Website: http://www.rfidvirus.org
Rank: 1133 / 1500
2 selected articles
The Architecture of RFID Systems - RFID Virus
The Architecture of RFID Systems
Real-life RFID deployments employ a wide variety of physically distributed RFID readers, access gateways, management interfaces, and databases. The middleware receives events from the RFID readers when tags are scanned. These events are passed through a number of filters, which process the events in an ...
Date: 2006-03-13 11:07:13
Related topics : rfid reader system architecture / rfid stock management system / rfid tag reader system / rfid card reader system / rfid middleware architecture
RFID Middleware - RFID Virus
We will then give two examples of RFID middleware bugs that can allow attacks to happen as examples of how attacks work.
An RFID system consists of hardware, including RFID readers, and software. The software runs on ordinary PCs or servers and consists of middleware, which contains the logic of the RFID application, and a backend database system (e.g., Oracle, SQL Server, Postgres, MySQL) ...
Date: 2007-02-23 12:06:45
Related topics : rfid middleware software / rfid tag reader software / rfid tag data for products consist of the following information except / rfid tag reader system / rfid tag and reader working
2 Resources