Contact Us

intelligent 2 4 g active electronic tags home school school xuntong active rfid card distance rfid card tag

Just fill in the form below, click submit, you will get the price list, and we will contact you within one working day. Please also feel free to contact us via email or phone. (* is required).

  • 2.4G active tag for card type - Active Rfid Tags,uhf Rfid ...

    2.4GHz Long Range Smart Cheap Active RFID Tags for School Attendance System. 2.4GHz Active RFID tags: 2.4GHz students cards are designed for students security attendance, assets inventory, vehicle tracking and livestock outdoors tracking. It is dual frequency card with 2.4GHz and 13.56MHz, used for auto-attendance recording and payment ...

    Get Price
  • China Active Rfid System, China Active Rfid System ...

    China Active Rfid System, China Active Rfid System Suppliers and Manufacturers Directory - Source a Large Selection of Active Rfid System Products at rfid warehouse management system,rfid blocking card,rfid reader from China Alibaba.com

    Get Price
  • Secure Entrances with Reliable 2.4g rfid card - Alibaba.com

    About products and suppliers: 2.4g rfid card sets are computer-controlled cards situated at the entrances of buildings to ensure security.2.4g rfid card devices enable only authorized person to enter into the safeguarded area.The 2.4g rfid card can be swiped or waved in front of a reader, which then verifies the information before allowing access. . They have a particular chip installed in ...

    Get Price
  • (PDF) The Internet of Things for Smart Manufacturing: A

    Active tags have an embedde d power source (e.g., battery) and can operate at a farther distance from the reader. RFID readers transmit an encoded interrogating signal to all tags within range and ...

    Get Price
  • (PDF) Near Field Communication (NFC) - A technical

    Table 2.4 RFID standards for item management ... Furthermore tags can have two modes active or passive. In short to explain, when a tag uses ... or the communication distance of RFID system can be ...

    Get Price
  • RFID Based Security and Access Control System

    2015-2-15u2002·u2002providing a RFID card to the customer and fixing an RFID tag on the bike. The bike is tagged to keep track of its location from the renting store to the return store. The information is successful RFID strategy is built and deployed. This paper discusses the design of a security and access control system using RFID technology. The system is

    Get Price
  • US7565542B2 - Remote authentication of an object using

    A method of authenticating an object in which a computer system receives indicating data from a sensing device. The indicating data is generated in response to sensing of coded data provided on or in a surface associated with the object and is indicative of an identity of the object and at least part of a signature. The signature is in turn a digital signature of at least part of the identity.

    Get Price
  • US20140365194A1 - Method, apparatus, and computer

    Provided herein are systems, methods and computer readable media for assessing the health, fitness, operation, or performance of an individual. An example method comprises selecting an individual dynamics/kinetics model from a database and comparing it to tag location data. Another example method comprises selecting a health, fitness, operation and performance (HFOP) model from a database and ...

    Get Price
  • (PDF) Near Field Communication (NFC) Technology

    kilobits per sec ond (kbps) [2-4]. NFC applications can be categorized such as touch and g o, t ouch and confirm, to uch and connec t, and touch and exp lore.

    Get Price
  • 2.4G active tag for card type - Active Rfid Tags,uhf Rfid ...

    2.4GHz Long Range Smart Cheap Active RFID Tags for School Attendance System. 2.4GHz Active RFID tags: 2.4GHz students cards are designed for students security attendance, assets inventory, vehicle tracking and livestock outdoors tracking. It is dual frequency card with 2.4GHz and 13.56MHz, used for auto-attendance recording and payment ...

    Get Price
  • China Active Rfid System, China Active Rfid System ...

    China Active Rfid System, China Active Rfid System Suppliers and Manufacturers Directory - Source a Large Selection of Active Rfid System Products at rfid warehouse management system,rfid blocking card,rfid reader from China Alibaba.com

    Get Price
  • Secure Entrances with Reliable 2.4g rfid card - Alibaba.com

    About products and suppliers: 2.4g rfid card sets are computer-controlled cards situated at the entrances of buildings to ensure security.2.4g rfid card devices enable only authorized person to enter into the safeguarded area.The 2.4g rfid card can be swiped or waved in front of a reader, which then verifies the information before allowing access. . They have a particular chip installed in ...

    Get Price
  • RFID Based Security and Access Control System

    2015-2-15u2002·u2002providing a RFID card to the customer and fixing an RFID tag on the bike. The bike is tagged to keep track of its location from the renting store to the return store. The information is successful RFID strategy is built and deployed. This paper discusses the design of a security and access control system using RFID technology. The system is

    Get Price
  • (PDF) The Internet of Things for Smart Manufacturing: A

    Active tags have an embedde d power source (e.g., battery) and can operate at a farther distance from the reader. RFID readers transmit an encoded interrogating signal to all tags within range and ...

    Get Price
  • (PDF) Near Field Communication (NFC) - A technical

    Table 2.4 RFID standards for item management ... Furthermore tags can have two modes active or passive. In short to explain, when a tag uses ... or the communication distance of RFID system can be ...

    Get Price
  • US7565542B2 - Remote authentication of an object using

    A method of authenticating an object in which a computer system receives indicating data from a sensing device. The indicating data is generated in response to sensing of coded data provided on or in a surface associated with the object and is indicative of an identity of the object and at least part of a signature. The signature is in turn a digital signature of at least part of the identity.

    Get Price
  • US20140365194A1 - Method, apparatus, and computer

    Provided herein are systems, methods and computer readable media for assessing the health, fitness, operation, or performance of an individual. An example method comprises selecting an individual dynamics/kinetics model from a database and comparing it to tag location data. Another example method comprises selecting a health, fitness, operation and performance (HFOP) model from a database and ...

    Get Price
  • (PDF) Near Field Communication (NFC) Technology

    kilobits per sec ond (kbps) [2-4]. NFC applications can be categorized such as touch and g o, t ouch and confirm, to uch and connec t, and touch and exp lore.

    Get Price
  • 2.4G active tag for card type - Active Rfid Tags,uhf Rfid ...

    2.4GHz Long Range Smart Cheap Active RFID Tags for School Attendance System. 2.4GHz Active RFID tags: 2.4GHz students cards are designed for students security attendance, assets inventory, vehicle tracking and livestock outdoors tracking. It is dual frequency card with 2.4GHz and 13.56MHz, used for auto-attendance recording and payment ...

    Get Price
  • China Active Rfid System, China Active Rfid System ...

    China Active Rfid System, China Active Rfid System Suppliers and Manufacturers Directory - Source a Large Selection of Active Rfid System Products at rfid warehouse management system,rfid blocking card,rfid reader from China Alibaba.com

    Get Price
  • Secure Entrances with Reliable 2.4g rfid card - Alibaba.com

    About products and suppliers: 2.4g rfid card sets are computer-controlled cards situated at the entrances of buildings to ensure security.2.4g rfid card devices enable only authorized person to enter into the safeguarded area.The 2.4g rfid card can be swiped or waved in front of a reader, which then verifies the information before allowing access. . They have a particular chip installed in ...

    Get Price
  • RFID Based Security and Access Control System

    2015-2-15u2002·u2002providing a RFID card to the customer and fixing an RFID tag on the bike. The bike is tagged to keep track of its location from the renting store to the return store. The information is successful RFID strategy is built and deployed. This paper discusses the design of a security and access control system using RFID technology. The system is

    Get Price
  • (PDF) The Internet of Things for Smart Manufacturing: A

    Active tags have an embedde d power source (e.g., battery) and can operate at a farther distance from the reader. RFID readers transmit an encoded interrogating signal to all tags within range and ...

    Get Price
  • (PDF) Near Field Communication (NFC) - A technical

    Table 2.4 RFID standards for item management ... Furthermore tags can have two modes active or passive. In short to explain, when a tag uses ... or the communication distance of RFID system can be ...

    Get Price
  • US7565542B2 - Remote authentication of an object using

    A method of authenticating an object in which a computer system receives indicating data from a sensing device. The indicating data is generated in response to sensing of coded data provided on or in a surface associated with the object and is indicative of an identity of the object and at least part of a signature. The signature is in turn a digital signature of at least part of the identity.

    Get Price
  • US20140365194A1 - Method, apparatus, and computer

    Provided herein are systems, methods and computer readable media for assessing the health, fitness, operation, or performance of an individual. An example method comprises selecting an individual dynamics/kinetics model from a database and comparing it to tag location data. Another example method comprises selecting a health, fitness, operation and performance (HFOP) model from a database and ...

    Get Price
  • (PDF) Near Field Communication (NFC) Technology

    kilobits per sec ond (kbps) [2-4]. NFC applications can be categorized such as touch and g o, t ouch and confirm, to uch and connec t, and touch and exp lore.

    Get Price
  • 2.4G active tag for card type - Active Rfid Tags,uhf Rfid ...

    2.4GHz Long Range Smart Cheap Active RFID Tags for School Attendance System. 2.4GHz Active RFID tags: 2.4GHz students cards are designed for students security attendance, assets inventory, vehicle tracking and livestock outdoors tracking. It is dual frequency card with 2.4GHz and 13.56MHz, used for auto-attendance recording and payment ...

    Get Price
  • China Active Rfid System, China Active Rfid System ...

    China Active Rfid System, China Active Rfid System Suppliers and Manufacturers Directory - Source a Large Selection of Active Rfid System Products at rfid warehouse management system,rfid blocking card,rfid reader from China Alibaba.com

    Get Price
  • Secure Entrances with Reliable 2.4g rfid card - Alibaba.com

    About products and suppliers: 2.4g rfid card sets are computer-controlled cards situated at the entrances of buildings to ensure security.2.4g rfid card devices enable only authorized person to enter into the safeguarded area.The 2.4g rfid card can be swiped or waved in front of a reader, which then verifies the information before allowing access. . They have a particular chip installed in ...

    Get Price
  • RFID Based Security and Access Control System

    2015-2-15u2002·u2002providing a RFID card to the customer and fixing an RFID tag on the bike. The bike is tagged to keep track of its location from the renting store to the return store. The information is successful RFID strategy is built and deployed. This paper discusses the design of a security and access control system using RFID technology. The system is

    Get Price
  • (PDF) The Internet of Things for Smart Manufacturing: A

    Active tags have an embedde d power source (e.g., battery) and can operate at a farther distance from the reader. RFID readers transmit an encoded interrogating signal to all tags within range and ...

    Get Price
  • (PDF) Near Field Communication (NFC) - A technical

    Table 2.4 RFID standards for item management ... Furthermore tags can have two modes active or passive. In short to explain, when a tag uses ... or the communication distance of RFID system can be ...

    Get Price
  • US7565542B2 - Remote authentication of an object using

    A method of authenticating an object in which a computer system receives indicating data from a sensing device. The indicating data is generated in response to sensing of coded data provided on or in a surface associated with the object and is indicative of an identity of the object and at least part of a signature. The signature is in turn a digital signature of at least part of the identity.

    Get Price
  • US20140365194A1 - Method, apparatus, and computer

    Provided herein are systems, methods and computer readable media for assessing the health, fitness, operation, or performance of an individual. An example method comprises selecting an individual dynamics/kinetics model from a database and comparing it to tag location data. Another example method comprises selecting a health, fitness, operation and performance (HFOP) model from a database and ...

    Get Price
  • (PDF) Near Field Communication (NFC) Technology

    kilobits per sec ond (kbps) [2-4]. NFC applications can be categorized such as touch and g o, t ouch and confirm, to uch and connec t, and touch and exp lore.

    Get Price
  • 2.4G active tag for card type - Active Rfid Tags,uhf Rfid ...

    2.4GHz Long Range Smart Cheap Active RFID Tags for School Attendance System. 2.4GHz Active RFID tags: 2.4GHz students cards are designed for students security attendance, assets inventory, vehicle tracking and livestock outdoors tracking. It is dual frequency card with 2.4GHz and 13.56MHz, used for auto-attendance recording and payment ...

    Get Price
  • China Active Rfid System, China Active Rfid System ...

    China Active Rfid System, China Active Rfid System Suppliers and Manufacturers Directory - Source a Large Selection of Active Rfid System Products at rfid warehouse management system,rfid blocking card,rfid reader from China Alibaba.com

    Get Price
  • Secure Entrances with Reliable 2.4g rfid card - Alibaba.com

    About products and suppliers: 2.4g rfid card sets are computer-controlled cards situated at the entrances of buildings to ensure security.2.4g rfid card devices enable only authorized person to enter into the safeguarded area.The 2.4g rfid card can be swiped or waved in front of a reader, which then verifies the information before allowing access. . They have a particular chip installed in ...

    Get Price
  • RFID Based Security and Access Control System

    2015-2-15u2002·u2002providing a RFID card to the customer and fixing an RFID tag on the bike. The bike is tagged to keep track of its location from the renting store to the return store. The information is successful RFID strategy is built and deployed. This paper discusses the design of a security and access control system using RFID technology. The system is

    Get Price
  • (PDF) The Internet of Things for Smart Manufacturing: A

    Active tags have an embedde d power source (e.g., battery) and can operate at a farther distance from the reader. RFID readers transmit an encoded interrogating signal to all tags within range and ...

    Get Price
  • (PDF) Near Field Communication (NFC) - A technical

    Table 2.4 RFID standards for item management ... Furthermore tags can have two modes active or passive. In short to explain, when a tag uses ... or the communication distance of RFID system can be ...

    Get Price
  • US7565542B2 - Remote authentication of an object using

    A method of authenticating an object in which a computer system receives indicating data from a sensing device. The indicating data is generated in response to sensing of coded data provided on or in a surface associated with the object and is indicative of an identity of the object and at least part of a signature. The signature is in turn a digital signature of at least part of the identity.

    Get Price
  • US20140365194A1 - Method, apparatus, and computer

    Provided herein are systems, methods and computer readable media for assessing the health, fitness, operation, or performance of an individual. An example method comprises selecting an individual dynamics/kinetics model from a database and comparing it to tag location data. Another example method comprises selecting a health, fitness, operation and performance (HFOP) model from a database and ...

    Get Price
  • (PDF) Near Field Communication (NFC) Technology

    kilobits per sec ond (kbps) [2-4]. NFC applications can be categorized such as touch and g o, t ouch and confirm, to uch and connec t, and touch and exp lore.

    Get Price
  • 2.4G active tag for card type - Active Rfid Tags,uhf Rfid ...

    2.4GHz Long Range Smart Cheap Active RFID Tags for School Attendance System. 2.4GHz Active RFID tags: 2.4GHz students cards are designed for students security attendance, assets inventory, vehicle tracking and livestock outdoors tracking. It is dual frequency card with 2.4GHz and 13.56MHz, used for auto-attendance recording and payment ...

    Get Price
  • China Active Rfid System, China Active Rfid System ...

    China Active Rfid System, China Active Rfid System Suppliers and Manufacturers Directory - Source a Large Selection of Active Rfid System Products at rfid warehouse management system,rfid blocking card,rfid reader from China Alibaba.com

    Get Price
  • Secure Entrances with Reliable 2.4g rfid card - Alibaba.com

    About products and suppliers: 2.4g rfid card sets are computer-controlled cards situated at the entrances of buildings to ensure security.2.4g rfid card devices enable only authorized person to enter into the safeguarded area.The 2.4g rfid card can be swiped or waved in front of a reader, which then verifies the information before allowing access. . They have a particular chip installed in ...

    Get Price
  • RFID Based Security and Access Control System

    2015-2-15u2002·u2002providing a RFID card to the customer and fixing an RFID tag on the bike. The bike is tagged to keep track of its location from the renting store to the return store. The information is successful RFID strategy is built and deployed. This paper discusses the design of a security and access control system using RFID technology. The system is

    Get Price
  • (PDF) The Internet of Things for Smart Manufacturing: A

    Active tags have an embedde d power source (e.g., battery) and can operate at a farther distance from the reader. RFID readers transmit an encoded interrogating signal to all tags within range and ...

    Get Price
  • (PDF) Near Field Communication (NFC) - A technical

    Table 2.4 RFID standards for item management ... Furthermore tags can have two modes active or passive. In short to explain, when a tag uses ... or the communication distance of RFID system can be ...

    Get Price
  • US7565542B2 - Remote authentication of an object using

    A method of authenticating an object in which a computer system receives indicating data from a sensing device. The indicating data is generated in response to sensing of coded data provided on or in a surface associated with the object and is indicative of an identity of the object and at least part of a signature. The signature is in turn a digital signature of at least part of the identity.

    Get Price
  • US20140365194A1 - Method, apparatus, and computer

    Provided herein are systems, methods and computer readable media for assessing the health, fitness, operation, or performance of an individual. An example method comprises selecting an individual dynamics/kinetics model from a database and comparing it to tag location data. Another example method comprises selecting a health, fitness, operation and performance (HFOP) model from a database and ...

    Get Price
  • (PDF) Near Field Communication (NFC) Technology

    kilobits per sec ond (kbps) [2-4]. NFC applications can be categorized such as touch and g o, t ouch and confirm, to uch and connec t, and touch and exp lore.

    Get Price