The present inventive subject matter relates generally to the art of graphic displays and/or signage.
Illuminated signage and/or graphic displays are generally known. Commonly, illuminated signage will include graphic media, e.g., such as paper or polymeric film having a desired image thereon, that is illuminated from the back or the front or in some instances the side or edge. In general, backlight or backlit applications are those in which the media is illuminated from the side of the media that is opposite the side from which the media is intended to be viewed, while front-light or front-lit applications are those in which the media is illuminated from the same side in which the media is intended to be viewed. In side or edge-lit applications, the graphic media is generally mounted to a pane of glass or other suitable light guide which is illuminated from the edge or side. In turn, the pane of glass or other suitable light guide directs the light onto and/or through the graphic media.
Co-pending application Ser. No. 13/014,806 filed on the same day as the instant application discloses a smart signage concept, and in particular a graphic display and/or illuminated sign box 50. In particular, the display or sign box 50 holds or otherwise supports a graphic media 80 intended to be viewed, e.g., by the public or some other desired audience.
In the aforementioned co-pending application, two basic “smart” features have been proposed along with other features. The first basic smart feature involves the use of a security tag (e.g., an RFID device 82) or the like placed at a specific place on the graphic media 80 that interacts with an RFID reader 60 built inside the sign box 50. The reader 60 and/or a connected controller 56 authenticates the tag (and thus the graphical media 80) to make sure that the correct graphics from the correct source is installed in the sign box 50. If the reader/controller cannot detect or authenticate the tag, then the sign box 50 will not function properly, e.g., it will not turn on a light 54 to illuminate the signage. This security feature helps ensure that a brand owner feels safe letting others change graphics in their sign box. Additionally, a sign maker can also use the owner's authentication or security code to change graphics with the owner's authority.
The second smart feature disclosed in the '609 application provides the sign graphics or sign box 50 with the capability to communicate and/or otherwise interact with suitably equipped or otherwise provisioned mobile devices, e.g., such as cell phones, personal digital assistants (PDAs), etc. In particular, it was disclosed that NFC or other like short range communication technology could be used for this feature. For example, in one exemplary embodiment, the RFID device 82 could be enabled for NFC functionality. The present disclosure expands upon this interactive smart feature to further meet the demands and/or desires of sign makers, owners, operators, viewers, etc.
The embodiments of the present invention described below are not intended to be exhaustive or to limit the invention to the precise forms disclosed in the following detailed description. Rather, the embodiments are chosen and described so that others skilled in the art may appreciate and understand the principles and practices of the present invention.
In one exemplary embodiment, advertising system, is provided and includes a graphic media supporting frame that has an activatable light source, and an advertising graphic that has printed or imaged indicia relating to an advertising or marketing campaign. A plurality of RFID tags are provided, with each of the RFID tags including a substrate that has first and second surfaces, an antenna and a chip disposed on the first surface with the chip encoded with information relating to the advertising graphic. An activator is provided for activating and reading the chip on at least one of the plurality of RFID tags and for causing a first signal to be sent to the graphic supporting frame. The present system also includes a processor for receiving the first signal and for transmitting a second signal to the activator.
In a still further exemplary embodiment of the presently described invention, an interactive advertising system, is presented and includes an advertising graphic that is provided at a first location, the advertising graphic has indicia relating to a particular marketing theme or campaign and is supported by a frame having an illumination device. A display panel is provided and has a plurality of RFID devices positioned thereon. The display panel is at a second location distinct from the first location. An activator is used for activating and reading at least one of the plurality of RFID devices and for causing a first signal to be sent to the advertising graphic. A processor is used for receiving the first signal and for transmitting a second signal to the activator such that the activator activates the illumination device to display a portion of the advertising graphic related to the at least one of the plurality of RFID devices.
In yet a still further exemplary embodiment of the presently described invention, a method of using an interactive advertising system is described and includes the steps of initially providing an advertising graphic and then placing the advertising graphic in a supporting frame which has a light source. Next, a display panel is provided that has a plurality of RFID devices with each of the RFID devices having at least one of content or language. Then at least one of the RFID devices read to create a first signal and the first signal in order to activate the light source to illuminate at least a portion of the advertising graphic.
Other features and advantages of the present inventive subject matter will become apparent to those skilled in the art from the following detailed description. It is to be understood, however, that the detailed description of the various embodiments and specific examples, while indicating preferred and other embodiments of the present inventive subject matter, are given by way of illustration and not limitation. Many changes and modifications within the scope of the present invention may be made without departing from the spirit thereof, and the invention includes all such modifications.
These, as well as other objects and advantages of this invention, will be more completely understood and appreciated by referring to the following more detailed description of the presently preferred exemplary embodiments of the invention in conjunction with the accompanying drawings, of which:
The apparatuses and methods disclosed in this document are described in detail by way of examples and with reference to the figures. Unless otherwise specified, like numbers in the figures indicate references to the same, similar, or corresponding elements throughout the figures. It will be appreciated that modifications to disclosed and described examples, arrangements, configurations, components, elements, apparatuses, methods, materials, etc. can be made and may be desired for a specific application. In this disclosure, any identification of specific shapes, materials, techniques, arrangements, etc. are either related to a specific example presented or are merely a general description of such a shape, material, technique, arrangement, etc. Identifications of specific details or examples are not intended to be, and should not be, construed as mandatory or limiting unless specifically designated as such. Selected examples of apparatuses and methods are hereinafter disclosed and described in detail with reference made to FIGURES.
Radio frequency identification (RFID) tags and labels (collectively referred to herein as “devices”) are widely used to associate an object with an identification code or other information. RFID devices generally have a combination of antennas, and analog and/or digital electronics, which may include for example communications electronics, data memory, and control logic. For example an RFID system often includes an RFID chip in order to store information. Common uses for RFID tags include but are not limited to security locks in cars, for access control to buildings, and for tracking inventory and parcels.
RFID labels are typically pressure sensitive based and have RFID devices that are incorporated into the label (such as by placing an inlay on a label substrate) that are adhesively or otherwise applied or attached directly to objects. RFID inlays may be incorporated into a label in order to form a RFID inlay. In addition to labels, RFID devices can be provided in other suitable formats such as tags which might be hung or attached to the display such as by mechanical fasteners like VELCRO, frangible coatings or the like.
RFID devices include active tags and labels, which include a power source, and passive tags and labels, which do not. In the case of passive devices, in order to retrieve the information from the chip, a “base station” or “activator” sends an excitation signal to the RFID tag or label. The excitation signal energizes the tag or label, and the RFID circuitry transmits the stored information back to the activator. The RFID activator receives and decodes the information from the RFID tag. In general, RFID devices can retain and transmit enough information to uniquely identify individuals, packages, inventory and the like. RFID devices also can be characterized as to those to which information is written only once (although the information may be read repeatedly), and those to which information may be written during use. For example, RFID devices may store environmental data (that may be detected by an associated sensor), logistical histories, state data, etc.
RFID devices suitable for use in accordance with embodiments disclosed herein are available from Avery Dennison RFID Company of Clinton, S.C.
Commonly, signs and the like for displaying graphic media such as those described in the co-pending application can be located in places not easily accessed, e.g., such as high on a post, on a building, behind a window, behind a counter or otherwise substantially out of reach of a viewer. In such instances, the RFID device 82 or the like carried by the graphic media 80 may be further away than the effective communication range within which a viewer is able to reach. That is to say, a viewer desiring to access or otherwise communicate (e.g., via their mobile phone or other like communication device) with an RFID device 82 or the like carried by the graphic media 80 may be physically unable to place their mobile phone or other like device close enough to the RFID device 82 in order to establish effective communication or other interactions therewith. For example, NFC based technology typically works only within a limited range, e.g., a couple of centimeters or inches. Placing a mobile phone or other like device in such close proximity to the graphic media 80 carrying an RFID device 82 that a viewer wishes to access can be inconvenient at times, particularly, when the sign or display 50 holding the graphic media 80 is physically beyond the reach of the viewer such that the distance between the viewer's mobile phone or other like device and the RFID device 82 is greater than the effective range of the communication technology and/or protocol employed. In this case, carrying the RFID device 82 and/or NFC tag inside or on the graphic media 80 may not be practical.
With reference now to
Alternately, the tag 202 included on the panel 200 can be built in or other integrally arranged thereon (e.g. molded, laminated, etc.), or it can be removable and/or replaceable, such as through the use of a removable or repositionable adhesive. Accordingly, in the later case, when the graphic media 80 is replaced on the sign 50, a new tag 202 for the corresponding content can also be replaced in or on the panel 200. Optionally, in the formed case, when the graphic media 80 is replaced on the sign 50, the content of the tag 202 can be rewritten or otherwise provisioned in situ. Alternately, the panel 200 can be removed and returned to a sign shop or the like for rewriting or other like updating of the tag 202.
Of course, even though the graphic media 80 and/or sign 50 may be installed in a place that is accessible, it may still be desirable to have the panel 200 and/or tag 202 separated by some distance therefrom. For example, in order to get a panoramic or full view of the graphic media 80, the viewer 300 may want to stand at some distance from the media 80. Accordingly, it may be desirable to have the panel 200 and/or tag 202 located at this distance so that it can be accessed while obtaining a full view of the sign 50 and/or the media 80 held thereby. In general, close proximity of the tag 202 to the media 80 may not be quite practical for all signage applications. For example, if only one tag 202 is used directly on the media 80, the users may be inconvenienced by having to get their device 302 close to the tag 202 and they may even have to move their device 302 across the media 80 to looking for the tag 202, e.g., because in some applications it may desirable to have the media content unencumbered with a message or other indicia pointing to the location of the tag 202 on the media 80.
Accordingly, using a separate panel 200 to hold the tag 202 allows one to readily identify the location of the tag 202 without obscuring or encumbering the content of the graphic media 80. Optionally, for example, the panel 200 may be provided with a message or pointer or other like indicia instructing or otherwise showing the viewer 300 where to place their device 302 in order to communicate or otherwise interact with the tag 202. For example, see
Typical, a tag 202 can only talk or otherwise communicate with one device 302 at a time, so a viewer such as the viewer 300 may become impatient if he has to wait for his or her turn (e.g., because through put for reading the media 80 on the sign 50 is too low). Accordingly, there may be an array of panels 200 provisioned for each sign 50 and/or each panel 200 may be provisioned with an array of tags 202. That is to say, for each sign 50 there may be one or more panels 200 and/or each panel 200 may be equipped with one or more tags 202. For example, as shown in
In one suitable embodiment, each tag 202 on a panel 200 may perform the same function or otherwise provide for the delivery of the same content to a user's device 302. Alternately, one or more of the tags 202 may perform different functions or provide for the delivery of alternate content to the user's device 302. For example, as illustrated in
In one suitable embodiment, a 2D array or other arrangement of tags 202 are provided on or in a sheet of media or other like carrier that is selectively held by, affixed or otherwise secured to, e.g., a face of the panel 200. In this way, the media or carrier can be readily replaced or changed in order to update or change the tags 202 on the panel 200, e.g., when the graphic media 80 on the sign 50 is changed or updated. Optionally, the media or carrier for the tags 202 is printable or otherwise marked via any suitable printing method known in the art, e.g., on at least one side thereof, or the media or carrier can be embossed to create patterns as well as to assist the visually impaired. Accordingly, the media or carrier can be selectively printed or imaged with indicia, instructions, messages or the like that indicate the locations, content, functions, etc. of the various tags 202 underlying or otherwise corresponding to each region of the media or carrier. Optionally, the sheet or media or other like carrier of the tags 202 may simply include printing or indicia thereon as it relates to a panel 200 functioning for another graphic sign nearby (e.g., such as the sign 50 displaying the media 80); or the sheet/carrier for the tags 202 may also serve as the main or primary graphic display as well as.
While shown in
With reference now to
In one suitable embodiment, the panel 200 is equipped with appropriate electronics and/or other hardware, software and/or firmware to detect and/or distinguish such interactions with the respective tags 202 and/or relay communications from or with the tags 202 to the sign 50. Optionally, the panel 200 may be hardwired to the sign 50 in order to communicate therewith or the panel 200 may wirelessly communicate with the sign 50. For example, the panel 200 is optionally equipped with an antenna that picks up signals to and or from the respective tags 202 and in turn identifies for the sign 50 which tag 202 is accessed and/or relays appropriate signals to the sign 50. In addition, if an antenna is provided in the panel, the antenna can be further used to provide an energy source, e.g. battery, or boost of energy to either the display or the tag in order to facilitate the exchange of information. The antenna in the panel can also capacitively couple to the tag in order to increase read range of the tag. Suitably, the information or data received from the panel 200 is optionally processed by the signs controller 56 and the sign 50 regulated or otherwise controlled accordingly.
In yet one further embodiment, optionally the sign 50 or some portion thereof is implemented as a video display or electronic billboard or the like and may optionally be provision with a speaker and/or other audio playback capabilities. In addition to visual and auditory feedback, olfactory capabilities may also be included, such that for example a fragrance retailer can have the prospective customer experience a particular scent. Accordingly, the various options presented via the tags 202 on the panel 200 may in turn trigger the sign 50 to play a corresponding video and/or audio clip, e.g., such as a movie trailer or music sample. Alternately or in addition, a user 300 may selectively interact with a given tag 202 on the panel 200 by placing their communication device 302 next to or near the desired tag 202, and accordingly, the various different tags 202 may prompt delivery of various different video and/or audio clips to the users device 302, which the user 300 can then play as desired. In one option, upon accessing a given tag 202, the video or audio content may be directly delivered to the device 302, e.g., via a Bluetooth connection, or alternately, the tag 202 may provide the viewer's device 302 with an Internet or web address or other like pointer, e.g., to which a browser or the like on the device 302 is directed. The corresponding Internet site or web page accordingly contains the content (i.e., video and/or audio clip) that is ultimately delivered to the device 302. In either case, suitably, the video or audio clips may relate to or be associated with the content displayed on the sign 50.
Optionally, the NFC tag 202 enables the user's device 302 to accept a data file at high speed (e.g., via a Bluetooth connection); so, for example, when the user 300 access the tag 202, a local Bluetooth server will push a video or audio file to the user's device 302. Accordingly, in one embodiment, the controller 56 in the sign 50 (e.g., which handles the authentication) may also optionally store the media (i.e., video and/or audio clips) and will push the selected audio and/or video clips to the target mobile device 302 when the corresponding tag 202 is read thereby. Optionally, the sign 50 or controller 56 could also include a link (e.g., via a WiFi or a wired connection) that allows easy updating of data files.
While the tags 202 herein have been referred to in terms of electronic communication devices, it is to be appreciated that in alternate embodiments, for delivering content and/or information or data to the viewer's mobile device 302, optionally the tags 202 may be implemented as bar codes or other like indicia printed or otherwise formed on the panel 200 or a sheet of media secured thereto. In such instances, the viewer's mobile device 302 is optionally equipped with a bar code read or the like with reads the tag 202 and decodes or otherwise interprets the corresponding data, e.g., which may be an Internet or web address or other like pointer, e.g., to which a browser or the like on the device 302 is directed to obtain the associated content.
In any event, it is to be appreciated that in connection with the particular exemplary embodiment(s) presented herein certain structural and/or function features are described as being incorporated in defined elements and/or components. However, it is contemplated that these features may, to the same or similar benefit, also likewise be incorporated in other elements and/or components where appropriate. It is also to be appreciated that different aspects of the exemplary embodiments may be selectively employed as appropriate to achieve other alternate embodiments suited for desired applications, the other alternate embodiments thereby realizing the respective advantages of the aspects incorporated therein.
It is also to be appreciated that particular elements or components described herein may have their functionality suitably implemented via hardware, software, firmware or a combination thereof. Additionally, it is to be appreciated that certain elements described herein as incorporated together may under suitable circumstances be stand-alone elements or otherwise divided. Similarly, a plurality of particular functions described as being carried out by one particular element may be carried out by a plurality of distinct elements acting independently to carry out individual functions, or certain individual functions may be split-up and carried out by a plurality of distinct elements acting in concert. Alternately, some elements or components otherwise described and/or shown herein as distinct from one another may be physically or functionally combined where appropriate. For example, a single RFID device (such as the device 82) may optionally be provisioned with control logic or other like instructions for the operation of the sign 50, authentication data and NFC functionality. Alternately, a plurality of separate RFID or other like devices may be employed each provisioned to carry out one or more of the foregoing functions. For example, one RFID device could be provisioned with sign control logic or the like and authentication data, while a separate RFID could be provisioned to support the NFC functionality with regard to the viewers' devices 302.
There are of course a number of other applications for the present inventive subject matter. For example, the present system could be used as a replacement for the ‘old’ phone systems, where a user or guest would touch the hotel's tag or key which has an embedded RFID device with your mobile (and perhaps the one with the correct language) and it connects you to the hotel operator, who knows from the number you came in on what language you speak or alternatively with a number of other hotel services, such as video options through the in room monitor or graphics display device. In addition, the display provides details about the hotel, and other points of potential interest.
Another example includes illuminated highway markers, signs or the like, where a motorist would be able to gain assistance and receive additional instructions as well as status of the service vehicle by using his or her mobile phone as the activator for the RFID device in the signage. The foregoing could also be used for example in connection with large entertainment events, sporting events, and the like where a graphics display could be activated to provide the customer with additional information about the event, locations of seats, dining options and the like.
Many retail eating establishments, such as fast food outlets now facilitate the processing of customers through illuminated signage in which a customer through use of an intercom system places his or her order with the establishment. In the present example, the system through the use of a split panel, one panel would show what food selections are available, the other panel would allow the user to select and possibly pay. The activator or phone would then receive a code, which the customer would take it to the counter, to get his or her food. Alternatively, menus with the NFC stickers could be on the table in front of you and the activator used to select which dining options are desirable.
Another possible use for the present invention would be to include a pack of postcards with removable NFC stickers disposed thereon. For example a transparent holder with say a 4×5 grid of pockets could be used to display a variety of cards for distinct service or entertainment offerings. A retailer, or a do it yourself (“DIY”) store, will accept a payment from a local service provider who desires to advertise a service. The retailer, then would generate a postcard, such as through an inkjet printer (or give the card to the user to print at home), and, then using a mobile phone or activator, program the NFC to include contact website and/or contact number for the service provider. The illuminated sign on display at the retailer identified above then accepts a graphic which advertises the local services.
Larger advertisers may want to send out preprinted postcards with NFC to shops on the basis that these can be used to advertise brands in unused slots. Each card has a unique ID as well as its NFC data, the larger advertiser will get ‘hits’ on its website which can be connected to a particular card sent to a specific retailer and a small payment can be made.
It will thus be seen according to the present invention a highly advantageous interactive advertising system and method has been provided. While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it will be apparent to those of ordinary skill in the art that the invention is not to be limited to the disclosed embodiment, and that many modifications and equivalent arrangements may be made thereof within the scope of the invention, which scope is to be accorded the broadest interpretation of the appended claims so as to encompass all equivalent structures and products.
The present application claims priority from U.S. Provisional Patent Application Nos. 61/299,609 filed Jan. 29, 2010, and 61/311,473 filed Mar. 8, 2010, and is related to U.S. Provisional Application Nos. 61/416,384 filed Nov. 23, 2010, and 61/423,139 filed Dec. 15, 2010, all of which are incorporated herein by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
1331136 | Woodjard | Feb 1920 | A |
5083111 | Drucker et al. | Jan 1992 | A |
5485291 | Qiao | Jan 1996 | A |
5609059 | McEwan | Mar 1997 | A |
5641219 | Mizobe | Jun 1997 | A |
5648613 | Kiefer | Jul 1997 | A |
5648643 | Knowles et al. | Jul 1997 | A |
5720123 | Taylor | Feb 1998 | A |
5841350 | Appalucci et al. | Nov 1998 | A |
5867017 | Merwin et al. | Feb 1999 | A |
5921674 | Koczi | Jul 1999 | A |
5944405 | Takeuchi | Aug 1999 | A |
5945938 | Chia et al. | Aug 1999 | A |
5947578 | Ayres | Sep 1999 | A |
6142375 | Belka et al. | Nov 2000 | A |
6144264 | Wen | Nov 2000 | A |
6246778 | Moore | Jun 2001 | B1 |
6744367 | Forster | Jun 2004 | B1 |
6771256 | Abraham et al. | Aug 2004 | B1 |
6786626 | Wu | Sep 2004 | B2 |
6838989 | Mays et al. | Jan 2005 | B1 |
6839035 | Addonisio et al. | Jan 2005 | B1 |
6851999 | Fong | Feb 2005 | B2 |
6965205 | Piepgras et al. | Nov 2005 | B2 |
7012544 | Cunningham et al. | Mar 2006 | B2 |
7046160 | Pederson et al. | May 2006 | B2 |
7064498 | Dowling et al. | Jun 2006 | B2 |
7084769 | Bauer et al. | Aug 2006 | B2 |
7086587 | Myllymaki | Aug 2006 | B2 |
7086769 | Thompson et al. | Aug 2006 | B1 |
7098794 | Lindsay | Aug 2006 | B2 |
7109986 | Kerr et al. | Sep 2006 | B2 |
7167106 | Hasse | Jan 2007 | B2 |
7202838 | Kerr et al. | Apr 2007 | B2 |
7304577 | Waldner | Dec 2007 | B2 |
7375650 | Lo | May 2008 | B2 |
7377421 | Rhoads | May 2008 | B2 |
7378973 | Dixon | May 2008 | B2 |
7477152 | Forster | Jan 2009 | B2 |
7490054 | Reade et al. | Feb 2009 | B2 |
7492346 | Manabe | Feb 2009 | B2 |
7495576 | Maskeny et al. | Feb 2009 | B2 |
7515149 | Kerr et al. | Apr 2009 | B2 |
7564426 | Poor | Jul 2009 | B2 |
7600906 | Chon | Oct 2009 | B2 |
7654723 | Chang | Feb 2010 | B2 |
7670020 | Chang | Mar 2010 | B2 |
7695165 | Chang | Apr 2010 | B2 |
7722172 | Silverbrook | May 2010 | B2 |
7722241 | Chang | May 2010 | B2 |
7737858 | Matityaho | Jun 2010 | B2 |
7750810 | Ritter et al. | Jul 2010 | B2 |
7752790 | Michael et al. | Jul 2010 | B1 |
7756467 | Bent et al. | Jul 2010 | B2 |
7810983 | Chang | Oct 2010 | B2 |
7817045 | Onderko | Oct 2010 | B2 |
7845823 | Mueller | Dec 2010 | B2 |
7850341 | Mrakovich | Dec 2010 | B2 |
7868778 | Kenwright | Jan 2011 | B2 |
7876101 | Lee | Jan 2011 | B2 |
7903103 | Osterberg et al. | Mar 2011 | B2 |
7920050 | Juels | Apr 2011 | B2 |
7959326 | Laporte | Jun 2011 | B2 |
7961097 | Porte et al. | Jun 2011 | B2 |
7979026 | Hulvey | Jul 2011 | B2 |
8014722 | Abel et al. | Sep 2011 | B2 |
8018345 | Xiang | Sep 2011 | B2 |
8068011 | Sajadi et al. | Nov 2011 | B1 |
8102797 | Abel | Jan 2012 | B2 |
8112066 | Ayed | Feb 2012 | B2 |
8117445 | Werner et al. | Feb 2012 | B2 |
8126505 | Tulloch | Feb 2012 | B2 |
8237562 | Picasso et al. | Aug 2012 | B1 |
8242893 | Lin | Aug 2012 | B1 |
8249935 | DiMartino et al. | Aug 2012 | B1 |
8321922 | Lo et al. | Nov 2012 | B1 |
8326991 | Diaz et al. | Dec 2012 | B2 |
8332272 | Fisher | Dec 2012 | B2 |
8469269 | Daily et al. | Jun 2013 | B2 |
8474700 | Lewis et al. | Jul 2013 | B1 |
8520695 | Rubin et al. | Aug 2013 | B1 |
8638228 | Amigo et al. | Jan 2014 | B2 |
8655286 | Mendolia | Feb 2014 | B2 |
8750514 | Gallo et al. | Jun 2014 | B2 |
8842102 | Forster et al. | Sep 2014 | B2 |
8880055 | Clement et al. | Nov 2014 | B1 |
8937531 | Rimai et al. | Jan 2015 | B2 |
8961306 | LeMay et al. | Feb 2015 | B2 |
9024763 | Hamedani | May 2015 | B2 |
9108434 | Tsirline et al. | Aug 2015 | B2 |
9124442 | McCormack et al. | Sep 2015 | B2 |
9698872 | Havernin et al. | Jul 2017 | B2 |
9767329 | Forster | Sep 2017 | B2 |
9894468 | Brown et al. | Feb 2018 | B2 |
10402598 | Forster | Sep 2019 | B2 |
10540527 | Forster | Jan 2020 | B2 |
20020030992 | Lefebvre | Mar 2002 | A1 |
20020036622 | Jaeger et al. | Mar 2002 | A1 |
20020154633 | Shin et al. | Oct 2002 | A1 |
20020159246 | Murasko et al. | Oct 2002 | A1 |
20020186133 | Loof | Dec 2002 | A1 |
20020190845 | Moore | Dec 2002 | A1 |
20030029918 | Leanheart et al. | Feb 2003 | A1 |
20030034985 | Needham Riddle | Feb 2003 | A1 |
20030115096 | Reynolds | Jun 2003 | A1 |
20040012486 | Mani | Jan 2004 | A1 |
20040183742 | Goff et al. | Sep 2004 | A1 |
20040220860 | Persky et al. | Nov 2004 | A1 |
20050017071 | Noonan | Jan 2005 | A1 |
20050186902 | Lieffort et al. | Aug 2005 | A1 |
20050207823 | Adams et al. | Sep 2005 | A1 |
20050280631 | Wong et al. | Dec 2005 | A1 |
20060028822 | Tanamachi | Feb 2006 | A1 |
20060032926 | Baba et al. | Feb 2006 | A1 |
20060066453 | Homanfar et al. | Mar 2006 | A1 |
20060071778 | Vesikivi et al. | Apr 2006 | A1 |
20060080819 | Mcallister | Apr 2006 | A1 |
20060090384 | Woodruff | May 2006 | A1 |
20060160488 | Sueoka et al. | Jul 2006 | A1 |
20060214794 | Wang | Sep 2006 | A1 |
20060215958 | Yeo | Sep 2006 | A1 |
20060230276 | Nochta | Oct 2006 | A1 |
20060261938 | Lai | Nov 2006 | A1 |
20060261950 | Arneson et al. | Nov 2006 | A1 |
20060266824 | Hassenbuerger | Nov 2006 | A1 |
20060273176 | Audebert et al. | Dec 2006 | A1 |
20060287964 | Brown | Dec 2006 | A1 |
20060290501 | Hammad et al. | Dec 2006 | A1 |
20060293956 | Walker et al. | Dec 2006 | A1 |
20070008140 | Saarisalo et al. | Jan 2007 | A1 |
20070013479 | Goel et al. | Jan 2007 | A1 |
20070022294 | Lapstun et al. | Jan 2007 | A1 |
20070029384 | Atherton | Feb 2007 | A1 |
20070029939 | Burkum et al. | Feb 2007 | A1 |
20070056871 | Griffiths | Mar 2007 | A1 |
20070057791 | Karjoth et al. | Mar 2007 | A1 |
20070075145 | Arendonk et al. | Apr 2007 | A1 |
20070090954 | Mahaffey | Apr 2007 | A1 |
20070120772 | Kim et al. | May 2007 | A1 |
20070135112 | Lessing | Jun 2007 | A1 |
20070145152 | Jogand-Coulomb et al. | Jun 2007 | A1 |
20070188483 | Bonner | Aug 2007 | A1 |
20070194879 | Backes et al. | Aug 2007 | A1 |
20070215685 | Self et al. | Sep 2007 | A1 |
20070229250 | Recker | Oct 2007 | A1 |
20070027395 | Ribi | Nov 2007 | A1 |
20070273951 | Ribi | Nov 2007 | A1 |
20070274242 | Lamacraft et al. | Nov 2007 | A1 |
20080022160 | Chakraborty | Jan 2008 | A1 |
20080040845 | Shoshan | Feb 2008 | A1 |
20080064346 | Charrat | Mar 2008 | A1 |
20080079582 | Alexis et al. | Apr 2008 | A1 |
20080094854 | Coleman | Apr 2008 | A1 |
20080100443 | Grunwald et al. | May 2008 | A1 |
20080101400 | Auterinen | May 2008 | A1 |
20080117047 | Collins et al. | May 2008 | A1 |
20080132167 | Bent et al. | Jun 2008 | A1 |
20080132269 | Shen et al. | Jun 2008 | A1 |
20080136647 | Brown | Jun 2008 | A1 |
20080146148 | Hulvey | Jun 2008 | A1 |
20080150719 | Cote et al. | Jun 2008 | A1 |
20080162154 | Fein | Jul 2008 | A1 |
20080167000 | Wentker et al. | Jul 2008 | A1 |
20080183581 | Philippe Coppolani | Jul 2008 | A1 |
20080191878 | Abraham | Aug 2008 | A1 |
20080192932 | Graeber et al. | Aug 2008 | A1 |
20080219227 | Michaelis | Sep 2008 | A1 |
20080238610 | Rosenberg | Oct 2008 | A1 |
20080238706 | Kenwright | Oct 2008 | A1 |
20080248815 | Busch | Oct 2008 | A1 |
20080251582 | Nguyen | Oct 2008 | A1 |
20080255960 | Nguyen | Oct 2008 | A1 |
20080258875 | Jesme et al. | Oct 2008 | A1 |
20080262928 | Michaelis | Oct 2008 | A1 |
20080276507 | Hines | Nov 2008 | A1 |
20080300985 | Shamp et al. | Dec 2008 | A1 |
20080309463 | Godzwon | Dec 2008 | A1 |
20090019755 | Moretti | Jan 2009 | A1 |
20090081943 | Dobyns et al. | Mar 2009 | A1 |
20090085746 | Ericikson et al. | Apr 2009 | A1 |
20090088077 | Brown et al. | Apr 2009 | A1 |
20090088229 | Hammad et al. | Apr 2009 | A1 |
20090102748 | Stoyer et al. | Apr 2009 | A1 |
20090115614 | Bertin | May 2009 | A1 |
20090118006 | Kelly et al. | May 2009 | A1 |
20090146814 | Hammad et al. | Jun 2009 | A1 |
20090168441 | Lin | Jul 2009 | A1 |
20090174556 | Horne et al. | Jul 2009 | A1 |
20090189816 | Nikiti | Jul 2009 | A1 |
20090192937 | Griffin et al. | Jul 2009 | A1 |
20090193500 | Griffin | Jul 2009 | A1 |
20090197551 | Paraskake | Aug 2009 | A1 |
20090212919 | Selgrath et al. | Aug 2009 | A1 |
20090221240 | Zhang | Sep 2009 | A1 |
20090257242 | Wendman | Oct 2009 | A1 |
20090258678 | Chava et al. | Oct 2009 | A1 |
20090267862 | Roesner | Oct 2009 | A1 |
20090282859 | Glielmo et al. | Nov 2009 | A1 |
20090292816 | Etchegoyen | Nov 2009 | A1 |
20090297157 | Nakagawa | Dec 2009 | A1 |
20090315670 | Naressi | Dec 2009 | A1 |
20100009627 | Huomo | Jan 2010 | A1 |
20100012715 | Williams et al. | Jan 2010 | A1 |
20100026464 | Graeber | Feb 2010 | A1 |
20100030636 | Vijayshankar et al. | Feb 2010 | A1 |
20100046198 | Hoffman | Feb 2010 | A1 |
20100066508 | Jokinen | Mar 2010 | A1 |
20100066561 | Ulrich et al. | Mar 2010 | A1 |
20100075666 | Garner | Mar 2010 | A1 |
20100079416 | Chung et al. | Apr 2010 | A1 |
20100082444 | Lin et al. | Apr 2010 | A1 |
20100082485 | Lin et al. | Apr 2010 | A1 |
20100085774 | Park | Apr 2010 | A1 |
20100107463 | Spiro | May 2010 | A1 |
20100123553 | Banerjee | May 2010 | A1 |
20100141452 | Lian et al. | Jun 2010 | A1 |
20100148964 | Broer | Jun 2010 | A1 |
20100148965 | Alexis et al. | Jun 2010 | A1 |
20100161410 | Tulloch | Jun 2010 | A1 |
20100161434 | Herwig et al. | Jun 2010 | A1 |
20100172149 | Siemiet | Jul 2010 | A1 |
20100174599 | Rosenblatt et al. | Jul 2010 | A1 |
20100176971 | Banerjee et al. | Jul 2010 | A1 |
20100188842 | Yohananoff | Jul 2010 | A1 |
20100211431 | Lutnick et al. | Aug 2010 | A1 |
20100216396 | Fernandez et al. | Aug 2010 | A1 |
20100217709 | Aabye et al. | Aug 2010 | A1 |
20100221999 | Braun et al. | Sep 2010 | A1 |
20100231362 | Smith et al. | Sep 2010 | A1 |
20100241494 | Kumar et al. | Sep 2010 | A1 |
20100255865 | Karmarkar | Oct 2010 | A1 |
20100262449 | Monteforte et al. | Oct 2010 | A1 |
20100265041 | Almog et al. | Oct 2010 | A1 |
20100269383 | Nifenecker | Oct 2010 | A1 |
20100271839 | Chan | Oct 2010 | A1 |
20100274859 | Bucuk | Oct 2010 | A1 |
20100275265 | Fiske | Oct 2010 | A1 |
20100282849 | Mair | Nov 2010 | A1 |
20100290251 | Wang | Nov 2010 | A1 |
20100294835 | Bam et al. | Nov 2010 | A1 |
20100303230 | Taveau et al. | Dec 2010 | A1 |
20100306076 | Taveau | Dec 2010 | A1 |
20100306819 | Nahari et al. | Dec 2010 | A1 |
20100311326 | Klabunde et al. | Dec 2010 | A1 |
20110000971 | Onderko | Jan 2011 | A1 |
20110029777 | Murakami et al. | Feb 2011 | A1 |
20110047463 | Shepherd et al. | Feb 2011 | A1 |
20110047759 | Reiter | Mar 2011 | A1 |
20110065383 | Frankland et al. | Mar 2011 | A1 |
20110084814 | Ramsch | Apr 2011 | A1 |
20110112918 | Mestre et al. | May 2011 | A1 |
20110112920 | Mestre et al. | May 2011 | A1 |
20110114735 | Ziai | May 2011 | A1 |
20110121488 | Duffy | May 2011 | A1 |
20110149079 | Anderson | Jun 2011 | A1 |
20110149596 | Lv et al. | Jun 2011 | A1 |
20110156640 | Moshfeghi | Jun 2011 | A1 |
20110165859 | Wengrovitz | Jul 2011 | A1 |
20110185607 | Forster et al. | Aug 2011 | A1 |
20110187558 | Serex | Aug 2011 | A1 |
20110191478 | Eischeid et al. | Aug 2011 | A1 |
20110195748 | Main et al. | Aug 2011 | A1 |
20110211344 | Harbers | Sep 2011 | A1 |
20110225421 | Han et al. | Sep 2011 | A1 |
20110227487 | Nichol | Sep 2011 | A1 |
20110227507 | Salm | Sep 2011 | A1 |
20110228517 | Kawabat | Sep 2011 | A1 |
20110234379 | Lee | Sep 2011 | A1 |
20110235318 | Simon | Sep 2011 | A1 |
20110238995 | Blanco | Sep 2011 | A1 |
20110244799 | Roberts et al. | Oct 2011 | A1 |
20110258443 | Barry | Oct 2011 | A1 |
20110276961 | Johansson et al. | Nov 2011 | A1 |
20110285511 | Maguire et al. | Nov 2011 | A1 |
20110287718 | Abel | Nov 2011 | A1 |
20110295108 | Cox et al. | Dec 2011 | A1 |
20110307309 | Forster et al. | Dec 2011 | A1 |
20110320291 | Coon | Dec 2011 | A1 |
20110320314 | Brown | Dec 2011 | A1 |
20110320345 | Taveau et al. | Dec 2011 | A1 |
20120001725 | Chen | Jan 2012 | A1 |
20120011572 | Chew et al. | Jan 2012 | A1 |
20120013448 | Baranowski | Jan 2012 | A1 |
20120024951 | Graeber | Feb 2012 | A1 |
20120029990 | Fisher | Feb 2012 | A1 |
20120032632 | Soar | Feb 2012 | A1 |
20120039472 | Liu et al. | Feb 2012 | A1 |
20120055998 | Mieslinger | Mar 2012 | A1 |
20120059741 | Khan et al. | Mar 2012 | A1 |
20120061465 | Luo | Mar 2012 | A1 |
20120072979 | Cha | Mar 2012 | A1 |
20120075148 | Cho | Mar 2012 | A1 |
20120083205 | Marcu et al. | Apr 2012 | A1 |
20120089845 | Raleigh | Apr 2012 | A1 |
20120126700 | Mayfield et al. | May 2012 | A1 |
20120135839 | Watanabe et al. | May 2012 | A1 |
20120015633 | Rodriguez | Jun 2012 | A1 |
20120154633 | Rodriguez | Jun 2012 | A1 |
20120156992 | Walker et al. | Jun 2012 | A1 |
20120218084 | Arponen et al. | Aug 2012 | A1 |
20120253646 | Reghunath | Oct 2012 | A1 |
20120253974 | Haikonen et al. | Oct 2012 | A1 |
20120256494 | Kesler et al. | Oct 2012 | A1 |
20120265596 | Mazed et al. | Oct 2012 | A1 |
20120265682 | Menon | Oct 2012 | A1 |
20120278676 | Teraura | Nov 2012 | A1 |
20120297204 | Buer | Nov 2012 | A1 |
20120309302 | Buhot | Dec 2012 | A1 |
20120315839 | Mumcuoglu et al. | Dec 2012 | A1 |
20130006847 | Hammad et al. | Jan 2013 | A1 |
20130045679 | Orsatti et al. | Feb 2013 | A1 |
20130063008 | Martin | Mar 2013 | A1 |
20130065523 | Yun et al. | Mar 2013 | A1 |
20130106576 | Hinman et al. | May 2013 | A1 |
20130157713 | Stolarczyk | Jun 2013 | A1 |
20130165041 | Bukovjan et al. | Jun 2013 | A1 |
20130173455 | Adams et al. | Jul 2013 | A1 |
20130176184 | Dokai et al. | Jul 2013 | A1 |
20130309965 | Hillan | Nov 2013 | A1 |
20130342323 | Hinman et al. | Dec 2013 | A1 |
20130344805 | Lefley | Dec 2013 | A1 |
20140009268 | Oshima et al. | Jan 2014 | A1 |
20140070850 | Darwhekar et al. | Mar 2014 | A1 |
20140113551 | Krishnan et al. | Apr 2014 | A1 |
20140139347 | Forster | May 2014 | A1 |
20140145823 | Aase | May 2014 | A1 |
20140152856 | Ikeda et al. | Jun 2014 | A1 |
20140227970 | Brockenbrough et al. | Aug 2014 | A1 |
20140229251 | Lim et al. | Aug 2014 | A1 |
20140252083 | Lee et al. | Sep 2014 | A1 |
20140370803 | Haverinen et al. | Dec 2014 | A1 |
20150140929 | Lefley | May 2015 | A1 |
20150334521 | Lee | Nov 2015 | A1 |
20160283759 | Forster | Sep 2016 | A1 |
20170012355 | Pachler et al. | Jan 2017 | A1 |
20170302335 | Sawata et al. | Oct 2017 | A1 |
20170344765 | Forster | Nov 2017 | A1 |
20180049029 | Kumar et al. | Feb 2018 | A1 |
20190384948 | Forster | Dec 2019 | A1 |
20200151402 | Forster | May 2020 | A1 |
Number | Date | Country |
---|---|---|
PI0611910 | Feb 2011 | BR |
1741862 | Mar 2006 | CN |
101233753 | Jul 2008 | CN |
101253750 | Aug 2008 | CN |
201302803 | Sep 2009 | CN |
102217410 | Oct 2011 | CN |
102638446 | Aug 2012 | CN |
0677887 | Oct 1995 | EP |
1127469 | Aug 2001 | EP |
1912437 | Apr 2008 | EP |
1914631 | Apr 2008 | EP |
2143991 | Jan 2010 | EP |
1948995 | Apr 2010 | EP |
2174457 | Apr 2010 | EP |
1792272 | Oct 2010 | EP |
2237519 | Oct 2010 | EP |
2296025 | Mar 2011 | EP |
2309431 | Apr 2011 | EP |
2366937 | Sep 2011 | EP |
2371110 | Oct 2011 | EP |
2783960 | Mar 2000 | FR |
2002162918 | Jun 2002 | JP |
2006011422 | Jan 2006 | JP |
2006-030882 | Feb 2006 | JP |
2006030883 | Feb 2006 | JP |
2006058435 | Mar 2006 | JP |
2006349887 | Dec 2006 | JP |
2007034362 | Feb 2007 | JP |
2007114924 | May 2007 | JP |
20100072115 | Oct 2017 | KR |
WO2006031824 | Mar 2006 | WO |
WO2006095212 | Sep 2006 | WO |
WO2006098765 | Sep 2006 | WO |
WO2006111782 | Oct 2006 | WO |
WO2006111797 | Oct 2006 | WO |
WO2007002459 | Jan 2007 | WO |
WO2007035835 | Mar 2007 | WO |
WO2007064069 | Jun 2007 | WO |
WO2008034937 | Mar 2008 | WO |
WO2008063706 | May 2008 | WO |
WO2008087431 | Jul 2008 | WO |
WO2008132269 | Nov 2008 | WO |
WO2008142455 | Nov 2008 | WO |
WO2009028203 | Mar 2009 | WO |
WO2010077194 | Jul 2010 | WO |
WO2010095988 | Aug 2010 | WO |
WO2010148816 | Dec 2010 | WO |
WO2011010970 | Jan 2011 | WO |
WO2011020041 | Feb 2011 | WO |
WO2011033424 | Mar 2011 | WO |
WO2011053914 | May 2011 | WO |
WO2011088190 | Jul 2011 | WO |
WO2011109092 | Sep 2011 | WO |
WO2011112778 | Sep 2011 | WO |
WO2011121488 | Oct 2011 | WO |
WO2012037255 | Mar 2012 | WO |
Entry |
---|
Domdouzis et al., Radio Frequency Identification (RFID) applications: A brief introduction, 2007, Elsevier, Advanced Engineering Informatics vol. 21, pp. 351-355 (Year: 2007). |
Australia: Examination Report dated Jun. 13, 2017; Application No. 2016202079; 3 pages. |
“AN1445: Antenna design guide for MFRC52x, PN51x and PN53x, Rev. 1.2, Document AN1445_12”, NXP B.V., (Oct. 11, 2010), 65 pgs. |
“Radio-Frequency-Identific@tion, http://rfid-handbook.com”, advertisement (Dec. 2, 2011), 5pgs., RFID-Handbook 3rd edition, Wiley and Sons LTD, Kalus Finkenzeller. |
“NFC Record Type Definition (RTD)”, Technical Specification NFC Forum, RTD 1.0, NFCForum-TS-RTD_1.0, (Jul. 24, 2006), 20 pgs. |
“Radio Frequency Identification (RFID): A Focus on Information Security and Privacy”, OECD_Digital_Economy_Papers,_No._138, Jan._14,_2008,_11-81. |
“South Korea Telecommunications Report Included BMI's Forecasts”, Q2 2012, Business Monitor International Ltd., (Apr. 2012), 94 pgs. |
A Near Field Communication Tool for Building Intelligent Environment using Smart Posters, International Journal of Computers and Communications, Issue 1, vol. 4, 2010, Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, and Miguel Angel Gomez-Nieto. |
A pervasive presentator—Simplifying the task of presenting, Lulea University of Technology; Viktor Lindgren, Mattias Lundberg, Elias Naslund, John Viklund. |
A System of Secure Virtual Coupons Using NFC Technology, IEEE Computer Society, CompProceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07); Manfred Aigner, Sandra Dominikus, Martin Feldhofer. |
Alios Ferscha, Orientation sensing for gesture-based interaction with smart artifacts, 2005. |
Amato-McCoy, Deena M., Crime stoppers: by focusing their loss prevention efforts on the entire enterprise, grocers are in a better position to combat internal and external theft. Grocery Headquarters, v77, n 11, p. 101 (3). Nov. 2011. |
Anonymous, “Near-field communications will be standard technology for mobiles”, Electronics Weekly, (Feb. 21, 2007), p. 8. |
Antoniou, Zoe, “NFC-Based Mobile Middleware for Intuitive User Interaction With Security in Smart Homes”, Proc. of the 5th IASTED International Conference on Communication Systems and Networks (CSN'06), Aug. 28-30, 2006, Palma De Mallorca, Spain, Track 543-038, 6pgs. |
Application of Near Field Communication for Health Monitoring in Daily Life; Esko Strommer, Jouni Kaartenen, Juha Parkka, Arto Ylisauko-oja, Ilkka Korhonen; Proceedings of the 28th IEEE EMBS Annual International Conference New York City, USA, Aug. 30-Sep. 3, 2006. |
Bauer-Reich, et al. “Low-profile, high-permeability antennaless RFID tags for use on metal objects”Proceedings of the 2012 IEEE International Workshop on Antenna Technology (iWAT), (Mar. 5-7, 2012), 32-35. |
Becher, Michael et al., “Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices”, 2011 IEEE Symposium on Security and Privacy, 96-11. |
Bling: NFC Arrives in U.S., Sam Churchill, Oct. 27, 2010, http://www.dailywireless.org/2010/10/27/bling-nfc-arrives-in-u-s/. |
Bovelli, S., “A Novel Antenna Design for Passive RFID Transponders on Metal Surfaces”, Proceedings of the 36th European Microwave Conference, Manchester, UK (Sep. 2006) 580-582. |
Broll, Gregor, et al., “Touch to Play—Exploring Touch-Based Mobile Interaction with Public Displays”, 3rd International Workshop on Near Field Communication, Feb. 22, 2011, 15-20. |
Cavoukian, A. “Mobile Near Field Communications (NFC)—Tap'n Go—Keep it Secure & Private”, Information and Privacy Commissioner, Ontario, Canada/Privacy by Design (Nov. 2011), 22 pgs. |
Chai, Qi, “Design and Analysis of Security Schemes for Low-cost RFID Systems”, Doctor of Philosophy Thesis in Electrical and Computer Engineering, University of Waterloo, Ontario, Canada, 2012, 184 pgs. |
Cheng, Hsu-Chen, et al., “A Secure and Practical Key Management Mechanism for NFC Read-Write Mode”, J. Computational Information Systems, 7:11, (2011), 3819-3828. |
Cheng, Jerry, et al., “SmartSiren: Virus Detection and Alert for Smartphones”, MobiSys'07, Jun. 11-4, 2007, San Juan, Puerto Rico, 258-271. |
Choi, Kwanghoon, et al., “A Secure Application Invocation Mechanism in Mobile Phones for Near Field Communication”, 2012 IEEE International Conference on Consumer Electronics (ICCE), Jan. 2012, 731-732. |
Christian Metzger et al: “Making Radio Frequency Indentificaiton Visible—A Watchdog Tag”, Fifth Annual IEEE International Conference on pervasive computing and communications workshops, Mar. 19-23, 2007. |
Christianson, B., et al. (eds), “Security Protocols”, 13th International Workshop, Revised Selected Papers, Cambridge, UK, (Apr. 20-22, 2005), Lecture Notes in Computer Science 4631, Springer-Verlag, Berlin 354 pgs. |
Close Contact: An Examination of the Future of Near Field Communications, International Journal of Management & Information Systems—First Quarter 2012 vol. 16, No. 1; Chris Rose Capella. |
Cole, P.H., et al., Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting, First Edition, Springer-Verlag, Berlin (2003) 350pgs. |
Connecting the Mobile Phone with the Internet of Things—Benefits of EPC and NFC Compatibility; Thomas J.P. Wiechert, Florian Michahelles. |
Coppolino, Luigi, et al., “A Trusted information Agent for Security Information and Event Management”, ICONS 2012: The Seventh International Conference on Systems, 6-12. |
Do you talk to each poster? Security and Privacy for Interactions with Web Service by means of Contact Free Tag Readings, Peter Schoo, Massimo Paolucci. |
Dodson, B., et al. “Micro-Interactions with NFC-Enabled Mobile Phones”, Proceedings of the Third International Conference on Mobile Phones, Proceedings of the Third International Conference on Mobile Computing, Applications, and Services (MobiCASE), Los Angeles, CA, Oct. 2011. Retrieved from the Internet: <URFL:http://mobisocial.stanform.edu/papers/mobicase11.pdf>, 20pgs. |
Elliptic Curve Certificates and Signatures for NFC Signature Records, Reasearch in Motion, Certicom Research; Tony Rosati, Greg Zaverucha. |
Enabling RFID in Retail, George Roussos, Birkbeck, University of London, IEEE Computer Society, Mar. 2006. |
Encrypted NFC emergency tags based on the German Telematics Infrastructure, 2011 Third International Workshop on Near Field Communication, Sebastian Dunnebeil, Felix Kobler, Philip Koene, Helmut Kremar, Jan Marco Leimeister. |
Enhancing Authentication in eBanking with NFC enabled mobile phones, Aug. 11, 2008, Diego Alejandro Ortiz-Yepes. |
Enhancing Security and Usabiliy Features of NFC, 2009; Beygo, Omer Kerem; Eraslan, Cihan. |
Finkenzeller, K., “Known attacks on RFID systems, possible countermeasures and upcoming standardization activities”, presentation slides, RFID-Systech, Bermen, Germany, Jun. 2009. Retrieved from the internet: <URL:http://rfid-handbook.de/downloads/finkenzeller_Systech-Bremen-2009_v1.0.pdf>, 31pgs. |
Francis, Lishoy, et al., “Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones”, The 6th Workshop on RFID Security (RFIDSec 2010), Istanbul, Turkey (LNCS), Jun. 7-9, 2010, 35-49. |
Francis, Lishoy, et al., “Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones”, In Cryptology ePrint Archive, Report 2011/618, Nov. 2011, 16pgs. |
Gebhart, M, et al., “Design of 13.56 MHz Smartcard Stickers with Ferrite for Payment and Authentication”, Proceedings of the 2011 3rd International Workshop on near Field Communication (NFC), Feb. 21-22, 2011. Retrieved from the Internet: <URL:https://online.tugraz.at/tug_online/voe_main2.getVollText?pDocumentNr=202812&pCurrPk=59398>, 6pgs. |
Ghanname, Taoufik. How NFC can to speed Bluetooth transactions—today. Eetimes. Feb. 14, 2006. Retieved at http://eetimes.com/General/PrintView/4012606. |
Hancke, G.P., “Practical Eavesdipping and Skimming Attacks on high-Frequency RFID Tokens”, Perprint version of article published in Journal of Computer Security vol. 19 Issue 2. (Jun. 2010). Retrieved from the Internet: <URL:http://www.rfidblog.org.uk/HanckeJoCSS specialRFIDJune2010.pdf>, 23 pgs. |
Hancke, G.P., “Security of proximity identification systems”, technical Report, No. 752, Unicersity of Cambridge Computer Laboratory, UK (Jul. 2009), 161 pgs. |
Hancke, G.P., et al., “Security Challenges for User-Oriented RFID Applications within the ‘Internet of Things’”, J. Internet Technology, vol. 11, No. 3, 2010, 307-313. |
Hardy, Robert, et al., “Touch & Interact: Touch-based Interaction of Mobile Phones with Displays”, MobileHCL 2008, Proc. 10th international conference on Human computer interaction with mobile devices and services, 245-254. |
Haselsteiner, Ernst, et al., “Security in Near Field Communication (NFC): Strengths and Weaknesses”, Proceedings of the Workshop on RFID Security (RFIDSec), Graz, Austria, Jul. 12-14, 2006, 11pgs. |
Hend S. Al-Khalifa: “Utilizing QR Code and Mobile Phones for Blinds and Visually Impaired People”, copyright 2008. |
Hinske, S., et al., “RFIDice—Augmenting Tabletop Dice with RFID”, Journal of Virtual Reality and Broadcasting, vol. 5, No. 4 (2008), 12 pgs. |
Husni, EMIR, et al, “Efficient Tag-to-Tag Near Field Communication (NFC) Protocol for Secure Mobile Payment”, 2nd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), Bandung, Indonesia, Nov. 8-9, 2011, 97-101. |
International Preliminary Report on Patentability and Written Opinion dated Apr. 21, 2015 for International Application PCT/US13/031448 filed Mar. 14, 2013. |
International Preliminary Report on Patentability and Written Opinion dated Jul. 31, 2012 for International Application PCT/US11/022680 filed Jan. 27, 2011. |
International Preliminary Report on Patentability and Written Opinion dated Jul. 31, 2012 for International Application PCT/US11/022687 filed Jan. 27, 2011. |
International Preliminary Report on Patentability and Written Opinion dated Mar. 4, 2014 for International Application PCT/US12/053322 filed Aug. 31, 2012. |
International Preliminary Report on Patentability and Written Opinion dated Mar. 10, 2015 for International Application PCT/US13/031136 filed Mar. 14, 2013. |
International Preliminary Report on Patentability and Written Opinion dated May 19, 2015 for International Application PCT/US13/031131 filed Mar. 14, 2013. |
International Search Report dated Aug. 20, 2013 for International Application PCT/US13/031131 filed Mar. 14, 2013. |
International Search Report dated Aug. 6, 2013 for International Application PCT/US13/031448 filed Mar. 14, 2013. |
International Search Report dated Aug. 3, 2011 for Internation Application PCT/US11/022680 filed Jan. 16, 2011. |
International Search Report dated Mar. 11, 2011 for Internation Application PCT/US11/022687 filed Jan. 27, 2011. |
International Search Report dated May 22, 2013 for International Application PCT/US13/031136 filed Mar. 14, 2013. |
International Search Report dated Nov. 21, 2012 for International Application PCT/US12/053322 filed Aug. 31, 2012. |
Johansson, B., “An Introduction to RFID—Information Security and Privacy Concerns”, TDDC03 Projects, (Spring 2004), 14 pgs. |
Jonathan W. Valvano, Embedded System, 2009, https://books.google.ca/books?id=_JFsCgAAQBAJ&q=smart+scan+in+box+using+electronic+instructions#v=onepage&q&f=false. |
Juels, A., et al., “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy”, Proceedings of ACC CCS'03, Washington, DC (Oct. 27-30, 2003), 9 pgs. |
Jung, M, et al., “All-Printed and Roll-to-Roll Printable 13.56-MHz-Operated 1-bit RF Tag on Plastic Foils”, IEEE transactions on electron Devices, (Feb. 19, 2010), 10 pgs. |
Kazmi, Hammad Raza, “Security and Privacy Issues in Near Field Communication (NFC) Systems”,Master Thesis, Royal Institute of Technology, Sweden, Apr. 2011, 59 pgs. |
Kfir, Ziv, et al., “Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems”, Proceeding of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Sep. 5-9, 2005, 47-58. |
Kortvedt, H.S., “Securing near Field Communication”, Thesis for Master of Science in Communication Technology, Norwegian University of Science and Technology, (Jun. 2009), 135 pgs. |
Kuo, S., “A performance evaluation method for EMI sheet of metal mountable HR RFID tag”, Measurement, 44 (2011), 946-953. |
Kupusamy, K S et al “A Model for Remote Access and Protection of Smartphones JUsing Short Message Service”, International]. Computer Science, Engineering and. Iñformation Technology (IJCSEIT), vol. 2, No. 1, (Feb. 2012), 91-1 00. |
LocaTag-An NFC-based system enhancing instant messaging tools with real-time user location; Kobler, Philip Koene, Helmut Kremar, Matthias Altmann, Jan Marco Leimeister. |
Location-Triggered Code Execution-Dismissing Displays and Keypads for Mobile Interaction; W. Narzt and H. Schmitzberger. |
Long, Men, et al., “Human Perceivable Authentication: An Economical Solution for Security Associations in Short-Distance Wireless Networking”, Proceedings of 16th International Conference on Computer Communications and Networks, Aug. 13-16, 2007, 257-264. |
Madlmayr, Gerald, et al., “NFC Devices: Security & Privacy”, Proceedings of the 3rd International Conference on Availability, Reliability and Security, Barcelona, Spain, Mar. 7, 2008, 13 pgs. |
Media Clips: Implementation of an Intuitive Media Linker; Seunghyun Yoon, Kyuyun Lee, Hyunchang Shin, Samsung Electronics, 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) held Jun. 8-10, 2011. |
Mitrokotsa, A., et al., “Classification of RFID Attacks”, Proceedings of the 2nd International Workshop on RFID Technology—Concepts, Applications, Challenges (IWRT 2008), in conjuction with the 10th International Conference on Enterprise Information Systems, pp. 73-86, Barcelona, Spain, Jun. 2008. INSTICC Press, Portugal. Retrieved from the Internet: <URL: http://www.cs.vu.nl/˜ast/publications/iwrt-2008.pdf>. |
Mobile Personal Devices meet Situated Public Displays: Synergies and Opportunities; Alan Dix, Corina Sas (2010). International Journal of Ubiquitous Computing (IJUC), 1(1), pp. 11-28. http://www.hcibook.com/alan/papers/MPD-SPD-2010/. |
Mulliner, Collin, “Attacking NFC Mobile Phones”, 25th Chaos Communication Congress, Berlin, Germany (Dec. 2008). Retrieved from the internet : <URL:http://www.mulliner.org/nfc/feed/collin_mulliner_25c3_attacking_nfc_phones.pdf>, 71pgs. |
Mulliner, Collin, “Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones”, 2009 International Conference on Availability, Reliability and Security, Fukuoka, Japan, Mar. 16-19, 2009, 695-700. |
Near Field Communication in Smartphones, Simon Burkard, Berlin Institute of Technology, Germany, 2012. |
Near Field Communications Handbook, vol. 13 of Internet and Communications, 2009; Mohammad Ilyas, https://books.google.co.in/books?id=xVZMTU8SpQAC&I pg=PA25&ots=2A3z7a-b93&dq=NFC%20adhesive%20tags%20security%20code &Ir&pg=PA25#v=onepage&q&f=false, pp. 30-49, 2009. |
Newport Digital Technologies to Implement Microsoft Licensing Agreement; Prepares to Launch First Ruggesized RFID Reader with Windows Mobile Operating System. Business Wire. Oct. 20, 2009. |
NFC and Mobile Payments Today, Andre Filipe de Axevedo Figueiredo Cruz, Nov. 2011. |
NFC Data Exchange Format (NDEF), Technical Specification, NDEF 1.0, Jul. 24, 2006. |
NFC Forum Type Tags, White Paper V1.0, Apr. 1, 2009-Public. |
NFC Mobile Parlor Games Enabling Direct Player to Player Interaction, 2011 Third International Workshop on Near Field Communication, Avinash Nandwani, Paul Coulton, Reuben Edwards. |
NFC-Based Mobile Interactions with Direct-View Displays; Khoovirajsingh Seewoonauth, Enrico Rukzio, Robert Hardy, and Paul Holleis. |
NFC-CAP Security Assessment, vol. 1.0—May 11, 2009; Diego A. Ortiz-Yepes. |
Ongtang, Machiagar, et al. “Semantically Rich Application-Centric Security in Android”, Security and Communication Networks, vol. 5, Issue 6, Jun. 2012, 658-673. |
Opoku, Samuel King, “Performance Enhancement of Large-Size NFC Multi-Touch System”, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), (Oct. 2011), 52-57. |
Oren, Y., “Attacks on RFID-Based Electronic Voting System”, Cryptology ePrint Archive, Report 2009/442 (2009). Retrieved from the Internet<URL: http://eprint.iacr.org/2009/422.pdf>, 21 pgs. |
Physical browsing with NFC technology; Heikki Ailisto, Tapio Matinmikko, Juha Haikio, Arto Ylisaukko-oja, Esko Strommer, Mika Hillukkala, Arto Wallin, Erkki Siira, Aki Poyry, Vili Tormanen, Tua Huomo, Tuomo Tuikka, Sonja Leskinen & Jarno Salonen. |
Programming Android; Zigurd Mednieks, Laird Domin, G. Blake Meike, Masumi Nakamura, O'Reilly Media, Inc., 2011, https://books.google.com/books/about/Programming_Android.html?id=QP7VvnhDOOsC. |
QR Code Tech Info: MECARD Format, May 2, 2011. |
QRFactory, Redirectable QR, http://dashboard.qrfactory.com/. |
Rahnama, Behnam, et al., “Securing RFID-Based Authentication Systems Using ParseKey+”, Proceedings of the 3rd International Conference on Security of Information and Networks,_Taganrog,_Russia, Sep. 7-11, 2010,_212-217. |
RFID based applications in culture, media and creative industries, 2011 Third International Workshop on Near Field Communication, Eileen Kuehn, Jens Reinhardt, Stephan Bergemann, Prof. Dr. Juergen Sieck. |
RFID Inventory Management System. Package Printing, v57 n2, pp. 34. Feb. 2010. |
Rieback, M.R., et al., “A Platform for RFID Security and Privacy Administration”, Proceedings of the 20th USENIX/SAGE Large Installation System Administration conference (LISA 2006), Washington D.C., (Dec. 2006). Retrieved from the Internet: <URL: http://www.rfidguardian.org/images/a/a9/Lisa.06.pdf>, 14 pgs. |
Rieback, M.R., et al., “The Evolution of RFID Security”, Pervasive Computing (Jan.-Mar. 2006), 62-69. |
Roland, M., “Security Vulnerabilities of the NDEF Signature Record Type”, Presentation from WIMA 2011—NFC Research Track, Monaco (Apr. 19, 2011). Retrieved from the Internet: <URL:http://www.wima.mc/dan/2011/CONF_PDF/TUESDAY/AM/ROLAND.pdf>, 14pgs. |
Roland, Michael, et al., “Digital Signature Records for the NFC Data Exchange Format”, Second International Workshop on Near Field Communication, Monaco, Apr. 20, 2010, 71-76. |
Sabzevar, A.P., “Security in RFID Systems”Project report for GMU ECE 646 (2004). Retrieved from the Internet: <URL: http:teal.gmu.edu/courses/ECE646/project/reports_2004/SP-4_report.pdf>, 13pgs. |
Sarma, S.E., et al., “RFID Systems and Security and Privacy Implications”, CHES 2002, LNCS 2523, B.S. Kaliski Jr. et al. (Eds.) (2003), pp. 454-469, 2003. |
Secure contactless mobile financial services with Near Field Communication, Adeola Oluwaseyi Poroye, Thesis submitted to Department of Computer Science, University of the Western Cape, Aug. 2011, 150 pages. |
Simple NDEF Exchange Protocol, Technical Specification, NFC Forum SNEP 1.0, Aug. 31, 2011. |
Situated Door Displays and how to interact with them, Barbara Schmid, Jan. 16, 2012. |
Smart Poster Record Type Definition Technical Specification NFC ForumTM SPR 1.1 NFCForum-SmartPoster_RTD_1.0, Jul. 24, 2006. |
Suh, J., “Introduction to composite electromagnetic noise absorber technology” EMC Directory & Design Guide, (2007), 4 pgs. |
Switching the role of NFC tag and reader for the implementation of Smart Posters, 2012 4th International Workshop on Near Field Communication; Dirk Volland, Kay Noyen, Onur Kayikei, Lukas Ackermann, Florian Michahelles, pp. 63-68. |
Thamilarasu, G et al. “Intrusion detection in RFID systems” Military Communications Conference, 2008. MILCOM 2008. Piscataway, NJ, Nov. 16, 2008, pp. 1-7, ISBN: 978-1-4244-2676-8. |
The “Weak Spots” in Stacked UHF RFID Tags in NFC Applications, IEEE RFID 2010; Xiaosheng Chen, Feng Lu, Terry T.Ye. |
The Junction Protocol for Ad Hoc Peer-to-Peer Monile Applications; Computer Science Department Stanford University; Ben Dodson, Aemon Cannon, Te-Yuan Huang, Monica S. Lam, Apr. 2011. |
The Mobile Phone as Digital SprayCan; Philip Garner, Omer Rashid, Paul Coulton, and Reuben Edwards, Proceedings of the 2006 ACM SIGCHI international conference on advances in computer entertainment technology, Article No. 12, Hollywood, California, USA. Jun. 14-16, 2006. |
Touch-driven Interaction Between Physical Space and Cyberspace with NFC, Longbio Chen, Gang Pan, Shijian Li, Department of Computer Science, Zhejiang University Hangzhou, China, 2011 IEEE International Conferences on Internet of Things and Cyber, Physical and Social Computing. |
Turcu, C. (ed.), Development and Implementation of RFID Technology, In-Tech, I-Tech Education and Publishing KG, Vienna, Austria (Feb. 2009), 564 pgs. |
Type 1 Tag Operation Specification, Technical Specification, Technical Specification, NFC Forum T1TOP 1.1, Apr. 13, 2011. |
Type 2 Tag Operation Specification Technical Specification, T2TOP 1.1 NFC Forum May 31, 2011. |
Type 3 Tag Operation Specification, Technical Specification, Technical Specification, NFC Forum, T3TOP 1.1, Jun. 28, 2011. |
Valkkynen, Pasi, et al.,' Suggestions for Visualizing Physical Hyperlinks, PERMID 2006: Pervasive Mobile Interaction Devices—Mobile Devices as Pervasive User Interlaces and Interaction Devices, Dublin, Ireland, May 7, 2006, 245-254. |
Varshney , L.R., et al.., “Securing Inductively-Coupled Communication”, Information Theory and Applications Workshop (ITA) (Feb. 5-10, 2012), 6 pgs. |
Vidano, R., “13.56-MHz Inductively Coupled Card Compatibility to Conducting Surfaces”, Proceedings of Asia-Pcific Microwave Conference (2007), 4 pgs. |
Violino, Bob. A Summary of RFID Standards. RFID Standards. RFID Journal. Jan. 16, 2005. URL at http://www.rfidjournal.com/articles/view?135. |
Wang, J.J.H., “Spiral Antennas in RFID and Their Size Reduction and Performance Enhancement”, 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification (Apr. 16-18, 2007), 44-47. |
Wegleiter, H. et al., “Automatic Antenna Tuning Unit to improve RFID System Performance”, IEEE Transactions on Instrumentation and Measurement, vol. 60, No. 8, (Aug. 2011), 2797-2803. |
Weis, Stephen A, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, Security in Pervasive Computing 2003, LNCS 2802, D. Hutter et al. (Eds.) (2004) 201-212. |
Yamada, I., et al., “Secure Active RFID Tag System”, Ubicomp2005 Workshops, 5pgs. |
Zhu, H., et al., “Solutions of Metal Surface Effect for HF RFID Systems”, 2007 International Conference on Wireless Communications, Networking and Mobile Computing (WiCom), (Sep. 21-25, 2007), 2089-2092. |
Number | Date | Country | |
---|---|---|---|
20110185607 A1 | Aug 2011 | US |
Number | Date | Country | |
---|---|---|---|
61311473 | Mar 2010 | US | |
61299609 | Jan 2010 | US |