Patent classifications
H04K2203/20
Method and device for detecting a decoy operation of a GNSS system
A method of detecting an operation to spoof a first positioning device carried by a first vehicle moving in a zone in which at least one second vehicle carrying a second positioning device is also moving, the method comprising the step of causing at least one first positioning value to be calculated for each vehicle from initial satellite signals received by each device; the method being characterized in that it further comprises the steps of: causing the second device to initiate a latching stage in order to make a new search for satellite signals and using the new satellite signals received by the second device to calculate a second positioning value for the second vehicle at the same instant as the first value; comparing the first and second values relating to the second vehicle; and issuing a warning when the two values do not coincide.
Magnetic stripe reader tamper protection
A technique for tamper protection of incoming data signal to an electronic device is disclosed. An intentional interference signal is generated and modulated onto the incoming data signal as one composite input signal, to prevent unauthorized acquisition of valid data from the incoming data signal. The magnitude of the interference signal is adjusted to correspond to the magnitude of the incoming data signal, thereby preventing an attacker from properly differentiating the two different signals and/or decoding the valid data from the composite input signal. Once the composite input signal is safely received within the device, the interference signal can be filtered out in either analog mode or digital mode.
SYSTEM AND METHOD FOR NEAR FIELD COMMUNICATIONS HAVING LOCAL SECURITY
A system for near field communications is provided. The system can include a near field generator configured to generate a near field detectable signal comprising information. The system can include a near field detector configured to receive the near field detectable signal and output the information. The system can include an Electro-Magnetic (EM) shield surrounding the near field generator to block EM radio frequency (RF) signals in the vicinity of the near field generator from interfering with operations of the near field generator. The EM shield does not prevent communication of the near field detectable signal between the near field generator and the near field detector. The EM shield can be configured to reduce magnetic field loss from eddy currents in the EM shield as the near field detectable signal passes through the EM shield.
NFC tags with proximity detection
Systems, apparatuses and methods provide for detecting the proximate placement of an external NFC reader to a specific location on a display surface. The display surface can be intended for viewing indicia and enabling interaction with an NFC communication device embedded within the display. A circuit can control an NFC security system that can scan for unauthorized tags affixed to the surface of a display. The NFC security system may be activated by an NFC enabled mobile phone placed proximate to the indicated region for receiving an NFC coded message from the display. An NFC security scan can be performed prior to the mobile phone reading the message from the intended NFC tag in the display. Enabling interactive display modes can allow for making selections indicated on the display or detecting motion gestures across the face of the display.
FINANCIAL DEVICE AND METHOD OF CONTROLLING FINANCIAL DEVICE
A financial device includes: an insertion part to which a medium is inserted; a random number generation unit configured to generate an signal including information on a copying prevention number for preventing copying of a medium according to an on signal; a detection unit installed near the insertion part and configured to generate a detection signal by detecting the existence of the medium; a determination unit configured to determine whether the medium is completely inserted or is being removed based on the detection signal; a controller configured to generate the on signal to make the random number generation unit operate, wherein the controller generates an off signal to make the random number generation unit not operate when it is determined that the medium is completely inserted and generates the on signal to make the random number generation unit operate again when it is determined that the medium is being removed; and a card reader unit installed at one position of a movement path of the inserted medium and configured to recognize information included in the medium.
Game table reading system
The game table reading system comprises reading antennas for each of a plurality of reading areas of a game table, read-restriction antennas for each of the plurality of the reading areas, the read-restriction antennas restricting the RFID tag embedded in a game token placed in the corresponding reading area from being read by the reading antenna corresponding to the other adjacent reading areas, a reading control device that controls the reading antennas, and a read-restriction control device that controls the read-restriction antennas. The read-restriction control device causes the read-restriction antennas corresponding to the reading areas adjacent to the reading areas corresponding to the reading antenna that the reading control device causes to read, in synchronization with the reading control device.
Protection of personal data contained on an RFID-enabled device
A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.
SYSTEM AND METHOD FOR NEAR FIELD COMMUNICATIONS HAVING LOCAL SECURITY
A system for near field communications is provided. The system can include a near field generator configured to generate a near field detectable signal comprising information. The system can include a near field detector configured to receive the near field detectable signal and output the information. The system can include an Electro-Magnetic (EM) shield surrounding the near field generator to block EM radio frequency (RF) signals in the vicinity of the near field generator from interfering with operations of the near field generator. The EM shield does not prevent communication of the near field detectable signal between the near field generator and the near field detector. The EM shield can be configured to reduce magnetic field loss from eddy currents in the EM shield as the near field detectable signal passes through the EM shield.
PROTECTION OF PERSONAL DATA CONTAINED ON AN RFID-ENABLED DEVICE
A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.
A HARDWARE COMPONENT AND A METHOD FOR IMPLEMENTING A CAMOUFLAGE OF CURRENT TRACES GENERATED BY A DIGITAL SYSTEM
Implementing a camouflage of current traces generated by a hardware component having one or more set of digital elements defining a plurality of operational datapaths comprises adjusting (761) one or more working condition(s) of the hardware component, measuring (762) a reaction of the hardware component to the working condition(s) by a logic test circuit through processing data operations along a reference datapath having a minimum duration corresponding to at least the longest of the operational datapaths, and in response to detecting an error (763) along the reference datapath, modifying (764) the working condition(s) so that the error generated by the logic test circuit is cancelled. Applications to countermeasures to side-channel attacks.