LEGIC Sets Standards For Contactless Smart Card Market
LEGIC Sets Standards For Contactless Smart Card Market

LEGIC Identsystems Ltd, the leading supplier of contactless smart card technologies for personal identification applications, has in 2007 set the standards for the contactless identification market through several product releases.  To name a few like the card-in-card solutions for third party Smart Cards and NFC phones, the Configurator-Soft- and Hardware CSW / CHW-2000, the ATC128-MV210 crypto transponder chip and also through the expansion of its LEGIC advant product line to battery powered applications.Explore contactless and secure multi-applications with the LEGIC all-in-one area on third party smart cardsLEGIC card-in-card solutions combine smart card micro-controllers with physical access and related multi-applications on one single smart card chip.  The core element is the LEGIC all-in-one area which is a multi-application space that behaves like all other LEGIC advant crypto transponders.  The LEGIC all-in-one area runs on contactless smart card micro-controllers provided by third parties.  Smart card micro-controllers are commonly used for applications including logical access to PC and networks (PKI), mobile phones, banking and public transport. LEGIC card-in-card extends these with physical access and related multi-applications leading to true all-in-one multi-application credentials.The LEGIC advant Configurator Hardware CHW-2000 is a universal desktop reader to initialise, write and read LEGIC credentialsThe robust desktop reader CHW-2000 is suitable especially to initialise and analyse LEGIC credentials.  Its design is optimized to hold various credential shapes like cards, keys and fobs, wristbands and watches, as well as mobile phones.  The CHW-2000 can be operated with the LEGIC Configurator Software CSW-2000, the LEGIC Development Kit Software DKS-2000 or alternative software available from a LEGIC partner.  The integrated LEGIC advant reader module can be easily upgraded through the USB interface.  Thus, new features are quickly available.The Configurator Software CSW-2000 is a helpful tool to configure and analyse applications on LEGIC credentialsWith the CSW-2000 segments can be defined and credentials can be initialised (e.g. as Master-Token or as user credential).  The configuration required for a project can be easily administrated.  The graphical user interface enables a quick analysis of credentials as well as the configuration of LEGIC advant reader modules.  The CSW-2000 can be operated together with the Configurator Hardware CHW-2000, the Development Kit DK-2000 or a LEGIC advant based reader from a LEGIC partner.New cost-effective LEGIC advant transponder chipThe ATC128-MV210 crypto transponder chip meets the need for a secure low-memory and cost-effective transponder in the 13.56 MHz area.  With a user memory of 128bytes - enough to typically house 3 applications - the new transponder is designed for basic access control and leisure applications such as event ticketing and leisure passes.  The ATC128-MV is a full member of the LEGIC advant product family and has the same high security and functionality level like all other LEGIC advant transponders. The ATC128-MV210 crypto transponder chip is fully compatible with the ISO 15693 standard.How to reduce maintenance costs significantly for off-line door locks with unique low-power functionBy expanding the reader chip functionality of its LEGIC advant product line to battery-powered applications, LEGIC now offers a cost-effective alternative for stand-alone contactless physical access.  Using a new and unique "low power" feature enables energy-efficient contactless door lock solutions.  Until now, such stand-alone solutions (which repetitively power-down and wake-up the lock/card reader, thus saving energy) required the installation of expensive and bulky mechanical switches or infrared sensors as an energy-saving alternative to the wired "always on" readers.  Beyond saving energy, this contactless solution is cost-effective (the simplified circuit reduces development and production costs) and can greatly extend battery life, under certain circumstances up to 200 times and thus reduce maintenance and servicing. LEGIC advant is LEGIC's most advanced product line for state-of-the art high security and multi-applications including access control, personal identification, biometrics, IT access compliant with ISO 15693, ISO 14443 and LEGIC RF standards.

Add to Compare
After LEGIC Licencing Agreement, US-based RF IDeas Presented New Products At ASIS
After LEGIC Licencing Agreement, US-based RF IDeas Presented New Products At ASIS

LEGIC Identsystems Ltd, the worldwide developer and manufacturer of secure, contactless smart card technologies for personal identification applications, has announced it has partnered with United States based RF IDeas, Inc.  The leading provider of reader solutions for personal identification and access control will develop and manufacture cost efficient USB, RS-232 and Ethernet readers for a variety of access control applications for existing LEGIC customers.RF IDeas develops and manufactures contactless reader solutions that significantly expand functionality of building access cards to hundreds of further applications.  The applications include employee identification, computer and LAN access solutions, time/attendance, enrolment and more, all using existing contactless smart cards."What makes our partnership so exciting is the flexibility that RF IDeas brings to existing LEGIC's customers," stated Dr Otto Eggimann, Vice President Sales & Business Development of LEGIC.  "LEGIC's backward compatibility provides legacy customers the same ability as brand new customers to use their corporate credential for PC login from a proven leader.  RF IDeas' innovative and easy to use offering further enhances the LEGIC's application range especially for customers seeking to combine physical and logical access on the same credential.  We are very happy to welcome RF IDeas as a strong new partner in our expanding North American Partner network."RF IDeas will be producing readers for LEGIC's contactless smart card technology.  The RF IDeas reader AIR ID Enroll is a USB port based external reader of contactless smart cards for computer login access control.  It eliminates the need for manual entry and provides error-free identification.  AIR ID is compatible with LEGIC's 13.56 MHz contactless smart card technology and allows users to apply their building access card or other LEGIC identification and security tags/devices throughout the workplace."Adding LEGIC support to our AIR ID product line was effortless and the partnership allows us to address the current increase in demand in addition to expanding our reach into new markets," commented Rick Landuyt, CEO and President for RF IDeas, Inc.  "Including LEGIC based solutions in our offerings was an important advancement of our AIR ID product line."

Add to Compare

Access control readers - Expert commentary

Q&A: Bosch Video Systems & Solutions' Michael Seiter And Magnus Ekerot On Smart Technology, "AIot", And Plans For 2021
Q&A: Bosch Video Systems & Solutions' Michael Seiter And Magnus Ekerot On Smart Technology, "AIot", And Plans For 2021

Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to containing the pandemic.  Michael Seiter: Overall, we managed the past year well despite the challenges and have been growing again since the third quarter compared to 2019. We see good opportunities for further growth in 2021. Q: Has the Corona crisis again accelerated the development of smart technologies in the security technology market, and does the security market in contrast to most industries benefit from the crisis more than it suffers? Michael Seiter: The Corona crisis has definitely demonstrated that the future lies in data-driven solutions. Thanks to our product development strategy already being based on this, we at Bosch were very quickly able to develop new products for the ‘New Normal’ and to expand existing products accordingly. To give one or two examples: in cooperation with Philips, we very quickly developed a people counting solution for retail operations – smart Philips displays in conjunction with smart cameras from Bosch that provide protection for staff and customers. The In-Store Analytics software solution was also implemented with additional features. Shop owners can now make decisions based on customer movement data such as “Where do we position products to avoid queues or crowds?” HTD involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature  The latest highlight is the Bosch Human Skin Temperature Detection solution, in short HTD. This involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature at control points in offices, factory floors, or airports. The benefits of previously existing solutions on the market are sometimes called into question. Competitors are often unable to deliver what they promise because, for example, the measured temperature of the skin does not correspond to the core temperature of the person, or fluctuates, due to environmental influences. Therefore, we developed a software-based solution that, in compliance with GDPR, first allows people with potentially elevated body temperatures to be filtered out, and in a second step, allows medical personnel to perform a more targeted fever measurement. Q: You see a lot of potential for the video security industry in new technologies such as Artificial Intelligence and the Internet of Things. What specific opportunities do you mean, and how are you leveraging these technologies at Bosch Building Technologies? Michael Seiter: Bosch has committed itself fully to an “AIoT” – AI meets IoT – strategy. The development of AI algorithms and software, in general, is at Bosch significantly driven in the security space.  By AIoT, we specifically mean the networking of physical products and the deployment of artificial intelligence. With AI we aim to enable clients to understand events at an ever-deeper level and predict them in the future – the keyword being predictive – so that they can act proactively. This is particularly important for health and safety. An example is the Intelligent Insights solution where the user can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area. Q: From your point of view do you have an advantage over other suppliers when it comes to AI-based products in the video arena? Michael Seiter: The analysis and utilization of video data have long been front and center with us. Since 2016 we’ve been following the strategy of offering AI applications in the form of integrated intelligent video analytics as a standard in our network cameras. Data such as color, object size, object speed, and direction are all measured. Simply put, you can say this is seeing and understanding – which is the principle behind smart security cameras. Today it’s much more a question of intelligent, data-based solutions than collecting high-quality pictures and storing them for the record. Bosch has been investing heavily in AI for years, from which we can benefit greatly in our area. In the first quarter, for example, we will launch a vehicle detector based on deep learning that is already running on our cameras. This will create significant added value for our customers in the area of intelligent traffic control. Q: Mr. Ekerot, what advantages do customers have in AI-based video security from Bosch? Magnus Ekerot: A key advantage is strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms A key advantage is our strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms. Take the example of Camera Trainer, a machine learning software that can be directly uploaded to Bosch network cameras. The camera is thus trained up on recognizing objects and situations – tailored to the specific needs of our customers. If the camera detects the defined scenario, it performs a predefined action in real-time – for example, a count or an alarm. The latest example is our new camera platform Inteox. As a completely open camera platform, Inteox combines Bosch's intelligent video analytics with an open operating system. This allows programmers to develop specific software applications - or apps - for various application purposes. These can then be loaded onto cameras – the same principle as an app store for smartphones. To sum up, Bosch AI applications support customer-specific needs related to data analysis while enabling totally new applications within and beyond the video security market. Q: Can you name a specific current project where Bosch has deployed an AI-based solution? Magnus Ekerot: A current ground-breaking project using our smart cameras is being implemented as a pilot in the USA. Smart Ohio enables users to configure more intelligent traffic flows and thus ensure mobility, safety, and the efficient use of roads today and tomorrow. The new vehicle detector mentioned by Mr. Seiter also plays a central role here. Our overall goal is to provide connected smart sensor solutions for public and private transportation agencies to enable them to operate their roads safely and efficiently. The Intelligent Insights can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area Q: Mr. Seiter, you have been involved with the topic of mobility for some time. What experience from your previous job in the automotive business of Bosch might help you when it comes to further develop the video portfolio of Bosch Building Technologies? Michael Seiter: There's a lot to tell. First of all, the development of core algorithms for video-based solutions, whether for autonomous driving, for vehicle interior monitoring, or for our Bosch Building Technologies video systems, all come together at Bosch's Hildesheim location. This gives us considerable synergies and allows us to bring R&D results to market faster and more flexibly. Essentially, assisted driving systems use AI algorithms that process ever-increasing volumes of video data. Attempts are being made to imitate the human being and enable the vehicle to understand better the surrounding environment with its ‘eyes’. This predictive capability is especially critical with autonomous driving. For example, key questions include: “How should the car respond and what could potentially happen next?” “What kind of environment does it find itself in?” etc. There are many activities in this area at Bosch that in my new role in security we can also strongly benefit from. I am now bringing a lot of this experience and existing R&D achievements to Bosch Video Systems & Solutions, which also results in further synergies with our mobility division: At Stuttgart Airport, autonomous driving is already being implemented together with Mercedes-Benz and the parking garage operator Apcoa as part of the "Automated Valet Parking" project, or AVP for short, in which intelligent video systems from Bosch Building Technologies are making a significant contribution. Mr. Ekerot, you have a lot of experience in the video security area. Where do you position Bosch Building Technologies now in this market and what specific goals are you pursuing? Magnus Ekerot: Our clients are looking for reliable partners and products. We are a strong brand; you can rely on Bosch products. Bosch is a thought leader in video and a pioneer in AI applications in this field since 2016. Data security is everything to us: Our products conform to the EU’s GDPR regulations. Beyond that, we have an extensive camera portfolio that complies with the US National Defense Authorization Act (NDAA) for video security devices. This enables our portfolio to be deployed for example within US government buildings. We are planning to conclude more software maintenance agreements with our clients in 2021. These deliver investment and future security for our customers and include for example a ‘patch guarantee’ along with regular updates with new functionalities. This is the first step in a comprehensive plan to access new revenue channels for us and our partners delivering the best technology and excellent service to the end-user! Overall, many new products will be launched this year and this trend will intensify. Our goal is to establish new product families that follow a simple principle: “The development and delivery of disruptive, predictive video solutions that every user can trust because of the underlying sustainable forward-thinking mindset.” It’s been much discussed of late that Bosch is one of the very first companies globally that operates on a CO2-neutral basis. How does sustainability impact your business? Magnus Ekerot: IoT solutions are actually sustainable and contribute to environmental protection Our IoT solutions are actually sustainable and contribute to environmental protection. For example, our cameras are sustainable in that they remain up-to-date through software updates and needn’t be constantly exchanged for new ones. Our systems demonstrate sustainability also operationally as they can be managed remotely. System integrators don’t need to be physically present, thus avoiding unnecessary travel with its accompanying emissions. All in all, Bosch Building Technologies develops ways to accompany and support our clients in reaching their climate goals via new technologies. This can be done, for example, through improved energy efficiency, the total cost of ownership models, organizing and simplifying the supply chain, and helping our customers meet their social responsibilities. The Power of Bosch helps us here to leverage company-wide research to be two steps ahead, a shade faster, when it comes to new technologies and initiatives that our and future generations will benefit from. I should also say that I am personally very proud to work for a company that set an ambitious climate goal for itself and achieved it! Can you already share a preview of your technology innovations in 2021? Michael Seiter: We see great market potential for our cameras that use artificial intelligence and can be updated flexibly throughout their lifecycles. I have already mentioned the deep learning-based vehicle detector in our cameras. More such solutions – also for other applications where object and person recognition are important – will follow in the course of the year. And the best part is: with AI, the more data we collect and the more intelligently we use it, the better the solutions become and the more added value they bring to the customer. This will revolutionize our industry! Another example is our cloud-based solutions, for example for alarm monitoring. Here, we can now also integrate third-party cameras and, building on this, offer and jointly develop our intelligent software-based solutions. This gives our customers more opportunities to take advantage of the opportunities created by AI. The trend towards integration of the various security technologies seems to be driven mostly by the rapid progress in software development. Does this affect full-range suppliers such as Bosch and what specific plans for fully integrated security solutions do you have for the future? Michael Seiter: Naturally, this suits us as a full-scope supplier. Bosch solutions are deployed in many cross-domain client projects. We have experts for the different domains under one roof and a strong brand with the same quality promise for all areas. Nevertheless, it is always also about specific domain excellence. Only when you master all different areas and have profound and proven expertise in each of them you can succeed in integrated cross-domain projects. The respective business units craft their future strategies and innovation roadmaps with this in mind – as we do in the field of Video Systems & Solutions. Our business unit offers fully integrated Bosch video solutions that can be extended and operated on open systems. This is why we drive open platforms such as Inteox, to offer customers from a wide range of industries the right solutions. Our Bosch Integration Partner Program that we launched in 2012 is also heading in this direction – every product can be integrated into multiple other systems and VMS solutions. In summary: At Bosch, we are both a one-stop-shop, but also an open-system, meaning we offer customers maximum flexibility in their choice of products and services.

Smart Offices: How Is Mobile ID Changing The Way We Access The Office?
Smart Offices: How Is Mobile ID Changing The Way We Access The Office?

If you’re a security or facilities manager, you may already be aware of the quiet revolution that’s taking place across businesses and organizations up and down the country. By the end of 2020, 20% of all ID and access control systems featured mobile capability, and this is set to increase by a further 34% over the next three years. There’s no doubt that using a smartphone or mobile device in place of traditional credential and access control is a growing trend that’s only been sped up by the pandemic. It’s true that many businesses are still very much focused on remote working, although many are now starting to implement new-and-improved strategies that are better suited to protect the workforce moving forward. Mobile ID systems As the next normal becomes clearer, businesses will be reviewing procedures such as access control, occupancy monitoring, reducing touch points, and tracking visitors. Mobile ID systems are ideally suited to this task. But what are the key reasons for considering such a setup in 2021? But why is this new technology so well-suited to future-proof your physical access system, and why is it becoming so popular? Eradicating outdated legacy credentials Have you seen just how vulnerable outdated Proximity card technology can be? Low-frequency 125kHz cards can be cloned in a matter of seconds with the use of cheap, readily available tools. Despite their weaknesses, they are still used by a huge majority of businesses – big and small. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential Replacing such a system with a mobile-enabled system is one of the best ways to increase security ten-fold. Thanks to a cloud-based infrastructure, mobile ID offers best-in-class security and cryptography. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential. Bluetooth Smart and NFC (Near Field Communication) make them the best product to operate such a credential via a secure app. If you’re looking for best-in-class security in 2021, mobile access is most definitely the way forward. Removing touch points across the business Reducing touch points and the adoption of touchless facilities has become a key priority for businesses in the wake of COVID-19. Even as businesses start to return to the office and operate a home/office split, it will be imperative that unnecessary contact is kept to an absolute minimum between staff. The traditional issuance of identification and access control credentials can pose problems in this regard. Facility and security managers who are responsible for onboarding and processing ID have done the process face to face. Mobile access makes it possible to carry this process out without people coming into direct content. First, the security manager has access to a secure portal, allowing them to create, manage and edit credentials anywhere. They can upload and remotely transfer mobile ID and access control credentials directly to users’ smartphones over the air. Via the secure app, users can view and see their credentials and immediately begin using it for ID and access control by simply placing their smartphone over card readers. Enabling a more flexible way of working The way in which we work has changed for good. Even as people more people return to the office in 2021, a majority of businesses will be operating a home/office split indefinitely. This once again reinforces the need for a smarter, more adaptable onboarding system. Implementing mobile ID is the perfect way of doing this: over-the-air delivery of credentials and security data is now a given, helping businesses create the perfect balance between the home and the office. No longer do people have to come into the office for the onboarding process. Increasing convenience and user experience More often businesses are realising the value mobile ID can have for enhancing the work experience as well as security Ok, so mobile ID is the perfect way of increasing security and adapting workplaces to a post-COVID way of working. And we’ve not even touched on the most obvious advantage yet: Convenience. How many times have you forgotten your ID card? We’re sure it’s more times than you forget your smartphone. These powerful processors have become intertwined with the way we carry out tasks on a daily basis. They’re so vital that people will soon notice if they’ve forgotten it. From an employee’s perspective, mobile ID and access control is simple, convenient, and extremely user-friendly. More and more businesses are realizing the value mobile ID can have for enhancing the work experience as well as security. From the employer’s perspective, mobile ID means it’s easier for administrators to manage access and credentials. Future-proofing access control now will ensure that in the longer term, mobile ID is well worth the investment. The annual expenditure of printing ID cards and purchasing credentials can be vast, while reissuance costs can also quickly add up for larger organizations. These issues are a thing of the past for businesses using mobile ID. Mobile ID perfect tool for 2021 and beyond Until mobile ID, new and improved credentials’ main focus was on increasing security. Mobile ID not only delivers that, but it also provides a more convenient way of accessing the office in a way that’s perfectly suited to returning to the office in 2021. If there was ever a time to upgrade, now is the time. Summing up, mobile access is changing the way we access the office by: Eliminating weak links in security systems such as outdated legacy card technologies Eradicating the need for touch points across multiple areas of the workplace Enabling a smarter, more flexible approach to onboarding Increasing convenience – for both employers and employees.

Access Control and Door Entry Management: How Technology is Driving Change
Access Control and Door Entry Management: How Technology is Driving Change

Access control and door entry is a huge responsibility, and challenge, for local authorities and housing associations UK wide. For councils, they’re accountable for the security and safety of many public facilities such as leisure centers, libraries as well as residential housing developments which are often large scale and home to hundreds of people. Housing associations manage affordable rental housing which also means they’re responsible for the appropriate access control management for each individual house or apartment. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage. For example, with modern intercom and access control systems, remote management and communication is something that offers local authorities and housing associations features that enable them to reduce costs and cut their carbon footprints by managing multiple sites from one place. On the other hand, such technological innovation has meant that local authority and housing association specifiers and consultants now have a wide range of systems and products to choose from which can cause issues in ensuring the right system for a specific building or development is chosen. Choosing an appropritate access control system In choosing an appropriate system, local authorities and housing associations need to opt for a cost effective solution that can be easily maintained with excellent support from the manufacturer and guarantees that the system and system parts will remain supported for the duration of its expected life cycle. It is also important that the chosen system is flexible to cater for the varying needs of the tenants and visitors. Of increasing importance is the reduction of anti-social behavior which new technology can help by providing the use of data loggers which track the use and events of a door entry system, allowing specific evidence to be located by integrating with CCTV. Using technology to our advantage Through advancements in management systems and services, we can gain a much better visual representation of the events and general usage of an intercom entry system and not just its proximity access control. Systems, for example, can now send email alarms or notifications to the administrator or management. We are now able to modify user rights and access levels on the go from a mobile app which enables a much greater control over service and maintenance engineers, such as making sure they have full access when required via an app, rather than arriving to site with the incorrect keys or access fob. Systems, for example, can now send email alarms or notifications to the administrator or management Dealing with tenant’s lost and stolen keys has never been so easy either. The blocking or deletion of lost fobs and adding a new fob can be carried out in minutes while at the same time removing the cost of sending an engineer to the development to program new fobs. This greatly reduces the carbon footprint of the whole task as fobs can now be sent out via mail to a secure location for collection. Technology has also helped local authorities and housing associations to overcome the issue of not being able to have a concierge or building manager available 24/7 at some developments. Now with internet communication, it’s possible for tenants and visitors to get in touch with someone should they need assistance, whether that’s from within the apartment or from an entrance point. For example, lets take the Videx VX2200 with IP concierge integration. This system is exceptionally flexible, enabling calls to be answered on Videx intercoms and also mobile phones if required. With the integration of the IP concierge each block can be either standalone or networked via the internet back to a central control room. Reduced maintenance costs and carbon footprint We work with a wide range of local authorities and housing associations to help them overcome access control and door entry challenges. One organization we have recently partnered with is The Living Group to help them greatly reduce their maintenance costs and carbon footprint by installing the MiAccess offline proximity system on many of their developments across the North East. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage By installing an appropriate system, The Living Group has managed to overcome issues caused by the existing system’s limitations and also enabled much more flexibility when it comes to effectively managing the access control system of all their included developments. For those responsible for effective and appropriate access control, the management of the systems are easier, quicker and there’s no delay or on-going costs for needing a specialist program to modify fobs and access rights as this can now all carried out in-house. Improved security legislation Further advancements in programmes such as Secured by Design (SBD), a police initiative that improves the security of buildings and their immediate surroundings to provide safe places to live, work and visit, means that there’s more security legislation being implemented that’s making intercoms and access control more secure, without affecting ease and convenience. Videx holds an SBD accreditation and we know, from first-hand experience, how it’s making a difference in keeping tenants safe. When you combine the safety features promoted by an SBD member company like ourselves with the likes of the Videx event logging, image capture and ability to modify access users on the go, for example, we can help to create a very safe and secure environment. Personally, I think there needs to be a greater emphasis on the role of security legislation Technology has completely transformed the way local authorities and housing association are able to choose, install and manage door entry and access control systems for tenants and visitors alike. Personally, I think there needs to be a greater emphasis on the role of security legislation such as Secured by Design to ensure all councils and housing association consultants are up to date with what constitutes a robust and secure system that’s also cost effective too. In my role, I see weaknesses in systems and constant ongoing costs that could easily be avoided. For instance, features such as timed remote entry means local authority and housing association management no longer need to worry about keys being lost, the wrong keys being supplied or locks needing to be changed. With new systems such as the Videx MiAccess and Videx WS4 range, we can help to massively reduce a housing association’s or council’s carbon footprint and engineer costs by allowing them the access to management and control from an offsite location. Crime prevention We can also use live and logged events to help prevent crime in different ways, from antisocial behavior growing around a tenant being called or visited much more regularly than others, to knowing a tenant is currently still living at a property but isn’t paying rent or answering to any correspondence. Technology enables local authorities and housing associations to receive detailed data and therefore behavioral insights on the people under their management and care. If consultants and specifiers are advised on the most appropriate systems that meet their specific entry needs, they can ensure greater, safer and more convenient access control that meets the requirements of both the end user and the those responsible for its effective management.

Latest LEGIC Identsystems Ltd news

ELATEC To Introduce The TWN4 Palon Compact Panel Reader At ISC West 2020
ELATEC To Introduce The TWN4 Palon Compact Panel Reader At ISC West 2020

From buildings to vehicle fleets and enterprise networks to perimeter gates, having access control to let the right people in—while keeping everyone else out—is a security necessity. ELATEC, a global specialist in radio frequency identification (RFID) readers enabling user authentication for these and other access control applications, will introduce its latest new product the TWN4 Palon Compact Panel Reader at the ISC West Conference and Exhibition, to be held March 17-20, 2020 in Las Vegas, Nevada. Physical access control applications The Palon is a powerful, multi-function reader optimized for physical access control applications. Unlike traditional RFID readers, Palon’s unique capabilities include: Flexible architecture and a robust, open API to support custom applications and unique functionality Supports encryption for security applications Quick and easy updating to support emerging market requirements, and done so either remotely or via a contactless configuration card Reads and writes all major transponder technologies globally—60+, including HID Global, LEGIC and NXP, and NFC and BLE mobile device technologies for use with smartphones. Highly customizable panel mount Palon’s compact OEM PCB module is designed for integration into third-party products and devices. And its attractive, highly customizable panel mount is ideal for use in PAC panels, elevators, parking systems, EV chargers, kiosks and more. To see Palon and ELATEC’s suite of offerings, visit ELATEC booth #23006. Visitors can also see Palon in the new product showcase at ISC West.

LEGIC Orbit Upgraded With New Security Feature That Restricts Configuration Data To Specific Reader ICs
LEGIC Orbit Upgraded With New Security Feature That Restricts Configuration Data To Specific Reader ICs

Correct configuration of readers in the field forms the basis of secure ID solutions. In the latest version of LEGIC Orbit, the option to restrict configuration data to specific reader ICs is a very powerful new feature. Versatile Configuration Packages LEGIC Orbit offers the possibility to transmit cryptographic keys and other configuration data from the management system securely to readers in the field. This works via so-called Versatile Configuration Packages (VCP), which are generated in a Hardware Security Module (HSM) and distributed to readers in the field via user’s smartphones or management system. With this new feature, you can now restrict the validity of each VCP to specific reader devices based on their chipID which uniquely identifies every LEGIC reader IC. This feature provides additional protection against abuse of configuration data and can help prevent configuration errors. Transmitting cryptographic keys For example, a cryptographic key for a specific building is generated in the secure LEGIC Orbit environment. Subsequent distribution of this key via VCP can now be restricted to readers installed only in that building. This feature makes it impossible to wrongly configure readers not belonging to that building.

LEGIC SM-6300 Reader ICs Upgraded With Improvements To The OS50 Firmware
LEGIC SM-6300 Reader ICs Upgraded With Improvements To The OS50 Firmware

With the OS50 firmware upgrade, several new features have been implemented to make the SM-6300 faster and even more powerful. New filter options in the search for Bluetooth devices enable the selection of specific devices, energy consumption is significantly reduced. Additionally, the generation of authorization media for the LEGIC Master-Token-System-Control (MTSC) solution and the creation of LEGIC prime and advant segments on LEGIC smartcards are possible with the new SM-6300init. LEGIC Master-Token-System-Control solution The SEARCH command for LEGIC reader ICs offers an easy and efficient way to communicate with different devices. When using the Bluetooth Low Energy transparent mode of the SM-6300, there is a growing demand for a filtering capability to precisely select a device, as more and more Bluetooth devices are around. With the new OS50, there are now more filter options available, allowing the reader to specifically find Bluetooth Low Energy devices that advertise certain data. In previous firmware versions the SEARCH command executed sequentially for every technology which cost valuable time in the search for the various ID media and slowed down the opening process noticeably. With the new upgrade, the search for Bluetooth Low Energy devices can be started and continued in the background while simultaneously searching for RFID media. SM-6300 reader ICs One of the strengths of the SM-6300 reader ICs is their design for use in battery-powered readers One of the strengths of the SM-6300 reader ICs is their design for use in battery-powered readers or other infrastructure components. Energy consumption is therefore essential and determines whether a solution is successful or not. If a reader design consumes less energy, the battery lasts longer, and maintenance costs are reduced. LEGIC has already introduced optimizations for energy consumption with enhancements to the sleep mode in September 2019. Since then, a reader can be woken up not just by inductive Wake Up, but also capacitive, with a timer or via GPIO. With the latest OS50 firmware upgrade, the SM-6300 is now also considerably more power-efficient when the IC is active. The improvements not only lead to a further reduction in energy consumption, but also significantly reduce the peaks in current consumption, which opens up new design possibilities. Generate authorization media To allow MTSC users to generate authorization media themselves, LEGIC reader ICs offer corresponding commands to create an authorization medium from a Master-Token blank. Until now, the generation of authorization media as well as the initialization of advant and prime applications on LEGIC smartcards could only be done with the SM-4500. With the new SM-6300init, these commands are now also supported by the 6000 series. This means that all applications can now be covered with just one design based on the SM-6300init.

Related white papers

Delivering a Smart, Secure and Healthy Workplace with Cloud

Trusted Execution Environment in Access Control

Four Areas to Consider in Frictionless Access Control