What gives the highest security?
Do you ever wonder what kind of system or technology combination provides the most secure access control to a site? You can build it now with Idesco solutions. We recently announced the availability of transparent readers, as well as our launch of the latest DESFire enhancement, Key Diversification. Transparent readers wholly eliminate the risk of reader or transaction skimming, since they are only a transaction platform that forwards data from a transponder to the system; the functional equivalent of a speaker in a sound system. Transparent type readers are already prescribed in security standards for some European nations, destined to become specified soon at planned high security access control sites.
By contrast, Key Diversification, i.e. card-specific security keys, brings yet another extra level of security to the already secure DESFire concept. Key Diversification extends a unique authentication between every single transponder and a reader. Today’s supercomputers would need thousands of years to theoretically hack a DESFire transponder’s key. Yet even if one succeeded, a cloned card using that key would still be useless because key diversification’s protocol can recognize a cloned transponder’s key is just that: a clone.
Transparent readers, implementing transactions controlled from your system, and containing no sensitive data of their own, combined with key diversification, would lift your security to the very highest level.
How does RFID actually work, and what kind of features do transponders require to make it work? This article answers these questions by focusing on RFID’s transponders and their identification capability. If you are a system integrator, your own customers might find the points covered in this discussion helpful.