Secure UHF Solutions

1st June 2017

Secure UHF Solutions

Secure UHF for contactless technology enables solutions for Industry 4.0, automatic vehicle identification (AVI), access control, asset tracking and innovative ticketing.

As ever more powered devices become connected in the IoT (Internet of Things), there is also a need to connect passive devices without batteries. While existing UHF (Ultra High‐Frequency) solutions communicate in insecure ways with plain text, Secure UHF bridges this gap and connects passive devices in the IoT in a secure manner. Beyond IoT, Secure UHF can also be used in smart mobility applications, such as parking areas or access control, as well as for secure logistics applications, such as asset tracking.

What is the technology behind Secure UHF?

Secure UHF technology is an innovative solution developed by G+D Mobile Security.

G+D Mobile Security has developed a new encryption technology called RAMON, which leads to the standardized ISO 29167–19. This technology is characterized by saving power consumption in the RFID chip, which is essential in UHF technology in order to keep long read out distances.

Unlike existing UHF tags, the data is now transmitted in a securely encrypted manner. This is to prevent unauthorized reading of the data during transmission between tag and reader.

Secure UHF is also based on ISO 18000–6, which is the standard UHF protocol. Therefore, Secure UHF can run in existing ecosystems in parallel with insecure UHF. Furthermore, Secure UHF prevents unauthorized tracking and is enabled with an additional sensor interface.

What are the advantages of Secure UHF?

Secure UHF is a breakthrough in the long‐range RFID, where security until now was not available. Secure UHF combines for the first time the advantages of both technologies: encryption technology known from HF RFID (high frequency RFID) devices and the long read range from insecure UHF RFID devices.

In addition, Secure UHF works with directional antennas, which detect both the position and the movement of tags. The transaction time of approximately 20 milliseconds allows very quick read‐outs. It also provides simultaneous read‐outs of large numbers of UHF tags – so far, more than 400 can be scanned simultaneously within one second. The data on Secure UHF is private and protected whereas current standard UHF tags are insecure.

Article tools:
Share Article:

Stay smart!
Receive the latest insights straight to your inbox