NFC Tag as authentication tool

孤人 提交于 2019-12-06 12:36:57

An NFC tag (as defined by the NFC Forum's Tag Operation specifications) is simple memory without any security mechanisms. Therefore, you cannot protect it from being read and cloned to another tag*.

*) As corvairjo wrote, tags typically have a read-only part that contains a (more or less) unique identifier. However, as opposed to what corvairjo states, this does not really prevent cloning. For most tag technologies, you can get tags that permit overwriting/customization of even that "unique" identifier. Even if no such tags exist yet, it is fairly easy to create a card emulator that emulates such a tag containing the original tag's serial number (such hardware exists, e.g. ProxMark).

Beyond pure NFC tags, some tag manufacturers provide tags with cloning protection. However, in the low cost segment (e.g. the signature feature of the new NTAG series) tags often do not really provide cloning protection (NTAG signature only prevents creation of tags with arbitrary UIDs but does not prevent cloning including the static(!) signature). Still, tags with usable cloning protection do exist.

You could store a number (serial or pseudo random) on the tag. Your app should transmit both that number and the tag's UID to the remote server. That server can then verify whether the two numbers match together. Since the UID is unique to the chip, this prohibits cloning of a tag.

易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!