MALWARE SCANNER FOR RFID TAGS
First Claim
Patent Images
1. A method for detecting and isolating malware stored in an RFID tag comprising:
- reading data stored on the tag;
scanning the data read from the tag to detect possible malware in the data; and
if said possible malware is detected, then isolating the data by storing the data in a quarantine file in tag reader memory.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for detecting and isolating malware stored in an RFID tag. Data stored on the tag is read and scanned to detect malware in the data. if any suspected malware is detected, then the data is stored in a quarantine file in reader memory. The data isolated in the quarantine file may be flagged with a corrupted-tag indicator to indicate the presence of suspected said malware, or a corrupted-tag indicator may be stored in the quarantine file in lieu of the data read from the tag.
99 Citations
20 Claims
-
1. A method for detecting and isolating malware stored in an RFID tag comprising:
-
reading data stored on the tag;
scanning the data read from the tag to detect possible malware in the data; and
if said possible malware is detected, then isolating the data by storing the data in a quarantine file in tag reader memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for detecting and isolating malware stored in an RFID tag comprising:
-
reading data stored on the tag;
storing the data in a temporary file;
scanning the data in the temporary file to detect malware in the data; and
if said malware is detected, then storing the data, in a quarantine file in reader memory, together with an indicator to indicate the presence of suspected said malware;
wherein the step of scanning the data includes scanning the data for possible malware including executable code and rule-based data defined by a set of rules. - View Dependent Claims (10, 11)
-
-
12. A method for detecting malware stored in an RFID tag comprising:
-
reading data stored on the tag; and
scanning the data read from the tag to detect malware in the data;
if said malware is detected, then storing an indicator in a file in tag reader memory, wherein the indicator indicates the presence of suspected said malware;
wherein the step of scanning the data includes;
scanning the data for possible malware including executable code, data format, range, and length mismatches, and rule-based data defined by a set of rules; and
if the data thus scanned includes said possible malware, then isolating the data in a quarantine file in tag reader memory;
wherein the set of rules defines syntax constructions representative of certain computer languages. - View Dependent Claims (13, 14)
-
-
15. An RFID reader, including memory for storing data, for detecting malware stored in an RFID tag comprising:
-
a scanner for detecting malware;
a set of rules, used by the scanner, for detecting malware;
a quarantine file, for isolating suspected malware; and
a temporary file;
wherein;
data stored on the tag is read into the temporary file by the reader and scanned by the scanner for the presence of possible malware;
if said possible malware is detected, then an indicator, indicating the presence of suspected said malware, is stored in the quarantine file in RFID reader memory;
wherein the process of scanning the data includes scanning the data for said possible malware including executable code, data format/range/length mismatches, and rule-based data defined by a set of rules indicating predefined operators and syntax constructions representative of certain computer languages. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification