RFID Intrusion Protection System and Methods
First Claim
Patent Images
1. A method for monitoring radio frequency identification (RFID) networks for intrusion and policy violations with RFID sensors, the method comprising the steps of:
- a) setting configuration and policy information;
b) scanning for RFID transmissions;
c) logging statistics to a data store over a set time interval;
d) determining the existence of intrusions or policy violations;
e) generating an alarm responsive to any of intrusions and policy violations; and
f) repeating steps b) through, d).
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for RFID intrusion protection are defined. The system uses RFID sensors coupled with one or more servers to detect unauthorized scanning or programming of RFID tags. The system has active defense mechanisms to block unauthorized communications between a rogue RFID reader and one or more tags. Special IPS tags implement active defenses and log activity for tags that are not within the protected perimeter or in transit.
176 Citations
41 Claims
-
1. A method for monitoring radio frequency identification (RFID) networks for intrusion and policy violations with RFID sensors, the method comprising the steps of:
-
a) setting configuration and policy information; b) scanning for RFID transmissions; c) logging statistics to a data store over a set time interval; d) determining the existence of intrusions or policy violations; e) generating an alarm responsive to any of intrusions and policy violations; and f) repeating steps b) through, d). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A radio frequency identification (RFID) sensor, the sensor comprising:
-
an antenna configured, to receive and transmit wireless transmissions of signals in an adjustable range of frequencies; memory capable of storing received data and program data; a system processor comprising one or more processing elements, wherein the system processor is in communication with the antenna and the memory and wherein the system processor'"'"'s one or more processing elements are programmed or adapted to; i) extract RFID data into one or more logical, units from signals received by the antenna; ii) inspect each extracted logical unit; iii) store information derived from the inspection of each logical unit in memory; and iv) communicate the information to a server. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A server-based method for monitoring radio frequency identification (RFID) networks for intrusion and policy violations, the method comprising the steps of:
-
a) obtaining configuration and policy information; b) establishing communication with a plurality of RFID sensors; e) receiving events from the plurality of RFID sensors; d) correlating events from the plurality of RFID sensors; e) generating an alarm responsive to the correlating step; and f) repeating steps c) through e) - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A radio frequency identification (RFID) intrusion protection system, the system comprising:
-
a local intrusion protection server connected to a network; a data store connected to the server; wherein, the server is configured to; establish communications with a plurality of RFID sensors connected to the network; obtain configuration and policy from the network and RFID infrastructure connected to the network; receive events and statistics from the plurality of RFID sensors; store events and statistics in the data store; and correlate events to identify RFID readers, policy violations, and intrusions. - View Dependent Claims (31)
-
-
32. A tag-based method of intrusion protection for radio frequency identification (RFID) networks, the method comprising the steps of:
-
initializing an intrusion protection RFID tag; and activating a defense responsive to the RFID signature, the defense comprising one of a jamming signal and a collision signal. - View Dependent Claims (33, 34, 35, 36, 37, 38)
-
-
39. An intrusion protection, radio frequency Identification (RFID) tag configured to protect RFID tags located substantially in the same vicinity as the intrusion protection RFID tag, the tag comprises:
-
an antenna configured to transmit and receive RFID communications at a set frequency, the frequency responsive to the RFID protocol; a processor coupled to the antenna, the processor configured to; detect RFID signatures; and transmit a jamming or a collision signal responsive to an RFID signature. - View Dependent Claims (40, 41)
-
Specification