Access Password
Data & Encoding32-bit password in reserved memory controlling write access to tag memory banks, preventing unauthorized data modification.
Access Password
The Access Password is a 32-bit value stored in the Reserved Memory bank of an EPC Gen2 RFID tag. It controls write access to the tag's memory banks, preventing unauthorised modification of the EPC, User Memory, and the passwords themselves. When properly configured, the Access Password is the primary defence against tag data tampering in supply chain and retail environments.
How Access Control Works
epc-gen2/" class="glossary-term-link" data-term="EPC Gen2" data-definition="UHF RFID air interface standard." data-category="Standards & Protocols">EPC Gen2 defines three lock states for each memory bank:
| State | Read | Write | Description |
|---|---|---|---|
| Unlocked | Open | Open | Default state — anyone can read and write |
| Locked | Open | Requires Access Password | Reads are free; writes need authentication |
| Permalocked | Open | Permanently blocked | No writes ever, regardless of password |
When a memory bank is locked, the reader must first send the correct Access Password via the Access command. If the password matches, the tag enters the "secured" state and grants write access for the duration of the session. If the password is wrong, the tag returns an error and may impose a backoff delay to slow brute-force attempts.
Setting the Access Password
The workflow for securing a tag typically occurs during commissioning:
- Write the EPC (e.g., an SGTIN) to Memory Bank 01.
- Write application data to User Memory if needed.
- Write a random or derived 32-bit Access Password to Reserved Memory.
- Write a Kill Password to Reserved Memory (if kill capability is desired).
- Issue Lock commands to lock the desired memory banks.
- Store the Access Password in the enterprise database keyed by EPC.
Security Strength
A 32-bit password provides 2^32 (approximately 4.3 billion) possible values. While this is insufficient against offline cryptanalysis, the practical attack surface is limited because the attacker must transmit each guess over the air to the tag, which responds slowly (each attempt takes ~20 ms). A brute-force attack would take thousands of years at RF speeds.
However, the Access Password is transmitted in plaintext over the air interface unless crypto suite authentication is used. An adversary performing eavesdropping during a legitimate access transaction could capture the password. For high-security applications, Gen2v2's mutual authentication should be used instead of or in addition to the plaintext Access Password.
Best Practices
- Generate unique passwords per tag — shared passwords create single points of failure.
- Use the Access Password in combination with Lock commands — a password alone without locking the memory banks provides no protection.
- Consider Permalock for data that must never change (e.g., calibration records on aviation parts).
- For consumer-facing products, evaluate whether the Untraceable Command provides sufficient privacy protection without the complexity of password management.
Related Content
Understanding the EPC Standard
Getting Started…Bank Name Typical Contents 00 Reserved Kill password , access password 01 EPC EPC + PC word + XPC 10 TID IC manufacturer, model,…
RFID Tag Memory Planning Guide
Tag Selection…of sale. A zero kill password disables the kill function. Access password : Enables a secured session that permits lock/unlock…
Alien Higgs Family Guide
Tag Selection…Bank Size Notes Reserved 64 bit Kill password (32 bit) + Access password (32 bit) EPC 96–480 bit Configurable in 32-bit increments…
RFID with MQTT and IoT Protocols
IntegrationCrypto-Enabled RFID Tags Guide
Security & Privacy…Security Mechanism Commissioning Key write + lock Access password In-field read AES challenge-response Crypto suite Consumer…
RFID Security Audit and Forensics
Security & Privacy…lock status (should be locked post-commissioning) - Verify access password is not the factory default - Verify kill password is not…
EPC Gen2v2 Deep Dive
Advanced Topics…command is an Access-class command (requires the correct access password to execute): Parameter Values Effect U (EPC hide) 0 =…
RFID Tag Commissioning Best Practices
Troubleshooting…If used Manufacturing data, lot numbers, timestamps Set access password If memory lock needed 32-bit value; store securely Set…
Frequently Asked Questions
The RFID glossary is a comprehensive reference of technical terms, acronyms, and concepts used in Radio-Frequency Identification technology. It is designed for engineers, system integrators, and project managers who work with RFID and need clear definitions of terms like EPC, backscatter, anti-collision, and ISO 18000.
Yes. RFIDFYI provides glossary definitions in 15 languages including English, Korean, Japanese, Chinese, Spanish, Portuguese, Hindi, Arabic, French, Russian, German, Turkish, Vietnamese, Indonesian, and Thai.