Detecting an attempted theft of information stored in an RFID-enabled card
First Claim
1. A method of detecting an attempted theft of information stored in a Radio Frequency Identification (‘
- RFID’
)-enabled card, the method comprising,by computer program instructions executed by a computer processor;
receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information;
determining, by the theft detection module, that the RFID-enabled card information is mock card information corresponding to an RFID-enabled card security enclosure that is not valid RFID-enabled card information for an RFID-enabled card contained inside an RFID shield of the RFID-enabled card security enclosure, wherein the mock card information is modified at regular intervals to include updated information that is based on a timestamp, wherein the mock card information is provided to an RFID reader by an RFID tag disposed between an exterior of the security enclosure and the RFID shield responsive to an RFID request directed at the security enclosure, wherein the mock card information provided to the RFID reader responsive to the RFID request directed at the security enclosure includes updated timestamp information corresponding to a time period of an attempted theft of the RFID-enabled card information; and
responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions.
1 Assignment
0 Petitions
Accused Products
Abstract
Detecting an attempted theft of information stored in an RFID-enabled card, including: receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information; determining, by the theft detection module, that the RFID-enabled card information is mock card information, wherein mock card information is provided to an RFID reader by an RFID tag exterior to an RFID shield of an RFID-enabled card security enclosure responsive to an RFID request directed at the security enclosure; and responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions.
7 Citations
18 Claims
-
1. A method of detecting an attempted theft of information stored in a Radio Frequency Identification (‘
- RFID’
)-enabled card, the method comprising,by computer program instructions executed by a computer processor; receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information; determining, by the theft detection module, that the RFID-enabled card information is mock card information corresponding to an RFID-enabled card security enclosure that is not valid RFID-enabled card information for an RFID-enabled card contained inside an RFID shield of the RFID-enabled card security enclosure, wherein the mock card information is modified at regular intervals to include updated information that is based on a timestamp, wherein the mock card information is provided to an RFID reader by an RFID tag disposed between an exterior of the security enclosure and the RFID shield responsive to an RFID request directed at the security enclosure, wherein the mock card information provided to the RFID reader responsive to the RFID request directed at the security enclosure includes updated timestamp information corresponding to a time period of an attempted theft of the RFID-enabled card information; and responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
- RFID’
-
13. An apparatus for detecting an attempted theft of information stored in a Radio Frequency Identification (‘
- RFID’
)-enabled card, the apparatus comprising a computer processor, a computer memory operatively coupled to the computer processor, the computer memory having disposed within it computer program instructions that, when executed by the computer processor, cause the apparatus to carry out the steps of;receiving, by a theft detection module, a transaction request, the transaction request including RFID-enabled card information; determining, by the theft detection module, that the RFID-enabled card information is mock card information corresponding to an RFID-enabled card security enclosure that is not valid RFID-enabled card information for an RFID-enabled card contained inside an RFID shield of the RFID-enabled card security enclosure, wherein the mock card information is modified at regular intervals to include updated information that is based on a timestamp, wherein the mock card information is provided to an RFID reader by an RFID tag disposed between an exterior of the security enclosure and the RFID shield responsive to an RFID request directed at the security enclosure, wherein the mock card information provided to the RFID reader responsive to the RFID request directed at the security enclosure includes updated timestamp information corresponding to a time period of an attempted theft of the RFID-enabled card information; and responsive to determining that the RFID-enabled card information is mock card information, initiating, by the theft detection module, one or more security actions. - View Dependent Claims (14, 15, 16, 17, 18)
- RFID’
Specification