Wenn
zuverlässige Identifikation
möglich wird

Seit über 25 Jahren ermöglicht LEGIC Identsystems mit Sitz in der Schweiz vielfältige Lösungen für Kunden aus aller Welt.

Die Basis unserer hochsicheren Lösungen ist die LEGIC Security Plattform, bestehend aus modernem Schlüsselmanagement, Trusted Services und kontaktlosen Halbleitern. Sie bietet end-to-end Sicherheit für Smartphone- und Smartcard-basierte Zugangs- sowie Mobilitätsprodukte und -services – bis hin zu gemeinsam verwendeter Infrastruktur und industriellen IoT-Anwendungen.

Weshalb wir
die richtige Wahl sind

Weltweit bauen unzählige Anwender seit über 25 Jahren auf Hardware, Software und Services von LEGIC. Denn unerreichte Flexibilität, höchstmögliche Einfachheit, skalierbare Sicherheit und hoher Investitionsschutz bilden die vier Pfeiler unserer Sicherheitsplattform. Unsere Produkte und Dienstleistungen helfen Ihnen, Ihren Alltag sicher und unkompliziert zu gestalten.

Flexibilität

Ihre Wahl – ganz nach Ihren Wünschen. Jedes Projekt ist anders und jeder Kunde hat eigene Anforderungen. Sie bekommen die Möglichkeit zu wählen – in jeder Hinsicht.

Einfachheit

Wir vereinfachen Ihre Anwendungen im Bereich Authentifikation. So unkompliziert wie unsere Lösungen sind auch wir. Als LEGIC Kunde werden Sie beraten, begleitet und unterstützt.

Skalierbare Sicherheit

Mit dem einzigartigen Master-Token System-Control liegt die Sicherheit Ihres Systems für kontaktlose Smartcard-
anwendungen in Ihren Händen. Um Anwendungen in der mobilen Welt zu sichern, können Sie das Schlüssel- und Berechtigungsmanagement LEGIC Orbit verwenden.

Investitionsschutz

Setzen Sie auf unser Netzwerk. Sie denken langfristig und das tun wir auch. Sie sollen sich keine Sorgen um die Zukunft Ihres ID-Systems machen müssen. Als Teil eines soliden Netzwerks gibt es für Sie immer einen Weg vorwärts.

LEGIC

Geschäftsleitung

 
General Manager

Christoph Beckenbauer

Mitglied der Geschäftsleitung: seit 2015

Ausbildung: Diplom-Wirtschaftsingenieur

Vice President
Innovation & Technology

Marcel Plüss

Mitglied der Geschäftsleitung: seit 2002

Bildung: Diplomingenieur in Elektronik und Softwareentwicklung

LEGIC Identsystems weltweit

Hauptsitz

LEGIC Identsystems AG

Binzackerstrasse 41   ·   8620 Wetzikon   ·   Schweiz
Tel: +41 44 933 64 64   ·   info@legic.com

USA

Tel: +1 514 448 4460
infousa@legic.com

Grossbritannien

Tel: +44 2392 478 033
infouk@legic.com

Deutschland

Tel: +49 2303 870 829
infode@legic.com

China

Tel: +86 21 62884107 
infoasia@legic.com

Unsere

Mitgliedschaften

Zertifikate

[Translate to DE:] FAQs

[Translate to DE:]

Learn more about LEGIC, our history, technology, products, markets and security philosophy.

Company FAQs

(copy 1)

(copy 3)

LEGIC stands for LEG = Legitimation + Integrated Circuit (IC). It is pronounced“LE” as in the start of “Legitimation”, and “GIC” as in the second syllable of “maGIC”.

LEGIC Identsystems AG is headquartered in Wetzikon, Switzerland, approximately 25 kilometers outside of Zürich. The company has sales offices in the USA, UK, Germany and China.

LEGIC has been a trusted supplier of authentication and secure credential management platforms consisting of software services and semiconductor components to leading corporations worldwide for more than 25 years. LEGIC introduced the world's first commercially available contactless identification solution based on 13.56 MHz in 1992.

There are over 100 thousand installations of LEGIC’s security platforms running worldwide. 

LEGIC’s advant and neon technology for smartcard / smartphone authentication and credential management have never been compromised.

LEGIC’s security platform is ideal for enabling applications that require secure, contactless management of the interaction between people and things. Customer applications enabled by the LEGIC Security Platform include: 

  • Access control to buildings, rooms and IT equipment such as terminals and printers.
  • Applications where many users share high-value resources such as car or IT resource sharing
  • Applications requiring managed access to machines and sensitive information such as healthcare or financial data terminals
  • Smart city applications that enable autonomous permissioned control of a building’s operations in response to specific occupant requirements
  • Closed-loop ePayment applications such as corporate canteen or vending services

Security FAQs

(copy 4)

(copy 5)

All credential data stored on a smartcard is encrypted via AES (128/256 Bit), 3DES, DES, or LEGIC encryption. LEGIC Security Modules are pre-programmed with corresponding decryption keys stored in an integrated secure element, meaning they never leave secure environments in an unencrypted form. Keys are also modified after each session eliminating so-called replay attacks.

Smartcards are extremely robust with long lifetime (e.g. can survive in the washing machine). They need no power supply, or software updates. Smartcards support short-range contactless communication, typically 20 cm but can be customized to meet application requirements. This is ideal for high-security apps requiring close-proximity such as e-payment and access control. Smartcards are also low-cost and double as visual identification (photo ID badge).

Smartphones support long-range contactless communications based on Bluetooth Low Energy (10+ m), which is well suited for longer distance applications such as remote control of lighting, heating, etc. or opening garage doors. Android smartphones also support NFC, which also gives them the benefits of close-range communication. Smartphone-based apps can also be instantly downloaded and used which is ideal, as an example, for real-time granting of building or room access and employee onboarding. Smartphone apps can also be integrated with LEGIC’s authentication and credential management software to create graphical-rich 3rd party applications. Smartphones also allow Instant, remotely updatable/revocable permissioning, and have multifactor authentication hardware/software built-in to support fingerprint and facial recognition.

The platform also supports bi-directional encrypted messaging between cloud app and edge devices. This may include any binary data such as text, files, code, etc. It also supports Firmware Update Over the Air (FOTA), and secure hosting of application software in hardware secure element (in addition to encryption key storage).

Between cloud & smartphone; HTTPS over TLS 1.2. Between smartphone and IIoT edge devices (via a LEGIC Security Module); mutual authentication with AES-128 session keys. Between the Security Module and the host controller of the IIoT device, communication is encrypted via AES-128/256 or 3DES. Credential data passing over all these links are further encrypted using symmetrical encryption keys based on AES-128 that are stored in a Hardware Security Module of LEGIC’s Trusted Service. 

V4.2+ Bluetooth Low Energy, RFID and Near Field Communication (NFC) standards ISO 14443 A, ISO 15693, LEGIC RF standard, Inside Secure, Sony Felica, and ST SR series

Credentials are data uniquely associated with an individual user. Credentials include data defining a person’s unique identity, when and where and for how long a user may use a device, which applications are available to the user, e-money balance for e-payment applications, data access privileges, etc. Credentials are provisioned by an (optional) cloud management system and securely stored on a users’ smartcard or smartphone to give them managed access to devices, data and infrastructure.

127 for 4k advant smartcards, for smartphones you are only limited by the memory size of the smartphone.

Security can be scaled up with smartphones by using mobile OS security features like fingerprint/facial recognition, or with an ID solution provider defined PIN that is entered via the smartphone.  For smartcard based applications, measures can be implemented on the reader terminal (biometrical sensors, PIN pad, etc.). For both solutions, any combination can be implemented.

LEGIC Connect runs in IBM cloud hosted data centers located in Switzerland and Germany. Hardware Security Modules (HSMs) are run in a secure, audited environment within Swiss borders only.