Location based security data provisioning and management via RFID tags
First Claim
1. A method for provisioning security data based on location, comprising:
- (a) writing a set of security data to a radio frequency identification (RFID) tag located in a container within a secure location;
(b) reading the set of security data from the RFID tag using an RFID reader placed at least partially within the container; and
(c) using at least a portion of the security data to establish a secure application.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for securely provisioning and managing security data based on location are provided. In an installation having one or more secure locations, a physically secure container having a security data tag is provided in a secure location. Security data required to establish a secure application (e.g., secure communications with a network element or with one or more peripheral devices in the secure location), such as a digital certificate and/or cryptographic keys, is written into the security data tag. Each secure location within an installation may have different security needs and therefore the security data tags in different locations may store different sets of security data. When a reader or device requiring access to an application enters a secure location, the security data is read from the tag and used to establish a secure application.
32 Citations
20 Claims
-
1. A method for provisioning security data based on location, comprising:
-
(a) writing a set of security data to a radio frequency identification (RFID) tag located in a container within a secure location; (b) reading the set of security data from the RFID tag using an RFID reader placed at least partially within the container; and (c) using at least a portion of the security data to establish a secure application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for provisioning security data in an installation having a plurality of secure locations, comprising:
-
a plurality of security data tags, wherein each security data tag is located within a container in one of the plurality of secure locations and wherein each security data tag includes a set of security data for establishing a secure application; and a plurality of RFID readers, one per secure location, wherein each of the plurality of readers is configured to read the security data from the security data tags. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification