Check out our special report on Cybersecurity
HID KIAT Chip Operating Systems - multi-application operating system
Technical Specification
- Make: HID
- Model code: KIAT Chip Operating Systems
KIAT is a multi-application operating system designed to work with contactless and dual-interface microcontrollers, in compliance with the international standards ISO 7816 (up to 192 kbps T=0) and ISO 14443 (up to 848 kbps). KIAT OS features: Active Authentication / PIN Transaction management Secure messaging Secure proprietary e-Purse Rollback functionality The COS Cryptographic algorithms are: Cipher: DES (TDES, DESX) ECB-CBC Signature: DES MAC8 MAC: ISO 9797, ISO 10118 Checksum: CRC16/CRC32 Random Number: Secure Random DES Key Size: up to 120-bit Main strengths are: Versatility: KIAT OS can be used in many different markets High reliability: extensively tested for many applications; Multi-application feature: KIAT OS can be used for many different applications
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | KIAT Chip Operating Systems |
| Additional info |
KIAT is a multi-application operating system designed to work with contactless and dual-interface microcontrollers, in compliance with the international standards ISO 7816 (up to 192 kbps T=0) and ISO 14443 (up to 848 kbps). KIAT OS features:
The COS Cryptographic algorithms are:
Main strengths are:
|
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
