- Trained on our vast library of engineering resources.

RFID Tags Information

RFID (radio frequency identification) tags are small electronic devices that wirelessly identify and track physical articles through radio frequency interaction with RFID readers. Each tag contains a minimum of an integrated circuit and an antenna.

RFID tags are used to label various assets with a unique electronic signature that can be encoded and read by other RFID equipment. This information is stored in non-volatile memory. Tags frequently have an Electronic Product Code (EPC), a 96-bit string of data which identifies the tag's protocol, the organization which manages the tag, asset identification, and tag serial number. Readers register the EPC of the tag and ensure its accuracy through the use of an error-correcting code algorithm. The EPC is an ambitious attempt to provide every item in the world with a unique code to track it in global databases.

Video credit: YouTube - Explania

These tags can be routinely scanned to determine the accompanying specimen's location, as well as other information such as name, ownership, transaction account, or environment. RFID tags do not need to be within the line of sight of an RFID reader. They can be placed well within the package or object as long as any RF signals remain unhindered. RFID tags can be implemented in hostile environments, and RFID readers can usually scan several hundred tags at once if supplied with anti-collision technology.

RFID tag applications are virtually limitless. Since chips can become corrupted or used to invade privacy, many RFIDs support encryption. RFID tags are also assigned an operational identity to prevent the tag from being misused.

  • Read-only tags have a factory-programmed serial number which cannot be altered, and therefore cannot be misread or corrupted. A complementary internal database can be used to add supplemental information to the serial number.
  • Read/write tags can have the inherited information rewritten or altered by a system user and chip reader. This information is stored in the memory of the tag chip.
  • Write-once tags can be assigned an identity by a system user only once, but it can be read many times.

Active vs. Passive Tags

RFID tags contain, at minimum, two components: an antenna to collect and radiate an RF signal and an integrated circuit which stores and processes the tag identity, modulates the corresponding RF signal, and for passive chips collects power from electromagnetic waves. Passive chips rely on the ability of the antenna to perceive enough electrons from the radio frequency to charge the circuit and return its own radio frequency. Passive chips can be very small, cheap to produce, and do not need to be routinely replaced or maintained. However, the energy needed for the initial circuit charge three times the energy needed to maintain communication. Consequently, passive RFID tags have ranges of less than several feet. This characteristic can be both a design benefit (such as in credit cards) or drawback (such as in warehouse inventory).

RFID tags active passive difference

Image credit: Intech Open

Active RFIDs incorporate a battery that powers the circuit continuously. Some RFIDs transmit the ID signal periodically (active), while others wait for a reader to interrogate the tag before radiating its signal (semi-active). While an active RFID will eventually need battery replacement, the overall levels of interference and radiation are lower than in a passive RFID. Active RFIDs can also provide a range of several hundred feet.


The frequencies at which the reader and tag communicate are represented in the table below. Low- and high-frequency tags use the magnetic field to transfer power by induction; this signal is well-defined but rather weak. Ultra-high and microwave frequency RFID tags use the electric field for power transfer by propagation; this method has excellent range, but the reading for some tags is more ambiguous.

Band Range Data speed Common uses
120—159 kHz (low frequency) 10 cm Low Animal identification; factory data collection; auto keys
13.56 MHz (high frequency) 10 cm—1 m Low to moderate Smart cards; shelf inventories; transactions
433 MHz (ultra-high frequency) 1—100 m Moderate Defense applications; tracking pallets

Eurasia: 865—868 MHz (ultra-high frequency)

North America: 902—928 MHz (ultra-high frequency)

1—12 m Moderate to high Inventory; hard-to-read RFID applications
2450—6800 MHz (microwave) 1—2 m High 802.11 WLAN, Bluetooth standards
3.1—10 GHz (microwave) >200 m High Road toll accounts

Tag Communication

Low- and high-frequency RFID tags are usually passive or semi-active tags. These tags are less than one full wavelength away from the RFID reader and must modulate the wave produced by the reader into a return signal. This is done by oscillating the electrical load of the tag between low and high values that produces a change measurable by an RFID reader. At ultra-high and microwave frequencies, the tag is more than a full wavelength away from the reader, and with assistance from the integrated battery it can backscatter or transmit a response on a related frequency.

RFID uplink/downlink from Enigmatic Consulting

Image credit: Enigmatic Consulting

Tag collision occurs when an individual RFID reader perceives multiple tags simultaneously, potentially overloading the reader and making it impossible to decipher a tag's individual identity. Readers isolate tag identity in two ways. Some readers use a slotted ALOHA relay to randomly delay each tag's response, while other readers attempt to discover each RFID tag's underlying binary code by seeking random permutations from the sample set. Both systems have drawbacks, so bulk reading is not recommended for precise inventory control. Conversely, frequency hopping can be used to prevent two or more RFID readers from scanning the same chip simultaneously. This is where an RFID reader alternates between frequencies within its bandwidths to limit the chances of the same tag being interrogated twice.

Tag Implementation

RFID infrastructure is easier to operate in a closed system: a system where items tagged with RFID never change ownership. The complete history of the RFID tag is stored within an internal database which does not need to adhere to regulated RFID standards; it is also less likely to be corruptedSmall passive RFID tag from RFID NetworkRFID tag inventory management from RFID Library

Image credits: RFID Network; RFID Library

RFID tags' small footprint is a significant reason for their current prevalence and the expected increase in their utilization. When passive tags are employed correctly they can be nearly impossible to recognize visually. The smallest RFID tags ever created were passive tags affixed to ants to study colony behavior. They are often incorporated into merchandise in a process known as electronic article surveillance, where the RFID tag must be overwritten at the point-of- purchase to prevent an alarm at the store exit from sounding. Even active tags, which must include a battery, are usually no larger than a matchbook and are used in many shipping and cargo applications. Furthermore, RFID tags are exceptionally cheap, with most passive tags costing less than $1 USD each, and active tags costing just a few times more, where the initial expense is usually worth the investment.

NFC (Near Field Communication)

NFC, or near field communication, is a short range subset of radio-frequency identification (RFID) communication protocols that use electromagnetic radio fields for connecting electronic devices.  NFC enabled devices maybe passive or active with passive devices allowing only reading from other devices while active can read and send information.  NFC operates at 13.56 MHz at a distance of 4 cm and has a data transfer rate up to 424 kbps.  It is used in the consumer electronics industry allowing users to connect to other NFC enabled devices without compromising personal data.


Since each country may allocate different frequencies for RFID, the bands utilized are different around the world. As such, RFID tagging is rarely compatible with international equipment, and local and regional legislation may apply when utilizing RFID. The industrial standards in the list below are widely accepted. 

RFID Tag Applications

It would be impossible to name every application in which RFID is useful. The following examples provide a good representation of the capabilities of RFID tags.

RFID tags can used as payment alternatives. Tags can be linked to credit or bank accounts and can be scanned by an RFID reader. The transaction is complete once the owner enters a private, preset PIN. These types of tags are common in cell phones, key chains, poker chips, and within credit cards themselves.

Factories, warehouses, cargo operations, and delivery services regularly implement RFID tags for asset tracking to distribute and track cargo accurately and instantaneously. Large businesses and corporations may also tag important information technology devices and electronics for quick locating. Manufacturers may keep track of assets far along the supply chain to analyze efficiency. RFID key tags from Easi-Card

Tags are regularly incorporated in merchandise to help retailers maintain an accurate inventory and speed up the locating of particular items. There is speculation that RFID chips may one day replace bar codes, since hundreds of tags can read read at once.

ID badges and electronic keys frequently incorporate RFID tags. This allows selective access to locked doors and restricted areas without the need to exchange or keep track of mechanical keys.

RFID tags are occasionally affixed to humans. It is a common practice on oil rigs to tag important personnel so they can be found quickly in the event of an emergency.

Within passports, RFID tags allow the passport to be read digitally and the individual is assessed against a database to determine entry eligibility.

RFID tags are frequently placed in cars so drivers do not have to come to a stop to pay a toll. Similar measures have been used for buses and trains.

Animal identification is a common usage of RFID tags. They are used to identify livestock, as well as assist in locating of missing pets.

Hospitals have considering using tags to offer an immediate electronic history of the patient without the need for an accompanying physical record.

Many races (foot, automotive, and others) use tags to provide an exact readout of race times.


Wikipedia - Radio-frequency identification

RFID Journal - FAQ

Technovelgy - What is RFID?

NFC: How It Works

Image credits:

Explania | Intech Open | Enigmatic Consulting | RFID Network | RFID Library | Easi-Card


Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Category: RFID Tags
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.