Hardware

Hardware compatibility at a glance

Telcred is designed to work with modern access control hardware while giving organizations the flexibility to use the devices that best fit their environment.
 
Our platform integrates with industry-standard controllers, readers, and wireless lock systems, allowing organizations to deploy secure access control without being locked into a single hardware ecosystem.
 
 

Controllers: Axis Communications (others will be added)
Wireless Locks: Aperio, SimonsVoss
Readers: OSDP / Wiegand
Recommended Credentials: DESFire, PKI, Mobile Wallet

 

Telcred image

Preconfigured hardware

For organizations that want a faster and simpler deployment, Telcred can provide preconfigured hardware ready for installation.
 
These devices are prepared and tested before delivery so they can be installed in a plug-and-play manner, reducing installation time and simplifying setup for installers and integrators.
 
Preconfigured hardware ensures that controllers and readers are already prepared to communicate with the Telcred platform, allowing systems to be brought online quickly.
 
Every access control installation has unique requirements. Telcred works with customers and integrators to advise on the optimal hardware setup for each deployment.

Axis Communications

Axis controllers offer several advantages:

  • global availability and distribution
  • strong reliability and build quality
  • modern IP-based architecture
  • excellent integration ecosystem

This makes Axis a strong foundation for scalable access control deployments. Supported models are:  A1210, A1610, A1710, A1810, A9188.

 

Telcred image

Card technologies

– Why this matters

Access credentials are evolving from encrypted smart cards to cryptographic identities and mobile wallet credentials. Choosing the right reader hardware today is important to ensure long-term flexibility.

 

The most widely used secure credential today is MIFARE DESFire, which uses AES encryption and secure authentication between card and reader. DESFire has become the standard for many corporate and enterprise access control deployments.

 

However, the industry is gradually moving toward credentials based on public key cryptography (PKI). Technologies such as Personal Identity Verification (PIV) and PKI-on-Card (PKOC) use asymmetric cryptography, where each credential contains a unique private key and digital certificate.

 

At the same time, credentials are increasingly moving to smartphones and wearable devices. Emerging standards such as Aliro aim to enable secure and interoperable mobile credentials.

 

Because credential technologies evolve over time, modern reader infrastructure should support both DESFire and future PKI or mobile standards, allowing organizations to adopt new credential models gradually without replacing hardware.

Evolution of access credentials

Technology Security Model Authentication Method Examples Typical Use
Legacy RFID Static identifier (UID) Reader reads card ID 125 kHz Prox cards Older access systems
Secure Smart Cards Symmetric encryption (AES) Mutual authentication using shared keys MIFARE DESFire Corporate access control
PKI Credentials Asymmetric cryptography Challenge-response using private key PIV, PKOC High-security environments
Mobile Credentials Device-based cryptographic identity Secure device authentication Aliro, Mobile Wallet Next-generation access systems

Reader capabilities: Supporting today and tomorrow

Because credential technologies evolve over time, reader infrastructure plays a critical role in long-term flexibility.

 

  • Modern multi-technology readers can support multiple credential types simultaneously, including:
  • MIFARE DESFire smart cards
  • PKI-based credentials such as Personal Identity Verification
  • Mobile credentials and emerging standards like Aliro

 

This capability allows organizations to introduce new credential technologies gradually, without replacing readers or disrupting existing deployments.

 

By choosing readers that support both today’s DESFire credentials and tomorrow’s PKI or mobile standards, organizations can ensure their access control system remains secure, adaptable, and future-ready.

Do you want us to contact you?

Please fill in the form below and we’ll be in touch soon.