Skimming? AESCO defeats it!

28.05.2013

Increased transponder hacks have recently fueled interest in encrypted data transfer for access control systems. The highest transponder security is AES encryption and usually defeats card and fob cloning efforts.  However, even if data was encrypted when captured by a reader, it still must pass unprotected from that reader to its controller.  Our AESCO decryption module allows data to remain fully-encrypted the entire distance – from card to controller.  That’s because our AESCO module deciphers encrypted data only at the location of the controller, where it’s either attached or integrated.  This ensures cloning or spoofing efforts positioned between our readers and your controller will also be thwarted.  Connect the AESCO decryption module directly to your existing controller and it won’t detect anything different. Your level of security?  The highest available.  Cost-effective?  Oh, yeah.

Want to learn more about ways you can implement AESCO in your current system?

Other news

Mobile access with Idesco reader

04.10.2018

Idesco has launched a new 8 CD 2.0 DESFire reader that supports mobile device transactions. In addition to reading conventional transponders, it reads access credentials you can store in your smartphone.

Read more

03.10.2018

Thank you to all visited us at Security Essen last week and saw the debut of our new Idesco BLE/NFC-compatible 8 CD 2.0 with Idesco mobile application

Read more

03.10.2018

Idesco’s product codes are built from characters that specify different product features. Many indicate customer-specific features. This is why it is so important you always include a specific product code when you order from us – it perfectly identifies the product you need, so we can accurately deliver it to you – fast.

Read more
Customer support

Cookies on our website

Your privacy is important to us, and we are committed to protecting your personal information. Before you continue browsing our website, please read privacy policy and accept cookies.