NFC Chip UID - GoToTags (2024)

The NFC chip UID is a manufacturer-supplied, usually read-only, unique identifier for the NFC chip used to uniquely identify an NFC tag in a project’s software systems. The UID is also an important part of NFC security and anti-cloning. The NFC chip UID can be read by most software systems, including iPhone and Android 3rd party apps. The NFC chip UID is functionally similar to the UHF RFID chip TID.

Example NFC Tag UID: 044F7132214B80

Contents
  • Read Only NFC Chip UID
  • NFC Chip Manufacturer Code
  • NFC Chip UID Formatting
  • NFC Chip UID Randomness
  • Random NFC Chip UIDs
Related
  • Reading an NFC Chip UID
  • NFC Chip
  • NFC Tags
  • NFC

Read Only NFC Chip UID

The NFC chip UID on most NFC chip types is determined by the chip manufacturer, programmed to the NFC chip during manufacturing and is permanently read-only; meaning that it is not possible to change the value of the UID via software. The fact the UID is not changeable is what makes it useful for NFC security systems. Some NFC chip types support random UIDs; these are still read-only.

There are NFC chip types that allow for the UID to be changed by software after manufacturing; this has significant effects on NFC security and must be protected against. This feature is particularly beneficial in scenarios where the NFC chip needs to mimic or replace another chip for testing, security research, or system development purposes. Additionally, these chips often come with a range of customizable parameters beyond the UID.

In general, GoToTags does not work with or support NFC chip types with writable UIDs.

NFC Chip Manufacturer Code

Every manufacturer of NFC chips is assigned a manufacturer code per NFC standards; this code is included in the NFC chip UID to allow software systems to determine the manufacturer of the NFC chip and help in the process of NFC chip type identification. The location of the manufacturer code in the UID is different for each NFC tag type.

Given that some NFC chips have writable UIDs, using the manufacturer code to determine the manufacturer is not secure as it is possible for a malicious NFC chip to lie about its UID and therefore lie about its manufacturer. To securely verify the manufacturer, the NFC chip’s originality signature must be used if available.

ManufacturerCode
EM Microelectronic0x16
Fudan Micro0x1D
NXP Semiconductors0x04
STMicroelectronics0x02
Example UID from NXP NTAG213

044A7232214B80

NFC Chip UID Formatting

The NFC chip UID is stored as binary (1s and 0s) in an NFC chip. Some NFC chip types store the UID in a different bit position format and need to be reversed after reading and before using. It is important that the NFC chip UID be formatted properly in string format.

NFC Chip UID Randomness

NFC chip UIDs are unique, but they are not very random. Mathematically speaking they have low entropy; practically this means that NFC chip UIDs seem to follow a quasi-pattern and don’t “look” random. This pattern is often more present for NFC chips that were manufactured next to each other in sequence. This has several implications for NFC security:

  • It is trivial to create a fake UID that looks like it should be a real UID; a project should never depend on the the UID “looking right” for any reason.
  • UIDs should never be used as a password or encryption key as it is not that hard to guess the available set of UIDs for a prioritized brute force attack.

Example Sequence of NFC Chip UIDs

The following is a sequence of NFC chip UIDs (NTAG213). It is clear that these are not very random, with only the part in bold varying between UIDs. It would not be difficult to create a set of additional UIDs that would fit into this pattern.

044F7132214B8004547032214B80045A7032214B80045F6F32214B80

This concept of the randomness of the NFC chip UID is separate from random NFC UIDs which is a security and privacy feature.

Random NFC Chip UIDs

Some NFC chip types have a feature where an NFC chip can be put into a mode such that every time the NFC chip UID is read it returns a random value; often this feature is protected with a password. The effect of enabling a random UID on an NFC chip is that the UID can not be used to uniquely identify the NFC tag anymore; effectively preventing a software system from tracking the tag over multiple interactions. This can be thought of as a privacy feature, similar to a web browser’s “incognito” mode.

NFC Chip Types Supporting Random UIDs

NFC Chip UID - GoToTags (2024)

FAQs

What is the UID of the NFC tag? ›

The NFC chip UID is a manufacturer-supplied, usually read-only, unique identifier for the NFC chip used to uniquely identify an NFC tag in a project's software systems. The UID is also an important part of NFC security and anti-cloning.

Can NFC Tags be cloned? ›

However, if you have an Android phone, you don't need a separate reader to do this since Androids are equipped with an NFC reader. Yes, NFC cards can be copied with smartphones. The Android app, Mifare Classic Tool, can read data from an NFC card, store it in a file, and then write it back onto a blank card or key fob.

Can NFC chips be tracked? ›

NFC tags carry passive data, but they lack processing capabilities. They're able to transmit information using power drawn from readers. Apple Pay uses this technology. You can use NFC tags to track products in your store.

What is tag UID? ›

Certain tag technologies in Connected Things support a unique identifier (UID) that can be used by software systems to uniquely identify one tag from another. It is important that this UID is represented in a consistent format within a project.

What is an example of a NFC tag UID? ›

Seven bytes equates to 14 hexadecimal characters. A hexadecimal character is a number from 0 to 9 or a letter from A to F. Therefore an NFC tag might have a unique ID such as '04 9C 64 D2 45 2B 80'.

Can two NFC tags communicate with each other? ›

In Peer-to-Peer mode, two NFC-enabled devices can exchange data with each other. In reader/writer mode, an NFC-enabled device can read information from an NFC tag or card.

Can NFC tags be malicious? ›

The threat of maliciously programmed NFC tag has been reported in the past [24, 23, 27, 22, 28, 9] . An attacker can leverage an NFC tag to trigger risky actions; e.g., opening a malicious URL in a browser without user approval [22] or forcing a smartphone to pair with a rogue Bluetooth device [27, 22] .

Can a phone mimic a NFC tag? ›

The NFC card you use is a Tag and phone is the reader in general cases. So to set the code on phone to be used as a tag you will need a dedicated hardware/application. You can create an application which can emulate any NFC code.

How to use an NFC tag as a tracker? ›

#1: Track Assets

Then, when an NFC-enabled smart device is held near the tag, its unique identifying information (e.g., serial number), along with location and time stamps will auto-populate on the digital form to be reported back to your database. This method works well with equipment check-out and check-in forms.

Is NFC a microchip? ›

A Near-Field Communication chip (NFC chip or NFC chipset) is a silicon component or Integrated Circuit (IC) that can be used in different ways, depending on the targeted application.

Can my phone read NFC chips? ›

Most Android phones natively have NFC capabilities. Check our Android NFC capability article to be sure yours does. Depending on your phone manufacturer, NFC may be switched off by default. If your phone supports NFC but still doesn't interact with NFC objects, see our Android NFC Guide for more information.

How to read NFC UID? ›

To read the UID of your NFC tag with an Android smartphone open the free app NXP TagInfo. Now hold the NFC tag to the upper back of the smartphone. The smartphone usually vibrates after the tag has been completely scanned. Then tap on FULL SCAN.

Why do people use UID? ›

The primary purpose of a Unique Identifier (UID) is to uniquely identify and distinguish individual entities or items within a system or database.

Is NFC UID unique? ›

All NFC Tags have a unique code, called UID (Unique ID), located in the first 2 pages of the memory, that are locked (can not be changed nor deleted). Through the UID, you can uniquely pair an NFC Tag to an object or a person, and develop applications that identify and interact with them.

How to find NFC tag ID? ›

To read the UID of your NFC tag with an Android smartphone open the free app NXP TagInfo. Now hold the NFC tag to the upper back of the smartphone. The smartphone usually vibrates after the tag has been completely scanned. Then tap on FULL SCAN.

Do NFC tags have unique ID? ›

All NFC Tags have a unique code, called UID (Unique ID), located in the first 2 pages of the memory, that are locked (can not be changed nor deleted). Through the UID, you can uniquely pair an NFC Tag to an object or a person, and develop applications that identify and interact with them.

What is UID in RFID tag? ›

So the read-only code or UID (Unique Identifier) on the RFID tag is read first, which is an 8-byte unique identifier. From this number, the manufacturer and chip type can be decoded. Once the chip is known, the writing of 8 bytes is performed automatically.

What is NFC ID card? ›

Contactless ID cards are powered by Near Field Communication (NFC) Technology — an innovation that readily identifies the encrypted data in the chip to verify the user. NFC technology is beneficial for mobility industry players for completing the user onboarding process in real-time.

Top Articles
The 10X Rule by Grant Cardone
LAND token economics
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Velia Krajcik

Last Updated:

Views: 6046

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Velia Krajcik

Birthday: 1996-07-27

Address: 520 Balistreri Mount, South Armand, OR 60528

Phone: +466880739437

Job: Future Retail Associate

Hobby: Polo, Scouting, Worldbuilding, Cosplaying, Photography, Rowing, Nordic skating

Introduction: My name is Velia Krajcik, I am a handsome, clean, lucky, gleaming, magnificent, proud, glorious person who loves writing and wants to share my knowledge and understanding with you.