Download PDF version Contact company
U.S. Patent 8854177 B2 outlines the system and method for storing user permissions for multiple disparate physical devices in a unified permissions database
Viscount’s software-centric Freedom Access Control solution takes physical access control panels out of the equation

Viscount Systems, a leading provider of IT-based security software and services, announced recently it has received a second U.S. patent for its Freedom Access Control solution, building on the technology’s strong IP foundation. U.S. Patent 8854177 B2 outlines the system and method for storing user permissions for multiple disparate physical devices in a unified permissions database, connected to a network in common with the products.

Physical access control traditionally requires significant amounts of expensive proprietary hardware to drive the decision database. Viscount’s software-centric Freedom Access Control solution takes physical access control panels out of the equation. Instead, IP encryption bridges receive messages from the Freedom software platform to trigger locks and monitor doors. The solution works by assigning permissions for existing users and groups through databases, such as Active Directory, based on the functions of each IP bridge and associated MAC address.

“This new patent marks another significant advance in how access control systems are deployed and managed,” said Dennis Raefield, CEO, Viscount Systems. “It further validates our vision to transform access control from a physical security solution to a unified physical/logical security software application. Innovation is at the core of Viscount’s Freedom platform and as such, we continue to push the boundaries of what’s possible."

For the end user, unified software systems, such as Freedom, provide a wide range of benefits from measureable ROI and simplified systems management to new levels of functionality and harmonisation with logical and cyber security applications. Designed as a software-centric platform, Freedom delivers simplified system audits and compliance through correlated logical and physical databases and logs, and creates direct relationships between IT and corporate security functions.

Download PDF version Download PDF version

In case you missed it

How is AI transforming physical security?
How is AI transforming physical security?

In the physical security marketplace, artificial intelligence (AI) has evolved beyond the novelty phase. The emphasis has now shifted to the more practical aspects of implementing...

Sunprime & Dahua: Advanced security for solar plants
Sunprime & Dahua: Advanced security for solar plants

Founded in 2020 by a team of energy professionals in Milan, Sunprime is a fast-growing independent renewable energy producer that develops sustainable photovoltaic plants across It...

ISC West update: New SoCs inside cameras drive intelligence at the edge
ISC West update: New SoCs inside cameras drive intelligence at the edge

For all the emphasis on cloud systems and centralised servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video c...

Quick poll
Which trend do you think will define physical security in the next 5 years?