Method, system and apparatus for NFC security

ABSTRACT

A method, system and apparatus for providing security to RFID and NFC systems. In some exemplary embodiments, a smart poster may be utilized to provide appropriate or desired communications with an RFID or NFC-enabled device. Such exemplary embodiments may utilize an authorized NFC tag to communicate with an NFC-enabled device, and upon activation of the authorized NFC tag, may trigger activation or appearance of one or more related items, such as visual cues. Additionally, aspects of NFC security systems which can include regions of security, states of activity and actions performed when security violations are detected.

CROSS-REFERENCE TO RELATED APPLICATION

The present application claims the benefit of U.S. Provisional PatentApplication No. 61/715,426 filed Oct. 18, 2012, which is incorporatedherein by reference in its entirety.

BACKGROUND OF THE INVENTION

Radio frequency identification (RFID) devices, including near fieldcommunication (NFC) enabled RFID devices, are utilized for a variety ofpurposes. Often such devices are formed as tags or labels and can beutilized to associate an object with an identification code or otherdata, such as website data. Such RFID devices may be passive and, uponreceiving a signal, such as an excitation signal from an RFID orNFC-enabled reader, may be energized. The devices can then respond witha desired communication or provide information associated with aproduct, item or service associated with the RFID device.

Specifically, NFC is a data exchange protocol designed to allow devices,including suitably equipped mobile phones and the like, to interact withinfrastructures, such as point of sale terminals and ticket gates ontransportation systems, or RFID devices in the forms of “smart posters”or “touchpoints”, for example. In such situations, bringing an NFCenabled device into proximity of such infrastructure or RFID devices cancause the transmission of data to the NFC enabled device, resulting in,for example, the opening of a web page, the acceptance of a media streamvia Bluetooth® or any of a number of other functions.

Often the manner of associating a product, item or service with an RFIDdevice is to physically couple or adhere the RFID device to the productor item, or associate it with advertising relating to the product, itemor service, such as the “smart poster” or “touchpoint” described above.For example, RFID labels may be coupled adhesively to objects or mayotherwise have surfaces that attach directly to objects. RFID tags maybe secured to objects in other manners, such as through the use of aplastic fastener, string or other fastening mechanism. Such RFID devicesmay then provide data to NFC enabled devices located or placed proximatethe RFID devices.

Additionally, RFID devices are often associated with the product oritem, or advertising item, in such a manner as to conceal or secure theRFID device. Such methods can provide security against the removal ormisuse of an RFID device. However, in such circumstances, andparticularly with NFC enabled devices designed to convey information toconsumers with NFC enabled mobile phones and devices, there is adesignated area (touchpoint) on an advertisement or product thatindicates information can be obtained if the NFC enabled device isplaced in close proximity to an area associated with the RFID device.However, as it is then known that information can be obtained from suchareas, vandal or pirate RFID devices are often placed in close proximityto the indicated NFC area. The vandal or pirate devices often containdeceptive, misleading, undesired or malicious information. These devicescan be coupled with or adhered to products and items, or advertisementsassociated with those items, leading to inappropriate or maliciousinformation being unknowingly communicated to a user's NFC-enableddevice. The current invention provides a possible solution to thisproblem.

SUMMARY

A method, system and apparatus for providing security to RFID and NFCsystems. In some exemplary embodiments, a smart poster may be utilizedto provide appropriate or desired communications with an RFID orNFC-enabled device. Such exemplary embodiments may utilize an authorizedNFC tag to communicate with an NFC-enabled device, and upon activationof the authorized NFC tag, may trigger activation or appearance of oneor more related items, such as visual cues. Additionally, aspects of NFCsecurity systems which can include regions of security, states ofactivity and actions performed when security violations are detected.

BRIEF DESCRIPTION OF THE DRAWINGS

Advantages of embodiments of the present invention will be apparent fromthe following detailed description of the exemplary embodiments. Thefollowing detailed description should be considered in conjunction withthe accompanying figures in which:

FIG. 1 is an exemplary view of a poster with an embedded RFID device.

FIG. 2 is an exemplary view of a poster with an embedded RFID device anda security system.

FIG. 3 is an exemplary diagram showing a security system that may beused with an RFID device.

DETAILED DESCRIPTION

Aspects of the invention are disclosed in the following description andrelated drawings directed to specific embodiments of the invention.Alternate embodiments may be devised without departing from the spiritor the scope of the invention. Additionally, well-known elements ofexemplary embodiments of the invention will not be described in detailor will be omitted so as not to obscure the relevant details of theinvention. Further, to facilitate an understanding of the description,discussion of several terms used herein follows.

As used herein, the word “exemplary” means “serving as an example,instance or illustration.” The embodiments described herein are notlimiting, but rather are exemplary only. It should be understood thatthe described embodiments are not necessarily to be construed aspreferred or advantageous over other embodiments. Moreover, the terms“embodiments of the invention”, “embodiments” or “invention” do notrequire that all embodiments of the invention include the discussedfeature, advantage or mode of operation.

Generally referring to FIGS. 1-3, a smart poster, such as a poster thatincorporates an authorized RFID device, including an authorized NFC tag,may be utilized to provide appropriate or desired communications with anRFID or NFC-enabled device. Such exemplary embodiments may utilize anauthorized NFC tag to communicate with an NFC-enabled device, and uponactivation of the authorized NFC tag, may trigger activation orappearance of one or more related items, such as visual cues.Additionally, aspects of NFC security systems which can include regionsof security, states of activity and actions performed when securityviolations are detected. Additionally, while some of the exemplaryembodiments described discuss either RFID or NFC communicationcapabilities, it may be appreciated that such capabilities may beembodied in the same device or such capabilities may be usedinterchangeably in some instances.

Referring now to exemplary FIG. 1, a view of a display 100 having aposter 106 with a supporting frame 102 is provided. In the exemplaryembodiment, poster 106 may be any type of poster, formed of any type ofmaterial, and may be utilized to convey any type of information. Theposter can be formed from any acceptable material, including but notlimited to paper, foils and plastic/films. The information conveyed canbe any desired type, including, but not limited to, advertisements,personal care, health care and product or service information. Thestructural frame 102 can provide a secure containment of poster 106, anauthorized communication device, such as authorized NFC tag 114 anddesired related components or electronics, such as, but not limited to,lighting and an NFC security system. Frame 102 may be any type ofdesired frame and may be formed out of any desired materials.Additionally, frame 102 may be such that it can be formed with anintegral antenna or may be retrofitted with an antenna.

In FIG. 1, the exemplary poster 106 may contain visual information 108,for example an advertisement for a product or any other desired visualinformation. Additionally, NFC tag 114 may be provided with a visualindicator 116 associated therewith. The visual indicator 116 may be anytype of static or electronic visual indicator and may be used, forexample, to guide user to an appropriate region to place NFC-enableddevices that can read the authorized NFC tag 114. Such devices caninclude mobile phones with NFC interrogators incorporated into thephones, or any other devices with NFC interrogators associate therewith.Placing a suitably equipped mobile phone (or other NFC-enabled device)in the indicated region 116 can allow for the reading of the contents ofthe NFC tag 114. Such contents may be any type of information or data,for example data which could point to a website that containsinformation related to the visual information 108 of the poster 106.

The smart poster or sign may also be equipped with a low power receiveror “watch dog” device that would allow the NFC tag 114 to detect thepresence of an NFC reading device, such as a smart phone, at a greaterrange than the reading device is capable of typically interacting withNFC tags on the surface or in an area. One use for the pre-detection orwatch dog device is to allow a security sweep for intruder/pirate tagsto be performed before the user or consumer comes close enough to readpirate tags if present. As the sweep is only activated when a consumerapproaches, the average power consumption is very low, allowing thefunction to be supported by a battery which can be resident on the tagor associated with the tag. Pre-detection by such a watch dog devicecould also be used to activate visual, audible or other functions, suchas illuminating the sigh or extending a greeting to the on-comingconsumer. By placing a watch dog device within the protected range, theNFC tags can be monitored, and, as the watch dog units can be batterypowered because of pre-detection, they can be deployed flexibly withoutthe cost of additional wiring or support structures to implement use ofthe watch dog device.

Still referring to exemplary FIG. 1, a pirate or vandal tag 104 is shownas being affixed to a visual surface of poster 106. The contents of thevandal tag 104 might contain any type of information or data. In oneembodiment, the contents of the vandal tag include information or datathat redirects a user's device to a website that contains unauthorizedinformation or could install malicious software on the reading device.

As described with respect to exemplary FIG. 1, authorized NFC tag 114 isassociated with poster 106. Authorized NFC tag 114 may be utilized aloneto provide desired or authorized communications between authorized NFCtag 114 and an NFC-enabled reader, or may be used with an NFC securitysystem, as described in more detail herein. Additionally, authorized NFCtag 114 may be such that it can function to prevent or limit thefunctionality of vandal tag 104, or other unauthorized or undesireddevices, that are placed in proximity or directly overlapping the NFCtag 114. Authorized NFC tag 114 may be formed in any of a variety ofmanners, and include elements such as a relatively high dielectricconstant substrate, a relatively high magnetic permeability substrate,or include areas of a conductive material beyond that needed to form theantenna. Relatively high dielectric constant material can be furtherdefined as a material with a dielectric constant greater than that ofsilicon dioxide, or 3.9. Example materials include hafnium silicate,zirconium silicate, hafnium dioxide and zirconium dioxide, but any highdielectric material known in the art may be used. Magnetic permeabilityis usually expressed as relative magnetic permeability (μ_(R)), theratio of the permeability of a specific medium to the permeability offree space, or the ability of a material to attract and sustain amagnetic field. High relative magnetic permeability can be defined asgreater than 1. Examples of high relative magnetic permeabilitysubstrates include ferro-magnetic materials such as nickel or iron.[http://www.microwaves101.com/encyclopedia/highpermeability.cfm]. Thesefeatures will cause a vandal tag placed in proximity to be stronglyde-tuned, and therefore reduced in functionality. In some embodiments,the structure supporting the poster or the poster itself willincorporate relatively high dielectric constant, high magneticpermeability and conductive areas, or any combination of these, andauthorized tag 114 may be designed for a loaded resonant frequency thatcan compensate for these obstructions or interferences. Unauthorized orvandal tags that are designed for benign substrates typical to manyapplications, may have their performance significantly impaired orrendered incapacitated due to the presence and functionality of theelements incorporated into the structure, poster, or both. Authorizedtag 114, by having prior knowledge of the surface conditions, mayimplement the concept of a having a special “keyed” or authorized RFIDdevice properties to function on the surface. Thus, any unauthorized orvandal tags without this knowledge may not function to provide theirintended communication capabilities.

FIG. 2 can provide an exemplary view of a display 200 with a displayframe 202 that may incorporate a poster 206 having visual information208 and an authorized NFC tag 214. Additionally, in such an exemplaryembodiment, an NFC reading zone indicated by a visual guide 216 may alsobe provided. Further, the display 202 can incorporate an NFC securitysystem (described in more detail with respect to exemplary FIG. 3 below)which can protect the display 200 from vandal tag 204, or any number ofother vandal tags. The security system can include a security controller210, one or more sub-assembly circuit boards 212 associated with thesecurity controller 210, and an NFC antenna 218. For example, thesub-assembly circuit board or boards 212 of the security controller 210can provide functionality for the operation of the security system.Additionally, NFC antenna 218 can provide an interrogation area whichmay be substantially equivalent to the entire surface of the display200. The scanning area can thus include the poster 206, the NFCindicated reading zone 216 and all other surfaces of the display frame202, as well as some areas located near or proximate the display 200, asdesired.

Still referring to exemplary FIG. 2, an unauthorized tag 204 may beshown as affixed to a portion of the poster 206. The security system, asdescribed in more detail below, may periodically energize the NFCantenna 218 to scan for any and all NFC tags affixed to the display 202.The security system could then detect the vandal tag 204 (or some otherunauthorized device) and select an appropriate or desired action or setof actions to perform. In one exemplary embodiment, the security systemmay first scan the memory contents of the vandal tag 204. Then,depending on the persistent states of the vandal tag 204 the securitysystem may attempt to overwrite the memory contents of the vandal tag204 or otherwise disable the functionality of the vandal tag 204 using a“kill” command commonly found with most NFC tags. Additional oralternative steps which could be performed by the security controller210 may include jamming the communication channel with noise, soundingan alarm, or turning off display lights associated with display 200 toindicate an out of order state, or signaling an alert using networkconnections incorporated into the system. Such steps are described inmore detail as follows.

FIG. 3 can provide an exemplary view, in functional block diagram form,of components of a security system 300 used in conjunction with NFC orRFID systems. The security controller 210 may be the primary controllerto all other controllers in the system. The secondary controllers in thesystem shown in this exemplary embodiment can include the networkcontroller 320, NFC controller 322 and display controller 310, as wellas others, as desired. The secondary controllers 310, 320, 322 in thisexemplary embodiment may be connected to the security controller 210 viacables, such as cables 318, 312, and 314. The network controller 320 mayfurther include network transceivers that can support wired standardssuch as Ethernet or wireless network standards such as cellular network,Wi-Fi and Bluetooth connections, or any other wired or wirelessstandards, as desired. The NFC controller 322 can provide for NFCfunctions such as, but not limited to, interrogation, reading, writingand disabling NFC tags. The NFC controller 322 may be connected viacable 308 to the NFC antenna 218. The NFC antenna 218 can include one ormore near field elements that could provide energy and communications toNFC tags located in proximity to the NFC antenna 218, and may bedisposed in any location on or about display 200, for example in frame202. The display controller 310 can provide for sending and receivingsignals from the display 200 through the connecting cable 306.

Still referring to exemplary FIG. 3, the display 200 can containcomponents or methods of controlling electronics in the display 200, forexample visual lighting, auditory electronics speakers, buzzers andlocking mechanisms. The display 200 can indicate states through the useof toggle switches, or any other desired components. Additionally,sensors incorporated into the display 200 can include light sensors,motion sensors, proximity sensors, vibration sensors, and the like.Signals from sensors and switches may provide information for control ofscanning intervals and security elements of the NFC display 200. Forexample, the security system 300 can be programmed to stop scanning whena user or consumer is present so that the user's NFC mobile device isnot interfered with and a desired NFC communication may take place.

Referring now to both exemplary FIG. 2 and exemplary FIG. 3, an areaprotected by the NFC security system 300 can be one or more regions orzones. Such regions or zones can be any size deemed appropriate ordesired for the protection of the display 200. The zone can be withinthe boundary of the display. The zone of security may, in some exemplaryembodiments, extend past the physical boundary of the display 200.Further, for an NFC security system 300 with multiple zones, the sizeand configurations of each zone can be different from the configurationof all other zones. The technology used to secure such a zone can beachieved by any desired combination of near field or far fieldstructures. Examples of near field structures can include inductivecoils, capacitive structures or transmission lines. Examples of farfield structures can include any physical configuration of conductivematerial used as an antenna for detecting electromagnetic wave energy.The structures used for the security of a zone can be operated inconfigurations suitable for RFID interrogation, detecting alternatingfields or transmission of alternating fields.

In one exemplary embodiment, the zone or area, which may correspond tothe size of frame 202, can have of a large inductive coil antenna 218which can follow an outside perimeter directly behind the visual part ofthe display 200. The coil antenna 218 may be energized in order toprovide an alternating magnetic field for deactivating unauthorized tags204. The energy and control of the coil antenna 218 can be provided byNFC controller 322, which can attempt to interrogate any NFC tags, suchas a vandal tag 204, affixed to the visual face of the display 200.

In another exemplary embodiment, and still referring to both FIG. 2 andFIG. 3, a security scanning zone can be created by one or more magneticprobes positioned on the display 200. The magnetic probes may be used toscan for alternating magnetic fields which might correspond to an NFCinterrogation system of a user's device. High power fields detected inzones where no authorized NFC tag exists, such as authorized NFC tag 214located proximate indicator 216, could indicate the presence of anunauthorized tag 204 on the display.

In yet another exemplary embodiment, a secure zone can be provided by anantenna 218 inside the display 200 which may record far field signals atan NFC operating radio frequency. The signals can be analyzed by acomponent of the security system for timing and content related to theauthorized NFC tag 214 on the display 200. Discrepancies orirregularities in the analyzed data might indicate the presence of anunauthorized tag 204.

In still another exemplary embodiment, the security system may initiatescans of an area or zone associated with display 200. This can be donethrough a watch dog type device or other components provided for thisactivity. Scanning activity performed by the security system can beoperated by constant polling or may be triggered by conditional rules,as desired. Conditional control of the scanning activity may have thebenefit of a lower power usage or consumption of the display 200 and mayalso reduce potential interference with legitimate NFC activity by usersof the display 200, such as a reading of authorized NFC tag 214.Parameters that may be used for triggering NFC security scanningactivity can include, but is not limited to, time, sensor states,display states, or external requests. Examples of time parametersinclude, but are not limited to, regular intervals, fixed time of day,or a timed interval after a conditional state change of anotherparameter. Examples of sensor states include, but are not limited to,infrared, acoustic, proximity, and vibration sensors, as well asenvironmental sensors such as light, temperature and humidity. Examplesof display states can include, but are not limited to, user NFCinterrogation activity or initialization directly after a new authorizedNFC tag 214 has been installed. Examples of external requests caninclude, but are not limited to, signals and communication sent viawireless communication methods associated with network controller 320,such as Bluetooth, NFC or Wi-Fi as well as wired communication fromconnections such as an Ethernet connection.

Conditions for triggering scanning activity may further be any logicalor desired combinations of parameter triggers and states as well assequential conditions of gating previously triggered activity. Forexample, the security system 300 may conduct a scan at regular intervalsduring daytime hours while light sensors in the top of the display 200are triggered by overhead fluorescent lights. In another exemplaryembodiment, the security system 300 may scan the display after adesignated time interval after an acoustic sensor in the front of thedisplay 200 has been triggered. In yet another exemplary embodiment,security scans may be triggered when the authorized NFC tag 204 isinterrogated by the user.

Still referring to both exemplary FIG. 2 and exemplary FIG. 3, if thesecurity system 300, after conducting a scan, detects an unauthorizedNFC tag 204 or corrupted authorized NFC tag 214, the NFC security system300 may select an appropriate action or set of actions to be performedand perform them. The security actions performed by the system 300 maybe any type of actions, for example ranging from direct actionsperformed on an unauthorized tag 204 to progressively more indirectactions in an attempt to mitigate threats caused by the unauthorized tag204. For example, it may be desired for the direct actions to beattempted first, with indirect actions performed for redundancy andbackup.

Examples of direct actions to an unauthorized tag 204 can includeinspection of memory contents and operational states, commands issued todisable the tag 204, reprogramming the memory contents of the tag 204,or jamming the communication channel of said tag 204. The inspection ofthe memory contents and states of the unauthorized tag 204 can determinea threat level and severity of a security violation. The inspectionmight also aid in the identification of unauthorized NFC tags thatcontain code which could exploit weaknesses in user device software orcontain pointers to install malicious software on a user's device. Thememory contents of an unauthorized tag 204 may be recorded by thesecurity system for later analysis by authorized personnel. Disablingunauthorized tags 204 can be achieved via known and established commandscommonly available for NFC tags such as the “kill” command commonly usedfor privacy functions. Jamming the communication channel can beimplemented by methods such as issuing read commands to the unauthorizedtag 203 or transmitting random noise or pulses to disrupt communicationwith the unauthorized tag 204.

Other examples of indirect security actions can include alertingauthorized personnel, warning a user, or disabling the display 200.Alerting authorized personnel can be achieved via a wireless or wirednetwork communication channel available to the security system, forexample through network controller 320. If a network connection is notavailable to the security system, coded messages can be sent viareprogramming the authorized NFC tag 214. In such an example,information can be embedded into the URL pointer that sends codedmessages to the website server but does not affect the website contentthat a user will see on their NFC enabled device. Another exemplarymethod of signaling can be achieved by storing the alert in the memoryof the security system 300 for communication during maintenanceintervals by authorized personnel. Visual displays such as lightedindicators can be used to request maintenance by authorized personnel.Such indicators may be provided on or around display 200, on frame 202,on or in conjunction with poster 206, or as a part of indictor 216.Similarly, warnings to the user can be achieved by audio or visualindicating lights or by reprogramming the authorized NFC tag 214 toindicate a problem with the display 200. Disabling the display 200 canbe also be achieved by reprogramming the authorized NFC tag 214 incombination with switching off the display 200 backlight to indicate anon-functional state.

In some other exemplary embodiments, the NFC security system 300 caninterrogate the intended and authorized NFC tag 214 to check if memorycontents and identification codes remain uncorrupted. A previouslystored unique identification code and known good data of the authorizedNFC tag 214 can be established during the period of the installation ofthe authorized tag 214 into the display 200 by authorized personnel. Ifthe security system determines that the authorized NFC tag 214 isnon-functional or has corrupted memory contents, a set of actionssimilar to the previous described actions for unauthorized tags 204 canbe performed.

In a further exemplary embodiment, an integrated RFID interrogatorsystem, such as NFC controller 322, can verify a unique identificationcode and memory contents belonging to the authorized NFC tag 214. Theunique identification code and memory contents of the authorized NFC tag214 may then be compared with previously stored, known good data. Ifcorrupted data is detected in the authorized NFC tag 214, the integratedRFID reader (e.g. NFC controller 322) can start repeatedly issuing tagreads to the authorized NFC tag 214. Such repeated tag reads may jam thecommunication channel and prevent interrogation of the authorized NFCtag 214 by a user's NFC-enabled device. Additionally, the display 200backlight can be switched off, or some other indicator provided, whichsignals that the display 200 is no longer functioning. The display 200may return to normal use and appearance after the issue is corrected.

In another exemplary embodiment, the NFC security system 300 can reportthe presence of an unauthorized NFC tag 204 to an internet server via acellular network connection, or other desired communication method. Sucha report may be sent using network controller 320. The memory contentsof the unauthorized tag(s) 204 may then be uploaded to the server usingnetwork controller 320 for later analysis. Authorized personnel may alsobe alerted via a message from the server or directly from networkcontroller 320 of the nature of the unauthorized tag 204.

In still another exemplary embodiment, the detection of an unauthorizedNFC tag 204 can be made through an integrated RFID interrogation system,such as with NFC controller 322. As discussed previously, the antenna218 of the security system can encompass the perimeter of the display200, for example inside frame 202, so as to protect the entire surfaceof the display 200 and region around the display 200. The NFC controller322 can execute an NFC (or RFID, as desired) inventory function to checkfor the presence of unauthorized tags 204. The inventory function candetermine the quantity and identification codes of NFC tags 204 inproximity to the energized antenna coil 218. Upon detection of anunauthorized tag 204, the security system 300 can disable theunauthorized tag 204 by reading the unique identification code of thetag and executing a kill function to the unauthorized tag 204, asdescribed in previous exemplary embodiments.

In yet another exemplary embodiment, the security system 300 can includean RF or NFC radio detection system that can scan for local emissions ofRF energy in the 13.56 MHz frequency band. Such scanning may beaccomplished through the use of NFC controller 322, an RFID controlleror any other component with the desired scanning or interrogatingcapabilities. The system may then compare the detection of emissionsabove specified signal strength with timing of interrogations of theintended and authorized tag 214. RF or NFC emissions may then beanalyzed by the security system 300 to determine if a user in proximityof the display 200 is reading an unauthorized tag 204. Statisticalinformation about the presence and nature of the emissions can then beused to alert maintenance personnel to the potential presence ofunauthorized tags 204.

The foregoing description and accompanying figures illustrate theprinciples, preferred embodiments and modes of operation of theinvention. However, the invention should not be construed as beinglimited to the particular embodiments discussed above. Additionalvariations of the embodiments discussed above will be appreciated bythose skilled in the art.

Therefore, the above-described embodiments should be regarded asillustrative rather than restrictive. Accordingly, it should beappreciated that variations to those embodiments can be made by thoseskilled in the art without departing from the scope of the invention asdefined by the following claims.

What is claimed is:
 1. A security system for detecting unauthorized nearfield communication (NFC) tags, comprising: a NFC radio detection systemhaving a NFC controller with scanning or interrogating abilities andwith at least one sub-assembly circuit boards; an antenna, periodicallyenergized by the NFC radio detection system; a structure for housing theNFC radio detection system and at least one authorized NFC tag; adisplay provided on the structure and containing the at least oneauthorized NFC tag; at least one unauthorized NFC tag emitting a radiofrequency (RF) signal applied on or near the display or the structure;and where the at least one authorized NFC tag is programed withinformation about a surface of the display and has authorized radiofrequency identification (RFID) device properties to function on thesurface and the at least one unauthorized NFC tag without theinformation about the surface of the display does not provide intendedcommunication capabilities; the NFC controller interrogating an areaincluding the display and the structure to detect whether the at leastone unauthorized NFC tag is present; and an alarm to signal the presenceof the at least one unauthorized NFC tag and selects an action or set ofactions to perform based on results from interrogating the area.
 2. Thesecurity system of claim 1, wherein the area extends past a physicalboundary of the display.
 3. The security system of claim 1, wherein thearea corresponds to a size of the display.
 4. The security system ofclaim 1, wherein the security system further includes the antenna thatfollows an outside perimeter of the display.
 5. The security system ofclaim 4, wherein the antenna is an inductive coil antenna.
 6. Thesecurity system of claim 1, further comprising magnetic probespositioned on the display.
 7. The security system of claim 1, whereinthe security system scans the at least one unauthorized NFC tag andoverwrites the at least one unauthorized NFC tag.
 8. The security systemof claim 1, wherein the security system disables a functionality of theat least one unauthorized NFC tag.
 9. The security system of claim 1,wherein the display is a smart poster.
 10. The security system of claim9, wherein the smart poster includes a low power receiver.
 11. Thesecurity system of claim 1, wherein the at least one authorized NFC tagis designed for a loaded resonant frequency that can compensate for theat least one unauthorized NFC tag.
 12. A security system for detectingunauthorized near field communication (NFC) tags, comprising: a NFCradio detection system having a NFC controller with scanning orinterrogating abilities, where scanning is operated by polling ortriggered by conditional rules; a structure for housing the NFC radiodetection system and at least one authorized NFC tag; a display providedon the structure and containing the at least one authorized NFC tag; atleast one unauthorized NFC tag emitting a radio frequency (RF) signalapplied on or near the display or the structure, and the at least oneauthorized NFC tag is designed for a loaded resonant frequency that cancompensate for the at least one unauthorized NFC tag; and where the atleast one authorized NFC tag is programed with information about asurface of the display and the at least one unauthorized NFC tag withoutthe information about the surface of the display does not provideintended communication capabilities; the NFC controller interrogating anarea including the display and the structure to detect whether the atleast one unauthorized NFC tag is present; magnetic probes positioned onthe display; and an alarm to signal the presence of the at least oneunauthorized NFC tag to perform based on results from interrogating thearea.