Let’s talk about security

01.10.2019

RFID card technologies used in access control systems are not all the same. They differ from each other according to capacity, updatability and the foremost important; security. There are several ways to improve your system security from cloning and hacking. If you are planning a new access control system, we recommend you consider MIFARE® DESFire. With 128 bit AES or TDES encryption it prevents any hacking attempts. Another benefit is that it is an open standard technology; devices from different manufacturers are compatible with each other.

Depending on whether you are planning a new system or looking for methods to improve your old system, there are several ways to improve security:

  • Add personal pin-codes to authentication process
  • Choose a technology that is safe enough to prevent any hacking or cloning
  • Consider “transparent” readers enabling all data and commands be handled within your system
  • Choose highly secure OSDP v2 data protocol
  • Decryption modules or software implemented in your Wiegand system, enabling you to use encrypted transponder-reader-host communication all the way from transponder to host also in existing, older Wiegand systems

Download White Paper: A Path to More Secure Access Control

Other news

RFID reader with display

11.09.2023

An RFID display reader, 8 CD 2.0 D Pin expands the ability of users’ to interact with your identification system.

Read more

11.09.2023

On October 11, at Finnsec expo in Helsinki, Idesco will launch new Idesco product, Idesco Portal.

Read more
RFID reader and tag

11.09.2023

How does RFID actually work, and what kind of features do transponders require to make it work? This article answers these questions by focusing on RFID’s transponders and their identification capability. If you are a system integrator, your own customers might find the points covered in this discussion helpful.

Read more
Customer support

Cookies on our website

Your privacy is important to us, and we are committed to protecting your personal information. Before you continue browsing our website, please read privacy policy and accept cookies.