Although it is an RFID tag (IC card) used in various fields, such as management of entry and exit and route tracking of goods in circulation, from the hacker it is very easy to make a copy. Business ...