ISLOG presents RFID.ONL on STid stand at IFSEC London. First cards configuration creation plateform for access control readers. All through your web browser. RFID.ONL also encodes and personalizes access cards. WEB INTERFACE READER CONFIGURATION (STid Architect, HID Omnikey 5427 CK, neXus Cidron…) Customize your access control reader how you want it to behave and looks like. Define […]
Security from end to end is our watchword, as we work closely with the manufacturers of access control readers. This allows us to integrate the creation and management of readers configuration directly maps into our encoding solution without disclosing the secret keys to a third party.
It’s in 2008, after Mifare Classic card was cracked that we decided to focus our developments to the MIFARE® DESFire® card. Since 7 years, year after year, we improve our badge encoding solution that is now one of the most complete and most versatile on the market. From the standalone version to the client / […]
Always at the forefront of technology, we developed a reading tool / write information in DESFire cards on mobile Android. We currently have several R & D projects underway, some open source around the NFC and Android smartphones.
In collaboration with the company ISIC France, we have designed a solution to simplify the call for learners through their student badge. We have developed on Linux nano-computers an interface to connect any Wiegand reader to the computer network. We can read and write informations in the cards, but also manage readers’ LEDs and buzzers as […]
Whether for safety or traceability issue identification simple and user friendly way can seem complex. Specialized in contactless technologies for ten years, we have developed a set of tools for using RFID cards on Windows or Linux workstations directly through the IP network. We are thus able to use a contactless badge for: Open / […]
Our logical access solutions can identify a user on an Windows or Linux session or at a business application: the need is not the same. In the first case we respond to a problem of “securing access to IT’ while in the 2nd case ” traceability “is at the heart of the problem. A “hands-free” […]