Apparatus and method for preventing wireless interrogation of phones

ABSTRACT

An apparatus and method is provided to prevent contactless portable electronic consumer devices such as an RF identification device (RFID), tokens, mini-cards, key fobs, cellular phones, smart card, etc. from being wirelessly interrogated. In one embodiment, a decoy circuit capable of detecting wireless interrogation signals transmitted to a contactless portable consumer device is used to prevent one or more interrogation devices from interrogating an authentic circuit in the contactless portable consumer device.

CROSS-REFERENCES TO RELATED APPLICATIONS

This patent application is a continuation of and claims priority to U.S.patent application Ser. No. 11/165,969, filed on Jun. 24, 2005, which isincorporated herein by reference for all purposes.

BACKGROUND OF THE INVENTION

The present invention relates in general to radio frequencycommunication and in particular to various embodiments of activelypreventing portable electronic devices such as contactless smart cardsfrom being wirelessly interrogated.

Generally, portable electronic devices such as contactless smart cards,key fobs, radio frequency identification devices (RFID), cellularphones, etc. are designed to provide the consumer with a way to engagein wireless communication and data exchange using radio frequency (RF)signals. For example, contactless smartcards allow a consumer to storeand transmit financial data and other personal data to third partiessuch as banks. In another example, portable electronic devices such asRFIDs are used to wirelessly identify articles and allow monitoring ofsuch articles during manufacturing, shipment, storage, etc. Due to theincreased popularity of smartcards and RFIDs, it is envisioned that theywill eventually be used for virtually all transactions involved inbanking, health, insurance, social security, tracking, shipping, etc.

Because contactless electronic devices can operate without wires,contactless portable electronic devices are expected to replace othertypes of devices that require physical contact and/or physicalconnections to communicate with other devices and systems.Illustratively, smart cards are expected to replace regular creditcards, as they need not be in contact with a transaction terminal to beoperated. Regular contact credit cards having magnetic strips andcontact smartcards must come in contact with a reader. Similarly, RFIDsare expected to replace many of the bar code reading systems due to thefact that articles may be identified and tracked wirelessly.

A major benefit of contactless portable electronic devices is that theydo not have to be removed from a user's wallet, briefcase, backpack, orpurse to be used. Currently, an international standard has beenestablished that sets a standard range between a contactless reader andthe contactless portable electronic device. Therefore, a contactlessportable electronic device may wirelessly exchange data with acontactless reader without the user having to remove the contactlessportable electronic device from his wallet, purse, pocket, etc. as longas he is in range of the contactless reader. For simplicity and costsavings, contactless portable electronic devices often do not haveembedded power sources (i.e., batteries). For example, smartcards andRFIDs have an antenna designed to receive RF signals from thecontactless reader that is used to both power the smartcard/RFIDdevices, as well as enable them to communicate with the contactlessreader.

Unfortunately, due to the wireless nature of the contactless portableelectronic devices, it is entirely possible that a contactless readermay be used for surreptitious interrogation (e.g., data skimming) of thecontactless portable electronic devices. In addition, it is conceivablethat a contactless reader may be developed or modified to generate amuch greater RF signal strength and sensitivity and thereby increase thestandard range. Such an enhanced reader may allow surreptitiousinterrogation of the contactless portable electronic devices from agreater range.

As theft of sensitive information using wireless interrogation ofcontactless portable electronic devices is a major concern for consumersand businesses alike, law enforcement agencies are actively seeking waysto discover when such activity is taking place. Unfortunately, given thesophistication of the wireless interrogation equipment and the nature ofwireless signals, it is easy for wireless interrogation to occurvirtually at any time and place. Once the victim of the wirelessinterrogation discovers that they had sensitive information stolen, itis often too late to discover where the theft took place. Thus, theunauthorized interrogations may continue unabated.

Therefore, what is needed is a device and method that prevents thecontactless portable electronic devices from unauthorized interrogationthat is simple to use and is cost effective.

BRIEF SUMMARY OF THE INVENTION

Embodiments of the present invention provide an apparatus and method forpreventing a contactless portable consumer device such as a smartcard,RFID, key FOB, tag, and the like from being wireless interrogated.

In one embodiment, the present invention provides a decoy circuitcapable of detecting wireless interrogation signals transmitted to acontactless portable consumer device, wherein the decoy circuit isconfigured to prevent one or more interrogation devices frominterrogating an authentic circuit in the contactless portable consumerdevice.

In another embodiment, the present invention provides a method includingdetecting a wireless interrogation signal from an interrogation deviceusing a decoy circuit, responding to the wireless interrogation signalwith the decoy circuit, wherein the response from the decoy circuit ismore rapid than a response from a corresponding authentic circuit in acontactless portable consumer device, and providing decoy data to theinterrogation device in response using the decoy circuit.

In another embodiment, the present invention provides for a system thatincludes a contactless portable consumer device, which includesauthentic data, and a decoy device. The decoy device includes decoydata. The decoy device is adapted to provide the decoy data to aninterrogation device before or instead of the authentic data.

In another embodiment, the present invention provides a method includingobtaining a contactless portable consumer device and a decoy device,placing the contactless portable consumer device adjacent to the decoydevice, receiving an interrogation signal at the contactless portableconsumer device and at the decoy device from an interrogation device;and sending decoy data from the decoy device to the interrogationdevice.

These and other embodiments of the invention are described in furtherdetail below.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a front view illustrating one embodiment of a wireless decoydevice positioned in proximity to a contactless portable consumer devicein accordance with embodiments of the invention;

FIG. 2 is a front view illustrating one embodiment of an envelope usedto store a wireless decoy device and a contactless portable consumerdevice in accordance with embodiments of the invention;

FIG. 3A is a front view illustrating one embodiment of a wallet having awireless decoy device disposed therein in proximity to a contactlessportable consumer device in accordance with embodiments of theinvention;

FIG. 3B is a front view illustrating one embodiment of a wallet having awireless decoy device disposed on or integral to a liner positioned inproximity to a contactless portable consumer device in accordance withembodiments of the invention;

FIG. 4 is a high-level block diagram illustrating one embodiment ofwireless decoy circuit in accordance with embodiments of the invention;

FIG. 5 is a high-level flow diagram illustrating one embodiment of amethod of preventing wireless interrogation of a contactless portableconsumer device in accordance with embodiments of the invention; and

FIG. 6 is a high-level flow diagram illustrating one embodiment of amethod of determining the location and/or time of a wirelessinterrogation of a contactless portable consumer device, in accordancewith embodiments of the invention.

DETAILED DESCRIPTION OF THE INVENTION

Embodiments of the present invention provide for a wireless decoy deviceand method of preventing a contactless portable consumer device frombeing wirelessly interrogated with an unauthorized interrogation device.An unauthorized interrogation device can be used to surreptitiouslyinterrogate a portable consumer device when it is being shipped to aconsumer or while the consumer is carrying it. The wireless decoy devicemay be separate from, attached to, or incorporated within the portableconsumer device.

In one embodiment, the wireless decoy device has decoy data which may besent to an unauthorized interrogation device instead of authentic data.Alternatively or additionally, such decoy data may allow the wirelessdecoy device to establish a communication lock or multiple sessions withan unauthorized interrogation device simulating one or more authenticdevices so that data transfer (e.g., the unauthorized transfer of bankaccount numbers) between a contactless portable consumer device and theunauthorized interrogation device does not occur.

The contactless portable consumer devices according to embodiments ofthe invention may be in any suitable form. For example, the contactlessportable consumer devices can be hand-held and compact so that they canfit into a consumer's wallet and/or pocket (e.g., pocket-sized). Forexample, the contactless portable consumer devices may includesmartcards, ordinary credit or debit cards (with a magnetic strip andwithout a microprocessor), a keychain device (such as the Speedpasscommercially available from Exxon-Mobil Corp.), key Fob, etc. Otherexamples of contactless portable consumer devices include cellularphones, personal digital assistants (PDAs), pagers, payment cards,security cards, access cards, smart media, transponders, and the like.Such contactless portable consumer devices can have one or more antennasthat can transmit and/or receive signals and data through a wirelesscommunication medium.

An exemplary contactless portable consumer device may include a memorysuch as a memory chip and/or a microprocessor. Either may beoperationally coupled to the antenna in the contactless portableconsumer device. The memory preferably contains information such asfinancial information or in the most simplistic form a built in wiredlogic. Financial information may include information such as bankaccount information, credit or debit card number information, accountbalance information, consumer information, etc. If the contactlessportable consumer device is in the form of a debit, credit, orsmartcard, the contactless portable consumer device may also optionallyhave features such as magnetic strips. Such devices can operate ineither a contact or contactless mode.

The contactless portable consumer devices according to embodiments ofthe invention can be used with authorized interrogation devices (e.g.,authorized readers) that can also have antennas. Such authorizedinterrogation devices may be present at point of sale (POS) terminals,ATM (automatic teller machines), and the like. Such interrogationdevices are well known in the art.

FIG. 1 is a front view illustrating one embodiment of a wireless decoydevice 100 disposed with respect to a conventional contactless portableconsumer device 102. For purposes of illustration, the wireless decoydevice 100 is described in terms of a general rectangular shape.However, it is to be understood that wireless decoy device 100 may haveany shape as long as the wireless decoy device 100 prevents the transferof data from the contactless portable consumer device 102. As shown inFIG. 1, the contactless portable consumer device 102 includes aprocessor 104 (or logic circuitry) and an antenna 106 integrated into abody 108. Processor 104 may also be a memory based hard wired logic.Generally, contactless portable consumer devices 102 do not containpower sources. They are powered by the wireless interrogation signals.For example, the antenna 106 is designed to receive wirelessinterrogation signals and provide power from such wireless interrogationsignals to processor 104 for operation thereof.

The wireless decoy device 100 includes a wireless decoy circuit 112coupled to a decoy antenna 114. The gain (the ability of the antenna topick up signals) of decoy antenna 114 may be designed to increase thesensitivity of the wireless decoy device 100 to wireless interrogationsignals. For example, the decoy antenna 114 may be increased inreception area as is known in the art to increase the signal receptionproperties by about 10 dB or more. The decoy antenna 114 may also be anactive antenna having a gain boosting circuit as known. In anotherembodiment, the decoy antenna 114 may also be designed in shape andmaterial to absorb sufficient wireless interrogation signal power toreduce the available power of surrounding wireless interrogation signalsto a very low level making it more difficult for contactless reader 110to activate the contactless portable consumer device 102.Advantageously, increased antenna gain provides the wireless decoydevice 100 with the ability to detect wireless interrogation signalsbefore the portable consumer device 102 is activated and/or can processthe wireless interrogation signals. The wireless decoy circuit 112 anddecoy antenna 114 are generally integrated into the body 116 of thewireless decoy device 100. Generally, the decoy antenna 114 may be afirst antenna and is configured to be sensitive to a specific spectrumof RF signals used with an interrogation device such as contactlessreader 110. In other words, the contactless portable consumer device 102and wireless decoy device 100 are designed to receive signals from thecontactless reader 110 within a particular range of frequencies. Thecontactless reader 110 includes a second antenna that transmits and/orreceives a signal from the decoy antenna 116 and the antenna 106 of thecontactless portable consumer device 102.

In one embodiment, the wireless decoy device 100 is an electronic decoyplaced between the antenna of the contactless reader 110 and thecontactless portable consumer device 102. The wireless decoy device 100is designed to deceive (e.g., trick) the contactless reader 110 intobelieving that the wireless decoy device 100 is a legitimate contactlessportable consumer device 102. The wireless decoy device 100 prevents thecontactless reader 110 from interrogating the portable consumer device102 by establishing a one-on-one communication link. The one-on-onecommunication link is designed to lock the contactless reader 110 into asingular communication session (e.g., an exclusive communicationexchange) with the wireless decoy device 100.

The wireless decoy device 100 may also include a plurality of decoyantennas 116 coupled to a plurality of wireless decoy circuits 112designed to simulate a plurality of authentic (i.e., legitimate)contactless portable consumer devices 102. In this embodiment, theplurality of decoy antennas 116, and wireless decoy circuits 112, may beused alone, or in combination, to simulate a plurality of differentauthentic contactless portable consumer devices 102 operating atdifferent frequencies, different operating standards, and the like. Insummary, the wireless decoy device 100 acts as one or more legitimatecontactless portable consumer devices 102 which can establish aone-on-one session with one or more contactless readers 110 therebypreventing the one or more contactless readers 110 from interrogatingone or more contactless portable consumer devices 102.

A consumer may legitimately use the contactless portable consumer device102 with an authorized interrogation device by physically separating thecontactless portable consumer device 102 from the decoy device 100. Forexample, the decoy device 100 and the portable consumer device 102 maybe adjacent to each other in a person's wallet. The person may thenremove the portable consumer device 102 from the wallet and may leavethe decoy device 100 the wallet. The portable consumer device 102 maythen be placed close to an authorized contactless interrogation deviceto conduct an authorized financial transaction. The decoy device 100 isout of the operating range of the authorized interrogation device sothat decoy data is not sent to the authorized interrogation device.

In one embodiment, the body 116 of wireless decoy device 100 may beformed into a sticker for attachment to a contactless portable consumerdevice 102. The sticker is formed from one or more layers of polymers,metal alloys, or other conductive materials such as non-ferromagneticmaterials such as aluminum, copper, brass, stainless steel, and thelike, used to further shield the contactless portable consumer device102 from wireless interrogation signals. The one or more layers ofmaterials may be formed in a flexible carrier such as a paper orpolymeric substrate. The sticker includes a temporary adhesive totemporarily affix the sticker to the contactless portable consumerdevice 102. The adhesive may be virtually any type of adhesive as isknown that temporarily bonds items together.

The stickers may also have any suitable size or shape. The sizes andshapes of the stickers may correspond to the shapes and sizes of thecontactless portable consumer device 102. In addition, in someembodiments, the size, shape, and material used in the sticker may beadjusted to optimize its signal detection properties relative to thefrequency of operation for the particular contactless portable consumerdevice 102 being used. For example, the antenna 114 may be integrated asa part of the sticker and shaped to enhance its sensitivity. Thestickers may also be printed with information pertinent to the user ofthe contactless portable consumer device 102. For example, the stickersmay contain information such as instructions regarding how to activate acontactless portable consumer device 102 (e.g., by dialing a toll-freenumber and then following the recorded instructions).

FIG. 2 is a front view illustrating one embodiment of an envelope 200designed to hold a carrier 204, which includes a wireless decoy device100, along with a contactless portable consumer device 102. The envelope200 is an example of a flexible carrier. For clarity, a common envelopeshape is illustrated. However, it is to be understood that any type ofenvelope or enclosure shape and/or configuration capable of holding thecontactless portable consumer device 102 and the carrier 204 may beused. The carrier 204 may be separate from the envelope 200, attached tothe envelope 200, or integrally formed with the envelope 200. Forexample, the carrier 204 may be an RF shield formed of anon-ferromagnetic conductive internal coating of envelope 200 used toshield the contactless portable consumer device 102 from wirelessinterrogation signals. Exemplary embodiments of RF shield may be foundin co-pending patent application Ser. No. 11/165,901, docket number of16222U-022200US, entitled “Apparatus And Method To ElectromagneticallyShield Portable Consumer Devices” which is hereby incorporated byreference in its entirety, and is being filed on the same day as thepresent application.

The embodiment in FIG. 2 and the above-described sticker embodiments areparticularly suitable when a portable consumer device is mailed to aconsumer. As will be apparent from the description herein, these andother embodiments protect the contactless portable consumer device 102from unauthorized data access when the contactless portable consumerdevice 102 is being transported through the mail or the like.

FIG. 3A is a front view illustrating one embodiment of a wallet 300having a wireless decoy device 100 being disposed therein with respectto a contactless portable consumer device 102. In one embodiment, thewireless decoy device 100 is designed to fit within a holder 302 of thewallet 300. The wallet 300 may be an example of a flexible carrier. Theholder 302 may be any suitable storage area of the wallet 300 (e.g.,pouch, recess, etc.). For example, the holder 302 may be a conventionalcredit card pocket. Illustratively, holder 302 may be configured to holdpictures or other items. The wireless decoy device 100 is configured tobe positioned within holder 302 in proximity to contactless portableconsumer device 102 such that, similar to wireless decoy device 100described with respect to FIGS. 1-2 above, any RF signals within afrequency range and power level suitable for activating the contactlessportable consumer device 102 are detected.

FIG. 3B is a front view illustrating an embodiment of a wallet 300having a liner 304 integrated with a wireless decoy device 100 to form adecoy insert 306 positioned in proximity to a contactless portableconsumer device 102. Similar to the carrier 204 described above, thedecoy insert 306 is formed to be integrated with the wallet 300. In oneembodiment, the decoy insert 306 is configured to slip into aconventional momentary holding pocket 308 extending, for example,lengthwise along the wallet 300. In another embodiment, the decoy insert306 may be manufactured with the wallet 300 as a hidden liner. The decoyinsert 306 may also be integrated with the wallet 300 such that some orall of the liner 304 is in view. For example, the liner 304 may beformed of one or more layers of conductive materials with a specializeddesign, color, surfaces, etc., to enhance the uniqueness of the wallet'slook and feel. In either case (as a separate liner, or integrated intothe wallet 300), the decoy insert 306 is configured to detect RF signalswithin the operation frequency range of the contactless portableconsumer device 102.

FIG. 4 is a high-level block diagram illustrating one embodiment of thewireless decoy device 112. Wireless decoy device 112 may be virtuallyany type of integrated circuit and/or data processing system such as amicroprocessor, field programmable integrated circuit (FPGA),application specific integrated circuit (ASIC), and the like, that maybe configured to perform embodiments of the present invention toadvantage. In one embodiment, wireless decoy circuit 112 includesCentral Processing Unit (CPU) 402, a fast response circuit 404, a RFtransceiver circuit 406, and a memory 410 in communication therewith viabus 418. CPU 402 may be under the control of an operating system thatmay be disposed in memory 410. Virtually any operating system or portionthereof supporting the configuration functions disclosed herein may beused. In one embodiment, CPU 402 may be hardwired logic circuitry, andthe like, adapted to operate wireless decoy circuit 112.

To enhance the operation of the wireless decoy device 100 to detect andprocess wireless interrogation signals, the wireless decoy circuit 112may include an optional power source 440. The power source 440 allowsthe wireless decoy circuit 112 to be receptive to wireless interrogationsignals without using such signal for power. Power source 440 may bevirtually any number and type of standalone power sources such asbatteries, solar power sources, fuel cells, and the like, that arecapable of operating wireless decoy circuit 112 for a predeterminedperiod.

In one embodiment, the fast response circuit 404 is used to detectwireless interrogation signals before the contactless portable consumerdevice 102 has a chance to activate and/or respond to the contactlessreader 110. In one embodiment, the fast response circuit 404 is designedwith one or more high speed RF detection circuits such as diodedetection circuits, mixer detection circuits, and other circuitsdesigned to detect the wireless interrogation signals at a power levelof at least that of, or less, than the contactless portable consumerdevice 102. Optionally, to avoid false detection, the fast responsecircuit 404 may employ conventional RF signal filtering such as bandpass, low pass, and high pass filters, that only pass a selected RFsignal spectrum, generally within the operational frequency range of thecontactless portable consumer device 102.

The RF transceiver 406 may be designed to receive wireless interrogationsignals and transmit communication signals to the contactless reader 110via antenna 114. Any number of wireless communication devices well knownin the art may be used to accomplish the reception and transmission ofdata between contactless reader 110 and the contactless portableconsumer device 102. For example, the RF transceiver 406 may be formedfrom a wireless receiver in combination with a wireless transmitter asis known. In another example, the RF transceiver 406 may be similar tothe transceiver circuitry (not shown) integral to the contactlessportable consumer device 102. In other words, virtually any wirelesstransceiver system that is sized accordingly and capable ofcommunicating with contactless reader 110 may be used.

The RF transceiver 406 may also be configured to transmit an alert ondifferent frequencies, or the same frequency, to alert others, and/orthe user of the wireless decoy device 100, about the wirelessinterrogation signals. The RF transceiver may transmit the alert eitherseparately and/or simultaneously and may use different communicationprotocols to keep the interrogation device from discerning that thewireless decoy device 100 is a decoy. For example, the alertcommunication may be transmitted using any viable communication linksuch as Bluetooth, 802.11x, cellular network, RF, and the like. Forexample, consider a case where a contactless reader 110 is attempting anunauthorized interrogation of a contactless portable consumer device 102during shipment. When the fast response circuit 404 detects wirelessinterrogation signals, the RF transceiver 406 transmits communicationprotocols to the contactless reader 110 to establish a communicationlink. Simultaneously, or at a later time, the RF transceiver 406 mayalso transmit data alerting a third party, such as a law enforcementagency, that a contactless reader 110 has attempted to and/or accessedthe wireless decoy device 100. Advantageously, in this embodiment, asthe wireless decoy device 100 is in proximity to the contactlessportable consumer device 102, the wireless decoy device 100 is capableof detecting wireless interrogation signals in real time andtransmitting an alert to any receiver system configured to receive thealert. In one embodiment, in addition to, or in lieu of, the wirelessalert described above, the wireless decoy device 100 may include anindicator (not shown), such as an light emitting diode (LED), speaker,vibrator, and the like. For example, the LED may illuminate and/or thespeaker may produce a tone to indicate that it is being interrogated bya contactless reader 110.

Memory 410 is preferably a random access memory sufficiently large tohold the necessary programming and data structures of the invention.While memory 410 is shown as a single entity, it should be understoodthat memory 410 may in fact comprise a plurality of modules, and thatmemory 410 may exist at multiple levels, from high speed registers andcaches to lower speed but larger direct random access memory (DRAM)chips. In one embodiment, memory 410 may include a decoy program 410that, when executed on CPU 402, controls at least some data processingoperations of wireless decoy circuit 112. The decoy program 410 may useany one of a number of different programming languages. For example, theprogram code can be written in PLC code (e.g., ladder logic), ahigher-level language such as C, C++, Java, or a number of otherlanguages. While decoy program 410 may be a standalone program, it iscontemplated that decoy program 410 may be combined with other programs.

The decoy program 410 is configured to control the wireless decoycircuit 112 such that when wireless interrogation signals are detectedby the fast response circuit 404, the decoy program 410 establishes adecoy communication link with the contactless reader 110 associated withthe wireless interrogation signals. To establish the communication link,the decoy program 410 operates CPU 402 to perform a variety ofactivities in response to wireless interrogation signals. For example,the decoy program 410 provides decoy data 414 via RF transceiver 404,described below, to establish and maintain a one-on-one communicationdialog with the contactless reader 110. In one embodiment, during acommunication session, the decoy program 410 and CPU 414 may process “aturn off” or “halt” requests from the contactless reader 110, but willignore such requests to stop or turn off. This allows the wireless decoydevice 100 to continue the interrogation process, thereby providing oneway for the wireless decoy device 100 to lock the contactless reader 110into a one-on-one communication session.

In other embodiments, the decoy program 410 and CPU 402, may processdata related to the wireless interrogation signals for storage thereofin memory 410. For example, the decoy program 410 and CPU 402 mayprocess the time, date, power level, frequency, and the like, associatedwith wireless interrogation signals for storage thereof in memory 410.

In one embodiment, memory 410 includes decoy data 414. Decoy data 414 isused to provide bogus data (e.g., fake data) to the contactless reader110 via RF transceiver 406. For example, such decoy data 414 may includedecoy financial transaction detail, decoy communication protocols, decoycommunication messages, and the like, which is intended to deceive thecontactless reader 110 into believing that it is communicating with alegitimate contactless portable consumer device 102. In otherembodiments, the decoy data 414 may provide seed data. The seed data maybe used to capture an unauthorized wireless interrogation device. Forexample, the seed data may be specific account numbers and informationthat are readily traceable by financial institutions, law enforcementagencies, etc. In other examples, such seed data may allow theunauthorized user to process financial and other types of legitimatelooking transactions that ultimately may be traced to particular groupsand/or individuals.

In one embodiment, the decoy data 414 includes multiple sets of devicesimulation data to ensure that it can provide multiple responses to thecontactless reader 110 thereby simulating multiple authentic devices tothe contactless reader 110. For example, the multiple sets of simulateddata enable the wireless decoy device 100 to assume any number ofdifferent identities to the contactless reader 110. Therefore, when thecontactless reader 110 is finished interrogating one identity, thewireless decoy device 100 may take on a new identity for the contactlessreader 110 to interrogate. For example, as a consumer may have more thanone smartcard in their wallet (or purse), the wireless decoy device 100may take on the multiple sets of simulated data to simulate thosesmartcards or many other types of contactless portable consumer devices102. This embodiment is advantageous as it enables the wireless decoydevice 100 to remain in communication with the contactless reader 110that believes that it is interrogating more than one contactlessportable consumer device 102. Thus, this embodiment enables the wirelessdecoy device 100 a way to lock the contactless reader 110 in virtuallyan unlimited amount of one-on-one communication sessions.

Optionally, memory 410 includes location/time data 416. In oneembodiment, location/time data 416 is data gathered by a globalpositioning system (GPS) or other devices and systems used to trackgeographic and/or time. For example, wireless decoy circuit 112 mayinclude an optional GPS 420 with GPS antenna 422, which provides thegeographic location of the wireless decoy circuit 112. The GPS 420 maybe virtually any type of geographic location system, such as a wirelesstriangulation system, and may be integrated with a clock or timingdevice that can provide date and time information. Advantageously, suchgeographic and/or time data may be used to track unauthorized wirelessinterrogation. For example, consider the case where a piece of luggage(not shown) is being shipped with an RFID flex tag along with a wirelessdecoy device 100, the time and/or geographic data may be transmitted toother devices used, for example, by law enforcement agencies to detectwhere and/or when a wireless interrogation is occurring as the luggageis being transported.

FIG. 5 is a high-level flow diagram illustrating one embodiment of amethod 500 of preventing wireless interrogation of a contactlessportable electronic device 102. Method 500 may be entered into at step502 when, for example, a wireless decoy device 100 detects wirelessinterrogation signals. At 504, method 500 is seeking wirelessinterrogation signals. At step 506, the method 500 determines whether ornot any wireless interrogation signals have been detected. For example,in one embodiment, wireless decoy device 100 may be activated bywireless interrogation signals which are then detected by fast responsecircuit 404. In other embodiments, method 500 does not require that thewireless interrogation signals act as a power source. If no wirelessinterrogation signals are detected at step 506, method 500 returns to504 and continues to actively seek out wireless interrogation signals atstep 506. If however, one or more wireless interrogation signals aredetected, then a decoy handshake is transmitted to one or moreinterrogation devices (e.g., contactless readers 110) at step 508. If atstep 510, the handshake protocol is not correct, then the method 500proceeds to step 512 to determine a different handshake protocol andreturns to step 508. However, at step 510, if the handshake is acceptedby an interrogation device, then at step 514, the method 500 establishesa one-on-one communication link, or multiple concurrent sessions, withthe interrogation device. At step 516, decoy data 414, for example, maybe provided to the interrogation device. The decoy data 414 is designedto deceive the interrogation device into believing that it iscommunicating with a legitimate contactless portable consumer device102.

In other embodiments, at step 516, some of the communication may pertainto discovering more about the interrogation device that is attempting towirelessly interrogate a contactless portable consumer device 102. Forexample, method 500 may inquire directly from the interrogation device,for example, who the interrogation device is, where the interrogationdevice is located, and the like. The method 500 may also receive dataassociated with the wireless interrogation from other sources besidesthe interrogation device. For example, the method 500 may request andreceive data such as the type and frequency of the wirelessinterrogation signal, the number of interrogation attempts, and thelike. In one embodiment, the method 500 may also include receiving datapertaining to the location and/or time of the wireless interrogation asdescribed below with regard to method 600. At step 518, if thecommunication link is ended, for example, by the wireless decoy circuit112 moving out of range of the interrogation device, the method 500proceeds to 520. At step 520, method 500 determines if it is finished,if so, then the method 500 ends at step 522. If, however, at step 520,the method 500 is not finished, then it returns to 504 to detectwireless interrogation signals.

FIG. 6 is a high-level flow diagram illustrating one embodiment of amethod 600 of determining during wireless interrogation otherinformation, including information associated with the geographiclocation and/or time of when a wireless decoy device 100 issurreptitiously interrogated. Method 600 may be entered into at step 602when for example the wireless decoy device 100 detects wirelessinterrogation signals. Similar to method 500, method 600 does notrequire the wireless interrogation signals be used as a power source. Atstep 604, the method 600 determines whether or not there are anywireless interrogation signals. If there are wireless interrogationsignals, then at step 606 the method 600 determines a geographiclocation of the wireless interrogation. For example, consider the casewhere a person carrying a wallet 300 contactless portable consumerdevices 102 and a wireless decoy device 100 is passing in proximity to ainterrogation device. As the person passes in range of the interrogationdevice, at step 606, the method 600 determines the approximategeographic location of the wireless decoy device 100. In one embodiment,the method 600 at step 608 receives geographic data from a GPS 420located in proximity of, or integral to, the wireless decoy device 100.At step 610, the method 600 processes the geographic data received atstep 608 and determines the geographic location. In one embodiment,processing the geographic data can occur in the wireless decoy device100 as part of the decoy program 410, and/or may also occur in a thirdparty processing system, for example, a processing system used by lawenforcement. Method 600 at step 612 determines if the time and date dataassociated with the wireless decoy device 100 is available. If the timeand/or date data is not available, then the method 60 proceeds to 620described below. If, however, the time and/or date data is availablethen at step 614, method 600 stores the time and/or date of the wirelessinterrogation (e.g., stores the time and/or date information in memory410). For example, at steps 616 and 618, the method 600 receives anddetermines the time and date of when the wireless interrogationoccurred. At step 620, the method 600 determines if it is finished. Forexample, the wireless decoy device 100 may be separated from thecontactless portable consumer device 102, and/or is disabled. If themethod 600 is not finished, then at step 620, the method returns to 602.If, however, method 600 is finished, it ends at step 622.

Any of the above described functions may be may be implemented ascomputer code in a computer program-product for use with a computersystem. The program can be provided to a computer via a variety ofcomputer-readable media (i.e., signal-bearing medium), which include butare not limited to, volatile and non-volatile memory devices includingRAMs, ROMs, EEPROMs, magnetic strips, etc.

It is apparent to one skilled in the art that various changes andmodifications can be made to this disclosure, and equivalents employed,without departing from the spirit and scope of the invention. Elementsshown with any embodiment are exemplary for the specific embodiment andcan be used on other embodiments within this disclosure.

1. A phone comprising: a decoy circuit configured to detect wirelessinterrogation signals transmitted to the phone and to prevent one ormore interrogation devices from interrogating an authentic circuit inthe phone by deceiving the one or more interrogation devices intobelieving the decoy circuit is the authentic circuit.
 2. The phone ofclaim 1, further comprising a memory that includes at least financialinformation or health information, and combinations thereof.
 3. Thephone of claim 1, wherein the decoy circuit comprises an antenna that isat least as sensitive as an antenna associated with the phone.
 4. Thephone of claim 1, wherein the decoy circuit comprises a detectioncircuit that responds more quickly to the wireless interrogation signalsthan the phone.
 5. The phone of claim 1, wherein the decoy circuitcomprises a decoy program configured to simulate the authentic circuit.6. The phone of claim 1, wherein the decoy circuit comprises decoy dataconfigured to simulate data associated with the phone.
 7. The phone ofclaim 1, wherein the decoy circuit comprises a location device capableof determining where the decoy circuit detected the wirelessinterrogation signals.
 8. The phone of claim 1, wherein the decoycircuit comprises a timing device capable of determining when the decoycircuit detected the wireless interrogation signals.
 9. The phone ofclaim 1, further comprising a transceiver configured to transmit analert indicating that the wireless interrogation signals have beentransmitted to the phone.
 10. A method for preventing interrogation of aphone comprising: detecting a wireless interrogation signal from aninterrogation device using a decoy circuit; and responding to thewireless interrogation signal with the decoy circuit, wherein theresponse from the decoy circuit is more rapid than a response from acorresponding authentic circuit in the phone, and wherein the responsefrom the decoy circuit is configured to deceive the interrogation deviceinto believing the decoy circuit is the authentic circuit.
 11. Themethod of claim 10, wherein detecting the wireless interrogation signalcomprises detecting the wireless interrogation signal at a signal levellower than the phone can detect.
 12. The method of claim 10, furthercomprising determining a geographic location of the phone.
 13. Themethod of claim 10, further comprising sending an alert indicating thata wireless interrogation signal has been transmitted to the phone.
 14. Asystem comprising: a phone comprising authentic data; and a decoy devicecomprising decoy data, wherein the decoy device is adapted to providethe decoy data to an interrogation device, the decoy data beingconfigured to deceive the interrogation device into believing the decoydata is the authentic data.
 15. The system of claim 14, wherein thedecoy device is adapted to respond to a signal from the interrogationdevice before the phone responds to the signal when both the phone andthe decoy device are within an operating range of the interrogationdevice.
 16. The system of claim 14, wherein the authentic data comprisesfinancial information.
 17. A method for preventing interrogation of aphone having authentic data comprising: placing the phone adjacent to adecoy device; receiving an interrogation signal at the decoy device froman interrogation device; and sending decoy data from the decoy device tothe interrogation device, wherein the decoy data is configured todeceive the interrogation device into believing the decoy data is theauthentic data.
 18. The method of claim 17, further comprising sendingthe authentic data to the interrogation device after the decoy data issent from the decoy device.
 19. The method of claim 17, wherein thedecoy data comprises a decoy account number.