Security

Anti-Cloning

Techniques and technologies used to prevent NFC tag duplication, including originality signatures, SUN/SDM dynamic messages, mutual authentication, and tamper-evident packaging. Critical for brand protection and access control.

Còn được gọi là: anti-cloning clone protection

What Is Anti-Cloning?

Anti-cloning refers to hardware and software techniques used to prevent unauthorized duplication of NFC tags. In a cloning attack, an adversary copies data from a legitimate tag onto a blank chip, creating a functional duplicate. Anti-cloning measures make such duplication either technically impossible or easily detectable by backend systems.

Why Anti-Cloning Matters

NFC tags are increasingly used where tag authenticity is critical: brand protection (counterfeit goods using cloned tags), access control (duplicated employee badges), event ticketing (copied wristbands), and loyalty programs (point fraud). Without anti-cloning, an attacker can clone a tag in under 30 seconds using a smartphone and freely available apps.

Anti-Cloning Technologies

Hardware-Level Protection

Technology Mechanism Chip Examples
Originality Signature Factory ECC signature over UID NTAG 21x, ICODE DNA
SUN/SDM Per-tap unique CMAC URL NTAG 424 DNA
Mutual Authentication AES challenge-response DESFire EV3, NTAG 424 DNA
Unique UID Non-clonable factory serial All genuine NXP chips
Tamper detection Physical loop break sensing NTAG 424 DNA TagTamper

Software-Level Protection

  • Backend counter validation: The internal NFC read counter on the original continues incrementing. The backend detects counter anomalies (two tags reporting different counters for the same UID).
  • UID allowlisting: The server maintains a registry of legitimately provisioned UIDs.
  • Geofencing and velocity checks: Taps from impossible locations or in impossibly short intervals indicate cloned tags.

Layered Defense Strategy

Best practice combines multiple layers:

  1. Layer 1 — Hardware authenticity: Originality signature confirms genuine NXP silicon.
  2. Layer 2 — Dynamic authentication: SDM with per-tap CMAC prevents replay.
  3. Layer 3 — Counter validation: Backend tracks monotonic counter to detect stale clones.
  4. Layer 4 — Physical tamper evidence: TagTamper variants detect if the tag has been removed from the product.

Choosing the Right Chip

For strong anti-cloning: use NTAG 424 DNA with SUN/SDM for consumer products, MIFARE DESFire EV3 with AES mutual authentication for high-security access, and ICODE DNA for ISO 15693 logistics. Tags using only password protection (NTAG 213/215/216) offer minimal clone resistance.

Related Terms

Related Guides

Câu Hỏi Thường Gặp

The NFC glossary is a comprehensive reference of technical terms, acronyms, and concepts used in Near Field Communication technology. It is designed for developers, product managers, and engineers who work with NFC and need clear definitions of terms like NDEF, APDU, anti-collision, and ISO 14443.

Each glossary term is cross-referenced with related NFC chips, standards, and other terms. For example, the term 'AES-128' links to chips that support AES encryption (NTAG 424 DNA, DESFire EV2/EV3), and the term 'ISO 14443' links to all chips compliant with that standard.

Yes. NFCFYI provides glossary definitions in 15 languages including English, Korean, Japanese, Chinese, Spanish, Portuguese, Hindi, Arabic, French, Russian, German, Turkish, Vietnamese, Indonesian, and Thai. Use the language selector in the header to switch languages.