Download PDF version Contact company

Physical Access Control Systems (PACS) continually evolve as vulnerabilities are identified. It is no exaggeration to say most RFID cards used for access at office buildings, data centers, factories, and government buildings are susceptible to card cloning or hacking.

Card cloning devices can be obtained online for as little as US$ 10. The battle is ongoing and is relatively cost-effective to put right.

Legacy PACS

The majority of legacy PACS installed use standard open transmission protocols, such as Wiegand and MIFARE. These cards have been in use for many years, without being managed by industry standards, resulting in hundreds of different card types being developed and used.

The proliferation of 125KHz proximity and latterly Mifare standard proximity adoption revolves around perceived convenience and low cost however these cards have little to no encryption and therefore vulnerable to attack. The following offers practical ways to update existing systems and future-proof new ones.

Two-factor authentication

MIFARE DESFire EV2 allows for fast and highly secure encrypted data transmission with read/write capability

Two-factor authentication is the combination of two out of the three possible methods (something one knows, something one has, or/and something one is). Most access control systems will couple an access card with a pin code.

MIFARE DESFire EV2 allows for fast and highly secure encrypted data transmission with read/write capability. This high frequency 13.56MHz technology is ideal for access control management.

Secure credential technology

In this ever-expanding universe of credential technologies, it is advisable to opt for open global standards for both air interface and cryptographic methods. MIFARE DESFire EV2 is the latest secure credential technology to hit the market that provides 128Bit encryption and is compliant to all 4 levels of ISO/IEC 14443A and uses optional ISO/IEC 7816-4 commands.

Put simply, these cards cannot be copied or cloned and offer the additional benefit of being used to exchange data with third party applications, such as cashless vending and logical access control systems.

Mobile access

Smartphones are becoming increasingly commonplace in replacing access cards in the security industry. Mobile credentials are easy to assign, monitor, and revoke in real time. They cannot be copied or duplicated, and users are less likely to share their phone than key card.

From a security and convenience standpoint, mobile access is second to none.

Download PDF version Download PDF version

In case you missed it

Digital access solution for Munich's Hofbräuhaus
Digital access solution for Munich's Hofbräuhaus

Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world&r...

How should total cost of ownership (TCO) impact security decisions?
How should total cost of ownership (TCO) impact security decisions?

Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lo...

Achat Hotel implements Dahua DeepHub for modern meetings
Achat Hotel implements Dahua DeepHub for modern meetings

Achat Hotel in Bochum, Germany offers comprehensive meeting and conference services, including both accommodation and catering. Due to the ever-increasing demand for interactive m...