Entrypass mini installation manual


















That is Kenwei Solution promise and assurance. The SCB is a great general purpose camera that can be used successfully in most applications. Download the SCB product catalogue, brouchure, specification. Adobe PDF Reader is required to read this documents.

For more details please visit www. Description: Suitable for medium size offices or residential. Current package configuration support 5 alarm zone. Adding one more extra keypad will allow the system to reach maximum 6 alarm zones. Spectra is a combination of elegance and simplicity. Its user-friendliness and incredible functionality make it the best security system in its class. Defender 8Zones Security Alarm System. Download the Defender 8Zones product catalogue, brouchure, specification.

Model : TA Its a leading figure in biometrics field. The color camera can get high definition picture in low Lux condition. Its powerful till can be Controlled from anywhere in the World.

For more product information, please visit our website at www. Any enquiries, please do not hesitate to send your enquiries to sales kenwei. It has local recording, playback, support triple code remote network surveillance. It also support audio recording, provide recording schedule system with interactive schedule grid.

Use the remote surveillance software to take a snapshot of the channels on the main display screen. Screen Captures can be useful for your own records, or may be needed by authorities in case of a security incident. The unique feature of Encryted Lock Control ELC that build in with an encrypted chipset in the relay board to prevent others from tampering the system. Special feature: Can provide protection for two independent partition area at the same location.

Maid can disarm the maids room, kitchen and dining area first partition to do house chores early in the morning while the whole house perimeter second partition still armed and protected.

PTZ Dome Camera. They incorporate more advanced features like time group access and door group access, normally set only via the computer terminal. Typical applications includes offices where they want to keep track of staff movement as in time and attendance, or where they are controlling more than one door, and it is far easier and convenient to manage the database on a computer than to program individually at each reader.

We support a wide range of network readers so if you have one of these readers and needed help, feel free to contact us at If you have these readers and you need help getting it to work, contact us at Multiple doors access applications utilised controllers that are connected with a wide range of readers.

They are linked in a network with a PC running an Access Managment software. Such applications tended to be in offices where there is more than 1 doors to be controlled. They are also implemented in commercial buildings, condominiums as well as industrial plants. And they are used to control gates, barriers, turnstiles, auto sliding doors as well as office doors and private apartments. Depending on your scale, budget and complexity, we have the various ranges and brands to meet your needs.

Single Door Access applications utilised controllers that comes with a built-in reader and keypad. They can be. These Readers are commonly used for premises where only one door is it to be controlled. For offices, this would normally be the main entrance.

For homes, it may be a side gate or the main door. In many applications, there is seldom a need to link to a computer except where the office has many staff beyond 20 and it would be difficult to manage the cards without the use of the a computer. Or where they wish to track when staff come into the office.

Single Door Standalone Readers are controllers with built-in reader. They are ideal for clients who want something simple and economical. The keypad is used for entering PIN number as well as for programming systems. Most of these systems can handle pin, card, card and pin.

We support a wide range of standalone readers so if you have one of these readers and needed help, feel free to contact us at There are several forms of biometric identification employed in access control. They are:. Using biometric technology increases the security level of the systems as it eliminates problems such as lost, stolen or loaned ID cards, and forgotten or guessed PINs.

All biometric readers function by comparing templates stored in its memory to the scan obtained during the process of identification. If the scan match the the template, the ID number of that person is sent to a control panel. The control panel then checks permissions of the user and makes the decision whether to grant access or not.



0コメント

  • 1000 / 1000