RFID University

What is RFID Technology - An Overview

BY James Childers

calendar_today   NOV/01/2023
Radio-Frequency Identification (RFID) is a technology that uses radio waves to identify and track objects, animals, or people.  It consists of two main components: an RFID tag or transponder and an RFID reader or scanner. RFID technology has a wide range of applications across various industries and is used for purposes like inventory management, access control, supply chain management, and more. 

RFID Tags Embedded in Credit Cards, Passports and Vehicle Keyless Entry and Push to Start (PTS) Systems 

RFID tags, also known as transponders or labels, are the physical devices that store data and transmit it to an RFID reader.  Credit cards and most modern contactless payment cards use passive RFID (Radio-Frequency Identification) technology.  These cards are equipped with passive RFID chips that allow for contactless payments.  Passive tags do not have their own power source and rely on the energy supplied by the RFID reader to transmit data. They are smaller, less expensive, and have shorter read ranges. Passive tags are commonly used in applications like credit cards, passports, vehicle keys enabling keyless access and push-to-start, inventory management, loss prevention and access control.


The scientific principle that underlies the operation of passive RFID tags, which involves the transfer of energy from an RFID reader to the tag to power it, is known as "electromagnetic induction."

   

Electromagnetic induction is a fundamental concept in physics and electrical engineering, and it is responsible for the generation of an electric current in a conductor when it is exposed to a changing magnetic field, as seen in the RFID tag's antenna when it interacts with the reader's RF signal.


Here's how RFID works in your credit card, passport and other passive RFID tags: 

  1. RFID Reader's Signal: The process begins when an RFID reader emits a radiofrequency (RF) signal. This signal contains energy in the form of electromagnetic waves.
  2. Antenna in the RFID Tag: The passive RFID tag has a built-in antenna. When the RF signal from the reader's antenna reaches the RFID tag's antenna, it induces a current in the tag's antenna due to electromagnetic induction.
  3. Powering the Tag: This induced current provides the necessary electrical power to the RFID tag, activating it. The tag doesn't have its own internal power source (like a battery) but relies on the energy from the reader's signal to function.
  4. Tag Response: Once powered, the RFID tag's microchip becomes active and begins to transmit data. The tag may contain information such as a unique identifier or other data relevant to the item it's attached to.
  5. Reader Communication: The RFID reader then receives the data transmitted by the RFID tag. It can use this information for various purposes, such as identifying and tracking items, or for processing transactions (in the case of credit cards or contactless payment systems).
The key principle here is that the energy from the RFID reader's signal powers the passive RFID tag temporarily, allowing it to respond and transmit its data. This is why passive RFID tags are often used in applications where they don't require a long-lasting power source and where the convenience of wireless, contactless communication is valuable.

RFID Skimming - Where You are Broadcasting Your Data

RFID skimming, also known as RFID data theft or electronic pickpocketing, is a form of unauthorized data theft in which an attacker wirelessly reads the information from RFID (Radio-Frequency Identification) cards, such as contactless credit cards, passport cards, or key cards, without physical contact or consent from the cardholder. The attacker can capture sensitive information, including card numbers, expiration dates, and other data, which can then be used for fraudulent purposes. RFID Skimmers can clone your credit card data, passport, transportation cards, car key fobs and use these to rob you blind.  So, while you are walkiing around about town, an identity thief could be near you with an unassuming backpack or a well-placed static reader could be gathering all of your critical data. 
format_quote
"If we don't act now to safeguard our privacy, we could all become 
victims of identity theft."
Bill Nelson
NASA Administrator

How RFID Skimming Works

RFID skimmers are easy to make, easier to buy, and a hacker could easily scan an RFID credit card while it's in your purse or pocket. This would allow them to steal money or your personal information

  • RFID skimming typically involves the use of a handheld RFID reader or skimming device that can intercept the radio waves emitted by RFID cards.
  • When a person carrying an RFID card with an activated chip is within close proximity to the attacker's skimming device, the data on the card can be captured without the cardholder's knowledge.

Prevent RFID Skimming with IDLokr

IDLokr™ RFID Blocking Products are designed to be a vault for your personal data.  Our Special RFID-blocking Odyssey™ wallets, Affinity™ RFID sleeves, Explorer™ Secure Travel Wallets, Cruiser™ KeyFob holders and Slate™ RFID Bags are designed with advanced RFID blocking materials designed to shield the radio waves, making it difficult if not impossible for skimmers to read your secure data.

Targets of RFID Skimming

  • Credit and Debit Cards: Some credit and debit cards have RFID chips that allow for contactless payments. These are often targeted.
  • Passport Cards: Passport cards issued in most all countries also have RFID chips containing personal information.
  • Access Control Cards: RFID-based access cards used for entry into buildings or facilities.
  • Transportation Cards: Cards used for public transportation payment (e.g., Octopus RFID-based transit cards).
  • Hotel Key Cards: Some hotel key cards use RFID technology.

Just one Example... It is a real threat

April 2023 - Amazon has banned the sale of the Flipper Zero portable multi-tool for pen-testers as it no longer allows its sale on the platform after tagging it as a card-skimming device.  The Flipper Zero is a compact, portable, and programmable pen-testing tool selling for $169 that can help experiment with and debug various digital and hardware devices via multiple protocols, including RFID, radio, NFC, infrared, Bluetooth, and others.
Securing your digital life from identity theft has never been easier. With IDLokr™ line of products, our RFID-blocking technology provides a powerful shield against unauthorized scanning, ensuring your sensitive information remains private and secure. It's a simple and effective way to safeguard your digital profile and protect your identity, allowing you to go about your day with confidence and peace of mind.