RFID Wet Inlays are described as “wet” due to their adhesive backing, so they are essentially industrial RFID stickers. Passive RFID Tags are comprised of two parts: an integrated circuit for storing and processing information and an antenna for receiving and transmitting the signal. They have no internal power supply. RFID Wet Inlays are best for applications where a low-cost “peel-and-stick” tag is needed. Any RFID Wet Inlay can also be converted into a paper or synthetic face label.



Radio Identification, or RFID (stands for Radio Frequency Identification) is a technology allowing to identify and characterise an object thanks to a sticker broadcasting radio waves.

RFID is part of Real Time Localisation Systems (RTLS) and is widely used for logistical purposes in many different sectors where tracking merchandises is a key issue: retailing, health, transport and logistics, military activities, etc.

Thus, NFC is derived from RFID but is different in many ways. One of the main differences is the fact that NFC allows a limited data sharing between the tag and the reader. Then, another one is that NFC has a really short range compared to RFID (a few centimeters versus a few meters).

ACOS3 64KB Secure Card

ACOS3 64KB Secure Card
ACOS3 is specifically designed for highly secure payment applications. With this high degree of security feature, ACOS3 is particularly suitable for applications such as network access control, electronic purse and multitude of other applications in which security is extremely critical.

SLE4428 Smart Card
Programmable Security Code verification logic. All the memory, except for the PSC, can always be read. The memory can be written or erased only after PSC verification. After eight successive incorrect entries the error counter will block any subsequent attempt at PSC verification and hence any possibility to write and erase. This IC is one of the most popular in the industry.

SLE4442 Smart Card
Intelligent 256-Byte EEPROM with Write Protect Function and Programmable Security Code (PSC). This chip contains and EEPROM organized 1024 x 8 bit offering the possibility of programmable write protection for each byte. Reading of the whole memory is always possible. The memory can be written and erased byte by byte .

AT24C128 16KBytes Memory Card
The AT24C128 provides 131,072 bits of serial electrically erasable and programmable read only memory (EEPROM) organized as 16,384 words of 8 bits each. The devices are optimized for use in smartcard applications where low power and low-voltage operation may be essential.

ACOS5 64/72KB PKI Card
The ACOS 5 card is an advanced cryptographic smart card that fully complies with ISO 7816-1/2/3/4/8/9 and is specially designed for public-key based applications and for enhancing security and performance for RSA public-key cryptographic operations that are essential in smart card PKI, digital signature and high level security requirements. ACOS5 provides up to 64/72KB EEPROM of secure data storage. Typical applications include payment system, e-banking, e-commerce, stock trading, network security, corporate identity, Microsoft windows logon, PKI application, and cryptographic middleware layers CSP and PKCS#11.

Mifare Classic 1k
Fully compliant with ISO 14443A, MIFARE? is the industry standard for contactless and dual interface smart card schemes. With an immense worldwide installed base, it is a well proven RF communication technology for transmitting data between a card and a reader device. The platform offers a full range of compatible contactless smart card and reader ICs, as well as dual interface ICs that provide a secure link between the contactless and contact card markets.

Mifare Classic 4k ISO 14443A Contactless
MIFARE? Classic 4K with 4 Kbytes of EEPROM read/write memory and is compatible with existing MIFARE? infrastructures. Operating in accordance with ISO 14443A, MIFARE? 4K functions at a distance of up to 10 cm with true anti-collision properties and without the need for a battery.

The MIFARE? classic family is the pioneer and front runner in contactless smart card ICs operating in the 13.56 MHz frequency range with read/write capability.

Mifare DESFire ISO 14443A Contactless
MIFARE? DESFire operates at a distance of 10cms and in accordance with the international standard ISO 14443A perfectly meets mid-end transportation segment needs including security and cost effectiveness. It features a 4Kbyte non volatile memory, a high speed triple -DES data encryption co-processor, a flexible memory organization structure, a mutual 3-pass authentication technique together with a true random number generator and an anti-tear mechanism to guarantee data integrity during contactless transactions.

Printing Cards

Printing Cards

All Plastic Cards and Smart Cards can be printed with 4 color, 1 color printing on 1 side or 2 sides.
This process refers to cards printed at their time of manufacture. All cards of a manufacturing batch will be printed with the same artwork/design etc.

Cards are generally manufactured using four large sheets of PVC plastic that are bonded together under a lamination (heat and pressure) process. In the first step of manufacturing the design for the face of the card is printed on one sheet and the reverse on another making up the core.

The printing of these sheets is done in volume using either a two or five colour press printing up to 35 cards per sheet. The print may be applied by silkscreen print, offset print or a combination of these depending on the requirements of your design.

Once the core has been printed, the final two layers of transparent plastic are attached and laminated in order to protect the printed surface. The cards are punched from each sheet and additional features such as signature panels, magnetic stripes, foils and holograms are added.

Offset printing
Generally Offset printing is very good at printing detail (such as small fonts and fine objects).
It is advised to use Offset Printing where you use screened layouts or four colours (CMYK). With Offset printing colours are less brilliant than Silkscreen printing.

Silkscreen printing
This process should be used for extensive layout elements, because more ink is applied to the printing sheet. This gives a more vibrant feel to the artwork. The disadvantage of more ink is that with bleeding, fine layout elements may disappear, and the printing looks less precise.

Bleeding layouts
Bleeding layouts should generally be printed silkscreen, at least those colours touching the card’s border. Of course, this is only possible if the colours are not screened or CMYK printed. On occasions it might be better to separate one colour, that is, to use Offset printing for the fine or screened elements and Silkscreen printing for the more extensive elements which have to be printed with this colour.

The reason for this lies in the different consistency of the inks : Silkscreen inks can easily be laminated due to their high share of resins and varnishes, where as the Offset inks cannot be laminated with the PVC material. Should we wish to print cards with bleeding Offset colours a special overlay foil has to be used. This overlay has a coating of glue to allow the overlay to adhere to the card. However this layer of glue may impact the colours, especially colours based on blue, purple, green or grey. With these colours we advise using silkscreen printing to improve results.

RFID application in Supply Chain

RFID application in Supply Chain, Inventory and Logistics

Let’s look at how RFID solutions provide significant benefits over barcoding for supply chain operations.
– End-to-end track and trace capabilities reduce counterfeiting, theft, billing disputes and charge-back fees while protecting the brand.
– Real-time, automated data capture reveals process improvement, increased efficiency and cost control opportunities.
– Specific data such as manufacturing location; ship date, lot number, etc. is associated with the individual product, carton and/or pallet supporting simpler and more effective recall or product tracking processes.
– Elimination of line-of-sight, tag orientation, or bar code label quality requirements; manual data entry and operator error plus increased read range enables faster, more accurate inventory management.
– Just-in-time inventory resupply, from manufacturing through distribution to point of sale reduces costs and out-of-stocks, increases inventory turn and creates higher customer satisfaction.

RFID Application in Access Contol

RFID Application in Access Contol
Access Control is a system which enables an authority to control access to areas in a given physical facilities. An access control point, which can be a door, turnstile, parking gate, elevator or other physical barrier where granting access can be controlled using RFID technology.

Data security is generally very high using RFID technology. It also reduces the possibility of duplicating credentials. Secure or proprietary communication protocols can also be used to further enhance security.

An RFID based Access Control reader does not usually make an access decision but send a card number to an Access Control panel that verifies the number against an access list. Generally only entry is controlled and exit is uncontrolled. In cases where exit is also controlled a second reader is used on the opposite side of the door. The typical RFID tag is an RFID based contactless smartcard, key fob, wristband or smartphone sticker.

RFID based Access Control Systems are typically used for Enterprise Access, Car Park Access, Access to Gyms or Swimming Areas, Event Access, Library Access or Access to Hotel Rooms.

RFID Vehicle Tracking

RFID Vehicle Tracking
OPRFID’s RFID Vehicle Tracking Solutions provide accurate, scalable and extremely reliable identification to seamlessly manage and control the movement of vehicles.

RFID tags are mounted on vehicles and fixed RFID infrastructure is placed at strategic locations such as entry/ exit gates, weigh-bridges, parking lots and equipment. This allows completely automated wireless identification of vehicles without impacting on existing vehicle processes.

OPRFID designs solutions that are suitable for any size business problem, and our system architecture and software suite are flexible enough to support any business requirement. Our Vehicle Tracking Solutions can add the following efficiencies to vehicle management processes:

Dealership Vehicle Management – Automatically track the movement of vehicles car throughout dealerships, including post sale return visits.

Traffic & Queue Management – Automatically control the flow of vehicles to maximise efficiency and prevent operational gridlock.

Driver Identification – Gain visibility into who is driving which vehicles and at what time.

Gate Automation – Seamlessly manage gate operations without manual processing.

Weighbridge Automation – Automatically identify trucks at weighbridges, tying their vehicle identification data and weight measurements to increase process efficiency and transactional accuracy.

Collision Avoidance – Designed to help prevent collisions between heavy and light vehicles, an alert is generated when a truck comes within a defined range of another vehicle. Certified for use in underground mines, these automatic proximity alerts help to minimise costly and dangerous accidents.

Associated Assets – Trucks and their associated assets (trailers, containers, returnable items and inventory) are linked to determine the identity responsible for each movement.

What is the Application of RFID Active Tag in Parking?

What is the Application of RFID Active Tag in Parking?
Radio Frequency Identification (RFID) is one of the fastest growing technologies used in numerous industries including supply chain management, healthcare, aviation and logistics. RFID systems use proprietary protocols and application-specific hardware. An RFID-enabled parking system will minimize the need of parking managers and employees to manually look at the parking lot. RFID tag has the ability to receive occupancy data like the number of cars entering & exiting instantly. This information and data is extremely helpful in determining the exact parking space captured and helps the respective management to take proper staffing decisions. Additionally, it will record all the entries and exits automatically & precisely that will result in least errors by human intervention.

RFID tags can also identify and monitor any suspicious and untagged vehicle present in the parking lot. CCTV cameras are generally used with RFID system to ensure 100% security from theft. For larger parking lots, RFID systems manage multiple zones to ensure complete safety of the parking facility. Thus, RFID technology (tags) is more beneficial and reliable as compared to the others in many ways as:
* RFID tags do not require any kind of physical contact between the communication device and data carrier.
* They are extremely durable; have the ability to withstand extreme temperatures.
* These tags come in vast array of sizes, materials and types.
* They have the ability to generate precise results with least errors.
* These tags can be used repeatedly that makes them much economical to use.
* RFID tags are read by the RFID system sequentially.

Whenever an RFID-labeled vehicle enters into a parking lot, the RFID system can automatically detect whether it is registered into the database or not. If it’s a registered vehicle as per the RFID database and has not checked out of an unauthorized RFID-enabled parking lot, the system will record it immediately. The RFID system records vehicle information, parking-lot title as well as entrance time and date in the ‘vehiclecirculationinfo’ table of its database. The check-in and check-out information are cross-checked by the RFID system and so, if any vehicle has attempted for an unauthorized exit, it won’t be able to enter to any of the RFID-enabled parking lots. To the vehicle-owner, the final and only solution would be to pay the fine and receive the approval to enter; from the respective authorities.

Thus, an RFID tag for parking lots will offer improved customer experience. It will ensure complete safety & security of the vehicles along with the minimized expenses of hiring staff. The integration of surveillance cameras with RFID system will help curbing the criminal attempts & offences, if any.


Contact and Contactless cards are plastic identification cards containing electronic memory and, in some cases, an embedded integrated circuit (known as chip cards). They are also sometimes called “smart ID cards” or “RFID cards” depending on the type of card and the smart card vendor.

Security conscious industries (like the medical profession) utilize smart cards to enhance patient privacy and prevent fraud. Smart cards are also able to provide strong security authentication for single sign-on (SSO) in large organizations, as well as identification, authentication, application processing and data storage. Through the use of smart cards, governments and regional authorities are able to reduce budgets tied to expensive processing, and security costs associated with standard license and identification cards.

Advantages of Contactless Cards

Contactless cards house an integrated circuit chip. They provide not only memory capacity, but computational capability as well. The self-containment of a contactless smart card makes it resistant to attack, as it does not depend upon potentially vulnerable external resources. Because of this characteristic, contactless smart cards are often used in different applications which require strong security protection and authentication. For added security, a contactless smart card can be paired with a mobile phone to restrict contactless transactions when the mobile device is not within range, preventing use of the card if stolen.

RFID Smart Card
Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. An RFID system consists of an antenna and a transceiver, which read the radio frequency and transfer the information to a processing device, as well as a transponder (or tag), which is an integrated circuit on the plastic smart card containing the radio frequency circuitry and information to be transmitted. A subtype of RFID is NFC, which stands for near field communication, enabling two devices to communicate within a very short range. NFC cards add a layer of security to information transactions.

Smart card applications include: financial, identification, SIM card, public transit, computer security, school operations, healthcare and more.

Plastic Smart ID Cards Available:

AT AT24C01
AT AT24C02
AT AT24C16
AT AT24C64

Contactless RFID
FM FM1302T
ID TK4100
MIFARE? Classic
MIFARE Ultralight?



Some Facts You Need to Know About Chip-Enabled Cards
Most banks are in the process of re-issuing all cards
Chip cards increase security and minimize fraud for both you and your customers
Most of your customers will have these cards by October 2015
You can continue to accept cards via swipe

What is EMV?
EMV chip technology is becoming the global standard for credit card and debit card payments. Named after its original developers (Europay, MasterCard? and Visa?), this technology features payment instruments (cards, mobile phones, etc.) with embedded microprocessor chips that store and protect cardholder data. This standard has many names worldwide and may also be referred to as: “chip and PIN” or “chip and signature.”

What is chip technology?
Chip technology is an evolution in our payment system that will help increase security, reduce card-present fraud and enable the use of future value-added applications. Chip-enabled cards are standard bank cards that are embedded with a micro computer chip. Some may require a PIN instead of a signature to complete the transaction process.
What makes EMV different than the traditional magnetic stripe card payment?
Simply put, EMV (also referred to as chip-and-PIN, chip-and-signature, chip-and-choice, or generally as chip technology) is the most recent advancement in a global initiative to combat fraud and protect sensitive payment data in the card-present environment. Payment data is more secure on a chip-enabled payment card than on a magnetic stripe (magstripe) card, as the former supports dynamic authentication, while the latter does not (the data is static). Consequently, data from a traditional magstripe card can be easily copied (skimmed) with a simple and inexpensive card reading device – enabling criminals to reproduce counterfeit cards for use in both the retail and the CNP environment. Chip (EMV) technology is effective in combating counterfeit fraud with its dynamic authentication capabilities (dynamic values existing within the chip itself that, when verified by the point-of-sale device, ensure the authenticity of the card).

What other incentives are there to accept chip cards?
In addition to the reduction of fraud and related chargebacks, there are other cost savings associated with EMV acceptance. The payment brands are doing their part to ensure that chip-bearing customers can pay at chip-enabled businesses. For example, Visa, MasterCard, Discover and American Express have all issued upcoming rules and guidelines for processors and merchants to support EMV chip technology. The Payment Brands have introduced programs that waive a merchant’s annual PCI-DSS audit if 75 percent of the respective payment brand specific transactions are processed through a dual contact and contactless EMV certified device.
Another Payment Brand ruling is the impending chip liability shift. Once this goes into effect, merchants who have not made the investment in chip-enabled technology may be held financially liable for card-present counterfeit and potentially lost and stolen fraud that could have been prevented with the use of a chip-enabled POS system.