Passport shield

ABSTRACT

Various switchable RFID devices are disclosed. These switchable RFID devices may include one or more RFID tags and one or more switches. Some of these one or more switches are optionally wireless. In various embodiments, the switchable RFID devices include cellular phones, security devices, identity devices, financial devices, remote controls, and the like. The switchable RFID devices are optionally disposed in a passport.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. non-provisional patentapplication Ser. No. 15/418,726 filed Jan. 28, 2017; which, in turn, isa continuation of U.S. non-provisional patent application Ser. No.14/660,825 filed Mar. 17, 2015, which in turn is:

-   -   a continuation in part of U.S. non-provisional patent        application Ser. No. 13/481,104 filed May 25, 2012; which is in        turn is a continuation of Ser. No. 12/777,474 filed May 11,        2010, which in turn is a continuation of Ser. No. 11/350,309        filed Feb. 7, 2006, now U.S. Pat. No. 7,719,425, and claims        benefit of provisional patent applications:        -   60/650,478 filed Feb. 7, 2005,        -   60/678,428 filed May 6, 2005,        -   60/685,331 filed May 27, 2005,        -   60/700,884 filed Jul. 19, 2005,        -   60/712,308 filed Aug. 30, 2005,        -   60/715,641 filed Sep. 10, 2005,        -   60/752,933 filed Dec. 21, 2005, and        -   60/758,751 filed Jan. 13, 2006;    -   a continuation in part of U.S. non-provisional patent        application Ser. No. 13/084,433 filed Apr. 11, 2011 which in        turn is a continuation in part of Ser. No. 11/458,620 filed Jul.        19, 2006, now U.S. Pat. No. 7,924,156 which is a continuation in        part of:        -   Ser. No. 11/382,052 filed May 7, 2006,        -   Ser. No. 11/382,053 filed May 7, 2006,        -   Ser. No. 11/382,054 filed May 8, 2006,        -   Ser. No. 11/382,264 filed May 8, 2006,        -   Ser. No. 11/382,265 filed May 8, 2006, and        -   Ser. No. 11/420,721 filed May 26, 2006,        -   and claims benefit of provisional patent applications:        -   60/700,884 filed Jul. 19, 2005,        -   60/712,308 filed Aug. 30, 2005,        -   60/715,641 filed Sep. 10, 2005,        -   60/752,933 filed Dec. 21, 2005,        -   60/758,751 filed Jan. 13, 2006,        -   60/782,068 filed Mar. 13, 2006,        -   60/744,154 filed Apr. 3, 2006, and        -   60/746,636 filed May 6, 2006, and is    -   a continuation in part of Ser. No. 11/382,050 filed May 7, 2006,        which claims benefit of provisional patent applications:        -   60/678,428 May 6, 2005, and        -   60/685,331 May 27, 2005; and    -   a continuation in part of U.S. non-provisional patent        application Ser. No. 14/468,110 filed Aug. 25, 2014, which is a        continuation of Ser. No. 12/577,209 Oct. 12, 2009, now U.S. Pat.        No. 8,816,826, which (Ser. No. 14/468,110) claims benefit of        provisional patent applications:        -   60/700,884 filed Jul. 19, 2005,        -   60/712,308 filed Aug. 30, 2005,        -   60/715,641 filed Sep. 10, 2005,        -   60/752,933 filed Dec. 21, 2005,        -   60/758,751 filed Jan. 13, 2006,        -   60/782,068 filed Mar. 13, 2006,        -   60/744,154 filed Apr. 3, 2006, and        -   60/746,636 filed May 6, 2006, and    -   is a continuation in part of        -   CIP Ser. No. 11/382,052 filed May 7, 2006,        -   CIP Ser. No. 11/382,053 filed May 7, 2006,        -   CIP Ser. No. 11/382,054 filed May 8, 2006,        -   CIP Ser. No. 11/382,264 filed May 8, 2006,        -   CIP Ser. No. 11/382,265 filed May 8, 2006,        -   CIP Ser. No. 11/420,721 filed May 26, 2006, and        -   CIP Ser. No. 11/382,050 filed May 7, 2006 which claims            benefit of provisional patent applications:            -   60/678,428 filed May 6, 2005, and            -   60/685,331 filed May 27, 2005.

The disclosures of the above provisional and nonprovisional patentapplications are hereby incorporated herein by reference.

BACKGROUND OF THE INVENTION Field of the Invention

The invention is in the fields of electronic passports, and morespecifically in the field of electronic passports including shieldingand/or switchable RFID tags.

Description of Related Art

Radio Frequency identity (RFID) tags are typically small, flexible, andlow profile devices that can be affixed to items for electronic trackingand information storage purposes. An RFID tag can be read by an RFIDreader when the RFID tag is brought within a certain vicinity of thereader that is broadcasting a radio frequency signal. In some cases,once within that vicinity, the RFID tag receives sufficient power fromthe radio frequency signal to permit it to transmit a return radiofrequency signal using the received power. These RFID tags are referredto as passive RFID tags. In other cases the RFID tag has an independentpower source for generating a return radio frequency signal. These RFIDtags are referred to as active RFID tags. With either passive or activeRFID tags, the return radio frequency signal may include an encoded copyof information stored within the RFID tag. As used herein, RFID tagsinclude radio frequency contactless chips.

SUMMARY

The invention includes the use of shielding in relation to RFID tags.For example, some embodiments of the invention include shieldedcontainers for storing devices including RFID tags. These devices caninclude identification devices such as passports, credit cards, ordriver's licenses.

Some embodiments of the invention include shielded containers and RFIDtags, the RFID tags configured for use in determining a state of thecontainer. For example, detection of an RFID tag can be used todetermine if the container is open or closed. These embodiments areoptionally used in event logging or security.

Some embodiments of the invention include shielding attached toidentification devices. This shielding may, for example, be included ina clamshell configuration, as a shielding insert, or as part of a pageor cover.

Various embodiments of the invention include a container comprising anRFID tag configured for determining if the container is open or closed,and radio frequency shielding configured to shield a signal from theRFID tag responsive to whether the container is open or closed.

Various embodiments of the invention include a vehicle comprising areceptacle attached to the vehicle and configured to receive anidentification device including an RFID tag, and a radio frequencyshielding attached to the receptacle and configured to shield the RFIDtag when the identification device is placed within the receptacle.

Various embodiments of the invention include a purse comprising areceptacle configured to receive an identification device including anRFID tag, and a radio frequency shielding attached to the purse andconfigured to shield the RFID tag when the identification device isplaced in the receptacle.

Various embodiments of the invention include a wallet comprising areceptacle configured to receive an identification device including anRFID tag, and a radio frequency shielding attached to the wallet andconfigured to shield the RFID tag when the identification device isplaced in the receptacle.

Various embodiments of the invention include a shielded RFID devicecomprising an identity device including an RFID tag, and a coverphysically attached to the device, the cover including a radio frequencyshielding material configured to shield the RFID tag in a first positionand to not shield the RFID tag in a second position.

Various embodiments of the invention include an identification devicecomprising a base including a surface configured to display identifyinginformation, an RFID tag configured to transmit identifying information,and a cover including a radio frequency shielding material configured toshield the RFID tag when closed and to allow the RFID tag to communicatewith a reader when open.

Various embodiments of the invention include a passport devicecomprising an RFID tag configured to transmit identifying information, asurface configured to visually display the identifying information, andan attached cover including a radio frequency shielding materialconfigured to shield the RFID tag when the cover is closed, andconfigured to enable reading of the RFID tag when the cover is open.

Various embodiments of the invention include a passport devicecomprising a first cover part including identifying information on aninside surface, a second cover part separated from the first cover partby a fold, an RFID tag within the first cover or the second cover part,and a page between the first cover part and the second cover part, thepage including shielding configured for shielding the RFID tag in afirst position and not shielding the RFID tag in a second position.

Various embodiments of the invention include a driver's license devicecomprising an RFID tag configured to transmit identifying information, asurface configured to visually display the identifying information, anda cover including a radio frequency shielding material configured toshield the RFID tag in a first position, and configured to enablereading of the RFID tag in a second position.

Various embodiments of the invention include a credit card devicecomprising an RFID tag configured to transmit account information, anattached cover including radio frequency shielding and configured tomove relative to the RFID tag, to shield the RFID tag in a firstposition, and not to shield the RFID that in a second position.

Various embodiments of the invention include a shielding devicecomprising a shielding material configured to be temporally attached toan identity device and to shield an RFID tag within the identity device,and an attachment mechanism configured for attaching the shieldingmaterial to the identity device.

Various embodiments of the invention include a passport reading systemcomprising an RFID reader, and a base disposed to form a slot betweenthe base and the RFID reader, a width of the slot configured for passageof a passport in an open position such that shielding material withinthe passport does not interfere with communications between the RFIDreader and an RFID tag included in the passport.

Various embodiments of the invention include a passport reading systemcomprising a first RFID reader, a second RFID reader, a third RFIDreader, the first, second and third RFID readers surrounding a passportreading volume and being disposed such that at least one of the first,second and third RFID readers will be at a proper angle relative to anantenna of an RFID tag within a passport in the passport reading volumeto read the RFID tag, and also disposed such that transmission betweenthe RFID tag and the at least one of the first, second and third RFIDreaders is not prevented by shielding within the passport when thepassport is open in the passport reading zone regardless of the angle ofthe shielding relative to the first, second and third readers.

Various embodiments of the invention include a system comprising a covermaterial configured for inclusion in a polarity of identity devices, astrip of shielding deposited on the cover material, a first RFID tagdeposited on the cover material, a second RFID tag deposited on thecover material, and a cutting area configured to be cut in order toproduce the plurality of identity devices, the cut including cutting ofthe strip of shielding and separation of the first RFID tag and thesecond RFID tag.

Various embodiments of the invention include a passport comprising anRFID tag configured to transmit identifying information, a surfaceconfigured to visually display the identifying information, and a coverincluding a first part and a second part separated by a fold, the firstpart including the RFID tag and the second part including a radiofrequency shielding configured to shield the RFID tag when the cover isclosed, and configured to allow reading of the RFID tag when the coveris open, the radio frequency shielding including metallic fibersdisposed within the second part.

Various embodiments of the invention include a passport comprising afirst cover part including identifying information including aphotograph on an inside surface, a second cover part separated from thefirst cover part by a fold, an RFID tag within the first cover or thesecond cover part, and a page between the first cover part and thesecond cover part, the page including shielding configured for shieldingthe RFID tag in a first position and not shielding the RFID tag in asecond position.

Various embodiments of the invention include a passport comprising afirst cover part including an RFID tag disposed at least 5 mm from afold, a second cover part separated from the first cover part by thefold and including shielding configured for shielding the RFID tag in afirst position of the second cover part and not shielding the RFID tagin a second position of the cover part.

Various embodiments of the invention include a system comprising a covermaterial configured for inclusion in a polarity of identity devices, astrip of shielding deposited on the cover material, a first RFID tagdeposited on the cover material, a second RFID tag deposited on thecover material, and a cutting area configured to be cut in order toproduce the plurality of identity devices, the cut including cutting ofthe strip of shielding and separation of a location for depositing ofthe first RFID tag and a location for depositing of the second RFID tag.

Various embodiments of the invention include a method comprisingdepositing a radio frequency shielding material on a first part of acover material, depositing at least a first radio frequency identity tagand a second radio frequency identity tag on a second part of the covermaterial, cutting the cover material through the radio frequencyshielding, and creating a fold in the flexible material, the foldseparating the first part of the cover material from the second part ofthe cover material.

Various embodiments of the invention include a remotely powered RFID(radio frequency identity) tag having an electronically controlledswitch. This switch is optionally a remotely (wirelessly) controlledswitch. In some embodiments, when the switch is in an off state, theRFID tag will not transmit and when the switch is in an on state theRFID tag will transmit in response to an RF (radio frequency) signal. Insome embodiments, the switch includes multiple on states in whichdifferent information or signals are transmitted responsive to the stateof the switch. The RFID tag includes a memory configured to store thestates of the RFID tag and an integrated circuit configured to determinewhether to transmit responsive to the stored state of the RFID tag and areceived RF signal.

Various embodiments of the invention include switchable RFID devices.These switchable RFID devices can include identity documents such aspassports or driver's licenses, financial cards such as credit or debitcards, remote controls, security devices, access devices, communicationdevices, or the like. In some embodiments, more than one switchable RFIDtag is included in a single RFID device. In various embodiments, one ormore switches are used to change operation of an RFID tag from aresponsive state to a non-responsive state, to change operation of anRFID tag from one responsive state to another responsive state, to enterdata into an RFID device, to control an external device, or the like. Invarious embodiments, the switches are electronic, wireless, and/ormechanical.

Various embodiments of the invention includes an RFID tag comprising anantenna configured to receive data in a first RF signal, to receiveenergy from the first RF signal, and to transmit data in a second RFsignal, the transmission of the second RF signal being powered by theenergy received from the first RF signal; and an integrated circuitincluding an input configured to receive data from the antenna and toreceive power resulting from the energy received from the antenna, anoutput configured to provide an RF signal to the antenna fortransmission, a state memory configured to store an ON/OFF state of theRFID tag, a key memory configured for storing a key for changing theON/OFF state stored in the state memory, and a switch logic configuredto receive data from the input, to read the key from the key memory, tocompare the received data with the read key, and to change the ON/OFFstate stored in the state memory responsive to this comparison, theswitch logic is further configured to determine whether or not toprovide a second RF signal to the antenna for transmission, thedetermination being responsive to the ON/OFF state stored in the statememory.

Various embodiments of the invention include a method of changing anON/OFF state of an RFID Tag, the method comprising receiving energysufficient to power the RFID Tag through an RF antenna included in theRFID tag, receiving first data through the RF antenna, reading a keyfrom a key memory, using an integrated circuit to compare the first datareceived through the RF antenna with the key read from the key memory,the integrated circuit powered by the received energy, and writing datato state memory responsive to the comparison, the data written to thestate memory being configured to change the RFID tag from an OFF statein which the RFID tag will not transmit an RF signal to an ON state inwhich the RFID tag will transmit an RF signal.

Various embodiments of the invention includes a method of operating anRFID tag, the method comprising receiving energy sufficient to power theRFID tag through an RF antenna included in the RFID tag, reading a statefrom state memory, sending an RF response through the RF antenna unlessthe read state is an OFF state.

Various embodiments of the invention includes a method of operating anRFID tag, the method comprising receiving energy sufficient to power theRFID tag through an RF antenna included in the RFID tag, reading a statefrom state memory, sending an RF response through the RF antenna if theread state is an ON state, and disabling the RF response through the RFantenna if the read state is an OFF state.

Various embodiments of the invention includes a method of operating anRFID tag, the method comprising receiving energy sufficient to power theRFID tag through an RF antenna included in the RFID tag, reading a statefrom state memory, sending an RF response through the RF antenna only ifthe read state is an ON state.

Various embodiments of the invention includes a multilayer identitydocument comprising a first outer layer, an electrical conductorconfigured to conduct a current, a spacer layer including an openingconfigured to contain a switch activator, the switch activatorconfigured to make and break an electrical connection to the electricalconnector, and an inner layer disposed such that the spacer layer andswitch activator are between the first outer layer and the second outerlayer, the inner layer being configured to be pressed to activate theswitch activator.

Various embodiments of the invention includes a switchable RFID tagcomprising an antenna configured to receive an RF transmission, anintegrated circuit configured to generate a response transmission, and aswitch configured to turn on and of the ability of the integratedcircuit to generate the response transmission, the switch being disposedsuch that it is surrounded by the antenna.

Various embodiments of the invention includes a system comprising aplurality of switches configured for a user to enter data, logicconfigured to transmit a first wireless signal responsive to the entereddata, and a circuit configured to receive energy from a received secondwireless signal and to power the logic and the transmission of thesystem using the received energy.

Various embodiments of the invention includes a system comprising logicconfigured to transmit a first wireless signal in response to a receivedsecond wireless signal, a wireless I/O configured to receive the secondwireless signal and to transmit the first wireless signal, a memoryconfigured to store an account number, the account number being includedin the first wireless signal, a physical contact I/O configured forwriting the account number to the memory, logic configured to allowwriting of the account number to the memory if the account number isreceived via the physical contact I/O but if the account number isreceived via the wireless I/O, and a circuit configured to receiveenergy from the received second wireless signal and to power the logicand the transmission of the first wireless signal using the receivedenergy.

Various embodiments of the invention includes a system comprising logicconfigured to transmit a first wireless signal in response to a receivedsecond wireless signal, a wireless I/O configured to receive the secondwireless signal and to transmit the first wireless signal, the secondwireless signal including an identification data associated with areader, a memory configured to store a log of received identificationdata received from a plurality of readers, a physical contact I/Oconfigured for uploading the log of received identification data fromthe memory, logic configured to allow uploading of the log of receivedidentification data from the memory via the physical contact I/O but viathe wireless I/O, and a circuit configured to receive energy from thereceived second wireless signal and to power the logic and thetransmission of the first wireless signal using the received energy.

Various embodiments of the invention includes a method comprisingmounting a plurality of RFID antenna and RFID tags on a support,mounting a the support on a first side of a spacer, the spacer includingopening 140 and optionally including one or more cavity to receive theRFID tags, mounting a cover layer on a second side of the spacer, andcutting the support and spacer to generate a plurality of RFID enabledfinancial Cards.

Various embodiments of the invention include a method comprisingmounting an RFID antenna and RFID tag on a support, mounting a spacer onthe support, the spacer being compliant (soft) so that the RFID tag canenter a plane of the spacer to form a cavity, allowing the spacer toharden, and mounting a cover layer on the spacer.

Various embodiments of the invention include a method of assembling anidentity device, the method comprising depositing an integrated circuit,antenna and switch contacts on a support layer, and laminating thesupport layer, spacer and flexible membrane together, the spacer havinga cavity in which the integrated circuit fits.

Various embodiments of the invention include a method of assembling anidentity device, the method comprising depositing an integrated circuit,antenna and switch contacts on a support layer 150, depositing spacer120 on the support layer, spacer 120 covering the integrated circuit,and depositing a flexible membrane on the support layer, the flexiblemembrane or the support layer optionally including an image of a user.The Spacer is optionally configured to create a hermetic seal around theintegrated circuit and/or the RFID antenna.

Various embodiments of the invention include a method comprisingprogramming data to non-volatile memory of an RFID tag in a programmablemode, and changing a state of a switch coupled to the RFID tag so as tochange the RFID tag from the programmable mode to a non-programmablemode.

Various embodiments of the invention include an RFID tag comprising anantenna configured to transmit data, a power circuit configured toprovide power, an integrated circuit configured to receive power fromthe power circuit, to provide the data to the antenna, the integratedcircuit including a non-volatile memory configured to store the data anda logic circuit configured to determine a state of a switch, the switchbeing configured to control whether the volatile memory can or cannot beprogrammed.

Various embodiments of the invention include an integrated circuitcomprising a first logic input configured for determining a state of aswitch, a power input configured to receive power from a radio frequencyantenna, the received power being sufficient for powering the integratedand transmitting a data output signal via the radio frequency antenna,and a data output configured for generating the data output responsiveto the state of the switch as determined by the first logic input.

Various embodiments of the invention include an Identity Devicecomprising an RFID antenna configured to receive power from andcommunicate with an RFID reader, a circuit configured to receive powerfrom the RFID Antenna, a tag configured to be powered by power receivedthrough the RFID antenna and to generate a signal for transmissionbetween the RFID antenna and the RFID reader, and a switch configured torepeatedly turn on and turn off detectability or readability of the tag.

Various embodiments of the invention include a locking mechanismcomprising a RFID tag activation circuit configured to turn on aswitchable RFID tag by operating a switch within the switchable RFIDtag, an RFID reader configured to read the switchable RFID tag, and alock configured to open responsive to the RFID reader.

Various embodiments of the invention include a method of operating anRFID tag, the method comprising activating a switch in order to turn onthe detectability or readability of the RFID tag, the RFID tag poweredby power received through an RFID antenna, and activating the switch inorder to turn off the detectability or readability of the RFID tag. Insome embodiments, the switch is configured to keep the readability ofthe RFID tag off until the switch is activated again. The switchoptionally being included in an identity device.

Various embodiments of the invention include a method of operating aswitchable RFID tag, the method comprising operating a switch to turnthe RFID tag on, responsive to a first action of a user, receiving asignal at an RFID antenna, collecting power from the signal, using thecollected power to power an integrated circuit, collecting data from thesignal, processing the collected data using the integrated circuit,transmitting a signal generated by the integrated circuit in response tothe collected data, using the RFID antenna, and operating the switch toturn the RFID tag off, responsive to a second action of a user.

Various embodiments of the invention include a switchable RFID tagcomprising an RFID antenna configured to receive power from andcommunicate with an RFID reader, a tag configured to be powered by powerreceived through the RFID antenna and to generate a signal fortransmission between the RFID antenna and the RFID reader, and a switchconfigured to repeatedly turn on and turn off detectability orreadability of the tag.

Various embodiments of the invention include a method of controlling anelectronic device, the method comprising receiving a wireless RF signalfrom an RF transmitter, converting the received RF signal intoelectronic power, generating a wireless return signal using theelectronic power, the wireless return signal configured to control theelectronic device, placing a switch in a first position to turn on thegeneration of the wireless return signal, placing the switch in a secondposition to turn off the generation of the wireless return signal, andreturning the switch to the first position to turn on the generation ofthe wireless return signal.

Various embodiments of the invention include a method of controlling anelectronic device, the method comprising receiving a wireless RF signalfrom an RF transmitter; converting the received RF signal intoelectronic power; repeatedly changing a switch from a first position toa second position; and generating a wireless return signal using theelectronic power, the wireless return signal configured to control theelectronic device and being responsive to whether the switch is in thefirst position and the second position.

Various embodiments of the invention include a system comprising anantenna configured to receive a wireless RF signal from an RFtransmitter, a power circuit configured to convert the RF signal intoelectronic power, a circuit configured to receive the electronic powerand to send a wireless response signal in response to the RF signal, anda first switch configured to repeatedly turn on and off a firstoperation of the circuit under control of a user.

Various embodiments of the invention include a method of receivingcontrol instructions, the method comprising, generating a wireless RFsignal, transmitting the wireless RF signal to a RF powered remotecontrol device configured to send a wireless return signal responsive tothe states of one or more switches, the return signal being generatedand transmitted using power converted from the wireless RF signal,receiving the return signal, and determining the states of the one ormore switches using the received return signal.

Various embodiments of the invention include a system comprising a RFtransmitter configured to send a wireless RF signal, a controlleddevice, a RF powered remote control configured to be powered by thewireless RF signal and to send a wireless response signal to thecontrolled device responsive to a first switch, the first switchconfigured to be repeatedly turned on and off by a user.

Various embodiments of the invention include a method of operating anRFID tag, the method comprising receiving energy sufficient to power theRFID tag through an RF antenna included in the RFID tag, reading a statefrom state memory, and sending an RF response through the RF antennaunless the read state is an OFF state.

Various embodiments of the invention include a method of operating anRFID tag, the method comprising receiving energy sufficient to power theRFID tag through an RF antenna included in the RFID tag, reading a statefrom state memory, sending an RF response through the RF antenna if theread state is an ON state, and disabling the RF response through the RFantenna if the read state is an OFF state.

Various embodiments of the invention include a method of operating anRFID tag, the method comprising receiving energy sufficient to power theRFID tag through an RF antenna included in the RFID tag, reading a statefrom state memory, sending an RF response through the RF antenna only ifthe read state is an ON state.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 illustrates a container including a receptacle configured tostore an ID incorporating an RFID tag, according to various embodimentsof the invention.

FIG. 2 illustrates a container including an RFID tag or alternatively anRFID tag reader.

FIG. 3 illustrates various monitoring systems that employ illustrativeembodiments of the container of FIG. 2.

FIG. 4 illustrates further details of an embodiment of the container ofFIG. 2 that includes a monitored vial.

FIG. 5 illustrates another embodiment of a monitored vial that includesmore than one compartment.

FIG. 6 illustrates an embodiment of the container of FIG. 2 wherein thecontainer is a room.

FIG. 7 illustrates an access system based on an RFID tag, according tovarious embodiments of the invention.

FIG. 8 illustrates a clamshell ID including a base including an RFID tagand a cover connected to the base, according to various embodiments ofthe invention.

FIG. 9 illustrates a clamshell ID similar to that shown in FIG. 8 exceptthat the base and cover are pivotally connected at a point rather thanalong an edge, according to various embodiments of the invention.

FIGS. 10A and 10B illustrate an ID similar to that shown in FIGS. 8 and9 except that the cover is configured to fit into the base, according tovarious embodiments of the invention.

FIG. 11 illustrates further detail of some embodiments of a clamshell IDhaving a first cover and second cover separated by a fold.

FIG. 12 illustrates further embodiments of a clamshell ID including afirst cover and second cover separated by a fold.

FIG. 13 illustrates a clamshell ID wherein shielding is added to a page,according to various embodiments of the invention.

FIG. 14 illustrates an identification device, according to variousembodiments of the invention.

FIG. 15 illustrates a method of allowing communication to an RFID tag,according to various embodiments of the invention.

FIG. 16 illustrates a method of modifying an RFID enabled identificationdevice, according to various embodiments of the invention.

FIG. 17 illustrates a method of making an identity device including,according to various embodiments of the invention.

FIG. 18 is a block diagram illustrating a stage in the manufacture of anidentification device, according to various embodiments of theinvention.

FIG. 19 illustrates the method of manufacturing an identificationdevice, according to various embodiments of the invention.

FIG. 20 illustrates an RFID reader system, according to variousembodiments of the invention.

FIG. 21 illustrates an alternative RFID reader system, according tovarious embodiments of the invention.

FIG. 22 is a block diagram of a switchable RFID device, according tovarious embodiments of the invention;

FIGS. 23 and 24 illustrate some of many possible locations for a switchwithin a switchable RFID device, according to various embodiments of theinvention;

FIG. 25A illustrates an OFF Position of a switch, according to variousembodiments of the invention;

FIG. 25B illustrates an ON position of a switch, according to variousembodiments of the invention;

FIGS. 26A and 26B illustrates a membrane switch, according to variousembodiments of the invention;

FIG. 26C illustrates an embodiment of a membrane switch including aspring, according to various embodiments of the invention;

FIG. 26D illustrates a cross-sectional view of a membrane switchdisposed within a switchable RFID Tag, according to various embodimentsof the invention;

FIG. 27 illustrates a top view of a membrane switch, according tovarious embodiments of the invention;

FIG. 28 illustrates a switchable RFID tag in an identity document,according to various embodiments of the invention;

FIG. 29 illustrates the manufacture of instances of an identitydocument, according to various embodiments of the invention;

FIG. 30 illustrates an exploded view of an embodiment of a switchableRFID device including a driver's license, according to variousembodiments of the invention;

FIG. 31 illustrates an embodiment of a switchable RFID device includinga plurality of switches, according to various embodiments of theinvention;

FIG. 32 illustrates various embodiments of an tag configured for use inembodiments of a switchable RFID device including a plurality ofswitches, according to various embodiments of the invention;

FIG. 33 illustrates an instance of a tag, according to variousembodiments of the invention;

FIG. 34 illustrates a method according to various embodiments of theinvention, according to various embodiments of the invention;

FIG. 35 illustrates a switchable RFID device configured to operate as aremote control, according to various embodiments of the invention;

FIG. 36 illustrates a multiswitch credit card, according to variousembodiments of the invention;

FIGS. 37A-37C illustrate an antenna within a credit card, according tovarious embodiments of the invention;

FIG. 38 illustrates an RFID device including a conductor configured toset a state of an RFID tag, according to various embodiments of theinvention.

FIG. 39 is a block diagram illustrating an RFID tag, according tovarious embodiments of the invention;

FIG. 40 is a flowchart illustrating a method of changing a state of theRFID tag illustrated in FIG. 22, according to various embodiments of theinvention; and

FIG. 41 is a flowchart illustrating a method of operating the RFID tagillustrated in FIG. 22, according to various embodiments of theinvention.

DETAILED DESCRIPTION

Various embodiments of the present invention includes holders (e.g.,containers) including radio frequency shielding materials to protectitems, such as IDs (identification devices), incorporating RFID tagsfrom being read. In some embodiments, a person can allow informationwithin an RFID tag to be read by removing the item from the holder,while in other embodiments the holder is merely opened or removed toallow the RFID tag to be read. Replacing the item within the holder, orclosing the holder, secures the item's RFID tag from unwanted readingsfrom, or detection by, unknown or unauthorized RFID readers. It will beappreciated that items other than IDs, such as library books, consumerelectronics, medications, and so forth, can also include, or be packagedwith, RFID tags that a person may wish to shield from unauthorized RFIDreaders. Holders specifically tailored for such items, as well asgeneral purpose holders such as wallets, purses and briefcases, can alsoinclude radio frequency shielding (also referred to herein as shielding)according to the present invention.

The holder can be in the general form of a container as an illustrativeexample, having two similar rectangular sides joined around three edges,being configured to be repeatedly opened and close, and optionallyincluding a closure or flap along the fourth side. Such holders are wellsuited to the typical shape of most personal IDs such as passports,driver's licenses, green cards, credit and debit cards, medicalinformation cards, insurance cards, medical alerts, studentidentification cards, security badges, immigration documents, or thelike. Typically, the holder is configured to be repeatedly opened andclosed to receive the ID.

The holder can also be a case such as a carrying-case for a cell phoneor digital camera. The holder can also be a purse, suitcase, backpack,briefcase, satchel, glove compartment, a jewelry container, and thelike. In some embodiments, the RF shielding is physically attached tothe holder. The holder can alternatively include a checkbook holder, awallet, a ticket holder, or a windshield visor pocket. Some embodimentsof the invention are directed at articles of clothing in which one ormore pockets include an attached radio frequency shielding material.Additional embodiments are directed to key holders.

The desirability of RFID shielding for the objects listed above will bereadily appreciated. Being able to read an RFID tag on a green card (animmigration document) without the owner of the green card giving consentor being aware that the green card is being read, for example, canenable less scrupulous individuals to engage in improper behaviors.Incorporating RFID shielding into a wallet, purse, or other type ofholder would prevent an RFID tag on an item within the holder from beingread unless the item is deliberately exposed to the RFID reader, forinstance, by removing the item from the holder. In view of the problemof identity theft, such shielding is desirable for credit cards withRFID tags, social security cards with RFID tags, driver's licenses withRFID tags, and so forth.

In some instances the RFID tag is essentially a label that has beenattached to an object for inventory or similar purposes. Library bookscan carry RFID tags, for example. Accordingly, providing RFID shieldingfor various carrying devices, such as purses, suitcases, book bags,briefcases, and satchels can prevent RFID tags in library books andother objects from being read without permission. In other instances theRFID tag is more integral with an object. Consumer electronics,electronic media, and so forth, can be manufactured to include RFID tagsinside of housings, on printed circuit boards, and on electroniccomponents, for example. Often, such devices have specially designedcases such as cell phone cases and camera cases. These cases can alsocomprise RFID shielding to prevent the RFID tags in the associateddevices from being read without authorization.

In some embodiments, the holder is clear (e.g., transparent) so that theID, such as a driver's license, can be readily seen without having to beremoved from the holder. Many wallets include either a plastic sleeve ora leather pocket with a plastic window for this purpose. In someembodiments, of the invention in which at least part of the holder istransparent, the shielding in the transparent region needs to also betransparent. Certain electrically conductive polymers can serve as theRFID shielding material in these embodiments. Other transparent andnon-transparent materials for RFID shielding are discussed furtherherein.

In some embodiments, the holder is designed to allow the ID to be easilyand repeatedly removed and returned. For instance, some credit and debitcards have a smaller format (mini-cards) and can be stored in a matchingcase that can serve as a fob for keys. In some of these embodiments, theholder and the ID card are pivotally attached to one another so that theID card can flip out from the holder, and in still further embodiments aspring mechanism aids in extending and retracting the ID card. Othercases of the present invention can comprise a clamshell configuration.Such ID card holders of the present invention include an RFID shieldingmaterial.

The present invention also provides for articles of clothing designed toinclude pockets that can shield RFID tags on objects within the pockets.In these embodiments the articles of clothing can be made from a cloththat includes a radio frequency shielding material, or the pocket can belined with the radio frequency shielding material.

The present invention also provides for key holders comprising RFIDshielding. The keys that are held by such key holders can be eithermechanical or electronic, where mechanical is used herein to refer tokeys meant to fit into mechanical locks such as car keys, house keys,and the like. Electronic keys refer to keys that carry an encodedpassword on a magnetic strip, a bar code, an RFID tag, or the like.Either type of key can include an RFID tag as either a further componentof the locking mechanism or for completely unrelated reasons. An RFIDtag on a key is part of the locking mechanism, for example, when thelock reads the RFID tag for some purpose, such as to read the keynumbers from RFID tags on different keys in order to track which keysare being used in the lock.

Electronic keys are often placed on ID badges and other forms ofidentification. An RFID tag with such electronic keys may carryconfidential information but be unrelated to the lock mechanism. In someembodiments, the key holder is retractable, and in some of theseembodiments the key holder is spring-loaded to automatically retract thekey into the key holder.

In the embodiments described herein, the holder, whether an container,case, article of clothing, or key holder, has some form of openingthrough which the ID or other object having an RFID tag can betransferred. In some embodiments, the holder also includes a closure forclosing the opening. In some of these embodiments, the closure cancomprise a flap that closes over the opening. In other embodiments theclosure is a zipper, Velcro, or related closure device. The closure canprovide an electrical contact between opposing sides of the opening, insome instances.

In some embodiments, the RFID shielding material is incorporated into anID. For example, a passport can include an RFID shielding material inthe passport's cover so that an RFID tag within the passport can only beread when the passport is opened. Similarly, a driver's license caninclude a clamshell cover and base including an RFID shielding material,or a pivoting cover including an RFID shielding material.

The RFID shielding material can be provided in numerous different ways.The radio frequency shielding material can include a conductive materialsuch as a metal or an electrically conductive plastic. The RFIDshielding can be attached using adhesive. The radio frequency shieldingmaterial can include a mesh with a mesh size small enough to provideshielding against the radio frequency range used by RFID readers. Theradio frequency shielding material can be laminated, either bylaminating the RFID shielding material to another layer, such as aprotective material layer, and/or by laminating together multiple layersof RFID shielding materials. In many embodiments the RFID shieldingmaterial is either flexible, transparent, or both. Examples of suitableRFID shielding materials include metal-coated elastomers such asaluminized Mylar and copper-coated plastic sheets and films. In someembodiments, the RFID shielding material is a semi-transparent mesh.

In some embodiments, the RFID shielding material is effective to form aFaraday cage around the ID, object, or key. Closing the closure can beeffective to complete the Faraday cage, in some instances. In otherembodiments the RFID shielding is used in selective locations in theholder. For example, where a nation's passport includes an RFID tag in alower right-hand corner of the cover, passport holders designed for thatnation's passports need only include RFID shielding above and/or belowthe location of the RFID tag when the passport is in the passportholder.

The RFID shielding shields an RFID tag from a reader in two ways. First,the RFID shielding greatly reduces the power being broadcast from thereader that reaches the RFID tag within the holder. This cuts the poweravailable to the RFID tag to transmit information back. Secondly, evenif the RFID tag receives enough power to transmit, the signal sent fromthe RFID tag is also attenuated. Accordingly, it will be appreciatedthat the effectiveness of the RFID shielding can be varied considerablybased on choices of radio frequency shielding materials and theirthicknesses, mesh sizes, and so forth. In some embodiments, the radiofrequency shielding material provides a reduction of input power to theRFID tag by between about 5 db-30 db, 10 db-25 db, 15 db-20 db, or morethan 15, 25, 35 or 45 db.

In some embodiments, the container is configured to be repeatedly openedand closed to receive an item including an RFID tag. In someembodiments, the container includes a closure configured to enhance theshielding.

In some embodiments, the container configured to just fit a standardCalifornia driver's license. These embodiments may be characterized byinner dimensions of less then 3.5 inches, 3.75 inches, 4 inches or 4.5inches height, and less than 2.25 inches, 2.5 inches or 2.75 inches inwidth. In some embodiments, the container is configured to just fit aU.S. passport or a passport issued by another country. These embodimentsmay be characterized by inner dimensions of less then 5 inches, 5.25inches, 5.5 inches or 6 inches in height, and less than 3.5 inches, 3.75inches, 4 inches or 4.5 inches in width.

FIG. 1 illustrates a Container 100 including a Receptacle 110 configuredto store an ID 130 (identification device) incorporating an RFID Tag140. The Container 100 and Receptacle 110 may include a wallet, purse,passport holder, key chain, ticket holder, pocket, sleeve, slot,opening, niche, compartment, lid & base, glove compartment, jewelry,suitcase, backpack, bag, carrier, carton, box, sack, carton, casing,shell, carapace, covering, sheath, or the like. Container 100 furtherincludes attached Shielding 120 configured to attenuate the transmissionof radio frequency signals to or from the RFID Tag 140. Receptacle 110is configured to be repeatedly opened and repeatedly closed forinsertion and removal of ID 130.

FIG. 2 illustrates an embodiment of a Container 200 including RFID Tag140 or alternatively an RFID tag Reader 210. Container 200 is optionallyan embodiment of the Container of FIG. 1, and visa-versa. Container 200further includes Shielding 120 configured to attenuate the transmissionof radio frequency signals to or from the RFID Tag 140 or Reader 210.The shielding effect of the Shielding 120 is optionally dependent on astate of the Container 200. For example, in some embodiments, theShielding 120 may be more efficient at attenuating RF transmission whenContainer 120 is closed than when it is open. As such, in someembodiments, the state of the Container 200 may be determined by amagnitude of a detected radio frequency signal between RFID Tag 140 andReader 210 either of which may be within Container 200.

FIG. 3 illustrates various monitoring systems that employ illustrativeembodiments of Container 200. These illustrative embodiments include awall hanging (e.g., a Picture 320), a Refrigerator 325, a Jewelry Box330, a Chest of Drawers 335, a Monitored Vial 340, a Filing Cabinet 345,and a Safe 350. In these embodiments, the monitoring systems furtherinclude RFID tag Reader 210 and optional Alarm and/or Log 310. Each ofthese examples of Container 200 include one or more RFID Tag 140 andShielding 120 (whether shown or not) configured to modify thetransmission of RFID signals from Reader 210 to RFID Tags 140 responsiveto a state of the Container 200.

For example, the Picture 320 illustrated includes Shielding 120 (notshown) that surrounds the RFID Tag 140 while Picture 320 is mounted onWall 330. Shielding 120 is configured such that the attenuation effectof the shielding will be reduced if Picture 320 is removed from Wall330. For example, Shielding 120 may be disposed to form a Faraday cagearound or interfere with the RFID Tag 140 (e.g. be on the back of thepicture, optional standoffs, and/or wall) and if Picture 320 is removedfrom Wall 330 a resulting gap, or reduction in interference, will allowincreased RFID signal transmission between the associated RFID Tag 140and Reader 210. Picture 320 may alternatively be a statue or some otherobject designed to sit on a surface with an RFID tag between the objectand the surface.

In a similar manner each of the Refrigerator 325, Jewelry Box 330, Chest335, Monitored Vial 340, Filing Cabinet 345 and Safe 350 includesShielding 120 configured such that a magnitude of an RFID tag signalreceived by Reader 210 is dependent on whether the particular containeris open or not.

Reader 210 is configured to detect RFID signals from one or more of theRFID Tags 140 and to generate a responsive output signal. In someembodiments, this responsive output signal is a quantitative orqualitative indication of the state of one or more of the containers.The reader is optionally configured to distinguish the signals receivedfrom each of the one or more RFID tags and, thus, identify which of thecontainers is open.

Alarm/Log unit 310 is optionally an alarm system or a logging systemconfigured to activate an alarm or log an event responsive to the outputsignal of Reader 210. For example, in some embodiments, the Alarm/Logunit 310 is configured to activate an alarm when Picture 320 is removedfrom the wall or Safe 350 is opened. In some embodiments, the Alarm Logunit 310 is configured to log when Filing Cabinet 345, Chest 335 orDrawers or Refrigerator 325 is opened.

In alternative embodiments, Reader 210 may be placed within thecontainer and RFID Tag 140 outside.

FIG. 4 illustrates further details of an embodiment of the Container ofFIG. 2 that includes Monitored Vial 340. Monitored Vial 340 includesshielding in a Lid 410 and/or Base 420. When the Lid 410 and Base 420are attached the shielding attenuates any signal from the enclosed RFIDTag 140. When Lid 410 is opened the attenuation is reduced. The RFID tagis optionally disposed on the underside of Lid 410. The illustratedembodiments are optionally used to monitor the use of medication orother material stored within Monitored Vial 340. The monitored vial isoptionally an alternative form of Container 200 and optionallyconfigured to store alternative types of goods. In some embodiments,Reader 210 of FIG. 3 is configured to log when Monitored Vial 340 isopened and closed. For example, if a user has a medication that shouldbe taken at a specific time Reader 210 may be used to detect ifMonitored Vial 340 is opened at these times and activate a reminderusing Alarm/Log 310 if Monitored Vial 340 is not opened at a timemedication should be taken.

FIG. 5 illustrates another embodiment of Monitored Vial 340 thatincludes more than one Compartment 510. Each Compartment 510 includes aseparate RFID Tag 140 that may be separately identifiable using Reader210. This embodiment may be used, for example, to monitor an activitythat should occur at a variety of different times (e.g., times of day ordays of the week).

FIG. 6 illustrates an embodiment of the Container of FIG. 2 whereinContainer 200 includes a Room 610. In these embodiments, radio frequencysignals between RFID Tag 140 and Reader 210 may be used to determine ifan opening to the room is open. Room 610 includes Shielded Wall(s) 620that block radio frequency signals between Tag 140 and Reader 210 whenan Opening 630 is closed. When Opening 630 is open Tag 140 can bedetected by Reader 210 and this stage can be logged by Alarm/Log 310.While the illustration shows Reader 210 within Room 610 and RFID Tag 140outside, these positions are optionally exchanged. Room 610 isoptionally a shipping container. RFID Tag 140 is optionally mounted onOpening 630 such that Tag 140 is brought within reading range of Reader210 when Opening 630 is opened. Opening 630 can be, for example, awindow or door.

FIG. 7 illustrates an access system based on an RFID Tag 140. RFID Tag140 is optionally implanted within a Animal or Person 720 or attached toan animal collar. A Reader/Lock Control 710 is configured to detect asignal from RFID Tag 140 and to control a Lock 740 in response. Lock 740controls the function of a Barrier 730, such as a door or gate.Reader/Lock Control 710 is optionally programmable to operate responsiveto particular instances of RFID Tag 140.

The Reader/Lock Control 710 illustrated in FIG. 7 is optionally used inthe following manner. RFID Tag 140 is placed within or attached to theAnimal or Person 720. Reader/Lock Control 710 is placed in a programmingmode. A serial number of the RFID Tag 140 is programmed into theReader/Lock Control 710 either by digital data entry or communication,or by bringing the RFID Tag 140 within the reading range of theReader/Lock Control 710, such that the serial number can be read fromthe RFID Tag 140. The Reader/Lock Control 710 in placed in a normaloperation mode wherein it monitor's for the presence of the RFID Tag140. The RFID Tag 140 is detected by the Reader/Lock Control 710. Theserial number is read from the detected RFID Tag 140 by Reader/LockControl 710. Reader/Lock Control 710 compares the read serial numberwith the serial number programmed into the Reader/Lock Control 710 whilein the programming mode. If the read and programmed serial numbers agreeLock 740 is activated in response. Activation of Lock 730 controls(e.g., locks or unlocks) access through Barrier 730. After the detectedRFID tag is no longer detected by the Reader/Lock Control 710,Reader/Lock Control 710 optionally reactivates Lock 740 to return it toa previous state.

FIG. 8 illustrates a Clamshell ID 810 (e.g. greencard (immigrationcard), passport, driver's license, transaction card, key card, nationalidentity card, or the like). Transaction cards include credit cards,debit cards, check cards, payment cards, fare (e.g., transit) cards, orthe like. Clamshell ID 810 includes an optional picture, a Base 830including an RFID Tag 140, and a Cover 820 connected to Base 830 in aclamshell configuration, e.g., connected along an edge or Fold 840.Cover 820 and/or Base 830 include RFID shielding configured to attenuateradio frequency signals to or from RFID Tag 140 when Cover 820 is closed(e.g., shut), and to not attenuate, or attenuate to a lesser extent,radio frequency signals to or from RFID Tag 140 when Cover 820 is open.The shielding is optionally laminated into Base 830 and/or Cover 820. Insome embodiments, Clamshell ID 810 includes shielding in both Base 830and Cover 820. Base 820 can be the cover of a passport or otherdocument. In some embodiments, Base 830 includes a plastic card.

In various embodiments, Clamshell ID 810 includes a passport, driver'slicense, credit card, etc. that includes RF shielding in one part (e.g.,a page or cover) and an RFID tag in another part (e.g., a different pageor cover). Not shown in FIG. 8 are pages that may be included betweenthe covers (e.g., Base 830 and Cover 820). The RF shielding and RFID Tag140 are configured such that, when Clamshell ID 810 is closed theshielding interferes with the RF pickup of the RFID tag to an extentsufficient for reading of RFID Tag 140 to be attenuated.

In some embodiments, Clamshell ID 810 can be closed in two ways. First,such that a picture and/or other identification information is displayedon the exposed surface of Base 830. Or, second, such that the pictureand/or other identification information are covered by Cover 820. Thesetwo methods of closure are achieved by rotating Cover 820 and Base 830relative to each other in different directions around Fold 840. In thefirst instance, the picture and/or other identification information canbe used for identification while RFID Tag 140 is still shielded. Thus,Clamshell ID 810 can be used for identification (non-RFID) withoutunshielding RFID Tag 140.

When the Clamshell ID 810 is open, the shielding is less close to RFIDTag 140 and, thus, the interference of the shielding is reduced and RFIDTag 140 can be read. The shielding does not necessarily form a Faradaycage around RFID Tag 140 when Clamshell ID 810 is closed. In someembodiments, shielding is not included in the part of Clamshell ID 810that includes the RFID Tag 140. Clamshell ID 810 is optionally formed bylaminating RFID Tag 140 and RF shielding between layers of Cover 820 orto a page disposed between Cover 820 and Base 830. Further visibleinformation such as a name and/or photograph can be placed on anysurface of the Clamshell ID. Thus, in some embodiments, this visibleinformation is visible when the Clamshell ID is open or closed. In otherembodiments, this visible information is visible only when the ClamshellID is open.

FIG. 9 illustrates an ID 910 similar to that shown in FIG. 8 except thatBase 830 and Cover 820 are pivotally connected at a Pivot Point 920rather than in a clamshell configuration. Cover 820 is configured torotate over Base 830 as shown. When Cover 820 covers the Base 830 theRFID Tag 140 is shielded. When Cover 820 is rotated away from Base 830RFID Tag 140 is unshielded. In some embodiments, Cover 820 may have twosections between which Base 830 fits. Either Cover 820 and/or Base 830can include the RF shielding.

FIGS. 10A and 10B illustrate an ID similar to that shown in FIGS. 8 and9 except that Cover 820 is configured to fit into Base 839, or visaversa. In the example shown, Cover 820 slides into and out of a slot inBase 830 and thus shields and exposes, respectively, RFID Tag 140. Thisembodiment may include an item to be worn such as a medical alertbracelet, an identity tag, a ring, clothing, glasses, or the like. Forexample, in the case of a medical alert bracelet, the bracelet includesan RFID tag (having medical information) that is only readable when acover element of the bracelet is opened to expose the RFID tag to anRFID tag reader. When the cover is opened medical personal can read datafrom the RFID tag. When the cover is closed the medical information isshielded from being read by unauthorized persons and is thus keptconfidential.

One embodiment of the invention includes the credit card (16) and casehaving sides (12) and (14) as illustrated in U.S. patent applicationPub. 2004/0117514. In this embodiment, credit card (16) further(additionally) includes an RFID Tag 140 and sides (12) and/or (14) nfurther include RF shielding, or visa versa. The credit card may bereplaced by an alternative type of ID device, e.g., a driver's license,debit card, or others discussed herein.

On embodiment of the invention includes the credit card (3) and holder(1) as illustrated in U.S. patent application Pub. 2005/0011776. In thisembodiment, credit card (3) further includes an RFID Tag 140 and theholder (1) further includes RF shielding. The credit card may bereplaced by an alternative type of ID device, e.g., a driver's license,debit card, or the like.

One embodiment of the invention includes the carrying case taught inU.S. patent application Pub. 2004/0256469, wherein the carrying casefurther includes RF shielding.

One embodiment of the invention includes the credit card and pivotingcase described in U.S. patent application Pub. 2004/0237360, wherein anRFID tag is included in one part (e.g., the credit card) and shieldingin another part (e.g., the case). Thus, when the credit card is pivotedinto the case the RFID tag is shielded. One embodiment of the inventionincludes a credit card and case illustrated in FIG. 10 of U.S. patentapplication Pub. 2004/0237360. In this embodiment, the credit cardincludes an RFID Tag 140 and the case includes shielding. The creditcard may be replaced by an alternative type of ID device, e.g., adriver's license, debit card, or the like.

One embodiment of the invention includes the security wallet illustratedin U.S. Pat. No. 4,744,497, wherein the security wallet further includesRFID shielding.

Various embodiments of the invention include the foldable transactioncards illustrated in US. Patent Applications Pubs. 2004/0169087 and2004/0089724, wherein shielding is further included in one side of thefold while RFID Tag 140 is further included in the other side. RFID Tag140 is shielded when the transaction card is folded closed andunshielded when it is open.

Various embodiments of the invention include the several differentfolding cards illustrated in U.S. Pat. No. 5,700,037 and ApplicationPub. 2005/0205665. Wherein these cards further include RFID Tag 140 inone part and shielding in another part, such that in one fold positionRFID Tag 140 is shielded by the shielding, and in another fold positionRFID Tag 140 is un-shielded.

One embodiment of the invention includes the credit card caseillustrated in U.S. patent application Pub. 2002/0117243. Where in thecredit card case further includes shielding configured to shield an rfidenabled credit card or other identification device.

FIG. 11 illustrates further detail of some embodiments of Clamshell ID810, having a First Cover 1110 and a Second Cover 1120 separated by Fold840. First Cover 1110 and a Second Cover 1120 may be, for example, Base830 and Cover 820. Fold 840 can be a spine, hinge, crease, or the like.In alternative embodiments, First Cover 1110 and/or Second Cover 1120can be embodied as a page or pages between covers of an identitydocument. Shielding 1130 is disposed as part of the second cover (e.g.,or on or in an ID document cover or page). Shielding 1130 is optionallydisposed away from fold 840 such that, when Clamshell ID 810 is open,the shielding as well separated from RFID Tag 140. In variousembodiments, the separation between shielding 1130 and Fold 840 isgreater than 5 mm, 10 mm, 15 mm, 20 mm, 25 mm or 30 mm. Likewise, RFIDTag 140 is optionally disposed away from Fold 830. In variousembodiments, the separation between RFID Tag 140 (including antenna) andFold 840 is greater than 5 mm, 10 mm, 15 mm, 20 mm, 25 mm or 30 mm.Alternatively, RFID Tag 140 and/or Shielding 1130 may be disposed toabut Fold 840.

FIG. 12 illustrates embodiments of Clamshell ID 810 including a FirstCover 1210 and a Second Cover 1220 separated by Fold 830. Theseembodiments further include a Page 1230 disposed between First Cover1210 and Second Cover 1220. Page 1230 includes RFID Tag 140 or Shielding1130. For example, these embodiments of Clamshell ID 810 can include apassport including a photograph and identity information within aninside surface (facing toward Page 1230) of First Cover 1210, RFID Tag140 within First Cover 1210 or Second Cover 1220, and Shielding 1130within Page 1230. RFID Tag 140 can be shielded and un-shielded by movingPage 1230 close to or away from RFID Tag 140. In embodiments, whereinRFID Tag 140 is included in Second Cover 1220, RFID Tag 140 is shieldedwhen Page 1230 is held close to Second Cover 1220. In this position ismay be possible to view the photograph and identity information withinthe inside surface of First Cover 1210 without un-shielding RFID Tag140. When Page 1230 is moved away from Second Cover 1220 then RFID Tag140 is unshielded.

By including the RF Shielding 1130 with one of the one or more Page1230, Clamshell ID 810 can be opened without necessarily removingShielding 1130 from the vicinity of RFID Tag 140. For example, if RFIDTag 140 is disposed within the back cover, and Clamshell ID 810 isopened such that the inside of the First Cover 1210 is visible, Page1230 including Shielding 1130 could remain adjacent to Second Cover 1220and thus limit communication with the RFID Tag 140. To allowcommunication with RFID Tag 130 Page 1230 including Shielding 1130 isturned such that it moves away from Second Cover 1220. The Shielding1130 may be attached to Page 1230 or be included within Page 1230. Forexample, Shielding 1130 may be laminated within Page 1230, be sewn onPage 1230, be glued on Page 1230, be within the material of Page 1230,or otherwise be connected to Page 1230. In various embodiments,Shielding 1130 includes a wire mesh, metallic fibers, metallicparticles, metallic thread, or the like. Shielding is optionallyattached to a binding of Clamshell ID 810 as Page 1230. Page 1230 isoptionally bound to Clamshell ID by stable, pin, wire, thread, adhesive,laminate, or the like.

FIG. 13 illustrates embodiments of Clamshell ID 810 wherein Shielding1130 is added to Page 1230 following assembly of Clamshell ID. In theseembodiments, Shielding 1130 is included in a Shielding Insert 1310.Shielding Insert 1310 optionally includes Adhesive 1320 or some othermechanism for attaching Shielding Insert 1310 to Page 1230. Theattachment of Shielding Insert 1310 to Page 1230 can be permanent ortemporary (e.g., Shielding Insert 1310 may be removable). In variousembodiments, Shielding Insert 1310 includes a metal plate, wire mesh,metallic fibers, metallic particles, metallic thread, or other forms ofshielding.

The size of Shielding Insert 1310 is optionally the same as or slightlysmaller then a European Union Passport, a Japanese Passport, a ChinesePassport, a United States Passport, or the like. Alternatively, invarious embodiments, Shielding Insert 1310 is configured in size suchthat it can be attached to Clamshell ID 810 at least greater than 5 mm,10 mm, 15 mm, 20 mm, 25 mm or 30 mm from Fold 830. For example,Shielding Insert 1310 may be configured to attach to Page 1230 such thatShielding Insert 1310 extends from near an outer edge (opposite Fold830) of Page 1230 to within 10 mm of Fold 830.

FIG. 14 illustrates embodiments of an Identification Device 1410, suchas Clamshell ID 810. In these embodiments, Shielding Insert 1310includes one or more clips 1420, clamp, pin, slot, rivet, or othermechanism configured for, optionally temporary, attaching ShieldingInsert 1310 to Identification Device 1410. In some embodiments Clip 1420is replaced by a slot configured to receive that part of IdentificationDevice 1410 including an RFID tag. Shielding Insert 1320 is optionallypivotally connected to Identification Device 1210. In the embodimentsillustrated by FIG. 14, Fold 830, Second Cover 1220 and Page 1230 areoptional. For example, Identification Device 1410 can be a single piecedriver's license, credit card, etc. (without separate front and backcovers) including RFID Tag 140. Shielding Insert 1310 is configured tobe attached to First Cover 1210, Page 1230, and/or Second Cover 1220. Inthese embodiments Page 1230 need not include shielding. In someembodiments, Shielding Insert 1310 may be attached to that part ofIdentification Device 1410 that includes RFID Tag 140. In theseembodiments, Shielding Insert 1310 is inserted to shield RFID Tag 140and removed in order to un-shield RFID Tag 140. In some embodiments,Shielding Insert 1310 includes a flat metal plate configured to fitwithin a passport, e.g., a passport issued by the United States, aEuropean Country, or an Asian Country. In these embodiments, the size ofshielding insert may be similar to or slightly smaller than thedimensions of the passport. In some embodiments, Shielding Insert 1310can include an attachment device, such as Clip 1420, on more than oneside (face). As such, Shielding Insert 1310 may be configured to shieldand RFID enabled driver's license on one side and an RFID enabled creditcard on the other side. Shielding Insert 1310 is optionallyapproximately the size of a driver's license or credit card. In someembodiments, Shielding Insert 1310 has height and width dimensionssimilar to or smaller than a page between the front cover and the backcover. Shielding Insert 1310 is optionally thin and optionally flexible.

As illustrated in FIG. 15, some embodiments of the invention include amethod of allowing communication to an RFID tag. The method includes aStep 1510 of opening a front cover of an identification device, such asClamshell ID 810 or Identification Device 1410, in order to makeinformation included on the inside of the front cover visible, an RFshielding page being kept in proximity of the back cover such that an RFtag within the back cover is unreadable. The RF shielding page can befor example an instance of Page 1230 or a page with Shielding Insert1310 attached. The method further includes a Step 1520 of visuallypresenting the information on the inside of the front cover. Theinformation can include a name, citizenship, photograph, identificationnumber, or the like. A step 1530 includes turning the shielding pageaway from the back cover such that the RFID tag becomes un-shielded andcan communicate with a reader. The shielding page is a page, between thefront cover and the back cover, that includes or is attached to RFshielding configured to limit communication with the RFID tag. Inalternative embodiments of this method, the rolls of the front cover andback cover are reversed.

As illustrated in FIG. 16, some embodiments of the invention include amethod of modifying an RFID enabled identification device, e.g.,Identification Device 1410. This method includes, a Step 1610 of openingthe identification device by turning a back cover away from a frontcover; a Step 1620 of selecting a page disposed (optionally bound)between the front cover and the back cover; an optional Step 1630 ofexposing an adhesive surface on an RF shielding insert, the RF shieldingconfigured to limit RF communication between an RFID tag included in theidentification device and a reader; and a Step 1640 of attaching the RFshielding insert to the selected page using the exposed adhesive. Inalternative embodiments, the adhesive is optionally replaced by a clip,clamp, pin, slot, or other mechanism configured for temporary attachmentto the identification device. The identification device is optionally apassport, driver's license, immigration document, national identitydocument, or other identification device discussed herein. The RFshielding insert is optionally sized (as discussed elsewhere herein)such that it is disposed at a distance from a fold in the identificationdevice.

As illustrated by FIG. 17, one embodiment of the invention includes amethod of making an identity device including: a Step 1710 of adding anRFID tag to a first cover layer; a Step 1720 of adding a second coverlayer such that the RFID tag is disposed between the first cover layerand the second cover layer; and a Step 1730 of a attaching an RF shieldto the combined first cover layer and second cover layer. The RF shieldis optionally attached as a page configured to be disposed between toparts of the combined first cover layer and second cover layer when thecombination is folded. The RF shield is optionally temporally attachedto the combined first cover layer and second cover layer.

FIG. 18 is a block diagram illustrating the manufacture of anidentification device, such as a passport. At one stage in themanufacturing process Shielding 1130 is dispensed in the form of astrip. The strip is laid down over what will be several separateidentification devices when the manufacturing is completed. A pluralityof RFID Tags 140 are deposited. The assembled material, includingshielding is cut along a Cutting Line 1820 (cutting area) to separatethe locations where the RFID Tags 140 are deposited or to be deposited.As a result a plurality of identity documents are produced. The cutalong Cutting Line 1820 occurs after Shielding 1130 is laid down. Pagesare optionally added to the assembled material prior to cutting.

FIG. 19 illustrates the method of illustrating an identification deviceas shown in FIG. 18. In an Add Shielding Step 1910, shielding is addedto an area of a cover that will become a first identification device anda second identification device. In an Add RFIDs Step 1920, a first RFIDtag is added to that part of the cover that will become the firstidentification device and a second RFID tag is added to that part of thecover that will become the second identification device. In a Cut Step1930, the cover is cut to separate that part that will become the firstidentification device and that part that will be come the secondidentification device. Cut Step 1930 includes cutting the shieldingadded in Add Shielding Step 1910.

FIG. 20 illustrates an RFID reader system configured to read ClamshellID 810 e.g., an RFID enabled passport including shielding. Spacingbetween an RFID Reader 2010 and a Base 2020 is configured to form aPassport Slot 2030. RFID Reader 2010 is configured to read Clamshell ID810. The height of Passport Slot 2030 is configured such that ClamshellID 810 is sufficiently open when passed though Passport Slot 2030between the RFID Reader 2010 and Base 2020. E.g., Passport Slot 2030 isconfigured such that, in order to pass through Passport Slot 2030Clamshell ID 810 cannot be partially open such that shielding withinClamshell ID 810 could block the communication between RFID Reader 2010and the RFID tag included in Clamshell ID 810. The width of the passportslot is optionally configured to assure that the shielding is notdisposed between the RFID reader and the RFID tag.

FIG. 21 illustrates an RFID reader system including more than one RFIDreaders (RFID Reader 2010A, RFID Reader 1010B, and optionally RFIDReader 1010C). The more than one RFID readers are disposed such that anyshielding within an ID is never within the line of sites between all ofthe one or more RFID readers and an RFID tag in a reading volume. And inaddition, the more than one RFID readers are disposed such that theangle between an antenna of the RFID tag is at least one of the RFIDreaders is favorable for communicating between the RFID tag and RFIDreader. Achieving both or these criteria may require three or more RFIDreaders. In alternative embodiments, this system may include fewer ormore RFID readers than illustrated. The illustrated readers optionallysurround a walk through reading volume.

FIG. 22 is a block diagram of a Switchable RFID Device 2200. In someembodiments, Switchable RFID Device 2200 is an identity device such as apassport, identity card, driver's license, immigration document (e.g.,green card or visa), student identity card, library card, financial card(e.g., credit card, debit card or prepaid card), social security card,Military ID card, key, keycard or the like. Switchable RFID Device 2200optionally includes Visible Indications 2220 such as a barcode, picture,image, name, address, text, and/or the like. Switchable RFID Device 2200further includes one or more Switchable RFID Tag 2230. Switchable RFIDTag 2230 includes one or more RFID Antenna 2240, a Circuit 2250, one ormore Tag 2260 and one or more Switch 2270. Switch 2270 is optionallydisposed within Circuit 2250 or Tag 2260. RFID Antenna 2240 isconfigured for sending a radio frequency (RF) signal from SwitchableRFID Device 2200 in response to a received signal. The received signalis optionally used to power Switchable RFID Tag 2230. In someembodiments, the received signal is an RF signal received by RFIDAntenna 2240. In alternative embodiments, the received signal isreceived through an inductive coupling or a non-RF antenna withinCircuit 2250. RFID Antenna 2240 is optionally a dipole antenna.

In some embodiments, Switchable RFID Tag 2230 is configured for a userto be able to repeatedly turn on and off the function (e.g.,delectability or readability) of Tag 2260 using Switch 2270. Circuit2250 typically further includes a diode, capacitor, transistor, and/orthe like configured to receive power through RFID Antenna 2240 or aninductive coupling and to convey signals between RFID Antenna 2240 andTag 2260. In some embodiments, Tag 2260 includes an integrated circuit.

Switchable RFID Tag 2230 is differentiated from circuits found in RFIDtags of the prior art by at least the inclusion of Switch 2270. Switch2270 is optical, thermal, magnetic, mechanical, wireless, and/orelectronic. Switch 2270 is configured to be activated by a magneticfield, an electric field, a wireless signal, light, heat, mechanicalforce, and/or an electronic circuit external to Switchable RFID Device2200. Switch 2270 is optionally a sliding switch, a flip switch, arotating switch, membrane switch, pushbutton switch, or other mechanicalswitch known in the art of mechanical switches. In typical embodiments,Switch 2270 is configured for both turning on and turning off functionof Tag 2260.

In various embodiments, Switch 2270 is normally open or normally closed,and the function of Tag 2260 can be normally on or normally off. Forexample, In some embodiments, Switch 2270 is a mechanical contact switchactivated by applying pressure to an outside surface of Switchable RFIDDevice 2200. In some embodiments, when this pressure is applied thefunctionality of Tag 2260 will be turned on, and when this pressure isnot applied the functionality of Tag 2260 will be off. In someembodiments, Switch 2270 is a mechanical contact switch activated usinga magnetic field. In some embodiments, Switch 2270 is an electricalswitch turned on or off by a circuit external to Switchable RFID Device2200. For example, Switch 2270 may include two electrical contactsexposed at the exterior of Switchable RFID Tag 2230. When a conductancepath, current and/or voltage is applied between these electricalcontacts Switch 2270 is turned on, or in alternative embodiments, turnedoff.

In various embodiments, Switch 2270 functions by creating a shortcircuit. For example, Switch 2270 can be configured to turn off thefunction of Tag 2260 by short circuiting RFID Antenna 2240, a diodewithin Circuit 2250, a capacitor within Circuit 2250, a transistorwithin Circuit 2250, and/or a connection within Tag 2260.

In various embodiments, Switch 2270 functions by creating an opencircuit. For example, Switch 2270 can be configured to create an opencircuit between (or within) RFID Antenna 2240, Circuit 2250, and/or Tag2260.

In some embodiments, Switchable RFID Device 2200 is configured tooperate as a key and Switch 2270 is activated to turn on the functionsof Tag 2260 by mechanical insertion of the key into a locking device. Inthese embodiments, the functions of Tag 2260 are typically off when thekey is not inserted in the locking device. The locking device isconfigured to activate Switch 2270 using an electronic circuit, amechanical force, or a magnetic field.

In alternative embodiments, an instance of Switch 2270 is included inTag 2260 and/or Circuit 2250. Thus, Switchable RFID Tag 2230 may includea plurality of Switch 2270, one Switch 2270 in Circuit 2250 and oneSwitch 2270 in Tag 2260. As is described further herein, these instancesof Switch 2270 may be configured to perform different functions.

FIG. 23 illustrates some of many possible locations for Switch 2270within Switchable RFID Device 2200 where Switch 2270 creates an opencircuit. FIG. 24 illustrates some of man possible locations for Switch2270 within Switchable RFID Device 2200 wherein Switch 2270 creates ashort circuit. The embodiments illustrated by FIGS. 23 and 24 include aTransistor 2310, a Diode 2320, and a Capacitor 2330. Possible positionsfor Switch 2270 are indicated by an “X.”

In some embodiments, Switch 2270 is configured to partially limit thefunctionality of Tag 2260. Thus, Tag 2260 may be configured to respondwith data indicating a first state when Switch 2270 is on and to respondwith data indicating a second state when Switch 2270 is off. Forexample, Switch 2270 can be connected to logic circuits of Tag 2260 insuch a way that Tag 2260 will transmit a limited amount of data whenSwitch 2270 is off and a less limited amount of data when Switch 2270 ison. For example, Tag 2260 may be configured to respond with dataindicating the name of a person when Switch 2270 is off and to respondwith the data including the name, an address, an account number and atelephone number when Switch 2270 is on. When Switch 2270 is connectedto a circuit within Tag 2260, Switch 2270 (or a plurality thereof) isoptionally configured to separately control detection of and readabilityof Tag 2260. Detection occurs when Tag 2260 sends any response signal,while readability is a function of the data that may be included in thecontents of the response signal.

FIGS. 25A and 25B illustrate one embodiment of Switchable RFID Device2200 in which Switch 2270 is a sliding switch disposed along an Edge2520 of Switchable RFID Device 2200. FIG. 25A illustrates an OFFPosition wherein an Electrical Connector 2510 between Circuit 2250 andTag 2260 is in an open circuit state. In this state, Tag 2260 is notnormally detectable or readable. FIG. 25B illustrates an ON positionwherein Switch 2270 completes an electrical connection between Circuit2250 and Tag 2260. In this position, Tag 2260 is detectable andreadable. In this embodiment, Switch 2270 is configured to be movedbetween the on position and the off position, for example using afinger. In the on position, Switch 2270 optionally extends from Edge2520 of Switchable RFID Device 2200. In the off position, Switch 2270 isoptionally approximately flush with Edge 2520. Some embodiments of theinvention include a switch configured to be approximately flush with anedge of a financial card (e.g., credit card or debit card) in at leastone position. Some embodiments of the invention include a switchconfigured to be below an edge of a financial card in at least oneposition. Switch 2270 may be bistable or astable. Other featuresillustrated in FIGS. 25A and 25B are optional.

FIGS. 26A and 26B illustrates a Membrane Switch, generally designated2600, (and surrounding area) for use in a switchable RFID device such asSwitchable RFID Device 2200. Membrane Switch 2600 is optionally anembodiment of Switch 2270. Membrane Switch 2600 is shown in the OFF andON positions, in FIGS. 26A and 26B respectively. The use of a finger tooperate Membrane Switch 2600 is optional, other devices may be used toactivate the switch. By bringing electrical conductors on a Surface 2630and a Surface 2625 together, a switchable RFID tag is controlled,activated or deactivated. Typically, Surface 2625 and Surface 2630 arecoated with an electrical conductor, such as copper. In someembodiments, a Support Layer 2610 is disposed at a First Surface 2615 ofSwitchable RFID Device 2200 and a Flexible Membrane 2620 is disposed ata Second Surface 2635 of Switchable RFID Device 2200. Thus, the FlexibleMembrane 2620 includes both Surface 2625 and an outer surface, e.g.,Surface 2635 of Switchable RFID Device 2200. In some embodiments,Surface 2635 extends beyond Membrane Switch 2600 to Surrounding Areas2650. As such Flexible Membrane 2620 is essentially flush with a surfaceof Switchable RFID Device 2200. Flexible membrane 2620 and Support Layer2610 are separated by a Spacer 2640. In some embodiments, Spacer 2640extends beyond the immediate vicinity if Membrane Switch 2600 toSurrounding Areas 2650. Spacer 2640 optionally extends essentiallythroughout Switchable RFID Device 2200. As such, Surface 2635 can beessentially smooth, e.g. does not include raised portions near MembraneSwitch 2600. Support Layer 2610 is typically stiffer than FlexibleMembrane 2620.

In various embodiments, Membrane Switch 2600 is included in an identitydevice such as a passport, driver's license, immigration card, key card,financial card, ID card, or the like. For example, in some embodiments,Membrane Switch 2600 is included within a passport or other identitydevice having a clamshell configuration. In these embodiments, FlexibleMembrane 2620 is optionally disposed toward an interior of the identitydevice when the identity device is closed. In this position, FlexibleMembrane 2620 is protected from inadvertent contact and typically canonly be pressed after the identity device is opened.

In various embodiments, Membrane Switch 2600 is included in a financialcard (e.g., a credit card, debit card or the like). In some of theseembodiments, Flexible membrane 2620 is essentially flush withSurrounding Areas 2650 of the financial card including Surface 2625, asillustrated in FIGS. 26A and 26B. In this position Membrane Switch 2600does not substantially stick out from First Surface 2625 of thefinancial card and is, thus, protected by Surrounding Areas 2650 frominadvertent activation. In some embodiments, Membrane Switch 2600 isrecessed below First Surface 2635.

FIG. 26C illustrates an embodiment of Membrane Switch 2600 furtherincluding a Spring 2655. Spring 2655 may be considered a switchactivator. Spring has an activation height at which the spring centerwill spring into contact with the Support Layer 2610 this activationheight is typically below First Surface 2635.

FIG. 26D illustrates a cross-sectional view of Membrane Switch 2600disposed within Switchable RFID Tag 2230. Tag 2260 is at least partiallydisposed within Spacer 540 and/or Support Layer 2610. Spacer 2640 and/orSupport Layer 2610 optionally include a cavity configured to receive Tag2260. In some embodiments, Tag 2260 is deposited on Support Layer 2610before Spacer 2640 is deposited on Support Layer 2640. In theseembodiments, Support Layer 2640 is formed around Tag 2260. In someembodiments, Spacer 2640 is configured to hermetically seal Tag 2260and/or Membrane Switch 2600.

In various embodiments, an Opening 2670 within Membrane Switch 2600 isless than or equal to 2.0 mm, 1.5 mm, 1.75 mm, 1.25 mm, 1.0 mm, 0.75 mm,or 0.5 mm think as measured from Surface 2625 to Surface 2630.

The membrane switch illustrated in FIGS. 26A and 26C is optionallydisposed such that Flexible Membrane 2620 is approximately flush with,or recessed in, First Surface 2635 of an identity device such as adriver's license or credit card. As such, Spacer 2640 prevents themembrane switch from being activated when a force is applied to theentire first surface. For example, when the identity device is placedwithin a wallet and the wallet is compressed.

Spacer 2640 optionally extends essentially throughout an identitydevice. For example, where Switchable RFID Device 2200 is a credit card,Spacer 2640 may extend to the outer edges of the credit card. FlexibleMembrane 2620 optionally includes a picture of a user and/or anindication of the location of Opening 2670 in Spacer 2640. In someembodiments, Flexible Membrane 2620 is transparent and Spacer 2640includes a picture of a user or a credit card number. In someembodiments, Spacer 2640 includes a cavity configured to fit anintegrated circuit, the integrated circuit configured to operate as partof Tag 2260 and optionally mounted on Support Layer 2640. In someembodiments, Support Layer 2640 includes conductive traces configured toconnect Tag 2260 to an RFID Antenna 2240. In some embodiments, Spacer2640 is generally rectangular in shape, (e.g., in the shape of afinancial card).

FIG. 27 illustrates a top view of Membrane Switch 2600 of FIG. 26C,according to various embodiments of the invention. In these embodiments,the shape of the Opening 2670 is configured to prevent Spring 2655 fromrotating. A wide variety of alternative shapes may be used inalternative embodiments.

FIG. 28 illustrates Switchable RFID Tag 2230 in an embodiment whereinSwitchable RFID Device 2200 includes an Identity Document 2800 having aclamshell configuration (e.g., a passport). Switchable RFID Tag 2230 maybe included in a Cover 2840, a Cover 2830, or an interior page (notshown) of Identity Document 2800. Identity Document 2800 optionallyincludes Shielding 2810. Flexible Membrane 2620 is typically disposedsuch that it is on the interior of Identity Document 2800 when IdentityDocument 2800 is closed. See U.S. Pat. No. 7,719,425 issued May 18, 2010for further details of Identity Document 2800, according to someembodiments.

FIG. 29 illustrates the manufacture of instances of Identity Document2800. At one stage in the manufacturing process, Shielding 2810 isdispensed in the form of a strip. The strip is laid down over what willbe several separate instances of Identity Document 2800 (after when themanufacturing is completed). A plurality of Switchable RFID Tag 2230 aredeposited, creating a device including several Switchable RFID Tag 2230.The assembled material, including Shielding 2810 is optionally cut toseparate the locations where the instances of Switchable RFID tag 2230are deposited or to be deposited. As a result a plurality of IdentityDocument 2800 are produced. Pages are optionally added to the assembledmaterial prior to cutting. See U.S. non-provisional patent applicationSer. No. 11/350,309 filed Feb. 7, 2006 for further details, according tosome embodiments.

In the above and other embodiments, Switchable RFID Tag 2230 isoptionally disposed such that the switch mechanism is accessed from theinside of Cover 2830 or Cover 2840, the inside being the sides that faceeach other when Identity Document 2800 is closed. This orientation isoptionally configured to reduce the probability of inadvertentlyactivating Switch 2270 when Identity Document 2800 is closed. Forexample, in these embodiments, Flexible membrane 2610 may be to theinside (of the closed Identity Document 2800) and Support Layer 2610 maybe to the outside. Support Layer 2610 optionally includes a stiffener inthe region near Opening 2670.

FIG. 30 illustrates an exploded view of an embodiment of Switchable RFIDDevice 2200 including a Driver's License, generally designated 3000. Inthis view, for clarity, Spacer 2640 is removed and Flexible Membrane2620 is separated from Tag 2260, RFID Antenna 2240, Circuit 2250 andSupport Layer 2610. A location of Membrane Switch 2600 is indicated byMarkings 3020 visible at Flexible Membrane 2620. Surface 2635 is ofuniform level across the face of Driver's License 3000. As such,Switchable RFID Device 2200 can smoothly be placed in a wallet andMembrane Switch 2600 is protected from inadvertent activation by Spacer2640. Membrane Switch 2600 is optionally disposed at least partiallywithin RFID Antenna 2240. A similar embodiment of Switchable RFID Device2200 may include a credit card or similar financial device.

FIG. 31 illustrates an embodiment of Switchable RFID Device 2200including a plurality of Switches, designated 3110, 3120 and 3130. Theseembodiments of Switchable RFID Device 2200 may include an identitydevice, financial device, credit card, debit card, remote control,product label, communication device, or the like. Any of Switches 3110,3120, and 3130 are optional. Switch 3130 is configured for turningSwitchable RFID Device 2200 ON and OFF. For example, as illustrated,Switch 3130 may be disposed in a connection between RFID Antenna 2240and a Power Circuit 3140. Power Circuit 3140 is an embodiment of Circuit2250 configured to generate electrical power from a received signal topower Tag 2260.

Switch 3110 and Switch 3120 are configured to control processing logicwithin Tag 2260. For example, in some embodiments, Switch 3110 andSwitch 3120 are configured to provide Boolean (true/false) values to alogic circuit within Tag 2260. Some embodiments include further switches(e.g., 3, 4, 6, 8, 10 or more) configured to control processing logic.

In various embodiments, the processing logic within Tag 2260 can beconfigured to perform a wide variety of functions responsive to Switch3110, Switch 3120, and any additional switches present. For example, insome embodiments, the processing logic is configured such that whenSwitch 3110 is activated a transaction amount is approved and whenSwitch 3120 is activated the transaction amount is disapproved.Alternatively, Switch 3110 and Switch 3120 may be part of a set ofswitches used to enter a PIN (personal identification number), anencryption key, an amount, an authorization code, an RFID readeridentification number, an identification number associated withSwitchable RFID Device 2200, a selection of a mode of Tag 2260, text,numbers, and/or other data.

In some embodiments, data sent by Tag 2260 using RFID Antenna 2240 isresponsive to Switch 3110 and/or Switch 3120. For example, in someembodiments, Tag 2260 will send a different identification numberdepending on whether Switch 3110 or Switch 3120 is activated. In someembodiments, Tag 2260 is configured to allow a transaction up to acertain value if neither Switch 3110 nor Switch 3120 is activated, andprogressively higher values if Switch 3110 or Switch 3120 is activated.In some embodiments, Tag 2260 is configured to require that Switch 3110and Switch 3120 be activated in a specific combination, order and/orwith a specific temporal pattern in order to perform some operation,e.g., a financial transaction.

While the embodiment of Switchable RFID Device 2200 illustrated in FIG.31 includes one instance of Tag 2260, as discussed elsewhere herein,Switchable RFID Device 2200 optionally includes more than one instanceof Tag 2260. When more than one instance of Tag 2260 is present, aseparate instance of Switch 3130 may be disposed between RFID Antenna2240 (or Circuit 2250) and each instance of Tag 2260. In thisconfiguration, the instances of Switch 3130 may be used to select whichinstance of Tag 2260 to activate. Switch 3110 and/or Switch 3120 may,likewise, be configured to select, activate or control differentinstances of Tag 2260.

In some embodiments, Switchable RFID Device 2200 includes a Memory 3150.Memory 3150 is optionally programmable. For example, in someembodiments, Memory 3150 is programmable using data entered throughinstances of Switch 3110 and Switch 3120. In some embodiments, Memory3150 is changed from a write state to a read only state, using Switch3110. In various embodiments, Memory 3150 is configured to store data tobe broadcast, encryption information, data keys, values to be used inconjunction with data entered suing Switch 3110, data for logicprocessing, identifying data, account data, mode data characterizing amode of Switchable RFID Tag 2230, or the like. Memory 3150 can bevolatile or non-volatile, FLASH, SDRAM, ROM, DDRAM, DRAM, or the like.Some embodiments of the invention include an automated device configuredto actuate Switch 2270 in order to place Switchable RFID Tag 2230 in aprogrammable mode.

FIG. 32 illustrates various embodiments of Tag 2260 configured for usein embodiments of Switchable RFID Device 2200 including a plurality ofswitches. In the illustrated embodiments, Tag 2260 includes a FirstLogic Input 3210 and an optional Second Logic Input 3220, configured tobe coupled to Switch 3110 and Switch 3120, respectively. First LogicInput 3210 and Second Logic Input 3220 are each configured to beresponsive to a different switch. First Logic Input 3210 and SecondLogic Input 3220 are configured to control the function of Tag 2260.

For example, in some embodiments, Tag 2260 is configured to outputdifferent data via a Data Input/Output 3240 depending on the state ofSwitch 3110 as determined by the First Logic Input 3210. Tag 2260 isoptionally configured to output different data depending on whether aswitch coupled to First Logic Input 3210 or a switch coupled to SecondLogic Input 3220 is activated.

In some embodiments, the switches illustrated in FIG. 32 are membraneswitches. In some embodiments, the switches illustrated in FIG. 32 areirreversible switches.

FIG. 33 illustrates an instance of Tag 2260, according to variousembodiments of the invention. These embodiments include a plurality(e.g., 2, 3, 4, 8, 10, 12 or more) of switch inputs, such as First LogicInput 3210, Second Logic Input 3220 and Third Logic Input 3330. FirstLogic Input 3210, Second Logic Input 3220 and Third Logic Input 3330 areconfigured to receive inputs from Switch 3110, Switch 3120, Switch 3130,or the like, respectively. The state of connected switches (Switch 3110,Switch 3120, etc.) is monitored by an optional Switch State Monitor 3340and a Processing Logic 3350. Switch State Monitor 3340 is optionally amultiplexer, latch, logic circuit, or the like.

In some embodiments, Processing Logic 3350 is configured to process datareceived through a Data Input From Antenna 3360, to receive power from aPower Input From Antenna 3230, and to generate data for output through aData Output to Antenna 3370 responsive to the states of Switch 3110,Switch 3130, etc. The generated data is optionally further responsive todata stored in Memory 3150 and/or data received from Data Input fromAntenna 3360.

The data received from Memory 3150 can include codes required forProcessing Logic 3350 to generate specific data for communicationthrough Data Output to Antenna 3370. For example, in some embodiments,Tag 2260 is configured to output an RF signal only if data in Memory3150 matches a state of Switches 3110 and 3120. In some embodiments, thestate of switches is used to determine which of several differentalternative RF signals to transmit. For example, if Switch 3110 isactivated then a first signal is transmitted, if Switch 3120 isactivated then a second signal is transmitted, and if no switches aredepressed than no signal is transmitted or an third signal istransmitted. The first and second signals are optionally associated withdifferent financial accounts and/or different functions.

Some embodiments of the invention include a multiswitch credit cardincluding one or more instances of Tag 2260. This multiswitch creditcard optionally is configured to be associated with more than onefinancial account and switches may be used to indicate which of the morethan one financial account should be used for a transaction. In oneexample, the multiswitch credit card includes an instance of Tag 2260configured for engaging in a financial transaction responsive to Switch3110 and also configured to operate an electronic lock responsive toSwitch 3120.

Some embodiments of the invention optionally include programming of Tag2260 to make associations with the one or more financial account. Thisprogramming can include entering data within Memory 3150. Alternatively,Tag 2260 is configured to include a plurality of exchangeable Memory3150. In these embodiments, Tag 2260 is programmed to operate withdifferent financial accounts and/or functions by inserting differentinstances of Memory 3150 within Switchable RFID Tag 2230. Themultiswitch credit card is, thus, optionally a multi account creditcard.

Some embodiments of Switchable RFID Device 2200 are configured toinclude a plurality of Tag 2260. Each member of the plurality of Tag2260 may be responsive to one or more switches. In some embodiments,Switchable RFID Device 2200 is configured to receive one or morereplaceable instances of Tag 2260. In these embodiments, Switchable RFIDDevice 2200 may be programmed by replacing an instance of Tag 2260.Multiple instances of Tag 2260 optionally share one instance of RFIDAntenna 2240 and/or one instance of Memory 3150.

FIG. 34 illustrates a method according to various embodiments of theinvention. In these embodiments, power is received by Tag 2260 throughan RF or inductive signal in a Receive Power Step 3410. The RF signaloptionally includes data received in a Receive Data Step 3420. The stateof one or more of Switches 3110, Switch 3120, etc. is then determined ina Determine Switch State 3430 Step. This state is used to determine anRF response, of any, in a Determine Response Step 3440. The RF responseis then sent in a Send Response Step 3450.

FIG. 35 illustrates various embodiments of the invention in whichSwitchable RFID Device 2200 is configured as a RF Powered Remote 3500configured to control external devices. This RF Powered Remote 3500optionally does not require an internal power source (e.g., is poweredwirelessly). Power is received from an RF (radio frequency) signal viaRFID Antenna 2240 and used to send a return signal, typically throughthe same instance of RFID Antenna 2240. RF Powered Remote 3500 uses oneor more Switchable RFID Tag 2230 to activate and deactivate or modifythe return signal. The one or more Switchable RFID Tag 2230 optionallyshare RFID Antenna 2240, power circuits, and/or processing logic. RFPowered Remote 3500 is typically a multifunction remote control.

RF Powered Remote 3500 is optionally used as part of a lockingmechanism, such as in a vehicle lock or door lock. RF Powered Remote3500 is optionally configured to control electronic equipment, such as acomputing device, a video recording device, projector, a game, a stereo,or a television. RF Powered Remote 3500 is optionally configured tocontrol a garage door opener.

As illustrated in FIG. 35, a Transmitter 3510 is configured to send anRF signal to provide power to RF Powered Remote 3500. This RF signal isreceived by RF Powered Remote 3500. When a switch (e.g. a First Switch3520 or a Second Switch 3530), included in RF Powered Remote 3500, is ina first position the received power is used to send a return signal fromRF Powered Remote 3500 to the device being controlled, e.g. a ControlledDevice 3540. Transmitter 3510 is optionally included in ControlledDevice 3540. When First Switch 3520 and/or Second Switch 3530 is in asecond position the received power is not used to send the return signalfrom the remote, or is used to send a different return signal. Thereturn signal may include audio, RF, infrared light, visible light, orthe like. First Switch 3520 and Second Switch 3530 are optionallyembodiments of Switch 3110, Switch 3120, or Switch 3130. In variousembodiments, RF Powered Remote 3500 includes 1, 2, 3, 4 or moreswitches, such as First Switch 3520 and Second Switch 3530. Typically,different switches are configured to control different functions ofControlled Device 3540.

In some embodiments, First Switch 3520 and/or Second Switch 3530 areconfigured to control the collection of power from the RF signal. Insome embodiments, First Switch 3520 and/or Second Switch 3530 areconfigured to prevent the power from flowing through an integratedcircuit within the RF Powered Remote 3500. In some embodiments, theFirst Switch 3520 and/or Second Switch 3530 are configured to decouplean instance of RFID Antenna 2240 within RF Powered Remote 3500. In someembodiments, the First Switch 3520 and/or Second Switch 3530 areconfigured to prevent data transmission from RF Powered Remote 3500. Insome embodiments, First Switch 3520 and/or Second Switch 3530 areconfigured to control logic within an instance of Tag 2260 within RFPowered Remote 3500. In various embodiments, First Switch 3520 and/orSecond Switch 3530 are normally on or normally off. In some embodiments,more than one switch is configured to control logic within the sameintegrated circuit.

The embodiments of RF Powered Remote 3500 illustrated in FIG. 14 includea Power Collection Circuit 3550 configured to convert the received RFsignal to electrical power of the operation of one or more Tag 2260. RFPowered Remote 3500 is configured to power an integrated circuit, e.g.,Tag 2260, and send a return signal using the electrical power producedby Power Collection Circuit 3550. The RF Powered Remote optionallyreceives all of its electrical power from the Power Collection Circuit3550.

Depending on the state of First Switch 3520 and/or Switch 3530, Tag 2260may cause the return signal to be transmitted using a Return SignalGenerator 3560. Return Signal Generator 3560 is optionally included inTag 2260. Return Signal Generator 3560 is optionally shared by aplurality of Tag 2260 within RF Powered Remote 3500. In someembodiments, Return Signal Generator 3560 includes an instance of RFIDAntenna 2240.

First Switch 3520 and Second Switch 3530 each control Tag 2260, suchthat the return signal is responsive to the states of these, andoptionally further, switches. For example, in some embodiments, if FirstSwitch 3520 is on, then Tag 2260 will include a first data in the returnsignal, and if Second Switch 3530 is on, then Tag 2260 will include asecond (typically different) data in the return signal.

The RF Transmitter 3510 and Controlled Device 3540 are optionallyseparate. For example, the RF transmitter may be included in anautomobile and the controlled device may be a garage door.

In some embodiments, First Switch 3520 is activated by insertion of RFPowered Remote 3500 in part of a locking system.

In some embodiments, First Switch 3520 is coupled to a button configuredfor turning the volume of an electronic device up and/or Second Switch3530 is coupled to a different button configured for changing a channel.

In some embodiments, RF Powered Remote 3500 is configured to unlock acar.

In various embodiments, RF Powered Remote 3500 includes a wirelesskeypad, a wireless computer mouse, a wireless keyboard, a wirelessmicrophone, a key, a telephone, an identity document, or the like.

In some embodiments, RF Powered Remote 3500 is included in ahermetically sealed and/or waterproof housing. Because the RF poweredremote is remotely powered, there is no necessity for a batterycompartment or power plug.

First Switch 3520 and Second Switch 3530 may include a push-buttonswitch, a membrane switch, a sliding switch, a magnetic switch, or anyof the many other switches known in the art to make and break electricalconnections. First Switch 3520 is optionally part of a roller, wheel ordial that makes and breaks an electrical connection as it is turned.First Switch 3520 and Second Switch 3530 are optionally embodiments ofSwitch 2270.

In some embodiments, a single instance of RF Transmitter 3510 isconfigured to power a plurality of Tag 2260. Each of this plurality ofTag 2260 is optionally configured to control a separate electronicdevice or operate different functions in a single electronic device. Theplurality Tags 2260 optionally included in the same RF Powered Remote3500.

In some illustrative embodiments, an instance of RF Transmitter 3510 isdisposed within a vehicle dashboard and a plurality of Tag 2260 aredisposed within a steering wheel of the vehicle or rear view mirror. Oneof the plurality Tag 2260 is configured to control an audio system andanother of the plurality of switchable RFID tags is configured tocontrol a climate system (e.g., air conditioner or heating). In someembodiments, the wireless response signals generated by both of theseTag 2260 is received by a RF receiver and communicated to a circuit thatthen controls the separate electronic devices. In alternativeembodiments, each of the separate electronic devices (e.g., audio systemand climate system) includes a separate RF receiver configured toreceive the response signals.

FIG. 36 illustrates an embodiment of Switchable RFID Device 2200including a Multiswitch Credit Card 3600, according to variousembodiments of the invention. Multiswitch Credit Card 3600 includes twoor more switches, such as Switch 3610, Switch 3611, and optional Switch3612. Switches 3610, 3611 and 3612 are optionally embodiments of Switch3110 and Switch 3120. Multiswitch Credit Card 3600 further includes oneor more instances of Tag 2260, an optional instance of Circuit 2250configured to generate power for used by Tag 2260, and RFID Antenna2240. In embodiments without Circuit 2250, Multiswitch Credit Card 3600includes its own power source (not shown).

Switches 3610-3612 are each configured to make or break an electricalconnection, the state of which can be determined by the resistance ofelectric current flow or the presence of a current or voltage. In someembodiments, Switches 3610-3612 are membrane switches, such as MembraneSwitch 2600. In various embodiments, Multiswitch Credit Card 3600including Switches 3610-3612 is less than 4, 3, 2, 1.5, 1, or 0.5 mmthick. In various embodiments, Switches 3610-3612 are essentially flushwith a front surface of Multiswitch Credit Card 3600.

In some embodiments, Circuit 2250 is configured to generate electricalpower from the RF signal received via RFID Antenna 2240 for use by oneor more instances of Tag 2260. In some embodiments, Circuit 2250 and/orRFID Antenna 2240 are shared by several instances of Tag 2260 withinMultiswitch Credit Card 3600. In some embodiments, Multiswitch CreditCard 3600 is configured not to transmit an RF signal unless at least oneof Switches 3610-3612 is activated. In some embodiments, Switches3610-3612 are configured for entering an access code, such as PIN orpassword. The access code is optionally encoded by an order in which thestates of switches are changed, by a switch combination, and/or by atemporal relationship between changes in switch state, e.g., a temporalpattern.

In some embodiments, Switches 3610-3612 are configured for approving theamount of a financial transaction. In some embodiments, Switches3610-3612 are configured for selecting from among a plurality offinancial accounts. For example, activating Switch 3610 may result in atransaction being debited from a checking account, activating Switch3611 may result in a transaction being applied a first charge account,and activating Switch 3612 may result in a transaction being applied toa second charge account.

In some embodiments, Multiswitch Credit Card 3600 (or other embodimentsof Switchable RFID Device 2200) includes encryption logic configured tooperate in response to the activation of switches. For example, theencryption logic may be configured to use data received via switches asan encryption or decryption key. The encryption logic may be configuredto encrypt data received via switches prior to transmission of thisdata. In some embodiments, Switchable RFID Tag 2200 is configured tomake use of rolling codes for security purposes. In these embodiments,synchronization of the codes is optionally be coordinated by a centralserver configured to communicate with point of sale stations. In someembodiments, a switch is activated using a biometric sensor. Thefeatures described herein with respect to various embodiments ofSwitchable RFID Device 2200, such as Multiswitch Credit Card 3600, maybe included in other types of identity devices.

In various embodiments of the invention, an identity device includesboth one or more electrical contact configured to make physicalelectrical contact with a reader and a RFID tag configured tocommunicate wirelessly with a reader. The physical contact is optionallyused to convey communication that is different from the wirelesscommunication. For example, the physical connection based communicationmay include programming of a circuit within the RFID tag (e.g.,programming account number), while the wireless communication may bemore limited than the physical connection based programming, (e.g., thewireless communication may be limited to reading the programmed accountnumber). In another example, the wireless communication may beconfigured for a limited set of transaction types (e.g., those less than$50, or deposits), while the physical communication is configured foradditional transaction types (e.g., larger value withdrawals). Further,the physical communication may be used for downloading transaction logsor other data stored on the ID card. Transaction logs are optionallystored using power received through RFID Antenna 2240.

In various embodiments, an identity device includes a plurality ofswitches and is configured to engage in a transaction or allow access(to an account, data, or a physical location) responsive to whetherproper members of the plurality of switches are pressed. For example, inone embodiment the ID card includes 10 switches configured for a user toenter a PIN (personal identification number) or password. Only when theproper data is entered using the plurality of switches will the ID cardparticipate in certain functions, such as an electronic payment oropening of a lock. As described further herein, different numbers ofswitches are possible.

In various embodiments, an identity device includes logic configured toprocess data entered using a plurality of switches. This logic may, forexample, prevent the identity device from transmitting an RF signalunless the entered data matches previously stored data, for example, ifan entered PIN matches a stored access code. The logic may be responsiveto the order of switches activated, combinations of switch activation(e.g., which switches are activated at the same time), or which of theplurality of switches are activated. Timing may be achieved through theuse of appropriate RC (resister-capacitor) circuits or a clock signal.

Various embodiments of the invention include a modified version of BasicAccess Control. In these embodiments, the logic is configured to preventthe identity device from transmitting certain data unless the dataentered using switches on the identity device matches an ID number of aRFID reader making a request. The logic may be configured to implementBasic Access Control, such as that used in electronic U.S. passports,but unlike the system used in current passports, the data entered is anID of the reader and the data is entered at the passport (or otheridentity device) rather than at the reader.

In various embodiments, the identity device includes a plurality ofswitches configured for a user to enter data associated with a reader.For example, in some embodiments, the switches are configured to receivean ID number of a point of sale (POS) device. Logic within the identitydevice may then use this ID number to assure that a transaction iscommunicated to the correct POS device. For example, if several vendingdevices are positioned adjacent to each other, the ID number of one ofthe vending devices may be entered in the identity device using theplurality of switches and the ID card may then be enabled to engage in atransaction with that particular vending device but not the other nearbyvending devices.

Passwords, PINs, or the like received by the identity device through theplurality of switches are optionally stored in volatile memory withinthe identity device. When the identity device ceases to receive energythrough an RF signal the data stored in this volatile memory isdiscarded (lost). In some embodiments, this data is stored innon-volatile memory and thus retained between RF transmissions.

In some embodiments, the identity device is configured to store anaccount balance in static memory. Logic within the identity device isoptionally configured such that the account balance can only beincreased using a physical connection, while the account balance can bedebited using a wireless connection. Alternatively, logic within theidentity device is optionally configured such that the account balancecan only be debited using a physical connection.

Some embodiments of the invention include methods of purchasing using aswitchable RFID. The identity device is placed within the reading rangeof a wireless POS device. One of a plurality of switches within identitydevice is activated such that an RFID tag will respond to an RF signalfrom the POS device. The RFID tag responses to the RF signal from thePOS by energizing itself using the RF signal and generating a responseRF signal. The responsive RF signal includes an account number such as achecking or savings account number, a credit card number, identitynumber, or the like, responsive to the switch.

FIGS. 37A-37C illustrate positions of RFID Antenna 2240 withinMultiswitch Credit Card 3600, according to various embodiments of theinvention. As illustrated in FIG. 37A, in some embodiments, RFID Antenna2240 is disposed such that Embossed Lettering or Numbering 3620 isinside of RFID Antenna 2240. In these embodiments, at least part ofSwitch 2270 (or a plurality thereof) is optionally disposed inside ofRFID Antenna 2240. As illustrated in FIGS. 37B and 37C, in someembodiments, RFID Antenna 2240 is disposed primarily in the part of acredit card (e.g., the upper half) that does not include EmbossedLettering or Numbering 3620. In these embodiments, Switch 2270 (or aplurality thereof) may be disposed either inside and/or outside of RFIDAntenna 2240. As illustrated in FIG. 37C, when Switch 2270 is disposedoutside of RFID Antenna, Connections 3615 between Switch 2270 and Tag2260 are optionally routed to avoid Embossed Lettering or Numbering3620. In some embodiments, Spacer 2640 is comprised of a material thatcan be embossed to form raised lettering and numbering (e.g., a name andcredit card number). In these embodiments, the manufacture of EmbossedLettering or Numbering 3620 can be made through Spacer 2640.

In some embodiments, of the invention, one or more instances of Switch2270 are configured to control whether Tag 2260 (and/or associatedmemory) are in a programmable state or a non-programmable state. Forexample, when an instance of Switch 2270 is in a first state writing tonon-volatile memory within Tag 2260 is allowed and when Switch 2270 isin a second state writing to the non-volatile memory is not allowed butreading of the non-volatile memory may be allowed. In some embodiments,Switch 2270 is initially in a state wherein the non-volatile memory canbe written to and the switch is then irreversible changed to a statewherein the non-volatile memory can no longer be written to.

The irreversible change optionally includes breaking of a conductor. Forexample, in some embodiments, an RFID enabled identity device isconfigured such that an instance of Switch 2270 comprises a Conductor3810 coupled to Tag 2260. As illustrated in FIG. 38, when Conductor 3810is unbroken Tag 2260 is in a programmable state, e.g., non-volatilememory within Switchable RFID Tag 2230 can be written to. Afterprogramming this conductor is broken and Tag 2260 is thus irreversiblychanged to a nonprogrammable state. Data already programmed withinSwitchable RFID Tag 2230 may be locked by the breaking of Conductor3850. In one embodiment, Conductor 3810 is broken through themanufacture of Embossed Lettering or Numbering 3620. For example,embossing a credit card number into a credit card can break a conductorand thus lock the contents of non-volatile memory within the creditcard. In alternative embodiments, an identity device includes aplurality of Conductor 3810 and members of this plurality are broken inorder to program function of Tag 2260. Each member of the plurality ofConductor 3810 that is or is not broken represents one bit of logicprogrammed.

Some embodiments of the invention include a switchable RFID tag isconfigured to be remotely switched using an RF signal. In someembodiments, in an OFF state, the RFID tag will not transmit a responsesignal and thus is not remotely detectable using an RF signal. In an ONstate, the RFID tag will transmit a response signal. The RFID tag isswitched between the ON state and the OFF state through receipt of aspecific command or commands, through an RF signal. In alternativeembodiments, the RFID tag includes multiple ON states, optionally incombination with an OFF state.

FIG. 39 illustrates a remotely switchable RFID Tag 3900 including anAntenna 3910, a Power Electronics 3920, and an Integrated Circuit 3930.RFID Tag 3900 is optionally an embodiment of other RFID tags disclosedherein. Likewise, Antenna 3910, Power Electronics 3920 and IntegratedCircuit 3930 are optionally embodiments of other antennae, powerelectronics and integrated circuits disclosed herein. Antenna 3910 isconfigured to send and receive data encoded in an RF signal and alsooptionally configured to receive sufficient energy to power RFID Tag3900.

Power Electronics 3920 are configured to receive energy through Antenna3910 and to power Integrated Circuit 3930 using this received energy.Power Electronics 3920 typically include elements such as a diode,capacitor, transistor, or the like.

Integrated Circuit 3930 includes an Input 3935 configured to receivedata from Antenna 3910 and power from Power Electronics 3920. IntegratedCircuit 3930 further includes an Output 3940 configured to convey datato Antenna 3910 for transmission as an RF signal.

Integrated Circuit 3930 further includes an optional State Memory 3945configured to store the current state of the RFID Tag, e.g., ON or OFF.In various embodiments, State Memory 3945 includes a memory location ina static random access memory, a magnetic memory, or the like. In theseembodiments, the state stored within State Memory 3945 is preservedwithout a constant source of power. In some embodiments, State Memory3945 includes memory configured to store data only while power isavailable. In this embodiment, the ON state is typically temporary andautomatically reverts to the OFF state after power is no longeravailable.

Integrated Circuit 3930 further includes an optional Data Memory 3950configured to store data received through Antenna 3910, and/or to betransmitted using Antenna 3910. The data stored in Data Memory 3950 mayinclude a serial number of RFID Tag 3900, identification data, biometricdata, medical information, license information, or the like.

Integrated Circuit 3930 further includes a Key Memory 3955 configured tostore a key required to change the state of the RFID Tag 3900 from ON toOFF, from OFF to ON, and/or between two ON states. Key Memory 3955 istypically static memory, and optionally read only memory or write-oncememory. In other embodiments, the Key Memory 3955 is memory configuredfor temporary storage of data.

Integrated Circuit 3930 further includes Switch Logic 3960 configured toread the state stored in State Memory 3945 and, responsive to the readstate, either transmit or not transmit an RF signal using Antenna 3910.The transmitted data optionally includes data stored in Data Memory3950. In some embodiments, Switch Logic 3960 is configured to nottransmit an RF signal unless the state read from State Memory 3945indicates that the RFID Tag is in an ON state. In some embodiments,Switch Logic 3960 is configured to read the state stored in State Memory3945 and, responsive to the read state, transmit one of a plurality ofalternative data stored in Data Memory 3950. In some embodiments, SwitchLogic 3960 is configured to read the state stored in State Memory 3945and, responsive to the read state, transmit different amounts of datastored in Data Memory 3950.

In some embodiments, Switch Logic 3960 is configured to receive datathrough Antenna 3910, to read a key from Key Memory 3955, to compare thereceived data with the read key, and to change the state stored in StateMemory 3945 responsive to this comparison. For example, in someembodiments, if the read key matches the received data, the state of theRFID Tag 3900 is set to ON, or changed from one ON state to another ONstate. In some embodiments, Switch Logic 3960 includes logic configuredto decrypt or apply a hash function to the received data prior to thecomparison. The Switch Logic 3960 can include software, hardware, and/orfirmware. In some embodiments, State Memory 3945 is configured to storea rolling code.

In some embodiments, Integrated Circuit 3930 is embodied in severaldevices. For example, the functionality of Integrated Circuit 3930 maybe distributed among several chips. In some embodiments, Key Memory3955, Antenna 3910, Switch Logic 3960 and/or State Memory 3945 areconfigured to be shared by more than one instance of Integrated Circuit3930. For Example, two or more instances of RFID Tag 3900 may beincluded in a single device and these two or more instances of RFID Tag3900 may share a single instance of Key Memory 3955, Antenna 3910,Switch Logic 3960 and/or State Memory 3945.

In some embodiments, RFID Tag 3900 further includes a mechanical switchconfigured to control operation of RFID Tag 3900. This switch mayinclude, for example, Switch 2270 (FIG. 22). For example, in oneembodiment, Switch Logic 3960 is configured for turning ON and OFFoperation of RFID Tag 3900, while Switch 2270 is configured to selectbetween alternative ON states. In an alternative embodiment, Switch 2270is configured for turning ON and OFF operation of RFID Tag 3900 andSwitch Logic 3960 is configured for selecting between alternative ONstates. In some embodiments, proper activation of both Switch 2270 andSwitch Logic 3960 is required to turn RFID Tag 3900 to an ON state.Thus, in order for RFID Tag 3900 to transmit certain information, or totransmit at all, Switch 2270 must be activated by a person and SwitchLogic 3960 must receive a proper key from an RF reader. This provides adual layer of mechanical and key based security. In some embodiments,the switch must be activated and a proper key must be received in orderfor RFID Tag 3900 to transmit certain information. In some embodiments,use of Switch 2270 will activate RFID Tag 3900 in a first ON state anduse of Switch Logic 3960 (through an RF signal) will activate RFID Tag3900 in a second ON state. The second ON state optionally requires useof both Switch 2270 and Switch Logic 3960.

In some embodiments, Integrated Circuit 3930 also includes anindependent Power Supply 3965 such as a battery or capattery.

In some embodiments, the switchable RFID Tag 3900 of FIG. 1 is includedin an identification document such as a driver's license, green card,passport, or the like. In some embodiments, the Switchable RFID Tag 3900is included in a wireless key configured to open a lock, to access data,to gain entry, or the like. In some embodiments, Switchable RFID Tag3900 is included in a cellular telephone or another device configured tocommunicate using WiFi, WiMAX, or similar non-RFID standards.

FIG. 40 is a flowchart illustrating a method of changing a state of RFIDTag 3900. In an optional Receive Energy Step 4010, energy sufficient topower RFID Tag 3900 is received by Antenna 3910. Receive Energy Step4010 is typically similar to Receive Power Step 3410. In a Receive DataStep 4020, data is received by Antenna 3910 in the form of an RF signal.In some embodiments, Receive Data Step 4020 requires that a mechanicalswitch be activated. In a Read Key Step 4030, a key is read from KeyMemory 3955. Optionally, the data received in the Receive Data Step 4020is decrypted or otherwise processed. In a Compare Step 4040, the readkey is compared with the, optionally processed, data received in theReceive Data Step 4020.

In a Change State Step 4050, the state of RFID Tag 3900 is changedresponsive to results of the comparison made in the Compare Step 4040.In some embodiments, if there is a match between the key and the datathen the state of RFID Tag 3900 is set to ON. Setting the state ONoptionally includes writing a value to State Memory 3945. In someembodiments, if there is no match between the key and the data then thestate is set to OFF. In some embodiments, if there is a match betweenthe key and the data, then the state is set to one of two or morepossible ON states. In one of the two or more possible ON states, RFIDTag 3900 can transmit a response RF signal but the data that can beincluded in the response RF signal is restricted relative to another ofthe two or more possible ON states. For example, in one embodiment, inone ON state RFID tag 3900 is configured to include a name in theresponse RF signal, but another ON state RFID tag 3900 is configured toinclude the name and medical information in the response RF signal.

In some embodiments, RFID Tag 3900 is automatically returned to the OFFstate from the ON state, in a Revert Step 4060. For example, in oneembodiment the ON state remains only so long as there is charge on acapacitor. When this charge dissipates or is used, the RFIDautomatically returns to a default OFF state. The automatic switch backto the OFF state can be dependent on when power is no longer receivedfrom an RF signal, on the timing characteristics of an RC(resistor-capacitor) circuit, on Switch 2270, on an RF signal received,and/or the like.

FIG. 41 is a flowchart illustrating a method of operating the RFID Tag3900 illustrated in FIG. 39. In an optional Receive Energy Step 4010energy sufficient to power the RFID is received by Antenna 3910. In aRead State Step 4120 the state of the RFID Tag is read from State Memory2245. In a State? Step 4130 the read state is examined. If the readstate is ON, then in a Send Response Step 4140 an RF response is sentfrom the RFID Tag 3900 using Antenna 3910. If the read state is OFF,then the RFID Tag 3900 is prevented from sending an RF response, in anAbort Response Step 4150. In some embodiments, that include more thantwo states, the read state can be something other than ON or OFF. If theread state is a state other than ON or OFF then a restricted RF responseis sent in a Send Restricted Response Step 4160. The restricted responsetypically includes less or different data than would be included if theread state had been ON.

The steps shown in FIGS. 40 and 41 are optionally performed usingIntegrated Circuit 3930 of FIG. 39.

In some embodiments, first data in a transmission is configured tochange the state of an RFID tag to ON. Further data in the transmissionis then configured to elicit a responding transmission from the RFIDtag. After the transmission is concluded the RFID tag automaticallyreverts to the OFF state. These embodiments optionally includenon-volatile memory for storage of the state.

In some embodiments, data in a transmission is configured to change thestate of an RFID tag to ON. The ON state persists until the RFID tagreceives data configured to change the state of the RFID tag to OFF.

Several embodiments are specifically illustrated and/or describedherein. However, it will be appreciated that modifications andvariations are covered by the above teachings and within the scope ofthe appended claims without departing from the spirit and intended scopethereof. For example, an RFID key device may include more than one RFIDtag and moving of shielding may be used to determine which RFID tag cancommunicate with readers. The RFID tags discussed herein may includeactive or passive contactless circuits configured to transmitidentification information. For example, in some embodiments, Tag 2260is an active rather than a passive RFID tag. Examples discussed hereinin relation to credit cards can equally be applied to other types offinancial card such as a debit card, or prepaid card. For example, insome embodiments, RFID Tag 3900 is configured to change the ON/OFF statein response to a signal from a point of sale system indicating that anitem has been sold. In these embodiments, RFID Tag 3900 is optionallyconfigured to send different signals before and after a sale. A first ofthe different signals may be used to determine that the item has not yetbeen sold, and a second of the different signals may be used todetermine that the item has been sold and/or may be returned. Thefeatures illustrated in FIGS. 39-41 are optionally included inembodiments illustrated by other figures of this application.

The embodiments discussed herein are illustrative of the presentinvention. As these embodiments of the present invention are describedwith reference to illustrations, various modifications or adaptations ofthe methods and or specific structures described may become apparent tothose skilled in the art. All such modifications, adaptations, orvariations that rely upon the teachings of the present invention, andthrough which these teachings have advanced the art, are considered tobe within the spirit and scope of the present invention. Hence, thesedescriptions and drawings should not be considered in a limiting sense,as it is understood that the present invention is in no way limited toonly the embodiments illustrated.

What is claimed is:
 1. An electronic passport comprising: a back cover comprising a passive RFID tag, a capacitor and an antenna, the antenna being coupled to the capacitor, the capacitor configured to store energy to power the RFID tag; a front cover comprising a shield and a surface, the surface including a visual display of personal identifying information, the shield being configured to attenuate a radio frequency signal; and an integrated circuit including non-volatile memory storing the personal identifying information, wherein the RFID tag is configured to transmit at least a portion of the personal identifying information using a radio frequency signal powered by the capacitor.
 2. The passport of claim 1, wherein the shield includes a mesh.
 3. The passport of claim 1, wherein the shield includes multiple layers of metallic fibers.
 4. The passport of claim 1, wherein the shield includes a wire mesh.
 5. The passport of claim 1, wherein the shield includes metallic thread.
 6. The passport of claim 1, wherein the RFID tag is disposed at least 5 mm from a fold separating the back cover from the front cover.
 7. The passport of claim 1, wherein the RFID tag is disposed at least 10 mm from a fold separating the back cover from the front cover.
 8. The passport of claim 1, wherein the personal identifying information includes a photograph.
 9. The passport of claim 1, wherein the RFID tag is configured to transmit at least the portion of the personal identifying information in an encrypted form.
 10. The passport of claim 1, further including a state memory configured to store a state of the RFID tag, the state memory including an integrated circuit.
 11. The passport of claim 10, wherein the integrated circuit further includes a state logic configured to modify a state of the RFID tag.
 12. The passport of claim 10, wherein the state memory is configured to store two alternative ON states, but not an OFF state.
 13. The passport of claim 10, wherein the state memory is configured to store at least an ON state and OFF state.
 14. The passport of claim 10, wherein the state memory is configured to store two alternative ON states.
 15. The passport of claim 1, wherein the back cover includes at least part of the shield.
 16. The passport of claim 1, wherein the shield is configured to attenuate the radio frequency signal by at least 15 dB. 