New Skim Guard
Development Overview - Why DCT?
Today, RFID technology is used in many applications. We commonly use it in the form of tap & go credit cards, public transport transit passes and hotel room keys. These all sit on the 1350 KHZ RFID bandwidth.
What now poses a greater security risk is the cyber theft of workplace entry codes embedded in our workplace entry cards. As well, the myriad of access cards we use for entering gymnasiums, apartment complexes etc are also now easy targets for cyber criminals. These access cards all sit on the 125 KHZ RFID bandwidth. As well as stealing access codes, any personal identity information embedded in the card is also targeted.
Patented Dual Circuit Technology
Skimguard DCT now guards and protects against cyber intrusion on both the 1350 KHZ and 125 KHZ frequency bandwidths. The new DCT card incorporates an all-in-one electronic cyber theft protection.
Its patented technology sees two seperate layers of electronic E Field defence, protecting all cards against cyber-attacks, whether at home, out and about or at work.
DCT also incorporates Skimguard Phantom Chip
DCT also includes Skimguards firewall defence system, the Ghost Chip. Ghost Chip is a genuine chip embedded within the card that emits erroneous data, foiling cyber thieves. This scrambling technology adds a further layer of cyber protection when intruders are detected within skimming range.
DCT- How to Use
The blue side of DCT card is embedded with a 1350 KHZ electronic E-Field jammer protecting your credit cards, transit cards and hotel room key cards. It protects all RFID cards in your wallet or purse, wherever they are placed.
The white side of your DCT card is embedded with a 125 KHZ electronic E Field jammer preventing cyber access to workplace RFID entry as well as gymnasiums. Workplace access and gym cards should always be kept in near proximity to the A Lock side of the card.
DCT - Passive & Active Interface
This is what sets Skimguard apart from traditional faraday cage RFID devices. Skimguards built in detection receptors draw power from the skimmers own device to power up and create an impregnable E-Field. So DCT is passive when no threat exists and activates when threats surround.
So DCT can never go flat, there are no batteries to buy, there’s no recharging required and no naps to download or renew, just set and forget.
…. Key cards are great, so much better than carrying around keys …. but are they?
A key card is a security card that grants access through electronically powered entry doors. They are embedded with a microchip loaded with a unique code granting physical entry. They act as a wireless remote control access device into apartments, offices and 24-hour service businesses like gymnasiums.
Anyone using a key card to gain building access may be exposed to the very real threat of serious security breaches, both to building occupiers and confidential data theft. They are a vulnerable target to RFID cyber theft. Once skimmed, cards are quickly cloned granting unlawful access to any breached premises. Any personal identifying data stored on the key card can also be stolen, becoming a steppingstone to synthetic identity fraud. Skimmers literally tap into your business network in seconds. Its instant, its silent and its unstoppable…till now.
How is key card data stolen?
RFID Security doors incorporate a wall reader known as a Building Access Control Card Reader (BACCR). The wall reader sends a signal to the key card, i.e., an Original Building Access Control Card (OBACC). The key card details are verified by the wall reader giving the key card holder automatic entry. This is where the system breaks down. Using a compatible 125 KHZ RFID card reader criminals can easily skim information stored on the key card, then clone it. No building BACCR reader can distinguish between genuine or cloned key cards.
How Does a-lock work?
A Lock is the world’s first designated electronic RFID key card cyber shield. Building access key cards sit on the 125 KHZ RFID bandwidth. Skimguards patented E-Field technology is built into A-Lock. It creates an impregnable electronic jamming barrier surrounding the key card preventing skimmers from cloning them. A Lock powers up into active mode drawing energy from the intruding skimmer. When the skimmer moves out of range A-Lock powers down to passive mode.
Where do I put It?
Place your access key card next to A Lock in your wallet, purse, or workplace lanyard for maximum protection. To gain building access remove key card and tap for entry.