Proven Design. Enhanced Architecture.
Same trusted security keyboard platform — now built on a fully in -house developed electronic and firmware architecture.
Firmware Update Capability
Flash -based controller enables field updates and long -term adaptability to regulatory and security requirements.
Driverless CCID Integration
Operates via Microsoft native CCID driver and Linux pcsc -lite — no proprietary driver installation required.
Integrated Copilot Key
Modern workplace enhancement supporting evolving digital workflows.
Reduced Packaging Volume ( - 15%)
Optimized logistics footprint, lower transport costs, improved sustainability profile.
Security - Critical Workplace Protection
Integrated smartcard reader for electronic signatures, authentication, encryption, and access control.
The Smart Board 1150 combines reliable performance with a clean, functional design – while maintaining a strong focus on security . The integrated smartcard reader meets key requirements for electronic signatures, user authentication, data encryption, and access control . When used in combination with compatible software, this wired security keyboard becomes an intelligent access control solution at the workplace – certified, durable, and trustworthy . It ensures that sensitive IT infrastructure remains securely protected against unauthorized access.
The Smart Board 1150 TAA combines reliable performance with a clean, functional design – while maintaining a strong focus on security . It is designed for GSA sales to government agencies, the military, their vendors and suppliers as well as other organizations requiring end products which meet the manufacturing requirements according to the U.S . Trade Agreement Act Specifications (TAA). The integrated smartcard reader meets key requirements for electronic signatures, user authentication, data encryption, and access control . When used in combination with compatible software, this wired security keyboard becomes an intelligent access control solution at the workplace – certified, durable, and trustworthy . It ensures that sensitive IT infrastructure remains securely protected against unauthorized access .