Access control

How secure is your access control? Are there end-to-end encrypted communication protocols in real time? These and other questions have been on our minds at Autec since 1989, when we were one of the pioneers of encrypted communication. Today, we are one of the leading international providers of integrated solutions ranging from access control and access control with visitor management to time recording and time management.

Our access control simplifies and optimizes relevant security tasks for organizations and managers in an increasingly complex working environment. The software is modular and can be expanded and scaled depending on the application. It can be adapted to changing security requirements and provides audit-proof documentation of which persons have been granted access and when, ensuring that only authorized persons are granted access. This makes it easier for those responsible to meet their information obligations towards internal departments and supervisory authorities, while at the same time saving valuable personnel resources, as it accelerates and automates the control and allocation of access authorizations across organizational units and locations. Manual intervention is reduced thanks to stored rules and workflows. IT security officers are relieved and can focus on important security-critical tasks.

XMP-BABYLON fulfills the requirements of the German Federal Office for Information Security and is therefore KRITIS-compliant:

  • Real-time capability (changes and events)
  • Storage of data in the secured areas.
  • Secure key generation and management (Never-Visible Keys).
  • Data communication with high-quality encryption
  • Branch module – enables globally networked companies to update data in real time
  • Maximum data security and data consistency.
  • Cybersecurity: “Security by design” and “Security by default”.
  • Simple administration and operation
  • Conformity: Consideration of laws and standards (e.g. GDPR and EN 60839).
  • Open system architecture: API with a variety of interfaces enables data exchange with other systems.

Our drive is to develop products and solutions with the best technical customer service for our partner companies. Thanks to our close proximity to our partners, we can better understand them, anticipate their needs and adapt with agility to support their actions.

A central product is the door controller, which was designed to be extremely open from the outset. This openness allows OEM partners and system integrators to develop their own applications and integrate a variety of card readers (e.g. via the OSDP V2 Secure protocol). This flexibility allows customers to implement AUTEC solutions in different environments and applications to meet their specific security requirements.

This openness extends not only to the hardware, but also to the software. The open architecture of the software enables OEM partners, system integrators and end customers to develop their own interfaces, applications and interfaces. This flexibility ensures that our solutions are not only technologically advanced, but can also be adapted to the specific needs and requirements of users.

We support the OSS-SO theme and thus offer our customers a wide range of offline locking devices. This allows customers to expand and customize their security systems with a variety of devices from different manufacturers, while ensuring seamless integration into the existing infrastructure.

In an increasingly networked world, the issue of interoperability is becoming more and more important. The card readers support the OSDP V2 Secure protocol, which enables seamless integration into third-party systems. This interoperability capability extends the range of applications and offers our customers greater independence.

Control access with your smartphone. With the XMP2GO app, you can manage access rights efficiently via your smartphone. We offer you an access control solution for digitizing RFID badge media. There is no need to use a cloud because the data and virtual credentials are created and managed securely on the XMP-BABYLON server.

This is how it works:

The mobile credentials are usually sent to the user by e-mail and imported into the XMP2GO® app via smartphone. For additional security, a PIN code is generated for each credential, which in the best case is communicated to the user in a second way (SMS or by telephone). This PIN code is only used to verify the person, i.e. the smartphone does not know whether the PIN code entered matches the PIN code stored in the database. This verification is performed by the XMP-BABYLON server and/or the door controller.

To encrypt and decrypt the mobile credentials (AES-256-GCM), a key generated by the customer must be stored in the door controller and on the XMP-BABYLON server. In contrast to other mobile solutions, the Bluetooth module does not decrypt the data, as the badge reader is located in the unsecured area, but the door controller takes over this task. This means that theft of the badge reader still secures the project, as no key information is stored in the badge reader when XMP2GO® is used

© Autec Gesellschaft für Automationstechnik mbH