Ask an experienced design team to conceptualize the perfect multi-factor reader. Allow unconstrained design of all new hardware and software. Modularize the innovation in step with implementation paths recommend by SP800-116. Give the solution a form that blends into any environment, and is intuitive to manage and use.

Introducing the Cheetah
 
 

SP800-116 provides Federal agencies and non-governmental organizations with risk-based guidelines for the incremental rollout of PIV-enabled access points. The PIV Implementation Maturity Model (PIMM) defines stages in the process, which progress from casual Ad Hoc PIV verification, to secured “Controlled, Limited, Exclusion” zones where specific PIV authentication mechanisms are mandated. Unfortunately PIV-enabled authentication devices have not been in step with the SP800-116 guidelines, making the incremental deployment of PIV cards difficult and expensive. Most PIV implementations ceased all forward motion at the lowest PIMM maturity levels. The Cheetah paves the path to full PIV deployment.

 
 

Modular Design Protects Investment

Start with the Cheetah Core, and then gain new authentication modes by simply adding an extension module. The Core investment is retained as an organization expands the use of PIV authentication. Repurpose Core units as the security zone mix changes.

  • True snap-in expansion
  • Module autosense firmware
  • On-site conversion
 
 
 
 
 
 

PIV Authentication Mechanism

  • Free Read CHUID
  • CHUID Signature
  • Card Authentication Challenge

All readers are OCSP compliant for certificate path validation

State Of The Art Technology

Advanced open architecture allows for seamless integration into existing PACS and network environments. Leading edge components overcome the authentication issue of the past

  • Browser based management
  • Ethernet, RS485 & Wiegand
  • Network based OS upgrades
  • Lumidigm Mercury sensor
 
 
 
 

PIV Authentication Mechanism

  • Free Read CHUID
  • CHUID Signature
  • Card Authentication Challenge
  • Biometric Authentication (Server based or Card based)
 
 
 
 
 

Infinitas Integration

The Infinitas suite of network-based services allows enterprise-wide Cheetah implementations to be managed from a central location.

  • PIV registration & validation
  • Biometric recapture
  • Template delivery services
  • Centralized repository
 
 
 
 
 
 

PIV Authentication Mechanism

  • Free Read CHUID
  • CHUID Signature
  • Card Authentication Challenge
  • PKI\PAK\PIV Authentication Challenge
  • PIV PIN verification

Form and Usability

The Cheetah blends into all environments, from laboratories to executive suites. It's attractive yet unobtrusive, and the user interface progressively intuitive.

  • Compact - 5.5" by 5.9"
  • Unobtrusive > 1.2" thick
  • Touch interface
  • Full color display
 
 
 

PIV Authentication Mechanism

  • Free Read CHUID
  • CHUID Signature
  • Card Authentication Challenge
  • PKI\PAK\PIV Authentication Challenge
  • PIV PIN verification
  • Biometric Authentication (Server based & Card based)
 
 
 

Datasheets

 
 

Made in America

Corporate
Engineering
Manufacturing
Support