Base HD - NFC RFID Access Control Reader Writer (2023)

Base HD – NFC RFID Access Control Reader

Access Control & Time Attendance NFC RFID System Development

Base HD is a comprehensive NFC RFID Reader that implements time attendance and access control functions the best of all Digital Logic development tools (µFR Series).

What sets this device apart from our other devices is the ability to work at a distance of up to 320m from the computer without additional power. The device is powered exclusively via the USB port on the computer.
It uses the RS-485 communication protocol, which is fully transparent to the system and the user. Therefore, this reader can behave as any µFR NFC RFID Reader Writer. Consequently, the same Software Development Kit, API functions, drivers, and protocol can be used to develop NFC systems with Base HD as for device-based µFR systems.

Besides, Base HD is a low-power RFID device and uses only +5V USB power to operate. For that reason, the NFC development kit includes a USB/RS-485 transceiver converter as well

Also, Base HD also has built-in relays that make this device suitable for access control and similar systems. For example, the software can trigger the relay to lock or unlock the door locking mechanism.

Base HD - NFC RFID Access Control Reader Writer (1)

Buy now

Docs & Software Download

API Docs

(Video) RFID Locks are way too easy to "Hack"! Let me show you!


COM Protocol


Video Tutorial

Integrated components

Base HD - NFC RFID Access Control Reader Writer (2)

  • Real-Time Clock (RTC)
    • Provides added security against changing the log’s date and time
  • User-configurable EEPROM
    • Enables writing of certain data (user data, licenses, certificates, etc.) into the device.
    • Read-only access
    • Writing enabled only with a password
  • Buzzer (Beeper)
    • User controllable built-in speaker
    • Sound on Reading and Write events
  • Relay
    • For triggering the electronic lock mechanism (used for access control)

Base HD is an NFC-compatible Contactless Smart Card and Tag RFID Reader Writer – programmer intended for implementation with MIFARE® and other ISO14443A/B compatible cards, tags, key fobs, stickers, and wristbands.

Base HD – NFC RFID Reader Writer fully supports both 4-byte and 7-byte UIDs and an anti-collision mechanism. It also supports NFC Forum Type 2 and tags like NTAG and Ultralight family.

In addition to the hardware, the NFC system development kit contains a fully-featured API with examples, libraries, development tools, and software for everyday use. The libraries for Windows (“*.dll”) and Linux (“*.so”) OS platforms are included as well. The reader acts as a serial interface device: So it is visible on any platform. It is successfully implemented on Mac, Raspberry Pi, BeagleBoard, and Android OS ( up from the 3.2 Honeycomb version).

All source code software examples are available in all major programming languages.

For example:

  • Java (and Java Applet example),
  • JavaScript (unique feature, convenient for PHP usage),
  • Lazarus,
  • Borland Delphi,
  • C++ Borland Builder,
  • Microsoft® Visual .NET family: C++, C#, VB

At the customer’s request, our team also develops software examples in other programming languages ​​that are not currently included in our repository.
Such requests are processed according to priorities that are aligned with a similar project’s existence in the development queue or partner relations with the client.

Most importantly, support is provided for all the developing platforms.

The software package includes a set of very useful applications intended for everyday use. Such as:

Base HD - NFC RFID Access Control Reader Writer (3)

  • Application for programming and manipulation of NFC compliant like NTAG and MIFARE Ultralight®, with source code, included.
  • Android NFC phone App – Android NFC phone Application for MIFARE® reading. Write a card with uFR, and read it with an NFC phone!
  • Formatter – application for card/tag formatting and programming
  • uFR2FileSystem – keyboard simulation, data reading, data parsing into several formats, and sending data to MySQL database via HTTP.
  • Application for NTAG and MIFARE Ultralight® programming and manipulation.
  • Application for creating and writing common NDEF messages into NFC tags
  • Reader Keys application – for easy manipulation of keys stored in the reader

Our support team provides explanations and assistance for the implementation and custom solutions development to each customer’s requirements.

Downloads:Software examples with SDK,AIS Hotel API, and configuration

Operating modes

Base HD NFC RFID Reader Writer can operate in two basic modes: autonomous and non-autonomous.

In non-autonomous mode device acts as all other readers from the uFR series, like Classic, Nano, and Advanced. The same protocol, libraries, Software development kit API, and examples are used for this purpose.

A significant difference is that Base HD devices can work on installations where long cable runs are a must. So, for example, you can establish a PC-Base HD communication link with a 320m (1000) ft cable using only USB power.

In addition, Base HD RFID NFC Reader has a built-in access control IO module, which has the following functionalities:

  • Door strike lock contacts
  • Push to open button contacts
  • NO & NC relay contacts
  • Door state contact inputs

When the autonomous mode is enabled, the device can operate independently. As a result, it does not require a direct connection to the host. In this case, it only needs a USB or equivalent power supply (5V DC).

The device stores card-related events in non-volatile memory. Also, each event is sent asynchronously to the host as a Real-Time Event (RTE).

The device can store up to 16384 separate events. After its buffer overflows, it starts to erase the oldest events to free memory for new forthcoming events.

(Video) Electronics 101: RFID vs NFC (Explained)

Get your BASE HD development kit right away!


(Video) How to - Desktop Mac & PC NFC Tag Reader/Writer
  • Electronic payment systems
  • Identification systems
  • Access control systems
  • Subscription services
  • Banking systems
  • Digital content system
  • Customer loyalty systems
  • Vending machines
  • Time & attendance
  • Machine work attendance
  • NFC card and tag programming
  • NFC NDEF records management
  • Network access control
  • Inventory management
  • Software login management
  • Automatic fare collection
  • Public transport terminals
  • Cashless payment
  • Parking systems
  • Reception desk services
  • Event visitors attendance
  • Authentication and authorization
  • Libraries, museums, stadium events
  • Identity verification, data exchange & contactless transaction
  • Useful for the binding device to software license
  • Supporting multiple OS (Win, Linux, Android)
  • USB compliant interface
  • Operating Frequency: 13.56MHz
  • Proximity read/write speed up to 424 kbps
  • Built-in antenna for contactless tag access, with a reading distance of up to 60 mm
  • Supports MIFARE® and other ISO 14443 Type A/B
  • Supports ISO18092 NFC tags
  • Built-in anti-collision feature
  • RFID Reader locking by passwords and keys
  • Application Programming Interface:
  • Virtual COM through FTDI
  • User controllable LEDs
  • Upgradable (3-year or 5-year) warranty
  • NFC cards and tags reading/writing (programming)
  • NFC NDEF Record writing: MIME types, URI types, vCard, SMS, Phone, URL
  • Card formatting
  • Card linear space emulation
  • Card block direct access
  • Card sectors and blocks indirect access
  • Card Keys and Access Bits management
  • Block values management (increment/decrement)
  • Asynchronously sending of Card UID to COM port (feature programmable)
  • DES and 3DES Software Encryption
  • Optional APDU structure (application protocol data unit) with examples of the Credit Card use in public data reading
  • Shell-like environment for easy testing and automation
  • Web browser extensions for Chrome, Firefox, and Opera
  • Digital Signing source code examples: contactless signing of digital documents with PKI (public key infrastructure) certificates

Downloads: API Documentation,µFR COM Protocol,Software source code examples with SDK

The documentation contains a detailed explanation of API and communication protocol reference with actual byte-level examples for communication protocol implementation. Our API provides a very comfortable way of implementation, and we highly recommend it. When API implementation is not possible, a communication protocol is a very good alternative. We provide regular updates for all libraries, firmware, examples, tools, and documents. Updates are FREE and are available for download from the official Digital Logic GitLab repository.

Our support team always provides prompt responses. Depending on the inquiry complexity, you can expect an answer in no more than 24 hours.

We are open to custom development requirements based on specific customer needs. Feel free to contact us for any questions or further assistance regarding your projects and implementation.

Base HD hardware specification

(Video) uFR XRC - RFID NFC Reader Writer with relays for access control
Operating frequency13.56 MHz
Read rangeThe operating distance is 2o-80mm (0,78”-3,15”), depending on the antenna geometry and reader configuration
Supported cable lengthUp to 320 meters (1050 feet)
Supply current150mA (operating)
Supply voltage5V
Supported cards and tags

MIFARE® family: MIFARE Mini®, MIFARE Classic® (1K, 4K, EV1), MIFARE Ultralight®, MIFARE Ultralight C®, MIFARE PLUS® (2K, 4K), MIFARE DESFire® (Light, 2K, 4K, 8K, EV1, EV2)

NTAG® family: NXP NTAG® 2xx Type 2 (210, 213, 215, 216 Tag Tamper), NXP NTAG® 4xx DNA Type 4 (413, 424)

SmartMX® family: NXP JCOP® Java Card (J3A040, J3A081, J3H145, JC30M48CR)

Connection and power supplyRS-485 or USB (RS-485-to-USB converter included)
SoftwareLibrary and SDK for Java, Java Applet, JavaScript, Node JS extensions, Lazarus, Borland Delphi, C, C + + Builder, C++ WxWidgets, Microsoft® Visual C++ .NET, Microsoft® Visual C #, Microsoft® Visual Basic .NET, PHP, Python, and Arduino IDE examples
Supported Operating SystemsMicrosoft® Windows™, Linux®, macOS, Android
Smart Card InterfaceISO14443 Type A & B, ISO18092
Built-in componentsBuzzer, Real-Time Clock (RTC), EEPROM, Relay
AccessoriesCards, key-fobs, labels, wristbands, tags
Size & Weight
ModelDimensions (mm)DeviceCommercial Set
Base HD86 x 54 x 9150 g311 g


Get your BASE HD development kit right away!





(Video) NFC reader writer - programming NFC tags with common NDEF formats - uFR Classic by D-Logic


What can you do with an RFID reader and writer? ›

Some common uses for RFID applications include:
  • pet and livestock tracking.
  • inventory management.
  • asset tracking and equipment tracking.
  • inventory control.
  • cargo and supply chain logistics.
  • vehicle tracking.
  • customer service and loss control.
  • improved visibility and distribution in the supply chain.

Why is my RFID reader not working? ›

If a chip is applied on a metallic surface and does not contain a protective layer, the metal reduces the radio frequency signals and the chip does not respond. The solution is to use transponders with special protection from ferromagnetic materials known as on-metal or anti-metal protection.

Can you write RFID tags with your phone? ›

Can my phone be used as RFID tag? Yes, you can use your phone as RFID tag. For Android or Windows phones you enable NFC. In case of an Apple you need to enable Bluetooth.

What is the difference between NFC reader and RFID reader? ›

What is the difference between NFC vs RFID? In short: RFID stands for Radio Frequency Identification, a contactless one-way communication method at varying distances. NFC, Near Field Communication, allows for two-way communication and requires action by the user.

How do I decode my RFID card? ›

So the read-only code or UID (Unique Identifier) on the RFID tag is read first, which is an 8-byte unique identifier. From this number, the manufacturer and chip type can be decoded. Once the chip is known, the writing of 8 bytes is performed automatically.

How many times can you write to an RFID tag? ›

RFID Standards:

125 Khz (low-frequency) tags are write-once/read-many, and usually only contain a small (permanent) unique identification number. 13.56 Mhz (high-frequency) tags are usually read/write, they can typically store about 1 to 2 kilbytes of data in addition to their preset (permanent) unique ID number.

How do you check that RFID card is working or not? ›

Typically, when an antenna is attached, a reader attempts to communicate with the tag. Sometimes, it writes a serial number to that tag, assuming the tags are preprogrammed. If the tag can successfully communicate with it, then it is properly functioning.

What blocks RFID readers? ›

Some of the most common materials used to block RFID signals include:
  • Metal: Metal is a highly effective RFID signal blocker, as it reflects radio waves and prevents them from penetrating the material. ...
  • Water: ...
  • Concrete: ...
  • Leather: ...
  • Faraday cages: ...
  • RFID-blocking materials:
Dec 30, 2022

Can an RFID card go bad? ›

Active RFID tags have a battery that can last for up to 10 years, depending on its size, type and beacon rate, but the tags do have to be replaced when the battery dies. Many systems have tags report when the battery is low, so that the tag can be replaced before it dies.

How do I write to NFC tags? ›

To simply write to one blank NFC tag, make sure all of these options are unchecked. Finally, select “Write” at the bottom of the screen and tap the back of your phone to a blank NFC tag as if you were going to read it. This writes the URL to the tag. Congratulations, you've just encoded your first NFC tag!

What phones can write NFC tags? ›

Oppo - Samsung - Xiaomi
BrandModelNFC Tags Compatibility
AppleiPhone Xs / Xs Max **
AppleiPhone Xr **
AppleiPhone 11, 11 Pro, 11 Pro Max
AppleiPhone 12, 12 Pro, 12 Pro Max, 12 Mini
71 more rows
Mar 10, 2023

Can cell phones read RFID? ›

An RFID sled is an RFID scanner with the same capabilities as a handheld UHF RFID reader; however, it's also equipped with Bluetooth technology that can connect the RFID sled to mobile devices such as a smartphone or a tablet. It is used to read RFID tags for asset and inventory tracking.

What can I use NFC reader for? ›

NFC is commonly used for contactless payment systems, such as Apple Pay and Android Pay. It is also used in some public transport systems, such as the Oyster card in London. RFID is used in a variety of applications, including contactless key fobs, security systems, and inventory management.

Why would I need a NFC tag reader? ›

Near-field communication (NFC) allows devices within a few centimeters of each other to exchange information wirelessly. iOS apps running on supported devices can use NFC scanning to read data from electronic tags attached to real-world objects.

What is the disadvantage of NFC tag reader? ›

Drawbacks or disadvantages of NFC

Following are the disadvantages of NFC: ➨It can only works in shorter distances which is about 10-20 cm. ➨It offers very low data transfer rates which is about 106 or 212 or 424 Kbps. ➨It is very expensive for the companies to adopt the NFC enabled devices.

Can RFID cards be cloned? ›

If unauthorized individuals get access to the information stored in the RFID chip, they can easily copy the data into another card to develop a replica. This RFID card clone will perform just like the original card, which poses a significant security threat.

Can I copy NFC card to phone? ›

Turn on the device and hold a compatible EM4100 card or fob to the side facing the hand grip and click on the “Read” button. The device will then beep if it succeeds, now replace the copied tag with an empty tag and press “Write” The information stored on the original tag or fob will then be copied onto the new device.

How long do RFID readers last? ›

Active: Active RFID tags usually last between three to five years, depending on the battery. Some tags may allow for battery replacement, while other tags may not. These tags also last much longer than other RTLS technologies such as ultra wide-band tags and WiFi tags).

Do RFID tags need to be programmed? ›

The data stored on the RFID chip comes pre-programmed (pre-encoded) directly from the manufacturer, but can easily be re-programmed. However, there are a few things to consider before re-programming an RFID tag, such as memory bank information, the memory format (the way the data is represented), and character limits.

Can RFID tags track you? ›

Can RFID tags be tracked? Yes, RFID tags can be tracked. They can be tracked automatically using active RFID tags or manually using passive RFID tags. To be tracked RFID tags provide data related to where they have been and where they currently are.

How can I test my RFID at home? ›

The simple way is to bring it across an RFID scanner/reader while placing the credit card inside it. If you see any signals transmitting, you can tell that the wallet is not RFID protected.

What is my RFID number? ›

The RFID number is located on the back, below the magnetic strip at the bottom of the card. The number starts with an asterisk and is four to six digits long.

Does aluminum foil block RFID? ›

Is it possible to do RFID blocking with aluminum foil? Yes, it is possible successfully block RFID with aluminum foil. It can work by simply wrapping it around your cards or wallet. In fact, many people actually use aluminum foil around their cards' as a homemade, cheap RFID blocker.

What kills RFID? ›

To kill a tag, you need to overload it with energy and blow its circuits. These circuits are tiny, so even static electricity from your finger can blow them, as long as you are able to touch the chip directly.

Can someone scan your credit card in your wallet? ›

Although banks claim that RFID chips on cards are encrypted to protect information, it's been proven that scanners—either homemade or easily bought—can swipe the cardholder's name and number. (A cell-phone-sized RFID reader powered at 30 dBm (decibels per milliwatt) can pick up card information from 10 feet away.

Can RFID cards be hacked? ›

Hackers can and have jammed RFID cards and tags from working simply by being nearby and generating a signal that is stronger than the one being put out by the RFID reader. This can make it impossible to track inventory using RFID, while also creating general havoc by preventing access using ID cards.

Can RFID be reactivated? ›

Such a separation provides visual confirmation that the tag has been deactivated. However, a physical contact channel may be used later to reactivate it. Such a reactivation would require deliberate actions on the part of the owner of the RFID tag to permit the reactivation to take place.

What is NFC code? ›

Near Field Communication (NFC) is a radio-frequency technology that allows the transmission of data between an NFC tag and NFC-enabled device. NFC tags can basically do what QR codes are being used for and more because they use embedded chips.

Can phones read NFC tags? ›

If the NFC function has been activated on the Android smartphone (Activate NFC on Android), the NFC tag can be easily read with the smartphone. To do this, it simply has to be held against the upper back of the device.

Is an NFC tag on your phone? ›

The bottom line is that almost all modern Android devices have NFC, as does every iPhone since the iPhone 6. In either case, though, you'll need a relatively recent version of Android or iOS to take advantage of the latest NFC capabilities.

How do I know if my phone is NFC compatible? ›

One way you can test if your phone has NFC capabilities by opening the HotSpot app, going to the “Parking” tab, press the “Gate” tab, then click the “Use Tap” button. If your phone screen changes and says “Ready to Scan”, you have NFC capabilities.

Can you write on NFC tags with Sharpie? ›

Our nfc card is PVC material, it can be written by a permanent marker or pen,but I do not advise to write,becuase it may damage the chip. You can try a way, write it on a note paper with adhesive function and stick it on the card.

How do I know if my phone has an NFC tag reader? ›

You can check whether your Google phone is enabled for NFC by opening your settings. In the search settings bar, type “NFC” and tap to turn it on. If you cannot find it following these steps, your phone cannot make contactless payments.

How can I use my phone as a key card? ›

Manage your digital car key
  1. Open the Google Wallet app .
  2. Tap your digital car key. You may need to swipe to find it.
  3. At the bottom, tap Details. Require phone unlock.
  4. Choose the action that you want to use the screen lock for: Unlock car. Start car. Unlock, lock, and start car. For no screen lock, tap Off.
  5. Tap Save.

Does RFID block cell phone calls? ›

Adalberto, Regulators carefully apportion the radio frequency spectrum to avoid having one RF device interfere with another. So radio frequency identification generally is given a piece of the spectrum that will not interfere with cell phones.

Do you need an app to scan NFC? ›

IOS & Android devices can scan an NFC tag by tapping the physical tag to instantly pull up information on the device.

What are two uses of NFC on smartphones? ›

NFC is a method of wireless data transfer that allows smartphones, laptops, tablets and other devices to share data when in close proximity. NFC technology powers contactless payments via mobile wallets like Apple Pay and Google Pay, as well as contactless cards.

How to read data from NFC tag in Android? ›

Setup Foreground Dispatch
  1. Initialize NFC Adapter. First, init the NFCAdapter in the onCreate method of the Activity or a similar Fragment lifecycle method. ...
  2. Enable Foreground Dispatch. Next, call enableForegroundDispatch to enable foreground dispatch of the NFCAdapter . ...
  3. Disable Foreground Dispatch.
Oct 31, 2021

How long do NFC tags last? ›

The NFC (near field communication) tag is made up of an antenna and a small passive IC chip usually on a PET substrate with an adhesive backing; no power source required. Tags have a lifespan of 10 plus years.

Can I turn off NFC tag reader? ›

Here's how to do it: Open Settings > Connected devices. Some Android phones have the NFC option in the system tray menu at the top of the screen. Turn off the NFC toggle switch.

What are some of the risks of using NFC on your phone or devices? ›

NFC is used for close-proximity data exchange. It can be complemented with RFID capabilities to extend the range of an NFC tag.
Potential NFC risks for enterprises
  • Privacy. ...
  • Payment processing fraud. ...
  • Data corruption and tampering. ...
  • Eavesdropping and interception.
Mar 10, 2022

How far can NFC tag read? ›

The technology works over a very short distance — approximately 4 inches. NFC tags work without a battery and draw power from another device, e.g., a smartphone. An NFC reader connects to only one NFC tag at a time, minimizing accidental transactions.

What are RFID writers used for? ›

GAO's Gen2 readers/writers can provide any RFID application with the ability to read and simultaneously interrogate RFID tags while enabling the writing of information to RFID read-write tags.

What is a handheld RFID writer used for? ›

This device is used to copy and duplicate the 125 Khz EM4100 ID Card for backup purpose. Excellent program algorithm and circuit design are adopted. You can copy all ID(EM4100) Cards with this RFID copier. Portable size, easy to carry.

What can an RFID reader do? ›

The reader is a device that has one or more antennas that emit radio waves and receive signals back from the RFID tag. Tags, which use radio waves to communicate their identity and other information to nearby readers, can be passive or active. Passive RFID tags are powered by the reader and do not have a battery.

What does RFID reader do? ›

The RFID reader is responsible for orchestrating the communication between itself and RFID tags in its read range, which decodes the data encoded in the tag's IC and passes the data to the middleware for further processing.

How do criminals use RFID readers? ›

A criminal can hide the scanner e.g. inside a glove or a bag, and then place it close to the victim and wirelessly steal the victim's payment card information. With the wirelessly obtained payment card information, the criminal can use it to make fraudulent purchases online. This is called card-not-present fraud.

How is RFID used to steal information? ›

What Is RFID? Radio-Frequency Identification (RFID) involves the use of radio waves to read and capture information stored on an electronic chip attached to an object. RFID chips, or “tags,” can be read via scanning devices from up to several feet away.

What are three uses of RFID? ›

7 magnificient uses of RFID
  • Car rental: No-waiting vehicle returns. ...
  • Amusement parks: No-swipe ticket passes. ...
  • Casinos: Robbery-proof chips. ...
  • Sports: Loss-resistant golf balls. ...
  • Guns: Safety products. ...
  • Smart fitting rooms. ...
  • Health care: A hygiene solution.

What do RFID devices collect? ›

RFID is a method of data collection that involves automatically identifying objects through low-power radio waves. Data is sent and received with a system consisting of RFID tags, an antenna, an RFID reader, and a transceiver.

How do hackers use RFID? ›

Hackers can and have jammed RFID cards and tags from working simply by being nearby and generating a signal that is stronger than the one being put out by the RFID reader. This can make it impossible to track inventory using RFID, while also creating general havoc by preventing access using ID cards.

Can RFID track you? ›

Aside from keeping track of inventory, RFID technology also helps organizations identify people and monitor their location. They can detect people who stray away from their assigned locations and help prevent theft, shoplifting, or other problems.

Do credit cards use RFID? ›

Though many new credit cards are RFID-enabled, not all of them are. On the other hand, all newly-issued credit cards come with an EMV chip. You won't be able to see the RFID chip in a credit card because it's inside the card. Credit cards with RFID technology are easy to use.


1. NFC Reader / Writer - uFR Nano Unboxing - New D-Logic product
(D-Logic NFC_SDK)
2. NFC Reader Writer OEM - uFR Nano - D-Logic product
(D-Logic NFC_SDK)
3. How to Clone RFID Keycards and Fobs | NS208 Multifunctional Copier Review
(Heads of Tech)
4. RFID Mifare and NFC Reader Writer Programming - Java uFRCoder Advanced software review (Windows)
5. Creating an NFC reader and Writer App in Java, Android Studio
6. Ten channel RFID copier (371)
(Dark Arts Lock Picking)


Top Articles
Latest Posts
Article information

Author: Allyn Kozey

Last Updated: 04/13/2023

Views: 6507

Rating: 4.2 / 5 (63 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Allyn Kozey

Birthday: 1993-12-21

Address: Suite 454 40343 Larson Union, Port Melia, TX 16164

Phone: +2456904400762

Job: Investor Administrator

Hobby: Sketching, Puzzles, Pet, Mountaineering, Skydiving, Dowsing, Sports

Introduction: My name is Allyn Kozey, I am a outstanding, colorful, adventurous, encouraging, zealous, tender, helpful person who loves writing and wants to share my knowledge and understanding with you.