RFID authentication devices on OEM machinery ensure the proper users are taking permitted actions, providing performance benefits and improved safety.
Byline: Linda Htay, IDEC Corporation
Automated equipment and machinery can incorporate many ways for users to monitor and control operation, such as with buttons, switches, and touchscreens. When original equipment manufacturers (OEMs) design and build their machinery, they want to deliver easy-to-use functionality. However, they must carefully balance this desire with the need to verify authorized users are at the controls and making acceptable selections.
Several authentication methods are possible, ranging in the security levels, user convenience, and features they provide. The simplest schemes may not offer enough protection, while the most complex usually are expensive and limiting.
Balanced solutions provide strong security and audit logs—and they are simple to implement, cost-effective to maintain, and easy for end users to work with. This article will discuss developments in the area of using radio-frequency identification (RFID) in and on machinery and equipment for managing user authority, providing traceability, improving safety, and reducing paperwork.
It is certainly possible to design machinery void of authentication methods, just as a car could be built with an on/off switch instead of an ignition key, or a house with no locks on its doors. Just as there are logical reasons to implement authentication solutions on cars and houses, there are motivations for doing so on industrial machinery, such as achieving operation restriction, traceability, or both. Sometimes these motivations are driven by technical initiatives, but often they are mandated by regulatory requirements.
Operation restriction can sound negative, so operation permission may be a better term. OEMs and end user manufacturing companies incorporate authentication methods to ensure proper personnel are accessing machinery controls, but they do not wish to limit authorization to a binary yes or no. Authentication extends into defining groups of personnel and even individuals, with granular selection of what machinery information they can view and adjust.
Some companies may proactively add permissions to better ensure safe and proper equipment operation. In other cases, compliance with industry safety standards such as ISO16090 (for machine tools) or ISO10218-1 (for industrial robots) can lead to adopting authentication methods.
Traceability drivers involve gathering data, and manufacturers can use authentication to log which users operated a machine and the actions performed. This history may be used for informational purposes, which a company can analyze with the goal of improving performance. Or, the data trail may be stored to satisfy an industry requirement such as FSSC22000 for food safety, which calls for traceability in the manufacturing process.
Several levels of security are possible, each with a range of benefits, disadvantages, and costs. The following methods are suitable for adapting into industrial machinery use, and are familiar to most consumers:
Physical keys are the oldest and most familiar of the authentication methods. They are simple and low cost, but easy to copy or lend. OEMs can implement a basic key switch into their machine, but it only provides a binary or limited selection by any user who gains access to the key. Magnetic strip cards are an improved version of physical keys, which add some digital capability. However, they may not be convenient to carry and protect at industrial sites.
Modern digital devices used for industrial machine automation—including PCs, human-machine interfaces (HMIs), and mobile devices—have made passwords a common authentication method. Passwords can provide a limitless number of authentication levels per user, and are relatively inexpensive to manage. Unfortunately, they can be forgotten or leaked, and they can be difficult to use in many industrial settings where gloves are used or where a full keyboard or touchscreen may not be available.
Biometrics are common in consumer electronics and some commercial applications. Fingerprint and face scanners are some examples. Because they use personal and non-transmittable information, they are relatively secure, do not require operators to carry or remember anything, and typically cannot be duplicated or lent out. Unfortunately, biometric techniques are relatively expensive to implement and manage, and they don’t work well around machinery where gloves, helmets, masks, and safety glasses may impede their function.
This brings us to the RFID method, which occupies a sweet spot within industrial machinery authentication. RFID tags are familiar to most anyone who has used a parking lot or building access system. They are simple and relatively inexpensive to manage, and they are not easily duplicated. Although they are easy to lend, authentication can be modified quickly because they are digitally managed. As a robust physical token, RFID tags and sensors are readily implemented for industrial applications.
RFID is a preferred technology for many applications because the user’s tag is passive, meaning it is lightweight and does not require batteries. Reader devices, typically installed in a fixed location, generate a radio signal, causing a passive tag in range responds with a unique signal.
Consumer-grade RFID readers commonly found in commercial applications are fairly robust, but they usually are not built to withstand the temperature, vibration, and washdown/chemical environments associated with many machines. Most of these readers are designed to use rectangular cutouts, which are not convenient for many control panel designs.
On the contrary, certain industrial-grade RFID readers are explicitly designed to fit industrial-friendly common control panel form factors, such as the 22mm knockout hole (Figure 1). Furthermore, these devices are available with IP67 ratings, meaning they are protected from dust, low-pressure water jets, and even immersion situations sometimes found with industrial installations.
Figure 1: Unlike common commercial-grade RFID readers, industrial-rated readers are available to fit common 22mm panel-mount knockout holes while resisting harsh environments.
Industrial-rated RFID readers can take functionality a step further with LED multi-state and color indicator lights on the face, which can be activated to identify conditions such as standby, success, or error. Some can also generate an audible signal to give users operational feedback.
Not all RFID tags are created equal. Certainly, there are global RFID standards such as ISO14443A, ISO15693, and ISO18092 that apply to credit-card style configurations. While cards can be useful for industrial applications, there are also key fob styles which may be more suitable for carrying and using in production environments (Figure 2). Each tag carries a unique ID, which can be registered and associated with a user or a worker category.
Figure 2: RFID tags can be traditional cards, but the key fob style shown here is especially suitable for industrial-rated smart RFID readers like the IDEC KW2D series, which can include a bracket to hold the tag in place.
Users may present tags at a reader for an intermittent acknowledgement, but sometimes an application requires the user to place the tag in constant contact with the reader during certain operations. Some industrial RFID readers include a mechanism to hold the tag in such a scenario.
By their nature, RFID readers are intelligent devices. On the front end they must interpret IDs from physical tags, and on the back end they must communicate with supervisory systems. This is usually performed with an industrial communication protocol such as Modbus TCP/IP (Figure 3), through which the reader can send complex tag IDs or simple authorization levels to the supervisory system, as well as receive commands to operate its light indicators and buzzer.
Industrial RFID readers are commonly integrated with the programmable logic controllers (PLCs) which control machinery such as machine tools and injection molding equipment. Consider one of these machines, which may have a few types of users:
New or temporary staff
Trained Operators
Technical Leads
When the new staff apply their RFID tags, machine operation can be limited to their skill level and operating authority. Trained operators may be able to access normal operation monitoring and control functions, while technical leads are authorized to adjust advanced settings and make special production runs. Maintenance personnel may be restricted from running the system normally, but they may be allowed to jog motors and manually actuate devices.
For traceability, each of the preceding users and their actions can be logged by the PLC and HMI. If the RFID tag is at a machine access or safety cage location, it may be used in conjunction with unlock solenoids to only allow the door to open at the proper time for permitted personnel. Workers who inspect parts could confirm their review by scanning a tag. RFID tags can be incorporated into maintenance procedures to confirm personnel are working in the right areas, enhancing safety.
Additionally, engineering teams can review logged user activity to analyze machine operation and determine more efficient ways to run. All actions can be stored and retrieved in a database environment to facilitate analytics and avoid inefficient paper logs.
Machines and equipment of all types can benefit from applying industrial-rated RFID readers and tags. The ability to manage and track user authority can be used to ensure basic access control, thereby improving safety. More advanced functions, such as paperless traceability and database connectivity, can help OEMs and manufacturers cost-effectively meet regulatory requirements and optimize machine performance.
About the Author
Linda Htay, Product Marketing Manager, IDEC Corporation
Read more about how our RFID readers improve machine performance and safety.
Read more about how our RFID readers offer better security management for your facilities.
©2025 IDEC Corporation. All rights reserved. Privacy Policy