The RFID system generally consists of a single-chip RFID card and an RFID card reader. The card integrates a radio frequency front end, memory and controller. The RFID card reader can decode the data on the card and then perform appropriate operations (such as opening the door). lock). RFID cards are similar to barcodes, but they store product information electronically. In addition to the security features, the latest RFID cards have the ability to automatically update relevant information as the product is transported over the supply chain. RFID cards can be used to track everything from home pets, livestock to high-end electronics.
RFID cards can be used to track everything from home pets, livestock to high-end electronics. They can automatically collect bridge and road fees and limit access to sensitive areas. Recently, RFID cards have begun to enter more secure areas such as pharmaceuticals, contactless payments, cargo security, and e-passports. STARNFC is professional RFID cards supplier and manufacturer from china. We can supply best RFID cards for you.
These information applications and security-intensive applications must adopt new standards to define RFID cards and readers. Such criteria include the availability of memory on the card, the robustness of the encryption algorithm, the number of different information areas on the card, and security.
Storage density and configuration capabilities
RFID cards must be able to support a more accurate tracking mechanism. Take the pharmaceutical industry as an example. According to the US Food and Drug Administration (FDA), the number of counterfeit drugs has increased tenfold in the past five years. In the worst case, fake medicine may even endanger the patient’s life. The manufacturer’s mark on the tablet can be faithfully reproduced to achieve a false effect. The barcode on the package can provide some additional information and security measures, but it can also be easily scanned and copied. It is estimated that 10% of prescription drugs worldwide are fake drugs, and tens of thousands of lives are lost every year.
In order to prevent the spread of counterfeit drugs, Florida states that from July 1, 2006, prescription drugs must have a paper-based medical record, including the name of the drug, the dosage form, concentration, manufacturer, batch number, corresponding invoice/ Shipping/transfer voucher number, transaction date, name and address of each owner, name and address of each drug user, identification certificate, contact information of each wholesaler, confirmation of the drug record information is accurate and complete Sexual signature or oath, as well as information such as the manufacturer’s tracking number.
It is very difficult to track so much information for many RFID cards currently on the market, which requires not only a large amount of on-chip memory, but also a plurality of different security areas. For example, the manufacturer’s ID, date of manufacture, and product specifications should be readable by everyone, but only the manufacturer can write it; the retailer’s ID can be written not only by the distributor, but also at the retail point. Authorized person to update.
This type of data and security-intensive applications may require 64Kb of on-chip EEPROM and up to 16 different user areas.
Design engineers should be aware of whether the card vendor provides sufficient storage density and user provisioning capabilities for the application being developed. Most cards have a memory capacity of 2Kb and below, and usually only have two banks. While this storage density is more than adequate for animal tracking applications, it is not sufficient to track the requirements of each receiving link in a complex supply chain.
Security is an important issue for RFID systems, but the security of RFID systems (generally provided by label and card reader vendors) has not been enough. Most of today’s RFID cards use an old encryption algorithm with a 48-bit key that can be cracked in a few hours using a laptop.
A block diagram of a typical security process for an RFID system.
However, the situation has improved. Some RFID vendors have introduced cards and readers that support advanced encryption algorithms with 64-bit keys. From 48-bit keys to 64-bit keys, security performance is not only 50%. In terms of the number of factorial combinations of key lengths, the 64-bit algorithm is 64,000 times more powerful than the 48-bit algorithm. Therefore, the 64-bit key is more difficult to crack. Designers should choose a label that provides an efficient and secure encryption algorithm with a key length of at least 64 bits.
RFID card and reader
The security of an RFID card can only be as high as the security of the card reader that reads it. In other words, the 64-bit encryption algorithm on advanced RFID cards is only useful if the card reader or host supports such 64-bit encryption algorithms. Like RFID cards, most card readers on the market today only support minimal security and use old encryption algorithms and too short a key length, making them easy to crack.
The new, more secure reader will support advanced military-grade 128-bit AES encryption algorithms while also supporting simpler encryption algorithms. They also allow password protection and allow for the use of optional encryption algorithms in multiple encryption zones on RFID cards.
As the saying goes, change is eternal. The same is true for security and RFID applications. Encryption algorithms are constantly being updated and improved, and keys are getting longer and stronger. As RFID is an emerging technology, it is expected that the feature set on RFID cards will continue to evolve over time to accommodate changing supply chain requirements.
When choosing RFID cards and readers, keep in mind that some readers can only be upgraded by manually changing the hardware in the device. Imagine disassembling and updating thousands of devices at every point of the supply chain from manufacturer to consumer if you are sending equipment maintenance personnel to each entrance to the building to disassemble and update each card reader. The card reader, this will be a very troublesome thing. Flexibility is a key feature of RFID systems. The new RFID reader simply uploads new firmware and allows all devices on the network to be upgraded over the network. This card reader not only supports Internet-based firmware upgrades, but also allows multiple card reader networks to be upgraded at a single remote location.
RFID cards and readers have a variety of security features, including unique identification numbers (including traceable codes), read and write password protection, unilateral or mutual authentication, and data transmission encryption.
Atmel’s RFID cards and readers offer a variety of security features, including unique identification numbers (including traceable codes), read and write password protection, unilateral or mutual authentication, and data transfer encryption.
RFID applications are starting to grow rapidly in pharmaceutical, cashless transactions and identity applications where security is critical. These emerging applications require a large amount of data and security measures, as well as the ability to provide security services to multiple users. RFID system designers should begin with the design of card readers that support the level of security required for the application and can be easily upgraded. RFID cards should be defined as having enough memory to accommodate all the data needed and should be configurable enough to be configured in a separate storage area to support all of the different users in the supply chain.
We specialize on rfid cards and RFID products for more than ten years. If you have any question, welcome to vist our website: https://www.starnfc.com. We will give you the best RFID solutions.