Solution - Dorlet

DMA - DORLET Mobile Access

Real-time management of access permissions for both wired and wireless systems.

  • Smartphone system, compatible with iOS and Android.
  • Can be used via NFC and/or BLE (Bluetooth Low Energy) technologies, eliminating the need for physical cards and offering greater convenience and security for both users and administrators.
  • Can be used in both OnTouch (proximity) and Button (remote) modes.
DMA

 

Features

Multiple DMA (DORLET Mobile Access) credentials for different facilities, per user.

App language selectable by the user.

Security level programmable from the manager

without unlocking the mobile phone, mobile phone unlocking with biometric parameters, etc.

Possibility of configuration by reader of the operating mode (OnTouch / Button).

Automatic detection of nearby Button readers.

Credential deployment

  • Simple deployment of credentials (from DASSnet®) based on an invitation email.
  • Invitation email customisable by the customer, based on an HTML template (logo, format, text, etc.).
  • The user will be able to download the Dorlet Mobile Access app from the invitation email itself.
  • Access based on unique tokens per user and installation.
  • In CX wireless systems, events are sent to the DASSnet® server in real time.

Capacity

Up to 65,000 online readers and 65,000 wireless DOC readers per user, on a single DMA credential

Security

  • DMA key storage using the most secure mechanism available in each case, depending on the terminal.
  • Limited validity of issued access tokens.
  • Periodic renewal of access tokens controlled by DMA API.
  • Credential becomes inoperative if there is no connectivity with DMA API for a period exceeding 24 hours.

Data Sheet

Related products

No results found

Get in touch

Responsible: Dorlet S.A.U.

Purpose: Management of requests and queries.

Legitimation: Consent obtained, legitimate interest and compliance with regulations.

Recipients: Third party service providers, including international transfers.

Rights: Access, rectification, deletion, limitation of processing, data portability or opposition, including opposition to automated individual decisions.

Provenance: User.