Viscount Systems secures second U.S. patent for IT-centric Freedom Access Control platform

Nov. 21, 2014
New patent outlines the system and method for storing user permissions for multiple disparate physical devices

(VANCOUVER, British Columbia, November 12, 2014) — Viscount Systems, a leading provider of IT-based security software and services, announced today it has received a second U.S. patent for itsFreedom Access Control solution, building on the technology’s strong IP foundation. U.S. Patent 8854177 B2 outlines the system and method for storing user permissions for multiple disparate physical devices in a unified permissions database, connected to a network in common with the products.

Physical access control traditionally requires significant amounts of expensive proprietary hardware to drive the decision database. Viscount’s software-centric Freedom Access Control solution takes physical access control panels out of the equation. Instead, IP encryption bridges receive messages from the Freedom software platform to trigger locks and monitor doors. The solution works by assigning permissions for existing users and groups through databases, such as Active Directory, based on the functions of each IP bridge and associated MAC address.

“This new patent marks another significant advance in how access control systems are deployed and managed,” said Dennis Raefield, CEO, Viscount Systems. “It further validates our vision to transform access control from a physical security solution to a unified physical/logical security software application.Innovation is at the core of Viscount’s Freedom platform and as such, we continue to push the boundaries of what’s possible."

For the end user, unified software systems, such as Freedom, provide a wide range of benefits from measureable ROI and simplified systems management to new levels of functionality and harmonization with logical and cyber security applications. Designed as a software-centric platform, Freedom delivers simplified system audits and compliance through correlated logical and physical databases and logs, and creates direct relationships between IT and corporate security functions.