News

Sunnyvale startup Wirama announced that they've finished the most precise RFID reader available yet, with the ability to locate passive RFID tags to within 6 inches (through the EPC Class 1 Gen 2 ...
In large-scale, high-volume manufacturing and distribution environments, RFID’s (radio frequency identification’s) original paradigm has held sway: The readers stay put; the tags move. Until now.
This article introduces the CMOS integrated transceiver circuit EM4095 for RFID applications working with transponders at a frequency of typically 125 kHz. The EM4095 is a single-chip RFID reader IC ...
The concept of "Walk-Through Ultra-High-Frequency RFID Asset Inventory" was not introduced by a single individual or ...
RFID tag readings have traditionally been largely restricted to indoor portals or desktops, with recent expansion to handheld readers that are more mobile to accommodate outdoor environments and ...
Devices that utilise RFID technology for identification purposes are widely applied in warehouse logistics, shipping or management. A number of available solutions and a ceaseless need to integrate ...
At every turn, networks must handle additional traffic from new sources. One of the latest and soon-to-rise sources of increased network traffic arises from the implementation of radio frequency ...
Passive ultrahigh-frequency (UHF) transponders measure received signal strength (RSS), and can determine a tag’s relative distance from a reader based on how strong the tag’s signal is. This is how, ...
Not all Radio Frequency Identification (RFID) readers are created equal. In the case of UHF Gen 2, this maxim bears added significance. Standards compliance is only part of the story: meeting the ...
Security researcher [Fran Brown] sent us this tip about his Tastic RFID Thief, which can stealthily snag the information off an RFID card at long range. If you’ve worked with passive RFID before, you ...
With increasing security and public health concerns, contactless credentials are gaining more and more importance. Contactless credentials can be divided into two main categories: soft credentials ...
In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber and numerous others have been heavily fined due to security and data protection violations. This period has seen data ...