Privacy Protection Cleanup Shop Station and Devices
First Claim
1. A method of destroying RFID tags attached to purchased products to protect consumer privacy, comprising:
- a) providing a RFID tag interrogator which is able to detect the presence of RFID tags attached to purchased goods carried by a customer, said RFID tag interrogator being associated to a computer, said RFID tag interrogator detecting RFID tags working in different bands of frequency;
b) providing a computer having storage and processing means, said computer receiving, storing and processing information on RFID tags detected by said RFID tag interrogator, said computer being connected to an external network;
c) providing an internal database containing RFID identification data, said database being stored on said computer;
d) connecting to external databases to collect RFID identification data missing on said internal database;
e) integrating data collected from said external databases into said internal database;
f) providing a display for showing the presence of RFID tags on said purchased goods, said display being connected to said computer;
g) providing an input device for said customer to authorize and direct the destruction process of RFID tags, said input device being connected to said computer;
h) showing warnings about potential damages to electronics or another RFID products surrounding the location in which said destruction process is performed;
i) executing anti-destruction instructions in respect of sensitive RFID tags, said anti-destruction instructions being executed according to different security levels;
j) providing a device which is capable to destroy RFID tags by emitting electromagnetic pulses or any other particle emission, said device receiving instructions from said computer and acting only upon authorization of the customer;
k) showing the results of said destruction process on said display, said results consisting of the total number of destroyed RFID tags;
l) allowing to repeat the process after an unsuccessful attempt to destroy the RFID tags;
whereby said method is to be offered at the way out of shopping malls, shopping centers or any other shopping facilities as well as in car wash centers by implementing means for performing steps (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) of the method into a passage, doorway, channels or any other similar entity separating to locations.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and a method for disabling RFID tags that send information to a receiver by using a device capable of generate a strong electromagnetic field or any other targeted radiation of energy or particles. The system comprises a RFID tag interrogator, a display, an input device, and an EMP emitting device, all connected to a computer. The system may be built into a doorway, passage, channel or any other similar pass through or way through. It can be also built as a handheld device or into a belt running apparatus. The method is comprised of offering these systems in shopping malls, shopping centers or any other shopping facilities as well as in car wash centers.
17 Citations
19 Claims
-
1. A method of destroying RFID tags attached to purchased products to protect consumer privacy, comprising:
-
a) providing a RFID tag interrogator which is able to detect the presence of RFID tags attached to purchased goods carried by a customer, said RFID tag interrogator being associated to a computer, said RFID tag interrogator detecting RFID tags working in different bands of frequency; b) providing a computer having storage and processing means, said computer receiving, storing and processing information on RFID tags detected by said RFID tag interrogator, said computer being connected to an external network; c) providing an internal database containing RFID identification data, said database being stored on said computer; d) connecting to external databases to collect RFID identification data missing on said internal database; e) integrating data collected from said external databases into said internal database; f) providing a display for showing the presence of RFID tags on said purchased goods, said display being connected to said computer; g) providing an input device for said customer to authorize and direct the destruction process of RFID tags, said input device being connected to said computer; h) showing warnings about potential damages to electronics or another RFID products surrounding the location in which said destruction process is performed; i) executing anti-destruction instructions in respect of sensitive RFID tags, said anti-destruction instructions being executed according to different security levels; j) providing a device which is capable to destroy RFID tags by emitting electromagnetic pulses or any other particle emission, said device receiving instructions from said computer and acting only upon authorization of the customer; k) showing the results of said destruction process on said display, said results consisting of the total number of destroyed RFID tags; l) allowing to repeat the process after an unsuccessful attempt to destroy the RFID tags; whereby said method is to be offered at the way out of shopping malls, shopping centers or any other shopping facilities as well as in car wash centers by implementing means for performing steps (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) of the method into a passage, doorway, channels or any other similar entity separating to locations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for disabling radio frequency identification (RFID) tags, said system comprising:
-
a) a RFID tag interrogator that detects RFID tags attached to purchased goods carried by a customer, said RFID tag interrogator being associated to a computer; b) a computer having storage means to store the different bands of frequency in which said RFID tags operate; c) processing means stored on said computer, said processing means directing the system for performing the destruction process of RFID tags; d) a database containing RFID identification data, said database being stored on said computer; e) a device that emits electromagnetic pulses or any other particle emission to destroy said RFID tags, said device acting in conjunction with said computer; f) an input device that allows the customer to direct the destruction process, said input device being connected and controlled by said computer and; g) a display that shows the instructions for performing said destruction process, said display being connected and controlled by said computer. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification