Skip to main content
Skip table of contents

Security

Security Is our #1 Priority

System Architecture

LINC’s architecture and supporting software functions reside within the connected machine’s local ethernet network and not on the customer’s network providing a layer of security through physical separation.

Gateway Security

LINC Device Secure Boot-up

A secure boot process ensures that a trusted environment is created when the LINC device’s communication module boots, ensuring a secure anchor point into the device exists. When the chip is energized, every line of code is verified to be from a trusted source.

  • Cellular radio source code and operating environment

  • Edge (LINC) logic

This comes together to assemble a series of firmware that is trusted and has no possibility of allowing or enabling any malicious code to be injected into the system.

IP Separation in the device

The LINC module’s data processor and the cellular communication module have separate IP addresses that rely on the connection agent software and TR50/MQTT message broker to build the data payload, encrypt it and prepare it for transmission via a Transport Layer Security (TLS) protocol to the cloud-based connection management portal.

Application Layer Security

The application assigns a unique authentication token (certificate) for use when interacting with connected LINC devices and transmitting via an MQTT protocol. There is also a security permissions architecture that allows for a structured approach to for site administrators granting user access to the features of the application. Site administrators can assign security permissions levels to user, restricting the access and use of features within the application providing an additional level of security to the system. Site administrators can grant and revoke access to the LINC portal allowing for control over the sharing of the data collected by the system.

Data Aggregation Point Security

The LINC module's communication software creates the secure connection to the cloud. LINC’s data transfer software contacts and authenticates with the cloud-based connection portal establishing a secure SSH Tunnel bridge from the LINC device to the cloud-based connection management portal which serves as the aggregation point for all connected assets’ data.

When a data payload is received, the LINC Enterprise Gateway, using a similar agent as the LINC modules, establishes a secure bridge from the connection portal to the LINC database, decrypts the data and inserts it into the LINC database where the data is stored for use. Upon the successful receipt of the data payload, the transaction’s connection is severed preventing any potential use other than receiving the authenticated payloads from the source LINC device.

LINC SQL Server Security

The LINC database resides within Lantech’s server network where security policies and supporting software (e.g. CrowdStrike) are stored and secured for use in the LINC portal.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.