11.06.2014 Views

TAGnology_TAGid -125kHz_Protocol.pdf - RFID Webshop

TAGnology_TAGid -125kHz_Protocol.pdf - RFID Webshop

TAGnology_TAGid -125kHz_Protocol.pdf - RFID Webshop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Security Considerations Rev. 1.2 February 1999<br />

6.2 Data Privacy<br />

The use of cryptography (Stream Cypher), mutual authentication, and password verification<br />

prevents monitoring and copying the data channel. Therefore, the area of the transponder that<br />

only can be accessed enciphered is called “secret area“.<br />

To make use of cryptography you need secret data: keys (HITAG 1 and HITAG 2 transponders)<br />

and logdata (HITAG 1 transponders).<br />

The transponders and the read/write device are provided with identical transport keys and<br />

transport logdata by Philips so that you can start operating them right away.<br />

In order to offer our OEM clients high flexibility, the configuration of the transponder memory,<br />

password, keys and logdata can be changed.<br />

We strictly recommend to rigorously restrict these possibilities for the end customers (e.g. for<br />

HITAG 1 transponders by setting the Configuration Page to read only, setting password, keys<br />

and logdata to neither read nor write).<br />

Protokoll HTRM801 V1.2/C Page 106 (107)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!