LEGIC Access control systems & kits (6)
At the start of June, LEGIC Identsystems AG announced the launch of its first cross-standard transponder chip – CTC for short. The CTC4096-MP410 supports the prime RF standard of LEGIC as well as of LEGIC advant (ISO 14443A) and brings new possibilities for card manufacturers and end users. At the end of the financial year, LEGIC Identsystems AG was able to announce the launch of the first family of multi-RF transponder chips. CTC are innovative in that they are both LEGIC advant and prime transponders at the same time. The CTC4096-MP410 has a 4kb memory; 3kb for the LEGIC advant memory and 1kb for the LEGIC prime memory. A LEGIC prime reader can access the latter without additional tools. A LEGIC advant reader can access both the LEGIC advant memory as well as the prime memory. The first of a multi-lingual family “With CTC technology, we are introducing a family of multi-RF transponder chips, which offers an easy solution to integrate several RF standards”, explains Reinhard Kalla, Vice President Product Marketing & New Business at LEGIC Identsystems AG. “CTC is possibly the first solution of this kind that operates faultlessly.” Future versions of CTC4096-MP410 will be based on the same technology platform and allow communication in several RF standards. Considerable advantages for manufacturers and end users For manufacturers of storage media, the CTC generation signifies simplified card design: until now, communication in different RF standards required two chips each with an antenna; now only one chip with antenna is required, thus saving on costs. “CTC users will be the ones to reap the most benefits”, emphasises Kalla. CTC allows to use one card within a mixed reader infrastructure. the migration from LEGIC prime to LEGIC advant to take place in steps or selectively. For example, the prime user can convert selected fields with very high security requirements individually to LEGIC advant, without having to change the entire system. Or, he can implement the migration from prime to LEGIC advant in several steps. “With CTC, we give our end customers full flexibility in developing their system”, sums up Kalla. In operation soon The CTC4096-MP410 has already been thoroughly tested and is on the way to being put into practical application. For one major customer, several hundred thousands of pieces had already been produced at the time of the launch. Successful market penetration is therefore not an issue.Add to Compare
The market for contactless identification technology is constantly moving. Requirements for advanced security and reliability are increasing, along with demands for comfortable and internationally flexible use. Manufacturers of readers and credentials, along with systems integrators, require technologies that fulfil high functional requirements and user-related criteria to the same extent. The new LEGIC SM-4200 reader chip rises to this challenge. The established variety of supported applications, such as access control, time & attendance, offline locks, IT access or cashless payments, is only the basis. Due to the extremely small size (8 x 8 mm) and the compact design of the new LEGIC reader chip, manufacturers are offered even more flexibility in developing their applications. A much longer battery lifetime also makes the chip attractive for offline applications such as lockers or furniture locks. Open technology platform The challenges are even more demanding when you consider the complex system of different technologies, manufacturers and industrial standards that characterises almost all modern security solutions. Intelligent basic technology, as used by SM-4200, is open to a variety of standards and transponder types, has a high level of interoperability and can be easily integrated into existing installations. Security standards are also increasing on a daily basis. It is therefore more and more important for a technology platform in the field of secure personal identification to include an encryption package that can be upgraded on demand. This openness not only guarantees high protection of investments, but also ensures that installations always comply with the most up-to-date security standards. Setting trends The new development of the LEGIC advant SM-4200 reader chip is perfectly in line with the trend for compact, interoperable and energy-efficient solutions, which can be flexibly integrated into existing infrastructure. Ultimately, the end user's comfort is enhanced through the use of flexible and versatile reading technology.Add to Compare
The new reader chip SM-4500 and the new OS-4000 V2.0 make the LEGIC advant 4000 series the most versatile reader generation of LEGIC. The great novelty of the SM-4500 is the initialisation function, which enables the creation and the management of segments on LEGIC transponders. With the installation of OS-4000 V2.0 the complete LEGIC advant 4000 series further supports common third party transponders, e.g. MIFARE Classic und MIFARE DESFire. This feature opens up a bigger market for readers. Through its compact design, its low-power consumption and a versatile and simple application interface LEGIC advant 4000 based readers integrate themselves in a wide variety of applications. Creation and management of segments with the SM-4500 The new SM-4500 includes the complete function set to create and manage segments on transponder chips. Thus the initialisation of smart cards becomes easier and the management of a system is more comfortable than ever before. Interoperability with MIFARE transponders LEGIC advant 4000 reader modules support all common RF standards and can therefore be used in an extreme wide variety of installations. With the introduction of the OS-4000 V2.0, this key feature is further enhanced – so that, besides the RF standards, the required cryptographic functions for the complete MIFARE transponder family are supported by LEGIC advant 4000 readers. New features and a full backward compatibility The coexistence of LEGIC advant 4000 readers in existing installations is secured by a full backward compatibility with all existing LEGIC products. The SM-4500 is further pin-compatible with the SM-4200 and thus integrates itself easily in existing designs. New installations benefit additionally from the extended possibilities and the higher efficiency – which is also prepared for future challenges. Suitable for all applications The LEGIC advant 4000 series features an extremely compact design and low-power consumption. A smooth integration in readers, easy deployments with battery-powered applications and a simple usage of the smart card technology offer attractive designs, new applications and a unique comfort for operators and users.Add to Compare
Browse Access control systems & kits
Access control system products updated recently
Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to containing the pandemic. Michael Seiter: Overall, we managed the past year well despite the challenges and have been growing again since the third quarter compared to 2019. We see good opportunities for further growth in 2021. Q: Has the Corona crisis again accelerated the development of smart technologies in the security technology market, and does the security market in contrast to most industries benefit from the crisis more than it suffers? Michael Seiter: The Corona crisis has definitely demonstrated that the future lies in data-driven solutions. Thanks to our product development strategy already being based on this, we at Bosch were very quickly able to develop new products for the ‘New Normal’ and to expand existing products accordingly. To give one or two examples: in cooperation with Philips, we very quickly developed a people counting solution for retail operations – smart Philips displays in conjunction with smart cameras from Bosch that provide protection for staff and customers. The In-Store Analytics software solution was also implemented with additional features. Shop owners can now make decisions based on customer movement data such as “Where do we position products to avoid queues or crowds?” HTD involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature The latest highlight is the Bosch Human Skin Temperature Detection solution, in short HTD. This involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature at control points in offices, factory floors, or airports. The benefits of previously existing solutions on the market are sometimes called into question. Competitors are often unable to deliver what they promise because, for example, the measured temperature of the skin does not correspond to the core temperature of the person, or fluctuates, due to environmental influences. Therefore, we developed a software-based solution that, in compliance with GDPR, first allows people with potentially elevated body temperatures to be filtered out, and in a second step, allows medical personnel to perform a more targeted fever measurement. Q: You see a lot of potential for the video security industry in new technologies such as Artificial Intelligence and the Internet of Things. What specific opportunities do you mean, and how are you leveraging these technologies at Bosch Building Technologies? Michael Seiter: Bosch has committed itself fully to an “AIoT” – AI meets IoT – strategy. The development of AI algorithms and software, in general, is at Bosch significantly driven in the security space. By AIoT, we specifically mean the networking of physical products and the deployment of artificial intelligence. With AI we aim to enable clients to understand events at an ever-deeper level and predict them in the future – the keyword being predictive – so that they can act proactively. This is particularly important for health and safety. An example is the Intelligent Insights solution where the user can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area. Q: From your point of view do you have an advantage over other suppliers when it comes to AI-based products in the video arena? Michael Seiter: The analysis and utilisation of video data have long been front and centre with us. Since 2016 we’ve been following the strategy of offering AI applications in the form of integrated intelligent video analytics as a standard in our network cameras. Data such as colour, object size, object speed, and direction are all measured. Simply put, you can say this is seeing and understanding – which is the principle behind smart security cameras. Today it’s much more a question of intelligent, data-based solutions than collecting high-quality pictures and storing them for the record. Bosch has been investing heavily in AI for years, from which we can benefit greatly in our area. In the first quarter, for example, we will launch a vehicle detector based on deep learning that is already running on our cameras. This will create significant added value for our customers in the area of intelligent traffic control. Q: Mr. Ekerot, what advantages do customers have in AI-based video security from Bosch? Magnus Ekerot: A key advantage is strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms A key advantage is our strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms. Take the example of Camera Trainer, a machine learning software that can be directly uploaded to Bosch network cameras. The camera is thus trained up on recognising objects and situations – tailored to the specific needs of our customers. If the camera detects the defined scenario, it performs a predefined action in real-time – for example, a count or an alarm. The latest example is our new camera platform Inteox. As a completely open camera platform, Inteox combines Bosch's intelligent video analytics with an open operating system. This allows programmers to develop specific software applications - or apps - for various application purposes. These can then be loaded onto cameras – the same principle as an app store for smartphones. To sum up, Bosch AI applications support customer-specific needs related to data analysis while enabling totally new applications within and beyond the video security market. Q: Can you name a specific current project where Bosch has deployed an AI-based solution? Magnus Ekerot: A current ground-breaking project using our smart cameras is being implemented as a pilot in the USA. Smart Ohio enables users to configure more intelligent traffic flows and thus ensure mobility, safety, and the efficient use of roads today and tomorrow. The new vehicle detector mentioned by Mr. Seiter also plays a central role here. Our overall goal is to provide connected smart sensor solutions for public and private transportation agencies to enable them to operate their roads safely and efficiently. The Intelligent Insights can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area Q: Mr. Seiter, you have been involved with the topic of mobility for some time. What experience from your previous job in the automotive business of Bosch might help you when it comes to further develop the video portfolio of Bosch Building Technologies? Michael Seiter: There's a lot to tell. First of all, the development of core algorithms for video-based solutions, whether for autonomous driving, for vehicle interior monitoring, or for our Bosch Building Technologies video systems, all come together at Bosch's Hildesheim location. This gives us considerable synergies and allows us to bring R&D results to market faster and more flexibly. Essentially, assisted driving systems use AI algorithms that process ever-increasing volumes of video data. Attempts are being made to imitate the human being and enable the vehicle to understand better the surrounding environment with its ‘eyes’. This predictive capability is especially critical with autonomous driving. For example, key questions include: “How should the car respond and what could potentially happen next?” “What kind of environment does it find itself in?” etc. There are many activities in this area at Bosch that in my new role in security we can also strongly benefit from. I am now bringing a lot of this experience and existing R&D achievements to Bosch Video Systems & Solutions, which also results in further synergies with our mobility division: At Stuttgart Airport, autonomous driving is already being implemented together with Mercedes-Benz and the parking garage operator Apcoa as part of the "Automated Valet Parking" project, or AVP for short, in which intelligent video systems from Bosch Building Technologies are making a significant contribution. Mr. Ekerot, you have a lot of experience in the video security area. Where do you position Bosch Building Technologies now in this market and what specific goals are you pursuing? Magnus Ekerot: Our clients are looking for reliable partners and products. We are a strong brand; you can rely on Bosch products. Bosch is a thought leader in video and a pioneer in AI applications in this field since 2016. Data security is everything to us: Our products conform to the EU’s GDPR regulations. Beyond that, we have an extensive camera portfolio that complies with the US National Defense Authorization Act (NDAA) for video security devices. This enables our portfolio to be deployed for example within US government buildings. We are planning to conclude more software maintenance agreements with our clients in 2021. These deliver investment and future security for our customers and include for example a ‘patch guarantee’ along with regular updates with new functionalities. This is the first step in a comprehensive plan to access new revenue channels for us and our partners delivering the best technology and excellent service to the end-user! Overall, many new products will be launched this year and this trend will intensify. Our goal is to establish new product families that follow a simple principle: “The development and delivery of disruptive, predictive video solutions that every user can trust because of the underlying sustainable forward-thinking mindset.” It’s been much discussed of late that Bosch is one of the very first companies globally that operates on a CO2-neutral basis. How does sustainability impact your business? Magnus Ekerot: IoT solutions are actually sustainable and contribute to environmental protection Our IoT solutions are actually sustainable and contribute to environmental protection. For example, our cameras are sustainable in that they remain up-to-date through software updates and needn’t be constantly exchanged for new ones. Our systems demonstrate sustainability also operationally as they can be managed remotely. System integrators don’t need to be physically present, thus avoiding unnecessary travel with its accompanying emissions. All in all, Bosch Building Technologies develops ways to accompany and support our clients in reaching their climate goals via new technologies. This can be done, for example, through improved energy efficiency, the total cost of ownership models, organising and simplifying the supply chain, and helping our customers meet their social responsibilities. The Power of Bosch helps us here to leverage company-wide research to be two steps ahead, a shade faster, when it comes to new technologies and initiatives that our and future generations will benefit from. I should also say that I am personally very proud to work for a company that set an ambitious climate goal for itself and achieved it! Can you already share a preview of your technology innovations in 2021? Michael Seiter: We see great market potential for our cameras that use artificial intelligence and can be updated flexibly throughout their lifecycles. I have already mentioned the deep learning-based vehicle detector in our cameras. More such solutions – also for other applications where object and person recognition are important – will follow in the course of the year. And the best part is: with AI, the more data we collect and the more intelligently we use it, the better the solutions become and the more added value they bring to the customer. This will revolutionise our industry! Another example is our cloud-based solutions, for example for alarm monitoring. Here, we can now also integrate third-party cameras and, building on this, offer and jointly develop our intelligent software-based solutions. This gives our customers more opportunities to take advantage of the opportunities created by AI. The trend towards integration of the various security technologies seems to be driven mostly by the rapid progress in software development. Does this affect full-range suppliers such as Bosch and what specific plans for fully integrated security solutions do you have for the future? Michael Seiter: Naturally, this suits us as a full-scope supplier. Bosch solutions are deployed in many cross-domain client projects. We have experts for the different domains under one roof and a strong brand with the same quality promise for all areas. Nevertheless, it is always also about specific domain excellence. Only when you master all different areas and have profound and proven expertise in each of them you can succeed in integrated cross-domain projects. The respective business units craft their future strategies and innovation roadmaps with this in mind – as we do in the field of Video Systems & Solutions. Our business unit offers fully integrated Bosch video solutions that can be extended and operated on open systems. This is why we drive open platforms such as Inteox, to offer customers from a wide range of industries the right solutions. Our Bosch Integration Partner Program that we launched in 2012 is also heading in this direction – every product can be integrated into multiple other systems and VMS solutions. In summary: At Bosch, we are both a one-stop-shop, but also an open-system, meaning we offer customers maximum flexibility in their choice of products and services.
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data centre world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organisations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centres or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognise individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analysing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable. Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognise. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the centre of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
From buildings to vehicle fleets and enterprise networks to perimeter gates, having access control to let the right people in—while keeping everyone else out—is a security necessity. ELATEC, a global specialist in radio frequency identification (RFID) readers enabling user authentication for these and other access control applications, will introduce its latest new product the TWN4 Palon Compact Panel Reader at the ISC West Conference and Exhibition, to be held March 17-20, 2020 in Las Vegas, Nevada. Physical access control applications The Palon is a powerful, multi-function reader optimised for physical access control applications. Unlike traditional RFID readers, Palon’s unique capabilities include: Flexible architecture and a robust, open API to support custom applications and unique functionality Supports encryption for security applications Quick and easy updating to support emerging market requirements, and done so either remotely or via a contactless configuration card Reads and writes all major transponder technologies globally—60+, including HID Global, LEGIC and NXP, and NFC and BLE mobile device technologies for use with smartphones. Highly customisable panel mount Palon’s compact OEM PCB module is designed for integration into third-party products and devices. And its attractive, highly customisable panel mount is ideal for use in PAC panels, elevators, parking systems, EV chargers, kiosks and more. To see Palon and ELATEC’s suite of offerings, visit ELATEC booth #23006. Visitors can also see Palon in the new product showcase at ISC West.
Correct configuration of readers in the field forms the basis of secure ID solutions. In the latest version of LEGIC Orbit, the option to restrict configuration data to specific reader ICs is a very powerful new feature. Versatile Configuration Packages LEGIC Orbit offers the possibility to transmit cryptographic keys and other configuration data from the management system securely to readers in the field. This works via so-called Versatile Configuration Packages (VCP), which are generated in a Hardware Security Module (HSM) and distributed to readers in the field via user’s smartphones or management system. With this new feature, you can now restrict the validity of each VCP to specific reader devices based on their chipID which uniquely identifies every LEGIC reader IC. This feature provides additional protection against abuse of configuration data and can help prevent configuration errors. Transmitting cryptographic keys For example, a cryptographic key for a specific building is generated in the secure LEGIC Orbit environment. Subsequent distribution of this key via VCP can now be restricted to readers installed only in that building. This feature makes it impossible to wrongly configure readers not belonging to that building.
With the OS50 firmware upgrade, several new features have been implemented to make the SM-6300 faster and even more powerful. New filter options in the search for Bluetooth devices enable the selection of specific devices, energy consumption is significantly reduced. Additionally, the generation of authorisation media for the LEGIC Master-Token-System-Control (MTSC) solution and the creation of LEGIC prime and advant segments on LEGIC smartcards are possible with the new SM-6300init. LEGIC Master-Token-System-Control solution The SEARCH command for LEGIC reader ICs offers an easy and efficient way to communicate with different devices. When using the Bluetooth Low Energy transparent mode of the SM-6300, there is a growing demand for a filtering capability to precisely select a device, as more and more Bluetooth devices are around. With the new OS50, there are now more filter options available, allowing the reader to specifically find Bluetooth Low Energy devices that advertise certain data. In previous firmware versions the SEARCH command executed sequentially for every technology which cost valuable time in the search for the various ID media and slowed down the opening process noticeably. With the new upgrade, the search for Bluetooth Low Energy devices can be started and continued in the background while simultaneously searching for RFID media. SM-6300 reader ICs One of the strengths of the SM-6300 reader ICs is their design for use in battery-powered readers One of the strengths of the SM-6300 reader ICs is their design for use in battery-powered readers or other infrastructure components. Energy consumption is therefore essential and determines whether a solution is successful or not. If a reader design consumes less energy, the battery lasts longer, and maintenance costs are reduced. LEGIC has already introduced optimizations for energy consumption with enhancements to the sleep mode in September 2019. Since then, a reader can be woken up not just by inductive Wake Up, but also capacitive, with a timer or via GPIO. With the latest OS50 firmware upgrade, the SM-6300 is now also considerably more power-efficient when the IC is active. The improvements not only lead to a further reduction in energy consumption, but also significantly reduce the peaks in current consumption, which opens up new design possibilities. Generate authorisation media To allow MTSC users to generate authorisation media themselves, LEGIC reader ICs offer corresponding commands to create an authorisation medium from a Master-Token blank. Until now, the generation of authorisation media as well as the initialisation of advant and prime applications on LEGIC smartcards could only be done with the SM-4500. With the new SM-6300init, these commands are now also supported by the 6000 series. This means that all applications can now be covered with just one design based on the SM-6300init.
Related white papers
Four areas to consider in frictionless access control
Physical access control in higher education
11 considerations for embedded system RFID readers
Best practices guide: analogue video to cloudDownload
Delivering a smart, secure and healthy workplace with cloudDownload
Are your technology providers keeping you in the dark?Download
Capture new opportunities with computer vision and video analyticsDownload
C2MI deploys Honeywell’s AI-powered thermal screening and risk self-assessment solutions for safe building access
- C2MI deploys Honeywell’s AI-powered thermal screening and risk self-assessment solutions for safe building access
- Merrion Vaults opts for Iris ID biometric identity verification technology to enhance security
- Videonetics MeraFace facial recognition software helps Indonesia Government Institution identify and authenticate visitors
- Aiphone IS Series video intercom installed to enhance visitor management and communications at the Congregation Beth Jacob