enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Radio-frequency identification - Wikipedia

    en.wikipedia.org/wiki/Radio-frequency_identification

    An RFID tag can be affixed to an object and used to track tools, equipment, inventory, assets, people, or other objects. RFID offers advantages over manual systems or use of barcodes. The tag can be read if passed near a reader, even if it is covered by the object or not visible.

  3. Microchip implant (human) - Wikipedia

    en.wikipedia.org/wiki/Microchip_implant_(human)

    Examples include an identifying integrated circuit RFID device encased in silicate glass which is implanted in the body of a human being. This type of subdermal implant usually contains a unique ID number that can be linked to information contained in an external database, such as identity document , criminal record , medical history ...

  4. Automatic identification and data capture - Wikipedia

    en.wikipedia.org/wiki/Automatic_identification...

    RFID has found its importance in a wide range of markets, including livestock identification and Automated Vehicle Identification (AVI) systems because of its capability to track moving objects. These automated wireless AIDC systems are effective in manufacturing environments where barcode labels could not survive.

  5. Track and trace - Wikipedia

    en.wikipedia.org/wiki/Track_and_trace

    RFID is synonymous with track-and-trace solutions, and has a critical role to play in supply chains. RFID is a code-carrying technology, and can be used in place of a barcode to enable non-line of sight-reading. Deployment of RFID was earlier inhibited by cost limitations but the usage is now increasing.

  6. Faraday cage - Wikipedia

    en.wikipedia.org/wiki/Faraday_cage

    Faraday bags are portable containers fabricated with metallic materials that are used to contain devices in order to protect them from electromagnetic transmissions for a wide range of applications, from enhancing digital privacy of cell telephones to protecting credit cards from RFID skimming.

  7. Chipless RFID - Wikipedia

    en.wikipedia.org/wiki/Chipless_RFID

    Chipless rfid operating principle. A. Vena, E. Perret, and S. Tedjini, 2013. Like various existing RFID technologies, chipless RFID tags are associated with a specific RF reader, which questions the tag and recovers the information contained in it. The operating principle of the reader is based on the emission of a specific electromagnetic (EM ...

  8. Transponder - Wikipedia

    en.wikipedia.org/wiki/Transponder

    Passive and active RFID systems are used in motor sports, and off-road events such as Enduro and Hare and Hounds racing, the riders have a transponder on their person, normally on their arm. When they complete a lap they swipe or touch the receiver which is connected to a computer and log their lap time.

  9. Wireless identity theft - Wikipedia

    en.wikipedia.org/wiki/Wireless_identity_theft

    Wireless identity theft, also known as contactless identity theft or RFID identity theft, is a form of identity theft described as "the act of compromising an individual’s personal identifying information using wireless (radio frequency) mechanics."