WO2004049246A1 - Jamming device against rfid smart tag systems - Google Patents

Jamming device against rfid smart tag systems Download PDF

Info

Publication number
WO2004049246A1
WO2004049246A1 PCT/US2003/021827 US0321827W WO2004049246A1 WO 2004049246 A1 WO2004049246 A1 WO 2004049246A1 US 0321827 W US0321827 W US 0321827W WO 2004049246 A1 WO2004049246 A1 WO 2004049246A1
Authority
WO
WIPO (PCT)
Prior art keywords
rfid
jamming
signal
active
scanner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2003/021827
Other languages
English (en)
French (fr)
Inventor
Walter C. Reade
Daniel L. Ellingson
Jeff Lindsay
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kimberly Clark Worldwide Inc
Kimberly Clark Corp
Original Assignee
Kimberly Clark Worldwide Inc
Kimberly Clark Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kimberly Clark Worldwide Inc, Kimberly Clark Corp filed Critical Kimberly Clark Worldwide Inc
Priority to CA002505413A priority Critical patent/CA2505413A1/en
Priority to JP2004555275A priority patent/JP4339261B2/ja
Priority to MXPA05004837A priority patent/MXPA05004837A/es
Priority to AU2003249180A priority patent/AU2003249180A1/en
Priority to DE60328224T priority patent/DE60328224D1/de
Priority to EP03811998A priority patent/EP1579381B1/en
Publication of WO2004049246A1 publication Critical patent/WO2004049246A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10366Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
    • G06K7/10376Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications the interrogation device being adapted for being moveable
    • G06K7/10386Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications the interrogation device being adapted for being moveable the interrogation device being of the portable or hand-handheld type, e.g. incorporated in ubiquitous hand-held devices such as PDA or mobile phone, or in the form of a portable dedicated RFID reader
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/65Jamming involving special techniques using deceptive jamming or spoofing, e.g. transmission of false signals for premature triggering of RCIED, for forced connection or disconnection to/from a network or for generation of dummy target signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/68Jamming involving special techniques using passive jamming, e.g. by shielding or reflection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/86Jamming or countermeasure characterized by its function related to preventing deceptive jamming or unauthorized interrogation or access, e.g. WLAN access or RFID reading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/20Jamming or countermeasure used for a particular application for contactless carriers, e.g. RFID carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/30Jamming or countermeasure characterized by the infrastructure components
    • H04K2203/34Jamming or countermeasure characterized by the infrastructure components involving multiple cooperating jammers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/42Jamming having variable characteristics characterized by the control of the jamming frequency or wavelength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/43Jamming having variable characteristics characterized by the control of the jamming power, signal-to-noise ratio or geographic coverage area
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/44Jamming having variable characteristics characterized by the control of the jamming waveform or modulation type
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/45Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"

Definitions

  • the present invention relates generally to the field of RFID technology, and more particularly to a jamming device against RFID systems.
  • RFIDs Radio Frequency Identification Devices
  • RFIDs are low-cost, passive "smart” chips or “tags” that can be embedded in or attached to articles, products, and the like to convey information about the product via a scanner.
  • the smart tags are generally small label-like devices with a microchip and a miniature embedded antennae.
  • the tags may be passive or active, the active tags requiring an internal power supply.
  • a reader or scanner interrogates the smart tag with an electronic "trigger” signal.
  • the tag in turn generates an electromagnetic pulse response that is readable by the scanner, the response containing the product information.
  • RFID smart tags can be embedded in or attached to product packaging, or incorporated directly into the product, and may convey conventional "bar code” information, as well as other more detailed information.
  • RFID technology may be used to gather information related to consumer trends, purchasing habits, consumption rates, etc. It has also been suggested that RFID technology has promise in the areas of inventory control, manufacturing process and control, product accountability and tracking systems, etc. Manufacturers, shippers, and retailers may be able to follow a given product through their respective systems from initial production through to point of sale. It has been suggested that other applications may include shopping carts that automatically charge a bank account, refrigerators that tap into the Internet to automatically reorder items that are running low, and interactive televisions linked to such refrigerators that will feed targeted commercials and special offers to consumers. (See, "They Know What You Eat,” by Kayte VanScoy, Smart Business, January 2001 ).
  • RFID technology may provide benefits to the commercial sector, certain individuals may view particular uses of the technology as intrusive and an invasion of privacy. For example, some consumers refuse to use of "loyalty" cards at supermarkets even if a significant discount is offered because they object to the notion that their purchases are being tracked and analyzed. Such consumers may be less than enthused at the possibility that smart chips or tags embedded in their 5 clothing, for example, may disclose their purchasing habits or likes and dislikes when they walk past a smart tag scanner at the entrance of a store. Consumers may object to being selectively targeted by telemarketers or mass mailings based on the smart tagged products they purchased at a store.
  • the present invention relates to a novel implementation of jamming devices 10 . to inhibit unwanted intrusions of RFID technology.
  • the present invention provides a RFID technology jamming system and method to inhibit unwanted intrusions of RFID technology into an individual's personal life.
  • the device and method of the present invention is intended to prevent RFID smart tag systems from detecting and identifying products > purchased or worn by an individual, or otherwise associated with or belonging to 20 an individual.
  • a jamming device according to the invention includes means for inhibiting a smart chip RFID scanner or receiver from accurately receiving information from smart tags attached to or within the products associated with or belonging to the individual.
  • the jamming device comprises a passive 25 device.
  • the passive device may comprise a structure containing a large volume of RFID chips.
  • the chips When the chips are "excited" by a trigger excitation signal from a nearby scanner, the chips simultaneously generate an electromagnetic response pulse. The number of chips is so great that the scanner is overwhelmed by the response pulses and cannot read the multiple 30 responses rapidly enough and discriminate between these responses and any "legitimate" responses generated by any product smart tags.
  • one or more chips are used the emit lengthy codes (e.g. greater than about 500 bits of information) to confuse or overwhelm a scanner.
  • a conventional smart tag may transmit less than 600 bits of information, such as 128 bits or less
  • chips with a greater number of bits may be used, such as 1024 bits or 2048 bits, or bit lengths that are greater than about 1000 bits, 2000 bits, 4000 bits, 8000 bits, 16,000 bits, 64,000 bits, 100,000 bits, or in general equal to or greater than 2 N , where N is any integer greater than 10, such as 15, 17, 25, 31 , 63, or 100.
  • the number of bits in the code emitted by a chip is an odd number, to confuse a scanner seeking to read an even number of bits.
  • Odd bit lengths may be, for example, 31 or greater, 63 or greater, 127 or greater, 1001 or greater, and the like.
  • the odd number of bits can be expressed as 2 N + M, where N is any integer equal to or greater than 3, such as 6 or greater, 7 or greater, 8 or greater, 9 or greater, or 10 or greater, and M is a positive or negative odd integer such as plus or minus any of the following: 1 , 3, 5, 7, 9, 11 , 13, 15, 17, and the like, wherein the minimum bit length for odd-bit chips may be any of 3, 7, 13, 27, 31 , 63, or 121.
  • Any combination of active chips may be used.
  • a jamming device may comprise, for example, a mixture of over 100 96-bit chips, over 100 32-bit chips, over 100 128-bit chips. 10 512-bit chips, and 5 97-bit chips.
  • the structure containing the RFID jamming chips is not limited in any manner and, desirably, may be disguised as any type of item typically carried or worn by a consumer.
  • the structure may be configured to look like a cellular telephone, pager, camera, or the like.
  • the passive jamming device may have a size so as to fit within a pocket, purse, briefcase, backpack, belt, pen, button on an item of clothing, a shirt label, a shoe, a dental filling, a wristwatch, and so forth. Ways in which to hide or disguise the passive jamming device will be readily apparent to those of skill in the art.
  • the jamming device comprises an active device.
  • a self-powered RFID transmitter generates random RFID signals in the presence of an RFID scanner.
  • the random RFID frequency signals will have a scrambling effect on the RFID receiver, thereby essentially rendering the receiver ineffective and unable to detect product smart tag signals associated with the individual.
  • the active RFID jammer may be a spot jammer transmitting at select frequencies.
  • the jamming frequencies may be shifted randomly or in a "sweep" sequence controlled by a microprocessor including an ASIC (Application Specific Integrated Circuit).
  • the signal strength of the active chip is much greater than the significant strength of the smart tags that are to be masked by the jamming device.
  • the degree of signal amplification required to mask a weaker smart tag signal may be determined by routine experimentation, but in one embodiment, the rms, amplitude of the active chip's signal may be about 50 times as strong or greater, more specifically about 100 times as strong or greater, and most specifically about 500 times as strong or greater, than the signal strength of a smart tag to be masked, when measured with a conventional scanner at a distance of, 10 centimeters..
  • an active device is used the emits a significant of rapidly changing length or a continuous signal with no readily discernible bit length.
  • Active chips can also be used in combination with passive chips. For example, an active chips that emits random signals and an active chips that emits a continuous signal may be combined with a mixture of passive chips of various bit lengths.
  • Signals from active devices can also be fleeting, such that the signal does not last long enough to be accurately read by the scanner in order to confuse it, yet long enough to repeatedly divert the "attention" of the scanner away from weaker smart tag signals that are to be jammed by the device.
  • an active jamming device may emit signals at more than one frequency to confuse a scanner.
  • a rapid sequence of alternating frequencies may be used, or the device can provide two or more simultaneous frequencies such as 2.48 GHz and 13.56 MHz, or a simultaneous burst of two or more frequencies or many frequencies (e.g., a wide band signal).
  • the active RFID jamming device may be essentially an RFID receiver/transmitter that includes RFID scanning circuitry to detect RFID signals from either the smart tags or RFID scanner For example, when an individual comes within range of an RFID scanner, any product smart tags associated with the individual will be induced by an excitation signal from the scanner to generate a product identification response signal.
  • the jamming device may also detect the smart signals from the tags or the RF signal from the scanner, and transmit a jamming RF signal at a frequency or band to jam the RFID scanner.
  • the jamming signal may simply be RF noise, and in another embodiment the jamming signal may be a "smart" modulated signal conveying false information, the modulated signals being similar to but distinctly different from the legitimate product smart tag signals.
  • the active versions of the smart tag jammer may transmit continuously or only in the presence of a scanner in which they are intended to jam.
  • the active transmitters may include detection circuitry that activates the jamming device upon detecting an excitation source or signal from an RFID scanner or from the smart tags.
  • the jamming device may include an alert or alarm to indicate to the individual that they or their products are within range of an RFID scanner.
  • the active jamming devices may be disguised as any typical consumer product, such as an electronic product, and the like, or may be of a size so as to fit discretely within a pocket, purse, briefcase, backpack, and the like.
  • the jamming device can be activated or deactivated at the will of the user to prevent others from scanning smart tags except under certain circumstances. For example, some users of smart cards containing personal and financial information may fear that others may use scanners to obtain their personal information (e.g., account numbers and access codes). Such smart cards can be protected with a jamming device that is turned off when the smart card is to be used by a legitimate scanner. Active jamming devices may simply have the power turned off or disconnected.
  • Passive jamming devices may employ antennas that can be disabled or disconnected by actions such as squeezing or bending a flexible card, pulling a tab, pressing a button, and the like, or the passive jamming device may be shielded by a Faraday cage, a metal cover, or a layer of dense material such as concrete, or may simply be removed from the presence of the smart card or other objects comprising smart tags when the user wishes to allow the smart tags to be scanned.
  • an automated teller at a bank adapted to read smart tags in a smart card may be equipped with a shielding device into which a jamming device can be temporarily placed to prevent jamming, or there may be removal means such as a pneumatic tube or conveyor system to momentarily allow the jamming device to be carried a distance away from a smart tag reader to prevent jamming. Additional aspects of the present methodology and system will be described below with reference to the figures.
  • Figure 1 is a graphic illustration of concepts according to a method and system of the invention.
  • Figure 2 is a graphic illustration of a passive RFID jamming device according to the invention.
  • FIG. 3 is a schematic block diagram of a representative active RFID jamming device according to the invention.
  • Conductive or passive micro memory chips (“smart tags”) 14 may consist of a microchip comprising silicon or other semiconductors, a coiled, etched, or stamped antennae, a capacitor, and a substrate on which the components are mounted or embedded. A protective covering is typically used to encapsulate and seal the substrate.
  • Inductive or passive smart tags have been introduced by Motorola under the name "BiStatix". A detailed description of the BiStatix device may be found in U.S. Patent No. 6,259,367 B1 , incorporated herein by reference in its entirety for all purposes.
  • Another commercial source of suitable smart tags is Alien Technology Corporation of Morgan Hill, California, under the technology name FSA (Fluidic Self-Assembly). With the FSA process, tiny semi-conductor devices are assembled into rolls of flexible plastic. The resulting “smart" substrate can be attached to or embedded in any variety of products.
  • the smart tag technology under development at the Auto-ID Center at Massachusetts Institute of Technology (Cambridge, Mass.) can also be used within the scope of the present invention.
  • RFID systems include those marketed by Microchip Technologies (Chandler, Arizona); the TCODE chips and readers of Philips Semiconductor (Eindhoven, The Netherlands); the RFID products of Sokymat (Lausanne, Switzerland); the TI*RFIDTM Systems and Tag ItTM chips of Texas Instruments (Dallas, Texas); and the products of Gempius (Gemenos, France), Nedap (Groenlo, The Netherlands), Checkpoint Systems Inc. (Miami, Florida), and Omron Company (Tokyo, Japan).
  • High frequency bands can be used, exemplified by the 2.45 GHz products of SCS Corporation (Rancho Bernardo, California.
  • a related technology within the scope of the present invention is Surface Acoustic Wave (SAW) technology.
  • SAW Surface Acoustic Wave
  • InfoRay Cambridge, Massachusetts markets a passive smart tag that is said to achieve long ranges (up to 30 meters) using a Surface Acoustic Wave (SAW) device.
  • SAW Surface Acoustic Wave
  • the SAW device converts a radio signal to an acoustic wave, modulates it with an ID code, then transforms it to another radio signal that is emitted by the smart tag and read by a scanner.
  • the ID code of the smart tag is extracted from the radio signal.
  • the scanner is said to compare the spectral content of the signal with a database of signatures and to derive the ID code. This method enables a read range of up to 30 m (typical 10-20 m).
  • the system can operate in the 915MHz band and 2.45GHz band.
  • RFSAW, Inc. (Dallas, Texas) also provides minute Surface Acoustic Wave (SAW) RFID devices that can be used within the scope of the present invention.
  • SAW Surface Acoustic Wave
  • Smart tags can include read-write systems or write-only systems.
  • An embedded antennae within the smart tags 14 can be a useful component of the device, though it is recognized that alternatives to antennas may exist in some applications.
  • the smart tag need not comprise an antenna but the metallic object itself can serve as the antenna.
  • An excitation trigger signal 18 from a RFID scanner 16 must be received by the antennae to "activate" the smart tag 14.
  • the received excitation signal 18 is the power source for the smart tag 14 and results in the generation of an electromagnetic pulse containing a coded product information signal 20.
  • a detailed description of RFID smart tag antennas and technology may also be found in U.S. Patent No. 6,320,556 B1 , incorporated herein by reference for all purposes.
  • an RFID scanner For commercial applications, an RFID scanner must be able to read multiple signals from a plurality of smart tags and to discriminate and focus only on the signals of interest.
  • the problem of RFID scanners encountering multiple signals has been recognized in the art.
  • Anti-collision algorithms may be used to sort through multiple signals, but such systems have limitations. It is unlikely that RFID scanners can be reasonably equipped to process large numbers of simultaneous RFID signals, such as about 1 ,000 or more, or 10,000 or more simultaneous signals. It is also unlikely from a commercial feasibility standpoint to equip RFID scanners with processing circuitry necessary to effectively handle the complexities created by active signal jamming that confuses the scanner with transient random signals, spot frequency jamming, or broadband barrage jamming.
  • FIG. 1 graphically illustrates a typical smart tag detection system wherein smart tags 14 are attached or embedded in any manner of articles 12.
  • a smart tag scanner 16 is disposed at a location to detect and interrogate products associated with smart tags 14 coming within range of the scanner 16.
  • the scanner 16 may be disposed at the exit or entrance to a store, departments within the store, checkout counters, etc.
  • the scanner 16 is disposed so as to detect the types of products or articles a consumer has purchased in a particular department, or is actually wearing in the case of embedded smart tags 14 in the consumer's clothes, etc.
  • the scanner 16 may be operationally configured with any manner of computer network (graphically illustrated as computer 20) wherein the received and decoded product information signals are processed and analyzed for any number of reasons. Still referring to Fig. 1 , the consumer may carry on their person a jamming device 30 in accordance with the present invention to inhibit the scanner 16 from effectively detecting smart tags 14 in any products purchased or otherwise associated with the consumer.
  • Fig. 2 is a graphic representation of a passive RFID jamming device 30 in accordance with the teachings of the invention.
  • the device 30 may be disguised as any conventional item or article that is typically and inconspicuously associated with consumers.
  • the device 30 includes a structure 28 disguised as a conventional cellular telephone. This is for illustrative purposes only.
  • the structure 28 may be disguised, for example, as any manner of consumer electronic item, such as a pager, camera, personal CD player, radio, etc. In an alternate embodiment, it is not necessary that the scanner 30 actually be visible.
  • the jamming device 30 may be of a size and proportion so as to discretely fit within the individual's pocket, purse, briefcase, backpack, and the like.
  • the structure 28 defines an interior volume in which a plurality of RFID chips 32 are stored.
  • the number of chips may vary, but should be great enough so as to generate a sufficient number of random RFID signals to overwhelm the RFID scanner 16.
  • the number of chips and signals will obviously vary depending on the type of RFID system and such number may be empirically determined.
  • the present inventors contemplate that 10,000 or greater chips may be sufficient to render current RFID scanner technology ineffective. However, it should be recognized that this number may be greater or larger depending on the RFID system.
  • the scanner's excitation trigger signals 18 "excite” or activate the plurality of jamming chips 32 causing each chip 32 to transmit an electromagnetic pulse signal 20.
  • the plurality of pulse signals 20 are received by the scanner 16 and are of such a large number so as to prevent the scanner 16 from effectively detecting or recognizing legitimate product information signals 20 transmitted by any product associated smart tags 14.
  • the jamming or inhibiting means used in the jammer 30 may comprise an active device.
  • the system system - RFID tag and the scanner
  • the RFID tags transmit at different times. This is accomplished by having each tag, after being activated, generate a random number and then count down from the random number to zero before transmitting data. Theoretically, the tags would use different random numbers and thus would transmit at different times.
  • a transmitter may be used to transmit RF "garbage" over the detected RF envelope (or frequency spectrum used by various RFID systems) as soon as a RF field transmitted by either a scanner or an RFID tag is detected.
  • the jamming transmitter would transmit for a set period of time.
  • At least one signal from the jamming device is delayed relative to the trigger signal sent by the scanner.
  • the lag time between the trigger signal and the delayed returned signal can vary automatically in length.
  • Capacitors and other known devices can be used with passive jamming devices to delay the returned signal.
  • a carrier frequency is generated by a carrier frequency generator A which may be, for example, a crystal oscillator clock signal generator.
  • the counter value may be programmable to allow jamming at random frequencies.
  • a counter value generated by a random number generator would jam at random frequencies.
  • the counter value may be programmed to jam at all frequencies by sweeping the jammer signal (stepping up or down in sequence).
  • the jammer may include an Application Specific Integrated Circuit (ASIC) microprocessor E that is activated by a signal from an envelope detector G.
  • ASIC Application Specific Integrated Circuit
  • the ASIC would then generate random numbers which would be used as the counter values for the counter B.
  • the random numbers would have a maximum and minimum value. For example, if one wanted to jam over a frequency spectrum of 300 KHz to 50 KHz, the random numbers would be between 13 and 80. A short delay would be required between the reprogramming of the counter value to allow for transmitting the jamming signal.
  • the ASIC E would also provide the modulation information to a modulator C (if incorporated in the circuit). As mentioned, another effective jamming method would be to just "sweep" the frequency spectrum of interest.
  • the counter value is sequentially decremented or incremented (after a short delay). For example, for a 4MHz clock (to jam from 50 kHz to 300 kHz), the counter may be started at 13 and increase by a "step value" until the upper counter value limit (for this example, 80) is reached. The process then repeats over and over.
  • a modulator C may be provided in a more sophisticated jamming circuit. Modulation may be provided to generate "false information", and not just “jam” the RFID scanner.
  • An envelope detector G may be provided to trigger the ASIC E upon receiving a signal for either the RFID tag or the RFID scanner.
  • a carrier signal amplifier D is provided to sufficiently boost the jamming signal to a desired level prior to transmission.
  • An antenna F is provided to receive a detected RFID tag or scanner signal, and to subsequently transmit the jamming signal.
  • the antenna F should be capable of transmitting a signal of sufficient strength over the frequency spectrum that one wishes to jam.
  • Such antenna would be tuned to the center frequency of the spectrum and would be used for transmitting and receiving. For example, if one wished to jam over a spectrum of 100 kHz to 150 kHz, the antenna would be tuned to 125 kHz.
  • the RFID jamming device may also be capable of communicating with an external device through an interface H.
  • an external device could be used to reprogram firmware within the processor to add functionality or jamming features to be developed in the future.
  • the active jamming device 30 may also be disguised as any manner of conventional consumer good, such as an electronic article, and the like.
  • the active jamming device 30 may be of a size and configuration so as to discretely fit within an individual's pocket, purse, backpack, briefcase, or the like.
  • RFID jamming system and methodology according to the invention is not limited to any particular scenario.
  • the jamming device may be used wherever an individual desires to inhibit smart tag technology from intruding into the individual's private life.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Electromagnetism (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Burglar Alarm Systems (AREA)
  • Near-Field Transmission Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)
PCT/US2003/021827 2002-11-21 2003-07-10 Jamming device against rfid smart tag systems Ceased WO2004049246A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
CA002505413A CA2505413A1 (en) 2002-11-21 2003-07-10 Jamming device against rfid smart tag systems
JP2004555275A JP4339261B2 (ja) 2002-11-21 2003-07-10 Rfidスマートタグシステムに対する妨害装置
MXPA05004837A MXPA05004837A (es) 2002-11-21 2003-07-10 Dispositivo de atascamiento en contra de sistemas de etiquetas inteligentes de dispositivos de identificacion con frecuencia de radio.
AU2003249180A AU2003249180A1 (en) 2002-11-21 2003-07-10 Jamming device against rfid smart tag systems
DE60328224T DE60328224D1 (de) 2002-11-21 2003-07-10 Störeinrichtung gegen intelligente rfid-etikettensysteme
EP03811998A EP1579381B1 (en) 2002-11-21 2003-07-10 Jamming device against rfid smart tag systems

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/301,549 US7221900B2 (en) 2002-11-21 2002-11-21 Jamming device against RFID smart tag systems
US10/301,549 2002-11-21

Publications (1)

Publication Number Publication Date
WO2004049246A1 true WO2004049246A1 (en) 2004-06-10

Family

ID=32324556

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/021827 Ceased WO2004049246A1 (en) 2002-11-21 2003-07-10 Jamming device against rfid smart tag systems

Country Status (10)

Country Link
US (1) US7221900B2 (https=)
EP (2) EP2065838A3 (https=)
JP (1) JP4339261B2 (https=)
KR (1) KR20050084664A (https=)
AU (1) AU2003249180A1 (https=)
CA (1) CA2505413A1 (https=)
DE (1) DE60328224D1 (https=)
MX (1) MXPA05004837A (https=)
WO (1) WO2004049246A1 (https=)
ZA (1) ZA200503648B (https=)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005052846A3 (en) * 2003-11-27 2005-10-20 Koninkl Philips Electronics Nv Jammer for jamming the readout of contactless data carriers
JP2008515260A (ja) * 2004-09-27 2008-05-08 コミツサリア タ レネルジー アトミーク 非接触プライバシー保護機器
US8366035B2 (en) 2005-12-07 2013-02-05 Sca Hygiene Products Ab Supply package having support element with RFID
EP4547014A1 (de) 2022-06-28 2025-05-07 Thomas Prosser Ergänzendes zugangskontrollsystem für eine rfid-gesteuerte katzenklappe und verfahren zur ergänzenden kontrolle des zugangs durch eine rfid-gesteuerte katzenklappe

Families Citing this family (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6970070B2 (en) * 2003-05-08 2005-11-29 Rsa Security Inc. Method and apparatus for selective blocking of radio frequency identification devices
US20050057424A1 (en) * 2003-07-10 2005-03-17 Vesa Kukko Planar antenna
JP4666451B2 (ja) * 2003-08-19 2011-04-06 三菱電機株式会社 識別タグシステム
US20050058292A1 (en) * 2003-09-11 2005-03-17 Impinj, Inc., A Delaware Corporation Secure two-way RFID communications
US7327802B2 (en) * 2004-03-19 2008-02-05 Sirit Technologies Inc. Method and apparatus for canceling the transmitted signal in a homodyne duplex transceiver
US7088248B2 (en) * 2004-03-24 2006-08-08 Avery Dennison Corporation System and method for selectively reading RFID devices
US7920050B2 (en) * 2004-07-29 2011-04-05 Emc Corporation Proxy device for enhanced privacy in an RFID system
WO2006015145A2 (en) * 2004-07-29 2006-02-09 Rsa Security Inc. Methods and apparatus for rfid device authentication
JP4682582B2 (ja) * 2004-10-27 2011-05-11 ヤマハ株式会社 Rfidタグ読取報知装置、収容装置およびrfidタグ読取報知シート
GB2419781A (en) * 2004-10-29 2006-05-03 Hewlett Packard Development Co Packaging of a transponder device
TWI260549B (en) * 2004-12-14 2006-08-21 Ind Tech Res Inst Electronic tag reading design method concealing partial information
US7086587B2 (en) * 2004-12-16 2006-08-08 International Business Machines Corporation Anti-tracking system to ensure consumer privacy
US8624740B2 (en) * 2005-02-04 2014-01-07 Philip Morris Usa Inc. Controllable RFID card
US7429984B2 (en) * 2005-02-04 2008-09-30 Philip Morris Usa Inc. Display management system
WO2006087503A1 (en) * 2005-02-15 2006-08-24 Vodafone Group Plc Improved security for wireless communication
KR100783084B1 (ko) * 2005-04-28 2007-12-11 이지현 보안장치를 가지는 무선주파수인식 시스템 및 그 제어 방법
US20060273176A1 (en) * 2005-06-03 2006-12-07 Actividentity, Inc. Blocking contactless personal security device
FR2888652B1 (fr) * 2005-07-18 2007-10-12 Oberthur Card Syst Sa Procede et dispositif de securisation active pour dispositif electronique sans contact
US8102243B2 (en) * 2005-10-31 2012-01-24 Curio Ltd. RFID protection device, and related methods
US7889056B2 (en) * 2005-10-31 2011-02-15 Curio, Ltd. RFID protection system, device, combination, and related methods
US8378786B2 (en) * 2006-02-03 2013-02-19 Emc Corporation Security provision in standards-compliant RFID systems
US7612675B2 (en) * 2006-02-14 2009-11-03 Miller Ronald N RFID—sensor system for lateral discrimination
US8226003B2 (en) 2006-04-27 2012-07-24 Sirit Inc. Adjusting parameters associated with leakage signals
US7887755B2 (en) * 2006-09-20 2011-02-15 Binforma Group Limited Liability Company Packaging closures integrated with disposable RFID devices
US7684751B2 (en) * 2006-09-26 2010-03-23 Intel Corporation Radio frequency identification apparatus, system and method adapted for self-jammer cancellation
FR2908205B1 (fr) * 2006-11-03 2009-02-27 Xiring Sa Dispositif de protection contre la fraude des objets de communication sans contact
WO2008062331A2 (en) * 2006-11-23 2008-05-29 International Business Machines Corporation Privacy method, device and computer program
US7612671B2 (en) * 2006-11-29 2009-11-03 Motorola, Inc. Attachment device, attachment receiving device and system for identifying secured containers
FR2914518B1 (fr) * 2007-03-27 2009-05-01 Commissariat Energie Atomique Systeme de communication securisee entre un lecteur de carte sans contact et une carte.
US20080246611A1 (en) * 2007-04-04 2008-10-09 John King Method and apparatus for detecting the presence of rfid devices and modifying the same
US8248212B2 (en) 2007-05-24 2012-08-21 Sirit Inc. Pipelining processes in a RF reader
EP2186210A4 (en) * 2007-08-08 2014-04-30 Radeum Inc CLOSE-UP COMMUNICATION SYSTEM WITH INCREASED SAFETY
CA2700991A1 (en) * 2007-09-26 2009-04-02 Radeum, Inc. Dba Freelinc System and method for near field communications having local security
US8427316B2 (en) 2008-03-20 2013-04-23 3M Innovative Properties Company Detecting tampered with radio frequency identification tags
US8446256B2 (en) * 2008-05-19 2013-05-21 Sirit Technologies Inc. Multiplexing radio frequency signals
US8169312B2 (en) * 2009-01-09 2012-05-01 Sirit Inc. Determining speeds of radio frequency tags
US8113435B2 (en) * 2009-01-28 2012-02-14 Cubic Corporation Card reader
US9509436B2 (en) 2009-01-29 2016-11-29 Cubic Corporation Protection of near-field communication exchanges
US8350668B2 (en) * 2009-01-29 2013-01-08 Cubic Corporation Smartcard protocol transmitter
US20100289623A1 (en) * 2009-05-13 2010-11-18 Roesner Bruce B Interrogating radio frequency identification (rfid) tags
US8416079B2 (en) * 2009-06-02 2013-04-09 3M Innovative Properties Company Switching radio frequency identification (RFID) tags
US20110205025A1 (en) * 2010-02-23 2011-08-25 Sirit Technologies Inc. Converting between different radio frequencies
US20180163325A1 (en) 2016-12-09 2018-06-14 Robert Wayne Glenn, Jr. Dissolvable fibrous web structure article comprising active agents
CN103025930B (zh) 2010-07-02 2014-11-12 宝洁公司 递送活性剂的方法
MX345025B (es) 2010-07-02 2017-01-12 Procter & Gamble Producto detergente.
BR112013000101A2 (pt) 2010-07-02 2016-05-17 Procter & Gamble filamentos compreendendo mantas de não tecido com agente ativo e métodos de fabricação dos mesmos
US9094057B2 (en) 2010-08-25 2015-07-28 Qualcomm Incorporated Parasitic circuit for device protection
US8723649B2 (en) * 2011-02-15 2014-05-13 Raytheon Company Antenna for protecting radio frequency communications
US10062025B2 (en) 2012-03-09 2018-08-28 Neology, Inc. Switchable RFID tag
US9129200B2 (en) * 2012-10-30 2015-09-08 Raytheon Corporation Protection system for radio frequency communications
US9135548B2 (en) 2012-11-29 2015-09-15 Paypal, Inc. Portable mechanical switch for selective deactivation of radio frequency identification circuits
WO2014085862A1 (en) 2012-12-05 2014-06-12 Harris Teece Pty Ltd Inhibiting unauthorised contactless reading of a contactless readable object
EP2987119A1 (en) 2013-04-19 2016-02-24 Curio, Ltd Rfid disruption device and related methods
US20150002273A1 (en) * 2013-06-28 2015-01-01 Hand Held Products, Inc. Rfid tag blocking
US11308462B2 (en) 2014-05-13 2022-04-19 Clear Token Inc Secure electronic payment
US10128890B2 (en) * 2014-09-09 2018-11-13 Ppip Llc Privacy and security systems and methods of use
US10587360B2 (en) 2016-02-26 2020-03-10 Hewlett Packard Enterprise Development Lp Device privacy protection
JP6882519B2 (ja) 2017-01-27 2021-06-02 ザ プロクター アンド ギャンブル カンパニーThe Procter & Gamble Company 発泡性凝集粒子を含む溶解性固形構造体形態の組成物
MX380853B (es) 2017-01-27 2025-03-12 Procter & Gamble Composiciones en la forma de estructuras solidas solubles
US10423811B2 (en) * 2017-03-29 2019-09-24 Walmart Apollo, Llc Garment including RFID reader
WO2018213003A1 (en) 2017-05-16 2018-11-22 The Procter & Gamble Company Conditioning hair care compositions in the form of dissolvable solid structures
GB2568915A (en) * 2017-11-30 2019-06-05 Moran Humberto Reshaping interrogation range
CN108960359A (zh) * 2018-06-06 2018-12-07 北京银鞍技术有限公司 个人物品管理方法及系统
EP3954053A1 (en) 2019-04-11 2022-02-16 Nexite Ltd. Wireless dual-mode identification tag
US11551537B2 (en) 2019-04-11 2023-01-10 Nexite Ltd. Wireless dual-mode identification tag
MX2023001042A (es) 2020-07-31 2023-02-16 Procter & Gamble Bolsa fibrosa soluble en agua que contiene granulos para el cuidado del cabello.
RU200438U1 (ru) * 2020-08-04 2020-10-23 Общество с ограниченной ответственностью "Велтер" (ООО "Велтер") Устройство защиты информационного обмена при использовании персонального устройства инфокоммуникации
EP4275160B1 (en) 2021-01-11 2025-05-07 Nexite Ltd. Contactless and automatic operations of a retail store
WO2023034763A1 (en) 2021-08-30 2023-03-09 The Procter & Gamble Company Dissolvable solid structure comprising first and second polymeric structurants
CN114083913B (zh) * 2021-11-02 2022-09-16 珠海艾派克微电子有限公司 一种芯片、耗材盒及数据传输方法
EP4449301A1 (en) 2021-12-13 2024-10-23 Nexite Ltd. Systems, methods, and devices for contactless and automatic operation of retail stores
MX2024005474A (es) 2021-12-17 2024-05-22 Procter & Gamble Articulos de champu fibroso solido disoluble que contienen sales.
MX2024010903A (es) 2022-03-10 2024-09-17 Procter & Gamble Estructura solida disoluble que tiene primera y segunda capas.
FR3136912A1 (fr) * 2022-06-16 2023-12-22 Orange Procédés de surveillance et de gestion d’objets communicants, équipement de confiance, serveur et objets communicants

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE29714999U1 (de) * 1997-08-21 1997-10-09 Trebe Elektronik Gmbh & Co Kg Vorrichtung zum Schutz eines Transponders gegen unbefugtes Ablesen und/oder Löschen und/oder Überschreiben der Daten des Transponders
DE19742126A1 (de) * 1997-09-24 1999-03-25 Siemens Ag Tragbarer Datenträger mit Aktivierungsschalter
US5955969A (en) * 1997-04-09 1999-09-21 Texas Instruments Incorporated Method to prevent rouge transponder responses in automatic vehicle identification systems
US6037879A (en) * 1997-10-02 2000-03-14 Micron Technology, Inc. Wireless identification device, RFID device, and method of manufacturing wireless identification device
US6226619B1 (en) * 1998-10-29 2001-05-01 International Business Machines Corporation Method and system for preventing counterfeiting of high price wholesale and retail items
US20020070862A1 (en) * 2000-12-12 2002-06-13 Francis Robert C. Object tracking and management system and method using radio-frequency identification tags
US6429768B1 (en) * 1999-09-09 2002-08-06 Kenneth E. Flick Vehicle control system including transponder jammer and related methods
US6446049B1 (en) * 1996-10-25 2002-09-03 Pole/Zero Corporation Method and apparatus for transmitting a digital information signal and vending system incorporating same

Family Cites Families (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2885543A (en) * 1945-01-27 1959-05-05 Everard M Williams Automatic sweeping and jamming radio equipment
US4217550A (en) * 1962-09-28 1980-08-12 Blassel Pierre P Radio jamming device
US4656463A (en) 1983-04-21 1987-04-07 Intelli-Tech Corporation LIMIS systems, devices and methods
US5047614A (en) 1989-01-23 1991-09-10 Bianco James S Method and apparatus for computer-aided shopping
US5164707A (en) 1990-02-28 1992-11-17 Cabot Safety Corporation Detection system for safety equipment
US5361070B1 (en) 1993-04-12 2000-05-16 Univ California Ultra-wideband radar motion sensor
US5380991A (en) 1993-11-16 1995-01-10 Valencia; Luis Paperless coupon redemption system and method thereof
US5677927A (en) 1994-09-20 1997-10-14 Pulson Communications Corporation Ultrawide-band communication system and method
US5832035A (en) 1994-09-20 1998-11-03 Time Domain Corporation Fast locking mechanism for channelized ultrawide-band communications
US5687169A (en) 1995-04-27 1997-11-11 Time Domain Systems, Inc. Full duplex ultrawide-band communication system and method
US5606322A (en) * 1994-10-24 1997-02-25 Motorola, Inc. Divergent code generator and method
US6690796B1 (en) * 1995-05-17 2004-02-10 The Chamberlain Group, Inc. Rolling code security system
US5727153A (en) 1995-06-06 1998-03-10 Powell; Ken R. Retail store having a system of receiving electronic coupon information from a portable card and sending the received coupon information to other portable cards
US6272341B1 (en) * 1995-11-30 2001-08-07 Motient Services Inc. Network engineering/systems engineering system for mobile satellite communication system
US5918211A (en) 1996-05-30 1999-06-29 Retail Multimedia Corporation Method and apparatus for promoting products and influencing consumer purchasing decisions at the point-of-purchase
KR100199015B1 (ko) * 1996-11-25 1999-06-15 정선종 확장형 칼만 필터를 사용한 fm 복조장치
DE19653291C1 (de) * 1996-12-20 1998-04-02 Pepperl & Fuchs Sensor- und Auswertesystem, insbesondere für Doppelsensoren zur Endlagen- und Grenzwerterfassung
US6112052A (en) * 1997-01-29 2000-08-29 Northrop Grumman Corporation Remote controlled noise jamming device
WO1998042239A2 (en) 1997-03-25 1998-10-01 Luigi Fiordelisi Computerized shopping cart with storage and distribution system, for supermarket use
US5963134A (en) 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
US6409086B1 (en) 1997-08-08 2002-06-25 Symbol Technolgies, Inc. Terminal locking system
US6249227B1 (en) 1998-01-05 2001-06-19 Intermec Ip Corp. RFID integrated in electronic assets
US6362738B1 (en) 1998-04-16 2002-03-26 Motorola, Inc. Reader for use in a radio frequency identification system and method thereof
US5942978A (en) * 1998-04-24 1999-08-24 Sensormatic Electronics Corporation Wireless transmitter key for EAS tag detacher unit
US6123259A (en) 1998-04-30 2000-09-26 Fujitsu Limited Electronic shopping system including customer relocation recognition
US6640214B1 (en) 1999-01-16 2003-10-28 Symbol Technologies, Inc. Portable electronic terminal and data processing system
US6332128B1 (en) 1998-07-23 2001-12-18 Autogas Systems, Inc. System and method of providing multiple level discounts on cross-marketed products and discounting a price-per-unit-volume of gasoline
CN1293507C (zh) * 1998-08-14 2007-01-03 3M创新有限公司 射频识别系统的应用
AU5916799A (en) 1998-09-11 2000-04-03 Key-Trak, Inc. Object tracking system with non-contact object detection and identification
EP1049042A1 (en) 1999-04-28 2000-11-02 The Procter & Gamble Company Storage system
WO2000077704A2 (en) * 1999-06-11 2000-12-21 Creative Golf Designs, Inc. Inventory control system
US6177903B1 (en) 1999-06-14 2001-01-23 Time Domain Corporation System and method for intrusion detection using a time domain radar array
US6218979B1 (en) 1999-06-14 2001-04-17 Time Domain Corporation Wide area time domain radar array
US6693511B1 (en) 1999-09-24 2004-02-17 Ge Interlogix, Inc. System and method for communicating with dormant radio frequency identification tags
US6259367B1 (en) 1999-09-28 2001-07-10 Elliot S. Klein Lost and found system and method
US7933780B2 (en) * 1999-10-22 2011-04-26 Telaric, Llc Method and apparatus for controlling an infusion pump or the like
US6354493B1 (en) 1999-12-23 2002-03-12 Sensormatic Electronics Corporation System and method for finding a specific RFID tagged article located in a plurality of RFID tagged articles
US6320556B1 (en) 2000-01-19 2001-11-20 Moore North America, Inc. RFID foil or film antennas
US6497656B1 (en) 2000-02-08 2002-12-24 General Electric Company Integrated wireless broadband communications network
US6587835B1 (en) 2000-02-09 2003-07-01 G. Victor Treyz Shopping assistance with handheld computing device
US6451154B1 (en) 2000-02-18 2002-09-17 Moore North America, Inc. RFID manufacturing concepts
AU2001245733A1 (en) 2000-03-15 2001-09-24 International Paper Controlled remote product internet access and distribution
SE522000C2 (sv) 2000-08-18 2004-01-07 Rutger Roseen Förfarande och anordning för att hålla reda på lagringstiden för i ett utrymme förvarade varor
JP2002163722A (ja) 2000-11-29 2002-06-07 Kojima Co Ltd 商品販売管理方法および装置ならびに携帯端末
US6951596B2 (en) * 2002-01-18 2005-10-04 Avery Dennison Corporation RFID label technique
US6491217B2 (en) 2001-03-31 2002-12-10 Koninklijke Philips Electronics N.V. Machine readable label reader system with versatile response selection
US6758397B2 (en) 2001-03-31 2004-07-06 Koninklijke Philips Electronics N.V. Machine readable label reader system for articles with changeable status
US6694177B2 (en) 2001-04-23 2004-02-17 Cardionet, Inc. Control of data transmission between a remote monitoring unit and a central unit
US6942155B1 (en) * 2001-05-31 2005-09-13 Alien Technology Corporation Integrated circuits with persistent data storage
US6707381B1 (en) 2001-06-26 2004-03-16 Key-Trak, Inc. Object tracking method and system with object identification and verification
US7809087B2 (en) * 2002-04-26 2010-10-05 Qualcomm, Incorporated Power detection techniques and discrete gain state selection for wireless networking
US6707376B1 (en) 2002-08-09 2004-03-16 Sensormatic Electronics Corporation Pulsed power method for increased read range for a radio frequency identification reader

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6446049B1 (en) * 1996-10-25 2002-09-03 Pole/Zero Corporation Method and apparatus for transmitting a digital information signal and vending system incorporating same
US5955969A (en) * 1997-04-09 1999-09-21 Texas Instruments Incorporated Method to prevent rouge transponder responses in automatic vehicle identification systems
DE29714999U1 (de) * 1997-08-21 1997-10-09 Trebe Elektronik Gmbh & Co Kg Vorrichtung zum Schutz eines Transponders gegen unbefugtes Ablesen und/oder Löschen und/oder Überschreiben der Daten des Transponders
DE19742126A1 (de) * 1997-09-24 1999-03-25 Siemens Ag Tragbarer Datenträger mit Aktivierungsschalter
US6037879A (en) * 1997-10-02 2000-03-14 Micron Technology, Inc. Wireless identification device, RFID device, and method of manufacturing wireless identification device
US6226619B1 (en) * 1998-10-29 2001-05-01 International Business Machines Corporation Method and system for preventing counterfeiting of high price wholesale and retail items
US6429768B1 (en) * 1999-09-09 2002-08-06 Kenneth E. Flick Vehicle control system including transponder jammer and related methods
US20020070862A1 (en) * 2000-12-12 2002-06-13 Francis Robert C. Object tracking and management system and method using radio-frequency identification tags

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005052846A3 (en) * 2003-11-27 2005-10-20 Koninkl Philips Electronics Nv Jammer for jamming the readout of contactless data carriers
JP2008515260A (ja) * 2004-09-27 2008-05-08 コミツサリア タ レネルジー アトミーク 非接触プライバシー保護機器
US8022810B2 (en) 2004-09-27 2011-09-20 Commissariat A L'energie Atomique Contactless privacy protection device
US8366035B2 (en) 2005-12-07 2013-02-05 Sca Hygiene Products Ab Supply package having support element with RFID
US8789787B2 (en) 2005-12-07 2014-07-29 Sca Hygiene Products Ab Supply package having support element with RFID
EP4547014A1 (de) 2022-06-28 2025-05-07 Thomas Prosser Ergänzendes zugangskontrollsystem für eine rfid-gesteuerte katzenklappe und verfahren zur ergänzenden kontrolle des zugangs durch eine rfid-gesteuerte katzenklappe

Also Published As

Publication number Publication date
JP4339261B2 (ja) 2009-10-07
KR20050084664A (ko) 2005-08-26
ZA200503648B (en) 2008-03-26
AU2003249180A1 (en) 2004-06-18
EP1579381B1 (en) 2009-07-01
JP2006507599A (ja) 2006-03-02
US7221900B2 (en) 2007-05-22
US20040100359A1 (en) 2004-05-27
DE60328224D1 (de) 2009-08-13
EP2065838A2 (en) 2009-06-03
CA2505413A1 (en) 2004-06-10
EP2065838A3 (en) 2009-08-19
MXPA05004837A (es) 2005-07-22
EP1579381A1 (en) 2005-09-28

Similar Documents

Publication Publication Date Title
US7221900B2 (en) Jamming device against RFID smart tag systems
CA2610432C (en) Techniques for detecting rfid tags in electronic article surveillance systems using frequency mixing
Chawla et al. An overview of passive RFID
US10922939B1 (en) Information management system for tagged goods
US20070075145A1 (en) Jammer for tags and smart cards
US6130612A (en) Antenna for RF tag with a magnetoelastic resonant core
US7839276B2 (en) Secure self scan
Sharma et al. A review of dielectric resonator antennas (DRA)-based RFID technology for Industry 4.0
US8026819B2 (en) Radio tag and system
EP3453117B1 (en) Wearable device with integrated rfid or nfc chipset
Robertson et al. RF id tagging explained
US20070164865A1 (en) Security sensor system
Singh et al. Radio frequency identification: applications and security issues
JP2026031992A (ja) 多数の読取区域を含むシステム及びその使用方法
Rao et al. RFID security threats to consumers: Hype vs. reality
Bansal Now you see it and now you don't [RFID Technology]
Hahanov et al. Contemporary RFID systems and identification problems
HK1228086A1 (en) Techniques for detecting rfid tags in electronic article surveillance systems using frequency mixing
HK1119280A (en) Techniques for detecting rfid tags in electronic article surveillance systems using frequency mixing
TEDJINI et al. A TECHNOLOGY FOR THE FUTURE?

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: PA/a/2005/004837

Country of ref document: MX

Ref document number: 1020057007919

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 2505413

Country of ref document: CA

Ref document number: 2005/03648

Country of ref document: ZA

Ref document number: 200503648

Country of ref document: ZA

Ref document number: 2004555275

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2003811998

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020057007919

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 2003811998

Country of ref document: EP