TITLE

Beyond Prox, RFID Goes Viral

AUTHOR(S)
Zalud, Bill
PUB. DATE
December 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Dec2010, Vol. 47 Issue 12, p52
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the application of radio frequency identification (RFID) in proximity cards for security access systems in the U.S. It states that MIFARE is the most commonly used contactless card in world which is owned by NXP Semiconductors USA Inc. It mentions that RFID tags have been used in medical facilities to track inventory and secure expensive assets.
ACCESSION #
56438028

 

Related Articles

  • Secura Key: Free Card Readers With Control Panel.  // SDM: Security Distributing & Marketing;Sep2004, Vol. 34 Issue 9, p20 

    This article reports that for a limited time the company Secura Key of Chatsworth, California, is offering free card readers to purchasers of the SK-ACP access control panel. Dealers can fax or mail these coupons to Secura Key and two ET4-WXM readers will be shipped freight prepaid. High...

  • HID Corporation.  // Government Security;Dec2005, Vol. 4 Issue 8, p23 

    This article presents information on HID Corp., a pioneer in the high security industry. It is informed that HID manufactures contactless access control cards. It pioneered the development of radio frequency identification technology for physical access control. Its specialized card...

  • RFID privacy issues loom large. Bischoff, Glenn // Mobile Radio Technology;May2007, Vol. 25 Issue 5, p10 

    The article focuses on the predominance of radio frequency identification (RFID) privacy issues in the U.S. RFID users, systems and their customers are suggested to focus on the growing technology, despite encryption and access control technology improvements. RFID tags are considered to be...

  • 4 Ways to Improve Facility Security. Kempfer, Lisa M. // Material Handling Management;Mar2007, Vol. 62 Issue 3, p29 

    The article suggests several ways to improve security of factories and distribution centers. They include network security, keeping an electronic eye on assets, access control and security of containers. Several security technology that can be employed include biometric access-control and radio...

  • ACCESS CONTROL: CHALLENGES AND APPROACHES IN THE INTERNET OF THINGS. Grummt, Eberhard; Müller, Markus; Ackermann, Ralf // Proceedings of the IADIS International Conference on WWW/Interne;Nov2007, p89 

    Information about physical items gathered using automatic identification (Auto-ID) technologies such as RFID is envisioned to be available anywhere, anytime using an "Internet of Things". Novel applications can be built on the ability to track and trace real-world objects. Since the required...

  • Making the Right Choice. Gompers, James // Government Security;Jun2004, Vol. 3 Issue 4, p22 

    Offers advice on the proper selection of an access control system. Checklist for determining where access control is needed in an organization; Selection of the level of security needed for each area within a facility; Radio Frequency Identification; Magnetic stripe; Barcodes; Biometric...

  • MiFare RFID crack more extensive than previously thought. Dayal, Geeta // ComputerWorld Hong Kong;5/10/2008, Vol. 25 Issue 4, p17 

    The article reports on the statement from security researchers that the MiFare Classic radio frequency identification (RFID) chip used in access control keys and subway passes is easier to crack than previously thought. According to computer science graduate student Karsten Nohl, it takes only...

  • The Security Implications of VeriChip Cloning. Halamka, John; Juels, Ari; Stubblefield, Adam; Westhues, Jonathan // Journal of the American Medical Informatics Association;Nov/Dec2006, Vol. 13 Issue 6, p601 

    VeriChipâ„¢ is a Radio-Frequency Identification (RFID) tag produced commercially for implantation in human beings. Its proposed uses include identification of medical patients, physical access control, contactless retail payment, and even the tracing of kidnapping victims. As the authors...

  • RF/ID system secures PCs.  // Automatic I.D. News;Jun98, Vol. 14 Issue 7, p1 

    Features Asset ID, an asset protection system based on radio frequency identification technology. Applications in curtailing unauthorized computer access; IBM Corp.'s plans in shipping Asset-ID enabled personal computers; Key specifications.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics