User's Manual

Table Of Contents
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
The Application can and should provide more barriers:
Sector access conditions. It is possible to assign access conditions in a way
that only decrementing of values is allowed with the keys used in the field. So
even a manipulated field station cannot be used to increment the value on the
cards. As a general rule, key A is used as a field key, allowing only to read
and decrement values, and key B is used to format the card or increment
values.
Diversified keys. To make life even harder for attackers, keys can be modified
using the serial number and memory content of the card. So each card uses
different keys and a listening attack on the reader interface would be
hopeless.
Limiting cash volume stored on a card
Do not use the transport keys (keys programmed at the time of delivery) for
ticketing applications!
Ciphered and scrambled data storage
Sabotage alarm
Even higher security with contact less controller cards like mifare
®
DESFire,
mifare
®
ProX, mifare
®
Smart MX etc.
ASSA ABLOY Identification Technologies GmbH 129