What gives the highest security?

26.11.2019

Do you ever wonder what kind of system or technology combination provides the most secure access control to a site? You can build it now with Idesco solutions. We recently announced the availability of transparent readers, as well as our launch of the latest DESFire enhancement, Key Diversification. Transparent readers wholly eliminate the risk of reader or transaction skimming, since they are only a transaction platform that forwards data from a transponder to the system; the functional equivalent of a speaker in a sound system. Transparent type readers are already prescribed in security standards for some European nations, destined to become specified soon at planned high security access control sites.

By contrast, Key Diversification, i.e. card-specific security keys, brings yet another extra level of security to the already secure DESFire concept. Key Diversification extends a unique authentication between every single transponder and a reader. Today’s supercomputers would need thousands of years to theoretically hack a DESFire transponder’s key. Yet even if one succeeded, a cloned card using that key would still be useless because key diversification’s protocol can recognize a cloned transponder’s key is just that: a clone.

Transparent readers, implementing transactions controlled from your system, and containing no sensitive data of their own, combined with key diversification, would lift your security to the very highest level.

Other news

03.05.2021

Mari Malinen has been a valued SCM team member the past 18 months. Mari will enter your order, check material availability and production schedules before confirming delivery time in the order confirmation she sends you.

Read more

26.04.2021

LEGIC® is a secure, readily-updatable standardized technology that supports you embedding multiple applications on a single system.

Read more

26.04.2021

How does RFID actually work, and what kind of features do transponders require to make it work? This article answers these questions by focusing on RFID’s transponders and their identification capability. If you are a system integrator, your own customers might find the points covered in this discussion helpful.

Read more
Customer support

Cookies on our website

Your privacy is important to us, and we are committed to protecting your personal information. Before you continue browsing our website, please read privacy policy and accept cookies.