HID KIAT Chip Operating Systems - multi-application operating system

Technical Specification

Features:
  • Make: HID
  • Model code: KIAT Chip Operating Systems
Additional info:

KIAT is a multi-application operating system designed to work with contactless and dual-interface microcontrollers, in compliance with the international standards ISO 7816 (up to 192 kbps T=0) and ISO 14443 (up to 848 kbps). KIAT OS features: Active Authentication / PIN Transaction management Secure messaging Secure proprietary e-Purse Rollback functionality The COS Cryptographic algorithms are: Cipher: DES (TDES, DESX) ECB-CBC Signature: DES MAC8 MAC: ISO 9797, ISO 10118 Checksum: CRC16/CRC32 Random Number: Secure Random DES Key Size: up to 120-bit Main strengths are: Versatility: KIAT OS can be used in many different markets High reliability: extensively tested for many applications; Multi-application feature: KIAT OS can be used for many different applications

Read more
Make HID
Manufacturer HID
Category Access Control>Access control software
Model code KIAT Chip Operating Systems
Additional info

KIAT is a multi-application operating system designed to work with contactless and dual-interface microcontrollers, in compliance with the international standards ISO 7816 (up to 192 kbps T=0) and ISO 14443 (up to 848 kbps).

KIAT OS features:

  • Active Authentication / PIN
  • Transaction management
  • Secure messaging
  • Secure proprietary e-Purse
  • Rollback functionality

The COS Cryptographic algorithms are:

  • Cipher: DES (TDES, DESX) ECB-CBC
  • Signature: DES MAC8
  • MAC: ISO 9797, ISO 10118
  • Checksum: CRC16/CRC32
  • Random Number: Secure Random
  • DES Key Size: up to 120-bit

Main strengths are:

  • Versatility: KIAT OS can be used in many different markets
  • High reliability: extensively tested for many applications;
  • Multi-application feature: KIAT OS can be used for many different applications
Download PDF version Download PDF version

Related Whitepapers

The 2024 state of physical access trend report

The truth behind 9 mobile access myths

6 good reasons to embrace mobile credentialing

Quick poll
What's the primary benefit of integrating access control with video surveillance?