In order to simplify their installation and operation, modern home security systems must be able to monitor their environments wirelessly. This includes monitoring perimeter security, intrusion ...
In a broad context, radio transmissions containing some type of identifying information are considered Radio Frequency Identification (RFID). This can be a cab driver using his unit number over the ...
Built for easy integration into industrial environments and systems, this new RFID device lets OEMs and end users implement secure equipment identification, access control, and traceability IDEC ...
Passwords, PINs and physical keys are so yesterday. Today’s employees, students, tenants and consumers are used to accessing all kinds of locations, goods and services with the wave of an ID card or ...
Don’t be surprised if, in the near future, you need a key card and a smile to gain entry into your workplace. Security experts say that some smart cards, which have embedded RFID tags, can be easily ...
Introducing the TWN4 Palon Compact RFID Reader Module and Panel Mount from ELATEC. The Palon family of smart, multi-function readers are optimized for physical access control (PAC). The ELATEC TWN4 ...
A lightweight encryption technology that uses a one-time, self-destructing encryption key will land on RFID chips sometime next year, according to the firm that developed it. Tutarus already sells the ...
Awareness of consumer privacy issues and tight security must go hand in hand if RFID technology is to flourish, according to industry experts. A set of RFID guidelines designed to help protect ...
BOSTON—I caught up with Kevin Ashton just as he was getting back into Boston following a red-eye flight. Kevin is currently the vice president of marketing at RFID vendor ThingMagic in Cambridge, Mass ...
After making a range of moves last year toward bolstering RFID adoption, network specialist VeriSign Inc. is now working with epcGlobal on future RFID security improvements, while also consulting ...