The present inventive subject matter relates generally to the art of graphic displays and/or signage.
Illuminated signage and/or graphic displays are generally known. Commonly, illuminated signage will include graphic media, e.g., such as paper or polymeric film having a desired image thereon, that is illuminated from the back or the front or in some instances the side or edge. In general, backlight or backlit applications are those in which the media is illuminated from the side of the media that is opposite the side from which the media is intended to be viewed, while front-light or front-lit applications are those in which the media is illuminated from the same side in which the media is intended to be viewed. In side or edge-lit applications, the graphic media is generally mounted to a pane of glass or other suitable light guide which is illuminated from the edge or side. In turn, the pane of glass or other suitable light guide directs the light onto and/or through the graphic media.
In backlight applications, the graphic media is typically transparent, semitransparent or translucent.
Accordingly, a new and/or improved media, display and/or method for using the same are disclosed which addresses the above-referenced problem(s) and/or others.
The embodiments of the present invention described below are not intended to be exhaustive or to limit the invention to the precise forms disclosed in the following detailed description. Rather, the embodiments are chosen and described so that others skilled in the art may appreciate and understand the principles and practices of the present invention.
In accordance with one embodiment, an advertising system is described and includes a graphic supporting frame having an activatable light source. An advertising graphic having printed or imaged indicia is provided in connection with a marketing or advertising campaign. A RFID inlay is provided on the advertising graphic, the inlay includes a substrate having first and second surfaces, with an antenna and a chip disposed on the first surface. The chip is encoded with information relating to the advertising graphic. An activator is used for activating and reading the chip on the RFID inlay and for causing a first signal to be sent to the graphic supporting frame. A processor is provided for receiving the first signal and for transmitting a second signal to the activator.
In accordance with another embodiment, an advertising graphic having a graphic media with a printable surface. A RFID inlay is associated with the advertising graphic, the RFID inlay has a surface with a chip and antenna provided thereon. The RFID inlay is attached to the graphic media, the chip of the RFID inlay including information relating to the graphic media and an advertising message provided on the graphic media and matching to information contained on the chip on the RFID inlay.
In a yet still further exemplary embodiment of the presently described invention, a method of using an advertising system. The method includes the steps of initially providing a frame that has an illumination source, RFID reader and controller connected to the RFID reader. Then, producing a replaceable graphic, the graphic having advertising and/or marketing information provided on a surface of the graphic. Next, a RFID inlay is associated with the replaceable graphic, the RFID inlay having a chip encoded with product information and illumination instructions. Once an individual is sensed as being near the frame, the illumination source is increased in connection with the illumination instructions provided on the chip. If the individual has a mobile communication device, the device is positioned near the frame and the information encoded on the chip on the RFID inlay is read which generates information on the mobile communication device for the user to act on.
The foregoing embodiment, may also include the further steps of unlocking the display so as to be able to remove the replaceable graphic and providing an authentication code on the RFID chip. Reading the authentication code can enable the appropriate user to remove the replaceable graphic.
Numerous other features and advantages of the present invention will become apparent to those skilled in the art from the following detailed description. It is to be understood, however, that the detailed description of the various embodiments and specific examples, while indicating preferred and other embodiments of the present invention, are given by way of illustration and not limitation. Many changes and modifications within the scope of the present invention may be made without departing from the spirit thereof, and the invention includes all such modifications.
The inventive subject matter disclosed herein may take form in various components and arrangements of components, and in various steps and arrangements of steps. The drawings are only for purposes of illustrating preferred embodiments and are not to be construed as limiting. Further, it is to be appreciated that the drawings may not be to scale.
The apparatuses and methods disclosed in this document are described in detail by way of examples and with reference to the figures. Unless otherwise specified, like numbers in the figures indicate references to the same, similar, or corresponding elements throughout the figures. It will be appreciated that modifications to disclosed and described examples, arrangements, configurations, components, elements, apparatuses, methods, materials, etc. can be made and may be desired for a specific application. In this disclosure, any identification of specific shapes, materials, techniques, arrangements, etc. are either related to a specific example presented or are merely a general description of such a shape, material, technique, arrangement, etc. Identifications of specific details or examples are not intended to be, and should not be, construed as mandatory or limiting unless specifically designated as such. Selected examples of apparatuses and methods are hereinafter disclosed and described in detail with reference made to FIGURES.
In general, there is disclosed herein a graphic display and/or illuminated sign. In particular, the display or sign holds or otherwise supports a graphic media intended to be viewed, e.g., by the public or some other desired audience. Suitably, the graphic media is, e.g., a paper, metal foils or films, or polymeric film having a desired image printed, laminated or otherwise formed thereon. The image may also be formed by perforating the film or foil using different perforation sizes or patterns to create the image. For example, the image may include, without limitation, text, graphics, photographic images and/or combinations of any of the foregoing. Depending on the application, the graphic media may be transparent, semi-transparent or translucent. The image may be multi-color, black and white or otherwise monotone.
In practice, the graphic media is selectively mounted in, on or to the display/sign, and from time-to-time can be changed as desired by a user of the display/sign. That is to say, one graphic media, e.g., having a first image printed or formed thereon, can be exchanged for another graphic media, e.g., having a second image printed or formed thereon or to inform the viewer of a change in condition, such as a sale or other promotion. That is, the image may remain the same but additional information may be provided with the original graphic. In this way, the display/sign can be updated or changed as desired by the user to present various different graphic media to the target audience. For example, the display/sign may be used to provide advertising that a user may wish to change from time-to-time. Accordingly, rather than replacing the entire display or sign, the user merely replaces the graphic media mounted thereto or otherwise held thereby.
Suitably, when mounted in, on or to the display or sign, the graphic media is selectively illuminated by one or more light sources. Optionally, the display or signage may be implemented as a backlit application, a front-lit application or a side or edge-lit application. The light source optionally comprises a light emitting diode (LED) or a collection of multiple LEDs. The LEDs can be conventional LEDs or organic LEDs. Alternately, other electroluminescent material can be employed as the light source or other conventional light sources may be employed, e.g., incandescent or fluorescent lighting. Optionally, a plurality of light sources are provided which each emit light at a different wavelength or a single light source is provided which is capable of emitting light at a plurality of different wavelengths. In one embodiment, the light source includes one or more layers or elements which produce different wavelengths of light. Suitably, by appropriate control of the light source or sources, the color and/or wavelength of the illumination can therefore be selected as desired. In one exemplary embodiment, the intensity of the illumination is also able to be selectively controlled.
In a suitable embodiment, one or more of a variety of power sources are optionally included to provide electrical power for the display/sign, e.g., to selectively power the light source or other electronic components. In one embodiment, the power source may be a solar cell or other like photovoltaic element. In another embodiment, the power source may be a battery, e.g., which may be rechargeable. Alternately, electrical power can be obtained for the display or sign via a conventional wall outlet or other like source operatively connected to an electrical mains or conventional power grid. In still another embodiment, electrical power is supplied to the display or signage via an equipped coil or loop of conductive wire or the like which is inductively or magnetically coupled, e.g., to an external drive circuit or the like. Suitably, an AC (alternating current) power signal is picked up from the drive circuit by the inductively and/or magnetically coupled conductive coil or loop equipped on or in the display/sign. Optionally, the power may be rectified and/or otherwise conditioned prior to its delivery to the light source and/or other electronic components of the display/sign. If a rechargeable battery is employed, optionally, it may be recharged via a photovoltaic or other suitable source, e.g., such as those mentioned herein.
The display or sign is also optionally equipped with an RFID (Radio Frequency IDentification) reader or other like communication device such as a near field communication device (NFC). Suitably, the reader is provisioned to communicate with an RFID device carried by the graphic media. Optionally, the RFID device carried by the graphic media is position thereon, so that when the graphic media is installed in or on the display/sign, the RFID device is sufficiently close to the reader (or an antenna thereof) to permit communication to be established between the RFID device and the reader. While referred to herein as a reader, it is to be appreciated that optionally the reader may also may selectively write and/or up-load data or information to the RFID device and/or program the RFID device.
For example, the RFID device may be integrated on or into the media itself or it may be implemented as a label or sticker which is applied to the media. Although the description herein mainly references RFID technology, it is to be appreciated that smartcard technology and/or other like technologies (e.g., that may be based on contact reading and writing of electronic information) are also contemplated and may be utilized for alternate embodiments in appropriate circumstances. However, the advantage of RFID technology and/or similar wireless communication technologies is that it provides greater freedom or leeway in the positioning of the RFID or other like device on the graphic media.
Suitably, the display and/or sign also includes a controller that regulates and/or otherwise controls operation of the display/sign. In one embodiment, the controller selectively controls the light source, e.g., to turn the illumination on or off, to control or vary the color or wavelength of emitted illumination, to control or vary the intensity of the illumination, etc. Optionally, the controller is in operative communication with and/or responsive to the reader, and accordingly controls operation of the display/sign based upon data, information and/or other communications received from the RFID device.
In one suitable embodiment, the RFID device is loaded with and/or otherwise contains authentication data. For example, the authentication data ensures that the graphic media is authentic or genuine. Optionally, upon verification of the authentication data obtained from the RFID device by the reader, the controller enables operation of the display/sign. Alternately, if no valid authentication data is obtained, the controller may disable operation of the display/sign, e.g., by interrupting the delivery of electrical power to the light source or otherwise turning the light source off. Optionally, in response to the detection of authentication data from the RFID device, the controller may control a magnetic or other like lock which protects against unauthorized removal or installation of media.
In another suitable embodiment, the RFID device is loaded with and/or otherwise contains data or information related to illumination characteristics. For example, the data or information may indicate what color, wavelength or intensity or other characteristic of illumination is desired for the particular graphic media on which the RFID device is carried. Accordingly, the reader obtains this information from the RFID device and in turn the controller regulates the light source to achieve the indicated illumination characteristics. In other words, depending on the image depicted by the graphic media or the desired effect one wishes to achieve with the illumination, the RFID device is loaded with data or information indicating suitable illumination characteristics that meet the desired criteria, e.g., the color or wavelength of the illumination, the intensity of the illumination, etc. Of course, for different media or different media content or for different desired effects the RFID device can be selectively loaded or otherwise provisioned with different data or information indicating different desired illumination characteristics. Consequently, when the media carrying the RFID device is installed in or on the display, the reader obtains the data/information and the controller regulates the light source accordingly to achieve the characteristic illumination and/or desired effects specific to the particular media installed in or on the display.
Optionally, the illumination is actively controlled and the RFID device may be provisioned with information or data indicating the desired control sequence or control options or control responses to be executed in response to detected stimuli in order to achieve a desired effect for the particular media carrying the RFID device. For example, via appropriate control of the light source by the controller, the illumination may be cycled or otherwise varied through an array of different colors or wavelengths or the intensity of the illumination may be cycled or varied through an array of different levels. For example, in response to an internal or other clock, the controller may selectively turn the illumination on and off, e.g., such that the signage is illuminated during evening or otherwise dark hours and is not illuminated during daytime or light hours, and thusly the display conserves power. Alternately, the display may be equipped with an ambient light sensor and the controller programmed or otherwise provisioned to turn the illumination on when the detected ambient light falls below a set or otherwise determined threshold, while otherwise leaving or turning off the illumination when the detected ambient light remains or rises above the threshold. In yet another embodiment, the intensity of the illumination from the light source can be controlled by the controller in response to the ambient lighting conditions detected by the light sensor.
In yet another embodiment, the display is optionally equipped or otherwise provisioned with a passive infrared (PIR) sensor or other motion sensor to detect the presence of individuals near the display. Accordingly, the controller can then operate the display in response to the detection of a nearby person or persons. For example, the light source can be turned on or the illumination intensity increased when an individual or audience is detected and the light source can be turned off or the illumination intensity decreased when nobody is detected, thusly the display conserves power when it is not being viewed.
In one suitable option, the light source may provide illumination outside the visible wavelength, e.g., such as UV (ultraviolet) or IR (infrared) illumination. In turn, the graphic media may be printed with a fluorescent ink or otherwise provided with fluorescent material that glows or fluoresces in response to the foregoing illumination. In this way, the visual appeal may be enhanced and/or the appearance of motion may be provided.
In yet another embodiment, an RFID or other like device carried by the media may be programmed or otherwise provisioned to communicate with viewers' mobile phones and/or other communication devices (e.g., a personal digital assistant (PDA) or the like) carried by viewers of the display/sign, for example, using the Near Field Communication (NFC) standard or another suitable standard. Accordingly, for example, when a mobile phone or other device with an integrated NFC or like reader is placed near the RFID or other like device carried on or by the media, it will download content, e.g., relevant to the media, such as data, music or a video or a discount coupon for a product advertised by the media, etc.
With reference now to
For example,
Suitably, the graphic media 80 is, e.g., a paper, foil or polymeric film or laminate having a desired image or content printed or otherwise formed thereon. For example, the image may include, without limitation, text, graphics, photographic images and/or combinations of any of the foregoing. Depending on the application, the graphic media 80 may be transparent, semi-transparent or translucent. The image or content may be multi-color, black and white or otherwise monotone. In addition, the graphic or image for the graphic may be formed by creating a pattern of perforations, holes, slits which may be of a similar or different shape. In addition, a printed image can be combined with a perforation pattern.
For clarity and simplification, the light source 54 has been illustrated as a single element in
As shown in
In suitable embodiments, the power supply 70 is optionally implemented in one or more of a variety of different ways. In one embodiment, the power source 70 may be a solar cell or other like photovoltaic element. In another embodiment, the power source 70 may be a battery, e.g., which may be rechargeable. Alternately, electrical power can be obtained for the display or sign 50 via a conventional wall outlet or other like source operatively connected to an electrical mains or conventional power grid. If a rechargeable battery is employed, optionally, it may be recharged via a photovoltaic or other suitable source, e.g., such as those mentioned herein.
With reference to
Returning attention to
Suitably, the RFID device 82 carried by the graphic media 80 is positioned thereon, so that when the graphic media 80 is installed in or on the display/sign 50, the RFID device 82 is within range of the reader 60 (or the reader's antenna 62) to permit communication to be established between the RFID device 82 and the reader 60. Optionally, the RFID device 82 may be integrated on or into the media 80 itself, such as being laminated into the material or it may be implemented as a label or sticker which is applied to the media 80. The label or tag may be removable from the graphic so as to allow recycling.
In practice, the controller 56 is optionally implemented as a microprocessor or the like that regulates and/or otherwise controls operation of the display/sign 50. In various embodiments, the controller 56 selectively controls the light source 54, e.g., to turn the illumination on or off, to control or vary the color or wavelength of emitted illumination, to control or vary the intensity of the illumination, etc. Again, the controller 56 is optionally in operative communication with and/or responsive to the reader 60, and accordingly controls operation of the display/sign 50 based upon data, information and/or other communications received from the RFID device 82.
In one embodiment, the RFID device 82 is loaded with and/or otherwise contains authentication data. For example, the authentication data may be an otherwise secret alphanumeric code or the like that ensures that the graphic media 80 is authentic or genuine. Optionally, upon verification of the authentication data obtained from the RFID device 82 by the reader 60, the controller 56 enables operation of the display/sign 50. Alternately, if no valid authentication data is obtained, the controller 56 may disable operation of the display/sign 50, e.g., by interrupting the delivery of electrical power to the light source 54 or otherwise turning the light source 54 off. Optionally, in response to the detection of valid or invalid authentication data from the RFID device 82, the controller 56 may control (i.e., selectively engage or disengage) a magnetic or other like lock (not shown). For example, this lock could limit access to an interior or other location or portion of the display 50 or could limit the operation of or access to manual controls, e.g., such as a master on/off or power switch.
Optionally, as described above, the RFID device 82 is loaded with and/or otherwise contains data or information related to illumination characteristics. For example, this data or information may indicate what color, wavelength or intensity or other characteristic of illumination is desired for the particular graphic media 80 on which the RFID device 82 is carried. Therefore, when the media 80 carrying the RFID device 82 is installed in the display 50, the reader 60 obtains this information from the RFID device 82 and in turn the controller 56 regulates the light source to achieve the indicated illumination characteristics. In other words, depending on the image or content on the graphic media 80 or the desired effect one wishes to achieve with the illumination, the RFID device 82 is loaded with data or information indicating suitable illumination characteristics that meet the desired criteria, e.g., the color or wavelength of the illumination, the intensity of the illumination, etc. Of course, for different media or different media content or for different desired effects, the RFID device 82 can be selectively loaded or otherwise provisioned with different data or information indicating different desired illumination characteristics. Consequently, when the media 80 carrying the RFID device 82 is installed in or on the display 50, the reader 60 obtains the data/information and the controller 56 regulates the light source 54 accordingly to achieve the characteristic illumination and/or desired effects specific to the particular media 80 installed in or on the display 50.
Again, as described above, the illumination is optionally actively controlled and the RFID device 82 may be provisioned with information or data indicating the desired control sequence or control options or control responses to be executed in response to detected stimuli in order to achieve a desired effect for the particular media 80 carrying the RFID device 82. For example, via appropriate control of the light source 54 by the controller 56, the illumination may be cycled or otherwise varied through an array of different colors or wavelengths or the intensity of the illumination may be cycled or varied through an array of different levels. For example, in response to an internal or other clock (not shown), the controller 56 may selectively turn the illumination on and off, e.g., such that the signage is illuminated during evening or otherwise dark hours and is not illuminated during daytime or light hours, and thusly the display 50 conserves power. Alternately, in response to the level of ambient light detected by the ambient light sensor 59, the controller 56 may be programmed or otherwise provisioned to turn the illumination on when the detected ambient light falls below a set or otherwise determined threshold, while otherwise leaving or turning off the illumination when the detected ambient light remains or rises above the threshold. In yet another embodiment, the intensity of the illumination from the light source 54 can be controlled by the controller 56 in response to the ambient lighting conditions detected by the light sensor 59. Optionally, the forgoing thresholds, on/off times, etc. may be values stored in the RFID device 82 or otherwise set by the controller 56 in accordance with data obtained from the RFID device 82. The RFID device and controller can be used as part of a power conversation feature as well as a security feature providing lighting during times of darkness such as at the entry of a door or the like.
In yet another embodiment, the controller 56 operates the display 50 in response to the detection of a nearby person or persons, e.g., via the motion sensor 58. For example, the light source 54 can be turned on or the illumination intensity increased when an individual or audience is detected and the light source 54 can be turned off or the illumination intensity decreased when nobody is detected, thus the display 50 conserves power when it is not being viewed.
In still another optional embodiment, an RFID device 82 carried by the media 80 may be programmed or otherwise provisioned to communicate with a viewer's mobile phone and/or other communication device (e.g., a personal digital assistant (PDA) or the like), for example, using the NFC standard or another suitable standard. Accordingly, for example, when a mobile phone or other device with an integrated NFC or like reader is placed near the RFID device 82 carried on or by the media 80, it will download content, e.g., relevant to the media, such as data, music or a video or a discount coupon for a product advertised by the media, etc.
Optionally, the RFID device 82 may be any conventional RFID device as is generally known in the art, e.g., including RFID receivers, transmitters and/or transponders (collectively referred to herein as RFID “devices”). In a suitable embodiment, the RFID device 82 may includes a number of components including an antenna for wirelessly transmitting and/or receiving RF (Radio Frequency) signals and analog and/or digital electronics operatively connected thereto. The RFID device 82 may be a so called active or semi-passive RFID device and may also include a battery or other suitable power source. In conventional parlance, the RFID electronics along with any operatively connected antenna and/or power source are collectively referred to as the RFID inlay. Exemplary RFID inlays are available from Avery Dennison RFID Company of Clinton, S.C.
Suitably, the electronics are implemented via an integrated circuit (IC) or microchip or other suitable electronic circuit and may include, e.g., communications electronics, data memory, control logic, etc. In operation, the IC or microchip functions to store and/or process information, modulate and/or demodulate RF signals, as well as optionally performing other specialized functions.
As discussed above, the RFID reader 60 is generally used to wirelessly obtain data or information communicated from an RFID device 82. The manner in which the RFID reader 60 interacts and/or communicates with the RFID device 82 generally depends on the type of RFID device. Suitably, the RFID device 82 may be a passive device, an active device, a semi-passive device (also known as a battery-assisted or semi-active device).
A passive RFID device actives when the RFID reader 60 is nearby to power the RFID device 82, e.g., via wireless illumination of the RFID device 82 with an RF signal and/or electromagnetic energy from the RFID reader 60. Conversely, a semi-passive or active RFID device is provided with its own power source (e.g., such as a small battery or capacitor). To communicate, the RFID device 82 responds to queries or interrogations received from the RFID reader 60. Optionally, the response is achieved by backscattering, load modulation and/or other like techniques that are used to manipulate the RFID reader's field. Suitably, backscatter is used in far-field applications (i.e., where the distance between the RFID device 82 and reader 60 (or reader's antenna 62) is greater than approximately a few wavelengths), and alternately, load modulation is used in near-field applications (i.e., where the aforementioned distance is within approximately a few wavelengths).
Suitably, if the RFID device 82 is a passive RFID device, then it will signal or communicate its respective data or information by backscattering a carrier wave from the RFID reader 60. That is to say, in the case of a passive RFID device, in order to retrieve information therefrom, the RFID reader 60 typically sends an excitation signal to the RFID device 82. The excitation signal energizes the RFID device 82 which transmits the information stored therein back to the RFID reader 60. In turn, the RFID reader 60 receives and decodes the information from the RFID device 82.
As mentioned earlier, a passive RFID device generally has no internal power supply, although in some instances, the device can be provided with a capacitor to store energy to allow the RFID device to have enough energy to transmit the data on the chip back to the reader. Power for operation of a passive RFID device is provided by the energy in the form of the incoming RF signal received by the RFID device 82 from the RFID reader 60. Generally, a small electrical current induced in the antenna of the RFID device 82 by the incoming RF signal provides just enough power for the IC or microchip in the RFID device 82 to power up and transmit a response. Accordingly, in this case, the antenna of the RFID device 82 is generally designed both to collect power from the incoming signal and also to transmit the outbound backscatter signal. Notably, a passive RFID device has the advantage of simplicity and long life (e.g., having no battery to go dead).
Alternately, the RFID device 82 may be an active RFID device, as opposed to passive one. Suitably, an active RFID device 82 is provisioned with its own transmitter and a power source (e.g., a battery, photovoltaic cell, etc.). In essence, an active RFID device employs the self-powered transmitter to broadcast a signal which communicates the information stored on the IC or microchip in the RFID device. Optionally, an active RFID device will also use the power source to power the IC or microchip employed therein.
In yet another embodiment, the device 82 may be a semi-passive RFID device, which is similar to an active device in that it is provisioned with its own power source, but the battery or capacitor in this case may power the IC or microchip as well as to provide energy to broadcast the signal. Like a passive RFID device, the response from the semi-passive RFID device 82 is powered by means of backscattering the RF energy received from the RFID reader 60, i.e., the energy is reflected back to the reader 60 as with passive devices. In a semi-passive RFID device, the battery may also serve as a power source for data storage.
Optionally, the RFID device 82 operates in one of a variety of frequency ranges including, e.g., a low frequency (LF) range (i.e., from approximately 30 kHz to approximately 300 kHz), a high frequency (HF) range (i.e., from approximately 3 MHz to approximately 30 MHz) and an ultra-high frequency (UHF) range (i.e., from approximately 300 MHz to approximately 3 GHz). Suitably, if a passive RFID device is employed, it may optionally operate in any one of the aforementioned frequency ranges. In exemplary embodiments, for example, where a passive device 82 is employed: in a LF system, the device 82 may operate at around 124 kHz, 125 kHz or 135 kHz; in a HF system, the device 82 may operate at around 13.56 MHz; and, in a UHF system, the device 82 may use a band anywhere from 860 MHz to 960 MHz. Alternately, a passive device system may also use 2.45 GHz and other areas of the radio spectrum. If an active RFID device 82 is employed, suitably it may operate at around 455 MHz, 2.45 GHz, or 5.8 GHz, and a semi-passive device 82 may use a frequency around 2.4 GHz.
The read range of the RFID device 82 (i.e., the range at which the RFID reader 60 can communicate with the RFID device 82) is generally determined by many factors, e.g., the type of device (i.e., active, passive, etc.). For example, a passive LF RFID device (also referred to as a LF device) may be read from within approximately 12 inches (0.33 meters); a passive HF device (also referred to as a HF device) may be read from up to approximately 3 feet (1 meter); and a passive UHF RFID device (also referred to as a UHF device) may be read from approximately 10 feet (3.05 meters) or more. One factor influencing the read range for a passive RFID device 82 is the method used to transmit data, i.e., the coupling mode between the device 82 and the reader 60—which may optionally be inductive coupling, capacitive or radiative/propagation coupling. In the case of a passive LF device or a passive HF device, optionally inductive coupling is used between the device 82 and the reader 60. Alternately, e.g., where a passive UHF device is employed, radiative or propagation coupling may be used between the device 82 and the reader 60.
In inductive coupling applications (e.g., as may be used by a passive LF or HF device), the device 82 and reader 60 are typically each provisioned with a coil or loop antenna that together form an electromagnetic field therebetween. In inductive coupling applications, the device 82 draws power from the field, uses the power to run the circuitry on the device's IC or microchip and then changes the electric load on the device antenna. Consequently, the reader antenna 62 senses the change or changes in the electromagnetic field and converts these changes into data that is understood by the reader 60 or adjunct processor (e.g., the controller 56). Because the coil/loop in the device antenna and the coil/loop in the reader antenna 62 form an electromagnetic field therebetween in order to complete the inductive coupling between the device 82 and the reader 60, the device 82 has to be somewhat in the proximity of the reader antenna 62.
Alternately, in radiative or propagation coupling applications (e.g., as may be used by a passive UHF device), rather than forming an electromagnetic field between the respective antennas of the reader 60 and device 82, the reader 60 emits electromagnetic energy which illuminates the device 82. In turn, the device 82 gathers the energy from the reader 60 via its antenna, and the device's IC or microchip uses the gathered energy to change the load on the device antenna and reflect back an altered signal, i.e., backscatter. Suitably, if a UHF device is used, it can optionally communicate data in a variety of different ways, e.g., it can increase the amplitude of the reflected wave sent back to the reader 60 (i.e., amplitude shift keying), shift the reflected wave so its out of phase with respect to the received wave (i.e., phase shift keying) or change the frequency of the reflected wave (i.e., frequency shift keying). In any event, the reader 60 picks up the backscattered signal (e.g., via antenna 62) and converts the altered wave into data that is understood by the reader 60 or adjunct processor (e.g., the controller 56).
The coupling of the RFID device 82 to the reader 60 can be impacted by a number of factors such as any metal in the frame of the supporting structure, moisture, the material contained in the graphic (if for example a holographic foil is used in the graphic and the like.).
In practice, the media 80 may optionally be printed and/or cut, e.g., by a print shop or the like. Suitably, it will have the RFID device 82 mounted at certain location (e.g., in a certain corner) on the media 80 which corresponds to where the antenna 62 of the reader 60 is located in the display 50. Accordingly, the media 80 after being loaded into the display or sign 50 will have the RFID device 82 in relatively close proximity to the reader 60 (or its antenna 62) such that the device is within the read range of the reader, so that they can communicate or otherwise interact. Optionally, desired data or information (e.g., authentication codes, desired illumination characteristics, etc.) may be written into the RFID device 82 at the print shop.
It is to be appreciated, the presently described authentication model serves a number of purposes to the benefit of various parties by ensuring that only authentic or genuine media 80 is used within a given display or sign 50. For example, a sign shop can sell a display or sign 50 which is operative as intended only in conjunction with media 80 bearing an RFID device 82 having the proper authentication data or credentials provisioned therein. Accordingly, the sign shop benefits from the repeat business of a sign purchaser or other user seeking to replace old media 80 with new media 80 that is also compatible (i.e., also bears an RFID device 82 with the proper authentication credentials) with a display or sign 50 previously purchased from the sign shop. Additionally, the user benefits from knowing that the media 80 is genuine and/or authentic, and accordingly the quality of the media and/or its suitability for use in the display or sign 50 can be inferred.
In one suitable embodiment, the RFID device 82 optionally contains one or more specific authentication codes or the like. Accordingly, when the media 80 is installed in display or sign 50, the reader 60 will attempt to obtain one or more of the authentication codes. Suitably, any obtained codes are in turn passed to the controller 56 for verification of their authenticity. After processing the information, the controller 56 can decide if it allows the media 80 to be used (e.g., enables illumination of the media 80 or turns on the light source 54) or not to be used (e.g., disables illumination of the media 80 or turns off the light source 54). For example, the controller 56 optionally controls a relay, which regulates and/or controls the delivery of electrical power and/or current from the power supply 70 to the light source 54.
Optionally, the authentication code may be a fixed code that is specific to a particular media supplier or specific to a particular print or sign shop. Suitably, the print or sign shop applies the RFID device to the media 80 after printing and cutting. Accordingly, optionally, the media supplier besides supplying the rolls of media may also supply the RFID devices to be used with the media.
Of course, some users or other individuals may be tempted to circumvent the proposed authentication model described herein. For example, a user may attempt to remove an old RFID device 82 from a previously used genuine media 80 and then re-apply it to or otherwise use it along with a new potentially non-genuine media. To guard against unwanted circumvention of this type, there a number of suitable solutions. For example, the reader 60 (which also optionally functions as an RFID writer) optionally erases the authentication code from RFID device 82 after it has been read once to activate, or after a period of time has elapsed and/or otherwise enable the display or sign 50. In another embodiment, the reader 60 and/or controller 56 will allow the same code to be used some limited number of times, but after that a different code is must be obtained to enable or illuminate the display or sign 50 yet a further time, or after a set or determined number of readings, a given code can be erased or deleted. In yet another embodiment, an adhesive used to secure the RFID device 82 to the media 80 can be such that the RFID device 82 will be destroyed or damaged to the point of inoperability if one attempts to remove or peel the RFID device 82 from the media 80 upon which it was originally adhered. In yet another suitable embodiment, the RFID device 82 is optionally provisioned with a set date or determined time period (e.g., about a week) or other expiration criteria (e.g., which may set and/or updated by the printer or sign shop), so that the RFID device 82 or any authentication code thereon will only work or be valid prior to and/or within the bounds of the expiration criteria. This latter method can also be used to ensure that the media 80 in the display 50 is promptly and/or otherwise regularly replaced.
Optionally, the RFID device 82 may be provisioned to wirelessly communicate and/or otherwise interact with electronic communication devices carried by viewers of the display or sign 50 or other nearby individuals. For example, using the NFC standard or the like, the display or sign 50 may selectively communicate or otherwise interact via the RFID device 82 with a NFC or similarly enabled cell phone or other like handheld device (e.g., PDA). For example, using such a cell phone or other handheld device, a viewer can just point their cell phone or the like toward the display 50 or otherwise hold it sufficiently near the device 82, then with the RFID function, the cell phone or the like may be able to link to a website related or associated with the advertising or other content on the graphic media 80, bring up a coupon, or perform some other desired function.
Optionally, the NFC device employed for interaction with the viewers' cell phone or other like handheld device can be a separate element or tag or label, e.g., that may be similar to but different from the device 82 that is used to authenticate the source of media 80. In this case, two devices can be used, i.e., one for authentication and one for communication with viewer devices. In one suitable embodiment, a single label can be provisioned with two RFID tags or devices. The first tag or device (i.e., device 82) is used for authentication with an authentication code, and will only interact with the reader 60 in the sign or display 50 to authenticate the printing media 80, e.g., so as to enable the sign 50 to light up. The second tag or device can be written to or provisioned, e.g., by a sign shop or other entity, to support NFC interaction with consumer electronics such as NFC enable cell phones. Accordingly, the second tag or device will only interact with consumer electronics. Optionally, the content provided by the second tag or device can be SMS (Short Message Service) code or the like which is linked to or associated with the graphical content of the media 80. Optionally, the two tags or devices can be stuck or otherwise linked together so if somebody tries to tamper with one, the other one will stop functioning. For example, the two functions carried by two tags could be placed into one chip and one tag will be used. Optionally, using an appropriate chip, one can find a space to write (and lock) the authentication code into a memory separate from the space used by the NFC function. Alternatively, if two tags are employed, one could make a special inlay with two chips connected to the same antenna, which would difficult to forge.
As pointed out earlier, the reader 60 also optionally functions to write to the RFID device so as to up-load and/or otherwise write data or information to the RFID device 82. Accordingly, the RFID device is optionally loaded (e.g., periodically or as otherwise desired) with usage information from the sign or display 50. For example, the reader 60 may optionally write back to the RFID device 82 carried by the media 80 how many hours the illumination has been active, the date and/or time when the media 80 was installed or removed, the number of times the display 50 was activated or the number of times the light source 54 was turned-on, the number of times the motion sensor 58 and/or the ambient light sensor 59 was tripped, etc. Accordingly, for example, an owner or advertiser employing the sign 50 could obtain feedback about the actual operation of the sign 50. As can be appreciated, such feedback is reasonably related to the traffic in the vicinity of the sign 50 and/or the amount or degree of exposure the installed media 80 would have to a target audience or potential viewers. Suitably, such feedback could be used as the basis for calculating and/or accessing a usage fee or the like for the display 50.
With reference now to
With reference now to
With reference now to
In any event, it is to be appreciated that in connection with the particular exemplary embodiment(s) presented herein certain structural and/or function features are described as being incorporated in defined elements and/or components. However, it is contemplated that these features may, to the same or similar benefit, also likewise be incorporated in other elements and/or components where appropriate. It is also to be appreciated that different aspects of the exemplary embodiments may be selectively employed as appropriate to achieve other alternate embodiments suited for desired applications, the other alternate embodiments thereby realizing the respective advantages of the aspects incorporated therein.
It is also to be appreciated that particular elements or components described herein may have their functionality suitably implemented via hardware, software, firmware or a combination thereof. Additionally, it is to be appreciated that certain elements described herein as incorporated together may under suitable circumstances be stand-alone elements or otherwise divided. Similarly, a plurality of particular functions described as being carried out by one particular element may be carried out by a plurality of distinct elements acting independently to carry out individual functions, or certain individual functions may be split-up and carried out by a plurality of distinct elements acting in concert. Alternately, some elements or components otherwise described and/or shown herein as distinct from one another may be physically or functionally combined where appropriate. For example, a single RFID device (such as the device 82) may optionally be provisioned with control logic or other like instructions for the operation of the sign 50, authentication data and NFC functionality. Alternately, a plurality of separate RFID or other like devices may be employed each provisioned to carry out one or more of the foregoing functions. For example, one RFID device could be provisioned with sign control logic or the like and authentication data, while a separate RFID could be provisioned to support the NFC functionality with regard to the viewers' devices.
It will thus be seen according to the present invention a highly advantageous graphic advertising system has been provided. While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it will be apparent to those of ordinary skill in the art that the invention is not to be limited to the disclosed embodiment, and that many modifications and equivalent arrangements may be made thereof within the scope of the invention, which scope is to be accorded the broadest interpretation of the appended claims so as to encompass all equivalent structures and products.
The present application claims priority from U.S. Provisional Patent Application Nos. 61/299,609 filed Jan. 29, 2010, and 61/311,473 filed Mar. 8, 2010, and is related to U.S. Provisional Application Nos. 61/416,384 filed Nov. 23, 2010, and 61/423,139 filed Dec. 15, 2010, all of which are incorporated herein by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
1331136 | Woodjard | Feb 1920 | A |
5083111 | Drucker et al. | Jan 1992 | A |
5485291 | Qiao | Jan 1996 | A |
5609059 | McEwan | Mar 1997 | A |
5641219 | Mizobe | Jun 1997 | A |
5648613 | Kiefer | Jul 1997 | A |
5648643 | Knowles et al. | Jul 1997 | A |
5720123 | Taylor | Feb 1998 | A |
5841350 | Appalucci et al. | Nov 1998 | A |
5867017 | Merwin et al. | Feb 1999 | A |
5921674 | Koczi | Jul 1999 | A |
5944405 | Takeuchi | Aug 1999 | A |
5945938 | Chia et al. | Aug 1999 | A |
5947578 | Ayres | Sep 1999 | A |
6142375 | Belka et al. | Nov 2000 | A |
6144264 | Wen | Nov 2000 | A |
6246778 | Moore | Jun 2001 | B1 |
6744367 | Forster | Jun 2004 | B1 |
6771256 | Abraham et al. | Aug 2004 | B1 |
6786626 | Wu | Sep 2004 | B2 |
6838989 | Mays et al. | Jan 2005 | B1 |
6839035 | Addonisio et al. | Jan 2005 | B1 |
6851999 | Fong | Feb 2005 | B2 |
6965205 | Piepgras et al. | Nov 2005 | B2 |
7012544 | Cunningham et al. | Mar 2006 | B2 |
7046160 | Pederson et al. | May 2006 | B2 |
7064498 | Dowling et al. | Jun 2006 | B2 |
7084769 | Bauer et al. | Aug 2006 | B2 |
7086587 | Myllymaki | Aug 2006 | B2 |
7086769 | Thompson et al. | Aug 2006 | B1 |
7098794 | Lindsay | Aug 2006 | B2 |
7109986 | Kerr et al. | Sep 2006 | B2 |
7167106 | Haase | Jan 2007 | B2 |
7202838 | Kerr et al. | Apr 2007 | B2 |
7304577 | Waldner | Dec 2007 | B2 |
7375650 | Lo | May 2008 | B2 |
7377421 | Rhoads | May 2008 | B2 |
7378973 | Dixon | May 2008 | B2 |
7477152 | Forster | Jan 2009 | B2 |
7490054 | Reade et al. | Feb 2009 | B2 |
7492346 | Manabe | Feb 2009 | B2 |
7495576 | Maskeny et al. | Feb 2009 | B2 |
7515149 | Kerr et al. | Apr 2009 | B2 |
7564426 | Poor | Jul 2009 | B2 |
7600906 | Chon | Oct 2009 | B2 |
7654723 | Chang | Feb 2010 | B2 |
7670020 | Chang | Mar 2010 | B2 |
7695165 | Chang | Apr 2010 | B2 |
7722172 | Silverbrook | May 2010 | B2 |
7722241 | Chang | May 2010 | B2 |
7737858 | Matityaho | Jun 2010 | B2 |
7750810 | Ritter et al. | Jul 2010 | B2 |
7752790 | Michael et al. | Jul 2010 | B1 |
7756467 | Bent et al. | Jul 2010 | B2 |
7810983 | Chang | Oct 2010 | B2 |
7817045 | Onderko | Oct 2010 | B2 |
7845823 | Mueller | Dec 2010 | B2 |
7850341 | Mrakovich | Dec 2010 | B2 |
7868778 | Kenwright | Jan 2011 | B2 |
7876101 | Lee | Jan 2011 | B2 |
7903103 | Osterberg et al. | Mar 2011 | B2 |
7920050 | Juels et al. | Apr 2011 | B2 |
7959326 | Laporte | Jun 2011 | B2 |
7961097 | Porte et al. | Jun 2011 | B2 |
7979026 | Hulvey | Jul 2011 | B2 |
8014722 | Abel | Sep 2011 | B2 |
8018345 | Xiang et al. | Sep 2011 | B2 |
8068011 | Sajadi et al. | Nov 2011 | B1 |
8102797 | Abel | Jan 2012 | B2 |
8112066 | Ayed | Feb 2012 | B2 |
8117445 | Werner | Feb 2012 | B2 |
8126505 | Tulloch | Feb 2012 | B2 |
8237562 | Picasso et al. | Aug 2012 | B1 |
8242893 | Lin | Aug 2012 | B1 |
8249935 | DiMartino et al. | Aug 2012 | B1 |
8321922 | Lo et al. | Nov 2012 | B1 |
8326991 | Diaz et al. | Dec 2012 | B2 |
8332272 | Fisher | Dec 2012 | B2 |
8469269 | Daily et al. | Jun 2013 | B2 |
8474700 | Lewis et al. | Jul 2013 | B1 |
8520695 | Rubin et al. | Aug 2013 | B1 |
8638228 | Amigo et al. | Jan 2014 | B2 |
8655286 | Mendolia | Feb 2014 | B2 |
8750514 | Gallo et al. | Jun 2014 | B2 |
8842102 | Forster et al. | Sep 2014 | B2 |
8880055 | Clement et al. | Nov 2014 | B1 |
8937531 | Rimai et al. | Jan 2015 | B2 |
8961306 | LeMay et al. | Feb 2015 | B2 |
9024763 | Hamedani | May 2015 | B2 |
9108434 | Tsirline et al. | Aug 2015 | B2 |
9124442 | McCormack et al. | Sep 2015 | B2 |
9698872 | Haverinen et al. | Jul 2017 | B2 |
9767329 | Forster | Sep 2017 | B2 |
9894468 | Brown et al. | Feb 2018 | B2 |
10402598 | Forster | Sep 2019 | B2 |
10540527 | Forster | Jan 2020 | B2 |
20020030992 | Lefebvre | Mar 2002 | A1 |
20020036622 | Jaeger | Mar 2002 | A1 |
20020154633 | Shin | Oct 2002 | A1 |
20020159246 | Murasko et al. | Oct 2002 | A1 |
20020186133 | Loof | Dec 2002 | A1 |
20020190845 | Moore | Dec 2002 | A1 |
20030029918 | Leanheart et al. | Feb 2003 | A1 |
20030034985 | Needham Riddle | Feb 2003 | A1 |
20030115096 | Reynolds | Jun 2003 | A1 |
20040012486 | Mani | Jan 2004 | A1 |
20040183742 | Goff et al. | Sep 2004 | A1 |
20040220860 | Persky et al. | Nov 2004 | A1 |
20050017071 | Noonan | Jan 2005 | A1 |
20050186902 | Lieffort et al. | Aug 2005 | A1 |
20050207823 | Adams et al. | Sep 2005 | A1 |
20050280631 | Wong et al. | Dec 2005 | A1 |
20060028822 | Tanamachi | Feb 2006 | A1 |
20060032926 | Baba et al. | Feb 2006 | A1 |
20060066453 | Homanfar et al. | Mar 2006 | A1 |
20060071778 | Vesikivi et al. | Apr 2006 | A1 |
20060080819 | McAllister | Apr 2006 | A1 |
20060090384 | Woodruff | May 2006 | A1 |
20060160488 | Sueoka et al. | Jul 2006 | A1 |
20060214794 | Wang | Sep 2006 | A1 |
20060215958 | Yeo | Sep 2006 | A1 |
20060230276 | Nochta | Oct 2006 | A1 |
20060261938 | Lai | Nov 2006 | A1 |
20060261950 | Arneson et al. | Nov 2006 | A1 |
20060266824 | Hassenbuerger | Nov 2006 | A1 |
20060273176 | Audebert et al. | Dec 2006 | A1 |
20060287964 | Brown | Dec 2006 | A1 |
20060290501 | Hammad et al. | Dec 2006 | A1 |
20060293956 | Walker et al. | Dec 2006 | A1 |
20070008140 | Saarisalo et al. | Jan 2007 | A1 |
20070013479 | Goel et al. | Jan 2007 | A1 |
20070022294 | Lapstun et al. | Jan 2007 | A1 |
20070029384 | Atherton | Feb 2007 | A1 |
20070029939 | Burkum et al. | Feb 2007 | A1 |
20070056871 | Griffiths | Mar 2007 | A1 |
20070057791 | Karjoth et al. | Mar 2007 | A1 |
20070075145 | Arendonk | Apr 2007 | A1 |
20070090954 | Mahaffey | Apr 2007 | A1 |
20070120772 | Kim et al. | May 2007 | A1 |
20070135112 | Lessing | Jun 2007 | A1 |
20070145152 | Jogand-Coulomb et al. | Jun 2007 | A1 |
20070188483 | Bonner | Aug 2007 | A1 |
20070194879 | Backes et al. | Aug 2007 | A1 |
20070215685 | Self | Sep 2007 | A1 |
20070229250 | Recker | Oct 2007 | A1 |
20070273951 | Ribi | Nov 2007 | A1 |
20070274242 | Lamacraft et al. | Nov 2007 | A1 |
20080022160 | Chakraborty | Jan 2008 | A1 |
20080040845 | Shoshan | Feb 2008 | A1 |
20080064346 | Charrat | Mar 2008 | A1 |
20080079582 | Alexis et al. | Apr 2008 | A1 |
20080094854 | Coleman | Apr 2008 | A1 |
20080100443 | Grunwald et al. | May 2008 | A1 |
20080101400 | Auterinen | May 2008 | A1 |
20080117047 | Collins et al. | May 2008 | A1 |
20080132167 | Bent et al. | Jun 2008 | A1 |
20080136647 | Brown | Jun 2008 | A1 |
20080146148 | Hulvey | Jun 2008 | A1 |
20080150719 | Cote et al. | Jun 2008 | A1 |
20080162154 | Fein et al. | Jul 2008 | A1 |
20080167000 | Wentker et al. | Jul 2008 | A1 |
20080183581 | Coppolani | Jul 2008 | A1 |
20080191878 | Abraham | Aug 2008 | A1 |
20080192932 | Graeber et al. | Aug 2008 | A1 |
20080219227 | Michaelis | Sep 2008 | A1 |
20080238610 | Rosenberg | Oct 2008 | A1 |
20080238706 | Kenwright | Oct 2008 | A1 |
20080248815 | Busch | Oct 2008 | A1 |
20080251582 | Nguyen | Oct 2008 | A1 |
20080255960 | Nguyen | Oct 2008 | A1 |
20080258875 | Jesme et al. | Oct 2008 | A1 |
20080262928 | Michaelis | Oct 2008 | A1 |
20080276507 | Hines | Nov 2008 | A1 |
20080300985 | Shamp et al. | Dec 2008 | A1 |
20080309463 | Godzwon et al. | Dec 2008 | A1 |
20090081943 | Dobyns et al. | Mar 2009 | A1 |
20090085746 | Ericikson et al. | Apr 2009 | A1 |
20090088077 | Brown et al. | Apr 2009 | A1 |
20090088229 | Hammad et al. | Apr 2009 | A1 |
20090102748 | Stoyer et al. | Apr 2009 | A1 |
20090115614 | Bertin | May 2009 | A1 |
20090118006 | Kelly et al. | May 2009 | A1 |
20090146814 | Hammad et al. | Jun 2009 | A1 |
20090168441 | Lin | Jul 2009 | A1 |
20090174556 | Horne et al. | Jul 2009 | A1 |
20090189816 | Nikiti | Jul 2009 | A1 |
20090192937 | Griffin et al. | Jul 2009 | A1 |
20090193500 | Griffin | Jul 2009 | A1 |
20090197551 | Paraskake | Aug 2009 | A1 |
20090212919 | Selgrath | Aug 2009 | A1 |
20090221240 | Zhang | Sep 2009 | A1 |
20090257242 | Wendman | Oct 2009 | A1 |
20090258678 | Chava et al. | Oct 2009 | A1 |
20090267862 | Roesner et al. | Oct 2009 | A1 |
20090282859 | Glielmo et al. | Nov 2009 | A1 |
20090292816 | Etchegoyen | Nov 2009 | A1 |
20090297157 | Nakagawa | Dec 2009 | A1 |
20090315670 | Naressi | Dec 2009 | A1 |
20100009627 | Huomo | Jan 2010 | A1 |
20100012715 | Williams et al. | Jan 2010 | A1 |
20100026464 | Graeber | Feb 2010 | A1 |
20100030636 | Vijayshankar et al. | Feb 2010 | A1 |
20100046198 | Hoffman | Feb 2010 | A1 |
20100066508 | Jokinen et al. | Mar 2010 | A1 |
20100066561 | Ulrich et al. | Mar 2010 | A1 |
20100075666 | Garner | Mar 2010 | A1 |
20100079416 | Chung et al. | Apr 2010 | A1 |
20100082444 | Lin et al. | Apr 2010 | A1 |
20100082485 | Lin | Apr 2010 | A1 |
20100085774 | Peifer | Apr 2010 | A1 |
20100107463 | Spiro | May 2010 | A1 |
20100123553 | Banerjee et al. | May 2010 | A1 |
20100141452 | Lian et al. | Jun 2010 | A1 |
20100148964 | Broer | Jun 2010 | A1 |
20100148965 | Alexis et al. | Jun 2010 | A1 |
20100161410 | Tulloch | Jun 2010 | A1 |
20100161434 | Herwig et al. | Jun 2010 | A1 |
20100172149 | Siemiet | Jul 2010 | A1 |
20100174599 | Rosenblatt et al. | Jul 2010 | A1 |
20100176971 | Banerjee et al. | Jul 2010 | A1 |
20100188842 | Yohananoff | Jul 2010 | A1 |
20100211431 | Lutnick et al. | Aug 2010 | A1 |
20100216396 | Fernandez et al. | Aug 2010 | A1 |
20100217709 | Aabye | Aug 2010 | A1 |
20100221999 | Braun et al. | Sep 2010 | A1 |
20100231362 | Smith et al. | Sep 2010 | A1 |
20100241494 | Kumar et al. | Sep 2010 | A1 |
20100255865 | Karmarkar et al. | Oct 2010 | A1 |
20100262449 | Monteforte et al. | Oct 2010 | A1 |
20100265041 | Almog et al. | Oct 2010 | A1 |
20100269383 | Nifenecker | Oct 2010 | A1 |
20100271839 | Chan | Oct 2010 | A1 |
20100274859 | Bucuk | Oct 2010 | A1 |
20100275265 | Fiske | Oct 2010 | A1 |
20100282849 | Mair | Nov 2010 | A1 |
20100290251 | Wang | Nov 2010 | A1 |
20100294835 | Bam et al. | Nov 2010 | A1 |
20100303230 | Taveau | Dec 2010 | A1 |
20100306076 | Taveau | Dec 2010 | A1 |
20100306819 | Nahari | Dec 2010 | A1 |
20100311326 | Klabunde et al. | Dec 2010 | A1 |
20110000971 | Onderko | Jan 2011 | A1 |
20110029777 | Murakami et al. | Feb 2011 | A1 |
20110047463 | Shepherd et al. | Feb 2011 | A1 |
20110047759 | Reiter | Mar 2011 | A1 |
20110065383 | Frankland et al. | Mar 2011 | A1 |
20110084814 | Ramsch | Apr 2011 | A1 |
20110112918 | Mestre | May 2011 | A1 |
20110112920 | Mestre | May 2011 | A1 |
20110114735 | Ziai et al. | May 2011 | A1 |
20110149079 | Anderson | Jun 2011 | A1 |
20110149596 | Lv | Jun 2011 | A1 |
20110156640 | Moshfeghi | Jun 2011 | A1 |
20110165859 | Wengrovitz | Jul 2011 | A1 |
20110185607 | Forster et al. | Aug 2011 | A1 |
20110187558 | Serex | Aug 2011 | A1 |
20110191478 | Eischeid et al. | Aug 2011 | A1 |
20110195748 | Main et al. | Aug 2011 | A1 |
20110211344 | Harbers | Sep 2011 | A1 |
20110225421 | Han et al. | Sep 2011 | A1 |
20110227487 | Nichol | Sep 2011 | A1 |
20110227507 | Salm | Sep 2011 | A1 |
20110228517 | Kawabat | Sep 2011 | A1 |
20110234379 | Lee | Sep 2011 | A1 |
20110235318 | Simon | Sep 2011 | A1 |
20110238995 | Blanco | Sep 2011 | A1 |
20110121488 | Sikkens | Oct 2011 | A1 |
20110244799 | Roberts et al. | Oct 2011 | A1 |
20110258443 | Barry | Oct 2011 | A1 |
20110276961 | Johansson et al. | Nov 2011 | A1 |
20110285511 | Maguire et al. | Nov 2011 | A1 |
20110287718 | Abel | Nov 2011 | A1 |
20110295108 | Cox | Dec 2011 | A1 |
20110307309 | Forster | Dec 2011 | A1 |
20110320291 | Coon | Dec 2011 | A1 |
20110320314 | Brown | Dec 2011 | A1 |
20110320345 | Taveau | Dec 2011 | A1 |
20120001725 | Chen | Jan 2012 | A1 |
20120011572 | Chew et al. | Jan 2012 | A1 |
20120013448 | Baranowski | Jan 2012 | A1 |
20120024951 | Graeber | Feb 2012 | A1 |
20120029990 | Fisher | Feb 2012 | A1 |
20120032632 | Soar | Feb 2012 | A1 |
20120039472 | Lic | Feb 2012 | A1 |
20120055998 | Mieslinger | Mar 2012 | A1 |
20120059741 | Khan et al. | Mar 2012 | A1 |
20120061465 | Luo | Mar 2012 | A1 |
20120072979 | Cha | Mar 2012 | A1 |
20120075148 | Cho | Mar 2012 | A1 |
20120089845 | Raleigh | Apr 2012 | A1 |
20120126700 | Mayfield et al. | May 2012 | A1 |
20120135839 | Watanabe et al. | May 2012 | A1 |
20120154633 | Rodriguez | Jun 2012 | A1 |
20120156992 | Walker et al. | Jun 2012 | A1 |
20120083205 | Marcu et al. | Jul 2012 | A1 |
20120218084 | Arponen et al. | Aug 2012 | A1 |
20120253646 | Reghunath | Oct 2012 | A1 |
20120253974 | Haikonen et al. | Oct 2012 | A1 |
20120256494 | Kesler et al. | Oct 2012 | A1 |
20120265596 | Mazed et al. | Oct 2012 | A1 |
20120265682 | Menon | Oct 2012 | A1 |
20120278676 | Teraura | Nov 2012 | A1 |
20120297204 | Buer | Nov 2012 | A1 |
20120309302 | Buhot | Dec 2012 | A1 |
20120315839 | Mumcuoglu et al. | Dec 2012 | A1 |
20130006847 | Hammad et al. | Jan 2013 | A1 |
20130045679 | Orsatti et al. | Feb 2013 | A1 |
20130063008 | Martin | Mar 2013 | A1 |
20130065523 | Yun et al. | Mar 2013 | A1 |
20130106576 | Hinman | May 2013 | A1 |
20130157713 | Stolarczyk | Jun 2013 | A1 |
20130165041 | Bukovjan et al. | Jun 2013 | A1 |
20130173455 | Adams et al. | Jul 2013 | A1 |
20130176184 | Dokai et al. | Jul 2013 | A1 |
20130309965 | Hillan | Nov 2013 | A1 |
20130342323 | Hinman et al. | Dec 2013 | A1 |
20130344805 | Lefley | Dec 2013 | A1 |
20140009268 | Oshima et al. | Jan 2014 | A1 |
20140070850 | Darwhekar et al. | Mar 2014 | A1 |
20140113551 | Krishnan et al. | Apr 2014 | A1 |
20140139347 | Forster | May 2014 | A1 |
20140145823 | Aase | May 2014 | A1 |
20140152856 | Ikeda et al. | Jun 2014 | A1 |
20140227970 | Brockenbrough et al. | Aug 2014 | A1 |
20140229251 | Lim et al. | Aug 2014 | A1 |
20140252083 | Lee et al. | Sep 2014 | A1 |
20140370803 | Haverinen et al. | Dec 2014 | A1 |
20150140929 | Lefley | May 2015 | A1 |
20150334521 | Lee | Nov 2015 | A1 |
20160283759 | Forster | Sep 2016 | A1 |
20170012355 | Pachler et al. | Jan 2017 | A1 |
20170302335 | Sawata et al. | Oct 2017 | A1 |
20170344765 | Forster | Nov 2017 | A1 |
20180049029 | Kumar et al. | Feb 2018 | A1 |
20190384948 | Forster | Dec 2019 | A1 |
20200151402 | Forster | May 2020 | A1 |
Number | Date | Country |
---|---|---|
0611910 | Feb 2011 | BR |
1741862 | Mar 2006 | CN |
101233753 | Jul 2008 | CN |
101253750 | Aug 2008 | CN |
201302803 | Sep 2009 | CN |
102217410 | Oct 2011 | CN |
102638446 | Aug 2012 | CN |
0677887 | Oct 1995 | EP |
112746961 | Jul 2003 | EP |
1912437 | Apr 2008 | EP |
1914631 | Apr 2008 | EP |
2143991 | Sep 2009 | EP |
1948995 | Jan 2010 | EP |
2174457 | Apr 2010 | EP |
1792272 | Oct 2010 | EP |
2237519 | Oct 2010 | EP |
2296025 | Mar 2011 | EP |
2309431 | Apr 2011 | EP |
2366937 | Sep 2011 | EP |
2371110 | Oct 2011 | EP |
2783960 | Mar 2000 | FR |
2002-162918 | Jun 2002 | JP |
2006011422 | Jan 2006 | JP |
2006-030882 | Feb 2006 | JP |
2006-30883 | Feb 2006 | JP |
2006058435 | Mar 2006 | JP |
2006349887 | Dec 2006 | JP |
2007034362 | Feb 2007 | JP |
20070343362 | Feb 2007 | JP |
2007-114924 | May 2007 | JP |
2007114924 | May 2007 | JP |
02002162918 | Jun 2007 | JP |
20100072115 | Jun 2010 | KR |
2006031824 | Mar 2006 | WO |
2006095212 | Sep 2006 | WO |
2006098765 | Sep 2006 | WO |
2006111782 | Oct 2006 | WO |
WO-2006111797 | Oct 2006 | WO |
2007002459 | Jan 2007 | WO |
2007035835 | Mar 2007 | WO |
2007064069 | Jun 2007 | WO |
2008034937 | Mar 2008 | WO |
2008063706 | May 2008 | WO |
2008087431 | Jul 2008 | WO |
2008132269 | Nov 2008 | WO |
2008142455 | Nov 2008 | WO |
2009028203 | Mar 2009 | WO |
2010077194 | Jul 2010 | WO |
2010095988 | Aug 2010 | WO |
2010148816 | Dec 2010 | WO |
2011010970 | Jan 2011 | WO |
2011020041 | Feb 2011 | WO |
2011033424 | Mar 2011 | WO |
2011053914 | May 2011 | WO |
2011088190 | Jul 2011 | WO |
2011094384 | Aug 2011 | WO |
2011109092 | Sep 2011 | WO |
2011112778 | Sep 2011 | WO |
2011121488 | Oct 2011 | WO |
WO2012037255 | Mar 2012 | WO |
Entry |
---|
Jonathan W. Valvano, Embedded System, 2009 (Year: 2009). |
Alois Ferscha, Orientation sensing for gesture-based interaction with smart artifacts, 2005 (Year: 2005). |
Australia: Examination Report dated Jun. 13, 2017; Application No. 2016202079; 3 pages. |
“AN1445: Antenna design guide for MFRC52x, PN51x and PN53x, Rev.1.2, Document AN1445_12”, NXP B.V., (Oct. 11, 2010), 65 pgs. |
“NFC Record Type Definition (RTD)”, Technical Specification NFC Forum, RTD 1.0, NFCForum-TS-RTD_1 .0, (Jul. 24, 2006), 20 pgs. |
“Radio Frequency Identification (RFID): A Focus on Information Security and Privacy”, OECD Digital Economy Papers, No. 138, Jan. 14, 2008, 11-81. |
“Radio-Frequency-IDentific@tion, http://rfid-handbook.com/”, advertisement (Dec. 2, 2011), 5 pgs. |
“South Korea Telecommunications Report Included BMI's Forecasts”, Q2 2012, Business Monitor International Ltd., (Apr. 2012), 94 pgs. |
A Near Field Communication Tool for Building Intelligent Environment using Smart Posters, International Journal of Computers and Communications, Issue 1, vol. 4, 2010, Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, and Miguel Angel Gomez-Nieto. |
A Pervasive Presentator—Simplifying the Task of Presenting, Lulea University of Technology; Viktor Lindgren, Mattias Lundberg, Elias Naslund, John Viklund (2012). |
A System of Secure Virtual Coupons Using NFC Technology, IEEE Computer Society, CompProceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops 2007 (PerComW'07); Manfred Aigner, Sandra Dominikus, Martin Feldhofer. |
Amato-McCoy, Deena M. Crime stoppers: by focusing their loss prevention efforts on the entire enterprise, grocers are in a better position to combat internal and external theft. Grocery Headquarters, v77, No. 11, p. 101 (3). Nov. 2011. |
Anonymous, “Near-field communications will be standard technology for mobiles”, Electronics Weekly, (Feb. 21, 2007), p. 8. |
Antoniou, Zoe, “NFC-Based Mobile Middleware for Intuitive User Interaction With Security in Smart Homes”, Proc. Of the 5th IASTED International Conference on Communication Systems and Networks (CSN'06), Aug. 28-30, 2006, Palma De Mallorca, Spain, Track 543-038, 6 pgs. |
Application of Near Field Communication for Health Monitoring in Daily Life; Esko Strommer, Jouni Kaartenen, Juha Parkka, Arto Ylisauko-oja, Ilkka Korhonen; Proceedings of the 28th IEEE EMBS Annual International Conference New York City, USA, Aug. 30-Sep. 3, 2006. |
Bauer-Reich,C., et al. “Low-profile, high-permeability antennaless RFID tags for use on metal objects”, Proceedings of the 2012 IEEE International Workshop on Antenna Technology (iWAT), (Mar. 5-7, 2012), 32-35. |
Becher, Michael et al., “Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices”, 2011 IEEE Symposium on Security and Privacy, 96-11. |
Bling: NFC Arrives in U.S., Sam Churchill, Oct. 27, 2010, http://www.dailywireless.org/2010/10/27/bling-nfc-arrives-in-u-s/. |
Bovelli, S., “A Novel Antenna Design for Passive RFID Transponders on Metal Surfaces”, Proceedings of the 36th European Microwave Conference, Manchester, UK (Sep. 2006), 580-582. |
Broll, Gregor, et al., “Touch to Play-Exploring Touch-Based Mobile Interaction with Public Displays”, 3rd International Workshop on Near Field Communication, Feb. 22, 2011, 15-20. |
Cavoukian, A., “Mobile Near Field Communications (NFC)—“Tap'n. Go”—Keep it Secure & Private”, Information and Privacy Commissioner, Ontario, Canada/Privacy by Design (Nov., 2011), 22 pgs. |
Chai, Qi, “Design and Analysis of Security Schemes for Low-cost RFID Systems”, Doctor of Philosophy Thesis in Electrical and Computer Engineering, University of Waterloo, Ontario, Canada, 2012, 184 pgs. |
Cheng, Hsu-Chen, et al., “A Secure and Practical Key Management Mechanism for NFC Read-Write Mode”, J. Computational Information Systems, 7:11, (2011), 3819-3828. |
Cheng, Jerry, et al., “SmartSiren: Virus Detection and Alert for Smartphones”, MobiSys'07, Jun. 11-4, 2007, San Juan, Puerto Rico, 258-271. |
Choi, Kwanghoon, et al., “A Secure Application Invocation Mechanism in Mobile Phones for Near Field Communication”, 2012 IEEE International Conference on Consumer Electronics (ICCE), Jan. 2012, 731-732. |
Christian Metzger et al: “Making Radio Frequency Indentificaiton Visible—A Watchdog Tag”, Fifth Annual IEEE International Conference on pervasive computing and communications workshops, Mar. 19-23, 2007. |
Christianson, B., et al. (eds.), “Security Protocols”, 13th International Workshop, Revised Selected Papers, Cambridge, UK, (Apr. 20-22, 2005), Lecture Notes in Computer Science, 4631, Springer-Verlag, Berlin, 354 pgs. |
Close Contact: An Examination of the Future of Near Field Communications, International Journal of Management & Information Systems—First Quarter 2012 vol. 16, No. 1; Chris Rose Capella. |
Cole, P.H., et al., Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting, First Edition, Springer-Verlag, Berlin (2003), 350 pgs. |
Connecting the Mobile Phone with the Internet of Things—Benefits of EPC and NFC Compatibility; Thomas J.P. Wiechert, Florian Michahelles, 2007. |
Coppolino, Luigi, et al., “A Trusted information Agent for Security Information and Event Management”, ICONS 2012: The Seventh International Conference on Systems, 6-12. |
Do you talk to each poster? Security and Privacy for Interactions with Web Service by means of Contact Free Tag Readings, Peter Schoo, Massimo Paolucci, Feb. 24 2009 First International Workshop on Near Field Communication. |
Dodson, B., et al., “Micro-Interactions with NFC-Enabled Mobile Phones”, Proceedings of the Third International Conference on Mobile Computing, Applications, and Services (MobiCASE), Los Angeles, CA, Oct. 2011. Retrieved from the Internet: <URL: http://mobisocial.stanford.edu/papers/mobicase11.pdf>, 20 pgs. |
Elliptic Curve Certificates and Signatures for NFC Signature Records, Reasearch In Motion, Certicom Research, Jan. 1, 2011, Tony Rosati, Greg Zaverucha. |
Enabling RFID in Retail, George Roussos, Birkbeck, University of London, IEEE Computer Society, Mar. 2006. |
Encrypted NFC emergency tags based on the German Telematics Infrastructure, 2011 Third International Workshop on Near Field Communication, Sebastian Dunnebeil, Felix Kobler, Philip Koene, Helmut Kremar, Jan Marco Leimeister. |
Enhancing Authentication in eBanking with NFC enabled mobile phones, Aug. 11, 2008, Diego Alejandro Ortiz-Yepes. |
Enhancing Security and Usability Features of NFC, 2009; Beygo, Omer Kerem; Eraslan, Cihan. |
European Search Report dated Nov. 25, 2016 for European Application No. EP16002075 filed Sep. 26, 2016. |
Finkenzeller, K., “Known attacks on RFID systems, possible countermeasures and upcoming standardization activities”, presentation slides, RFID-Systech, Bremen, Germany, Jun. 2009. Retrieved from the Internet: <URL: http://rfidhandbook.de/downloads/Finkenzeller Systech-Bremen-2009 v1.0.pdf>, 31 pgs. |
Francis, Lishoy, et al., “Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones”, The 6th Workshop on RFID Security (RFIDSec 2010), Istanbul, Turkey (LNCS), Jun. 7-9, 2010, 35 49. |
Francis, Lishoy, et al., “Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones”, in Cryptology ePrint Archive, Report 2011/618, Nov. 2011, 16 pgs. |
Gebhart, M, et al., “Design of 13.56 MHz Smartcard Stickers with Ferrite for Payment and Authentication”, Proceedings of the 2011 3rd International Workshop on Near Field Communication (NFC), Feb. 21-22, 2011. Retrieved from the Internet: <URL: https://online.tugraz.at/tug_online/voe_main2.getVollText?pDocumentNr=202812&pCurrP k=59398>, 6 pgs. |
Ghanname, Taoufik. How NFC can to speed Bluetooth transactions-today. Eetimes. Feb. 14, 2006. Retrieved at http://eetimes.com/General/PrintView/4012606. |
Hancke, G.P., “Practical Eavesdropping and Skimming Attacks on High-Frequency RFID Tokens”, Preprint version of article published in Journal of Computer Security. vol. 19, Issue 2. (Jun. 2010). Retrieved from the Internet: <URL: http://www.rfidblog.org.uk/Hancke-JoCSSpecialRFIDJune2010.pdf>, 23 pgs. |
Hancke, G.P., “Security of proximity identification systems”, Technical Report, No. 752, University of Cambridge Computer Laboratory, UK (Jul. 2009), 161 pgs. |
Hancke, G.P., et al., “Security Challenges for User-Orented RFID Applications within the 'Internet of Things'”, J. Internet Technology, vol. 11, No. 3, 2010, 307-313. |
Hardy, Robert, et al., “Touch & Interact: Touch-based Interaction of Mobile Phones with Displays”, MobileHCL 2008, Proc. 10th international conference on Human computer interaction with mobile devices and services, 245-254. |
Haselsteiner, Ernst, et al., “Security in Near Field Communication (NFC): Strengths and Weaknesses”, Proceedings of the Workshop on RFID Security (RFIDSec), Graz, Austria, Jul. 12-14, 2006, 11 pgs. |
Hend S. Al-Khalifa: “Utilizing QR Code and Mobile Phones for Blinds and Visually Impaired People”, copyright 2008. |
Hinske, S., et al., “RFIDice—Augmenting Tabletop Dice with RFID”, Journal of Virtual Reality and Broadcasting, vol. 5, No. 4, (2008), 12 pgs. |
Husni, Emir, et al., “Efficient Tag-to-Tag Near Field Communication (NFC) Protocol for Secure Mobile Payment”, 2nd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICIC-BME), Bandung, Indonesia, Nov. 8-9, 2011, 97-101. |
International Preliminary Report on Patentability and Written Opinion dated Apr. 21, 2015 for International Application PCT/US13/031448 filed Mar. 14, 2013. |
International Preliminary Report on Patentability and Written Opinion dated Jul. 31, 2012 for International Application PCT/US11/022680 filed Jan. 27, 2011. |
International Preliminary Report on Patentability and Written Opinion dated Jul. 31, 2012 for International Application PCT/US11/022687 filed Jan. 27, 2011. |
International Preliminary Report on Patentability and Written Opinion dated Mar. 04, 2014 for International Application PCT/US12/053322 filed Aug. 31, 2012. |
International Preliminary Report on Patentability and Written Opinion dated Mar. 10, 2015 for International Application PCT/US12/031136 filed Mar. 14, 2013. |
International Preliminary Report on Patentability and Written Opinion dated May 19, 2015 for International Application PCT/US12/031131 filed Mar. 14, 2013. |
International Search Report dated Aug. 20, 2013 for International Application PCT/US13/031131 filed Mar. 14, 2013. |
International Search Report dated Aug. 6, 2013 for International Application PCT/US13/031448 filed Mar. 14, 2013. |
International Search Report dated Mar. 11, 2011 for International Application PCT/US11/022687 filed Jan. 27, 2011. |
International Search Report dated Mar. 8, 2011 for International Application PCT/US11/022680 filed Jan. 27, 2011. |
International Search Report dated May 22, 2013 for International Application PCT/US12/031136 filed Mar. 14, 2013. |
International Search Report and Written Opinion dated Mar. 4, 2014 for International Application PCT/US12/053322 filed Aug. 31, 2012. |
Johnansson, B., “An Introduction to RFID—Information Security and Privacy Concerns”, TDDC03 Projects, (Spring 2004), 14 pgs. |
Juels, A., et al., “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy”, Proceedings of ACC CCS'03, Washington, DC (Oct. 27-30, 2003), 9 pgs. |
Jung, M, et al., “All-Printed and Roll-to-Roll Printable 13.56-MHz-Operated 1-bit Rf Tag on Plastic Foils”, IEEE Transactions on Electron Devices, (Feb. 19, 2010), 10 pgs. |
Kazmi, Hammad Raza, “Security and Privacy Issues in Near Field Communication (NFC) Systems”, Master Thesis, Royal Institute of Technology, Sweden, Apr. 2011, 59 pgs. |
Kfir, Ziv, et al., “Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems”, Proceeding of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Sep. 5-9, 2005, 47-58. |
Kortvedt, H.S., “Securing Near Field Communication ”, Thesis for Master of Science in Communication Technology, Norwegian University of Science and Technology, (Jun. 2009), 135 pgs. |
Kuo, S., “A performance evaluation method for EMI sheet of metal mountable HR RFID tag”, Measurement, 44 (2011), 946-953. |
Kupusamy, K. S. et al., “A Model for Remote Access and Protection of Smartphones Using Short Message Service”, International. Computer Science, Engineering and. Iñformation Technology (IJCSEIT), vol. 2, No. 1, (Feb. 2012), 91-100. |
LocaTag-An NFC-based system enhancing instant messaging tools with real-time user location; Kobler, Philip Koene, Helmut Kremar, Matthias Altmann, Jan Marco Leimeister, Apr. 20, 2010 Second International Workshop on Near Field Communication. |
Location-Triggered Code Execution-Dismissing Displays and Keypads for Mobile Interaction; W. Narzt and H. Schmitzberger, C. Stephanidis (Ed.): Universal Access in HCI, Part II, HCII 2009, LNCS 5615, pp. 374-383, 2009. © Springer-Verlag Berlin Heidelberg 2009. |
Long, Men, et al., “Human Perceivable Authentication: An Economical Solution for Security Associations in Short-Distance Wireless Networking”, Proceedings of 16th International Conference on Computer Communications and Networks, Aug. 13-16, 2007, 257-264. |
Madlmayr, Gerald, etal., “NFC Devices: Security & Privacy”, Proceedings of the 3rd International Conference on Availability, Reliability and Security, Barcelona, Spain, Mar. 7, 2008, 13 pgs. |
Media Clips: Implementation of an Intuitive Media Linker; Seunghyun Yoon, Kyuyun Lee, Hyunchang Shin, Samsung Electronics, 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) held Jun. 8-10, 2011. |
Mitrokotsa, A., et al., “Classification of Rfid Attacks”, Proceedings of the 2nd International Workshop on Rfid Technology - Concepts, Applications, Challenges (IWRT 2008), in conjunction with the 10th International Conference on Enterprise Information Systems, pp. 73-86, Barcelona, Spain, Jun. 2008. INSTICC Press, Portugal. Retrieved from the Internet: <URL: http://www.cs.vu.n1/˜ast/publications/iwrt-2008.pdf>. |
Mobile Personal Devices meet Situated Public Displays: Synergies and Opportunities; Alan Dix, Corina Sas (2010). International Journal of Ubiquitous Computing (Ijuc), 1(1), pp. 11-28. http://www.hcibook.com/alan/papers/MPD-SPD-2010/. |
Mulliner, Collin, “Attacking NFC Mobile Phones”, 25th Chaos Communication Congress, Berlin, Germany (Dec. 2008). Retrieved from the Internet: <URL: http://www.mulliner.org/nfc/feed/collin_mulliner_25c3_attacking_nfc_phones.pdf>, 71 pgs. |
Mulliner, Collin, “Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones”, 2009 International Conference on Availability, Reliability and Security, Fukuoka, Japan, Mar. 16-19, 2009, 695-700. |
Near Field Communication in Smartphones, Simon Burkard, Berlin Institute of Technology, Germany, 2012. |
Near Field Communications Handbook, volume 13 of Internet and Communications, 2009; Mohammad Ilyas. |
Newport Digital Technologies to Implement Microsoft Licensing Agreement; Prepares to Launch First Ruggedized RFID Reader with Windows Mobile Operating System. Business Wire Oct. 20, 2009. |
NFC and Mobile Payments Today, Andre Filipe de Axevedo Figueiredo Cruz, Nov. 2011. |
NFC Data Exchange Format (NDEF), Technical Specification, NDEF 1.0,-Jul. 24, 2006. |
NFC Forum Type Tags, White Paper V1.0, Apr. 1, 2009-Public. |
NFC Mobile Parlor Games Enabling Direct Player to Player Interaction, 2011 Third International Workshop on Near Field Communication, Avinash Nandwani, Paul Coulton, Reuben Edwards. |
NFC-Based Mobile Interactions with Direct-View Displays; Khoovirajsingh Seewoonauth, Enrico Rukzio, Robert Hardy, and Paul Holleis, IFIP Conference on Human-Computer Interaction—Interact 2009 pp. 835-838. |
NFC-Cap Securty Assessment, vol. 1.0-May 11, 2009; Diego A. Ortiz-Yepes. |
Ongtang, Machiagar, et al. “Semantically Rich Application-Centric Security in Android”, Security and Communication Networks, vol. 5, Issue 6, Jun. 2012, 658-673. |
Opoku, Samuel King, “Performance Enhancement of Large-Size NFC Multi-Touch System”, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), (Oct. 2011), 52-57. |
Oren, Y., “Attacks on RFID-Based Electronic Voting System”, Cryptology ePrint Archive Report 2009/442 (2009). Retrieved from the Internet: <URL: http://eprint.iacr.org/2009/422.pdf>, 21 pgs. |
Physical browsing with NFC technology; Heikki Ailisto, Tapio Matinmikko, Juha Haikio, Arto Ylisaukko-oja, Esko Strommer, Mika Hillukkala, Arto Wallin, Erkki Siira, Aki Poyry, Vili Tormanen, Tua Huomo, Tuomo Tuikka, Sonja Leskinen & Jarno Salonen, Espoo May 2007. VTT Tiedotteit—Research Notes 2400. |
Programming Android; Zigurd Mednieks, Laird Domin, G. Blake Meike, Masumi Nakamura, O'Reilly Media, Inc., 2011, http://books.google.co.In/books?id=5BGBswAQSiEC&Ipg=PR5&ots=xSfgivFwS& dq=rogue%2ONFC%20active%20tags%2Ourl%2Ophone%2Opeer%20to%2Opeer&Ir&p. g=PA397#. |
QR Code Tech Info: MECARD Format, May 2, 2011. |
QRFactory, Redirectable QR, http://dashboard.qrfactory.com/,pulled from the internet Apr. 27, 2012. |
Rahnama, Behnam, et al., “Securing RFID-Based Authentication Systems Using ParseKey+”, Proceedings of the 3rd International Conference on Security of Information and Networks,_Taganrog,_Russia,_Sept._7-11,_2010,_212-217. |
RFID based applications in culture, media and creative industries, 2011 Third International Workshop on Near Field Communication, Eileen Kuehn, Jens Reinhardt, Stephan Bergemann, Prof. Dr. Juergen Sieck. |
RFID Inventory Management System. Package Printing, v57 n2, pp. 34. Feb. 2010. |
Rieback, M.R., et al., “A Platform for RFID Security and Privacy Administration”, Proceedings of the 20th USENIX/SAGE Large Installation System Administration conference (Lisa 2006), Washington D.C., (Dec. 2006). Retrieved from the Internet: <URL: http://www.rficleuardian.org/images/a/a9/Lisa.06.odf>, 14 pgs. |
Rieback, M.R., et al., “The Evolution of RFID Security”, Pervasive Computing (Jan.-Mar., 2006), 62-69. |
Roland, M., “Security Vulnerabilities of the NDEF Signature Record Type”, Presentation from WIMA 2011—NFC Research Track, Monaco (Apr. 19, 2011). Retrieved from the Internet: <URL: http://www.wima.mc/dan/2011/CONF_PDF/Tuesday/Am/Roland.pdf>, 14 pgs. |
Roland, Michael, et al., “Digital Signature Records for the NFC Data Exchange Format”, Second International Workshop on Near Field Communication, Monaco, Apr. 20, 2010, 7176. |
Sabzevar, A.P., “Security in RFID Systems” Project report for GMU ECE 646 (2004). Retrieved from the Internet: <URL: http://teal.gmu.edu/courses/ECE646/project/ reports_2004/Sp-4_report.pdf>, 13 pgs. |
Sarma, S.E., et al., “RFID Systems and Security and Privacy Implications”, Ches 2002, LNCS 2523, B.S. Kaliski Jr. et al. (Eds.) (2003), pp. 454-469, 2003. |
Secure contactless mobile financial services with Near Field Communication; Adeola Oluwaseyi Poroye, Aug. 2011. |
Simple NDEF Exchange Protocol, Technical Specification, NFC Forum SNEP 1.0,-Aug. 31, 2011. |
Situated Door Displays and how to interact with them, Barbara Schmid,-Jan. 16, 2012. |
Smart Poster Record Type Definition Technical Specification NFC ForumTM SPR 1.1 NFCForum-SmartPoster_RTD_1.0, 2006-07-24. |
Suh, J., “Introduction to composite electromagnetic noise absorber technology” EMC Directory & Design Guide, (2007), 4 pgs. |
Switching the role of NFC tag and reader for the implementation of Smart Posters, 2012 4th International Workshop on Near Field Communication; Dirk Volland, Kay Noyen, Onur Kayikei, Lukas Ackermann, Florian Michahelles. |
Thamilarasu G et al: “Intrusion detection in RFID systems”, Military Communications Conference, 2008, pp. 1-7. |
The “Weak Spots” in Stacked UHF RFID Tags in NFC Applications, IEEE RFID 2010; Xiaosheng Chen, Feng Lu, Terry T.Ye*. |
The Junction Protocol for Ad Hoc Peer-to-Peer Mobile Applications; Computer Science Department Stanford University; Ben Dodson, Aemon Cannon, Te-Yuan Huang, Monica S. Lam, Apr. 2011. |
The Mobile Phone as Digital SprayCan; Philip Garner, Omer Rashid, Paul Coulton, and Reuben Edwards, Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology Article No. 12, Hollywood, California, USA—Jun. 14-16, 2006. |
Touch-driven Interaction Between Physical Space and Cyberspace with NFC, Longbio Chen, Gang Pan, Shijian Li, Department of Computer Science, Zhejiang University Hangzhou, China, 2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing. |
Turcu, C. (ed.), Development and Implementation of RFID Technology, In-Teh, I-Tech Education and Publishing KG, Vienna, Austria (Feb., 2009), 564 pgs. |
Type 1 Tag Operation Specification, Technical Specification, Technical Specification, NFC Forum T1TOP 1.1,-Apr. 13, 2011. |
Type 2 Tag Operation Specification Technical Specification, T2TOP 1.1 NFC Forum-May 31, 2011. |
Type 3 Tag Operation Specification, Technical Specification, Technical Specification, NFC Forum, T3TOP 1.1, Jun. 28, 2011. |
Valkkynen, Pasi, et al.,' Suggestions for Visualizing Physical Hyperlinks, Permid 2006: Pervasive Mobile Interaction Devices—Mobile Devices as Pervasive User Interlaces and Interaction Devices, Dublin, Ireland, May 7, 2006, 245-254. |
Varshney, L.R., et al.., “Securing Inductively-Coupled Communication ”, Information Theory and Applications Workshop (ITA) (Feb. 5-10, 2012), 6 pgs. |
Vidano, R., “13.56-MHz Inductively Coupled Card Compatibility to Conducting Surfaces”, Proceedings of Asia-Pacific Microwave Conference (2007), 4 pgs. |
Violino, Bob. A Summary of RFID Standards. RFID Standards. RFID Journal. Jan. 16, 2005. URL at http://www.rfidjournal.com/articles/view?135. |
Wang, J.J.H., “Spiral Antennas in RFID and Their Size Reduction and Performance Enhancement”, 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification (Apr. 16-18, 2007), 44-47. |
Wegleiter, H. et al., “Automatic Antenna Tuning Unit to Improve RFID System Performance”, IEEE Transactions on Instrumentation and Measurement, vol. 60, No. 8,(Aug. 2011), 2797-2803. |
Weis, Stephen A, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, Security in Pervasive Computing 2003, LNCS 2802, D. Hutter et al. (Eds.) (2004) 201-212. |
Yamada, I., et al., “Secure Active RFID Tag System”, Ubicomp2005 Workshops, 5 pgs. |
Zhu, H., et al., “Solutions of Metal Surface Effect for HF RFID Systems”, 2007 International Conference on Wireless Communications, Networking and Mobile Computing (WiCom), (Sep. 21-25, 2007), 2089-2092. |
Partial European Search Report dated Aug. 7, 2017 for European Application No. EP17000461 filed Mar. 21, 2017. |
Domdouzis et al., “Radio-Frequency Identification (RFID) applications: A brief introduction,” Advanced Engineering Informatics 21 (2007), pp. 350-355. |
Number | Date | Country | |
---|---|---|---|
20110307309 A1 | Dec 2011 | US |
Number | Date | Country | |
---|---|---|---|
61299609 | Jan 2010 | US | |
61311473 | Mar 2010 | US | |
61416384 | Nov 2010 | US | |
61423139 | Dec 2010 | US |