Knowing who you are dealing with is a challenge for businesses and governments alike. We understand that building a secure infrastructure enabled by smart card technology can be a daunting task.
In response to these challenges, CardLogix has engineered high-security, high-endurance cards that enable both physical and logical access, essential to identity applications such as National IDs, Government and Military IDs, Driver Licenses, Voting Cards, and National Healthcare Programs.
CardLogix Corporation’s history and expertise enable key components for any Information Security (INFOSEC) application or environment. We have built NIST-certified, GSA-approved cards that respond to the U.S. government HSPD-12 and FIPS 201 requirements for secure federal employee IDs.
The products that we manufacture for these unique environments are interoperable with existing and new identity management systems. The cards are built to exceed many standards from ANSI, ISO, and EAL organizations.
These products, along with the smart card software, readers, and printers that make up this infrastructure are all available from CardLogix. CardLogix Corporation’s products, essential to security and identity, include:
- High-assurance cryptographic smart cards
- FIPS 201, HSPD12 smart cards and PIV II applets
- ICAO and biometric match-on-card applets
- Web-based authentication solutions
- Personalization services
- Cryptographic libraries and middleware
- Card-based Infrastructure Components (Readers, Terminals, and Printers)
- Internet and Intranet web security applications
- Gen 2 UHF cards
CardLogix Identity Cards can be designed with many external (overt and covert) security features to validate and authenticate the legitimacy of a card. These include—but are not limited to—microprinting, holograms, hidden images, tamper-evident signature panels, color shifting inks, and guilloche.
CardLogix Identity Cards are designed with the following internal features to thwart unauthorized access:
- Bus scrambling
- Current scrambling
- Documentation control, restricted access to data, NDA, wafer/die monitoring
- Dummy computations
- Error counter authentication
- File structure permanently fused into card at factory
- Full chip erase capability in case of fraudulent access
- Fuses and test structure protection
- Hardware MMU, acts as firewall
- Memory encryption
- Metal mask
- No back doors into card operating system
- No DIR command – user MUST know file addresses or risk lockout
- No regular layout structures
- No test mode for the I/O port (test circuitry physically removed at die scribe)
- On chip randomization of instructions – randomizes power consumption
- On-chip encryption of all information
- Random wait states
- Randomized encryption algorithms
- Self-timed memories (not related to input clock)
- Process changing transport codes
- Unique chip IDs
- Use of lower physical layers for EEPROM
- Voltage/frequency control