![PDK RDRBT Скачать руководство пользователя страница 9](http://html1.mh-extra.com/html/pdk/rdrbt/rdrbt_manual_1516721009.webp)
Touch io Instruction Manual
cloud service credential management for both Bluetooth Low Energy and legacy reader capability. It
provides for access control from a single application on any Internet-enabled mobile or desktop device. An
Internet or Wi-Fi connection is
not
required on the mobile device when being utilized for credential use. The
cloud service is merely used for easy and fast issuance and management of credentials.
A
touch io
reader is associated with an organization’s pdk.io door controller and can be paired to a user’s
phone or other smart device. The user’s
touch io
credentials are presented to the reader and passed along to
the access control system for validation. If the access request is valid, the
touch io
reader displays the
designated LED color and entrance is granted at that reader access point.
IMPORTANT
: A ProdataKey Cloud Node is required to operate the
touch io
readers.
For Bluetooth-supported smartphone credential support, with the phone in your pocket or purse, just touch
the reader. An existing standard legacy proxy card or key fob credential can also be used; all that is
necessary is to present the card or fob for access.
Touch io
is designed for the ease of users using the
pdk.io App
and the
touch App
. The
pdk.io App
is for
anyone with
(also referred to as an administrator) permission roles to
provision and configure
touch io
readers. The
can be used by anyone who has been granted
access to a system.
NOTE
: Multiple smart devices may be added to access the
touch io
door controllers; the same credential
invitation, however, cannot be used for accepting another device. An additional credential must be
sent to a user and accepted in order to add an additional device.
Users experience a new level of convenience to gain entry to a protected area as their Bluetooth-enabled
smartphone becomes a mobile credential for
touch io
readers, eliminating the need to carry or worry about
a lost fob or prox card.
NOTE
: Readers that are NOT Bluetooth enabled will still require either a traditional credential (such as a
prox card) or the
touch App
credential.
The
touch App
runs silently in the background of the user’s mobile device, transmitting the BLE credential to
the reader when the user activates the reader’s capacitive touch sensor by touching the reader.
NOTE
: Standard RFID credentialed prox cards and key fobs are not as secure as using a smart device for
touch io
access. Standard legacy prox cards can be cloned easily. The
touch App
is designed for
convenience, ease of use, and greater security.
The
touch App
that transmits the credential to the reader uses very little power and merely needs to be
running in the background; an Internet or Wi-Fi connection on the mobile device is
not
required for reader
access when being utilized for credentialed access. The cloud service is merely used for easy and fast
issuance and management of credentials. Internet access is only needed to download the app and accept the
credentials that have been issued. Once accepted, credentials are securely stored on the smartphone.
Page 9