|
|
|
|
|
|
Our focus is simple
and unique; we integrate digital finger/palm prints, Iris and various
other technologies into a cohesive solution that meets the demands
of our creative customers. The uniqueness lies in the ability to
integrate this product with many other control systems. Our biometrics
and access control systems can be combined with Intercom systems,
CCTV cameras for face recognition, or to identify movement of vehicles.
Both biometrics and access cards\fobs can be used to control traffic
both entering and exiting a specific area or building. We take pride
in products those we use due to the stringent quality and performance
standards they deliver.
|
|
Proxy
Readers, Accsses cards, Fobs and operating software |
Access
Card is similar in size and thickness to a traditional credit card,
and dimensions comply with standards called out in applicable ISO
Guidelines. The Durable surface is ideal for printing of Images
and personal photographs. Key fobs are slim line and tear drop shaped
tag which could be easily added to a key ring. Ideal for environments
those do not require photo Id bagging. The Proximity card\Fob Identify
Individuals and allows access to pre-defined areas by scanning the
Card\Fob in front of the proximity Reader. The Reader Stores the
information and records the activity for future reference or reports
which could be accessed via the operating software. This system
can monitor Individuals, protect employees and can be integrated
to sophisticated payroll systems. Operating software is password
protected and allows administrator access to system and network.
|
|
|
Biometrics |
|
Biometrics
Readers Recognizes humans based on intrinsic Physical Traits. For
Example a Biometric Reader can read eye retinas or irises, facial
patterns, hand measurements or fingerprints. A Biometric reader
can be used as stand alone or network operated, perfect for Home
office or commercial application. An authorized person has their
physical characteristic scanned and turned into a Numerical algorithm
which is then entered into a database. The authorized person must
subsequently provide that same physical Characteristic to be read
and Recognized by the reader before Access is granted.
It is affordable and user friendly. Can store up to 35, 000 Users
(Networked)
|
|
|
|
|
|
|
|
|
Copyright © Online Premier Pro-Tek.,
All Rights Reserved. |
|
|