G2V2 Offers 5 New Features:
Authenticate a tag as genuine. This feature will ensure that no tags can be faked or spoofed because each tag has the ability to respond by using a stored secret key.
Modify tag information securely. User memory banks can only be accessed via privilege. Access privileges include reading, writing, and locking.
Create files and assign access privileges. Currently all user memory on a tag is in one file. G2V2 allows the user to keep multiple files separate of each other in the same user memory bank.
Hide tag data to protect consumer privacy. This allows the user to hide certain memory banks, or certain parts of memory banks, which is ideal for applications such as retail, ID cards, and healthcare.
Use a tag for EAS (Electronic Article Surveillance). By including a "store" and "sold" code on each RFID tag, the facility will know if the item was actually sold or was stolen when the tag is read.
These five features are individual options on each tag. An RFID system can contain bare tags with none of the five features above as well as tags with 2 out of 5 features, etc. Depending on the application, users can activate the features specific to what they need. Because G2V2 tags are backwards compatible, it is not necessary to purchase new RFID readers - a simple firmware update will suffice. This new protocol was ratified in October of 2013 and these tags will start selling early to mid 2015.
To read more about RFID news, check out the links below!