Download HID's executive brief

This executive brief explores the security risks associated with using CSN instead of reading the data protected by security mechanisms.

When contactless smart cards are implemented and deployed properly, they represent one of the most secure identification technologies available. However, some manufacturers, in an attempt to sell a ‘universal’ reader capable of reading almost any contactless smart card technology, actually disable the built-in security mechanisms. These readers, referred to as ‘CSN readers’, only read the card’s serial number which, per ISO standards, is not protected by any security.

 What's Inside?

  • Introduction
  • A False Sense of Security
  • Card Serial Number (CSN)
  • Anticollision
  • How is a CSN Used for Access Control?
  • Most Commonly Used Card Format Intensifies the Problem
  • Why is CSN reading so popular?
  • Recommendations from Government and International Organisations
  • Summary

Click Here to Download the Executive Brief Now!

Save

Save

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?