
|
Security Authentication between RFID readers and applications Authorization of access to device Secure access to federated readers: company B accesses its readers that are attached to company A’s network Secure device configuration and management Rogue device detection |