User verification made easy

CHERRY Security Devices

CHERRY Security

From office to health applications: CHERRY Security Solutions guarantees optimum protection for your sensitive data. We offer user authentication with maximum usability and high security standards.

Secure access control via smartcard

Smartcard reader

A central and fundamental component of modern security concepts is the authentication of users and the authorization of access. Passwords have long since ceased to provide comprehensive access protection - they are easily forgotten, changed infrequently or inadvertently disclosed to third parties due to carelessness.

In many cases, two-factor authentication using a smart card is already state of the art, especially in highly sensitive areas. Using this security concept, a terminal for inserting and reading the smart card is usually required. CHERRY follows the “make two into one” approach and offers space-saving solutions where the card reader is integrated into the keyboard.

NFC Card reader

Simple, clever, contactless: NFC

Access control, systems for proof of presence, two-factor authentication - fast, uncomplicated data exchange is a prerequisite for all these processes. Especially when this data transfer has to take place several times a day as part of access control to sensitive areas or office buildings, simple and contactless transmission via Near Field Communication (NFC) is an advantage. This is an international transmission standard based on RFID technology for the contactless exchange of data over short distances of a few centimeters and a maximum data transmission rate of 424 kBit/s. Applications include the transmission of Bluetooth or WLAN authentication data to establish communication.

Communication via NFC tags and smartphones is also possible with the smart card keyboard SECURE BOARD 1.0, as it has a contactless card reader located on the back of the keypad.

Passwordless log-in closes the gateway from the inside

  • Problem: Passwords are often forgotten, misplaced, or unintentionally shared.
  • Solution: The FIDO2 standard allows for passwordless authentication, offering strong multi-factor authentication with secondary factors like biometrics, hardware keys, smart cards, or TPM modules.
  • Technology: The challenge-response method is based on asymmetric encryption with private and public keys.
  • Practice: A USB hardware key enables fast and secure log-ins. The key connects via USB, NFC, or Lightning, and authentication is completed by touching the key.
  • Security: Data theft becomes virtually impossible if this method is implemented company-wide, closing a popular gateway for cybercriminals.

Secure proof of identity and legally binding signature in the digital space

Many tasks that were once strictly "analog" can now be done online: shopping, banking, virtual visits to authorities, and more. However, digital identity verification is still necessary, often via an ID card that can also be used for electronic signatures (eSignatures).

eSignatures hold the same legal weight as handwritten signatures, ensuring binding agreements in digital environments. They validate a user’s identity similarly to an ID document and are available across various media to suit individual needs.

The use of ID cards with online ID functions varies by region, with widespread applications in Sweden, Finland, and Latvia for identification and digital signatures.

in accordance with ISO 27001:2005

Fulfill the necessary basic IT protection with secure input devices

The BSI standards contain methods and procedures for a wide range of information security topics and, together with the IT-Grundschutz compendium, represent a de facto standard for IT security. DIN ISO/IEC 27001, or ISO 27001 for short, is an international standard designed to ensure information security in organizations such as companies, non-profit organizations and public institutions.

Physical protection of buildings through secure input devices

A central and fundamental component of modern security concepts is the authentication of users and the authorization of access. Two-factor authentication using a smart card is already state of the art in many cases, especially in highly sensitive areas.

Thanks to the integrated card reader, card-based authentication and access control procedures can be easily implemented with the smart card keyboards KC 1000 SC and the SECURE BOARD. Particularly in companies with many employees, anonymity is so great that access is relatively easy with forged, stolen or fraudulent ID cards. Employees must use security technology responsibly. Personalized access cards provide the necessary level of security. With chip card readers at the key points, these cards can be read quickly in a space-saving manner. This also applies to authentication for IT applications that require access to sensitive data.

Secure, convenient and comfortable: FIPS for US

In addition to ease of use, CHERRY has placed great emphasis on security in the usual manner. The integrated card reader meets the highest security standards and fulfills the requirements of FIPS 201 (Federal Information Processing Standard Publication 201), Personal Identity Verification (PIV) of Federal Employees and Contractors, a standard of the National Institute of Standards and Technology, which specifies the technical requirements for access control for employees and contractors of the US government.

Which chip card keypad best suits your requirements?

  CHERRY KC 1000 SC CHERRY SECURE BOARD 1.0
Reliable CHERRY Keyboard
PC/SC smartcard reader for user ID and offline eHealth transactions
secure PIN entry mode
ISO 7816 compatible
RF / NFC contactless cardreader X
ISO 14443 A/B compatible X
immune to hardware keyloggers & bad USB devices, thanks to encrypted secure mode X
Colors available Black / White Black / White

CHERRY’s Input for Security Users’ Output

Highest security standards

We deliver solutions that facilitate the management of sensitive data while ensuring the highest security standards.

Always there for you

We take care of the technology so that IT professionals can focus on what really matters to them. We serve solutions that ensure durability, compatibility, and reliability.

Innovate for best results

We develop intelligent and secure solutions that enhance work and improve security.

Best in class

We are constantly evolving to deliver quality solutions for every user, accurate in the details with a fair value for the money.

Security Product Highlights