Security

IT Security
Server and systems connect via your Server and systems connect via your company’s ethernet (LAN or WLAN).
We are using the most sophisticated and reliable communication protocols from the mobile world, eg. SOAP and REST.
These methods further benefit through the use of independent communication via GSM or LTE. These methods further benefit through the use of independent communication via GSM or LTE. This mobile communication in combination with our Software-as-a-Service offers an easy to handle direct and secure connection.
The external communication between server and systems is encoded using the most sophisticated The external communication between server and systems is encoded using the most sophisticated encryption, like the symmetrical AES with 256 Bit.
The internal communication in the systems between the main processor and the micro-processors on the CAN-bus is encoded by the elliptic asymmetrical ECC with 233 Bit.

System Security
We support all types of authentication methods, like PIN or RFID cards, a.e. Legic, Mifare or HID. For advanced security standards the latest biometric methods are available.We support all types of authentication methods, like PIN or RFID cards, a.e. Legic, Mifare or HID. For advanced security standards the latest biometric methods are available.
Combining fingerprint and finger vein readers in the “morphosmart”, the highest security requirements are met. This is certified by the American FBI, the French CNIL and the British BSI for government use in their respective countries.
More than 20 different alarm notifications are available. Either on the interface as optical and acoustic More than 20 different alarm notifications are available. Either on the interface as optical and acoustic warning, or as pop-ups on your terminal application, as well as automated e-mails to the person in charge. Four alarm lines can be freed up for security or police use.

Multi user authentication
Our multi user authentication consists of two unequivocal components, the freely adjustable multifactor authentication.
The multifactor authentication refers to the identifaction feature of a single person. To identify a user you can choose between PIN, RFID cards like the RFID access card and the RFID chip on the driver´s license as well as biometric methods as fingerprint and finger vein readers.
These methods can be combined freely and individually for different systems. A simple key cabinet for example can only be openend with a RFID card whereas for the locker system storing laptops and weapons in the adjacent room, the login has to be provided through a second method, for example by entering a PIN.
Various access methods can also be allocated to different systems. This often concerns entreprises located in several countries having an access control from different manufactures or just adapting to new access procedures.
We furthermore provide a TAN system which works like a bank transfer. The administrator creates a TAN list as required with numbers that are only valid one. When using such a secured system, the number has to be entered to open the requested compartment after the login via RFID card or fingerprint.
The multi group authentication requires several persons to open a door or a compartment. The respective groups are interlinked. In a casino for example, the treasurer has to put the cash box back into the corresponding compartment in the presence of a safety manager. Eventually, the features are saved in the group of the treasurer or safety manager. The employees are allocated to these groups and all dependeces are activated.
Reader
Default reader
Kombination reader
Fingerprint reader
Finger veins and imprints reader

ecos Alarm
- four Alarmrelais
- Alarm module with automatic e-mail transmission
- Emergency opening contact on the control panel door
- Emergency power supply (incl. battery) with power saving modes
Our key management systems and locker systems can generate over 20 different alarms. Some alarms are the same for all systems, some depend on the system, e.g. lockers, key cabinets with steel doors or rolling doors.
Alarms for all systems | Alarms for depots | Alarms for key cabinets |
|
|
|
The alarms listed above are either already integrated in the system or have to be activated by attaching corresponding alarm contacts.

Alarm message pop-up window:
The alarms can always be displayed up-to-date if the function "Show alarm message" is activated. In this case, the alarm messages always appear immediately and clearly visible in a pop-up window.

Alarm list alarm log
For a quick overview, only the incoming alarms can be displayed in the log via filter settings. Remarks can be entered for the alarm messages, such as "False alarm" or "Forwarded to...".