DETECTING AN ATTEMPTED THEFT OF INFORMATION STORED IN AN RFID-ENABLED CARD
First Claim
1. A method of detecting an attempted theft of information stored in a Radio Frequency Identification(‘
- RFID’
)-enabled card, the method comprising;
receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information;
determining, by the theft detection module, that the RFID-enabled card information is mock card information, wherein mock card information is provided to an RFID reader by an RFID tag exterior to an RFID shield of an RFID-enabled card security enclosure responsive to an RFID request directed at the security enclosure; and
responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions.
1 Assignment
0 Petitions
Accused Products
Abstract
Detecting an attempted theft of information stored in an RFID-enabled card, including: receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information; determining, by the theft detection module, that the RFID-enabled card information is mock card information, wherein mock card information is provided to an RFID reader by an RFID tag exterior to an RFID shield of an RFID-enabled card security enclosure responsive to an RFID request directed at the security enclosure; and responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions.
-
Citations
20 Claims
-
1. A method of detecting an attempted theft of information stored in a Radio Frequency Identification(‘
- RFID’
)-enabled card, the method comprising;receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information; determining, by the theft detection module, that the RFID-enabled card information is mock card information, wherein mock card information is provided to an RFID reader by an RFID tag exterior to an RFID shield of an RFID-enabled card security enclosure responsive to an RFID request directed at the security enclosure; and responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
- RFID’
-
13. An apparatus for detecting an attempted theft of information stored in a Radio Frequency Identification(‘
- RFID’
)-enabled card, the apparatus comprising a computer processor, a computer memory operatively coupled to the computer processor, the computer memory having disposed within it computer program instructions that, when executed by the computer processor, cause the apparatus to carry out the steps of;receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information; determining, by the theft detection module, that the RFID-enabled card information is mock card information, wherein mock card information is provided to an RFID reader by an RFID tag exterior to an RFID shield of an RFID-enabled card security enclosure responsive to an RFID request directed at the security enclosure; and responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions. - View Dependent Claims (14, 15, 16, 17, 18)
- RFID’
-
19. A security enclosure for RFID-enabled cards, the security enclosure comprising:
-
an RFID (‘
Radio Frequency Identification’
) shield, the RFID shield configured to block RFID transmissions from an exterior of the RFID shield into an interior space formed by the RFID shield, the interior space configured to store one or more RFID-enabled cards; andan RFID tag located exterior to the RFID shield, the RFID tag including mock card information. - View Dependent Claims (20)
-
Specification