OPTIGA™ Authenticate NFC - secured tags

NFC Forum certified Type 4 tags based on open security standards for brand protection and consumer engagement

anchor

Overview

Infineon's secured NFC tags are contactless solutions that provide superior anti-counterfeiting, identification, and authentication for products and accessories. These tags are built with a chip that enables advanced cryptography features, making them especially suitable for protecting high-value assets. Because of their contactless interface, they can be easily combined with customer engagement use cases, simply by tapping the phone to the tag.

Key Features

  • AES-128 cryptography
  • Built-in command set (ISO 7816-4/-9)
  • NFC Forum Type 4 certification
  • CIPURSE™ security architecture
  • CIPURSE™ certification
  • Configurable file system (ISO/IEC 7816-4)
  • Up to 4 KB user memory
  • ISO/IEC 14443 Type A support
  • Mutual authentication

Products

About

Secured NFC tags offer superior security based on robust cryptography for seamless authentication. These are based on CIPURSE™ open-standard security architecture to bring customers greater security, transparency, and flexibility. With 304 bytes, 1 KB, 2 KB, and 4 KB of user memory, these tags allow users to store data in standardized NFC data exchange format (NDEF) and to build custom applications for anti-counterfeiting, identification, authentication, and customer engagement use cases. 

Embedded secured NFC tags in luxury or Healthcare products enable product authentication to verify its genuineness. These tags can also provide exclusive content and experiences, thereby enhancing the overall brand experience. Furthermore, NFC technology enables easy tracking of the product's journey, from production to sale, allowing transparency and traceability.

The tags also offer brand protection for original equipment manufacturers (OEMs). By providing effective security against counterfeit products, our tags offer safety from non-compatible, sub-standard accessories so that the safety and functionality are prioritized throughout the entire lifespan of the product.

  • Clone protection and robust security: Secured NFC tags feature advanced cryptography algorithms
  • Advanced anti-counterfeiting: Reliable check for product authenticity. Protection of revenues thanks to easy identification of sales in unauthorized markets.
  • Enhanced user experience: NFC tags are intuitive – all the consumer needs to do is tap the product with their phone to read the tag and authenticate their purchase.
  • Unobtrusive design: Tags can easily and subtly be embedded into the brand graphics or packaging so the technology has no impact on the brand aesthetics or design 
  • Flexible deployment for higher ROI: The same chip supports complementary use cases such as enabling consumer engagement or track and trace functionality along the supply chain, thus increasing return on investment.

The secured NFC tags work on the principle of symmetric cryptography. The 128-bit AES master key is stored in the backend cloud server and a corresponding derived key is stored in each tag. This key is unique to each tag. Whenever the user taps the NFC app on a product featuring an NFC tag, the unique ID and an authentication command (derived from the crypto keys) are exchanged between the tag and the cloud server. If the keys are correct, the mutual authentication process is successful, and the user can read out the data from the tag. Cloned tags that do not have the correct crypto keys would result in a fail in the mutual authentication process. 

Counterfeit trade has a significant impact on luxury, high-value goods, and healthcare products. It tarnishes brand image by creating a bad user experience and poses serious health and safety risks. Additionally, brands that complement their physical offerings with a "wow" digital customer experience have a greater chance of success in a competitive landscape. NFC tags allow consumers to easily authenticate the product and have a truly phygital experience that combines the best of both physical and digital worlds.

The tags can be programmed to store a website URL or an app download link, or to activate a chatbot, which opens up a whole new set of possibilities. The consumer can access additional data on the product and complementary services. This could be anything from an overview of the raw materials used and information on material sourcing to the inclusion of a Digital Product Passport (DPP). NFC tags can act as the data carrier to link products with their online DPP data and support in-field refresh.  NFC tags could also store data offline by permanently embedding all the DPP data providing a transparent and accessible chain of custody throughout a product’s lifecycle

The process of reading the NFC tag is straightforward. The first step is to locate the NFC tag on the product. The wayfinding mark system informs users that an item includes NFC and shows them where to tap.

Counterfeit consumables and accessories not only damage the brand image by creating a bad user experience but can also pose serious health and safety risks. Secured NFC tags can address these challenges by enabling: 

  • Identification

Automatic Identification of the accessory for an intuitive and seamless user experience. 

  • Authentication 

Protect the brand reputation and revenues by verifying the authenticity of the accessory. In addition, create a more personalized user experience.

  • Applications where the secure NFC tags are best suited:

Water purifier, air purifier, power tools, interactive toys, and healthcare

Secured NFC tags offer superior security based on robust cryptography for seamless authentication. These are based on CIPURSE™ open-standard security architecture to bring customers greater security, transparency, and flexibility. With 304 bytes, 1 KB, 2 KB, and 4 KB of user memory, these tags allow users to store data in standardized NFC data exchange format (NDEF) and to build custom applications for anti-counterfeiting, identification, authentication, and customer engagement use cases. 

Embedded secured NFC tags in luxury or Healthcare products enable product authentication to verify its genuineness. These tags can also provide exclusive content and experiences, thereby enhancing the overall brand experience. Furthermore, NFC technology enables easy tracking of the product's journey, from production to sale, allowing transparency and traceability.

The tags also offer brand protection for original equipment manufacturers (OEMs). By providing effective security against counterfeit products, our tags offer safety from non-compatible, sub-standard accessories so that the safety and functionality are prioritized throughout the entire lifespan of the product.

  • Clone protection and robust security: Secured NFC tags feature advanced cryptography algorithms
  • Advanced anti-counterfeiting: Reliable check for product authenticity. Protection of revenues thanks to easy identification of sales in unauthorized markets.
  • Enhanced user experience: NFC tags are intuitive – all the consumer needs to do is tap the product with their phone to read the tag and authenticate their purchase.
  • Unobtrusive design: Tags can easily and subtly be embedded into the brand graphics or packaging so the technology has no impact on the brand aesthetics or design 
  • Flexible deployment for higher ROI: The same chip supports complementary use cases such as enabling consumer engagement or track and trace functionality along the supply chain, thus increasing return on investment.

The secured NFC tags work on the principle of symmetric cryptography. The 128-bit AES master key is stored in the backend cloud server and a corresponding derived key is stored in each tag. This key is unique to each tag. Whenever the user taps the NFC app on a product featuring an NFC tag, the unique ID and an authentication command (derived from the crypto keys) are exchanged between the tag and the cloud server. If the keys are correct, the mutual authentication process is successful, and the user can read out the data from the tag. Cloned tags that do not have the correct crypto keys would result in a fail in the mutual authentication process. 

Counterfeit trade has a significant impact on luxury, high-value goods, and healthcare products. It tarnishes brand image by creating a bad user experience and poses serious health and safety risks. Additionally, brands that complement their physical offerings with a "wow" digital customer experience have a greater chance of success in a competitive landscape. NFC tags allow consumers to easily authenticate the product and have a truly phygital experience that combines the best of both physical and digital worlds.

The tags can be programmed to store a website URL or an app download link, or to activate a chatbot, which opens up a whole new set of possibilities. The consumer can access additional data on the product and complementary services. This could be anything from an overview of the raw materials used and information on material sourcing to the inclusion of a Digital Product Passport (DPP). NFC tags can act as the data carrier to link products with their online DPP data and support in-field refresh.  NFC tags could also store data offline by permanently embedding all the DPP data providing a transparent and accessible chain of custody throughout a product’s lifecycle

The process of reading the NFC tag is straightforward. The first step is to locate the NFC tag on the product. The wayfinding mark system informs users that an item includes NFC and shows them where to tap.

Counterfeit consumables and accessories not only damage the brand image by creating a bad user experience but can also pose serious health and safety risks. Secured NFC tags can address these challenges by enabling: 

  • Identification

Automatic Identification of the accessory for an intuitive and seamless user experience. 

  • Authentication 

Protect the brand reputation and revenues by verifying the authenticity of the accessory. In addition, create a more personalized user experience.

  • Applications where the secure NFC tags are best suited:

Water purifier, air purifier, power tools, interactive toys, and healthcare

Documents

Design resources

Developer community

{ "ctalist":[ { "link" : "https://community.infineon.com/t5/forums/postpage/choose-node/true", "label" : "Ask the community ", "labelEn" : "Ask the community " }, { "link" : "https://community.infineon.com/t5/Forums/ct-p/products", "label" : "View all discussions ", "labelEn" : "View all discussions " } ] }