MIFARE DESFire, OSDPv2, access with mobile phone

How to choose a reader to your access control system?

Download our free guide

Interfaces, technologies, installation environment and more. These are factors you must consider to choose the right reader for your access control system. All covered in our guide. Download for free!

Preview reader guide's contents Download our free access control reader guide
How to ensure my security?

Principles of secure access control

Most secure card technology

MIFARE DESFire

MIFARE DESFire is one of the most secure card technologies. It uses 128-bit encrypted mutual authentication protocols (AES / TDES) between readers and cards or tags. Both readers and cards are programmed with shared security keys. DESFire is based on MIFARE’s open, multi-source standard, which promotes device availability and ongoing technological development.

Secured reader host communication

OSDP

OSDP is a standardised, secure, bi-directional data protocol. While securing data transfer between readers and host, it also enables downstream data file transfers from system hosts, simplifying and speeding onsite device configurations and even firmware updates. Idesco’s OSDPv2 compliant products are verified by SIA (Security Industry Association).

Supplier security standards

Secure reader supplier

Security risks now go beyond hacked access cards, requiring careful sourcing of critical devices and selection of trusted partners for sensitive data management. Our ISO/IEC 27001 certification confirms compliance with top information security standards.

Critical infrastructure and public services

Security sensitive access control sites

  • Military facilities require the highest level of security to protect classified information, critical assets, and personnel. Their systems must be tamper-proof and resistant to both physical and digital attacks. Other requirements for readers in military facilities:
    • Support for multi-factor authentication (card + pin code)
    • Rugged hardware: Readers and controllers must be durable and able to function reliably in harsh environmental conditions.
    • Hierarchical access control: The system itself must support a complex hierarchy of permissions, where access is strictly based on a person’s security clearance and need-to-know status.
    • Offline capability: In many cases, the system is also working offline, and should have the ability to make local access decisions and log events even if network connectivity is lost or it is not wanted.
    Learn more about durability ratings of access control readers
  • Government buildings and public services handle sensitive data and serve the public, requiring a balance between high security and efficient public access.
    • Visitor management: The system must include a robust process for managing visitors, issuing temporary credentials, and tracking their movements within the facility. Mobile phone access with remotely issued temporary access rights directly to users’ phones is a convenient and cost-effective solution for temporary access rights.
    • Open standards: To avoid vendor lock-in and ensure long-term flexibility, authorities often require systems based on open technologies like MIFARE DESFire. This allows them to maintain control over their security keys and choose from multiple suppliers.
    • Scalability: The system must be able to scale easily from small offices to large, multi-building campuses, while maintaining a single, centralized management platform.
    • Compliance and reporting: Detailed reporting and auditing capabilities are necessary to meet regulatory requirements and demonstrate security compliance.
    Idesco readers have secured Finnish prisons for more than 30 years
  • As part of a nation’s critical infrastructure, power plants and other energy facilities face a dual threat from physical and cyber-attacks. Secure access control is essential to prevent sabotage and ensure the safety of employees and the public. The access control system must seamlessly integrate with video surveillance, intrusion detection, and building management systems to provide a unified security view.

    • Granular Access Zones: Access must be controlled at a very specific level, from the main gate to individual rooms housing sensitive equipment.
    • Real-Time Auditing: The ability to track who has accessed a specific area and when, with a full audit trail, is essential for compliance and post-incident analysis.
    • Environmental Resilience: Hardware must be capable of withstanding the extreme temperatures, dust, and electrical interference common in industrial environments.
    Principles of secure access control systems
  • Hospitals have specific access control requirements that must address both security concerns and the continuous movement of people, while supporting patient care. Unlike office buildings or power plants, hospitals present a dynamic environment that requires a balance between maintaining security and ensuring accessibility. Some special requirements for hospital access control are:

    • Protection and control of specific areas such as hospital pharmacies.
    • Stock control of hospital pharmacies with RFID identification.
    • Hands-free access to support movement (nurses moving with patients in hospital beds) etc.
    • Hands-free access to support hygienic access control without touching access control devices (mobile access, hands-free readers).
    • Durable, moisture-proof access control readers with IP67 protection class that are easy to clean.

Physical access control methods

Tags and cards

Access control tags are available in various forms and sizes, including compact keyrings and badges designed for lanyards. Access control cards typically resemble credit cards and are made from printable plastic. Personal identification data is stored within these tags and cards. Advanced technologies, such as MIFARE DESFire, secure this information by using security keys protected with high-level TDES and 128-bit AES encryption. Unlike older technologies that rely solely on reading the card’s UID and are less secure, modern cards and tags cannot be duplicated, ensuring a higher level of safety.

Smartphone

Mobile phone access is increasingly replacing physical access cards and tags. Access credentials can be securely stored in smartphones, and access control readers read them using Bluetooth Low Energy (BLE) and Near Field Communication (NFC) technologies. Mobile credentials are cost-effective and environment friendly when eliminating the need for physical tags. They are also easy to manage and can be issued remotely to users’ phones. They also enable multi-factor authentication, if unlocking the phone is required for identification.

Security with pin code

Personal pin codes are used in access control to provide security. When combined with access cards, they enable two-factor authentication (2FA) that complies with the NIS2 directive. Pin codes can be customised for different security needs, such as requiring an additional code during certain hours. Features including sound feedback, tactile pads, backlighting, and adjustable angles are available to support user convenience and accessibility of pin code readers.

What is new in access control?

Access control trends

Who can access your data and your devices?

Cyber security

Site security now goes beyond physical boundaries and access credentials. It’s essential to understand how cybersecurity risks affect product design and service development. Secure management of digital keys, secure supply chain and knowing  who has any access to your devices during their production or delivery, or to sensitive data, is vital for risk assessment.

Standards

NIS2

NIS2 (Network and Information Security Directive 2) is the European Union’s latest update to its cyber security directive. Its mission is to strengthen cyber security for critical infrastructure across the European Union. One of NIS2 requirements is two factor authentication. That’s easily fulfilled by requiring user pin codes as well as cards or tags.

Phone as access card

Mobile access

Mobile phones offer secure, convenient access by storing user credentials, eliminating the need for separate cards or tags. Security matches that of contactless payments. Administrators can remotely issue access rights, which is ideal for temporary needs. Reducing physical cards saves time, lowers environmental impact, and supports touchless entry.

Proprietary vs. open technology

Differences between secure access control technologies

There are two types of secure technologies: proprietary and open. Proprietary technologies are supplier-specific, so compatible tags and readers can only be purchased from one source. Open technologies follow shared standards, allowing you to choose between different suppliers for compatible devices. While both options offer similar security, proprietary systems limit your ability to find alternatives later.

All secure access control systems—proprietary or open—rely on shared security keys between readers and cards. Open technologies offer supplier flexibility, but if your vendor controls the security keys, you may still be limited. If you can’t program your site’s keys into new readers, they won’t work with your system. Before choosing your supplier of open technology devices, and confirm who controls the security keys before choosing a vendor.

Learn more about Idesco Security Key Management

 

From time and attendance to mobile access

Access control solutions

Flexible management, convenient use

For easy mobile access

Need mobile compatible access control readers, a customisable mobile access app, or flexible mobile credential management options? Idesco ID will give you and your personnel an easy path to entering doors using personal phones. Discover how easy Idesco ID will make mobile access for you and your users!

IK-09-10, IP54-67, – 40 °C – +55 °C

For tough environments

The most challenging environments test readers to the limit. That’s why Idesco’s readers, already known for toughness and durability, are found in prisons and public places alike. Reliable tamper alarms, impact-enduring housings, keypads impervious to snow or ice – are just examples of how Idesco’s reader design will reduce your access system maintenance costs.

Accessible and easy to use

For everyone, everywhere

We design our readers for maximum user-friendliness. Tactile keypads, visible numbers, five dot, pin pad backlighting, adjustable buzzers and different siting angles keep our readers accessible for both visually- and mobility-impaired persons. For hands-free access in hospitals, clinics or factories we even have an entry option out to 4 meters for cards attached over clothing.

MIFARE DESFire & OSDP-secured access control

For your high security

With a proven capability for robust data encryption from card to host, Idesco readers are frequently chosen by European site security managers to protect the most security-sensitive settings such as banks, airports and military installations.

Data collection and payroll administration

For time & attendance

If you need to collect time & attendance data for payroll administration, or to fulfil employer obligations to collect worktime and employee entrance data – Idesco readers have you and your work site covered!

Self service

For payment & interactivity

Need an efficient user interactivity solution? Transaction convenience? Idesco RFID display and touch screen devices can meet your need. With a broad range of user choice options, from expanded function keypads to robust touch screens, Idesco has you covered.

Customers’ comments about Idesco access control solutions

Tom Ojala, CEO

Asio

“It was so rapid and convenient to integrate Idesco ID with our Asio booking system”
Ari Pakarinen, Specialist

Finland’s Prison and Probation Service

“I know correction sites in which the same Idesco readers have been constantly serving for as long as 25 years. “Idesco readers are very reliable. There are no faults in them”.
Petri Kiianlinna

Loginets

“The expertise of Idesco’s technical support was excellent. Their deliveries were prompt and on time, ensuring our own deliveries to our customer’s construction sites were on-time. The product quality was excellent, we haven’t had to return one single reader”. Petri Kiianlinna, Loginets.
view of futuristic glass-walled office building illuminated by sunset from behind

Contact Us

This field is for validation purposes and should be left unchanged.
Name*
Sign me up to the newsletter list