1 / 9

Microcrypt Technologies

Microcrypt Technologies. SPACER Secure Physical Access Control Enhanced Reader. for contactless cryptographic smart cards. Reliable Cryptography. Key system is defined by Customer. 3 DES. Algorithms of enciphering 3DES & AES. AES. Data exchange with card is secured.

otto
Download Presentation

Microcrypt Technologies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Microcrypt Technologies SPACER Secure Physical Access Control Enhanced Reader for contactless cryptographic smart cards

  2. Reliable Cryptography Key system is defined by Customer 3DES Algorithms of enciphering3DES&AES AES Data exchange with card is secured Keys of each card are unique Working keys are generated and used inside readers only Microcrypt Technologies

  3. Zonal System Controlled territory can be divided on up to 12 independent access areas (zones) Independent key system for each area Independent user authentication in each access area One card is common entry for all areas Microcrypt Technologies

  4. Key System Flexibility Key system is entirely controlled by Customer Possibility of independent change of keys in different areas Change of working keys by couple of service cards Simultaneous validity of previous and new keys during renewing of area’s key system Simple reservation of working keys Microcrypt Technologies

  5. Administration Flexibility Independent administration of each access area Separation and control of ACS operators activity: • readers configuration and working keys generation (PIN) issuing and control of cards (PIN) operation in monitoring mode Microcrypt Technologies

  6. Administration Flexibility • Separation of the reader functionality at initialization stage: generation of working keys export of working keys for other readers initialization of new cards management of card access keys reading and verification of users cards Microcrypt Technologies

  7. Integration Possibility of step-by-step rearrangement to cryptographic cards in the existing ACS Possibility of integration into the existing ACS Support of wide spread protocols of connection with ACS controllers Cryptographic system is clear for ACS Microcrypt Technologies

  8. Contacts • Feel free to contact as: • E-mail: mail@microcrypt.com.ua Microcrypt Technologies

More Related