In the world where rapid transactions have become the norm, contactless card payments are becoming more prevalent. It is common to encounter access, identification, tracking, purchasing or other cards that are RFID (radio frequency identification) or NFC (near field communication) enabled. Hereinafter we will refer to both such type of cards collectively as RFID activated cards. In busy terminals or quick checkout lines, being able to just tap your card to pay two dollars has become a convenience that many people have begun to enjoy. Nevertheless, problems have arisen with these wireless transactions.
The first problem is wireless data theft. Card readers can be utilized to remotely collect a card's data through the air, for example on a crowded public transportation vehicle This theft can allow criminals to steal the card's information, without the card owner even being aware that the data on his card has been misappropriated.
A second problem is ‘card-clash’. This phenomenon results when two or more RFID cards are read by the same reader, although the user only intends one card to be read. This could result in the customer being charged on each card, therefore paying double what they should have. Card clash can also prevent the intended card reader, such as a subway turnstile, from deciphering either signal, preventing the cardholder from using either card.
In the current state of the art, wallets have been designed that prevent outside sources from maliciously reading the card's information. However, these wallets render the card unreadable for contactless payment when inside the wallet, and each card must be removed so as to enable the card to be used. There are also wallets that allow for a single card to be on the outside of this protection, so it may be used without removing the card from the wallet. This device however, limits the availability to the single card positioned on the outside of the wallet. Further, this device does not provide complete protection for data theft for the exposed card.
There is therefore a need to address the deficiencies of the art and to provide a card holder that enables the user to protect multiple cards from data theft, and also enables a user to use multiple cards without the need to remove each one from the holder in order to prevent card clash.
The shortcomings of the prior art are overcome and additional advantages are provided through the card holder for RFID enabled cards disclosed herein. In one aspect, a holder for RFID activated cards comprises at least a first sheath and a second sheath, said first and second sheaths forming the outer most sheaths of the holder. Each sheath further comprises a front and a back, each having a perimeter, a protective assembly, a card position adjacent said protective assembly, and means for positioning a card adjacent said protective assembly. The protective assembly comprises a conductive layer adjacent an absorbing layer, wherein said absorbing layer is also adjacent said card position, and wherein said protective assembly has a perimeter. Said conductive layer and absorbing layer each have a perimeter and are preferably sized to be at least coextensive with the card position. The sheaths are hingedly connected to enable the sheaths to move relative to each other, to enable one side of a card positioned in a sheath to be isolated from other cards within said holder and therefore readable, and to enable the sheaths to be stacked in a first position when the cards are not in use and the holder is closed.
In another aspect, the holder further comprises an additional conductive layer external to and adjacent the front of said second sheath and preferably also external to and adjacent the back of said first sheath. These additional conductive external layers are hingedly connected to the sheaths and preferably form a unitary protective shell that is at least coextensive with the size of the front of said second sheath the back of said first sheath. In this way, said unitary protective shell covers the sheaths when the sheaths are stacked in a first position, thereby preventing malicious data appropriation from the cards within the holder when the holder is closed.
Additional features and advantages are realized through the techniques of the present invention. Other embodiments and aspects of the invention are described in detail herein and are considered a part of the claimed invention.
The subject matter which is regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of practice, together with the further objects and advantages thereof, may best be understood by reference to the following description taken in connection with the accompanying drawings in which:
The RFID protecting card holder is designed to protect against identity theft from the outside of the holder and also allow for easy contactless card payment with several cards. Another main function of the card holder is that contactless payment may be made with any number of different cards for different situations, and never requires removal of the cards from the holder. This allows for a quick and painless payment method.
Referring to
While not essential, in a preferred embodiment each sheath will enable the user to identify the RFID card in the card position, whether by a cutaway in the sheath front 9 as shown
Further, it will be appreciated that the RFID card can be held in the card position adjacent the protective assembly 7 by means of an adhesive as opposed to a slot. Further means for positioning an RFID card in the card position adjacent the protective assembly 7 can include a clip or a band fastening the RFID card to the protective assembly 7. In such embodiments, the sheath front 9 may comprise the card position. The sheath back 11 in such embodiments may comprise the conductive layer 17 of the protective assembly 7 or may be a separate material forming the sheath back 11.
In
As will be understood, the conductive layer 17 of the protective assembly 7 of each sheath prevents unintended malicious external card reading by scrambling the signal from one side of a card 3 in a sheath. For example, as shown in
In one embodiment the conductive layer 17 can be copper mesh, nickel mesh, or other similar electromagnetic shielding materials such as product number 1212 pure copper polyester taffeta fabric, 0.08 millimeters thick, available from lessemf.com. The absorbing layer 15 can be for example product number HFC-A5000, 0.3 millimeters thick, available from emigasket.com. A combined conductive layer and absorber layer can be sourced from mwtmaterials.com as product number MAS-310. It will be appreciated that the absorbing layer can also comprise an air gap or a nonconductive spacer. The purpose of the absorbing layer is to absorb the scrambled signal that is emanating from the conductive layer while the card is being read. Absent the absorbing layer 15, the card could not be read.
In a further embodiment designed to provide additional edge protection against malicious card reads,
An embodiment of the holder described herein can be made by providing a first sheet of sheath material consistent with the size of a first sheath 1A and a second sheath 1B. The first sheet has a first half and a second half. A first protective assembly 7 comprising an absorbing layer 15 and a conductive layer 17 is placed upon a first half of said first sheet so that the absorbing layer 15 is adjacent said sheet. A second protective assembly 7 comprising an absorbing layer 15 and a conductive layer 17 is placed upon a second half of said first sheet so that the conductive layer 17 is adjacent said sheet. A second sheet of sheath material coextensive with the size and shape of said first sheet is place on top of said first and second protective assemblies 7. The first and second sheets are joined together about a portion of their perimeters so as to create a slot between the first sheet of sheath material and the first protective assembly, and to also create a slot between the second sheet of sheath material and said second protective assembly 7. A hinged connection is provided along the center axis of said first and second sheets, resulting in first sheath 1A and second sheath 1B.
It will be appreciated that additional sheaths can be added to the holder by repeating the steps outlined above onto the first and second sheaths 1A and 1B respectively. Once a sufficient number of sheaths have been created, electromagnetic signal blocking material for an additional conductive layer 19, or an encapsulation protective shell 23 is placed adjacent sheaths 1A and 1B and a hinged connection between the conductive layer 19 or encapsulation protective shell 23, on the one hand, and the sheaths on the other hand, is provided, preferably along the center axis.
In another embodiment of the holder, it could be made without using a second sheet of sheath material. In this method the sheet still has a first half and a second half. A first protective assembly 7 comprising an absorbing layer 15 and a conductive layer 17 is placed upon the first half of said sheet so the conductive layer is adjacent said sheet. A second protective assembly 7 would be placed under said sheet so the conductive layer is adjacent the sheet. A means for positioning the RFID card to the absorber would then be placed above the first protective assembly and below the second protective assembly. This means could be a clip, band, adhesive, or other device to position the card adjacent the absorber.
While the invention has been described in detail herein in accordance with certain preferred embodiments thereof, many modifications and changes therein may be effected by those skilled in the art. Accordingly, it is intended by the appended claims to cover all such modifications and changes as fall within the spirit and scope of the invention.
This application claims priority to U.S. Provisional Application No. 62/386,304 filed on Nov. 27, 2015 which is incorporated herein by reference in its entirety
Number | Name | Date | Kind |
---|---|---|---|
5034724 | Tone | Jul 1991 | A |
5941375 | Kamens | Aug 1999 | A |
6121544 | Petsinger | Sep 2000 | A |
6184788 | Middlemiss | Feb 2001 | B1 |
7889056 | Horne | Feb 2011 | B2 |
8305193 | Horne | Nov 2012 | B2 |
9192217 | Vargas | Nov 2015 | B1 |
9524458 | Colby | Dec 2016 | B2 |
20050236489 | Droz | Oct 2005 | A1 |
20060187055 | Colby | Aug 2006 | A1 |
20060187061 | Colby | Aug 2006 | A1 |
20060254815 | Humphrey | Nov 2006 | A1 |
20060290501 | Hammad et al. | Dec 2006 | A1 |
20070090954 | Mahaffey | Apr 2007 | A1 |
20070164866 | Robin | Jul 2007 | A1 |
20070284264 | Davis | Dec 2007 | A1 |
20070289775 | Potts | Dec 2007 | A1 |
20080303632 | Hammad | Dec 2008 | A1 |
20090026751 | Rancien | Jan 2009 | A1 |
20090067150 | Ito | Mar 2009 | A1 |
20110268925 | Kagawa | Nov 2011 | A1 |
20120228168 | Kitchen | Sep 2012 | A1 |
20130270347 | Wernke | Oct 2013 | A1 |
20140034520 | Scicluna | Feb 2014 | A1 |
20140311636 | Jordan | Oct 2014 | A1 |
20140366250 | Barone | Dec 2014 | A1 |
20160285171 | Moylan | Sep 2016 | A1 |
20160374442 | Zhang | Dec 2016 | A1 |
Number | Date | Country |
---|---|---|
2528316 | Jan 2016 | GB |
2005296591 | Oct 2005 | JP |
Entry |
---|
Chapman, Daniel, Wallet to Combat Card Clash, Designed by UK Entrepreneur, www.get2press.com, Jun. 15, 2015, <www.get2press.com.au/default.asp?show=showpm&pmid=8628>. |
Flux Utmost, FLUX BIZ/RF Interference Prevention Separator, Nov. 11, 2016, <www.amazon.com/gp/product/B006AZZBU8/ref=s9_dcacsd_bhz_bw_c_x_1 >. |
Number | Date | Country | |
---|---|---|---|
20170372181 A1 | Dec 2017 | US |
Number | Date | Country | |
---|---|---|---|
62386304 | Nov 2015 | US |