Now loading.
Please wait.


Access Control Systems

HomeProductsAccess Control
HomeProductsAccess Control
HID Access Control CDVI Access Control Brivo Access Control Axis Access Control Gallagher Access Control Salto Access Control Schlage Access Control

Access Control for leading Security Systems provided
by iMotion

Solutions best suited to your requirements
Whether you have one or multiple buildings to protect - regardless of the number of users, iMotion Security provides flexible access solutions tailored to every customer’s different requirements: multi-site, multi-company, multi-station... Access control means checking that a person has the necessary clearance to enter an area, building or room. It helps organise human traffic inside a site and selectively manage access to different zones. In this way, sensitive areas can be restricted to identified users subject to predefined times, with all movements recorded in a log. iMotion’s systems integrate every identification technology from the market's major manufacturers (HID, Indala, etc…). Our technical expertise means we can analyse the badges you use today and recommend the solution best suited to your requirements.

HID Access Control
HID Access Control

Managing Access


Identification means checking that a person has clearance for an area or a building. When the person shows their ID to a reader placed near the door, the system will open, or not, the door. Identification, depending on the technology used, is represented by a card or a badge containing recorded information. It can be a key ring, remote control, biometric data or a vehicle registration number... A very common solution for access control is badges. To enter a building, the person must show a valid badge to a reader. The badge is the system’s “key” and the reader captures the information recorded on the badge.

The different technologies

iMotion uses all identification technologies from the simplest to the most advanced whatever the type of identification. The choice of technology for an access system depends on several criteria. Security is the most important element but ease and comfort of use are increasingly crucial.

Contact technologies - Magnetic and chip card

Magnetic card: contact reading of the badge (insertion or swiping). The number relating to the card holder is contained in the badge’s magnetic stripe (ISO stripe). This technology is mainly used for applications with a low level of security. Wear and tear of the contact reader is also to be taken in to account.

Chip card: the information is stored in a memory inserted in a plastic card. Example: bank card.

Contact-free technologies: RFID
RFID stands for Radio Frequency Identification. It reads information at a distance, which is stored in an RFID chip. These electronic chips contain identification and can contain other data. They are integrated in a card (badge) or object (key ring, remote control, etc.). Distance reading avoids problems associated with wear and tear of contact readers.

How does RFID work?
The reader sends a signal on a set frequency to a radio tag located in the read field. When the tag, also known as a marker or transponder, is “awoken” by the reader, it sends a signal back and a dialogue is established according to a predefined communication protocol. Certain tags include further memory that can write data. To communicate, the tag and the reader must be on the same frequency but, similarly to a radio, these frequencies cover a spectrum ranging from low to very high frequencies. Contrary to barcodes, RFID tags do not need to be visible to the reader to be identified and there is no need for reader contact either. The distance between tag and reader can stretch from a few centimetres to a few dozen metres.

Low frequency - 125 KHz
The badge’s serial number is recorded in the electronic chip in the badge. The antenna (or reader) determines the reading distance between it and the badge. From 30cm, it is called hands-free technology. In the access control and identification industry, 125 kHz technology revolutionised the market by offering unrivalled value for money. Robust, without wear and tear and easy to set up, this technology has been a worldwide success and today represents the benchmark.

HF - 13,56 MHz : Mifare, Mifare+, Desfire, iCLASS®, Legic...
This was the first RFID technology to have international standards (ISO 14443-A/B and ISO 15693). It is the ideal choice when speed, security and memory capacity are required. The chip’s memory can store different information (photographs, text, etc.) for access control or other applications, for example electronic money. For access control, high frequency increases security as an encrypted number can be entered into the badge’s memory using an encoder. Biometrics are useful in this case; the fingerprint is stored in the badge.

UHF - 433 MHz, 863 à 915 MHz, 2.45 GHz
With this frequency, the badge can be read at a distance of several metres, for example at a toll gate. The serial number in the badge’s chip is still being read, but the badge has a battery that is only activated when it is in the reader’s field, thus increasing the reading distance. It is called an active badge..

HID Access Control

Access control software

Our solution allows you to centralise your access management in one unique point with the possibility of allocating autonomous authorization to other sites. With our access control software, you can allocate nominative badges to users by defining the authorized areas and also allocate access times to these badges. Then you can manage visitor and staff traffic safely and securely.

Using a password, the Access Control system consults the database to see the clearance of the identified person: validity start and end date, authorized areas, access times and dates, etc. According to this clearance, the system will authorize, or not, access to the area concerned and open the door, or not..

Software features
Create nominative badges and personalise them Allocate rights and clearance to these badges: who has access to which area and when? Archive every event in a log (access, alarm, etc.) for any later search or checks. Cross-reference, or search the logs for data according to specific criteria: date, time, access or not, etc.

Profile management
With its multi-profile management and flexible access allocation the iMotion solution adapts to your requirements and solves all your access management issues. Profile management requires creating a “badge holder” file in the software. This individual file will contain all the personal information pertaining to the badge holder. The badge holder’s individual file contains information about him or her: name, validity period, profile, etc. In the database, the administrator or the operator associates the badge holder to an identifier and allocates access clearance in the form of a profile. A profile is a group of geographical areas, times, dates, etc. For lift management, for example, the geographical area corresponds to a range of floors, i.e.: Mr Smith has clearance for areas A and D, Monday to Friday, between 9am and 6pm. Depending on the customer’s particularities, spare fields can store further information not necessarily associated with security such as clearance for specific training or access (electrical or other), for example: Mr Smith cannot access the electrical units because his clearance has expired.

Multi-profiles management
Ideal for managing sensitive areas and access to several buildings, the iMotion solution makes for easy clearance allocation, simplifying your profile management. A flexible tool, it meets every access management need, from the most straightforward to the most complicated.

Badge personalisation and coding
The software has an ISO format badge customisation module for creating card backgrounds with a photo, logo and text positioned wherever you like and also typeface colour, size and style. When entering a new badge holder in the iMotion system’s database, the operator chooses the card background to be used for printing. The module includes standard photo capture functions (Twain). It is compatible with different technologies: video capture on webcams, digital cameras, file transfer by scanner, etc. The badge personalisation module uses very fast and simple photo cropping tools. It is compatible with most badge printers on the market. When creating a badge, coding enables the identification to be written directly in the badge.

HID Access Control

HID Access Control

Access Control
Visitor management

Visitor Management feature

You have a large number of visitors to manage and would like to create badges quickly. The Visitor Management software saves time and cuts down on queues, being able to create a badge for someone outside the company who needs temporary access to the site. It requires the badges to be created as quickly as possible in order to be active immediately. It is therefore important that information about the visitor can be recorded prior to their visit.


A visitor is by definition attached to a visited person. The receptionist can save time by finding all the information about the visited person in the badge holder’s database. Visitor information can be kept in the database (even though their badge has been deactivated); when they return to the site, the receptionist does not need to re-enter the information. The system’s automatic functions and the predefined profiles help accelerate the creation of visitor badges.


The receptionist has a stock of visitor badges with numbers registered in the access system database; these badges have not been activated. When a visitor arrives at reception, he introduces himself to the receptionist who enters data about the visitor in the information file, allocating him one of the numbers of the inactive badges, and saves the information in the database. The receptionist can enter the number using the keyboard or by enrolment. Enrolment is when a table-top reader reads the identifier, avoiding any typing errors, and allocates it to a person. The system downloads the visitor profile and access clearance in the badge holders’ database, thus activating the badge. When the visitor leaves, he hands in his badge to reception and the receptionist deactivates it, cancelling the badge’s access clearance. The badge is now inactive and available for any other use. This operation can also be carried out automatically using a motorized reader. The history of visitor movements is stored in the visitor log to be checked at a later date if necessary; it contains all the information about who had clearance and when.

Access control - visitor management

Door Locks