Security techniques in the RFID framework
First Claim
Patent Images
1. A system that facilitates employing security to an RFID network, comprising:
- an interface that receives role-based authorization data related to an operating system; and
a security component that enhances security relating to at least one of a manipulation of a process and a utilization of a device within the RFID network based at least in part upon role-based authorization data.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject invention provides a system and/or a method that facilitates employing a security technique to an RFID network. An interface can receive role-based authorization data related to an operating system. A security component can enhance security to at least one of a manipulation of a process and a utilization of a device within the RFID network based at least in part upon role-based authorization data.
-
Citations
20 Claims
-
1. A system that facilitates employing security to an RFID network, comprising:
-
an interface that receives role-based authorization data related to an operating system; and
a security component that enhances security relating to at least one of a manipulation of a process and a utilization of a device within the RFID network based at least in part upon role-based authorization data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method that facilitates employing security to an RFID network, comprising:
-
creating an RFID administrator and an RFID user group;
incorporating at least one of a user and a group associated with an authorization model within an operating system; and
enhancing security in the RFID network based at least in part upon the authorization model. - View Dependent Claims (18, 19)
-
-
20. A computer-implemented system that facilitates employing security to an RFID network, comprising:
-
means for receiving role-based authorization data related to an operating system; and
means for enhancing security relating to at least one of a manipulation of a process and a utilization of a device within the RFID network based at least in part upon role-based authorization data.
-
Specification