Can you make RFID scanner to detect any 3rd party tags despite countermeasures?

In summary, Team Red wants to create RFID tags that can only be scanned by their own authorized scanners, while Team Blue wants to be able to detect and locate any Team Red tags. The question of who would win in this scenario is uncertain, as Team Red's "security through obscurity" strategy may not be foolproof against Team Blue's ability to detect the tags through the re-radiation of energy. However, if Team Red implements a pass phrase system, the tags may not respond to Team Blue's scanners. Ultimately, it is unknown who would come out on top in this situation.
  • #1
cave_cat
41
0
suppose Team Red wants to make RFID tags that only their own "authorized" scanners can pick up, such as for tagging merchandise in Walmart. Meanwhile Team Blue wants to be able to find any Team Red tags on items or prove that they are not there. They don't need to extract any info from the tags, only establish their existence and hopefully location.

Who would win, now and in the foreseeable future? Can Team Red achieve "security through obscurity" for their tags? Or can Team Blue detect the presence of the miniature chip antennas regardless of manufacturer's countermeasures?
 
Computer science news on Phys.org
  • #2
There could be a type of tag that only responds if it hears a pass phrase. Assuming that Team Blue doesn't have access to the pass phrase, then the tags will not reply to their scanner.
 
  • #3
They would be detectable because the RFID chip antenna re-radiates energy. Light 'em up and triangulate.
 

1. How does an RFID scanner detect 3rd party tags?

An RFID scanner works by emitting radio waves that activate RFID tags within its range. These tags then respond by sending back a unique identification number, which the scanner can read and display.

2. Can an RFID scanner detect any 3rd party tag, regardless of countermeasures?

While most RFID scanners are capable of detecting a wide range of RFID tags, there are certain countermeasures that can be used to block or interfere with the scanner's signal. These include metal shielding, encryption, and jamming devices.

3. What countermeasures can be used to prevent an RFID scanner from reading 3rd party tags?

As mentioned before, metal shielding, encryption, and jamming devices are commonly used to prevent RFID scanners from reading 3rd party tags. Some companies also use specialized tags that can only be read by their own proprietary scanners.

4. Are there any ways to bypass countermeasures and still detect 3rd party tags with an RFID scanner?

There are some techniques that can be used to overcome certain countermeasures, such as using higher frequency radio waves or using multiple antennas to increase the scanner's range. However, these methods may not work in all situations and are not guaranteed to be successful.

5. Is it ethical to use an RFID scanner to detect 3rd party tags despite countermeasures?

The ethical implications of using an RFID scanner to detect 3rd party tags despite countermeasures are a matter of debate. Some argue that it is an invasion of privacy and can be used for malicious purposes, while others believe it is necessary for security and inventory management. Ultimately, the use of an RFID scanner should be carefully considered and regulated to ensure ethical practices.

Similar threads

Replies
7
Views
4K
Back
Top