AESCO solves security challenge
Solves thorny RFID security Wiegand problem
All of us in access control have been growing more aware of the importance of the latest RFID security technologies. Our industry now more often deploys MIFARE® DESFire’s encryption to defeat the efforts of others to hack or clone our transponders.
Certainly, DESFire will powerfully enhance your security (or your offering). But did you know you can strengthen your system’s RFID security even further? You can extend the encryption of your transponders all the way upstream to your controllers with Idesco AESCO security and our AES-encrypting DESFire readers. How do you decide if you need AESCO? If you currently let your readers decrypt IDs before sending them to your controller, you might need AESCO. That’s because when your readers decrypt IDs into a format your controller understands, i.e. Wiegand, they also strip protection away from those IDs. Current eavesdropping methods can detect and read your unprotected, Wiegand format IDs as they’re being sent to your controller at a distance.
Fortunately, you can cost-effectively install AESCO and its latest-generation AES-encrypted readers in your current MIFARE® system. We even have three different ways you can deploy AESCO. You can piggy-back a separate AESCO module onto your controller. Or you can update your system’s controller(s) with Idesco’s RS-485 AES protocol. Or you can replace your system controller(s) with Idesco’s Badicio 8000 controller embedded with the decryption protocol.
Then, you use AESCO’s user-friendly encoding station to migrate your current set of credentials up into DESFire security. This tool lets you read IDs from your system’s legacy technology, translate them, then quickly create new high-security tags or cards with IDs your system will recognize. The result? Your population of user IDs will stay protected with the very pinnacle of RFID security: AES encryption.
Read more about securing your system with AESCO!
How does RFID actually work, and what kind of features do transponders require to make it work? This article answers these questions by focusing on RFID’s transponders and their identification capability. If you are a system integrator, your own customers might find the points covered in this discussion helpful.