Vicon introduces smartphone credentialing for VAX access control system

Vicon introduces smartphone credentialing for VAX access control system
Vicon brings a new level of convenience and simplicity to its Vicon VAX Access Control solution by introducing mobile credential technology. This new feature allows VAX customers to present their smartphones, instead of cards or fobs, to specialized Bluetooth-enabled VAX door readers.

Employees can now use their smartphone, tablet or wearable to access doors, gates, networks and more. This new solution for access control greatly improves user convenience in today’s mobile-first world, as well as makes your organization look more modern and professional. The solution can be deployed as best suits your needs. Implement it as pure a mobile solution or integrate it into an existing card-based access control system.

Upon installation of a custom smartphone “wallet” app and a simple authentication process that links that app to the specific phone, users enter their personal VAX credentials into the wallet. To unlock doors using the mobile credentials, users unlock their phone, access the credential within the wallet app and push the “unlock” button. Multiple credentials can be accommodated.

The mobile-ready contactless smartcard reader enables access through secured access points, such as locked doors and protected gates, giving electronic access control users the ability to effectively use smartphones as access credentials. The readers read BLE mobile credentials as well as traditional contactless smartcards and can be integrated into existing access control systems.

This single reader can be mounted on a mullion or wall-switch mount, accommodating metal doors, window frames and flat surfaces. The read range of the reader is controllable. For operation with mobile credentials, the BLE read range settings can be set from short to long. With its core compliant to the Certified Common Criteria EAS5+ Computer Interface Standard, these readers inherently provide increased hardware cybersecurity defense to resist skimming, eavesdropping and relay attacks.


Product Adopted:
Software
Share to:
Comments ( 0 )