enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Radio-frequency identification - Wikipedia

    en.wikipedia.org/wiki/Radio-frequency_identification

    When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods. [1] Passive tags are powered by energy from the RFID reader's interrogating radio waves. Active tags are powered ...

  3. Singulation - Wikipedia

    en.wikipedia.org/wiki/Singulation

    Singulation is a method by which an RFID reader identifies a tag with a specific serial number from a number of tags in its field. This is necessary because if multiple tags respond simultaneously to a query, they will jam each other. In a typical commercial application, such as scanning a bag of groceries, potentially hundreds of tags might be ...

  4. Mobile RFID - Wikipedia

    en.wikipedia.org/wiki/Mobile_RFID

    Mobile RFID (M-RFID) are services that provide information on objects equipped with an RFID tag over a telecommunication network. [1] The reader or interrogator can be installed in a mobile device such as a mobile phone or PDA. [2] Unlike ordinary fixed RFID, mobile RFID readers are mobile, and the tags fixed, instead of the other way around.

  5. Automatic equipment identification - Wikipedia

    en.wikipedia.org/wiki/Automatic_equipment...

    RFID antenna used by trackside AEI readers. As of 31 December 1994, Amtech had shipped over 3.1 million tags to railways in North America. The AAR reported that over 95% of the North American rail car fleet was tagged. Over 3,000 readers have been installed by the railways in North America as of the end of 2000. Amtech was bought by TransCore.

  6. Card reader - Wikipedia

    en.wikipedia.org/wiki/Card_reader

    A card reader is a data input device that reads data from a card-shaped storage medium and provides the data to a computer. Card readers can acquire data from a card via a number of methods, including: optical scanning of printed text or barcodes or holes on punched cards, electrical signals from connections made or interrupted by a card's punched holes or embedded circuitry, or electronic ...

  7. Chipless RFID - Wikipedia

    en.wikipedia.org/wiki/Chipless_RFID

    Chipless rfid operating principle. A. Vena, E. Perret, and S. Tedjini, 2013. Like various existing RFID technologies, chipless RFID tags are associated with a specific RF reader, which questions the tag and recovers the information contained in it. The operating principle of the reader is based on the emission of a specific electromagnetic (EM ...

  8. Digital signature transponder - Wikipedia

    en.wikipedia.org/wiki/Digital_signature_transponder

    The Texas Instruments digital signature transponder (DST) is a cryptographically enabled radio-frequency identification (RFID) device used in a variety of wireless authentication applications.

  9. HID Global - Wikipedia

    en.wikipedia.org/wiki/HID_Global

    HID Global supplies its readers and credentials for access control to Banco do Nordeste of Brasil, [16] Employers Mutual Casualty Company [17] HID Global provides network access control to the China Pacific Insurance Co. [ 18 ] and Jinwan District People's Procuratorate [ 19 ] located in Sihucheng District, Zhuhai city.