Method for preventing unauthorized diversion of nfc tags

ABSTRACT

A method, system and apparatus for pairing authorized NFC enabled RFID devices with an intended object or product. The method, system and apparatus can include a primary RFID with a radio frequency identification chip, a coil antenna, a bridge and a substrate; an association of the at least primary RFID device with an object; an integration of a material into one of the at least primary RFID device and the object that provides the RFID device with a predetermined resonant frequency; and the detuning of one or more secondary communication devices located proximate the RFID device.

CROSS-REFERENCE(S) TO RELATED APPLICATIONS

The present application is a divisional application of pending U.S. Utility patent application Ser. No. 13/803,080 filed Mar. 14, 2013, which claims the benefit of U.S. Provisional Patent Application No. 61/698,839 filed Sep. 10, 2012, each of which is incorporated herein by reference in its entirety.

BACKGROUND

Radio frequency identification (RFID) devices, including near field communication (NFC) enabled RFID devices, are utilized for a variety of purposes. Often such devices are formed as tags or labels and can be utilized to associate an object with an identification code or other data, such as website data. Such RFID devices may be passive and, upon receiving a signal, such as an excitation signal from an RFID or NFC-enabled reader, may be energized. The devices can then respond with a desired communication or provide information associated with a product, item or service associated with the RFID device.

Specifically, NFC is a data exchange protocol designed to allow devices, including suitably equipped mobile phones and the like, to interact with infrastructures, such as point of sale terminals and ticket gates on transportation systems, or RFID devices in the forms of “smart posters” or “touchpoints”, for example. In such situations, bringing an NFC enabled device into proximity of such infrastructure or RFID devices can cause the transmission of data to the NFC enabled device, resulting in, for example, the opening of a web page, the acceptance of a media stream via Bluetooth or any of a number of other functions.

Often the manner of associating a product, item or service with an RFID device is to physically couple or adhere, attach, affix, etc., the RFID device to the product or item, or associate it with advertising, packaging or marketing materials relating to the product, item or service, such as the “smart poster” creating a “touchpoint” described herein. For example, RFID labels may be coupled adhesively or mechanically (permanent pressure sensitive adhesive to thwart removal, switchable or removable adhesives so the RFID tag can be removed, or mechanical or other physical attachment, e.g. hook and loop type fasteners) to objects or may otherwise have surfaces that attach directly to objects. RFID tags may be secured to object in other manners, such as through the use of a plastic fastener, string or other fastening mechanism. Such RFID devices may then provide data to NFC enabled devices located or placed proximate the RFID devices.

Additionally, RFID devices are often associated with the product or item, packaging or advertising item, in such a manner as to conceal or secure the RFID device. Such methods can provide security against the removal or misuse of an RFID device. However, in such circumstances, and particularly with NFC enabled devices designed to convey information to consumers with NFC enabled mobile phones and devices, there is a designated area (touchpoint) on an advertisement, packaging or product that indicates information can be obtained if the NFC enabled device is placed in close proximity to an area associated with the RFID device. However, as it is then known that information can be obtained from such areas, vandal or “pirate” RFID devices are often placed in close proximity to the indicated NFC area. The vandal or pirate devices often contain deceptive, misleading, undesired, counterfeit or malicious information. These devices can be coupled with or adhered to products and items, or advertisements associated with those items, leading to inappropriate or malicious information being unknowingly communicated to a user's NFC-enabled device including the perpetration of a fraud in an effort to market or sell counterfeit goods and/or services.

SUMMARY OF THE INVENTION

The embodiments of the present invention described below are not intended to be exhaustive or to limit the invention to the precise forms disclosed in the following detailed description. Rather, the embodiments are chosen and described so that others skilled in the art may appreciate and understand the principles and practices of the present invention.

A method, system and apparatus for pairing authorized NFC enabled RFID devices with an intended object, product or service and detuning unauthorized or pirate RFID devices is described. An exemplary method can include the steps for forming at least a primary radio frequency identification device with a radio frequency identification chip, a coil antenna, a bridge and a substrate; associating the at least primary radio frequency identification device with an object; integrating a material into one of the at least primary radio frequency identification device and the object that provides the radio frequency identification device with a predetermined resonant frequency; and detuning one or more secondary communication devices located proximate the radio frequency identification device.

An exemplary device that allows for authorized NFC enabled RFID devices with an intended object or product may also be described. The NFC enabled RFID device can include a label or tag substrate formed with a load compensator; a radio frequency identification chip coupled to the substrate; a coil antenna formed on the substrate; and a bridge.

In still further exemplary embodiments, a system for blocking unauthorized radio frequency communications may be described. The system can include a near field communication (NFC) enabled radio frequency identification device; an object to which the radio frequency identification device is associated; and a substrate formed integrally with at least one of the radio frequency identification device and the object, the substrate comprising at least one of a high dielectric material, a high permeability material, a resonant inductive circuit, and a conductive region.

Other features and advantages of the present invention will become apparent to those skilled in the art from the following detailed description. It is to be understood, however, that the detailed description of the various embodiments and specific examples, while indicating preferred and other embodiments of the present invention, are given by way of illustration and not limitation. Many changes and modifications within the scope of the present invention may be made without departing from the spirit thereof, and the invention includes all such modifications.

BRIEF DESCRIPTION OF THE DRAWINGS

Advantages of embodiments of the present invention will be apparent from the following detailed description of the exemplary embodiments. The following detailed description should be considered in conjunction with the accompanying figures in which:

FIG. 1a is an exemplary view of a poster with an authorized RFID device;

FIG. 1b is an exemplary view of a smart poster or marketing piece with an authorized RFID device and unauthorized RFID devices;

FIG. 2a is an exemplary view of a substrate used in conjunction with an RFID device;

FIG. 2b is another exemplary view of a substrate used in conjunction with an RFID device;

FIG. 2c is yet another exemplary view of a substrate used in conjunction with an RFID device;

FIG. 3a is an exemplary schematic view of an RFID device with a substrate used as a load compensator; and

FIG. 3b is another exemplary schematic view of an RFID device with a conductive region used as a load compensator.

DETAILED DESCRIPTION OF THE INVENTION

Aspects of the invention are disclosed in the following description and related drawings directed to specific embodiments of the invention. Alternate embodiments may be devised without departing from the spirit or the scope of the invention. Additionally, well-known elements of exemplary embodiments of the invention will not be described in detail or will be omitted so as not to obscure the relevant details of the invention. Further, to facilitate an understanding of the description discussion of several terms used herein follows.

As used herein, the word “exemplary” means “serving as an example, instance or illustration.” The embodiments described herein are not limiting, but rather are exemplary only. It should be understood that the described embodiments are not necessarily to be construed as preferred or advantageous over other embodiments. Moreover, the terms “embodiments of the invention”, “embodiments” or “invention” do not require that all embodiments of the invention include the discussed feature, advantage or mode of operation.

Generally referring to FIGS. 1-3, additional materials, such as high relative permeability ferrite, high dielectric constant ceramic, a combination of both, a conductor, such as aluminum and a resonant or partially resonant conductor structure, may be utilized to provide desired NFC communication. In some exemplary embodiments, the additional materials may be built into a sign or surface, or integrated into a desired RFID tag. Thus, a design of the RFID tag may be such that, when it is in proximity to the material or structure, its resonant frequency is near or at 13.56 MHz. However, commonly available NFC tags designed for near free space loading conditions are detuned, making it unlikely to operate or significantly reducing the read range.

FIGS. 1a and 1b provide exemplary views of a poster 102 that incorporates a tag 104, such as an RFID tag or device with NFC capabilities, with a method of mitigating, detuning or rendering inoperable vandal or unauthorized tags. Exemplary RFID tags, labels or inlays for use in this invention are available from Avery Dennison RFID Company of Clinton, S.C. As used herein, RFID tag includes RFID labels, inlays, intermediates and similar structures

Near field RFID applications may have limited distances for interrogation by mobile devices and may be utilized to provide targeted or specific information about an item, marketing, advertising, packaging or service onto which the RFID tag 104 may be affixed or otherwise associated. An interrogation range of two inches or less is typical for 13.56 MHz RFID technology. In exemplary FIG. 1a , the authorized RFID tag 104 may be designed to have a resonant loaded frequency near the operational frequency when placed on a high permeability sheet or substrate. The design of the RFID tag 104 to compensate for proximity to the high permeability material can be achieved by techniques such as, but not limited to, reducing the inductance of the antenna coil through fewer coil loops or introducing magnetic field blocking metal structures, selecting a RFID chip with less internal capacitance or reducing the size of capacitive antenna structures, as may be described and shown in more detail below. The resonant frequency can refer to the frequency of the alternating magnetic field in which maximum power can be transferred between the interrogator and the RFID tag 104. The loaded resonant frequency can be the resonant frequency of the RFID tag when placed in the configuration found in an application use case. In this example, RFID tag 104 may be placed on poster 102. Poster 102 may further have a touchpoint or NFC communication area 106 which provides users with NFC enabled devices to acquire information or data associated with poster 102. As described above, typical interrogation ranges for such devices are about 2 inches. In some exemplary embodiments, RFID tag 104 or touchpoint 106 can be formed with materials that detune or otherwise impair the use of any unauthorized or undesired communication devices placed in proximity to RFID tag 104 or touch point 106.

Referring now to exemplary FIG. 1b , most commonly available HF RFID tags are designed for benign dielectric loading of the antenna coil structure via proximity to paper or thin plastic. These HF RFID tags, such as tags 108 and 110, are often placed in proximity to authorized or known tags providing information, such as RFID tag 104, so as to hijack the signal of a mobile device and provide undesired, unauthorized or malicious information. If one or more HF RFID tags 108, 110, for example, that are not designed to compensate for the proximity to high permeability materials are affixed in or proximate the designated interrogation region 106 shown in FIG. 1b , the loaded resonant frequency of those RFID tags 108, 110 may be significantly altered. This can render uncompensated tags 108, 110 detuned, with too small an interrogation distance for practical use by mobile devices, or effectively inoperable. Further, the desired communications from the RFID tag 104 and a mobile device may take place, unhindered by any of the uncompensated HF RFID tags 108, 110.

Exemplary FIGS. 2a, 2b and 2c are schematic views of substrates that can significantly modify the performance of RFID tags when placed in close proximity to such tags. The substrates may be identified as a relatively high dielectric substrate 202, resonant inductive circuit substrate 204 and relatively high permeability substrate 206. Such substrates can be built into or otherwise incorporated onto an object or item with which an RFID tag is associated, such as packaging, a poster or other marketing or advertising collateral.

In exemplary FIGS. 2a and 2c , respectively, the high relative dielectric substrate 202 and high permeability substrate 206 may achieve a significant resonant frequency change by altering the effective wavelength in the area of the RFID tag, such as touchpoint area 106 of RFID tag 104 from exemplary FIGS. 1a and 1b . For example, relatively high dielectric substrate 202 may utilize high relative dielectric materials, such as, but not limited to, ceramic materials, and relatively high permeability substrate 206 may utilize high relative permeable materials, such as, but not limited to, ferrite materials. Thus, substrate 202 can reduce the loaded resonant frequency of NFC tags that are placed in proximity of a tag using substrate 202.

In exemplary FIG. 2b , the inductive circuit substrate 204 can achieve a change in the RFID tag, such as RFID tag 104 from exemplary FIGS. 1a and 1b , through a coupling 205 of two inductors together, which can create a mutual inductance between the inductive circuit and an RFID circuit in close proximity.

An exemplary method of using substrates 202, 204, and 206 may be to have an authorized or intended RFID tag (e.g. RFID tag 104) designed for a loaded resonant frequency that can compensate for these atypical substrates 202, 204 and 206. Alternatively, unauthorized or vandal tags 108 and 110 (FIG. 1b ) that are designed for benign substrates typical to many application use cases will have their performance significantly impaired or rendered incapacitated. For example, vandal tags 108 and 110 in FIG. 1b may be unable to provide their unauthorized signals if an authorized RFID tag, such as RFID tag 104, were paired with one of substrates 202, 204 and 206.

Thus, and still referring to exemplary FIGS. 2a-c , the use of any of the substrates 202, 204, and 206 can form the concept of a needing a special “keyed” or authorized RFID device to function on the surface. Therefore, in order to operate properly, there may be knowledge of the substrate's (202, 204, 206) inductive circuit loading conditions that can allow for an authorized RFID tag to properly work. Any unauthorized or vandal tags without this knowledge or special key, may not function to provide their intended communication capabilities.

Exemplary FIG. 3a is a schematic view that demonstrates the concept where an authorized RFID tag 300 directly incorporates circuit compensating techniques that allow for the basic design of a RFID tag, including chip 302, coil antenna 304 and bridge 306 to remain standard. In such an exemplary embodiment, RFID tag 300 may be a NFC-enabled tag. Thus, these methods can allow commonly available RFID tags designed for benign loading conditions to be utilized as keyed or authorized RFID tags, or may allow the compensating methods to be added to the RFID tags at a later time.

In RFID tag 300, ferrite material in the tag substrate 308 can increase the effective wavelength in the inductive circuit. Thus, when the RFID tag 300 is placed on a substrate 308 that effectively increase the loaded resonant frequency, the ferrite substrate 308 can provide a compensator to achieve a desired resonant frequency, such as 13.56 MHz. In contrast, vandal RFID tags (not pictured) without such compensating methods can be significantly detuned by the substrate 308 on a poster or other object. Additionally, if a vandal tag is placed over the authorized RFID tag 300 or inlay that incorporates a compensator, the vandal tag can be significantly detuned as well.

In exemplary FIG. 3b , an authorized RFID tag 300 can incorporate a conductive region 310 as a substrate load compensator. The conductive region 310 can be added as part of the antenna coil 304 manufacturing process or at a separate manufacturing process step. The addition of the conductive region 310 can cause a decrease in the inductance of antenna coil 304 by disrupting the magnetic field lines of the inductive coil 304. When the authorized RFID tag 300 is placed in the intended region on the poster (such as touchpoint 106 shown in exemplary FIGS. 1a and 1b ), a correct or desired loaded resonant frequency may be achieved which can be close to the RFID operating frequency, about 13.56 MHz. In contrast, vandal tags which do not incorporate load compensators can be significantly detuned by either a substrate in the poster, a substrate of the tag or an inductive circuit on the tag. Additionally, as with RFID tag 300 in FIG. 3A, placing a vandal tag directly onto the intended tag will cause the compensating method to significantly detune the vandal tag rendering the vandal or pirate tag inoperable or significantly weakened.

In still further exemplary embodiments, any of a variety of keyed inductive circuits may be utilized on RFID tags, such as RFID tag 300. In some exemplary embodiments, irregularly shaped RFID tags can be formed that avoid short circuit patches of metal. Alternatively, combinations of different substrate loading techniques that can utilize combinations of compensating methods may be incorporated into an authorized RFID tag. In still other exemplary embodiments, combinations of unique tag shapes with compensating methods for substrate loading methods may be utilized.

The foregoing description and accompanying figures illustrate the principles, preferred embodiments and modes of operation of the invention. However, the invention should not be construed as being limited to the particular embodiments discussed above. Additional variations of the embodiments discussed above will be appreciated by those skilled in the art.

Therefore, the above-described embodiments should be regarded as illustrative rather than restrictive. Accordingly, it should be appreciated that variations to those embodiments can be made by those skilled in the art without departing from the scope of the invention as defined by the following claims. 

What is claimed is:
 1. A system for blocking unauthorized radio frequency communication comprising: a NFC enabled RFID device; an object to which the RFID device is associated; and a substrate provided with the RFID device and the object wherein the substrate includes at least one of a high dielectric material, a high permeability material, a resonant inductive circuit, and a conductive region.
 2. The system of claim 1, wherein the device has an interrogation range of two inches or less.
 3. The system of claim 1, wherein the device has a resonant loaded frequency near the operational frequency
 4. The system of claim 1, wherein the object is a poster having a touchpoint or NFC communication area.
 5. The system of claim 1, wherein the high dielectric material is a ceramic material.
 6. The system of claim 1, wherein the substrate facilitates a change in the RFID device through a coupling of two inductors together.
 7. The system of claim 1, wherein an unauthorized RFID tag designed for a benign substrate will have its performance impaired or incapacitated by the substrate.
 8. The system of claim 1, wherein the substrate includes a ferrite material.
 9. The system of claim 1, wherein the RFID device comprises an antenna and a conductive region is added as part of the antenna.
 10. The system of claim 1, wherein the RFID device is a special “keyed” or authorized RFID device which functions on the substrate.
 11. A NFC enabled RFID device comprising: a substrate formed with a load compensator; a RFID chip coupled to the substrate; and an antenna formed on the substrate.
 12. The device of claim 11, wherein the substrate comprises ferrite material.
 13. The device of claim 11, wherein the device incorporates a conductive region as the load compensator.
 14. The device of claim 11, wherein the antenna is a coil antenna
 15. The device of claim 11, wherein the interrogation range for the device is 2 inches.
 16. The device of claim 11, wherein the substrate is a dielectric substrate.
 17. The device of claim 11, wherein the device is placed on a poster.
 18. A NFC enabled RFID device comprising: a substrate; a RFID chip; an antenna coil formed on the substrate having a conductive region which causes a decrease in an inductance of the antenna coil; and the NFC enabled RFID device is placed on a poster such that when an unauthorized tag is placed over the NFC enabled RFID device it is detuned.
 19. The device of claim 18, wherein the substrate is a high dielectric substrate. 