Articles Search Results

2433 Articles and 31 related Products found for identification
  • How do mobile credentials work?
    Needless to say, mobile phones are increasingly used as keys to open doors, due to the convenience factor. So how does the mechanism work? H...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 5 / 21
  • Secure KNX communication over IP
    This extension of the KNXnet/IP protocol enables fully encrypted transmission of data telegrams, thus ensuring secure data- and access-proof...
    Editor / Provider: Siemens | Updated: 2019 / 5 / 3