Abstract:
According to an embodiment, a wireless tag communication device includes a first antenna that emits radio waves towards a first region of a conveyance path for wireless tags and a second antenna that emits radio waves towards a second region of the conveyance path on downstream of the first region along the conveyance path. A shield prevents the radio waves emitted from the first antenna from reaching a first portion of the first region while permitting the radio waves to reach a second portion of the first region. A controller is configured to select a tag ID read via the first antenna as a target tag ID, designate the target tag ID by communication via the second antenna, and then write tag information via the second antenna to the wireless tag corresponding to the designated target tag ID.
Abstract:
Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50′) and an RFID data storage device (30, 30′) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161′, 171, 171′, 271, 271′) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50′) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30′). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30′) that an unauthorized RFID interrogation device (50, 50′) is attempting to interrogate the RFID data storage device (30, 30′) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30′) to provide protection thereto and when the RFID interrogation device (50, 50′) is producing the interrogation signal.
Abstract:
Disclosed is a radio frequency identification (RFID) tag comprising: an RFID functional portion configured to enable wireless communication between the RFID tag and an RFID reader; a data processing functional portion with asymmetric cryptographic capability; and a power source configured to power the data processing functional portion.
Abstract:
Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50′) and an RFID data storage device (30, 30′) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161′, 171, 171′, 271, 271′) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50′) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30′). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30′) that an unauthorized RFID interrogation device (50, 50′) is attempting to interrogate the RFID data storage device (30, 30′) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30′) to provide protection thereto and when the RFID interrogation device (50, 50′) is producing the interrogation signal.
Abstract:
Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50′) and an RFID data storage device (30, 30′) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161′, 171, 171′, 271, 271′) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50′) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30′). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30′) that an unauthorized RFID interrogation device (50, 50′) is attempting to interrogate the RFID data storage device (30, 30′) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30′) to provide protection thereto and when the RFID interrogation device (50, 50′) is producing the interrogation signal.
Abstract:
Various exemplary embodiments relate to a method, device, and storage medium including: receiving an NDEF message by an NFC device including a payload and at least one of a digital signature and a reference to a digital signature; stripping data from the payload to produce a stripped payload; verifying the payload using the digital signature and the stripped payload; and conditionally interpreting the payload based on whether the payload is verified. Various embodiments are described wherein: the payload includes a URI including a fragment denoted by a pound character; and stripping data includes stripping the fragment from the URI. Various embodiments are described wherein the payload is verified, the fragment comprises fragment data, and interpreting the payload comprises: transmitting a message requesting a resource identified by the URI, wherein the request omits the fragment data; executing a received script to transmit the fragment data to a device.
Abstract:
Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50′) and an RFID data storage device (30, 30′) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161′, 171, 171′, 271, 271′) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50′) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30′). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30′) that an unauthorized RFID interrogation device (50, 50′) is attempting to interrogate the RFID data storage device (30, 30′) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30′) to provide protection thereto and when the RFID interrogation device (50, 50′) is producing the interrogation signal.
Abstract:
A reading device for contactless communication with a transponder unit includes a first antenna for generating a reading device field in the form of an alternating magnetic field. The reading device further contains one or more second antennas configured, and arranged in relation to the first antenna, such that during a contactless communication of the reading device with a transponder unit which generates communication signals by means of load modulation, a predetermined change of a detection signal is captured on the second antenna or antennas if the transponder unit is located in a predetermined zone around the reading device.
Abstract:
An apparatus for securing a portable device is described. The portable device includes a housing having a mating feature adapted to mate with a corresponding mating feature of the cradle. The cradle includes a locking mechanism that is capable of locking the portable device to the cradle. A transceiver is positioned in the housing. The transceiver is capable of communicating with a remote server containing data of a registered user. A radio-frequency identification (RFID) reader is positioned in the housing. The RFID reader controls the locking mechanism such that the locking mechanism releases the portable device from the cradle when a RFID tag storing the data of the registered user is positioned proximate to the RFID reader.
Abstract:
Devices and methods of disrupting data transfer between an RFID interrogation device (50, 50′) and an RFID data storage device (30, 30′) to be protected, are provided. An example of an embodiment of an RFID signal disruptor device includes a container (41, 141) and an RFID signal disruptor circuit (151, 161, 161′, 171, 171′, 271, 271′) configured to substantially disrupt the signal provided by the RFID interrogation device (50, 50′) when the RFID signal disruptor device is positioned to protect the RFID data storage device (30, 30′). The RFID signal disruptor device can also include an interrogation indicator (63, 296) configured to indicate to a user of the RFID data storage device (30, 30′) that an unauthorized RFID interrogation device (50, 50′) is attempting to interrogate the RFID data storage device (30, 30′) when the RFID signal disruptor device is positioned in close proximity to the RFID data storage device (30, 30′) to provide protection thereto and when the RFID interrogation device (50, 50′) is producing the interrogation signal.