
ATS Designers Guide 73
6.4 Safeguards
Due to the sensitivity of the problem, the security of the system using the ATS Smart
technology is detailed in a separate chapter.
The reasons, why the programmable card and reader solution might seem insecure are:
• Availability of software and equipment for generating new cards - the ability to
generate a duplicate by unauthorised persons (external sabotage);
• The ability to program a duplicate of the card by an unauthorised employee (internal
sabotage);
• Compromising security in case of card loss;
• Compromising security in case software and/or equipment (programmer) loss.
The ATS Smart card safeguards provide a high level of security for installations in which
they are used.
• Securing equipment against unauthorized access;
The programmer requires a password when connecting to the computer. The default
password is blank and is not verified to simplify the process for new users. However if a
password is used, the programmer will later require password authentication every time
the connection is made. The connection password is stored only in the programmer
which decreases the risk of revealing the password in case of a hacker attack or
equipment loss.
There are two methods for deleting the programmer memory: software function or use of
the programmer erasing card. Although the software function requires the programmer to
be connected with the TITAN software, the use of the card allows the programmer
memory to be deleted without a computer connection. Due to the possibility of losing the
connection password (forgetting, disloyal employees etc.), it is recommended that an
erasing card be supplied with every system that uses a programmer.
• Card security;
The basic protection of the cards and readers is the 4 byte security code. It’s set in the
programmer activation phase and is remembered in the computer profile and it’s internal
memory. The card security code is stored in each programmed user and configuration
card. The configuration cards, besides storing the programmed options in the accessed
reader, also store the card security code. The reader ignores all tokens with a different
security code than the one it’s programmed with. The reader-card configuration is bi-
directional and encrypted. Every time the reader receives 112 bits of information from the
card.
Each attempt to change a user card once it’s programmed requires password verification.
Only programming blank cards does not require authentication.
An additional safeguard is the option to block programming of the security code. By
blocking the change of the code, erasing the card is also blocked.
The security code cannot be read either form the card or from the reader. It can only be
read from the programmer, and only if an active connection to the TITAN software is
present – activating such a connection requires authorisation.
The programmer profile contains the range of system codes and programmed cards for
the current system/profile. The system will only accept cards that have the system codes
from this range. This is an additional protection for systems in which the programmed
cards are supplied by the installing technician. This solution is widely used in many
countries as it allows reducing the system costs.
• Card uniqueness.
Komentarze do niniejszej Instrukcji