NFC Tag Programming Service

Duolabs has developed entirely in-house both the hardware and software dedicated to programming NFC Tags (see the tag types). This proprietary infrastructure lets us manage all encoding phases securely and flexibly—from writing the information to verifying correct programming—ensuring full reliability and traceability.

A distinctive service offered by Duolabs is NFC Tag serialization, performed according to the customer’s custom algorithm. Serialization can be based on the serial number (UID) and implemented using symmetric cryptography such as AES and 3DES, asymmetric algorithms such as RSA and ECC, as well as hash functions like SHA. This flexibility guarantees a wide range of secure solutions adaptable to every customer need.

To meet industrial production requirements, Duolabs has refined its technology to handle tags on rolls with variable spacing up to 4 millimeters, eliminating anticollision issues. Thanks to this, it’s possible to program up to 32 Tags per system simultaneously. The systems themselves are designed to be scalable and replicable, enabling the creation of many parallel production lines and ensuring very high output capacity.

The programming process ensures not only correct data writing but also the verification of each individual Tag. All UIDs are recorded to guarantee complete traceability: every Tag is linked to the original roll, the machine that programmed it, and even the specific reader that verified its functionality. This level of detail allows total supply-chain control and ensures certified quality. In addition, defective Tags (BAD) are removed and replaced, guaranteeing rolls that are 100% working.

Duolabs’ production capacity ranges from 50,000 to 500,000 Tags programmed per day, depending on the type of serialization required and the complexity of the information to be written. This scalability allows us to respond promptly and reliably to both small projects and large industrial supply volumes.

The hardware and software developed by Duolabs are completely proprietary and were created to ensure maximum compatibility and customization. This makes it possible not only to program all standard Tags, but also advanced devices such as NTag, which offer special features for complex, next-generation applications. We support the ISO 14443, ISO 15693, and ISO 18000 standards, ensuring global compatibility.

Thanks to our long-standing experience in the DVB sector, where piracy issues required extremely secure systems, Duolabs provides advanced expertise for building secure encoding solutions. This know-how is transferred into NFC projects to ensure protection, effectiveness, and resistance to fraudulent attacks.

Besides programming, Duolabs offers fine-tuning services for NFC readers, including antenna calibration and the design of customized RFID readers, together with the software to manage them. This integrated approach enables complete, optimized systems for every application scenario.

To address issues related to unauthorized production or handling extra lots, Duolabs provides a cloud platform for remote generation of NFC Tag payloads. This solution ensures traceability, certified origin, and data security, allowing complete control of the production chain.

Duolabs has also developed innovative systems for consumable protection such as DuoLocker, designed to guarantee the authenticity of consumable materials and prevent the use of counterfeit components.

Finally, the company offers years of experience in digital security for creating systems that allow verification of the authenticity of final products. This expertise ensures robust, reliable solutions to protect your business.

In addition to programming services, Duolabs also handles direct sourcing of Tags from certified suppliers, offering a turnkey service from material supply to customized serialization.

Industrial RFID NFC Tag Programming Service.

Strengths of Duolabs:

  • Proprietary Technology

    Duolabs has internally developed proprietary hardware and software technology for NFC Tag programming.

  • Reliability

    All NFC Tags are programmed and verified individually.

  • NFC Tag Customization

    Ability to customize NFC Tag content using tag-specific features combined with cryptographic algorithms.

  • Programming based on UID

    All Tags can be programmed based on their UID.

  • Production Capacity

    On current production lines, daily capacity can reach 500,000 units.

  • Tag Traceability

    All programmed Tags are traceable from the UID down to the individual reader that programmed them.

  • Remote Programming

    Tag content can be generated locally or remotely at the customer’s site.

  • Additional Services

    Duolabs provides PC software for programming customized tags (including the customer’s logo) and dedicated hardware with tailor-made RFID readers.

RFID Tag Types

RFID Tags can be grouped into three major families by operating frequency:

  • LF – 125 kHz: Low Frequency RFID. Typical range of a few centimeters; widely used for access control and animal identification. They are not readable by smartphones (not NFC).
  • HF – 13.56 MHz (NFC): High Frequency / NFC. Related standards: ISO/IEC 14443 and ISO/IEC 15693. NFC tags are specific RFID tags operating in the NFC band (13.56 MHz) that can be read/written by compatible smartphones and dedicated readers.
    They store small amounts of data (e.g., an NDEF record with URL, text, commands) and are passive—powered by the reader’s field. Popular models (e.g., NTAG213/215/216, MIFARE Classic/Ultralight) offer memory from a few dozen to several hundred bytes, lock (read-only) functions and sometimes passwords. They are not suitable for storing secrets: data can be read by any NFC reader unless protected.
  • UHF – 860–960 MHz: EPCglobal Class-1 Gen-2 / ISO/IEC 18000-63. Read ranges up to several meters; ideal for logistics, inventory, and traceability. Not readable by standard smartphones.

The image below groups RFID Tags by operating frequency:

How They’re Used (Practice)

  1. Choose the right tag: LF 125 kHz for legacy access; NFC/HF when you need smartphone interaction; UHF for long-range reads and inventory.
  2. Encoding/Writing: for NFC, use an encoding app (e.g., “NFC Tools”) or a desktop reader to write NDEF records (URL, text, custom payloads). For UHF/LF, use dedicated programmers to set EPC/UID and user fields.
  3. Protection: set read-only where possible; use passwords/keys if supported by the tag/reader; and don’t store sensitive data in plain text.
  4. Media choice: on metal, use “on-metal” tags or spacers; consider temperature, humidity, chemicals (IP rating), and adhesive/mechanics.
  5. Software integration: with smartphones you can use: Android NFC, Apple Core NFC, or, in compatible browsers, the Web NFC API (MDN). For desktop/industrial readers, use the manufacturer’s SDKs.

Typical Use Cases

Low-frequency RFID tags (LF, 125–134 kHz) are often used in access-control applications, particularly in door openers with keyfobs. In this context, LF RFID keyfobs uniquely identify the user and grant access to restricted areas such as offices, apartment buildings, or company facilities. These tags are ideal because they work at short distances and are less sensitive to metals or liquids. A common example is using 125 kHz RFID keyfobs in condo or corporate access-control systems, replacing traditional mechanical keys with greater security and easier management.

High-frequency RFID tags (HF, 13.56 MHz), including NFC tags, are used in more advanced scenarios. A typical example is contactless keycard door locks used in hotels or offices, which rely on NFC to allow access by simply bringing the card—or a compatible phone—close. The same HF tags are widely used for verifying the authenticity of clothing: global fashion brands apply NFC or HF labels sewn into garments or attached to hangtags, allowing consumers to verify originality via a dedicated app. This approach combats counterfeiting and enhances the shopping experience, since customers can get additional information by simply tapping their smartphone on the tag.

Ultra-high-frequency RFID tags (UHF, 860–960 MHz) are designed for logistics and industrial applications that require long-range reading. Thanks to a unique Electronic Product Code (EPC), UHF tags can be read at several meters, making them ideal for warehouse management, goods tracking, and replacing traditional barcodes. A practical example is large retail logistics: pallets and boxes are labeled with UHF tags, allowing hundreds of items to be read simultaneously without line-of-sight scanning, drastically reducing inventory time and improving supply-chain efficiency.

In short, each RFID technology fits a specific context: LF tags are ideal for short-range security and access control; HF/NFC tags shine in authentication and consumer-friendly applications such as payments and advanced door access; while UHF tags are the most efficient solution for logistics, tracking, and industrial automation, thanks to their ability to replace barcodes with a fast, scalable, error-proof system.

The UID of NFC Tags

The UID (Unique ID) is the serial number of an RFID Tag made up of a series of specific bytes. The UID is assigned during manufacturing, guaranteed to be unique and immutable in many NFC chips, especially in the NTAG series. This makes it reliable for uniquely identifying tags—essential for inventory, brand protection, and product authentication.

UID uniqueness also helps with collision handling, i.e., distinguishing different tags when read simultaneously—important in applications where tags are placed close together.

In contexts requiring high authenticity, the UID is the first layer of protection—though it may not be sufficient alone—so it is integrated with advanced security features such as signing, dynamic authentication, or cryptographic algorithms.

Comparison: RFID Tag vs. QR Code vs. Barcode

For years, Barcodes—and more recently QR Codes—have entered our daily lives. However, advancing technology allows a higher level of information than a simple product label can provide.
RFID is gradually complementing—and making obsolete—the two technologies we’re used to seeing on shelves. The differences are significant and can be summarized as follows:

  1. Barcodes and QR Codes provide static information that cannot be updated. RFID allows dynamically updating the information stored in the tag.
  2. Barcodes and QR Codes must be visible to the reader. RFID operates outside the reader’s direct line of sight. An RFID tag can still be printed together with a Barcode and/or QR Code.
  3. Barcodes and QR Codes can be visually duplicated. RFID provides electronic protection against copying.
  4. Barcodes and QR Codes require human intervention for reading. RFID does not necessarily require human presence to be read.

Below is a summary table of the differences between RFID Tags, QR Codes, and Barcodes:

Tag Programming?

Contact us now for more information—we’re at your complete disposal for any question or request.