RFID security system and method
First Claim
1. A radio-frequency identification (RFID) tag security apparatus, comprising:
- a security server coupled between an RFID tag reader device and a back-end system, wherein the back-end system comprises at least one database configured to receive data output by the security server; and
at least one database coupled to the security server, wherein the database is configurable to store a plurality of policies, and wherein the security server is configurable to receive data output by the tag reader device and to screen the data for exceptions according to the policies, including at least one of malware and errors, and to handle exceptions according to the policies.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of an RFID security system and method are described herein. Embodiments include an RFID security server or appliance and RFID security software. In an embodiment, the RFID security server is placed between an RFID reader and an enterprise back-end. Thus the system operates at the point where the RFID data stream leaves the RF interface and enters a physical transmission medium before any other active components on the network (such as databases, middleware, routers). The RFID security server analyzes RFID tag data (including meta-data) received from the reader in-band and detects malware and errors in the data. RFID tag data containing malware or errors is blocked from entering the enterprise back-end. Unwanted RFID tags are also identified and filtered as noise.
-
Citations
29 Claims
-
1. A radio-frequency identification (RFID) tag security apparatus, comprising:
-
a security server coupled between an RFID tag reader device and a back-end system, wherein the back-end system comprises at least one database configured to receive data output by the security server; and at least one database coupled to the security server, wherein the database is configurable to store a plurality of policies, and wherein the security server is configurable to receive data output by the tag reader device and to screen the data for exceptions according to the policies, including at least one of malware and errors, and to handle exceptions according to the policies. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A radio-frequency identification (RFID) tag security method, the method comprising:
-
receiving RFID tag data from an RFID tag reader device; performing exception detection on the RFID data, wherein exceptions comprise one or more of malware and errors; if no exceptions are detected, transmitting the RFID tag data to a destination system, wherein the destination system comprises an enterprise back-end system; and if an exception is detected, handling the exception according to predetermined policies, including preventing the RFID tag data from being transmitted to the destination system. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable medium having stored thereon instructions, that when executed in a system cause a radio-frequency identification (RFID) tag security method to be performed, the method comprising:
-
receiving RFID tag data from an RFID tag reader device; performing exception detection on the RFID data; if no exceptions are detected, transmitting the RFID tag data to a destination system, wherein the destination system comprises an enterprise back-end system; and if an exception is detected, handling the exception according to predetermined policies, including preventing the RFID tag data from being transmitted to the destination system. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification