Security

 

IT-Sicherheit

IT Security

Server and systems connect via your Server and systems connect via your company’s ethernet (LAN or WLAN).

We are using the most sophisticated and reliable communication protocols from the mobile world, eg. SOAP and REST.

These methods further benefit through the use of independent communication via GSM or LTE. These methods further benefit through the use of independent communication via GSM or LTE. This mobile communication in combination with our Software-as-a-Service offers an easy to handle direct and secure connection.

The external communication between server and systems is encoded using the most sophisticated The external communication between server and systems is encoded using the most sophisticated encryption, like the symmetrical AES with 256 Bit.

The internal communication in the systems between the main processor and the micro-processors on the CAN-bus is encoded by the elliptic asymmetrical ECC with 233 Bit.


System-Sicherheit

System Security

We support all types of authentication methods, like PIN or RFID cards, a.e. Legic, Mifare or HID. For advanced security standards  the latest biometric methods are  available.We support all types of authentication methods, like PIN or RFID cards, a.e. Legic, Mifare or HID. For advanced security standards  the latest biometric methods are available.

Combining fingerprint and finger vein readers in the “morphosmart”, the highest security requirements are met. This is certified by the American FBI, the French CNIL and the British BSI for government use in their respective countries.

More than 20 different alarm notifications are available. Either on the interface as optical and acoustic  More than 20 different alarm notifications are available. Either on the interface as optical and acoustic  warning, or as pop-ups on your terminal application, as well as automated e-mails to the person in charge. Four alarm lines can be freed up for security or police use.


Multiauthentifizierung

Multi user authentication 

Our multi user authentication consists of two unequivocal components, the freely adjustable multifactor authentication.

The multifactor authentication refers to the identifaction feature of a single person. To identify a user you can choose between PIN, RFID cards like the RFID access card and the RFID chip on the driver´s license as well as biometric methods as fingerprint and finger vein readers.

These methods can be combined freely and individually for different systems. A simple key cabinet for example can only be openend with a RFID card whereas for the locker system storing laptops and weapons in the adjacent room, the login has to be provided through a second method, for example by entering a PIN.

Various access methods can also be allocated to different systems. This often concerns entreprises located in several countries having an access control from different manufactures or just adapting to new access procedures.

We furthermore provide a TAN system which works like a bank transfer. The administrator creates a TAN list as required with numbers that are only valid one. When using such a secured system, the number has to be entered to open the requested compartment after the login via RFID card or fingerprint.

The multi group authentication requires several persons to open a door or a compartment. The respective groups are interlinked. In a casino for example, the treasurer has to put the cash box back into the corresponding compartment in the presence of a safety manager. Eventually, the features are saved in the group of the treasurer or safety manager. The employees are allocated to these groups and all dependeces are activated.  


Reader

Default reader

Default reader

Kombination reader

Kombination reader

Fingerprint reader

Fingerprint reader

Finger veins and imprints reader

Finger veins and imprints reader


Tabelle Preisliste

ecos Alarm

  • four Alarmrelais
  • Alarm module with automatic e-mail transmission
  • Emergency opening contact on the control panel door
  • Emergency power supply (incl. battery) with power saving modes

Our key management systems and locker systems can generate over 20 different alarms. Some alarms are the same for all systems, some depend on the system, e.g. lockers, key cabinets with steel doors or rolling doors. 

  Alarms for all systems    Alarms for depots    Alarms for key cabinets
  • 3 x incorrectly logged in
  • Connection interrupted
  • Mains operation
  • Battery operation
  • Battery status critical: low 20 V
  • Battery level OK
  • Door of control unit open
  • System restarted
  • Door open too long
  • Return time exceeded
  • Quiet alarm
  • Unauthorised opening of locker
  • Platform or spacer open
  • Supervisor opens lockers
  • Manipulation of compartment, compartment was deactivated
  • Door surface was broken open (only with Meander foil)
  • Unauthorized drawn
  • Positive alcohol test
  • System was suspended (wall contact)
  • Manipulation attempt roller door
  • Blockade roller door

The alarms listed above are either already integrated in the system or have to be activated by attaching corresponding alarm contacts.


Alarmmeldungen

Alarm message pop-up window:

The alarms can always be displayed up-to-date if the function "Show alarm message" is activated. In this case, the alarm messages always appear immediately and clearly visible in a pop-up window.


Alarmliste - Alarmprotokoll

Alarm list alarm log

For a quick overview, only the incoming alarms can be displayed in the log via filter settings. Remarks can be entered for the alarm messages, such as "False alarm" or "Forwarded to...".