Legic
Open your door with a mobile key based on a cloud solution
Legic Identsystems AG is a provider of secure credential and authentication control. They have been the leader in mobile and contactless smartcard technologies via RFID, BLE and NFC for over 25 years.
Challenge
Wanting to maintain its leading position in the market in times of digital change, Legic recognised the opportunities associated with providing cloud-based services. Further, they are placing a stronger focus on mobile applications, enabling users to use their smartphone as an efficient and personal mobile key for payments, mobility, authorised access and more.
How we got there
With the development of a pioneering configuration and key management software, we laid the foundation for the development of a web-based platform for the administration of new data structures for smartphones.
Building up a whole new ecosystem
To establish a highly secure cloud solution we needed to combine NFC-HCE / RFID and BLE technology into the same ecosystem, including different interacting components like Reader, Card, Mobile, Cloud and Key Management.
Taking the green field approach
At the time of the project, there was no standard procedure in the industry for such technologies. We started from scratch with many requirements, such as embedding a browser in the UI or connectivity from the browser UI to locally connected USB devices.
“I identified myself most with Greenliff's approach, especially in terms of future-oriented thinking. This was the deciding factor in getting Greenliff on board as a development partner.” Nicolai Finke, Head of Product Management, Legic
What made our customer happy
Cloud solutions are future-proof
Smartphones have become an essential part of our lives. Using them as mobile keys and managing access permissions through a cloud solution is the next step in mobile and contactless smart card technologies.
One solution for different problems
This mobile key solution is applicable to many different industries, like hospitality to give guests access to their rooms, for mobility services like car and bike sharing, fleet-management or e-charging as well as for various payment services.
Security in the first place
Protection against the increasing threat of hacker attacks was an important topic. That’s why our solution enables service security by integrating four encryption layers.