Beefing Up Security

Beefing Up Security

A crypto algorithm embedded in an EPC Gen 2 tag could thwart counterfeiters and ensure only supply-chain partners have access to business information.

Making RFID Easy(er)

Making RFID Easy(er)

The continued evolution of radio frequency identification hardware, software and standards is taking much of the complexity—and risk—out of deploying the technology.