ELATEC GmbH - Experts & Thought Leaders
White papers from ELATEC GmbH
What is a universal RFID reader?
DownloadLatest ELATEC GmbH news & announcements
ELATEC, a pioneering manufacturer of access technologies, specialising in RFID readers and credentials, has released its latest software development toolkit, TWN4 DevPack 5.07. The new version delivers faster performance, stronger security and greater flexibility for configuring and managing RFID readers, enabling flexible and future-proof access solutions. Future-ready authentication solutions “With every DevPack release, our goal is to make life easier for developers, system integrators and end users,” said Tobias Rasche, Global Head of Product Management of ELATEC GmbH. “Version 5.07 takes another big step forward by combining deeper diagnostics, broader mobile credential support and open-standard interoperability, all in one powerful package. With this evolution, our DevPack is now more than a development toolkit—it’s a comprehensive framework for building secure, flexible, and future-ready authentication solutions.” Future-proof mobile and security capabilities DevPack 5.07 expands ELATEC’s support for modern mobile ecosystems, giving developers more ways to deliver seamless, secure, and flexible authentication experiences. Built-in integration for Orange PackID, Transact and AccessGrid eliminates extra setup steps, simplifying deployment of mobile ID solutions for campuses, workplaces and customer loyalty programs. New Bluetooth® capabilities enable developers to create fully customised mobile ID experiences and integrate ELATEC readers effortlessly into existing apps and ecosystems. The release also introduces support for PKOC (Public Key Open Credential): an open, vendor-neutral standard that aligns perfectly with ELATEC’s agnostic reader philosophy. PKOC gives customers maximum freedom of choice and stronger protection through asymmetric cryptography, creating a more resilient foundation for future-ready access systems. Additional enhancements Additional enhancements include a new API for MIFARE DESFire EV2/EV3 cards, giving developers greater flexibility in advanced security and feature integration. The PIN-after-card option enables two-factor authentication (2FA) with a well-defined authentication process in physical access (PAC) environments. It is designed for use with wall readers featuring keypads, such as the Secustos. Together, these updates simplify mobile credential deployment while raising the bar for security and interoperability across diverse applications. Smarter tools for development and configuration DevPack 5.07 gives developers and integrators faster insight into reader performance, greater control over configuration and dramatically shorter update cycles. The result: quicker rollouts, easier troubleshooting and lower maintenance costs across even the most complex deployments. Key advancements include: Enhanced Tracer diagnostics: Deeper transponder analysis and broader technology support—including HID DESFire EV3 and SEOS—enable faster, more accurate troubleshooting and performance validation. Compact OSDP configuration updates: The new configuration update cuts time for updates over OSDP by a factor of 10 or greater, minimizes bandwidth requirements and reduces downtime. Wiegand configuration via AppBlaster: Expanded options for Secustos and TWN4 Palon readers simplify migration from legacy Wiegand to secure OSDP systems. These improvements make DevPack 5.07 a more powerful, efficient toolkit for building and managing RFID systems from setup through long-term maintenance. ELATEC’s continued investment “The new DevPack gives our partners the freedom to innovate within a secure, open and future-ready framework,” said Gerhard Burits, CEO of ELATEC GmbH. “It’s a perfect example of our philosophy: simplify what’s complex, protect what matters and prepare for what’s next.” The TWN4 DevPack 5.07 release represents ELATEC’s continued investment in flexibility, interoperability and developer empowerment, making it easier than ever to design and maintain secure, scalable RFID and mobile access solutions across industries.
The Physical Security Interoperability Alliance (PSIA) hosted a well-attended cocktail reception and live demonstration during ISC West 2025 to unveil its latest advancement: the PKOC 3.0 specification, an exciting solution for secure, open credentialing in physical access control systems. Jason Ouellette, Chairman of the PSIA and Corporate VP of Innovation and Technical Partnerships at ELATEC, led the presentation. He shared an overview of PKOC’s progress, key developments in the 3.0 release, and demonstrated a range of interoperable devices—including readers, cards, and mobile applications, built on the freely available, non-proprietary PKOC specification. Broad industry collaboration This year’s demonstration highlighted broad industry collaboration, with support and technologies provided by PSIA member companies including: ELATEC, EMSI, INID Readers USA, Johnson Controls, Kastle Systems, Last Lock, rf IDEAS, Sentry Enterprises, Taglio, and Universal Smart Card. There is a growing list of manufacturers actively supporting the PKOC specification, but these 10 companies showcased products at the event, highlighting its interoperability and real-world applications. Deloitte’s own proof-of-concept The project features PKOC certificates working seamlessly across readers, physical cards, and mobile devices At the reception, Jeff Longo, Director of Software Development at Kastle Systems, announced that the company will officially make the PKOC card its standard card offering—further solidifying its commitment to open, secure, and interoperable access control solutions. Keith Kelly, Chief Security Officer at Deloitte Canada, shared insights from Deloitte’s own proof-of-concept implementation of PKOC at its Toronto office. The project features PKOC credentials functioning seamlessly across readers, physical cards, and mobile devices. Kelly emphasised that PKOC represents “a new generation of access control,” aligned with Deloitte’s priorities around open, flexible, and secure credentialing. Simplicity, security, and scalability David Bunzel, Executive Director of the PSIA, noted, “PKOC is widely recognised as one of the most exciting solutions for secure credentials. Because it is based on an open specification, it is cost-effective—but just as important, it is secure and highly flexible.” Unlike many legacy credential technologies, PKOC is completely open source, with no fees, royalties, or membership requirements. Its simplicity, security, and scalability are fuelling growing interest across integrators, manufacturers, and enterprise users.
ELATEC, a pioneering global provider of user authentication and identification solutions, is beginning 2025 with a significant step forward in its global expansion strategy: the launch of its new office in Dubai. Operating under the name ELATEC Middle East Trading FZE, this new location will serve as a dedicated hub to support the company’s growing customer base and partners across the Middle East. The operations, led by Managing Director Carsten Hoersch, are set to drive innovative, secure, and tailored access control solutions in the region. A strategic milestone in the Middle East Gerhard Burits, CEO of the ELATEC Group, emphasised the strategic importance of this expansion: “Our new presence in the GCC (Gulf Cooperation Council) demonstrates our commitment to strengthening relationships with regional partners and addressing market-specific needs." "This move aligns seamlessly with our mission to provide secure, flexible, and future-ready solutions. The Dubai office is a vital addition to our global network and will act as a springboard for further growth in this dynamic region.” Rapid development and innovation ELATEC’s new office shows the company’s pledge to identification technologies The Middle East is a region of rapid development and innovation, and ELATEC’s new office demonstrates the company’s commitment to identification technologies that empower customers to deliver advanced solutions to their markets. With the launch of ELATEC Middle East Trading FZE, the company aims to foster closer collaboration with OEMs, system integrators, distributors, and other local stakeholders. This local presence allows ELATEC to address specific market demands and offer enhanced customer support and faster response times. Driving localised solutions and collaboration Carsten Hoersch, Managing Director of ELATEC Middle East Trading FZE, shared his vision for the new office: “Establishing a local hub in the United Arab Emirates enables us to work hand-in-hand with our partners and customers, developing innovative solutions that add real value to their businesses." "Our focus is on building trust, delivering top-tier support, and driving advancements in secure and seamless access technology tailored to the region’s unique requirements.”
Insights & Opinions from thought leaders at ELATEC GmbH
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
The smartphone is an integral part of our daily routines. The communication and entertainment device of yesteryear has become a serious player with which we increasingly handle sensitive processes, such as payment transactions. BLE or NFC authentication At the supermarket checkout, more and more customers are pulling out their smartphones instead of their wallets. Apple Pay, Google Pay, or specific banking apps make it possible: to hold the smartphone in front of the reader of the checkout system, and the transaction is completed without contact. In technological terms, either Bluetooth® Low Energy (BLE) or Near Field Communication (NFC) is used to complete the authentication and authorise the payment process. Benefits of smartphone authentication Issuing cards, taking them back, blocking and replacing lost cards all is no longer necessary Smartphone authorisations are also becoming increasingly popular for access solutions. The advantages are obvious. Users do not need an additional medium to gain access to the building or data. For the IT department, the switch is just as convenient. Issuing cards, taking them back, and blocking and replacing lost cards are no longer necessary, saving time and money. Card systems However, card systems are still irreplaceable in some cases. For example, in manufacturing environments where smartphones are often prohibited. Country-specific regulations also play a role: not everywhere is the professional use of private cell phones permitted. In Germany, for example, data protection is an obstacle; on the other hand, not every employee automatically has a company cell phone. Card or smartphone? The question "card or smartphone?" is not necessarily a matter of choice. There is much to be said for hybrid use, especially since the card and smartphone share numerous strengths: both are suitable for building access and for secure data access, and both can be used for applications such as secure printing and for time and attendance systems, to name just a few examples. This is also the reason that a hybrid system using both media is an excellent solution for many companies. Technological transition The transition from card to smartphone often raises concerns in companies at the beginning As with any technological transition, the transition from card to smartphone often raises concerns in companies at the beginning. After all, seamless security must be maintained at all times, and productivity should not suffer due to technological innovations for example, because users suddenly have difficulty accessing the data and programs they need for their daily work. In addition, deployment scenarios are very individual from industry to industry and organisation to organisation, and a wealth of questions must be clarified in advance. Flexible universal readers ELATEC is at the user's side as an experienced partner and with the appropriate systems, including software. With its universal readers, for example, users remain flexible and can handle cards and smartphones in parallel operation. This "soft migration" is often the best way: take a relaxed approach and see how mobile access authorisations are accepted in an organisation and how they work for user-specific purposes.
Identity management is an important element of both data security and physical security in an organisation. But all ID management solutions are not the same—especially when it comes to security. There are no uniform security standards for the industry, and many off-the-shelf systems fall short when it comes to data protection. To protect people, property, and data, make sure you select a system that maximises security at every stage. What is identity management? Identity management—also known as ID Management (IdM) or Identity and Access Management (AIM)—is a framework for managing digital identities and controlling who has access to what. It includes both policies laying out what types of access different people should have and technologies for enabling and enforcing those access controls. An identity management system makes it easy for IT to define access levels for individuals or groups within the organisation. Each user is assigned a unique identity within the system with specific user rights and restrictions These systems enable companies to increase security and productivity while reducing the costs and labour associated with security efforts. At the lowest level, identity management involves defining what a user is allowed to do on a network, with what devices, and under what circumstances. Each user is assigned a unique identity within the system with specific user rights and restrictions. Specific business system For example, what files, business systems, and programs is the user allowed to access? What are they allowed to do within a specific business system? What physical locations and resources are they allowed to access, and at what times? Access rights and restrictions may be role-based or individualised. An IdM system may provide the backend for a Single Sign-on (SSO) system that controls access to everything on the network with one user identification key. Many security products focus on mobile device management (MDM) systems that control access of devices to the corporate network. As more workers shift to remote and hybrid models, managing what devices are authorised to connect to the network, how users are authenticated when they log on to the device, the activities that can be performed by these devices while on the network, and the data and applications they have access to while offline is essential. Meeting the security challenge Ultimately, the ID management system is only as secure as the access system it connects to In an IdM solution, the user administration system that provisions the roles and rights within the system is linked to an access system that verifies the identity of the user. Ultimately, the ID management system is only as secure as the access system it connects to. Access systems include input screens for passwords or PINs, biometric input systems (such as fingerprint or facial recognition), or readers that connect to identification media (such as an ID badge or smartphone) via Radio-Frequency Identification (RFID), Bluetooth® Low Energy (BLE), or Near-Field Communication (NFC). Some systems may require multifactor identification. RFID and smartphone-enabled BLE and NFC access systems are highly popular for their combination of security, reliability, user convenience, and ease of administration. While there are many access systems available, there are no uniform standards for security—and many standard systems are not very secure. User administration system When evaluating security for an IdM and access system, there are two important aspects to consider. Data storage: How is data stored in the IdM system and on the local reader or input device? Are user identities, rights, and activity logs stored in an unencrypted table on a single server or device? Is a blockchain system used for data storage? Or something in between? Data transmission: How is data transmitted between the access system and the user administration system? Is data transmitted in encrypted form? Is the Advanced Encryption Standard (AES) used? Security starts with the creation of the user ID and identification medium Security starts with the creation of the user ID and identification medium. To protect business data and systems, organisations should look for an IdM solution that uses industry best practices for encrypted data storage and transmission. If using ID badges—as a majority of organisations still do—they also need to consider how and where those badges are produced. Industry best practices For example, our partner evolutionID offers a secure ID-Management system with extended security functions. In-house badge production enhances security by eliminating the need to send sensitive, personalised data to a third-party badge printer. It also streamlines the badge production process, so employees can get their badges right away without waiting. With the creation of the identification medium, individual security features such as biometric properties, user ID, and permissions can be programmed directly onto the transponder card using an RFID reader or distributed to relevant systems by interfaces. This system maximises security and gives organisations the tools they need to customise their security concept for their needs. On top, cost-saving self-service features such as image acquisition or badge management are available for every employee on any device.
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download