摘要:
Methods and apparatuses for assembling and implementing tamper indicating RFID devices are presented. An RFID device includes a substrate, an electrically conductive pattern formed on the substrate configured to operate as an antenna by separating a portion of a first device section from a second device section, and an electrical circuit mounted on the substrate that is electrically coupled to the antenna. The electrical circuit stores an identification code.
摘要:
Methods and apparatuses for assembling and implementing tamper indicating RFID devices are presented. An RFID device includes a substrate, an electrically conductive pattern formed on the substrate configured to operate as an antenna by separating a portion of a first device section from a second device section, and an electrical circuit mounted on the substrate that is electrically coupled to the antenna. The electrical circuit stores an identification code.
摘要:
Various antenna arrangements are disclosed for RFID tags. Embodiments of single dipole, dual dipole and patch antenna arrangements are described. Dipole antenna arrangements include metalizations used for tuning the antenna to resonance and for impedance matching to an IC with which they operate. Patch antenna arrangements have cut out portions used for tuning the antenna to resonance and for impedance matching to an IC with which they operate.
摘要:
In some embodiments, an apparatus includes a management module configured to assign a unique set of identifiers to each network control entity from a set of network control entities. As a result, a network control entity from the set of network control entities can assign an identifier from its unique set of identifiers to a port in response to that network control entity receiving a login request from the port. The set of network control entities is associated with a distributed multi-stage switch. The management module is also configured to store a zone set database associated with the distributed multi-stage switch. The management module is configured to send an instance of an active zone set stored within the zone set database to each network control entity from the set of network control entities such that each network control entity can enforce the active zone set.
摘要:
Methods, systems, and apparatuses for preventing unauthorized reading of identifying data stored in tags are described. A secure access identification number and associated read lock password are received. The secure access identification number and associated read lock passcode are transferred to the tag. The tag stores the secure access identification number and read lock passcode. A read lock command is transmitted to the tag. The tag is locked from being read for selected information, such as identifying information and user information, by the read lock command. In a further aspect, the secure access identification number is read from the read locked tag. The secure access identification number is associated with a passcode. The passcode is transmitted to the read locked tag. The tag disables the read lock if the passcode matches the previously received read lock password.