Radio frequency identification (RFID) devices, including near field communication (NFC) enabled RFID devices, are utilized for a variety of purposes. Often such devices are formed as tags or labels and can be utilized to associate an object with an identification code or other data, such as website data. Such RFID devices may be passive and, upon receiving a signal, such as an excitation signal from an RFID or NFC-enabled reader, may be energized. The devices can then respond with a desired communication or provide information associated with a product, item or service associated with the RFID device.
Specifically, NFC is a data exchange protocol designed to allow devices, including suitably equipped mobile phones and the like, to interact with infrastructures, such as point of sale terminals and ticket gates on transportation systems, or RFID devices in the forms of “smart posters” or “touchpoints”, for example. In such situations, bringing an NFC enabled device into proximity of such infrastructure or RFID devices can cause the transmission of data to the NFC enabled device, resulting in, for example, the opening of a web page, the acceptance of a media stream via Bluetooth® or any of a number of other functions.
Often the manner of associating a product, item or service with an RFID device is to physically couple or adhere the RFID device to the product or item, or associate it with advertising relating to the product, item or service, such as the “smart poster” or “touchpoint” described above. For example, RFID labels may be coupled adhesively to objects or may otherwise have surfaces that attach directly to objects. RFID tags may be secured to objects in other manners, such as through the use of a plastic fastener, string or other fastening mechanism. Such RFID devices may then provide data to NFC enabled devices located or placed proximate the RFID devices.
Additionally, RFID devices are often associated with the product or item, or advertising item, in such a manner as to conceal or secure the RFID device. Such methods can provide security against the removal or misuse of an RFID device. However, in such circumstances, and particularly with NFC enabled devices designed to convey information to consumers with NFC enabled mobile phones and devices, there is a designated area (touchpoint) on an advertisement or product that indicates information can be obtained if the NFC enabled device is placed in close proximity to an area associated with the RFID device. However, as it is then known that information can be obtained from such areas, vandal or pirate RFID devices are often placed in close proximity to the indicated NFC area. The vandal or pirate devices often contain deceptive, misleading, undesired or malicious information. These devices can be coupled with or adhered to products and items, or advertisements associated with those items, leading to inappropriate or malicious information being unknowingly communicated to a user's NFC-enabled device. The current invention provides a possible solution to this problem.
A method, system and apparatus for providing security to RFID and NFC systems. In some exemplary embodiments, a smart poster may be utilized to provide appropriate or desired communications with an RFID or NFC-enabled device. Such exemplary embodiments may utilize an authorized NFC tag to communicate with an NFC-enabled device, and upon activation of the authorized NFC tag, may trigger activation or appearance of one or more related items, such as visual cues. Additionally, aspects of NFC security systems which can include regions of security, states of activity and actions performed when security violations are detected.
Advantages of embodiments of the present invention will be apparent from the following detailed description of the exemplary embodiments. The following detailed description should be considered in conjunction with the accompanying figures in which:
Aspects of the invention are disclosed in the following description and related drawings directed to specific embodiments of the invention. Alternate embodiments may be devised without departing from the spirit or the scope of the invention. Additionally, well-known elements of exemplary embodiments of the invention will not be described in detail or will be omitted so as not to obscure the relevant details of the invention. Further, to facilitate an understanding of the description, discussion of several terms used herein follows.
As used herein, the word “exemplary” means “serving as an example, instance or illustration.” The embodiments described herein are not limiting, but rather are exemplary only. It should be understood that the described embodiments are not necessarily to be construed as preferred or advantageous over other embodiments. Moreover, the terms “embodiments of the invention”, “embodiments” or “invention” do not require that all embodiments of the invention include the discussed feature, advantage or mode of operation.
Generally referring to
Referring now to exemplary
In
The smart poster or sign may also be equipped with a low power receiver or “watch dog” device that would allow the NFC tag 114 to detect the presence of an NFC reading device, such as a smart phone, at a greater range than the reading device is capable of typically interacting with NFC tags on the surface or in an area. One use for the pre-detection or watch dog device is to allow a security sweep for intruder/pirate tags to be performed before the user or consumer comes close enough to read pirate tags if present. As the sweep is only activated when a consumer approaches, the average power consumption is very low, allowing the function to be supported by a battery which can be resident on the tag or associated with the tag. Pre-detection by such a watch dog device could also be used to activate visual, audible or other functions, such as illuminating the sigh or extending a greeting to the on-coming consumer. By placing a watch dog device within the protected range, the NFC tags can be monitored, and, as the watch dog units can be battery powered because of pre-detection, they can be deployed flexibly without the cost of additional wiring or support structures to implement use of the watch dog device.
Still referring to exemplary
As described with respect to exemplary
Still referring to exemplary
Still referring to exemplary
Referring now to both exemplary
In one exemplary embodiment, the zone or area, which may correspond to the size of frame 202, can have of a large inductive coil antenna 218 which can follow an outside perimeter directly behind the visual part of the display 200. The coil antenna 218 may be energized in order to provide an alternating magnetic field for deactivating unauthorized tags 204. The energy and control of the coil antenna 218 can be provided by NFC controller 322, which can attempt to interrogate any NFC tags, such as a vandal tag 204, affixed to the visual face of the display 200.
In another exemplary embodiment, and still referring to both
In yet another exemplary embodiment, a secure zone can be provided by an antenna 218 inside the display 200 which may record far field signals at an NFC operating radio frequency. The signals can be analyzed by a component of the security system for timing and content related to the authorized NFC tag 214 on the display 200. Discrepancies or irregularities in the analyzed data might indicate the presence of an unauthorized tag 204.
In still another exemplary embodiment, the security system may initiate scans of an area or zone associated with display 200. This can be done through a watch dog type device or other components provided for this activity. Scanning activity performed by the security system can be operated by constant polling or may be triggered by conditional rules, as desired. Conditional control of the scanning activity may have the benefit of a lower power usage or consumption of the display 200 and may also reduce potential interference with legitimate NFC activity by users of the display 200, such as a reading of authorized NFC tag 214. Parameters that may be used for triggering NFC security scanning activity can include, but is not limited to, time, sensor states, display states, or external requests. Examples of time parameters include, but are not limited to, regular intervals, fixed time of day, or a timed interval after a conditional state change of another parameter. Examples of sensor states include, but are not limited to, infrared, acoustic, proximity, and vibration sensors, as well as environmental sensors such as light, temperature and humidity. Examples of display states can include, but are not limited to, user NFC interrogation activity or initialization directly after a new authorized NFC tag 214 has been installed. Examples of external requests can include, but are not limited to, signals and communication sent via wireless communication methods associated with network controller 320, such as Bluetooth, NFC or Wi-Fi as well as wired communication from connections such as an Ethernet connection.
Conditions for triggering scanning activity may further be any logical or desired combinations of parameter triggers and states as well as sequential conditions of gating previously triggered activity. For example, the security system 300 may conduct a scan at regular intervals during daytime hours while light sensors in the top of the display 200 are triggered by overhead fluorescent lights. In another exemplary embodiment, the security system 300 may scan the display after a designated time interval after an acoustic sensor in the front of the display 200 has been triggered. In yet another exemplary embodiment, security scans may be triggered when the authorized NFC tag 204 is interrogated by the user.
Still referring to both exemplary
Examples of direct actions to an unauthorized tag 204 can include inspection of memory contents and operational states, commands issued to disable the tag 204, reprogramming the memory contents of the tag 204, or jamming the communication channel of said tag 204. The inspection of the memory contents and states of the unauthorized tag 204 can determine a threat level and severity of a security violation. The inspection might also aid in the identification of unauthorized NFC tags that contain code which could exploit weaknesses in user device software or contain pointers to install malicious software on a user's device. The memory contents of an unauthorized tag 204 may be recorded by the security system for later analysis by authorized personnel. Disabling unauthorized tags 204 can be achieved via known and established commands commonly available for NFC tags such as the “kill” command commonly used for privacy functions. Jamming the communication channel can be implemented by methods such as issuing read commands to the unauthorized tag 203 or transmitting random noise or pulses to disrupt communication with the unauthorized tag 204.
Other examples of indirect security actions can include alerting authorized personnel, warning a user, or disabling the display 200. Alerting authorized personnel can be achieved via a wireless or wired network communication channel available to the security system, for example through network controller 320. If a network connection is not available to the security system, coded messages can be sent via reprogramming the authorized NFC tag 214. In such an example, information can be embedded into the URL pointer that sends coded messages to the website server but does not affect the website content that a user will see on their NFC enabled device. Another exemplary method of signaling can be achieved by storing the alert in the memory of the security system 300 for communication during maintenance intervals by authorized personnel. Visual displays such as lighted indicators can be used to request maintenance by authorized personnel. Such indicators may be provided on or around display 200, on frame 202, on or in conjunction with poster 206, or as a part of indictor 216. Similarly, warnings to the user can be achieved by audio or visual indicating lights or by reprogramming the authorized NFC tag 214 to indicate a problem with the display 200. Disabling the display 200 can be also be achieved by reprogramming the authorized NFC tag 214 in combination with switching off the display 200 backlight to indicate a non-functional state.
In some other exemplary embodiments, the NFC security system 300 can interrogate the intended and authorized NFC tag 214 to check if memory contents and identification codes remain uncorrupted. A previously stored unique identification code and known good data of the authorized NFC tag 214 can be established during the period of the installation of the authorized tag 214 into the display 200 by authorized personnel. If the security system determines that the authorized NFC tag 214 is non-functional or has corrupted memory contents, a set of actions similar to the previous described actions for unauthorized tags 204 can be performed.
In a further exemplary embodiment, an integrated RFID interrogator system, such as NFC controller 322, can verify a unique identification code and memory contents belonging to the authorized NFC tag 214. The unique identification code and memory contents of the authorized NFC tag 214 may then be compared with previously stored, known good data. If corrupted data is detected in the authorized NFC tag 214, the integrated RFID reader (e.g. NFC controller 322) can start repeatedly issuing tag reads to the authorized NFC tag 214. Such repeated tag reads may jam the communication channel and prevent interrogation of the authorized NFC tag 214 by a user's NFC-enabled device. Additionally, the display 200 backlight can be switched off, or some other indicator provided, which signals that the display 200 is no longer functioning. The display 200 may return to normal use and appearance after the issue is corrected.
In another exemplary embodiment, the NFC security system 300 can report the presence of an unauthorized NFC tag 204 to an internet server via a cellular network connection, or other desired communication method. Such a report may be sent using network controller 320. The memory contents of the unauthorized tag(s) 204 may then be uploaded to the server using network controller 320 for later analysis. Authorized personnel may also be alerted via a message from the server or directly from network controller 320 of the nature of the unauthorized tag 204.
In still another exemplary embodiment, the detection of an unauthorized NFC tag 204 can be made through an integrated RFID interrogation system, such as with NFC controller 322. As discussed previously, the antenna 218 of the security system can encompass the perimeter of the display 200, for example inside frame 202, so as to protect the entire surface of the display 200 and region around the display 200. The NFC controller 322 can execute an NFC (or RFID, as desired) inventory function to check for the presence of unauthorized tags 204. The inventory function can determine the quantity and identification codes of NFC tags 204 in proximity to the energized antenna coil 218. Upon detection of an unauthorized tag 204, the security system 300 can disable the unauthorized tag 204 by reading the unique identification code of the tag and executing a kill function to the unauthorized tag 204, as described in previous exemplary embodiments.
In yet another exemplary embodiment, the security system 300 can include an RF or NFC radio detection system that can scan for local emissions of RF energy in the 13.56 MHz frequency band. Such scanning may be accomplished through the use of NFC controller 322, an RFID controller or any other component with the desired scanning or interrogating capabilities. The system may then compare the detection of emissions above specified signal strength with timing of interrogations of the intended and authorized tag 214. RF or NFC emissions may then be analyzed by the security system 300 to determine if a user in proximity of the display 200 is reading an unauthorized tag 204. Statistical information about the presence and nature of the emissions can then be used to alert maintenance personnel to the potential presence of unauthorized tags 204.
The foregoing description and accompanying figures illustrate the principles, preferred embodiments and modes of operation of the invention. However, the invention should not be construed as being limited to the particular embodiments discussed above. Additional variations of the embodiments discussed above will be appreciated by those skilled in the art.
Therefore, the above-described embodiments should be regarded as illustrative rather than restrictive. Accordingly, it should be appreciated that variations to those embodiments can be made by those skilled in the art without departing from the scope of the invention as defined by the following claims.
The present application claims the benefit of U.S. Provisional Patent Application No. 61/715,426 filed Oct. 18, 2012, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
1331136 | Woodjard | Feb 1920 | A |
5083111 | Drucker et al. | Jan 1992 | A |
5485291 | Qiao | Jan 1996 | A |
5641219 | Mizobe | Jun 1997 | A |
5720123 | Taylor | Feb 1998 | A |
5841350 | Appalucci et al. | Nov 1998 | A |
5867017 | Merwin et al. | Feb 1999 | A |
5921674 | Koczi | Jul 1999 | A |
5944405 | Takeuchi | Aug 1999 | A |
5945938 | Chia et al. | Aug 1999 | A |
5947578 | Ayres | Sep 1999 | A |
6142375 | Belka et al. | Nov 2000 | A |
6144264 | Wen | Nov 2000 | A |
6246778 | Moore | Jun 2001 | B1 |
6744367 | Forster | Jun 2004 | B1 |
6771256 | Abraham et al. | Aug 2004 | B1 |
6786626 | Wu | Sep 2004 | B2 |
6838989 | Mays et al. | Jan 2005 | B1 |
6839035 | Addonisio et al. | Jan 2005 | B1 |
6851999 | Fong | Feb 2005 | B2 |
6965205 | Piepgras et al. | Nov 2005 | B2 |
7012544 | Cunningham et al. | Mar 2006 | B2 |
7046160 | Pederson et al. | May 2006 | B2 |
7064498 | Dowling et al. | Jun 2006 | B2 |
7084769 | Bauer et al. | Aug 2006 | B2 |
7086587 | Myllymaki | Aug 2006 | B2 |
7086769 | Thompson et al. | Aug 2006 | B1 |
7098794 | Lindsay | Aug 2006 | B2 |
7109986 | Kerr et al. | Sep 2006 | B2 |
7167106 | Hasse | Jan 2007 | B2 |
7202838 | Kerr et al. | Apr 2007 | B2 |
7304577 | Waldner | Dec 2007 | B2 |
7375650 | Lo | May 2008 | B2 |
7377421 | Rhoads | May 2008 | B2 |
7378973 | Dixon | May 2008 | B2 |
7477152 | Forster | Jan 2009 | B2 |
7490054 | Reade et al. | Feb 2009 | B2 |
7492346 | Manabe | Feb 2009 | B2 |
7495576 | Maskeny et al. | Feb 2009 | B2 |
7515149 | Kerr et al. | Apr 2009 | B2 |
7564426 | Poor | Jul 2009 | B2 |
7600906 | Chon | Oct 2009 | B2 |
7654723 | Chang | Feb 2010 | B2 |
7670020 | Chang | Mar 2010 | B2 |
7695165 | Chang | Apr 2010 | B2 |
7722172 | Silverbrook | May 2010 | B2 |
7722241 | Chang | May 2010 | B2 |
7737858 | Matityaho | Jun 2010 | B2 |
7750810 | Rudolf et al. | Jul 2010 | B2 |
7752790 | Daryl et al. | Jul 2010 | B1 |
7756467 | Bent et al. | Jul 2010 | B2 |
7810983 | Chang | Oct 2010 | B2 |
7817045 | Onderko | Oct 2010 | B2 |
7845823 | Mueller | Dec 2010 | B2 |
7850341 | Mrakovich | Dec 2010 | B2 |
7868778 | Kenwright | Jan 2011 | B2 |
7876101 | Lee | Jan 2011 | B2 |
7903103 | Osterberg et al. | Mar 2011 | B2 |
7920050 | Juels | Apr 2011 | B2 |
7959326 | Laporte | Jun 2011 | B2 |
7961097 | Porte et al. | Jun 2011 | B2 |
7979026 | Hulvey | Jul 2011 | B2 |
8014722 | Abel | Sep 2011 | B2 |
8018345 | Xiang | Sep 2011 | B2 |
8068011 | Sajadi | Nov 2011 | B1 |
8102797 | Abel | Jan 2012 | B2 |
8112066 | Ayed | Feb 2012 | B2 |
8117445 | Werner | Feb 2012 | B2 |
8126505 | Tulloch | Feb 2012 | B2 |
8242893 | Lin | Aug 2012 | B1 |
8249935 | DiMartino et al. | Aug 2012 | B1 |
8321922 | Lo et al. | Nov 2012 | B1 |
8326991 | Diaz et al. | Dec 2012 | B2 |
8332272 | Fisher | Dec 2012 | B2 |
8469269 | Daily et al. | Jun 2013 | B2 |
8474700 | Lewis | Jul 2013 | B1 |
8638228 | Amigo et al. | Jan 2014 | B2 |
8655286 | Mendolia | Feb 2014 | B2 |
8937531 | Rimai | Jan 2015 | B2 |
8961306 | LeMay | Feb 2015 | B2 |
9024763 | Hamedani | May 2015 | B2 |
9108434 | Tsirline et al. | Aug 2015 | B2 |
9894468 | Brown et al. | Feb 2018 | B2 |
20020030992 | Lefebvre | Mar 2002 | A1 |
20020036622 | Jaeger | Mar 2002 | A1 |
20020154633 | Shin | Oct 2002 | A1 |
20020159246 | Murasko et al. | Oct 2002 | A1 |
20020186133 | Loof | Dec 2002 | A1 |
20020190845 | Moore | Dec 2002 | A1 |
20030029918 | Leanheart et al. | Feb 2003 | A1 |
20030034985 | Needham Riddle | Feb 2003 | A1 |
20030115096 | Reynolds | Jun 2003 | A1 |
20040012486 | Mani | Jan 2004 | A1 |
20040183742 | Goff et al. | Sep 2004 | A1 |
20040220860 | Persky et al. | Nov 2004 | A1 |
20050017071 | Noonan | Jan 2005 | A1 |
20050186902 | Lieffort et al. | Aug 2005 | A1 |
20050207823 | Adams et al. | Sep 2005 | A1 |
20050280631 | Wong et al. | Dec 2005 | A1 |
20060028822 | Tanamachi | Feb 2006 | A1 |
20060032926 | Baba et al. | Feb 2006 | A1 |
20060066453 | Homanfar et al. | Mar 2006 | A1 |
20060071778 | Vesikivi et al. | Apr 2006 | A1 |
20060080819 | McAllister | Apr 2006 | A1 |
20060090384 | Woodruff | May 2006 | A1 |
20060160488 | Sueoka et al. | Jul 2006 | A1 |
20060214794 | Wang | Sep 2006 | A1 |
20060215958 | Yeo | Sep 2006 | A1 |
20060230276 | Nochta | Oct 2006 | A1 |
20060261938 | Lai | Nov 2006 | A1 |
20060261950 | Arneson et al. | Nov 2006 | A1 |
20060266824 | Hassenbuerger | Nov 2006 | A1 |
20060273176 | Audebert et al. | Dec 2006 | A1 |
20060290501 | Hammad et al. | Dec 2006 | A1 |
20060293956 | Walker et al. | Dec 2006 | A1 |
20070008140 | Saarisalo et al. | Jan 2007 | A1 |
20070013479 | Goel et al. | Jan 2007 | A1 |
20070022294 | Lapstun | Jan 2007 | A1 |
20070029384 | Atherton | Feb 2007 | A1 |
20070029939 | Burkum et al. | Feb 2007 | A1 |
20070056871 | Griffiths | Mar 2007 | A1 |
20070057791 | Karjoth et al. | Mar 2007 | A1 |
20070075145 | Arendonk et al. | Apr 2007 | A1 |
20070090954 | Mahaffey | Apr 2007 | A1 |
20070120772 | Kim et al. | May 2007 | A1 |
20070135112 | Lessing | Jun 2007 | A1 |
20070145152 | Jogand-Coulomb et al. | Jun 2007 | A1 |
20070188483 | Bonner | Aug 2007 | A1 |
20070194879 | Backes | Aug 2007 | A1 |
20070215685 | Self | Sep 2007 | A1 |
20070229250 | Recker | Oct 2007 | A1 |
20070273951 | Ribi | Nov 2007 | A1 |
20070274242 | Lamacraft et al. | Nov 2007 | A1 |
20080022160 | Chakraborty | Jan 2008 | A1 |
20080040845 | Shoshan | Feb 2008 | A1 |
20080064346 | Charrat | Mar 2008 | A1 |
20080079582 | Alexis et al. | Apr 2008 | A1 |
20080094854 | Coleman | Apr 2008 | A1 |
20080100443 | Grunwald | May 2008 | A1 |
20080101400 | Auterinen | May 2008 | A1 |
20080117047 | Collins et al. | May 2008 | A1 |
20080132167 | Bent et al. | Jun 2008 | A1 |
20080136647 | Brown | Jun 2008 | A1 |
20080146148 | Hulvey | Jun 2008 | A1 |
20080150719 | Cote et al. | Jun 2008 | A1 |
20080162154 | Fein et al. | Jul 2008 | A1 |
20080183581 | Philippe Coppolani | Jul 2008 | A1 |
20080191878 | Abraham | Aug 2008 | A1 |
20080192932 | Graeber et al. | Aug 2008 | A1 |
20080219227 | Michaelis | Sep 2008 | A1 |
20080238610 | Rosenberg | Oct 2008 | A1 |
20080238706 | Kenwright | Oct 2008 | A1 |
20080248815 | Busch | Oct 2008 | A1 |
20080251582 | Nguyen | Oct 2008 | A1 |
20080255960 | Nguyen | Oct 2008 | A1 |
20080258875 | Jesrne et al. | Oct 2008 | A1 |
20080262928 | Michaelis | Oct 2008 | A1 |
20080276507 | Hines | Nov 2008 | A1 |
20080300985 | Shamp et al. | Dec 2008 | A1 |
20080309463 | Godzwon et al. | Dec 2008 | A1 |
20090081943 | Dobyns et al. | Mar 2009 | A1 |
20090085746 | Ericikson et al. | Apr 2009 | A1 |
20090088077 | Brown et al. | Apr 2009 | A1 |
20090088229 | Hammad et al. | Apr 2009 | A1 |
20090102748 | Stoyer et al. | Apr 2009 | A1 |
20090115614 | Bertin | May 2009 | A1 |
20090118006 | Kelly | May 2009 | A1 |
20090146814 | Hammad et al. | Jun 2009 | A1 |
20090168441 | Lin | Jul 2009 | A1 |
20090174556 | Horne | Jul 2009 | A1 |
20090189816 | Nikiti | Jul 2009 | A1 |
20090192937 | Griffin et al. | Jul 2009 | A1 |
20090193500 | Griffin | Jul 2009 | A1 |
20090197551 | Paraskake | Aug 2009 | A1 |
20090212919 | Selgrath et al. | Aug 2009 | A1 |
20090221240 | Zhang | Sep 2009 | A1 |
20090257242 | Wendman | Oct 2009 | A1 |
20090258678 | Chava et al. | Oct 2009 | A1 |
20090282859 | Glielmo et al. | Nov 2009 | A1 |
20090292816 | Etchegoyen | Nov 2009 | A1 |
20090297157 | Nakagawa | Dec 2009 | A1 |
20090315670 | Naressi | Dec 2009 | A1 |
20100009627 | Huomo | Jan 2010 | A1 |
20100012715 | Williams et al. | Jan 2010 | A1 |
20100026464 | Graeber | Feb 2010 | A1 |
20100030636 | Vijayshankar et al. | Feb 2010 | A1 |
20100046198 | Hoffman | Feb 2010 | A1 |
20100066508 | Jokinen et al. | Mar 2010 | A1 |
20100066561 | Ulrich et al. | Mar 2010 | A1 |
20100075666 | Garner | Mar 2010 | A1 |
20100079416 | Chung et al. | Apr 2010 | A1 |
20100082444 | Lin et al. | Apr 2010 | A1 |
20100082485 | Lin | Apr 2010 | A1 |
20100085774 | Park | Apr 2010 | A1 |
20100107463 | Spiro | May 2010 | A1 |
20100123553 | Banerjee et al. | May 2010 | A1 |
20100141452 | Lian et al. | Jun 2010 | A1 |
20100148964 | Broer | Jun 2010 | A1 |
20100148965 | Alexis et al. | Jun 2010 | A1 |
20100161410 | Tulloch | Jun 2010 | A1 |
20100161434 | Herwig et al. | Jun 2010 | A1 |
20100172149 | Siemiet | Jul 2010 | A1 |
20100174599 | Rosenblatt et al. | Jul 2010 | A1 |
20100176971 | Banerjee et al. | Jul 2010 | A1 |
20100188842 | Yohananoff | Jul 2010 | A1 |
20100211431 | Lutnick et al. | Aug 2010 | A1 |
20100216396 | Fernandez et al. | Aug 2010 | A1 |
20100217709 | Aabye | Aug 2010 | A1 |
20100221999 | Braun et al. | Sep 2010 | A1 |
20100231362 | Smith et al. | Sep 2010 | A1 |
20100241494 | Kumar et al. | Sep 2010 | A1 |
20100255865 | Karmarkar | Oct 2010 | A1 |
20100262449 | Monteforte et al. | Oct 2010 | A1 |
20100265041 | Almog et al. | Oct 2010 | A1 |
20100269383 | Nifenecker | Oct 2010 | A1 |
20100271839 | Chan | Oct 2010 | A1 |
20100274859 | Bucuk | Oct 2010 | A1 |
20100275265 | Fiske | Oct 2010 | A1 |
20100282849 | Mair | Nov 2010 | A1 |
20100290251 | Wang | Nov 2010 | A1 |
20100294835 | Bam et al. | Nov 2010 | A1 |
20100303230 | Taveau | Dec 2010 | A1 |
20100306076 | Taveau | Dec 2010 | A1 |
20100306819 | Nahari | Dec 2010 | A1 |
20100311326 | Klabunde et al. | Dec 2010 | A1 |
20110000971 | Onderko | Jan 2011 | A1 |
20110047463 | Shepherd et al. | Feb 2011 | A1 |
20110047759 | Reiter | Mar 2011 | A1 |
20110065383 | Frankland | Mar 2011 | A1 |
20110084814 | Ramsch | Apr 2011 | A1 |
20110112918 | Mestré | May 2011 | A1 |
20110112920 | Mestré | May 2011 | A1 |
20110114735 | Ziai et al. | May 2011 | A1 |
20110149596 | Lv et al. | Jun 2011 | A1 |
20110156640 | Moshfeghi | Jun 2011 | A1 |
20110165859 | Wengrovitz | Jul 2011 | A1 |
20110185607 | Forster | Aug 2011 | A1 |
20110187558 | Serex | Aug 2011 | A1 |
20110191478 | Eischeid et al. | Aug 2011 | A1 |
20110195748 | Main et al. | Aug 2011 | A1 |
20110211344 | Harbers | Sep 2011 | A1 |
20110225421 | Han et al. | Sep 2011 | A1 |
20110227487 | Nichol | Sep 2011 | A1 |
20110227507 | Salm | Sep 2011 | A1 |
20110228517 | Kawabat | Sep 2011 | A1 |
20110234379 | Sang Hoon Lee | Sep 2011 | A1 |
20110235318 | Simon | Sep 2011 | A1 |
20110238995 | Blanco | Sep 2011 | A1 |
20110258443 | Barry | Oct 2011 | A1 |
20110276961 | Johansson et al. | Nov 2011 | A1 |
20110287718 | Abel | Nov 2011 | A1 |
20110295108 | Cox | Dec 2011 | A1 |
20110307309 | Forster | Dec 2011 | A1 |
20110320291 | Coon | Dec 2011 | A1 |
20110320314 | Brown | Dec 2011 | A1 |
20110320345 | Taveau | Dec 2011 | A1 |
20120001725 | Chen | Jan 2012 | A1 |
20120013448 | Baranowski | Jan 2012 | A1 |
20120024951 | Graeber | Feb 2012 | A1 |
20120029990 | Fisher | Feb 2012 | A1 |
20120032632 | Soar | Feb 2012 | A1 |
20120039472 | Liu | Feb 2012 | A1 |
20120059741 | Khan et al. | Mar 2012 | A1 |
20120061465 | Luo | Mar 2012 | A1 |
20120072979 | Cha | Mar 2012 | A1 |
20120075148 | Cho | Mar 2012 | A1 |
20120083205 | Marcu et al. | Apr 2012 | A1 |
20120089845 | Raleigh | Apr 2012 | A1 |
20120126700 | Mayfield et al. | May 2012 | A1 |
20120154633 | Rodriguez | Jun 2012 | A1 |
20120156992 | Walker et al. | Jun 2012 | A1 |
20120218084 | Arponen et al. | Aug 2012 | A1 |
20120253974 | Haikonen et al. | Oct 2012 | A1 |
20120256494 | Kesler | Oct 2012 | A1 |
20120265596 | Mazed | Oct 2012 | A1 |
20120265682 | Menon | Oct 2012 | A1 |
20120278676 | Teraura | Nov 2012 | A1 |
20120309302 | Buhot | Dec 2012 | A1 |
20130006847 | Hammad et al. | Jan 2013 | A1 |
20130045679 | Orsatti | Feb 2013 | A1 |
20130063008 | Martin | Mar 2013 | A1 |
20130106576 | Hinman | May 2013 | A1 |
20130157713 | Stolarczyk | Jun 2013 | A1 |
20130165041 | Bukovjan et al. | Jun 2013 | A1 |
20130173455 | Adams et al. | Jul 2013 | A1 |
20130176184 | Dokai et al. | Jul 2013 | A1 |
20130309965 | Hillan | Nov 2013 | A1 |
20130342323 | Hinman | Dec 2013 | A1 |
20130344805 | Lefley | Dec 2013 | A1 |
20140009268 | Oshima | Jan 2014 | A1 |
20140070850 | Darwhekar et al. | Mar 2014 | A1 |
20140113551 | Krishnan et al. | Apr 2014 | A1 |
20140145823 | Aase | May 2014 | A1 |
20140152856 | Ikeda | Jun 2014 | A1 |
20140229251 | Lim | Aug 2014 | A1 |
20140252083 | Lee | Sep 2014 | A1 |
20150140929 | Lefley | May 2015 | A1 |
20150334521 | Lee | Nov 2015 | A1 |
20160283759 | Forster | Sep 2016 | A1 |
20170012355 | Pachler et al. | Jan 2017 | A1 |
Number | Date | Country |
---|---|---|
PI0611910 | Feb 2011 | BR |
101253750 | Aug 2008 | CN |
201302803 | Sep 2009 | CN |
102217410 | Oct 2011 | CN |
1127469 | Jul 2003 | EP |
1914631 | Apr 2008 | EP |
2143991 | Jan 2010 | EP |
1948995 | Apr 2010 | EP |
1792272 | Oct 2010 | EP |
2237519 | Oct 2010 | EP |
2296025 | Mar 2011 | EP |
2309431 | Apr 2011 | EP |
2371110 | May 2011 | EP |
2366937 | Sep 2011 | EP |
2783960 | Mar 2000 | FR |
2006011422 | Jan 2006 | JP |
2006030882 | Feb 2006 | JP |
2006058435 | Mar 2006 | JP |
2006349887 | Dec 2006 | JP |
2007034362 | Feb 2007 | JP |
2002162918 | Jun 2007 | JP |
20100072115 | Jun 2010 | KR |
2006031824 | Mar 2006 | WO |
2006095212 | Sep 2006 | WO |
2006098765 | Sep 2006 | WO |
2006111782 | Oct 2006 | WO |
2007002459 | Jan 2007 | WO |
2007035835 | Mar 2007 | WO |
2007064069 | Jun 2007 | WO |
2008034937 | Mar 2008 | WO |
2008063706 | May 2008 | WO |
2008087431 | Jul 2008 | WO |
2008132269 | Nov 2008 | WO |
WO-2008142455 | Nov 2008 | WO |
2009028203 | Mar 2009 | WO |
2010077194 | Jul 2010 | WO |
2010095988 | Aug 2010 | WO |
2010148816 | Dec 2010 | WO |
2011010970 | Jan 2011 | WO |
2011020041 | Feb 2011 | WO |
2011033424 | Mar 2011 | WO |
2011053914 | May 2011 | WO |
2011088190 | Jul 2011 | WO |
2011094384 | Aug 2011 | WO |
2011109092 | Sep 2011 | WO |
WO-2011112778 | Sep 2011 | WO |
2011121488 | Oct 2011 | WO |
2012037255 | Mar 2012 | WO |
Entry |
---|
Antoniou, Zoe, “NFC-Based Mobile Middleware for Intuitive User Interaction With Security in Smart Homes”, Proc. of the 5th IASTED International Conference on Communication Systems and Networks (CSN'06), Aug. 28-30, 2006, Palma De Mallorca, Spain, Track 543-038, 6 pgs. |
Ongtang, Machigar, et al., “Semantically Rich Application-Centric Security in Android”, Security and Communication Networks, vol. 5, Issue 6, Jun. 2012, 658-673. |
Becher, Michael, et al., “Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices”, 2011 IEEE Symposium on Security and Privacy, 96-111. |
Broll, Gregor, et al., “Touch to Play—Exploring Touch-Based Mobile Interaction with Public Displays”, 3rd International Workshop on Near Field Communication, Feb. 22, 2011, 15-20. |
Chai, Qi, “Design and Analysis of Security Schemes for Low-cost RFID Systems”, Doctor of Philosophy Thesis in Electrical and Computer Engineering, University of Waterloo, Ontario, Canada, 2012, 184 pgs. |
Cheng, Hsu-Chen, et al., “A Secure and Practical Key Management Mechanism for NFC Read-Write Mode”, J. Computational Information Systems, 7:11, (2011), 3819-3828. |
Cheng, Jerry, et al., “SmartSiren: Virus Detection and Alert for Smartphones”, MobiSys'07, Jun. 11-14, 2007, San Juan, Puerto Rico, 258-271. |
Choi, Kwanghoon, et al., “A Secure Application Invocation Mechanism in Mobile Phones for Near Field Communication”, 2012 IEEE International Conference on Consumer Electronics (ICCE), Jan. 2012, 731-732. |
Coppolino, Luigi, et al., “A Trusted Information Agent for Security Information and Event Management”, ICONS 2012: The Seventh International Conference on Systems, 6-12. |
Francis, Lishoy, et al., “Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones”, The 6th Workshop on RFID Security (RFIDSec 2010), Istanbul, Turkey (LNCS), Jun. 7-9, 2010, 35-49. |
Francis, Lishoy, et al., “Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones”, In Cryptology ePrint Archive, Report 2011/618, Nov. 2011, 16 pgs. |
Hancke, G. P., et al., “Security Challenges for User-Oriented RFID Applications within the ‘Internet of Things’”, J. Internet Technology, vol. 11, No. 3, 2010, 307-313. |
Hardy, Robert, et al., “Touch & Interact: Touch-based Interaction of Mobile Phones with Displays”, MobileHCI 2008, Proc. 10th international conference on Human computer interaction with mobile devices and services, 245-254. |
Haselsteiner, Ernst, et al., “Security in Near Field Communication (NFC): Strengths and Weaknesses”, Proceedings of the Workshop on RFID Security (RFIDSec), Graz, Austria, Jul. 12-14, 2006, 11 pgs. |
Husni, Emir, et al., “Efficient Tag-to-Tag Near Field Communication (NFC) Protocol for Secure Mobile Payment”, 2nd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), Bandung, Indonesia, Nov. 8-9, 2011, 97-101. |
Juels, Ari, et al., “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy”, 8th ACM Conference on Computer and Communications Security, 103-111, ACM Press, 2003. |
Kazmi, Hammad Raza, “Security and Privacy Issues in Near Field Communication (NFC) Systems”,Master Thesis, Royal Institute of Technology, Sweden, Apr. 2011, 59 pgs. |
Kfir, Ziv, et al., “Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems”, Proceeding of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Sep. 5-9, 2005, 47-58. |
Kortvedt, Henning Siitonen, “Securing Near Field Communication”, Norwegian University of Science and Technology, Dept. of Telematics, Master Thesis, Jun. 2009, 135 pgs. |
Kuppusamy, K. S., et al., “A Model for Remote Access and Protection of Smartphones Using Short Message Service”, International J. Computer Science, Engineering and Information Technology (IJCSEIT), vol. 2, No. 1, (Feb. 2012), 91-100. |
Long, Men, et al., “Human Perceivable Authentication: An Economical Solution for Security Associations in Short-Distance Wireless Networking”, Proceedings of 16th International Conference on Computer Communications and Networks, Aug. 13-16, 2007, 257-264. |
Madlmayr, Gerald, et al., “NFC Devices: Security & Privacy”, Proceedings of the 3rd International Conference on Availability, Reliability and Security, Barcelona, Spain, Mar. 7, 2008, 13 pgs. |
Mulliner, Collin, “Attacking NFC Mobile Phones”, 25th Chaos Communication Congress, Berlin, Germany, Dec. 2008, 71 pgs. |
Mulliner, Collin, “Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones”, 2009 International Conference on Availability, Reliability and Security, Fukuoka, Japan, Mar. 16-19, 2009, 695-700. |
Anonymous, “Near-field communications will be standard technology for mobiles”, Electronics Weekly, (Feb. 21, 2007), p. 8. |
“NFC Record Type Definition (RTD)”, Technical Specification NFC Forum, RTD 1.0, NFCForum-TS-RTD_1.0, (Jul. 24, 2006), 20 pgs. |
Opoku, Samuel King, “Performance Enhancement of Large-Size NFC Multi-Touch System”, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), (Oct. 2011), 52-57. |
“Radio Frequency Identification (RFID): A Focus on Information Security and Privacy”, OECD Digital Economy Papers, No. 138, Jan. 14, 2008, 11-81. |
Rahnama, Behnam, et al., “Securing RFID-Based Authentication Systems Using ParseKey+”, Proceedings of the 3rd International Conference on Security of Information and Networks, Taganrog, Russia, Sep. 7-11, 2010, 212-217. |
Roland, Michael, et al., “Digital Signature Records for the NFC Data Exchange Format”, Second International Workshop on Near Field Communication, Monaco, Apr. 20, 2010, 71-76. |
Roland, Michael, et al., “Security Vulnerabilities of the NDEF Signature Record Type”, 2011 Third International Workshop on Near Field Communication, Hagenberg, Austria, Feb. 22, 2011, 65-70. |
Rose, Chris, “Close Contact: An Examination of the Future of Near Field Communications”, International J. Management & Information Systems, First Quarter 2012, vol. 16, No. 1, 95-100. |
“South Korea Telecommunications Report Included BMI's Forecasts”, Q2 2012, Business Monitor International Ltd., (Apr. 2012), 94 pgs. |
Välkkynen, Pasi, et al., “Suggestions for Visualizing Physical Hyperlinks”, PERMID 2006: Pervasive Mobile Interaction Devices—Mobile Devices as Pervasive User Interfaces and Interaction Devices, Dublin, Ireland, May 7, 2006, 245-254. |
“AN1445: Antenna design guide for MFRC52x, PN51x and PN53x, Rev.1.2, Document AN1445_12”, NXP B.V., (Oct. 11, 2010), 65 pgs. |
“Radio-Frequency-IDentific@tion, http://rfid-handbook.com/”, advertisement (Dec. 2, 2011), 5 pgs. |
A Near Field Communication Tool for Building Intelligent Environment using Smart Posters, International Journal of Computers and Communications, Issue 1, vol. 4, 2010, Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, and Miguel Angel Gomez-Nieto. |
A Pervasive Presentator—Simplifying the Task of Presenting, Lulea University of Technology; Viktor Lindgren, Mattias Lundberg, Elias Naslund, John Viklund (2012). |
A System of Secure Virtual Coupons Using NFC Technology, IEEE Computer Society, CompProceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops 2007 (PerComW'07); Manfred Aigner, Sandra Dominikus, Martin Feldhofer. |
Amato-McCoy, Deena M. Crime stoppers: by focusing their loss prevention efforts on the entire enterprise, grocers are in a better position to combat internal and external theft. Grocery Headquarters, v77, n. 11, p. 101 (3). Nov. 2011. |
Application of Near Field Communication for Health Monitoring in Daily Life; Esko Strommer, Jouni Kaartenen, Juha Parkka, Arto Ylisauko-oja, Ilkka Korhonen; Proceedings of the 28th IEEE EMBS Annual International Conference New York City, USA, Aug. 30-Sep. 3, 2006. |
Bauer-Reich,C., et al. “Low-profile, high-permeability antennaless RFID tags for use on metal objects”, Proceedings of the 2012 IEEE International Workshop on Antenna Technology (iWAT), (Mar. 5-7, 2012), 32-35. |
Bling: NFC Arrives in U.S., Sam Churchill, Oct. 27, 2010, http://www.dailywireless.org/2010/10/27/bling-nfc-arrives-in-u-s/. |
Bovelli, S., “A Novel Antenna Design for Passive RFID Transponders on Metal Surfaces”, Proceedings of the 36th European Microwave Conference, Manchester, UK (Sep. 2006), 580-582. |
Cavoukian, A., “Mobile Near Field Communications (NFC)—“Tap'n Go”—Keep it Secure & Private”, Information and Privacy Commissioner, Ontario, Canada / Privacy by Design (Nov. 2011), 22 pgs. |
Christian Metzger et al: “Making Radio Frequency Indentificaiton Visible—A Watchdog Tag”, Fifth Annual IEEE International Conference on pervasive computing and communications workshops, Mar. 19-23, 2007. |
Christianson, B., et al. (eds.), “Security Protocols”, 13th International Workshop, Revised Selected Papers, Cambridge, UK, (Apr. 20-22, 2005), Lecture Notes in Computer Science, 4631, Springer-Verlag, Berlin, 354 pgs. |
Cole, P.H., et al., Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting, First Edition, Springer-Verlag, Berlin (2003), 350 pgs. |
Connecting the Mobile Phone with the Internet of Things—Benefits of EPC and NFC Compatibility; Thomas J.P. Wiechert, Florian Michahelles, 2007. |
Do you talk to each poster? Security and Privacy for Interactions with Web Service by means of Contact Free Tag Readings, Peter Schoo, Massimo Paolucci, Feb. 24, 2009 First International Workshop on Near Field Communication. |
Dodson, B., et al., “Micro-Interactions with NFC-Enabled Mobile Phones”, Proceedings of the Third International Conference on Mobile Computing, Applications, and Services (MobiCASE), Los Angeles, CA, Oct. 2011. Retrieved from the Internet: <URL: http://mobisocial.stanford.edu/papers/mobicase11.pdf >, 20 pgs. |
Elliptic Curve Certificates and Signatures for NFC Signature Records, Reasearch in Motion, Certicom Research, Jan. 1, 2011, Tony Rosati, Greg Zaverucha. |
Enabling RFID in Retail, George Roussos, Birkbeck, University of London, IEEE Computer Society, Mar. 2006. |
Encrypted NFC emergency tags based on the German Telematics Infrastructure, 2011 Third International Workshop on Near Field Communication, Sebastian Dunnebeil, Felix Kobler, Philip Koene, Helmut Kremar, Jan Marco Leimeister. |
Enhancing Authentication in eBanking with NFC enabled mobile phones, Aug. 11, 2008, Diego Alejandro Ortiz-Yepes. |
Enhancing Security and Usability Features of NFC, 2009; Beygo, Omer Kerem; Eraslan, Cihan. |
European Search Report dated Nov. 25, 2016 for European Application No. EP16002075 filed Sep. 26, 2016. |
Finkenzeller, K., “Known attacks on RFID systems, possible countermeasures and upcoming standardization activities”, presentation slides, RFID—Systech, Bremen, Germany, Jun. 2009. Retrieved from the Internet: <URL: http://rfidhandbook. de/downloads/Finkenzeller_Systech-Bremen-2009_v1.0.pdf>, 31 pgs. |
Gebhart, M, et al., “Design of 13.56 MHz Smartcard Stickers with Ferrite for Payment and Authentication”, Proceedings of the 2011 3rd International Workshop on Near Field Communication (NFC), Feb. 21-22, 2011. Retrieved from the Internet: <URL: https://online.tugraz.at/tug_online/voe_main2.getVollText?pDocumentNr=202812&pCurrPk=59398>, 6 pgs. |
Ghanname, Taoufik. How NFC can to speed Bluetooth transactions—today. Eetimes. Feb. 14, 2006. Retrieved at http://eetimes.com/General/PrintView/4012606. |
Hancke, G.P., “Practical Eavesdropping and Skimming Attacks on High-Frequency RFID Tokens”, Preprint version of article published in Journal of Computer Security. vol. 19, Issue 2. (Jun. 2010). Retrieved from the Internet: <URL: http://www.rfidblog.org.uk/Hancke-JoCSSpecialRFIDJune2010.pdf>, 23 pgs. |
Hancke, G.P., “Security of proximity identification systems”, Technical Report, No. 752, University of Cambridge Computer Laboratory, UK (Jul. 2009), 161 pgs. |
Hend S. Al-Khalifa: “Utilizing QR Code and Mobile Phones for Blinds and Visually Impaired People”, copyright 2008. |
Hinske, S., et al., “RFIDice—Augmenting Tabletop Dice with RFID”, Journal of Virtual Reality and Broadcasting, vol. 5, No. 4, (2008), 12 pgs. |
International Preliminary Report on Patentability and Written Opinion dated Apr. 21, 2015 for International Application PCT/US13/031448 filed Mar. 14, 2013. |
International Preliminary Report on Patentability and Written Opinion dated Jul. 31, 2012 for International Application PCT/US11/022680 filed Jan. 27, 2011. |
International Preliminary Report on Patentability and Written Opinion dated Jul. 31, 2012 for International Application PCT/US11/022687 filed Jan. 27, 2011. |
International Preliminary Report on Patentability and Written Opinion dated Mar. 4, 2014 for International Application PCT/US12/053322 filed Aug. 31, 2012. |
International Preliminary Report on Patentability and Written Opinion dated Mar. 10, 2015 for International Application PCT/US12/031136 filed Mar. 14, 2013. |
International Preliminary Report on Patentability and Written Opinion dated May 19, 2015 for International Application PCT/US12/031131 filed Mar. 14, 2013. |
International Search Report dated Aug. 20, 2013 for International Application PCT/US13/031131 filed Mar. 14, 2013. |
International Search Report dated Aug. 6, 2013 for International Application PCT/US13/031448 filed Mar. 14, 2013. |
International Search Report dated Mar. 11, 2011 for International Application PCT/US11/022687 filed Jan. 27, 2011. |
International Search Report dated Mar. 8, 2011 for International Application PCT/US11/022680 filed Jan. 27, 2011. |
International Search Report dated May 22, 2013 for International Application PCT/US12/031136 filed Mar. 14, 2013. |
International Search Report dated Nov. 21, 2012 for International Application PCT/US12/053322 filed Aug. 31, 2012. |
Johnansson, B., “An Introduction to RFID—Information Security and Privacy Concerns”, TDDC03 Projects, (Spring 2004), 14 pgs. |
Jung, M, et al., “All-Printed and Roll-to-Roll Printable 13.56-MHz-Operated 1-bit RF Tag on Plastic Foils”, IEEE Transactions on Electron Devices, (Feb. 19, 2010), 10 pgs. |
Kuo, S., “A performance evaluation method for EMI sheet of metal mountable HR RFID tag”, Measurement, 44 (2011), 946-953. |
LocaTag—An NFC-based system enhancing instant messaging tools with real-time user location; Kobler, Philip Koene, Helmut Kremar, Matthias Altmann, Jan Marco Leimeister, Apr. 20, 2010 Second International Workshop on Near Field Communication. |
Location-Triggered Code Execution-Dismissing Displays and Keypads for Mobile Interaction; W. Narzt and H. Schmitzberger, C. Stephanidis (Ed.): Universal Access in HCI, Part II, HCII 2009, LNCS 5615, pp. 374-383, 2009. © Springer-Verlag Berlin Heidelberg 2009. |
Media Clips: Implementation of an Intuitive Media Linker; Seunghyun Yoon, Kyuyun Lee, Hyunchang Shin, Samsung Electronics, 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) held Jun. 8-10, 2011. |
Mitrokotsa, A., et al., “Classification of RFID Attacks”, Proceedings of the 2nd International Workshop on RFID Technology—Concepts, Applications, Challenges (IWRT 2008), in conjunction with the 10th International Conference on Enterprise Information Systems, pp. 73-86, Barcelona, Spain, Jun. 2008. INSTICC Press, Portugal. Retrieved from the Internet: <URL: http://www.cs.vu.nl/˜ast/publications/iwrt-2008.pdf>. |
Mobile Personal Devices meet Situated Public Displays: Synergies and Opportunities; Alan Dix, Corina Sas (2010). International Journal of Ubiquitous Computing (IJUC), 1(1), pp. 11-28. http://www.hcibook.com/alan/papers/MPD-SPD-2010/. |
Near Field Communication in Smartphones, Simon Burkard, Berlin Institute of Technology, Germany, 2012. |
Near Field Communications Handbook, vol. 13 of Internet and Communications, 2009; Mohammad Ilyas. |
Newport Digital Technologies to Implement Microsoft Licensing Agreement; Prepares to Launch First Ruggedized RFID Reader with Windows Mobile Operating System. Business Wire Oct. 20, 2009. |
NFC and Mobile Payments Today, Andre Filipe de Axevedo Figueiredo Cruz, Nov. 2011. |
NFC Data Exchange Format (NDEF), Technical Specification, NDEF 1.0, Jul. 24, 2006. |
NFC Forum Type Tags, White Paper V1.0, Apr. 1, 2009—Public. |
NFC Mobile Parlor Games Enabling Direct Player to Player Interaction, 2011 Third International Workshop on Near Field Communication, Avinash Nandwani, Paul Coulton, Reuben Edwards. |
NFC-Based Mobile Interactions with Direct-View Displays; Khoovirajsingh Seewoonauth, Enrico Rukzio, Robert Hardy, and Paul Holleis, IFIP Conference on Human-Computer Interaction—INTERACT 2009 pp. 835-838. |
NFC-CAP Securty Assessment, vol. 1.0—May 11, 2009; Diego A. Ortiz-Yepes. |
Oren, Y., “Attacks on RFID-Based Electronic Voting System”, Cryptology ePrint Archive Report 2009/442 (2009). Retrieved from the Internet: <URL: http://eprint.iacr.org/2009/422.pdf>, 21 pgs. |
Physical browsing with NFC technology; Heikki Ailisto, Tapio Matinmikko, Juha Haikio, Arto Ylisaukko-oja, Esko Strommer, Mika Hillukkala, Arto Wallin, Erkki Siira, Aki Poyry, Vili Tormanen, Tua Huomo, Tuomo Tuikka, Sonja Leskinen & Jarno Salonen, Espoo May 2007. VTT Tiedotteita—Research Notes 2400. |
Programming Android; Zigurd Mednieks, Laird Domin, G. Blake Meike, Masumi Nakamura, O'Reilly Media, Inc., 2011, http://books.google.co.in/books?id=5BGBswAQSiEC&lpg=PR5&ots=xSfgivFwS&dq=rogue%20NFC%20active%20tags%20url%20phone%20peer%20to%20peer&lr&pg=PA397#. |
QR Code Tech Info: MECARD Format, May 2, 2011. |
QRFactory, Redirectable QR, http://dashboard.qrfactory.com/, pulled from the internet Apr. 27, 2012. |
RFID based applications in culture, media and creative industries, 2011 Third International Workshop on Near Field Communication, Eileen Kuehn, Jens Reinhardt, Stephan Bergemann, Prof. Dr. Juergen Sieck. |
RFID Inventory Management System. Package Printing, v57 n2, pp. 34. Feb. 2010. |
Rieback, M.R., et al., “A Platform for RFID Security and Privacy Administration”, Proceedings of the 20th USENIX/SAGE Large Installation System Administration conference (LISA 2006), Washington D.C., (Dec. 2006). Retrieved from the Internet: <URL: http://www.rfidguardian.org/images/a/a9/Lisa.06.pdf>, 14 pgs. |
Rieback, M.R., et al., “The Evolution of RFID Security”, Pervasive Computing (Jan.-Mar. 2006), 62-69. |
Sabzevar, A.P., “Security in RFID Systems” Project report for GMU ECE 646 (2004). Retrieved from the Internet: <URL: http://teal.gmu.edu/courses/ECE646/project/reports_2004/SP-4_report.pdf>, 13 pgs. |
Sarma, S.E., et al., “RFID Systems and Security and Privacy Implications”, CHES 2002, LNCS 2523, B.S. Kaliski Jr. et al. (Eds.) (2003), pp. 454-469, 2003. |
Secure contactless mobile financial services with Near Field Communication; Adeola Oluwaseyi Poroye, Aug. 2011. |
Simple NDEF Exchange Protocol, Technical Specification, NFC Forum SNEP 1.0, Aug. 31, 2011. |
Situated Door Displays and how to interact with them, Barbara Schmid, Jan. 16, 2012. |
Smart Poster Record Type Definition Technical Specific MFC Forum TM SPR 1.1 NFCForum-SmartPoster_RTD_1.0, Jul. 24, 2006. |
Suh, J., “Introduction to composite electromagnetic noise absorber technology” EMC Directory & Design Guide, (2007), 4 pgs. |
Switching the role of NFC tag and reader for the implementation of Smart Posters, 2012 4th International Workshop on Near Field Communication; Dirk Volland, Kay Noyen, Onur Kayikei, Lukas Ackermann, Florian Michahelles. |
Thamilarasu G et al: “Intrusion detection in RFID systems”, Military Communications Conference, 2008, pp. 1-7. |
The “Weak Spots” in Stacked UHF RFID Tags in NFC Applications, IEEE RFID 2010; Xiaosheng Chen, Feng Lu, Terry T.Ye*. |
The Junction Protocol for Ad Hoc Peer-to-Peer Mobile Applications; Computer Science Department Stanford University; Ben Dodson, Aemon Cannon, Te-Yuan Huang, Monica S. Lam, Apr. 2011. |
The Mobile Phone as Digital SprayCan; Philip Garner, Omer Rashid, Paul Coulton, and Reuben Edwards, Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology Article No. 12, Hollywood, California, USA—Jun. 14-16, 2006. |
Touch-driven Interaction Between Physical Space and Cyberspace with NFC, Longbio Chen, Gang Pan, Shijian Li, Department of Computer Science, Zhejiang University Hangzhou, China, 2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing. |
Turcu, C. (ed.), Development and Implementation of RFID Technology, In-Teh, I-Tech Education and Publishing KG, Vienna, Austria (Feb. 2009), 564 pgs. |
Type 1 Tag Operation Specification, Technical Specification, Technical Specification, NFC Forum T1TOP 1.1, Apr. 13, 2011. |
Type 2 Tag Operation Specification Technical Specification, T2TOP 1.1 NFC Forum May 31, 2011. |
Type 3 Tag Operation Specification, Technical Specification, Technical Specification, NFC Forum, T3TOP 1.1, Jun. 28, 2011. |
Varshney, L.R., et al.., “Securing Inductively-Coupled Communication”, Information Theory and Applications Workshop (ITA) (Feb. 5-10, 2012), 6 pgs. |
Vidano, R., “13.56-MHz Inductively Coupled Card Compatibility to Conducting Surfaces”, Proceedings of Asia-Pacific Microwave Conference (2007), 4 pgs. |
Violino, Bob. A Summary of RFID Standards. RFID Standards. RFID Journal. Jan. 16, 2005. URL at http://www.rfidjournal.com/articles/view?135. |
Wang, J.J.H., “Spiral Antennas in RFID and Their Size Reduction and Performance Enhancement”, 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification (Apr. 16-18, 2007), 44-47. |
Wegleiter, H. et al., “Automatic Antenna Tuning Unit to Improve RFID System Performance”, IEEE Transactions on Instrumentation and Measurement, vol. 60, No. 8,(Aug. 2011), 2797-2803. |
Weis, Stephen A, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, Security in Pervasive Computing 2003, LNCS 2802, D. Flutter et al. (Eds.) (2004) 201-212. |
Yamada, I., et al., “Secure Active RFID Tag System”, Ubicomp2005 Workshops, 5 pgs. |
Zhu, H., et al., “Solutions of Metal Surface Effect for HF RFID Systems”, 2007 International Conference on Wireless Communications, Networking and Mobile Computing (WiCom), (Sep. 21-25, 2007), 2089-2092. |
Number | Date | Country | |
---|---|---|---|
20160283759 A1 | Sep 2016 | US |
Number | Date | Country | |
---|---|---|---|
61715426 | Oct 2012 | US |