Skimming? AESCO defeats it!

28.05.2013

Increased transponder hacks have recently fueled interest in encrypted data transfer for access control systems. The highest transponder security is AES encryption and usually defeats card and fob cloning efforts.  However, even if data was encrypted when captured by a reader, it still must pass unprotected from that reader to its controller.  Our AESCO decryption module allows data to remain fully-encrypted the entire distance – from card to controller.  That’s because our AESCO module deciphers encrypted data only at the location of the controller, where it’s either attached or integrated.  This ensures cloning or spoofing efforts positioned between our readers and your controller will also be thwarted.  Connect the AESCO decryption module directly to your existing controller and it won’t detect anything different. Your level of security?  The highest available.  Cost-effective?  Oh, yeah.

Want to learn more about ways you can implement AESCO in your current system?

Other news

Wireless RFID reader

08.04.2021

9 CM 2.0 Wireless transacts data using mobile networks, even in the remotest locations that lack data cabling.

Read more
Keypad RFID reader

22.03.2021

Reliability and user-friendliness are vital features of keypad readers. Other keypad characteristics may vary across locations.

Read more
RFID touch screen

22.03.2021

Idesco’s touch screen reader, Access Touch, is a powerfully versatile platform, designed to fulfill multiple tasks, including identification, across a wide range of needs and settings.

Read more
Customer support

Cookies on our website

Your privacy is important to us, and we are committed to protecting your personal information. Before you continue browsing our website, please read privacy policy and accept cookies.