23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Sync” allow<strong>in</strong>g the users to configure <strong>RFID</strong> reader, to collect the data on<br />

tag, and download<strong>in</strong>g the data to the host PC.<br />

Control Panel<br />

The Control Panel applet is one of the Tracient software applications.<br />

The ma<strong>in</strong> functions of the Control Panel are <strong>RFID</strong> test, Datascan and<br />

Reader log. <strong>RFID</strong> test is used for test<strong>in</strong>g an <strong>RFID</strong> tag to the sett<strong>in</strong>g<br />

applied. Datascan is used when the user memory is required to be read<br />

while read<strong>in</strong>g tag ID. Reader log can only store the identifications of the<br />

tags have been read.<br />

Figure A6.4: <strong>RFID</strong> Control Panel Applet<br />

The sett<strong>in</strong>gs used for reader and Skyetek ISO 18000-6B tag <strong>in</strong> Control<br />

Panel can be seen <strong>in</strong> the Figure A6.5 and Figure A6.6 below.<br />

61

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!