WO2008109271A1 - Device for reducing or preventing exchange of information - Google Patents
Device for reducing or preventing exchange of information Download PDFInfo
- Publication number
- WO2008109271A1 WO2008109271A1 PCT/US2008/054739 US2008054739W WO2008109271A1 WO 2008109271 A1 WO2008109271 A1 WO 2008109271A1 US 2008054739 W US2008054739 W US 2008054739W WO 2008109271 A1 WO2008109271 A1 WO 2008109271A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- card
- information
- transparent
- transparent conductive
- interrogating
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H05—ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
- H05K—PRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
- H05K9/00—Screening of apparatus or components against electric or magnetic fields
- H05K9/0007—Casings
- H05K9/0043—Casings being flexible containers, e.g. pouch, pocket, bag
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
- G06K19/07318—Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
- G06K19/07327—Passive means, e.g. Faraday cages
Definitions
- the current disclosure is generally related to the field of electronic data information exchange, and, more particularly, to a device for reducing or preventing the exchange of information, including confidential information.
- Homeland Security will be charged with drafting the details of any regulations regarding the new electronic ID card.
- Such electronic ID cards will undoubtedly include information that the card owner would like to prevent unauthorized access to by unauthorized personnel or entities.
- Such information may be confidential in nature.
- the confidential information may be personal information or business-related information. For example, information such as home address, country of citizenship, Social Security number, driver's license number, etc. may be part of the information contained in the electronic ID card.
- the legislation mandates that the electronic ID card employ machine-readable technology, although the precise form of such machine-readable technology is not specified. However, such machine-readable technology may include the use of magnetic strips or an RFID tag, for example.
- FIGS. IA-I B schematically depict the theory behind one form of accessing electronically stored data by use of non-contact techniques.
- an interrogating device 10 seeks to access information in electronic form from an interrogated device 12. To do so, the interrogating device 10 generates a signal 14 that is directed toward the interrogated device 12. In some cases, the signal 14 powers up the interrogated device 12 such that it generates a return signal 16 with the required information to the interrogating device 10.
- Such systems are frequently employed in many aspects of modern life, e.g., toll booths on highways, etc.
- Bar code scanners are another example of where information may be read from a device without the interrogating device 10 actually contacting the interrogated device 12. In such systems, the bar code scanner simply recognizes a pattern of bar codes on the interrogated device 12 that corresponds to certain information, e.g., the type of product and its price.
- Figures IA- IB depict illustrative examples of prior art systems that exchange information electronically
- FIGS. 2A-2D depict various embodiments of a device disclosed herein.
- FIGS 3A-3C depict yet another embodiment of the device disclosed herein.
- a shielding device 20 is provided for receiving a card 22 that contains electronic information that is stored in a format such that the information may be read from the card 22 using non-contact interrogating devices or systems, e.g., RFID, active or passive tags, etc.
- the shielding device 20 has a generally rectangular body 21 with a front surface 24, a back surface 26, an end surface 28 and side surfaces 32.
- the shielding device 20 is provided with an opening 30.
- the shielding device 20 is adapted to have the card 22 inserted through the opening 30 and positioned in the cavity 25 defined by the body 21.
- the precise form of the card 22 itself may vary as well as the format of the data stored on the card 22.
- At least a portion of the body 21 is made from a material that is adapted to disrupt an interrogating signal sent toward the card 22 and/or disrupt a return signal sent from the card
- the term "interrogating signal” means any form of signal that is used in an attempt to extract electronic information (in any form) from the card 22, e.g., light, radio signals, a signal falling within the electromagnetic spectra, etc.
- return signal means any form of signal by which the card 22 transmits electronic information (in any form) back to an interrogating device.
- the disruption of the interrogating signal and/or the return signal may be due, at least in part, from the use of a material that absorbs, reflects, or otherwise changes at least a portion of the interrogating signal and/or the return signal.
- the material of the body 21 that is used to disrupt an interrogating signal and/or return signal, its thickness, and its location on the shielding device 20 may vary depending upon the particular application. In one embodiment, the entirety of the body 21 of the shielding device 20 may be made of such material. In other cases, only a portion of the body 21, e.g., a portion or the entirety of the front surface 24, may be comprised of such material. Additionally, the material of the body 21 may be opaque or transparent, depending upon the particular material selected.
- the body 21 may be comprised of a metal, such as silver, copper, aluminum, and alloys thereof, and it may have a thickness 34 of approximately 1 A - 2500 ⁇ m.
- the body 21 may be manufactured using a variety of known techniques, e.g. , casting, welding, etc.
- at least a portion of the body 21 may be made of an electrically conductive transparent material that is adapted to disrupt an interrogating signal and/or a return signal, e.g., indium-tin-oxide (ITO), copper-tin-oxide (CTO), or other similar materials.
- ITO indium-tin-oxide
- CTO copper-tin-oxide
- the thickness and composition of such a transparent material may vary depending upon the particular application.
- the body 21 described herein may comprise sufficient material to attenuate the interrogating signal, the return signal or both signals to prevent, hamper or disrupt the transfer of information using such signals.
- the body 21 may be designed of a material and configured so as to attenuate a signal by approximately 1-1000 dB.
- the materials of the body 21 and the configuration of the body 21 may be designed so as to attenuate an interrogating or return signal by at least approximately 92 dB.
- the exact materials employed in all or a portion of the body 21 may vary depending on a variety of factors, such as anticipated strength of the interrogating and/or receiving signal, the type of device employed (active or passive device), the distance between the source of the signal and the body 21 during anticipated interrogating operations, etc. Of course, these illustrative factors are by no means exhaustive. The type, characteristics and thickness of the material selected to attenuate the signal(s) may be determined based on the characteristics and strength of the anticipated interrogating system, the interrogating signal and the return signal.
- Figure 2C depicts one particularly illustrative example of the shielding device 20 wherein a portion 36 of the body 21 is comprised of a transparent material like that described above. The remainder of the body 21 shown in Figure 2C may be comprised of a metal or other material.
- the owner of the card 22 may quickly determine that the card 22 is inside the shielding device 20 by visual inspection and/or show the card 22 to authorized personnel when required to do so without removing the card 22 from the shielding device 20.
- Figure 2D depicts yet another illustrative embodiment of the shielding device 20. As shown therein, a door 38 is provided to cover the opening 30. The door 38 is hinged to the body 21 by a spring-loaded hinge 40.
- the shielding device 20 may be provided with other mechanisms to aid in retaining the card 22 in the shielding device 20.
- a strap may be positioned across the opening 30 wherein one end of the strip is removably coupled to a portion of the body 21 by a variety of techniques, e.g., a Velcro attachment, a button, etc.
- the cavity 25 of the shielding device 20 is sized in an effort to secure maintain the card 22 within the device 20 without damaging the card 22.
- Figures 3A-3C depict yet another illustrative example of the shielding device 20, having a pouch-type configuration as opposed to the generally box-shaped design depicted in Figures 2A-2B. More specifically, the shielding device 20 depicted in Figures 3A-3C comprises first and second layers of material 33, 35 that are coupled or joined together along the edges 37 of those layers of material. The edges 37 may be joined by a variety of known techniques, e.g., welding, brazing, gluing, etc.
- the card 22 is adapted to be positioned within the device 20 via the opening 30. A door or flap (not shown) may be provided over the opening 30 if desired.
- the owner of the information contained on the card 22 may limit or prevent unauthorized access to the information contained on the card 22.
- the owner of the card 22 may then remove the card 22 from the shielding device 20 and present it to the authorized person.
- the particular embodiments disclosed above are illustrative only, as the invention may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. For example, the process steps set forth above may be performed in a different order.
- no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope and spirit of the invention. Accordingly, the protection sought herein is as set forth in the claims below.
Abstract
A device that is adapted to receive a card including information, such as confidential information, in machine-readable form is disclosed. The device includes a body, wherein at least a portion of the body is made of a material that is adapted to attenuate or disrupt an interrogating signal sent toward the card or a return signal sent from the card to thereby at least reduce the likelihood that the confidential information is read from the card.
Description
DEVICE FOR REDUCING OR PREVENTING EXCHANGE OF
INFORMATION
BACKGROUND OF THE INVENTION 1. TECHNICAL FIELD
The current disclosure is generally related to the field of electronic data information exchange, and, more particularly, to a device for reducing or preventing the exchange of information, including confidential information.
2. DESCRIPTION OF THE RELATED ART
Congress has recently passed legislation that provides that individuals will be required to carry cards that contain a variety of confidential information in machine-readable format. See the articles entitled "House Backs Major Shift to Electronic IDs" and "Senate Approves Electronic ID Card Bill," which are submitted herewith by Applicants on an Information Disclosure Statement. According to the first article referenced above, the Department of
Homeland Security will be charged with drafting the details of any regulations regarding the new electronic ID card.
Such electronic ID cards will undoubtedly include information that the card owner would like to prevent unauthorized access to by unauthorized personnel or entities. Such information may be confidential in nature. The confidential information may be personal information or business-related information. For example, information such as home address, country of citizenship, Social Security number, driver's license number, etc. may be part of the information contained in the electronic ID card. The legislation mandates that the electronic ID card employ machine-readable technology, although the precise form of such
machine-readable technology is not specified. However, such machine-readable technology may include the use of magnetic strips or an RFID tag, for example.
Figures IA-I B schematically depict the theory behind one form of accessing electronically stored data by use of non-contact techniques. As shown in these figures, an interrogating device 10 seeks to access information in electronic form from an interrogated device 12. To do so, the interrogating device 10 generates a signal 14 that is directed toward the interrogated device 12. In some cases, the signal 14 powers up the interrogated device 12 such that it generates a return signal 16 with the required information to the interrogating device 10. Such systems are frequently employed in many aspects of modern life, e.g., toll booths on highways, etc. Bar code scanners are another example of where information may be read from a device without the interrogating device 10 actually contacting the interrogated device 12. In such systems, the bar code scanner simply recognizes a pattern of bar codes on the interrogated device 12 that corresponds to certain information, e.g., the type of product and its price.
Given the ease with which machine-readable information may be accessed, personal and/or confidential information maintained in such a format may be readily accessed by unauthorized personnel and used for unauthorized reasons. For example, maintaining confidential information in machine-readable form may facilitate identity theft by criminals that access the machine-readable information without the knowledge of the card holder.
BRIEF DESCRIPTION OF THE DRAWINGS
The present disclosure may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements, and in which:
Figures IA- IB depict illustrative examples of prior art systems that exchange information electronically;
Figures 2A-2D depict various embodiments of a device disclosed herein; and
Figures 3A-3C depict yet another embodiment of the device disclosed herein.
While the subject matter disclosed herein is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the invention to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.
DETAILED DESCRIPTION OF THE INVENTION
In the interest of clarity, not all features of an actual implementation of the device disclosed herein are described in this specification. It will of course be appreciated that in the development of any such actual embodiment, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-
related and business -related constraints, which will vary from one implementation to another. Moreover, it will be appreciated that such a development effort might be complex and time- consuming, but would nevertheless be a routine undertaking for those of ordinary skill in the art having the benefit of this disclosure. For purposes of clarity and explanation, the relative sizes of the various features depicted in the drawings may be exaggerated or reduced as compared to the actual size of those features or structures. Nevertheless, the attached drawings are included to describe and explain illustrative examples of the present invention.
As shown in Figures 2A-2B, a shielding device 20 is provided for receiving a card 22 that contains electronic information that is stored in a format such that the information may be read from the card 22 using non-contact interrogating devices or systems, e.g., RFID, active or passive tags, etc. In the embodiment depicted in Figures 2A-2B, the shielding device 20 has a generally rectangular body 21 with a front surface 24, a back surface 26, an end surface 28 and side surfaces 32. The shielding device 20 is provided with an opening 30. The shielding device 20 is adapted to have the card 22 inserted through the opening 30 and positioned in the cavity 25 defined by the body 21. The precise form of the card 22 itself may vary as well as the format of the data stored on the card 22.
At least a portion of the body 21 is made from a material that is adapted to disrupt an interrogating signal sent toward the card 22 and/or disrupt a return signal sent from the card
22 to an interrogating device (not shown), or disrupt both signals. The material may also disrupt the ability of the interrogated device to send a return signal, e.g., it may prevent the interrogated device from powering up. It should be understood that, as used herein, the term "interrogating signal" means any form of signal that is used in an attempt to extract electronic information (in any form) from the card 22, e.g., light, radio signals, a signal falling within
the electromagnetic spectra, etc. Similarly, it should also be understood that the term "return signal" as used herein means any form of signal by which the card 22 transmits electronic information (in any form) back to an interrogating device. The disruption of the interrogating signal and/or the return signal may be due, at least in part, from the use of a material that absorbs, reflects, or otherwise changes at least a portion of the interrogating signal and/or the return signal.
The material of the body 21 that is used to disrupt an interrogating signal and/or return signal, its thickness, and its location on the shielding device 20 may vary depending upon the particular application. In one embodiment, the entirety of the body 21 of the shielding device 20 may be made of such material. In other cases, only a portion of the body 21, e.g., a portion or the entirety of the front surface 24, may be comprised of such material. Additionally, the material of the body 21 may be opaque or transparent, depending upon the particular material selected.
In one embodiment, the body 21 may be comprised of a metal, such as silver, copper, aluminum, and alloys thereof, and it may have a thickness 34 of approximately 1 A - 2500 μm. The body 21 may be manufactured using a variety of known techniques, e.g. , casting, welding, etc. In another example, at least a portion of the body 21 may be made of an electrically conductive transparent material that is adapted to disrupt an interrogating signal and/or a return signal, e.g., indium-tin-oxide (ITO), copper-tin-oxide (CTO), or other similar materials. The thickness and composition of such a transparent material may vary depending upon the particular application.
In general, the body 21 described herein may comprise sufficient material to attenuate the interrogating signal, the return signal or both signals to prevent, hamper or disrupt the transfer of information using such signals. In one example, the body 21 may be designed of a material and configured so as to attenuate a signal by approximately 1-1000 dB. As an even more specific example, the materials of the body 21 and the configuration of the body 21 may be designed so as to attenuate an interrogating or return signal by at least approximately 92 dB. Of course, those skilled in the art will understand that the exact materials employed in all or a portion of the body 21 , as well as the thickness and positioning of such materials, may vary depending on a variety of factors, such as anticipated strength of the interrogating and/or receiving signal, the type of device employed (active or passive device), the distance between the source of the signal and the body 21 during anticipated interrogating operations, etc. Of course, these illustrative factors are by no means exhaustive. The type, characteristics and thickness of the material selected to attenuate the signal(s) may be determined based on the characteristics and strength of the anticipated interrogating system, the interrogating signal and the return signal.
Figure 2C depicts one particularly illustrative example of the shielding device 20 wherein a portion 36 of the body 21 is comprised of a transparent material like that described above. The remainder of the body 21 shown in Figure 2C may be comprised of a metal or other material. By having a portion 36 of the shielding device 20 transparent, the owner of the card 22 may quickly determine that the card 22 is inside the shielding device 20 by visual inspection and/or show the card 22 to authorized personnel when required to do so without removing the card 22 from the shielding device 20.
Figure 2D depicts yet another illustrative embodiment of the shielding device 20. As shown therein, a door 38 is provided to cover the opening 30. The door 38 is hinged to the body 21 by a spring-loaded hinge 40. The presence of the door 38 reduces the likelihood that the card 22 may inadvertently fall out of the shielding device 20. However, the shielding device 20 may be provided with other mechanisms to aid in retaining the card 22 in the shielding device 20. For example, a strap may be positioned across the opening 30 wherein one end of the strip is removably coupled to a portion of the body 21 by a variety of techniques, e.g., a Velcro attachment, a button, etc. In general, the cavity 25 of the shielding device 20 is sized in an effort to secure maintain the card 22 within the device 20 without damaging the card 22.
Figures 3A-3C depict yet another illustrative example of the shielding device 20, having a pouch-type configuration as opposed to the generally box-shaped design depicted in Figures 2A-2B. More specifically, the shielding device 20 depicted in Figures 3A-3C comprises first and second layers of material 33, 35 that are coupled or joined together along the edges 37 of those layers of material. The edges 37 may be joined by a variety of known techniques, e.g., welding, brazing, gluing, etc. The card 22 is adapted to be positioned within the device 20 via the opening 30. A door or flap (not shown) may be provided over the opening 30 if desired.
Through use of the present shielding device 20, the owner of the information contained on the card 22 may limit or prevent unauthorized access to the information contained on the card 22. When the owner is convinced that an authorized person or entity is appropriately seeking the information on the card 22, the owner of the card 22 may then remove the card 22 from the shielding device 20 and present it to the authorized person.
The particular embodiments disclosed above are illustrative only, as the invention may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. For example, the process steps set forth above may be performed in a different order. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope and spirit of the invention. Accordingly, the protection sought herein is as set forth in the claims below.
Claims
1. A device that is adapted to receive a card comprising information in machine- readable form, the device comprising: a body, wherein at least a portion of the body is comprised of a material that is adapted to attenuate an interrogating signal sent toward the card or a return signal sent from the card.
2. The device of claim 1, wherein the entirety of the body is comprised of the material.
3. The device of claim 1, wherein the material is adapted to attenuate at least one of the interrogating signal and the return signal by approximately 1-1000 dB.
4. The device of claim 1, wherein the information is confidential information.
5. The device of claim 1 , wherein the material comprises a metal.
6. The device of claim 1 , wherein the material is a transparent material.
7. The device of claim 6, wherein the material is electrically conductive.
8. The device of claim 6, wherein the material is flexible. a
9. The device of claim 6, wherein the transparent material is at least one of indium-tin-oxide (ITO) and copper-tin-oxide (CTO).
10. The device of claim 1, wherein the body comprises a first surface and a second surface, and wherein the first surface comprises the material.
1 1. The device of claim 10, wherein the first surface is a front surface of the device.
12. The device of claim 1 , wherein the body comprises a first surface and a second surface, and wherein the second surface comprises the material.
13. The device of claim 12, wherein the second surface is a back surface of the device.
14. The device of claim 1, wherein the body comprises a first surface and a second surface, and wherein the first surface comprises the material and the material is transparent.
15. A device that is adapted to receive a card comprising information in machine- readable form, the device comprising: a body, wherein at least a portion of the body is comprised of a transparent conductive material.
16. The device of claim 15, wherein the entirety of the body is comprised of the transparent conductive material.
17. The device of claim 15, wherein the transparent conductive material is adapted to attenuate at least one of an interrogating signal to be directed toward the card and a return signal to be sent from the card by approximately 1-1000 dB.
18. The device of claim 15, wherein the transparent conductive material is flexible.
19. The device of claim 18, wherein the transparent conductive material is at least one of indium-tin-oxide (ITO) and copper-tin-oxide (CTO).
20. The device of claim 15, wherein the information is confidential information.
21. The device of claim 15, wherein the body comprises a first surface and a second surface, and wherein the first surface comprises the transparent conductive material.
22. The device of claim 21, wherein the first surface is a front surface of the device.
23. The device of claim 15, wherein the body comprises a first surface and a second surface, and wherein the second surface comprises the transparent conductive material.
24. The device of claim 23, wherein the second surface is a back surface of the device. 1 1
25. The device of claim 15, wherein the body comprises a first surface and a second surface, and wherein the first surface comprises the transparent conductive material and the transparent conductive material is absent from the second surface.
26. A method, comprising: providing a card comprising information in machine-readable form; and positioning the card at least partially within an opening in a body of a device, wherein at least a portion of the body is comprised of a material that is adapted to attenuate an interrogating signal sent toward the card or a return signal sent from the card.
27. The method of claim 26, wherein the entirety of the body is comprised of the material.
28. The method of claim 26, wherein the material is adapted to attenuate at least one of the interrogating signal and the return signal by approximately 1-1000 dB.
29. The device of claim 26, wherein the information is confidential information.
30. The method of claim 26, wherein the material comprises a metal.
31. The method of claim 26, wherein the material is a transparent material.
32. The method of claim 31 , wherein the material is electrically conductive.
33. The method of claim 31 , wherein the material is flexible.
34. The method of claim 31 , wherein the transparent material is at least one of indium- tin-oxide (ITO) and copper-tin-oxide (CTO).
35. The method of claim 26, wherein the body comprises a first surface and a second surface, and wherein the first surface comprises the material.
36. The method of claim 26, wherein the body comprises a first surface and a second surface, and wherein the first surface comprises the material and the material is transparent.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/681,340 | 2007-03-02 | ||
US11/681,340 US20080212303A1 (en) | 2007-03-02 | 2007-03-02 | Device for reducing or preventing exchange of information |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008109271A1 true WO2008109271A1 (en) | 2008-09-12 |
Family
ID=39732914
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2008/054739 WO2008109271A1 (en) | 2007-03-02 | 2008-02-22 | Device for reducing or preventing exchange of information |
Country Status (2)
Country | Link |
---|---|
US (1) | US20080212303A1 (en) |
WO (1) | WO2008109271A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6714121B1 (en) | 1999-08-09 | 2004-03-30 | Micron Technology, Inc. | RFID material tracking method and apparatus |
US9345178B2 (en) * | 2012-01-20 | 2016-05-17 | Paul Fitzgerald Davis | Configurable shield for hand-held electronic device |
US9002288B1 (en) * | 2012-01-25 | 2015-04-07 | James Patrick Reible | Configurable shielded enclosure with signal transfer element |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5440448A (en) * | 1992-06-22 | 1995-08-08 | Dell Usa, L.P. | Electronic system with compact card ejector |
US6471131B2 (en) * | 2000-03-02 | 2002-10-29 | Kabushiki Kaisha Toshiba | Memory card and card socket |
US6550684B1 (en) * | 1999-07-26 | 2003-04-22 | Molex Incorporated | Chip card ejector system |
US7094106B2 (en) * | 2003-03-10 | 2006-08-22 | Matsushita Electric Works, Ltd. | Adaptor for memory card |
Family Cites Families (95)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3299424A (en) * | 1965-05-07 | 1967-01-17 | Jorgen P Vinding | Interrogator-responder identification system |
US3679874A (en) * | 1970-07-06 | 1972-07-25 | Bendix Corp | Automatic baggage handling system |
US3689885A (en) * | 1970-09-15 | 1972-09-05 | Transitag Corp | Inductively coupled passive responder and interrogator unit having multidimension electromagnetic field capabilities |
US3832530A (en) * | 1972-01-04 | 1974-08-27 | Westinghouse Electric Corp | Object identifying apparatus |
US3986119A (en) * | 1973-12-28 | 1976-10-12 | International Business Machines Corporation | Emergency communication system |
US4075632A (en) * | 1974-08-27 | 1978-02-21 | The United States Of America As Represented By The United States Department Of Energy | Interrogation, and detection system |
US4354189A (en) * | 1977-11-09 | 1982-10-12 | Lemelson Jerome H | Switch and lock activating system and method |
US4636950A (en) * | 1982-09-30 | 1987-01-13 | Caswell Robert L | Inventory management system using transponders associated with specific products |
US4827395A (en) * | 1983-04-21 | 1989-05-02 | Intelli-Tech Corporation | Manufacturing monitoring and control systems |
US4862160A (en) * | 1983-12-29 | 1989-08-29 | Revlon, Inc. | Item identification tag for rapid inventory data acquisition system |
US5168510A (en) * | 1984-03-06 | 1992-12-01 | Comsource Systems | Spread spectrum-time diversity communications systems and transceivers for multidrop area networks |
US4761778A (en) * | 1985-04-11 | 1988-08-02 | Massachusetts Institute Of Technology | Coder-packetizer for random accessing in digital communication with multiple accessing |
US4776464A (en) * | 1985-06-17 | 1988-10-11 | Bae Automated Systems, Inc. | Automated article handling system and process |
US5008661A (en) * | 1985-09-27 | 1991-04-16 | Raj Phani K | Electronic remote chemical identification system |
US4799059A (en) * | 1986-03-14 | 1989-01-17 | Enscan, Inc. | Automatic/remote RF instrument monitoring system |
FR2595889B1 (en) * | 1986-03-14 | 1988-05-06 | Havel Christophe | TRANSMISSION POWER CONTROL DEVICE IN A RADIO COMMUNICATION TRANSCEIVER STATION |
US4766299A (en) * | 1986-03-28 | 1988-08-23 | Spectra-Physics, Inc. | Hand-mounted bar code reader |
US4850009A (en) * | 1986-05-12 | 1989-07-18 | Clinicom Incorporated | Portable handheld terminal including optical bar code reader and electromagnetic transceiver means for interactive wireless communication with a base communications station |
US4684933A (en) * | 1986-05-15 | 1987-08-04 | Rita Ann Gray | Unauthorized personnel detection system |
US4857893A (en) * | 1986-07-18 | 1989-08-15 | Bi Inc. | Single chip transponder device |
US4750197A (en) * | 1986-11-10 | 1988-06-07 | Denekamp Mark L | Integrated cargo security system |
CA1290020C (en) * | 1987-02-09 | 1991-10-01 | Steven Messenger | Wireless local area network |
US4845504A (en) * | 1987-04-08 | 1989-07-04 | M/A-Com, Inc. | Mobile radio network for nationwide communications |
NL8700861A (en) * | 1987-04-13 | 1988-11-01 | Nedap Nv | READING, WRITING SYSTEM WITH MINIATURE INFORMATION CARRIER. |
EP0301127B1 (en) * | 1987-07-31 | 1993-12-01 | Texas Instruments Deutschland Gmbh | Transponder arrangement |
US5144314A (en) * | 1987-10-23 | 1992-09-01 | Allen-Bradley Company, Inc. | Programmable object identification transponder system |
CA1300289C (en) * | 1987-10-27 | 1992-05-05 | Paul Anton Nysen | Passive universal communicator |
US4969146A (en) * | 1987-11-10 | 1990-11-06 | Echelon Systems Corporation | Protocol for network having a plurality of intelligent cells |
US4955018A (en) * | 1987-11-10 | 1990-09-04 | Echelon Systems Corporation | Protocol for network having plurality of intelligent cells |
JPH0720762B2 (en) * | 1988-03-26 | 1995-03-08 | 富士電機株式会社 | Logistics equipment |
CA1310431C (en) * | 1988-07-04 | 1992-11-17 | Yoshio Nishi | Information card with printed battery |
NO169983C (en) * | 1988-10-27 | 1992-08-26 | Micro Design As | PROCEDURE AND DEVICE FOR INDIVIDUAL IDENTIFICATION |
US5025486A (en) * | 1988-12-09 | 1991-06-18 | Dallas Semiconductor Corporation | Wireless communication system with parallel polling |
US5003619A (en) * | 1989-01-31 | 1991-03-26 | Motorola, Inc. | Method and apparatus for adjusting the power of a transmitter |
US4999636A (en) * | 1989-02-17 | 1991-03-12 | Amtech Technology Corporation | Range limiting system |
EP0409016A3 (en) * | 1989-07-10 | 1992-07-01 | Csir | System and method for locating labelled objects |
US5150310A (en) * | 1989-08-30 | 1992-09-22 | Consolve, Inc. | Method and apparatus for position detection |
US5124697A (en) * | 1989-10-16 | 1992-06-23 | Motorola, Inc. | Acknowledge-back pager |
US5467082A (en) * | 1989-10-25 | 1995-11-14 | Sanderson; Glenn A. | Proximity actuator and reader for an electronic access system |
SE464946B (en) * | 1989-11-10 | 1991-07-01 | Philips Norden Ab | TRANSMISSION SYSTEM INCLUDING A QUESTION STATION AND NUMBER OF ANSWERING STATIONS |
GB2238147B (en) * | 1989-11-16 | 1993-04-21 | Gen Electric Co Plc | Radio telemetry systems |
WO1991010290A1 (en) * | 1989-12-28 | 1991-07-11 | Kabushiki Kaisha Toyota Chuo Kenkyusho | Mobile communication system and mobile communication equipment |
US5030807A (en) * | 1990-01-16 | 1991-07-09 | Amtech Corporation | System for reading and writing data from and into remote tags |
US5055659A (en) * | 1990-02-06 | 1991-10-08 | Amtech Technology Corp. | High speed system for reading and writing data from and into remote tags |
CA2034878C (en) * | 1990-03-08 | 2002-04-02 | Craig S. Hyatt | Programmable controller communication module |
US5347274A (en) * | 1990-05-17 | 1994-09-13 | At/Comm Incorporated | Hazardous waste transport management system |
US5148618A (en) * | 1990-06-01 | 1992-09-22 | Brewster Blair M | Sealed tag |
US5640151A (en) * | 1990-06-15 | 1997-06-17 | Texas Instruments Incorporated | Communication system for communicating with tags |
JPH0496520A (en) * | 1990-08-13 | 1992-03-27 | Sharp Corp | Data transmitter |
US5121407A (en) * | 1990-09-27 | 1992-06-09 | Pittway Corporation | Spread spectrum communications system |
US5144668A (en) * | 1991-01-25 | 1992-09-01 | Motorola, Inc. | Signal overlap detection in a communication system |
DE69230171T2 (en) * | 1991-04-03 | 2000-04-13 | Integrated Silicon Design Pty | PRODUCT SORTING SYSTEM |
AU662901B2 (en) * | 1991-05-07 | 1995-09-21 | Nippondenso Co. Ltd. | Electronic tag |
US5220678A (en) * | 1991-08-12 | 1993-06-15 | Motorola, Inc. | Method and apparatus for adjusting the power of a transmitter |
US5610387A (en) * | 1992-05-15 | 1997-03-11 | Symbol Technologies, Inc. | Portable optical scanning system worn by a user for reading indicia of differing light reflectivity |
US5278992A (en) * | 1991-11-08 | 1994-01-11 | Teknekron Communications Systems, Inc. | Method and apparatus for controlling transmission power of a remote unit communicating with a base unit over a common frequency channel |
US5346652A (en) * | 1992-03-16 | 1994-09-13 | Dotolo Research Corporation | Nail polish remover composition |
US5231646A (en) * | 1992-03-16 | 1993-07-27 | Kyros Corporation | Communications system |
US5365551A (en) * | 1992-12-15 | 1994-11-15 | Micron Technology, Inc. | Data communication transceiver using identification protocol |
US5497140A (en) * | 1992-08-12 | 1996-03-05 | Micron Technology, Inc. | Electrically powered postage stamp or mailing or shipping label operative with radio frequency (RF) communication |
US5500650A (en) * | 1992-12-15 | 1996-03-19 | Micron Technology, Inc. | Data communication method using identification protocol |
DE4345610B4 (en) * | 1992-06-17 | 2013-01-03 | Micron Technology Inc. | Method for producing a radio-frequency identification device (HFID) |
US5613228A (en) * | 1992-07-06 | 1997-03-18 | Micron Technology, Inc. | Gain adjustment method in two-way communication systems |
US5406263A (en) * | 1992-07-27 | 1995-04-11 | Micron Communications, Inc. | Anti-theft method for detecting the unauthorized opening of containers and baggage |
US5382784A (en) * | 1993-02-08 | 1995-01-17 | Indala Corporation | Hand-held dual technology identification tag reading head |
US5373503A (en) * | 1993-04-30 | 1994-12-13 | Information Technology, Inc. | Group randomly addressed polling method |
US5416310A (en) * | 1993-05-28 | 1995-05-16 | Symbol Technologies, Inc. | Computer and/or scanner system incorporated into a garment |
DE4323883C2 (en) * | 1993-07-16 | 2002-11-07 | Meto International Gmbh | Theft security tag |
US5477215A (en) * | 1993-08-02 | 1995-12-19 | At&T Corp. | Arrangement for simultaneously interrogating a plurality of portable radio frequency communication devices |
US5751256A (en) * | 1994-03-04 | 1998-05-12 | Flexcon Company Inc. | Resonant tag labels and method of making same |
US5500651A (en) * | 1994-06-24 | 1996-03-19 | Texas Instruments Incorporated | System and method for reading multiple RF-ID transponders |
US5602535A (en) * | 1994-07-15 | 1997-02-11 | The Friedkin Corporation | Vehicle security system based on two step communication range between transmitter and receiver |
USH1606H (en) * | 1994-07-22 | 1996-11-05 | The United States Of America As Represented By The Secretary Of The Army | Electronic quasi-passive identification system |
US5521600A (en) * | 1994-09-06 | 1996-05-28 | The Regents Of The University Of California | Range-gated field disturbance sensor with range-sensitivity compensation |
US5565858A (en) * | 1994-09-14 | 1996-10-15 | Northrop Grumman Corporation | Electronic inventory system for stacked containers |
US5534847A (en) * | 1994-11-23 | 1996-07-09 | Mcgregor; Gerald C. | Bicycle alarm system |
JP3185576B2 (en) * | 1994-12-22 | 2001-07-11 | 株式会社デンソー | Vehicle communication device |
US5671362A (en) * | 1995-04-04 | 1997-09-23 | Cowe; Alan B. | Materials monitoring systems, materials management systems and related methods |
US5798693A (en) * | 1995-06-07 | 1998-08-25 | Engellenner; Thomas J. | Electronic locating systems |
US5640002A (en) * | 1995-08-15 | 1997-06-17 | Ruppert; Jonathan Paul | Portable RF ID tag and barcode reader |
US5627517A (en) * | 1995-11-01 | 1997-05-06 | Xerox Corporation | Decentralized tracking and routing system wherein packages are associated with active tags |
US5785181A (en) * | 1995-11-02 | 1998-07-28 | Clothestrak, Inc. | Permanent RFID garment tracking system |
US5855988A (en) * | 1995-11-27 | 1999-01-05 | Nippon Paint Co., Ltd. | Electromagnetic wave absorbing shielding material |
GB9601899D0 (en) * | 1996-01-31 | 1996-04-03 | Neopost Ltd | Mailing system |
US5828693A (en) * | 1996-03-21 | 1998-10-27 | Amtech Corporation | Spread spectrum frequency hopping reader system |
US5850187A (en) * | 1996-03-27 | 1998-12-15 | Amtech Corporation | Integrated electronic tag reader and wireless communication link |
US5887176A (en) * | 1996-06-28 | 1999-03-23 | Randtec, Inc. | Method and system for remote monitoring and tracking of inventory |
US5920287A (en) * | 1997-01-21 | 1999-07-06 | Widata Corporation | Radio location system for precisely tracking objects by RF transceiver tags which randomly and repetitively emit wideband identification signals |
US5971587A (en) * | 1997-08-01 | 1999-10-26 | Kato; Kiroku | Package and mail delivery system |
US6121544A (en) * | 1998-01-15 | 2000-09-19 | Petsinger; Julie Ann | Electromagnetic shield to prevent surreptitious access to contactless smartcards |
EP1279140B1 (en) * | 2000-05-03 | 2010-09-29 | Gemalto SA | Integrated circuit card and case therefor |
US7163152B2 (en) * | 2004-12-15 | 2007-01-16 | Osborn Warren R | Protective container for readable cards |
US20060187055A1 (en) * | 2005-02-07 | 2006-08-24 | Colby Steven M | Containers including radio frequency shielding |
US7482925B2 (en) * | 2005-06-24 | 2009-01-27 | Visa U.S.A. | Apparatus and method to electromagnetically shield portable consumer devices |
US20070040653A1 (en) * | 2005-08-16 | 2007-02-22 | Potts Kevin L | Rfid shielding devices |
-
2007
- 2007-03-02 US US11/681,340 patent/US20080212303A1/en not_active Abandoned
-
2008
- 2008-02-22 WO PCT/US2008/054739 patent/WO2008109271A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5440448A (en) * | 1992-06-22 | 1995-08-08 | Dell Usa, L.P. | Electronic system with compact card ejector |
US6550684B1 (en) * | 1999-07-26 | 2003-04-22 | Molex Incorporated | Chip card ejector system |
US6471131B2 (en) * | 2000-03-02 | 2002-10-29 | Kabushiki Kaisha Toshiba | Memory card and card socket |
US7094106B2 (en) * | 2003-03-10 | 2006-08-22 | Matsushita Electric Works, Ltd. | Adaptor for memory card |
Also Published As
Publication number | Publication date |
---|---|
US20080212303A1 (en) | 2008-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2005332555B2 (en) | Carrying devices for RF tokens | |
US7719425B2 (en) | Radio frequency shielding | |
US7482925B2 (en) | Apparatus and method to electromagnetically shield portable consumer devices | |
US7701408B2 (en) | Shielded contactless electronic document | |
US11734524B2 (en) | Protection of personal data contained on an RFID-enabled device | |
US9697453B2 (en) | Wireless device security system | |
KR20080038386A (en) | Contactless proximity communications apparatus and method | |
US11599734B2 (en) | Methods of inductive communication in a cellular telephone | |
US20100263179A1 (en) | LINING FOR BLOCKING WI-FI, ULTRA-SOUND, LASER, VHF, UHF, BLUE TOOTH, AND RFlD TAG SIGNAL | |
US20080212303A1 (en) | Device for reducing or preventing exchange of information | |
US20170032235A1 (en) | Scanner resistant device with built in reading lens and led light | |
US20190294940A1 (en) | Method and apparatus to enhance the security of contact-less cards | |
CN104063922B (en) | A kind of Alarm door lock device combination based on RFID induction | |
GB2533598A (en) | Shielding device | |
JP2007279897A (en) | Non-contact data carrier system, reader-writer and rack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08730529 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08730529 Country of ref document: EP Kind code of ref document: A1 |