Base HD – NFC RFID Access Control Reader
Access Control & Time Attendance NFC RFID System Development
Base HD is a comprehensive NFC RFID Reader that implements time attendance and access control functions the best of all Digital Logic development tools (µFR Series).
What sets this device apart from our other devices is the ability to work at a distance of up to 320m from the computer without additional power. The device is powered exclusively via the USB port on the computer.
It uses the RS-485 communication protocol, which is fully transparent to the system and the user. Therefore, this reader can behave as any µFR NFC RFID Reader Writer. Consequently, the same Software Development Kit, API functions, drivers, and protocol can be used to develop NFC systems with Base HD as for device-based µFR systems.
Besides, Base HD is a low-power RFID device and uses only +5V USB power to operate. For that reason, the NFC development kit includes a USB/RS-485 transceiver converter as well
Also, Base HD also has built-in relays that make this device suitable for access control and similar systems. For example, the software can trigger the relay to lock or unlock the door locking mechanism.
Buy now
Docs & Software Download
API Docs
Firmware
COM Protocol
Libraries
Video Tutorial
Integrated components
Real-Time Clock (RTC)
- Provides added security against changing the log’s date and time
User-configurable EEPROM
- Enables writing of certain data (user data, licenses, certificates, etc.) into the device.
- Read-only access
- Writing enabled only with a password
Buzzer (Beeper)
- User controllable built-in speaker
- Sound on Reading and Write events
Relay
- For triggering the electronic lock mechanism (used for access control)
Base HD is an NFC-compatible Contactless Smart Card and Tag RFID Reader Writer – programmer intended for implementation with MIFARE® and other ISO14443A/B compatible cards, tags, key fobs, stickers, and wristbands.
Base HD – NFC RFID Reader Writer fully supports both 4-byte and 7-byte UIDs and an anti-collision mechanism. It also supports NFC Forum Type 2 and tags like NTAG and Ultralight family.
In addition to the hardware, the NFC system development kit contains a fully-featured API with examples, libraries, development tools, and software for everyday use. The libraries for Windows (“*.dll”) and Linux (“*.so”) OS platforms are included as well. The reader acts as a serial interface device: So it is visible on any platform. It is successfully implemented on Mac, Raspberry Pi, BeagleBoard, and Android OS ( up from the 3.2 Honeycomb version).
All source code software examples are available in all major programming languages.
For example:
- Java (and Java Applet example),
- JavaScript (unique feature, convenient for PHP usage),
- Lazarus,
- Borland Delphi,
- C++ Borland Builder,
- Microsoft® Visual .NET family: C++, C#, VB
At the customer’s request, our team also develops software examples in other programming languages that are not currently included in our repository.
Such requests are processed according to priorities that are aligned with a similar project’s existence in the development queue or partner relations with the client.
Most importantly, support is provided for all the developing platforms.
The software package includes a set of very useful applications intended for everyday use. Such as:
- Application for programming and manipulation of NFC compliant like NTAG and MIFARE Ultralight®, with source code, included.
- Android NFC phone App – Android NFC phone Application for MIFARE® reading. Write a card with uFR, and read it with an NFC phone!
- Formatter – application for card/tag formatting and programming
- uFR2FileSystem – keyboard simulation, data reading, data parsing into several formats, and sending data to MySQL database via HTTP.
- Application for NTAG and MIFARE Ultralight® programming and manipulation.
- Application for creating and writing common NDEF messages into NFC tags
- Reader Keys application – for easy manipulation of keys stored in the reader
Our support team provides explanations and assistance for the implementation and custom solutions development to each customer’s requirements.
Downloads:Software examples with SDK,AIS Hotel API, and configuration
Operating modes
Base HD NFC RFID Reader Writer can operate in two basic modes: autonomous and non-autonomous.
In non-autonomous mode device acts as all other readers from the uFR series, like Classic, Nano, and Advanced. The same protocol, libraries, Software development kit API, and examples are used for this purpose.
A significant difference is that Base HD devices can work on installations where long cable runs are a must. So, for example, you can establish a PC-Base HD communication link with a 320m (1000) ft cable using only USB power.
In addition, Base HD RFID NFC Reader has a built-in access control IO module, which has the following functionalities:
Door strike lock contacts
Push to open button contacts
NO & NC relay contacts
Door state contact inputs
When the autonomous mode is enabled, the device can operate independently. As a result, it does not require a direct connection to the host. In this case, it only needs a USB or equivalent power supply (5V DC).
The device stores card-related events in non-volatile memory. Also, each event is sent asynchronously to the host as a Real-Time Event (RTE).
The device can store up to 16384 separate events. After its buffer overflows, it starts to erase the oldest events to free memory for new forthcoming events.
Get your BASE HD development kit right away!
BUY NOW!
COMMON APPLICATIONS
- Electronic payment systems
- Identification systems
- Access control systems
- Subscription services
- Banking systems
- Digital content system
- Customer loyalty systems
- Vending machines
- Time & attendance
- Machine work attendance
- NFC card and tag programming
- NFC NDEF records management
- Network access control
- Inventory management
- Software login management
- Automatic fare collection
- Public transport terminals
- Cashless payment
- Parking systems
- Reception desk services
- Event visitors attendance
- Authentication and authorization
- Libraries, museums, stadium events
FEATURES
- Identity verification, data exchange & contactless transaction
- Useful for the binding device to software license
- Supporting multiple OS (Win, Linux, Android)
- USB compliant interface
- Operating Frequency: 13.56MHz
- Proximity read/write speed up to 424 kbps
- Built-in antenna for contactless tag access, with a reading distance of up to 60 mm
- Supports MIFARE® and other ISO 14443 Type A/B
- Supports ISO18092 NFC tags
- Built-in anti-collision feature
- RFID Reader locking by passwords and keys
- Application Programming Interface:
- Virtual COM through FTDI
- User controllable LEDs
- Upgradable (3-year or 5-year) warranty
SOFTWARE FEATURES
- NFC cards and tags reading/writing (programming)
- NFC NDEF Record writing: MIME types, URI types, vCard, SMS, Phone, URL
- Card formatting
- Card linear space emulation
- Card block direct access
- Card sectors and blocks indirect access
- Card Keys and Access Bits management
- Block values management (increment/decrement)
- Asynchronously sending of Card UID to COM port (feature programmable)
- DES and 3DES Software Encryption
- Optional APDU structure (application protocol data unit) with examples of the Credit Card use in public data reading
- Shell-like environment for easy testing and automation
- Web browser extensions for Chrome, Firefox, and Opera
- Digital Signing source code examples: contactless signing of digital documents with PKI (public key infrastructure) certificates
Downloads: API Documentation,µFR COM Protocol,Software source code examples with SDK
The documentation contains a detailed explanation of API and communication protocol reference with actual byte-level examples for communication protocol implementation. Our API provides a very comfortable way of implementation, and we highly recommend it. When API implementation is not possible, a communication protocol is a very good alternative. We provide regular updates for all libraries, firmware, examples, tools, and documents. Updates are FREE and are available for download from the official Digital Logic GitLab repository.
Our support team always provides prompt responses. Depending on the inquiry complexity, you can expect an answer in no more than 24 hours.
We are open to custom development requirements based on specific customer needs. Feel free to contact us for any questions or further assistance regarding your projects and implementation.
Base HD hardware specification
Feature | Description |
---|---|
Operating frequency | 13.56 MHz |
Read range | The operating distance is 2o-80mm (0,78”-3,15”), depending on the antenna geometry and reader configuration |
Supported cable length | Up to 320 meters (1050 feet) |
Supply current | 150mA (operating) |
Supply voltage | 5V |
Supported cards and tags | MIFARE® family: MIFARE Mini®, MIFARE Classic® (1K, 4K, EV1), MIFARE Ultralight®, MIFARE Ultralight C®, MIFARE PLUS® (2K, 4K), MIFARE DESFire® (Light, 2K, 4K, 8K, EV1, EV2) NTAG® family: NXP NTAG® 2xx Type 2 (210, 213, 215, 216 Tag Tamper), NXP NTAG® 4xx DNA Type 4 (413, 424) SmartMX® family: NXP JCOP® Java Card (J3A040, J3A081, J3H145, JC30M48CR) |
Connection and power supply | RS-485 or USB (RS-485-to-USB converter included) |
Software | Library and SDK for Java, Java Applet, JavaScript, Node JS extensions, Lazarus, Borland Delphi, C, C + + Builder, C++ WxWidgets, Microsoft® Visual C++ .NET, Microsoft® Visual C #, Microsoft® Visual Basic .NET, PHP, Python, and Arduino IDE examples |
Supported Operating Systems | Microsoft® Windows™, Linux®, macOS, Android |
Smart Card Interface | ISO14443 Type A & B, ISO18092 |
Built-in components | Buzzer, Real-Time Clock (RTC), EEPROM, Relay |
Accessories | Cards, key-fobs, labels, wristbands, tags |
Size & Weight
Model | Dimensions (mm) | Device | Commercial Set |
Base HD | 86 x 54 x 9 | 150 g | 311 g |
WARRANTY: 24 MONTHS
Get your BASE HD development kit right away!
BUY NOW!
HOME
HARDWARE PRODUCTS
SDK SOFTWARE
FAQs
What can you do with an RFID reader and writer? ›
- pet and livestock tracking.
- inventory management.
- asset tracking and equipment tracking.
- inventory control.
- cargo and supply chain logistics.
- vehicle tracking.
- customer service and loss control.
- improved visibility and distribution in the supply chain.
If a chip is applied on a metallic surface and does not contain a protective layer, the metal reduces the radio frequency signals and the chip does not respond. The solution is to use transponders with special protection from ferromagnetic materials known as on-metal or anti-metal protection.
Can you write RFID tags with your phone? ›Can my phone be used as RFID tag? Yes, you can use your phone as RFID tag. For Android or Windows phones you enable NFC. In case of an Apple you need to enable Bluetooth.
What is the difference between NFC reader and RFID reader? ›What is the difference between NFC vs RFID? In short: RFID stands for Radio Frequency Identification, a contactless one-way communication method at varying distances. NFC, Near Field Communication, allows for two-way communication and requires action by the user.
How do I decode my RFID card? ›So the read-only code or UID (Unique Identifier) on the RFID tag is read first, which is an 8-byte unique identifier. From this number, the manufacturer and chip type can be decoded. Once the chip is known, the writing of 8 bytes is performed automatically.
How many times can you write to an RFID tag? ›RFID Standards:
125 Khz (low-frequency) tags are write-once/read-many, and usually only contain a small (permanent) unique identification number. 13.56 Mhz (high-frequency) tags are usually read/write, they can typically store about 1 to 2 kilbytes of data in addition to their preset (permanent) unique ID number.
Typically, when an antenna is attached, a reader attempts to communicate with the tag. Sometimes, it writes a serial number to that tag, assuming the tags are preprogrammed. If the tag can successfully communicate with it, then it is properly functioning.
What blocks RFID readers? ›- Metal: Metal is a highly effective RFID signal blocker, as it reflects radio waves and prevents them from penetrating the material. ...
- Water: ...
- Concrete: ...
- Leather: ...
- Faraday cages: ...
- RFID-blocking materials:
Active RFID tags have a battery that can last for up to 10 years, depending on its size, type and beacon rate, but the tags do have to be replaced when the battery dies. Many systems have tags report when the battery is low, so that the tag can be replaced before it dies.
How do I write to NFC tags? ›To simply write to one blank NFC tag, make sure all of these options are unchecked. Finally, select “Write” at the bottom of the screen and tap the back of your phone to a blank NFC tag as if you were going to read it. This writes the URL to the tag. Congratulations, you've just encoded your first NFC tag!
What phones can write NFC tags? ›
Brand | Model | NFC Tags Compatibility |
---|---|---|
Apple | iPhone Xs / Xs Max ** | ✔ |
Apple | iPhone Xr ** | ✔ |
Apple | iPhone 11, 11 Pro, 11 Pro Max | ✔ |
Apple | iPhone 12, 12 Pro, 12 Pro Max, 12 Mini | ✔ |
An RFID sled is an RFID scanner with the same capabilities as a handheld UHF RFID reader; however, it's also equipped with Bluetooth technology that can connect the RFID sled to mobile devices such as a smartphone or a tablet. It is used to read RFID tags for asset and inventory tracking.
What can I use NFC reader for? ›NFC is commonly used for contactless payment systems, such as Apple Pay and Android Pay. It is also used in some public transport systems, such as the Oyster card in London. RFID is used in a variety of applications, including contactless key fobs, security systems, and inventory management.
Why would I need a NFC tag reader? ›Near-field communication (NFC) allows devices within a few centimeters of each other to exchange information wirelessly. iOS apps running on supported devices can use NFC scanning to read data from electronic tags attached to real-world objects.
What is the disadvantage of NFC tag reader? ›Drawbacks or disadvantages of NFC
Following are the disadvantages of NFC: ➨It can only works in shorter distances which is about 10-20 cm. ➨It offers very low data transfer rates which is about 106 or 212 or 424 Kbps. ➨It is very expensive for the companies to adopt the NFC enabled devices.
If unauthorized individuals get access to the information stored in the RFID chip, they can easily copy the data into another card to develop a replica. This RFID card clone will perform just like the original card, which poses a significant security threat.
Can I copy NFC card to phone? ›Turn on the device and hold a compatible EM4100 card or fob to the side facing the hand grip and click on the “Read” button. The device will then beep if it succeeds, now replace the copied tag with an empty tag and press “Write” The information stored on the original tag or fob will then be copied onto the new device.
How long do RFID readers last? ›Active: Active RFID tags usually last between three to five years, depending on the battery. Some tags may allow for battery replacement, while other tags may not. These tags also last much longer than other RTLS technologies such as ultra wide-band tags and WiFi tags).
Do RFID tags need to be programmed? ›The data stored on the RFID chip comes pre-programmed (pre-encoded) directly from the manufacturer, but can easily be re-programmed. However, there are a few things to consider before re-programming an RFID tag, such as memory bank information, the memory format (the way the data is represented), and character limits.
Can RFID tags track you? ›Can RFID tags be tracked? Yes, RFID tags can be tracked. They can be tracked automatically using active RFID tags or manually using passive RFID tags. To be tracked RFID tags provide data related to where they have been and where they currently are.
How can I test my RFID at home? ›
The simple way is to bring it across an RFID scanner/reader while placing the credit card inside it. If you see any signals transmitting, you can tell that the wallet is not RFID protected.
What is my RFID number? ›The RFID number is located on the back, below the magnetic strip at the bottom of the card. The number starts with an asterisk and is four to six digits long.
Does aluminum foil block RFID? ›Is it possible to do RFID blocking with aluminum foil? Yes, it is possible successfully block RFID with aluminum foil. It can work by simply wrapping it around your cards or wallet. In fact, many people actually use aluminum foil around their cards' as a homemade, cheap RFID blocker.
What kills RFID? ›To kill a tag, you need to overload it with energy and blow its circuits. These circuits are tiny, so even static electricity from your finger can blow them, as long as you are able to touch the chip directly.
Can someone scan your credit card in your wallet? ›Although banks claim that RFID chips on cards are encrypted to protect information, it's been proven that scanners—either homemade or easily bought—can swipe the cardholder's name and number. (A cell-phone-sized RFID reader powered at 30 dBm (decibels per milliwatt) can pick up card information from 10 feet away.
Can RFID cards be hacked? ›Hackers can and have jammed RFID cards and tags from working simply by being nearby and generating a signal that is stronger than the one being put out by the RFID reader. This can make it impossible to track inventory using RFID, while also creating general havoc by preventing access using ID cards.
Can RFID be reactivated? ›Such a separation provides visual confirmation that the tag has been deactivated. However, a physical contact channel may be used later to reactivate it. Such a reactivation would require deliberate actions on the part of the owner of the RFID tag to permit the reactivation to take place.
What is NFC code? ›Near Field Communication (NFC) is a radio-frequency technology that allows the transmission of data between an NFC tag and NFC-enabled device. NFC tags can basically do what QR codes are being used for and more because they use embedded chips.
Can phones read NFC tags? ›If the NFC function has been activated on the Android smartphone (Activate NFC on Android), the NFC tag can be easily read with the smartphone. To do this, it simply has to be held against the upper back of the device.
Is an NFC tag on your phone? ›The bottom line is that almost all modern Android devices have NFC, as does every iPhone since the iPhone 6. In either case, though, you'll need a relatively recent version of Android or iOS to take advantage of the latest NFC capabilities.
How do I know if my phone is NFC compatible? ›
One way you can test if your phone has NFC capabilities by opening the HotSpot app, going to the “Parking” tab, press the “Gate” tab, then click the “Use Tap” button. If your phone screen changes and says “Ready to Scan”, you have NFC capabilities.
Can you write on NFC tags with Sharpie? ›Our nfc card is PVC material, it can be written by a permanent marker or pen,but I do not advise to write,becuase it may damage the chip. You can try a way, write it on a note paper with adhesive function and stick it on the card.
How do I know if my phone has an NFC tag reader? ›You can check whether your Google phone is enabled for NFC by opening your settings. In the search settings bar, type “NFC” and tap to turn it on. If you cannot find it following these steps, your phone cannot make contactless payments.
How can I use my phone as a key card? ›- Open the Google Wallet app .
- Tap your digital car key. You may need to swipe to find it.
- At the bottom, tap Details. Require phone unlock.
- Choose the action that you want to use the screen lock for: Unlock car. Start car. Unlock, lock, and start car. For no screen lock, tap Off.
- Tap Save.
Adalberto, Regulators carefully apportion the radio frequency spectrum to avoid having one RF device interfere with another. So radio frequency identification generally is given a piece of the spectrum that will not interfere with cell phones.
Do you need an app to scan NFC? ›IOS & Android devices can scan an NFC tag by tapping the physical tag to instantly pull up information on the device.
What are two uses of NFC on smartphones? ›NFC is a method of wireless data transfer that allows smartphones, laptops, tablets and other devices to share data when in close proximity. NFC technology powers contactless payments via mobile wallets like Apple Pay and Google Pay, as well as contactless cards.
How to read data from NFC tag in Android? ›- Initialize NFC Adapter. First, init the NFCAdapter in the onCreate method of the Activity or a similar Fragment lifecycle method. ...
- Enable Foreground Dispatch. Next, call enableForegroundDispatch to enable foreground dispatch of the NFCAdapter . ...
- Disable Foreground Dispatch.
The NFC (near field communication) tag is made up of an antenna and a small passive IC chip usually on a PET substrate with an adhesive backing; no power source required. Tags have a lifespan of 10 plus years.
Can I turn off NFC tag reader? ›Here's how to do it: Open Settings > Connected devices. Some Android phones have the NFC option in the system tray menu at the top of the screen. Turn off the NFC toggle switch.
What are some of the risks of using NFC on your phone or devices? ›
...
Potential NFC risks for enterprises
- Privacy. ...
- Payment processing fraud. ...
- Data corruption and tampering. ...
- Eavesdropping and interception.
The technology works over a very short distance — approximately 4 inches. NFC tags work without a battery and draw power from another device, e.g., a smartphone. An NFC reader connects to only one NFC tag at a time, minimizing accidental transactions.
What are RFID writers used for? ›GAO's Gen2 readers/writers can provide any RFID application with the ability to read and simultaneously interrogate RFID tags while enabling the writing of information to RFID read-write tags.
What is a handheld RFID writer used for? ›This device is used to copy and duplicate the 125 Khz EM4100 ID Card for backup purpose. Excellent program algorithm and circuit design are adopted. You can copy all ID(EM4100) Cards with this RFID copier. Portable size, easy to carry.
What can an RFID reader do? ›The reader is a device that has one or more antennas that emit radio waves and receive signals back from the RFID tag. Tags, which use radio waves to communicate their identity and other information to nearby readers, can be passive or active. Passive RFID tags are powered by the reader and do not have a battery.
What does RFID reader do? ›The RFID reader is responsible for orchestrating the communication between itself and RFID tags in its read range, which decodes the data encoded in the tag's IC and passes the data to the middleware for further processing.
How do criminals use RFID readers? ›A criminal can hide the scanner e.g. inside a glove or a bag, and then place it close to the victim and wirelessly steal the victim's payment card information. With the wirelessly obtained payment card information, the criminal can use it to make fraudulent purchases online. This is called card-not-present fraud.
How is RFID used to steal information? ›What Is RFID? Radio-Frequency Identification (RFID) involves the use of radio waves to read and capture information stored on an electronic chip attached to an object. RFID chips, or “tags,” can be read via scanning devices from up to several feet away.
What are three uses of RFID? ›- Car rental: No-waiting vehicle returns. ...
- Amusement parks: No-swipe ticket passes. ...
- Casinos: Robbery-proof chips. ...
- Sports: Loss-resistant golf balls. ...
- Guns: Safety products. ...
- Smart fitting rooms. ...
- Health care: A hygiene solution.
RFID is a method of data collection that involves automatically identifying objects through low-power radio waves. Data is sent and received with a system consisting of RFID tags, an antenna, an RFID reader, and a transceiver.
How do hackers use RFID? ›
Hackers can and have jammed RFID cards and tags from working simply by being nearby and generating a signal that is stronger than the one being put out by the RFID reader. This can make it impossible to track inventory using RFID, while also creating general havoc by preventing access using ID cards.
Can RFID track you? ›Aside from keeping track of inventory, RFID technology also helps organizations identify people and monitor their location. They can detect people who stray away from their assigned locations and help prevent theft, shoplifting, or other problems.
Do credit cards use RFID? ›Though many new credit cards are RFID-enabled, not all of them are. On the other hand, all newly-issued credit cards come with an EMV chip. You won't be able to see the RFID chip in a credit card because it's inside the card. Credit cards with RFID technology are easy to use.