Summary is AI-generated, newsdesk-reviewed
  • CSN-only readers disable crucial security, posing significant access control risks.
  • CSN readers offer a false sense of security by bypassing data protection mechanisms.
  • Universal CSN readers compromise security by reading only unprotected card serial numbers.
Download HID's executive brief

This executive brief explores the security risks associated with using CSN instead of reading the data protected by security mechanisms.

When contactless smart cards are implemented and deployed properly, they represent one of the most secure identification technologies available. However, some manufacturers, in an attempt to sell a ‘universal’ reader capable of reading almost any contactless smart card technology, actually disable the built-in security mechanisms. These readers, referred to as ‘CSN readers’, only read the card’s serial number which, per ISO standards, is not protected by any security.

 What's Inside?

  • Introduction
  • A False Sense of Security
  • Card Serial Number (CSN)
  • Anticollision
  • How is a CSN Used for Access Control?
  • Most Commonly Used Card Format Intensifies the Problem
  • Why is CSN reading so popular?
  • Recommendations from Government and International Organisations
  • Summary

Click Here to Download the Executive Brief Now!

Save

Save

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...