enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Radio-frequency identification - Wikipedia

    en.wikipedia.org/wiki/Radio-frequency_identification

    A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defense's recent [when?] adoption of RFID tags for supply chain management. [127]

  3. Automatic identification and data capture - Wikipedia

    en.wikipedia.org/wiki/Automatic_identification...

    Data encoder. A code is a set of symbols or signals that usually represent alphanumeric characters. When data are encoded, the characters are translated into machine-readable code. A label or tag containing the encoded data is attached to the item that is to be identified. Machine reader or scanner.

  4. Keycard lock - Wikipedia

    en.wikipedia.org/wiki/Keycard_lock

    Keycard systems operate by physically moving detainers in the locking mechanism with the insertion of the card, by shining LEDs through a pattern of holes in the card and detecting the result, by swiping or inserting a magnetic stripe card, or in the case of RFID or NFC cards, merely being brought into close proximity to a sensor.

  5. Electronic Product Code - Wikipedia

    en.wikipedia.org/wiki/Electronic_Product_Code

    The Electronic Product Code is one of the industrial standards for global RFID usage, and a core element of the EPCglobal Network, [3] an architecture of open standards developed by the GS1 EPCglobal community. Most currently deployed EPC RFID tags comply with ISO/IEC 18000-6C for the RFID air interface standard.

  6. Wireless identification and sensing platform - Wikipedia

    en.wikipedia.org/wiki/Wireless_Identification...

    A wireless identification and sensing platform (WISP) is an RFID (radio-frequency identification) device that supports sensing and computing: a microcontroller powered by radio-frequency energy. [1] That is, like a passive RFID tag, WISP is powered and read by a standard off-the-shelf RFID reader, harvesting the power it uses from the reader's ...

  7. Basic access control - Wikipedia

    en.wikipedia.org/wiki/Basic_Access_Control

    Basic access control (BAC) is a mechanism specified to ensure only authorized parties [1] can wirelessly read personal information from passports with an RFID chip. It uses data such as the passport number, date of birth and expiration date to negotiate a session key.

  8. ISO/IEC 14443 - Wikipedia

    en.wikipedia.org/wiki/ISO/IEC_14443

    Cards may be Type A and Type B, both of which communicate via radio at 13.56 MHz (RFID HF). The main differences between these types concern modulation methods, coding schemes (Part 2) and protocol initialization procedures (Part 3). Both Type A and Type B cards use the same transmission protocol (described in Part 4).

  9. Singulation - Wikipedia

    en.wikipedia.org/wiki/Singulation

    Singulation is a method by which an RFID reader identifies a tag with a specific serial number from a number of tags in its field. This is necessary because if multiple tags respond simultaneously to a query, they will jam each other. In a typical commercial application, such as scanning a bag of groceries, potentially hundreds of tags might be ...