We work.
For you. What RFID can do for you. With ELATEC.

Does your company operate in a dynamic environment, aim to secure opportunities for the future, and rely on trusted partners to do so? For almost every industry and application, ELATEC offers flexible RFID solutions that let you benefit in several ways.

Technologically. Practically. Financially.
Because our triad consisting of service, software and hardware works.

Would you like to
know the details?

Not all RFID is the same

If you want to get the most from your RFID technology, you need to make sure that you not only have the right hardware, but the right software and service, too. The quality of the products is one thing. Working together as partners and having a service mindset is the other.

You won’t find another company that can meet your individual needs as a customer as extensively as we do. We offer software that is more comprehensive and customizable than any other.

We guarantee that you receive support from ELATEC experts who solve problems quickly and competently. And we develop and deliver products that are so universal – and thereby versatile and flexible – that they will be able to keep step with your company’s growth and development. And what’s more: Together, we can use them to tap even greater potential for your company.

In a nutshell: If you are looking for the ideal RFID, you have found the right place with ELATEC. Because we live and deliver what we promise. Maximum dependability and efficiency – individual solutions – universal technology.

You will only find this here


Compatible with more than 60 transponder technologies


Runs on LF and HF and with NFC and BLE


Certified in up to 110 countries*


Remotely configurable and updatable


Partnerships with specialized providers such as HID Global, LEGIC and NXP

How you can benefit from RFID in other areas

Contactless user authentication and access control have become an indispensable part of our everyday (work) lives. Give your customers, employees and partners in other fields of application the convenience of RFID.

You have questions. We have answers.

The need for tamper detection varies widely between RFID applications, so it’s important to consider the level of security required for your specific use case. For example, card readers attached to multi-function printers (MFPs) for releasing print jobs in an enterprise environment can be considered less critical, since tampering with the reader can ultimately lead to downtime for the printers but will not compromise the safety of your documents. Typically, in such scenarios the card reader works hand-in-hand with the MFP and a print management solution that ensures the release of print jobs. Therefore, if the card reader is sabotaged or tampered with, the MFP or the print management software simply prevents the release of any information. On the other hand, high security environments such as data centers certainly need a more secure RFID reader solution. One would need to thoroughly evaluate the consequences of any attempts directed towards compromising the device integrity or the data associated with the device. Depending on the application, the credentials involved, and the data that is being exchanged with the card reader and eventually the host, tamper detection technologies can improve the security of the device. There are several technologies in the market such as mechanical and optical tamper detectors that can be embedded directly on the card reader for superior protection against threats.

Just like your smart phone or laptop, an RFID card reader will occasionally need a firmware update or new configuration. This is typically done to address emerging security requirements, to expand the number of technologies the reader is able to read, or to introduce new functionality. Depending on the type of data that is stored in the firmware, it may be desirable to encrypt the new configuration data or firmware update for higher security. Encrypted firmware or configuration files can be safely shared with end customers to perform updates to existing readers or with the card reader manufacturer to load new readers with the update. Using encrypted files secures the sharing process and the update process to eliminate security risks that arise with a firmware update.

The need for encryption depends on the type of data being exchanged or stored by the reader. For example, if the reader is merely reading static card numbers from the RFID media and isn’t using data protected by encryption keys, the firmware and/or configuration files do not need to be encrypted, since these files do not carry any sensitive information. The need to encrypt configuration/firmware files arises if the data that is being read by the reader contains any personal information or is part of a proprietary corporate format that is confidential. Secure transfer of data is also needed if a customer decides to move to a higher security credential encrypted with keys. This means that the card readers (which may be existing or new) must have a configuration that holds these keys. In these scenarios, the configuration and firmware files must also be encrypted since they hold sensitive information.

It is essential to choose a card reader that supports the security features appropriate to the requirement of the customer. ELATEC TWN4 RFID readers support the exchange of encrypted files for secure configuration and firmware updates.

* for TWN4 MultiTech 2 BLE programmability

Get in touch with us