Highest security standards
We deliver solutions that facilitate the management of sensitive data while ensuring the highest security standards.
A central and fundamental component of modern security concepts is the authentication of users and the authorization of access. Passwords have long since ceased to provide comprehensive access protection - they are easily forgotten, changed infrequently or inadvertently disclosed to third parties due to carelessness.
In many cases, two-factor authentication using a smart card is already state of the art, especially in highly sensitive areas. Using this security concept, a terminal for inserting and reading the smart card is usually required. CHERRY follows the “make two into one” approach and offers space-saving solutions where the card reader is integrated into the keyboard.
Access control, systems for proof of presence, two-factor authentication - fast, uncomplicated data exchange is a prerequisite for all these processes. Especially when this data transfer has to take place several times a day as part of access control to sensitive areas or office buildings, simple and contactless transmission via Near Field Communication (NFC) is an advantage. This is an international transmission standard based on RFID technology for the contactless exchange of data over short distances of a few centimeters and a maximum data transmission rate of 424 kBit/s. Applications include the transmission of Bluetooth or WLAN authentication data to establish communication.
Communication via NFC tags and smartphones is also possible with the smart card keyboard SECURE BOARD 1.0, as it has a contactless card reader located on the back of the keypad.
Many tasks that were once strictly "analog" can now be done online: shopping, banking, virtual visits to authorities, and more. However, digital identity verification is still necessary, often via an ID card that can also be used for electronic signatures (eSignatures).
eSignatures hold the same legal weight as handwritten signatures, ensuring binding agreements in digital environments. They validate a user’s identity similarly to an ID document and are available across various media to suit individual needs.
The use of ID cards with online ID functions varies by region, with widespread applications in Sweden, Finland, and Latvia for identification and digital signatures.
The BSI standards contain methods and procedures for a wide range of information security topics and, together with the IT-Grundschutz compendium, represent a de facto standard for IT security. DIN ISO/IEC 27001, or ISO 27001 for short, is an international standard designed to ensure information security in organizations such as companies, non-profit organizations and public institutions.
A central and fundamental component of modern security concepts is the authentication of users and the authorization of access. Two-factor authentication using a smart card is already state of the art in many cases, especially in highly sensitive areas.
Thanks to the integrated card reader, card-based authentication and access control procedures can be easily implemented with the smart card keyboards KC 1000 SC and the SECURE BOARD. Particularly in companies with many employees, anonymity is so great that access is relatively easy with forged, stolen or fraudulent ID cards. Employees must use security technology responsibly. Personalized access cards provide the necessary level of security. With chip card readers at the key points, these cards can be read quickly in a space-saving manner. This also applies to authentication for IT applications that require access to sensitive data.
In addition to ease of use, CHERRY has placed great emphasis on security in the usual manner. The integrated card reader meets the highest security standards and fulfills the requirements of FIPS 201 (Federal Information Processing Standard Publication 201), Personal Identity Verification (PIV) of Federal Employees and Contractors, a standard of the National Institute of Standards and Technology, which specifies the technical requirements for access control for employees and contractors of the US government.
CHERRY KC 1000 SC | CHERRY SECURE BOARD 1.0 | |
Reliable CHERRY Keyboard | ✓ | ✓ |
PC/SC smartcard reader for user ID and offline eHealth transactions | ✓ | ✓ |
secure PIN entry mode | ✓ | ✓ |
ISO 7816 compatible | ✓ | ✓ |
RF / NFC contactless cardreader | X | ✓ |
ISO 14443 A/B compatible | X | ✓ |
immune to hardware keyloggers & bad USB devices, thanks to encrypted secure mode | X | ✓ |
Colors available | Black / White | Black / White |
We deliver solutions that facilitate the management of sensitive data while ensuring the highest security standards.
We take care of the technology so that IT professionals can focus on what really matters to them. We serve solutions that ensure durability, compatibility, and reliability.
We develop intelligent and secure solutions that enhance work and improve security.
We are constantly evolving to deliver quality solutions for every user, accurate in the details with a fair value for the money.