What is RFID Technology - An Overview
BY James Childers
RFID Tags Embedded in Credit Cards, Passports and Vehicle Keyless Entry and Push to Start (PTS) Systems
The scientific principle that underlies the operation of passive RFID tags, which involves the transfer of energy from an RFID reader to the tag to power it, is known as "electromagnetic induction."
Electromagnetic induction is a fundamental concept in physics and electrical engineering, and it is responsible for the generation of an electric current in a conductor when it is exposed to a changing magnetic field, as seen in the RFID tag's antenna when it interacts with the reader's RF signal.
Here's how RFID works in your credit card, passport and other passive RFID tags:
- RFID Reader's Signal: The process begins when an RFID reader emits a radiofrequency (RF) signal. This signal contains energy in the form of electromagnetic waves.
- Antenna in the RFID Tag: The passive RFID tag has a built-in antenna. When the RF signal from the reader's antenna reaches the RFID tag's antenna, it induces a current in the tag's antenna due to electromagnetic induction.
- Powering the Tag: This induced current provides the necessary electrical power to the RFID tag, activating it. The tag doesn't have its own internal power source (like a battery) but relies on the energy from the reader's signal to function.
- Tag Response: Once powered, the RFID tag's microchip becomes active and begins to transmit data. The tag may contain information such as a unique identifier or other data relevant to the item it's attached to.
- Reader Communication: The RFID reader then receives the data transmitted by the RFID tag. It can use this information for various purposes, such as identifying and tracking items, or for processing transactions (in the case of credit cards or contactless payment systems).
RFID Skimming - Where You are Broadcasting Your Data
How RFID Skimming Works
RFID skimmers are easy to make, easier to buy, and a hacker could easily scan an RFID credit card while it's in your purse or pocket. This would allow them to steal money or your personal information
- RFID skimming typically involves the use of a handheld RFID reader or skimming device that can intercept the radio waves emitted by RFID cards.
- When a person carrying an RFID card with an activated chip is within close proximity to the attacker's skimming device, the data on the card can be captured without the cardholder's knowledge.
Prevent RFID Skimming with IDLokr
Targets of RFID Skimming
- Credit and Debit Cards: Some credit and debit cards have RFID chips that allow for contactless payments. These are often targeted.
- Passport Cards: Passport cards issued in most all countries also have RFID chips containing personal information.
- Access Control Cards: RFID-based access cards used for entry into buildings or facilities.
- Transportation Cards: Cards used for public transportation payment (e.g., Octopus RFID-based transit cards).
- Hotel Key Cards: Some hotel key cards use RFID technology.