Email:info@getsmartcard.net
Tel:86 756-2282948
Mobile:86-158 7569 3036
Skype:velia168
Wechat/Whatsapp: 8615875693036
Address:
No.2 Shamei Industrial Zone, Pingsha, Jinwan district Zhuhai, China.
NT2H1311TT NTAG213 TT TAMPER LOOP tags have been specifically designed for tamper detection and authentication, targeting a wide array of applications in packaged goods for consumer and industrial markets. The tag opens the door to entirely new, NFC-based consumer experience solutions featuring higher security and additional consumer engagement at the point of sale and post-sale.
This Tamper loop tag enables advanced digital seal functionality for smart packaging and brand protection. It exhibits one of two conditions: a closed loop shows that the packaging is sealed; while an open loop indicates an open package. The tamper detection status can be checked at the tap of a smartphone via a programmed on-chip URL
Moreover, products can be authenticated at any stage in the supply chain by verifying their digital identity. Even in the case of an open loop, the TAMPER LOOP can be read with a smartphone to display a consumer experience specific to an opened package. At any time, it can be exploited for further pre- and post-sales activities like vouchers, product services or access to dedicated social media channels, and much more.
The small TAMPER LOOP is available with NXP’s NTAG 213 TT chip that provides additional features compared to the NTAG 213. It offers tamper detection with once-opened status and NXP original signature with an option of a brand-unique signature.
Tamper tags or tamperproof tags are not new. In fact they have been quite a few variants but there’s an important difference between this new NTAG213 TT chip and the previous generation of tamper tags.
To understand the difference, it’s important to remember that an NFC antenna is a coil of wire. If that coil of wire is broken then the tag will fail to energise and the tag will not work. The principle therefore of the standard tamper proof tag was simple. Any attempt to remove the tag label should break the antenna and effectively stop the tag from working. There are a number of ways this might happen.
In some cases, the tags material can be very fragile. An attempt to remove it might cause the tag to quite literally fall apart. As a user tries to peel it away from it’s attached surface, the actual material substrate and antenna of the tag will disintegrate and the antenna loop will be broken.
In other cases, there can be a ‘two part’ construction to the antenna. When the tag is removed, one part of the antenna will detach itself from the other part, thus breaking the loop.
This means two things. Firstly, the chip itself is not broken or changed. Simply, the antenna is broken which means that tag not the chip is modified. Secondly, after the tamper, the tag does not function. This might seem fairly obvious but it means that a user trying to scan the tag does not know if the tag has stopped working, never worked, or has been tampered with. It simply does not work.
The NTAG213 TT allows a different design. Instead of a single antenna loop it has an additional two connections allowing for two loops of wire. This second, additional, loop of wire can now act as the one that ‘breaks’ but without damage to the important antenna loop.
This serves two significant benefits.
Firstly, NFC antennas need careful tuning to make sure that they work properly. The length, design and material need to be designed to ensure good performance. This makes the older design of tamper tags more difficult because this tuning has to be taken into account. With the NTAG213 TT, the antenna is independent which means it can be tuned and set like any normal NFC antenna. The tamper loop can now be used in any shape or format that works best.
Secondly, and importantly, the tag will continue to work after the tamper action. This means that it is now possible to scan the tag to detect a tamper rather than the previous action which was just to be presented with a dead tag.
Clearly, if the NTAG213 TT simply allowed a scan after tamper it wouldn’t be doing much as a tamper tag. So what actually happens is that the NTAG213 TT can change the content of the data dynamically to indicate that it has been tampered with.
For example, a typical use case might be that the tag is encoded with a web address such as https://t.ixkio.com/t?a=x7k&u=04473D5A5A5780&t=00000000 where the t variable indicates a data code being dynamically set by the chip. The default state would be ‘00000000’. Now, should the additional tamper loop on the tag be broken, the tag can still be scanned but the chip will automatically change the ‘00000000’ to, say ‘FFFFFFFF’. The web address when it is now scanned will show https://t.ixkio.com/t?a=x7k&u=04473D5A5A5780&t=FFFFFFFF, allowing a developer to display a different page and show that the tag has been modified.
It’s a simple solution, but effective.
Typically, the tags are used the detect the opening of packaging. This can either be in the cap/lid of a bottle so that as it the cap is twisted, the tamper loop is broken. However, tamper tags can also be used for single use ticketing or vouchers.
One of the most common use cases for tamper proof tags is for asset management. As many readers of NFC.Today and many NFC users in general will know, NFC tags and metal aren’t the best of friends. Normal NFC tags cannot be used on metal surfaces. To allow an NFC tag to be used on a metal surface, an additional ferrite layer needs to be included between the tag and the adhesive. We also have on metal NFC Tamper tags. Contact us now for more information.