Authentication Systems

Data and Database Management Software

Data Protection Software offers secure remote authentication.

Addressing security needs of SMEs, DIGIPASS Pack for Remote Authentication includes packs based on IDENTIKEY server software with DIGIPASS GO6 authenticators. Complete solution helps add extra security layer to protect remote access to corporate network and data. IDENTIKEY integration also provides support for operating systems such as Windows Server 2008. Expandable according to demand, packs...

Read More »
Authentication System provides counterfeit protection.
Security Systems

Authentication System provides counterfeit protection.

Based on ST23 microcontrollers and secure operating system, AuKey turnkey solution helps brand owners authenticate products such as computer accessories, add-in cards, printer cartridges, network infrastructure products, and metering devices. AuKey supports advanced security crypto algorithms including AES shared-key system and Elliptic Curve Cryptography. Microcontroller and OS, together, also...

Read More »
Card Readers

Authenticators are based on public key infrastructure.

Suited for local and remote access to corporate network and applications, DIGIPASS® KEY 200 consists of USB device with PKI smart card and secure USB mass storage on single device. DIGIPASS® KEY 860, adapted for banking environments, combines smart card ID device, OTP authenticator, and secure USB storage. Both offer PKI-based digital signature for emails or transactions, encryption...

Read More »
Circuits

Integrated Circuit provides secure authentication.

With plug-and-play AT88SA10HS CryptoAuthentication host-side IC, designers can implement authentication-ready embedded systems, without knowledge of security protocols or algorithms. Device includes embedded SHA-256 engine and 256-bit cryptographic key. When used with AT88SA family of CryptoAuthentication ICs and system microprocessor such as AVR® or ARM®, AT88SA10HS provides...

Read More »
Circuits

Authentication IC features embedded SHA-256 engine.

Designed to protect consumers from counterfeit electronic and medical consumables, AT88SA102S CryptoAuthentication(TM) IC ensures that stored code is authentic and protects downloads from snooping or modification. Device includes 23 bits of one-time-programmable fuses that can be used for personalization, status, or consumption logging. High-speed single-wire interface is compatible with all...

Read More »
Data and Database Management Software

Portable Forensic Tool promotes document security.

Featuring software architecture that enables addition of multiple plug-ins, iDetector Mobile lets users check security features via interchangeable light sources, magnification lenses, and digital camera. Specific software plug-in can be used to embed authentication software, turning unit into completely autonomous tool for field authentication. Additional software plug-ins are available for...

Read More »
Network Software

Software offers PKI-based authentication solution.

Providing strong authentication, digital signature, and data protection, Digipass CertiID is client-based software suite with signing and encryption functionality as well as nonrepudiation of transactions. Certificates and keys are generated and managed on device and private key cannot be exported. Program supports multiple certificate authorities and logins and is offered in smartcard-, USB...

Read More »
Miscellaneous Software

PKI Device provides 2-factor strong authentication.

Used with Digipass CertiID client-based software offering digital signature capabilities, USB-based Digipass Key1 provides strong authentication, secure access, and secure transactions. Unit has been developed for large corporations, governments, and banks delivering secure web login, Windows PKI login to desktop, e-mail signature, e-mail encryption, and secure VPN access. Private keys which are...

Read More »
Encryption Systems

Portable USB Device enables secure access and transactions.

When connected to any free USB port and used with smart card technology, @MAXX(TM) prime can provide strong authentication for access to PCs and networks as well as digital signature and encryption tools. It can also provide secure PIN protection for accessing on-board portable flash data storage. In addition to contact/contactless smart card functionality, solution combines fixed and expandable...

Read More »

All Topics

COVID-19 Response Suppliers COVID-19 Response:
Can Your Company Help Provide Critical Supplies?

We are using the power of our platform to aid in the mass shortage of critical supplies. If your company can help provide supplies, capabilities, or materials for products such as N-95 Masks and Tyvek SuitsPlease let us know.

COVID-19 Response Suppliers