Identifying a computer device
First Claim
Patent Images
1. A system comprising:
- RFID readers;
an RFID controller operably connected to the RFID readers;
an RFID secure gateway operably connected to the RFID controller; and
an enterprise application environment running application components that interpret inbound RFID data from the RFID controller;
wherein the application components apply application specified data validation to inbound RFID data from the RFID controller;
wherein the RFID secure gateway comprises an identity-based communication layer that provides a communication channel between the RFID secure gateway and the application components; and
wherein the identity-based communication layer authenticates and secures the communication channel between the RFID secure gateway and the application components.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer architecture for enterprise device applications that provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. The unique identity is independent of a network-address. Security information and a network address may be associated with the unique identity.
106 Citations
20 Claims
-
1. A system comprising:
-
RFID readers; an RFID controller operably connected to the RFID readers; an RFID secure gateway operably connected to the RFID controller; and an enterprise application environment running application components that interpret inbound RFID data from the RFID controller; wherein the application components apply application specified data validation to inbound RFID data from the RFID controller; wherein the RFID secure gateway comprises an identity-based communication layer that provides a communication channel between the RFID secure gateway and the application components; and wherein the identity-based communication layer authenticates and secures the communication channel between the RFID secure gateway and the application components. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
RFID readers; an RFID controller operably connected to the RFID readers; an RFID secure gateway operably connected to the RFID controller; and an enterprise application environment running multiple applications that use RFID data sent from the RFID controller, wherein the multiple applications apply application specified data validation to inbound RFID data from the RFID controller; wherein the RFID secure gateway comprises an identity-based communication layer that provides a communication channel between the RFID secure gateway and the application components; and wherein the identity-based communication layer authenticates and secures the communication channel between the RFID secure gateway and the application components. - View Dependent Claims (13, 14, 15, 16, 19, 20)
-
-
17. The system of 12, further comprising additional RFID controllers interacting with the enterprise application environment.
-
18. The system of 12, further comprising at least one application component at the enterprise application environment to manage the RFID readers.
Specification