Patent classifications
H04K2203/20
Protection of personal data contained on an RFID-enabled device
A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.
Backscatter communication method, excitation device, backscatter device, and receiving device
Embodiments of this application disclose a backscatter communication method and a related apparatus. The method includes: An excitation device determines a first sequence, generates a first signal, and sends the first signal, where the first signal carries the first sequence; after receiving the first signal, a backscatter device modulates backscatter device data onto the received first signal to obtain a second signal, and backscatters the second signal, to implement first scrambling on the backscatter device data by using the first sequence; and a receiving device determines the first sequence, receives the second signal from the backscatter device, and demodulates the received second signal based on the first sequence, to obtain the backscatter device data carried on the second signal.
ATM SKIMMER DETECTION BASED UPON INCIDENTAL RF EMISSIONS
The disclosed embodiments include methods and systems for detecting ATM skimmers based upon radio frequency (RF) signal. In one aspect, the disclosed embodiments include a system for detecting ATM skimmers including a memory storing instructions and one or more processors that execute the instructions to perform one or more operations for detecting ATM skimmers. The operations may include, for example, receiving radio frequency (RF) signal data corresponding to one or more RF signals detected by an antenna located within communication range of the ATM. The operations may also include determining one or more unidentified RF signals of the detected ATM RF signals that differ from one or more baseline RF signals. The operations may also include determining whether the one or more unidentified RF signals are present for a predetermined period of time, and determining whether a skimmer is present at the ATM based on a determination that the one or more unidentified RF signals are present for the predetermined period of time.
ATM SKIMMER DETECTION BASED UPON INCIDENTAL RF EMISSIONS
The disclosed embodiments include methods and systems for detecting ATM skimmers based upon radio frequency (RF) signal. In one aspect, the disclosed embodiments include a system for detecting ATM skimmers including a memory storing instructions and one or more processors that execute the instructions to perform one or more operations for detecting ATM skimmers. The operations may include, for example, receiving radio frequency (RF) signal data corresponding to one or more RF signals detected by an antenna located within communication range of the ATM. The operations may also include determining one or more unidentified RF signals of the detected ATM RF signals that differ from one or more baseline RF signals. The operations may also include determining whether the one or more unidentified RF signals are present for a predetermined period of time, and determining whether a skimmer is present at the ATM based on a determination that the one or more unidentified RF signals are present for the predetermined period of time.
ATM skimmer detection based upon incidental RF emissions
The disclosed embodiments include methods and systems for detecting ATM skimmers based upon radio frequency (RF) signal. In one aspect, the disclosed embodiments include a system for detecting ATM skimmers including a memory storing instructions and one or more processors that execute the instructions to perform one or more operations for detecting ATM skimmers. The operations may include, for example, receiving radio frequency (RF) signal data corresponding to one or more RF signals detected by an antenna located within communication range of the ATM. The operations may also include determining one or more unidentified RF signals of the detected ATM RF signals that differ from one or more baseline RF signals. The operations may also include determining whether the one or more unidentified RF signals are present for a predetermined period of time, and determining whether a skimmer is present at the ATM based on a determination that the one or more unidentified RF signals are present for the predetermined period of time.
RFID disruption device and related methods
Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50) and an RFID data storage device (30, 30) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161, 171, 171, 271, 271) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30) that an unauthorized RFID interrogation device (50, 50) is attempting to interrogate the RFID data storage device (30, 30) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30) to provide protection thereto and when the RFID interrogation device (50, 50) is producing the interrogation signal.
Electronic countermeasures transponder system
A system is provided that has an ECM (electronic counter measures) system and a transponder monitor connected to or forming part of the ECM system. The system monitors for a transponder signal from a remote transponder. The system determines information, such as transponder location, based on the transponder signal and makes use of the information in the ECM system and/or the system extracts encoded information contained in the transponder signal, such as information about a transponder owner, such as status of consumables, medical status. The ECM system may have a reactive jammer that is used both for a reactive jamming function, and as the transponder monitor function.
Middleware device, driving method of reader and method for determining misrecognition of tag
A middleware device, a driving method of a reader and a tag misrecognition determining method are provided. The middleware device operated in relation to a reader includes a storage configured to pre-store receiving sensitivity of tag information of a tag of an object recognized at different distances from the reader as a reference value, a communication interface configured to, in response to the object approaching to the reader, acquire the receiving sensitivity of tag information of the tag recognized at a preset time interval, and a tag misrecognition processor configured to compare the acquired receiving sensitivity with the pre-stored reference value to determine misrecognition of the tag.
NFC Tags with Proximity Detection
Systems, apparatuses and methods provide for detecting the proximate placement of an external NFC reader to a specific location on a display surface. The display surface can be intended for viewing indicia and enabling interaction with an NFC communication device embedded within the display. A circuit can control an NFC security system that can scan for unauthorized tags affixed to the surface of a display. The NFC security system may be activated by an NFC enabled mobile phone placed proximate to the indicated region for receiving an NFC coded message from the display. An NFC security scan can be performed prior to the mobile phone reading the message from the intended NFC tag in the display. Enabling interactive display modes can allow for making selections indicated on the display or detecting motion gestures across the face of the display.
PROTECTION OF PERSONAL DATA CONTAINED ON AN RFID-ENABLED DEVICE
A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.