×

Security techniques in the RFID framework

  • US 7,944,355 B2
  • Filed: 05/31/2005
  • Issued: 05/17/2011
  • Est. Priority Date: 09/01/2004
  • Status: Active Grant
First Claim
Patent Images

1. A system that facilitates employing security to a Radio Frequency Identification (RFID) network, comprising:

  • an RFID device that is associated with at least one RFID process;

    a processor that executes the following computer executable components stored on a computer readable medium;

    an interface that receives a role-based authorization model associated with an operating system, wherein the role-based authorization model defines a security hierarchy;

    a security component that applies the role-based authorization model to an RFID network to define security permissions for the RFID network, wherein the security component comprises a first security layer that regulates processing of the RFID process and a second security layer that regulates use of the RFID device such that the RFID process and the RFID device are protected from threats and breaches, wherein the security component is configured to analyze possible threats and/or breaches to the security of the RFID network that could be introduced via the RFID process or the RFID device, wherein the possible threats and/or breaches relate to at least one of manipulation of the at least one associated RFID process and the utilization of the RFID device within the RFID network, the possible threats and/or breaches being determined before any actual threat or breach has occurred; and

    a threat component that utilizes a track model analysis to dynamically determine RFID network vulnerabilities and threat conditions that the security component is configured to prevent, wherein the threat conditions are determined before the occurrence of an actual intrusion, and wherein the track model analysis provides a list of one or more vulnerabilities including the resources, entry points, trust levels, data flow diagrams, and determined ways of compromising the RFID network.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×