Monday, January 4, 2010

RFID technology in secret

Unfortunately, many customers often because the system may be infected. With the proper equipment, scanners and RFID devices in close contact with someone who can activate and read the contents. Obviously, some other major problems. If someone in your bag of books outside the 13.56 MHz sniffer "with RF fields, they will buy books for RFID devices allow the" book store, which may have recently bought a complete list. This course is a violation of their privacy, but may be worse. Other programs that involve situations in which the military vehicle to explore the other hand, in connection with the project, and officials are quality labels, which coincide with the only objective.

Companies more aware of the company's flagship, the increasing use of RFID devices. RF competent court, the RFID chips will carry an identification card of the "new overflow" that allows any person. This information can be stored and playback scanner companies, access to thieves - and their logo is "important to remember a visit."

Konsum used for smaller goods can not have enough processing power for data encryption technology to protect your privacy on the label. The more you can do is type the password.

No comments:

Post a Comment