RFID (Radio Frequency Identification) is a form of automatic identification and data capture (AIDC) technology that uses electric or magnetic fields at radio frequencies to transmit information. AIDC technologies are also known as Automatic Identification Systems and Automatic Identification Technologies. The terms automated and automatic are often used interchangeably. Other AIDCs include smart cards, optical memory cards, contact memory buttons, and satellite tracking systems. RFID technologies are being deployed by many organizations because they have the potential to improve mission performance and reduce operational costs as well as reduce corporate exposure. An RFID system can be used to identify many types of objects, such as manufactured goods, animals, and people. RFID are used in virtually every industry - manufacturing, healthcare, education, hospitality, government, production, logistics etc. to manage inventory, tack items, monitor device conditions and protect items in transit or storage from unauthorised access or usage.
Each object that needs to be identified has a small object known as an RFID tag affixed to it or embedded within it. The tag has a unique identifier and may optionally hold additional information about the object. Devices known as RFID readers wirelessly communicate with the tags to identify the item connected to each tag and possibly read or update additional information stored on the tag. This communication can occur without optical line of sight and over greater distances than other AIDC technologies. RFID technologies support a wide range of applications everything from asset management and tracking to access control and automated payment.
Each object that needs to be identified has a small object known as an RFID tag affixed to it or embedded within it. The tag has a unique identifier and may optionally hold additional information about the object. Devices known as RFID readers wirelessly communicate with the tags to identify the item connected to each tag and possibly read or update additional information stored on the tag. This communication can occur without optical line of sight and over greater distances than other AIDC technologies. RFID technologies support a wide range of applications everything from asset management and tracking to access control and automated payment.
We partner with various OEM and software developers around the globe to offer specialised services from RFID integration to complete enterprise system in the following areas:
Our e-ticketing service helps to cut fraud and enhance passenger's experience, and is designed to reduce the number of transactions and delays associated with paper tickets. The ticket shall come in the form a smartcard or a bank-card-sized stored value card which can hold a variety of single tickets, period tickets and travel permits which must be loaded onto the card prior to travel. It is also a contactless smartcard which passengers must touch onto an electronic reader when entering and leaving the transport system in order to validate it or deduct travel cost. The cards can be recharged in person from sales points, by recurring payment authority or by online purchase. Using contactless technology, passengers can board buses, and trains quickly and simply with a wave of their e-ticket.
A nation that does not know how many they are is a recipe for failure in governance in today�s global village. Crime control and investigation will be in shambles; national development planning will be based on estimates of unreliable and non-credible or crooked population data. Gone are the days when nation relies on population census conducted every long interval of years for economic and development planning, today, at the touch of a button a nation should be able to display its demographic data. Nowadays, the dislocation of population is faster and the rate of growth in particular Nigeria, is higher � thus the need to have a fair grip on demographic figures is undeniable. At SMARTECH, we offer an integrated solution for the provision of National ID system � from the initial planning, relevant legislation, to roll-out and management of the National ID infrastructure. Our ID format comes with high physical and cryptographic security features in 2 or 3 factors authentication mechanisms � what you have (a contact/contactless smart card); what you know (password or PIN); and what you are (a biometric). Our product conforms to all relevant ID card standards and specifications as well as industry requirements.
With the incidences of ghost workers in our payroll administration, Smartech is offering an integrated smart card solution that combines security with automated identification and authentication for access to offices and facilities. The card consists of multiple factor authentication solution (biometric, password) and uses contactless technology that allows the staff to just wave its card at an automated entrance. The card can be deactivated or denied access upon a restriction order, and the cardholder credentials can be securely updated and managed as and when required.
[SMARTECH offers an integrated campus ID card management system using smart cards. The campus card solution is multi-applicative and verifies student�s identities, granting them access to university/college premises including libraries, dormitories and sports facilities. Apart form the highly secure authentication of students ID, it also contain student campus record life cycle, and e-Purse which can be used for payment at university bookshops and any school registration expenses.
Drivers Licences are unquestionably a crucial means of Identification, however this document is frequently forged leading to potentially unsafe driving environments and identity fraud. We offer a complete contactless smart card lifecycle management system for the delivery of a Digital Driver Licence Card Issuance System, with the power to mange complex applications across a range of parameters. Our secure Driver License solution ensures the smooth delivery of Driver Licences through smart card technology. The Drivers Licence expiry date and other relevant information loaded onto the card can be read and verified by inspection agents upon presentation using an RFID smart card reader.
With the colossal loss of revenue by the insurance companies year-in year-out due to forgery of the paper-based Third-Party vehicle insurance certificate, our application transforms vehicle insurance certificate issuance to a paperless, highly secure and forge-proof document. The system uses a contactless smart card with highly secure cryptographic algorithms to protect vehicle insurance details/certificate from forgery. The vehicle insurance expiry date and other relevant information loaded onto the card can be read and verified by vehicle insurance inspection agents upon presentation using an RFID smart card reader. The RFID card comes in the form of a key holder that will equally hold your car key. This solution can be integrated with other vehicle permits such as Hackney permits, road worthiness etc.
In today�s cybercrime infested IP-network world, and with the increase in the volume of internet-based B2B transactions and e-governance, the security of your information or data cannot be overemphasised. In SMARTECH, we offer our clients � individual, corporate or government institutions reputable proprietary and standard symmetric cryptographic systems for your encryption and decryption requirements to protect your business secrets and data on transit, on the internet, or stored in your drives from unauthorised access and malicious usage/damage. Depending on the level of data security required by clients, we offer unbreakable symmetric ciphers with various key lengths ranging from 64bits to 1024bits. We provide various key storage and distribution solutions to ensure that your keys are well protected and available whenever users need it.
In addition to the symmetric keys service we offer above, we equally assist our clients to procure public keys for their day-to-day authentication requirements as well as for cryptographic key exchange for their information transactions. We offer highly secure and unbreakable standard public key systems, and our services covers the entire key management life cycle � from key generation, key certification, key issuance, key change, and key verification to key destruction. We collaborate with reputable key certification authority to ensure that your public keys are acceptable to a third party for any of your transaction.
As B2B transaction transcends from traditional paper-based or hard copy to paperless-based or soft copy, the need for the use of digital signature is becoming irresistible. Even within an organisation, memos, letters and documents are sent via email or other form of ftp, and the idea of using a scanned physical signature on such documents give room to malicious action in which case document can either be forged or even repudiated by the sender. In Smartech, we assist our clients to procure and manage standard digital signature for your authentication and validation requirements in information processing.
CoSign is a revolutionary digital signature developed by ARX incorporated and are in partnership with SMARTECH. CoSign enables users to digitally sign documents with their usual handwritten signature and allows anyone to seamlessly verify and retain proof of identity, intent and document integrity without costly, complicated, or proprietary software. CoSign digital signature solution produces legally enforceable and non-repudiation of electronic documents/records, meets all of the criteria for security and complies with all of the legal standards of PKI technology, and it is globally acceptable.
CoSign digital signature solution automates approvals affordably in a compliant manner, allowing organizations to go paperless, expedite business processes and reduce costs. It is the only digital signature solution that works seamlessly with all popular document formats and business applications such as Microsoft� Word, Excel�, PDF, SharePoint, InfoPath�, Adobe� Reader, AutoCAD�, Bentley� MicroStation, Outlook�, TIFF, and others.
The CoSign digital signature solution counts some of the most successful organizations throughout the world among its customers. With customers in industries including the financial institutions, life sciences, engineering, healthcare, government, and technology; the CoSign digital signature solution has a proven value in any vertical and horizontal markets. For further enquiry or to learn more about how a digital signature solution can reduce costs, accelerate workflows in your enterprise and improve relationships with customers and partners,
please contact us at info@smartechinfosec.com or download a pdf document .
Governments, public institutions and corporate organizations need to have an Information Security Management System in place especially in today�s digital world where most activities of which they are involved with or have an interaction with the public is through the internet, or in another way store or capture data.
Thus having an ISMS provides an indication that the company is using a well defined approach to management, identification and assessment of information security risks and hence they can tackle issues in relation to confidentiality, integrity and availability (CIA) that have great impact on the company�s ability to survive and do business.
Key amongst the management systems which are some of the competencies of our company are the ISO 27001 and ISO 9001 standards and certification. It is very important for large organizations such as banks, telecommunications, financial and health institutions, public or government to address security risks and make it high priority.
ISO 27001 & ISO 9001: We will take you through the process of obtaining this certification and audit and keep the process going in your organisation. It is designed to address the security risks and entrench controls to reduce security risks within the organisation and at the same time let your customers or the public know that their data or transactions are safe and secure and meet legal, and/or regulatory compliance requirement.
Forensics is a very important element in the 21st century in an organizations computer security and network. At SMARTECH, we have the expertise and required technical acumen to collect and analyze data from networks, computer systems, communication and storage devices in a standard way, that not only is admissible in court of law but also available to the organizations as a deterrent to further crime or risk to assets and the collection of important information which could save money for the clients.
We also offer Forensic Consulting Services where the clients will be saved a lot of adverse issues before it occurs to the detriment of the company and it becomes pertinent and injurious to the firm.
Contact us at info@smartechinfosec.com and we will pay you an assessment visit.
Get the maintenance management tool you need to cut costs, improve operational efficiency, and make better strategic and operational decisions faster. We partner with Smartware Group to offer Bigfoot CMMS which has deep industry functionality across the manufacturing, engineering and utilities sectors, making costly customizations a thing of the past and allowing you to work both smarter and faster.
Since 2002, Bigfoot Computerized Maintenance Management Software (CMMS) has held a proven track record of managing the maintenance needs of organizations worldwide - whether there is 1 site or 1,000. Its full, web-based functionality paired with intuitive design allows you to learn the system quickly so you can get results quickly. Bigfoot is used by over 1,500 organizations - large and small � in a number of industries throughout the world, in the manufacturing, oil service and construction companies, utility companies etc.
Bigfoot Web functionality includes work order, asset and equipment management, maintenance requests, preventive and predictive maintenance, inventory, tool crib, and built-in reporting and analysis. Integration is also available with other systems, such as ERP, Accounting, Purchasing, Building Control solutions, and Active Directory.
Learn more about Bigfoot CMMS for your organisation by e-mailing info@smartechinfosec.com for a complimentary Bigfoot demonstration today.