SMART CARD READERS
A Smart Way To Read Data
Smart Card Readers
Efficient and Innovative
With smart cards, authentication is always of top priority. That’s why Securemetric’s smart card readers are a must for most businesses.
Smart Card Reader
Smart Card Reader
Smart Card Reader
Smart card readers for smart cards – which are a type of plastic technology card with a built-in chip. Smart card reader are used for electronic processes including personal identification, access control, authentication, and financial transactions. Smart card readers obtain or “read” this type of data. These easy-to-install devices read the data that is stored on contact or contactless 13.56 MHz smart cards.
-Non-Smart Chip Based
Commonly based on a typical low cost EEPROM where the main protection algorithms rely more on the firmware that are bundle together rather than on the hardware. This type of hardware architecture can easily be duplicated by most Dongle Duplication Experts
-Self Definable Security Algorithms
Up to 128 self definable security algorithms that will be executed on-board when called by protected software which will then be authenticated using the popular Challenge Response Authentication to maximize the security level of the protection.
-Smart Chip Based
Advanced EAL4+ and ITSEC certified microprocessor smart chips enable the algorithm’s execution and on board seed code generation. Microprocessor smart chips also prevent hardware cloning and duplication attacks.
-Multi Levels Access Right Management
Supports multi level access right management to facilitate different access rights for the development team.
As HID driverless, SecureDongle requires no external device driver installation, thus minimizing the common technical issue arise from device driver. No driver is required. As long as a USB thumb drive is compatible with
-User-define security password
Supports on-board seed code and random number generation which developer can apply into their protection to strengthen the security and to make the protection more complicated to crack.
SecureDongle is built also with advanced encryption/decryption on communication between firmware and hardware to prevent debugging and emulator attacks.
Smarter way to protect your sfotware!
of software installed on PCs around the world in 2015 were not properly licensed (a decrease from 43% in BSA’s previous global study published in 2014)
worldwide rate of unlicensed use in banking, insurance and securities industries (despite the fact that much tighter control of the digital environment is expected)
The commercial value of unlicensed software worldwide plunged (BSA’s 2014 report cited commercial value of $62.7 billion)
PrimeKey Solution AB Implements Government PKI
EJBCA is the most downloaded open source PKI soOware in the world with more than 250,000 downloads since it started, in addition PrimeKey has successfully implemented of national level and enterprise level PKI projects which…
Ministry of Finance (MOF), Malaysia
There are many division under Ministry of Finance Malaysia, all division having their own responsibility and roles to achieve the vision and objectives.
Customised PKI Token to Commerce Dot Com
ePerolehan is the electronic procurement system to enable Malaysian Government agencies nationwide to procure goods and services from their suppliers electronically and transparently.
Lazada Group, From EJBCA Community to PKl-ln-A-Box
As the number one online shopping and selling platform in Southeast Asia, Lazada has long recognized the importance of adopting PKI to secure their infrastructure. PKI has been implemented across many mission critical applications across…
Advanced Science and Technology Institute
In line with improving and institutionalizing egovernment services, the Philippine government embarked on a mission to PKI enable the whole country with a focus on a few crucial government agencies such as the Bureau of…
MyID Reader Brochure
MyID Reader suits customers where security concerns are the most salient and can be widely use on ID authentication, e-commerce, e-payment, information security and access control.