GB2407189A - Preventing unauthorised access to a contact-less smart card - Google Patents

Preventing unauthorised access to a contact-less smart card Download PDF

Info

Publication number
GB2407189A
GB2407189A GB0323165A GB0323165A GB2407189A GB 2407189 A GB2407189 A GB 2407189A GB 0323165 A GB0323165 A GB 0323165A GB 0323165 A GB0323165 A GB 0323165A GB 2407189 A GB2407189 A GB 2407189A
Authority
GB
United Kingdom
Prior art keywords
smart token
smart
token
card
reader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0323165A
Other versions
GB0323165D0 (en
Inventor
Keith Edward Mayes
Susan Margaret Mayes
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vodafone Group PLC
Original Assignee
CRISP TELECOM Ltd
Vodafone Group PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CRISP TELECOM Ltd, Vodafone Group PLC filed Critical CRISP TELECOM Ltd
Priority to GB0323165A priority Critical patent/GB2407189A/en
Publication of GB0323165D0 publication Critical patent/GB0323165D0/en
Publication of GB2407189A publication Critical patent/GB2407189A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07345Means for preventing undesired reading or writing from or onto record carriers by activating or deactivating at least a part of the circuit on the record carrier, e.g. ON/OFF switches
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/41Jamming having variable characteristics characterized by the control of the jamming activation or deactivation time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/86Jamming or countermeasure characterized by its function related to preventing deceptive jamming or unauthorized interrogation or access, e.g. WLAN access or RFID reading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/20Jamming or countermeasure used for a particular application for contactless carriers, e.g. RFID carriers

Abstract

To ensure that a contact-less smart card is not accessed by an unauthorised entity the card is disabled when not required. The card may be enabled by entry of a pin or scanning of a fingerprint. The card may alternatively be enabled by a photo diode, one or more pressure sensors, a heat or skin resistance sensor or an inertial sensor. Alternatively a jamming device may jam communication with adjacent smart cards or the smart card may be shielded by a metal plate in a wallet or purse.

Description

PREVENTING UNAUTHORISED ACCESS TO A
CONTACT-LESS SMART CARD
Background of the invention
The invention relates to contact-less RF (radio frequency) smart cards. Examples of contact-less smart card technology is described within ISO/IEC 14443 and ISO/IEC 15693 standards. These cards contain an in built inductive antenna that allows the card to exchange information with a card reader when the two are in sufficiently close proximity. The reader emits a RF signal to supply power to the card and communicate with it.
These cards are already extremely widespread in applications such as entry systems for buildings or as electronic tickets for entry to venue, public transport and toll fee collection points. They are also used in tagging systems such as in airport luggage handling where the smart cards can be read from several hundreds metros.
However there is also enormous interest in using contact- less cards as secure national identity cards and entitlement cards.
A hybrid form of contact-less smart cards has also been proposed as SIM (Subscriber Identity Module) in mobile technology and in aiding and facilitating transactions for commerce. The SIM is enhanced in this respect by the addition of an antenna built into the card, the mobile communicator or an accessory piece of equipment.
With the increase in value of the data which these cards hold it is important to protect the cards from unauthorized access.
A suitably placed or adapted reader would be able to exchange information with a card without the owner's permission. Sensitive data on the card could be stolen or changed. Indeed the card may participate in a sensitive or valuable transaction without the knowledge of the owner.
Current systems rely on some existing protection means.
The RF link between the card and reader is meant to be of limited range.
The communication between the card and the reader is encrypted.
Another known but not widely used system is to place a card in a metal enclosure that provides shielding to prevent RF access to the card.
These protection means have limitations.
Relying on range limitation is dangerous as specialist radio equipment may be used to extend the intended range.
Encryption can be effective, but it does not guard against unauthorized communication with a rogue reader (such as a genuine reader that has been stolen or a reader that has broken the encryption algorithm).
Efficient shielding is effective, but it is not user convenient as it requires the user to remember to place the card in the shield, also a user may have several such cards.
This invention is to provide other methods to ensure that a contact-less smart card is not accessed by an unauthorized entity.
Description of the invention
One method of ensuring that the smart card is not being accessed is to have the card disabled when not required.
The following are examples of how the card could be enabled and disabled as required.
Manual switching (requiring direct action by the user) These systems would be most useful when the card is required to be enabled for reasonably long periods of time.
For example when the card is a SIM for mobile terminal.
The card could automatically switch off when the reader is no longer communicating with it. These systems have the added advantage that the card cannot be enabled if it is stolen.
PIN entry - the card has an entry system for entering a PIN to enable the card. Examples of PIN entry system are shown in Figure 1a and 1b. Other systems of PIN entry could be used.
Biometric entry - It would be also possible to enable the card by taking a scan of a finger pant and comparing it to a print stored in the card's memory. If the print is confirmed to be of the authorised user the card is enabled. Such an example is shown in Figure 2. Other forms of biometric include voice recognition.
Automatic switching (requiring no direct action by the user) These system would be most useful when cards are only required for use for short periods of time. Examples are door entry system or in dealing with transactions.
Light sensor - e.g. a photo diode (a sensor that modifies an electric current when exposed to a light source) could act as a switch. The smart card would only be enabled when the card is exposed to light.
Hence when a card is in a wallet or pocket it is disabled.
Pressure sensor - a pressure sensor would act as a switch. The smart card would only be enabled when the user is physically holding the card. Hence when a card is in a wallet or pocket it is disabled. The pressure sensor may be combined with a fingerprint scanner.
The combined sensor could be set up to detect that it is an actual finger that is applying the pressure.
Alternatively the pressure sensor could be combined with an electrical resistance meter and used to detect that it is a human hand holding the card and applying pressure.
Heat sensors - another method of ensuring that the card is in a user's hand include using heat sensors.
Skin resistance sensor- as mentioned above a method of ensuring that the card is in a user's hand include using electrical resistance sensors.
Inertial sensors - an inertial sensor can be used to detect the fact that the user is moving the card around at a sufficient speed to indicate it is to be used. Inertial sensors can be based on micro-accelerators, these are commonly used in motion detectors for example in gaming and virtual reality/remote control systems.
General ambient sensors - the above switching solutions are based on changes in ambient conditions (e.g. light, pressure, heat, movement) from when a card is simply being stored to when a card is required to be active. The invention is not limited to the exemplary sensors described.
Non switching methods - Useful for single or multiple cards or where the card is not in a users possession (such as in tagging systems).
Jamming device - A contact-less card or electronic device that is designed to jam/disrupt the low level communications of all cards within the range of the jamming device. In stead of following an anti-collision protocol commonly used in contact-less smart card technology it attempts to create collisions and other forms of interference. The jamming device would have to be disabled or the cards removed from the proximity of the jamming device when authorised use of the card is required.
Round trip detector- To guard against access from RF fields that have been greatly extended the card has a round trip delay (time taken for a signal to travel from the card to the reader and back to the card) tester. It sends a test signal when the card is being probed and expects a response within a certain round-trip delay otherwise it will shut down or refuse to function.
Other methods.
Shielding methods - A purse or wallet can have a thin metal plate sewn into the fabric, as shown in Figure 6, in order to conveniently shield any cards placed in the walleVpurse A smart card may have any of the above systems implemented in any combination. For example a card may have a manual entry system and automatic entry system for both short and long periods of use. The system may work in parallel, hence the card would be enabled if the light sensor was activated or the PIN was entered. The system may work in series, hence for example the card would be enabled if the light sensor was activated and the PIN was entered.
I:)escription of the diagrams Figure 1a and 1b - PIN entry system Fig 1a shows a smart card (100) with an in-built inductive antenna (200) and a PIN entry system. Due to the size of a smart card (100) the PIN entry system consist of a small display (10) which shows the current number. An 'up' and down' button (11) will allow the user to go through the numbers and an 'enter' button (12) will allow the user to select number.
Fig 1b shows another PIN entry system is to use symbols printed on buttons (13) on the smart card (100) and the user must enter the symbol in the correct order.
Finure 2 -Biometric system Fig 2 shows a smart card (100) with an inbuilt inductive antenna (200) and a biometric system (20) for reading a finger print. The print is ideally compared to a previously taken print stored in the memory (30) of the smart card (100) or may just be judged as having the characteristics of a non- specific fingerprint.
Figure 3 - Light sensor system Fig 3 shows a smart card (100) with an inbuilt inductive antenna (200) and photo diode (40) that enable the card when the diode (40) is exposed to light. The smart card (100) may contain single or multiple photo diodes (40). To prevent accidental activation multiple photo diodes (40) may have to be activated to make the smart card (100) enabled.
Figure 4 - Pressure sensor Fig 4 shows a smart card (100) with an inbuilt inductive antenna (200) and pressure sensor (50) that enables the card when the card is being held. To prevent accidental activation multiple pressure sensors (50) may have to be activated to make the smart card (100) enabled. The card may contain multiple pressure sensor (50) on the same face of the smart card (100) or on the opposite face of the smart card (100). The smart card (100) may require a single hand to operate or two hands to operate.
Figure 5 - Inertial sensor Fig 5 shows a smart card (100) with an inbuilt inductive antenna (200) and an inertial sensor (60) that enables the card when the card is being waved around at a sufficient speed.
Figure 6 - Shielded wallet Fig 6 shows a walleVpurse (1) with metal shielding (2) that prevents RF signals reaching the smart card (100) held in the walleVpurse (l).

Claims (1)

  1. Clarions for Patent Application No CTB0323165.1 Claims for Patent
    Application No GB0323165.1 Date Lodged 03.10.2003 Title PREVENTING UNAUTHORISiED ACCESS TO A CONTACT-LESS SMART
    CARD
    Applicallt(s) Crisp Telecom Limited (01488686396 - 07767891161- keth. mayescnsptele.com) 1. A system consisting of one or more smart tokens plus one or more smart token reader devices where a smart token is able to communicate with a smart token reader without the use of direct electrical contact: and this communication is prevented except when the smart token is used in the intended manner and this prevention does not rely on the electromagnetic shielding of Be smart token.
    2. A system according to claim O whereby communication is prevented by a switching function 3. A system according to claim O whereby communication is prevented by a non-switching function 4. A system according to claun 2 whereby the switching control function requires an input or proper only known and or available to the legitimate smart token owner 5. A system according to claim 2 whereby the switching control function does not check the legitimacy of the mart token user 6. A system according to claim 4 whereby the smart token has means for PIN entry and comparison such that the entry of the PIN enables or disables the communications capability 7. A system according to claun 4 whereby the smart token has means for biometric sensing and comparison such that Be sensmg of Be correct biometric enables or disables the communications capability 8. A system according to claim 7 whereby the biometric sensor is a fingerprint reader.
    9. A system according to claim 5 whereby the smart token has means for sensing visible and or infra red and or ultra violet light such that the presence or absence of this light can be used to enable or disable the smart token communications capability 10. A system according to claim 9 whereby lighting is provided by a system located in the vicinity of the smart token reader system or integral to it.
    11. A system according to claim 9 whereby the card is shielded Trom light when not in authorised use 12. A system according to claim 11 whereby a normal wallet is used to shield the smart token from light when the card is not in authorised use 13. A system according to claim 12 whereby the wallet is substantially as shown in Figure 6.
    14. A system according to claim 12 whereby normal clothing is used to shield the smart token from light when the card is not in authorised use 15. A system according to claim 12 whereby a special purpose opaque sleeve or pocket is used to shield the smart token from light. when the card is not in authorised use 16. A system according to claim whereby the smart token has means for sensing pressure on the smart token such that the presence or absence of this pressure can be used to enable or disable the smart token comm; mcahons capability 17. A system according to claim 16 whereby the pressure is applied by the users hand and or fingers 18. A system according to claim 16 whereby the pressure is applied by the use of the smart token reader.
    19. A system according to claim 5 whereby the smart token has means for sensing heat such that the presence or absence of this heat can be used to enable or disable the smart token communications capability 20. A system aeeordlng to claim 19 whereby heating and or cooling is provided by a system located in the vicmlty of the smart token reader system or integral to it.
    Claims for Patent Application No GB0323 165.1 21. A system according to claim 19 whereby the heating and or cooling is prodded by the users hand and or fingers.
    22. A system according to claim 5 wherever the smart token has means for sensing resistance across an area of the smart token such that the value of this resistance can be used to enable or disable the smart token communications capability 23. A system according to claim whereby the smart token has means for sensing capacitance across an area of the smart token such that the value of this capacitance can be used to enable or disable the smart token communications capability 24. A system according to chim 5 Hereby the smart token has means for sensing inductance across an area of the smart token such that the value of this inductance can be used to enable or disable the smart token communications capability 25. A system according to claim whereby the smart token has means for sensing inertial changes such that the value of this inertial change can be used to enable or disable the smart token communications capability 26. A system according to claun 3 whereby the communication capability of the Retort token is rendered ineffective due to a jamming device.
    27. A system according to claim 26 whereby the jamming device is also a smart token.
    28. A system according to claim 26 whereby the jamming device is a shortrange electronic device that is not a smart token.
    29. A system according to claim 26 whereby the jamming device is a longrange electronic device.
    30. A system according to rem 5 whereby a sub system connected via a snout token reader has means to measure the time taken for the smart token communication protocol and depending on those measurements render the smart token communications capability logically valid or invalid.
    31. A method consisting of one or more smart tokens plus one or more smart token reader devices where a smart token is able to communicate with a smart token reader without the use of direct electrical contact and this communication is prevented except when the smart token is used in the intended manner and this prevention does not rely on the electromagnetic shielding of the smart token.
    32. A method according to claim 31 whereby conununication is prevented by a switching function 33. A method according to claim 31 whereby communication is prevented by a non- switching function 34. A method according to claim 32 whereby the switching control function requires an input or property only known and or available to the legitimate smart token owner 35. A method according to claim 32 whereby the switching control fimction does not check the legitimacy of the smart token user 36. A method according to clam, 34 whereby the smart token has means for PIN entry and comparison such that the entry of the PIN enables or disables the communications capability 37. A method according to claim 34 whereby the smart token has means for biometric sensing and comparison such that the sensing of the correct biometric enables or disables the Communications capability 38. A method according to claim 37 whereby the biometric sensor is a fingerprint reader.
    39. A method according to claim 35 whereby the smart token has means for sensing v isible and or infra red and or ultra violet light such that the presence or absence of this light can be used to enable or disable the smart token communications capability 4Q. A method according to claim 39 whereby lighting is provided by a system located in the vicinity of the smart token reader system or integral to *.
    41. A method according to claim 39 whereby the card is shielded fi om light when not in authorised use t <' Claims for Patent Application No GB0323 165.1 42 A method according to clang 41 whereby a normal wallet is used to shield the smart token from light when the card is not in authorised use 43. A method according to claim 42 whereby the wallet is substantially as shown in Figure 6.
    44. A method according to claim 42 whereby normal clothing is used to shield the smart token from light when the card is not in authorised use 45. A method according to claim 42 whereby a special purpose opaque sleeve or pocket is used to shield the smart token from light. when the card is not in authorised use 46. A method according to claim 3:S whereby the smart token has means for sensing pressure on the smart token such that the presence or absence of this pressure can be used to enable or disable the smart token communications capability 4?. A method according to claim 46 whereby the pressure is applied by the users hand and or fingers 48. A method according to elfin 46 whereby the pressure is applied by the use of the smart token reader.
    49. A method according to claim 5 whereby the smart token has means for sensmg heat such that the presence or absence of this heat can be used to enable or disable the smart token communications capability 50. A method according to claim 19 whereby headog and or cooling is provided by a system located in the vicinity of Me smart token reader system or integral to it.
    51. A system according to claim 19 whereby the healing and or cooling is provided by the users hand and or fingers.
    52. A method according to Skim 35 whereby the smart token has means for sensing resistance across an area of the smart token such that the value of this resistance can be used to enable or disable the smart token communications capability 53. A method according to Maim 35 whereby the smart token has means for sensing capacitance across an area of the smart token such that the value of this capacitance can be used to enable or disable the smart token communications capability 54. A method according to eLaim 35 whereby the smart token has means for sensing inductance across area of the smart token such that the value of this inductance can be used to enable or disable the smart token communications capability 55. A method according to Alan 35 whereby the smart token has means for sensing inertial changes such that the value of this martin change coo be used to enable or disable the smart token communications capability 56. A method according to Skim 33 whereby the cormmmcation capability of the smart token is rendered ineffective due to a jamming device.
    57. A method according to claim 56 whereby the jamming device is also a smart token.
    58. A method according to claim 56 whereby the jamming device is a shortrange electronic device that is not a smart token.
    59. A method according to claim 56 whereby the jamniing device is a lonrange electronic device.
    60. A method according to claim 35 whereby a sub-system connected via a smart token reader has means to measure the time traced for:e smart token communication protocol and depending on those; measurements render the smart token communications capability logically valid or invalid.
    61. A system according to any of the above clauns in which the smart token is a contact-less smart card 62. A system according to any of the above claims in which the smart token is an electronic chip with a radio frequency interface mounted insider a cattier device.
    63. A system according to any of the above claims in which the smart token is an electmnic chip with an optical coupling mounted insider a carrier device.
    64. A system according to any of the above claims in which the smart tolled is an electronic chip with a capacitive coupling mounted insider a carrier device.
    Claims for Patent Application No GB0323 165.1 65. A system according to any of the above claims in which the smart token is an electronic chip with an inductee coupling mounted insider a Gamer device.
    66. A system according to any of the above claims in which the smart token is substantially as shown in Figures 1 to 5.
    67. A system according to any of the above claims in which the smart token reader is a contact-less smart card reader.
    68. A method according to any of the above claims in which the smart token is a contact-less smart card 69. A method according to any of the above claims in which the smart token is an electronic chip with a radio frequency interface mounted insider a carrier device.
    70. A method according to any of the above claims in which the smart token is an electronic chip with an optical coupling mounted insider a carrier device.
    7] A method according to any of the abwe claims in which the smart token is an electronic chip with a capacitive coupling mounted insider a carrier device.
    72. A method according to any of Me above claims in which the smart token is an electronic chip with an inductive coupling mounted insider a carrier device.
    73. A method according to any of the above claims in which the smart token is substantially as shown in Figures 1 to 5.
    74. A method according to any of the above clamls in which the smart token reader is a contact-less smart card reader. lo
GB0323165A 2003-10-03 2003-10-03 Preventing unauthorised access to a contact-less smart card Withdrawn GB2407189A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0323165A GB2407189A (en) 2003-10-03 2003-10-03 Preventing unauthorised access to a contact-less smart card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0323165A GB2407189A (en) 2003-10-03 2003-10-03 Preventing unauthorised access to a contact-less smart card

Publications (2)

Publication Number Publication Date
GB0323165D0 GB0323165D0 (en) 2003-11-05
GB2407189A true GB2407189A (en) 2005-04-20

Family

ID=29415440

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0323165A Withdrawn GB2407189A (en) 2003-10-03 2003-10-03 Preventing unauthorised access to a contact-less smart card

Country Status (1)

Country Link
GB (1) GB2407189A (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006136833A2 (en) * 2005-06-22 2006-12-28 Ecebs Group Limited Secure pupil response testing
WO2006138440A2 (en) 2005-06-16 2006-12-28 Visa International Service Association Contactless activation systems and methods
WO2007003301A1 (en) 2005-07-01 2007-01-11 Fabrizio Borracci Universal smart card
EP1814066A1 (en) * 2006-01-24 2007-08-01 Vodafone Holding GmbH Information carrier comprising means for contactless reading
WO2007110142A1 (en) 2006-03-27 2007-10-04 Amoruso, Matteo A method for making a secure personal card and its working process
DE102007009216A1 (en) 2007-02-26 2008-10-30 Giesecke & Devrient Gmbh Portable data carrier e.g. smart card, for contact-less data exchange, has processor connected with antenna, and shield designed such that it enables contact-less communication through shield in state
EP2095299A2 (en) * 2006-12-19 2009-09-02 Kimberly-Clark Worldwide, Inc. Reversibly deactivating a radio frequency identification data tag
EP2147400A1 (en) * 2007-04-16 2010-01-27 Visa U.S.A. Inc. Anti-interrogation for portable device
WO2011038787A1 (en) * 2009-09-29 2011-04-07 Nagraid Security S.A. Portable electronic device provided with an optical switch, in particular an electronic board
FR2953619A1 (en) * 2009-12-03 2011-06-10 Uint ACTIVATION AND INDICATION OF RF FIELD ON A DEVICE COMPRISING A CHIP.
FR2968803A1 (en) * 2010-12-10 2012-06-15 St Microelectronics Rousset Electromagnetic transponder e.g. dual integrated circuit card, for contactless exchanging of protected data with reader for bank card, has electric circuit switched from one state to another state when resonant circuit is powered by reader
FR2968802A1 (en) * 2010-12-10 2012-06-15 St Microelectronics Rousset CONTACTLESS COMMUNICATION WITH HUMAN CONTACT AUTHORIZATION AND VISUAL INDICATOR
WO2012143039A1 (en) * 2011-04-18 2012-10-26 C-Sigma S.R.L. Authentication device with photosensitive input keys
WO2015183412A1 (en) * 2014-05-29 2015-12-03 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US9299072B2 (en) 2014-05-29 2016-03-29 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
EP3107042A1 (en) * 2015-06-16 2016-12-21 Motorola Mobility LLC Person-centric activation of radio frequency identification (rfid) tag
WO2017025187A1 (en) * 2015-08-11 2017-02-16 Giesecke & Devrient Gmbh Portable data carrier, in particular a chip card
RU2666100C2 (en) * 2013-03-15 2018-09-05 Олтриа Клайент Сервисиз Ллк Electronic smoking article
WO2020076941A1 (en) * 2018-10-12 2020-04-16 Kirkeby Cynthia Fascenelli Secure wireless data devices and methods of use
US10650443B2 (en) 2014-03-31 2020-05-12 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US10977716B2 (en) 2014-03-31 2021-04-13 Monticello Enterprises LLC System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service
US11017384B2 (en) 2014-05-29 2021-05-25 Apple Inc. Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device
DE102019133836A1 (en) * 2019-12-10 2021-06-10 Bayerische Motoren Werke Aktiengesellschaft Check card-shaped device and method for activating data transmission of a check card-shaped device
US11282131B2 (en) 2014-03-31 2022-03-22 Monticello Enterprises LLC User device enabling access to payment information in response to user input
US11343370B1 (en) 2012-11-02 2022-05-24 Majen Tech, LLC Screen interface for a mobile device apparatus
US11431834B1 (en) 2013-01-10 2022-08-30 Majen Tech, LLC Screen interface for a mobile device apparatus
EP4106212A1 (en) * 2021-06-11 2022-12-21 Tenvirk Spólka Z Ograniczona Odpowiedzialnoscia A method of short-range data transmission between a portable electronic device for storage and short-range data transmission and another device of this type or a stationary device, and a portable electronic device for storage and short-range data transmission
FR3132581A1 (en) * 2022-02-09 2023-08-11 Stmicroelectronics (Rousset) Sas Contactless communication device
US11836784B2 (en) 2014-03-31 2023-12-05 Monticello Enterprises LLC System and method for providing a search entity-based payment process

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS62251137A (en) * 1986-04-24 1987-10-31 三菱レイヨン株式会社 Magnetic shielding back fabric material for bag
US4885788A (en) * 1986-02-17 1989-12-05 Hitachi, Ltd. IC card
FR2728710A1 (en) * 1994-12-23 1996-06-28 Solaic Sa Electronic card with function that can be activated manually
EP1004980A2 (en) * 1998-11-23 2000-05-31 Cardis Research & Development Ltd. Smart card PIN system, card, and reader
US6095416A (en) * 1998-02-24 2000-08-01 Privicom, Inc. Method and device for preventing unauthorized use of credit cards
WO2001061640A1 (en) * 2000-02-16 2001-08-23 Ong Yong Kin Michael Electronic credit card - ecc
EP1326196A1 (en) * 2002-01-04 2003-07-09 Magnex Corporation Fingerprint sensing smart card with on-card fingerprint comparison

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4885788A (en) * 1986-02-17 1989-12-05 Hitachi, Ltd. IC card
JPS62251137A (en) * 1986-04-24 1987-10-31 三菱レイヨン株式会社 Magnetic shielding back fabric material for bag
FR2728710A1 (en) * 1994-12-23 1996-06-28 Solaic Sa Electronic card with function that can be activated manually
US6095416A (en) * 1998-02-24 2000-08-01 Privicom, Inc. Method and device for preventing unauthorized use of credit cards
EP1004980A2 (en) * 1998-11-23 2000-05-31 Cardis Research & Development Ltd. Smart card PIN system, card, and reader
WO2001061640A1 (en) * 2000-02-16 2001-08-23 Ong Yong Kin Michael Electronic credit card - ecc
EP1326196A1 (en) * 2002-01-04 2003-07-09 Magnex Corporation Fingerprint sensing smart card with on-card fingerprint comparison

Cited By (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8487769B2 (en) 2004-04-30 2013-07-16 Binforma Group Limited Liability Company Reversibly deactivating a radio frequency identification data tag
EP1891582A2 (en) * 2005-06-16 2008-02-27 Visa International Service Association Contactless activation systems and methods
WO2006138440A2 (en) 2005-06-16 2006-12-28 Visa International Service Association Contactless activation systems and methods
US7815126B2 (en) 2005-06-16 2010-10-19 Visa International Service Association Contactless activation systems and methods
EP1891582A4 (en) * 2005-06-16 2008-09-24 Visa Int Service Ass Contactless activation systems and methods
WO2006136833A3 (en) * 2005-06-22 2008-07-03 Ecebs Group Ltd Secure pupil response testing
WO2006136833A2 (en) * 2005-06-22 2006-12-28 Ecebs Group Limited Secure pupil response testing
GB2444424A (en) * 2005-06-22 2008-06-04 Ecebs Group Ltd Secure pupil response testing
WO2007003301A1 (en) 2005-07-01 2007-01-11 Fabrizio Borracci Universal smart card
US7946501B2 (en) 2005-07-01 2011-05-24 Fabrizio Borracci Universal smart card
EP1814066A1 (en) * 2006-01-24 2007-08-01 Vodafone Holding GmbH Information carrier comprising means for contactless reading
WO2007110142A1 (en) 2006-03-27 2007-10-04 Amoruso, Matteo A method for making a secure personal card and its working process
US7992789B2 (en) 2006-03-27 2011-08-09 Fabrizio Borracci Method for making a secure personal card and its working process
EP2095299A2 (en) * 2006-12-19 2009-09-02 Kimberly-Clark Worldwide, Inc. Reversibly deactivating a radio frequency identification data tag
DE102007009216A1 (en) 2007-02-26 2008-10-30 Giesecke & Devrient Gmbh Portable data carrier e.g. smart card, for contact-less data exchange, has processor connected with antenna, and shield designed such that it enables contact-less communication through shield in state
EP2147400A1 (en) * 2007-04-16 2010-01-27 Visa U.S.A. Inc. Anti-interrogation for portable device
EP2147400A4 (en) * 2007-04-16 2010-05-26 Visa Usa Inc Anti-interrogation for portable device
US8505826B2 (en) 2007-04-16 2013-08-13 Visa U.S.A. Anti-interrogation for portable device
RU2556422C2 (en) * 2009-09-29 2015-07-10 Награид Секьюрити С.А. Portable electronic device, particularly electronic card with optical switch
US8748803B2 (en) 2009-09-29 2014-06-10 Nagraid Security S.A. Portable electronic device, particularly an electronic card, provided with an optical switch
WO2011038787A1 (en) * 2009-09-29 2011-04-07 Nagraid Security S.A. Portable electronic device provided with an optical switch, in particular an electronic board
FR2953619A1 (en) * 2009-12-03 2011-06-10 Uint ACTIVATION AND INDICATION OF RF FIELD ON A DEVICE COMPRISING A CHIP.
US9189725B2 (en) 2009-12-03 2015-11-17 Uint Activation and indication of an RF field on a device including a chip
FR2968802A1 (en) * 2010-12-10 2012-06-15 St Microelectronics Rousset CONTACTLESS COMMUNICATION WITH HUMAN CONTACT AUTHORIZATION AND VISUAL INDICATOR
FR2968803A1 (en) * 2010-12-10 2012-06-15 St Microelectronics Rousset Electromagnetic transponder e.g. dual integrated circuit card, for contactless exchanging of protected data with reader for bank card, has electric circuit switched from one state to another state when resonant circuit is powered by reader
WO2012143039A1 (en) * 2011-04-18 2012-10-26 C-Sigma S.R.L. Authentication device with photosensitive input keys
US11652916B1 (en) 2012-11-02 2023-05-16 W74 Technology, Llc Screen interface for a mobile device apparatus
US11343370B1 (en) 2012-11-02 2022-05-24 Majen Tech, LLC Screen interface for a mobile device apparatus
US11431834B1 (en) 2013-01-10 2022-08-30 Majen Tech, LLC Screen interface for a mobile device apparatus
RU2666100C2 (en) * 2013-03-15 2018-09-05 Олтриа Клайент Сервисиз Ллк Electronic smoking article
US10977716B2 (en) 2014-03-31 2021-04-13 Monticello Enterprises LLC System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service
US10650443B2 (en) 2014-03-31 2020-05-12 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US11836784B2 (en) 2014-03-31 2023-12-05 Monticello Enterprises LLC System and method for providing a search entity-based payment process
US11669884B2 (en) 2014-03-31 2023-06-06 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US11468497B2 (en) 2014-03-31 2022-10-11 Monticello Enterprises LLC System and method for receiving data at a merchant device from a user device over a wireless link
US11461828B2 (en) 2014-03-31 2022-10-04 Monticello Enterprises LLC System and method for receiving data at a merchant device from a user device over a wireless link
US11282131B2 (en) 2014-03-31 2022-03-22 Monticello Enterprises LLC User device enabling access to payment information in response to user input
US11074640B2 (en) 2014-03-31 2021-07-27 Monticello Enterprises LLC System and method for providing a universal shopping cart across multiple search platforms
US10825079B2 (en) 2014-03-31 2020-11-03 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US10769717B2 (en) 2014-03-31 2020-09-08 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US9299072B2 (en) 2014-05-29 2016-03-29 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
WO2015183412A1 (en) * 2014-05-29 2015-12-03 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US10699262B2 (en) 2014-05-29 2020-06-30 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US10489769B2 (en) 2014-05-29 2019-11-26 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US11922408B2 (en) 2014-05-29 2024-03-05 Apple Inc. Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device
US10977642B2 (en) 2014-05-29 2021-04-13 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
US9864984B2 (en) 2014-05-29 2018-01-09 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
US11017384B2 (en) 2014-05-29 2021-05-25 Apple Inc. Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device
KR101831351B1 (en) 2014-05-29 2018-02-22 애플 인크. User device enabling access to payment information in response to mechanical input detection
US10289996B2 (en) 2014-05-29 2019-05-14 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
US10223682B2 (en) 2014-05-29 2019-03-05 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US9400977B2 (en) 2014-05-29 2016-07-26 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US9965658B2 (en) 2015-06-16 2018-05-08 Motorola Mobility Llc Person-centric activation of radio frequency identification (RFID) tag
EP3107042A1 (en) * 2015-06-16 2016-12-21 Motorola Mobility LLC Person-centric activation of radio frequency identification (rfid) tag
DE102016110532B4 (en) 2015-06-16 2019-10-17 Motorola Mobility Llc Person-centered activation of a radio-frequency identification tag (RFID tag)
DE102015010458A1 (en) 2015-08-11 2017-02-16 Giesecke & Devrient Gmbh Portable data carrier, in particular chip card
WO2017025187A1 (en) * 2015-08-11 2017-02-16 Giesecke & Devrient Gmbh Portable data carrier, in particular a chip card
WO2020076941A1 (en) * 2018-10-12 2020-04-16 Kirkeby Cynthia Fascenelli Secure wireless data devices and methods of use
DE102019133836A1 (en) * 2019-12-10 2021-06-10 Bayerische Motoren Werke Aktiengesellschaft Check card-shaped device and method for activating data transmission of a check card-shaped device
EP4106212A1 (en) * 2021-06-11 2022-12-21 Tenvirk Spólka Z Ograniczona Odpowiedzialnoscia A method of short-range data transmission between a portable electronic device for storage and short-range data transmission and another device of this type or a stationary device, and a portable electronic device for storage and short-range data transmission
FR3132581A1 (en) * 2022-02-09 2023-08-11 Stmicroelectronics (Rousset) Sas Contactless communication device

Also Published As

Publication number Publication date
GB0323165D0 (en) 2003-11-05

Similar Documents

Publication Publication Date Title
GB2407189A (en) Preventing unauthorised access to a contact-less smart card
US6021494A (en) Electronic micro identification circuit that is inherently bonded to someone or something
ATE125054T1 (en) SYSTEM FOR SECURE DATA EXCHANGE.
CA2668333C (en) Device for protecting contactless communication objects against fraud
US8550360B2 (en) Peripheral security device built into a contactless object in the form of secure document equipped with a radiofrequency device
US7911355B2 (en) Apparatus for storing and wirelessly transmitting data
US20040124248A1 (en) Methods and apparatus for wireless RFID cardholder signature and data entry
EP2717552A1 (en) A portable proximity wireless communication device
US11281871B2 (en) Protection of personal data contained on an RFID-enabled device
JPWO2002086808A1 (en) Information protection system and information protection method
CN108763993A (en) The noninductive control methods of RFID based on range sensor, apparatus and system
US20160057627A1 (en) Method and Apparatus for Preventing Concealed, Unauthorized Wireless Data Access
CN108765671A (en) The noninductive control methods of RFID based on trigger switch, apparatus and system
CN208314887U (en) The noninductive control device of RFID and system based on trigger switch
US20200387765A1 (en) Security Measures in Relation to Data Tags and Contactless Cards
KR200433667Y1 (en) A rfid terminal having a personal authentification device
WO2014169393A1 (en) Security switch for an rfid token
JP2009110373A (en) Non-contact ic card, card case, card reading device, and non-contact ic card system
GB2571301A (en) Security of data tags
KR20130078056A (en) Hi-speed rfid access gates system with surveillance features
WO2024035375A1 (en) An identity access device consisting of at least two separate modules associated with each other to provide data communication
CN113661500A (en) Switch button for contactless passive NFC and RFID devices
Grillmayer Radio-Frequency Identification-Overview
TWM586389U (en) Smart card with anti-fraudulent technique
Binu et al. Mobile Phone Based Secured Electronic Payment System Using RFID Communication

Legal Events

Date Code Title Description
COOA Change in applicant's name or ownership of the application

Owner name: VODAFONE GROUP PLC

Free format text: FORMER APPLICANT(S): CRISP TELECOM LIMITED

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)