Idesco Access Control Readers(59)
Idesco presents at IFSEC the innovative Access 7 C product line. Access readers are designed for reliable and secure access control, data collection and people identification in various environments. Access multi-technology readers are vandal resistant and available with most common interfaces for easy integration. Access 7 C Exclusive is the first access control reader with a wooden housing to suit high profile environments. Access 7 E reader with Ethernet output utilizes existing Ethernet network in data transfer.Access 7 C is a reliable reader that functions even in harsh environments. It has a unique design and it is available with several colour options. It is available also as a module. Access 7 Cpin reader provides pin code identification and is absolutely maintenance-free. Reliability and robustness of the design ensure that the readers function even in harsh environments and under all weather conditions.Add to Compare
Idesco Access 7 A is based on industry-wide standard 125 khz EM technology. By launching Access 7 A Idesco can now offer its technology as an inexpensive alternative ideally suited to price sensitive installations. Access 7 A reads EM 4001 compatible tags and cards which are the most inexpensive options available on the market. The reader is available with Wiegand 26 bit, Clock and Data and RS232 interfaces. Access 7 A is an attractively designed unit, in keeping with Idesco's Access 7 C multi-technology reader, at an even more attractive price level. Access 7 A is designed to offer more cost effective access control solutions to complement the Idesco's 13.56 Mhz readers designed for multi-faceted applications.Add to Compare
As an answer to the ever-increasing needs of sustainable development and ecological solutions, Idesco introduces its new eco20 Reader product platform. This new product range is designed for minimized power supply requirements and includes several new 13,56MHz reader products supporting Mifare Classic, Ultralight, DESfire and upcoming MifarePlus. eco20 readers are also available with Legic and Mifare compatible Smart MX and NFC reader technologies, and have also multiple housing, PIN pad, illumination and connection options.Eco20 reader series for different applications and several technology options are the new ecological solution for the access control, time & attendance, vending machine, cafeterias and billing applications. eco20 platform includes full security and application support for most 13,56MHz reader technologies.This new product range is designed for minimized power supply requirements and it allows for both smaller power consumption together with lower requirements for the system power supplies, bringing also cost saving to the peripheral equipment. Typical power consumption of the eco20 readers is only 30% compared to the most readers on the market.The eco20 platform includes several new 13,56MHz reader products in different housing options, with backlit PIN keyboards and with or without connectors. These high security readers are available supporting various technologies like Mifare Classic, Ultralight, DESFire and upcoming MifarePlus, but also with Legic and Mifare compatible Smart MX and NFC reader technologies.The eco20 reader platform is an ideal product range providing superior customizing possibilities for introducing fast designing and cost effective ODM readers.Idesco Oy is one of the leading and longest established RFID technology companies, located in Finland. The company applies its technology to create solutions for different situations and applications for example in person and vehicle identification and access control. The significant part of the company production is sold to European countries. The Idesco Cardea System, also a part of eco20 platform, was chosen for the finals in the year 2009 IFSEC international security industry awards in the access control product of the year series. eco20 product platform range includes:Idesco Cardea ReaderAccess DESFire readerAccess Quattro pinAdd to Compare
The Idesco Access 9CM multipurpose Mifare® r/w reader is designed to be used in applications where data on the transponder needs to be updated during the reading transaction. Such applications include access control, data collection, payment applications and people identification in various environments. The Idesco Access 9CM reader supports: normal Mifare® commands as well as some additional commands all standard Mifare® cards (1Kbyte, 4 Kbyte) RS 232 interface Mifare ProX is also supported, if the ProX card is in the Mifare® standard emulation mode Access 9CM is also available as a module for OEM's. The reader has an elegantly designed housing and is available with many colour options to choose from. It also has a wooden housing option.Add to Compare
Idesco’s new Access 8 CM Mifare® sector reader reads application specific data from selected sectors of all Mifare® standard cards. Multi-application cards can also be used with this reader unit. The reader accepts any bit lengths making it compatible with almost any system.The card sectors the reader can access are protected by an additional security key, which is defined separately between the reader and the card. The application data can only be read with Idesco Access 8 CM reader and with a correct security key. By using an encoder reader and the encoder software customers can implement their own applications and define security keys also themselves. Also interface, default sector and timing of the data can be configured by using a configuration card which offers superior flexibility. The reader is available in many colours and also with hand-made wooden housings.Add to Compare
Idesco's Access Touch, an elegant touch computer and RFID reader, has just been updated to 2.0. Used for a variety of applications including management of wireless systems, as an independent interface for time and attendance, payment, alarm control or as an info screen, Idesco's Access Touch 2.0 now operates on its own enhanced, high-performance Idesco Embedded Linux as well as embedded Windows XP. Crucially, the Access Touch 2.0 also offers vastly improved processor performance over its previous architecture. Processor speeds now range from 1.1 GHz to up to 2.0 GHz depending upon your preferences. Access Touch 2.0 display quality has also been enhanced with the integration of Backlight LED technology. Furthermore, USB port capacity has been increased to a maximum of five and a standard internal UPS has been introduced to augment its ability to interface with an external UPS for protecting against external power failure. Most importantly, the Access Touch 2.0, with its significantly enhanced hardware and operating system options, now readily accommodates an even wider range of customised, secure solutions and applications (including your company's own proprietary software). It still possesses its innovative built-in RFID reader customisable to a wide variety of technologies in the 125 kHz and 13,56 MHz frequencies (including AES). However, the Access Touch 2.0 can now also wirelessly and securely connect and administer wireless UHF readers through intermediary Idesco controller products such as the Idesco Control Unit or Door Control Unit. The new Access Touch 2.0 still comes in a variety of stylish Scandinavian designs lending a refined elegance to complement its sturdily-engineered shock-proof glass display. Naturally, the front panel remains fully customisable to suit the needs of whatever tasks you assign it. In short, Idesco's Access Touch 2.0 has become an even more powerful RFID Touchscreen Terminal solution.Add to Compare
Idesco launches an EPC reader for cost-effective applications. It is a passive UHF reader that enables longer identification distances with cost effective and durable passive identifiers. This innovative passive long range UHF reader makes it possible to create user-friendly identification applications for vehicle identification (AVI), logistic systems and access control. This EPC reader operates according to the European UHF (ultra high frequency) regulations.The reader can work with one external and one internal antenna. The antennas can transmit and receive at the same time or the other antenna can transmit when the other is receiving. The Idesco EPC reader is available with several interfaces for easy integration and it offers a variety of security options. It supports anti-collision. Via the four I/O ports peripherals can be addressed. The wide operation temperature range of the reader and its protection class enable usage in indoor and outdoor environments.Please visit our stand A14:29 at Skydd Exhibition in Stockholm, from September 30th to October 3rd.Add to Compare
Idesco's Access 8 CD reader line offers a significant improvement to access control security by combining configurable MIFARE® technology with an unprecedented flexibility in platform configuration and customizability. The biggest improvement is that Access 8 CD readers are fully customizable in their deployment of MIFARE®security. This is because 8 CD readers can be built in three different operational modes: MIFARE®DESFire, MIFARE® Classic and a dual mode. Dual mode allows you to anticipate a future migration from Classic up to DESFire. That migration process itself involves nothing more than the swipe of a configuration card! Of course, in choosing MIFARE®, Idesco also ensures the full power and security of that technology is made available to you. For starters, ciphers no less powerful than 3DES or AES are deployed in Access 8 CD readers configured for MIFARE® DESFire. Additionally, 8 CD readers are fully capable of reading application-specific data from one or more selected applications and files of MIFARE® DESFire cards. For maximum security, the 8 CD readers can even be programmed to interrogate data strings combined from different data blocks stored in different files. The 8 CD comes in a wide variety of housings: Basic, Slim, Slim Pin, Quattro, Quattro Pin and Desktop. The first five models can be optionally-equipped with optical tamper switches for even further security. Pin reader keypads are built with capacitive sensing technology to increase reliability and have configurable backlighting LEDs for illumination. As always, all Idesco® 8 CD readers may be customized with your company logo.Add to Compare
Idesco® is introducing a dynamic new product, the Idesco® EPC Writer. The Idesco® EPC Writer is an elegant, innovative and compact PC accessory for convenient desktop encoding of EPC Class 1 Generation 2 transponders. It is a fully functional read/write device and comes with a USB cable for convenient PC connections enabling it to interface with Idesco's user-friendly, proprietary EPC Writer Application.Idesco's EPC Writer is a timely addition to the rest of its versatile EPC product family, which includes readers employing different interfaces capable of communicating with a wide variety of transponders. Whether you deploy EPC Class 1 Gen 2 transponders in an inventory tracking, logistics, transportation or security setting, the Idesco® EPC Writer is an indispensable and convenient tool, simplifying your task of programming your transponders.The complete Idesco® EPC Writer package contains the desktop device, application software and a user manual.Secure. Reliable. Innovative. We Are Idesco®.Add to Compare
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localisation. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymised and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognising the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
Idesco devised a transparent reader to simplify Infobric’s construction site system management, making it powerfully adaptable to widely different market needs and technology standards. For a while, construction sites have provided a textbook example of how much electronic access control systems can benefit managers. Controlling access to a site, including restricted zones, machinery access (such as lifts and elevators), increases both security and safety, while also helping track authorised personnel and even equipment utilisation. Ensuring regulatory compliance Infobric Ease possesses a wide range of functionality, from site access to energy control and much more An automatic, electric system, with that much functionality combined in a single service meets a high-value need in the construction industry. Today, Infobric provides a cloud-based digital platform, Infobric Ease, to help construction site managers monitor and secure key elements, such as site safety, while increasing worker productivity and ensuring regulatory compliance. Infobric Ease possesses a wide range of functionality, from site access to energy control and much more. In addition to simplifying site management and boosting worker productivity, it simplifies sites’ compliance with staff ledger regulation across a number of European countries. Worker productivity has been enhanced by the elimination of queues to register new staff on site and attendance. Lastly, controlled access increases worker safety while reducing theft and vandalism. Simplifying worker attendance monitoring Cloud management contributes even more to time and labour cost savings while also letting site owners conveniently fulfil their law-mandated employer obligations. To prevent tax avoidance and illegal workers, some European countries require construction site managers to upload the employee data registered in their staff ledgers – which Infobric Ease also provides, thereby also simplifying worker attendance monitoring. In short, the digital tracking of all this data saves significant time and money. The RFID industry commonly labels this type of reader ‘transparent’, because it seamlessly transmits transponder data Infobric integrated Idesco’s 9 CD 2.0 Slim Pin T reader into Infobric Ease as its vital front-end interface with construction workers. The RFID industry commonly labels this type of reader ‘transparent’, because it seamlessly transmits transponder data – fully-encrypted to ANSSI Level 1 Architecture specification – directly to a system, without any mediating keys. This lets systems themselves directly control all aspects of transactions – including data collection and reader response – resulting in both a highly secure and a cost-effective solution. Several identification card standards For integrators like Infobric, 9 CD 2.0 Slim Pin T’s direct, ‘transparent’, interaction between transponder and system not only simplifies transactions. It also lets them use more of the available features in the chips in workers’ transponders. This further benefits site owners and security managers because system updates can be implemented with greater agility and cost savings. “There are several identification card standards we adapt our products and systems to work with. So, we really wanted a card reader we could use in all our markets, without needing different hardware updates after a system upgrade or launching a new functionality across our different markets. The ‘transparent’ reader from Idesco turned out to be the perfect solution”, says Björn Hilliges, IT & Electronics Director at Infobric. Product design and expertise Every month, the Infobric Ease system handles approx. 11,000,000 card readings" “Infobric and Idesco have been co-operating for more than 10 years and through several product development projects. Over the years, Idesco repeatedly demonstrated their excellent quality in both product design and expertise, always providing us with products and solutions that reliably withstood very rough, inclement conditions amid frequent use at our customers’ construction sites,” says Björn Hilliges, IT & Electronics Director at Infobric. “Every month, the Infobric Ease system handles approx. 11,000,000 card readings. So, Idesco is a key partner for Infobric, and each day their readers fill a vital role at approx. 15,000 construction sites,” says Björn Hilliges, IT & Electronics Director at Infobric. Convenient regulatory compliance Infobric ease benefits for construction sites Convenient regulatory compliance on staff ledger registration in numerous European countries Increased productivity by reducing administrative tasks Time savings from agile system updating (despite differing card standards in different markets) because reader updates are no longer needed Enhanced reader functionality for workers with included keypads Reliability of Scandinavian-designed readers that are robust, weather-proof, maintenance-free Sites can now substantively help prevent undocumented labour and unprofessional contractors Infobric Ease features: Cloud-mediated service Seamless data collection Energy control Regulatory-compliant staff ledger Automated electronic access Mobile attendance & access Staff access control Vehicle access control Machine control Smart locks Making construction sites safer Infobric designs systems that make construction sites safer, more productive and reduce costs. Infobric’s solutions ensure the right people are in the right place at the right time at the site. Infobric provides with the best-working solution for the worksite, for both work hours and after, in packages that have been serving successfully on European construction sites large and small. Their goal is to become the digitisation partner for the construction industry in the Nordics. With 30 years of experience, RFID technology pioneer Idesco Oy makes RFID readers, transponders, controllers and touch screen devices. Every day, for customers around the world, their devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory systems.
Mari Melakari is one of the newest to join Idesco’s SCM team. She oversees incoming component logistics and inventory, ensuring adequate supply for production members. Additionally, every day Mari expedites delivery of numerous Idesco product consignments to customers world-wide. Teamwork is integral to Mari’s work at Idesco. Every morning, Mari and her SCM team review the pending task and delivery schedule to parse assignments among individuals. Providing a healthy counterbalance to work When Mari began at Idesco, it was a new kind of job with a robust learning curve. Yet the work variety since then has also kept her job interesting. “The best days give me a feeling of achievement; it’s nice leaving at the end of the day, with everything in its place, knowing shipments left for destinations on time,” she says. Mari has a most interesting hobby. In pursuit of her life-long dream, she applied to and was accepted into the Student Theatre of Oulu. She is already in rehearsal for her sixth performance. As the performance date approaches, she anticipates a string of evening rehearsals will keep her busy. Acting, however, provides a healthy counterbalance to work, Mari concludes.
Denmark’s Evotec chose Idesco readers to complete their cargo securing system they had designed for transport companies’ vehicles. Evotec’s system does more than merely preventing cargo theft. Drivers also feel more secure when delivering because hijack risks are also reduced. This is because cargo is robustly secured when drivers leave vehicles behind. Idesco 8 CD 2.0 DESFire readers Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles Danish cargo companies had been struggling with regular delivery cargo thefts. Drivers did not feel secure when delivering and financial losses were growing. Evotec decided to develop a novel vehicle security solution for cargo companies. As part of their solution, Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles. Idesco readers have since been installed on several hundred Danish cargo trucks and vans. Early in their design process, Evotec had seen a clear need to strictly limit access to vehicle’s cargo space to authenticated personnel only. They had known RFID technology could provide accurate, secure user identification and authentication. They learned that Idesco’s MIFARE DESFire readers, paired with 128-bit AES-encrypted DESFire transponders, would easily repel transponder hacking or cloning. Best of all, they learned Idesco designed many of its readers for installing outdoors, reliably resisting impacts, moisture, dirt and temperature extremes. Security Key Management service Idesco’s Security Key Management service saved Evotec extensive time and resources"Bo Schønning, Evotec Aps CEO, described the subsequent cooperation of Idesco with his company, “We got great assistance in choosing the correct solution for our system”. In addition to coded readers, Evotec ApS also subscribed to Idesco’s convenient Security Key Management Service for ensure compatibility with every vehicle’s readers. Since DESFire demands readers and transponders be encoded with matching security keys, Idesco’s Security Key Management service saved Evotec extensive time and resources, freeing them to focus exclusively on installations for their customers’ vehicles without worrying about managing DESFire keys themselves. “We feel safe when Idesco handles this data for our customers”, says Bo Schønning. The cargo drivers of Evotec’s customers are assigned vehicle specific transponders to carry, which open the cargo space when presented to the reader guarding it. For increased security, the driver cabin locks automatically when the cargo space unlocks. Additionally, cargo doors automatically lock when they close and will remain locked when the vehicle’s engine is running. The system works equally well in vehicles equipped with liftgates. Opening the vehicle’s driver cabin with the ignition key doesn’t affect its cargo space: it remains continuously locked. If needed, a vehicle’s cargo space could be opened remotely via fleet management software. If a transponder is stolen, a vehicle’s readers can be reprogrammed to not recognise the transponders. Fleet management and vehicle tracking Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes. The fleet software’s online tracking and route reporting also provides cargo companies a powerful fuel control ability that can reduce fleet costs. “This system has significantly increased drivers’ security at work while reducing costs caused by theft”, notes Bo Schønning, CEO, Evotec ApS. “Fuel costs have also been reduced, as the cars aren’t left idling anymore. It is easier to control the fleet, and our customers can also follow the quality of deliveries with this system”, he continues.” RFID technology Founded in 1989, Idesco is an experienced company in the field of RFID technology. From the very beginning, Idesco was a pioneer in using RFID, deploying it for identification in industrial applications. Down through the years Idesco continued expanding its reputation as a pioneer provider by innovating numerous technological alternatives and multiple technologies for a variety of different application areas. Every day, Idesco devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory control systems.
Related white papers
11 considerations for embedded system RFID readers
RFID and smartphone readers in physical access control
3 reasons to migrate to a new access control system
Building a safe ecosystem for visitors post COVID-19Download
Smart security cameras: excellence in retailDownload
5 reasons to integrate mobile technology into your security solutionDownload
- ASSA CLIQ® Remote system secures plant control rooms at Loughborough University
- Edgeworx secures Manhattan preschool with Darcy AI thermal camera
- HID Global Seos® smart cards and FARGO® Connect help secure access to University of Connecticut student campus
- Vanderbilt installs ACT365 cloud-based access control reader at Denmark’s Vejle marina