23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Step 2: Check<strong>in</strong>g the fictitious data keyed <strong>in</strong>to the rfid_db and rfid_log databases<br />

on the backend server.<br />

Figure A7.1: Pre-keyed data <strong>in</strong> the rfid_db database<br />

Figure A7.2: Pre-keyed data <strong>in</strong> the rfid_log database<br />

Step 3: Check<strong>in</strong>g the fictitious data keyed <strong>in</strong>to the rfid_db by us<strong>in</strong>g the R/W<br />

<strong>RFID</strong> middleware API.<br />

80

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!