Vous êtes sur la page 1sur 4

presents

System

Secured
RFID Identication, Traceability & Logistics

Turning RFID into reality


Easy integration of the Mifare technology into existing sites or systems Easy setup of multi-zone, multi purpose card application Simplified card programming software Master your own security

[ Identification & Security ]

Secured Mifare
System Presentation

Secured Mifare System goals

Protect the access to the data stored in the card by using private security keys and encrypted communication. Make the system highly secured by having the keys almost invisible : the security parameters are loaded into each reader by an encrypted card, impossible to read. Dont change existing system, but use and benefit from new security features of the Mifare technology.

Functional Overview

up and encoding of Set Configuration cards


Private keys Individual coding format for user cards System configuration Load security parameters and private keys into the Configuration cards

User cards programming


Encode user cards with the private key(s)

Once programmed, the security keys are invisible and impossible to be read into the encrypted configuration cards or programming unit.

OK !
Once programmed, the access readers accept the user cards, transaction is secured

Setup readers and upload parameters by reading Configuration Cards

Exploitation

Benefits and Value

Setup Access reader

Complete freedom in the management of the card security. Free choice of the security keys and the protection parameters : the user client controls his own security. Transparency in the technology : no trick for a technical or commercial control over the technology or the system (e.g. selling an open technology with proprietary security parameters). Proved security technologyn used all over the world in many public transportation payment systems. Readers are immediately compatible with the existing systems thanks to Wiegand or ISO protocols. Allows for a multiple security levels by managing several security keys.

Turning RFID into reality

Secured Mifare
System Presentation

System components overview

KPRG-Ph1 : Encoding unit and software for Configuration and User cards.

Credentials : Mifare Classic 1K, 4K - cards, keyfobs...

Mifare LXS TTL secured access reader LXS Mifare Reader brochure

Fonctionnality & Specifications


The system is based on two different Configuration Cards. Their fucntions and content is described below : Access reader configuration card (ACC) : Private corporate security Key : make the configuration card unique. Private data security Key : protects the access to the individual user ID (will be loaded into the access reader) Reader communication mode : protocol selection (clock&data, wiegand...) Location of the data in the card (sector #) Fixe or variable sector location with the use of the MAD (Mifare Application Directory), true table of content of the card that allows several applications to coexist without fixed memory mapping. Reader mode - 3 possiblities : Private ID only, or Private ID else Card Serial Number, or Serial Number only Encoding unit configuration card (ECC) : The Encoder Configuration Card can upload to the encoder up to 32 keys These keys can then be used only by index call to access or write data in user cards, for biometric or commercial applications. It is impossible to read the data in the EC Card. It can be used to configure safely remote encoding equipments. Once loaded into the encoder, the keys are protected and cannot be read, stored in a write-only memory. Once configured, encoders can be supplied to remote sites without any communication or transmission of the security keys.

The Mifare Technology


The system is based of the Mifare chip family, one of the biggest standard in contactless personal identification : 16 applications can coexist in the card, each having its own independence and security. Compliant with the standard ISO14443A : for long term availability and freedom Memory : 1Kbyte, 4Kbyte : compatible with most biometric applications. High communication speed : allows for increased security without impairing the system reaction, by transmitting large data volume (biometrics) in very short time.

Turning RFID into reality

Secured Mifare
System Presentation

OEM Model

The Secured Mifare system is also available in OEM : 100% compatible Secured Mifare Read only and Read-Write Very small and performing Ideal for embedded applications and biometry Protocols : Clock/Data and Wiegand = no adaptation to switch from low frequency systems (125kHz) to the Secured Mifare system.

Mifare & Biometry


Thanks to its large memory, the Mifare card can store both ngerprint templates and private access code. Connected to a ngerprint reader the system will provide a double protection : the data access is protected and the acrd holder is identied.

Applications examples

1687.76 9456.58 6188.10 0106.73 9135.84 7354.15

Example of multi-sites and multi keys configuration

Using sectors with private keys you can create multiple access rights like, for example, conguring tow sites with different access conditions but with common credentials where the access rights are stored. See illustration below :

Headquarters ZAC des pradeaux Bd Salvador Allende 13850 Greasque, France Tel. +33 (0)4.42.12.60.60 Fax. +33 (0)4.42.12.60.61 info@stid.com / www.stid.com Paris Branch Immeuble Expansion 10 000 28, rue de la Redoute 92260 Fontenay-aux-Roses, France Tel. +33 (0)1.43.50.11.43 Fax. +33 (0)1.43.50.27.37 info@stid.com / www.stid.com

Visit our website : www.stid.com


The full Mifare range:
Product Range
Download documentation

V1.02 - US

Turning RFID into reality

Vous aimerez peut-être aussi