Identification has become more common in many areas, both for persons as well as in different professions. Identification can be done in many ways, either biometrically by personal attributes (iris, voice, face, fingerprint or palmprint), or various personal smart cards (identity cards, smart cards, or chip cards).
Readers provided by us, involved in the identification, are all trustworthy; verified together with the importers, software vendors, and national claims organizations.
Personal cards with a microchip are becoming more and more popular because with them a fast, reliably and secure identification is made when logging in to various network services.
ACS - ACR39UProduct no.: ACR39USmart card reader, horizontal table design |
ACS - ACR38U-H1Product no.: ACR38U-H1Smart card reader, handy vertical design |
Identiv - uTrust2700RProduct no.: uTrust 2700RSmart card reader, horizontal table design |
Identiv - SCR3500AProduct no.: SCR3500ASmart card reader, USB (Type-A) |
Identiv - SCR3500BProduct no.: SCR3500BSmart card reader, USB (Micro-B) |
ACS - ACR3901U-S1Product no.: ACR3901U-S1Smart card reader, with Bluetooth (not Mac OS) and USB connections |
Fujitsu - KB-SCR2 GreyProduct no.: KB-SCR2GKeyboard, with smart card reader |
Deltaco - KB595Product no.: EKB595Keyboard, small |
SCM - SCR243Product no.: SCR243Smart card reader, PCMCIA (type II)
Original price:
58.50 €
|
Identiv - SCR3340Product no.: SCR3340Smart card reader, ExpressCard54
Original price:
58.50 €
|
Fujitsu - KB-SCR2 BlackProduct no.: KB-SCR2BKeyboard, with smart card reader |
A smart card is a secure key for many public and private sector online services that require a person's identity. The secure certificate of the ID card also acts as a network key for many insurance, education, municipal and state administration services. The service offering is growing continuously and one can now say that the ID card is one key to numerous services. In addition, card certificates can be used to encrypt and electronically sign information such as e-mails.
The authentication challenge
Balancing security and usability has always been a challenge. Software authentication, including passwords, sms and mobile apps are all increasingly vulnerable to malware and hackers. And the more secure hardware authentication solutions are difficult to use and deploy.
Ubiquitous security
Security keys are used to fulfill newest global authentication standards, enabling one single security key to access computers, phones, networks and online services—all in a simple touch.
Special keyboards with high quality features for different needs. To facilitate product placement on a desk, mobile solutions or highly protected for the most demanding conditions.
Biometric recognition means that a person is identified using the unique features of the human body, biometric identifiers, such as human fingerprints. Only very few people have similar biometric identifiers, so they can almost certainly be identified by man.
The most commonly used biometric identifiers include face, sound, fingerprints, eye iris and palm blood vessels.