Weighing Contactless Cost

April 2006
Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p32
Trade Publication
The article examines the advantages of a contactless smart card access control system. Contactless systems offers advantages in terms of convenience and cost-efficiency. They also offer a high level of vandal-resistance when compared with a keypad or swipe card reader. In addition, with contactless systems, verifying systems work faster because a biometric measurement is verified with a reference template stored on the smart card. INSET: Retail Security Blazes Trail.


Related Articles

  • Buy a Coke, Copy a Class Lesson, Oh, and Open a Door. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Sep2010, Vol. 47 Issue 9, p74 

    The article reports on the security applications of a smart card, a device that includes an embedded integrated circuit in the U.S. Applications include controlling physical access, authenticating a person's identity and determining the appropriate level of access. The article offers information...

  • An 8 Step ID Card Plan.  // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p64 

    The article discusses steps to put a dual-use identification smart card system to work. First is to assess security policies and levels. Second is to hire a champion to drive the transition. Third is to develop an implementation plan. Fourth is to select the access technology. Fifth is to select...

  • ACCESS CONTROL: STATE of the MARKET. Cager, Russ // SDM: Security Distributing & Marketing;Feb2007, Vol. 37 Issue 2, p62 

    The article presents the outlook for the access control marketplace in 2007. Security dealers, systems integrators, manufacturers, and distributors express optimism for the access control sales. The Federal Information Processing Standard (FIPS) 201 for smart cards was cited by manufacturers as...

  • HID Global.  // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p88 

    The article provides information on the products and services offered by HID Global Corp. in the U.S. The firm, regarded as leader in providing solutions for the delivery of secure identity, offers proximity and smart card technologies to customers for physical access control. Its series of...

  • Custom Smart Cards Developed for Microsoft.  // SDM: Security Distributing & Marketing;Jun2005, Vol. 35 Issue 6, p23 

    This article focuses on custom smart cards developed by Indala Corp., San Jose, California. It recently developed multi-technology, multi-application credentials for Microsoft Corp., employees, which enabled network (logical) as well as building (physical) access control. The new Indala...

  • LEGIC Identsystems.  // Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p102 

    The article profiles LEGIC Identsystems, the company that invented the 13.56 megahertz contactless smart card technology in the U.S. The company, which was established in 1990, introduced the world's first contactless and secure smart card technology platform for access control and other...

  • Yesterday, Tomorrow, Forget Today. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Feb2005, Vol. 42 Issue 2, p58 

    Focuses on the emergence and adoption of smart cards in developing security systems. Barriers in the large-scale acceptance of smart card systems; Forecasts on the convergence and integration of security systems.

  • Seven top security tips.  // Communications News;Aug2006, Vol. 43 Issue 8, p8 

    The article presents mobile security tips for securing employees' notebooks. These include always making sure that the notebook case, including all contents are present before leaving a plane, taxi or train and creating a password that is difficult enough to crack. A mixture of characters,...

  • A New Kind of Security Communication Mechanism With Security Sessions. Yao Jingjing // Applied Mechanics & Materials;2014, Issue 513-517, p2506 

    For the smart card, the existing security system does not establish a secure communication with the terminal application, which makes the possibility of being attacked by intercepted, modified or forged orders. In this paper, the definition of security session is given. Through a combination of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics