Secure RFID & Wireless IoT technologies are the key to sustainable applications

Access control, time and attendance, payment or ticketing - in almost all areas of life and work, contactless solutions are used where the highest security standards must be applied. Security, as presented by the experts in this field, creates the necessary transparency in the implementation of authentication applications of all types.

Road and Race-Track Safety

The integration of NFC RFID transponders in leather suits. Why?
Smart Sensor Cards

With display cards and fingerprint cards for ID, banking and access applications, and Bluetooth cards for indoor RTLS and secure temperature monitoring during the transport of medical devices, a new drive is coming to the card industry.
Secure RFID

Protection Against Manipulation, Resistance to Hacker Attacks, Untraceable IDs, and More!
RFID-based security solution

The 'One Card For All' project was initiated together with the property developer Nshama. It currently comprises the following areas: Physical and vehicle access control at a total of 14 entrances and exits to the complex, as well as access control to the leisure facilities, and payment at the attractions.
Keyfob Configurator

AEG ID transfers the widespread concept of new car configurators to the world of RFID for the first time.
Brand Protection

Old Kempton whiskey distillery knocks out counterfeiters with HID Global’s IoT platform for brand protection.
Building automation

Safety first: NFC and cloud authentication opens up a more efficient and secure future on an area of over 300,000 square metres.
RFID File-tracking System

OGTech collaborates with Feig Electronic to provide the Public Prosecution service in Qatar with a comprehensive UHF RFID solution.
Anja Van Bocxlaer
Anja Van Bocxlaer

If you have any questions, requests, or feedback, do not hesitate to contact me.

Wireless Technologies for Security Purposes

In a digital age with an increasing need for digitisation and digitalisation, security is at the centre of this development. The need to continuously update security protocols and design new ways of security and encryption methods is ever-present. The transfer of data in a network or across networks involves the risk of misuse or loss of data.

All articles in this section have been selected with care to not only provide you with information about certain projects but also to give you the opportunity to find the exact fit of supplier, product, or solution for your own project.

Encryption and Protection

Encoded communication is a necessary part of cyber security to protect a business against data theft. But not only the communication in a business, across businesses or in the IoT needs to be secure. In retail or online, payments (e. g. via smartphone) cannot be open to misuse and need to be protected. Banking applications can be protected via password, PIN, or code.

Access Control

With ORM like biometrics or QR code, access and distribution can be managed and controlled or people can be indentified. In the health care sector, self-service station (for medication or laundry) for patients guarantee correct and automated supply, 24/7 availability, and documentation. In pharmaceutics, NFC tags on medication packages can detect tampering.

Cookies are necessary to provide you with our services. By continuing your visit on the website, you consent to the use of cookies.
More information Ok