GB2407189A - Preventing unauthorised access to a contact-less smart card - Google Patents
Preventing unauthorised access to a contact-less smart card Download PDFInfo
- Publication number
- GB2407189A GB2407189A GB0323165A GB0323165A GB2407189A GB 2407189 A GB2407189 A GB 2407189A GB 0323165 A GB0323165 A GB 0323165A GB 0323165 A GB0323165 A GB 0323165A GB 2407189 A GB2407189 A GB 2407189A
- Authority
- GB
- United Kingdom
- Prior art keywords
- smart token
- smart
- token
- card
- reader
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
- H04K3/825—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
- G06K19/07345—Means for preventing undesired reading or writing from or onto record carriers by activating or deactivating at least a part of the circuit on the record carrier, e.g. ON/OFF switches
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/41—Jamming having variable characteristics characterized by the control of the jamming activation or deactivation time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/86—Jamming or countermeasure characterized by its function related to preventing deceptive jamming or unauthorized interrogation or access, e.g. WLAN access or RFID reading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/10—Jamming or countermeasure used for a particular application
- H04K2203/20—Jamming or countermeasure used for a particular application for contactless carriers, e.g. RFID carriers
Abstract
To ensure that a contact-less smart card is not accessed by an unauthorised entity the card is disabled when not required. The card may be enabled by entry of a pin or scanning of a fingerprint. The card may alternatively be enabled by a photo diode, one or more pressure sensors, a heat or skin resistance sensor or an inertial sensor. Alternatively a jamming device may jam communication with adjacent smart cards or the smart card may be shielded by a metal plate in a wallet or purse.
Description
PREVENTING UNAUTHORISED ACCESS TO A
CONTACT-LESS SMART CARD
Background of the invention
The invention relates to contact-less RF (radio frequency) smart cards. Examples of contact-less smart card technology is described within ISO/IEC 14443 and ISO/IEC 15693 standards. These cards contain an in built inductive antenna that allows the card to exchange information with a card reader when the two are in sufficiently close proximity. The reader emits a RF signal to supply power to the card and communicate with it.
These cards are already extremely widespread in applications such as entry systems for buildings or as electronic tickets for entry to venue, public transport and toll fee collection points. They are also used in tagging systems such as in airport luggage handling where the smart cards can be read from several hundreds metros.
However there is also enormous interest in using contact- less cards as secure national identity cards and entitlement cards.
A hybrid form of contact-less smart cards has also been proposed as SIM (Subscriber Identity Module) in mobile technology and in aiding and facilitating transactions for commerce. The SIM is enhanced in this respect by the addition of an antenna built into the card, the mobile communicator or an accessory piece of equipment.
With the increase in value of the data which these cards hold it is important to protect the cards from unauthorized access.
A suitably placed or adapted reader would be able to exchange information with a card without the owner's permission. Sensitive data on the card could be stolen or changed. Indeed the card may participate in a sensitive or valuable transaction without the knowledge of the owner.
Current systems rely on some existing protection means.
The RF link between the card and reader is meant to be of limited range.
The communication between the card and the reader is encrypted.
Another known but not widely used system is to place a card in a metal enclosure that provides shielding to prevent RF access to the card.
These protection means have limitations.
Relying on range limitation is dangerous as specialist radio equipment may be used to extend the intended range.
Encryption can be effective, but it does not guard against unauthorized communication with a rogue reader (such as a genuine reader that has been stolen or a reader that has broken the encryption algorithm).
Efficient shielding is effective, but it is not user convenient as it requires the user to remember to place the card in the shield, also a user may have several such cards.
This invention is to provide other methods to ensure that a contact-less smart card is not accessed by an unauthorized entity.
Description of the invention
One method of ensuring that the smart card is not being accessed is to have the card disabled when not required.
The following are examples of how the card could be enabled and disabled as required.
Manual switching (requiring direct action by the user) These systems would be most useful when the card is required to be enabled for reasonably long periods of time.
For example when the card is a SIM for mobile terminal.
The card could automatically switch off when the reader is no longer communicating with it. These systems have the added advantage that the card cannot be enabled if it is stolen.
PIN entry - the card has an entry system for entering a PIN to enable the card. Examples of PIN entry system are shown in Figure 1a and 1b. Other systems of PIN entry could be used.
Biometric entry - It would be also possible to enable the card by taking a scan of a finger pant and comparing it to a print stored in the card's memory. If the print is confirmed to be of the authorised user the card is enabled. Such an example is shown in Figure 2. Other forms of biometric include voice recognition.
Automatic switching (requiring no direct action by the user) These system would be most useful when cards are only required for use for short periods of time. Examples are door entry system or in dealing with transactions.
Light sensor - e.g. a photo diode (a sensor that modifies an electric current when exposed to a light source) could act as a switch. The smart card would only be enabled when the card is exposed to light.
Hence when a card is in a wallet or pocket it is disabled.
Pressure sensor - a pressure sensor would act as a switch. The smart card would only be enabled when the user is physically holding the card. Hence when a card is in a wallet or pocket it is disabled. The pressure sensor may be combined with a fingerprint scanner.
The combined sensor could be set up to detect that it is an actual finger that is applying the pressure.
Alternatively the pressure sensor could be combined with an electrical resistance meter and used to detect that it is a human hand holding the card and applying pressure.
Heat sensors - another method of ensuring that the card is in a user's hand include using heat sensors.
Skin resistance sensor- as mentioned above a method of ensuring that the card is in a user's hand include using electrical resistance sensors.
Inertial sensors - an inertial sensor can be used to detect the fact that the user is moving the card around at a sufficient speed to indicate it is to be used. Inertial sensors can be based on micro-accelerators, these are commonly used in motion detectors for example in gaming and virtual reality/remote control systems.
General ambient sensors - the above switching solutions are based on changes in ambient conditions (e.g. light, pressure, heat, movement) from when a card is simply being stored to when a card is required to be active. The invention is not limited to the exemplary sensors described.
Non switching methods - Useful for single or multiple cards or where the card is not in a users possession (such as in tagging systems).
Jamming device - A contact-less card or electronic device that is designed to jam/disrupt the low level communications of all cards within the range of the jamming device. In stead of following an anti-collision protocol commonly used in contact-less smart card technology it attempts to create collisions and other forms of interference. The jamming device would have to be disabled or the cards removed from the proximity of the jamming device when authorised use of the card is required.
Round trip detector- To guard against access from RF fields that have been greatly extended the card has a round trip delay (time taken for a signal to travel from the card to the reader and back to the card) tester. It sends a test signal when the card is being probed and expects a response within a certain round-trip delay otherwise it will shut down or refuse to function.
Other methods.
Shielding methods - A purse or wallet can have a thin metal plate sewn into the fabric, as shown in Figure 6, in order to conveniently shield any cards placed in the walleVpurse A smart card may have any of the above systems implemented in any combination. For example a card may have a manual entry system and automatic entry system for both short and long periods of use. The system may work in parallel, hence the card would be enabled if the light sensor was activated or the PIN was entered. The system may work in series, hence for example the card would be enabled if the light sensor was activated and the PIN was entered.
I:)escription of the diagrams Figure 1a and 1b - PIN entry system Fig 1a shows a smart card (100) with an in-built inductive antenna (200) and a PIN entry system. Due to the size of a smart card (100) the PIN entry system consist of a small display (10) which shows the current number. An 'up' and down' button (11) will allow the user to go through the numbers and an 'enter' button (12) will allow the user to select number.
Fig 1b shows another PIN entry system is to use symbols printed on buttons (13) on the smart card (100) and the user must enter the symbol in the correct order.
Finure 2 -Biometric system Fig 2 shows a smart card (100) with an inbuilt inductive antenna (200) and a biometric system (20) for reading a finger print. The print is ideally compared to a previously taken print stored in the memory (30) of the smart card (100) or may just be judged as having the characteristics of a non- specific fingerprint.
Figure 3 - Light sensor system Fig 3 shows a smart card (100) with an inbuilt inductive antenna (200) and photo diode (40) that enable the card when the diode (40) is exposed to light. The smart card (100) may contain single or multiple photo diodes (40). To prevent accidental activation multiple photo diodes (40) may have to be activated to make the smart card (100) enabled.
Figure 4 - Pressure sensor Fig 4 shows a smart card (100) with an inbuilt inductive antenna (200) and pressure sensor (50) that enables the card when the card is being held. To prevent accidental activation multiple pressure sensors (50) may have to be activated to make the smart card (100) enabled. The card may contain multiple pressure sensor (50) on the same face of the smart card (100) or on the opposite face of the smart card (100). The smart card (100) may require a single hand to operate or two hands to operate.
Figure 5 - Inertial sensor Fig 5 shows a smart card (100) with an inbuilt inductive antenna (200) and an inertial sensor (60) that enables the card when the card is being waved around at a sufficient speed.
Figure 6 - Shielded wallet Fig 6 shows a walleVpurse (1) with metal shielding (2) that prevents RF signals reaching the smart card (100) held in the walleVpurse (l).
Claims (1)
- Clarions for Patent Application No CTB0323165.1 Claims for PatentApplication No GB0323165.1 Date Lodged 03.10.2003 Title PREVENTING UNAUTHORISiED ACCESS TO A CONTACT-LESS SMARTCARDApplicallt(s) Crisp Telecom Limited (01488686396 - 07767891161- keth. mayescnsptele.com) 1. A system consisting of one or more smart tokens plus one or more smart token reader devices where a smart token is able to communicate with a smart token reader without the use of direct electrical contact: and this communication is prevented except when the smart token is used in the intended manner and this prevention does not rely on the electromagnetic shielding of Be smart token.2. A system according to claim O whereby communication is prevented by a switching function 3. A system according to claim O whereby communication is prevented by a non-switching function 4. A system according to claun 2 whereby the switching control function requires an input or proper only known and or available to the legitimate smart token owner 5. A system according to claim 2 whereby the switching control function does not check the legitimacy of the mart token user 6. A system according to claim 4 whereby the smart token has means for PIN entry and comparison such that the entry of the PIN enables or disables the communications capability 7. A system according to claun 4 whereby the smart token has means for biometric sensing and comparison such that Be sensmg of Be correct biometric enables or disables the communications capability 8. A system according to claim 7 whereby the biometric sensor is a fingerprint reader.9. A system according to claim 5 whereby the smart token has means for sensing visible and or infra red and or ultra violet light such that the presence or absence of this light can be used to enable or disable the smart token communications capability 10. A system according to claim 9 whereby lighting is provided by a system located in the vicinity of the smart token reader system or integral to it.11. A system according to claim 9 whereby the card is shielded Trom light when not in authorised use 12. A system according to claim 11 whereby a normal wallet is used to shield the smart token from light when the card is not in authorised use 13. A system according to claim 12 whereby the wallet is substantially as shown in Figure 6.14. A system according to claim 12 whereby normal clothing is used to shield the smart token from light when the card is not in authorised use 15. A system according to claim 12 whereby a special purpose opaque sleeve or pocket is used to shield the smart token from light. when the card is not in authorised use 16. A system according to claim whereby the smart token has means for sensing pressure on the smart token such that the presence or absence of this pressure can be used to enable or disable the smart token comm; mcahons capability 17. A system according to claim 16 whereby the pressure is applied by the users hand and or fingers 18. A system according to claim 16 whereby the pressure is applied by the use of the smart token reader.19. A system according to claim 5 whereby the smart token has means for sensing heat such that the presence or absence of this heat can be used to enable or disable the smart token communications capability 20. A system aeeordlng to claim 19 whereby heating and or cooling is provided by a system located in the vicmlty of the smart token reader system or integral to it.Claims for Patent Application No GB0323 165.1 21. A system according to claim 19 whereby the heating and or cooling is prodded by the users hand and or fingers.22. A system according to claim 5 wherever the smart token has means for sensing resistance across an area of the smart token such that the value of this resistance can be used to enable or disable the smart token communications capability 23. A system according to claim whereby the smart token has means for sensing capacitance across an area of the smart token such that the value of this capacitance can be used to enable or disable the smart token communications capability 24. A system according to chim 5 Hereby the smart token has means for sensing inductance across an area of the smart token such that the value of this inductance can be used to enable or disable the smart token communications capability 25. A system according to claim whereby the smart token has means for sensing inertial changes such that the value of this inertial change can be used to enable or disable the smart token communications capability 26. A system according to claun 3 whereby the communication capability of the Retort token is rendered ineffective due to a jamming device.27. A system according to claim 26 whereby the jamming device is also a smart token.28. A system according to claim 26 whereby the jamming device is a shortrange electronic device that is not a smart token.29. A system according to claim 26 whereby the jamming device is a longrange electronic device.30. A system according to rem 5 whereby a sub system connected via a snout token reader has means to measure the time taken for the smart token communication protocol and depending on those measurements render the smart token communications capability logically valid or invalid.31. A method consisting of one or more smart tokens plus one or more smart token reader devices where a smart token is able to communicate with a smart token reader without the use of direct electrical contact and this communication is prevented except when the smart token is used in the intended manner and this prevention does not rely on the electromagnetic shielding of the smart token.32. A method according to claim 31 whereby conununication is prevented by a switching function 33. A method according to claim 31 whereby communication is prevented by a non- switching function 34. A method according to claim 32 whereby the switching control function requires an input or property only known and or available to the legitimate smart token owner 35. A method according to claim 32 whereby the switching control fimction does not check the legitimacy of the smart token user 36. A method according to clam, 34 whereby the smart token has means for PIN entry and comparison such that the entry of the PIN enables or disables the communications capability 37. A method according to claim 34 whereby the smart token has means for biometric sensing and comparison such that the sensing of the correct biometric enables or disables the Communications capability 38. A method according to claim 37 whereby the biometric sensor is a fingerprint reader.39. A method according to claim 35 whereby the smart token has means for sensing v isible and or infra red and or ultra violet light such that the presence or absence of this light can be used to enable or disable the smart token communications capability 4Q. A method according to claim 39 whereby lighting is provided by a system located in the vicinity of the smart token reader system or integral to *.41. A method according to claim 39 whereby the card is shielded fi om light when not in authorised use t <' Claims for Patent Application No GB0323 165.1 42 A method according to clang 41 whereby a normal wallet is used to shield the smart token from light when the card is not in authorised use 43. A method according to claim 42 whereby the wallet is substantially as shown in Figure 6.44. A method according to claim 42 whereby normal clothing is used to shield the smart token from light when the card is not in authorised use 45. A method according to claim 42 whereby a special purpose opaque sleeve or pocket is used to shield the smart token from light. when the card is not in authorised use 46. A method according to claim 3:S whereby the smart token has means for sensing pressure on the smart token such that the presence or absence of this pressure can be used to enable or disable the smart token communications capability 4?. A method according to claim 46 whereby the pressure is applied by the users hand and or fingers 48. A method according to elfin 46 whereby the pressure is applied by the use of the smart token reader.49. A method according to claim 5 whereby the smart token has means for sensmg heat such that the presence or absence of this heat can be used to enable or disable the smart token communications capability 50. A method according to claim 19 whereby headog and or cooling is provided by a system located in the vicinity of Me smart token reader system or integral to it.51. A system according to claim 19 whereby the healing and or cooling is provided by the users hand and or fingers.52. A method according to Skim 35 whereby the smart token has means for sensing resistance across an area of the smart token such that the value of this resistance can be used to enable or disable the smart token communications capability 53. A method according to Maim 35 whereby the smart token has means for sensing capacitance across an area of the smart token such that the value of this capacitance can be used to enable or disable the smart token communications capability 54. A method according to eLaim 35 whereby the smart token has means for sensing inductance across area of the smart token such that the value of this inductance can be used to enable or disable the smart token communications capability 55. A method according to Alan 35 whereby the smart token has means for sensing inertial changes such that the value of this martin change coo be used to enable or disable the smart token communications capability 56. A method according to Skim 33 whereby the cormmmcation capability of the smart token is rendered ineffective due to a jamming device.57. A method according to claim 56 whereby the jamming device is also a smart token.58. A method according to claim 56 whereby the jamming device is a shortrange electronic device that is not a smart token.59. A method according to claim 56 whereby the jamniing device is a lonrange electronic device.60. A method according to claim 35 whereby a sub-system connected via a smart token reader has means to measure the time traced for:e smart token communication protocol and depending on those; measurements render the smart token communications capability logically valid or invalid.61. A system according to any of the above clauns in which the smart token is a contact-less smart card 62. A system according to any of the above claims in which the smart token is an electronic chip with a radio frequency interface mounted insider a cattier device.63. A system according to any of the above claims in which the smart token is an electmnic chip with an optical coupling mounted insider a carrier device.64. A system according to any of the above claims in which the smart tolled is an electronic chip with a capacitive coupling mounted insider a carrier device.Claims for Patent Application No GB0323 165.1 65. A system according to any of the above claims in which the smart token is an electronic chip with an inductee coupling mounted insider a Gamer device.66. A system according to any of the above claims in which the smart token is substantially as shown in Figures 1 to 5.67. A system according to any of the above claims in which the smart token reader is a contact-less smart card reader.68. A method according to any of the above claims in which the smart token is a contact-less smart card 69. A method according to any of the above claims in which the smart token is an electronic chip with a radio frequency interface mounted insider a carrier device.70. A method according to any of the above claims in which the smart token is an electronic chip with an optical coupling mounted insider a carrier device.7] A method according to any of the abwe claims in which the smart token is an electronic chip with a capacitive coupling mounted insider a carrier device.72. A method according to any of Me above claims in which the smart token is an electronic chip with an inductive coupling mounted insider a carrier device.73. A method according to any of the above claims in which the smart token is substantially as shown in Figures 1 to 5.74. A method according to any of the above clamls in which the smart token reader is a contact-less smart card reader. lo
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0323165A GB2407189A (en) | 2003-10-03 | 2003-10-03 | Preventing unauthorised access to a contact-less smart card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0323165A GB2407189A (en) | 2003-10-03 | 2003-10-03 | Preventing unauthorised access to a contact-less smart card |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0323165D0 GB0323165D0 (en) | 2003-11-05 |
GB2407189A true GB2407189A (en) | 2005-04-20 |
Family
ID=29415440
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0323165A Withdrawn GB2407189A (en) | 2003-10-03 | 2003-10-03 | Preventing unauthorised access to a contact-less smart card |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2407189A (en) |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006136833A2 (en) * | 2005-06-22 | 2006-12-28 | Ecebs Group Limited | Secure pupil response testing |
WO2006138440A2 (en) | 2005-06-16 | 2006-12-28 | Visa International Service Association | Contactless activation systems and methods |
WO2007003301A1 (en) | 2005-07-01 | 2007-01-11 | Fabrizio Borracci | Universal smart card |
EP1814066A1 (en) * | 2006-01-24 | 2007-08-01 | Vodafone Holding GmbH | Information carrier comprising means for contactless reading |
WO2007110142A1 (en) | 2006-03-27 | 2007-10-04 | Amoruso, Matteo | A method for making a secure personal card and its working process |
DE102007009216A1 (en) | 2007-02-26 | 2008-10-30 | Giesecke & Devrient Gmbh | Portable data carrier e.g. smart card, for contact-less data exchange, has processor connected with antenna, and shield designed such that it enables contact-less communication through shield in state |
EP2095299A2 (en) * | 2006-12-19 | 2009-09-02 | Kimberly-Clark Worldwide, Inc. | Reversibly deactivating a radio frequency identification data tag |
EP2147400A1 (en) * | 2007-04-16 | 2010-01-27 | Visa U.S.A. Inc. | Anti-interrogation for portable device |
WO2011038787A1 (en) * | 2009-09-29 | 2011-04-07 | Nagraid Security S.A. | Portable electronic device provided with an optical switch, in particular an electronic board |
FR2953619A1 (en) * | 2009-12-03 | 2011-06-10 | Uint | ACTIVATION AND INDICATION OF RF FIELD ON A DEVICE COMPRISING A CHIP. |
FR2968803A1 (en) * | 2010-12-10 | 2012-06-15 | St Microelectronics Rousset | Electromagnetic transponder e.g. dual integrated circuit card, for contactless exchanging of protected data with reader for bank card, has electric circuit switched from one state to another state when resonant circuit is powered by reader |
FR2968802A1 (en) * | 2010-12-10 | 2012-06-15 | St Microelectronics Rousset | CONTACTLESS COMMUNICATION WITH HUMAN CONTACT AUTHORIZATION AND VISUAL INDICATOR |
WO2012143039A1 (en) * | 2011-04-18 | 2012-10-26 | C-Sigma S.R.L. | Authentication device with photosensitive input keys |
WO2015183412A1 (en) * | 2014-05-29 | 2015-12-03 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US9299072B2 (en) | 2014-05-29 | 2016-03-29 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
EP3107042A1 (en) * | 2015-06-16 | 2016-12-21 | Motorola Mobility LLC | Person-centric activation of radio frequency identification (rfid) tag |
WO2017025187A1 (en) * | 2015-08-11 | 2017-02-16 | Giesecke & Devrient Gmbh | Portable data carrier, in particular a chip card |
RU2666100C2 (en) * | 2013-03-15 | 2018-09-05 | Олтриа Клайент Сервисиз Ллк | Electronic smoking article |
WO2020076941A1 (en) * | 2018-10-12 | 2020-04-16 | Kirkeby Cynthia Fascenelli | Secure wireless data devices and methods of use |
US10650443B2 (en) | 2014-03-31 | 2020-05-12 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
US10977716B2 (en) | 2014-03-31 | 2021-04-13 | Monticello Enterprises LLC | System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service |
US11017384B2 (en) | 2014-05-29 | 2021-05-25 | Apple Inc. | Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device |
DE102019133836A1 (en) * | 2019-12-10 | 2021-06-10 | Bayerische Motoren Werke Aktiengesellschaft | Check card-shaped device and method for activating data transmission of a check card-shaped device |
US11282131B2 (en) | 2014-03-31 | 2022-03-22 | Monticello Enterprises LLC | User device enabling access to payment information in response to user input |
US11343370B1 (en) | 2012-11-02 | 2022-05-24 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
US11431834B1 (en) | 2013-01-10 | 2022-08-30 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
EP4106212A1 (en) * | 2021-06-11 | 2022-12-21 | Tenvirk Spólka Z Ograniczona Odpowiedzialnoscia | A method of short-range data transmission between a portable electronic device for storage and short-range data transmission and another device of this type or a stationary device, and a portable electronic device for storage and short-range data transmission |
FR3132581A1 (en) * | 2022-02-09 | 2023-08-11 | Stmicroelectronics (Rousset) Sas | Contactless communication device |
US11836784B2 (en) | 2014-03-31 | 2023-12-05 | Monticello Enterprises LLC | System and method for providing a search entity-based payment process |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS62251137A (en) * | 1986-04-24 | 1987-10-31 | 三菱レイヨン株式会社 | Magnetic shielding back fabric material for bag |
US4885788A (en) * | 1986-02-17 | 1989-12-05 | Hitachi, Ltd. | IC card |
FR2728710A1 (en) * | 1994-12-23 | 1996-06-28 | Solaic Sa | Electronic card with function that can be activated manually |
EP1004980A2 (en) * | 1998-11-23 | 2000-05-31 | Cardis Research & Development Ltd. | Smart card PIN system, card, and reader |
US6095416A (en) * | 1998-02-24 | 2000-08-01 | Privicom, Inc. | Method and device for preventing unauthorized use of credit cards |
WO2001061640A1 (en) * | 2000-02-16 | 2001-08-23 | Ong Yong Kin Michael | Electronic credit card - ecc |
EP1326196A1 (en) * | 2002-01-04 | 2003-07-09 | Magnex Corporation | Fingerprint sensing smart card with on-card fingerprint comparison |
-
2003
- 2003-10-03 GB GB0323165A patent/GB2407189A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4885788A (en) * | 1986-02-17 | 1989-12-05 | Hitachi, Ltd. | IC card |
JPS62251137A (en) * | 1986-04-24 | 1987-10-31 | 三菱レイヨン株式会社 | Magnetic shielding back fabric material for bag |
FR2728710A1 (en) * | 1994-12-23 | 1996-06-28 | Solaic Sa | Electronic card with function that can be activated manually |
US6095416A (en) * | 1998-02-24 | 2000-08-01 | Privicom, Inc. | Method and device for preventing unauthorized use of credit cards |
EP1004980A2 (en) * | 1998-11-23 | 2000-05-31 | Cardis Research & Development Ltd. | Smart card PIN system, card, and reader |
WO2001061640A1 (en) * | 2000-02-16 | 2001-08-23 | Ong Yong Kin Michael | Electronic credit card - ecc |
EP1326196A1 (en) * | 2002-01-04 | 2003-07-09 | Magnex Corporation | Fingerprint sensing smart card with on-card fingerprint comparison |
Cited By (61)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8487769B2 (en) | 2004-04-30 | 2013-07-16 | Binforma Group Limited Liability Company | Reversibly deactivating a radio frequency identification data tag |
EP1891582A2 (en) * | 2005-06-16 | 2008-02-27 | Visa International Service Association | Contactless activation systems and methods |
WO2006138440A2 (en) | 2005-06-16 | 2006-12-28 | Visa International Service Association | Contactless activation systems and methods |
US7815126B2 (en) | 2005-06-16 | 2010-10-19 | Visa International Service Association | Contactless activation systems and methods |
EP1891582A4 (en) * | 2005-06-16 | 2008-09-24 | Visa Int Service Ass | Contactless activation systems and methods |
WO2006136833A3 (en) * | 2005-06-22 | 2008-07-03 | Ecebs Group Ltd | Secure pupil response testing |
WO2006136833A2 (en) * | 2005-06-22 | 2006-12-28 | Ecebs Group Limited | Secure pupil response testing |
GB2444424A (en) * | 2005-06-22 | 2008-06-04 | Ecebs Group Ltd | Secure pupil response testing |
WO2007003301A1 (en) | 2005-07-01 | 2007-01-11 | Fabrizio Borracci | Universal smart card |
US7946501B2 (en) | 2005-07-01 | 2011-05-24 | Fabrizio Borracci | Universal smart card |
EP1814066A1 (en) * | 2006-01-24 | 2007-08-01 | Vodafone Holding GmbH | Information carrier comprising means for contactless reading |
WO2007110142A1 (en) | 2006-03-27 | 2007-10-04 | Amoruso, Matteo | A method for making a secure personal card and its working process |
US7992789B2 (en) | 2006-03-27 | 2011-08-09 | Fabrizio Borracci | Method for making a secure personal card and its working process |
EP2095299A2 (en) * | 2006-12-19 | 2009-09-02 | Kimberly-Clark Worldwide, Inc. | Reversibly deactivating a radio frequency identification data tag |
DE102007009216A1 (en) | 2007-02-26 | 2008-10-30 | Giesecke & Devrient Gmbh | Portable data carrier e.g. smart card, for contact-less data exchange, has processor connected with antenna, and shield designed such that it enables contact-less communication through shield in state |
EP2147400A1 (en) * | 2007-04-16 | 2010-01-27 | Visa U.S.A. Inc. | Anti-interrogation for portable device |
EP2147400A4 (en) * | 2007-04-16 | 2010-05-26 | Visa Usa Inc | Anti-interrogation for portable device |
US8505826B2 (en) | 2007-04-16 | 2013-08-13 | Visa U.S.A. | Anti-interrogation for portable device |
RU2556422C2 (en) * | 2009-09-29 | 2015-07-10 | Награид Секьюрити С.А. | Portable electronic device, particularly electronic card with optical switch |
US8748803B2 (en) | 2009-09-29 | 2014-06-10 | Nagraid Security S.A. | Portable electronic device, particularly an electronic card, provided with an optical switch |
WO2011038787A1 (en) * | 2009-09-29 | 2011-04-07 | Nagraid Security S.A. | Portable electronic device provided with an optical switch, in particular an electronic board |
FR2953619A1 (en) * | 2009-12-03 | 2011-06-10 | Uint | ACTIVATION AND INDICATION OF RF FIELD ON A DEVICE COMPRISING A CHIP. |
US9189725B2 (en) | 2009-12-03 | 2015-11-17 | Uint | Activation and indication of an RF field on a device including a chip |
FR2968802A1 (en) * | 2010-12-10 | 2012-06-15 | St Microelectronics Rousset | CONTACTLESS COMMUNICATION WITH HUMAN CONTACT AUTHORIZATION AND VISUAL INDICATOR |
FR2968803A1 (en) * | 2010-12-10 | 2012-06-15 | St Microelectronics Rousset | Electromagnetic transponder e.g. dual integrated circuit card, for contactless exchanging of protected data with reader for bank card, has electric circuit switched from one state to another state when resonant circuit is powered by reader |
WO2012143039A1 (en) * | 2011-04-18 | 2012-10-26 | C-Sigma S.R.L. | Authentication device with photosensitive input keys |
US11652916B1 (en) | 2012-11-02 | 2023-05-16 | W74 Technology, Llc | Screen interface for a mobile device apparatus |
US11343370B1 (en) | 2012-11-02 | 2022-05-24 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
US11431834B1 (en) | 2013-01-10 | 2022-08-30 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
RU2666100C2 (en) * | 2013-03-15 | 2018-09-05 | Олтриа Клайент Сервисиз Ллк | Electronic smoking article |
US10977716B2 (en) | 2014-03-31 | 2021-04-13 | Monticello Enterprises LLC | System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service |
US10650443B2 (en) | 2014-03-31 | 2020-05-12 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
US11836784B2 (en) | 2014-03-31 | 2023-12-05 | Monticello Enterprises LLC | System and method for providing a search entity-based payment process |
US11669884B2 (en) | 2014-03-31 | 2023-06-06 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
US11468497B2 (en) | 2014-03-31 | 2022-10-11 | Monticello Enterprises LLC | System and method for receiving data at a merchant device from a user device over a wireless link |
US11461828B2 (en) | 2014-03-31 | 2022-10-04 | Monticello Enterprises LLC | System and method for receiving data at a merchant device from a user device over a wireless link |
US11282131B2 (en) | 2014-03-31 | 2022-03-22 | Monticello Enterprises LLC | User device enabling access to payment information in response to user input |
US11074640B2 (en) | 2014-03-31 | 2021-07-27 | Monticello Enterprises LLC | System and method for providing a universal shopping cart across multiple search platforms |
US10825079B2 (en) | 2014-03-31 | 2020-11-03 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
US10769717B2 (en) | 2014-03-31 | 2020-09-08 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
US9299072B2 (en) | 2014-05-29 | 2016-03-29 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
WO2015183412A1 (en) * | 2014-05-29 | 2015-12-03 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US10699262B2 (en) | 2014-05-29 | 2020-06-30 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US10489769B2 (en) | 2014-05-29 | 2019-11-26 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US11922408B2 (en) | 2014-05-29 | 2024-03-05 | Apple Inc. | Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device |
US10977642B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
US9864984B2 (en) | 2014-05-29 | 2018-01-09 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
US11017384B2 (en) | 2014-05-29 | 2021-05-25 | Apple Inc. | Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device |
KR101831351B1 (en) | 2014-05-29 | 2018-02-22 | 애플 인크. | User device enabling access to payment information in response to mechanical input detection |
US10289996B2 (en) | 2014-05-29 | 2019-05-14 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
US10223682B2 (en) | 2014-05-29 | 2019-03-05 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US9400977B2 (en) | 2014-05-29 | 2016-07-26 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US9965658B2 (en) | 2015-06-16 | 2018-05-08 | Motorola Mobility Llc | Person-centric activation of radio frequency identification (RFID) tag |
EP3107042A1 (en) * | 2015-06-16 | 2016-12-21 | Motorola Mobility LLC | Person-centric activation of radio frequency identification (rfid) tag |
DE102016110532B4 (en) | 2015-06-16 | 2019-10-17 | Motorola Mobility Llc | Person-centered activation of a radio-frequency identification tag (RFID tag) |
DE102015010458A1 (en) | 2015-08-11 | 2017-02-16 | Giesecke & Devrient Gmbh | Portable data carrier, in particular chip card |
WO2017025187A1 (en) * | 2015-08-11 | 2017-02-16 | Giesecke & Devrient Gmbh | Portable data carrier, in particular a chip card |
WO2020076941A1 (en) * | 2018-10-12 | 2020-04-16 | Kirkeby Cynthia Fascenelli | Secure wireless data devices and methods of use |
DE102019133836A1 (en) * | 2019-12-10 | 2021-06-10 | Bayerische Motoren Werke Aktiengesellschaft | Check card-shaped device and method for activating data transmission of a check card-shaped device |
EP4106212A1 (en) * | 2021-06-11 | 2022-12-21 | Tenvirk Spólka Z Ograniczona Odpowiedzialnoscia | A method of short-range data transmission between a portable electronic device for storage and short-range data transmission and another device of this type or a stationary device, and a portable electronic device for storage and short-range data transmission |
FR3132581A1 (en) * | 2022-02-09 | 2023-08-11 | Stmicroelectronics (Rousset) Sas | Contactless communication device |
Also Published As
Publication number | Publication date |
---|---|
GB0323165D0 (en) | 2003-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2407189A (en) | Preventing unauthorised access to a contact-less smart card | |
US6021494A (en) | Electronic micro identification circuit that is inherently bonded to someone or something | |
ATE125054T1 (en) | SYSTEM FOR SECURE DATA EXCHANGE. | |
CA2668333C (en) | Device for protecting contactless communication objects against fraud | |
US8550360B2 (en) | Peripheral security device built into a contactless object in the form of secure document equipped with a radiofrequency device | |
US7911355B2 (en) | Apparatus for storing and wirelessly transmitting data | |
US20040124248A1 (en) | Methods and apparatus for wireless RFID cardholder signature and data entry | |
EP2717552A1 (en) | A portable proximity wireless communication device | |
US11281871B2 (en) | Protection of personal data contained on an RFID-enabled device | |
JPWO2002086808A1 (en) | Information protection system and information protection method | |
CN108763993A (en) | The noninductive control methods of RFID based on range sensor, apparatus and system | |
US20160057627A1 (en) | Method and Apparatus for Preventing Concealed, Unauthorized Wireless Data Access | |
CN108765671A (en) | The noninductive control methods of RFID based on trigger switch, apparatus and system | |
CN208314887U (en) | The noninductive control device of RFID and system based on trigger switch | |
US20200387765A1 (en) | Security Measures in Relation to Data Tags and Contactless Cards | |
KR200433667Y1 (en) | A rfid terminal having a personal authentification device | |
WO2014169393A1 (en) | Security switch for an rfid token | |
JP2009110373A (en) | Non-contact ic card, card case, card reading device, and non-contact ic card system | |
GB2571301A (en) | Security of data tags | |
KR20130078056A (en) | Hi-speed rfid access gates system with surveillance features | |
WO2024035375A1 (en) | An identity access device consisting of at least two separate modules associated with each other to provide data communication | |
CN113661500A (en) | Switch button for contactless passive NFC and RFID devices | |
Grillmayer | Radio-Frequency Identification-Overview | |
TWM586389U (en) | Smart card with anti-fraudulent technique | |
Binu et al. | Mobile Phone Based Secured Electronic Payment System Using RFID Communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
COOA | Change in applicant's name or ownership of the application |
Owner name: VODAFONE GROUP PLC Free format text: FORMER APPLICANT(S): CRISP TELECOM LIMITED |
|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |