What is RFID and how does it work? (2024)

What is RFID (radio frequency identification)?

RFID (radio frequency identification) is a form ofwireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.

How does RFID work?

Every RFID system consists of three components: a scanningantenna, atransceiverand atransponder. When the scanning antenna and transceiver are combined, they are referred to as an RFID reader or interrogator. There are two types of RFID readers -- fixed readers and mobile readers. The RFID reader is a network-connected device that can be portable or permanently attached. It uses radiowaves to transmit signals that activate the tag. Once activated, the tag sends a wave back to the antenna, where it is translated into data.

The transponder is in the RFID tag itself. The read range for RFID tags varies based on factors including the type of tag, type of reader, RFID frequency and interference in the surrounding environment or from other RFID tags and readers. Tags that have a stronger power source also have a longer read range.

What are RFID tags and smart labels?

RFID tags are made up of an integrated circuit (IC), an antenna and a substrate. The part of an RFID tag that encodes identifying information is called the RFID inlay.

There are two main types of RFID tags:

  • Active RFID. An active RFID tag has its own power source, often a battery.
  • Passive RFID. A passive RFID tag receives its power from the reading antenna, whose electromagnetic wave induces a current in the RFID tag's antenna.

There are also semi-passive RFID tags, meaning a battery runs the circuitry while communication is powered by the RFID reader.

Low-power, embedded non-volatile memory plays an important role in every RFID system. RFID tags typically hold less than 2,000KBof data, including a unique identifier/serial number. Tags can be read-only or read-write, where data can be added by the reader or existing data overwritten.

The read range for RFID tags varies based on factors including type of tag, type of reader, RFID frequency, and interference in the surrounding environment or from other RFID tags and readers. Active RFID tags have a longer read range than passive RFID tags due to the stronger power source.

smart labels are simple RFID tags. These labels have an RFID tag embedded into an adhesive label and feature a barcode. They can also be used by both RFID and barcode readers. Smart labels can be printed on-demand using desktop printers, where RFID tags require more advanced equipment.

What is RFID and how does it work? (1)

What are the types of RFID systems?

There are three main types of RFID systems: low frequency (LF), high frequency (HF) and ultra-high frequency (UHF). Microwave RFID is also available. Frequencies vary greatly by country and region.

  • Low-frequency RFID systems. These range from 30KHzto 500 KHz, though the typical frequency is 125 KHz. LF RFID has short transmission ranges, generally anywhere from a few inches to less than six feet.
  • High-frequency RFID system These range from 3MHzto 30 MHz, with the typical HF frequency being 13.56 MHz. The standard range is anywhere from a few inches to several feet.
  • UHF RFID systems. These range from 300 MHz to 960 MHz, with the typical frequency of 433 MHz and can generally be read from 25-plus feet away.
  • Microwave RFID systems. These run at 2.45Ghzand can be read from 30-plus feet away.

The frequency used will depend on the RFID application, with actual obtained distances sometimes varying from what is expected. For example, when the U.S. State Department announced it would issue electronic passports enabled with an RFID chip, it said the chips would only be able to be read from approximately 4 inches away. However, the State Department soon received evidence that RFID readers could skim the information from the RFID tags from much farther than 4 inches -- sometimes upward of 33 feet away.

If longer read ranges are needed, using tags with additional power can boost read ranges to 300-plus feet.

What is RFID and how does it work? (2)

RFID applications and use cases

RFID dates back to the 1940s; however, it was used more frequently in the 1970s. For a long time, the high cost of the tags and readers prohibited widespread commercial use. As hardware costs have decreased, RFID adoption has also increased.

Some common uses for RFID applications include:

  • pet and livestock tracking
  • inventory management
  • asset tracking and equipment tracking
  • inventory control
  • cargo and supply chain logistics
  • vehicle tracking
  • customer service and loss control
  • improved visibility and distribution in thesupply chain
  • access control in security situations
  • shipping
  • healthcare
  • manufacturing
  • retail sales
  • tap-and-go credit card payments
What is RFID and how does it work? (3)

RFID vs. barcodes

Using RFID as an alternative for barcodes is increasing in use. RFID andbarcodetechnologies are used in similar ways to track inventory, but there are some important differences between them.

RFID tagsBarcodes
Can identify individual objects without direct line of sight.Direct line of sight required for scanning.
Can scan items from inches to feet away, depending on type of tag and reader.Require closer proximity for scanning.
Data can be updated in real time.Data is read-only and can't be changed.
Require a power source.No power source needed.
Read time is less than 100 milliseconds per tag.Read time is half a second or more per tag.
Contain a sensor attached to an antenna, often contained in a plastic cover and more costly than barcodes.Printed on the outside of an object and more subject to wear.

RFID vs. NFC

Near-field communication (NFC) enables data to be exchanged between devices by using short-range, high-frequency wireless communication technology. NFC combines the interface of a smart card and reader into a single device.

Radio frequency IDNear-field communication
Uni-directionalBi-directional
Range up to 100 mRange less than 0.2 m
LF/HF/UHF/Microwave13.56 MHz
Continuous samplingNo continuous sampling
Bit rate varies with frequencyUp to 424 Kbps
Power rate varies with frequency<15 milliamperes

RFID challenges

RFID is prone to two main issues:

  • Reader collision. Reader collision, when a signal from one RFID reader interferes with a second reader, can be prevented by using an anti-collision protocol to make RFID tags take turns transmitting to their appropriate reader.
  • Tag collision. Tag collision occurs when too many tags confuse an RFID reader by transmitting data at the same time. Choosing a reader that gathers tag info one at a time will prevent this issue.

RFID security and privacy

A common RFID security or privacy concern is that RFID tag data can be read by anyone with a compatible reader. Tags can often be read after an item leaves a store or supply chain. They can also be read without a user's knowledge using unauthorized readers, and if a tag has a unique serial number, it can be associated to a consumer. While a privacy concern for individuals, in military or medical settings this can be a national security concern or life-or-death matter.

Because RFID tags do not have a lot of compute power, they are unable to accommodate encryption, such as might be used in a challenge-response authentication system. One exception to this, however, is specific to RFID tags used in passports -- basic access control (BAC). Here, the chip has sufficient compute power to decode an encrypted token from the reader, thus proving the validity of the reader.

At the reader, information printed on the passport is machine-scanned and used to derive a key for the passport. There are three pieces of information used -- the passport number, the passport holder's birth date and the passport's expiration date -- along with a checksum digit for each of the three.

Researchers say this means passports are protected by a password with considerably less entropy than is normally used in e-commerce. They key is also static for the life of the passport, so once an entity has had one-time access to the printed key information, the passport is readable with or without the consent of the passport bearer until the passport expires.

The U.S. State Department, which adopted the BAC system in 2007, has added an anti-skimming material to electronic passports to mitigate the threat of undetected attempts to steal users' personal information.

RFID standards

There are several guidelines and specifications for RFID technology, but the main standards organizations are:

  • International Organization for Standardization (ISO)
  • Electronics Product Code Global Incorporated (EPCglobal)
  • International Electrotechnical Commission (IEC)

Each radio frequency has associatedstandards, including ISO 14223 and ISO/IEC 18000-2 for LF RFID, ISO 15693 and ISO/IEC 14443 for HF RFID, and ISO 18000-6C for UHF RFID.

Next-generation RFID use

RFID systems are becoming increasingly used to supportinternet of thingsdeployments. Combining the technology with smart sensors and/orGPStechnology enables sensor data including temperature, movement and location to bewirelesslytransmitted.

What is RFID and how does it work? (2024)

FAQs

What is RFID and how does it work? ›

RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.

How exactly does RFID work? ›

Like barcode technology, RFID Scanner recognizes locations and identification of tagged items — but instead of reading laser light reflections from printed barcode labels, it leverages low-power radio frequencies to collect and store data.

Do credit cards use RFID? ›

Key takeaways. RFID credit cards are growing in popularity and have already been adopted by major credit card issuers. These cards use radio frequencies to allow the cardholder to pay at terminals by tapping their card on a card reader as opposed to swiping or inserting their card.

What RFID is used for? ›

Radio Frequency Identification (RFID) is a technology that uses radio waves to passively identify a tagged object. It is used in several commercial and industrial applications, from tracking items along a supply chain to keeping track of items checked out of a library.

How serious is RFID theft? ›

Once a hacker has stolen your credit card data and other personally identifiable information, they can use it to do the following: Make unauthorized purchases. Create duplicate credit cards. Access your bank accounts and make withdrawals.

Can cell phones detect RFID tags? ›

Read/Write Capability: Not all mobile phones can read and write RFID cards. Phones with NFC (Near Field Communication) functionality are more likely to support RFID card interaction.

Can you be tracked with an RFID chip? ›

Aside from keeping track of inventory, RFID technology also helps organizations identify people and monitor their location. They can detect people who stray away from their assigned locations and help prevent theft, shoplifting, or other problems.

How do I protect my credit card from being scanned? ›

Preventing Credit Card Scanning
  1. Buy a card sleeve or RFID wallet that blocks RFID transmissions.
  2. Stack your cards together to mitigate some of the scanner's ability to read information.
  3. Leave your cards at home and only use cash in public places.

Can my debit card be scanned while in your wallet? ›

Similarly to card skimming, card scanning is a type of payment card theft where the fraudster with a scanning device gets close enough to your bag or wallet to scan your card number. This type of fraud is enabled by the fact that today's payment cards typically work on Radio Identification Frequency (RFID) technology.

Can I use my phone as a RFID card? ›

Yes, you can use your phone as RFID tag. For Android or Windows phones you enable NFC. In case of an Apple you need to enable Bluetooth. Traditionally a RFID tag is a smart card, badge, ticket or drop.

What are the disadvantages of RFID? ›

Disadvantages of RFID
  • Materials like metal and liquid can impact signal.
  • Sometimes not as accurate or reliable as barcode scanners.
  • Cost – RFID readers can be 10x more expensive than barcode readers.
  • Implementation can be difficult and time consuming.

How long do RFID tags last? ›

The lifespan of an RFID tag varies, but it's typically around 5-10 years. To maximize its lifespan, store RFID tags away from direct sunlight, extreme temperatures, and electromagnetic interference. Additionally, use quality materials for tag attachment to prevent wear and tear.

Is RFID good or bad? ›

Using RFID for inventory management offers several benefits, such as reduced labor costs and faster scanning. However, RFID technology also has some disadvantages, including security concerns and infrastructure requirements.

Do I really need a RFID wallet? ›

If you're at low risk, or simply don't use anything that has RFID in it, then you probably don't need RFID protection. For low-risk people that still have cards, passports, or ID you'd prefer to keep under wraps, then investing in some protection could be worth that extra peace of mind to know you're covered.

What is the major problem with RFID? ›

RFID challenges

RFID is prone to two main issues: Reader collision. Reader collision, when a signal from one RFID reader interferes with a second reader, can be prevented by using an anti-collision protocol to make RFID tags take turns transmitting to their appropriate reader. Tag collision.

What is the controversy with RFID? ›

There is controversy regarding human applications of implantable RFID technology including concerns that individuals could potentially be tracked by carrying an identifier unique to them. Privacy advocates have protested against implantable RFID chips, warning of potential abuse.

What actually blocks RFID? ›

Any material that can interfere with electromagnetic fields is able to block RFID. The most common materials used in the manufacture of RFID blocking wallets and bags are carbon fiber, aluminum, and leather. In a pinch, you can just wrap your credit card in tinfoil to protect against skimming attacks.

How does RFID work without power? ›

How Do Passive RFID Tags Work? Passive RFID tags have no power of their own and are powered by the radio frequency energy transmitted from RFID readers/antennas. The signal sent by the reader and antenna is used to power on the tag and reflect the energy back to the reader.

Can RFID chips be hacked? ›

By closely monitoring the power consumption levels of RFID tags, hackers can fool your systems. With some ingenuity and a cell phone bad actors can perform an RFID hack that will steal sensitive information or breach secured areas.

Can RFID change owner? ›

No. The TNG RFID Tag is unique to the registered customer and vehicle. If you no longer wish to use the TNG RFID Tag or have sold off the vehicle, you are required to terminate the TNG RFID Tag by contacting Touch 'n Go Careline. Address : Ground Floor, Tower 6, Avenue 5, The Horizon Bangsar South.

Top Articles
Investing In Chainlink (LINK) - Everything You Need to Know - Securities.io
Travel documents for non-EU nationals - Your Europe
Frases para un bendecido domingo: llena tu día con palabras de gratitud y esperanza - Blogfrases
Will Byers X Male Reader
Tryst Utah
Danielle Moodie-Mills Net Worth
What are Dietary Reference Intakes?
Mawal Gameroom Download
10000 Divided By 5
123 Movies Black Adam
Sunday World Northern Ireland
Bbc 5Live Schedule
Prices Way Too High Crossword Clue
Lonadine
Https E24 Ultipro Com
charleston cars & trucks - by owner - craigslist
6813472639
Louisiana Sportsman Classifieds Guns
Arre St Wv Srj
Soccer Zone Discount Code
ARK: Survival Evolved Valguero Map Guide: Resource Locations, Bosses, & Dinos
Dtab Customs
Union Ironworkers Job Hotline
Craigslist List Albuquerque: Your Ultimate Guide to Buying, Selling, and Finding Everything - First Republic Craigslist
Kringloopwinkel Second Sale Roosendaal - Leemstraat 4e
Toyota Camry Hybrid Long Term Review: A Big Luxury Sedan With Hatchback Efficiency
Nz Herald Obituary Notices
Www.craigslist.com Savannah Ga
Dtlr Duke St
Globle Answer March 1 2023
Danielle Ranslow Obituary
Water Temperature Robert Moses
Is Henry Dicarlo Leaving Ktla
30+ useful Dutch apps for new expats in the Netherlands
5 Star Rated Nail Salons Near Me
Mastering Serpentine Belt Replacement: A Step-by-Step Guide | The Motor Guy
Account Now Login In
Bee And Willow Bar Cart
Movies123.Pick
Nancy Pazelt Obituary
A Comprehensive 360 Training Review (2021) — How Good Is It?
Vindy.com Obituaries
The Wait Odotus 2021 Watch Online Free
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
Fool's Paradise Showtimes Near Roxy Stadium 14
Random Animal Hybrid Generator Wheel
Caphras Calculator
Beds From Rent-A-Center
Hello – Cornerstone Chapel
House For Sale On Trulia
R Detroit Lions
Jigidi Jigsaw Puzzles Free
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 5964

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.