The Global Leading Device Manufacturer of 2.4GHz RFID & UHF
Embedded Rfid Readers Design Tips

May 18,2021.

Public health concerns have put a new emphasis on contactless credentials. The blossoming variety of reader formats complicates the task of reading and verifying IDs.

Contactless credentials can be divided into two categories: soft credentials that include mobile phone apps transmitting data via BLE (Bluetooth Low Energy) or NFC (Near Field Communication), and hard credentials that typically include low-frequency (125 kHz) and high-frequency (13.56 MHz) passive RFID transponders. Security concerns are fostering interest in these sorts of credentialing. Consequently, OEMs and system integrators increasingly must understand subtle aspects of how to choose an appropriate RFID reader.

One concern is that readers be “future proof” or built to sustain technical advances and shifts in market forces. Additionally, customers have varied needs and requirements, particularly those who use contactless credentials. For example, a university will have different security needs than a federal office. Not only do the credentials differ but so, too, does the level of security.

For these reasons, a lot of contactless credentialing installations demand some of level of customization. Such efforts often involve changing or adjusting the output format, adapting hardware to read multiple technologies, and providing a means to update the reading technology after installation. Another common area of customization involves ensuring the system can accommodate future upgrades in security algorithms and data integrity checks, necessary because cryptosecurity methods are rapidly evolving.

The RFID integrated reader itself is typically just a small piece of the puzzle. Usually, the embedded product connects to a host that runs its application which interacts with a back-end system or database. Some instances require a matching of credential IDs that are already part of the end-user database or active directory. In systems where the host application cannot manipulate the reader data, the reader must be able to format its output to help match the credential ID stored in a database.  


There are numerous RF standards and technologies that apply to RFID. Examples include ISO14443A/B, which defines contactless 13.56-MHz cards used for identification and their transmission protocols; ISO 15693, which applies to vicinity cards, cards which can be read from a greater distance as compared with ISO 14443 standard-based cards, and low-frequency cards also widely referred to as “Proximity cards” or Prox cards that may use different modulation schemes such as FSK (Frequency Shift Keying) and ASK (Amplitude Shift Keying).

Here the reader typically provides power to the card via a wireless connection. Examples of RF technologies used in this area include NFC HCE (NFC Host Card Emulation, where an electronic appliance such as a smartphone behaves exactly as a contactless smart card), ordinary passive EM4x02 and Prox tags which operate at 125 kHz, and HITAG tags that also operate at 125 kHz but are memory based. The reader must be able to fully support all such transponders.

RFID readers must not only detect these varying card technologies but also read their data and interact with them. For example, a UID (unique identification number) may serve as a credential ID and in some instances. Memory-based transponders may store the credential ID in their memory. Here the reader must read not only the UID but also the memory segments of the transponder.

Copyright © 2022 Shenzhen Marktrace Co., Ltd All Rights Reserved

  • Facebook
  • Linkedin
  • Pinterest
  • Twitter
  • Youtube

Chat now

live chat

If you have questions or suggestions,please leave us a message,we will reply you as soon as we can!
网站对话