Skimming? AESCO defeats it!

28.05.2013

Increased transponder hacks have recently fueled interest in encrypted data transfer for access control systems. The highest transponder security is AES encryption and usually defeats card and fob cloning efforts.  However, even if data was encrypted when captured by a reader, it still must pass unprotected from that reader to its controller.  Our AESCO decryption module allows data to remain fully-encrypted the entire distance – from card to controller.  That’s because our AESCO module deciphers encrypted data only at the location of the controller, where it’s either attached or integrated.  This ensures cloning or spoofing efforts positioned between our readers and your controller will also be thwarted.  Connect the AESCO decryption module directly to your existing controller and it won’t detect anything different. Your level of security?  The highest available.  Cost-effective?  Oh, yeah.

Want to learn more about ways you can implement AESCO in your current system?

Other news

07.12.2017

Touch screen computers with embedded RFID readers are an ideal platform for a variety of identification-dependent applications.

Read more

05.12.2017

Identification systems often get deployed in demanding environments with constantly changing temperatures. Most of Idesco’s RFID readers operate from -40 °C to +55 °C – the widest range found on the market.

Read more

04.12.2017

After fifteen years, the Basic remains one of Idesco’s most popular housings.

Read more
Customer support