RFID security system and method, including security stamp
First Claim
1. A radio-frequency identification (RFID) tag security system, comprising:
- a plurality of security servers each coupled between respective RFID tag reader devices and respective back-end systems, wherein a back-end system comprises at least one database configured to receive data output by a security server; and
at least one database coupled to each security server, wherein the database is configurable to store a plurality of policies, and wherein each security server is configurable to analyze tag data output by a respective tag reader device according to one or more of the policies, wherein analyzing comprises determining whether the tag data has been tampered with, and if the tag data has not been tampered with, generating a security stamp uniquely associated with the tag data.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of an RFID security system and method are described herein. Embodiments include an RFID security server or appliance and RFID security software. In an embodiment, the RFID security server is placed between an RFID reader and an enterprise back-end. Thus the system operates at the point where the RFID data stream leaves the RF interface and enters a physical transmission medium before any other active components on the network (such as databases, middleware, routers). The RFID security server analyzes RFID tag data (including meta-data) received from the reader in-band and detects malware and errors in the data. RFID tag data containing malware or errors is blocked from entering the enterprise back-end. In an embodiment, analyzing RFID tag data includes generating a security stamp that is uniquely associated with the tag data. The security stamp is stored on the RFID tag, or alternatively, stored separately for later comparison in order to detect tampering.
-
Citations
37 Claims
-
1. A radio-frequency identification (RFID) tag security system, comprising:
-
a plurality of security servers each coupled between respective RFID tag reader devices and respective back-end systems, wherein a back-end system comprises at least one database configured to receive data output by a security server; and at least one database coupled to each security server, wherein the database is configurable to store a plurality of policies, and wherein each security server is configurable to analyze tag data output by a respective tag reader device according to one or more of the policies, wherein analyzing comprises determining whether the tag data has been tampered with, and if the tag data has not been tampered with, generating a security stamp uniquely associated with the tag data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A radio-frequency identification (RFID) tag security method, comprising:
-
receiving RFID tag data from an RFID tag reader device; analyzing the tag data, comprising determining whether the tag data has been tampered with; if the tag data has not been tampered with, generating a security stamp uniquely associated with the tag data, and transmitting the tag data to a destination system; and if the tag data has been tampered with, blocking the tag data from being transmitted to the destination system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer-readable medium having stored thereon instructions, that when executed in a system cause a radio-frequency identification (RFID) tag security method to be performed, the method comprising:
-
receiving RFID tag data from an RFID tag reader device; analyzing the tag data, comprising determining whether the tag data has been tampered with; if the tag data has not been tampered with, generating a security stamp uniquely associated with the tag data, and transmitting the tag data to a destination system; and if the tag data has been tampered with, blocking the tag data from being transmitted to the destination system. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification