KEY-ID Access ​

RFID and NFC credential encoding​​

All security professionals need to be aware of the need to secure their organisation’s NFC & RFID access controls with properly managed encryption keys.​

Many commonly used contactless systems, such as door access controls, are extremely vulnerable to credential cloning and replication attacks – either because no encryption is used or default ‘off-the-shelf’ standards are deployed without any custom configuration applied.​

KEY-ID access solutions give organizations control over their NFC / RFID encryption keys:​

  • Bespoke encoding tools for standard DESFire cards.​
  • Access control reader programming.​
  • Provision of secure pre-encoded cards.​

In additional to physical card solutions, Dot Origin have secure reader hardware that also support virtual cards in both Apple Wallet and Google Wallet.​

Many commonly used contactless systems, such as door access controls, are extremely vulnerable to credential cloning and replication attacks – either because no encryption is used or default ‘off-the-shelf’ standards are deployed without any custom configuration applied.​

KEY-ID access solutions give organizations control over their NFC / RFID encryption keys:​

  • Bespoke encoding tools for standard DESFire cards.​
  • Access control reader programming.​
  • Provision of secure pre-encoded cards.​

In additional to physical card solutions, Dot Origin have secure reader hardware that also support virtual cards in both Apple Wallet and Google Wallet.​