Products & Services
Smart cards
Memory cards offering cheap limited storage space up to high end smart card crypto controllers
RFID & NFC
Radio Frequency IDentification for e.g. building access, identification of items or public transport
Reader
We offer smart card readers like contact based smart card readers, RFID readers, dual interface readers and more
Printer
Our offer includes printers of the following brands: Fargo, Zebra and Evolis
Software
United Access offers software products as well as customized software development services
Services
We are committed not only to deliver state-of-the-art components but also to a deep knowledge of the products
Smart cards
Smart Cards are the core business of United Access. Talking about smart cards we assume intelligent micro-controller cards with cryptographic capabilities and an operating system running on a dedicated security hardware.
This gives a very broad range of controllers and operating systems. Within this large field we focus on independent platforms (not linked to a card manufacturer) mainly for IT security, banking and general purpose. We are not active in the GSM business.
RFID & NFC
Radio Frequency IDentification (RFID) is very trendy part of the business – many companies around the world are active in this segment. Catch words like intelligent logistic solutions, EPC, ICAO, intelligent supply chain, auto ID, NFC are used by many adventurers new in this exciting business. United Access is convinced that there are several applications which are ideal for RFID solutions – like building access, animal identification or public transport. On the other hand we observe a lot of unsolved technical questions or at least problems of practical usage. Logistic applications like palette identification are a perfect example: under laboratory conditions all problems are solved – in practice several blocking points remain. In many fields of application (like identification of single milk bottles) the traditional bar code will persist – there is simply no business case for RFID solutions.
Printer
Today card printers are mainly used to print card individual data on standard ISO CR80/ISO 7810 sized cards. Increasingly the cards should also be encoded within the same sequence to assure data consistecy. In order to serve this increasing demand we integrate as well encoders for contact based as for RFID cards into standard card printers. Our RFID encoders cover 125 kHz, 13,56 Mhz and UHF band widths. All encoders we use provide standard interface as well on physical (USB, RS232) as on logical level (PC/SC, Omnikey synchroneous API, ACG interface); Legic encoding (segmentation) is also part of our business.
Our offering contains printers of the following brands:
Software
United Access offers software products (like smartExplorer, smart2win) as well as customized software development services.
Examples for customized software developments:
- JavaCard applets (GIDS, PIV, FIDO2, …)
- Initialization for JavaCards
- COM object for accessing a card printer (printing, controlling the process)
- library for authentication of security modules
- library for NXP DESfire EV1, EV2 and EV3 personalization
- TCP / IP interface (PC based) for integration of smart cards
- DESfire coding station
- MIFARE coding station
- LEGIC coding station
Therefore we can offer:
Card and Keyfob Personalisation
Card personalisation covers as well the printing of the card as the encoding of the integrated chip(s). read more
Support Services
Various service level agreements are possible – please contact us for more details.
Project Management Services
We concentrate on projects in the RFID and smart card area. For these projects we offer professional management services focused on the subsystems delivered by us but – if required – also overall project management.
Consultancy Services
Focus of consultancy services is in the PKI, key management and security concept area.
Software development
United Access offers software development services – mainly based on standard components. The software is typically no end user application but an expert system (e.g. for key management).
Supported technologies: c, c++, c#, JavaCard
For further questions please contact us.
Hard disk encryption
Despite increasing availability of cloud storage offerings, external hard drives are very often used to save data or as a transfer medium for sensitive data. Since both areas of application are mostly sensitive data – be it company data or personal data – high requirements are placed on these data storage media to protect against spying, illegal copying and modification. A good way to counter this is to use secure symmetrical and asymmetrical cryptographic methods.
Cloud encryption
Saving data in the cloud is very popular and easy, but very often a very reduced protection of data is accepted. This concerns both the protection against illegal spying and disclosure to third parties, as well as the protection against data loss. In addition, the automated analysis and indexing of all data in the cloud by the respective providers are somehow accepted. These aspects were the trigger to enter into a partnership with a young company – fragmentiX GmbH. This partnership ultimately resulted in United Access GmbH investing in fragmentiX GmbH. We were and are involved in both the development and testing of the products.
The implemented basic principle of the fragmentiX product line is a scalable fragmentation of data to be stored with simultaneous information-theoretical secure encryption based on One Time Pad, which also offers security against attacks by quantum computers. This “fragmentation” and encryption of data enables data to be stored on multiple cloud services without the attack on a single fragment leading to illegal spying or analysis. In order to be protected against the failure of several cloud providers, a redundancy level can be set for storage.