Turkey ABD
DORMAKABA - BLUEWEST

Products

  • ARIOS-2
  • ARIOS-2
  • ARIOS-2
  • ARIOS-2

ARIOS-2

ARIOS-2 provides consistently secure RFID applications throughout the entire lifecycle of your access and time logging solutions. dormakaba offers additional advanced mechanisms that make your access control and time logging more secure compared to common MIFARE solutions.

With ARIOS-2, complex security measures are no longer needed to keep site keys private as the system works with unreadable keys. This helps you store your data keys securely and easily, thus preventing undetected disclosure or manipulation.

You can protect your entire system, from system components to individual ID cards, from commissioning and ongoing operation to maintenance and card ordering processes.

 

Features

  • The security concept is basically based on a secure keystore where all keys are stored as if they were in a safe. Direct access to these keys from the outside is not possible. This keystore is in a security card (site key) and is stored for readers, standalone components, etc. It is present in every system component.
  • Secure commissioning: A secret site key randomly generated by the system and stored by dormakaba in a protected location. This prevents abuse or theft.
  • Secure ID card order: The ID card supplier only receives a temporary production key. Only when new ID cards are delivered is this code converted to a secret site key using a secure ARIOS-2 process. This transaction is logged in the system and means that any illegally produced ID card cannot be used without being detected.
  • Secure ID cards: Each ID card is individually protected with a unique access key. It is not possible to draw any conclusions about other identity cards or data theft.
  • Safe operation: Security modules in all components protect the data key with recognized encryption mechanisms. In addition, the data exchange between the reader and the ID card is encrypted using recognized AES or 3DES procedures. This protects against current common attack scenarios such as reverse engineering or a man-in-the-middle attack.
dormakaba