Access control controllers - Expert commentary

The automated future of retail and how to secure it
The automated future of retail and how to secure it

While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimising operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilising data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behaviour. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customisation while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.

‘We want to become better known for access control’ - Q&A with Bosch Building Technologies’ Gregor Schlechtriem
‘We want to become better known for access control’ - Q&A with Bosch Building Technologies’ Gregor Schlechtriem

Gregor Schlechtriem has worked in the access control market for over 20 years and is now responsible for the Access & Intrusion Business Unit at Bosch Building Technologies. In this interview, the expert talks about key industry trends, the impact of the COVID-19 (Coronavirus) pandemic, technical innovations and his company’s strategy. Mr. Schlechtriem, you have many years of experience in the security technology market. What is your background and what are your responsibilities as Senior Vice President at Bosch Building Technologies? Gregor Schlechtriem: I am a trained engineer and electrical technician, and have been involved with access control in the broadest sense, since I started my career in the late 1980s. I started in the field of parking garage technology and then switched to security technology in 2001, as Managing Director of micos GmbH, which specialised in traditional access control. micos GmbH was known for its highly available and highly secure access control systems, for critical infrastructure and government applications. Many systems from that time are still in use today and continue to be supported and upgraded. Bosch is continuing micos’ business here? Gregor Schlechtriem: Exactly, micos was taken over in 2004 by Bosch Security Systems, now known as Bosch Building Technologies. Since then, we have continuously been developing the access control business. Being part of the Bosch Building Technologies division, we benefit a lot from international cooperation with colleagues Being part of the Bosch Building Technologies division, we benefit a lot from international cooperation with colleagues and from overlap with other product lines, such as intrusion detection technology and video security. This gives us the opportunity to implement outstanding project solutions for demanding customers in an international environment. In developing this business, I rely on my experience from other interesting roles at Bosch that I took on, after micos was bought in 2004. For a time, I worked in the European System Integrator Business, which I also had the privilege of managing for several years, as well as being directly responsible for business units. In Fairport, USA, I had the overall responsibility for intrusion detection technology for many years, as I later did in Eindhoven for video systems. Since 2018, the global access control and intrusion detection business has once again been my direct responsibility. At Bosch Building Technologies, we have in the meantime assigned sales to the respective business units, so that we can develop our product and solution portfolio, in close cooperation with sales and our regular customers. Our main task now is to make our access control portfolio accessible to a broader market. We want to make Bosch much better known, as an access control provider, in the international market. After all, with our own access product portfolio, the power of the Bosch Group and over 40 years of experience in this sector, we have a lot to offer. As an expert in access control, how do you see the industry developing? In which direction is it currently evolving? Gregor Schlechtriem: First of all, I see that security requirements are constantly increasing. Whereas there are currently still simple ‘key replacement systems’ that merely record card numbers, such an approach, to a large extent, no longer meets today’s security and user experience requirements.The core task of access control has not changed over the years In the beginning, access control was more or less a kind of key replacement. Later, there was the possibility of increasing security via a pin code, i.e., via verification through simple data inputs. The next step in this direction was biometrics, which is another key step up, because it allows verification by means of unmistakable characteristics. However, the core task of access control has not changed over all the years and has basically always remained the same: access control means determining who has an access request and checking whether this request can be fulfilled. What’s next on this path to greater security? Gregor Schlechtriem: Biometrics-based access control is becoming increasingly powerful and user-friendly through the use of artificial intelligence (AI). Here, data protection plays a major role, as wherever identities are established and movement data is recorded, it is necessary to reconcile the evolving technology with data protection.Biometrics-based access control is becoming increasingly powerful and user-friendly through the use of artificial intelligence The question of data protection is becoming even more significant, as systems increasingly migrate to the Cloud. Bosch puts particular emphasis on ensuring that, even in the cloud, the data generated in access control is always in line with data protection rules, regardless of where it is located. In my opinion, this trend towards the Cloud will continue, because companies are increasingly looking for complete service offerings, so that they can focus on their core business. Also, a system in the Cloud is easier to maintain and always up-to-date with the latest software, which makes cloud solutions even more attractive for providers and users. How can higher security be reconciled with a good user experience? Gregor Schlechtriem: Today, the card still plays a central role in the user experience, as the essential credential. Another current trend is ‘one card for everything’: with the increasing availability of secure multi-function smart cards, the possibility arises to use cards beyond the pure access function, for example, for payment in the canteen, at the catering and coffee machines, and in the parking garage, as well as simple access to other properties and so on.The security of cards has evolved significantly and kept pace with requirements The security of the cards, the reading and encryption processes, has evolved significantly and kept pace with requirements, although we are also facing an installed base that no longer meets these requirements, due to outdated systems. Today, it is standard for communications between reader and card to be encrypted. In some cases, the keys are also only held centrally to further increase security. The security systems industry was also affected by the COVID-19 (Coronavirus) pandemic. How do you think the industry has changed? What technical solutions have emerged during this time? Gregor Schlechtriem: First of all, there is a certain need for retrofitting in the industry due to changes in how buildings are used. For example, American retailers used to be open around the clock and always had staff on site. Now, due to COVID-19, stores are also closed, and this results in a whole new need for intrusion detection and access control systems to protect the buildings. For access control, an obvious task has arisen as a result of the COVID-19 pandemic, namely to track contacts, as far as this is compatible with data protection. We actually expected more to happen here, but in our observation, many companies did quite little, despite clear and simple steps that could have been implemented relatively quickly. The installed access control systems clearly lag behind the technical possibilities. Another topic that the COVID-19 pandemic has brought into focus is hygiene Another topic that the COVID-19 pandemic has brought into focus is hygiene. Companies should actually have invested in contactless systems here and retrofitted speed gates or motorised doors. But in many cases this was not put into practice. The door opener is still often used, which has to be operated manually and therefore, is touched multiple times. But, if everyone presses the same button, that doesn't help hygiene. Surprisingly, this is different in North America. Here, ‘request-to-exit’ proximity detectors are used almost everywhere, which avoids this problem completely and releases the door, when an authorised person approaches it. Mobile access and smartphone-based access control are also growing markets. What kind of developments do you see in these areas? Gregor Schlechtriem: I already mentioned that users increasingly want to be able to use one card for several applications. But, what we are seeing here is that even with the most modern cards, which have a lot of applications loaded on them, we are reaching performance limits and the user experience suffers. If you compare the card with the smartphone as a credential, you have a much more attractive integration platform there, which is significantly faster and delivers much better performance. For us, the mobile credential or the smartphone is the future, because it simply offers more possibilities that the card will not be able to provide in the long term. What is the specific direction Bosch is taking here? Gregor Schlechtriem: We are currently working on a broad implementation. A whole team is working on the user experience around the smartphone, because it’s understood that smartphone-based access has to work just as easily, as it currently does with a card.A whole team is working on the user experience around the smartphone In theory it does, but if you look at some of the actual implementations, this topic is still relatively complex. In terms of user experience and automation, we still have quite a way to go, and we are working hard on that at the moment. The user experience is one side of the coin, the other side concerns establishing security in the smartphone as a whole. In other words: How do I make the smartphone secure enough as a mobile credential, to meet my access control requirements? We are also working intensively on this. That's actually an IT task. Do you do this yourself at Bosch or do you work with external experts here? Gregor Schlechtriem: We have our own powerful Bosch IT, which also manages our company smartphones. If our company smartphones are lost, the data on them is automatically deleted. The devices use biometrics to identify users, before they can access the data. It is a sound security concept that a card cannot offer. Moreover, we are working with other partners in the IDunion project, to create the additional infrastructure around mobile credentials as well. What exactly is the IDunion and what role does Bosch play? Gregor Schlechtriem: Digital identities must be openly accessible, widely usable, interoperable, and secure. This applies not only to access control, but to the digitised economy in general. The IDunion project has set itself the task of creating the infrastructure for this, in the form of an independent wallet, i.e., secure identity storage on smart devices. The project is funded by the German Federal Ministry for Economic Affairs and Energy (BMWI), because digitisation is also a critical social issue. We are intensively involved in the ‘Physical access to the building’ work package in this consortium. Through this involvement, we want to ensure that our access control systems benefit from this infrastructure and are open to future digital business models. Does ‘digital identity management’, which includes biometrics and mobile access, also play a role for Bosch? Yes, it plays an important role for us, and I wouldn’t consider these topics separate Gregor Schlechtriem: Yes, it plays an important role for us, and I wouldn’t consider these topics separate. For me, a mobile device has the advantage that it has already ensured and verified my identity from the moment of interaction. That’s the fascinating thing about it. If I only allow the device to communicate with the access control system, if I have identified myself first, I have implemented biometrics and access control together in a widely accepted process. From my point of view, this is a very interesting perspective, in terms of security and user experience, because the biometrics procedures in smartphones are, I think, the best currently available. In my view, the smartphone has the potential to take over central functions in access control in the future. What are your goals for the access control business of Bosch Building Technologies in the near future? Gregor Schlechtriem: We will continue to focus on specific solutions for large customers. That is the continuation of our current strategy. In these projects, we will introduce new topics as I have just described, i.e., primarily new technology elements. I believe that, precisely because of the longevity of access control, a long-term migration capability is also of particular importance. We want to reach out to the broader market and make more widely available, what we have developed in terms of technology and innovation. We are currently in the process of setting up and optimising our sales organisation, so that it becomes much more widely known that we at Bosch have our own powerful access control portfolio, which can be used for all kinds of applications. In addition, we want to differentiate ourselves in the market with our systems, in line with the motto of our founder, Robert Bosch: ‘Technology for life’. The user experience with Mobile Access should be simple, straightforward, and secure: You hold your smartphone in front of the reader and the door opens.

Get the most from investments in building security
Get the most from investments in building security

From analogue to digital, from stand-alone to interlinked, building systems are in a state of transition. Moreover, the rate of change shows no sign of slowing, which can make it difficult to keep up to date with all the latest developments. If asked to pinpoint the single biggest driver of this revolution, one could point out the growing clamour for platform convergence. A security guard in a building doesn’t want to use different systems to check video cameras, fire alarms or if someone has entered a restricted area: – it simply isn’t efficient. For similar reasons, a building manager wants a single interface to control heating and lighting to match fluctuating occupancy levels, particularly in a hybrid working model. Applying the digital glue The demand from end-users for system convergence is growing, but to achieve full interoperability you still need to apply some ‘digital glue’ and that requires expertise. Yet bringing together disparate systems from different manufacturers can be problematic. Just as you get things to work, someone upgrades their solution and your carefully implemented convergence can start to come unstuck. Managing an implementation can quickly become more complicated, today’s quick-fix can become tomorrow’s headache This is one of the principal issues with all types of new technology; not everyone will choose the same path to reach the desired goal – it’s the old VHS/Betamax argument updated for building management and security systems. Managing and maintaining an implementation can quickly become more complicated than it first appears and without proper oversight, today’s quick-fix can become tomorrow’s technical headache. Effective support for a hybrid workforce Today’s hybrid workforce is a response to the pandemic that looks set to become an established part of working life for many companies across the world. Security systems have a massive role to play in facilitating this transformation that goes beyond simple intrusion detection, access control, and video monitoring. They can identify the most densely populated areas in a building to comply with social distancing guidelines and provide efficient use of space. The insights gathered from a security system can also be used to identify patterns of behaviour, which can then be used for planning and directing the use of building space to help create the best possible working environment while also minimising heating, lighting, and air conditioning expenditures. Identity credentials can help manage compliance with industry regulations by limiting access to certain areas Similarly, identity credentials – either biometric or mobile-based – can help manage compliance to industry regulations by limiting access to certain areas only to approved employees. Creating and maintaining the appropriate level of functionality requires a combination of innovative solutions and industry experience. The complete security package It’s not just physical security that’s important – cybersecurity is a major focus, too. Bringing together both the physical security and cybersecurity realms is increasingly becoming a ‘must have’ capability. What is evident is that the pace of technological change is faster than ever. Today’s functionality simply wouldn’t have been possible just a few years ago, while today’s leading-edge developments may seem commonplace in five years.

Latest Infineon Technologies AG news

The Connectivity Standards Alliance announces Matter, the secure connectivity standard for the future of the smart home
The Connectivity Standards Alliance announces Matter, the secure connectivity standard for the future of the smart home

The Connectivity Standards Alliance (CSA), formerly known as the Zigbee Alliance, an organisation of hundreds of companies creating, maintaining, and delivering open, global standards for the Internet of Things (IoT), announces Matter – the interoperable, secure connectivity standard for the future of the smart home. The proliferation of connected objects continues to change the way one lives, works and plays. From homes to offices, factories to hospitals, connected objects enable one to experience the environments in cohesive, interactive ways. Yet, for too long, disconnected platforms and disparate development paths have caused confusion for consumers and complicated processes for developers and innovators. Promoting new standard Smart objects should be reliable, secure, and work together – this is the shared vision behind Project Connected Home over IP (CHIP), now known as the new standard, Matter. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Matter is the unified IP-based connectivity protocol built on proven technologies Now, there are more than 180 Member organisations of all sizes, across a range of business categories, and over 1,700 Member individuals participating in bringing the Matter specification, reference implementations, testing tools and certification programs to life. Matter is the unified IP-based connectivity protocol built on proven technologies, helping connect and build reliable, secure IoT ecosystems. Truly connected world This new technology and royalty-free connectivity standard enable communications among a wide range of smart devices. Matter is also a seal of approval, assuring that any object built on this standard is reliable by nature, secure by design, and compatible at scale. “We create marks of trust, and Matter is an important milestone for users in our long history of delivering unifying, secure, reliable and trustworthy standards for the IoT,” said Tobin Richardson, President and CEO of the Connectivity Standards Alliance. “I’m very excited to unveil Matter as a foundational element in delivering a truly connected world.” Matter makes it easier for device manufacturers to build devices, and to ensure they are compatible with smart home and voice services such as Amazon’s Alexa, Apple’s HomeKit with Siri, Google’s Assistant, SmartThings, and others.” Simplifying connected experiences The first specification release of the Matter protocol will run on existing networking technologies such as Ethernet (802.3), Wi-Fi (802.11), and Thread (802.15.4) and for ease of commissioning, Bluetooth Low Energy. Other key attributes include: Simplicity – Easy to purchase and use. Simplifying connected experiences. Interoperability – Devices from multiple brands work natively together. Providing greater compatibility. Reliability – Consistent and responsive local connectivity. Security – Maintaining secure connections. Robust and streamlined for developers and users. Flexibility – Matter makes it easy for users to set up and control their devices with multiple ecosystems simultaneously. Simple setup code Retailers get reduced complexity in-store to create a more simplified purchasing experience Breakthrough connectivity is built on Matter, providing greater benefit and value for developers, and those who live or work in a smart home or business. Consumers get an increased choice, compatibility, and more control of their experience. Developers get lower development and operational cost via a single SKU and more time for innovation. Retailers get reduced complexity in-store to create a more simplified purchasing experience, leading to fewer returns for compatibility issues. With Matter, consumers and businesses can choose the brands they want in their smart home or commercial building and be confident they will work seamlessly. Homeowners, and especially those living in a smart home with multiple devices like smart locks, thermostats or smart speakers, can easily add new devices with a Matter mark using a simple setup code to connect their home as one. Single-vendor stacks Businesses, particularly those that rely on connectivity, can count on one network to keep their operations running smoothly. Key for developers is that Matter isn’t only a specification – it also offers an open-source reference implementation in parallel. This drives tangible benefits for developers including: faster time to market, reduced reliance on single-vendor stacks, improved quality since they can access multiple use cases to test against, and increased security with full transparency into the community’s ability to identify and commit patches. Products with the Matter mark connect securely with more devices, more reliably than ever Products with the Matter mark connect securely with more devices, more reliably than ever. The Matter mark will serve as a seal of approval, taking the guesswork out of the purchasing process and allowing businesses and consumers alike to choose from a wider array of brands to create secure and connected homes and buildings. Promise of convergence The new symbol and wordmark of Matter tell its story of connectivity. The name was selected for its foundational nature. Matter is a building block for life, and now also for the IoT. The three arrow forms meeting in the Matter symbol communicate the brand promise of convergence and connectivity in its most distilled visual form. Its geometric construction and triangular nature express security and utility. The badge on the product and packaging, with the Matter symbol and wordmark, notes that a product is Matter certified. The two-colour visual identity has been simplified to represent Day and Night with gradients evocative of dynamic connections between products. The new Matter brandmark was developed in partnership with Interbrand, one of the brand consultancies. Connected home technologies With Matter, smart home devices built on technologies like Wi-Fi will be more interoperable" “Today, millions of customers around the world rely on Alexa as their favorite way to control more than 140,000 Alexa-compatible smart home products, and we are committed to continuing to make smart home connections easier for customers,” said David Shearer, Vice President, Amazon Smart Home. “With Matter, smart home devices built on technologies like Wi-Fi will be more interoperable, making them simpler for manufacturers to develop and certify, and delivering more value for customers.” “As we focus on delivering the best connected experiences to our customers, Matter represents an important step forward in the global effort to make connected home technologies easier to use and more secure, with a high degree of interoperability. We’ve been honoured to work with our industry peers on Matter from the beginning and are excited to be part of its role in shaping the future of IoT,” said Jim Kitchen, Vice President Product, Connected Home and IoT Devices, Comcast. Multi-brand interoperability “Matter will be a leap forward in interoperability. It also demonstrates the power of the collaborative and open-source process within the Alliance that embraces the full IoT value chain and yields results. We are convinced that Matter is a great opportunity, therefore Legrand supports the project since the beginning notably by involving engineers and by participating in test events,” said Bruno Vulcano, R&D Manager at Legrand and Chair of the Board at the Connectivity Standards Alliance. We are convinced that Matter is a great opportunity, therefore Legrand supports the project" “Signify, the world leader in lighting and a long-term leader in the Alliance, is excited to be a driving force in the creation and adoption of Matter. We believe this multi-brand interoperability in the smart home will catalyse the benefit and value of smart lighting worldwide via both Philips Hue and WiZ smart lighting,” said George Yianni, Head of Technology Philips Hue, on behalf of Signify. Developing revolutionary protocol “We believe that a universal standard in connectivity is critical for the industry and Matter is the key that will fully unlock the connected home for consumers. We are proud to lend our historical expertise in IoT and be part of the pioneering team to develop this revolutionary protocol,” said Samantha Osborne, Vice President of Marketing and Business Operations at SmartThings. “Over the past year we’ve doubled down on our technology to enhance our ecosystem to not only welcome future Matter products, but to ensure that they work seamlessly with the thousands of products already within our ecosystem.” Providing diverse options Tuya is dedicated to providing diverse options to power our IoT developer ecosystem" “As an open IoT development platform provider, Tuya is dedicated to providing diverse options to power our IoT developer ecosystem. Matter is important to us and our developers because it enables even easier interoperability between brands and simplifies connections between people and our connected objects. When we can securely and easily connect everything, the possibilities of what we can do with those connections are limitless,” said Alex Yang, Co-Founder and COO, Tuya Smart. In early May, the feature-complete base specification was approved by the Matter Working Group. Reaching this milestone gives Members a definition of the major features to build out the open-source implementation and test the specification. Tracking first devices With this, the project is currently on track to see first devices through certification in late 2021, depending on manufacturer go-to-market plans. Devices targeted for launch include lighting and electrical (e.g., light bulbs, luminaires, controls, plugs, outlets), HVAC controls (e.g., thermostats, AC units), access controls (e.g., door locks, garage doors), safety and security (e.g., sensors, detectors, security systems), window coverings/shades, TVs, access points, bridges and others. Members poised to be early adopters of Matter include: Amazon, ASSA ABLOY, Comcast, Espressif Systems, Eve Systems, Google, Grundfos Holding A/S, Huawei, Infineon Technologies, LEEDARSON, Legrand, Nanoleaf, Nordic Semiconductor, NXP Semiconductors, Qorvo, Resideo, Schlage, Schneider Electric, Signify, Silicon Labs, SmartThings, Somfy, STMicroelectronics, Texas Instruments, Tuya Smart, ubisys, Wulian, and Zumtobel Group. Companies interested in accessing the specification and building devices with Matter can join the Connectivity Standards Alliance.

Infineon and Fingerprint Cards collaborate to drive mass deployment of biometric cards
Infineon and Fingerprint Cards collaborate to drive mass deployment of biometric cards

Biometric payment cards with an integrated fingerprint sensor make contactless payments more convenient, more secure and hygienic. The contactless card remains in the hands of the cardholder throughout the entire payment transaction, while eliminating the need for PIN entries or signatures to authorise even high-value payments. Infineon Technologies AG and Fingerprint Cards AB have joined forces to enable mass deployment of this emerging solution.  The pioneers for security controller in contactless payment and for fingerprint sensors, including their related software, aim to provide card makers with biometric semiconductor solutions which make integration particularly cost-efficient and scalable. The fingerprint information is stored on the card’s embedded secure element and not shared with any third party, thus protecting the user’s credentials.  Biometric payment cards  “Authorising payments without handing over the card is a huge step forward in terms of user experience, data security and hygiene. We selected Fingerprints as they are the leading biometric silicon and technology provider with market proven performance. Jointly, we want to drive the industrialisation of biometric payment cards from a niche into mass market rollout,” said Bjoern Scharfen, Head of the Payment and Transport Ticketing product line at Infineon. Collaboration is key in the payment ecosystem, in which Infineon is a leading player" “Combining Fingerprints’ leading biometric technology with our expertise in chip security, energy efficiency and contactless performance, we will develop a system solution that is easy to integrate and gives our customers a head start in an emerging growth market.”  “Collaboration is key in the payment ecosystem, in which Infineon is a leading player. Together we will produce an optimised solution that will make it easier for card manufacturers to integrate biometrics into future generations of contactless payment cards, ultimately putting these cards into the hands of consumers around the world to enable a worry-free payment experience,” says Michel Roig, SVP Business Line Payments & Access at Fingerprints.  Excellent contactless performance  Fingerprints’ sensor modules, combined with Infineon’s 40 nm high-performance and energy-efficient security controllers based on the 32-bit ARM® SC300™ SecurCore®, fully support the requirements of biometric payment cards. They enable:  Secured matching of the fingerprint image within the security controller where the private data is securely stored Excellent contactless performance despite the increased power required Convenient and reliable enrollment of sensitive biometric data in the card Almost every second payment card with a chip worldwide has an Infineon security controller at its core. Infineon also supplied chip solutions for major biometric card projects and pilots in 2020.  

Sectigo partners with Infineon Technologies AG to provide automated certificate provisioning
Sectigo partners with Infineon Technologies AG to provide automated certificate provisioning

Sectigo, a provider of automated digital identity management and web security solutions, announces a partnership with Infineon Technologies AG to provide automated certificate provisioning for Infineon’s OPTIGA™ Trusted Platform Module (TPM) 2.0 using Sectigo IoT Identity Manager. The integration provides manufacturers with a complete certificate management solution, including issuance and renewal, starting right on the factory floor, with secure certificate creation and insertion using the OPTIGA™ TPM for private key storage. Strong authentication and secure communication “Including a TPM chip in an IoT device design is the first step in enabling strong authentication and secure communication for IoT devices,” explained Alan Grau, VP of IoT/Embedded Solutions at Sectigo. “Together, Sectigo and Infineon are enabling device manufactures to leverage strong authentication and secure communication for IoT devices during the manufacturing of the device itself. This integration not only automates the process of provisioning certificates for IoT devices, but also delivers a complete PKI solution leveraging Sectigo’s highly secure cloud infrastructure.” Device manufacturers across industries recognise the need to strengthen the security of their devices Device manufacturers across industries increasingly recognise the need to strengthen the security of their devices. The Sectigo-Infineon joint solution enables manufacturers to provide the enhanced levels of security required to protect their devices and to ensure compliance with ever-emerging and evolving IoT security standards and regulations across the globe. Device identity certificates For example, manufacturers are able to provision certificates into devices before they leave the factory, so that their connected IoT and IIoT products comply with the authentication requirements of the California IoT Security Law, along with other similar legislation. Device identity certificates enable strong authentication and the TPM—a specialised chip on an endpoint device—provides secure key storage to ensure keys are protected against attacks. The joint solution enables the insertion of certificates into the device during the manufacturing of the device, when the device is first provisioned into a network, or into the TPM chip itself before the chip is shipped to the manufacturer. By installing certificates into the TPM chip prior to manufacturing, manufacturers are able to track the component throughout the supply chain to protect against device counterfeiting, ensuring that only authentic devices are manufactured. Securing and authenticating connected devices Together with our partner Sectigo, we are now also able to offer automated factory provisioning" “Infineon’s audited and certified TPMs enable manufacturers of connected devices to achieve higher levels of security. Together with our partner Sectigo, we are now also able to offer automated factory provisioning. This gives our customers a proven path combining ease of integration with the benefits of higher security performance,” said Lars Wemme, Head of IoT Security at Infineon Technologies. The Sectigo IoT Identity Platform removes the complexity associated with securing and authenticating connected devices so that businesses can protect their infrastructure in an easy, scalable, cost-effective, way. The platform enables enterprises and OEMs to ensure the integrity and identity of their devices and maintain that security by managing certificates throughout the lifecycle of the device. Broad portfolio of security controllers Infineon’s OPTIGA™ security solutions, including the OPTIGA™ TPM, offer a broad portfolio of security controllers to protect the integrity and authenticity of embedded devices and systems. With a secure key store and support for a variety of encryption algorithms, the security chips provide robust protection for critical data and processes through their rich functionality—and are essential for strong device identity solutions because the crypto co-processor can securely store the private key of the device. Infineon’s proven key storage, coupled with Sectigo’s automated certificate issuance and management, delivers a robust, automated and easy-to-use PKI solution for device manufacturers.

Related white papers

10 top insights in access, cloud and more

Protecting dormitory residents and assets

Top 5 ways to ensure visitor safety and security