Eylon Gersten Device, method and system of wireless video communication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4833533A (en) * 1985-05-03 1989-05-23 Ing. C. Olivetti & C., S.P.A. Color image reacting apparatus having a non-uniformity correction ROM with sections corresponding to red, green, and blue color separation filters
US5729361A (en) * 1995-06-30 1998-03-17 Logitech, Inc. Color scanner using both variable led exposure time and photo detector output compensation
US5900943A (en) * 1997-08-29 1999-05-04 Hewlett-Packard Company Page identification by detection of optical characteristics
US20050146626A1 (en) * 2004-01-05 2005-07-07 Jung-Chiao Chang Image chromatism compensation method
US20070133839A1 (en) * 2005-11-22 2007-06-14 Berner Fachhochschule Technik Und Informatik Method to transmit a coded information and device therefore
US8024576B2 (en) * 2008-03-31 2011-09-20 International Business Machines Corporation Method and system for authenticating users with a one time password using an image reader
US8478990B2 (en) * 2011-06-02 2013-07-02 Cryptite LLC Mobile transaction methods and devices with three-dimensional colorgram tokens

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GIF Article describing GIF87a specification published in 1989, Wikipedia [online]. [retrieved on 02/05/2015]. Retrieved from the internet:; *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150104187A1 (en) * 2013-09-16 2015-04-16 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20150104184A1 (en) * 2013-09-16 2015-04-16 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20150104183A1 (en) * 2013-09-16 2015-04-16 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20150155937A1 (en) * 2013-09-16 2015-06-04 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20150155938A1 (en) * 2013-09-16 2015-06-04 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US9548814B2 (en) * 2013-09-16 2017-01-17 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US9787404B2 (en) * 2013-09-16 2017-10-10 Clutch Authentication Systems, Llc System and method for communication over color encoded light patterns
US20170033868A1 (en) * 2015-07-28 2017-02-02 Research & Business Foundation Sungkyunkwan University Method of outputting color code for data communication to display screen and method of transmitting data using color code
US10027411B2 (en) * 2015-07-28 2018-07-17 Research & Business Foundation Sungkyunkwan University Method of outputting color code for data communication to display screen and method of transmitting data using color code
US10461859B2 (en) 2015-07-28 2019-10-29 Research & Business Foundation Sungkyunkwan University Method of outputting color code for data communication to display screen and method of transmitting data using color code

Also Published As

Publication number Publication date
US20130051553A1 (en) 2013-02-28
US8555065B2 (en) 2013-10-08

Similar Documents

Publication Publication Date Title
US8555065B2 (en) Method and apparatus for transmitting, receiving and decoding data using encoded patterns of changing colors
AU2015294453B2 (en) Invisible optical label for transmitting information between computing devices
US9385808B2 (en) Flicker-free color visible light communication system
US9787404B2 (en) System and method for communication over color encoded light patterns
US9571193B2 (en) Transmitter, receiver, and method
US20150104184A1 (en) System and method for communication over color encoded light patterns
US20110096246A1 (en) Visual Identifier for Images on an Electronic Display
US20170078278A1 (en) Method of performing one-time password (otp) authentication using color code and otp authentication server using color code
US9548814B2 (en) System and method for communication over color encoded light patterns
US20150256522A1 (en) System and method for communication over color encoded light patterns
WO2016111823A2 (en) System and method for communication over color encoded light patterns
CN107210815A (en) System and method for providing optical encoding information
US20190205619A1 (en) Visible light identity verification systems and methods
WO2016014252A1 (en) Invisible optical label for transmitting information between computing devices
US20150155938A1 (en) System and method for communication over color encoded light patterns
CN106412882A (en) Method and system for accessing intelligent equipment into wireless network
Jung et al. Complementary color barcode-based optical camera communications
KR20050074646A (en) Key synchronization in an image cryptographic system
US6864860B1 (en) System for downloading data using video
KR101718279B1 (en) Visible light communication using diplay apative behind schene method
US11245724B2 (en) Spoofed webpage detection
US10567699B2 (en) Information processing apparatus to improve image quality by removing flicker component from captured image
KR20200107776A (en) Parameter setting method and display device and display device using the same
JP2006511114A (en) Key synchronization in visual cryptosystems
CN115761567A (en) Video processing method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: CLUTCH AUTHENTICATION SYSTEMS, LLC, VIRGINIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CESNIK, JEFFREY T;REEL/FRAME:031990/0193

Effective date: 20140109

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION