Inhibiting unauthorised contactless reading of a contactless readable object

ABSTRACT

A jamming device for inhibiting unauthorised contactless reading of a contactless readable object is disclosed. In one embodiment, the jamming device includes: an antenna for receiving an interrogation signal from a reader device; a touch sensitive interface; and a circuit electrically connected to the antenna and the touch sensitive interface, wherein the circuit is configured to: operate in a first mode to generate and emit a jamming signal, via the antenna, in response to receiving the interrogation signal whilst the touch sensitive interface fails to indicate a touch event; and operate in a second mode whilst the touch sensitive interface indicates a touch event, wherein the jamming signal is not emitted via the antenna in response to receiving the interrogation signal whilst operating in the second mode. A card carrying object, system and method is also disclosed.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims priority from Australian ProvisionalPatent Application No. 2012905294 filed on 5 Dec. 2012, the content ofwhich is incorporated herein by reference.

TECHNICAL FIELD

The present invention relates to a jamming device, a system, a methodand a card carrying object for inhibiting unauthorised contactlessreading of contactless readable object.

BACKGROUND

A number of objects include an RFID (Radio Frequency Identification)chip that enable contactless reading of data from a data store. Suchobjects include contactless payment cards and passports. It is envisagedthat more objects are likely to include an RFID chip in order to enablecontactless reading of data from a data store.

Whilst RFID enabled objects provide a significant advantage in beingable to conveniently read data from the data store in a wireless manner,a significant disadvantage is the security and privacy aspects of suchRFID enabled objects, particularly when sensitive information is storedby the RFID chip In particular, it is possible that a person using anRFID reader can skim RFID enabled objects without the knowledge of theowners of the RFID enabled devices. The data skimmed from the RFIDenabled objects could be used for illegitimate purposes, such asunauthorised payments or identity theft.

One proposal has been to provide the RFID enabled device with amechanism to selectively enable the reading of data from the RFID chip,such that if the RFID enabled device is not selectively enabled by auser, data cannot be read in an unauthorised manner. However, the costof reissuing RFID enabled devices, such as payment cards (credit cards,debits cards, etc) passports, etc, to include such a mechanism issubstantially high, particularly if each RFID enabled device which auser owns needs such a mechanism. Therefore, this proposal has not beenconsidered as a realistic solution to preventing unauthorised reads fromRFID enabled devices. Thus, is it not anticipated that RFID enableddevices will be redesigned in such manner any time in the near future.

Therefore, there is a need to inhibit unauthorised contactless readingof an RFID enabled object.

The reference in this specification to any prior publication (orinformation derived from the prior publication), or to any matter whichis known, is not, and should not be taken as an acknowledgment oradmission or any form of suggestion that the prior publication (orinformation derived from the prior publication) or known matter formspart of the common general knowledge in the field of endeavour to whichthis specification relates.

SUMMARY

This summary is provided to introduce a selection of concepts in asimplified form that are further described below in the PreferredEmbodiments. This summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used to limit the scope of the claimed subject matter.

In a first aspect there is provided a jamming device for, inhibitingunauthorised contactless reading of an RFID enabled object, wherein thejamming device includes:

-   -   an antenna for receiving an interrogation signal from a reader        device;    -   a touch sensitive interface; and    -   a circuit electrically connected to the antenna and the touch        sensitive interface, wherein the circuit is configured to:        -   operate in a first mode to generate and emit a jamming            signal, via the antenna, in response to receiving the            interrogation signal whilst the touch sensitive interface            fails to indicate a touch event; and        -   operate in a second mode whilst the touch sensitive            interface indicates a touch event, wherein the jamming            signal is not emitted via the antenna in response to            receiving the interrogation signal whilst operating in the            second mode.

In certain embodiments, the jamming device has a body having a planarshaped profile having a first face and a second face opposing the firstface.

In certain embodiments, the body has a card shaped profile.

In certain embodiments, the body has profile for being tight fittinglyreceived within a pocket of an object, wherein the pocket is sized totightly receive a credit card.

In certain embodiments, the body has a length between about 80 mm and 90mm and a width of between about 50 mm to 60 mm.

In certain embodiments, the length of the body is about 86 mm and thewidth of the body is about 54 mm.

In certain embodiments, the jamming device has a thickness between about1 mm to 3 mm.

In certain embodiments, the jamming device has a thickness of about 2mm.

In certain embodiments, the body is a board which provides the circuit,the antenna and the touch sensitive interface.

In certain embodiments, the antenna is provided on the first face of theboard and the touch sensitive interface is provided on a second face ofthe board.

In certain embodiments, the touch sensitive interface is located at anedge section of the first face of the board and a majority of theantenna is located at the edge section of the second face of the board.

In certain embodiments, the antenna and touch sensitive interface areprinted on the board and wherein the circuit is provided on or in theboard.

In certain embodiments, the jamming device includes at least one coverfor covering at least part of the circuit on the board.

In certain embodiments, the jamming device includes a batteryelectrically connected to the circuit, wherein the at least one covercovers the battery.

In certain embodiments, the board includes a cut-out section which thebattery partially protrudes therethrough or is at least partiallylocated therein.

In certain embodiments, the at least one cover includes a first coverand a second cover, wherein the first cover covers at least part of afirst face of the board and the second cover covers at least part of asecond face of the board such that the battery is covered by the firstand second covers.

In certain embodiments, the battery is an thin cell battery.

In certain embodiments, the battery is a Lithium-ion battery.

In certain embodiments, the at least one cover does not cover a majorityof the antenna provided on the board.

In certain embodiments, a majority of the antenna loops about aperiphery of the at least one cover.

In certain embodiments, the circuit includes an integrated circuitconfigured to:

-   -   generate or retrieve jamming data in response to the antenna        receiving the interrogation signal; and    -   modulate the jamming data with the interrogation signal for        generating the jamming signal.

In certain embodiments, the circuit includes one or more visualindicators which are controllable by the integrated circuit to indicateat least one of:

-   -   the circuit operating in the second mode; and    -   the circuit detecting the interrogation signal whilst operating        in the first mode.

In certain embodiments, the one or more indicators includes a secondmode indicator controllable by the integrated circuit for indicatingwhether the circuit is operating in the second mode.

In certain embodiments, the second mode indicator is a light emittingdiode.

In certain embodiments, the second mode indicator is controllable toflash whilst the circuit is operating in the second mode.

In certain embodiments, the one or more indicators include a jammingindicator controllable by the integrated circuit for indicatingtransmission of the jamming signal.

In certain embodiments, the jamming indicator is a light emitting diode.

In certain embodiments, the jamming indicator is controllable to flashto indicate transmission of the jamming signal.

In certain embodiments, the touch sensitive interface is one of:

-   -   a capacitive sensing interface; and    -   a resistive sensing interface.

In certain embodiments, the circuit includes an interrogation signaldetector electrically connected to the antenna and the integratedcircuit, wherein the interrogation signal detector is configured todetermine whether a signal received by the antenna has one or morecharacteristics indicative of the interrogation signal, wherein inresponse to a positive determination, the interrogation signal detectortransfers a signal to the integrated circuit indicative of the detectedinterrogation signal.

In certain embodiments, the interrogation signal detector is configuredto detect if the signal received meets or exceeds a threshold indicativeof the interrogation signal.

In certain embodiments, the jamming device is configured to inhibit thereading of the RFID enabled object which is located within a jammingproximity of about 3 cm of the jamming device.

In certain embodiments, the jamming device is configured to inhibit thereading of the RFID enabled object which is located within a jammingproximity of about 2 cm of the jamming device.

In certain embodiments, the jamming device configured to inhibit readingof multiple RFID enabled objects within the jamming proximity of thejamming device.

In certain embodiments, the jamming device includes a plurality oforthogonal antennas.

In a second aspect there is provided a device for inhibiting contactlessreading of an RFID enabled object, wherein the device includes:

-   -   an antenna for receiving an interrogation signal from a reader        device;    -   an integrated circuit configured to:        -   generate or retrieve jamming data in response to the antenna            receiving the interrogation signal; and        -   modulate the jamming data with the interrogation signal to            generate a jamming signal which is emitted via the antenna            to inhibit the reading device reading data from the RFID            enabled object; and    -   a touch sensitive interface in electrical communication with the        integrated circuit;    -   wherein the integrated circuit operates in a first mode to        generate and emit a jamming signal, via the antenna, in response        to receiving the interrogation signal whilst the touch sensitive        interface fails to indicate a touch event, and the integrated        circuit operates in a second mode whilst the touch sensitive        interface indicates a touch event, wherein the jamming signal is        not emitted via the antenna in response to receiving the        interrogation signal whilst operating in the second mode.

In certain embodiments, the device includes a visual indicator which arecontrolled by the integrated circuit to indicate at least one of:

-   -   the device operating in a second mode; and    -   the device detecting the interrogation signal whilst operating        in the first mode.

In certain embodiments, the device includes a communication module towirelessly transfer a detection of the interrogation signal to a mobilecomputing device.

In certain embodiments, the communication module is a Bluetoothcommunication module.

In certain embodiments, the device includes a demodulator to demodulatethe interrogation signal to obtain interrogation request data.

In certain embodiments, the device transfers detection data indicativeof the interrogation request data to the mobile computing device tonotify the mobile computing device of the detection.

In certain embodiments, the touch sensitive interface is one of:

-   -   a capacitive sensing interface; and    -   a resistive sensing interface.

In certain embodiments, the device includes an interrogation signaldetector electrically connected to the antenna and the integratedcircuit, wherein the interrogation signal detector is configured todetermine whether a signal received by the antenna has characteristicsindicative of the interrogation signal, wherein in response to apositive determination, the interrogation signal detector transfers asignal to the integrated circuit indicative of the detectedinterrogation signal.

In certain embodiments, the interrogation signal detector is configuredto detect if the signal received meets or exceeds a threshold indicativeof the interrogation signal, wherein in response to a positive detectionthe interrogation signal detector transfers a signal to the integratedcircuit indicative of the detected interrogation signal.

In certain embodiments, the device has a card profile.

In certain embodiments, the touch sensitive interface is locatedadjacent the perimeter of the device.

In certain embodiments, the device includes a plurality of orthogonalantennas.

In a third aspect there is provided a system for inhibiting contactlessreading of an RFID enabled object, wherein the system includes:

-   -   the device according to the first aspect; and    -   a computer program for execution by a mobile computing device,        wherein the mobile computing device is in communication with the        device and is configured by the computer program to receive        detection data from the communication module of the device, and        generate a prompt in response to receiving the detection data to        warn the user of the detected interrogation signal.

In certain embodiments, the communication module is a Bluetoothcommunication module.

In certain embodiments, the device includes a demodulator to demodulatethe interrogation signal to obtain interrogation request data.

In certain embodiments, the device transfers the detection dataindicative of the interrogation request data to the mobile computingdevice to notify the mobile computing device of the detection.

In certain embodiments, the detection data received from the device isindicative of a timestamp of the detection.

In certain embodiments, the mobile computing device, under control ofthe computer program, appends a timestamp to the received detection dataindicative of a time when the mobile computing device was notified ofthe detection.

In certain embodiments, the mobile computing device, under control ofthe computer program, obtains a geographical location of the mobilecomputing device once notified of the detection and appends thegeographical location to the detection data.

In certain embodiments, the mobile computing device, under control ofthe computer program, stores the detection data in memory of the mobilecomputing device.

In certain embodiments, the mobile computing device, under control ofthe computer program, transfers the detection data to a serverprocessing system for recordal in a data store.

In certain embodiments, the system includes the server processingsystem.

In certain embodiments, the system includes a plurality of devices.

In certain embodiments, the data store has stored therein detection datafrom the plurality of devices.

In certain embodiments, the server processing system processes thedetection data received from the plurality of device to determine one ormore areas of unauthorised interrogation hotspots.

In certain embodiments, the server processing system transfer hotspotdata indicative of the one or more areas of unauthorised interrogationhotspots to at least some of the plurality of devices, wherein eachmobile computing device is configured to determine a current location ofthe mobile computing device, wherein if the current location is withinone of the hotspots the mobile computing device prompts the user with awarning.

In certain embodiments, the system includes the mobile computing device.

In a fourth aspect there is provided a card carrying object for carryinga one or more cards, wherein the card carrying object includes:

-   -   a device for inhibiting contactless reading of an RFID enabled        object, wherein the device includes:        -   an antenna for receiving an interrogation signal from a            reader device;        -   an integrated circuit configured to:            -   generate or retrieve jamming data in response to the                antenna receiving the interrogation signal; and            -   modulate the jamming data with the interrogation signal                to generate a jamming signal which is emitted via the                antenna to inhibit the reading device reading data from                the RFID enabled object; and        -   a touch sensitive interface located on a surface of the card            carrying object to selectively operate the device in a first            mode, wherein the jamming signal is emitted in response to            receiving the interrogation signal whilst the touch            sensitive interface fails to sense a touch event, and a            second mode, wherein the jamming signal is not emitted in            response to receiving the interrogation signal whilst the            touch sensitive interface senses a touch event;

In certain embodiments, the card carrying object is one of:

-   -   a purse; and    -   a wallet.

In another aspect there is provided a method of inhibiting unauthorisedcontactless reading of an RFID enabled object, wherein the methodincludes:

-   -   locating the jamming device according to any one of claims 1 to        33 adjacent one or more RFID enabled objects thereby inhibiting        unauthorised contactless reading of the one or more RFID enabled        objects whilst the circuit operates in the enabled mode; and    -   touching the touch interface of the jamming device to enable        reading of the one or more RFID enabled objects.

In certain embodiments, the method includes locating the jamming devicewithin a pocket of a wallet, wherein the wallet carries therein andadjacent to pocket the one or more RFID enabled objects.

Other aspects and embodiments will be appreciated through the detaileddescription.

BRIEF DESCRIPTION OF THE FIGURES

Example embodiments should become apparent from the followingdescription, which is given by way of example only, of at least onepreferred but non-limiting embodiment, described in connection with theaccompanying figures.

FIG. 1 illustrates a block diagram of an example of the device;

FIG. 2A illustrates a block diagram of another example of the device;

FIG. 2B illustrates a block diagram of another example of the device;

FIG. 3 illustrates a schematic of an example of a switch interface ofthe device;

FIG. 4 illustrates a schematic of components of a visual indicator ofthe device;

FIG. 5 illustrates a schematic of an example of an interrogation signaldetector of the device;

FIG. 6 illustrates a schematic of a block diagram of a processingsystem;

FIG. 7 illustrates a schematic of a microcontroller of the device;

FIG. 8 illustrates a block diagram of a system including the device;

FIG. 9 illustrates a front view of an example of the jamming device;

FIG. 10 illustrates a rear view of the jamming device of FIG. 9;

FIG. 11 illustrates a front view of the jamming device with the frontcover removed;

FIG. 12 illustrates side view of the jamming device of FIG. 9;

FIG. 13 illustrates the jamming device of FIG. 9 located in a purse;

FIG. 14 illustrates the jamming device of FIG. 9 located in a wallet;and

FIG. 15 illustrates a perspective view of an example of the board ofjamming device of FIG. 9 with the front cover removed.

DETAILED DESCRIPTION OF EMBODIMENTS

The following modes, given by way of example only, are described inorder to provide a more precise understanding of the subject matter of apreferred embodiment or embodiments.

In the figures, incorporated to illustrate features of an exampleembodiment, like reference numerals are used to identify like partsthroughout the figures.

Referring to FIG. 1 there is shown a block diagram of a jamming device10 for inhibiting unauthorised contactless reading of an RFID enabledobject. In particular, the jamming device 10 includes an antenna 30electrically connected to a circuit 20. The circuit 20 is generallyprovided in the form of a microcontroller 21 in electrical connectionwith a number of sub-circuits as will be described in more detailherein. Referring to FIG. 6 there is shown a block diagram of aprocessing system suitable for use as the microcontroller 20. Inparticular, the processing system 600 includes a processor 610, memory620 and an interface 630 coupled together via a bus 640.

The jamming device 10 is configured to be positioned adjacent one ormore contactless readable objects, such as RFID enabled objects. For thesake of clarity, the example herein will discuss the application of thejamming device 10 in relation to an RFID enabled object.

For example, the jamming device 10 may be provided in the form of a flatprofiled card, as shown in FIG. 9, which can be positioned in a pocketof card carrying object such as a wallet or purse adjacent one or morepayment cards contained in neighbouring pockets of the purse or wallet,as shown in FIG. 13 or 14. In specific embodiments, the jamming device10 is designed to be located within a proximity of approximately 3centimetres, and more specifically 2 centimetres, of one or more RFIDenabled objects. The jamming device 10 can be positioned in front orbehind the RFID enabled object(s) relative to a reader device emittingan interrogation signal.

When a reader device emits an interrogation signal 33 to read data fromthe RFID enabled object, the jamming device 10 is closely coupledelectrically with a transmitter of the reader device. The antenna 30 ofboth the RFID enabled object and the jamming device 10 receive theinterrogation signal 33 and generate an electrical current. The antenna30 is preferably provided in the form of an electromagnetic coil or loopto generate the electrical current from the received signal.

In response to the generated electrical current, the circuit 20 of thejamming device 10 generates a jamming signal. In one form, theintegrated circuit generates or retrieves, jamming data. The integratedcircuit 21 then modulates the jamming data with the interrogation signal33. A jamming signal 36, based on the modulated jamming data, is thenemitted via the antenna 30 which is received by the reader device. Thereader device detects the jamming signal 36 as well as a response signalfrom the RFID enabled object. It has been found that the reader deviceis unable to successfully read the response signal emitted by the nearbyRFID enabled object due to the jamming signal 36 being emitted.

As mentioned above, the microcontroller 21 is configured to modulate theinterrogation signal 33 received from the reader device with the jammingdata to generate the jamming signal 36.

It will be appreciated that the microcontroller 21 may perform themodulation process or optionally control a modulator module 80 toperform the modulation process. In this example, the read signalreceived from the reader has a frequency of approximately 13.56 MHz. Themicroprocessor can include an oscillator, or is coupled to an oscillatormodule, which generates an oscillator signal, for example an 847.5 KHzsignal. The interrogation signal 33 is modulated with the oscillatorsignal and the jamming data to generate the jamming signal 36 which isemitted by the antenna 30 of the jamming device 10 to inhibit the readerdevice reading data from the nearby RFID enabled object. It will beappreciated that other frequencies can also be used.

Referring to FIG. 2A there is shown a further block diagram of anexample of the device 10. In particular, the device 10 includes theantenna 30 electrically connected to the microcontroller 21.

In addition, the device of FIG. 2A includes a switch interface 40 whichis electrically connected to the microcontroller 21. The switchinterface 40 is preferably provided in the form of a touch sensitiveinterface that senses a user touching the touch sensitive component ofthe touch sensitive interface 40. The touch sensitive interface 40 canbe a capacitive or resistive sensing interface, wherein themicrocontroller 21 operates in a second mode when the capacitance orresistance sensed by the touch sensitive interface is indicative ofhuman body capacitance or resistance. An electrical schematic of anexample of the touch sensitive interface 40 is illustrated in FIG. 3. Inparticular, the touch sensitive interface 40 operates using a comparatorcircuit to sense if a user is touching the touch sensitive component ofthe touch sensitive interface 40. In the event that a user touches thetouch sensitive interface 40, a signal is transferred to themicrocontroller 21 from the touch sensitive interface 40 indicative ofthe user touching the interface 40. Whilst the touch sensitive interfaceindicates to the microcontroller 40 that the user is touching the switchinterface 40, the microcontroller 21 is disabled from generating ajamming signal 36 despite an interrogation signal 33 being received bythe antenna 30.

For example, in the event that the jamming device 10 is embodied as acard as shown in FIGS. 13 and 14 that is located in a wallet or purse1000, the user can touch the touch sensitive interface 40 with a fingerof their hand 1010 to disable the jamming device 10 so that the user candeliberately allow the reader device to read data from a RFID enabledpayment card contained in the wallet or purse 1010. Thus the user canselectively disable the jamming device 10 via interaction with theswitch interface 40 when required. In the event that the user is nottouching the switch interface 40, the microcontroller 21 operates in anenabled such that the jamming signal 36 can be emitted if aninterrogation signal 33 is detected.

As shown in FIG. 9, the switch interface 40 can be located within anedge section of the card adjacent the perimeter of the jamming device 10such that when the jamming device 10 is located in a pocket of thewallet or purse 1000, the switch interface 40 protrudes from the pocketto allow the user to easily touch the switch interface 40 and disablethe device 10 whilst located within the wallet or purse 1000 as shown inFIGS. 13 and 14.

As shown in FIG. 2A, the device also includes an one or moreelectrically controllable visual indicators. In one form, the visualindicators can be controlled to indicate a second mode of the jammingdevice 10. In particular, the visual indicator 50 can be provided in theform of one or more Light Emitting Diodes (LEDs) that are electricallyconnected to the microcontroller 40. When the microcontroller 21 isdisabled via user interaction with the switch interface 40, themicrocontroller 20 actuates the one or more LEDs 50 to indicate thesecond mode of the jamming device 10. In particular, a second modeindicator flashes when the jamming device 10 is disabled and a jammingindicator flashes indicating the transmission of the jamming signal.

In additional or alternative forms, the microcontroller 20 actuates oneor more LEDs when the antenna 30 generates a current indicative of adetected interrogation signal whilst operating in the first mode. In oneform, the visual indicator 50 includes two LED controllable circuitswhich are electrically connected to the microcontroller 21 for selectiveactuation, as shown in the schematics of FIG. 4 and in the schematic ofthe system shown in FIG. 7 wherein a first LED emits an green light whenthe jamming device 10 operates in a second mode, and a second LED emitsa red light when the antenna 30 generates a current indicative of adetected interrogation signal whilst operating in the first mode.However, it will be appreciated that the visual indicator 50 may utilisea single component may be used to indicate both events. For example, thejamming device 10 may, include a single LED that is a multi-colour LEDthat emits multiple colours of light. For example, the multi-colour LEDmay emit a green colour when the microcontroller is second and redcolour when the antenna 30 generates a current indicative of a detectedinterrogation signal whilst operating in the first mode.

The jamming device 10 of FIG. 2A preferably includes an interrogationsignal detector 60 to detect an interrogation signal 33 from a readerdevice. The interrogation signal detector 60 can be configured todetermine whether a signal received by the antenna 30 has one or morecharacteristics indicative of the interrogation signal. In particular, aschematic of an example of the interrogation signal detector 60 is shownin FIG. 5 which determines whether the current generated by the antenna30 in response to the a particular signal exceeds a threshold indicativeof an interrogation signal. The threshold may be a current threshold, avoltage threshold or a power threshold. As such, the interrogationsignal detector 60 operates as a filter to actuate the microcontroller21 to control the generation of the jamming signal in response to agenuine interrogation signal.

The jamming device 10 of FIG. 2A preferably includes an electrical powersource 99. In particular, the electrical power source 99 is anelectrical battery. The electrical battery 99 may be embedded or encasedwithin the jamming device 10 such that it cannot be removed. However, inother embodiments of the jamming device 10, the battery 99 isreplaceable. In certain embodiments, the jamming device 10 includes arecharging interface 98 electrically coupled to the battery 99 so as toallow the battery to be recharged. The recharging interface 98 maycouple to a micro USB electrical cable or similar electrical power cableto enable the battery to be recharged. In embodiments where the jammingdevice 10 includes the battery 99, the device may operate as an activedevice or a semi-active device. In other embodiments, the jamming device10 can be a passive device where no battery is provided.

The jamming device 10 of FIG. 2A can also be configured to demodulatethe interrogation signal 33. In particular, the microprocessor 21 canperform the demodulation process, or optionally the microcontroller 21can control a demodulator module 90 to perform the demodulation processupon the interrogation signal. The demodulator 90 can be used todemodulate the interrogation signal 33 received from the reader deviceto obtain interrogation request data. The interrogation request data maybe indicative of a number various fields associated with theinterrogation to read the data, such as an identity of the readerdevice. The microcontroller 20 can store an interrogation recordindicative of the interrogation request data in non-volatile memory 620of the microcontroller 20 as shown in FIG. 6. The microcontroller 20 canadditionally record a time field such as a time stamp indicative of whenthe interrogation request was detected.

Referring to FIG. 2B showing an alternate example of the jamming device10, the jamming device 10 can also include a communications module 70 toenable the device to communicate with one or more processing systems.The communications module 70 may be a wireless communication module. Inone form, the wireless communication module 70 is a Bluetooth™communication module that enables the jamming device to communicate witha Bluetooth™ enabled device. In specific forms, the jamming device 10 isable to communicate via the wireless communication module 70 with amobile computing device 800 such as a mobile telephone, laptop or tabletas shown in FIG. 8. The mobile computing device 800 is generally carriedor nearby by the user of the jamming device 10, such that additionalfunctions can be performed by the mobile computing device 800 inresponse to the detection. In particular, the mobile computing device800 executes a computer application 810 in order to control thecommunication between the mobile computing device 800 with the jammingdevice 10.

As shown in FIG. 7, the microcontroller 21 can be electrically connectedto each component of the device via a number of input and output pins ofthe microcontroller. The microcontroller 21 can have a computer programstored in non-volatile memory 620 which controls the operation ofmicrocontroller 21 in response to various events.

Referring to FIG. 8 there is shown a block diagram of a system 800including a plurality of jamming devices 10A-10N. In particular, themicrocontroller of each jamming device 10 is configured to transferdetection data to a respective mobile computing device 810 via therespective communication module 70 in response to the jamming device 10detecting an interrogation signal 33 from a reader device whilstoperating in the first mode. The detection data transferred by thejamming device 10 to the mobile computing device 810 may simply beindicative of a detection of an interrogation signal 33. Optionally, thedetection data may also be indicative of information extracted by thedemodulator 90 from the interrogation signal 33.

In response to the receiving the detection data, the application 810 cancontrol the mobile computing device 800 to notify the user of thedetection. For example, the display of the mobile computing device 800may display a prompt indicative of the detection. Additionally oralternatively, the application 810 may emit an audio prompt via thespeaker of the mobile computing device 800. Additionally oralternatively, the application 810 may control a vibration module of themobile computing device 800.

In particular embodiments, in response to the receiving the detectiondata, the application 810 of the mobile computing device 800 stores thedetection data in a data storage medium. The application 810 may storethe data in the memory 620 of the mobile computing device 800.Additionally or alternatively, the application 810 transfers thedetection data to a remote device 820, wherein the remote device 820stores the detection data in a data store 840. For example, theapplication 810 can transfer the detection data to an application server830 hosted by a remote processing system 820, such as a serverprocessing system, in data communication with the mobile computingdevice 800 via a network. The application server 830 stores thedetection data in a data store 840 such as a database.

The application 810 executed by the mobile computing device 800 canappend additional fields of data to the detection data for storage inthe data store 840. In particular, in the event that the detection datais not indicative of a time of the detection, the application 810 cancontrol the mobile computing device 800 to associate a time field, suchas a time-stamp, indicative of the time when the mobile computing device800 was notified of the detection. Additionally or alternatively, theapplication 810 can control the mobile computing device 800 to obtain alocation of the mobile computing device 800, such as a GPS coordinate,when the mobile computing device 800 was notified of the detection.

The user of the mobile computing device 800 can interact with theapplication 810 to review the detection reported by the jamming device10. The user is able to review various fields for at least some of thedetections made the jamming device 10 such as the time and location ofthe detection.

As shown in FIG. 8, the application server 830 can be in communicationwith a plurality of mobile computing devices 800A-800N associated with aplurality of devices 10A-10N. In this embodiment, the database 840 hasstored therein detection data from a community of users. A respectiveuser of a mobile computing device 800 can interact with the application810 to be presented with data indicative of at least some of thedetections from the community. The application server 830 can transferan indication of at least some of the detections by the community storedin the database 840. For example, the user may request an indication ofdetections within a particular geographical region within a particulartimeframe. The application server 830 may query the community ofdetections based on the location and time fields stored with eachdetection record. Data indicative of geographically and temporallyrelevant detections may then be transferred to the mobile computingdevice 800 and presented via the application 810. The community ofdetections may be presented in the form of a map indicative of thegeographical area including annotation data indicative of one or morerelevant detections.

The application server 830 can optionally determine, based on thecommunity of detections, one or more geographical areas where high ratesof unauthorised reads are detected. Such areas are referred to as“hotspots”. The application server 830 can transfer data indicative ofthese geographical areas to the mobile computing devices 800. Eachapplication 810 can periodically request the respective mobile computingdevice 800 to determine the current location, such as a GPS coordinate.In the event that the current location falls within one of thegeographical areas associated with high rates of unauthorised readdetections, the application 810 can warn the user. For example, theapplication 810 may control the mobile computing device 800 to generatea visual, audio and/or vibratory prompt to warn the user. The user maythen react to the warning and move out of the geographical areaaccordingly to minimise the risk of an authorised read.

The server processing system 820 can also include a web-server 850 indata communication with the data store 840. A user operating aweb-browser 870 via a user processing system 860 can view a web-pagegenerated by the web-server 850 based on the detection data stored inthe data store 840.

In particular embodiments, the jamming data may be random data that isgenerated by the microcontroller. In other embodiments, the jamming datamay be data stored in the memory of the microcontroller. In otherembodiments, the jamming data is designed to not conform to thecommunication standard used by RFID communication.

In another embodiment, the device may be embodied with multipleantennas. In particular, the device may include three orthogonalantennas. The multiple antennas provide an advantage that the devicedoes not necessarily need to be at least substantially parallel with thenearby RFID enabled objects to detect a read signal. However, due to themultiple antenna design, the device generally has a non-flat profile. Assuch the device may be embodied as a cube or some other non-flatstructure which can be contained within bags such as handbags, suitcasesand backpacks. In one example, the device may be embodied as a key-ring.

The jamming device 10 is generally configured to operate with Type Aand/or Type B RFID reader devices.

Referring to FIGS. 9 to 12 there is shown schematics of a jamming device10 provided in the form of a thin card. In particular, the jammingdevice 10 includes a body provided in the form of a board 900 whichincludes the circuit 20, the antenna 30 and the touch interface 40. Theantenna and the touch interface 40 are printed on opposite faces of theboard 90 so as to maximise the useable area of the board for bothapplications. The jamming device 10 includes a first cover 910 whichcovers at least part of the circuit 20. The first cover 910 includes aplurality of pins which protrude into holes 901A, 901B, 901C, 901D whichare held to the board using an adhesive. The first cover 910 generallyhas a protrusion 913 including a two holes 911, 912 exposing the twoLEDs 50A, 50B of the circuit 20. The first cover 910 includes a smallbevelled edge in order to provide a thin profile for the jamming device10. The first cover 910 includes a recessed corner to accommodate thetouch sensitive interface 40 on the board.

The jamming device 10 also includes a second cover 920 which covers theunderside of the board. As shown in FIG. 11, the board 900 includes acut-out section 905 which enables the battery 99 to partially protrudetherethrough or at least partially sit within the cut-out section 905 inorder to minimise the thickness of the jamming device such that it canbe tight fittingly received within a pocket of a wallet or purse. Due tothe cut-out section 905, the jamming device 10 includes the second cover920 to cover the rear surface of the battery 99. The battery 99 ispreferably a Lithium-ion battery. In more preferable embodiments, thebattery 99 is a thin cell battery in order to minimise the thickness ofthe jamming device 10. The second cover 920 includes a small bevellededge in order to provide a thin profile for the jamming device 10. Thefirst cover 910 is slightly thicker than the second cover, as shown inFIG. 12 due to accommodating the circuit 20 which is provided on a frontface of the board 900.

As shown in FIG. 10, a majority of the antenna 30 loops about theperiphery of the second cover 920 in an edge section of the board 900. Asmall portion of the antenna passes under the second cover to connect tothe circuit 20. The majority of the antenna 30 is advantageously locatedexternal to the second cover 920 to maximise the wireless proximity ofthe jamming device 10. As can be seen in FIG. 10, the touch interface(shown in dotted line) is also located within a edge section of theboard, although on the opposite side of the board, in order to maximisethe area which the user can touch to disable the jamming device 10whilst also providing a sufficient antenna to provide a useful jammingproximity.

It will be appreciated that the antenna 30 transmits the jamming signalsubstantially co-planar to the board of the jamming device 10, thus RFIDenabled objects located behind and in front of the jamming device 10which are located within the jamming proximity can be inhibited from anunauthorised read.

As shown in FIG. 12, the jamming device 10 provided in the form of acard is preferably a thin device that can be tightfittingly receivedwithin a pocket of a wallet, purse or any other card carrying object,wherein the pocket is designed to tight fittingly receive a credit card,debit card, license or the like. In this regard, the jamming device thebody has a length between about 80 mm and 90 mm and a width of betweenabout 50 mm to 60 mm. More preferably, the length of the body is about86 mm and the width of the body is about 54 mm. The jamming device has athickness between about 1 mm to 3 mm, and more preferably about 2 mm.

In an optional embodiment, the jamming device 10 may be embedded withina card carrying object such as a purse or wallet. The switch interface40 may be located on an external surface of the card carrying objectsuch that the user is not required to open the card carrying object todisable the device.

It will be appreciated that although the above embodiments have beendescribed with respect to inhibiting unauthorised reading of an RFIDenabled object, other contactless readable objects may also be inhibitedusing the jamming device. In particular, it will be appreciated thatobjects which are enabled for Near Field Communication (NFC) can also beinhibited using the jamming device due to NFC being a subset of RFID.

It will also be appreciated that the jamming device non-selectively jamsthe reading of multiple contactless readable objects which are withinthe jamming proximity should the jamming device be operating in thefirst mode and an interrogation signal is received.

Optional embodiments of the present invention may also be said tobroadly consist in the parts, elements and features referred to orindicated herein, individually or collectively, in any or allcombinations of two or more of the parts, elements or features, andwherein specific integers are mentioned herein which have knownequivalents in the art to which the invention relates, such knownequivalents are deemed to be incorporated herein as if individually setforth.

Although a preferred embodiment has been described in detail, it shouldbe understood that many modifications, changes, substitutions oralterations will be apparent to those skilled in the art withoutdeparting from the scope of the present invention.

The present invention may take the form of an entirely hardwareembodiment, an entirely software embodiment, firmware, or an embodimentcombining software and hardware aspects.

1-37. (canceled)
 38. A jamming device for inhibiting unauthorisedcontactless reading of a contactless readable object when locatedadjacent to the jamming device, wherein the jamming device includes: anantenna for receiving an interrogation signal from a reader device; atouch sensitive interface which is separate to the antenna; and acircuit operatively connected to the antenna and the touch sensitiveinterface, wherein the circuit is configured to: operate in a first modeto generate and emit a jamming signal, via the antenna, in response toreceiving the interrogation signal whilst the touch sensitive interfacefails to indicate a touch event; and operate in a second mode whilst thetouch sensitive interface indicates a touch event, wherein the jammingsignal is not emitted via the antenna in response to receiving theinterrogation signal whilst operating in the second mode.
 39. Thejamming device according to claim 38, wherein the circuit generates thejamming signal to be indicative of random data.
 40. A jamming device forinhibiting unauthorised contactless reading of a contactless readableobject when located adjacent to the jamming device, wherein the jammingdevice includes: an antenna for receiving an interrogation signal from areader device; a touch sensitive interface; and a circuit operativelyconnected to the antenna and the touch sensitive interface, wherein thecircuit is configured to: operate in a first mode to generate and emit ajamming signal, via the antenna, in response to receiving theinterrogation signal whilst the touch sensitive interface fails toindicate a touch event, wherein the circuit generates the jamming signalto be indicative of random data; and operate in a second mode whilst thetouch sensitive interface indicates a touch event, wherein the jammingsignal is not emitted via the antenna in response to receiving theinterrogation signal whilst operating in the second mode.
 41. Thejamming device according to claim 38, wherein the jamming device has abody having a planar shaped profile having a first face and a secondface opposing the first face, wherein the body has a card shapedprofile, wherein the card shaped profile of the body is sized for beingtight fittingly received within a pocket of a card carrying object,wherein the pocket is sized to tightly receive a credit card.
 42. Thejamming device according to claim 41, wherein the body is a board whichprovides the circuit, the antenna and the touch sensitive interface. 43.The jamming device according to claim 42, wherein the antenna isprovided on a first face of the board and the touch sensitive interfaceis provided on a second face of the board.
 44. The jamming deviceaccording to claim 43, wherein the touch sensitive interface is locatedat an edge section of the first face of the board and a majority of theantenna is located at an edge section of the second face of the board.45. The jamming device according to claim 42, wherein the jamming deviceincludes at least one cover for covering at least part of the circuit onthe board.
 46. The jamming device according to claim 45, wherein thejamming device includes a battery electrically connected to the circuit,wherein the at least one cover covers the battery.
 47. The jammingdevice according to claim 46, wherein the board includes a cut-outsection which the battery partially protrudes therethrough or is atleast partially located therein.
 48. The jamming device according toclaim 47, wherein the at least one cover includes a first cover and asecond cover, wherein the first cover covers at least part of a firstside of the board and the second cover covers at least part of a secondside of the board such that the battery is covered by the first andsecond covers.
 49. The jamming device according to claim 45, wherein theat least one cover does not cover a majority of the antenna provided onthe board, wherein the majority of the antenna loops about a peripheryof the at least one cover.
 50. The jamming device according to claim 38,wherein the circuit includes an integrated circuit configured to:generate or retrieve jamming data in response to the antenna receivingthe interrogation signal; and modulate the jamming data with theinterrogation signal for generating the jamming signal.
 51. The jammingdevice according to claim 50, wherein the circuit includes one or morevisual indicators which are controllable by the integrated circuit toindicate at least one of: the circuit operating in the second mode; andthe circuit detecting the interrogation signal whilst operating in thefirst mode.
 52. The jamming device according to claim 51, wherein theone or more indicators include a second mode indicator controllable bythe integrated circuit for indicating whether the circuit is operatingin the second mode.
 53. The jamming device according to claim 52,wherein the one or more indicators include a jamming indicatorcontrollable by the integrated circuit for indicating transmission ofthe jamming signal.
 54. The jamming device according to claim 38,wherein the touch sensitive interface is one of: a capacitive sensinginterface; and a resistive sensing interface.
 55. The jamming device ofclaim 38, wherein the jamming device includes: a battery; an integratedcircuit electrically connected to the battery and the circuit; and thecircuit includes one or more visual indicators which are controllable bythe integrated circuit to indicate at least one of: the circuitoperating in the second mode; and the circuit detecting theinterrogation signal whilst operating in the first mode.
 56. The jammingdevice according to claim 38, wherein the jamming device has a bodyhaving a planar shaped profile having a first face providing the antennaand a second face opposing the first face providing the touch sensitiveinterface, wherein respective footprints of the antenna and the touchsensitive interface at least partially overlap.
 57. A method ofinhibiting unauthorised contactless reading of one or more contactlessreadable objects, wherein the method includes: locating a jamming deviceconfigured according to claim 38 adjacent one or more contactlessreadable objects thereby inhibiting unauthorised contactless reading ofthe one or more contactless readable objects whilst the circuit operatesin the first mode; and touching the touch interface of the jammingdevice to enable reading of the one or more contactless readableobjects.