G06K7/10267

Rfid tag communication device

According to an embodiment, a wireless tag communication device includes a first antenna that emits radio waves towards a first region of a conveyance path for wireless tags and a second antenna that emits radio waves towards a second region of the conveyance path on downstream of the first region along the conveyance path. A shield prevents the radio waves emitted from the first antenna from reaching a first portion of the first region while permitting the radio waves to reach a second portion of the first region. A controller is configured to select a tag ID read via the first antenna as a target tag ID, designate the target tag ID by communication via the second antenna, and then write tag information via the second antenna to the wireless tag corresponding to the designated target tag ID.

Protection of personal data contained on an RFID-enabled device
10073995 · 2018-09-11 ·

A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.

Communication device and system
10019611 · 2018-07-10 · ·

The present invention relates to a communication method, device, and system. The communication method include using low-frequency alternating magnetic field signals to control a communication distance between a first radio frequency (RF) device and second RF device. The communication device receives and uses a first low-frequency alternating magnetic field signal transmitted from a second RF device to control the communication distance to the second RF device. The communication system includes a first RF device and a second RF device. The first RF device generates and transmits a first low-frequency alternating magnetic field signal and receives a second low-frequency alternating magnetic field signal, and the second RF device generates and transmits the second low-frequency alternating magnetic field signal and receives the first low-frequency alternating magnetic field signal. The first RF device and the second RF device control the communication distance using the first and second low-frequency alternating magnetic field signals.

RFID disruption device and related methods
10019663 · 2018-07-10 · ·

Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50) and an RFID data storage device (30, 30) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161, 171, 171, 271, 271) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30) that an unauthorized RFID interrogation device (50, 50) is attempting to interrogate the RFID data storage device (30, 30) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30) to provide protection thereto and when the RFID interrogation device (50, 50) is producing the interrogation signal.

Detecting passive RF components using radio frequency identification tags

Systems and methods are provided for automatically detecting passive components in communications systems using radio frequency identification (RFID) tags. A coupling circuit is provided in a system between a communications network and an RFID tag. The RFID tag is associated with a passive element of a distributed antenna system (DAS). The coupling circuit can allow an RFID signal received from an RFID transmitter over the communications network to be transported to the RFID tag. The coupling circuit can substantially prevent mobile communication signals on the communications network from being transported to the RFID tag.

Directional sensing mechanism and communications authentication
09998454 · 2018-06-12 · ·

The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the RFID device and then selectively allow or restrict the RFID device's ability to transmit messages, which may include sensitive data, when the RFID device is placed in an RF field. Thus, the motion sensing mechanism is utilized to control access to data on the RFID device to only instances when the holder of the RFID device moves the RFID device in a predefined sequence of motion(s).

BASED ON MOTION OF DEVICE, PERFORM OR LIMIT FEATURES

Methods, devices, and systems are provided for performing and/or limiting features based on a determined motion associated with a portable device. When the portable device is determined to be in motion, a feature control application running on the portable device prevents at least one radio frequency identification (RFID) component of the device from communicating with RFID reading devices. When the portable device is still, or not in motion, the feature control application running on the portable device prevents the at least one RFID component of the device from communicating with RFIDreading devices. Among other things, this feature control of a portable device can prevent theft of data in an access control system, credit payment system, and/or other data transfer system.

RFID disruption device and related methods
09965714 · 2018-05-08 · ·

Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50) and an RFID data storage device (30, 30) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161, 171, 171, 271, 271) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30) that an unauthorized RFID interrogation device (50, 50) is attempting to interrogate the RFID data storage device (30, 30) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30) to provide protection thereto and when the RFID interrogation device (50, 50) is producing the interrogation signal.

RFID DISRUPTION DEVICE AND RELATED METHODS
20180107910 · 2018-04-19 ·

Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50) and an RFID data storage device (30, 30) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161, 171, 171, 271, 271) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30) that an unauthorized RFID interrogation device (50, 50) is attempting to interrogate the RFID data storage device (30, 30) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30) to provide protection thereto and when the RFID interrogation device (50, 50) is producing the interrogation signal.

Proximity-Based System for Object Tracking and Automatic Application Initialization
20240386222 · 2024-11-21 ·

A system and method provides for one or more of tracking of an object and providing automatic access to applications or data. Depending upon the embodiment, the system includes a personal digital key (PDK), a reader, a computing device and one or more of an auto login server and a tracking server. The PDK stores one or more profiles in memory. A reader is configured to wirelessly communicate with the PDK. The computing device is coupled to the reader and one or more of the auto login server and tracking server. The auto login server is configured to communicate with the reader and launches one or more applications associated with a user name identified by a profile received from the PDK. The tracking server is configured to communicate with the reader and to track and log information received from the PDK associated with the object.