Know how your RFID security badge works

Posted by Mords1944 on December 14th, 2020

Let's start by defining RFID: "Radio Frequency Identification (RFID) is a technology that uses communication through radio waves to exchange data between a reader and a tag or electronic card attached to an object or person, for the purpose of identification and monitoring. "

RFID card technology has evolved over the last decade. It wasn't that long ago that "smart cards" had a gold chip mounted on the surface that made contact with the reader when inserted. Having to insert a card into a reader was never successful in the United States. We have become used to swiftly flipping and waving cards. Inserting, waiting, and removing a card so that it can be read was not progress! Contact smart cards are now a legacy technology. Contactless RFID is the new standard.

Over the past two decades, RFID has become the preferred identification credential technology for various types of data collection systems (door access, clocks, point of sale, and computer login). Aside from non-standard insert smart cards, contactless RFID offers the highest level of security afforded by an ID card and is not easily duplicated. RFID card readers last longer than those using magnetic stripe or barcode technology, as they have no exposed reading heads or moving parts.

Original "Proximity" RFID cards are considered read-only. Your unique ID is programmed by the card manufacturer or provider and cannot be changed by the issuing organization. There are several secure formats in which they can be programmed. Some are safer than others; however, their increased security also makes them individual system owners. However, proximity RFID has a non-proprietary standard format that is built into most data collection systems. If you are using the open standard format, you can extend its use in other types of data collection systems.

Proximity RFID is now considered a legacy technology for those implementing completely new systems. Aside from using a proprietary RFID format, their biggest weakness is that they cannot store more information than their encoded unique identification. For many, reading and writing capabilities are simply not necessary. If your current data collection system uses proximity RFID, make the most of your investment and use it until the end of its useful life; as it may never need to be replaced.

The "contactless" RFID cards have integrated the read / write functionality of the surface contact smart chip into an integrated RFID chip that provides increased security and functionality. You can store a biometric template directly on the RFID card to reduce authentication time and increase information security. You can register a unique user identification number (employee, student, membership ...) in the RFID protected by encryption. A contactless RFID card can be programmed with tokens, coupons, or even monetary value for use in retail and tracking. This has fueled a new trend on college and university campuses as an increasing number of them are adopting contactless 非接触ICカード for use in their campus door access, attendance and point of sale systems. Our federal government has implemented a common access card (CAC) program for all federal employees and contractors. The CAC integrates both contactless RFID technology and contact smart card technology that is mandated by strict government programs like FIPS 201 and HSPD12. Many consumers carry name-brand credit cards that use contactless RFID; however, merchants are still implementing contactless RFID-enabled terminals to meet this new deployment of card technology.

Like it? Share it!


Mords1944

About the Author

Mords1944
Joined: September 4th, 2018
Articles Posted: 896

More by this author