Automatic ID

Tags

UPM RFID and Partners to Exhibit NFC and RFID Innovations at RFID Journal Live! 2012

UPM RFID, Tampere - UPM RFID is joining with partners Cellotape, ChronoTrack, Mid-South Marking Systems and Seeonic to present the latest NFC and RFID solutions and applications at the tenth annual RFID Journal Live! Conference, April 3-5 at Walt Disney World, Swan and Dolphin Resort in Orlando, Florida. Visitors to Booth #512 will experience: o Cellotape displaying an assortment of printed...

Read More »
RFID Readers feature IO link interface.
Barcode Scanners / Readers

RFID Readers feature IO link interface.

Measuring 70 mm long, Models RF210R and RF220R have cylindrical design with thread diameters of 18 and 30 mm and short ranges of 20 and 40 mm, respectively. Model RF260R, measuring 75 x 75 x 40 mm, is used for ranges up to 130 mm. IO link interface allows readers to be integrated into machines and systems to extend applications. In addition to smart labels that are permanently attached to...

Read More »
RFID Readers feature IO link interface.
Barcode Scanners / Readers

RFID Readers feature IO link interface.

Measuring 70 mm long, Models RF210R and RF220R have cylindrical design with thread diameters of 18 and 30 mm and short ranges of 20 and 40 mm, respectively. Model RF260R, measuring 75 x 75 x 40 mm, is used for ranges up to 130 mm. IO link interface allows readers to be integrated into machines and systems to extend applications. In addition to smart labels that are permanently attached to...

Read More »
Miscellaneous Protectors

Machine Readable Taggants facilitate coin authentication.

Designed to detect if coin is authentic or counterfeit, CoinSure solution includes addition of machine-readable taggants to coins during minting. Taggants are chemical markers invisible to human eye which act like fingerprint; marking each coin with unique code that can only be identified with specially engineered reader. Authentication is carried out with battery-operated, pen-sized reader or,...

Read More »
Playing it Safe with a Chip
Sponsored

Playing it Safe with a Chip

This paper briefs about the quality management system practiced at one of the largest mustard maker in Dusseldorf, Lowensenf, where a secure access management system is tested and chosen to prevent the improper operation of QM system and the packaging unit. It states that protecting the system parameters such as password functions has become a major concern for the company, and highlights that EKS Light Electronic-Key-System from Euchner could resolve their problem. A brief overview on the construction and working of Light EKS is presented in it. Also explained in the paper is about the four access levels of QM system, along with the chip programming method performed by Electronic-Key-Manager EKM software from Euchner. Figures illustrating modular electronic-key adapter of EKS light and modular version of the EKS light access system form Euchner are added.

Read More »
Miscellaneous Protectors

Machine Readable Taggants facilitate coin authentication.

Designed to detect if coin is authentic or counterfeit, CoinSure solution includes addition of machine-readable taggants to coins during minting. Taggants are chemical markers invisible to human eye which act like fingerprint; marking each coin with unique code that can only be identified with specially engineered reader. Authentication is carried out with battery-operated, pen-sized reader or,...

Read More »
Cincinnati and Grand Rapids See Green from RFID-enabled Recycling and Waste Collection Operations
Tags

Cincinnati and Grand Rapids See Green from RFID-enabled Recycling and Waste Collection Operations

(UPM RFID, Tampere) - UPM RFID and Cascade Engineering have helped the cities of Cincinnati, OH, and Grand Rapids, MI, turn trash into cash, using RFID technology to optimize critical waste management processes and generate cost savings. The two municipalities are combating the problem of growing waste volumes by motivating citizen behavioral change with incentive-based recycling programs and...

Read More »
Cincinnati and Grand Rapids See Green from RFID-enabled Recycling and Waste Collection Operations
Tags

Cincinnati and Grand Rapids See Green from RFID-enabled Recycling and Waste Collection Operations

(UPM RFID, Tampere) - UPM RFID and Cascade Engineering have helped the cities of Cincinnati, OH, and Grand Rapids, MI, turn trash into cash, using RFID technology to optimize critical waste management processes and generate cost savings. The two municipalities are combating the problem of growing waste volumes by motivating citizen behavioral change with incentive-based recycling programs and...

Read More »
Biometric Readers

DERMALOG at CeBIT 2012: Fingerprint Login - Getting Rid of Usernames and Passwords

HAMBURG, Germany, - DERMALOG Identification Systems in Hamburg becomes the first manufacturer to provide middleware for its automated fingerprint identification system (AFIS). The middleware is flexible and can be integrated into any software application to enable fingerprint logins making usernames and passwords a thing of the past. The new Software Developer Suite will be presented at this...

Read More »
Biometric Readers

DERMALOG at CeBIT 2012: Fingerprint Login - Getting Rid of Usernames and Passwords

HAMBURG, Germany, - DERMALOG Identification Systems in Hamburg becomes the first manufacturer to provide middleware for its automated fingerprint identification system (AFIS). The middleware is flexible and can be integrated into any software application to enable fingerprint logins making usernames and passwords a thing of the past. The new Software Developer Suite will be presented at this...

Read More »
Identifiers

Optical E-Signature Device offers adaptive signing functionality.

Able to eliminate use of paper-based TAN lists while adding security layer to bank's infrastructure, DIGIPASS 736 authentication device features adaptive signing, what-you-see-is-what-you-sign capability, and optical interface that facilitates data transfer. Product offers zero footprint solution against man-in-the-browser and man-in-the-middle based fraud. Communication between PC and device is...

Read More »

All Topics