Table 5.
Candidate technologies organised into domains and technology types. These technologies are explained in more detail in the Section Candidate technologies to better link physical evidence and digital information.
| Technology type | Candidate technology | |
|---|---|---|
| Physical | ||
| Tag technology | Flexible tag | |
| Rigid tag | ||
| Adhesive tag | ||
| Tag with RFID | ||
| Implantable RFID | ||
| Enclosure | ||
| Label technology | Human-interpretable information | |
| Direct part marking | ||
| Bar code | ||
| Passive RFID | ||
| Active RFID | ||
| Locator technology | Automated locator system | |
| GPS locator system | ||
| IPS locator system | ||
| Choke point locator system | ||
| Human-powered locator system | ||
| Semi-automated locator system | ||
| Beacon location system | ||
| Physical to digital | ||
| Scene data collection | Aerial image capture | |
| 3D capture | ||
| Data entry | Automated speech recognition | |
| Smart-phone sensors | ||
| Machine-readable form elements | ||
| Automated forms | ||
| Workflow technologies | Matching labels | |
| Workflow metadata | ||
| Automated process logic | ||
| Digital | ||
| Information standards | Open identifier standards | |
| Closed identifier standards | ||
| Information infrastructure | Local applications | |
| Remote applications | ||
| Distributed databases | ||
| Opportunistic communication | ||
| Mobile ad hoc networks | ||
| Mobile data networks | ||
| Self-managed mobile networks | ||
| Self-hosted computing | ||
| Cloud-hosted computing | ||
| Information security | Digital signatures | |
| Digital certificates | ||
| Encryption | ||
| Access control | ||
| Audit trails | ||
| Block chains |
RFID: radio frequency identification; GPS: global positioning systems; IPS: indoor positioning systems; 3D: three-dimensional.