Unitronic Security

Idesco: Are your Transponder Credentials Secure?

Pressemeldungen | von Unitronic Security | 24. Februar 2016
Idesco: Are your Transponder Credentials Secure? BILD: IDESCO

The security of an RFID access control system relies heavily on the effectiveness of its design and the professionalism and compliance of its users. Ultimately, however, it depends utterly on the credential integrity of its transponders.

Obviously, transponders are much more dynamic and versatile than traditional keys, making them particularly beneficial for security. For example, transponder credentials let your system record the identity of users entering a site, where and when. If you need to ensure only authorized personnel are using that site’s transponders, you can add a pin code protocol to strengthen compliance.

And when a user loses their transponder or their access privileges expire, a couple mouse clicks easily deletes a credential from a system. You can even administer temporary or limited privileges for maintenance workers by limiting a credential’s access to certain hours or for a finite span of days.

However, because transponder credentials are so much more versatile than traditional keys they also demand a mindful vigilance. That’s because, when considering credential integrity, not all transponders are made equal. In particular, in the face of hacking and cloning risks, some technologies are woefully inadequate, while others utterly protect their credential’s integrity. For example, Idesco’s own AESCO solution, at the upper pinnacle end of the range of security, utterly protects the integrity of a transponder’s credential during interrogations from inside the transponder all the way up to a system’s controller.

Nevertheless, even the best system can be compromised if a security manager fails to retrieve user transponders after their employment ends or forgets to delete credentials from the system. Does your site currently have in place – and adhere to – a policy of collecting transponders from users when they leave? Do you immediately delete a credential from your system when an employee reports a lost transponder?

Reader speeds card and tag coding

Coding new cards and tags to your system gets a lot faster when your coder has a card holder. Our 9 CD 2.0 Desktop coding reader is also equipped with an USB interface for convenient connecting to your PC. It’s no surprise that the read/write capable 9 CD 2.0 Desktop is an integral part of Idesco’s Migration Station, our powerful, user-friendly coding package for migrating old populations of transponder credentials up into DESFire security. Migration Station reads transponders from a legacy technology then rapidly codes their credentials onto new DESFire transponders that will nevertheless remain transparent to the existing system.

9 CD 2.0 Desktop is also bundled with Idesco DESCoder, for coding both configuration cards and new transponders. The diagram illustrates the coding process for a DESFire transponder with this tool. You might also want to check out DESFire EV1 and MIFARE® Classic transponder structures, and MIFARE® Classic coding.

Your transponder can do more

Did you know you can make your card or tag do more than just open a door? Our 8 CD 2.0 USB Hi reader lets you read your transponder’s credential then route it directly to your PC, where it can be both and processed – as it is. No additional software is needed! You can create your own simple application to recognize your transponder’s data, triggering for example a speedier, thoroughly hidden workstation login. Idesco’s 8 CD 2.0 USB Hi reader supports AZERTY keyboard emulation, in addition to the default QWERTY emulation.

Letzte Änderung am Mittwoch, 24 Februar 2016 14:32
RFID & Wireless IoT tomorrow 2019
RFID and Wireless IoT tomorrow 2019Der europaweit größte Kongress für RFID & Wireless IoT
Di, 29.- Mi, 30. Oktober
Darmstadtium, Darmstadt bei Frankfurt, Deutschland
Kongress | Ausstellung | Live-Demos
Folgen Sie uns auf www.rfid-wiot-tomorrow.com/de
Wir freuen uns auf Sie!