sunnuntai, 20. tammikuu 2019

What are Proximity key fobs

There are many ways to have an electronic access in order to get the automated security of not only the personnel but also their possessions like cars. Basically in case of the organizations and companies where the employees are required to produce the smart cards or proximity cards in order to get themselves authorized and recognized by the card readers present at the entrance gates of the companies. In the same way there is a way to get your vehicle secured and that is by means of the smart key. With the help of a smart key you can have an access to the electronically secure system. The smart keys are basically carrying the proximity key fobs which contain the secret code for every car. The function of these keys is the same as that of the proximity cards, which is to validate and authorize a vehicle before entering into the premises of a building and getting it parked.

Development of proximity key fobs system

This system of the proximity key fobs was developed in 1995 by the Siemens Company and the first ever vehicle company to introduce the system of Keyless Go in 1998. Later on the patent design of this security system was filed and got approved in 1998 by Daimler Benz and this was based on the system of development of proximity cards. Since then there has been a development and introduction of the low cost keys available in the market and this made the life easier for the common man as well. Nowadays even the low price plastic key fobs are also made available in the market.

How does proximity key fobs system work

Usually this system is used by the drivers with the fob key pocketed inside the smart key designed especially for the cars. The proximity key fobs allow the locking and unlocking of the cars when they are parked in or parked out of the security arena. Nowadays the alternative systems of the low price plastic key fobs are also available which also work on the same principle. The identification of these keys is done by means of the antennas fixed in the body structure of the cars. Their mode of working is almost the same as that of the low price proximity card.

Availability of the low price cards and fob keys

When the technology was introduced, it was very costly that the common man was unable to afford it. However, as the system got simplified, the procedures became easier and the availability of low price cards and keys were made possible by various companies. Security systems have been made accessible for almost all the car owners due to the availability of the low price plastic key fobs.


Analogy of working of fob keys and proximity cards

The working principle of the low price fob keys is almost the same as that of the low price proximity card with an exception of the operation that the former works on cars specifically. In this system the door of car gets opened automatically even when the handle or trunk release is pressed. The availability of the low price proximity card and its working is not at all complex or substandard. In fact it is facilitating for the car owners and employees as well.

maanantai, 14. tammikuu 2019

RFID – Better solution than optical technology

What is RFID?

Radio-Frequency Identification or RFID are related to small electronic devices that are comprises of an antenna and a tiny chip which in a combined form are known as RFID tag or RFID transponder. RFID devises perform the same action as performed by a magnetic strip or a bar code on the back of debit or credit cards. The small chip offers specific identifier for the object. Similar to bar code and magnetic strips, RFID cards are also scanned for identification purpose and retrieving information.

How RFID devices works?

RFID devices uses radio waves signals to recognize objects and people. For identification purpose the microchip has a serial number that recognize objects and people. The antenna supports the chip to transfer the identification codes to a proximity reader. After that the proximity reader further transform the radio waves which were reflected back from the RFID transponder into digital codes that are then transformed to the system which finally use them. Generally proximity cards and proximity key fobs are embedded with RFID tag which enables them to be read by the proximity reader to gain access control.

Advantages of RFID

Use of RFID technology has multiple advantages. It is prominently used in tracking inventory where use of optical system fail. As compared to bar codes, RFID technology is better as the RFID tag can be read from a greater distance, whereas in bar codes labels are mandatory to be read by the laser lights and this optical technology seems to be cumbersome for heavy industries and equipment. Other advantage of using RFID tags are that they can be both read and write whereas on the other hand bar codes are only in readable form and data printed on the label cannot be changed. RFID tags are designed to work in harsh conditions and are reusable whereas bar codes are easily damaged as they are written on printed labels. RFID tags are designed to store more information as the data get stored in a non-volatile memory and maximum storage can be up to 8 kilobytes. RFID technology is stable, increasingly available, and continuously updating with the changing technological environment. Moreover in real time the RFID technology can keep a track of objects, people, equipment and items.

Disadvantages of RFID

With the increasing pros, RFID tags are also subjected to few cons. As RFID is an automated technology, thus an increase use of RFID technology will lead to reduction in staff count. And as this technology works with the use of radio waves and so any reason for blockage in transmission of radio waves will lead to a halt in the work. As compared to optical technology or bar code readers, RFID technology is more expensive. Moreover with its increase usage day by day, few nations or places requires legal advice to use RFID technology as the transmission of radio waves can be harmful for few premises and thus precautions have to be taken for the use of this technology to make sure it does not breach any federal laws.

sunnuntai, 6. tammikuu 2019

No building access control card? No problem if you have new tools

RFID card access systems are being used by most companies to let people within their complexes. But over the previous couple of years, researchers have shown how these systems can be easily bypassed.


Francis Brown, a partner at the computer security organization Bishop Fox, has recently been on the forefront of much of the research. In fact, he identified some of his tools and methods being used in the television program Mr. Robot, that can be noted for highly accurate technical detail.


Recently, he's been looking carefully at breaching high- and ultra-high frequency RFID (radio-frequency identification) systems, which are increasingly becoming utilized for physical security systems.


Each of our new gaming site is live! Gamestar covers video games, gaming gizmos and products. Subscribe to our e-newsletter and we'll email our best stuff directly to your inbox. Learn more here.

He's due to give a presentation at this year's Def Scam Hacking Conference in Algunas Vegas early next month with a bevy of new and improved software and hardware goodies.


"There are all kinds of areas that folks aren't considering at all that are fresh for exploitation, " this individual said.


Brown said his aim is to make it easier for sexual penetration testers to show how easy it is to clone employee badges, break in the action into buildings and vegetable network backdoors--without needing an electrical engineering degree to decode the vagaries of near-field communication (NFC) and RFID systems.


A few of years ago at the Black Hat convention, Brown showed how it was possible to "weaponize" an NFC card audience so that an gain access to card's details could be stolen merely by moving within a few toes of a targeted person, such as in a restaurant.


It is, however, getting harder to clone high-frequency building access cards anticipated to defensive measures people take to protect their cards.


For that reason, "the next step is to attack the building, " Brown said.


Right now Brown has been looking into how to enjoy a huge number of cards details by tampering with the RFID readers that grant building access. Your dog is improved after a prior tool he developed called the Tastic PCB (printed circuit board).


To mount the Tastic PCB, the lid is popped off a building's access credit card reader and wired in using vampire taps, Brown leafy said. Once in place, it records badge ideals of everybody who works their cards.


He's added a Bluetooth module to the Tastic PCB. With an accompanying Bluetooth software on his cellular phone, this individual can command the Tastic PCB to replay the details of the previous individual who entered the building, opening the doorway.


The attack is clever since it totally routes around some of the more recent cryptographic and authentication defense which may have been put in place for high- and ultra-high frequency NFC systems, Brown said.


"Essentially, I am just bypassing all that by breaking into the target audience, " he said.


When in an exceedingly building, an opponent must plant a backdoor to be able to harvest network data. There are a number of ways to do this.


Pertaining to instance, in an show of Mr. Robot, an intruder removes a snowboard from a climate control system and wires in a Raspberry Pi. It can a lttle bit of any fiddly job, though: He has to remove a panel from the climate control system, snip an ethernet wire and wire in the mini-computer.


A company called the Pwnie Express experienced an easier solution. This made a tool that looks like an ability strip but on the inside contains a Raspberry Pi including a sexual penetration testing toolkit. These devices, however, costed US$2, 000 and has since been stopped.


At Def Con, Dark brown said he will to push out a 3-D printable file that will let penetration testers print out their own high-quality shell of a power strip custom-made to hold a Raspberry Professional indemnity. The design will be released here after Brown's presentation on Aug. dokuz.


The cost of stamping the power strip is about $5, and a Raspberry Pi costs just $35, considerably bringing down the expense of a very sneaky tool. It's an everlasting backdoor that just needs to be plugged into a network port.


"Once My spouse and i physically break into a building, I leave it behind somewhere similar to an empty cube or a clear conference room plugged into their inner network, " Brown said. "It looks like something completely harmless. "


Bishop Fox has a web page online with the full range of RFID cracking tools and software they have already developed over the years.


maanantai, 24. joulukuu 2018

RFID-based access control system at Cards and keyfobs

The newly-installed Radio Frequency Identification System at the east idaho school of the st anthony idaho  was inaugurated by Joe pi, Marketing manager.


The access control facility on the digital platform is meant for regulating movement of vehicles, cargo, and people in the sensitive east idaho school .


The new system replaces manual checking and reduces waiting period at the school gates.


At present, access control of vehicles and persons are done with help of a manual gate pass system, said a press release here.


Under the new system, port users will be given HID RFID tags, which have to be fixed on the school. Access is granted when the sensor of the system captures and recognizes the vehicle at the gate.


Easy retrieval


The system works on high frequency signals, and every entry and exit of any person is stored in a system, which enables long period of storage with easy retrieval facility of attendance data at any point in time.

The introduction of RFID is one of the key measures adopted under the modernisation plan of India’s seaports, formulated by the Centre for port sector security and efficiency enhancement.

sunnuntai, 16. joulukuu 2018

Access Control- Key for Technological Lock

What is Access Control?

Access control is defined as a mechanism or security method to control and regulate the access of work, data and grants permission for accessing and using resources in technological environment. Generally in the environment of working on a database, a user is requested to enter his login credentials to a system and go through the authentication process to verify the user authenticity. After the authentication process, access control security system executes and it matches the user login id with the database of access control to keep a check on the user operations and refrain the user from accessing the services which are locked for the user credentials. Access control can also be defined as a way to restrict access by the means of virtual and physical way to a system. In language of computers, access control is a mechanism by which either users are restricted or granted permission for the access of information and resources.

How access control function?

Access control is the passage through which information flows between a subject and an object. A subject is classified as an active unit that seek permission for accessing the data within the object such as a process or user defined programs. An object is classified as a passive unit that holds the required resources and information such as a program, file, computer or a database.

Importance of access control

The importance and benefits of access control are in both physical and logical form. For example the proximity cards and proximity key fobs provides access control in a convenient physical form of small size devices. Access control protect systems from unauthorized users and hackers attack. It restrict and monitor the administrator usage. It protects the system by suspending the account due to several unsuccessful login attempts. It deletes the user accounts which are obsolete and non-functional as the user left the organization. Access control system impose authoritarian access rules. It disables the usage of unwanted services, ports and features. It sets up rules for setting the desired password such as content, password active duration, length, storage, etc. for security purpose and also implements rotation of passwords. Access control mechanism create audit logs and also conducts periodical auditing of work and generate required reports.


Challenges using access control

However despite various benefits from access control, it is also subjected to a lot of challenges. Few of the challenges are that varied levels of access are required by multiple users such as internal and external users, partners, contractors etc. Information usage has also different classification such as public, private, confidential, for external use, for internal use, etc. and thus accordingly access control mechanism has to be designed and executed. Varied identification data has to be stored for multiple users and that include login credentials, personal information, passwords, contact and email information, digital certificates and signatures, data related to their work, etc. Moreover access control mechanism also seek challenges from the dynamic corporate environment and needs to be continuously updated for meeting business requirements, updating employee count and information, meeting information access needs, etc.