Dear Valued Customer,
INTEGRATED IP Access Control & IP Video Surveillance

 Vol. 093 / October 2020

> LATEST NEWS

HOME     SOLUTIONS      PRODUCTS      SUPPORT      SALES      ABOUT US      CONTACT US

Anti-Cloning Access Cards with End-to-End Encryption 
1. Why is reading only UID not secure?

With the advancement of the card cloning technology today, it is considered unsafe to be totally dependent on the UID to uniquely identify a smartcard for card access control application....Tell me more
 
2. Who is likely to clone or hack into access control smartcards?

Statistics show that 55 to 75% of corporate fraud are due to insiders. Employees motivated by greed are most likely to clone the access cards of senior executives to commit fraudulent acts for personal gain. Industrial espionage is often motivated by competitive forces to gain advantage into highly competitive businesses while spies spend millions to hack target victims’ accounts....Tell me more

3. How to secure an access control card against cloning and hacking?
 
To guarantee uniqueness of any access card, the contactless access control reader must read data that has been encrypted and stored in the card. The card reader must unlock the smartcard to gain access to the encrypted data. The encrypted data is read and decrypted with a secret key available only in an authorised smart card reader...Tell me more

4. Who should keep the encryption secret keys of a card access system?

Even more important than storing encrypted data with a strong encryption key is the issue of where and who to keep the keys. Should the key be entrusted to the boss or an employee? What if this person resigns, forgets or attempts to sabotage the company? The solution is to use a professional, purpose built Secret Key Management System (SKeyMa)...Tell me more

5. Why is end-to-end encryption crucial to an access control system?
 
A highly secure access control system must protect against any such potential breach of security. The use of secure encryption keys to protect data stored in user access cards ensure that the cards cannot be cloned or hacked. Ensuring that user data is also encrypted while in transit to the access controller, and subsequently to the host is also very important to protect the secrecy and authenticity of every single transaction in the access control system...Tell me more
System Architecture
Products
IBSS.web Web-Based Enterprise Security Management Software
It is a browser based security management system software that provides scalability from access control only applications to a comprehensive suite of fully integrated security solutions.

Product Enquiry
Secret Key Management System (SKeyMa)
It is an integrated approach for managing secret key, personalise Secure Access Module (SAM), readers and also contactless card.

Product Enquiry
WebENTRA Professional Series IP Access Controller
Suitable for large corporates. The highly resilient IP controller is equipped with failover capability, dual CANbus for interconnecting modules and dual Ethernet host links that eliminates any potential SPOF (single-point-of-failure).

Product Enquiry
WebENTRA R300 Secured Encryption (SE) Readers
It is a secured encryption NFC reader capable of handling the demanding contactless smartcard reader requirements.

Product Enquiry

Contact our Sales Team @ (065) 6844 2141 or enquiry1@asis-technologies.com for more information.

Regards,

Sales Team @ ASIS Technologies