CALL US : +919962060070


Price :
Quantity :  
  • 200 Units in Stock



                          Radio frequency identification (RFID) has been used in a number of practical applications, such as improving supply chain management, tracking household pets, accessing office buildings, and speeding up toll collection on roadways. RFID is used to automatically identify people, objects, and animals using short range radio technology to communicate digital information between a stationary location (reader) and a movable object (tag). RFID technology can be used to track products in a manner similar to using bar codes for product identification, but RFID also carries additional benefits. RFID does not require line of sight to read the tag, has a longer read range than bar code reader, and tags can store more data than bar codes. Readers can simultaneously communicate with multiple tags. This feature could allow customers to breeze through grocery store checkout counters while a reader identifies all items in a shopping cart at the same time, instead of scanning each bar code individually.


            Like other information systems, RFID systems are vulnerable to attack and can be compromised at various stages of their use. Attacks against an RFID system can be categorized generally into four major groups: attacks on authenticity, attacks on integrity, RFID Technology, Security Vulnerabilities, and Countermeasures 365 attacks on confidentiality, and attacks on availability. Besides being vulnerable to common attacks such as eavesdropping, man-in-the-middle, and denial of service, RFID technology is, in particular, susceptible to spoofing and power attacks (Figure 2). This section illustrates different kinds of attacks and provides countermeasures against these attacks.


                    The Intermec™ IF61 Enterprise Reader is the most   powerful combination of reader and network appliance for running RFID applications, delivering faster processing at the edge of the network and faster decision making at the point of activity. Applications written in Java, JavaScript, VB.NET, or C#.NET can run on the IF61 enabling it to filter, store and manipulate information from tags and send to a server in a required format. In addition, it can monitor external sensors and control audible and visual indicators without the expense, and potential additional point of failure, of a separate server.          


            Dock door scanning and overhead scanning in supply chain management for retail operations, consumer goods and industrial manufacturing, and logistics.


Dimensions:                              12.74” L x 4.25” H x 8.9” W   (32.4 x 10.8 x 22.6 cm)

Operating Temperature:              -13° F to 131° F (-25°C to 55°C)

Frequency Ranges:                    865 or 915 MHz band

Connectivity:                           Ethernet 10/100 BaseT, optional 802.11a/b/g Tag Air Interfaces EPCglobal                                    UHF Gen 2, ISO 18000-6B, ISO 18000-6C

Certifications:                          Multiple regions

Environmental Protection:         IP54

Shock and Vibration Protection: Meets or exceeds MIL-PRF-28800F, Class 2