AcousticComms Spread Spectrum (ACSS):�An Imperceptible Identity Authentication Factor
Michael A. Ramalho, Ph.D.
February 2025
The Frequent Reauthentication Problem
Situation
Complication
Implication
© 2011 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
2
ACSS is the Solution
Our Perspective
Action
Benefit
© 2011 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
3
��How does ACSS work?�A Form of Direct Sequence Spread Spectrum (DSSS)
4
© 2025 AcousticComms Consulting Confidential. All rights reserved.
ACSS Ultrasound Spread-Spectrum:�Mobile phone to/from Laptop
��ACSS is Proven Technology�Extends and Improves Upon Existing Ultrasound Transmission Technology
6
© 2025 AcousticComms Consulting Confidential. All rights reserved.
AcousticComms Spread Spectrum (ACSS)
Proven Base DSSS Design: Leveraged, then Improved, from Cisco US 10,003,377 Experience
iPhone�Android�MacBook Air/Pro�MSFT PCs
Images from www.cisco.com
��Optional Enhancement: Protection Against Replay/Relay�Attacks
8
© 2025 AcousticComms Consulting Confidential. All rights reserved.
Relay Attack
Owner locks car. Puts
RFID key in pocket�and walks away.
Attacker approaches
with software-defined�RFID-emitter device.
Mule puts smartphone�near RFID key to�read emitted code.
Mule’s phone relays�RFID code to attacker’s�emitter. Car stolen.
Attack is enabled by a standardized RF interface (RFID)
Replay Attack (Similar)
Uses a recorded authentication communications (e.g., OTP) from an authorized device�to later gain access on an unauthorized device (within validation time limits).
��Keyed Ultrasound Transmission�[Implemented in ACSS C Library today]
10
© 2025 AcousticComms Consulting Confidential. All rights reserved.
Replay/Relay Attacks Impossible With Keyed ACSS
Key A
Key B
Correct Reception
No Reception: Pilot Different�Incorrect Reception: User Codes Different
Assign different�“key pairs” to�different users.
Key-dependent�CRC check�insures�against incorrect�reception.
One key pair reserved as�default key pair if replay/relay�protection not required.
What does ACSS signal look like?
12
© 2025 AcousticComms Consulting Confidential. All rights reserved.
What Does ACSS Look Like?�Spectrally Similar to Cisco System’s Proximity Signal
Relatively quiet room shown. Emitted today (at low SPL) on all Cisco cloud-connected Telepresence Endpoints.��Can implement ACSS signal in hearable region (for non-seamless, perhaps initial authentications / not in present code).
~19,000 to ~21,000 Hz�(low ultrasound region)
Spectrogram: Quiet Room (just HVAC low frequency noise)
Images from www.cisco.com
��Radio Frequency vs Acoustic Transmission:��ACSS Authentication is localized to an Acoustic Volume
14
© 2025 AcousticComms Consulting Confidential. All rights reserved.
Bluetooth/BLE (iBeacon/EddyStone)
ACSS Authentications Limited to Room
Acoustic Proximity vs Radio Frequency (RF) Proximity
WALL
ACSS
Acoustic / Ultrasound
vs.
ACSS
WALL
ACSS
RF Techniques Penetrates Walls�(don’t want authentications from adjacent rooms!)
Don’t�Want�This
Thus, ACSS can also be used for “Prove you are in Room X” authentication
AcousticComms Patents (3)
16
© 2025 AcousticComms Consulting Confidential. All rights reserved.
Multi-Factor Authentication and “Prove you are in Room X” Application
Stand-alone Emitter�(for “Prove you are in Room X” application)
Non-Provisional Filed for MFA Application
Stand-alone Emitter�is defined in prior�issued contact�tracing patents.��The MFA non-provisional�reads upon (i.e., includes�by reference) the use�of the emitter for�MFA application.
Stand-alone Emitter�COGS is sub $50.
Summary
18
© 2025 AcousticComms Consulting Confidential. All rights reserved.
ACSS is the Solution
Our Position
Action
Benefit
© 2011 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
19
Next Steps
1 - Scope Business Opportunity
2 – Mutual NDA – enables code access�
3 - Work with your engineers to�develop your applications�
4 - Define partnership/licensing/etc.
20
© 2025 AcousticComms Consulting Confidential. All rights reserved.
21
© 2025 AcousticComms Consulting Confidential. All rights reserved.
Michael A Ramalho
ramalho.webhop.info�mar42@cornell.edu
Education:�Rutgers University: BSEE and PhD�Cornell University: MEngEE�Wharton Business School Executive Program (classwork)�Udacity Artificial Intelligence Full Nanodegree (2018)
Employment:�Bell Telephone Laboratories (Bell Labs)�Bellcore/Telcordia Technologies
Voxware (Chief Telephony Technologist at IPO)�Cisco Systems (networking, ultrasound, video, VoIP, sig proc, AI)
Noteworthy/Other:�CSCO Proximity-v2 Inventor (Discrete Sequence Spread Spectrum)
Cisco Pioneer Award Finalist / Bellcore President’s Award
Patents: US: 59+ Issued / International: 20+ Issued�Standards: ITU-T (G.711.0) & IETF RFCs (~5, IP Media & VoIP)
IMTC VoIP Forum Co-Chair�Rutgers University Industrial Advisory Board and CAIP Fellow�IEEE Comm Society Technical Program Vice Chair (Globecom)
IEEE SP/COMM and Blockchain Chair (SW FL Section)
Red Shift Company Advisory Board (startup)
Cisco University Research Board / Cisco Patent Review Committee
6 dB
Double�Distance
2 meters
1 meter
Direct Path� Free� Space� Attenuation
SPL of Direct and Reverberant�sound is equal at 0.6 m / 2.0 ft.
RT60 (Reverberation Metric) ~ Quiet Rooms: 0.5, Office: 0.4 – 0.7, Homes: 0.9
No�Reflections�(blue line)
Total Power
“Self-Noise” == Negative SNR�(direct to sum(non-direct))�Reverberant energy dominates!
“Diffuse field area” (SPL ~= const)
15 dB at 4 M
Any distance over ~ 2 feet unreliable or�impossible for non-SS receivers requiring:�“dominant path power” > “self noise”��Need robustness provided by SS
Answer: Room Acoustics (Direct us Reverberant Power)
Frequent Question: Why Use Spread Spectrum?
Office RT60 Reverberation