What is a Transparent reader?

06.10.2020

Transparent reader

Transparent readers provide a significantly different method for powerfully strengthening high security access control systems. The security of transparent readers’ relies on eliminating as much hosted data, or software, as possible; essentially, their function depends entirely on instructions their system host sends to them. Their role is similar to loudspeakers in a sound system: hacking a loudspeaker doesn’t let you change the music. Another analogy likens transparent readers to antennae, merely transmitting data to and from transponders and the system, whereas system software determines a transparent reader’s functionality. This is why the French security authority, ANSSI, prescribes transparent readers for sites with the highest security requirements.

However, powerful security isn’t transparent readers’ only benefit – they also massively simplify system updates. How? With all software instructions hosted in the system, device updates are no longer required, even after a comprehensive system change. Any changes to reader functionality can be completely integrated into the system’s software update.

Swedish Infobric chose Idesco’s 9 CD 2.0 Slim Pin T transparent readers to implement a remarkably flexible solution for construction sites. Their system controls both site and equipment access while conveniently collecting data that employers need to fulfill their employee reporting obligations to government authorities. For Infobric, transparent readers greatly simplified system management while also letting them tailor their product to different markets and technology standards.

Other news

Mobile ID app

15.04.2021

We have been developing a centralized mobile credential service to let your access control system push credentials down into your users’ phones.

Read more

13.04.2021

A new installation plate designed for a precise fit under 8 CD 2.0 Slim and 8 CD 2.0 Slim Pin readers is just completing development

Read more
Wireless RFID reader

08.04.2021

9 CM 2.0 Wireless transacts data using mobile networks, even in the remotest locations that lack data cabling.

Read more
Customer support

Cookies on our website

Your privacy is important to us, and we are committed to protecting your personal information. Before you continue browsing our website, please read privacy policy and accept cookies.