Search
Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Filter by Custom Post Type
Posts
Pages
Search
Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Filter by Custom Post Type
Posts
Pages
blank
More Posts with same Categories

Token security for a safer access experience

Overview

RFID is a close distance radio authentication technology that was commercialised in scale during the 80’s for mainly security .  The most prominent use was passively powered tags that was used up to 100mm although high frequency powered tags were also used up to 5m.

The need for additional security and features saw the adoption of a sub family of RFID called being introduced with contactless bank cards.  Smart phone adoption opened up a plethora of applications to allow the device to be used everywhere to authenticate the user.

Small 3mm modules containing NFC enabled anything to be traced and authenticated if the module was incorporated into a product or simply attached to it.

Token is the one way to prove your identity for effortless and secure access to your entire world.  The token ring is simmilar to a bank card or mobile device to authenticate however is worn by the user rather than a pocket device.

CATIM support

CATIM uses NFC and MFA actively in our processes & products to maintain the best security practices in a world that is often highly rewarded to undo all good.

Additional Post information

Related Posts

Focus Page

Recent Page changes

Latest Post

Fast industrial application development
Consulting

CODESYS speeds up application development

Codesys is a software development platform used typically in industrial applications such as PLCs found in traffic lights or CNCs in machinery. Codesys enable devices to conform to industry standards such as IEC-61131-3 while making it easier to develop complex applications.

Read More »

Recent Related Posts