Farpointe Data Extending Mobile Access Control Platform

Farpointe Conekt

Showing CONEKT Compatible Proximity and Keypad/PIN Readers at ISC West

Farpointe Data will show that access control system manufacturers, integrators and dealers will be able to provide their customers with a broadened line of Conekt smart phone mobile access control products with multiple new customer-requested reader models.

On display for attendees to use at the ISC Show will be a reader that combines BLE (Bluetooth Low Energy) radio capability with support for 125 KHz proximity technology, Conekt compatible keyboard readers with PIN (Personal Identification Number) technology and an OEM Module supporting both BLE and 13.56 MHz contactless smartcard technology.

“While typically, mobile-based access control uses smartcard technology, proximity still makes up a significant proportion of the card access credentials in use around the world,” reports Scott Lindley, general manager of Farpointe Data.

“In many installed locations, proximity is doing the job it has been asked. However, many organizations would like to add the no-card convenience of mobile to their systems without having to add the extra expense of switching their entire proximity solution over to the smartcard technology. With the PCR series of Farpointe’s mobile Conekt proximity readers, they now have a more economical way to do so.

“As the acronym implies, a PIN can act as a form of identification,” Lindley adds.”It can also act as a form of verification, complimenting a smartphone. This is because the PIN is something known only by the system and the user. For consumers using the smartphone and then keying in their PIN on the reader’s keyboard, heightened security can therefore be based on something the user has, a smartphone, plus something the user knows, a PIN. The PIN number is essentially as secure as the vigilance of the user.”

The new Conekt keypad readers from Farpointe include a keyboard that can be used to enter the PIN to create two-factor access control. This can provide stricter access to prescription drug cabinets or network server rooms. They can be installed indoors or out. Additionally, it is good security practice to consider installing keypad readers at perimeter doors, often a secured facility’s first line of defense. Farpointe’s Conekt keypad readers are ETL listed to the UL294 standard, Edition 7, US and C.

The Farpointe Conekt solution will be on display at Farpointe’s booth 5076 at the ISC West show July 19-21 at the Sands Exposition Center in Las Vegas.

Farpointe Data has become the OEM’s global partner for premium RFID solutions, including proximity, smart card, long range and 2nd generation mobile smart phone solutions, for access control professionals around the world.

0 Comments

Home Forums Farpointe Data Extending Mobile Access Control Platform

Viewing 0 reply threads
  • Author
    Posts

    • stella
      Guest

      Access control system is an important part of security systems. It’s necessary to identify and close unauthorized entry points. As well, access control helps to manage the volume of personnel in and around a facility. In a food service operation for example, an employee may be permitted to enter the kitchen but not to draw money from the cash machine. Thus, security cameras can play an important role in controlling costs by preventing unauthorized access while also detecting crimes such as theft and fraud.

      There are many types of access control systems including: magnetic card scanners, access control cards, card readers, authorization codes, magnetic stripes, card readers, card lockers, proximity readers, voice recognition modules, OPC cards, radio frequency Identification (RFID) tags, software enabled cards, and other hardware devices such as cameras, burglar alarms, security cameras, and security lights. Magnetic card scanners prevent unauthorized access by capturing a barcode or magnetic stripe on items known as cards. Obtaining authorization from an authorized point is possible via manual signatures or electronic codes. In some cases, access may be granted only after a predetermined number of unsuccessful attempts by a visitor. In other cases, a system administrator may determine that too many visitors have attempted to gain access. In all cases, physically verifying credentials prevent unauthorized access.

      #537272 Reply
Viewing 0 reply threads
How you feel about it?
Your information: