Download PDF version Contact company

The PSIA had another impressive and compelling demonstration of its PKOC spec at GSX 2024.

Some of the major lock and physical access control (PACS) vendors were able to see PKOC in action, with commercially available readers, cards, and apps all relying on the open specification, showing seamless interoperability. 

PKOC product lines

It was gratifying to see all of the hard work of the PKOC technical committee come together at the demonstration at GSX 2024,” said David Bunzel, Executive Director of the PSIA.

Many new manufacturers and customers of the security industry were not only impressed, but discussing ways to include PKOC into their product lines and deployments.”

Secure and interoperable credentials

The simplicity of PKOC, ease of integration, and the significant advantage of asymmetric encryption

The simplicity of PKOC, ease of integration, and the significant advantage of asymmetric encryption were some of the drivers that were most interesting to the companies and customers who were able to see the demonstration.

PKOC creates truly secure and interoperable credentials. “The commercial and security advantages of the asymmetric key-based credential over traditional symmetric keys which we have been using for decades are finally attainable with the PKOC specification."

Public key-based solution

"A public key-based solution can not be underestimated in its value over traditional credential solutions. You now get security, availability, interoperability, and purchasing options all in one,” says John Cassise, Chairman of the PSIA’s PKOC Work Group, and Chief Product Officer, of SAFR at RealNetworks.

While changing from traditional access control products is never easy, the vulnerabilities they have, make more robust solutions, like PKOC, an obvious choice for security, and a more flexible choice for the future.

PKOC specification

PKOC uses the device itself to generate the private & public key pair enabling the private-public key handshake

The PKOC specification leverages the concept of PKI without the need for the typical complex, expensive identity Infrastructure necessary for PKI.

PKOC uses the device itself to generate the private & public key pair, (known as Keygen) enabling the private-public key handshake to authenticate the credential. 

Bring Your Credential

The beauty of PKOC is that the private key never leaves the device, and the public key becomes the “badge #” which can be easily shared with any system or device used to control access. 

With PKOC the USER literally “owns” the encryption keys and does not require any complicated process for managing or sharing keys. Furthermore, PKOC enables you to “Bring Your Own Credential” (BYOC).

Download PDF version Download PDF version

In case you missed it

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

ASSA ABLOY's mobile unlocking innovation wins award
ASSA ABLOY's mobile unlocking innovation wins award

ASSA ABLOY’s innovative new mobile access solution has won yet another prestigious industry award. At October’s Detektor International Awards, ABLOY CUMULUS received t...

Quick poll
What's the primary benefit of integrating access control with video surveillance?