High Security, Bluetooth Readers, Credentials

Total Page:16

File Type:pdf, Size:1020Kb

High Security, Bluetooth Readers, Credentials DMP.COM @DMPALARMS High Security, Bluetooth Readers, Credentials DELTA5 DELTA5-OSDP CSR-35 DELTA6.4 DELTA3 CSR-35-OSDP DE2 DELTA6.4-OSDP DELTA3-OSDP CSK-2 FEATURES Reader ▸ MIFARE® DESFire® EV2 ▸ Supports Conekt mobile access ▸ Compatible with all DMP technology, a leading industry credential and DE2 and CSK-2 XR Series™ panels standard for contactless Smart Card credentials Smart Cards ▸ Easily interfaces with DMP ▸ Wiegand or OSDP output 7073, 7073A and 7173 ThinlineTM Credential interface keypads, 7873 graphic keypad, Powerful 128-bit Advanced ▸ ▸ Adapter plate included for 734, 734N, 734N-POE or 1134 Encryption Standard (AES) access control modules mullion or single gang box ▸ 2K-byte memory size for the mount ▸ OSDP Readers Now Available ▸ Weatherized enclosures for greatest encryption indoor and outdoor applications Conekt Mobile Access Enhanced Smart Card ▸ ▸ Unaffected by body shielding or Credential Mounts directly on metal encryption and DESFire® EV2 ▸ environmental conditions ▸ Operates with Bluetooth mobile- support without a drop in performance ready reader ▸ Strong and flexible for resistance Built-in self-test routine at start- ▸ Supports industry-standard ▸ to cracking and breaking ▸ High-security encryption interfaces up to verify reader operation technology is protected behind the smartphone’s security ▸ Based upon the world-standard ▸ Indicator LED for card read Conekt™ Mobile-Ready Reader parameters MIFARE® technology, ideal for verification ▸ Uses Bluetooth Low Energy (BLE) ISO 14443 applications Easy, one-time registration ▸ Low power consumption to enable communication with ▸ without disclosure of private ▸ Installs indoors or outdoors an iPhone or Android ▸ Wiegand or Open Supervised information ▸ Lifetime warranty on ALL Device Protocol (OSDP) for easy ▸ MAXSecure™ unique security Optimized for mobile devices readers integration with DMP access feature, available upon request ▸ systems supporting BLE version 4.2 or newer DMP.COM @DMPALARMS 13.56-MHZ DELTA HIGH-SECURITY READERS To ensure the integrity of RF data EASILY INTERFACED Farpointe Data is the access control transactions, data communication DELTA comprises Farpointe Data’s industry’s trusted global partner between DELTA cards and DELTA 13.56-MHz line of contactless Smart for premium radio-frequency readers is encrypted using a powerful Card readers, cards and tags. Based on identification (RFID) solutions, key; furthermore, readers and credentials proven DESFIRE contactless digital including proximity, contactless smart challenge each other’s keys during the RFID technology, DELTA readers and long-range technologies. validation process. Showcasing DELTA’s interface with a wide range of versatility, the readers offer a wide range electronic access control systems by A key component of a physical security of adjustable settings to satisfy each complying with the Wiegand or OSDP electronic access control system, a customer’s individual needs, application communication protocols. contactless Smart Card reader is based requirements and system specifications. on RFID technology. In operation, it is BLUETOOTH READER AND MOBILE CREDENTIALS capable of reading data stored on a DELTA readers are able to read the Instead of keeping track of a key fob or proximity credential via radio frequency access control data and/or card serial card, some people may prefer using their and without physical contact. It then number from all ISO 14443 Type A & B smartphones to get into their businesses passes the data obtained to the physical Smart Cards. DELTA credentials meet or secure work areas. DMP can give access control system. Access control the ISO standard and are programmed those customers the convenience they systems typically manage and record by the manufacturer with a DELTA prefer with a mobile access credential the movement of individuals through a compatible secure key. During DELTA’s that is loaded on BLE - enabled protected area, such as a locked door. validation process, the credential’s secure key is challenged by the reader. smartphones. This allows the smartphone HIGH-LEVEL SECURITY FEATURES If the secure keys match, the reader will to function as a contactless electronic access control credential. The DELTA line offers MIFARE DESFire read the card’s sector data. If the secure keys don’t match, the reader will only EV2 application support. Credentials OSDP based upon MIFARE DESFire EV2 read the credential’s CSN. A higher security communication offer more protection using an even Additionally, DELTA cards and tags between the reader and access control higher security encryption technology are passive devices. This eliminates module is guaranteed with OSDP. It standard. DESFire is a high-end chipset maintenance with no battery required. utilizes AES-128 encryption and bi- in the MIFARE family that is the first chip They can also be ordered programmed directional communication for reader compliant with the Government Smart to various formats and encryption keys. configuration, reader status and line Card Interoperability Specification (GSC- monitoring. This allows the reader to be IS). The GSC-IS standard was created to VISUAL INDICATION “married” to the access control module ensure the interoperability of contactless When a proximity card is presented to to virtually eliminate interception of and contact Smart Cards throughout the a reader, the red LED flashes green to reader data. The DELTA series line of federal government. indicate a read card with the proper OSDP readers is among the highest format/frequency. The LED can also be Farpointe’s DELTA technology is based security readers available in the wired to the 734 LC terminal to follow on the world-popular MIFARE platform market today. to offer a globally accepted, secure and the state of the lock. versatile access control solution. DELTA readers support MIFARE Classic® 1K INDOOR/OUTDOOR DESIGN The readers carry an IP67 rating, and 4K, MIFARE DESFire EV1 and EV2, making them ready to take on any harsh MIFARE UltraLight® and MIFARE Plus®. environment. This also provides a high degree of vandal resistance. This allows reliable performance anywhere. READERS AND CREDENTIALS BLUETOOTH READER AND MOBILE CREDENTIALS DELTA3 The DELTA3 Contactless Mullion- Mount Smart Card Reader’s compact DE2 design makes it ideal for mounting The DE2 MIFARE DESFire EV2 Smart to metal door or window frames and Card is manufactured from composite CSR-35 PET plastic and can be directly printed other flat surfaces. The reader accepts As a member of DMP’s high-security on using an ID Badge Printer. The 5 to 14 volts, covering most voltage readers, the CSR-35 Conekt Mobile- DE2 comes with 2K memory, ISO requirements. Up to 1.5 inch read range. Ready Contactless Smart Card Reader 14443 technology and has a 2.5 inch It’s durable and secured with tamper and is based on the proven LEGIC® read range. weather-resistant epoxy potting, and it’s contactless digital RFID platform and backed by a lifetime warranty. interfaces easily with DMP’s access control modules. The CSR-35 can be installed on a metal door, window frame or flat surface at any entry point, and is also compatible with DMP’s DE2 and CSK-2 Smart Card credential with up to 1.5 inch read range. With the mobile credential, the CSR-35 is field configurable up to a 30 foot read CSK-2 range. This single reader comes as a kit The CSK-2 is an ISO 14443-A compliant with the option to change the back plate MIFARE DESFire EV1 Smart Card key for a switch plate or mullion. DELTA5 fob-style tag. The CSK-2 is a grey color and has a read range of 1 inch. The DELTA5 Contactless Smart Card Reader (single-gang box) boasts a thin profile and may be mounted to a standard North American single-gang wall switch box and other flat surfaces. Up to 3 inch read range. CMC-2 This credential is programed with a unique MaxSecure code. That same DELTA6.4 code is embedded to reader purchases so that readers and credentials only The DELTA6.4 Contactless Smart acknowledge each other with their Card Reader and Keypad can be MaxSecure codes match. The credential mounted directly to a standard North is stored and activated within the Conekt American sized single-gang wall box. Mobile Wallet app, which is available on It incorporates a contactless Smart the Apple App or Google Play Stores. Card reader (13.56 MHz) and a keypad into a single-unit, making it ideal for applications requiring an access credential and/or personal identification number (PIN). Up to 2 inch read range. READERS AND CREDENTIALS SPECIFICATIONS Reader Specifications Credential Specifications Panel Compatibility All DELTA readers have the following specifications: DE2 Readers All DMP XR Panels Material Polycarbonate UL 94 Dimensions 2.1" × 3.4" × 0.031" Credentials All DMP XR Panels Operating Temp -40°F to 149°F Operating Temp –31° F to 158° F Operating Voltage +5-14 VDC Weight 0.23 oz Keypad Compatibility Transmit Frequency 13.56 MHz Transmit Freq 13.56 MHz Readers 7073, 7073A, 7173, 7873 Note: All Current Draw specifications are Reader Listings CMC-2 based upon 12 VDC. All readers have the following listings: Technology Bluetooth Low Energy (BLE) UL 294 DELTA3/ DELTA3-OSDP Frequency 2.4 GHz FCC part 15, United States Dimensions 1.7" × 3.2" × 0.7" Type Smartphone mobile access Power Supply 5 – 14 VDC credential, downloadable via Current Draw Conekt Wallet app Average 135 mA Operation iPhone or Android-based Weight 3 oz smartphones Marking Date code and ID DELTA5/ DELTA5-OSDP Dimensions 3" × 4.6" × 0.4" CSK-2 Power Supply 5 – 14
Recommended publications
  • American Diplomacy Project: a US Diplomatic Service for the 21St
    AMERICAN DIPLOMACY PROJECT A U.S. Diplomatic Service for the 21st Century Ambassador Nicholas Burns Ambassador Marc Grossman Ambassador Marcie Ries REPORT NOVEMBER 2020 American Diplomacy Project: A U.S. Diplomatic Service for the 21st Century Belfer Center for Science and International Affairs Harvard Kennedy School 79 JFK Street Cambridge, MA 02138 www.belfercenter.org Statements and views expressed in this report are solely those of the authors and do not imply endorsement by Harvard University, Harvard Kennedy School, or the Belfer Center for Science and International Affairs. Design and layout by Auge+Gray+Drake Collective Works Copyright 2020, President and Fellows of Harvard College Printed in the United States of America FULL PROJECT NAME American Diplomacy Project A U.S. Diplomatic Service for the 21st Century Ambassador Nicholas Burns Ambassador Marc Grossman Ambassador Marcie Ries REPORT NOVEMBER 2020 Belfer Center for Science and International Affairs | Harvard Kennedy School i ii American Diplomacy Project: A U.S. Diplomatic Service for the 21st Century Table of Contents Executive Summary ........................................................................3 10 Actions to Reimagine American Diplomacy and Reinvent the Foreign Service ........................................................5 Action 1 Redefine the Mission and Mandate of the U.S. Foreign Service ...................................................10 Action 2 Revise the Foreign Service Act ................................. 16 Action 3 Change the Culture ..................................................
    [Show full text]
  • Access Control
    Security Engineering: A Guide to Building Dependable Distributed Systems CHAPTER 4 Access Control Going all the way back to early time-sharing systems, we systems people regarded the users, and any code they wrote, as the mortal enemies of us and each other. We were like the police force in a violent slum. —ROGER NEEDHAM Microsoft could have incorporated effective security measures as standard, but good sense prevailed. Security systems have a nasty habit of backfiring, and there is no doubt they would cause enormous problems. —RICK MAYBURY 4.1 Introduction Access control is the traditional center of gravity of computer security. It is where se- curity engineering meets computer science. Its function is to control which principals (persons, processes, machines, . .) have access to which resources in the sys- tem—which files they can read, which programs they can execute, how they share data with other principals, and so on. NOTE This chapter necessarily assumes more computer science background than previous chapters, but I try to keep it to a minimum. 51 Chapter 4: Access Controls Figure 4.1 Access controls at different levels in a system. Access control works at a number of levels, as shown in Figure 4.1, and described in the following: 1. The access control mechanisms, which the user sees at the application level, may express a very rich and complex security policy. A modern online busi- ness could assign staff to one of dozens of different roles, each of which could initiate some subset of several hundred possible transactions in the system. Some of these (such as credit card transactions with customers) might require online authorization from a third party while others (such as refunds) might require dual control.
    [Show full text]
  • Using Certificate-Based Authentication for Access Control
    GLOBALSIGN WHITE PAPER Using Certificate‐based Authentication for Access Control GLOBALSIGN WHITE PAPER John Harris for GlobalSign GLOBALSIGN WHITE PAPER CONTENTS Introduction ...................................................................................................................................................................2 Finding The Right Path ...................................................................................................................................................2 Certicate‐based Network Authentication ......................................................................................................................3 What Is It? ................................................................................................................................................................. 3 How Does It All Work? .............................................................................................................................................. 4 What Can Users Expect? ........................................................................................................................................... 4 How Does It Stack Up To Other Authentication Methods? ....................................................................................... 4 Other Authentication Methods ................................................................................................................................. 5 Comparing Authentication Methods ........................................................................................................................
    [Show full text]
  • Virtual Credential Ceremony of Foreign Diplomats
    Virtual Credential Ceremony of Foreign Diplomats Why in news? In a first, President Ram Nath Kovind accepted the credentials of foreign diplomats of as many as 7 countries in a virtual ceremony, given the COVID-19 situation. What is the credential ceremony all about? A Letter of Credence is a formal document appointing a diplomat as Ambassador or High Commissioner to another sovereign state. The present ceremony involved diplomats from the Democratic People's Republic of Korea, Senegal, Trinidad & Tobago, Mauritius, Australia, Cote d'Ivoire and Rwanda. They presented their credentials (Letters of Credence) before the President via video conference. Each of these letters is addressed from one head of state to another. President Ram Nath Kovind formally accepted each Letter of Credence. This marked the beginning of the ambassadorship of each of those foreign diplomats, in India. The letters were officially handed over to the MEA (Ministry of External Affairs) to be delivered to the President of India. Initially, the ambassadors were to present their credentials from their respective embassies. However, all seven were escorted to the Jawahar Bhavan headquarters of the MEA (Ministry of External Affairs). How does it take place generally? The presentation of credentials is a spectacular and elaborate ceremony with strict rules and rituals. Under normal circumstances, it is hosted at the majestic Ashoka Hall inside the Rashtrapati Bhavan. The envoys come to Rashtrapati Bhavan accompanied by a foreign ministry official. They have to sit in a specific seat in the car with the protocol officer next to them. The diplomat is received at the forecourt of the presidential palace by the commander of the Presidential Guard.
    [Show full text]
  • Access Control
    Access Control CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Access Control • Describe the permissions available to computing processes – Originally, all permissions were available • Clearly, some controls are necessary – Prevent bugs in one process from breaking another • But, what should determine access? CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 2 Permissions for Processes • What permissions should be granted to... – An editor process? – An editor process that you run? – An editor process that someone else runs? – An editor process that contains malware? – An editor process used to edit a password file? • Q: How do we determine/describe the permissions available to processes? • Q: How are they enforced? • Q: How might they change over time? CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 3 Protection System • Any “system” that provides resources to multiple subjects needs to control access among them – Operating system – Servers • Consists of: – Protection state • Description of permission assignments (i.e., policy) • Determines how security goals are met – Enforcement mechanism • Enforce protection state on “system” CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 4 Protection State • Describes the conditions under which the system is secure
    [Show full text]
  • Security in Ordinary Operating Systems
    39 C H A P T E R 4 Security in Ordinary Operating Systems In considering the requirements of a secure operating system,it is worth considering how far ordinary operating systems are from achieving these requirements. In this chapter, we examine the UNIX and Windows operating systems and show why they are fundamentally not secure operating systems. We first examine the history these systems, briefly describe their protection systems, then we show, using the requirements of a secure operating system defined in Chapter 2, why ordinary operating systems are inherently insecure. Finally, we examine common vulnerabilities in these systems to show the need for secure operating systems and the types of threats that they will have to overcome. 4.1 SYSTEM HISTORIES 4.1.1 UNIX HISTORY UNIX is a multiuser operating system developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs [266]. UNIX started as a small project to build an operating system to play a game on an available PDP-7 computer. However, UNIX grew over the next 10 to 15 years into a system with considerable mindshare, such that a variety of commercial UNIX efforts were launched. The lack of coherence in these efforts may have limited the market penetration of UNIX, but many vendors, even Microsoft, had their own versions. UNIX remains a significant operating system today, embodied in many systems, such as Linux, Sun Solaris, IBM AIX, the various BSD systems, etc. Recall from Chapter 3 that Bell Labs was a member of the Multics consortium. However, Bell Labs dropped out of the Multics project in 1969, primarily due to delays in the project.
    [Show full text]
  • General Access Control Guidance for Cloud Systems
    NIST Special Publication 800-210 General Access Control Guidance for Cloud Systems Vincent C. Hu Michaela Iorga Wei Bao Ang Li Qinghua Li Antonios Gouglidis This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-210 C O M P U T E R S E C U R I T Y NIST Special Publication 800-210 General Access Control Guidance for Cloud Systems Vincent C. Hu Michaela Iorga Computer Security Division Information Technology Laboratory Wei Bao Ang Li Qinghua Li Department of Computer Science and Computer Engineering University of Arkansas Fayetteville, AR Antonios Gouglidis School of Computing and Communications Lancaster University Lancaster, United Kingdom This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-210 July 2020 U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • FACILITY ACCESS CONTROL an Interagency Security Committee Best Practice
    FACILITY ACCESS CONTROL An Interagency Security Committee Best Practice 2020 Edition U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency Interagency Security Committee Message from the Chief One of the priorities of the Department of Homeland Security (DHS) is the protection of federal employees and private citizens who work within and visit federally owned or leased facilities. The Interagency Security Committee (ISC), chaired by DHS, consists of 64 executive-level departments and agencies and has a mission to develop security policies, standards, and recommendations for nonmilitary federal facilities in the United States. As Chief of the ISC, I am pleased to introduce the ISC document titled Facility Access Control: An Interagency Security Committee Best Practice. At a recent ISC Strategic Summit, members identified facility access control as their number-one subject area. Based on their request, the ISC formed a working group on facility access control, resulting in the development of this document. This ISC document provides guidance on addressing facility access control throughout the full access control process, from employee and visitor entry, through security screening, to the first point of authentication into nonpublic space. This guide represents exemplary collaboration within the ISC Facility Access Control Working Group and across the entire ISC. Daryle Hernandez Chief, Interagency Security Committee Facility Access Control: 1 An ISC Best Practice Table of Contents Message from the Chief ...................................................................................................................................
    [Show full text]
  • Operating Systems & Virtualisation Security Knowledge Area
    Operating Systems & Virtualisation Security Knowledge Area Issue 1.0 Herbert Bos Vrije Universiteit Amsterdam EDITOR Andrew Martin Oxford University REVIEWERS Chris Dalton Hewlett Packard David Lie University of Toronto Gernot Heiser University of New South Wales Mathias Payer École Polytechnique Fédérale de Lausanne The Cyber Security Body Of Knowledge www.cybok.org COPYRIGHT © Crown Copyright, The National Cyber Security Centre 2019. This information is licensed under the Open Government Licence v3.0. To view this licence, visit: http://www.nationalarchives.gov.uk/doc/open-government-licence/ When you use this information under the Open Government Licence, you should include the following attribution: CyBOK © Crown Copyright, The National Cyber Security Centre 2018, li- censed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/open- government-licence/. The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of education, training, course development, professional development etc. to contact it at con- [email protected] to let the project know how they are using CyBOK. Issue 1.0 is a stable public release of the Operating Systems & Virtualisation Security Knowl- edge Area. However, it should be noted that a fully-collated CyBOK document which includes all of the Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas KA Operating Systems & Virtualisation Security j October 2019 Page 1 The Cyber Security Body Of Knowledge www.cybok.org INTRODUCTION In this Knowledge Area, we introduce the principles, primitives and practices for ensuring se- curity at the operating system and hypervisor levels.
    [Show full text]
  • Physical Access Control Systems (PACS) Customer Ordering Guide
    Physical Access Control Systems (PACS) Customer Ordering Guide Revised January 2017 1 Physical Access Control Systems (PACS) Customer Ordering Guide Table of Contents Purpose ...................................................................................................................3 Background .............................................................................................................3 Recent Policy Announcements ...............................................................................4 What is PACS? .......................................................................................................5 As an end-user agency, where do I start and what steps are involved? ................. 7 Where do I purchase PACS Solutions from GSA? ..............................................10 How do I purchase a PACS Solution using GSA eBuy? .....................................11 Frequently Asked Questions (FAQs) ...................................................................12 GSA Points of Contact for PACS .........................................................................15 Reference Documents ...........................................................................................16 Sample Statement of Work (SOW) ......................................................................18 2 Physical Access Control Systems (PACS) Customer Ordering Guide Purpose The purpose of this document is to create a comprehensive ordering guide that assists ordering agencies, particularly contracting officers, to
    [Show full text]
  • Standards and Procedures Installation of Access Control Equipment At
    Standards and Procedures Installation of Access Control Equipment At University of North Carolina at Wilmington UNCW REV 120617 Provided by UNCW Physical Security and Access INDEX OVERVIEW ................................................................................................................................... 3 OUTLINE ....................................................................................................................................... 4 UNCW Door Hardware Standards .................................................................................................. 5 LENEL Network Communications................................................................................................. 5 Door Control Cabling ..................................................................................................................... 6 Responsibilities ............................................................................................................................... 7 UNCW ........................................................................................................................................ 7 Contractors .................................................................................................................................. 7 Standards for Termination of wires and cables in Lenel Panel, Lock Power Supplies, Readers, Hinges and Door Hardware ............................................................................................................ 8 UNCW Wireless Access Control
    [Show full text]
  • Integrated Access Control
    INTEGRATED ACCESS CONTROL Protect and manage your facility with confidence ACCESS CONTROL INCLUDES ALARM MANAGEMENT In the past, a sturdy lock was the most effective method Adding to the benefits of an access control system is the available to control access to your facility. Today you have ability to review reports detailing the arrival and departure the capability to truly manage both exterior and interior of each individual and which protected areas they entered. access. With the appropriate security devices and alarm An access control system not only provides added security, management software, which is integrated into a single but it also enhances your facility management capabilities. security solution, you can take control of who goes where and when throughout your facility. As a network application, real-time changes can be made to the access rights of any individual from anywhere with an Internet connection. Rather than worry about retrieving keys from discharged employees or re-keying locks, sim- ply delete their access privileges. You can also remotely lock and unlock any protected door. Access Control Hardware The main component in any access control system is the Request-to-Exit Devices: Motion sensors, buttons, or crash control panel. It communicates with and manages the var- bars used to bypass a door or release an electronic lock. ious other devices installed throughout the facility. DMP High Security Readers: Based on the MIFARE platform, systems include an “integrated” panel that also provides the high security reader is a globally accepted, secure, and intrusion and fire alarm capabilities, all in a single unit.
    [Show full text]