Solutions

logical access control

Logical access control

Within the emerging market of IT-Security and the broad spectrum of security needs our products and services are focused on protecting the logical access to an IT infrastructure and secure data transfer.

physical access control

Physical access control

Physical access control is the classic way of protecting a building against non-authorised access at the outer shell of a building or at the border line of a campus.

personalisation

Personalisation

Due to the different needs (technically and  quantity wise) of customers United Access is operating a large number of personalisation systems with different configurations.

mobile data collection

Mobile data collection

The unique identification of goods of all kinds is becoming more and more important due to increasingly complex logistics processes.

harddisc encryption

Hard disk encryption

High requirements are placed on data carriers to protect against spying, illegal copying and modification

cloud encryption

Cloud encryption

Protection against illegal spying and disclosure to third parties, as well as the protection against data loss

Logical access control

Within the emerging market of IT-Security and the broad spectrum of security needs our products and services are focused on protecting the logical access to an IT infrastructure and secure data transfer.

In order to provide solutions for this market our product portfolio offers entry level as well as high end solutions. On entry level standard RFID media like Mifare can be used to protect the logon process to a Windows based PC. On high end level a smart card can be used for high secure logon based on a Public Key Infrastructure (PKI / Kerberos) combined with email encryption and signature. Very often the logical access protection is combined with physical access control on media level by using hybrid cards (combining different chip technologies within one card or token) or multi-application cards (several applications on one chip).

logical access control

Physical access control

Physical access control is the classic way of protecting a building against non-authorised access at the outer shell of a building or at the border line of a campus. This physical access control is handled by automated systems verifying RFID based id-tokens. Older generations of such systems are based on so called white list verifications using the unique id of the embedded RFID chips. Due to new technologies used by attackers more and more systems are migrated to high secure RFID products based on high end cryptographic methods. In order to prepare convenient solutions for the end users very often such physical access media are combined with logical access functionality like in hybrid media (combining different chips within one media) or multi applications media (representing several logical applications on one chip).

United Access is focused on providing such high end products personalised in accordance to customer needs. Personalisation means printing of cards or tokens as well as encoding of the integrated RFID chips. Handling and maintaining cryptographic elements for our customers is our daily business. Furthermore United Access offers a broad portfolio of high quality card printing and encoding devices in order to enable the customer for self enrolment of access credentials. Additionally we also offer personalisation software incorporating as well the printing and the encoding of RFID and smart cards.

physical access control

Personalisation

Card personalisation covers as well the printing of the card as the encoding of the integrated chip(s). The encoding of the embedded chip includes the initialisation of the chip, the loading of the individual – in most of the cases personal data – and the installation of programms (e.g. JavaCard applets or patches). In order to guarantee data consistency the printing and encoding is handled within one integrated process. Due to the different needs (technically and  quantity wise) of customers United Access is operating a large number of personalisation systems with different configurations.

As a special service United Access is able to personalise hybrid cards combining different technologies like contact based chips, RFID chips and magstripes within one process by flexible configuration of the personalisation environment. RFID chips of different frequency bands from 125kHz  to 13,56MHz up to UHF are supported. Especially for the European market United Access is also providing personalisation services for the LEGIC technology (PRIME and Advant, unsegmented PRIME256).

Since these services have to be configured case by case it would be a pleasure for us to provide an individual offer – please contact us.

personalisation - access control

Mobile data collection

The unique identification of goods of all kinds is becoming more and more important due to increasingly complex logistics processes. Previously, this was usually mapped using optical IDs in the form of barcodes or QR codes. Here, too, RFID technology is becoming more and more important, as it can be used at the same time as a secure protection against illegal cloning of products with simultaneous optimization of logistics processes through increased reading distances.

To support this trend, we offer products from our partner Datatronic Kodiertechnik GmbH in our portfolio. The TagTrans product family offers readers for all common frequency bands from 125kHz LF to 13.56MHz HF up to 868 – 926MHz UHF. In terms of the migration from optical IDs to secure RFID tags, these devices can also be equipped with barcode and QR code scanners and are therefore perfectly suitable for hybrid applications or migration scenarios. For use in potentially explosive environments, some of these devices are also available with an ATEX certificate. The reader is connected to a host system via industrial Bluetooth with ranges of up to 100m.

mobile data collection - access control

Harddisc encryption

Despite increasing availability of cloud storage offerings, external hard drives are very often used to save data or as a transfer medium for sensitive data. Since both areas of application are mostly sensitive data – be it company data or personal data – high requirements are placed on these data storage media to protect against spying, illegal copying and modification. A good way to counter this is to use secure symmetrical and asymmetrical cryptographic methods.

Our product portfolio includes external storage media that make use of proven and disclosed cryptographic procedures and, depending on the application and the desired storage size, are designed as USB sticks or external hard drives in the terabyte range and offer additionally protection via chip cards. We use the products of a partner company with whom we have been working successfully for many years – the products of Digittrade GmbH from Germany.

harddisc encryption - access control

Cloud encryption

Saving data in the cloud is very popular and easy, but very often a very reduced protection of this data is accepted. This concerns both the protection against illegal spying and disclosure to third parties, as well as the protection against data loss. In addition, the automated analysis and indexing of all data in the cloud by the respective providers are somehow accepted. These aspects were the trigger to enter into a partnership with a young company – fragmentiX GmbH. This partnership ultimately resulted in United Access GmbH investing in fragmentiX GmbH. We were and are involved in both the development and testing of the products.

The implemented basic principle of the fragmentiX product line is a scalable fragmentation of the data to be stored with simultaneous information-theoretical secure encryption based on One Time Pad, which also offers security against attacks by quantum computers. This “fragmentation” and encryption of the data enables the data to be stored on multiple cloud services without the attack on a single fragment leading to illegal spying or analysis. In order to be protected against the failure of several cloud providers, a redundancy level can be set for storage.

cloud encryption - access control