HID Global’s iCLASS Seos Credential wins SESAMES Award at CARTES Asia 2013
HID Global, a worldwide leader in secure identity solutions, recently announced that its iCLASS Seos™ credential has won the Asian SESAMES Award in the software and applications category. The award recognises the industry’s most innovative technological applications developed for the Asia Pacific market in the field of smart cards, digital security, identification, secure transactions, and contactless technology. Judges include industry experts who evaluated entries during the competition and the Asian SESAME award marks HID Global’s thirteenth accolade for its iCLASS SE platform solution by the industry’s most influential security organisations and publications worldwide.
“As HID Global’s latest addition to our award-winning iCLASS SE platform, iCLASS Seos reinforces our Genuine HID commitment to deliver new capabilities for meeting current and future secure identity requirements,” said Selva Selvaratnam, senior vice president and chief technology officer with HID Global. “HID Global is honoured to be recognised by the Asian SESAMES Award committee. The award further validates our dedication to continually support customers with innovative solutions for a broad range of applications using a combination of smart cards, microprocessor cards and NFC-enabled mobile devices.”
iCLASS Seos features a standards-based universal card edge, which supports multiple technologies and future technologies for maximum interoperability. The credential is portable for use on NFC smartphones while providing data confidentiality and strong authentication with state-of-the-art cryptography for mutual authentication and data encryption that protects the privacy of contactless communications.
|Model code||iCLASS SE platform|
|Accessories||Portable secure identity model|
|Additional info||Readers and credentials based on the iCLASS SE platform will be the first HID access control products to operate under the company's Trusted Identity Platform™ (TIP) framework, which creates a secure and trusted boundary within which all cryptographic keys governing system security can be delivered with end-to-end privacy and integrity.|
|Download PDF version|