Apparatus and method for preventing wireless interrogation of phones
First Claim
Patent Images
1. A phone comprising:
- a decoy circuit configured to detect wireless interrogation signals transmitted to the phone and to prevent one or more interrogation devices from interrogating an authentic circuit in the phone by deceiving the one or more interrogation devices into believing the decoy circuit is the authentic circuit.
0 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method is provided to prevent contactless portable electronic consumer devices such as an RF identification device (RFID), tokens, mini-cards, key fobs, cellular phones, smart card, etc. from being wirelessly interrogated. In one embodiment, a decoy circuit capable of detecting wireless interrogation signals transmitted to a contactless portable consumer device is used to prevent one or more interrogation devices from interrogating an authentic circuit in the contactless portable consumer device.
23 Citations
19 Claims
-
1. A phone comprising:
a decoy circuit configured to detect wireless interrogation signals transmitted to the phone and to prevent one or more interrogation devices from interrogating an authentic circuit in the phone by deceiving the one or more interrogation devices into believing the decoy circuit is the authentic circuit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method for preventing interrogation of a phone comprising:
-
detecting a wireless interrogation signal from an interrogation device using a decoy circuit; and responding to the wireless interrogation signal with the decoy circuit, wherein the response from the decoy circuit is more rapid than a response from a corresponding authentic circuit in the phone, and wherein the response from the decoy circuit is configured to deceive the interrogation device into believing the decoy circuit is the authentic circuit. - View Dependent Claims (11, 12, 13)
-
-
14. A system comprising:
-
a phone comprising authentic data; and a decoy device comprising decoy data, wherein the decoy device is adapted to provide the decoy data to an interrogation device, the decoy data being configured to deceive the interrogation device into believing the decoy data is the authentic data. - View Dependent Claims (15, 16)
-
-
17. A method for preventing interrogation of a phone having authentic data comprising:
-
placing the phone adjacent to a decoy device; receiving an interrogation signal at the decoy device from an interrogation device; and sending decoy data from the decoy device to the interrogation device, wherein the decoy data is configured to deceive the interrogation device into believing the decoy data is the authentic data. - View Dependent Claims (18, 19)
-
Specification