TAGnology_TAGid -125kHz_Protocol.pdf - RFID Webshop
TAGnology_TAGid -125kHz_Protocol.pdf - RFID Webshop
TAGnology_TAGid -125kHz_Protocol.pdf - RFID Webshop
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Security Considerations Rev. 1.2 February 1999<br />
6.2 Data Privacy<br />
The use of cryptography (Stream Cypher), mutual authentication, and password verification<br />
prevents monitoring and copying the data channel. Therefore, the area of the transponder that<br />
only can be accessed enciphered is called “secret area“.<br />
To make use of cryptography you need secret data: keys (HITAG 1 and HITAG 2 transponders)<br />
and logdata (HITAG 1 transponders).<br />
The transponders and the read/write device are provided with identical transport keys and<br />
transport logdata by Philips so that you can start operating them right away.<br />
In order to offer our OEM clients high flexibility, the configuration of the transponder memory,<br />
password, keys and logdata can be changed.<br />
We strictly recommend to rigorously restrict these possibilities for the end customers (e.g. for<br />
HITAG 1 transponders by setting the Configuration Page to read only, setting password, keys<br />
and logdata to neither read nor write).<br />
Protokoll HTRM801 V1.2/C Page 106 (107)