Choosing the Right NFC (RFID) Tags for Check-In/Check-Out
The Right NFC and RFID Tags for Check-in in TARGPatrol
Choosing the right NFC tags is key to reliable check-ins with TARGPatrol. In this guide, we’ll show you what to look for—standards (use NFC Forum–compliant tags such as NTAG/Type 2 for broad device support), durability (indoor vs. outdoor, water/chemical resistance, tamper-evident options), mounting surface (on-metal/ferrite-backed tags for steel, standard tags for wood, drywall, glass), and form factor (stickers, discs, key fobs, screw-mount). We’ll also cover memory and encoding basics—most TARGPatrol setups only need a tag ID (often entered as a 4-byte or 7-byte HEX like AABBCCDD or assigned by scanning in the mobile app)—plus practical tips for printing, bulk ordering, and keeping costs down without sacrificing reliability.
NFC tags aren’t literally “forever,” but chip makers rate their memory for very long lifetimes. Older models typically guarantee at least ~10 years of data retention, while newer, higher-grade chips are rated for several decades—and some vendor variants claim up to ~200 years of retention for certain data areas (e.g., UID/NDEF) under recommended conditions. As always, real-world longevity depends on chip model, operating temperature, and storage environment.
Also note: NFC tags are passive devices—no battery or external power is required. They harvest energy from the reader’s RF field, so they can sit in place for years without maintenance.
RFID vs NFC
RFID (Radio Frequency Identification) is a broad family of technologies that use radio waves to read/write small tags across several bands (LF, HF, UHF). NFC (Near Field Communication) is a subset of HF RFID at 13.56 MHz, standardized for very short range (a few centimeters) and built into smartphones. In short: all NFC tags are HF RFID, but not all RFID tags are NFC. TARGPatrol uses NFC (HF RFID) tags so guards can check in with their phones; long-range UHF RFID isn’t required.
Choice of NFC Chip
If you plan to scan with smartphones, choose NFC Forum–compliant NTAG® or ICODE® chips. For the widest device compatibility (iOS and Android), NTAG (Type 2 / ISO 14443A) is the safest bet—NTAG213 is inexpensive and fast, while NTAG215/216 add more memory (useful if you also print/encode data, though TARGPatrol typically only needs the tag’s UID). ICODE (e.g., SLIX/SLIX2, Type 5 / ISO 15693) can offer a slightly longer read range and performs well in industrial setups, but some older iPhones or budget Androids may not read NFC-V—so verify handset support before standardizing. For metal surfaces, order on-metal (ferrite-backed) tags; for outdoor use, pick rugged housings (ABS/epoxy, IP67+, UV-resistant adhesive). If anti-tampering matters, consider tamper-evident or UID-locked tags. A practical tip: print a backup QR code on the label so users can still check in if a device’s NFC is unavailable.
NTAG203 vs NTAG213
Both are NFC Forum Type 2 (ISO 14443A) and work with essentially all modern smartphones. However, NTAG203 is end-of-life and has been replaced by NTAG213. NTAG213 adds useful capabilities (e.g., password protection, scan counter) and slightly more memory. If you previously standardized on NTAG203, you can switch to NTAG213 without any issues.
NTAG213 vs NTAG216
Both offer universal phone compatibility and 7-byte UIDs. The key difference is memory: NTAG213 ≈ 144 bytes, NTAG216 ≈ 888 bytes.
For TARGPatrol check-ins, you typically only need the tag’s UID, so NTAG213 is the best value and our default recommendation.
Choose NTAG216 only if you have a parallel use case that truly needs larger NDEF payloads (e.g., storing long vCards or additional on-tag metadata).
Quick takeaway: For most TARGPatrol deployments, pick NTAG213. It’s modern, widely compatible, cost-effective, and fully sufficient when the system reads the tag UID for check-ins.
Choosing NFC Tags for TARGPatrol
Selecting the right NFC tags ensures reliable, fast check-ins in TARGPatrol. Use the guidance below when buying and installing tags.
Tag placement (metal & interference)
Metal and other conductive materials detune NFC. Never place metal between the phone and the tag—the tag won’t be readable.
If you must mount on metal, use on-metal (anti-metal) tags with a ferrite backing. Mount them with the reader-facing side outward (they are readable only from the non-metal side).
Ferrite backing slightly reduces read range. Plan for a shorter scan distance vs. standard labels.
Size & read range
Bigger antenna = easier scans. If space allows, choose tags with a larger antenna (e.g., 25–30 mm round or similar).
Avoid very small tags (e.g., under ~12 mm)—they’re harder to detect with typical smartphones.
Mounting behind glass or plastic is usually fine but can reduce range; test before bulk installation.
For the same footprint, on-metal tags will have shorter range than non-metal tags.
Harsh environments
Pick constructions and housings that match your conditions:
Water & dust: Look for IP66/IP67/IP68.
Temperature: Standard tags operate roughly –20 °C to +70 °C. High-temp industrial tags can handle up to ~230 °C (check the spec).
Outdoors: UV-resistant, weatherproof materials and strong adhesives or mechanical fasteners.
Impact & vibration: Rugged, encapsulated hard-tags.
Chemicals / sanitizers / marine: Chemical-resistant plastics and adhesives; verify compatibility.
Washing / sterilization: Laundry-grade or heat-resistant tags for repeated cycles.
Quick TARGPatrol tips
Place tags where phones can comfortably approach flat (e.g., chest-height on door frames, railings, equipment housings).
Label each tag’s purpose (Point name/ID) to reduce operator error.
Before bulk rollout, pilot a few tags in real conditions (surface, temperature, cleaners) to validate read performance.
With the right tag type, placement, and construction, your NFC check-ins in TARGPatrol will be fast, consistent, and durable.
NFC Encryption & TARGPatrol Support
Quick note: The standard TARGPatrol iOS and Android apps do not work with encrypted NFC memory. If your security policy requires encrypted tags, we can provide a custom enterprise build that supports them. (Get in touch to discuss chip model, devices, and key-management requirements.)
Without encryption, anyone with a phone or NFC reader can read (and sometimes write) tag contents. Encryption protects data on the tag and helps prevent cloning/tampering.
Chip families & security (high level)
Recommended (modern, strong crypto)
MIFARE® DESFire® EV1/EV2/Light — DES/2K3DES/3K3DES/AES; widely used for secure access and tickets.
MIFARE Plus® (SL3) / ICODE® DNA — AES-128; strong authentication and anti-cloning features.
Acceptable with caveats
MIFARE Ultralight® C — 3DES; basic authentication, limited memory.
Avoid for security
MIFARE Classic® (CRYPTO1) — legacy cipher broken (since 2008); not suitable for security use.
Note on phones: iOS and Android support varies by chip and reader mode. iOS does not natively support MIFARE Classic; DESFire/ISO14443-4 and ICODE DNA are better cross-platform choices.
How this works with TARGPatrol
Standard app (default plans): Works with non-encrypted NFC (UID/NDEF). No access to encrypted sectors.
Enterprise solution: We can deliver a custom app that:
Authenticates to tags (DESFire / ICODE DNA, etc.)
Reads secure data or performs challenge–response
Implements key storage, rotation, and per-tag keys
Logs cryptographic outcomes in task check-ins (e.g., “NFC auth OK/failed”)
Practical recommendations
Choose DESFire EV2/EV3 or ICODE DNA for best security and iOS/Android compatibility.
Use unique keys per tag, stored securely (e.g., device keystore + backend).
Plan for key rotation and revocation procedures.
If you have mixed or BYOD devices, consider QR as a fallback for edge cases.
Next step: If you need encrypted NFC, share your chip model(s), device list, and security objectives. We’ll confirm feasibility and scope a custom enterprise build for your rollout.