NFC tags with proximity detection

Information

  • Patent Grant
  • 10970496
  • Patent Number
    10,970,496
  • Date Filed
    Wednesday, August 28, 2019
    4 years ago
  • Date Issued
    Tuesday, April 6, 2021
    2 years ago
Abstract
Systems, apparatuses and methods provide for detecting the proximate placement of an external NFC reader to a specific location on a display surface. The display surface can be intended for viewing indicia and enabling interaction with an NFC communication device embedded within the display. A circuit can control an NFC security system that can scan for unauthorized tags affixed to the surface of a display. The NFC security system may be activated by an NFC enabled mobile phone placed proximate to the indicated region for receiving an NFC coded message from the display. An NFC security scan can be performed prior to the mobile phone reading the message from the intended NFC tag in the display. Enabling interactive display modes can allow for making selections indicated on the display or detecting motion gestures across the face of the display.
Description
BACKGROUND OF THE INVENTION

Radio frequency identification (RFID) devices, including near field communication (NFC) enabled RFID devices, are utilized for a variety of purposes. Often such devices are formed as tags or labels and can be utilized to associate an object with an identification code or other data, such as website data. Such RFID devices may be passive and, upon receiving a signal, such as an excitation signal from an RFID or NFC-enabled reader, may be energized. The devices can then respond with a desired communication or provide information associated with a product, item or service associated with the RFID device.


Specifically, NFC is a data exchange protocol designed to allow devices, including suitably equipped mobile phones and the like, to interact with infrastructures, such as point of sale terminals and ticket gates on transportation systems, or RFID devices in the forms of “smart posters” or “touchpoints”, for example. In such situations, bringing an NFC enabled device into proximity of such infrastructure or RFID devices can cause the transmission of data to the NFC enabled device, resulting in, for example, the opening of a web page, the acceptance of a media stream via Bluetooth or any of a number of other functions.


Often the manner of associating a product, item or service with an RFID device is to physically couple or adhere the RFID device to the product or item, or associate it with advertising relating to the product, item or service, such as the “smart poster” or “touchpoint” described above. For example, RFID labels may be coupled adhesively to objects or may otherwise have surfaces that attach directly to objects. RFID tags may be secured to object in other manners, such as through the use of a plastic fastener, string or other fastening mechanism. Such RFID devices may then provide data to NFC enabled devices located or placed proximate the RFID devices.


Additionally, RFID devices are often associated with the product or item, or advertising item, in such a manner as to conceal or secure the RFID device. Such methods can provide security against the removal or misuse of an RFID device. However, in such circumstances, and particularly with NFC enabled devices designed to convey information to consumers with NFC enabled mobile phones and devices, there is a designated area (touchpoint) on an advertisement or product that indicates information can be obtained if the NFC enabled device is placed in close proximity to an area associated with the RFID device. However, as it is then known that information can be obtained from such areas, vandal or pirate RFID devices are often placed in close proximity to the indicated NFC area. The vandal or pirate devices often contain deceptive, misleading, undesired or malicious information. These devices can be coupled with or adhered to products and items, or advertisements associated with those items, leading to inappropriate or malicious information being unknowingly communicated to a user's NFC-enabled device.


In normal operation, mobile phones that have enabled NFC functions operate in NFC reader/writer mode. In this mode, the mobile phone transmits an NFC tag query consisting of modulated magnetic field pulses at a carrier frequency of 13.56 MHz. The NFC reader in the mobile phone has no prior indication that an NFC tag is proximate to the phone until an NFC tag responds to a query. Therefore, an external NFC reader such as a mobile phone will consistently transmit NFC interrogation queries until an NFC tag is detected.


SUMMARY

NFC detector circuit systems, apparatuses and methods may provide for detecting the proximate placement of an external NFC reader to a specific location on a display surface. The display surface may be intended for viewing indicia and enabling interaction with an NFC communication device embedded within the display.


In an exemplary embodiment, a circuit may control an NFC security system that scans for unauthorized tags affixed to the surface of a display. The NFC security system may be activated by an NFC enabled mobile phone placed proximate to the indicated region for receiving an NFC coded message from the display. An NFC security scan may be performed prior to the mobile phone reading the message from the intended NFC tag in the display.


Other exemplary embodiments may include enabling interactive display modes, for example, for making selections indicated on the display or detecting motion gestures across the face of the display. Such interaction may be useful for configuring the contents of the NFC tag based upon a specific user interaction.





BRIEF DESCRIPTION OF THE DRAWINGS

Advantages of embodiments of the present invention will be apparent from the following detailed description of the exemplary embodiments. The following detailed description should be considered in conjunction with the accompanying figures in which:



FIG. 1 is a schematic view of an exemplary embodiment of an NFC detector circuit.



FIG. 1A illustrates a display contemplated by the present invention having an authorized NFC tag as well as an unauthorized NFC tag.



FIG. 2 is a schematic view of an exemplary embodiment of an NFC detector for controlling the illumination of Light Emitting Diodes (LEDs) integrated into an NFC reading zone.



FIG. 3 is a schematic view of an exemplary embodiment of an NFC for activating an NFC security security system when an external NFC reader is placed proximate to an NFC reading zone that contains an NFC tag.



FIG. 4 is a schematic view of an exemplary embodiment of an NFC detector for activating the NFC security security system when an external NFC reader is placed close to an inductive coil.



FIG. 5 is a schematic view of an exemplary embodiment of an NFC detector incorporating a counter circuit recording the number of instances that an external NFC reader is placed proximate to a receiving inductive coil of an NFC detector.



FIG. 6 is an exemplary flowchart showing an order of operations for an NFC security system.





DETAILED DESCRIPTION

Aspects of the invention are disclosed in the following description and related drawings directed to specific embodiments of the invention. Alternate embodiments may be devised without departing from the spirit or the scope of the invention. Additionally, well-known elements of exemplary embodiments of the invention will not be described in detail or will be omitted so as not to obscure the relevant details of the invention. Further, to facilitate an understanding of the description discussion of several terms used herein follows.


As used herein, the word “exemplary” means “serving as an example, instance or illustration.” The embodiments described herein are not limiting, but rather are exemplary only. It should be understood that the described embodiments are not necessarily to be construed as preferred or advantageous over other embodiments. Moreover, the terms “embodiments of the invention”, “embodiments” or “invention” do not require that all embodiments of the invention include the discussed feature, advantage or mode of operation.


Generally referring to FIGS. 1-6, exemplary embodiments disclosed herein may describe NFC security systems, sometimes referred to as NFC Watch Dog systems. In some exemplary embodiments, queries transmitted by the external NFC reader in reader/writer mode can be used to sense when a mobile phone is placed proximate to a specific location on a display surface using NFC detector circuitry.


An exemplary NFC security system may include an NFC reader, a security controller 111 and an inductive coil with impedance matching circuits. Functions of an NFC security system may be to detect unauthorized tags, disable such tags and alert maintenance personnel of a problem.


The detection of unauthorized tags 216 may be achieved by an NFC reader component transmitting NFC interrogation commands to an inductive coil of a detector. The inductive coil may distribute magnetic energy over the surface of the display that is being interrogated for unauthorized tags. A security controller 111 of an exemplary NFC security system may not perform interrogation on a constant basis, so that it may not interfere with a communication channel of an external NFC reader and an NFC device such as an NFC tag. The security controller 111 may activate reading on regular intervals or conditionally upon the state of a signal line, such as from another controller or sensor. The NFC detector of the detector circuit may be configured to send a signal to the NFC security system when a phone is placed proximate a specific location on the surface of a display.


Exemplary embodiments may require less complex circuit design than other solutions utilizing an NFC reader circuit. In some exemplary embodiments, the major elements of the NFC detector circuit may include an inductive receiver coil, an RF demodulator and a threshold detector. The NFC detector circuit may not decode the data signal of an external NFC reader in order to detect its proximate placement on a display surface. Additionally, the NFC detector circuit may be designed only for receiving RF signals and may not transmit RF signals, unlike an NFC reader. As such, multiple NFC detectors or detector circuits may be integrated into a display system without interfering with a communication channel of an external NFC reader or an intended NFC communication device such as an NFC tag.


In an exemplary embodiment, a display may include two or more NFC detector circuits positioned apart over the display surface so that users may indicate choices using placement of the mobile phone based on display indicia. For example, if a user of the display places an external reader such as a mobile phone directly over one of the NFC detectors of a detector circuit, then the display may indicate the user's selection, such as departure information. In the same example, a mobile phone placed over another NFC detector may indicate arrival information is being desired. Once a selection has been made by the user, the NFC tag memory may be formatted with the appropriate NDEF message, which in this example may include a link to either the arrival or departure information.


In another exemplary embodiment, a display may include multiple NFC detectors embedded over a surface. The display system may detect when the user moves the mobile phone along a path recognized by the display system, which may be referred to as a gesture, such as, for example, following a circular path along display indicia. When a gesture is recognized by the display system, a custom NFC message may be prepared for the user, which may be read by the NFC enabled mobile phone.


Exemplary embodiments may reduce power consumption in systems that utilize the NFC detector to control the active state of NFC transceivers, such as NFC readers and NFC peer-to-peer mode devices. An internal NFC reader 212A used in the NFC security system may want to transmit enough power to interrogate unauthorized tags that could be affixed to the display. The power for the interrogation function may be up to 4 watts, depending on the desired operating range and size of the transmitting NFC coil. Utilizing an NFC detector to control the active state of an NFC reader may reduce power consumption, for example by limiting interrogation functions to necessary conditions, such as when an external NFC reader is brought close to the display.


Additionally, utilizing the NFC detector for lower power consumption may enable a display system to operate from battery power instead of a main connection. In an exemplary embodiment, the display system may use a battery as backup power for situations in which the main power has been interrupted.


In another exemplary embodiment, the NFC detector may control operating modes of an NFC peer-to-peer mode reader, which may function to transmit NFC messages via Simple NDEF Exchange Protocol (SNEP) to the external NFC reader. In this exemplary embodiment, the display system may be battery powered, which may require that the peer-to-peer reader be activated only when an external NFC reader is present.


Referring now to exemplary FIG. 1, a schematic view of an exemplary embodiment of an NFC detector circuit may be shown. The elements of the detector circuit may include a near field inductive receiver coil 102 with impedance matching element 104, a demodulator 106, and a threshold detector 108.


The inductive receiver coil 102 may include a distributed inductor adapted to be receptive to alternating magnetic fields in the vicinity of the coil. The capacitor 104 may form an impedance matching circuit between the inductive receiver coil 102 and a transmission line 110, such as, for example, a 50 ohm transmission line.


The impedance matching circuit may be adapted to enable a low loss transmission of signal energy between the inductive receiving coil 102 and the transmission line 110, which may be connected to other circuits of the NFC detector.


The capacitor 104 in FIG. 1 is only one exemplary embodiment of an impedance matching circuit; other circuit configurations may be possible which may, for example, increase the bandwidth across the frequency band but require the use of more complex circuitry for implementing the impedance matching circuit. Such impedance matching circuits may include any impedance matching circuit known in the art.


In this exemplary embodiment, when an external NFC reader is proximate to the NFC detector of the detector circuit, an RF signal on transmission line 110 may be received by the demodulator circuit 106 for recovery of the original data signal without an RF carrier wave. The demodulator 106 in FIG. 1 can be a diode envelope detector, used, for example, because of relatively simple circuit and low power consumption. However, if better signal discrimination or input filtering is desired, any other demodulator circuit known in the art may be implemented with the associated design trade-off in circuit complexity and power consumption. The output signal of the demodulator 106 may include DC voltage pulses 116 which may travel via the transmission line 112 to the threshold detector circuit 108.


The threshold detector circuit 108 may drive a two state output signal, normally in the “disabled” state, to the “enabled” state when the output voltage from the demodulator exceeds the “enabled” or high threshold voltage point. Separating the high and low threshold levels of the threshold detector 108 may form a hysteresis function, such that the “enabled” output state cannot be reset back to the “disabled” state, until the input voltage is lower than the “disabled” threshold voltage point. As such, the output state of the threshold detector may not oscillate if the input voltage oscillates around either voltage threshold point. The threshold detector 108 in exemplary FIG. 1 can be a low power Schmitt trigger circuit. The Schmitt trigger circuit may be utilized as it is a well-documented circuit commonly used in many circuit applications; therefore the design and implementation of a Schmitt trigger is not described in detail here. However, other threshold detectors known in the art may be implemented, as desired. The output of threshold detector 108 may drive the two state output signal through the transmission line 114 to digital output circuits for the host system 118. The digital output 118 to the host system may be implemented with necessary circuitry to buffer or latch the output state of the NFC detector for immediate or later use by the host system input circuitry.



FIG. 1A of the present invention illustrates a display 212 having both an authorized NFC tag 218 and an unauthorized tag 216. The present invention contemplates that the internal NFC reader 212A of the detector circuit 302 detects an unauthorized tag 216 applied to the display 212 and creates a signal in order to disable the unauthorized tag 216.



FIG. 2 is a schematic view of an exemplary embodiment of an NFC detector of a detector circuit that may control the illumination of Light Emitting Diodes (LEDs) integrated into an NFC reading zone. The circuit may be adapted to indicate to the user that the external NFC reader device 214 has been placed in a proper or desired region for reading the intended NFC tag. The inductive element of the NFC detector and the LEDs may be located proximate to the NFC reading zone. Other circuit elements may not have critical placement with respect to the display surface and may be placed where best suited or desired. The NFC detector 202 in the exemplary circuit may drive the voltage of the control line 220 to either the “enabled” state value when an external NFC reader is proximate to the NFC detector, or to the “disabled” state value when no external NFC reader is proximate to the detector. The LED driver circuit 204 may adjust the voltage and current source on line 222 relative to ground 210 to the appropriate condition to illuminate the LEDs 206 and 208 inside the display located near the NFC reading zone.



FIG. 3 is a schematic view of an exemplary embodiment of an NFC detector of a detector circuit that may activate an NFC security system when an external NFC reader, such as a mobile phone, is placed proximate to an NFC reading zone that contains an NFC tag. The NFC detector circuit 302 may drive the line 310 with an output voltage level signifying the “enabled” state to the security system 304. Upon sensing the “enabled” state voltage on the wakeup control line 310, the security system may perform an NFC inventory command with an internal NFC reader 212A. The internal NFC reader 212A may transmit NFC air protocol commands through the cable 312 to the matching network 308 and then to the transmitting coil 306. If the security system discovers an unauthorized tag, then appropriate actions may be taken, such as, for example, disabling the tag or sending a help request to maintenance personnel. When the NFC security function is complete, the system may transition to a sleep mode for minimal power consumption. Subsequently, the NFC detector circuit may remain idle for a specified time, to allow the external NFC reader to transfer contents of the authorized NFC tag without interference from the NFC security system.



FIG. 4 is a schematic view of an exemplary embodiment of an NFC detector that may activate the NFC security system when an external NFC reader, such as a mobile phone, is placed close to a common inductive coil 408. The inductive coil may include a common element to both the detector and the security system. The use of a common coil may be such that each circuit establishes an exclusive connection to the cable 412 that connects to the common coil 408. A “detect” state and a “security” state may be used for selecting a connection to a common NFC coil 408. The initial and nominal state for the system may be the “detect” state. When the display system is in the “detect” state, the NFC detector circuit may have priority control of the common NFC coil 408, while the security system may be disconnected from the common coil 408 and configured to a low power sleep mode. The NFC detector may continually monitor for signals from an external NFC reader, such as a mobile phone. Upon detecting a signal from an external reader, the system may transition to the “security” state. In the “security” state, the NFC detector may disconnect from the common NFC coil 408 by open circuiting the connection to the cable 412. The NFC detector may then drive the voltage of the wake up line 406 to the “enabled” state. The security system may detect the “enabled” state of the wake up line 406 and may transition to the “security” state. Upon transitioning to the “security” state, the security system may connect the common NFC coil 408 by switching the circuit connection of the system to cable 412 from an open circuit to a short circuit. The security system may then issue NFC inventory commands to the common coil 408 to check for unauthorized tags affixed to the display. If unauthorized tags are affixed to the display, the security system may perform actions such as attempting to disable the unauthorized tag or signaling a request for maintenance personnel to remove the unauthorized tag. Upon completion of the security operation, the security system may open the circuit connection to cable 412, may signal to the NFC detector that the security mode is complete, and may then transition to the low power operating state. The system state may then be returned to a “detect” mode. Upon switching from “security” state to “detect” state, the NFC detector circuit may remain idle for a specified time to allow the external NFC reader to transfer the contents of the authorized NFC tag without interference from the NFC security system.



FIG. 5 is a schematic view of an exemplary embodiment of an NFC detector 502 that may incorporate a counter circuit 504 that may record the number of instances that an external NFC reader, such as a mobile phone, is placed proximate to a receiving inductive coil of an NFC detector. The stored value of the counter circuit may be used, for example, to determine metrics for the effectiveness of the display. The signal line 510 may be routed to other functions 506 that sense the state of the NFC detector output signal. The other functions 506 may include, for example, an NFC security system or an interactive display system as described above.



FIG. 6 is an exemplary flow chart describing aspects of the NFC security system. In this exemplary embodiment, time 602 may represent any time after an NFC security system is implemented and/or triggered. The system can include sensors 604 which work to detect any undesired or rogue NFC signals. Thus, if sensors 604 are active and do not detect any rogue signals, the system may go into sleep 606 mode. If sensors 604 are active and detect a rogue signal, a desired response action 610 may be taken. The response action can include blocking the rogue signal or destroying the rogue device. If the action 610 is successful, the system can return to sleep 606 mode. If the action is unsuccessful, the system may try to take the desired action 610 again, or a signal may be dispatched to appropriate personnel. As can be appreciated by the above, any other courses of action using other components may also be utilized.


The foregoing description and accompanying figures illustrate the principles, preferred embodiments and modes of operation of the invention. However, the invention should not be construed as being limited to the particular embodiments discussed above. Additional variations of the embodiments discussed above will be appreciated by those skilled in the art.


Therefore, the above-described embodiments should be regarded as illustrative rather than restrictive. Accordingly, it should be appreciated that variations to those embodiments can be made by those skilled in the art without departing from the scope of the invention as defined by the following claims.

Claims
  • 1. A method of implementing a NFC security system comprising: providing a display, the display having a NFC security system having a security controller, an NFC reader, an inductive coil, and at least one detector;placing an external NFC reader near the display to read at least one NFC tag;triggering the system;detecting a rogue signal from at least one unauthorized NFC tag; anddetermining an action for disabling the at least one unauthorized NFC tag.
  • 2. The method of claim 1, where the action is generating an alarm to remove the unauthorized NFC tag.
  • 3. The method of claim 1, wherein the method further comprises blocking the rogue signal from the unauthorized NFC tag after the step of detecting.
  • 4. The method of claim 1, wherein the method further comprises destroying a rogue device after the step of determining.
  • 5. The method of claim 1, wherein the method comprising the further step of failing to detect at least one rogue signal, such that the system enters a sleep mode.
  • 6. The method of claim 1, wherein the at least one detector is positioned apart over a surface of the display.
  • 7. The method of claim 1, wherein the at least one detector is embedded in the display.
  • 8. The method of claim 1, wherein the NFC reader of the display transmits enough power to interrogate unauthorized tags.
  • 9. The method of claim 1, wherein the inductive coil includes a common element to both the at least one detector and the NFC security system.
  • 10. The method of claim 9, wherein the common element is a common coil.
  • 11. The method of claim 1, further comprising taking the action again if the action is unsuccessful.
  • 12. The method of claim 1, wherein the external NFC reader is a mobile phone.
  • 13. The method of claim 1, wherein the inductive coil comprises impedance matching circuits.
  • 14. The method of claim 1, wherein the system further comprises at least one sensors.
  • 15. The method of claim 1, wherein the security controller activated reading conditionally upon a state of a signal line.
  • 16. The method of claim 15, wherein the signal line is routed to functions that sense the state of a NFC detector output signal.
CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a division application of U.S. Utility patent application Ser. No. 15/679,616 filed Aug. 17, 2017, which is a division of U.S. Utility patent application Ser. No. 13/803,041 filed Mar. 14, 2013 patented as U.S. Pat. No. 9,767,329 on Sep. 19, 2017, each of which claims the benefit of U.S. Provisional Patent Application No. 61/727,907 filed Nov. 19, 2012, each of which is incorporated herein by reference in its entirety.

US Referenced Citations (339)
Number Name Date Kind
1331136 Woodjard Feb 1920 A
5083111 Drucker et al. Jan 1992 A
5485291 Qiao Jan 1996 A
5609059 McEwan Mar 1997 A
5641219 Mizobe Jun 1997 A
5648613 Kiefer Jul 1997 A
5648643 Kiefer Jul 1997 A
5720123 Taylor Feb 1998 A
5841350 Appalucci et al. Nov 1998 A
5867017 Merwin et al. Feb 1999 A
5921674 Koczi Jul 1999 A
5944405 Takeuchi Aug 1999 A
5945938 Chia et al. Aug 1999 A
5947578 Ayres Sep 1999 A
6142375 Belka et al. Nov 2000 A
6144264 Wen Nov 2000 A
6246778 Moore Jun 2001 B1
6744367 Forster Jun 2004 B1
6771256 Abraham et al. Aug 2004 B1
6786626 Wu Sep 2004 B2
6838989 Mays et al. Jan 2005 B1
6839035 Addonisio et al. Jan 2005 B1
6851999 Fong Feb 2005 B2
6965205 Piepgras et al. Nov 2005 B2
7012544 Cunningham et al. Mar 2006 B2
7046160 Pederson et al. May 2006 B2
7064498 Dowling et al. Jun 2006 B2
7084769 Bauer et al. Aug 2006 B2
7086587 Myllymaki Aug 2006 B2
7086769 Thompson et al. Aug 2006 B1
7098794 Lindsay Aug 2006 B2
7109986 Kerr et al. Sep 2006 B2
7167106 Hasse Jan 2007 B2
7202838 Kerr et al. Apr 2007 B2
7304577 Waldner Dec 2007 B2
7375650 Lo May 2008 B2
7377421 Rhoads May 2008 B2
7378973 Dixon May 2008 B2
7477152 Forster Jan 2009 B2
7490054 Reade et al. Feb 2009 B2
7492346 Manabe Feb 2009 B2
7495576 Maskeny et al. Feb 2009 B2
7515149 Kerr et al. Apr 2009 B2
7564426 Poor Jul 2009 B2
7600906 Chon Oct 2009 B2
7654723 Chang Feb 2010 B2
7670020 Chang Mar 2010 B2
7695165 Chang Apr 2010 B2
7722172 Silverbrook May 2010 B2
7722241 Chang May 2010 B2
7737858 Matityaho Jun 2010 B2
7750810 Ritter et al. Jul 2010 B2
7752790 Michael et al. Jul 2010 B1
7756467 Bent et al. Jul 2010 B2
7810983 Chang Oct 2010 B2
7817045 Onderko Oct 2010 B2
7845823 Mueller Dec 2010 B2
7850341 Mrakovich Dec 2010 B2
7868778 Kenwright Jan 2011 B2
7876101 Lee Jan 2011 B2
7903103 Osterberg et al. Mar 2011 B2
7920050 Juels Apr 2011 B2
7959326 Laporte Jun 2011 B2
7961097 Porte et al. Jun 2011 B2
7979026 Hulvey Jul 2011 B2
8014722 Abel et al. Sep 2011 B2
8018345 Xiang Sep 2011 B2
8068011 Sajadi et al. Nov 2011 B1
8102797 Abel Jan 2012 B2
8112066 Ayed Feb 2012 B2
8117445 Werner et al. Feb 2012 B2
8126505 Gill Feb 2012 B2
8237562 Picasso Aug 2012 B1
8242893 Lin Aug 2012 B1
8249935 DiMartino et al. Aug 2012 B1
8321922 Lo et al. Nov 2012 B1
8326991 Diaz et al. Dec 2012 B2
8332272 Fisher Dec 2012 B2
8469269 Daily et al. Jun 2013 B2
8474700 Lewis et al. Jul 2013 B1
8520695 Rubin et al. Aug 2013 B1
8638228 Amigo et al. Jan 2014 B2
8655286 Mendolia Feb 2014 B2
8750514 Gallo et al. Jun 2014 B2
8842102 Forster et al. Sep 2014 B2
8880055 Clement Nov 2014 B1
8937531 Rimai et al. Jan 2015 B2
8961306 LeMay et al. Feb 2015 B2
9024763 Hamedani May 2015 B2
9108434 Tsirline et al. Aug 2015 B2
9124442 McCormack Sep 2015 B2
9698872 Haverinen Jul 2017 B2
9767329 Forster Sep 2017 B2
9894468 Brown et al. Feb 2018 B2
10402598 Forster Sep 2019 B2
10540527 Forster Jan 2020 B2
10616207 Robison Apr 2020 B2
20020030992 Lefebvre Mar 2002 A1
20020036622 Jaeger et al. Mar 2002 A1
20020154633 Shin Oct 2002 A1
20020159246 Murasko et al. Oct 2002 A1
20020186133 Loof Dec 2002 A1
20020190845 Moore Dec 2002 A1
20030029918 Leanheart et al. Feb 2003 A1
20030034985 Needham Riddle Feb 2003 A1
20030115096 Reynolds Jun 2003 A1
20040012486 Mani Jan 2004 A1
20040183742 Goff et al. Sep 2004 A1
20040220860 Persky et al. Nov 2004 A1
20050017071 Noonan Jan 2005 A1
20050186902 Lieffort et al. Aug 2005 A1
20050207823 Adams et al. Sep 2005 A1
20050280631 Wong et al. Dec 2005 A1
20060028822 Tanamachi Feb 2006 A1
20060032926 Baba et al. Feb 2006 A1
20060066453 Homanfar et al. Mar 2006 A1
20060071778 Vesikivi et al. Apr 2006 A1
20060080819 McAllister Apr 2006 A1
20060090384 Woodruff May 2006 A1
20060160488 Sueoka et al. Jul 2006 A1
20060214794 Wang Sep 2006 A1
20060215958 Yeo et al. Sep 2006 A1
20060230276 Nochta Oct 2006 A1
20060261938 Lai Nov 2006 A1
20060261950 Arneson et al. Nov 2006 A1
20060266824 Hassenbueger Nov 2006 A1
20060273176 Audebert et al. Dec 2006 A1
20060287964 Brown Dec 2006 A1
20060290501 Hammad et al. Dec 2006 A1
20060293956 Walker et al. Dec 2006 A1
20070008140 Saarisalo et al. Jan 2007 A1
20070013479 Goel et al. Jan 2007 A1
20070022294 Lapstun et al. Jan 2007 A1
20070029384 Atherton Feb 2007 A1
20070029939 Burkum et al. Feb 2007 A1
20070056871 Griffiths et al. Mar 2007 A1
20070057791 Karjoth et al. Mar 2007 A1
20070075145 Arendonk et al. Apr 2007 A1
20070090954 Mahaffey Apr 2007 A1
20070120772 Kim et al. May 2007 A1
20070135112 Lessing Jun 2007 A1
20070145152 Jogand-Coulomb et al. Jun 2007 A1
20070188483 Bonner Aug 2007 A1
20070194879 Backes et al. Aug 2007 A1
20070215685 Self et al. Sep 2007 A1
20070229250 Recker Oct 2007 A1
20070273951 Ribi Nov 2007 A1
20070274242 Lamacraft Nov 2007 A1
20080022160 Chakraborty Jan 2008 A1
20080040845 Shoshan Feb 2008 A1
20080064346 Charrat Mar 2008 A1
20080079582 Alexis et al. Apr 2008 A1
20080094854 Coleman Apr 2008 A1
20080100443 Grunwald et al. May 2008 A1
20080101400 Auterinen May 2008 A1
20080117047 Collins et al. May 2008 A1
20080132167 Bent et al. Jun 2008 A1
20080136647 Brown Jun 2008 A1
20080146148 Hulvey Jun 2008 A1
20080150719 Cote et al. Jun 2008 A1
20080162154 Fein et al. Jul 2008 A1
20080167000 Wentker et al. Jul 2008 A1
20080183581 Coppolani Jul 2008 A1
20080191878 Abraham Aug 2008 A1
20080192932 Graeber et al. Aug 2008 A1
20080219227 Michaelis Sep 2008 A1
20080238610 Rosenberg Oct 2008 A1
20080238706 Kenwright Oct 2008 A1
20080248815 Busch Oct 2008 A1
20080251582 Nguyen Oct 2008 A1
20080255960 Nguyen Oct 2008 A1
20080258875 Jesme et al. Oct 2008 A1
20080262928 Michaelis Oct 2008 A1
20080276507 Hines Nov 2008 A1
20080300985 Shamp et al. Dec 2008 A1
20080309463 Godzwon et al. Dec 2008 A1
20090081943 Dobyns et al. Mar 2009 A1
20090085746 Erickson et al. Apr 2009 A1
20090088077 Brown et al. Apr 2009 A1
20090088229 Hammad et al. Apr 2009 A1
20090102748 Stoyer et al. Apr 2009 A1
20090115614 Bertin May 2009 A1
20090118006 Kelly et al. May 2009 A1
20090146814 Hammad et al. Jun 2009 A1
20090168441 Lin Jul 2009 A1
20090174556 Horne et al. Jul 2009 A1
20090189816 Nikiti Jul 2009 A1
20090192937 Griffin et al. Jul 2009 A1
20090193500 Griffin Jul 2009 A1
20090197551 Paraskake Aug 2009 A1
20090212919 Selgrath et al. Aug 2009 A1
20090221240 Zhang Sep 2009 A1
20090257242 Wendman Oct 2009 A1
20090258678 Chava et al. Oct 2009 A1
20090267862 Roesner et al. Oct 2009 A1
20090282859 Glielmo et al. Nov 2009 A1
20090292816 Etchegoyen Nov 2009 A1
20090297157 Nakagawa Dec 2009 A1
20090315670 Naressi Dec 2009 A1
20100009627 Huomo Jan 2010 A1
20100012715 Williams et al. Jan 2010 A1
20100026464 Graeber Feb 2010 A1
20100030636 Vijayshankar et al. Feb 2010 A1
20100046198 Hoffman Feb 2010 A1
20100066508 Jokinen et al. Mar 2010 A1
20100066561 Ulrich et al. Mar 2010 A1
20100075666 Garner Mar 2010 A1
20100079416 Chung et al. Apr 2010 A1
20100082444 Lin et al. Apr 2010 A1
20100082485 Lin et al. Apr 2010 A1
20100085774 Park Apr 2010 A1
20100107463 Spiro May 2010 A1
20100123553 Banerjee et al. May 2010 A1
20100141452 Lian et al. Jun 2010 A1
20100148964 Broer Jun 2010 A1
20100148965 Alexis et al. Jun 2010 A1
20100161410 Tulloch Jun 2010 A1
20100161434 Herwig et al. Jun 2010 A1
20100172149 Siemiet et al. Jul 2010 A1
20100174599 Rosenblatt et al. Jul 2010 A1
20100176971 Banerjee et al. Jul 2010 A1
20100188842 Yohananoff Jul 2010 A1
20100211431 Lutnick et al. Aug 2010 A1
20100216396 Fernandez et al. Aug 2010 A1
20100217709 Aabye et al. Aug 2010 A1
20100221999 Braun et al. Sep 2010 A1
20100231362 Smith et al. Sep 2010 A1
20100241494 Kumar et al. Sep 2010 A1
20100255865 Karmarkar et al. Oct 2010 A1
20100262449 Monteforte et al. Oct 2010 A1
20100265041 Almog et al. Oct 2010 A1
20100269383 Nifenecker Oct 2010 A1
20100271839 Chan Oct 2010 A1
20100274859 Bucuk Oct 2010 A1
20100275265 Fiske Oct 2010 A1
20100282849 Mair Nov 2010 A1
20100290251 Wang Nov 2010 A1
20100294835 Bam et al. Nov 2010 A1
20100303230 Taveau et al. Dec 2010 A1
20100306076 Taveau Dec 2010 A1
20100306819 Nahari et al. Dec 2010 A1
20100311326 Klabunde et al. Dec 2010 A1
20110000971 Onderko Jan 2011 A1
20110029777 Murakami et al. Feb 2011 A1
20110047463 Shepherd et al. Feb 2011 A1
20110047759 Reiter Mar 2011 A1
20110065383 Frankland et al. Mar 2011 A1
20110084814 Ramsch Apr 2011 A1
20110112918 Mestre et al. May 2011 A1
20110112920 Mestre et al. May 2011 A1
20110114735 Ziai et al. May 2011 A1
20110149079 Anderson Jun 2011 A1
20110149596 Lv Jun 2011 A1
20110156640 Moshfeghi Jun 2011 A1
20110165859 Wengrowitz Jul 2011 A1
20110185607 Forster et al. Aug 2011 A1
20110187558 Serex Aug 2011 A1
20110191478 Eischeid et al. Aug 2011 A1
20110195748 Main et al. Aug 2011 A1
20110211344 Harbers Sep 2011 A1
20110225421 Han et al. Sep 2011 A1
20110227487 Nichol Sep 2011 A1
20110227507 Salm Sep 2011 A1
20110228517 Kawabat Sep 2011 A1
20110234379 Lee Sep 2011 A1
20110235318 Simon Sep 2011 A1
20110238995 Blanco Sep 2011 A1
20110121488 Sikkens Oct 2011 A1
20110244799 Roberts et al. Oct 2011 A1
20110258443 Barry Oct 2011 A1
20110276961 Johansson et al. Nov 2011 A1
20110285511 Maguire et al. Nov 2011 A1
20110287718 Abel Nov 2011 A1
20110295108 Cox et al. Dec 2011 A1
20110307309 Forster et al. Dec 2011 A1
20110320291 Coon Dec 2011 A1
20110320314 Brown Dec 2011 A1
20110320345 Taveau et al. Dec 2011 A1
20120001725 Chen Jan 2012 A1
20120011572 Chew et al. Jan 2012 A1
20120013448 Baranowski Jan 2012 A1
20120024951 Graeber Feb 2012 A1
20120029990 Fisher Feb 2012 A1
20120032632 Soar Feb 2012 A1
20120039472 Liu et al. Feb 2012 A1
20120055998 Mieslinger Mar 2012 A1
20120059741 Khan et al. Mar 2012 A1
20120061465 Luo Mar 2012 A1
20120072979 Cha Mar 2012 A1
20120075148 Cho Mar 2012 A1
20120083205 Marcu Apr 2012 A1
20120089845 Raleigh Apr 2012 A1
20120126700 Mayfield et al. May 2012 A1
20120135839 Watanabe et al. May 2012 A1
20120154633 Rodriguez Jun 2012 A1
20120156992 Walker et al. Jun 2012 A1
20120218084 Arponen et al. Aug 2012 A1
20120253646 Reghunath Oct 2012 A1
20120253974 Haikonen et al. Oct 2012 A1
20120256494 Kesler et al. Oct 2012 A1
20120265596 Mazed et al. Oct 2012 A1
20120265682 Menon Oct 2012 A1
20120278676 Teraura Nov 2012 A1
20120297204 Buer Nov 2012 A1
20120309302 Buhot Dec 2012 A1
20120315839 Mumcuoglu et al. Dec 2012 A1
20130006847 Hammad et al. Jan 2013 A1
20130045679 Orsatti et al. Feb 2013 A1
20130063008 Martin Mar 2013 A1
20130065523 Yun et al. Mar 2013 A1
20130106576 Hinman et al. May 2013 A1
20130157713 Stolarczyk Jun 2013 A1
20130165041 Bukovjan et al. Jun 2013 A1
20130173455 Adams Jul 2013 A1
20130176184 Dokai et al. Jul 2013 A1
20130309965 Hillan Nov 2013 A1
20130342323 Hinman et al. Dec 2013 A1
20130344805 Lefley Dec 2013 A1
20140009268 Oshima et al. Jan 2014 A1
20140070850 Darwhekar Mar 2014 A1
20140113551 Krishnan Apr 2014 A1
20140139347 Forster May 2014 A1
20140145823 Aase May 2014 A1
20140152856 Ikeda et al. Jun 2014 A1
20140227970 Brockenbrough Aug 2014 A1
20140229251 Lim et al. Aug 2014 A1
20140252083 Lee et al. Sep 2014 A1
20140370803 Haverinen Dec 2014 A1
20150140929 Lefley May 2015 A1
20150334521 Lee Nov 2015 A1
20160283759 Forster Sep 2016 A1
20170012355 Pachler et al. Jan 2017 A1
20170302335 Sawata Oct 2017 A1
20170344765 Forster Nov 2017 A1
20180049029 Kumar Feb 2018 A1
20190116173 Robison Apr 2019 A1
20190384948 Forster Dec 2019 A1
20200151402 Forster May 2020 A1
20200204539 Robison Jun 2020 A1
Foreign Referenced Citations (58)
Number Date Country
I0611910 Feb 2011 BR
1741862 Mar 2006 CN
101233753 Jul 2008 CN
101253750 Aug 2008 CN
201302803 Sep 2009 CN
102217410 Oct 2011 CN
102638446 Aug 2012 CN
102725785 Oct 2012 CN
0677887 Oct 1995 EP
1127469 Aug 2001 EP
1912437 Apr 2008 EP
1914631 Apr 2008 EP
2143991 Jan 2010 EP
1948995 Apr 2010 EP
2174457 Apr 2010 EP
1792272 Oct 2010 EP
2237519 Oct 2010 EP
2296025 Mar 2011 EP
2309431 Apr 2011 EP
2366937 Sep 2011 EP
2371110 Oct 2011 EP
2783960 Mar 2000 FR
2002162918 Jun 2002 JP
2006011422 Jan 2006 JP
2006030882 Feb 2006 JP
2006030883 Feb 2006 JP
2006058435 Mar 2006 JP
2006349887 Dec 2006 JP
2007034362 Feb 2007 JP
2007114924 May 2007 JP
20100072115 Oct 2017 KR
WO2006031824 Mar 2006 WO
WO2006095212 Sep 2006 WO
WO2006098765 Sep 2006 WO
2006111797 Oct 2006 WO
WO2006111782 Oct 2006 WO
WO2007002459 Jan 2007 WO
WO2007035835 Mar 2007 WO
WO2007064069 Jun 2007 WO
WO2008034937 Mar 2008 WO
WO2008063706 May 2008 WO
WO2008087431 Jul 2008 WO
WO2008132269 Nov 2008 WO
WO2008142455 Nov 2008 WO
WO2009028203 Mar 2009 WO
WO2010077194 Jul 2010 WO
WO2010095988 Aug 2010 WO
WO2010148816 Dec 2010 WO
WO2011010970 Jan 2011 WO
WO2011020041 Feb 2011 WO
WO2011033424 Mar 2011 WO
WO2011053914 May 2011 WO
WO2011088190 Jul 2011 WO
WO2011094384 Aug 2011 WO
WO2011109092 Sep 2011 WO
WO2011112778 Sep 2011 WO
WO2011121488 Oct 2011 WO
WO2012037255 Mar 2012 WO
Non-Patent Literature Citations (135)
Entry
International Preliminary Report on Patentability and Written Opinion dated Mar. 10, 2015 for International Application PCT/US12/031136 filed Mar. 14, 2013.
International Preliminary Report on Patentability and Written Opinion dated May 19, 2015 for International Application PCT/US12/031131 filed Mar. 14, 2013.
International Search Report dated Mar. 11, 2011 for International Application PCT/US11/022687 filed Jan. 27, 2011.
International Search Report dated Mar. 8, 2011 for International Application PCT/US11/022680 filed Jan. 27, 2011.
International Search Report dated May 22, 2013 for International Application PCT/US12/031136 filed Mar. 14, 2013.
Valvano, Jonathan W., Embedded System, 2009 (Year: 2009).
Partial European Search Report Dated Aug. 7, 2017 for European Application No. EP17000461 filed Mar. 21, 2017.
Domdouzie et al., Radio Frequency Identification (RFID) applications: A brief introduction, 2007, Elsevier, Advanced Engineering Inforatics vol. 21, pp. 351-355 (Year: 2007).
“AN1445: Antenna design guide for MFRC52x, PN51x and PN53x, Rev. 1.2, Document AN1445_12”, NXP B.V., (Oct. 11, 2010), 65 pgs.
“Radio-Frequency-Identific@tion, http://rfid-handbook.com”, advertisement (Dec. 2, 2011), 5pgs., RFID-Handbook 3rd edition, Wiley and Sons LTD, Kalus Finkenzeller.
“NEC Record Type Definition (RTD)”, Technical Specification NFC Forum, RTD 1.0, NFCForum-TS-RTD_1 .0, (Jul. 24, 2006), 20 pgs.
“Radio Frequency Identification (RFID): A Focus on Information Security and Privacy”, OECD_Digital_Economy_Papers,_No._138, Jan._14,_2008,_11-81.
“South Korea Telecommunications Report Included BMI's Forecasts”, Q2 2012, Business Monitor International Ltd., (Apr. 2012), 94 pgs.
A Near Field Communication Tool for Building Intelligent Environment using Smart Posters, International Journal of Computers and Communications, Issue 1, vol. 4, 2010, Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, and Miguel Angel Gomez-Nieto.
A pervasive presentator—Simplifying the task of presenting, Lulea University of Technology; Viktor Lindgren, Mattias Lundberg, Elias Naslund, John Viklund.
A System of Secure Virtual Coupons Using NFC Technology, IEEE Computer Society, CompProceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07); Manfred Aigner, Sandra Dominikus, Martin Feldhofer.
Alios Ferscha, Orientation sensing for gesture-based interaction with smart artifacts, 2005.
Amato-McCoy, Deena M., Crime stoppers: by focusing their loss prevention efforts on the entire enterprise, grocers are in a better position to combat internal and external theft. Grocery Headquarters, v77, n. 11, p. 101 (3). Nov. 2011.
Anonymous, “Near-field communications will be standard technology for mobiles”, Electronics Weekly, (Feb. 21, 2007), p. 8.
Antoniou, Zoe, “NFC-Based Mobile Middleware for Intuitive User Interaction With Security in Smart Homes”, Proc. of the 5th lASTED International Conference on Communication Systems and Networks (CSN'06), Aug. 28-30, 2006, Palma De Mallorca, Spain, Track 543-038, 6pgs.
Application of Near Field Communication for Health Monitoring in Daily Life; Esko Strommer, Jouni Kaartenen, Juha Parkka, Arto Ylisauko-oja, Ilkka Korhonen; Proceedings of the 28th IEEE Embs Annual International Conference New York City, USA, Aug. 30-Sep. 3, 2006.
Bauer-Reich, et al. “Low-profile, high-permeability antennaless RFID tags for use on metal objects”Proceedings of the 2012 IEEE International Workshop on Antenna Technology (iWAT), (Mar. 5-7, 2012), 32-35.
Becher, Michael et al., “Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices”, 2011 IEEE Symposium on Security and Privacy, 96-11.
Bling: NFC Arrives in U.S., Sam Churchill, Oct. 27, 2010, http://www.dailywireless.org/2010/10/27/bling-nfc-arrives-in-u-s/.
Bovelli, S., “A Novel Antenna Design for Passive RFID Transponders on Metal Surfaces”, Proceedings of the 36th European Microwave Conference, Manchester, UK (Sep. 2006) 580-582.
Broll, Gregor, et al., “Touch to Play—Exploring Touch-Based Mobile Interaction with Public Displays”, 3rd International Workshop on Near Field Communication, Feb. 22, 2011, 15-20.
Cavoukian, A. “Mobile Near Field Communications (NFC)—'Tap'n. Go” —Keep it Secure & Private, Information and Privacy Commissioner, Ontario, Canada/Privacy by Design (Nov., 2011), 22 pgs.
Chai, Qi, “Design and Analysis of Security Schemes for Low-cost RFID Systems”, Doctor of Philosophy Thesis in Electrical and COmputer Engineering, University of Waterloo, Ontario, Canada, 2012, 184 pgs.
Cheng, Hsu-Chen, et al., “A Secure and Practical Key Management Mechanism for NFC Read-Write Mode”, J. Computational Information Systems, 7:11, (2011), 3819-3828.
Cheng, Jerry, et al., “SmartSiren: Virus Detection and Alert for Smartphones”, MobiSys'07, Jun. 11-4, 2007, San Juan, Puerto Rico, 258-271.
Choi, Kwanghoon, et al., “A Secure Application Invocation Mechanism in Mobile Phones for Near Field Communication”, 2012 IEEE International Conference on Consumer Electronics (ICCE), Jan. 2012, 731-732.
Christian Metzger et al: “Making Radio Frequency Indentificaiton Visible—A Watchdog Tag”, Fifth Annual IEEE International Conference on pervasive computing and communications workshops, Mar. 19-23, 2007.
Christianson, B., et al. (eds), “Security Protocols”, 13th International Workshop, Revised Selected Papers, Cambridge, UK, (Apr. 20-22, 2005), Lecture Notes in Computer Science 4631, Springer-Verlag, Berlin 354 pgs.
Close Contact: An Examination of the Future of Near Field Communications, International Journal of Management & Information Systems—First Quarter 2012 vol. 16, No. 1; Chris Rose Capella.
Cole, P.H., et al., Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting, First Edition, Springer-Verlag, Berlin (2003) 350pgs.
Connecting the Mobile Phone with the Internet of Things—Benefits of EPC and NFC Compatibility; Thomas J.P. Wiechert, Florian Michahelles.
Coppolino, Luigi, et al., “A Trusted information Agent for Security Information and Event Management”, Icons 2012: The Seventh International Conference on Systems, 6-12.
Do you talk to each poster? Security and Privacy for Interactions with Web Service by means of Contact Free Tag Readings, Peter Schoo, Massimo Paolucci.
Dodson, B., et al. “Micro-Interactions with NFC-Enabled Mobile Phones”, Proceedings of the Third International Conference on Mobile Phones, Proceedings of the Third International Conference on Mibile Computing, Applications, and Services (MobiCASE), Los Angeles, CA, Oct. 2011. Retrieved from the Internet: <URFL:http://mobisocial.stanform.edu/papers/mobicasell.pdf>, 20pgs.
Elliptic Curve Certificates and Signatures for NFC Signature Records, Reasearch in Motion, Certicom Research; Tony Rosati, Greg Zaverucha.
Enabling RFID in Retail, George Roussos, Birkbeck, University of London, IEEE Computer Society, Mar. 2006.
Encrypted NFC emergency tags based on the German Telematics Infrastructure, 2011 Third International Workshop on Near Field Communication, Sebastian Dunnebeil, Felix Kobler, Philip Koene, Helmut Kremar, Jan Marco Leimeister.
Enhancing Authentication in eBanking with NFC enabled mobile phones, Aug. 11, 2008, Diego Alejandro Ortiz-Yepes.
Enhancing Security and Usabiliy Features of NFC, 2009; Beygo, Omer Kerem; Eraslan, Cihan.
Finkenzeller, K., “Known attacks on RFID systems, possible countermeasures and upcoming standardization activities”, presentation slides, RFID-Systech, Bermen, Germany, Jun., 2009. Retrieved from the internet: <URL: http://rfid-handbook.de/downloads/finkenzeller_Systech-Bremen-2009_v1.0.pdf>, 31pgs.
Francis, Lishoy, et al., “Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones”, The 6th Workshop on RFID Security (RFIDSec 2010), Istanbul, Turkey (LNCS), Jun. 7-9, 2010, 35-49.
Francis, Lishoy, et al., “Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones”, In Cryptology ePrint Archive, Report 2011/618, Nov., 2011, 16pgs.
Gebhart, M, et al., “Design of 13.56 MHz Smartcard Stickers with Ferrite for Payment and Authentication”, Proceedings of the 2011 3rd International Workshop on near Field Communication (NFC), Feb. 21-22, 2011. Retrieved from the Internet: <URL: https://online.tugraz.at/tug_online/voe_main2.getVollText?pDocumentNr=202812&pCurrPk=59398>, 6pgs.
Ghanname, Taoufik. How NFC can to speed Bluetooth transactions—today. Eetimes. Feb. 14, 2006. Retieved at http://eetimes.com/General/PrintView/4012606.
Hancke, G.P., “Practical Eavesdipping and Skimming Attacks on high-Frequency RFID Tokens”, Perprint version of article published in Journal of Computer Security vol. 19 Issue 2. (Junee, 2010). Retrieved from the Internet: <URL: http://www.rfidblog.org.uk/HanckeJoCSS specialRFID June2010.pdf>, 23 pgs.
Hancke, G.P., “Security of proximity identification systems”, technical Report, No. 752, Unicersity of Cambridge Computer Laboratory, UK (Jul. 2009), 161 pgs.
Hancke, G.P., et al., “Security Challenges for User-Oriented RFID Applications within the ‘Internet of Things’”, J. Internet Technology, vol. 11, No. 3, 2010, 307-313.
Hardy, Robert, et al., “Touch & Interact: Touch-based Interaction of Mobile Phones with Displays”, MobileHCL 2008, Proc. 10th international conference on Human computer interaction with mobile devices and services, 245-254.
Haselsteiner, Ernst, et al., “Security in Near Field Communication (NFC): Strengths and Weaknesses”, Proceedings of the Workshop on RFID Security (RFIDSec), Graz, Austria, Jul. 12-14, 2006, 11pgs.
Hend S. Al-Khalifa: “Utilizing QR Code and Mobile Phones for Blinds and Visually Impaired People”, copyright 2008.
Hinske, S., et al., “RFIDice—Augmenting Tabletop Dice with RFID”, Journal of Virtual Reality and Broadcasting, vol. 5, No. 4 (2008), 12 pgs.
Husni, Emir, et aL, “Efficient Tag-to-Tag Near Field Communication (NFC) Protocol for Secure Mobile Payment”, 2nd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), Bandung, Indonesia, Nov. 8-9, 2011, 97-101.
International Preliminary Report on Patentability and Written Opinion dated Apr. 21, 2015 for International Application PCT/US13/031448 filed Mar. 14, 2013.
International Preliminary Report on Patentability and Written Opinion dated Jul. 31, 2012 for International Application PCT/US11/022680 filed Jan. 27, 2011.
International Preliminary Report on Patentability and Written Opinion dated Jul. 31, 2012 for International Application PCT/US11/022687 filed Jan. 27, 2011.
International Preliminary Report on Patentability and Written Opinion dated Mar. 4, 2014 for International Application PCT/US12/053322 filed Aug. 31, 2012.
International Preliminary Report on Patentability and Written Opinion dated Mar. 10, 2015 for International Application PCT/US13/031136 filed Mar. 14, 2013.
International Preliminary Report on Patentability and Written Opinion dated May 19, 2015 for International Application PCT/US13/031131 filed Mar. 14, 2013.
International Search Report dated Aug. 20, 2013 for International Application PCT/US13/031131 filed Mar. 14, 2013.
International Search Report dated Aug. 6, 2013 for International Application PCT/US13/031448 filed Mar. 14, 2013.
International Search Report dated Aug. 3, 2011 for Internation Application PCT/US11/022680 filed Jan. 16, 2011.
International Search Report dated Mar. 11, 2011 for Internation Application PCT/US11/022687 filed Jan. 27, 2011.
International Search Report dated May 22, 2013 for International Application PCT/US13/031136 filed Mar. 14, 2013.
International Search Report dated Nov. 21, 2012 for International Application PCT/US12/053322 filed Aug. 31, 2012.
Johansson, B., “An Introduction to RFID—Information Security and Privacy Concerns”, TDDC03 Projects, (Spring 2004), 14 pgs.
Juels, A., et al., “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy”, Proceedings of ACC CCS'03, Washington, DC (Oct. 27-30, 2003), 9 pgs.
Jung, M, et al., “All-Printed and Roll-to-Roll Printable 13.56-MHz-Operated 1-bit RF Tag on Plastic Foils”, IEEE transactions on electron Devices, (Feb. 19 2010), 10 pgs.
Kazmi, Ham Mad Raza, “Security and Privacy Issues in Near Field Communication (NFC) Systems”,Master Thesis, Royal Institute of Technology, Sweden, Apr. 2011, 59 pgs.
Kfir, Ziv, et al., “Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems”, Proceeding of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Sep. 5-9, 2005, 47-58.
Kortvedt, H.S., “Securing near Field Communication”, Thesis for Master of Science in Communication Technology, Norwegian University of Science and Technology, (Jun. 2009), 135 pgs.
Kuo, S., “A performance evaluation method for EMI sheet of metal mountable HR RFID tag”, Measurement, 44 (2011), 946-953.
Kupusamy, K S et al “A Model for Remote Access and Protection of Smartphones JUsing Short Message Service”, International]. Computer Science, Engineering and. Iñformation Technology (IJCSEIT), vol. 2, No. 1, (Feb. 2012), 91-1 00.
LocaTag-An NFC-based system enhancing instant messaging tools with real-time user location; Kobler, Philip Koene, Helmut Kremar, Matthias Altmann, Jan Marco Leimeister.
Location-Triggered Code Execution-Dismissing Displays and Keypads for Mobile Interaction; W. Narzt and H. Schmitzberger.
Long, Men, et al., “Human Perceivable Authentication: An Economical Solution for Security Associations in Short-Distance Wireless Networking”, Proceedings of 16th International Conference on Computer Communications and Networks, Aug. 13-16, 2007, 257-264.
Madlmayr, Gerald, et al., “NFC Devices: Security & Privacy”, Proceedings of the 3rd International Conference on Availability, Reliability and Security, Barcelona, Spain, Mar. 7, 2008, 13 pgs.
Media Clips: Implementation of an Intuitive Media Linker; Seunghyun Yoon, Kyuyun Lee, Hyunchang Shin, Samsung Electronics, 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) held Jun. 8-10, 2011.
Mitrokotsa, A., et al., “Classification of RFID Attacks”, Proceedings of the 2nd International Workshop on RFID Technology—Concepts, Applications, Challenges (IWRT 2008), in conjuction with the 10th International Conference on Enterprise Information Systems, pp. 73-86, Barcelona, Spain, Jun. 2008. INSTICC Press, Portugal. Retrieved from the Internet: <URL: http://www.cs.vu.n1/˜ast/publications/iwrt-2008.pdf>.
Mobile Personal Devices meet Situated Public Displays: Synergies and Opportunities; Alan Dix, Corina Sas (2010). International Journal of Ubiquitous Computing (IJUC), 1(1), pp. 11-28. http://www.hcibook.com/alan/papers/MPD-SPD-2010/.
Mulliner, Collin, “Attacking NFC Mobile Phones”, 25th Chaos Communication Congress, Berlin, Germany (Dec., 2008). Retrieved from the internet : <URL:http://www.mulliner.org/nfc/feed/collin_mulliner_25c3_attacking_nfc_phones.pdf>, 71pgs.
Mulliner, Collin, “Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones”, 2009 International Conference on Availability, Reliability and Security, Fukuoka, Japan, Mar. 16-19, 2009, 695-700.
Near Field Communication in Smartphones, Simon Burkard, Berlin Institute of Technology, Germany, 2012.
Near Field Communications Handbook, vol. 13 of Internet and Communications, 2009; Mohammad Ilyas, https://books.google.co.in/books?id=xVZMTU8SpQAC&Ipg=PA25&ots=2A3z7a-b93&dq=NFC%20adhesive%20tags%20security%20code&Ir&pg=PA25#v=onepage&q&f=false, pp. 30-49, 2009.
Newport Digital Technologies to Implement Microsoft Licensing Agreement; Prepares to Launch First Ruggesized RFID Reader with Windows Mobile Operating System. Business Wire. Oct. 20, 2009.
NFC and Mobile Payments Today, Andre Filipe de Axevedo Figueiredo Cruz, Nov. 2011.
NFC Data Exchange Format (NDEF), Technical Specification, NDEF 1.0, Jul. 24, 2006.
NFC Forum Type Tags, White Paper V1.0, Apr. 1, 2009-Public.
NFC Mobile Parlor Games Enabling Direct Player to Player Interaction, 2011 Third International Workshop on Near Field Communication, Avinash Nandwani, Paul Coulton, Reuben Edwards.
NFC-Based Mobile Interactions with Direct-View Displays; Khoovirajsingh Seewoonauth, Enrico Rukzio, Robert Hardy, and Paul Holleis.
NFC-CAP Security Assessment, vol. 1.0—May 11, 2009; Diego A. Ortiz-Yepes.
Ongtang, Machiagar, et al. “Semantically Rich Application-Centric Security in Android”, Security and Communication Networks, vol. 5, Issue 6, Jun. 2012, 658-673.
Opoku, Samuel King, “Performance Enhancement of Large-Size NFC Multi-Touch System”, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), (Oct. 2011), 52-57.
Oren, Y., “Attacks on RFID-Based Electronic Voting System”, Cryptology ePrint Archive, Report 2009/442 (2009). Retrieved from the Internet<URL: http://eprint.iacr.org/2009/422.pdf>, 21 pgs.
Physical browsing with NFC technology; Heikki Ailisto, Tapio Matinmikko, Juha Haikio, Arto Ylisaukko-oja, Esko Strommer, Mika Hillukkala, Arto Wallin, Erkki Siira, Aki Poyry, Vili Tormanen, Tua Huomo, Tuomo Tuikka, Sonja Leskinen & Jarno Salonen.
Programming Android; Zigurd Mednieks, Laird Domin, G. Blake Meike, Masumi Nakamura, O'Reilly Media, Inc., 2011, https://books.google.com/books/about/Programming_Android.html?id=QP7VvnhDOOsC.
QR Code Tech Info: MECARD Format, May 2, 2011.
QRFactory, Redirectable QR, http://dashboard.qrfactory.com/.
Rahnama, Behnam, et al., “Securing RFID-Based Authentication Systems Using ParseKey+”, Proceedings of the 3rd International Conference on Security of Information and Networks,_Taganrog,_Russia,_Sept._7-11,_2010,_212-217.
RFID based applications in culture, media and creative industries, 2011 Third International Workshop on Near Field Communication, Eileen Kuehn, Jens Reinhardt, Stephan Bergemann, Prof. Dr. Juergen Sieck.
RFID Inventory Management System. Package Printing, v57 n2, pp34. Feb. 2010.
Rieback, M.R., et al., “A Platform for RFID Security and Privacy Administration”, Proceedings of the 20th USENIX/SAGE Large Installation System Administration conference (LISA 2006), Washington D.C., (Dec. 2006). Retrieved from the Internet: <URL: http://www.rfidguardian.org/images/a/a9/Lisa.06.pdf>, 14 pgs.
Rieback, M.R., et al., “The Evolution of RFID Security”, Pervasive Computing (Jan.-Mar. 2006), 62-69.
Roland, M., “Security Vulnerabilities of the NDEF Signature Record Type”, Presentation from WIMA 2011 NFC Research Track, Monaco (Apr. 19, 2011). Retrieved from the Internet: <URL: http://www.wima.mc/dan/2011/CONF_PDF/Tuesday/Am/Roland.pdf>, 14pgs.
Roland, Michael, et al., “Digital Signature Records for the NFC Data Exchange Format”, Second International Workshop on Near Field Communication, Monaco, Apr. 20, 2010, 71-76.
Sabzevar, A.P., “Security in RFID Systems”Project report for GMU ECE 646 (2004). Retrieved from the Internet: <URL: http:teal.gmu.edu/courses/ECE646/project/reports_2004/SP-4_report.pdf>, 13pgs.
Sarma, S.E., et al., “RFID Systems and Security and Privacy Implications”, Ches 2002, LNCS 2523, B.S. Kaliski Jr. et al. (Eds.) (2003), pp. 454-469, 2003.
Secure contactless mobile financial services with Near Field Communication, Adeola Oluwaseyi Poroye, Thesis submitted to Department of Computer Science, University of the Western Cape, Aug. 2011, 150 pages.
Simple NDEF Exchange Protocol, Technical Specification, NFC Forum SNEP 1.0, Aug. 31, 2011.
Situated Door Displays and how to interact with them, Barbara Schmid, Jan. 16, 2012.
Smart Poster Record Type Definition Technical Specification NFC ForumTM SPR 1.1 NFCForum-SmartPoster_RTD_1.0, Jul. 24, 2006.
Suh, J., “Introduction to composite electromagnetic noise absorber technology” EMC Directory & Design Guide, (2007), 4 pgs.
Switching the role of NFC tag and reader for the implementation of Smart Posters, 2012 4th International Workshop on Near Field Communication; Dirk Volland, Kay Noyen, Onur Kayikei, Lukas Ackermann, Florian Michahelles, pp. 63-68.
Thamilarasu, G et al. “Intrusion detection in RFID systems” Military Communications Conference, 2008. Milcom 2008. Piscataway, NJ, Nov. 16, 2008, pp. 1-7, ISBN: 978-1-4244-2676-8.
The “Weak Spots” in Stacked UHF RFID Tags in NFC Applications, IEEE RFID 2010; Xiaosheng Chen, Feng Lu, Terry T.Ye*.
The Junction Protocol for Ad Hoc Peer-to-Peer Monile Applications; Computer Science Department Stanford University; Ben Dodson, Aemon Cannon, Te-Yuan Huang, Monica S. Lam, Apr. 2011.
The Mobile Phone as Digital SprayCan; Philip Garner, Omer Rashid, Paul Coulton, and Reuben Edwards, Proceedings of the 2006 ACM SIGCHI international conference on advances in computer entertainment technology, Article No. 12, Hollywood, California, USA. Jun. 14-16, 2006.
Touch-driven Interaction Between Physical Space and Cyberspace with NFC, Longbio Chen, Gang Pan, Shijian Li, Department of Computer Science, Zhejiang University Hangzhou, China, 2011 IEEE International Conferences on Internet of Things and Cyber, Physical and Social Computing.
Turcu, C. (ed.), Development and Implementation of Rfid Technology, In-Tech, I-Tech Education and Publishing KG, Vienna, Austria (Feb. 2009), 564 pgs.
Type 1 Tag Operation Specification, Technical Specification, Technical Specification, NFC Forum T1TOP 1.1, Apr. 13, 2011.
Type 2 Tag Operation Specification Technical Specification, T2TOP 1.1 NFC Forum May 31, 2011.
Type 3 Tag Operation Specification, Technical Specification, Technical Specification, NFC Forum, T3TOP 1.1, Jun. 28, 2011.
Valkkynen, Pasi, et al.,‘Suggestions for Visualizing Physical Hyperlinks’, PERMID 2006: Pervasive Mobile Interaction Devices—Mobile Devices as Pervasive User Interlaces and Interaction Devices, Dublin, Ireland, May 7, 2006, 245-254.
Varshney , L.R., et al., “Securing Inductively-Coupled Communication”, Information Theory and Applications Workshop (ITA) (Feb. 5-10, 2012), 6 pgs.
Vidano, R., “13.56-MHz Inductively Coupled Card Compatibility to Conducting Surfaces”, Proceedings of Asia-Pcific Microwave Conference (2007), 4 pgs.
Violino, Bob. A Summary of RFID Standards. RFID Standards. RFID Journal. Jan. 16, 2005. URL at http://www.rfidjournal.com/articles/view?135.
Wang, J.J.H., “Spiral Antennas in RFID and Their Size Reduction and Performance Enhancement”, 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification (Apr. 16-18, 2007), 44-47.
Wegleiter, H. et al., “Automatic Antenna Tuning Unit to improve RFID System Performance”, IEEE Transactions on Instrumentation and Measurement, vol. 60, No. 8, (Aug. 2011), 2797-2803.
Weis, Stephen A, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, Security in Pervasive Computing 2003, LNCS 2802, D. Hutter et al. (Eds.) (2004) 201-212.
Yamada, I., et al., “Secure Active RFID Tag System”, Ubicomp2005 Workshops, 5pgs.
Zhu, H., et al., “Solutions of Metal Surface Effect for HF RFID Systems”, 2007 International Conference on Wireless Communications, Networking and Mobile Computing (WiCom), (Sep. 21-25, 2007), 2089-2092.
Related Publications (1)
Number Date Country
20190384948 A1 Dec 2019 US
Provisional Applications (1)
Number Date Country
61727907 Nov 2012 US
Divisions (2)
Number Date Country
Parent 15679616 Aug 2017 US
Child 16553980 US
Parent 13803041 Mar 2013 US
Child 15679616 US