i3.IdentySoft.com - Communication and Encryption

i3.IdentySoft.com - Communication and Encryption


EasySecure International is committed to safety and security of your data. We therefore opt for the best security and work together with the best hosting parties and the latest technologies.

The image below shows a schematic representation of a LAN environment with a number of our scanners that connect to the IdentySoft cloud software. In this article we offer you more information about the local communication (LAN) within your network and we tell you more about the security and encryption of our hardware.





Below you can find a brief overview of how IdentySoft works within your local network. IdentySoft uses the following components:

  1. All our scanners for access control and time registration have their own IP address.
  2. The local communication runs over TCP port 80, 1470, 1471, 51211 and 51212.
  3. Communication with our cloud software is always from the inside out and never from the outside in. 
  4. An SCD Service is running within your LAN environment. This SCD service ensures communication with your cloud environment and forwards the log data to the cloud and at the same time also sends the user data to the scanners.
  5. It is possible to link multiple SCDs to the same software environment. This makes it possible to link an infinite number of separate networks to the same cloud software.
  6. The SCD software can be installed on any Windows PC or server. The SCD service is installed and set up within 1 minute.
  7. All scanners have their own memory in which tens of thousands of log and user data are stored. In the unlikely event that there is a problem with the SCD service or with the internet connection, access and registration will always continue. Once the connection is restored, all data is updated automatically.
  8. The connection between the SCD service and the IdentySoft cloud software runs over TCP port 443.


Below you can find a schematic representation of the ports used and the route of communication between scanners and our IdentySoft cloud software.

You will see the Local Area Network (LAN) on the left. The scanners communicate with the SCD server via ports 1470, 1471, 51211 and 51212. The SCD software then connects via internet via port 443 to IdentySoft.





Naturally, communication between readers and SCD / IdentySoft software is also secured. All our scanners use 246-bit Advanced Encryption Standard (AES) and MD2 Hash algorithms.
More information about AES and MD2 can be found on the following pages:



Please find the diagram below. You can see that all network scanners use the AES-256 encryption. "Slave" devices that are connected via RS485 are protected by the MD2 Hash Encryption.




Do you still have questions about security, communication and encryption within IdentySoft? Take a look at the related articles or contact us. We are happy to assist!



Related articles - Security Software & Hardware


    • Related Articles

    • i3.IdentySoft.com - Security & Hosting

      EasySecure International is committed to safety and security of your data. We therefore opt for the best security and work together with the best hosting parties and the latest technologies. The image below shows a schematic representation of a LAN ...
    • i3.IdentySoft.com - How does the privacy & security menu work?

      In this article we will show you how our 'privacy and security' menu works and which settings are possible. First of all, click on settings in your IdentySoft environment . You will see the sub-menu Privacy & Security. The next screen will be shown ...
    • i3.IdentySoft.com - How do I exclude a user from the script for deleting inactive data?

      Under the privacy & security menu it is possible to set retention periods for the automatic deletion of log data and the removal of inactive users, cards and templates. In the following article you can find more information about the menu 'privacy ...
    • i3.IdentySoft.com - Information about Biometrics & Privacy

      When talking about privacy and biometrics, one should immediately look at the kind of system they are using. Government systems (such as the police or your passport) are based on a system where biometric images are stored. These systems can violate ...
    • EasySecure - Security & Hosting

      EasySecure International heeft veiligheid uiteraard hoog in het vaandel staan. Wij kiezen dan ook voor de beste beveiliging en werken samen met de beste hosting partijen. In de afbeelding hieronder ziet u een schematische weergave van een LAN ...