RFID Card
  
Jcop Card&Java Card
bg pic Home      About Us       Products      Application      News      FAQ      Contact Us bg pic
 
Find My Card
RFID Card
- LF 125KHz Card
- HF 13.56Mhz Card
- UHF 860-960Mhz Card
- Rewritbale Surface Card
- RFID Wood Card
- Cashless Payment Systems
- RFID Blocking Cards
RFID Tag
- RFID Keyfob
- RFID Wristbands
- Animal Tag
- RFID Epoxy Keyfob
- Laundry Tag
- Anti-Metal Label
- RFID Tire Tag
- RFID Coin Tag/Disc Tag
- RFID Label With Adhesive
- Self Destructible Label
- RFID Jewelry Label
- UHF Washable Label
- Fragil Anti-tamper Label
- Fabric Laundry Tag
- Polyimide Inlay Tag
- RFID PCB Tag
- FPC RFID Inlay
- Cartoon RFID Tag
- RFID Security Seals
- Brick Tag (Wedge Tag)
- Flexible RFID Tag
- Mifare Metal Tag
UHF Anti-metal Tag
- Flexible UHF Metal Label
- High temperature Metal Tag
- FR4 UHF Metal Tag
- Mini UHF Metal Tag
- UHF Ceramic Tag
- Long Distance UHF Metal Tag
Smart Card
- Contact IC Card
- Java Card/JCOP Card
- EMTG97-3 Card
RFID Inlay
- RFID Prelam Sheet
- Large Format RFID Inlay
- HF Inlay & Antenna
- UHF Inlay & Antenna
NFC Tag
- NFC Smart Ring
RFID Reader
- OPD01 Desktop RFID Reader
- OPD02 Desktop RFID Reader
- OPD03 Desktop RFID Reader
- OPD04 Desktop RFID Reader
- OPD06 Desktop RFID Reader
- OPD07 Desktop RFID Reader
- ISO14443A Reader/Writer
- ISO15693 Reader/Writer
- ACR122U NFC Reader
- ACR38 Smart Card Reader
- OPP9918 Handheld Reader
- OPX10 Handheld Reader
- OPP101 UHF Fixed Reader
- OP401 UHF Fixed Reader
- OP801 UHF Fixed Reader
- OP1601 UHF Fixed Reader
- Industrial Tablet PC
- Industrial PDA OP9908
- 8dpi UHF RFID Reader
- 12dbi UHF RFID Reader
Plastic Card
Cleaning Card
NXP Product Overview
 
Home > RFID News > RFID Technical

Class 1 Gen 2 UHF RFID Tags and UHF RFID Security Measures

2017-2-18 View:
Class 1 Gen 2 UHF RFID Tags. 
The gaps in usage of UHF tags were even more pronounced before the release of Class 1 Gen 2 in 2004, because previous versions such as Class 1 Gen 1 contained virtually no security features.

Called "Gen 2" for short, the Class 1 Gen 2 protocol was released in order to create a single global standard for interoperability. Because the standard was created primarily to unify tag and hardware manufacturers under one global standard, security measures were auxiliary in production, but still managed to answer to newly emerging issues. A burst of security and authentication problems arose some pre- but mostly post-2004, forcing EPCglobal and ISO to respond with increased security measures on UHF tags in both the Gen 2 standard and the newly released G2V2 standard.

Security Breaches
Security breaches started as low-scale threats like hackers reading tags and obtaining private information, but they have grown into seven large global threats to UHF RFID security. To be addressed in a later post, these seven threats include hacking events like spoofing, reverse engineering, and eavesdropping.
Current Gen 2 tags do not have the capability to thwart all threats, but two security measures in particular were developed and applied to UHF Gen 2 tags in order to provide the first layer of protection against hackers – serialized TID numbers and passwords.

TID Numbers
When the Gen 2 standard was released, it introduced serialized Transponder ID (TID) numbers for identification purposes. While initially the concept of serialized TID numbers was intended for identification purposes (manufacturer’s codes, etc.), the TID became widely used for the purpose of authentication once cloning tags became achievable. TID numbers, unlike EPC numbers, are locked after being written at the factory and as a general rule cannot be tampered with. Generally, to authenticate a tag that is suspected to be fake, read the EPC memory bank and the TID memory bank and record both numbers.

Passwords
Two password functionalities are currently available on Class 1 Gen 2 tags: the access password and the kill password. Both passwords are stored on the reserved memory block and come pre-encoded with zeros, which do not function as an access or kill code.

Access Code
The access code on UHF Gen 2 tags must be written in order to be used. Once written, the access code is stored on the reserved memory bank along with the kill code and prevents anyone from changing the ‘lock’ state without first sending the 32-bit code. Four lock states exist on each memory bank:

Unlocked
Perma-unlocked (can never be locked)
Locked
Perma-locked (can never be unlocked)
The access code can also prevent readers from reading the reserved memory bank if it is locked. "Locking" the memory bank enables it only to be read when the reader interrogates it first with the access code, and is the first layer of security generally used with UHF tags. After the access code has been written and the selected memory bank has been locked, the next step is to lock the access password so that users cannot simply re-write it. It is important to note that a small piece of software is usually required in order for the reader to interrogate the tag using the access password. For specifics on locking RFID tags, read Locking Memory on EPC Gen2 RFID Tags.

Kill Code
The kill code is used primarily for applications that require tags to change state (or phase) to indicate a specific event has occurred. Applications like retail benefit from the kill code because once an item is purchased the tag can be killed, making it permanently unreadable. If this method is used, a reader is generally set up at the register to send the kill code after checkout. Using this state change, retailers are able to know if an item was actually purchased versus stolen if it is returned.

The Future – G2V2
Ever since the first details were released about the new G2V2 standard, the idea of security with UHF RFID tags has changed drastically. The new standard takes UHF tags into the 21st century – from two small security measures on Gen 2 tags, to intricate anti-counterfeiting measures and security privileges on G2V2. EPCglobal and ISO were able to step up security and anti-counterfeiting for this new standard by using encryption and cryptologic keys.

While enhanced security measures along with the other three new features are revolutionary, these features are not required on all G2V2 tags. The chips will be customizable based on which features the application needs. For example, if a manufacturing application needed enhanced user memory on tags in order to store increased information but did not need cryptographic authentication, EAS functionality, or the ability to be untraceable, the users can purchase the tag with that one feature alone. Allowing these tags to be customizable (16 combinations) enables them to be cheaper because one-feature chips will be cheaper than chips with all four features.

Even though allowing the chips to be customizable is cost-effective, it adds a huge barrier in the production timeline and availability. Because manufacturers cannot predict which combination will produce the biggest return-on-investment, virtually no G2V2 chips have been put into production as of mid-2016. Back in 2014, it was estimated these chips would be put into production and available in different tag formats for purchase by early 2016; but until the demand grows and large companies place significant orders, these tags will not likely be available in the near future.

For more information on Gen 2 security measures, or Gen 2 V2, please contact us:

OPRFID Technologies., LTD.
2104 Room SANDI International Finance Centre, 249# MingXin Street LongQiao, ChengXiang Putian City Fujian, P.R, China.
P.C: 351100
Tel: (0086)594 2790031
Fax: (0086)594 2790185
Email:info@oprfid.com
oprfid@hotmail.com


 
     
        Copyright | Privacy Statement | RFID Solution | RFID Knowledge | RFID products Shop | Sitemap
German Spanish French Greek Italia Japanese Dutch Polish Portuguese Russian English facebook googleplus twitter
        A smart card is a small plastic card containing a computer chip. People use smart cards along with personal identification numbers (PINs) to log on to a network, a computer, or a device. Using a smart card is more secure than using a password because it's more difficult for someone to steal a smart card and learn your PIN than to learn your password.Smart cards are generally issued by information technology (IT) departments in large organizations. To use a smart card, you also need a smart card reader—a device that’s installed in or connected to your computer and that can read the information stored on a smart card.