7 Access Control System

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Access Control System Illuminate

WHAT THIS PRODUCT DOES


In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place
or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called
authorization.In computing, access control is a process by which users are granted access and certain privileges to systems,
resources or information. In access control systems, users must present credentials before they can be granted access. In phys-
ical systems, these credentials may come in many forms, but credentials that can't be transferred provide the most security.

ORASKA explains Access Control


For example, a key card may act as an access control and grant the bearer access to a classified area. Because this credential
can be transferred or even stolen, it is not a secure way of handling access control.
A more secure method for access control involves two-factor authentication. The person who desires access must show
credentials and a second factor to corroborate identity. The second factor could be an access code, a PIN or even a biometric
reading.There are three factors that can be used for authentication:
Something only known to the user, such as a password or PIN
Something that is part of the user, such as a fingerprint, retina scan or another biometric measurement
Something that belongs to the user, such as a card or a key or a mobile phone

20
Product Outline
Brand: ZKTeco
Model: ZKTeco K40-Pro
Display: 2.8-inch TFT Screen
Fingerprint Capacity: 1000 (2000 without SSR )
ID Card Capacity: 1000 (Optional)
Logs Capacity: 80,000
Interface (Built-in): TCP/IP, USB Host
Function: Standard: WDMS,Web Server, SMS, Automatic Status Switch,Self-Service
Query, Work Code, T9 input, 9 Digits User ID, DST, Schedule
Bell, Optional: ID/Mifare
ZKTeco K40-Pro Verification Speed: ≤0.5 sec
Time Attendance & Power supply: DC 12V 1.5A
Simple Access Control Terminal Dimension: 184 x 136 x 37.6mm

Brand: ZKTeco
Model: ZKTeco K40.8-Pro
Display: 2.8-inch TFT Screen
Fingerprint Capacity: 3000 Templates
ID Card Capacity: 5,000 (Optional)
Logs Capacity: 30,000 Transactions
Interface (Built-in): RS232/485, TCP/IP, USB-host
Function: Standard: Algorithm Version: ZK Finger VX9.0&10.0, Standard Function:
Webserver, Anti-passback, Optional Function: ID Card, Mifare
Card
ZKTeco Fingerprint F18 Verification Speed: ≤0.75 sec
Standalone Access Control and Power supply: 12V DC,3A
Time Attendance Dimension: 80 x 183 x 42mm

Brand: ZKTeco
Model: ZKTeco MB300 Multi-Bio
Display: 2.8-inch TFT Screen
Face Capacity: 500
Fingerprint Capacity: 500 Templates
ID Card Capacity: 1,000 (Optional)
Logs Capacity: 80,000 Transactions
Interface (Built-in): TCP/IP,USB-host
Function: Standard: Standard Functions: Work Code, SMS, DST, Scheduled-bell,
Self-Service Query, Automatic Status Switch, T9 Input, Photo
ID, Camera, Optional Functions: ID/Mifare Cards
ZKTeco MB300 Multi-Bio Verification Speed: ≤ 0.5 Sec.
Time Attendance Terminal Power supply: DC5V 0.8A
Dimension: 167.5 x 148.8 x 32.2mm

Face Capacity: 400 Face


Fingerprint Capacity: 1000 Templates
ID Card Capacity: 1000(Optional) ID or Mifare card
Logs Capacity: 100,000 Transactions
Interface (Built-in): RS485, TCP/IP, USB-host
Function: Standard: Algorithm Version: ZKFinger VX10.0 & ZKFace VX7.0,
Standard Function: DST, Automatic Status Switch,
Anti-pass back, Scheduled-Bell, PhotoID
Verification Speed: ≤ 1.5 sse
Power supply: 12V DC,3A
DAccess Control Interface: 3rd Party Electric Lock, Door Sensor, Exit Button,
ZKTeco MultiBio 800 21 Alarm, Doorbell, Wiegand In/Out

You might also like