Access data must be secured

Issue 1 2022 Products & Solutions

Whether it is proximity, smartcard, long range reading or mobile access technologies, there is no excuse for not providing safe data today. First, one needs to understand that Wiegand, the industry standard over-the-air protocol commonly used to communicate credential data from a contactless access credential to an electronic access reader, is no longer inherently secure because of its underlying obscure and non-standard nature.

For this reason, options are now available that can be added to the readers. The first is MAXSecure, which provides a higher-security handshake, or code, between the proximity of smartcard, tag and reader to help ensure that readers will only accept information from specially coded credentials.

The second is an embedded anti-tamper feature available with contactless smartcard readers, cards and tags. It can add an additional layer of authentication assurance to the NXP MIFARE DESFire EV1 smartcard platform. It operates independently and above the significant standard level of security that DESFire EV1 delivers. A smartcard reader effectively helps verify that the sensitive access control data programmed to a card or tag is genuine.

Adding encryption

One aspect of securing a card’s information is to make the internal numbers unusable through encryption. To read them, the system needs access to a secret key or password that provides decryption. Modern encryption algorithms play a vital role in assuring data security.

Today,13,56 MHz smartcards are used to provide increased security compared to 125 kHz proximity cards.

The newest of the MIFARE standards, DESFire EV1, includes a cryptographic module on the card itself to add an additional layer of encryption to the card/reader transaction. (MIFARE, a technology from NXP Semiconductors, enables two-way communications between the card and the reader.) Because it is among the highest standards of card security available, MIFARE DESFire EV1 protection is ideal to secure multi-application smartcards in access management, public transportation programmes or closed-loop, e-payment applications.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
A year of integration, intelligence, and innovation
Suprema neaMetrics Products & Solutions
From the cloud-native CLUe platform and CoreStation 20 controller to the global debut of BioStar X, Suprema has redefined what connected, AI-driven security means for enterprises.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.