摘要:
The claimed subject matter provides a system and/or a method that facilitates implementing a binding between a radio frequency identification (RFID) process and a device. An RFID process can receive a tag read event from a device and make the tag read event available for at least one high level application. A binding engine can bind the RFID process to the device while decoupling a design time activity and a deployment time activity associated with the RFID process. In addition, the binding engine can include at least one of a device mapping component that employs a device binding; and a component configuration module that employs a component binding.
摘要:
The claimed subject matter provides a system and/or a method that facilitates receiving data from at least one device. A radio frequency identification (RFID) network can include at least one device that receives data from a tag. A batcher component can collect the data based on a start boundary and an end boundary and communicate the batched data to an RFID process.
摘要:
The claimed subject matter provides a system and/or a method that facilitates receiving data from at least one device. A radio frequency identification (RFID) network can include at least one device that receives data from a tag. A batcher component can collect the data based on a start boundary and an end boundary and communicate the batched data to an RFID process.
摘要:
The claimed subject matter provides a system and/or a method that facilitates providing reliability associated with radio frequency identification (RFID) technology. An RFID network can include at least one device that wirelessly receives data from a tag. A provider component can have a dedicated execution space independent of an RFID server within a host allowing communication to at least one device within the RFID network.
摘要:
The claimed subject matter provides a system and/or a method that facilitates configuring at least one radio frequency identification (RFID) device. An RFID network can include at least one device associated with a device group, wherein the device group corresponds to a characteristic. An organizational manager can uniformly configure the at least one device based at least in part upon membership of the device group.
摘要:
The claimed subject matter provides a system and/or a method that facilitates configuring at least one radio frequency identification (RFID) device. An RFID network can include at least one device associated with a device group, wherein the device group corresponds to a characteristic. An organizational manager can uniformly configure the at least one device based at least in part upon membership of the device group.
摘要:
The claimed subject matter provides a system and/or a method that facilitates configuring at least one radio frequency identification (RFID) device. An RFID network can include at least one device associated with a device group, wherein the device group corresponds to a characteristic. An organizational manager can uniformly configure the at least one device based at least in part upon membership of the device group.
摘要:
The claimed subject matter provides a system and/or a method that facilitates ensuring reliable data within a radio frequency identification (RFID) infrastructure. A radio frequency identification (RFID) network can include at least one device that receives data from a tag. A distribute component can initiate a reliable transaction with the received data to ensure at least one subscribing RFID process utilizes such data.
摘要:
The claimed subject matter provides a system and/or a method that facilitates ensuring reliable data within a radio frequency identification (RFID) infrastructure. A radio frequency identification (RFID) network can include at least one device that receives data from a tag. A distribute component can initiate a reliable transaction with the received data to ensure at least one subscribing RFID process utilizes such data.
摘要:
The subject invention provides a system and/or a method that facilitates employing a security technique to an RFID network. An interface can receive role-based authorization data related to an operating system. A security component can enhance security to at least one of a manipulation of a process and a utilization of a device within the RFID network based at least in part upon role-based authorization data.