• RDL 5-3 SAM AV2

RDL 5-3 SAM AV2

Category Access Control

HF programming station – the link between transponders and readers

The HF programming station is used in conjunction with a PC together with the appropriate programming software.

When initializing a new system it is extremely important that the same secret key of the respective customer or the respective system is stored in all readers and transponders, in other words key fobs or cards.

The HP programming station is equipped with a special secure memory, the so-called SAM module, in which it stores critical data.

Using the PC software together with the HF programming station it is possible to programme all readers and transponders locally.

When the system is initialized the first time a customer-specific key card is placed against the HF programming station, which then adopts and stores this secret key in the internal memory. Taking this approach means the key is never really visible, nor does it need to be written down and kept in a safe.

As a consequence, the HF programming station is the perfect hub of a secure access control system.



Your benefits at a glance:

  • Transponders programmed quickly, customers experience no waiting time
  • High levels of flexibility vis-à-vis system integrators and end users
  • Easy to use PC programming software
  • Programme different mifare® and mifare® DESFire EV1 transponders
  • Reliable crypto key management for applications requiring critical security arrangements


 

Access Control Readers and Credentials

Used by many of the world’s leading security businesses our access control components offer innovative design and functionally with card readers supporting the broadest range of proximity and smartcard technologies available. The reader is the most important part of an access control solution, forming the vital link between credentials and the access control system.  As a leading specialist in the design and manufacturer of access control readers we provide class-leading migration and security levels with the latest proven standards-based data encryption with advanced methods of authentication. Project consultancy and tailored individual solutions are available.