A non-intrusive access control method. First, identification of a tag and real-time circumstance information both related to a detection area are acquired. Next, whether the tag is permitted is determined based on circumstance identification corresponding to the detection area, the tag and the real-time circumstance information.

 
Web www.patentalert.com

< Logistics chain management system

< Finding location and ranging explorer

> Monitoring and recording tag with RF interface and indicator for fault event

> Apparatus for electronically verifying the authenticity of contents within a container

~ 00270