IDTECK Access Control Readers(35)
RF245, a 2.45GHz Long Range reader is uniquely designed for installations incorporating parking systems, with enhanced security via encryption and mutual identification. You may choose 90° one directional antenna or omni directional antenna depending on your preference. Multiple tags can be read with the blink of an eye. Armed with IDTECK patented card algorithm, it provides high security to your long-range solution with an affordable price.Long-range RFID active cards have always been troublesome with short battery life and no option to replace battery. With the IDA245 RFID active tag, the inability to replace the battery and the battery life no longer poses a challenge. The CR2025 battery can be replaced through the slot at the bottom of the card. Also, site code and ID numbers may be programmed using PRG3000. Applicable areaPerfect for long range parking controlVehicle trackingAsset controlPersonal trackingKey featuresLong read range - 3m(10feet), 5m(17feet), 10m(34feet) with IDA245 tagSimple to use - Able to connect directly using bargate outputMultiple purpose - Parking, vehicle control, asset control and personal trackingOutdoor capability - 100% weather resistance makes it perfect for outdoor useUser-friendly - User programmable site code and ID numbers using PRG3000 Life time / Replaceable battery - 3 years battery life with replaceable CR2025 batteryAdd to Compare
IDTECK Biometric stored smart card technology: High security with privacy protection Using Mifare cards, the SRB series provide high security with privacy protection. Fingerprint data will be safely stored inside Mifare cards to ensure privacy of the users with no limitation of user capacity. It is the perfect solution for areas where high security is required, such as military sites, R&D centres and government buildings. Common13.56 MHz [MIFARE] Contactless Smart Card ReaderRead Range: Up to 4 inch (10cm)Read Eycrypted ID of Smart Card which is written by PRG2000BCompatible Controller: iCON100, iTDC, Third Party Controller, FINGER007SRBCompatible Reader: FR006SRB, FINGER006SRB BenefitsHigh security level: Data protected with secure access keyBusiness Protection: Without data sector and access key information, other suppliers can not make compatible readers or cardsPrivacy protection: Personal bio data is stored in personal card memory instead of in public memory, no need to manage database or templatesUnlimited fingerprint user applicable SR10B(10BE) 26bit Wiegand (default) / RS232 and ABA Track II (optional) Output Format3 Array LED Indicators (Red and Green) and BeeperExternal LED ControlExternal Buzzer ControlEasy to install on Mullion Mount suitableSR10BE : Epoxy potted (Waterproof / IP65, IP66), Warranty (Lifetime)SR30B26bit Wiegand (default) / RS232 and ABA Track II (optional) Output Format7 Array LED Indicators (Red and Green) and BeeperExternal LED ControlExternal Buzzer ControlWall Mount (US, EU, Asian Gang Box Size)SRK101B26bit Wiegand (default), 4 / 8bit Burst for PIN (selectable) RS232 and ABA Track II (optional) Output FormatExternal LED ControlExternal Buzzer Control12 Numeric Keypads with Back LightingTamper SwitchWall Mount (US, EU, Asian Gang Box Size)Reverse Polarity ProtectionOptions: 3ea of External LED ControlSee 13.56 MHz [MIFARE] in actionAdd to Compare
IDTECK introduces the RF245, the long range proximity reader, an ideal solution for parking management and other various long range applications.Based on 2.45GHz technology, this versatile long ranger reader boasts stable read range up three to ten metres. (Three different reader models provide specified reading ranges from RF245-3M (10ft), RF245-5M (18ft), and RF245-10M (33ft). In operation with life time replaceable tag, IDA245, the RF245 offers enhanced security features as the digitally encrypted card ID and secured protocols are used between the readers and the designated active cards. It is also equipped with capability to identify 30 cards (tags) per second. The RF245 supports standard 26 bit, 34 bit Wiegand or higher up to 40 bits, and RS232 Formats.With its outdoor capacity of IP65 protection rating, it is specifically designed to withstand harsh weather or environment and guarantee stable operation in any circumstances. The RF245 has a high impact and scratch resistant polycarbonate housing and is 100% weatherproof and ready for any type of outdoor applications.Suitable for long range access control, logistics/fleet management, asset control, personnel tracking as well as vehicle management for parking control, the RF245 has various applications for higher security level combined with increased convenience.Take a peek on how other companies have applied the RF245 into their business according to their different needs and requirements.Parking enforcement and parking fee management solutionVehicle access control and parking management solutionWaste management solution using the long range, RF245Long experience in biometric access control and time & attendance field, IDTECK products assure the most reliable technology out in the security market. IDTECK offers wide range of security products, to provide the best security solution to suit your needs. All of IDTECK products are certified by UL, CE, FCC, MIC, and RoHS to satisfy the standards for international exports.Add to Compare
IDTECK's FGR006SRB is a fingerprint-recognition smart card reader for access control and time & attendance. Even with the easy-to-install feature, it is designed to provide the highest security available. One of the notable features is that the FGR006SRB allows you to store your personal bio data on the smart card using the PRG2000B programmer, which eliminates the need for managing database or templates separately. The fingerprint-stored smart card technology has several remarkable benefits. Since the biometric data of the card-holder is saved onto the card rather than inside the reader, the concern about the privacy of the card holder, i.e. biometric features, is effectively eliminated. This technology also allows the system to accommodate an unlimited number of fingerprint users as the decentralised template storage doesn't require large built-in storage memory for fingerprint templates. IDTECK's wide-ranging product line-up also offers control panels that work in perfect sync with the FGR006SRB and other smart card readers, including the single-door access control panel iCON100SR and the 2 to 4-door access control panel iTDC-SR.High security levelBusiness protectionPrivacy protectionUnlimited fingerprint user expansionKey features:13.56MHz [MIFARE] fingerprint-stored smart card readerRead range: up to 4 inches (10cm)Output formats: 26bit Wiegand (default) / RS232 and ABA Track II (optional)Reads encrypted-IDs of smart cards which can be written by the IDTECK programmer PRG2000BID-only verification for users whose fingerprints cannot be registered Compatible software: STARWATCH, DUAL PRO I/II, iTDC PRO I/IICompatible controllers: iCON100, iTDC, FINGER007SRB, third-party controllersCompatible readers: SR10B/SR10BE, SR30B, SRK101BAdd to Compare
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Nedap’s uPASS Reach long-range UHF readers in combination with IDTECK elevator384 access control system were installed To optimise the monitoring and management of all vehicles and people access points at the company’s headquarters, the Vietnam Post and Telecommunication group (VNPT) recently upgraded the building’s entire access control and surveillance system. Nedap’s uPASS Reach readers were selected to facilitate hands-free access and elevator management. Located in central Hanoi (Vietnam), VNPT is one of the largest companies of the country. With 1,000 employees working at the HQ, manageable vehicle and people access control systems are needed to guarantee a convenient and secure flow of people. The entire project included access control readers for automatic vehicle identification at the building’s parking facilities, elevator management and hands-free door access. Elevator management In order to control the 6 passenger elevators in the building’s 27 floors, Nedap partner Techpro successfully installed Nedap’s uPASS Reach long-range UHF readers in combination with the elevator384 access control system of IDTECK (Korea). Only people with an authorised access credential can operate elevators with call buttons. All exit doors at the stairs are also equipped with Nedap's uPASS readers for tracking purposes. With this solution, VNPT ensures convenient and secure hands-free elevator access to all of its authorised employees and registered visitors. Nedap’s uPASS Reach offers long-range identification up to 5 meters [16 ft] using the latest UHF technology. Based on battery-free, passive technology, the uPASS Reach reader is a cost effective and enduring solution for hands-free building and parking access. Convenient building access By using Combi cards featured with UHF and Mifare technology, VNPT facilitates a one card solution for employees and visitors, allowing them authorised access to the 184 doors and elevators throughout the entire premises. Employees and visitors benefit from using a single access credential throughout the facility, from the car park to their office door, making it a cost efficient identification solution. Excellent results Techpro Co. Ltd. Director, Mr. Do Duc Hau, is pleased with the excellent results of the system. “The system has been working well since its completion in 2013. The system helps the company and visitors to enjoy a well-managed elevator system, and provide people tracking and time attendance. With 1000 employees and visitors in the buildings 27 floors, before the installation, the elevator system was always busy and it took a long time to call an elevator. Additionally, it was hard to manage the working time of the employees. With the new systems this is not an issue anymore. As one of biggest telecom providers in Vietnam, with hundreds of daily visitors it was often a burden to manage visitors in and out for VNPT’s security department. The new installation helps to conveniently grant access to authorized visitors to the right floor and the right department. Visitor information can now also be stored and provide support for management purposes”.
IDTECK's FINGER007, professional T&A Software has been integrated to manage precise time and attendance dataArabian American Oil Company also known as Saudi Aramco is government-owned national oil company of Saudi Arabia. It is the largest oil corporation in the world with the largest crude oil reserves and production. Running over 100 oil and gas fields in Saudi Arabia, the company produces over 3.4 billion (540,000,000 m³) barrels of crude oil annually.In order to manage the large group of employees in their branch offices all over Saudi Arabia, the HR department of the Saudi Aramco headquarter office needed to retool its time and attendance system to reduce the payroll costs as well as the effectiveness in management. This included a prevention method for unauthorised overtime and card misuse. There were many cases of "buddy punching", which refers to the act of clocking in for other employees who might be late or absent. In addition, the time and attendance system had to integrate with their existing payroll and HR management system to apply payroll rules that are consistent and fair to every employee.IDTECK's distributor in Saudi Arabia region, Aflak Electronics Industries Co., has introduced FINGER007 access controller integration with T&A Software for precise time and attendance of their employees.IDTECK's intelligent standalone fingerprint access controller, FINGER007, delivers top of the line time & attendance and access control applications in a single device. High user efficiency is guaranteed as various identification modes; fingerprint, proximity card and PIN (Personal Identification Number) are supported. Arabian American Oil Company also known as Saudi Aramco is government-owned oil company of Saudi Arabia Best of all, fingerprint identification eradicates any possibilities of proxy attendance, which has known to be the weak point of proximity card T&A devices as the employees can generate false T&A data by using someone else's card to record clocking in and out time.Working alongside with IDTECK's FINGER007, professional T&A Software has been integrated to manage precise time and attendance data. IDTECK's Software Development Kit has been utilised to create one of a kind T&A software, which reflects user's request and regional characteristics. The T&A Software collects T&A data from FINGER007 for further processing and analysis to generate meaningful attendance reports. The software allows users to run multiple shifts and various work schedules without any manual calculations. Processing time, which used to take hours with conventional time clock T&A system, has reduced to just few simple clicks of a button.After the successful implementation of the new time and attendance system, the HR department of Saudi Aramco has been able to realise numerous benefits and satisfaction on their investment. The HR department of Saudi Aramco was pleased with how the time and attendance system reduced their payroll process. They no longer had to calculate employee time and input data in to the payroll system manually. Employees also achieved an immediate benefit by eliminating the need for employees to carry around RF cards or remember password numbers. Using only their fingerprint, employees can identify themselves more quickly and precisely.
IDTECK access control system has ensured safety at TOBB Economics and Technology UniversityTOBB Economics and Technology University, located in Ankara, the capital city of Turkey, is one of the largest technical institute in its region. School's new dormitory building is a signature space that supports the academics and personal growth of residents, provides a place where programmes and events are hosted, and most importantly, provides a home-away-from-home for 1,500 students. The student dormitory complex is consisted of 4 block buildings, which are respectively 18 stories high.Staying the dormitory provides a lot of benefits to the students. It offers convenient access to classes and campus events and most importantly, it provides much needed security to the students that are living away from home for their first time. Nevertheless, Dormitory buildings go through constant exposure to students, faculty, staffs and in some cases, unwanted solicitors and intruders. It is the responsibility of the university to present safe atmosphere where students could study and socialise with one another as well as privacy during their own hours. This is promoted as better describing a living and learning community that is part of the larger academic institution.As the school officials requested, all the entry doors of the dormitory buildings are remained locked all times to prevent the entry of the unauthorised personnel. 118 units of SR10 SMART Card readers were installed on every entry doors and students are allowed access if they present their access card to the reader. 34 units of iTDC-SR access control panels, which are capable of controlling up to 4 doors, are deployed to control the readers. ELEVATOR384 verifies the user and activates the buttons for the floors the student is permitted In addition, properly securing the elevator systems has helped eliminate the risk of the misfortunate events from taking place. With the SR10 SMART Card reader installed right below the floor button of the elevator, students must present his or her access card to the reader and the elevator system, ELEVATOR384, verifies the user and activates the buttons for the floors the student is permitted to. Accessible floors can be set for each card holder (student) by the system administrator and they were able to monitor all the floors. Elevator control played a large role in establishing a comprehensive Access Control System.A key part of this project was that the students didn't have to replace their existing student identification card with a new card equipped with access card capability as the access control system as well as the elevator control system was compatible with SMART Card (MiFARE).On this large project, IDTECK's Turkish distributor, Optimum Guvenlik, was able to beat out other access control suppliers due to the great performance of the IDTECK product. Their recent project at the Ministry of Foreign Affairs of Turkey was a great success and it has left a great impression for Optimum Guvenlik and IDTECK products. Students and dormitory personnel were fairly satisfied with the IDTECK access control system as it ensured safety and provided better environment to live and work.
Understanding the trade-off between image resolution and field of viewDownload
A blind spot in governance, risk and complianceDownload
H.265 High Efficiency Coding: Video compression for security applicationsDownload
- Fermax DUOX 2 wires solution for Evelina London Children's Hospital in UK
- HID DigitalPersona fingerprint biometric solution added to BigWise Stellar POS for greater security
- Armor At Hand partners with AASA and use Smart Shield to boost school safety nationwide
- WorldReach employs Cognitec’s technology to enable ID document applications with smartphones