What gives the highest security?
Do you ever wonder what kind of system or technology combination provides the most secure access control to a site? You can build it now with Idesco solutions. We recently announced the availability of transparent readers, as well as our launch of the latest DESFire enhancement, Key Diversification. Transparent readers wholly eliminate the risk of reader or transaction skimming, since they are only a transaction platform that forwards data from a transponder to the system; the functional equivalent of a speaker in a sound system. Transparent type readers are already prescribed in security standards for some European nations, destined to become specified soon at planned high security access control sites.
By contrast, Key Diversification, i.e. card-specific security keys, brings yet another extra level of security to the already secure DESFire concept. Key Diversification extends a unique authentication between every single transponder and a reader. Today’s supercomputers would need thousands of years to theoretically hack a DESFire transponder’s key. Yet even if one succeeded, a cloned card using that key would still be useless because key diversification’s protocol can recognize a cloned transponder’s key is just that: a clone.
Transparent readers, implementing transactions controlled from your system, and containing no sensitive data of their own, combined with key diversification, would lift your security to the very highest level.
Would you like to use your mobile access solution with secure and durable Idesco readers? We will soon release Idesco Mobile Lite SDK software development kit.