Challenging government identification projects call for a deep understanding of security needs that extends beyond security chips to cover all solution layers in the ecosystem.
Hardware components enriched with software and services
One-stop, ready-to-go solutions
Our fully certified solution bundles combine the market’s most advanced chip card controllers with optimized software from our trusted partners. Their bundled strengths will speed your time-to-market and business success without you having to invest heavily in development effort or human resources.
To meet your varied and complex needs, we offer native and Java partner Operating Systems as well as inlay or electronic cover solutions in combination with well-proven secured supply chains.
Solutions beyond controllers – for today’s eID challenges
We have a long-standing track record in the successful delivery of bundled solutions for electronic identification projects worldwide. German, American and many other governments rely on our solutions in high volumes for their eID documents.
|556 KB||08 三月 2017||03_17|
|1.7 MB||17 四月 2012||04_12|
|2 MB||13 九月 2012||04_12|
Product Selection Guide
|2.1 MB||03 十一月 2015||11_15|
|3.2 MB||09 五月 2017||05_17|
|1.5 MB||18 二月 2016||02_16|
|314 KB||11 四月 2017||04_17|
|226 KB||26 四月 2017||04_17|
|218 KB||26 四月 2017||04_17|
|228 KB||26 四月 2017||04_17|
|214 KB||26 四月 2017||04_17|
|406 KB||21 一月 2013||04_12|
In 2016, the 4th generation of electronic passports becomes reality and includes LDS 2.0 technology. LDS 2.0 enables such use cases as online visa download, eGate use for visa holders and automated reading of travel records. All requirements of LDS 2.0 are supported by Infineon’s product portfolio, today. Watch this video to learn more and get on track with LDS 2.0.
Mobile identification is on the march. It enables a wide range of mobile services at your convenience. At the same time it needs safeguard of your vulnerable privacy more than ever. This demo is about how to book a car with your mobile ID, showing the prozess of identification, authentication and authorization.