Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

GS1 Ratifies EPC Gen2v2, Adds Security Features, More Memory

The new version of the EPC Gen 2 UHF RFID standard provides such features as security, anti-counterfeiting cryptography, EAS functionality and privacy settings for consumers.
By Claire Swedberg
Nov 08, 2013

The management board at GS1, which oversees EPCglobal standards related to Electronic Product Code (EPC) and radio frequency identification technologies, has ratified EPC Gen2v2, a new version of the ultrahigh-frequency (UHF) EPC Gen 2 standard. EPC Gen2v2 provides a series of features intended to improve security and deter the counterfeiting of tagged products, by enabling the authentication of a tag or reader, and includes privacy features for consumers, as well as a way for embedded tags to identify themselves as such to an interrogator. Gen2v2 also enables a tag's user memory to be partitioned into multiple files. Tags compliant with the new standard can be used for electronic article surveillance (EAS). Gen2v2 was ratified on Oct. 30, and several Gen 2 UHF tag and reader manufacturers are currently developing products or upgrades to existing offerings based on the new standard.

Gen2v2 is the first revision of the standard since GS1 published its "item-level tagging" version (EPC Gen 2 v. 1.2.0) in 2008, building on the success of 2004's groundbreaking Gen 2 version (see EPCglobal Ratifies Gen 2 Standard). The improvements incorporated in Gen2v2 represent efforts made since that time to meet the needs of a variety of end users for additional functionality, according to Craig Alan Repec, GS1's senior manager for EPCglobal technology.

GS1's Craig Alan Repec

While Gen 2 offered a single, worldwide standard in the UHF RFID space to simplify visibility, boost read rates and improve tag performance, the EPC user community continued to explore ways in which to increase its versatility. Gen2v2, the result of several years of industry-wide collaboration with a diverse group of stakeholders, enables a tag to cryptographically authenticate a reader, thereby providing selective access only to authorized devices. Conversely, readers will be able to cryptographically authenticate tags, thus providing extensive protection against product counterfeiting and tag cloning. This authentication capacity will boost Gen2v2's adoption by the aerospace, defense, luxury-goods and pharmaceutical industries, Repec predicts, by ensuring that data is secure on the tag and cannot be altered without authorization.

In addition, the Gen2v2 standard allows the partitioning of user memory into one or more files (for up to a maximum of 1,023 files, each accommodating a maximum of 2,044 kilobytes of binary data). Readers can be assigned access privileges for some or all files. This partitioned memory could be used to store information regarding maintenance, product purchases or returns, as well as any other product lifecycle information deemed essential for encoding directly on the tag. Saving data to specific files allows access to some of that data to be restricted to certain users. What's more, some data can be set as permanent (unchangeable), while other information could be rewritten.

Retailers using existing Gen 2 tags can employ their own software to update a tag as purchased in their own database, in line with GS1's 2009 EAS guidelines, and thereby ensure that the tag does not set off an EAS alert upon exiting the store. "This approach works for some retailers," says Chris Diorio, the Gen2v2 project editor, founder and CTO of Impinj, a provider of RFID chips used to manufacture EPC tags, as well as RFID readers. For some stores, however, it was not feasible. "Bigger stores could have a million items in the store and 20 checkout lanes," Diorio says. At such sites, he notes, it is impossible to update the database for every purchase before each customer reaches the door. Therefore, the Gen2v2 standard enables the tag to be updated at the point of sale with an "exit code," indicating that the item to which that tag is attached has been paid for.

In addition, the new standard includes a command intended to protect consumer privacy. With this feature, specific readers can render a tag untraceable by restricting identifying information, such as parts of the EPC, extended tag identification (XTID) or user memory. The tag can also accomplish this by significantly reducing its operating range to a percentage of its previous range. The amount by which that read distance would be reduced would depend on the tag itself.

With the untraceable command, a user can protect a consumer's post-sale privacy, for instance, by hiding data until a tag is interrogated by a reader with an untraceable privilege—such as reader in a store when a purchased product is returned for refund or exchange.

Login and post your comment!

Not a member?

Signup for an account now to access all of the features of RFIDJournal.com!

Case Studies Features Best Practices How-Tos
Live Events Virtual Events Webinars
Simply enter a question for our experts.
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations