Skip to main content

Secure RFID is at the heart of i-SiD

Their passion is RFID security and the start-up company i-SiD is passionate about getting the message across to visitors at their stand. All five employees of i-SiD – a company embedded within multinational G+D Mobile Security – are showcasing the security aspect of their cloud-based solution that offers the possibility to use UHF-based identities in heterogeneous environments for a variety of scenarios. Until now, key management has proven to be a major show-stopper while setting up an open and secure
March 21, 2018 Read time: 2 mins
Secure approach: Kevin Niekrawietz, Karla Korb and Raoul-Thomas Herborg

Their passion is RFID security and the start-up company 8700 i-SiD is passionate about getting the message across to visitors at their stand.

All five employees of i-SiD – a company embedded within multinational G+D Mobile Security – are showcasing the security aspect of their cloud-based solution that offers the possibility to use UHF-based identities in heterogeneous environments for a variety of scenarios.

Until now, key management has proven to be a major show-stopper while setting up an open and secure RFID system with various stakeholders. Loading new keys into the reader is often time consuming and very complex.

In addition, the many different implementations of UHF technology and widely diverse hard- and software solutions markedly complicate the overall identity
management.

The i-SiD platform manages and monitors identities, chips and readers. Thousands of tags can easily be rolled out and handled via i-SiD, as well as new tags ordered directly via the platform.

Ultimately, the i-SiD platform securely links the physical and digital world by gathering the information of when and where each tag is identified. It takes over the complex but essential tasks of key management and authentication, as well as securing privacy by managing who is permitted to identify which tags.

The i-SiD platform integrates into existing applications and can be either used as a cloud service or installed on premise. Applications include access management, highway toll collection, smart parking, automatic vehicle identification and asset tracking.

Stand: 7.119

%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external www.i-sid.com i-sid website link false https://www.i-sid.com/ false false%>

Related Content

  • June 11, 2015
    Nedap introduces next generation microwave RFID readers
    Dutch vehicle identification and detection specialist Nedap is taking advantage of IFSEC 2015 to launch its Transit Ultimate microwave RFID long-range reader, developed for vehicular access control in high-security applications and under heavy environmental conditions.
  • March 20, 2018
    TagMaster shows XT-5 RAIN RFID reader
    TagMaster, whose business areas include traffic and rail solutions sold under the TagMaster, CitySync, Balogh, CA Traffic, and Magsys brands, is launching several new products, including the XT-5 UHF Reader. The XT-5, a new member in TagMaster’s UHF family, is the next generation of RAIN RFID reader for traffic solutions. It has a high-performance 33 dBm radio with self-jammer cancellation and polarisation switching. Built on a Linux platform with PoE+, it comes in versions with internal antenna or up to
  • March 19, 2018
    Irdeto and Conjure promote Keystone vehicle access solution
    Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry. Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences. Keystone combines secure, tamper-proof policy management that
  • March 20, 2018
    Redflex automates traffic offences with Alcyon
    Redflex is here at Intertraffic to highlight its innovative solution for processing and managing photo enforcement incidents. This can be a costly, complex and time-consuming task for an organisation, particularly so as camera networks proliferate and volumes of data increase. Numerous touch points and variables in the infringement life cycle add to the challenge. “We saw that enforcement agencies were looking for a unified platform that could help them streamline the way they handled incidents, while als