Contact company icon Add as a preferred source Download PDF version
Summary is AI-generated, newsdesk-reviewed
  • RXQR readers combine RFID and QR code scanning for streamlined access control.
  • RXQRK model adds keypad for two-factor authentication, ideal for high-security areas.
  • Integrated design reduces installation and maintenance costs, supporting modern access systems.

Third Millennium, known for its innovative access control solutions and a subsidiary of HID, has introduced the RXQR and RXQRK readers.

These new multi-technology access-control devices merge high-security RFID card and QR code credentials into a single, stylish unit. Designed to streamline the management of visitors and contractors, the RXQR range supports both legacy and modern communication protocols, offering an advanced yet cost-effective solution suitable for contemporary access control requirements.

Innovative Integration of RFID and QR Technology

The RXQR model incorporates high-security RFID card reading capabilities alongside QR code scanning features within a compact device. For organizations requiring an added layer of security, the RXQRK model includes a keypad for PIN verification, particularly useful during non-business hours or in high-security settings.

According to Steve Greenaway, Business Development Manager at Third Millennium, "QR codes have existed for decades, but their role in access control has accelerated dramatically since the COVID-19 pandemic." He notes the shift towards QR code-based access as a practical, contact-free, and cost-effective entry management solution, particularly as staffed reception areas have become less common.

Simplifying Access-Control Systems

Traditionally, entry points required separate readers for staff RFID cards and visitor QR codes, necessitating dual installations, cabling, and maintenance.

The RXQR range addresses this by integrating both functions into a single reader, connecting via the same door controller ports and supporting Clock and Data, Wiegand, and OSDP connectivity standards.

Compatibility with Modern Access Control Systems

"It’s a simple concept offering huge efficiency and financial gains," Greenaway comments. By reducing the number of devices and simplifying installation and maintenance processes, substantial cost savings are achieved.

Additionally, RXQR readers support a comprehensive range of high-frequency card technologies, such as MIFARE® Classic, MIFARE® DESFire®, and LEGIC, making them compatible with modern systems utilizing open standard smartcards. DESFire and LEGIC technologies ensure advanced cryptographic security on par with proprietary systems.

Enhancing Security in Multi-Use Facilities

Featuring a keypad for PIN-based two-factor authentication, the RXQRK model is well-suited for multi-tenanted buildings, data centres, and facilities with layered security requirements.

While mobile credentials grow in popularity, QR codes remain a cost-effective and straightforward option for temporary access for contractors and visitors. Greenaway emphasises this advantage, explaining, "Offering temporary access, they’re virtually free to issue, disposable and don’t require visitors or contractors to download an app or create an account either."

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...