Part of the Security management glossary:

A smart label is an item identification slip that contains more advanced technologies than conventional bar code data. The most common enhancements in smart labels are QR codes, Electronic Article Surveillance (EAS) tags and specially configured RFID tags.

QR codes are a type of 2D bar code that provides easy access to information through a smartphone or other device equipped with a barcode reader. 2D bar codes can store up to 7,089 characters, significantly greater storage than is possible with the 20-character capacity of a unidimensional barcode. QR code smart labels are often used to facilitate package shipping.

Electronic Article Surveillance (EAS) tag-based smart labels are commonly used to prevent theft of library books and merchandise in stores. When the item is checked out or purchased, the tag is deactivated. If someone tries to leave the premises with an item with an active tag, an alarm sounds. 

RFID tag-based smart labels are commonly used in manufacturing. They consist of a flat configuration of an RFID tag inserted into an item identification slip. 

This was last updated in November 2012
Contributor(s): Ivy Wigmore
Posted by: Margaret Rouse

Related Terms

Definitions

  • vulnerability

    - A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network. Vulnerabilities create possible attac... (WhatIs.com)

  • vulnerability management planning

    - Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in ... (WhatIs.com)

  • Google dork

    - A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person. (WhatIs.com)

Glossaries

  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.