Security techniques in the RFID framework
First Claim
Patent Images
1. A system that facilitates employing security to a Radio Frequency Identification (RFID) network, comprising:
- an RFID device that is associated with at least one RFID process;
a processor that executes the following computer executable components stored on a computer readable medium;
an interface that receives a role-based authorization model associated with an operating system, wherein the role-based authorization model defines a security hierarchy;
a security component that applies the role-based authorization model to an RFID network to define security permissions for the RFID network, wherein the security component comprises a first security layer that regulates processing of the RFID process and a second security layer that regulates use of the RFID device such that the RFID process and the RFID device are protected from threats and breaches, wherein the security component is configured to analyze possible threats and/or breaches to the security of the RFID network that could be introduced via the RFID process or the RFID device, wherein the possible threats and/or breaches relate to at least one of manipulation of the at least one associated RFID process and the utilization of the RFID device within the RFID network, the possible threats and/or breaches being determined before any actual threat or breach has occurred; and
a threat component that utilizes a track model analysis to dynamically determine RFID network vulnerabilities and threat conditions that the security component is configured to prevent, wherein the threat conditions are determined before the occurrence of an actual intrusion, and wherein the track model analysis provides a list of one or more vulnerabilities including the resources, entry points, trust levels, data flow diagrams, and determined ways of compromising the RFID network.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject invention provides a system and/or a method that facilitates employing a security technique to an RFID network. An interface can receive role-based authorization data related to an operating system. A security component can enhance security to at least one of a manipulation of a process and a utilization of a device within the RFID network based at least in part upon role-based authorization data.
115 Citations
20 Claims
-
1. A system that facilitates employing security to a Radio Frequency Identification (RFID) network, comprising:
-
an RFID device that is associated with at least one RFID process; a processor that executes the following computer executable components stored on a computer readable medium; an interface that receives a role-based authorization model associated with an operating system, wherein the role-based authorization model defines a security hierarchy; a security component that applies the role-based authorization model to an RFID network to define security permissions for the RFID network, wherein the security component comprises a first security layer that regulates processing of the RFID process and a second security layer that regulates use of the RFID device such that the RFID process and the RFID device are protected from threats and breaches, wherein the security component is configured to analyze possible threats and/or breaches to the security of the RFID network that could be introduced via the RFID process or the RFID device, wherein the possible threats and/or breaches relate to at least one of manipulation of the at least one associated RFID process and the utilization of the RFID device within the RFID network, the possible threats and/or breaches being determined before any actual threat or breach has occurred; and a threat component that utilizes a track model analysis to dynamically determine RFID network vulnerabilities and threat conditions that the security component is configured to prevent, wherein the threat conditions are determined before the occurrence of an actual intrusion, and wherein the track model analysis provides a list of one or more vulnerabilities including the resources, entry points, trust levels, data flow diagrams, and determined ways of compromising the RFID network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 18, 20)
-
-
15. A method that facilitates employing security to a Radio Frequency Identification RFID network, comprising:
employing a processor to execute computer readable instructions stored in a computer readable medium to perform the following acts; creating an RFID administrator and an RFID user group; incorporating existing roles associated with an authorization model within an operating system into the RFID user group; invoking a security component in the RFID network based upon the authorization model, wherein the security component comprises a first security layer that regulates processing of the RFID process and a second security layer that regulates use of the RFID device such that the RFID process and the RFID device are protected from threats and breaches, wherein the security component is configured to analyze possible threats and/or breaches to the security of the RFID network that could be introduced via the RFID process or the RFID device, wherein the possible threats and/or breaches relate to at least one of manipulation of the at least one associated RFID process and the utilization of the RFID device within the RFID network, the possible threats and/or breaches being determined before any actual threat or breach has occurred; and invoking a threat component that utilizes a track model analysis to dynamically determine RFID network vulnerabilities and threat conditions that the security component is configured to prevent, wherein the threat conditions are determined before the occurrence of an actual intrusion, and wherein the track model analysis provides a list of one or more vulnerabilities including the resources, entry points, trust levels, data flow diagrams, and determined ways of compromising the RFID network. - View Dependent Claims (16, 19)
-
17. A computer-implemented system that facilitates employing security to a Radio Frequency Identification (RFID) network, comprising:
-
an RFID device that is associated with at least one RFID process; means for receiving a hierarchy of security related to an operating system; means for incorporating the hierarchy of security into an RFID network, wherein a security component comprises a first security layer that regulates processing of the RFID process and a second security layer that regulates use of the RFID device such that the RFID process and the RFID device are protected from threats and breaches, wherein the security component is configured to analyze possible threats and/or breaches to the security of the RFID network that could be introduced via the RFID process or the RFID device, wherein the possible threats and/or breaches relate to at least one of manipulation of the at least one associated RFID process and the utilization of the RFID device within the RFID network, the possible threats and/or breaches being determined before any actual threat or breach has occurred; and means for utilizing a track model analysis to dynamically determine RFID network vulnerabilities and threat conditions that the security component is configured to prevent, wherein the threat conditions are determined before the occurrence of an actual intrusion, and wherein the track model analysis provides a list of one or more vulnerabilities including the resources, entry points, trust levels, data flow diagrams, and determined ways of compromising the RFID network.
-
Specification