Different types of RFID tags

by Anceline Aprilia Yolanda NIM : 2301888442

Since rewritable RFID tags come in so many varieties, it’s impossible to provide detailed usage instructions. Users may generally encode a serial number in a transponder and/or write data into a user memory block using the software offered by most readers’ manufacturers, on the whole. Locking the serial number is a common practice. You may be able to transmit a code to unlock the memory and write a fresh serial number, or it may be permanently locked.

You may be able to permanently or temporarily lock user memory depending on the chip used and the standards to which that chip adheres. Using your reader’s program, you may choose the user memory block, input the data you wish to save, and then write it to the transponder’s user memory if the memory is unlocked. In order to write fresh data, you must first unlock the memory by entering a serial number.

Most RFID transmission methods currently use unencrypted data transfer between the RFID reader and the tag. However, the growing needs for security in areas such as healthcare and homeland security are beginning to alter this trend.. Supply chain management, medical specimen monitoring for healthcare, border security, library system, and smart shelf use RFID technology that necessitates a level of security for permitted access to the system.

Medical RFID has seen rapid expansion in the last several years. Confidential information, such as a patient’s personal name or medical problems, must be kept private and secure by law. Healthcare providers are required by law to maintain patient data’s security and privacy under the Health Insurance Portability and Accountability Act of 1996 (HIPAA). RFID systems may be used in hospitals to identify patients and specimens, but only if the information contained in a tag is entirely safe and protected. Using an RFID wristband, the nursing staff may quickly identify a patient and give necessary medical care by recording information about the patient’s health, such as an emergency contact number, on the wristband. In addition to alleviating the nursing staff’s burden, such a method reduces the risk of medical mistakes. Because of this, the wristband’s data might still be hacked or tampered with remotely, which could have catastrophic implications. Using a portable RFID reader that operates on the same frequency and protocol as the tag, the original data may be replaced. There are many methods for preventing the theft and change of patient data inside a tag, such as storing merely a tag ID that is worthless to any non-authorized user.

References

Mark Roberti, Founder, and Editor, RFID Journal. (2014). RFID Journal. Retrieved from rfidjournal.com: https://www.rfidjournal.com/question/how-can-i-program-a-rewritable-rfid-tag

Pais, S., & Symonds, J. A. (2011). Data Storage on an RFID Tag for a Distributed System. International Journal of UbiComp, 26-27.

RFID Journal. (n.d.). RFID Journal. Retrieved from rfidjournal.com: https://www.rfidjournal.com/faq/whats-the-difference-between-read-only-and-read-write-rfid-tags

Yang, C.-C. O., Prabhu, B. S., Qu, C., Chu, C.-C., & Gadh, R. (2009). Read / Write Performance for low memory passive HF RFID. Journal of Theoretical and Applied Electronic Commerce Research, 2.

 

Dicky Hida Syahchari