Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Ask The Experts Forum

BlogsAsk The Experts ForumAre There Ways of Unauthorizing Cloned RFID Cards and Tags Using a Reader?

Are There Ways of Unauthorizing Cloned RFID Cards and Tags Using a Reader?

Posted By RFID Journal, 07.04.2016

If so, how would I go about doing this?

—Tomasz

———

Tomasz,

I am unsure what you mean by "unauthorizing" a tag. Generally speaking, any reader can read any tag as long as they share the same frequency and air-interface protocol (the "language" that tags and readers use to communicate). The latest passive ultrahigh-frequency (UHF) RFID chips support cryptographic authentication, to confirm that a tag is actually the one put on it by the manufacturer, and thus not a cloned tag.

If a reader interrogates a tag and does not receive the appropriate cryptographic response, the device will convey that information to a back-end system. What the back-end system does with that information is up to the company involved. It could send an alert to a worker, for instance, to find the item in questions and remove it from circulation, and to then investigate how the item came into the company's possession. But any tag that fails to give the proper cryptographic response during the authentication process is, by definition, an unauthorized tag.

—Mark Roberti, Founder and Editor, RFID Journal

Login and post your comment!

Not a member?

Signup for an account now to access all of the features of RFIDJournal.com!

Next Post
Can RFID Tags Be Integrated With a Retai...
Previous Post
What Would a Hospital Deployment Cost?
PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
TAKE THE POLL
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations
© Copyright 2002-2016 RFID Journal LLC.
Powered By: Haycco