Radio Frequency IDentification


A few months ago I checked out a stack of books at our local library by placing the books on a kiosk. All 5 books magically appeared on the computer screen. Around the same time my father ran in the Bolder Boulder, a foot race of over 50,000 people. An electronic system kept track of his time and thousands of others by only having the runners wear paper race bibs. Pets that are found wandering can be identified and returned to their owners with a basic scan of the neck. How is all of this possible?

alt text

Source: icons8

The answer is RFID or Radio Frequency IDentification. This tutorial will cover the basics of how RFID works, and will help guide you towards getting started with RFID.

Suggested Reading

If you aren’t familiar with the following concepts, check out these tutorials before continuing. They will help with the basic understanding of RFID.


Basic Functionality

It may be tempting to believe that RFID functions thanks to the reader module containing a very small hamster with x-ray eyes, but in actuality, the system is a bit simpler than that.

alt text

How RFID doesn’t work

RFID uses radio waves produced by a reader to detect the presence of (then read the data stored on) an RFID tag. Tags are embedded in small items like cards, buttons, or tiny capsules.

RFID System

Image courtesy of EPC RFID

These readers also use radio waves in some systems to write new information to the tags.

Types of RFID Systems

There are two types of RFID systems: passive or active. The tag power system defines which type of system it is.


In a passive RFID system, the tags do not use a battery; instead, they receive their energy to run from the reader. The reader emits an energy field of a few feet, providing the energy for any tag in the vicinity. The tag gathers the electromagnetic energy from the card reader, powers up, and responds with ‘hello world’ and its identification information.

Passive tags have the benefit of being able to be read at a fast rate (10 or more times a second). They are extremely thin (allowing them to be placed between layers of paper) and are extremely cheap (less than $0.05 in 10,000+pcs volumes).

Pile of passive RFID tags

In general, the smaller the tag the much shorter the read range


Active RFID systems include tags that have their own internal power supply for increased range. Active tags possess a battery and usually have larger SMD components. After a preset amount of time the tag emits an RF ‘chirp’. A reader in the vicinity can listen and hear for this chirp. Because an active tag is they can be read over much larger distances than passive tags (tens of feet).

Downsides to active tags include greater bulk (because of the battery), limited life span (tag is dead when the battery is exhausted), increased cost per tag, and varying report rates.

m130 Active RFID Tag

m130 Active RFID asset tag from RF Code

RFID Frequencies

As well as active and passive systems, RFID systems can also be broken out into different frequencies.

Some frequencies and systems are designed to only read one tag at a time, while others can read multiple. Cost of readers can also vary wildly based the frequency rating of the modules. In prior years a reader capable of reading multiple tags was in the thousands of dollars, sometimes tens of thousands. These systems were unattainable for most hobbyists and prototypers. However, this is finally beginning to change, and multi-read capable readers are becoming much more affordable.

Check out the following chart for a basic break down of the frequencies, and their associated properties.

Tag Memory

RFID tags store a lot of data in their memory – that’s what makes them so useful. While there can be many different types of identifying information stored in tags (which can vary from industry to industry), the majority of that is beyond the scope of this tutorial. You can find more detailed information on tag storage requirements from the Tag Data Standard, and the Tag Data Translation Standard.

Some RFID tags (like the ubiquitous “HID ProxCard II” brand ID card and some brands of pet tag) use aproprietary format. School IDs and other cards from commercial access control systems may not work with all RFID readers.

Gen2 UHF RFID Memory Standard

The v2.0.1 standard written by EPCglobal covers all RFID requirements for Gen2 RFID tags. Generally speaking, the memory of a tag is split into three: the TID, EPC, and User Memory.

Tag Identifier Memory

The TID or Tag Identifier is 20 bytes or 160 bits. These means there are 1,460,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 different possible tag IDs (1.46 * 1048). More than there are atoms in the human body! Not quite the number of atoms in the universe. Every RFID tag has a unique TID. The TID is not editable.

Electronic Product Code Memory

While TIDs are good for absolute identification the Gen2 RFID standard was really created to replace the barcode in many retail environments. When you go to buy your groceries the register doesn’t care if you have item TID 0xE242F3, it cares if you have a gallon of milk or a jar of peanut butter. That’s where the Electronic Product Code (EPC) comes in: it’s generally 12 bytes, user editable, and meant to be written to as a UPC type replacement. Slap an RFID tag on the gallon of milk, program the tag’s EPC to be 0 7874203641 0 and the register will identify it as a half-gallon of Lactose Free 1% Low Fat Milk made by Great Value (random source). The tag doesn’t care what you write to those 12 bytes so writing ASCII RufusTheDog is perfectly acceptable but keep it below 12 bytes.

User Memory

The size of User Memory can vary from 0 bytes to 64 bytes. The cheaper the tag the fewer bytes of user memory it will likely have. What do you do with 64 bytes? To continue with the gallon-of-milk analogy, user memory was originally intended to record things like expiration dates. The EPC is the global identifier (‘this is milk’), and the User Memory was specific to that gallon (‘sell by August 15th’). Again, the tag doesn’t care so consider recording user setting data (this user enjoys a 10 degree decline in the pilot seat) or use the memory as the world’s smallest dead drop.


There are additional writable memory locations called the Access password and Kill password. The Access password can be used to prevent people from re-configuring tags (“it may look like a sirloin steak but the register says it’s a pack of gum…”). The Kill password is used to permanently and irrevocably disable a tag.


Depending on the enclosure and environment you are operating an RFID system in, you may run into functionality issues with the readers not accurately reading or writing data from a tag. Here are a few pointers to keep in mind that may help improve your system’s functionality.

  • Avoid RF Interference – Any other RF-emmiting devices in the area of your system may negatively affect the performance of an RFID system, especially if they operate in the same band. Having multiple RFID readers near each other can cause system interference
  • Use a clean power supply – Like most electronic systems, noisy and/or dirty power supplies can cause strange behavior in an RFID system. Clean, regulated power sources are recommended.
  • Check for line of site – Open-air readings without other objects obstructing the line-of-site between the reader and the tag can improve outputs.
  • Use an external antenna – This can improve read range for all systems. Onboard antennas are limited in power and range.
  • Stop Holding Tags (UHF systems) – Humans are basically bags of water. If you hold the tag in your hand you’ll degrade the range for reading significantly. Instead, tape the tag to a non-metal, non-watery device.
  • Change tag types – Typically, the smaller the tag, the shorter the read range. If you are using a glass capsule, try a button. If you’re using a button, try a card.

One thought on “Radio Frequency IDentification

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s