Presentation is loading. Please wait.

Presentation is loading. Please wait.

NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.

Similar presentations


Presentation on theme: "NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018."— Presentation transcript:

1 NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution
June 2018

2 Conekt™? Conekt is Farpointe’s Mobile Smartphone Access Control Identification Solution Conekt consists of 3 elements: Smartphone wallet app Mobile credentials Mobile-ready contactless smartcard readers

3 Conekt is Simple Straightforward implementation
And just 3 steps to gain access: Download Conekt wallet app from Apple App Store or Google Play Register the smartphone (requires only the device’s phone number) Then to add a mobile credential, enter a 16-digit registration key

4 Conekt Respects Personal Information
Privacy maintained No requirement for end-users or project administrators to disclose sensitive information. With Conekt… No private information to disclose No intrusive on-boarding process No portal accounts 3

5 Conekt Supports the Channel
Same ordering process as physical access credentials From Farpointe-to-OEM-to- Integrator-to-End User Instead of a box of cards, administrator receives an Order Summary and corresponding Registration Key Certificates Electronic or printed Administrator enters credential information in access control system from order summary Coding is identical to physical access credentials, i.e. format, facility code and ID. Then distributes Registration Key Certificates directly to individual users, just as they would traditional clamshell-style access cards Sample Order Summary Sample Registration Key Certificate 4

6 Conekt Leverages BLE Bluetooth Low Energy (BLE)
BLE is a mainstream 2.4-GHz wireless technology standard BLE prevalent on all major smartphone brands BLE does not require pairing of devices Read range up to 15 feet (4.6 m) Read range is adjustable 5

7 Conekt is Secure Multi-Technology
Reads mobile access credentials and contactless smartcards 2.4-GHz & MHz Supports existing card user-base Supports users who don’t have smartphones Assists integrators and their customers with a seamless transition to a mobile solution Conekt™

8 Conekt is 2-Readers-in-1
Single reader mounts to both mullion and single-gang boxes Unique design is patent-pending. Provides flexible mounting options meeting the most common installation applications Metal mullion door frames North American single-gang wall switch boxes (metal or plastic) A flat surface

9 Conekt Offers Broad Support
Interfaces Conekt readers wire just like a traditional proximity reader. Supports Wiegand The industry’s standard protocol Supports ABA Track II Magnetic stripe emulation, a venerable protocol Supports SIA’s OSDP Open Supervised Device Protocol Makes a growing list of security devices interoperable

10 Conekt Targets Security
Common Criteria Certified EAL5+ Supports MIFARE® DESFire® EV1 and EV2, with advanced encryption

11 Conekt Provides End-to-End Security
2-factor-authentication during Registration Conekt Mobile App Mutual authentication. Session keys https with TLS and certificate pinning Hack Threats: False issuer Man-in-the-Middle App cracking BLE sniffing and replaying Firmware Hardware Conekt Reader End-to-end encryption Conekt Cloud Your µController LEGIC Connect Reader IC With SE Key derivation (unique keys per device) https with TLS Smartcard IC Host IF encryption (AES 128/256, 3DES) Key & Authorization Management

12 Conekt Addresses Hack Threats
Conekt secures against False Issuer hacking Connections to mobile cloud services are verified using HTTPS with TLS, certificate pinning and API keys Conekt secures against Man-in-the-middle hacking Connections between mobile cloud services and mobile app are verified using HTTPS with TLS, certificate pinning. All file data is encrypted in the hardware secure modules (HSM) before being transmitted to the mobile app. Unique derived keys per smartphone are used. Encryption keys are only stored in HSMs. Conekt secures against App hacking No data encryption keys are stored within the mobile app software. Thus hacker attacks focusing on the mobile app will not be successful in compromising data encryption security. Conekt secures against Replay Attack hacking Through the use of mutual authentication and session keys between the mobile app and reader IC historic recorded session data cannot be replayed to the reader IC. Conekt secures against Lock/Reader Firmware hacking Data encryption keys are stored in physical tamper-resistant EAL5+ compliant hardware security module (SM) in the reader IC. The SM can detect physical attacks, such as IC shaving and electronic signals monitoring.

13 Conekt Thank you! © 2018 Farpointe Data, Inc. All rights reserved. Patent Pending. Specifications subject to change without notice.


Download ppt "NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018."

Similar presentations


Ads by Google