{"id":13620,"date":"2024-11-19T11:44:07","date_gmt":"2024-11-19T10:44:07","guid":{"rendered":"https:\/\/forum.schreiner-group.com\/?p=13620"},"modified":"2024-11-19T11:44:07","modified_gmt":"2024-11-19T10:44:07","slug":"hardware-security-modules-rfid-projects-a-sure-thing","status":"publish","type":"post","link":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/","title":{"rendered":"Hardware Security Modules: RFID Projects? A Sure Thing!"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1730989817806{margin-top: 150px !important;}&#8221; parallax_background_image=&#8221;13507&#8243;][vc_column][vc_empty_space height=&#8221;615px&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1606213327836{background-color: #ffffff !important;}&#8221; el_class=&#8221;article_bighead&#8221;][vc_column][vc_custom_heading text=&#8221;SCHREINER PRINTRUST&#8221; font_container=&#8221;tag:h2|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;topcategory&#8221;][vc_custom_heading text=&#8221;Hardware Security Modules: RFID Projects? A Sure Thing!&#8221; font_container=&#8221;tag:h1|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<strong>In numerous industries RFID is used to ensure the traceability and identification of objects, for example. However, increasing pervasiveness of this technology entails a growing risk of security gaps. Schreiner Group together with the Schreiner PrinTrust team\u2014the experts in security and authentication\u2014is now using hardware security modules (HSMs) to offer customers comprehensive protection.<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][vc_column_text]The small dark box looks alittle like a normal industrial PC but the interior of this device is anything but normal: It is part of a hardware security module (HSM) with which cryptographic keys are generated, stored, and managed. HSMs protect sensitive data against unauthorized access and tampering. Unlike strictly software-based solutions HSMs offer higher protection because the sensitive information is stored in specialty hardware (the \u201cnormal\u201d industrial PC) that is highly secured and protected against unauthorized access.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;15px&#8221;][vc_column_text]This system clearly differs from conventional ones: symmetric encryption uses only one key for encryption and decryption. That is fast and efficient but if the key gets into the wrong hands the data are in acute jeopardy. Asymmetric encryption uses a pair of keys: one for encryption and one for decryption. That offers higher security but, accordingly, requires higher computing power. Using HSMs, all commercially available encryption methods can be professionally implemented.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;25px&#8221;][vc_single_image image=&#8221;13510&#8243; img_size=&#8221;full&#8221; add_caption=&#8221;yes&#8221; onclick=&#8221;link_image&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][vc_custom_heading text=&#8221;So that the clear response to unauthorized access to sensitive data is: Access denied!&#8221; font_container=&#8221;tag:h2|text_align:left|color:%23004a9b&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:400%20regular%3A400%3Anormal&#8221;][vc_empty_space height=&#8221;15px&#8221;][vc_column_text]\u201cThe security in a project is always only as strong as the weakest link in the total concept. We\u2019re in the fortunate position of being able to offer our customers a holistic security concept with auditable standards,\u201d says Dr. Kai Schnapauff, President of Schreiner PrinTrust. \u201cIn addition to the hardware security modules, it encompasses the integration of suitable, secure RFID chips and of course our in-house ISO 14298 certified security production. As a result, the sensitive keys enjoy constant highly secure protection against access\u2014from external as well as from internal parties.\u201d Maximum security, trustworthiness, and reliability are indispensable components in times where data security is becoming increasingly important. The implementation of the hardware security modules shows that Schreiner Group takes the challenges of digital security seriously and proactively tackles them. For customers, that means comprehensive protection on the highest level.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>In numerous industries RFID is used to ensure the traceability and identification of objects, for example. However, increasing pervasiveness of this technology entails a growing risk of security gaps. Schreiner Group together with the Schreiner PrinTrust team\u2014the experts in security and authentication\u2014is now using hardware security modules (HSMs) to offer customers comprehensive protection.<\/p>\n","protected":false},"author":2,"featured_media":13510,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[189],"tags":[203],"class_list":["post-13620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-schreiner-printrust-en","tag-rfid-nfc-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hardware Security Modules: RFID Projects? A Sure Thing! - Schreiner Group Forum<\/title>\n<meta name=\"description\" content=\"In numerous industries RFID is used to ensure the traceability and identification of objects, for example. However, increasing pervasiveness of this technology entails a growing risk of security gaps. Schreiner Group together with the Schreiner PrinTrust team\u2014the experts in security and authentication\u2014is now using hardware security modules (HSMs) to offer customers comprehensive protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hardware Security Modules: RFID Projects? A Sure Thing! - Schreiner Group Forum\" \/>\n<meta property=\"og:description\" content=\"In numerous industries RFID is used to ensure the traceability and identification of objects, for example. However, increasing pervasiveness of this technology entails a growing risk of security gaps. Schreiner Group together with the Schreiner PrinTrust team\u2014the experts in security and authentication\u2014is now using hardware security modules (HSMs) to offer customers comprehensive protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/\" \/>\n<meta property=\"og:site_name\" content=\"Schreiner Group Forum\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-19T10:44:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/forum.schreiner-group.com\/wp-content\/uploads\/2024\/10\/spr-rfid-hardware-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"markus.liedl@schreiner-group.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markus.liedl@schreiner-group.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/\",\"url\":\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/\",\"name\":\"Hardware Security Modules: RFID Projects? A Sure Thing! - Schreiner Group Forum\",\"isPartOf\":{\"@id\":\"https:\/\/forum.schreiner-group.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/forum.schreiner-group.com\/wp-content\/uploads\/2024\/10\/spr-rfid-hardware-security.jpg\",\"datePublished\":\"2024-11-19T10:44:07+00:00\",\"dateModified\":\"2024-11-19T10:44:07+00:00\",\"author\":{\"@id\":\"https:\/\/forum.schreiner-group.com\/de\/#\/schema\/person\/bd0e2515cfe9118ea30379405cb6f7dc\"},\"description\":\"In numerous industries RFID is used to ensure the traceability and identification of objects, for example. However, increasing pervasiveness of this technology entails a growing risk of security gaps. Schreiner Group together with the Schreiner PrinTrust team\u2014the experts in security and authentication\u2014is now using hardware security modules (HSMs) to offer customers comprehensive protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#primaryimage\",\"url\":\"https:\/\/forum.schreiner-group.com\/wp-content\/uploads\/2024\/10\/spr-rfid-hardware-security.jpg\",\"contentUrl\":\"https:\/\/forum.schreiner-group.com\/wp-content\/uploads\/2024\/10\/spr-rfid-hardware-security.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/forum.schreiner-group.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hardware Security Modules: RFID Projects? A Sure Thing!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/forum.schreiner-group.com\/de\/#website\",\"url\":\"https:\/\/forum.schreiner-group.com\/de\/\",\"name\":\"Schreiner Group Forum\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/forum.schreiner-group.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/forum.schreiner-group.com\/de\/#\/schema\/person\/bd0e2515cfe9118ea30379405cb6f7dc\",\"name\":\"markus.liedl@schreiner-group.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/forum.schreiner-group.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e83202ed81ba95ae0113c3f2d897918a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e83202ed81ba95ae0113c3f2d897918a?s=96&d=mm&r=g\",\"caption\":\"markus.liedl@schreiner-group.com\"},\"url\":\"https:\/\/forum.schreiner-group.com\/en\/author\/markus-liedlschreiner-group-de\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hardware Security Modules: RFID Projects? A Sure Thing! - Schreiner Group Forum","description":"In numerous industries RFID is used to ensure the traceability and identification of objects, for example. However, increasing pervasiveness of this technology entails a growing risk of security gaps. Schreiner Group together with the Schreiner PrinTrust team\u2014the experts in security and authentication\u2014is now using hardware security modules (HSMs) to offer customers comprehensive protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/","og_locale":"en_US","og_type":"article","og_title":"Hardware Security Modules: RFID Projects? A Sure Thing! - Schreiner Group Forum","og_description":"In numerous industries RFID is used to ensure the traceability and identification of objects, for example. However, increasing pervasiveness of this technology entails a growing risk of security gaps. Schreiner Group together with the Schreiner PrinTrust team\u2014the experts in security and authentication\u2014is now using hardware security modules (HSMs) to offer customers comprehensive protection.","og_url":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/","og_site_name":"Schreiner Group Forum","article_published_time":"2024-11-19T10:44:07+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/forum.schreiner-group.com\/wp-content\/uploads\/2024\/10\/spr-rfid-hardware-security.jpg","type":"image\/jpeg"}],"author":"markus.liedl@schreiner-group.com","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markus.liedl@schreiner-group.com","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/","url":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/","name":"Hardware Security Modules: RFID Projects? A Sure Thing! - Schreiner Group Forum","isPartOf":{"@id":"https:\/\/forum.schreiner-group.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#primaryimage"},"image":{"@id":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#primaryimage"},"thumbnailUrl":"https:\/\/forum.schreiner-group.com\/wp-content\/uploads\/2024\/10\/spr-rfid-hardware-security.jpg","datePublished":"2024-11-19T10:44:07+00:00","dateModified":"2024-11-19T10:44:07+00:00","author":{"@id":"https:\/\/forum.schreiner-group.com\/de\/#\/schema\/person\/bd0e2515cfe9118ea30379405cb6f7dc"},"description":"In numerous industries RFID is used to ensure the traceability and identification of objects, for example. However, increasing pervasiveness of this technology entails a growing risk of security gaps. Schreiner Group together with the Schreiner PrinTrust team\u2014the experts in security and authentication\u2014is now using hardware security modules (HSMs) to offer customers comprehensive protection.","breadcrumb":{"@id":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#primaryimage","url":"https:\/\/forum.schreiner-group.com\/wp-content\/uploads\/2024\/10\/spr-rfid-hardware-security.jpg","contentUrl":"https:\/\/forum.schreiner-group.com\/wp-content\/uploads\/2024\/10\/spr-rfid-hardware-security.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/forum.schreiner-group.com\/en\/hardware-security-modules-rfid-projects-a-sure-thing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/forum.schreiner-group.com\/en\/"},{"@type":"ListItem","position":2,"name":"Hardware Security Modules: RFID Projects? A Sure Thing!"}]},{"@type":"WebSite","@id":"https:\/\/forum.schreiner-group.com\/de\/#website","url":"https:\/\/forum.schreiner-group.com\/de\/","name":"Schreiner Group Forum","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/forum.schreiner-group.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/forum.schreiner-group.com\/de\/#\/schema\/person\/bd0e2515cfe9118ea30379405cb6f7dc","name":"markus.liedl@schreiner-group.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/forum.schreiner-group.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e83202ed81ba95ae0113c3f2d897918a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e83202ed81ba95ae0113c3f2d897918a?s=96&d=mm&r=g","caption":"markus.liedl@schreiner-group.com"},"url":"https:\/\/forum.schreiner-group.com\/en\/author\/markus-liedlschreiner-group-de\/"}]}},"_links":{"self":[{"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/posts\/13620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/comments?post=13620"}],"version-history":[{"count":7,"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/posts\/13620\/revisions"}],"predecessor-version":[{"id":13629,"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/posts\/13620\/revisions\/13629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/media\/13510"}],"wp:attachment":[{"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/media?parent=13620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/categories?post=13620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forum.schreiner-group.com\/en\/wp-json\/wp\/v2\/tags?post=13620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}