top of page

idLink Patented Cloud Access Control
Conventional Access Technologies

Conventional Access Control System

Problems frequently occured

Hardware cost is high because the system must require 4 system components:
- Card Reader / Biometric Reader
- Single Door / Multi-Door Controller for linking
  the reader and PC
- PC Computer; and
- Access Control Software which runs primarily
  on PC.

Cabling, piping and installation costs are high because of the complicated system architecture.

Need to install software at different work stations in order to operate.  Usually, such software will
run on PC system only.

In a large network applications, different doors are linked first with different door-controllers, e.g. 4-door, 8-door, 16-door, etc. 
Data synchronization among controllers will be complicated and causes performance issues or even errors during real time monitoring and anti-passback applications.


Advantages of idLink and technical problems overcome

Hardware cost is lower because the system DOES NOT require a hardware controller but the reader with a router.  For comparison, it is 30% or more cheaper in a classic case of 4-door access control application.

Cabling, piping and installation costs are lower, contributed by the new simpler system architecture.

Majority of the operation is on cloud
with only 3 system components:
- Dynamic QR Code Reader linked with router;
- Virtual Controller on cloud with software on
  Administration Portal; and
- Access via web Browser.
Therefore, idLink can
operate perfectly both on PC and MAC.

readers are connected in ONE network and easy to manage, especially when different anti-passback requirements are needed at different doors.

Standalone Keypad

Problems frequently occured

Little control of the user in disseminating the door code to 3rd parties.

To keep the door code secure in operation, the administrator needs to
change the code from time to time and it is resources consuming.

Since everyone needs to key in the code with hand, the operation will have hygenic issue, especially during pandemic.

Cannot generate Access Log Report of Staff or Visitors.


Advantages of idLink and technical problems overcome

Operation is simple and secure.  There is no code being kept in the virtual card on mobile and the secure credential cannot be transferred to any 3rd party.

Complete cloud based platform, visitors / access rights can be issued, deleted and re-issued real time through PC, MAC, tablets or smart phones, no software installation required.

Since the operation requires only scanning of the virtual card on mobile against the door reader, the identity authentication is proximity base, without hygienic issue.

Able to
generate Access Log Records any time and anywhere.  Time Attendance report down to individual level could also be exported just by a few clicks.

Static QR Code

Problems frequently occured

That Static QR Code represents a fixed code and unique ID number (UID) behind and is easier to crack.

It is also
easy to copy and be transferred to multiple parties.

There is
no way to identify immediately whether the one who holds the fixed QR code is the authorized person for entry; direct confrontation of security staff and the code holder such as questioning and even asking for further identity proof is inevitable in case of suspicion.


Advantages of idLink and technical problems overcome

The Dynamic QR Code is not from a static number but attributed to a binding of different secure elements and random keys chosen.  It represents a unique identity but difficult to compromise.

idLink Dynamic QR Code also
changes once every 5 seconds to prevent copying.

The Code cannot be transferred either, it is an unique identity and only the holder with the corresponding authorized mobile credential will be granted access.

On top of the Dynamic QR Code, the idLink Mobile App will
also show the perosnalized photo of the holder for immecdiate visual security check by security staff.  Since the photo is uploaded via cloud platform, it cannot be altered or changed.


Problems frequently occured

The identity of a functional RFID card comes from a static ID number, which is prone to be cracked and compromised.

The card holder is
able to pass easily the card to any 3rd party for entry without notifying the card issuing body.

It is
costly and resources consuming to stock cards, especially for those smart card with large chip memories, replacing lost cards is also time consuming and costly too.

Could only issue or re-issue lost card at a particular place.


Advantages of idLink and technical problems overcome

The virtual credential on the mobile phone appears as a Dynamic QR Code changing once every 5 seconds. It is difficlt to copy and transfer to a 3rd party.

BYOD and no more physical card is needed because the virtual card is on one's mobile phone.

This will
save cost and resources in stocking, managing and replacing cards.

Virtual card can be issued any time and any where.

Biometrics / Facial recognition

Problems frequently occured

Biometrics equipment and operating software are the most expensive among all the different door access solutions.

Certain biometrics application will still have the hygenic issue, for e.g. fingperprint recognition.

With more and more advance of A.I. (Articial Intelligence) technologies, biometrics data could be forged and fake.

Customers may not be willing to use biometrics due to
privacy issue.


Advantages of idLink and technical problems overcome

In standard access control usage, the secure element is usually the UID (unique card ID) written on a physical ID card and easy to crack.  VRCN applies more stringent practice by using AES256 encryption & blinding objects in the personal profile in protecting the mobile credential in the mobile ID, making idLink mobile ID more difficult to crack and secure.

idLink is able to offer ACaaS (AccessControl-as-a-service).   Customers are able to get a better and secure access solution with just a small investment threshold by entering our yearly subscription based contract.

total ownership cost (TOC) is much lower than biometrics applications when the hardware, software and installation at multiple sites are reduced to minimum.

bottom of page