UCODE DNA Advantages for Not Getting Hacked!

By Michael Hrabina | RFID

UCODE DNA Advantages for Not Getting Hacked

Not long ago, integrators implementing secure RFID based systems were forced to make a mutually exclusive decision between the advantages of a having a long read range and the data protection provided by cryptography.   As a result, whenever security became the primary purpose of the system, integrators were limited to using a short-range reader.

NXP’s introduction of UCODE DNA addressed this dilemma, combining long-range contactless performance of a RAIN UHF RFID transponder with cutting-edge cryptographic security implementation for tag authentication.  In doing so, UCODE DNA simultaneously alleviated one of the biggest threats companies face when implementing RFID in access control, ticketing, fare collection and anti-counterfeiting applications.  Getting hacked.

Data security is as big a concern as the physical security.  Not only do integrators need to worry about protecting the data used in their system, but client data is often carried in a tag and can be compromised as well.

Should a bad actor obtain access to equipment, they can also potentially discover the location of your readers and thereby its users.  You don’t want just anyone gaining access to your equipment, and you definitely don’t want your information and location compromised either.

UCODE DNA is one of the only tags that keep both your data and your location private with a mutual authentication technique that not only prevents unauthorized access, but detect if it is happens.   

AES Encryption

A 128-bit AES encryption key stored in the tag and reader ensure privacy and unauthorized access.  Matching keys between the tag and reader are required to read and modify the tag’s data content, including the electronic product code (EPC).  Further, the tag can remain completely unresponsive to a query issued by an unauthorized reader.

While UCODE DNA has certain useful proprietary features, it is based on the International Standard, GS1 UHF GEN2 v2.0 air protocol.  While many commercially available readers support this standard, the process of securely injecting the encryption key and protecting it within the reader.

capable of securely storing the key, detecting possible tampering of the hardware and preventing . 

FEIG ELECTRONIC is one of the few reader manufacturers that support these features to meet the highest level  security requirements.  This means that the likelihood of piracy and use of counterfeit transponders is eliminated.

For Military Use

Supply chain logistics is strategic in every sense of a military deployment, yet marking assets with a long-range wireless data carrier exposes them to possible surveillance.  Unlike other RFID tags used for inventory control and asset tracking that respond to data request from any reader, UCODE DNA tags will stay completely silent to unauthorized radio queries making them so secure, they can be applied to military use without compromise.

Defense departments, agencies and their contractors can track parts, inventory and equipment (including weapons) with UCODE DNA RAIN RFID tags; with encryption turned on they cannot be fraudulently activated and they won’t identify the location of the military personnel.   This keeps everyone’s location secure and equipment even more secure against possible hackers and threats.

In less life threatening situations, the user can opt not to have the tag “talk” or send signals. The asset tracking will have less possible interactions or interference from other readers or applications than the specified reader.

No RFID Blockers Required

Since the technology in the tag requires readers to authenticate their sessions before access is granted, you won’t need an RFID blocker. Even if you have the older technology, you’ll be able to update your cards’ firmware in order to use this technology.

Plus, when it comes to encrypted information, RFID blockers aren’t always considered the best technology. Though it’s been used since the 1960s, it’s not secure enough for industries that need more security and encryption. Hackers can certainly (and have) hacked RFID blockers — and have the technology to continue doing so.

Reads UCODE DNA Protocol

FEIG ELECTRONICS is one of the few RFID reader manufacturers that fully supports UCODE DNA Protocol. This long-range capacity can track users within a larger setting (such as entering or exiting a building) without fumbling for a card. It also can track users in a smaller setting (such as granting access to secured areas within floors) without compromising the security or privacy of each user.

The RFID tag uses Advanced Encryption Standards (AES). Each tag is equipped with a 128-bit secret key.

It also is in compliance with the GS1™ UHF RFID Gen2 v2.0, another powerful option for enhanced security. This also aids in counterfeit prevention. The proof of origin is monitored by ISO/ IEC29167-10 and is also up to AES.

All of our readers and cards are manufactured in Germany and were developed for all three frequency ranges.

About the Author

Michael Hrabina- Global Product Marketing Manager at FEIG ELECTRONICS

>