G06K19/07309

Card swiping method and device for determining mobile terminal for swiping card, utilizing intensity of ultrasonic signal

The present invention relates to a card swiping method for determining card swiping of a mobile terminal by using ultrasonic signal strength, comprising: closely contacting, by a mobile terminal, a card reading device, wherein a multi-interface integrated circuit module in the mobile terminal receives a ultrasonic signal transmitted by an ultrasonic wave transmitting module in the card reading device; measuring, by the multi-interface integrated circuit module, strength of the received ultrasonic signal, and comparing the measured strength with an ultrasonic signal strength threshold which allows card swiping; and if the strength of the received ultrasonic signal received by the multi-interface integrated circuit module is greater than the ultrasonic signal strength which allows card swiping, interactively performing card swiping procedures by the multi-interface integrated circuit module and the card reading device.

Method and Security Module for Receiving Two Signals
20170294916 · 2017-10-12 ·

A method for producing an output bit stream for a first signal of a first carrier frequency by a security module involves the security module receiving an input signal comprising the first signal and a second signal of a second carrier frequency. A mixed signal is formed which has the first signal at the first carrier frequency, the second signal at the second carrier frequency, and a mixed product at an intermediate frequency. The mixed product is demodulated by a second nonlinear component to output a second baseband signal for generating a second bit stream relating to the first signal in the mixed product. The output logic produces the output bit stream for the first signal, and selects either the first bit stream or the second bit stream as the output bit stream for the first signal.

READING APPARATUS
20220051066 · 2022-02-17 ·

According to one embodiment, a reading apparatus includes a shielding body, an antenna, and a reader and writer. The shielding body is formed in a box shape with an upper opening, to place an accommodating body and to shield radio waves. The antenna is provided in the shielding body to receive information from an RFID tag attached to a product that is passing through the opening. The reader and writer is connected to the antenna to read information of the product from the information received by the antenna.

SECURE DATA STORAGE
20170230169 · 2017-08-10 ·

The disclosure relates to secure data storage and retrieval, in particular to methods and circuits for securely storing data to reduce the possibility of leakage via side channel attacks. Embodiments disclosed include a method of storing a value comprising a series of words, the method comprising: i) combining in a series of XOR operations a word of a first portion of the value, a word of a second portion of the value and an output word of a first random number generator to provide a first combined word; ii) storing the first combined word in a shift register; and iii) repeating steps i) and ii) for each successive word of the first and second portions of the value.

METHODS AND APPARATUSES FOR DETERRING UNAUTHORIZED RFID SCANNERS
20220309258 · 2022-09-29 ·

Aspects of the present disclosure include receiving one or more RFID interrogating signals from the RFID scanner, generating one or more internal signals, mixing the one or more RFID interrogating signals with the one or more internal signals to generate one or more resultant signals, and backscattering the one or more resultant signals.

Enhanced Security for Contactless Access Card System
20220270420 · 2022-08-25 ·

An access card may store an encrypted operation key and a key used to read the encrypted operation key from the access card. The encrypted operation key and the key may be based on a unique identifier (UID) of the access card. The encrypted operation key may be obtained by encrypting an operation key using a cryptographic key that is also based on the UID of the access card. An access card reader may read the UID from the access card and use it to generate the key used to read the encrypted operation key from the access card. The access card read may also use the UID read from the access card to generate a cryptographic key used to decrypt the encrypted operation key. The access card reader may validate the decrypted operation key and determine whether to grant or deny access, for example, via an access control device.

OPERATING SYSTEMS FOR AN RFID TAG
20170270323 · 2017-09-21 ·

In embodiments of the present invention improved capabilities are described for a wireless computing device, comprising an antenna; an analog block for receiving and transmitting an RF signal through the antenna, wherein the energy from the received RF signal provides power to the wireless computing device; and a data processing and controller block for data management, wherein the data processing and controller block comprises: (i) a first program memory adapted to store a first set of instructions comprising a system call adapted to perform at least one function, and (ii) a second program memory adapted to store a second set of instructions comprising an instruction to call the system call, wherein the data processing and controller block is adapted to execute the first set of instructions and the second set of instructions,

wherein the antenna, analog block, and data processing and controller block are mounted on a single substrate.

NFC tags with proximity detection

Systems, apparatuses and methods provide for detecting the proximate placement of an external NFC reader to a specific location on a display surface. The display surface can be intended for viewing indicia and enabling interaction with an NFC communication device embedded within the display. A circuit can control an NFC security system that can scan for unauthorized tags affixed to the surface of a display. The NFC security system may be activated by an NFC enabled mobile phone placed proximate to the indicated region for receiving an NFC coded message from the display. An NFC security scan can be performed prior to the mobile phone reading the message from the intended NFC tag in the display. Enabling interactive display modes can allow for making selections indicated on the display or detecting motion gestures across the face of the display.

Biocrypt Digital Wallet
20210398134 · 2021-12-23 · ·

A device and method for using biometric technologies to ensure secure transactions using blockchain technology are disclosed. The embodiments described mitigate at least some security related problems in conventional blockchain digital wallets, particularly those that cannot reliably authenticate user identity. The present disclosure presents a method and apparatus for using authentication and data protection for implementing a blockchain offline wallet using biometrics.

SECURE WIRELESS DATA DEVICES AND METHODS OF USE
20210392499 · 2021-12-16 ·

A secure wireless data device is disclosed and configured as at least one of a passive, semi-passive, or active RFID or NFC enabled device. In at least one embodiment, the data device provides a memory, an antenna and an at least one access sensor. The memory is configured for storing select wireless data therein. The antenna is in selective wireless communication with a compatible reader. The at least one access sensor is configured for automatically switching between an enabled state—wherein the wireless data is capable of being accessed by the reader—and a disabled state—wherein the wireless data is prevented from being accessed by the reader—based on an at least one measurable physical parameter that is detectable by the at least one access sensor.