Integration Examples and Application Scenarios
Our solution is aimed at all businesses for which secure verification of identity is a serious part of their value chain.
With truedentity, businesses and authorities can have faith in the true identity of employees, customers and online service providers and therefore enjoy reliable protection of their internal and external systems and data from unauthorized access.
What would anyone want to steal from us?
Despite regular media reports about data theft and network attacks, many companies still feel a naïve, false sense of security. This means however that they are often overlooking their so-called “golden nuggets”, i.e. that five per cent of their information which is of existential importance for their company’s success and therefore has to be kept secret from competitors and news services. Such information may include strategies, pricing information, new product developments and manufacturing processes.
Employees are underestimated as a source of danger
Each of your employees has access to particular data and IT systems and is therefore a worthwhile target for cyber criminals. Should internal passwords get into the hands of external parties, this can end in catastrophe depending on the length of time in which the compromised situation was not recognized and the extent of attacked employee’s authorizations.
No less dangerous are attacks from within via employees who support or even carry out criminal activities for personal, political or economic reasons. For this reason, auditability and central revocation management are important security mechanisms.
With truedentity, you can have faith in the true identity of your employees and therefore reliably protect your internal as well as external systems and data from unauthorized access. At the same time, the unambiguous identification system allows activities to be allocated conclusively to individual employees in your digital processes (audit trail).
Access security for mobile end-devices
The trend towards out-of-office working independent of time and place via notebooks, smart phones or tablet PCs is increasing every year. Mobile devices offer a great deal of flexibility but also constitute a risk through unauthorized access to your company networks and server systems.
truedentity regulates access by way of employee identification, thereby offering effective protection. This means you can integrate mobile devices into your IT infrastructure without a second thought and have confidence that only the persons authorized by you can access sensitive company data.
Protect your golden nuggets!
- Pricing information
- Product developments
- Manufacturing processes
- And lots more
- Access to company data (data memory, cloud)
- Access security for mobile end-devices
- Windows logon (with FUJITSU PalmSecure truedentity)
- Generation of evidentiary value with digital processes (audit trail)
- Securing internal company networks and server systems
- Access control
- Time recording
Harmonization of identification methods
Large companies and corporations often have several solutions to support internal, workflow-based processes.
With truedentity, different identification methods, such as employee smart cards, login/password and RSA tokens, can be bundled in your company network and combined to create one whole system. Existing infrastructures can be easily expanded, e.g. to connect mobile devices or to use secure two-factor authentication with the new ID card.
Better image through increasing trust
For most consumers, digitalization in everyday life is definitely seen as something positive, as it means being able to make online purchases, execute banking transactions and book holidays at any time and in any place.
Yet anonymity on the internet proves an ideal basis for the theft of digital identities, and, with the increasing abuse of confidential data, your customers’ need for greater security in their online activities increases too.
With truedentity, you can use your customer loyalty cards for secure two-factor access to your web shop. Increase your customers’ trust in your services!
Secure access to your online shop
The use of user name and password represents an increasing risk for you and your customers. Whether caused by careless behavior on the part of consumers or by successful attacks on user data stored centrally in the database, in the wrong hands user name and password grant direct access to your customer system and can thereby cause major damage. By supplementing the login method with a second factor, e.g. your customer loyalty card, unauthorized access to your system can be effectively prevented.
Protect your customers from phishing mails
Bogus advertising e-mails also allow criminals to steal access data through trusting customers. Logging in via truedentity guarantees mutual, unambiguous identification of user and service. If the identity of the website stated in the e-mail cannot be proven with a valid certificate, no data shall be transferred and the customer will receive an error message.
Advantages for your customers
- Security through modern identity authentication and encryption
- Protection against phishing attacks and data theft through mutual authentication
- The service provider’s trustworthiness is confirmed by way of a certificate
- Control over data that is read out and transferred
- Can be used on PC, tablet, smart phone, USB stick, chip card and lots more
- Intuitive and easy to use
The advantages for you
- Reliable verification of your customers’ identities
- Securing your company’s core business by minimizing risks
- Adherence to compliance and data protection requirements
- Increased access security for your online shop
- Better image by increasing your customers’ trust in your services
- Expanding the benefits of your customer loyalty cards, membership IDs, employee ID cards, etc. (powerful chip cards)
- Immediate blocking of identities or access authorizations in the event of loss or theft
Competitive advantage through customer trust
Rely on a tried and tested, recognized data protection and security concept: through using IT security which meets the BSI’s technical guidelines for the new German ID card, you can gain your customers’ trust in your online services.
The forgery-proof identification of persons and devices as well as consistent end-to-end encryption enables banking and financial processes to be executed in accordance with the highest technical standards.
For example, you can expand your bank cards so that they become an unambiguous identity medium and use them for securely logging on to online banking portals, to electronically send bank transfers, to physically access safe deposit boxes and much more besides.
- Protection and document security of electronic data (bank statements, applications, contracts, internal bank documents, etc.)
- Highly secure access to the online banking portal
- Protection against password/identity theft, abuse of accounts, phishing attacks
- Unambiguous proof of electronic data being accessed
- Secure, legally binding opening of bank and custodial accounts
Electronic approval and authorization processes
- Access to bank deposit safes
- And lots more
Unambiguous treatment documentation
In the healthcare system, truedentity is always used when unambiguous identification of a person is desirable for access to particular data or access to secure rooms. One integration scenario for example is the medical documentation of treatments for at-risk patients. Doctors and external care services identify themselves unambiguously using their electronic identity (e.g. via an Android tablet), thereby gaining access to the necessary documents. By way of the electronic identity, it can be proven beyond doubt who accessed the data and performed changes (audit trail).
Other integration examples
- Access control for secure areas (intensive care unit, laboratories, staff rooms, etc.)
- Dispensing of medication
- Clear patient documentation
- Electronic patient documentation (e.g. via electronic forms)
Integration into existing infrastructure
- Open server administration interfaces
- Modular structure
- Multi-client and cluster-capable
- SOAP and SAML connection
- J2EE-compliant solution
Digitalization and IT security in government
From the implementation of digital administration through electronic access to services right up to compliance with legal regulations and formal requirements, governments around the world are facing the challenge of digitalizing their processes while at the same time guaranteeing the highest level of data protection.
As developer of the AusweisApp and the eID server for the new German ID card (nPA), OpenLimit possesses established know-how in the area of eID methods and guarantees a flexible security concept for need-oriented data protection.
The client and server technology provided with truedentity (technology stack) creates a basis for recognized IT processes as well as meeting high compliance requirements in businesses and authorities.
Securing physical and virtual access points
With increasing digitalization, both physical and virtual access to critical state infrastructures is becoming the focus of criminals’ attention. With truedentity, access to buildings and IT systems can, in combination with biometric features for example, be reliably secured using the same technology.
Based on two-factor authentication, the unique identity of the persons or machines concerned is verified before physical or virtual access is granted. The secure authentication technology can be flexibly deployed, thereby offering need-oriented solutions with scalable protection level.
Access protection examples
- IT systems
- High-security areas (e.g. government buildings, laboratories, armories, military bases)
Security for internet-based production processes
The topic of Industry 4.0 concerns every modern production enterprise: how can machines, production facilities, ERP systems and the finished products be efficiently connected with one another? Highly flexible production processes which can be checked and controlled in real-time are emerging. At the same time however, infrastructures’ attack surface and depth of attack are growing. Devices which were previously protected through limitation to the production site can today be reached from around the world via the internet.
With unambiguous authentication of authorized persons (e.g. service technicians), you can reliably control and protect who can access your system when (and via which configuration interface).
Examples of facilities and systems that need protection
- Production lines
- Electricity plants
- Wind power plants
- Traffic systems
- And lots more