Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Shopping for RFID

By John Mesenbrink
October 29, 2002
Radio frequency identification is becoming the technology of the future. Take an in-depth look at why radio waves are in demand.


Would you like fries with that? One swipe of a Mobil SpeedPass tag, for instance, and you can pay for gas and your next meal at McDonalds. You see its use more and more. RFID technology has been taken to the next level; with applications and advancements ever increasing, the future looks bright for radio frequency identification (RFID). Retail giant Wal-Mart is piloting RFID tags at its stores and plans to introduce the asset tracking technology into the UK shortly. Radio frequency identification (RFID) is an advanced automatic identification technology used to identify, track, sort and detect an infinite variety of objects, including people, vehicles and objects, thus making it multi-functional. “The performance of RFID has grown so that you can grow beyond your core applications,” says Doug Karp, senior director for operations and business development, RFID products group, Checkpoint Systems, Thorofare, N.J. “You’ll see RFID in new applications beyond basic access control.”

Why RFID?

“RFID is certainly a technology that can help solve some of the issues that homeland security is facing. RFID offers the ability to passively read and get data that you couldn’t get before. For example, with today’s technologies, if you have a package coming in through customs and you want to know what is in it quickly, you would have to open the package, count items, read barcodes and scan. With RFID, in theory, you can keep that package closed. Because everything would be tagged inside it, you could pass it through a tunnel or a reader of some sort and read what is inside that package. Also, you can read multiple items at the same time,” offers Karp. RFID benefits the end user, especially in access control situations, similarly to other automatic identification technologies in that it reduces the need to manually collect data. The system consists of two major components—the reader and the card/tag. RFID relies on radio frequency waves between a card or tag and a reader in order to make an identification. While RFID has its advantages, the technology will continue to flex its muscles in areas of memory capacity, read area reach and processing speed. The read/write capability of an active RFID system is also a significant advantage in interactive applications. Although currently it is a more expensive technology than, say, bar code, RFID has become a mainstay for facilitating data collection and ID applications. Also, “Integration of RFID systems is relatively painless. And there is a huge expense for changing mag stripe readers when they wear out. With contactless, there is never a fee because there are no moving parts. If an end user wanted to buy RFID system, they could have it up and running as soon as the systems integrator could physically integrate the system,” says Jeremy Wyant, RFID product manager, NTRU, Burlington Mass.

Another important benefit of RFID is the read/write capability of the tag in asset tracking, meaning new information can be added to asset tags. The whole history of a product will be available at your fingertips, allowing the benefits of RFID asset tracking to extend into areas like service and warranty tracking and automatic product returns. It is unlikely that the technology will ultimately replace barcode—the integrated circuit in an RF tag will never be as cost-effective as a barcode label.

It Makes Sense

Because RFID is a contactless technology, it requires neither contact with a reader—magnetic stripe technology—or a direct line of sight to a reader—bar code technology. RFID, therefore, reduces the problems associated with contact or line-of-sight technologies. The reader emits a low-level radio frequency magnetic field that energizes the tag. The tag then sends back identification data stored in its integrated circuit (IC). This data is decoded by the reader, which either grants or refuses accessibility depending on whether the identification data being sent matches user information stored in the host database. “We tend to think it is better to keep less information on the card and more information in your software database because that gives you more protection,” says Karp.

However, since RFID is an ever-emerging technology, it does not enjoy the depth in product offering found with the other older technologies like bar coding or electronic article surveillance (EAS). According to AIM and its Association for Automatic Identification and Data Capture Technologies, Pittsburgh, Penn., “RFID will continue to grow in its established niches where barcode or other optical technologies are not effective. If some standards commonality is achieved—whereby RFID equipment from different manufacturers can be used interchangeably—the market will very likely grow exponentially. It is uncertain whether RFID will cost cut and ultimately replace other methods of technology, such as bar coding. But it is quickly making strides, as evidenced by some of the major players creating better RFID systems.”

RFID tags are distinguished either as passive or active. Active tags have a battery in the tag and it acts as a transmitter. If you need long ranges, you put a battery in the tag. An active tag gets its energy from a battery and then can transmit a signal over longer ranges. Also, AIM reports, “Passive tags don’t have a battery, whereby getting its energy from the reader. RFID systems are also distinguished by their frequency ranges. Low-frequency (30 KHz to 500 KHz) systems have short reading ranges and relatively cheaper in price. They are most commonly used in security access, asset tracking, and animal identification applications. High-frequency (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) systems, offering long read ranges (greater than 90 feet) and high reading speeds, are used for such applications as railroad car tracking and automated toll collection. However, the higher performance of high-frequency RFID systems are more expensive.”

And, “Interest in higher levels of security and stronger meth-ods of authentication increased due to the events of the last year, particularly in government agencies and corporations. These entities often have multiple sites, use systems of different types or ages and have implemented a photo ID policy,” says Debra Spitler, vice president of marketing, ASSA ABLOY Identification Technology Group (ITG). HID Corporation’s iCLASS, a 13.56 MHz, read/write, contactless smart card technology, enables employees to use a single card for multiple applications including access control, IT secure authentication, cashless vending and health record storage. By incorporating multiple technologies into one card, users have the ability to leverage their existing investment in various systems. In addition, the ability to store a biometric template on a contactless smart card is a significant technological advancement that has seen increasing interest since 9/11/01. HID has teamed up with Bioscrypt, Sherman Oaks, Calif., in the development of the V-Smart iCLASS to ensure that traditional access control customers can use a biometric product that offers one-to-one biometric template authentication and user convenience. These two features support the markets’ requirement for fast throughput and individual privacy. The dual template enhancement solves the occasional inconvenience caused by a dirty or injured finger, or even a bandage, because each participant can use either of the two fingers enrolled in the system. V-Smart iCLASS, a two-in-one reader solution, supports dual fingerprint templates and multiple application contactless smart cards. At the current time, Bioscrypt has integrated iCLASS technology into a biometric fingerprint reader, and Recognition Systems, Camarillo, Calif., has integrated iCLASS into a hand geometry reader. The system can be easily integrated with other technologies. The iCLASS enables customers to upgrade existing proximity or mag stripe systems over time. In some cases, customers may use proximity/mag stripe technology in an existing building and use iCLASS technology in a new building.

It’s in the Cards

RFID ubiquity will create a forum for counterfeiters and criminals. If there is no mechanism to ensure that transmitted information has not been tampered with, hackers could easily change it. Manufacturers need to ensure that their RFID application is part of a trusted environment by guaranteeing confidentiality, authentication, integrity and non-repudiation. Such a guarantee is possible with the integration of a PKI (public key infrastructure). NTRU, Burlington, Mass., is a cryptography provider of technology that can provide this level of security for RFID. As RFID applications proliferate, and more high-value transactions are performed using these applications, the need for powerful security increases. NTRU provides security services tailored to meet the robust requirements of RFID and contactless applications, including a cost effective token and reader technology.With NTRUSign, RFID applications benefit from authentication capabilities, which ensure that the tag, reader and/or system component is who or what they claim to be and that the transmitted data have not been altered. NTRU technology also provides for confidential transaction and new audit capabilities that create digitally signed records of each and every transaction. NTRU develops powerful, fast security that, due to its small footprint, is uniquely suited to secure space-constrained environments such as contactless smart cards, radio frequency identification tags and wireless devices. NTRU shares in the vision of enabling an interoperable platform for the delivery of next-generation products and services based on smart card technology, offers Michael Yaffe, senior communications manager, NTRU.

All RF data transmission between the card and reader is encrypted using a secure algorithm. By using industry standard encryption techniques, HID’s iCLASS, for example, reduces the risk of compromised data or duplicated cards. Access to data stored on the cards is protected by 64-bit keys, which can be further customized by the end-user with an iCLASS programmer. Even if the unauthorized person obtains an iCLASS reader, without the keys, the reader will not authenticate with the card and data will not be transmitted. For even higher security, card data may also be protected with DES or triple DES encryption. With iCLASS, the transaction between the card and reader can not be sniffed.

On the Market

End users in various vertical markets are looking for every advantage they can get as a result of last year’s terrorist attacks. At the recently held Airport Security Expo in Las Vegas, Applied Digital Solutions and its VeriChip Corporation featured its VeriPass and VeriTag. These new applications will allow airport and port security personnel to link a VeriChip subscriber to his or her luggage—both during check-in and on the airplane—flight manifest logs and airline or law enforcement software databases.

Commenting on VeriChip’s participation in the Airport Security Expo, Scott R. Silverman, president of Applied Digital Solutions, says, “VeriChip can assist in assuring the public that only authorized personnel gain access to certain sensitive areas of airports and even the cockpits of airplanes. Since VeriChip’s personal verification technology can’t be lost, stolen, tampered with, misplaced or counterfeited, its secure personal verification system should be incorporated into our national airport security initiatives.” VeriChip is a miniaturized radio frequency identification device that can be used in a variety of security applications. About the size of a grain of rice, each VeriChip product contains a unique verification number and will be available in several formats, some of which will be insertable under the skin, which, by the way, is in the works to track a patient’s medical status.

In the security field, the company is actively developing applications for VeriChip in a variety of security, defense, homeland security and secure-access applications.

These opportunities include using VeriChip to control authorized access to government installations and private-sector buildings, nuclear power plants, national research laboratories, correctional facilities and sensitive transportation resources. VeriChip can enhance airport security, airline security, cruise ship security, intelligent transportation and port congestion management. In these markets, VeriChip could function as a stand-alone, tamper-proof personal verification technology or it could operate in conjunction with other security technologies such as standard ID badges and advanced biometric devices.

Frost & Sullivan reports that by 2006, 80 percent of the access control market will be RFID-based. With over

180 million RFID tags deployed worldwide and approximately six million Exxon/Mobil Speedpass users, Texas Instruments Radio Frequency Identification Systems (TI-RFid), Dallas, Tex., is making a huge splash in the industry with its line of 13.56 MHz reader and card security systems for access control. TI’s vicinity cards and S6400 reader series bring a new level of security to the market with 2000-bit programmable memory, unique and secure identification, at a cost comparable to traditional proximity cards. TI-RFid 13.56 MHz access control cards and readers are compliant with the ISO 15693 vicinity card standard offering security and access control providers increased security and authentication, at-the-door read-write programmability, interoperability across all suppliers and applications and multiple card reading capability. “As a pioneer in 13.56 MHz technology, TI has deployed more than 180 million tags worldwide in a range of RFID applications,” said Bill Allen, eMarketing manager, Texas Instruments RFid Systems. “We’re now bringing our wealth of experience to the security and access control industry.”

TI-RFid’s line of cards and badges provide factory-programmed ID, which cannot be duplicated, ensuring that no two cards or people are misidentified. With more than 2000 bits of data, the cards hold 50 times more data than traditional 125 kHz solutions. The data is written and stored directly on the card, independent from a host system, allowing employees to carry vital information such as authorization codes, certification or emergency medical histories. TI’s cards also provide the capacity for stronger encrypted security and the data capacity to use the ID cards beyond just facility access for other solutions, such as biometrics and wireless financial transactions.

Secura Key, Chatsworth, Calif., has a new generation of high frequency 13.56 MHz readers for use with access control systems. These new e*TagT proximity readers work with a variety of contactless smart cards and key fobs that meet ISO 15693 and ISO 14443 A/B standards.

Communicating 100 times faster than traditional 125 KHz proximity readers, e*TagT offers multiple card reads, read/write applications, custom card encoding and many other benefits. Designed to work with Tag-It transponders from Texas Instruments, e*Tag units can read multiple transponders in a field.

In full deployment, AXCESS RFID technology provides security features ranging from facial verification, badge-controlled access to facilities or areas within facilities, asset monitoring, and video surveillance with analytical capabilities. AXCESS manufactures RFID tags that will signal an alarm if tagged assets are removed from designated areas and will track their movements throughout a facility.

Checkpoint Systems, Thorofare, N.J., offers an entire family of RFID products, including low-cost 13.56 MHz tags with read-only or read-write capability, which offer significant capacity in a variety of tag configurations, readers designed to maximize read range for both fixed and portable applications and open architecture application programming interface (API) software for integration with existing systems.

Zebra Technologies offers the Zebra R402 RFID smart label printer/encoder, a tool for both printing and programming 13.56 MHz smart labels, tickets and tags. This printer/encoder delivers the enhanced tracking, inventory management and authenticating benefits of radio frequency identification (RFID) technology.

“The RF402 can print bar codes, human-readable text, and graphics on the label surface. It also can read, encode and verify information programmed to the ultra-thin RFID transponder embedded inside the label,” says Matt Ream, Zebra’s senior product manager for RFID systems.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Contactless keycard

    Improves Distance and Speed for RFID Locking Systems

    See More
  • Security Services

    Combines Video and RFID Data for Business Insights and Loss Prevention

    See More
  • fingerprint1-900px.jpg

    Wisconsin Company Pilots RFID-Microchip Implants for Employees

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing