HID

RFID viruses pose no threat for Access Control applications

"RFID is a broad term that encompasses everything from simple devices that contain a few thousand transistors and feature little or no security to contactless smart cards which are tiny computers that contain several million transistors and incorporate military grade security," said Peter Lowe, Chief Technology Officer for HID Global, the premier manufacturer of contactless access control cards and readers for the security industry, in response to recent claims that RFID technology can spread viruses.

The current research on RFID viruses' focuses on read/write RFID tags used for such applications as animal tagging and product identification in retail, and asserts that readers could interpret data stored on RFID cards as executable instructions.  According to Lowe, the reality is that readers never interpret the contents of a card as executable code; they always interpret the contents as data only.

Lowe added that some smart cards do use read/write technology, such as those using HID Global's iCLASS® technology.  "The benefit of this technology lies in the enhanced security it offers through encryption and mutual authentication, making it less susceptible to tampering.  Other techniques such as the use of digital signatures can be employed to verify the authenticity of data on a card and that the data came from a trusted source," he said.

Lowe also cited statements made by RFID scientists and experts from the International Organization for Standardization (ISO) at a recent AIM Global meeting in Kyoto, Japan.  The scientists and experts, responding to the research, emphasized, "that there are two broad types of RFID tags, ones that have pre-encoded, or fixed data, and ones that have data that can be changed.  Systems with fixed data such as those used to identify pets cannot be changed and therefore are immune to infection by a virus."

Furthermore, most readers that control doors remain read-only and could not rewrite a card.  "Comparing RFID tags used in animal identification and supply chain applications to contactless smart cards used in our industry is like comparing go-carts to military tanks," concluded Lowe.

More on HID

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

HID case studies

HID helps in automating the access control management at Żabka

Enhancing enterprise security is high on the list of priorities for businesses across sectors. Within the retail industry, there is an additional focus on enabling new ways of working through management tools. Integrated solutions and applications help to create a robust security landscape and ensure a future-ready posture as organisations look to address emerging risks and create better experiences for next-gen employees. Physical access control (i.e., the readers on the door and the credentia...

Avolon selects HID mobile access® to upgrade headquarter security

Founded in 2010, Avolon is the third-largest aircraft leasing company in the world with 824 aircraft and 145 customers in 62 countries. Its new global headquarters in Dublin is comprised of 6,967 sq m (75,000 sq ft) of secure office space across six floors that houses its IT, catering, legal, and communications departments. Need for a centralised monitoring solution Avolon’s new premises in the upmarket Ballsbridge area of Dublin provided an opportunity for the company to rethink its app...

BNY's mobile access solution with SwiftConnect

How do you rethink and transform building access for a 241-year-old company? BNY started by asking employees. The response was encouraging. The BNY team found that employees embraced the concept of mobile access solutions. The thought of implementing access solutions was already being considered by the company and the team was excited about the idea of providing a modern experience that allows employees worldwide to conveniently access their building spaces with a simple iPhone or Apple Watch....