Website: http://www.rfidvirus.org

Rank: 1133 / 1500

2 selected articles

The Architecture of RFID Systems - RFID Virus

The Architecture of RFID Systems

Real-life RFID deployments employ a wide variety of physically distributed RFID readers, access gateways, management interfaces, and databases. The middleware receives events from the RFID readers when tags are scanned. These events are passed through a number of filters, which process the events in an ...

Read more

Date: 2006-03-13 11:07:13

Related topics : rfid reader system architecture / rfid stock management system / rfid tag reader system / rfid card reader system / rfid middleware architecture

RFID Middleware - RFID Virus

We will then give two examples of RFID middleware bugs that can allow attacks to happen as examples of how attacks work.

An RFID system consists of hardware, including RFID readers, and software. The software runs on ordinary PCs or servers and consists of middleware, which contains the logic of the RFID application, and a backend database system (e.g., Oracle, SQL Server, Postgres, MySQL) ...

Read more

Date: 2007-02-23 12:06:45

Related topics : rfid middleware software / rfid tag reader software / rfid tag data for products consist of the following information except / rfid tag reader system / rfid tag and reader working