Contact Us

anti-interference flexible metal resistance fixed assets management labels bend metal shielding rfid electronic tag

Just fill in the form below, click submit, you will get the price list, and we will contact you within one working day. Please also feel free to contact us via email or phone. (* is required).

  • Journal of Physics: Conference Series, Volume 1948, 2021 ...

    The 2021 2nd International Conference on Internet of Things, Artificial Intelligence and Mechanical Automation (IoTAIMA 2021) 14-16 May 2021, Hangzhou, China. Accepted papers received: 03 June 2021. Published online: 28 June 2021.

    Get Price
  • Engineering360 - Industrial Products & Supplier Catalog

    2021-2-1u2002·u2002Engineering360 is a search engine and information resource for the engineering, industrial and technical communities. We help you quickly find industrial parts, specifications and services.

    Get Price
  • US7098794B2 - Deactivating a data tag for user privacy or ...

    Deactivating a data tag attached to packaging for user privacy or tamper-evident reasons. A data circuit stores identification information. A plurality of antennas is coupled to the data circuit. At least one antenna of the plurality of antennas is a removable antenna capable of wireless signal transmission at a first range such that removal of the antenna substantially prevents communication ...

    Get Price

    Get Price
  • RFID Technology: System, Principle, Classification and ...

    2018-11-9u2002·u2002Ⅰ RFID 1.1 Introduce Radio Frequency Identification Technology(RFID), also called electronic tag, wireless radio frequency identification, inductive electronic chip, and non-contact card, is a non-contact automatic identification technology, which can automatically identify the target object and obtain relevant data by a radio frequency signal.

    Get Price
  • CISSP Flashcards

    C. Key management is critical for proper protection. Part of key management is determining the lifespan of keys. The key's lifetime should correspond with the sensitivity of the data it is protecting. Less secure data may allow for a longer key lifetime, whereas more sensitive data might require a shorter key lifetime.

    Get Price