G06K19/0723

OBJECT IDENTIFICATION AND DUPLICATION SYSTEMS

Systems and methods disclosed for use in identifying and duplicating objects, particularly access devices such as house keys, office keys, automobile keys, and RFID key fobs. Within a singular housing, the customizable systems may include any or all of a key identification system, a key duplication system, an automobile key identification system, and/or an RFID key fob duplication system. Unique capabilities of the systems include the ability to verify that an existing automobile key matches data input by the user pertaining to the associated automobile. Further, the systems reduce frustration, error, and waste by programming a duplicate blank RFID key fob in a fully automated manner within the housing of the machine. To facilitate this process, blank RFID key fobs may be stored inside of the housing within RFID key fob containers that are readily stacked and dispensed.

RFID DEVICES HAVING MULTI-LAYER REACTIVE STRAPS AND RELATED SYSTEMS AND METHODS
20230048347 · 2023-02-16 ·

In some embodiments, an RFID device may include a multilayer reactive strap having a first substrate, a first conductor portion, a second conductor portion, and a first connection. The first conductor portion may enclose a first area and may be disposed on a first side of first substrate. A second conductor portion may enclose a second area and may be disposed on a second side of the first substrate. A first connection may couple the first conductor portion and the second conductor portion together, and may thereby form a multiturn coil that includes both the first conductor portion and the second conductor portion.

METHOD AND DEVICE FOR AUTHENTICATING PASSIVE RFID TAG
20230051005 · 2023-02-16 ·

A method for authenticating a passive RFID tag includes acquiring a tag fingerprint of a first tag as a first tag fingerprint, the first tag being the genuine tag; acquiring a tag fingerprint of a second tag as a second tag fingerprint, the second tag being the tag to be authenticated; comparing the first tag fingerprint with the second tag fingerprint: if the first tag fingerprint is consistent with the second tag fingerprint, determining that the second tag is a genuine tag, otherwise determining the second tag is a forged tag. The tag fingerprint is the persistence time enabling the passive RFID tag to operate normally during discharge after fully charging. The beneficial effects include being high in robustness to the change of environment and high in authentication accuracy and capable of being directly deployed on an existing commercial RFID device without modifying hardware of the tag and reader.

Stackable integrated circuit cards

Systems and methods allow for the integrated circuit cards (ICCs) to removably couple to each other and transmit information to an access device as a single device. One among the two or more ICCs coupled together may read data from the remaining ICCs and provide the data to an access device via contactless communication. The ICC may include a substrate; an integrated circuit embedded in the substrate; input ports exposed on a first surface of the substrate, and output ports exposed on a second surface of the substrate. The input ports and the output ports are electrically coupled to the integrated circuit. The output ports are configured to be removably coupled to the input ports of a second ICC.

Authentication apparatus, system and methods using unclonable identifiers

An integrated circuit having Radio Frequency Identification components and circuitry used for authentication is discussed. The RFID components and circuitry include two or more coils and corresponding electrical circuits that are tuned to use two or more different resonant frequencies including: a first resonant RF used for power generation and a second resonant RF used for data communication. The integrated circuit contains a unique signature that is used for the authentication with two or more aspects including i) a first aspect that is a programmed password in a memory embedded on the integrated circuit, and ii) a second aspect that is a unique, randomly generated code based upon a physical characteristic of the integrated circuit.

Wireless security protocol

This disclosure relates to a data storage device. A data port transmits data between a host computer system and the data storage device over a data channel. The device repeatedly broadcasts advertising packets over a wireless communication channel different from the data channel. Each advertising packet comprises a random value and a message authentication code calculated based on the random value and an identity key. The identity key is readable by a device to be connected and in proximity of the data storage device out of band of the data channel and the communication channel. The identity key enables the device to be connected to verify the message authentication code based on the random value and the identity key to thereby authenticate the data storage device.

Device with built-in bill capture, analysis, and execution
11580528 · 2023-02-14 · ·

Systems and methods for secure and efficient bill capture, analysis, and execution are provided. A method may include capturing, via a camera embedded in a smart card, an image of a bill. The bill may include a plurality of text fields. The method may include processing the text fields via a microprocessor embedded in the smart card. The method may include determining, based at least in part on the processing of the text fields, a balance amount and a payment recipient associated with the bill. The method may also include executing a payment for the balance amount from an account associated with a user of the smart card to an account associated with the payment recipient. The executing may be performed via a wireless communication element embedded in the smart card which may be configured to provide wireless communication between the smart card and a payment gateway.

Interacting RFID tags

An active radio frequency identification (“RFID”) tag receives an RFID interrogation signal via a first antenna. An integrated frequency reference in the RFID chip recovers the clock from the RFID interrogation and generates a reference clock for transmitting data responsive to the RFID interrogation. The integrated frequency reference generates the reference clock at the same frequency as the RFID interrogation for transmitting the response via the first antenna. The integrated frequency reference generates the reference clock at a different frequency for transmitting the response using a Bluetooth beacon message or a WiFi message via a second antenna. A mobile computing device can interrogate the RFID tag via an NFC interface and receive a response via a Bluetooth beacon messages or WiFi message received via a Bluetooth or wireless interface of the mobile computing device.

Agile time-continuous memory operation for a radio frequency identification transponder

A radio frequency identification (RFID) transponder includes a current control module for controlling a current consumption of a memory based on an amount of available power, and a control logic for controlling a memory operation in response to the control of the current consumption by the current control module. The RFID transponder further includes a power detector that is configured to continuously monitor and detect the amount of available power and output a power-dependent control signal. The power-dependent control signal is used by the RFID transponder to control the current consumption of the memory in dependence on the available power.

Transient infrastructure for ubiquitous network communications applications
11580348 · 2023-02-14 ·

The disclosure generally relates to networking infrastructure and, more particularly, to installing transient infrastructure for ubiquitous networking applications. A wireless gateway device is sent to physical premises with a parcel. After the wireless gateway device is delivered to the physical premises, a processor of the wireless gateway device draws power from the energy source to perform operations comprising executing program code stored in non-transitory processor-readable medium to establish a wireless communications connection with a network service through a first type of wireless communications interface. The wireless gateway device performs operations comprising establishing wireless communications with one or more wireless peripheral devices in the physical premises through the second type of wireless communications interface.