Buyer pains we hear most

  • NFC and RFID antenna tuning needs golden-unit reference per board revision
  • Credential keys must not leak during production
  • Vandal resistance has to survive years of public installation
  • GDPR obligations follow stored credentials all the way back to manufacturing data

Typical product traits

  • NFC or RFID front end with tuned antenna
  • Secure element (ATECC608, NXP, or similar) for credential handling
  • Compact reader form factor or DIN-rail controller
  • Tamper-evident or tamper-resistant enclosure

Regulatory environment

EU Radio Equipment Directive

2014/53/EU

Access control product standard

EN 50133-1

GDPR

Regulation (EU) 2016/679

Test plan considerations

  • RF tuning verification per unit
  • Credential round-trip test with reference card
  • Tamper detection sensor verification
  • Enclosure seal and durability sample test

Frequently asked questions

How do you handle embedded software and secure provisioning?

We support X.509 certificate enrollment, secure-element key injection (ATECC608, NXP EdgeLock), eFuse and OTP programming, and provisioning to AWS IoT Core, Azure DPS, and custom PKI. Private keys can be HSM-generated and never exposed to host systems.

Do you sign NDAs and how is IP handled?

NDA on request before file exchange. Firmware binaries and signing keys are stored under access controls and never shared outside the production line. Production data and per-unit logs remain available to you for audit.

What does box-build assembly include?

PCBA integration, cable harnessing, mechanical fixturing, gasketing for IP rating, antenna placement, label application post test, and packaging to your spec. We confirm scope on each project so handoff between PCBA and final box is clean.

Quote access control hardware

Send your product files and a short description. We respond within one business day.