LI-6343D67CB3716
top of page
Unbenannt-1.jpg

intelligent and self-sufficient hardware that is inaccessible from the outside

In order for your time recording terminals and access readers to work according to the specifications that you store in the software, these two components must communicate with each other. Of course, this communication is reliably encrypted at all times. In addition, we have questioned and tested the security of our hardware in various scenarios and implemented a decisive mechanism that makes the hardware inaccessible to hacker attacks: the hardware registers with the software - without exception and never vice versa.

Das Muss für jedes sichere Cloudsystem

The hardware registers itself with the software - without exception and never vice versa

​Damit Ihre Zeiterfassungsterminals und Zutrittsleser entsprechend der Vorgaben arbeiten, die Sie in der Software hinterlegen, müssen diese beiden Komponenten miteinander kommunizieren. Diese Kommunikation ist selbstverständlich zu jedem Zeitpunkt zuverlässig verschlüsselt.

 

Zusätzlich haben wir die Sicherheit unserer Hardware in verschiedenen Szenarien hinterfragt, geprüft und einen entschiedenen Mechanismus implementiert, die die Hardware für Hackerangriffe unerreichbar macht: die Hardware meldet sich bei der Software an - ausnahmslos und niemals umgekehrt.

Szenario 1:

Scenario 1:
The hardware registers with the software for the first time

During commissioning, the hardware establishes a connection to the software for the first time, in that the hardware registers with the software in encrypted form. A connection is only established if the hardware serial number is stored in the software.

It is not technically possible to connect software to hardware

The hardware always logs on to the correct account 

Scenario 2:
The hardware is connected to the software

Die Hardware ist mit der Software verbunden

If the hardware is connected to the software, there is an encrypted one-to-one connection. Another connection or tapping of the communication is not possible.

Szenario 3:

Scenario 3:
The connection between hardware and software is broken

If there is no active connection between hardware and software, eg due to a power failure, the hardware continues to work independently.

The hardware works independently and is not dependent on a permanent connection to the software

The hardware saves work data locally - encrypted, of course. The hardware works with these until new data is sent to the hardware

If there is no connection to the software, events are stored locally, encrypted of course, until the connection to the software can be reestablished

Szenario 4:

Scenario 4:
Someone is trying to access the hardware from outside while it is not connected to the nubicon software

If a connection is to be established, it must be initiated by the hardware without exception.

If software tries to register with the hardware, it will be rejected.

Our hardware has a proprietary operating system. The knowledge of how it works lies exclusively with us.

Noch Fragen?

nubicon develops location-independent operable time tracking and access control systems and combines security with flexibility. We bring more than 30 years of industry experience together with the latest knowledge of software development. 

Ausführlich oder kurz und knapp - ganz, wie es in Ihren Terminkalender passt.

bottom of page