H04K3/86

Protection of personal data contained on an RFID-enabled device
11734524 · 2023-08-22 ·

A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.

Communication control device and communication control system

According to an embodiment, a communication control device includes a communication unit and a jamming control unit. The communication unit wirelessly communicates with a first device and uploads information acquired from the first device to a second device via a network. The jamming control unit allows jamming radio waves to be output to interfere with wireless communication between the first device and a device other than the communication control device, the device being to perform wireless communication in a communication band used by the first device.

Electronically steerable parasitic array antenna process

A process for an electronically steerable parasitic array (ESPAR) antenna includes operating the ESPAR antenna with a receiver in Normal Mode until an internal flag is generated by the receiver indicating jamming RF noise preventing Normal Mode operation, causing the ESPAR antenna to switch to Anti-jam Mode. Anti-jam Mode includes a Search Mode and a Track Mode. The ESPAR antenna is steered in Search Mode, causing the ESPAR antenna to beam in a circular pattern to locate a spatial direction of the jamming RF noise, identify the spatial direction of the jamming RF noise preventing Normal Mode operation, and place a null in the spatial direction of the jamming RF noise. The ESPAR antenna switches to Track Mode to maintain the null in the spatial direction of the jamming RF noise until the jamming RF noise is not present. The ESPAR antenna then returns to operating in Normal Mode.

Algorithm and techniques for high-resolution interference parameter estimation in low-swap environment

Techniques for providing a multi-stage iterative scheme to determine fine granularity estimates of parameters of an interfering signal and for using the fine granularity estimates of the parameters to reduce an impact of the interfering signal against a signal of interest (SOI) are disclosed. An input signal is identified. A first set of estimation parameters that provide a coarse granularity estimate of a center frequency of the jamming signal and of a symbol rate of the jamming signal are determined. The first set of estimation parameters are refined to generate a medium granularity estimate of the center frequency and the symbol rate of the jamming frequency. The medium granularity estimates are also refined to produce a fine granularity estimate of the center frequency and the symbol rate. The fine granularity estimates are used to remove or reduce an influence of the jamming signal on the input signal.

PROTECTION OF PERSONAL DATA CONTAINED ON AN RFID-ENABLED DEVICE
20220318528 · 2022-10-06 ·

A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.

GAME TABLE READING SYSTEM
20220254218 · 2022-08-11 ·

The game table reading system comprises reading antennas for each of a plurality of reading areas of a game table, read-restriction antennas for each of the plurality of the reading areas, the read-restriction antennas restricting the RFID tag embedded in a game token placed in the corresponding reading area from being read by the reading antenna corresponding to the other adjacent reading areas, a reading control device that controls the reading antennas, and a read-restriction control device that controls the read-restriction antennas. The read-restriction control device causes the read-restriction antennas corresponding to the reading areas adjacent to the reading areas corresponding to the reading antenna that the reading control device causes to read, in synchronization with the reading control device.

Systems and methods for disrupting unauthorized communications in low frequency radio communication devices

Systems and methods for disrupting unauthorized communication in low frequency radio communication devices are provided. Traditional systems and methods may fail to provide for disrupting unauthorized communications by generating low frequency signals in the same band as the low frequency bands of the low frequency radio communication devices. Embodiments of the present disclosure provides for overcoming the limitations faced by the traditional systems and methods by generating, via a square wave generator and a device coil of a low frequency radio communication device, low frequency signals; integrating the low frequency signals on a computing device by implementing a power controlling technique; and disrupting, via the integrated low frequency signals on the computing device, unauthorized communications in the low frequency radio communication device.

SYSTEMS AND METHODS FOR READING RFID TAGS

An RFID system comprises an array of antennas each configured to emit a plurality of beams in different directions. The beams of each pair of adjacent antennas are directed towards one another and overlap. A pair of adjacent antennas transmits simultaneously and the overlapping beams interfere to create an interference pattern. An RFID reader controls the relative phase and/or frequency of the beams to move the interference pattern to read an RFID tag within the moving pattern. As the chance of a RFID tag responding to an emitted beam generally increases with signal strength of the reader beam an area of constructive interference means that RFID tags in that region are more likely to respond to the signal. The system can cover a large proportion of the area below ceiling-mounted antennas, where cover generally means that RFID tags in that area will be successfully read.

Protection of personal data contained on an RFID-enabled device
11281871 · 2022-03-22 ·

A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.

Speech recognition device, speech recognition method, non-transitory computer-readable medium storing speech recognition program

A speech recognition device of the present disclosure recognizes an uttered speech of a user, and includes a controller configured to control output of any disturbance sound according to whether uttered content requested to the user is content desired not to be heard by a third party, and stop the output of the disturbance sound in response to end of an utterance of the user.