LEGIC Access control systems & kits(6)
At the start of June, LEGIC Identsystems AG announced the launch of its first cross-standard transponder chip – CTC for short. The CTC4096-MP410 supports the prime RF standard of LEGIC as well as of LEGIC advant (ISO 14443A) and brings new possibilities for card manufacturers and end users. At the end of the financial year, LEGIC Identsystems AG was able to announce the launch of the first family of multi-RF transponder chips. CTC are innovative in that they are both LEGIC advant and prime transponders at the same time. The CTC4096-MP410 has a 4kb memory; 3kb for the LEGIC advant memory and 1kb for the LEGIC prime memory. A LEGIC prime reader can access the latter without additional tools. A LEGIC advant reader can access both the LEGIC advant memory as well as the prime memory. The first of a multi-lingual family “With CTC technology, we are introducing a family of multi-RF transponder chips, which offers an easy solution to integrate several RF standards”, explains Reinhard Kalla, Vice President Product Marketing & New Business at LEGIC Identsystems AG. “CTC is possibly the first solution of this kind that operates faultlessly.” Future versions of CTC4096-MP410 will be based on the same technology platform and allow communication in several RF standards. Considerable advantages for manufacturers and end users For manufacturers of storage media, the CTC generation signifies simplified card design: until now, communication in different RF standards required two chips each with an antenna; now only one chip with antenna is required, thus saving on costs. “CTC users will be the ones to reap the most benefits”, emphasises Kalla. CTC allows to use one card within a mixed reader infrastructure. the migration from LEGIC prime to LEGIC advant to take place in steps or selectively. For example, the prime user can convert selected fields with very high security requirements individually to LEGIC advant, without having to change the entire system. Or, he can implement the migration from prime to LEGIC advant in several steps. “With CTC, we give our end customers full flexibility in developing their system”, sums up Kalla. In operation soon The CTC4096-MP410 has already been thoroughly tested and is on the way to being put into practical application. For one major customer, several hundred thousands of pieces had already been produced at the time of the launch. Successful market penetration is therefore not an issue.Add to Compare
The market for contactless identification technology is constantly moving. Requirements for advanced security and reliability are increasing, along with demands for comfortable and internationally flexible use. Manufacturers of readers and credentials, along with systems integrators, require technologies that fulfil high functional requirements and user-related criteria to the same extent. The new LEGIC SM-4200 reader chip rises to this challenge. The established variety of supported applications, such as access control, time & attendance, offline locks, IT access or cashless payments, is only the basis. Due to the extremely small size (8 x 8 mm) and the compact design of the new LEGIC reader chip, manufacturers are offered even more flexibility in developing their applications. A much longer battery lifetime also makes the chip attractive for offline applications such as lockers or furniture locks. Open technology platform The challenges are even more demanding when you consider the complex system of different technologies, manufacturers and industrial standards that characterises almost all modern security solutions. Intelligent basic technology, as used by SM-4200, is open to a variety of standards and transponder types, has a high level of interoperability and can be easily integrated into existing installations. Security standards are also increasing on a daily basis. It is therefore more and more important for a technology platform in the field of secure personal identification to include an encryption package that can be upgraded on demand. This openness not only guarantees high protection of investments, but also ensures that installations always comply with the most up-to-date security standards. Setting trends The new development of the LEGIC advant SM-4200 reader chip is perfectly in line with the trend for compact, interoperable and energy-efficient solutions, which can be flexibly integrated into existing infrastructure. Ultimately, the end user's comfort is enhanced through the use of flexible and versatile reading technology.Add to Compare
The new reader chip SM-4500 and the new OS-4000 V2.0 make the LEGIC advant 4000 series the most versatile reader generation of LEGIC. The great novelty of the SM-4500 is the initialisation function, which enables the creation and the management of segments on LEGIC transponders. With the installation of OS-4000 V2.0 the complete LEGIC advant 4000 series further supports common third party transponders, e.g. MIFARE Classic und MIFARE DESFire. This feature opens up a bigger market for readers. Through its compact design, its low-power consumption and a versatile and simple application interface LEGIC advant 4000 based readers integrate themselves in a wide variety of applications. Creation and management of segments with the SM-4500 The new SM-4500 includes the complete function set to create and manage segments on transponder chips. Thus the initialisation of smart cards becomes easier and the management of a system is more comfortable than ever before. Interoperability with MIFARE transponders LEGIC advant 4000 reader modules support all common RF standards and can therefore be used in an extreme wide variety of installations. With the introduction of the OS-4000 V2.0, this key feature is further enhanced – so that, besides the RF standards, the required cryptographic functions for the complete MIFARE transponder family are supported by LEGIC advant 4000 readers. New features and a full backward compatibility The coexistence of LEGIC advant 4000 readers in existing installations is secured by a full backward compatibility with all existing LEGIC products. The SM-4500 is further pin-compatible with the SM-4200 and thus integrates itself easily in existing designs. New installations benefit additionally from the extended possibilities and the higher efficiency – which is also prepared for future challenges. Suitable for all applications The LEGIC advant 4000 series features an extremely compact design and low-power consumption. A smooth integration in readers, easy deployments with battery-powered applications and a simple usage of the smart card technology offer attractive designs, new applications and a unique comfort for operators and users.Add to Compare
Browse Access control systems & kits
Access control system products updated recently
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Should ‘Made in China’ be seen as a negative in security systems and products? It’s an important and complex issue that merits a more detailed response than my recent comment in the Expert Panel Roundtable. For me, there are two sides of the answer to this question: Buying products that have certain negative attributes that are not in alignment with some part of a belief system or company mandate. Buying products that do not perform as advertised or do something that is unacceptable. For integrators and end users making the buying decisions, the drive to purchase products may not be based on either aspect and instead on the product that can do the best job for their business. But for others, a greater emphasis on the ethical implications of purchasing decisions drives decision-making. What is ethical consumption? Ethical consumption is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favouredEthical consumption — often called ethical consumerism — is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favoured, and products that are ethically questionable may be met with a ‘moral boycott’. This can be as simple as only buying organic produce or as complex as boycotting products made in a totalitarian regime that doesn't offer its citizens the same freedoms that we enjoy in the United States. Consider the goals of the Boston Tea Party or the National Consumers League (NCL), which was formed to protect and promote social and economic justice for consumers and workers in the United States and abroad. Some examples of considerations behind ethical consumption include fair trade, treatment of workers, genetic modification, locally made and processed goods, union-made products and services, humane animal treatment, and in general, labour issues and manufacturing practices that take these factors into account. Increase in ethical consumption The numbers show that ethical consumption is on the rise. In a 2017 study by Unilever, 33 percent of consumers reported choosing to buy and support brands that they believe are doing social or environmental good. In the same study, 53 percent of shoppers in the United Kingdom and 78 percent in the United States said they feel better when they buy products that are ‘sustainably’ produced. There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities Though the aforementioned question that sparked this conversation centres around concerns with products made in China, there are many other countries where, for example, governments/dictators are extremely repressive to all or parts of their populations, whose products, such as oil, diamonds, minerals, etc., we happily consume. There are also a number of countries that are a threat in terms of cybersecurity. It may be naive and simplistic to single out Chinese manufacturers. Impact on physical security products Product buying decisions based on factors other than product functionality, quality and price are also starting to permeate the security marketplace. While this hasn't been a large focus area from the business-to-business consumption side, it's something that should be considered for commercial security products for a variety of reasons. Hardware hacks are more difficult to pull off and potentially more devastating" There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities. Last fall, 30 U.S. companies, including Apple and Amazon, were potentially compromised when it was discovered that a tiny microchip in the motherboard of servers built in China that weren't a part of the original specification. According to a Bloomberg report, “This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.” This, along with many other incidents, are changing the considerations behind purchasing decisions even in the physical security industry. Given that physical security products in general have been lax on cybersecurity, this is a welcome change. Combating tech-specific threats In early January, members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors and ensure U.S. technological supremacy by improving interagency coordination across the U.S. government. The bill creates the Office of Critical Technologies & Security at the White House, an indication that this issue is of critical importance to a number of players across the tech sector. Members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors To address a significant number of concerns around ethical production, there are certifications such as ISO 26000 which provides guidance on social responsibility by addressing accountability, transparency, ethical behaviour, respect for stakeholder interests, respect for rule of law, respect for international norms of behaviour and respect for human rights. While still emerging within physical security, companies that adhere to these and other standards do exist in the marketplace. Not buying products vulnerable to cyberattacks It may be counter-productive, even irresponsible, to brand all products from an entire country as unfit for purchasing. Some manufacturers’ products may be ethically questionable, or more vulnerable to cyberattacks than others; so not buying products made by those companies would make sense. The physical security industry might be playing a bit of catch up on this front, but I think we're beginning to see a shift toward this kind of responsible buying behaviour.
People and vehicle access control specialist, Nortech offers a number of products within the Nedap product range that use vehicle tagging to identify individual vehicles while they are moving through a monitoring point. uPASS Reach reader The uPASS Reach reader offers long-range vehicle identification for up to 5 metres using the latest UHF technology. With consistent reading up to 5 metres and adjustable onsite reading as just two of the benefits of the system, the uPASS Reach reader has an elegant slim design, LED and audible read indication and is encased in weatherproof housing. It also operates with passive UHF tags, self-adhesive windscreen tags and hand-held tags with dual-technology options. Long-range passive UHF tags The reader output allows the access control system to open the gate/barrier when an authorised vehicle arrives When the uPASS Reach reader is installed (maximum height two metres) next to an automatic gate or barrier, long-range passive UHF tags are identified at a distance of up to 5 metres as soon as they are visible in direct line of sight of the reader. The reader output allows the access control system to open the gate/barrier when an authorised vehicle arrives without the need for the driver to present a card or badge, and the built-in high intensity LED provides the user visual feedback that the tag has been read. UHF tags are also both battery and maintenance-free. UHF Windshield Tag To work alongside the uPASS Reach, Nedap has designed four different UHF tags to suit all environments. The UHF Windshield Tag is a passive UHF transponder and offers long range identification up to 5 metres when installed inside non metallised windscreens. This provides cost-effective long range vehicle identification for access control applications and is available as a standard peel off version or as a tamperproof version for additional security. Passive UHF Exterior Tag Where vehicle windscreens are fully metallised, Nedap offers a passive UHF Exterior Tag which can be easily fitted onto non-metallic / plastic parts of the vehicle such as the headlights. For added security, the UHF Exterior Tag is a tamper resistant, transparent, adhesive tag. It will show visual proof of removal and is extremely difficult to remove, intact and functional. The chip inside is also protected against harmful UV rays. UHF Heavy Duty Tag This tag features a rugged design for long term use in outdoor and industrial environments The Nedap UHF Heavy Duty Tag is a passive UHF transponder which again offers long-range identification up to 5 metres with the uPASS Reach. However, this tag features a rugged design for long term use in outdoor and industrial environments. The UHF Heavy Duty Tag is a cost-effective solution for installations where the tag needs to be mounted onto the exterior of the vehicle and can also be cable tied or bolted onto bicycles, forklifts and many other industrial devices. Finally, the UHF ISO Combi Card is a card featured with long-range UHF tag and proximity or smartcard technology. Used for both people and vehicle access, it enables the use of one card for both vehicle and building access applications. Available with a range of formats such as Mifare, Legic and HID. Efficient vehicle identification reader The uPASS Reach reader complies with the ISO18000-6C and EPC global Gen 2 directive. This long-range vehicle identification reader is based on latest passive UHF technology. It is used in combination with battery free UHF (EPC Gen 2) tags, making this access control solution totally cost efficient. The uPASS Reach is ideal for convenient vehicle access to public car parks, private-run parking spaces and lots, gated communities and staff parking areas in corporate offices and government buildings.
As a long standing Development Partner, Third Millennium is pleased to further strengthen its status with LEGIC in providing new and design-led collaborative innovation within the security access marketplace. With headquarters based in Switzerland, LEGIC is a trusted supplier to corporations around the world in supplying secure credential and access authentication control, and for more than 25 years, it has been a developer in mobile and contactless smartcard technologies using RFID, BLE and NFC. Key and authorisation management tools Utilising state-of-the-art security standards to secure data integrity, LEGIC’s technology platform includes reader and smartcard ICs and key & authorisation management tools, as well as the software service - LEGIC Connect. Working closely with LEGIC, Third Millennium manufactures a comprehensive range of advanced access control readers, together with integral keypad and biometric fingerprint readers, and provides an unparalleled service of design, quality, and support to its customers.
LEGIC launches its powerful ATC4096-MP312 smartcard IC with 8k byte memory and an improved reading distance. The new transponder chip is EAL 5+ certified and has a long-time backwards compatibility to readers in the field. LEGIC is proud to offer such an impressive IC in its product portfolio. LEGIC’s new smartcard IC features an improved reading distance of up to 11 cm on ISO 14443 A. Thanks to its backwards compatibility to the reading infrastructure of more than ten years, it can easily be used with existing readers. The new ATC4096-MP312 is a sensational allrounder, which is perfect for a wide range of applications with high security requirements. Smart city cards The latest LEGIC product has an extended storage space of 8k byte Furthermore, the latest LEGIC product has an extended storage space of 8k byte. 4k byte of storage are for LEGIC advant applications and 3.3k byte are reserved for MIFARE DESFire applications at a later stage. This will make expensive hybrid cards, interferences, and compatibility problems a thing of the past. As the new chip will be compatible with the NXP AppXplorer, it will also offer access to countless different applications. Thanks to the planned combination of LEGIC advant and NXP DESFire, global employee ID cards will take on a whole new scope. For example, if a company has several sites in different countries, and some buildings use LEGIC technology while others use NXP, the new ATC4096-MP312 will provide the company with a simple solution that will enable all its employees to access every building. Employees will have the possibility to load various private applications such as public transport, bike sharing, member cards, etc. via NXP AppXplorer on their badges and to use these services on site. Global multi-application, multi-technology transponders, and smart city cards – all of this will be possible with the ATC4096-MP312 in the near future!
A blind spot in governance, risk and complianceDownload
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
- Interflex security system streamlines access control, security of staff at Casino Baden-Baden
- Armor At Hand partners with AASA and use Smart Shield to boost school safety nationwide
- 3xLOGIC infinias access control system secures Las Vegas marijuana facility
- ASSA ABLOY’s SMARTair swaps manual keys for centralised electronic access control at Westbridge