Memory & Data

UID (Unique Identifier)

A factory-programmed read-only serial number that uniquely identifies each NFC chip. UIDs are 4 bytes (single-size) or 7 bytes (double-size) for ISO 14443, or 8 bytes for ISO 15693. Used for anti-collision and simple identification.

Également connu sous le nom de: UID unique identifier serial number

UID (Unique Identifier)

The UID (Unique Identifier) is a factory-programmed, read-only serial number permanently stored in every NFC chip. Each UID is intended to be globally unique, assigned during the IC manufacturing process and written to non-volatile memory before the chip leaves the fabrication facility. The UID serves as the primary mechanism for anti-collision (distinguishing multiple tags in the same RF field) and as a basic identifier for inventory and tracking systems.

UID Formats

UID length depends on the underlying standard and chip type:

Standard UID Length Format Used By
ISO 14443 Type A 4 bytes (single) Manufacturer code + serial MIFARE Classic
ISO 14443 Type A 7 bytes (double) Manufacturer (1B) + serial (6B) NTAG, MIFARE Ultralight, DESFire
ISO 14443 Type A 10 bytes (triple) Three cascaded levels Rare, reserved
ISO 15693 8 bytes Manufacturer (1B) + serial (7B) ICODE, ST25TV

For 7-byte UIDs (the most common in modern NFC tags), the first byte identifies the IC manufacturer (NXP = 0x04, STMicroelectronics = 0x02), and the remaining 6 bytes are sequential serial numbers.

UID in the Anti-Collision Process

During the NFC-A anti-collision procedure defined in ISO 14443 Part 3, the reader broadcasts ANTICOLLISION commands and tags respond with their UIDs. When multiple tags respond simultaneously, the reader detects collision bits and narrows the search by specifying known UID bits in subsequent commands. This binary tree walk isolates each tag's complete UID, enabling the reader to SELECT a specific tag for further communication.

Security Considerations

A UID alone is not a security credential. UIDs are transmitted in plaintext during anti-collision and can be easily read, recorded, and programmed into writable chips (MIFARE Classic clones). Relying on UID-based access control without additional cryptographic authentication is a significant security vulnerability. Secure applications should use AES encryption, mutual authentication, or SUN messages instead of or in addition to UID checks.

UID Mirroring

Some chips (NTAG 213/215/216) support UID mirroring: the chip automatically writes its UID into a specified location within user memory. This allows the UID to appear as part of an NDEF URL payload — for example, a tag might open https://example.com/verify?uid=04A1B2C3D4E5F6 where the UID portion is dynamically inserted by the chip on every read.

Related Terms

Related Guides

Questions fréquemment posées

The NFC glossary is a comprehensive reference of technical terms, acronyms, and concepts used in Near Field Communication technology. It is designed for developers, product managers, and engineers who work with NFC and need clear definitions of terms like NDEF, APDU, anti-collision, and ISO 14443.

Each glossary term is cross-referenced with related NFC chips, standards, and other terms. For example, the term 'AES-128' links to chips that support AES encryption (NTAG 424 DNA, DESFire EV2/EV3), and the term 'ISO 14443' links to all chips compliant with that standard.

Yes. NFCFYI provides glossary definitions in 15 languages including English, Korean, Japanese, Chinese, Spanish, Portuguese, Hindi, Arabic, French, Russian, German, Turkish, Vietnamese, Indonesian, and Thai. Use the language selector in the header to switch languages.