![]() method and system for nfc security
专利摘要:
METHOD, SYSTEM AND APPARATUS FOR NFC SECURITY A method, system and apparatus to provide security for RFID and NFC systems is exposed. According to some exemplary embodiments, a smart poster can be used to provide appropriate or desired communication with an RFID or NFC enabled device. Such exemplary embodiments may use an authorized NFC tag to communicate with an NFC-enabled device, and upon activation of the authorized NFC tag, it may trigger the activation or appearance of one or more related items, such as visual cues. In addition, aspects of NFC security systems that may include security regions, activity states and actions taken when security breaches are detected. 公开号:BR112014017152B1 申请号:R112014017152-1 申请日:2013-03-14 公开日:2021-01-12 发明作者:Ian J. Forster 申请人:Avery Dennison Corporation; IPC主号:
专利说明:
Related Order Referral [0001] The present application claims the benefit of U.S. provisional patent application No. 61 / 715,426 filed on October 18, 2012, which is included in this context by reference in its entirety. Background of the Invention [0002] Radio frequency identification (RFID) devices, including near-field communication (NFC) enabled RFID devices, are used for a variety of purposes. These devices are often formed as tags or labels and can be used to associate an object with an identification code or other data, such as web location data. These RFID devices can be passive and, when receiving a signal , such as an excitation signal from an RFID or NFC enabled reader, can be excited. The devices can then respond with a desired communication or provide information associated with a product, item or service associated with the RFID device. [0003] Specifically, NFC is a data exchange protocol designed to allow devices, including mobile phones and the like to be properly equipped, to interact with infrastructures, such as point-of-sale terminals and ticket turnstiles in transportation systems. , or RFID devices in the form of “smart signs” or “touch points”, for example. In these situations, bringing an NFC-enabled device close to that infrastructure or RFID devices can cause data transmission to the NFC-enabled device, resulting, for example, in the opening of a web page, 2/21 in the acceptance of a stream of media via Bluetooth® or any of a number of other functions. [0004] US 2007/0135112 discloses a mobile multimedia or communication device that comprises a control unit for controlling the functionality of the multimedia or communication device, in which the control of the functionality depends on information received from information emitted from a programming element that is placed in the vicinity of the device. The communication between said device and the programming element is preferably based on NFC and RFID. [0005] US 2008/022160 discloses a method for detecting and isolating malware stored on an RFID tag. The data stored in the tag is read and scanned for malware in the data. If any suspicious malware is detected, the data will be stored in a quarantine file in the reader's memory. Isolated data in the quarantine file can be flagged with a corrupted tag indicator to indicate the presence of a suspected suspect malware or a corrupted tag indicator can be stored in the quarantine file instead of the data read from the tag. [0006] US 2006/214794 A1 discloses a system for tracking elements that employ fixed tags that are permanently attached internally or externally to the elements. The label includes radio frequency (RF) communication units that have wireless communication with RF communicators. Wireless communications between RF tags and RF communicators operate with a tag communication protocol that defines operations and sequences for storing information and retrieving tag information. [0007] Often the way to associate a product, item or service with an RFID device is to physically attach or adhere the RFID device to the product or item, or to associate it with advertising relating to the product, item or service, such as the “smart poster” or “touch touch point” described earlier. For example, RFID tags can be adhesive-bonded to objects or they can otherwise be provided with surfaces that attach directly to objects. RFID tags can be attached to objects in other ways, such as through the use of a plastic fastener, cord or other fastening mechanism. These RFID devices can then provide data to the NFC-enabled devices located or placed close to the RFID devices. [0008] In addition, RFID devices are often associated with the product or item, or with the advertising item, in such a way as to hide or protect the RFID device. These methods can provide security against the removal or misuse of an RFID device. However, in such circumstances, and in particular with NFC-enabled devices designed to transmit information to consumers with NFC-enabled phones and mobile devices, there is a designated area (touch point) in an advertisement or product that indicates that Information can be obtained if the NFC-enabled device is placed in close proximity to an area associated with the RFID device. However, as it is then known that information can be obtained from these areas, vandalism or pirate RFID devices are often placed in close proximity to the indicated NFC area. Vandalism or pirate devices often contain misleading, unwanted or malicious information. These devices can be coupled or made to adhere to products and items, or advertisements associated with those items, leading to misleading, unwanted or malicious information that is inadvertently communicated to a user's NFC-enabled device. The present invention provides a possible solution to this problem summary [0009] A method, system and apparatus is provided to provide security for RFID and NFC systems. According to some exemplary embodiments, a smart poster can be used to provide appropriate or desired communication with an RFID or NFC enabled device. Such exemplary embodiments may use an NFC tag authorized to communicate with an NFC-enabled device, and when activating the authorized NFC tag, it may trigger the activation or appearance of one or more related items, such as visual cues. In addition, aspects of NFC security systems that may include security regions, activity states and actions taken when security breaches are detected. Brief Description of the Drawings [0010] The advantages of the embodiments of the present invention will be evident from the following detailed description of the exemplary embodiments. The following detailed description should be considered together with the figures in the accompanying drawings where: [0011] Figure 1 is an example view of a poster with a built-in RFID device. [0012] Figure 2 is an example view of a poster with a built-in RFID device and a security system. [00013] Figure 3 is an example diagram showing a security system that can be used with an RFID device. Detailed Description [00014] Aspects of the invention are set out in the following description and related drawings directed to specific embodiments of the invention. Alternative embodiments can be devised without departing from the spirit and scope of the invention. In addition, elements of widely known exemplary embodiments of the invention will not be described in detail or will be omitted so as not to obscure the relevant details of the invention. In addition, to facilitate an understanding of the description, a discussion of several terms used in this context follows. [00015] As used in this context, the word "exemplary" means "to serve as an example, instance or illustration". The embodiments described in this context are not limiting, but instead are merely exemplary. It should be understood that the embodiments described are not necessarily to be considered as preferred or advantageous over other embodiments. Furthermore, the terms "embodiments of the invention", "embodiments" or "invention" do not require that all embodiments of the invention include the feature, advantage or mode of operation discussed. [00016] In general with reference to Figures 1-3, a smart poster, such as a poster that includes an authorized RFID device, including an authorized NFC tag, can be used to provide appropriate or desired communication with a device enabled by RFID or NFC. Such exemplary embodiments may use an authorized NFC tag to communicate with an NFC-enabled device, and when activating the authorized NFC tag, it may trigger the activation or appearance of one or more related items, such as visual cues. In addition, aspects of NFC security systems that may include security regions, states of activity and actions taken when security breaches are detected. In addition, while some of the exemplary embodiments described discuss communication capabilities either with RFID or NFC, it can be appreciated that these capabilities can be realized on the same device or such capabilities can be used interchangeably in some cases. [00017] Referring now to the exemplary Figure 1, a view of a display 100 is provided which is provided with a poster 106 with a support frame 102. In the exemplary embodiment, poster 106 can be any type of poster, formed from any type of material, and can be used to carry any type of information. The poster can be formed from any acceptable material, including, but not limited to, paper, tinsel and plastic films. The information carried can be of any desired type, including, but not limited to, advertisements, personal care, health care and product or service information. Structural frame 102 can provide secure containment of poster 106, an authorized communication device, such as authorized NFC tag 114 and desired related electronic components or media, such as, but not limited to, lighting and a system NFC security. Frame 102 can be any type of frame desired and can be formed from any desired materials. In addition, the frame 102 can be such that it can be formed with an integral antenna or it can be adapted with an antenna. [00018] In Figure 1, the example poster 106 may contain visual information 108, for example, an advertisement for a product or any other desired visual information. In addition, the NFC tag 114 may be provided with a visual indicator 116 associated with it. Visual indicator 116 can be any type of static or electronic visual indicator and can be used, for example, to guide the user to an appropriate region for placing NFC-enabled devices that can read the authorized NFC tag 114. These devices can include mobile phones with NFC interrogators built into the phones, or any other devices with NFC interrogators associated with them. Placing an appropriately equipped mobile phone (or other NFC-enabled device) in the indicated region 116 can allow the reading of the content of the NFC tag 114. This content can also be any type of information or data, for example, data that may point to a web location that contains information related to visual information 108 on poster 106. [00019] The poster or smart indication can also be equipped with a low power receiver or “watchdog” device that will allow the NFC tag 114 to detect the presence of an NFC reading device, such as a smart phone, under a greater range than the reading device is typically able to interact with NFC tags on the surface or in an area. One use for the detection device or watchdog is to allow a security scan for invasive / pirated tags to be carried out before the user or consumer gets close enough to read the pirated tags if they are present. Since the scan is performed only when a consumer approaches, the average power consumption is very low, allowing the function to be supported by a battery that can be located on the label or associated with the label. Pre-detection using this watchdog device can also be used to trigger visual, audible or other functions, such as signal lighting or a greeting for the approaching consumer. By placing a watchdog device within the protected range, NFC tags can be monitored and, as watchdog units can be battery operated because of pre-detection, they can be deployed flexibly without the cost additional wiring structures or support structures to implement the use of the watchdog device. [00020] Still with reference to the exemplary Figure 1, a pirate or vandalism tag 104 is shown as being attached to a visual surface of the poster 106. The contents of the vandalism tag 104 can contain any type of information or data. According to one embodiment, the contents of the vandalism tag include information or data that redirects a user's device to a web location that contains unauthorized information or may install malicious software on the reading device. [00021] As described with reference to the exemplary Figure 1, the authorized NFC tag 114 is associated with the poster 106. The authorized NFC tag 114 can be used in isolation to provide desired or authorized communication between the authorized NFC tag 114 and an NFC-enabled reader, or can be used with an NFC security system, as described in more detail in this context. In addition, the authorized NFC tag 114 may be such that it can function to prevent or limit a vandal tag 104 functionality, or other unauthorized or unwanted devices, which are placed in close proximity or directly overlapping the NFC tag 114. Authorized NFC tag 114 can be formed in any of a variety of ways, and includes elements such as a relatively high dielectric constant substrate, a relatively high magnetic permeability substrate, or include areas of a conductive material in addition to that required for form the antenna. The material with a relatively high dielectric constant can be further defined as a material with a dielectric constant greater than that of silicon dioxide, or 3.9. Exemplary materials include hafnium silicate, zirconium silicate, hafnium dioxide, and zirconium dioxide, and any highly dielectric material known in the art may be used. Magnetic permeability is usually expressed as relative magnetic permeability (μR), the ratio of the permeability of a specific medium to the permeability of free space, or the ability of a material to attract and support a magnetic field. High relative magnetic permeability can be defined as greater than 1. Examples of substrates with high relative magnetic permeability include ferromagnetic materials such as nickel or iron [http://www.microwaves101.com/encyclopedia/highpermeability.cfm]. These aspects will cause a vandalism tag placed in the vicinity to be strongly tuned, and therefore reduced in functionality. According to some embodiments, the structure that supports the poster or the poster itself includes relatively high dielectric constant, high magnetic permeability and conductive areas, or any combination of these, and the authorized label 114 can be designed for a charged resonant frequency that can compensate for these obstructions or interference. Unauthorized or vandalism labels that are designed for benign substrates typical of many applications, can have their performance significantly impaired or become disabled due to the presence and functionality of the elements included in the structure, poster, or both. Authorized label 114, having previous knowledge of surface conditions, can implement the concept of having a special “key” or properties of an RFID device authorized to work on the surface. In this way, any unauthorized or vandalism tags without this knowledge may not work to provide your intended communication capabilities. [00022] Figure 2 can provide an exemplary view of a display 200 with a display frame 202 that can include a poster 206 with visual information 208 and an authorized NFC tag 214. On the other hand, in this exemplary embodiment, a zone NFC reading indicated by means of a visual guide 216 can also be provided. In addition, display 202 may include an NFC security system (described in more detail with respect to Figure 3 3x3mplificative below) that can protect display 200 against vandalism tag 204, or any number of other vandalism tags. The security system may include a security controller 210, one or more subset circuit boards 212 associated with security controller 210, and an NFC antenna 218. For example, the controller subset circuit board or boards 212 210 can provide functionality for operating the security system. In addition, the NFC antenna 218 can provide an interrogation area that can be substantially equivalent to the entire surface of the display 200. In this way, the scanning area can include the poster 206, the indicated reading zone of NFC 216 and all the other surfaces of the display frame 202, in the same way as some areas located near or near the display 200, as desired. [00023] Still with reference to the exemplary Figure 2, an unauthorized label 204 can be illustrated as attached to a part of the poster 206. The security system, as described in more detail below, can periodically excite the antenna of NFC 218 to scan any and all NFC tags attached to display 202. The security system can then detect vandalism tag 204 (or any other unauthorized device) and select an appropriate or desired action or set of actions to be performed . According to an exemplary embodiment, the security system can first scan the contents of the vandal tag 204 memory. Then, depending on the persistent states of the vandal tag 204 the security system can try to rewrite the vandal tag 204 or otherwise disable the vandal tag 204 functionality using a "delete" instruction commonly found with most NFC tags. Additional or alternative steps that can be taken by safety controller 210 may include congestion of the noisy communication channel, emitting an audible alarm, or turning off the display lights associated with display 200 to indicate an out of order status, or signaling alert using network connections included in the system. These steps are described in more detail below. [00024] Figure 3 can provide an exemplary view, in the form of a functional block diagram, of the components of a security system 300 used in conjunction with NFC or RFID systems. Safety controller 210 can be the primary controller for all other controllers in the system. Secondary controllers in the system illustrated in this exemplary embodiment can include network controller 320, NFC controller 322 and display controller 310, in the same way as others, as desired. The secondary controllers 310, 320, 322 in this exemplary embodiment can be connected to the safety controller 210 by means of cables, such as cables 318, 312, and 314. The network controller 320 can also include network transceivers that can support standards wired, such as Ethernet or wireless network standards, such as cellular network, Wi-Fi and Bluetooth connections, or any other wired or wireless standards, as desired. The NFC controller 322 can provide NFC functions such as, but not limited to, interrogating, reading, writing and disabling NFC tags. The NFC controller 322 can be connected via cable 308 to the NFC antenna 218. The NFC antenna 218 may include one or more near-field elements that can provide power and communication for the NFC tags located in close proximity to the antenna. of NFC 218, and can be arranged anywhere on display 200 or close to it, for example, on frame 202. Display controller 310 can provide sending and receiving signals from display 200 via connection cable 306 . [00025] Still with reference to the exemplary Figure 3, the display 200 may contain components or methods for controlling electronic means in the display 200, for example, visual lighting, electronic auditory speakers, cicadas and locking mechanisms. Display 200 can indicate states through the use of switches, or any other desired components. In addition, sensors included within the display 200 can be equipped with light sensors, motion sensors, proximity sensors, vibration sensors, and the like. Signals from sensors and switches can provide information for controlling scanning intervals and security elements on the NFC 200 display. For example, security system 300 can be programmed to stop scanning when a user or consumer is present such that the user's NFC mobile device is free from interference and a desired NFC communication can take place. [00026] Referring now to the exemplary Figure 2 and the exemplary Figure 3, an area protected by the NFC 300 security system can be one or more regions or zones. These regions or zones can be of any dimension considered appropriate or desired for the protection of the display 200. The zone can be located within the limits of the display. The security zone, according to some exemplary embodiments, can extend beyond the physical limits of the display 200. In addition, for an NFC 300 security system with multiple zones, the size and configurations of each zone may differ in regarding the configuration of all other zones. The technology used to secure this zone can be obtained through any desired combination of near- or far-field structures. Examples of near-field structures may include induction coils, capacitive structures or transmission lines. Examples of distant field structures can include any physical configuration of conductive material used as an antenna to detect electromagnetic wave energy. The structures used for the security of a zone can be operated in configurations suitable for RFID interrogation, detection of alternative fields or transmission of alternative fields. [00027] According to an exemplary embodiment, the zone or area, which may correspond to the size of the frame 202, may be that of a large inductive coil antenna 218 that may follow an external perimeter directly behind the visual part of the display 200. The coil antenna 218 can be energized to provide an alternative magnetic field for deactivating unauthorized tags 204. The power and control of the coil antenna 218 can be provided through the NFC controller 322, which can seek to interrogate any tags of NFC, such as a vandal tag 204, attached to the visual face of the display 200. [00028] According to another exemplary embodiment, and still with reference to Figure 2 and Figure 3, a security scanning zone can be created by one or more magnetic probes positioned on the display 200. The magnetic probes can be used to perform scanning for alternative magnetic fields that may correspond to an NFC interrogation system on a user's device. High power fields detected in areas where there is no authorized NFC tag, such as the authorized NFC tag 214 located next to indicator 216, may indicate the presence of an unauthorized tag 204 on the display. [00029] According to yet another exemplary embodiment, a safe zone can be provided by means of an antenna 218 within the display 200 that can record signals from distant fields under an operational NFC radio frequency. The signals can be analyzed using a security system component for timing and content related to the authorized NFC tag 214 on display 200. Discrepancies or irregularities in the analyzed data may indicate the presence of an unauthorized tag 204. [00030] Still according to another exemplary embodiment, the security system can initiate scans of an area or zone associated with the display 200. This can be done through a watchdog device or other components provided for this activity. The scanning activity performed by the security system can be operated through constant polling or can be triggered by conditional rules, as desired. Conditional control of scanning activity can have the benefit of lower utilization or power consumption of the display 200 and can also reduce potential interference with legitimate NFC activity by display 200 users, such as reading the Authorized NFC 214. Parameters that can be used to trigger NFC security scanning activity may include, but are not limited to, time, sensor states, display states, or external requests. Examples of time parameters include, but are not limited to, regular intervals, fixed time of day, or a synchronized interval after a conditional state change of another parameter. Examples of sensor states include, but are not limited to, infrared, acoustic, proximity, and vibration sensors, as well as environmental sensors, such as light, temperature, and humidity. Examples of display states may include, but are not limited to, user NFC interrogation activity or initialization directly after a new authorized NFC tag 214 has been installed. Examples of external orders may include, but are not limited to, signals and communication sent via wireless communication methods associated with the network controller 320, such as Bluetooth, NFC or Wi-Fi, in the same way as wired communication from connections such as an Ethernet connection. [00031] Conditions for triggering scan activity may further comprise any logical or desired combinations of trigger parameters and states as well as sequential conditions for propagating activity previously triggered. For example, the security system 300 can conduct a scan at regular intervals during hours of the day while light sensors on top of the display 200 are triggered by general fluorescent lamps. According to another exemplary embodiment, the security system 300 can scan the display after a specified time after an acoustic sensor in front of the display 200 has been triggered. In accordance with yet another exemplary embodiment, security scans can be triggered when the authorized NFC tag 204 is interrogated by the user. [00032] Still with reference to the exemplary Figure 2 and the illustrative Figure 3, if the security system 300, after conducting a scan, detects an authorized NFC tag 204 or corrupted NFC tag 214, the NFC security system 300 can select an appropriate action or set of actions to be performed and perform them. The security actions performed by the system 300 can be any type of actions, for example, variables ranging from direct actions performed on an unauthorized 204 tag to progressively more indirect actions in an attempt to reduce threats caused by unauthorized 204 tag. For example, it may be desirable that direct actions are attempted first, with indirect actions taken for redundancy and recovery. [00033] Examples of direct actions for an unauthorized 204 tag may include inspection of memory content and operational states, commands issued to disable tag 204, reprogram the memory content of tag 204, or obstruct the communication channel of said tag 204. Inspection of the contents of memory and unauthorized 204 tag status can determine a threat and severity level of a security breach. Inspection can also help identify unauthorized NFC tags that contain code that could exploit vulnerabilities in the user's device software or contain indicators to install malicious software on a user's device. The memory contents of an unauthorized tag 204 can be recorded by the security system for further analysis by authorized personnel. Disabling unauthorized 204 tags can be achieved through known and established commands commonly available for NFC tags such as the “delete” command commonly used for privacy functions. Blocking the communication channel can be implemented by methods such as issuing read commands to the unauthorized tag 204 or transmitting noise or random pulses to interrupt communication with the unauthorized tag 204. [00034] Other examples of indirect security actions may include alerting to authorized personnel, warning to a user, or disabling the 200 display. The alerting of authorized personnel can be obtained through a wireless or wired network communication channel. available to the security system, for example, via network controller 320. If a network connection is not available to the security system, encrypted messages can be sent by reprogramming the authorized NFC tag 214. In such an example , information can be embedded in the URL indicator that sends encrypted messages to the web site server, but it does not affect the web site content that a user will observe on their enabled NFC device. Another exemplary signaling method can be obtained by storing the alert in the memory of the security system 300 for communication during maintenance intervals by authorized personnel. Visual displays, such as illuminated indicators, can be used to require maintenance by authorized personnel. These indicators can be provided either on display 200 or around it, on frame 202, or in conjunction with poster 206, or as part of indicator 216. In a similar way, warnings for the user can be obtained through audio or visual indicator lights or by reprogramming the authorized NFC tag 214 to indicate a problem with the display 200. Disabling the display 200 can also be achieved by reprogramming the authorized NFC tag 214 in combination with turning off the 200 light indication background to indicate a non-functional state. [00035] According to some other exemplary embodiments, the NFC security system 300 can interrogate the desired and authorized NFC tag 214 to verify that the memory contents and identification codes remain uncorrupted. A previously stored unique identification code and reliable data known to the authorized NFC tag 214 can be established during the period of installation of the authorized tag 214 on the display 200 by authorized personnel. If the security system determines that the authorized NFC tag 214 is non-functional or has corrupted memory content, then a set of actions similar to those previously described for unauthorized tags 204 can be performed. [00036] According to another exemplary embodiment, an integrated RFID interruption system, such as the NFC controller 322, can verify a unique identification code and memory content belonging to the authorized NFC tag 214. The unique identification code and memory content of the authorized NFC tag 214 can then be compared with previously known good data stored. If corrupted data is detected on the authorized NFC tag 214, the integrated RFID reader (for example, the NFC controller 322) can start repeatedly by issuing tag readings to the authorized NFC tag 214. These repeated tag readings can obstruct the communication channel and prevent interrogation of the authorized NFC tag 214 by a user NFC-enabled device. In addition, the backlight of the display 200 can be turned off, or provided some other indication, which warns that the display 200 is no longer working. Display 200 may return to normal use and appearance after the problem is corrected. [00037] According to another exemplary embodiment, the NFC security system 300 can report the presence of an unauthorized NFC tag 204 to an internet server via a cellular network connection of another desired communication method. This report can be sent using the network controller 320. The memory contents of the unauthorized 204 tag (s) can then be sent to the server using the network controller 320 for further analysis . Authorized personnel can also be alerted via a message from the server or directly from network controller 320 as to the unauthorized nature of tag 204. [00038] In accordance with yet another exemplary embodiment, the detection of an unauthorized NFC tag 204 can be performed through an integrated RFID interrogation system, such as with the NFC controller 322. As discussed earlier, the antenna 218 of the security system can cover the perimeter of the display 200, for example, the internal frame 202, in order to protect the entire surface of the display 200 and the region around the display 200. The NFC controller 322 can perform a function of NFC (or RFID, as desired) inventory to check for the presence of unauthorized tags 204. The inventory function can determine the quantity and identification codes of NFC tags 204 in the vicinity of the energized antenna coil 218 When detecting an unauthorized tag 204, the security system 300 can disable unauthorized tag 204 by reading the tag's unique identification code and performing a delete function for the unauthorized tag 204, as described in the exemplary embodiments previously exposed. [00039] In accordance with yet another exemplary embodiment, the security system 300 may include an RF or NFC radio detection system that can scan for local RF energy emissions in the 13.56 MHz frequency band. This scan can be performed using the NFC 322 controller, an RFID controller or any other component with the desired scanning or interrogation capabilities. The system can then compare the detection of emissions above the specified signal strength with the desired and authorized tag interrogation timing 214. RF or NFC emissions can then be analyzed using security system 300 to determine if a user in the vicinity with display 200 it is reading an unauthorized label 204. Statistical information regarding the presence and nature of the emissions can then be used to alert maintenance personnel to the potential presence of unauthorized labels 204. [00040] The preceding description and figures of the attached drawings illustrate the principles, preferred embodiments and modalities of operation of the invention. However. The invention should not be considered to be limited to the specific embodiments discussed earlier in this context. Additional variations of the embodiments discussed above will be considered by those skilled in the art. [00041] For this reason, the embodiments described above should be considered as illustrative and not restrictive. For that reason, it should be appreciated that variations in these embodiments can be made by persons skilled in the art without thereby escaping from the scope of the invention as defined by the appended claims.
权利要求:
Claims (17) [0001] 1. Method for detecting an unauthorized NFC tag (204), which comprises the steps of: providing an RFID interrogation system with an NFC controller (322), the interrogation system being provided in a frame (102 , 202) of a display (100, 200), the frame having an antenna (218); characterized by the fact that an authorized tag (114) has prior knowledge of the surface conditions of the device (100, 200) and has properties of an RFID device authorized to operate on the surface, and unauthorized tags free of prior knowledge are free to provide your intended communication skills; perform a security scan through the system; verification of unauthorized NFC tags (204) by the device; determining a number of unauthorized NFC tag identification codes (204) in the vicinity of the frame (102, 202) by the system; detecting at least one unauthorized NFC tag (204); and take at least one action for at least one unauthorized NFC tag. [0002] 2. Method, according to claim 1, characterized by the fact that the at least one action includes disabling at least one unauthorized NFC tag (204). [0003] 3. Method, according to claim 1 or 2, characterized by the fact that the at least one action includes at least one of the group consisting of reprogramming the memory content of unauthorized NFC tags (204) and obstruction of the communication of said unauthorized labels (204). [0004] 4. Method according to any one of claims 1 to 3, characterized by the fact that the at least one action includes at least one of a group consisting of alerting authorized personnel and disabling the display (100, 200). [0005] 5. Method according to any one of claims 1 to 4, characterized by the fact that it also comprises interrogating the authorized NFC tag (114, 214) and verifying that the memory contents and identification codes remain free from being corrupted and determine which authorized NFC tags (114, 214) are corrupted. [0006] 6. Method, according to claim 5, characterized by the fact that it also includes performing at least one action on any authorized corrupted NFC tag (114, 214). [0007] 7. Method according to claim 6, characterized in that the at least one action on a corrupted NFC tag (114, 214) authorized includes at least one of the group consisting of disabling at least one NFC tag unauthorized (204), reprogram the memory content of unauthorized NFC tags (204) and obstructing the communication channel of said unauthorized tags (204). [0008] 8. Security system for the detection of unauthorized NFC tags, which comprises: an NFC radio detection system that is equipped with an NFC controller (322) with scanning or interrogation capabilities; a structure (102) to house the NFC radio detection system and at least one authorized NFC tag (114) characterized by the fact that a display (100) containing at least one authorized NFC tag (114) in which the at least one authorized NFC tag (114) is affixed to the display (100); at least one unauthorized NFC tag (204) that emits an RF signal applied to or near the display or structure (102); with the controller interrogating an area including the display (100) and frame (102) to detect whether at least one unauthorized NFC tag (104) is present; and an alarm to signal the presence of at least one unauthorized tag (104) based on the results of interrogating the area, in which at least one unauthorized tag (114) has prior knowledge of the surface conditions of the display (100 ) and has the properties of an RFID device authorized to operate on the surface, and unauthorized tags (104) free of prior knowledge are free to provide their intended communication capabilities. [0009] 9. Security system, according to claim 8, characterized by the fact that the area extends beyond the peripheral limit of the display (100). [0010] 10. Security system, according to claim 8, characterized by the fact that the area corresponds to the size of the display (100). [0011] 11. Security system, according to claim 8, characterized by the fact that the system also includes an antenna that follows the external perimeter of the display (100). [0012] 12. Security system, according to claim 11, characterized by the fact that the antenna is an induction coil antenna. [0013] 13. Security system, according to claim 8, characterized by the fact that it also comprises magnetic probes positioned on the display (100). [0014] 14. System, according to claim 8, characterized by the fact that it also includes a visual indicator associated with the authorized NFC tag (114). [0015] 15. The system according to claim 8, characterized by the fact that it also includes a low power receiver for detecting the presence of NFC reading devices. [0016] 16. System according to claim 8, characterized in that the at least one authorized NFC tag (114) includes a feature that causes the unauthorized NFC tag (104) to be strongly tuned. [0017] 17. System according to claim 9, characterized by the fact that the resource is at least a group of elements that include a relatively high dielectric constant, a substrate of relatively high magnetic permeability and areas of conductive material beyond that necessary to form the antenna.
类似技术:
公开号 | 公开日 | 专利标题 BR112014017152B1|2021-01-12|method and system for nfc security ES2698060T3|2019-01-30|NFC security system and method to disable unauthorized tags KR101782437B1|2017-09-28|Eas alarming tag with rfid features EP2543025B1|2018-05-30|Method and system for reducing effect of interference in integrated metal detection/electronic article surveillance systems WO2006116664A1|2006-11-02|Tamper monitoring system and method CN106940535B|2021-10-22|Apparatus and method for controlling operation thereof US20120286929A1|2012-11-15|Authenticated security system US20060203838A1|2006-09-14|EAS tag polling system US20080186184A1|2008-08-07|Networked security tags for portable devices KR20110055566A|2011-05-25|Electronic article surveillance deactivator with multiple label detection and method thereof CN205608942U|2016-09-28|Self -checking function's security label and commodity anti -theft device US8917179B2|2014-12-23|System and method for detecting presence of an object GB2387744A|2003-10-22|Transponder alarm system JP2010218280A|2010-09-30|Information processing apparatus and program CA2302075A1|2000-11-07|Intelligent antitheft method and system combining magnetic tags and smart cards WO2014169393A1|2014-10-23|Security switch for an rfid token JP2010186387A|2010-08-26|Data management system, data management method, reader, and rfid tag JP2011175348A|2011-09-08|Radio tag security system KR20140065959A|2014-05-30|Apparatus and method for book management JP2006127442A|2006-05-18|Theft-preventing mechanism using correlation among non-contact tags and plurality of antennas or gates JP5971278B2|2016-08-17|Self-sounding product theft prevention system with wireless communication function JP2005209063A|2005-08-04|Radio crime prevention device, radio crime prevention system, and program Sastry et al.0|Tamper Proofing of the Tags through Pressure Sensing
同族专利:
公开号 | 公开日 US11126803B2|2021-09-21| EP2786304A1|2014-10-08| US10540527B2|2020-01-21| US20160283759A1|2016-09-29| CN104704508B|2017-12-15| EP2786304B1|2017-06-07| EP3214572B1|2020-01-29| WO2014062224A1|2014-04-24| BR112014017152A2|2017-06-13| BR112014017152A8|2017-07-04| EP3214572A1|2017-09-06| CN104704508A|2015-06-10| US20200151402A1|2020-05-14|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US1331136A|1918-11-01|1920-02-17|Guy L Woodjard|Spring-oiler| US5641219A|1990-06-22|1997-06-24|Mizobe; Tatsuji|Uniform illumination light emitting device| US5083111A|1990-11-26|1992-01-21|Sensormatic Electronics Corporation|Jamming apparatus for electronic article surveillance systems| DE69427458T2|1993-12-28|2002-04-11|Eastman Kodak Co|Photo frames with depth images| US5485291A|1994-02-22|1996-01-16|Precision Lamp, Inc.|Uniformly thin, high efficiency large area lighting panel with two facet grooves that are spaced apart and have light source facing facets with smaller slopes than the facets facing away from the light source| US5648613A|1994-04-05|1997-07-15|Gas Research Institute|Scan assembly and method for signal discrimination| EP0677887A1|1994-04-13|1995-10-18|Texas Instruments Incorporated|Built-in chip transponder with antenna circuit| US6246778B1|1994-04-14|2001-06-12|Lewis J. Moore|Product distribution verification system using encoded marks indicative of product and destination| JP2742880B2|1994-08-12|1998-04-22|大日本印刷株式会社|Surface light source, display device using the same, and light diffusion sheet used for them| US5609059A|1994-12-19|1997-03-11|The Regents Of The University Of California|Electronic multi-purpose material level sensor| US5648643A|1995-06-16|1997-07-15|Knowles; Terence J.|Acoustic wave touch panel with inlayed, etched arrays and method of making the panel| CZ106396A3|1995-07-19|1999-02-17|Wolfgang Koczi|Optical signalling apparatus and piece of clothing provided therewith| US6650761B1|1999-05-19|2003-11-18|Digimarc Corporation|Watermarked business cards and methods| US5947578A|1995-10-24|1999-09-07|Nu-Tech & Engineering, Inc.|Back lighting device| US5945938A|1996-11-14|1999-08-31|National University Of Singapore|RF identification transponder| US5867017A|1997-04-21|1999-02-02|Motorola Inc.|Energy control system with remote switching| US5841350A|1997-06-27|1998-11-24|Checkpoint Systems, Inc.|Electronic security tag useful in electronic article indentification and surveillance system| US6644771B1|1997-07-12|2003-11-11|Silverbrook Research Pty Ltd|Printing cartridge with radio frequency identification| US20040052076A1|1997-08-26|2004-03-18|Mueller George G.|Controlled lighting methods and apparatus| US7064498B2|1997-08-26|2006-06-20|Color Kinetics Incorporated|Light-emitting diode based products| US6965205B2|1997-08-26|2005-11-15|Color Kinetics Incorporated|Light emitting diode based products| US6142375A|1998-04-10|2000-11-07|3M Innovative Properties Company|Apparatus and method for the optical detection of multiple items on a platform| US7289109B2|2000-09-26|2007-10-30|Denny Jaeger|Method and apparatus for detecting actuation of a controller device on a touch screen| FR2783960B1|1998-09-30|2001-08-10|Synergie Ingenierie Ind Sa|OPENING DISPLAY PANEL| US6072383A|1998-11-04|2000-06-06|Checkpoint Systems, Inc.|RFID tag having parallel resonant circuit for magnetically decoupling tag from its environment| US20030115096A1|2001-12-17|2003-06-19|Reynolds Randy B.|Computer-controlled, remotely programmed at-shelf advertising system| US7088333B1|1999-03-12|2006-08-08|Matsushita Electric Industrial Co., Ltd.|Surface lighting device and portable terminal using the same| GB9911878D0|1999-05-22|1999-07-21|Marconi Electronic Syst Ltd|Identification tag| US6714121B1|1999-08-09|2004-03-30|Micron Technology, Inc.|RFID material tracking method and apparatus| US6144264A|1999-08-23|2000-11-07|Raytheon Company|High Q-factor oscillator circuit| US6771256B1|1999-10-14|2004-08-03|Igraphics, Llc|Remotely programmable control device for use in electroluminescent display and lighting applications| US6838989B1|1999-12-22|2005-01-04|Intermec Ip Corp.|RFID transponder having active backscatter amplifier for re-transmitting a received signal| US6595671B2|2000-05-10|2003-07-22|Maxime Lefebvre|Rugged, waterproof LED array lighting system| US7828545B2|2001-10-19|2010-11-09|Leonard Arnold Duffy|Apparatus and method for producing structures with multiple undercut stems| AU1176902A|2000-10-20|2002-05-06|Promega Corp|Radio frequency identification method and system of distributing products| WO2002041276A2|2000-11-15|2002-05-23|Snowy Village, Inc.|Led warning light and communication system| US20020191603A1|2000-11-22|2002-12-19|Yeshik Shin|Method and system for dynamic segmentation of communications packets| JP4686024B2|2000-11-28|2011-05-18|大日本印刷株式会社|Poster with RF-ID tag| WO2002077953A1|2001-03-21|2002-10-03|Lumimove, Inc.|Illuminated display system| JP2005509181A|2001-04-30|2005-04-07|ザウォルトディズニーカンパニー|Position-sensitive display device, system, and method for providing animation sequences| US6507279B2|2001-06-06|2003-01-14|Sensormatic Electronics Corporation|Complete integrated self-checkout system and method| US6669092B2|2001-08-09|2003-12-30|Sensoryscapes, Inc.|Display apparatus| US6985163B2|2001-08-14|2006-01-10|Sarnoff Corporation|Color display device| MXPA04006667A|2002-01-09|2005-05-27|Meadwestvaco Corp|Intelligent station using multiple rf antennae and inventory control system and method incorporating same.| US6786626B2|2002-05-09|2004-09-07|Pixon Technologies Corp.|Linear light source device for image reading| FR2840472A1|2002-06-04|2003-12-05|St Microelectronics Sa|ANTICOLLISION PROCESS FOR CONTACTLESS ELECTRONIC MODULE| US6851999B2|2002-10-04|2005-02-08|Peter Sui Lun Fong|Interactive LED device| EP1863203A1|2002-10-24|2007-12-05|Nakagawa Laboratories, Inc.|Illumination light communication device| US7490054B2|2002-11-21|2009-02-10|Kimberly-Clark Worldwide, Inc.|RFID system and method for vending machine control| US20040220860A1|2002-12-20|2004-11-04|Michael Persky|Self-checkout system having integrated RFID reader| US7012544B2|2003-04-09|2006-03-14|Cube Investments Limited|Address and/or alarm indicator sign| DE10323691A1|2003-05-22|2004-12-23|Wincor Nixdorf International Gmbh|Self-service checkout| US6926202B2|2003-07-22|2005-08-09|International Business Machines Corporation|System and method of deterring theft of consumers using portable personal shopping solutions in a retail environment| WO2005022443A2|2003-08-29|2005-03-10|Mikoh Corporation|A radio frequency identification tag with tamper detection capability| AU2004275373A1|2003-09-17|2005-03-31|Segan Industries, Inc.|Flash imaging devices, methods for making and using the same| US6839035B1|2003-10-07|2005-01-04|A.C.C. Systems|Magnetically coupled antenna range extender| US7109986B2|2003-11-19|2006-09-19|Eastman Kodak Company|Illumination apparatus| US7202838B2|2003-11-19|2007-04-10|Eastman Kodak Company|Viewing device| US7065910B2|2003-11-20|2006-06-27|Woodruff Michael A|Illuminated display device| CN1886750A|2003-11-27|2006-12-27|皇家飞利浦电子股份有限公司|Jammer for tags and smart cards| US20060293956A1|2003-12-09|2006-12-28|Walker Jay S|Systems and methods for e-mail marketing via vending machines| US20060287964A1|2003-12-17|2006-12-21|Brown Kerry D|Contact/contactless and magnetic-stripe data collaboration in a payment card| US20070013479A1|2004-12-20|2007-01-18|Anurag Goel|Display designs and auxiliary promotional mechanisms for electronic labels| US7421245B2|2004-02-20|2008-09-02|3M Innovative Properties Company|Field-shaping shielding for radio frequency identification system| US7417599B2|2004-02-20|2008-08-26|3M Innovative Properties Company|Multi-loop antenna for radio frequency identification communication| WO2005081088A1|2004-02-25|2005-09-01|Accenture Global Services Gmbh|Rfid protected media system and method| US7375650B2|2004-02-27|2008-05-20|Teddy Yeung Man Lo|LED traffic light| US7876101B2|2004-03-08|2011-01-25|New York University|Active radio frequency coil providing negative resistance for high field magnetic resonance imaging| US7258467B2|2004-03-12|2007-08-21|Honeywell International, Inc.|Low profile direct/indirect luminaires| GB2412153A|2004-03-20|2005-09-21|Hewlett Packard Development Co|Digital pen with a memory tag reader/writer| US8474700B1|2005-12-20|2013-07-02|Diebold Self-Service Systems Division Of Diebold, Incorporated|Banking machine controlled responsive to data read from data bearing records| US7132946B2|2004-04-08|2006-11-07|3M Innovative Properties Company|Variable frequency radio frequency identification tags| US7167106B2|2004-04-15|2007-01-23|3M Innovative Properties Company|Methods and systems utilizing a programmable sign display located in proximity to a traffic light| US7098794B2|2004-04-30|2006-08-29|Kimberly-Clark Worldwide, Inc.|Deactivating a data tag for user privacy or tamper-evident packaging| JP4852887B2|2004-05-28|2012-01-11|凸版印刷株式会社|Bulletin board| US7168813B2|2004-06-17|2007-01-30|Microsoft Corporation|Mediacube| JP4659404B2|2004-07-21|2011-03-30|株式会社日立製作所|Information providing system and method| JP2006030882A|2004-07-21|2006-02-02|Hitachi Ltd|Information display operation terminal| US7920050B2|2004-07-29|2011-04-05|Emc Corporation|Proxy device for enhanced privacy in an RFID system| GB0416922D0|2004-07-29|2004-09-01|Innovision Res & Tech Plc|Multi-tag emulator| MX2007001266A|2004-08-04|2007-09-25|Koninkl Philips Electronics Nv|Passenger transportation system and method for obtaining tickets in such a system.| US7273300B2|2004-08-06|2007-09-25|Lumination Llc|Curvilinear LED light source| US20060028822A1|2004-08-09|2006-02-09|Tanamachi Steven W|Medical image viewing apparatus and method| JP4653440B2|2004-08-13|2011-03-16|富士通株式会社|RFID tag and manufacturing method thereof| US7319396B2|2004-08-16|2008-01-15|Abr, Llc|RFID transducer alignment system| JP2006058435A|2004-08-18|2006-03-02|Dainippon Printing Co Ltd|Advertisement display| US7158033B2|2004-09-01|2007-01-02|Avery Dennison Corporation|RFID device with combined reactive coupler| US7086769B1|2004-09-09|2006-08-08|Identity Group, Inc.|LED signage device| US20060080819A1|2004-09-14|2006-04-20|Mcallister Clarke W|Systems and methods for deployment and recycling of RFID tags, wireless sensors, and the containers attached thereto| US7940302B2|2004-09-15|2011-05-10|The Regents Of The University Of California|Apparatus and method for privacy protection of data collection in pervasive environments| US7126481B2|2004-09-27|2006-10-24|Nokia Corporation|Methods, systems, devices and computer program products for providing dynamic product information in short-range communication| WO2006055873A2|2004-11-17|2006-05-26|Fusion Optix, Inc.|Enhanced electroluminescent sign| US8049594B1|2004-11-30|2011-11-01|Xatra Fund Mx, Llc|Enhanced RFID instrument security| US7170415B2|2004-12-01|2007-01-30|Avery Dennison Corporation|RFID tags with modifiable operating parameters| US7086587B2|2004-12-16|2006-08-08|International Business Machines Corporation|Anti-tracking system to ensure consumer privacy| US7515149B2|2004-12-17|2009-04-07|Eastman Kodak Company|Display with wirelessly controlled illumination| IL166064D0|2004-12-30|2006-01-15|03 Magma 03 2004 Lts|Exhibiting device for advertisements| JP5100966B2|2005-01-17|2012-12-19|ソニーモバイルコミュニケーションズ株式会社|Non-contact short-range wireless communication device, mobile phone terminal| EP1684238A1|2005-01-21|2006-07-26|Swisscom Mobile AG|Identification method and system and device therefor| US20070215685A1|2005-02-03|2007-09-20|Yottamark, Inc.|System and Method of Product Identification Using a URL| ES2662254T3|2005-03-07|2018-04-05|Nokia Technologies Oy|Method and mobile terminal device that includes smart card module and near field communications media| US7477152B2|2005-03-14|2009-01-13|Avery Dennison Corporation|RFID application test systems and methods| US7665661B2|2005-03-28|2010-02-23|R828 Llc|Secure system for tracking elements using tags| US7378973B2|2005-03-29|2008-05-27|Emerson & Cuming Microwave Products, Inc.|RFID tags having improved read range| EP1864266A2|2005-03-29|2007-12-12|Symbol Technologies, Inc.|Smart radio frequency identification items| EP1710764A1|2005-04-07|2006-10-11|Sap Ag|Authentication of products using identification tags| NZ562245A|2005-04-07|2011-01-28|Freedom Shopping Inc|Self checkout kiosk and retail security system| GB0507285D0|2005-04-11|2005-05-18|Innovision Res & Tech Plc|Nfc enabled high-speed data| US7479882B2|2005-04-14|2009-01-20|Flexilis, Inc.|RFID security system and methods| AT467307T|2005-04-19|2010-05-15|Nokia Corp|METHOD, DEVICE AND SYSTEM FOR CONTROLLING THE START OF APPLICATION IN A MOBILE DEVICE| US20080204481A1|2005-04-20|2008-08-28|Freescale Semiconductor, Inc.|Device and Method for Controlling a Backlit Display| US20070057791A1|2005-04-25|2007-03-15|International Business Machines Corporation|Detecting a blocker RFID tag| US20070194879A1|2005-05-02|2007-08-23|International Business Machines Corporation|Method and device for detecting an invalid RFID tag and method for manufacturing an RFID tag| US7741965B2|2005-05-19|2010-06-22|Chung Nam Electronics Co., Ltd.|Radio frequency identification system| WO2006123316A2|2005-05-20|2006-11-23|Nxp B.V.|Method of securely reading data from a transponder| EP1889216A4|2005-05-27|2009-07-22|Gaba Holdings Int Inc|Consumer-centric rfid point of sale transaction system and method| US20060273176A1|2005-06-03|2006-12-07|Actividentity, Inc.|Blocking contactless personal security device| WO2006134428A1|2005-06-14|2006-12-21|Nokia Corporation|Tag multiplication| JP4709587B2|2005-06-15|2011-06-22|大日本印刷株式会社|Information provision device| US7657255B2|2005-06-23|2010-02-02|Microsoft Corporation|Provisioning of wireless connectivity for devices using NFC| US7482925B2|2005-06-24|2009-01-27|Visa U.S.A.|Apparatus and method to electromagnetically shield portable consumer devices| JP2007034362A|2005-07-22|2007-02-08|Dnp Card Service:Kk|Digital content selling system| WO2007012110A1|2005-07-25|2007-02-01|Silverbrook Research Pty Ltd|Product item having coded data identifying a layout| JP4687310B2|2005-07-29|2011-05-25|ソニー株式会社|Remote operation system, remote communication device, remote operation method| US20070029939A1|2005-08-05|2007-02-08|Philip Burkum|Electroluminescent sign having a coded information region| WO2007022282A2|2005-08-16|2007-02-22|Anaconda Sports, Inc.|Bat with an identification device| US8018345B2|2005-09-08|2011-09-13|Sri International|RFID tags having ferromagnetic patches| US20070056871A1|2005-09-09|2007-03-15|Medrad, Inc.|Devices, methods and applications for intelligent medical packaging| US7868778B2|2005-09-20|2011-01-11|David Norris Kenwright|Apparatus and method for proximity-responsive display materials| US20070064409A1|2005-09-21|2007-03-22|Ilight Technologies, Inc.|Elongated illumination device having uniform light intensity distribution| US20160344581A9|2005-09-21|2016-11-24|Amit Karmarkar|Text message including a contextual attribute of a mobile device| JP4764131B2|2005-10-19|2011-08-31|パナソニック株式会社|Multiple drawing device| US8102243B2|2005-10-31|2012-01-24|Curio Ltd.|RFID protection device, and related methods| CN101305242B|2005-11-11|2013-04-03|皇家飞利浦电子股份有限公司|A luminaire comprising LEDs| JP5312729B2|2005-11-29|2013-10-09|三星ディスプレイ株式會社|Display system| WO2007064069A1|2005-12-02|2007-06-07|Hunatech Co., Ltd.|A sign apparatus equipped with an easily replaceable and non-flat type sign unit and a differential light emission type backlight unit therefor| US20070135112A1|2005-12-13|2007-06-14|Lessing Simon R|Method for configuring the functionality of a mobile multimedia or communication device| GB0700671D0|2006-12-15|2007-02-21|Innovision Res & Tech Plc|Nfc communicator and method of data communication| US9524405B2|2005-12-21|2016-12-20|Koninklijke Philips N.V.|Collaborating RFID devices| US20070145152A1|2005-12-28|2007-06-28|Fabrice Jogand-Coulomb|Nested memory system with near field communications capability| US20080022160A1|2005-12-30|2008-01-24|Skyetek, Inc.|Malware scanner for rfid tags| WO2007081953A2|2006-01-11|2007-07-19|Appleton Coated, Llc|Reusable poster holder and methods for display| US20070188483A1|2006-01-30|2007-08-16|The Samson Group, Llc|Display apparatus for outdoor signs and related system of displays and methods of use| DE102006025000A1|2006-03-03|2007-09-06|Hamedani, Soheil|Precious metal object with RFID identifier| US7600906B2|2006-03-20|2009-10-13|Avago Technologies General Ip Pte. Ltd.|Illumination structure comprising a flexible light guide coupled with a light source| US8203445B2|2006-03-28|2012-06-19|Wireless Environment, Llc|Wireless lighting| US7658334B2|2006-04-05|2010-02-09|Smartfreeze S.R.L.|System for the real time inventory and localization of refrigerating containers and related method| US7832637B2|2006-07-05|2010-11-16|Martin Khang Nguyen|Managing retail transactions| US20080255960A1|2006-07-05|2008-10-16|Martin Khang Nguyen|Managing retail transactions| US7495576B2|2006-07-29|2009-02-24|Donald D Maskeny|Modular electronic sign and method of assigning a unique identifier to common modules of said sign| US8102797B2|2006-08-17|2012-01-24|Microsoft Corporation|Web format-based wireless communications| FR2905782B1|2006-09-11|2008-12-05|Inside Contactless Sa|METHOD FOR CONNECTING A NON-CONTACT INTEGRATED CIRCUIT TO AN NFC COMPONENT| CN101536008B|2006-09-20|2012-11-21|诺基亚公司|Near field connection establishment| US20080079582A1|2006-09-28|2008-04-03|Sensormatic Electronics Corporation|Electronic article surveillance enabled radio frequency identification system and method| US7962369B2|2006-09-29|2011-06-14|Einar Rosenberg|Apparatus and method using near field communications| US8626661B2|2006-10-10|2014-01-07|Global Standard Financial, Inc.|Electronic lockbox using digitally originated checks| US7750792B2|2006-10-11|2010-07-06|Kovio, Inc.|Multi-mode tags and methods of making and using the same| US20100265041A1|2009-04-16|2010-10-21|Powerid Ltd.|Rfid transponder| EP1914631A1|2006-10-20|2008-04-23|NTT DoCoMo, Inc.|Method and apparatus for interacting with a web service| US20080101400A1|2006-10-30|2008-05-01|Nokia Corporation|Managing attachment of a wireless terminal to local area networks| US7868761B2|2006-10-31|2011-01-11|Neocatena Networks Inc.|RFID security system and method| US20080113658A1|2006-11-13|2008-05-15|Sony Ericsson Mobile Communications Ab|Portable communication device and method for creating wishlist| FI123796B|2006-11-15|2013-10-31|Medixine Oy|Procedures and systems for communication using codes in connection with images| US7893814B2|2006-11-16|2011-02-22|Motorola Solutions, Inc.|Method and apparatus for tracking items on a conveyer using capacitive RFID| US7756467B2|2006-12-01|2010-07-13|Sony Ericsson Mobile Communications Ab|Multimedia distribution using a near field communication capable wireless communication device| DE102006057645A1|2006-12-05|2008-06-26|Deutsche Post Ag|Sensor transponder unit and method of operation| US9697556B2|2007-09-06|2017-07-04|Mohammad A. Mazed|System and method of machine learning based user applications| US7961097B2|2006-12-07|2011-06-14|Psion Teklogix, Inc.|RFID based monitoring system and method| US20080136647A1|2006-12-11|2008-06-12|Symbol Technologies, Inc.|Personal rfid detector| US7979026B2|2006-12-19|2011-07-12|Broadcom Corporation|System and method for using a single antenna for active and passive radio functions| US8026818B2|2006-12-20|2011-09-27|Checkpoint Systems, Inc.|EAS and UHF combination tag| US8117445B2|2006-12-20|2012-02-14|Spansion Llc|Near field communication, security and non-volatile memory integrated sub-system for embedded portable applications| US20080162154A1|2006-12-28|2008-07-03|Fein Gene S|System and Method for Vehicle Advertising Network| AU2008204838B2|2007-01-09|2012-11-01|Visa U.S.A. Inc.|Mobile phone payment process including threshold indicator| GB0700968D0|2007-01-18|2007-02-28|Glue4 Technologles Ltd|Communication system| FR2911981A1|2007-01-31|2008-08-01|Bouygues Telecom Sa|Discount coupon management method for mobile terminal user, involves transmitting editing information corresponding to processing of response by interactive terminal, where response is received at request transmitted by local server| US8638228B2|2007-02-02|2014-01-28|Hartford Fire Insurance Company|Systems and methods for sensor-enhanced recovery evaluation| US8203431B2|2007-02-14|2012-06-19|Nxp B.V.|Method of processing data, electronic device and transponder| US8687536B2|2007-02-23|2014-04-01|Qualcomm Incorporated|Method and apparatus to create multicast groups based on proximity| US7737858B2|2007-03-21|2010-06-15|Logitag Systems Ltd.|System, method and kit for managing inventory| US8229458B2|2007-04-08|2012-07-24|Enhanced Geographic Llc|Systems and methods to determine the name of a location visited by a user of a wireless device| WO2008131243A1|2007-04-18|2008-10-30|3M Innovative Properties Company|Radio frequency identification functionality coupled to electrically conductive signage| US20080262928A1|2007-04-18|2008-10-23|Oliver Michaelis|Method and apparatus for distribution and personalization of e-coupons| KR100882801B1|2007-04-25|2009-02-09|박휴완|Light guide plate lighting apparatus| WO2008132269A1|2007-04-26|2008-11-06|Nokia Corporation|Short range communication| CN101295034A|2007-04-26|2008-10-29|鸿富锦精密工业(深圳)有限公司|Back light module and optical plate| CN101295042B|2007-04-27|2011-12-14|鸿富锦精密工业(深圳)有限公司|Back light module and optical plate| CN101295041B|2007-04-27|2011-12-21|鸿富锦精密工业(深圳)有限公司|Back light module and optical plate| US7752790B1|2007-05-03|2010-07-13|Michael Daryl A|Display device| US7827712B2|2007-05-11|2010-11-09|Hines Stephen P|Lighted signage using reflected light behind the signage| GB2449510A|2007-05-24|2008-11-26|Asim Bucuk|A method and system for the creation, management and authentication of links between people, entities, objects and devices| US7817045B2|2007-05-30|2010-10-19|Onderko John C|Handling system for exception RFID labels| US20080300985A1|2007-05-31|2008-12-04|University Of Georgia Research Foundation, Inc.|System and Method for Providing Media Content to Physically Proximate Mobile Devices| CN101334554B|2007-06-28|2011-07-27|鸿富锦精密工业(深圳)有限公司|Backlight module group and its optical plate| CN101339327B|2007-07-04|2011-09-28|鸿富锦精密工业(深圳)有限公司|Backlight module group and its optical plate| FR2918826B1|2007-07-09|2009-10-02|Excem Soc Par Actions Simplifi|PSEUDO-DIFFERENTIAL INTERFACE DEVICE WITH SWITCHING CIRCUIT| US8326991B2|2007-08-21|2012-12-04|International Business Machines Corporation|Maintaining RFID information for virtual machines| WO2009028205A1|2007-08-30|2009-03-05|Zybox Technologies Co., Ltd.|Electronic advertizing display and information renewal method of electronic advertizing display| EP2193652A4|2007-09-26|2014-03-05|Radeum Inc Dba Freelinc|System and method for near field communications having local security| US8289163B2|2007-09-27|2012-10-16|3M Innovative Properties Company|Signal line structure for a radio-frequency identification system| US8249935B1|2007-09-27|2012-08-21|Sprint Communications Company L.P.|Method and system for blocking confidential information at a point-of-sale reader from eavesdropping| US8434909B2|2007-10-09|2013-05-07|Flex Lighting Ii, Llc|Light emitting display with light mixing within a film| US20090102748A1|2007-10-22|2009-04-23|Skyline Products, Inc.|Electronic display system| FR2923051B1|2007-10-30|2010-01-01|Oberthur Card Syst Sa|AUTHENTICATION OF AN ELECTRONIC LABEL WHEN ACCESSING A SERVICE, METHODS AND SYSTEM THEREFOR.| US8734245B2|2007-11-02|2014-05-27|Bally Gaming, Inc.|Game related systems, methods, and articles that combine virtual and physical elements| US7982611B1|2007-11-19|2011-07-19|Impinj, Inc.|Dealing with rogue RFID readers using reader attributes| EP2575611B1|2010-05-28|2021-03-03|C. R. Bard, Inc.|Apparatus for use with needle insertion guidance system| US8542114B2|2007-11-29|2013-09-24|Stolar, Inc.|Cap-lamp and communications support system| US8352323B2|2007-11-30|2013-01-08|Blaze Mobile, Inc.|Conducting an online payment transaction using an NFC enabled mobile communication device| US20120029990A1|2007-12-13|2012-02-02|Blaze Mobile|Social Media Marketing Based on Transactions Using a Mobile Device and Associated Secure Element| US9108434B2|2007-12-18|2015-08-18|Zih Corp.|RFID near-field antenna and associated systems| US9002263B2|2007-12-20|2015-04-07|Koninklijke Philips N.V.|Switching between multiple coupling modes| US7712918B2|2007-12-21|2010-05-11|Altair Engineering , Inc.|Light distribution using a light emitting diode assembly| CN101469844B|2007-12-27|2011-11-09|富士迈半导体精密工业(上海)有限公司|Illuminating apparatus| CN103561198B|2007-12-28|2017-05-31|松下电器(美国)知识产权公司|Electronic equipment| EP2077518B1|2008-01-03|2013-10-02|Nxp B.V.|Transponder detection by resonance frequency reduction| US20090192912A1|2008-01-30|2009-07-30|Kent Griffin|Charge-for-service near field communication transactions| US7843347B2|2008-01-30|2010-11-30|Intermac Ip Corp.|Near-field and far-field antenna-assembly and devices having same| US20090197551A1|2008-02-05|2009-08-06|Paper Radio Llc|Billboard Receiver and Localized Broadcast System| WO2009108736A1|2008-02-26|2009-09-03|Avery Dennison Corporation|Rfid tag for direct and indirect food contact| US20090221240A1|2008-02-29|2009-09-03|Nokia Corporation|Low power device activated by an external near-field reader| US8532624B2|2008-04-09|2013-09-10|Ven Chava|System and method for storing and retrieving multimedia messages on low-cost tags in order to facilitate contextual communications| WO2009126836A1|2008-04-09|2009-10-15|Ventures, Khosla|Light-emitting devices and related methods| WO2009130796A1|2008-04-22|2009-10-29|Telefonaktiebolaget Lm Ericsson |Bootstrap of nfc application using gba| US7898482B2|2008-04-24|2011-03-01|Sirit Technologies Inc.|Conducting radio frequency signals using multiple layers| GB2460234B|2008-05-20|2012-11-28|Univ Kent Canterbury|RFID tag| EP2311233A1|2008-05-21|2011-04-20|Uniloc Usa, Inc.|Device and method for secured communication| US8002435B2|2008-06-13|2011-08-23|Philips Electronics Ltd Philips Electronique Ltee|Orientable lens for an LED fixture| US8242893B1|2008-07-01|2012-08-14|Kemflo International Co., Ltd.|Filter assembly with RFID| US8292480B2|2008-07-10|2012-10-23|Koito Manufacturing Co., Ltd.|Lamp including main reflector, sub-reflector and LED assembly| US8342407B2|2008-07-21|2013-01-01|Gilbarco, Inc.|System and method for pairing a bluetooth device with a point-of-sale terminal| US8740073B2|2008-08-01|2014-06-03|Mastercard International Incorporated|Methods, systems and computer readable media for storing and redeeming electronic certificates using a wireless smart card| WO2010017523A1|2008-08-08|2010-02-11|Xicato, Inc.|Color tunable light source| WO2010022317A2|2008-08-21|2010-02-25|Night Moves, Llc|Flexible backlit display| US9087281B2|2009-06-12|2015-07-21|Impinj, Inc.|Dual-frequency RFID tag with isolated inputs| US20100217709A1|2008-09-22|2010-08-26|Christian Aabye|Apparatus and method for preventing unauthorized access to payment application installed in contactless payment device| US20120256494A1|2008-09-27|2012-10-11|Kesler Morris P|Tunable wireless energy transfer for medical applications| KR20100036089A|2008-09-29|2010-04-07|삼성전자주식회사|Radio frequency identification display pixel, display panel and display apparatus using the rfid display pixel| US20100082485A1|2008-09-30|2010-04-01|Apple Inc.|Portable point of purchase devices and methods| US9026462B2|2008-09-30|2015-05-05|Apple Inc.|Portable point of purchase user interfaces| US8375613B2|2008-10-03|2013-02-19|Tracer Imaging Llc|Illuminated signboard with edge effect| TW201025143A|2008-11-19|2010-07-01|3M Innovative Properties Co|RFID tag antenna with capacitively or inductively coupled tuning component| CN102216671B|2008-11-19|2015-09-02|罗姆股份有限公司|Led| CN201302803Y|2008-11-24|2009-09-02|中国移动通信集团广东有限公司|Multimedia poster| KR101561905B1|2008-12-08|2015-10-20|엘지전자 주식회사|Mobile terminal and nfc service providing method thereof| US8174388B2|2008-12-10|2012-05-08|Sensormatic Electronics, LLC|Method and system for deactivation of combination EAS/RFID tags| US8217793B2|2008-12-12|2012-07-10|Symbol Technologies, Inc.|Rogue RFID detector| US20100148965A1|2008-12-16|2010-06-17|Sensormatic Electronics Corporation|Method and system for item level uhf rfid tag with low frequency power assist| US8494908B2|2008-12-18|2013-07-23|Ncr Corporation|Retail checkout system and method| US8126505B2|2008-12-19|2012-02-28|Ncr Corporation|Data verification system for a near field communications enabled display| WO2010077194A1|2008-12-29|2010-07-08|Telefonaktiebolaget L M Ericsson |Method and device for installing applications on nfc-enabled devices| US20100174599A1|2009-01-05|2010-07-08|Apple Inc.|System and method for providing content associated with a product or service| US7922094B2|2009-01-09|2011-04-12|3M Innovative Properties Company|RFID packaging and attachment methods and devices| US8351898B2|2009-01-28|2013-01-08|Headwater Partners I Llc|Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account| IL196771D0|2009-01-28|2009-11-18|Ubox Ltd|Illumination device for paved floor| US8688517B2|2009-02-13|2014-04-01|Cfph, Llc|Method and apparatus for advertising on a mobile gaming device| US9092772B2|2009-02-16|2015-07-28|Xius Corp.|Integrated system and method for enabling mobile commerce transactions using “contactless identity modules in mobile handsets”| EP2399376A1|2009-02-18|2011-12-28|Telefonaktiebolaget L M Ericsson |User authentication| EP2221984A1|2009-02-23|2010-08-25|Motorola, Inc.|Wireless communication device for providing at least one near field communication service| US8131214B2|2009-03-02|2012-03-06|Motorola Mobility, Inc.|Method for selecting content for transfer or synchronization between devices| US10992817B2|2009-03-18|2021-04-27|Mastercard International Incorporated|Methods, systems and computer readable media for selecting and delivering electronic value certificates using a mobile device| GB2465037B|2009-03-20|2012-04-04|Innovision Res & Tech Plc|Near field rf communications apparatus| EP2237519A1|2009-03-31|2010-10-06|France Telecom|Method and system for securely linking digital user's data to an NFC application running on a terminal| KR100911032B1|2009-04-01|2009-08-05|애니쿼터스|The apparatus and method of cellular phone control with nfc chip and rf reader| US20100262449A1|2009-04-09|2010-10-14|Access Mobility, Inc.|Context based mobile marketing| US8172444B2|2009-04-24|2012-05-08|Avago Technologies Ecbu Ip Pte. Ltd.|Light guide display with multiple light guide layers| US20100269383A1|2009-04-27|2010-10-28|Nifenecker Eugene C|Power management system controller| US20100275265A1|2009-04-27|2010-10-28|Michael Stephen Fiske|System for securing transactions across insecure networks| CN102090093B|2009-04-30|2013-04-17|华为技术有限公司|Method and device for establishing security mechanism of air interface link| TW201040433A|2009-05-14|2010-11-16|Young Lighting Technology Corp|Illumination apparatus| US9396603B2|2009-05-22|2016-07-19|Nokia Technologies Oy|Method and apparatus for managing services using reusable bearer tags| US8650614B2|2009-05-29|2014-02-11|Ebay Inc.|Interactive phishing detection | US20100306076A1|2009-05-29|2010-12-02|Ebay Inc.|Trusted Integrity Manager | US9135424B2|2009-05-29|2015-09-15|Paypal, Inc.|Secure identity binding | KR101052115B1|2009-06-10|2011-07-26|엘지이노텍 주식회사|NFC Antenna Using Double Resonance| US8112066B2|2009-06-22|2012-02-07|Mourad Ben Ayed|System for NFC authentication based on BLUETOOTH proximity| CA2766340C|2009-06-25|2018-07-24|Koninklijke Philips Electronics N.V.|Home automation system and method for controlling the same| SI23114A|2009-07-20|2011-01-31|Ids D.O.O.|Procedure for the verification of the authenticity of a rfid label| US8662704B2|2009-08-14|2014-03-04|U.S. Pole Company, Inc.|LED optical system with multiple levels of secondary optics| KR100926165B1|2009-08-18|2009-11-10|애니쿼터스|The apparatus and method of one shot mode with nfc controller| US8275767B2|2009-08-24|2012-09-25|Xerox Corporation|Kiosk-based automatic update of online social networking sites| US20110047759A1|2009-08-25|2011-03-03|Romag Fasteners Inc.|Closures with magnetic and mechanical snap fastening and method of making the same| US8066417B2|2009-08-28|2011-11-29|General Electric Company|Light emitting diode-light guide coupling apparatus| US9008574B2|2009-09-14|2015-04-14|Qualcomm Incorporated|Focused antenna, multi-purpose antenna, and methods related thereto| US8721101B2|2009-09-21|2014-05-13|Koninklijke Philips N.V.|Light emitting device comprising a light guide plate with reflective shielding with glare reduction| EP2790132A3|2009-09-24|2014-10-29|Terrara Code Research Institute, Inc.|RFID tag| US20110084814A1|2009-10-08|2011-04-14|Checkpoint Systems, Inc.|Security tag utilizing rfid reflectivity mode power rationing| EP2494509A4|2009-10-30|2016-06-08|Mastercard International Inc|Methods, systems, and computer readable media for facilitating use of wireless smart devices to purchase goods or services| US9240005B2|2009-11-06|2016-01-19|Mastercard International, Incorporated|Methods for risk management in payment-enabled mobile device| WO2012070251A1|2010-11-25|2012-05-31|パナソニック株式会社|Communication device| US20120154633A1|2009-12-04|2012-06-21|Rodriguez Tony F|Linked Data Methods and Systems| CN102103616A|2009-12-17|2011-06-22|中兴通讯股份有限公司|Method and device for implementing application of NFC mobile terminal reader| EP2337231B1|2009-12-21|2012-10-31|ST-Ericsson SAS|A process for performing near field communication in an integrated circuit or package also including a FM receiver| CN102102829A|2009-12-21|2011-06-22|富准精密工业有限公司|LED lamp| US8619141B2|2009-12-22|2013-12-31|Deere & Company|Portal management| US8686685B2|2009-12-25|2014-04-01|Golba, Llc|Secure apparatus for wirelessly transferring power and communicating with one or more slave devices| WO2011080707A2|2009-12-30|2011-07-07|Meterlive Ltd.|Analyzing audiences at public venues| US8731583B2|2010-01-04|2014-05-20|Alcatel Lucent|Interactive ID system using mobile devices| US8926127B2|2010-01-15|2015-01-06|Edward Lawrence Sinofsky|Lightweight solid state lighting panel| US20110191478A1|2010-01-29|2011-08-04|International Business Organization Name Machines Corporation|Quick access display| US10977965B2|2010-01-29|2021-04-13|Avery Dennison Retail Information Services, Llc|Smart sign box using electronic interactions| WO2011094387A1|2010-01-29|2011-08-04|Avery Dennison Corporation|Rfid/nfc panel and/or array used in smart signage applications and method of using| US8350723B2|2010-01-29|2013-01-08|Guesswhat, Llc|Method and system for improved traffic signage| KR101684753B1|2010-02-09|2016-12-08|인터디지탈 패튼 홀딩스, 인크|Method and apparatus for trusted federated identity| US20110195748A1|2010-02-09|2011-08-11|Jonathan Main|Enhanced security feature for payment-enabled mobile telephone| WO2011109092A2|2010-03-03|2011-09-09|Cree, Inc.|Led lamp with remote phosphor and diffuser configuration| KR20110103157A|2010-03-12|2011-09-20|삼성전자주식회사|Content using method of mobile terminal and content using system| EP2366937B1|2010-03-18|2017-12-06|GLP German Light Products GmbH|Illumination apparatus| US20110227507A1|2010-03-18|2011-09-22|Glp German Light Products Gmbh|Illumination apparatus| WO2011119907A2|2010-03-26|2011-09-29|Altair Engineering, Inc.|Led light tube with dual sided light distribution| US8850196B2|2010-03-29|2014-09-30|Motorola Solutions, Inc.|Methods for authentication using near-field| US8899782B2|2010-03-31|2014-12-02|Koninkljke Philips N.V.|Lighting system and light source unit for such a system| US9189786B2|2010-03-31|2015-11-17|Mastercard International Incorporated|Systems and methods for operating transaction terminals| US9010646B2|2010-04-01|2015-04-21|Coin, Inc.|Optical contact loaded magnetic card| EP2378451B1|2010-04-19|2018-07-04|Vodafone Holding GmbH|User authentication ina tag-based service| US20110320291A1|2010-06-28|2011-12-29|Coon Jonathan C|Systems and methods for asynchronous mobile authorization of credit card purchases| CN201896534U|2010-06-29|2011-07-13|北京聚盾科技发展有限公司|Data cabinet| US20110320345A1|2010-06-29|2011-12-29|Ebay, Inc.|Smart wallet| TWI421777B|2010-06-30|2014-01-01|Mstar Semiconductor Inc|Identification processing apparatus and mobile apparatus thereof| FR2962571B1|2010-07-08|2012-08-17|Inside Contactless|METHOD FOR PERFORMING A SECURE APPLICATION IN AN NFC DEVICE| US8482250B2|2010-08-06|2013-07-09|Cynetic Designs Ltd.|Inductive transmission of power and data through ceramic armor panels| WO2012027748A2|2010-08-27|2012-03-01|Vivotech Inc.|Methods, systems, and computer readable media for detecting customer presence to initiate the ordering and purchase of goods and services| US8068011B1|2010-08-27|2011-11-29|Q Street, LLC|System and method for interactive user-directed interfacing between handheld devices and RFID media| US8469281B2|2010-09-07|2013-06-25|Identive Group, Inc.|RFID label with shielding element| WO2012037255A2|2010-09-14|2012-03-22|Vivotech Inc.|Methods, systems, and computer readable media for secure near field communication of a non-secure memory element payload| TWI446271B|2010-09-14|2014-07-21|Icon Minsky Luo|Near field communication device, authentication system using the same and method thereof| US20120083205A1|2010-10-04|2012-04-05|Qualcomm Incorporated|Nfc device having a differential input envelope detector| US8786189B2|2010-11-18|2014-07-22|Jerrold W. Mayfield|Integrated exit signs and monitoring system| WO2012071062A1|2010-11-23|2012-05-31|Avery Dennison Corporation|Graphic media display device and method for using same| JP2012117424A|2010-11-30|2012-06-21|Jatco Ltd|Vehicle control apparatus| US8655274B2|2010-12-21|2014-02-18|Blackberry Limited|Communications device including radio frequency signal blocking layer for near-field communication device and related methods| US11004056B2|2010-12-30|2021-05-11|Visa International Service Association|Mixed mode transaction protocol| CN109559148A|2011-01-04|2019-04-02|Aq株式会社|Advertising information provides system| EP2487629B1|2011-02-10|2016-11-30|Nxp B.V.|Secure smart poster| US8655286B2|2011-02-25|2014-02-18|Blackberry Limited|Method and apparatus for tuning a communication device| US20120218084A1|2011-02-25|2012-08-30|Nokia Corporation|Method and apparatus for presenting printed media based on radio frequency memory tag detection| US9224157B2|2011-03-03|2015-12-29|Life In Mobile Innovations, Inc.|Method and apparatus for presenting content in response to user inputs using dynamic intelligent profiling| US8630952B2|2011-03-04|2014-01-14|Citibank, N.A.|Methods and systems using contactless card| US20120253974A1|2011-03-30|2012-10-04|Nokia Corporation|Method and apparatus for providing memory tag-based payment methods| US8655575B2|2011-03-31|2014-02-18|International Business Machines Corporation|Real time estimation of vehicle traffic| EP2618424A4|2011-04-05|2014-05-07|Murata Manufacturing Co|Wireless communication device| US8762742B2|2011-05-16|2014-06-24|Broadcom Corporation|Security architecture for using host memory in the design of a secure element| US9123224B2|2011-06-01|2015-09-01|Jobsite Resources, Llc|Mobile perimeter access security system| US8482413B2|2011-09-09|2013-07-09|Coinstar, Inc.|Access monitoring systems for use with consumer-operated kiosks and other enclosures| KR101873738B1|2011-09-14|2018-07-03|엘지전자 주식회사|Mobile terminal and method for transmitting information using the same| US20130074112A1|2011-09-16|2013-03-21|Elwha LLC, a limited liability company of the State of Delaware|Secure electronic media for in-transit passenger usage| US8555363B2|2011-09-16|2013-10-08|Google Inc.|Authenticating a user of a system using near field communication| US8880055B1|2011-10-06|2014-11-04|Marvell International Ltd.|Method and apparatus for using near field communication to performtransactions on a mobile device| US9000892B2|2011-10-31|2015-04-07|Eastman Kodak Company|Detecting RFID tag and inhibiting skimming| US8706036B2|2011-12-21|2014-04-22|Nxp, B.V.|Near field communication data conversion with an event-field| US10318950B2|2011-12-29|2019-06-11|Blackberry Limited|Mobile communications device providing near field communication security features and related methods| US20130278441A1|2012-04-24|2013-10-24|Zetta Research and Development, LLC - ForC Series|Vehicle proxying| US8961306B2|2012-05-08|2015-02-24|Igt|Feedback to player of device connection state| US8923761B2|2012-05-17|2014-12-30|Qualcomm Incorporated|Methods and apparatus for improving NFC RF discovery loop tuning based on device sensor measurements| US20130344805A1|2012-06-25|2013-12-26|Broadcom Corporation|Automatic gain control for an nfc reader demodulator| US8937531B2|2012-06-26|2015-01-20|Eastman Kodak Company|RFID system with multiple tag transmit frequencies| US8933788B2|2012-06-26|2015-01-13|Eastman Kodak Company|RFID system with barriers and key antennas| US8824597B2|2012-09-07|2014-09-02|Texas Instruments Incorporated|Circuits and methods for field-based communication| EP3214572B1|2012-10-18|2020-01-29|Avery Dennison Corporation|System and apparatus for nfc security| US9071926B2|2012-10-22|2015-06-30|Qualcomm Incorporated|Device detection using load modulation in near-field communications| CN110351693A|2012-11-19|2019-10-18|艾利丹尼森公司|Disable unwarranted NFC security system and method| US20140145823A1|2012-11-27|2014-05-29|Assa Abloy Ab|Access control system| US9240827B2|2013-02-12|2016-01-19|Qualcomm Incorporated|Methods and apparatus for improving remote NFC device detection using an oscillator circuit| US9698872B2|2013-06-18|2017-07-04|Qualcomm Incorporated|Methods and apparatus for improving remote NFC device detection using a low power oscillator circuit| CN106796478B|2014-10-02|2020-07-28|夏普株式会社|Control device, display control system, and control method for control device| DE102015111038B4|2015-07-08|2021-05-06|Infineon Technologies Ag|A vertical ferrite antenna with prefabricated connection components| US20180049029A1|2016-08-11|2018-02-15|Qualcomm Incorporated|Intelligent remote touch for touch screen devices| US10616207B2|2017-10-12|2020-04-07|Dell Products, L.P.|Context and device state driven authorization for devices|WO2011094387A1|2010-01-29|2011-08-04|Avery Dennison Corporation|Rfid/nfc panel and/or array used in smart signage applications and method of using| US10977965B2|2010-01-29|2021-04-13|Avery Dennison Retail Information Services, Llc|Smart sign box using electronic interactions| CN104025556B|2011-09-01|2018-08-10|艾利丹尼森公司|Equipment, system and method for consumer's tracking| CN104025129B|2012-09-10|2018-04-03|艾利丹尼森公司|Method for preventing NFC labels unauthorized from shifting| EP3214572B1|2012-10-18|2020-01-29|Avery Dennison Corporation|System and apparatus for nfc security| CN110351693A|2012-11-19|2019-10-18|艾利丹尼森公司|Disable unwarranted NFC security system and method| EP3108403A1|2014-02-21|2016-12-28|Sony Corporation|Detection of unauthorized tags| CN106599943A|2015-10-14|2017-04-26|黄圣杰|Display device having radio frequency identification function, and data processing method thereof| US10499228B2|2016-11-11|2019-12-03|Carnival Corporation|Wireless guest engagement system| US10045184B2|2016-11-11|2018-08-07|Carnival Corporation|Wireless guest engagement system| WO2018125785A1|2016-12-31|2018-07-05|General Electric Company|Real time location platform beacon protocol systems and methods| US10621825B2|2017-04-07|2020-04-14|Japan Cash Machine Co., Ltd.|Device, system, and method for facilitating communications between electronic gaming machines and mobile devices| US10217337B1|2017-08-31|2019-02-26|Sennco Solutions, Inc.|Security device registration| US10592862B1|2018-11-01|2020-03-17|Sennco Solutions, Inc.|Timestamp-based security device registration|
法律状态:
2018-12-04| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]| 2019-12-31| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2020-09-15| B09A| Decision: intention to grant [chapter 9.1 patent gazette]| 2021-01-12| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 14/03/2013, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US201261715426P| true| 2012-10-18|2012-10-18| US61/715,426|2012-10-18| PCT/US2013/031448|WO2014062224A1|2012-10-18|2013-03-14|Method, system and apparatus for nfc security| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|