NFC Tag Authentication Explained - An NFC Pro Tutorial from Seritag

  Рет қаралды 12,277

Seritag NFC Tags

Seritag NFC Tags

2 жыл бұрын

Learn how authentication NFC tags work and how they can help protect brands from counterfeit goods and products.
This is an NFC Pro tutorial from Seritag explaining how authentication NFC tags such as NXP's NTAG424, NTAG223, NTAG224 and NTAG426 differ from standard NFC tags. The tutorial provides information on how they work, how they can be used and why they are being used.
Authentication NFC tags have a wide range of uses including anti-counterfeit and connecting physical assets to NFT's and the Metaverse.
Seritag is a worldwide supplier of NFC tags and products and a market leader in the provision of authentication tags. Our Ixkio tag management platform is specifically designed to allow companies to leverage the power of both standard and authentication tags quickly and easily.
Authentication NFC tags provided by seritag.com
Authentication tag management software by ixkio.com
00:10 - Standard v. authentication chips
00:46 - How auth tags work
01:35 - Encoding authentication tags
03:23 - Three ways to use auth tags
04:14 - Using an API
05:09 - Using a Redirect
06:00 - Using Direct Response
06:26 - Why use Authentication NFC tags ?

Пікірлер: 9
@baiomarlaye3165
@baiomarlaye3165 Жыл бұрын
This is the best explanation I've found so far thank you
@user-rl6tw4ds8j
@user-rl6tw4ds8j 6 ай бұрын
Loving the info. Can I get in touch with one of your reps ? Wanting to talk about possibilities with the NFC garment labels for my clothing business.
@SeritagNFCTags
@SeritagNFCTags 6 ай бұрын
Sure. Just drop an email to mail@seritag.com and we are happy to help.
@fuji_hakayito
@fuji_hakayito Жыл бұрын
Where can i read more on how the decryption works? How to decrypt the url sent to the server, back to the parameters/variables that can be checked with an MySQL database?
@SeritagNFCTags
@SeritagNFCTags Жыл бұрын
There's information on how to do this within the NTAG424 datasheet. Alternatively, you can use an API service such as ixkio.com
@gypsydog7092
@gypsydog7092 2 жыл бұрын
Can these authentication nfc tags also be used as a proof of presence ? For example if they were placed in locations around a building could they ensure that a user was actually next to the tag when it was scanned ?
@SeritagNFCTags
@SeritagNFCTags 2 жыл бұрын
They can. As auth NFC tags can't be copied, it's possible to use them as location points and proof of presence. This makes them more suitable than standard NFC tags or QR codes for security/round management. We've already done a number of projects where authentication tags have been used like this. For example, we had a construction company using the tags as 'touch' points on heavy machinery. By attaching the touch points at various locations around the machines, the operator had to physically scan them as they inspected the equipment. The authentication feature acted as additional level of security and aided compliance reporting. The implementation can be the same as any other - typically redirection or API.
@1RACKZ
@1RACKZ Жыл бұрын
is there any way to bypass or fake authentication?
@SeritagNFCTags
@SeritagNFCTags Жыл бұрын
Simple question but a complicated answer. With regards the tags themselves, then essentially no. Without having the encryption keys then it's safe to say they couldn't be 'faked'. However, a lot will depend how you configure your setup. For example, assume if you scan the tag, hits a script to check if the tag is authentic and then - if good - redirects to an 'authenticated' page. That page needs to be publicly visible and therefore someone could copy that page and put a link to it directly on another tag. Someone scanning the new tag could then be directed to go straight to the 'authenticated' page - a fake authentication. Therefore, you need to design the landing page, etc, in a way to prevent that (for example ixkio.com uses a traceback system to prevent unwanted direct hits). There is also the risk of one-time authentication link copy. This is a relatively simple problem and low risk. We've put an explainer to this on Seritag at : seritag.com/qa/what-is-onetime-link-fraud-on-authentication-nfc-tags
Passwords vs. Passkeys - FIDO Bites Back!
11:05
IBM Technology
Рет қаралды 36 М.
ОСКАР ИСПОРТИЛ ДЖОНИ ЖИЗНЬ 😢 @lenta_com
01:01
Incredible magic 🤯✨
00:53
America's Got Talent
Рет қаралды 67 МЛН
Was ist im Eis versteckt? 🧊 Coole Winter-Gadgets von Amazon
00:37
SMOL German
Рет қаралды 37 МЛН
Hacking Through the Air | Contactless Payments and NFC
24:14
I created my own NFC Business Card - Here's what happened...
11:40
NFC Tag scan distances compared - A Seritag NFC Pro Tutorial
4:11
Seritag NFC Tags
Рет қаралды 10 М.
What is the Difference between RFID and NFC?
6:32
Blue Bite
Рет қаралды 222 М.
NFC vs. RFID: What’s the Difference?
2:47
Eye on Tech
Рет қаралды 118 М.
ETRNL VAULT - Getting Started with NFC Authentication
15:50
ETRNL VAULT
Рет қаралды 1,5 М.
How Does a Hardware Security Key Like YubiKey Work?
11:17
Ask Leo!
Рет қаралды 32 М.
APIs Explained | Real World Examples
11:36
CertBros
Рет қаралды 494 М.
Klavye İle Trafik Işığını Yönetmek #shorts
0:18
Osman Kabadayı
Рет қаралды 1,2 МЛН
OZON РАЗБИЛИ 3 КОМПЬЮТЕРА
0:57
Кинг Комп Shorts
Рет қаралды 1,6 МЛН
$1 vs $100,000 Slow Motion Camera!
0:44
Hafu Go
Рет қаралды 12 МЛН
КРУТОЙ ТЕЛЕФОН
0:16
KINO KAIF
Рет қаралды 4,9 МЛН