您已经添加该商品到您的收藏列表
从您收藏列表中删除此商品。
这家公司已成功添加。 查看我的收藏.
这家公司已从你的收藏夹列表中删除。
这家公司已被添加到您的询问车。
这家公司已从询价车中删除。
该商品已被添加到您的询问车。
该商品已经从您的询价车中删除。
商品/公司已达到添加至询价车的数量。
登入NEWPAGES
保持登入状态
每日登录奖励

恭喜! 你获得了今天的每日登录奖励!

5 NP Point这是您获得的奖励!
查看您的每日登录奖励

确保每天回来登入以获更多的奖励!
谢谢!

Back
Seni Jaya Logo
访客

Anti-Cloning Access Cards With End-To-End Encryption

Anti-Cloning Access Cards With End-To-End Encryption

 

Anti-Cloning Access Cards With End-To-End Encryption

1. Why is reading only UID not secure?

The Unique Identifier (UID) of a smartcard used to be considered as highly unique as specified by the ISO 14443 international standards. However, with the advancement of the card cloning technology today, it is considered unsafe to be totally dependent on the UID to uniquely identify a smartcard for card access control application.
 

2. Who is likely to clone or hack into access control smartcards?

Statistics show that 55 to 75% of corporate fraud are due to insiders. Employees motivated by greed are most likely to clone the access cards of senior executives to commit fraudulent acts for personal gain. Industrial espionage is often motivated by competitive forces to gain advantage into highly competitive businesses while spies spend millions to hack target victims’ accounts. On a lighter note, commercial and residential service providers like maintenance contractors and real estate agents often find it more convenient and cost effective to clone and use multiple cards, rather than approaching the employer for additional access cards.
 

3. How to secure an access control card against cloning and hacking?
 

To guarantee uniqueness of any access card, the contactless access control reader must read data that has been encrypted and stored in the card. The card reader must unlock the smartcard to gain access to the encrypted data. The encrypted data is read and decrypted with a secret key available only in an authorised smart card reader. Because the secret data is hidden from view and data transmission is in encrypted form, it makes the access card impossible to clone or hack.
 

4. Who should keep the encryption secret keys of a card access system?
 

Even more important than storing encrypted data with a strong encryption key is the issue of where and who to keep the keys. Should the key be entrusted to the boss or an employee? What if this person resigns, forgets or attempts to sabotage the company? In principle, secret keys should be robust and never made vulnerable by one or more persons. The solution is to use a professional, purpose built Secret Key Management System (SKeyMa). The seeds to create a master secret key can come from one or more persons, without any one person in the mix having knowledge or visibility of the actual master key. The master key that is generated is stored in a highly secure medium to ensure the highest possible level of security.
 

5. Why is end-to-end encryption crucial to an access control system?

 
User access cards are commonly passed around without much thought to security compromise. A highly secure access control system must protect against any such potential breach of security. The use of secure encryption keys to protect data stored in user access cards ensure that the cards cannot be cloned or hacked. Ensuring that user data is also encrypted while in transit to the access controller, and subsequently to the host is also very important to protect the secrecy and authenticity of every single transaction in the access control system. A system with such end-to-end encryption complies to the highest level of corporate security.

System Architecture


如需咨询或问题,联系我们
总办事处

Q & E SYSTEQ SDN BHD (464182-T)
No. 17A, Jalan Tiara 2, Taman Perindustrian UEP, 47600 Subang Jaya, Selangor, Malaysia.
Google Maps Waze

电话: +603-8023 6262, +6011-3233 3393
传真: +603-8025 1262

邮件: sales@qesysteq.com.my
网址: https://www.qesysteq.com.my
网址: https://qesysteq.newpages.com.my/
网址: http://qesysteq.n.my/

601132333393
+601132333393

Powered by NEWPAGES