Identifying a computer device
First Claim
Patent Images
1. A system comprising:
- RFID readers;
an RFID controller operably connected to the RFID readers; and
an enterprise application environment running application components that interpret inbound RFID data from the RFID controller.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer architecture for enterprise device applications that provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. The unique identity is independent of a network-address. Security information and a network address may be associated with the unique identity.
-
Citations
21 Claims
-
1. A system comprising:
-
RFID readers;
an RFID controller operably connected to the RFID readers; and
an enterprise application environment running application components that interpret inbound RFID data from the RFID controller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
- 11. The system of 1, further comprising additional RFID controllers interacting with the enterprise application environment.
-
13. A system comprising:
-
RFID readers;
an RFID controller operably connected to the RFID readers; and
an enterprise application environment running multiple applications that use RFID data sent from the RFID controller. - View Dependent Claims (14, 15, 16, 17, 20, 21)
-
-
18. The system of 13, further comprising additional RFID controllers interacting with the enterprise application environment.
-
19. The system of 13, further comprising at least one application component at the enterprise application environment to manage the RFID readers.
Specification