Menu Close

「HAKO-FLO」- RFID Technology Overview

— Newsletter Archive: Newsletter Vol. 7, 2024/2/14 —

In previous newsletters, we have introduced the use of the HAKO-FLO logistics management solution.
In this newsletter, we will go over the Radio Frequency IDentification (RFID) tag technology used by HAKO-FLO and the features of RFID technology that are often inquired about by our customers.

PAT. P

(1) Features of RFID Technology
RFID is the generic name for a technology that uses short-range wireless communications to exchange information with a special tag (commonly known as an RFID tag) that contains data such as ID information in a contactless manner. It is known as one of the automatic recognition technologies that read data from RFID tags and recognize their contents without human intervention.

A dedicated tag is called an RF tag, RFID tag, or IC tag, and consists of an IC chip that can write data, an antenna, and PET film. The reader/writer, which is a dedicated reading device, enables short-range wireless communication between the tag and the reader/writer, allowing information to be exchanged.

Picture 1 – RFID tag structure (Source: TOPPAN Edge Inc.)

Typical RFID features include:

  • Readable from a distance
    RFID can read data from a distance of several meters to several tens of meters.
  • Readable from outside the box
    RFID can read data even in the presence of obstructions as long as the communication is within range.
  • Resistant to smudges
    Since the tag does not read the indication on the surface of the tag, data can be acquired even if the RFID tag is dirty.
  • Multiple tags can be read at once
    RFID can scan multiple RFID tags at once.

However, RFID has the following weak points that need to be considered:

  • Read range
    RFID tags that are not wanted to be read may be read if they are within range of radio waves.
  • Cost
    RFID implementation involves the cost of purchasing data management services, readers/writer devices, and RFID tags.
  • Read accuracy
    RFID tags may not communicate properly in certain environments, such as when placed near metal objects, which can interfere with communications, or when affixed to objects that contain a lot of moisture, which can reduce accuracy.

(2) RFID tag types
There are two types of RFID tags: passive and active. Each tag type is classified according to whether or not the RFID tag itself transmits radio waves.
Active RFID tags have an internal battery that transmits radio waves to enable wireless communication over long distances (tens of meters), but they are relatively expensive and require battery maintenance.

Picture 2 – Concepts of Passive tags and Active tags

Passive tags do not have an internal battery and use electromagnetic waves from an RFID reader/writer, so they can be made smaller and thinner, and can be used semi-permanently as long as the RFID tag is not damaged. Passive tags do not emit radio waves themselves, so the communication distance is shorter than that of active tags, at a few meters.

(3) RFID Standard
RFID is a technology that uses radio waves to exchange information. Its standards are set at various levels, including uniform international standards, industry-specific standards, and regional standards. Each standard has different characteristics and requirements, such as specific frequency bands, transmission distances, data transfer rates, and energy requirements, enabling RFID technology to be widely used in a variety of industries and applications. Typical international RFID standards include:

  • ISO/IEC 18000 series
    The ISO/IEC 18000 series is the most widely referenced of the RFID wireless interface standards, ranging from 125 kHz to 2.45 GHz, with read ranges from a few centimeters to tens of meters, and including active as well as passive tags.
  • EPC Gen2 (860 to 960 MHz)
    EPC Gen2 is the first generation standard for Class 1 UHF RFID air interface developed by EPC Global and is partially compliant with ISO18000 above.

Frequency bands include 130-135 kHz, 13.56 MHz, 433 MHz, 900 MHz, and 2.45 GHz. In general, communication in low frequency bands is mainly performed by electromagnetic induction, which has a short communication distance but is not easily affected by moisture. The high-frequency band is mainly used for radio wave communication and has a longer communication distance, but is more susceptible to moisture and metals.
In order to use RFID in Japan, the product must have a mark certifying that it conforms to the technical standards set forth in the Radio Law, commonly known as the “Gikitei Mark”.

(4) RFID identification codes
To recognize RFID tags that are read wirelessly, an identification code is used as information to identify each RFID tag. EPC (Electronic Product Code), which is defined by ISO/IEC 15459 and GS1, which is promoting standardization to improve efficiency and sophistication of business activities centering on distribution, is an identification code widely used around the world. EPC is based on GS1 identification codes, which have been used mainly in barcodes, and can also be used in RFID.
The GS1 identification code has a clear purpose and its specifications are publicly available, making it an easy code to use as a unique identification code for RFID. Most of the GS1 standards conform to ISO international standards, and the GS1 identification code conforms to the unique identification code defined in ISO/IEC 15459. Therefore, the GS1 standard is based on the ISO international standards.

(5) Security Risks of RFID
RFID tags can be read by anyone with an RFID reader as long as they are within radio range. While it is convenient to read RFID tag information from a distance even if the tag is shielded, it is also possible for an unintended third party to read the information on the RFID tag.
RFID tags are generally identified by an identification code to determine whether they are the RFID tags that your company needs. By using a standardized recognition code, the system can identify RFID tags other than the one used by the company so that it can distinguish between RFID tags that can be read and those that can be read.
RFID tags have multiple memory banks within the IC chip and they can set to read-only, which means that the information on the RFID tag cannot be rewritten.

RFID tags are characterized by the fact that anyone can read their information, but they also have a mechanism to encrypt specific areas within the IC chip and set it so that an unspecified third party cannot read the contents. Since the contents of encrypted data cannot be known without a key to decipher it, depending on the purpose of use, it may be possible to increase confidentiality by encrypting a portion of the data. However, encrypting data and decrypting encrypted data each require special processing and depend on the processing power of the CPU, etc. Therefore, data encryption should be carefully considered according to the intended use of the RFID tag.

We offer this highly effective technology as an easy-to-use service called “HAKO-FLO”. If you have any questions or concerns about logistics management, please feel free to contact us for consultation and support from implementation consulting to actual operation.


To Inquiry Page