The present invention relates to securing communications.
Wireless devices, such as radio frequency identification (RFID) tags, can be attached to goods and other objects to provide information. Some RFID tags are passive and do not include internal power sources. Instead, a passive RFID tag is powered when it receives a RF signal from a RF reader. In response to the RF signal from the RF reader, the RFID tag can transmit information stored in the RFID tag, such as an identifier or information about a person or goods associated with the RFID tag.
RFID tags may be subject to unauthorized reads. For example, a high-powered RF reader can transmit a signal that energizes a RFID tag from a distance. The RF reader may then read the information from the RFID tag covertly. Additionally, high-powered RF readers may be able to overcome some RFID security measures, such as passive shields, which block RF fields from reaching the RFID tags. For example, the high-powered RF reader may be able to provide enough power to energize the RFID tag despite the passive shield's blocking attributes.
In general, this document describes preventing unauthorized communications with a device, such as a radio frequency (RF) device.
In a first general aspect, a circuit is described. The circuit includes a power module that includes an antenna. The power module is configured to generate power from a carrier signal received by the antenna. The circuit also includes a subcarrier generator powered by the power module when the carrier signal is received regardless of a communication protocol used in transmitting the carrier signal. The subcarrier generator generates an obscuring signal configured to obscure an information signal generated by another circuit energized by the carrier signal.
In a second general aspect, a system is described. The system includes an information circuit comprising a transponder for receiving a radio frequency (RF) carrier signal from a RF reader and transmitting an information signal having information in response to the RF carrier signal. The system also includes a blocking circuit that includes a transponder for receiving the RF carrier signal and transmitting an obscuring signal in response to the RF carrier signal regardless of a communication protocol used by the RF reader for transmission of the RF carrier signal. The obscuring signal prevents the RF reader from extracting the information from the information signal.
In yet another general aspect, a method is described. The method includes receiving, at a first circuit, a carrier signal to energize the first circuit, and transmitting—regardless of a communication protocol used in transmission of the carrier signal—a blocking signal at a frequency to interfere with an information signal transmitted by a second circuit energized by the carrier signal.
The systems and techniques described here may provide none, one, or more of the following advantages. First, radio frequency (RF) communications between RF devices and RF readers can be obscured regardless of the transmitting power of the RF reader. Additionally, an obscuring signal can be transmitted regardless of the communication protocol used by the RF reader. The systems and methods can also decrease manufacturing costs because of the simplicity in the implementation. For example, an internal power source or a microprocessor is not needed to generate an obscuring signal.
The details of one or more implementations of the invention are set forth in the accompanying drawings and the description below. Other features and advantages of the invention will be apparent from the description and drawings, and from the claims.
Like reference symbols in the various drawings indicate like elements.
This document describes example systems and techniques for obscuring communications between, for example, a radio frequency (RF) reader and a RF identification (ID) tag. In certain implementations, an active shield is placed near a RF device, such as a RFID tag embedded in a passport. A RF reader can transmit a RF carrier signal that energizes both the RF device and the active shield. In response, the RF device transmits information to the reader using a subcarrier frequency imposed on the carrier frequency. The active shield also transmits a signal on the subcarrier frequency, however, the signal can include spurious, arbitrary, or random data. The signal from the active shield can interfere with the signal from the RF device so that the RF reader may not accurately read the signal transmitted by the RF device.
In certain implementations, the RF reader 108 includes a RF generator 110 that generates the power signal 104. For example, the RF generator 110 can generate a radio frequency signal, such as a high frequency (HF) signal of 13.56 MHz. Additionally, in certain implementations, the RF generator 110 can generate signals at different frequencies, such as 125-134.2 kHz, 140-148.5 kHz, and 868 MHz-928 MHz, in addition to or instead of generating the 13.56 MHz signal. Additionally, other frequencies generated by, for example, load modulation, can be used. For the purposes of illustration, the examples described use 13.56 MHz signals, although this is not intended to be limiting.
The RF generator 110 can send the generated signal to a reader antenna 112 for transmission to the RF card 106. As described previously, the generated signal, or power signal 104, can energize, or power, the RF card 106. In some implementations, the RF card transmits information in response to the received power signal 104. This information can include, for example, passport information, information about goods associated with the tag, medical information, etc. In certain implementations, the information can be encoded in an information signal 114 that is transmitted using a backscatter signal, or subcarrier signal, that is transmitted back to the RF reader.
In
The reader antenna 112 of the RF reader 108 can receive the information signal 114. As shown in
For example the obscuring signal 118 may be transmitted on substantially a same frequency as the information signal 114, as indicated by the joined arrow shown in
In some implementations, the obscuring signal 118 is transmitted in response to the power signal 104, regardless of communication protocols used by the RF reader to transmit the power signal 104. For example, regardless of whether the RF reader transmits a carrier signal using ISO (International Organization for Standardization) 15693, ISO 18000-3C, ISO 14443, various anti-collision protocols, etc., the active shield 102 can respond with an obscuring signal without having to decode the received carrier signal.
In some implementations, the obscuring signal may prevent unauthorized reads of the RF card 106. For example, a malicious user may use a high-powered (e.g., 100 W or higher) RF reader to gain unauthorized access to information stored in a RFID tag. Because of the high power, the RF reader may energize the RFID tag from a distance to avoid detection of the unauthorized attempt to read. If the high-powered reader energizes the RFID tag, an active shield placed near the RFID tag also may be energized. The energized RFID tag and active shield may then respond with an information signal and an obscuring signal, respectively. In this example, the high-powered RF reader may not successful read the RFID tag because the obscuring signal masks the information present in the information signal.
In step 204, the RF carrier signal is received from the RF reader. For example, the active shield can include an antenna, which receives the RF carrier signal. In step 206, the active shield is energized using the RF carrier signal. For example, the antenna can use the received carrier signal to power the active shield components. In some implementations, the power can be rectified before it is used by the active shield components.
In step 208, a signal is transmitted, which interferes with information signals transmitted by other RF circuits that are energized by the RF carrier signal. For example, the active shield can include an oscillator (e.g., a crystal oscillator) that generates a signal with arbitrary data, where the signal has the same frequency as an information signal transmitted by a RFID tag. The transmission of the obscuring signal may continue as long as the active shield is within the RF field, as indicated in step 202. If the RF field is removed, the method 200 can end.
The modulator 302 can generate a subcarrier signal 312, such as an example 847 kHz signal. The modulator can generate the signal as soon as the circuit 300 is energized by the carrier signal received by the antenna. In some implementations, the modulator continues to generate the subcarrier signal as long as the circuit 300 is powered.
The modulator can be designed to generate a subcarrier that has the same frequency as subcarrier submitted by other RF circuits, such as RFID tags, or cards. In some implementations, the subcarrier generated by the modulator 302 obfuscates information embedded in subcarriers generated by the other RF circuits so that a RF reader may not read the information from other subcarriers.
In some implementations, the modulator can generate more than one frequency. This may permit using the circuit 300 in several different RF communication schemes that have different subcarrier frequencies. For example, the modulator 302 may generate two subcarrier signals simultaneously, where one signal has a frequency of 847 kHz and the other signal has a frequency of 106 kHz. By generating both frequencies, the circuit 300 can interfere with RF communications using either or both of the frequencies.
In some implementations, the modulator generates a single subcarrier when powered. A user can select the frequency of the subcarrier through, for example, the adjustment of a variable resistor.
In certain implementations, the power management module 304 can also include components that store energy generated by the carrier signal for later use. For example, the power management module can include capacitors that store energy that may be used to power the modulator 302 even if the carrier signal stops.
Additionally, in certain implementations, the circuit 300 includes components to rectify and smooth the carrier signal transmitted as a sine wave. For example, the carrier signal can be rectified by a bridge rectifier 316. The rectified carrier signal can, in some implementations, then be smoothed by an RC filter including a capacitor 318 and a resistor 320. The rectified and smoothed carrier signal may approximate a direct current (DC) voltage that is transmitted to the power management module 304, the modulator 302, or both.
Signal 404 is an example of an obscuring signal transmitted by an active shield. The obscuring signal 404 can include meaningless or arbitrary data. In the example shown in
Signal 406 is an example of a composite signal 406 received at a RF reader. In some implementations, the composite signal is a combination of the obscuring signal and the information signal 402. The composite signal is received by a RF reader, but the information may not be extracted because the obscuring signal has—in this case—added information which may not be distinguished from the information embedded in the information signal.
In certain implementations, an active shield and RF device can be embedded in a structure, such as within a passport, so that the active shield prevents unauthorized reads when the active shield is positioned sufficiently near the RF device (e.g., near enough so that it is powered by a carrier signal when the RF device is powered).
By manipulating the position of the active shield in relation to the RF device, a user can select whether or not reads of the RF device are permitted. In the example of
When a user wants to prevent readers from accessing the information in the RF device, the user can close the passport, which places the active shield near the RF device. If a read is attempted, the RF field generated by the RF reader energizes both the RF device and the active shield, which can prevent the RF reader from accurately decoding information transmitted by the RF device because an obscuring signal is transmitted from the activated active shield.
In certain implementations, the RF device can be part of a card 510, for example, an identification card, a medical card, or a credit card, etc. When the card 510 is outside of the card holder 508, the card can be read by a RF reader if it is sufficiently far from the card holder 508 so that the card holder 508 is not within a RF field created by the RF reader. In certain implementations, if a user wishes to prevent reads from the RF device 506 embedded in the card 510, the user may insert the card 508 into the card holder 510. When inserted, the embedded RF device 506 can be positioned sufficiently near the active shield 504 of the card holder 508 so that both the active shield 504 and RF device 506 are powered when the RF reader attempts to read information from the RF device 506. The activated active shield 504 can then transmit an obscuring signal that interferes with the RF reader's ability to read information from an information signal transmitted by the RF device 506.
Although a few implementations have been described in detail above, other modifications are possible. For example, in some implementations, additional components may be used in the example circuit 300 used to generate obscuring signals. For example, the circuit 300 can include a capacitor 322 that prevents the rectified and smoothed carrier signal from traveling through the line used to transmit the subcarrier signal while still permitting the alternating current (AC) subcarrier signal to pass through.
In other implementations, the circuit 300 can handle high power energy, such as high-powered RF signals received from a high-powered RF reader (e.g., 100 W). In some instances, high-powered RF readers may be used in an attempted unauthorized read of an RFID tag. In one implementation, the excessive power can be limited using an adjustable load. For example, a resistive load can be placed in parallel with the capacitor 318 and driven by the power management module 304.
In some implementations, the active shield can include components that indicate whether an obscuring signal is transmitted. For example, if the active shield is energized, a status indicator can visually indicate the active shield is activated. In some implementations, the status indicator includes one or more light emitting diodes (LEDs). For example, a red colored LED can light when the active shield is powered. In another implementation, a display attached or incorporated into the active shield can indicate a status associated with active shield. For example, the active shield can include a liquid crystal display screen that displays a status, such as “ACTIVE,” or “UNAUTHORIZED READ ATTEMPT.” The screen may also display other information, such as how long it has been active, identification information about the RF reader transmitting the RF signals, the strength of the received RF signal, etc.
In addition, the logic flows depicted in