Anti-Cloning Access Cards with End-to-End Encryption
1. Why is reading only UID not secure?
With the advancement of the card cloning technology today, it is considered unsafe to be totally dependent on the UID to uniquely identify a smartcard for card access control application....Tell me more 2. Who is likely to clone or hack into access control smartcards?
Statistics show that 55 to 75% of corporate fraud are due to insiders. Employees motivated by greed are most likely to clone the access cards of senior executives to commit fraudulent acts for personal gain. Industrial espionage is often motivated by competitive forces to gain advantage into highly competitive businesses while spies spend millions to hack target victims’ accounts....Tell me more
3. How to secure an access control card against cloning and hacking? To guarantee uniqueness of any access card, the contactless access control reader must read data that has been encrypted and stored in the card. The card reader must unlock the smartcard to gain access to the encrypted data. The encrypted data is read and decrypted with a secret key available only in an authorised smart card reader...Tell me more
4. Who should keep the encryption secret keys of a card access system?
Even more important than storing encrypted data with a strong encryption key is the issue of where and who to keep the keys. Should the key be entrusted to the boss or an employee? What if this person resigns, forgets or attempts to sabotage the company? The solution is to use a professional, purpose built Secret Key Management System (SKeyMa)...Tell me more
5. Why is end-to-end encryption crucial to an access control system?
A highly secure access control system must protect against any such potential breach of security. The use of secure encryption keys to protect data stored in user access cards ensure that the cards cannot be cloned or hacked. Ensuring that user data is also encrypted while in transit to the access controller, and subsequently to the host is also very important to protect the secrecy and authenticity of every single transaction in the access control system...Tell me more
System Architecture
Products
IBSS.web Web-Based Enterprise Security Management Software It is a browser based security management system software that provides scalability from access control only applications to a comprehensive suite of fully integrated security solutions.
Secret Key Management System (SKeyMa) It is an integrated approach for managing secret key, personalise Secure Access Module (SAM), readers and also contactless card.
WebENTRA Professional Series IP Access Controller Suitable for large corporates. The highly resilient IP controller is equipped with failover capability, dual CANbus for interconnecting modules and dual Ethernet host links that eliminates any potential SPOF (single-point-of-failure).
You are receiving this message because you have previously registered with us as our customer. Please click here if you no longer want to receive emails from us.