ID Tech’s scheme is centered around its SDK DEMO Application and relies heavily on factory-embedded certificates for identity.
-
Architecture: It uses a certificate-based request system where the device (KRD) identifies itself to the Concierge server.
-
Workflow: ID Tech often utilizes a Dot NET SDK or a dedicated local host application to bridge the connection between the device and the cloud RKI server.
-
Prerequisites:
-
Serial Registration: The serial number must be whitelisted in the ID Tech RKI production server before the call is made.
-
Connectivity: Devices typically require a Windows-based host if they are USB-peripherals (like the VP3300) to execute the RKI command via the Universal Library.
-