Information / Helpline / Calendar Card

Information / Helpline / Calendar Card
A plastic information or helpline card is a multi-use device that can combine useful information with company promotion. Great for almost any organisation or company they are available with numerous options.

Because of its handy format, high quality and great durability, many very recognisable organisations successfully use the plastic card for important information such as emergency service details or donor information.

The credit card size of an information card means that it is easily retained in a wallet, purse or pocket. Organisations are offered endless application opportunities. These can range from the very important to the more trivial.

Helpline information might be printed for advice lines, technical support for computer or other technical applications etc.

Information cards can be used in combination with your company advertising or promotional activity. These multi-use plastic cards can be printed with superb quality graphics for highly effective advertising, at low cost. A card with highly targeted, useful and relevant information will be used time and time again.

Highly customisable these information cards can be printed with other types of information such as important dates, e.g. anniversary dates, festivals, bank holidays. Fixture lists, traditional annivesary gift ideas, birthstone charts, diets or recipes, calendars etc. are other applications.

Customisable options include variable informational or data or write on surfaces.

Let’s discuss your ideas. Whatever the purpose we’re are sure we can accomodate any project you might have.

Smart Cards

Smart Cards
Among our array of different plastic cards, smart cards are one of our specialities.Smart cards includes a memory chipset and can be used to store data/information for various software applications.

We provide smart cards
Blank Smart Card, without printing.
Smart Card with offset printing.
Smart Card with Screen Printing.
Smart Card with speciality security printing.
Smart card With personalized digital printing, with photo and other details.

We provide all kinds of smart cards:
Contact Type – Chip Card with memory of 256 Bytes, 1 KB, 4 KB, 32 KB, 64 KB. Viz., SLE 4428, SLE 4442, SLE 4452, Scosta Card, Micrporocessor Card.
Contactless Card – RFID Card with memory of 1 Kb, 4 KB Viz., Proximity Card, Clamshell Card, Mifare Card, Desfire Card.
Magnetic Stripe Card – Magnetic Stripe Cards similar to Bank ATM Cards with both Hi-Co and Lo-co Tapes.
Smart cards provided by us are of high quality and durability and backed by our fail proof guarantee.

Mifare Ultralight C Cards

Mifare Ultralight C Cards
MIFARE Ultralight C is a cost effective solution using the open 3DES cryptographic standard for chip authentication and data access.

The widely adopted 3DES standard enables easy integration into existing infrastructures and the integrated authentication command set provides an effective cloning protection that helps to prevent counterfeit of tags.

Tickets, vouchers or tags based on NXP MIFARE Ultralight C can act as single trip mass transit tickets, event tickets or as low cost loyalty cards and are also used for device authentication.

MIFARE Ultralight C operates according to the ISO/IEC 14443 A standard, allowing an operating distance of up to 10 cm with true anti-collision support. It also offers extended user memory compared to MIFARE Ultralight EV1 and a range of additional security features previously unavailable on low cost contactless ICs. Existing MIFARE Ultralight C solutions benefit from the same authentication commands as being used for MIFARE DESFire EV1. The MIFARE Ultralight C is furthermore compliant to the NFC Tag type 2.

Key features
Fully ISO/IEC 14443 A 1-3 compliant
NFC Forum Type 2 Tag compliant
106 Kbit/s communication speed
Anti-collision support
1536 bits (192 bytes) EEPROM memory
Protected data access via 3DES authentication
Cloning protection
Command set compatible to MIFARE Ultralight
Memory structure as in MIFARE Ultralight (pages)
16 bit counter
Unique 7 bytes serial number
Number of single write operations: 10,000

Mifare Classic Cards

Mifare Classic Cards
The MIFARE Classic family covers contactless smart card ICs used in public transport, access management, loyalty cards and many more. Fully compliant with ISO/IEC 14443 Type A, it is available with 1 KB and 4 KB memory, and 7 byte or 4 byte identifiers.

MIFARE is NXP’s well-known brand for a wide range of contactless IC products with a typical read/write distance of 10 cm (4 inch) used in more than 40 different types of application worldwide. With 50 million reader and 5 billion card components sold, MIFARE products are proven and more reliable than any other interface technology in the market.

Part of the MIFARE range is MIFARE Classic,a product family of contactless smart card ICs used in public transport, access management, loyalty cards and many more.

Key features
Fully ISO/IEC 14443Type A 1-3 compliant, ensuring a broad marketplace of solution developers and providers
Versatile product portfolio, offering an optimized price-performance ratio
1 KB or 4 KB EEPROM
Reduced infrastructure costs due to card and reader compatibility across all generations
Memory access conditions freely programmable

How dangerous is negligent RFID / NFC card use?

How dangerous is negligent RFID Card / NFC card use?
NFC readers are a great piece of technology. Sadly, it has been poorly executed and has many security concerns. Most the security concerns have been “debunked” by credit card companies whom continue to push the technology. Theft using NFC on various RFID systems is open to compromise, but really all depends on how secure the user is with this information, The NFC must be passing active data to be hijacked or intercepted. So a malicious person cannot simply pass his or her phone passed your wallet and get information, unless there is an active data stream or connection to a reader. But there has also been workings to have more levels of authentication to ensure appropriate use.

Eavesdropping
Eavesdropping is when a criminal “listens in” on an NFC transaction. The criminal does not need to pick up every single signal to gather private information. Two methods can prevent eavesdropping. First there is the range of NFC itself. Since the devices must be fairly close to send signals, the criminal has a limited range to work in for intercepting signals. Then there are secure channels. When a secure channel is established, the information is encrypted and only an authorized device can decode it. NFC users should ensure the companies they do business with use secure channels.

Active Attacks
There are NFC attacks based on actively probing a card without the cardholder’s knowledge, and this is done outside of the context of eavesdropping on or intercepting a legitimate transaction. The idea is that you sit next to someone on the train, and a computer in your backpack attacks the victim’s card while it’s still in their wallet. The first demonstration of this was on Mobil’s SpeedPass, which was defeated this way long ago. Charlie Miller recently presented on this at the 2012 Black Hat.

Data Corruption and Manipulation
Data corruption and manipulation occur when a criminal manipulates the data being sent to a reader or interferes with the data being sent so it is corrupted and useless when it arrives. To prevent this, secure channels should be used for communication. Some NFC devices “listen” for data corruption attacks and prevent them before they have a chance to get up and running.

Interception Attacks
Similar to data manipulation, interception attacks take this type of digital crime one step further. A person acts as a middleman between two NFC devices and receives and alters the information as it passes between them. This type of attack is difficult and less common. To prevent it, devices should be in an active-passive pairing. This means one device receives info and the other sends it instead of both devices receiving and passing information.

Theft
No amount of encryption can protect a consumer from a stolen phone. If a smartphone is stolen, the thief could theoretically wave the phone over a card reader at a store to make a purchase. To avoid this, smartphone owners should be diligent about keeping tight security on their phones. By installing a password or other type of lock that appears when the smartphone screen is turned on, a thief may not be able to figure out the password and thus cannot access sensitive information on the phone.

While it may seem like NFC would open up a world of new security risks, it may actually be safer than a credit card. If a user loses her credit card, a criminal can read the card and find out the owner’s information. If that same person loses her smartphone and has it password protected the criminal cannot access any private info. Through data encryption and secure channels, NFC technology can help consumers make purchases quickly while keeping their information safe at the safe time.

How do NFC tags prevent copying?

That depends on what type of tag you use and what level of protection against cloning you want.
1:NFC tags (as defined by the NFC Forum) have no protection against cloning. Such tags are intended as containers for freely readable data (so called NDEF messages). Anyone could read an NDEF message from one tag and duplicate it to another tag.

2:Many NFC tags also contain a unique identifier that is pre-programmed by the tag manufacturer and cannot be modified on normal tags because those memory segments are in read-only memory. Such a unique ID could be used to uniquely identify a tag (i.e. to match the ID against some form of database). This approach has been used by many access control systems in the past (and actually still is!). However, all data can still be extracted from the tag. Specialized hardware (e.g. Proxmark, etc) and ready-made tags are often available where an attacker can change the unique identifier. So this is certainly not perfect cloning protection. Nevertheless, some manufacturers still add new cloning protection features that rely on publicly readable (but supposed to be uncopyable) unique identifiers. One such manufacturer is NXP with their signature feature on new NTAG tags. (Basically they add a digital signature over the unique ID to the tag, but nothing prevents an attacker to create a clone that also contains a copy of that static signature.)

3:Contactless smartcards/tags that provide communication encryption and shared-key based mutual authentication (e.g. MIFARE DESFire) exist. With this approach, cloning could be prevented by protecting certain data on the tag with a secret password. However if an attacker is able to find out that secret password, nothing prevents the attacker from creating a clone of the tag. Many modern access control systems and closed-loop payment systems use such an approach.

4:Contactless tags/smartcards that contain a secret asymmetric key (that cannot be extracted from the card using the available communication interface) and provide a command to sign a cryptographic challenge with that key exist. Many such smartcards are built upon Java Card technology, so they contain a microcontroller that executes some custom application software (written in Java). Most modern EMV-based credit cards use this type of mechanism to prevent cloning.

RFID Introduction

RFID Introduction
RFID stands for Radio frequency identification. RFID is an automatic identification method, relying on storing and remotely retrieving data using RFID devices. Rfid device consists of an object called RFID TAG which can be incorporated in to product, animal or in a person for the purpose of identification and tracking using radio waves. RFID TAG is also known as RFID Transponder. Some RFID tags can be read from several meters and some beyond the line of sight of the RFID readers.

RFID Integration consists of RFID READERS [RFID TAG Readers] and RFID TAGS.

Most RFID TAGS contain two parts: one is an integrated circuit (RFID CHIP) for storage and process of information, MODEM function for RF signal. The second is an RFID antenna for receiving and transmitting the signal. Chip less RFID allows for discrete identification of tags without an integrated circuit, thereby allowing tags to be printed directly onto assets at a lower cost than traditional tags.

There are three types of RFID TAGS:
1>Active RFID Tags: This RFID Transponders contains a battery and can transmit signals independently.
2>Passive RFID Tags: Such kinds of transponders do not have battery.So they require external source to activate signal transmission.
3>Battery assisted Passive: It provides greater range.

RFID Standards:
There are many groups, who define RFID STANDARDS including ISO, IEC, ASTM International, Dash 7 Alliance, EPC global. They are actively involved in RFID Research and Technology development.

Utility of RFID:
RFID is having wide range of industrial applications.

Prohibition of Unauthorized human with RFID ACCESS CONTROL and Time Attendance.

Majority of companies in Retail sector adopting way of RFID INVENTORY MANAGEMENT and observe the path of their goods and assets with RFID Tracking.

Many schools, colleges, universities, public library employ RFID Technologies.

Valuable goods kept in ware houses are safe through RFID Asset tracking utility.

Many Import export logistics companies improved their supply chain management through RFID.

Now with the help of RFID technologies, payment can be made by mobile phones. Small microchip RFID is inserted in to cell phones. User’s phone can be linked with mobile phones and can be used in mobile payment.

In Government sector, application of RFID technology for Traffic management and in other public transport system.

Companies use RFID tracking solutions for product management.

In some countries, RFID is used for automated parking system.

RFID is also implemented as Road Toll Tax payment and also used in some public transportation system for payment of fare.

RFID is widely used for Asset Management
RFID combined with mobile computing and web technologies provides supportive role to asset management. Integrated RFID reader can provide proof of identification and attendance. This eliminates manual data entry.

Product Tracking
Giant retailers make used of RFID for their product tracking in b2b supply chain operations.

Logistics transportation and supply chain
Logistics and supply chain are main areas of RFID implementation. They are widely used for yard management, shipping and freight management.

Baggage handling system through RFID
In international airports, they employ RFID in Baggage passing system for perfect identification of baggage.

Animal identification with RFID
Identification animal through RFID is quite conventional utility of RFID. RFID tag is fixed with the ear of any animal.

Offset printing

Offset printing
Offset printing is a printing technique utilizing a plate and rubber blanket similar to flexographic printing, the ink is transferred to the rubber and then transferred to the material. This technique of printing is usually isolated to high volume individual die cut paper products with or without adhesives, however lower volume runs can now be produced on digital machines. Products like brochures, flyers, campaign media and box labels are created with great quality and at an affordable price.

OPRFID offers many printing options, which will allow you to lessen the time spent ordering these products from several companies that only offer certain processes.

a lot more technology updates regarding NFC in the News

We found a lot more technology updates regarding NFC in the News – take a look at these fun stories

Productivity improvement at a vineyard by easing record keeping for compensating manual labor for produce harvests is just one practical application. Shipping produce with NFC tags for collection of data regarding length of transit time, storage temperatures and assistance with inventory management for produce managers is another way NFC can help those in the produce business.

Consumers can easily access product information through the transfer of recipes, nutritional information and coupons from point-of-sale display to their phone. This makes trips to the grocery store a high-tech experience that provides additional value to shoppers.

Improved patient care and better monitoring of medications and patient accuracy is another area of opportunity proving very valuable. Passive tags are attached to the medicine, wristband of a patient and dispensing nurse.

Marketing, branding and event management can be taken up a notch with wrist bands that interface with social media accounts, drawings and payment systems. Coupons, offers and videos can be delivered immediately to phones of participants. Geo-location tags allow customers to discover other local events, friends nearby and special discounts and offers.

Asset tracking, inventory, maintenance records improve productivity and accuracy allowing for businesses to bring more profitability to the bottom line.

Emerging applications are being driven by the inclusion of a NFC tag in most mobile phones. Travelling with our phones has become a habit for many of us and an opportunity for marketing and customer loyalty incentives

The recently announced Apple Pay technology depends on NFC capabilities. Payment information will be passed via a token or coded message that does not store card, PIN or personal information that may be intercepted – thus offering a more secure transaction for merchant and card holders.

Detailed, real-time information is a benefit to consumers and businesses and NFC technology is poised to capture center stage.

NFC Tags/Labels

NFC Tags/Labels
NFC or Near Field Communication is the transferring of data between two NFC enabled devices utilizing chips embedded into a tag/label that is inside the devices. The chip is powered by being near a device that has a battery so it does not need any powering of its own. The tag sends out low frequency communications that can evoke any number of different commands from launching an app or website, a phone number, or possibly look up nutritional values from a restaurant’s menu. Currently the maximum number of characters are limited to approximately 137 characters. The process itself is very similar to RFID which made a huge impact on how businesses operate with large vendors, the main differences are NFC tags are only usable within a short distance and you do not need a sophisticated device to read a NFC tag, there are many phones and tablets that are already capable of reading them. Predictions are that most if not all smart phones and tablets will have NFC capabilities in the coming years.

NFC tags have unlimited capabilities and with OPRFID on the forefront of this technology, our customers will have access to many different options, from NFC tags that are hidden within the controls of a device, to domed beauty labels that have NFC capabilities hidden beneath. As the technology changes in this market or any market, OPRFID commits itself to being knowledgeable for our customers so we can offer them anything they might be inquiring about.

The technology behind NFC labels is moving rapidly, almost too fast to keep our website updated with all of the different ideas, forms, antenna sizes, enabled devices etc. If you have any questions, please call and OPRFID can offer you the solutions you need for your exciting adventure into the NFC market.