Solved

use of dallas keys / ibuttons

Posted on 2011-02-28
1
642 Views
Last Modified: 2012-05-11
We have a bespoke epos system developed in house. At the moment users authenticate themselves by typing in a 4 digit pin number. We would like to use something like dallas keys (ibuttons) to do this instead. My question is what's to stop someone simply opening up notepad and pressing the dallas key to the reader to get the 16 digit sequence? Or into another text field of the epos system. My understanding is that it just provides a stream of characters just like a keyboard.
0
Comment
Question by:groovyjon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 25

Accepted Solution

by:
kode99 earned 500 total points
ID: 35038948
Unlike bar code readers the ibutton readers are not installed as a keyboard or HID device.  

I have worked with some prox/smartcard readers in the past that are pretty similar to the Dallas chip stuff.  In those cases it was either serial port or directly via DLL with a USB driver.

Since I've not worked with the dallas chip readers specifically I did a bit of looking around .  Everything I found was done with a serial interface.  Even USB versions I found are 'connected' through a virtual serial port.  

Unless the software was specifically designed to read the card/button you won't see any card data.  Even within the program it is meant for the data should not actually show up when you swipe,  except maybe at a admin or diagnostic  level for key assignment.

Often the keys/buttons/cards are also encoded with additional information that ties cards to a specific site or to a vendor.  This is usually a global setting in the system and is something that the key holders would not even know of.  

There may be units that do setup like a keyboard but it seems pretty impractical for exactly the reason you are asking.  I only did a quick search.

If this is being developed inhouse it should be very simple for the software designer to properly incorporate the reader

Here's some info on HID proximity readers for computers,

http://www.hidglobal.com/iam/tabbedWithShowcase.php?pid=338


0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question