MAXSecure provides a high-security handshake, or code, between the card, tag and reader to help prevent credential duplication
Attendees can learn how to protect their access control systems from skimming & relay attacks
Farpointe Data, a DORMA Group Company, the access control industry's trusted global partner for RFID solutions, recently announced that attendees of the ISC East Show at the Jarvis Center North in New York City November 18-19 can learn how to protect their access control systems from skimming, eavesdropping and relay attacks with Farpointe's MAXSecure, Valid ID and Card Validation options.

Preventing credential duplication

"Unfortunately, the equipment needed to perpetrate these attacks can be quite inexpensive and is widely available," explains Scott Lindley, Farpointe Data president. "If the card system is hacked, there can be major problems. At the university, years of research can be tampered with or lost. At the hospital, HIPPA rules are very stringent and the penalties for having them breached can be severe. No administrator wants to be ultimately responsible for causing injury to an employee or visitor because somebody gained unauthorised entry via the card system. That's why we're emphasising this at ISC East."

MAXSecure - high-security handshake

 Besides providing 2-factor authentication via combination card reader/keypad units, Farpointe suggests three other options. MAXSecure provides a high-security handshake, or code, between the card, tag and reader to help prevent credential duplication to ensure that readers will only collect data from these specially coded credentials. No other facility will have the reader/card combination that only it gets from its integrator. Only their readers will be able to read their cards or tags and their readers will read no other cards or tags.

Valid ID algorithm

At manufacture, readers, cards and tags can be programmed with the Valid ID algorithm, cryptographically ensuring the integrity of the sensitive access control data stored on the card or tag. With Valid ID, readers scan through the credential's access control data searching for data discrepancies, which may occur during the counterfeiting, tampering or hacking of a contactless smartcard. Valid ID is an additional layer of protection to Mifare authentication, operating independently, in addition to, and above this standard level of security. In use, Valid ID allows a smartcard reader to effectively verify that the sensitive access control data programmed to a card or tag is not counterfeit.

With the card validation option, cards and readers are programmed with a fraudulent data detection system. The reader will scan through the credential's data in search of discrepancies in the encrypted data, which normally occurs during credential cloning.

To learn more about these options and still other ways to secure their card-based access control systems, ISC East attendees should go to Farpointe Data Booth #533.

Download PDF version Download PDF version

In case you missed it

SHIELD certification: enhancing security and stakeholder collaboration
SHIELD certification: enhancing security and stakeholder collaboration

In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certifi...

What are the new security applications in colleges and universities?
What are the new security applications in colleges and universities?

College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety an...

Real-time security analytics by Winston-Salem Police Department with Verkada
Real-time security analytics by Winston-Salem Police Department with Verkada

The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driv...

Quick poll
Which feature is most important in a video surveillance system?