Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

Pre-order Flipper Zero

The production of the first batch of Flipper Zero for backers who ordered the device on Kickstarter has now begun. The second batch will be available for purchase in the fall of 2021. You can reserve a device from the second batch in advance here https://shop.flipperzero.one/ This is important for us to more accurately predict production volumes.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

How RFID tags work

RFID tags differ not only in form, but also in data transfer protocols.

How do they work? The RFID system consists of two parts. This is a tag (tag) or transponder with a compact antenna (usually printed) and a reader, a full-featured device with a large antenna.

At the same time, the tag’s electronics are usually so simple and low-consuming that this radiation is usually more than enough to power the microcircuit built into the tag.

Beautiful illustration of the field distribution in the tag and reader antennas

Tags are usually divided into types according to the operating frequency (range). There are LF (125-134 kHz), HF (13.56 MHz) and UHF (860-960 MHz) bands. The Russian market offers mainly HF range chips.

EM-Marin

EM-Marin RFID format is the most common in the CIS. It is simple and not copy protected. E M-Marin is usually based on the EM4100 chip. There are other chips that work on the same principle, for example EM4305 – unlike EM4100, it can be overwritten.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

Unique EM-Marin code on the map and Flipper

EM4100 unique code consists of 5 bytes. Sometimes it is written on the RFID card. A unique code can be written in several formats at once: decimal and text. Flipper uses hexadecimal format when displaying a unique code. But on EM-Marin cards, not all 5 bytes are usually written, but only the lower 3 bytes. The remaining 2 bytes will have to be sorted out if it is not possible to read the card.

Some intercoms try to protect themselves from duplicate keys and try to check if the key is recorded on a blank. To do this, the intercom sends a write command before reading, and if the recording is successful, it considers such a key to be fake. When emulating keys with Flipper, the intercom will not be able to distinguish it from the original key, so there will be no such problems.

NFC – connection of the tag with a smartphone

The communication protocols of such devices are based on RFID standards, including the first generation of ISO 14443 standards. All of these standards were developed and widely adopted with the assistance of the non-profit NFC Forum, which was founded in 2004 by NXP, Sony and Nokia.

Small messages such as website address, e-mail, phone number can be written to the tag. You can, for example, write a website URL into the tag, the user brings his phone to the tag and the page at this address opens in his browser.

At the moment, the NFC Forum describes five types of NFC tags, they differ in speed, functionality, resistance to hacking.

In general, about five years along with marks

The relative uselessness of an NFC tag is described above. The rest – no special problems. For almost five years, nothing happened to the marks, nor to the hand itself, the scars disappeared long ago, and no special pitfalls were found either. Yes, opening doors with a “hand” is still more convenient than with a separate tablet. Yes, they can even be used in organizations as a pass, offering to register “your card” in the ACS and causing a slight surprise – but no more.

If you have any questions — ask, I will try to answer 🙂

RFID vs. NFC

When choosing between RFID and NFC, your final choice will depend on your needs. These two technologies are designed to meet different needs.

RFID is the perfect choice if you want to track your assets or manage your inventory. R FID tags will send signals to the reader, allowing you to get information about your target asset in minutes.

NFC is an excellent technology if you want a sophisticated system that provides peer-to-peer sharing, card reading, and smart poster reading. However, this technology works over short distances, and devices must be nearby for it to work effectively.

You will also need to purchase all RFID components independently, unlike NFC which is integrated into modern devices.

ApplePay Virtual Card VS Physical Bank Card

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

Security comparison of virtual and physical bank cards

Compared to a plastic bank card, a virtual card in a phone gives out less information and is more secure for offline payments.

Apple Pay, Google Pay virtual card benefits:

  • Does not allow the use of intercepted data for payments on the Internet – a regular card can be used for Card not present (CNP) transactions, that is, for payments on the Internet, by phone, etc. Data from an Apple Pay virtual card cannot be used in this way. This is due to the fact that an electronic card, upon registration, issues a new card, transactions on which must have a cryptographic signature. Reading Apple Pay gives the PAN and expiration date of the new issued electronic card, not the physical one being registered. Therefore, if you specify the intercepted data of a virtual card for payment on the Internet, the payment will be rejected, since these transactions require a special signature.
  • Doesn’t reveal cardholder details – some physical contactless cards may reveal the Cardholder name and recent purchase history. A virtual card doesn’t do that.

Support for bank cards in Flipper is made solely to demonstrate the operation of high-level protocols. We have no plans to develop this feature in the future. The protection of contactless bank cards is good enough not to worry that devices like Flipper can be used to attack bank cards.

Differences between RFID 125 kHz and 13.56 MHz

The easiest way to understand in what range an RFID tag works is by the type of antenna. At low-frequency tags (125 kHz), the antenna is made of very thin wire, literally thinner than a hair, and a huge number of turns. Therefore, such an antenna looks like a solid piece of metal. High frequency cards (13.56 MHz) have much fewer turns and thicker wire or traces. So gaps are visible between the turns.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

If you shine a flashlight on the card, you can find out at what frequency it works

To see the antenna inside the RFID card, you can illuminate it with a flashlight. If the antenna has only a few large turns, this is most likely a high-frequency card. If the antenna looks like a solid piece of metal with no gaps, this is a low-frequency card.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

Antennas for low-frequency cards are made of very thin wire, and for high-frequency cards – thicker

Low frequency tags are usually used in systems that do not require special security: intercom keys, gym memberships, etc. Due to the greater range, they are convenient to use as parking passes: the driver does not need to lean the card close to the reader, it works from afar. At the same time, low-frequency tags are very primitive, they have a low data transfer rate, because of this, they cannot implement complex two-way data exchange, such as balance checks and cryptography. Low-frequency tags transmit only their short ID without any means of authentication.

High-frequency tags are used for more complex interaction between the card and the reader when cryptography, long two-way exchange, authentication, etc. are needed, for example, for bank cards, secure passes.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

Comparison of 125 kHz and 13.56 MHz RFID tags

Difference between reading UID and data inside the card

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

NFC reading is divided into two types – low-level and high-level

Reading 13.56 MHz tags in Flipper can be divided into 2 parts:

  • Low-level – Primary read only UID, SAK and ATQA. Based on this data, Flipper tries to guess what high-level protocol the card is running on. This guess cannot be 100% accurate, it’s just a guess.
  • High-level – reading data in the card memory using a specific high-level protocol, for example, reading data in Mifare Ultralight cards, reading the contents of Mifare Classic sectors, reading PayPass/Apple Pay bank card details

Resume

Thus, NFC is not a separate technology, but a high-frequency branch of the RFID family. Both technologies have common features, their advantages and disadvantages. R FID is radio frequency identification that has been around for decades and NFC is near field communication that has only been gaining momentum over the last 5-7 years.

RFID can be emulated via NFC and perform a variety of manipulations that facilitate the activities of companies and the daily life of ordinary people.

Handheld RFID readers for every budget.

Leave a request and get a consultation within 5 minutes!

How useful was the information in the article?

Our product catalog

Here you will find a wide range of products in the segments of cash, retail, weighing, banking and office equipment.

See the whole catalog

Implantation process

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

But no – in fact, none of this is needed! This is a photo of the tools from the first part of the article.

Since the label comes already sterilized and in a syringe, its implantation is much simpler, without any problems, it is carried out independently without anyone’s help. In general terms, the process looks something like this:

  • Select the position of the mark. As already mentioned in the first part, most often they choose the space between the thumb and forefinger of the hand, since this place usually does not experience pressure in everyday life. If there are more than one marks, like mine, it is undesirable to have them very close, it is better to step back 1-2 cm from each other.
  • Anesthesia with novocaine – we inject a solution of novocaine 20 mg / ml subcutaneously into the intended incision site, simultaneously pushing the tissues apart and simplifying the further placement of the mark, wait for 5-10 minutes to penetrate into the surrounding tissues. Be careful with novocaine – if you have allergies and/or crooked hands, it can cause many of the most unpleasant consequences, even death! Do not do this yourself unless you are a doctor. Also, don’t do it alone and be prepared to call 911 if needed.

    In principle, anesthesia can be skipped, it is not so difficult to survive a thick needle prick in the arm. In this case, it is desirable that the introduction of the label is still performed not by you yourself, but by another person – in order to make a skin fold with the other hand.

  • Implantation – we wipe the skin twice with alcohol, pierce the skin fold or “blister” with novocaine, holding the needle almost horizontally to the skin, insert the needle 15-20 mm, then, pressing the syringe plunger, squeeze the mark through the needle under the skin. Carefully remove the needle.

    Here is a video (not mine) of what it looks like:

  • Finishing – the incision in this case is even smaller than it was the first time, so just sticking it with adhesive tape is enough. If everything was done correctly, after 3-5 days the patch can be removed, and only a small scar will remain on the skin, which will disappear completely in a few months. If during these days the temperature rises, again, we go to the doctor without delay.

Benefits of NFC over other wireless technologies

NFC has a lot to offer compared to traditional wireless technologies such as Bluetooth and Wi-Fi. Here is a comparison:

  • Close connection distance. NFC technology allows your mobile device to connect to another device only at a close distance (maximum distance 10 cm). NFC has no range issues as it uses a peer-to-peer connection that automatically pairs devices at close range.
  • Connecting to other devices. NFC allows you to connect your phone to other devices wirelessly and transfer data between them. Bluetooth and Wi-Fi require the use of special adapters to connect to other devices.
  • Ease of use. NFC is extremely easy to use and does not require any special skills or knowledge from the user. The technology is simple enough that anyone can use it effortlessly.
  • Security. NFC offers an extra layer of security over other payment technologies, as each user must verify their identity with a unique PIN or biometric. This means that even if someone gains access to the device, they still won’t be able to use the stored information without the correct credentials.
  • Cost. Since NFC is a low energy radio frequency communication technology, it is much cheaper to set up than Bluetooth or Wi-Fi technologies. Businesses can save on overhead by taking advantage of these features without having to install expensive additional hardware.
  • Convenience. The use of NFC means that customers no longer need to manually enter their payment details into the terminal every time they make a purchase, making payments faster and easier than ever before. It also allows users to quickly share data between applications on different platforms without having to enter any additional information manually.
  • Multifunctionality. The range of applications that can be used with NFC is constantly expanding due to its flexibility and scalability; this ranges from real-world applications such as contactless payments to more creative applications such as digital keys or access control in public buildings and venues.
  • Accuracy. With its short-range capabilities, NFC ensures transaction accuracy by eliminating the possibility of interference from devices outside the communication range; this helps reduce the risk of fraud while preventing errors when entering customer data when making payments or quickly and securely exchanging sensitive information between devices/readers.

There is a way out!

Of course, chip manufacturers are constantly taking steps towards improving the protection of tags. So, for example, at the moment, NXP chips of the Mifare DESfire and NTAG DNA series are considered not hacked.

Such tags use various techniques from copying and analyzing the recorded information (including at the physical level), have a cryptographic coprocessor, when reading use authentication based on challenge-response, generation of session keys.

A detailed review of methods of protection against each type of attack is the topic of the next article.

Indala

Indala’s RFID protocol was developed by Motorola and then bought by HID. This is a very old protocol, and modern access control manufacturers do not use it. But in real life, Indala is still rare. At the time of this writing, Flipper can work with the Indala I40134 protocol.

Same as HID26, Indala card unique code I40134 consists of 3 bytes. Unfortunately, the data structure in Indala cards is not public information, and everyone who is forced to support this protocol, themselves figure out which byte order to choose, and how to interpret the signal at a low level.

All these protocols are so simple that the card ID can be simply entered manually without having the original card at hand. You can stupidly send a text card ID, and the owner of Flipper will be able to enter it manually.

HID Prox

HID Global is the largest manufacturer of RFID equipment in the world. They have several proprietary low and high frequency RFID protocols. The most popular low-frequency HID protocol is the 26-bit H10301 (HID26, aka HID PROX II). The unique code in it consists of 3 bytes (24 bits), 2 more bits are used for parity (integrity check).

Some HID26 cards have numbers written on them to indicate the lot number and card ID. It is impossible to fully recognize 3 bytes of a unique code by these numbers, only 2 bytes are written on the card in decimal form: Card ID.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

HID26 data structure on card and when read by Flipper

Of the low-frequency protocols of the HID family, Flipper can only work with HID26 so far. We plan to expand this list in the future. H ID26 is the most popular as it is compatible with most access control systems.

Lack of RFID

The cost of RFID can be ten times more than its previous counterparts such as the barcode system. Many companies today still stick to the barcode system due to the expense required to adopt RFID. Moreover, despite the fact that key cards are convenient, there is no way to track their loss. Misplaced key cards are a loss to business. You also need to figure out how to open the locker if you lose your key card.

Another drawback is that RFID cannot be powered. Companies that have generators can still use RFID systems. But others that don’t have it may have to eventually switch to manual override until power is restored.

RFID and anti-counterfeiting

The idea of ​​RFID fits very well as a solution to the problem of combating the spread of counterfeit products. Indeed, it would seem that he stuck a unique label on the product – that’s the identification of the original product. However, in practice, the organization of such a system has a number of significant subtleties.

First, the implementation of the system affects the manufacturer. He needs to at least organize the placement of labels on the packaging or directly on the product. Printing and digital personalization should also be organized.

Secondly, such systems may involve tracking the path of the goods, which obliges intermediate links between the manufacturer and the distributor to add information about the route of the goods.

Thirdly, the end consumer must have the technical ability to verify the authenticity of the goods.

Fourthly, if the implementation of the system is an initiative of a third party in relation to the manufacturer (for example, the state), it is necessary to provide the technical ability to check the employees of the audit bodies.

Fifth, given that it only makes economic sense to stick RFID tags on high-value goods, there is also an incentive for attackers to try to hack the chip and fake it for use on counterfeit products.

How to choose NFC Tag chips

The NFC chip you choose will depend on what you need. In addition to the types above, also consider the following NTAG features before choosing the perfect NFC tag:

  • STAG 213. These NFC chips are easy to use and reliable. They will serve most of your data transfer needs.
  • NTAG 215. These NFC chips come with 540 bytes of memory. These are the perfect chips if you want to make your Nintendo Amiibo your home. Some amiibo figures you can make with these tags include Legend of Zelda and Breath of the Wild.
  • NTAG 216. These are high-quality standard chips that are ideal for NFC business cards. They can store a lot of data and information.
  • Mifare Ultralight. These are affordable chips that store simple data like URLs and identification numbers. They are ideal for large-scale projects that require a small amount of data.

Always remember that choosing the wrong type of NFC can be wasteful. For example, if you want to make amiibos at home only sttk 215 will work. If you buy any other type of tag, it will be a waste.

ISO 14443-A bare UID

All high frequency cards based on ISO 14443-A have a unique chip identifier – UID. This is the serial number of the card, similar to the MAC address of the network card. U ID is 4, 7 and very rarely 10 bytes long. U ID is not read-protected and is not secret, sometimes it is even written on the card.

In reality, there are many access control systems that use UIDs to authorize access. This occurs even when RFID tags are cryptographically protected. In terms of security, this is not much different from stupid low-frequency 125 kHz cards. Virtual cards (like Apple Pay) intentionally use a dynamic UID to prevent phone owners from using the payment app as a door key.

Since the UID is a low-level attribute, it is possible that the UID is read, but the high-level communication protocol is not yet known. Flipper implements reading, emulation and manual addition of UID, just for primitive readers that use UID for authorization.

Future potential of NFC

As smartphones become common household items, NFC is likely to continue to be integrated into them. This integration will eventually lead to NFC being used as a form of faster payment in stores, restaurants and pretty much everywhere else.

In the future, there is also a chance that NFC can be used for more serious applications, such as making electronic payments without using credit cards. Security considerations aside, this could revolutionize the way we conduct transactions in society.

There are currently millions of POS terminals with built-in NFC. There are currently millions of POS terminals with built-in NFC. It is predicted that over 1.4 billion NFC-enabled smartphones will be released in the next five years.

Judging by these statistics, you can be sure that the future of NFC is bright. More and more people will adopt this technology and it will be more widely adopted and used in society.

Related Articles

There are passive and active RFIDs. The radio signal from the passive type reader enters the tag that absorbs it and is reflected back in the identifier.

Long range active RFID allows a receiver with its own power supply to generate a radio signal without needing absorbed energy from another source. This technology is designed for identification, not for communication. With the help of special readers, a small (up to a thousand bytes) amount of information is removed from the tags, which can be read and rewritten.

The interaction of the near field is as follows. The initiating device works with the target device. With the help of the initiator, a radio frequency field is generated. It provides power to a simple target device, such as a contactless smart card, without a separate power supply.

The main essence of NFC technology is that it enables devices to interact over a longer period of time compared to RFID, but at much shorter distances.

Advantages and disadvantages

Since 1996, the number of bands in use has gradually increased. The most common are the unified world standards EPC Global from 5 to 135 kHz, from 860 to 930 MHz, 13.56 MHz and 2.45 GHz. For each of these frequency bands, the standards are divided between UHF, LF and HF bands.

Using the second generation Gen 2 protocol, which has an increased level of security, several readers can operate at once. They differ in that, in combination with other devices or readers, they can read tags faster and rewrite EPC.

RFID benefits include:

  • High speed of information reading, rewriting and transmission. The reader is able to read dozens of devices within a few seconds. This simplifies the process of collecting the necessary information.
  • Data privacy and security. The recorded information is encrypted thanks to the unique ID-code of the chip.
  • Automatic recording and scanning without human intervention.
  • Fast search for tags at a distance of up to ten meters without the need for line-of-sight, taking into account data recognition through packaging materials.
  • Stability when used in all conditions. Tags are not afraid of high and low temperature changes, moisture, pressure, water, dirt, dust, paints, oils, corrosion.

Major disadvantages include:

  • cannot be used under objects or on packages with a conductive surface;
  • susceptibility to interference from devices that create electromagnetic fields;
  • mutual collisions when several transponders enter the field, which are eliminated by creating special anti-collision algorithms;
  • higher cost of tags compared to barcode labels.

NFC technology was developed on the basis of RFID for the purpose of complex information exchange between process participants. Using an NFC reader, you can receive information from passive tags and write new information to a specific type of RFID tag, regardless of the type of tag, taking into account the use of a standard format.

Devices of this type can function:

  • in the mode of information exchange simultaneously in two directions;
  • in the mode of reading and writing data;
  • by emulating a card, like RFID tags via NFC, being in the field of a device operating on the same technology or on the technology of near contactless communication.

Pay attention! The main difference between NFC and RFID is the method of exchanging information in two directions simultaneously (P2P), implemented using GOST R ISO / IEC 18092 and two protocols (LLCP and SNEP).

The main advantages of this option for reading, transmitting and writing information include:

  • the ability to interact with NFC devices with duplex or two-way exchange;
  • operation at short distances (maximum up to 20 cm), which makes it difficult to intercept confidential data and saves power consumption during a short interaction;
  • versatility, taking into account the ability to replace various contactless technologies in healthcare, banking, trade, consumer electronics, transport, hospitality and other industries;
  • openness and compliance with industry standards;
  • the ability to simplify access to social networks, enter codes and make payments; intuitiveness, taking into account the establishment of communication with a single touch;
  • support for other wireless technologies, taking into account the settings for Bluetooth and Wi-Fi connections.

RFID data collection terminals! Delivery throughout Russia.

Leave a request and get a consultation within 5 minutes.

Please be aware that the transmission speed of Near Field Communications technology is significantly slower when compared to Bluetooth or Wi-Fi. But this is quite understandable, since N FC was created not for high-speed and long-term communications, but for the exchange of short messages. Therefore, if you need not only fast, but also long-term communication, then you need to use such advanced data exchange protocols as Wi-Fi or Bluetooth.

The disadvantages of this technology can be considered:

  • Increased energy dependence. Even in idle mode, the chip needs energy to function. Tethering to a mobile device may cause it to drain unexpectedly while making a purchase or paying for a service.
  • Compulsory preparatory work. Before you perform certain actions, you must first place the chip in the right place and make the correct settings.
  • The impossibility of operational blocking of the function. In case of loss of the smartphone with which the manipulation is performed, blocking it remotely will be problematic.

What are RFID tags

The appearance of RFID tags can be completely different: thick/thin cards, intercom key fobs, bracelets, rings, coins, and even stickers. At the same time, only by appearance it is impossible to unequivocally say at what frequency and according to what protocol the label operates.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

Externally, RFID tags can look different

Often manufacturers of RFID key fobs use the same plastic cases for tags of different frequency ranges, so it happens that two tags that look exactly the same work in different ranges. This is important to consider when trying to determine by eye what kind of mark is in front of you. In this article, we will consider the 2 most popular types of RFID tags that are used in access control systems. Flipper supports both of these ranges.

There are many RFID protocols that operate on other frequencies, such as UHF 840-960 MHz. They are used to track cargo, pay for toll roads, track wild animals during migration, etc. These tags can have their own battery and work at distances from a few meters to several kilometers. At the same time, they are quite rare, and are almost never found in everyday life. We will not consider them in the article.

RFID – Advanced Analysis

RFID is an identification method used in various industries, including pharmaceuticals, agriculture, automobiles, and agriculture.

How RFID technology works

This technology allows users to track their physical assets and manage their inventory. It uses radio waves to remotely identify your assets.

In order for an RFID system to successfully track your assets, it must have the following elements:

  • Reader
  • Antenna
  • Tag

Each tag contains all the necessary data about that particular asset. The reader will send signals through the antennas. After capturing the signals, the tag will respond with all the necessary information about your asset.

You can also integrate software that will allow you to access asset data through your mobile phones. Thus, you will be able to track the status of all your assets within a few minutes.

Understanding the types of RFID tags on the market will help you make an informed purchasing decision. When you decide to buy one for your business, you will come across the following main types:

  • Active RFID tags
  • Passive RFID Tags

Active tags are supplied with a battery that enables them to transmit a signal with a reading range of up to 100 meters. Their wide signal range makes them the best tracking tools for industries with scattered assets.

On the other hand, passive tags do not have a battery. They rely on electromagnetic waves transmitted by an RFID reader. Because of this limitation, passive RFID tags are only useful for close contact tracking (up to 25 meters). There are three main types of passive tags, including:

  • Ultra high frequency (300 MHz to 3 GHz). These tags have a reading range of up to 12 meters and boast fast data transfer. However, their functionality is adversely affected by liquids and metals, as well as other electromagnetic signals.
  • High frequency (3 to 30 MHz). These passive tags have a reading range of 30 cm to 1 meter. They are used in e-tickets and other card payment platforms.
  • Low frequency (30 to 300 kHz). These tags have a reading range of approximately 10 cm and a relatively low data rate. However, they are best suited for metal and water surfaces.

Before you get the perfect RFID tag, make sure you define your needs. Buy only one with adequate reading range to help you achieve your goals.

In addition, it is best to check the suitability of the tag for use in adverse environmental conditions. For example, an Ultra High Frequency tag would not be ideal for use with a metal surface.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

Where to buy NFC tags

NFC tags are readily available at your favorite online NFC store. You can purchase them from their respective dealers or online retailers such as Amazon. If you need wholesale NFC tags, please contact our factory.

Before you buy an NFC tag, make sure you consider all the factors that we have detailed here in order to meet your needs without any disappointment.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

RFID antenna operation in Flipper Zero

Flipper supports low and high frequency marks. To support both frequencies, we have designed a dual-band RFID antenna located on the bottom cover of the device.

For high-frequency protocols (NFC), Flipper has a separate NFC controller ST25R3916. It implements the entire physical part of working with cards: reading, emulation. We have implemented low-frequency 125 kHz protocols completely in software – Flipper “jumps” the foot of the microcontroller for transmission and receives a low-frequency signal through an analog circuit directly to the foot of the GPIO.

From above, the board with antennas is shielded with a ferromagnet layer – it isolates the rest of the electronics from pickups, redirecting the high-frequency field in the other direction, which further increases the operating range.

At the assembly stage, the antenna is glued into the bottom cover of the Flipper and connected to the board through spring-loaded contacts. This greatly simplifies the assembly process, as it does not require the connection of cables or UFL connectors to the antenna board.

Disadvantages of NFC

NFC technology may be too expensive for some companies. A set of related devices and equipment is required. It also includes update-specific standards. Major retailers like Starbucks have already implemented this system into their checkout process. However, for smaller retailers, this is still too expensive. The cost of hiring technicians and software installers can quickly add up. Small businesses need to get creative as they prepare to adopt NFC.

Conclusion

NFC and RFID are required for wireless technology. Many businesses are now using these technologies. Since they perform different functions, you need to determine what your business really needs. This will help you decide which technology is best for your business. If you need something for tracking and access, you might have RFID. However, if you need something that you can use to activate the payment system, you can use NFC. In any case, you should consult with a suitable technical specialist who will help you to use their capabilities.

Near field communication (NFC) works on the principle of magnetic induction. This means that when an alternating current is passed through a wire, it radiates waves of energy at right angles to the wire. They are called electromagnetic fields and they fluctuate or move quickly between two terminals.

The NFC chip emits radio waves at 13.56 MHz. When the waves pass through the antenna in the NFC reader, the signals are transmitted wirelessly.

Information transfer is possible due to mutual induction, when two magnetic fields work together. The device that emits electromagnetic waves is called the initiator, and the device that receives the waves is called the target.

The target device will have a coil of wire that can be recharged with energy from another device as it absorbs electromagnetic waves. The chip inside it transmits its identification number and also receives data from the reader via radio waves.

Because both devices are wireless, they can be used to communicate with each other without the need to connect through cables or wires. Communication between them is carried out in the following format: EXECUTE_TRANSFER. This means sending data from the initiator to receive data in the target. For NFC devices to work, they must comply with a set of standards developed by the NFC Forum as described below:

NFC technology system components

This technology consists of three main components:

  • Reader or initiator
  • Writer or target
  • Card or tags

The initiator is an NFC reader, it will read and write information to the target. It converts radio waves into digital bits and vice versa by emitting its electromagnetic field and receiving incoming waves from another device.

The writer or target receives commands from the initiator and stores the data in a secure key accessible only to the target. This ensures that the data cannot be stolen or changed.

The NFC chip is built into the card/tag, allowing users to access applications or send data by simply touching their smartphone to another NFC-enabled device (eg door, ticket). Using this technology, a smartphone can read and write data using NFC tags.

NFC tags look like tiny stickers and can store both large and small amounts of information. Examples of information that may be stored include, for example, product information, login credentials, website URLs, and contact information.

How it was for me

Having some knowledge in medicine, I decided to do everything myself. Actually, no problems arose 🙂 Those who wish to repeat – for the third time I will suggest re-reading the warning at the beginning of the article.

Under the spoiler are some photos with gloves, band-aids and a little blood

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

We inject novocaine, wait, inject a label, remove excess blood, simultaneously scattering everything around due to the fact that there are only two hands.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

NFC Advantage

No wonder so many companies use NFC technology. Below are some of the well known benefits of using NFC.

What is the difference between NFC and RFID? Are they different at all?

NFC uses the same concept as RFID technology. It is an offshoot of high frequency RFID operating at approximately 13.56 MHz

However, there are some small differences as below:

The main uses of RFID are asset tracking, inventory management, access control, visitor tracking, and tool tracking.

In contrast, NFC technology focuses on secure data transfer. This method is used in contactless payments, data exchange and smart posters.

When using RFID, you must have an RFID tag and a reader. Conversely, an NFC device can play the role of both a reader and a tag. This unique feature enables P2P communication between two NFC-enabled devices.

RFID uses a simple concept where the reader extracts information from a tag. The reader must detect radio waves from the tags to capture data.

NFC is a more sophisticated technology that allows read/write operations. This feature turns your phone into a digital one, providing flawless communication between users.

NFC technology standards

NFC was originally regulated by ISO/IEC 18092 (NFCIP-1). However, the rules have been expanded to include ISO/IEC 21481 (NFCIP-2). The ISO/IEC 15693 and ISO/IEC 14443 standards have also been added to ensure the seamless use of RF communications in functions such as data exchange and logistics management.

In 2004, NXP formed a standards group known as the NFC Forum after the creation of NFCIP-1. He also brought together Sony Corporation and Nokia Corporation to seamlessly integrate the technology into mobile devices.

The NFC Forum has formulated more rules that will allow manufacturers to produce goods that meet the specifications of the NFC Forum. This guarantees interoperability between devices, ensuring that both parties receive optimal benefits from the technology.

Some of the NFC Forum standards include:

  • NFC-A and NFC-B. These standards are in line with the provisions of ISO/IEC 14443 on contactless IC cards. This ensures that user data is protected whenever an exchange takes place.
  • NFC-F. This standard is also known as FeliCa communication technology. It has been designed in accordance with international standards JIS X 6319-4 and ISO/IEC 18092.
  • NFC-V. The NFC Forum developed this standard based on the requirements of the ISO/IEC 15693 standard for wireless communication between devices.

The main role of this standardization is to ensure the compatibility of all international communication devices. Thus, users will be able to use one technology with products from another company.

In addition, NFC is compatible with other wireless technologies such as Bluetooth and password entry. With these compatibility levels, users can access a wider range of features with their NFC-enabled phones.

NFC vs Bluetooth – what’s the difference?

NFC and Bluetooth have a lot in common. Both of them use radio waves at close range to connect devices. However, there are significant differences between these two technologies:

  • Assortment. NFC technology has a very short range, which allows you to automatically pair devices for fast data transfer (approximately 10 cm). Bluetooth has a wider range, allowing devices to connect from a greater distance (up to 10 meters).
  • Security. NFC is more secure than Bluetooth. Security is built into NFC technology, allowing each device to encrypt the data it sends. Even if hackers can intercept your information, they won’t be able to decrypt it because of the encryption.
  • Transmission speed. The speed at which data can be transferred via Bluetooth is higher because it was not designed for mobile devices. NFC devices are very limited in the amount of data they can send and receive, so NFC transfer speeds are much slower than Bluetooth.
  • Operating frequency. NFC uses 13.56 MHz while Bluetooth uses 2.45 GHz to operate. This means that NFC can send and receive more data at a faster rate, making it the best choice for mobile devices.

XNT Glass NFC Tag

It was he at the KDPV. A smooth 2x12mm glass cylinder containing a standard NXP NTAG216 chip and a compact antenna is shipped pre-sterilized inside a special syringe.

This tag was made by the guys from Dangerous Things during the campaign on Indiegogo, which raised more than 30 thousand dollars with the required 8 thousand.

In 2014, after the implantation of EM4100, this chip was found, ordered and successfully arrived by Russian Post to me. It cost $99 then (the same price now) plus $28 shipping.

High frequency cards 13.56 MHz

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

13.56 MHz HF tags consist of a whole stack of standards and protocols – this whole stack is usually called NFC technology, which is not always correct. The bulk of the protocols are based on the ISO 14443 standard – this is the basic set of physical and logical layer protocols on which high-level protocols are based, and based on which alternative low-level standards, such as ISO 18092, were created.

The most common is the implementation of ISO 14443-A, it is used by almost all the travel cards, passes and bank cards I studied.

Rfid nfc what is it and how I implanted rfid in my arm, then nfc. Part 2

Simplified architecture of NFC technology

Simplified NFC architecture looks like this: a transport protocol is implemented on the low-level base of ISO 14443, it is chosen by the manufacturer. For example, NXP has come up with its own high-level transport protocol for Mifare cards, although at the link level, Mifare cards are based on the ISO 14443-A standard.

The flipper is able to interact with both the low level of ISO 14443 protocols, as well as with the data transfer protocols of Mifare Ultralight and EMV bank cards. We are currently working on adding support for Mifare Classic and NFC NDEF protocols. A detailed analysis of the applicable NFC standards and protocols deserves a large separate article, which we plan to do later.

How RFID tags work

The RFID chip turns on when it is powered by the reader’s radio field

An RFID tag usually does not have its own power supply. As long as it is not in the reader’s field of action, the chip inside the tag is completely turned off. As soon as the tag enters the reader’s coverage area, its antenna absorbs the reader’s radiation energy, and power is supplied to the chip. At this moment, the chip turns on and starts communicating with the reader. At the same time, the RFID tag antenna is tuned only to a certain frequency, so the tag can only be activated in the field of action of a suitable reader.

NFC tag components

An NFC tag consists of three main components: a chip, a substrate, and an antenna. Here is a breakdown of the functions of each of the components:

  • NFC chip. This microchip is quite small (it’s the smallest part of the NFC tag). It contains a memory that stores information. It can store a wide range of data such as images, email addresses, phone numbers, and website links. This data is stored in NDEF (NFC Data Interchange Format) format for ease of transfer.
  • NFC antenna. This is the section of the NFC tag that detects or emits radio waves. It is shaped like a coil/loop of wire that is engraved in a strategic place on the NFC tag. If this part is defective, communication will not occur because smartphones will not send and receive signals.
  • Substrate. This is the part that holds the NFC antenna and NFC chip together. This is the largest part of the NFC tag, and it can be in the form of plastic or sticky materials, depending on the type of NFC tag.

NFC tags come in many forms, including NFC stickers, NFC tabs, NFC labels, and NFC discs. This diversity allows you to choose the format that best suits your needs. For example, NFC stickers are perfect for sticking to your desktop to automate tasks.

In addition, you can purchase customized NFC tags. For example, you can purchase NFC key chains, bracelets, and mats.

NFC and Digmus

The Digmus solution was chosen taking into account all the features described above and works in such a way that the use of the system may not affect the final cost of the product for the consumer.

So, for example, NXP’s latest development in the field of radio frequency identification NTAG 413 DNA (NFC Forum type 4) is used as a tag, which allows not only to cryptographically guarantee the authenticity of the goods, but to do this using a regular mobile phone (even iPhone, despite iOS NFC API limitations).

Taking into account the possibilities of guaranteed identification, tracking the route of a product at the level of the Digmus system becomes optional and the decision to use this functionality will lie with the manufacturer and be based on the economic model of each specific product.

Thus, the use of NTAG 413 DNA cryptographic NFC tags in the Digmus system opens up unique opportunities for all users (from the manufacturer to the end user), combining the capabilities of the world’s leading developers of RFID and Digmus technical solutions.

Advantage of RFID

Asset tracking, inventory management, and time savings are just a few of the benefits RFID can bring to your business. This wireless technology offers benefits for all sizes. This allows them to quickly improve efficiency and reduce operating costs by automating the process. Companies with RFID technology can improve asset utilization and quality.

RFID is also the heart of the Internet of Things. Below are some of the benefits of RFID that make it a good investment.

How to check if your smartphone supports NFC

If you are wondering how to check if your smartphone supports NFC, follow these simple steps:

  • Open the “Settings” section on your smartphone.
  • Go to the Wireless & Networks section.
  • Click More
  • If your phone supports NFC, you will see the “More” option.

Alternatively, you can open the “settings section” and search for NFC in the search bar. If it returns NFC application results, then your phone supports NFC.

Using NFC tags

NFC tags have many smart apps to make your life interesting. Some of the unique NFC tag apps include:

Using an NFC chip to invite friends and family to a wedding will leave an indelible mark. These cards have an NFC chip embedded with a unique ID for each invitee.

This app helps improve safety and efficiency for countries. Passports have an embedded NFC label that stores the personal data of the passport holder.

When using these cards, countries can apply anti-counterfeiting features that guarantee high security. It can also help in tracking the time when a visitor visits or leaves any country. What’s more, the tags can be customized to suit your needs.

Simple paper NFC tags can store unique data such as addresses, names, and unique identifiers that help with access control. Tags can be used to track the movement of a specific person in and out of any room.

In addition, these tags can be made into key chains, bracelets, NFC cards, or any other shape for ease of use. Thus, you will always be sure of quick identification of visitors and employees, which will increase security.

You can use NFC tags to automate your home. This allows you to effortlessly perform actions such as opening doors, sharing Wi-Fi passwords, syncing music, and remote desktop launch.

To do this, you can purchase a blank NFC tag and use NFC recording apps to write and store your desired information on the tags.

These NFC-enabled posters help you quickly share information. The poster has an embedded NFC label that contains a URL, video, image, or any other information.

When an NFC-enabled smartphone approaches the poster, the user gets all the information embedded in the tag. These tags can be customized to contain any data, making it easier to advertise.

Leave a Reply

Your email address will not be published. Required fields are marked *