Download PDF version Contact company

The PSIA had another impressive and compelling demonstration of its PKOC spec at GSX 2024.

Some of the major lock and physical access control (PACS) vendors were able to see PKOC in action, with commercially available readers, cards, and apps all relying on the open specification, showing seamless interoperability. 

PKOC product lines

It was gratifying to see all of the hard work of the PKOC technical committee come together at the demonstration at GSX 2024,” said David Bunzel, Executive Director of the PSIA.

Many new manufacturers and customers of the security industry were not only impressed, but discussing ways to include PKOC into their product lines and deployments.”

Secure and interoperable credentials

The simplicity of PKOC, ease of integration, and the significant advantage of asymmetric encryption

The simplicity of PKOC, ease of integration, and the significant advantage of asymmetric encryption were some of the drivers that were most interesting to the companies and customers who were able to see the demonstration.

PKOC creates truly secure and interoperable credentials. “The commercial and security advantages of the asymmetric key-based credential over traditional symmetric keys which we have been using for decades are finally attainable with the PKOC specification."

Public key-based solution

"A public key-based solution can not be underestimated in its value over traditional credential solutions. You now get security, availability, interoperability, and purchasing options all in one,” says John Cassise, Chairman of the PSIA’s PKOC Work Group, and Chief Product Officer, of SAFR at RealNetworks.

While changing from traditional access control products is never easy, the vulnerabilities they have, make more robust solutions, like PKOC, an obvious choice for security, and a more flexible choice for the future.

PKOC specification

PKOC uses the device itself to generate the private & public key pair enabling the private-public key handshake

The PKOC specification leverages the concept of PKI without the need for the typical complex, expensive identity Infrastructure necessary for PKI.

PKOC uses the device itself to generate the private & public key pair, (known as Keygen) enabling the private-public key handshake to authenticate the credential. 

Bring Your Credential

The beauty of PKOC is that the private key never leaves the device, and the public key becomes the “badge #” which can be easily shared with any system or device used to control access. 

With PKOC the USER literally “owns” the encryption keys and does not require any complicated process for managing or sharing keys. Furthermore, PKOC enables you to “Bring Your Own Credential” (BYOC).

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?