February 5, 20031 MS-Series Readers and Credentials.

Slides:



Advertisements
Similar presentations
ILO Turin Centre, November, The IUFs Transnational Company Work.
Advertisements

A. BobbioBertinoro, March 10-14, Dependability Theory and Methods 3. State Enumeration Andrea Bobbio Dipartimento di Informatica Università del Piemonte.
1 Introducing the RF5010 series Hybrid electric strike.
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
TinyOS Tutorial, Part I Phil Levis et al. MobiSys 2003.
Geography in Higher Education in. 03 February 2014HERODOT Network National situation Use 1-2 slides to comment on nationally: University system.
ASEM-DUO Fellowship Programme November 2003 Secretariat for ASEM-DUO Fellowship Annex B.
WS Choreography v.0-1 Overview This is work-in-progress David Burdett, Commerce One 18 June 2003.
The Role of Citizens in Shaping Public Policy. Examples from Italy Giovanni Moro Cittadinanzattiva – Active Citizenship Network BBL at The World Bank Washington.
October Government Your Fingertips: Strategic Framework of the World Bank Knut Leipold October 2003.
The Puzzle of WTO Safeguards and RTAs Joost Pauwelyn Duke University, Law School WTO Seminar on RTAs and the WTO Geneva, 14 November 2003.
TRACES TRAde Control and Expert System
Annual Meeting of ISPA Partners , Centre Borschette (CCAB), Brussels, 9-10 April From ISPA to Cohesion and Structural Funds DG Regio - Ispa.
Meeting of 9 and 10 April Financial rules of the Structural and Cohesion Funds DG Regio - Ispa nkb Financial Management : the n+2 rule Organised.
Basic Wave Theory Review
SC7/WG19 Geneva 2003 ISO/IEC 15909: A Simple Example of Protocol Specification and Verification Jonathan Billington Computer Systems Engineering Centre.
1/10/20031 End-to-end QoS in the users' point of view ITU-T Workshop Geneva 1-3 October 2003 P-Y Hébert - ETSI.
May International and European M.Eng. Introduction of 5th year technical options Master of Engineering for 2003 Introduction for students to the.
Milano 25/2/20031 Bandwidth Estimation for TCP Sources and its Application Prepared for QoS IP 2003 R. G. Garroppo, S.Giordano, M. Pagano, G. Procissi,
All Rights Reserved, Copyright © FUJITSU LABORATORIES LTD An approach to KNOW-WHO using RDF Nobuyuki Igata, Hiroshi Tsuda, Isamu Watanabe and Kunio.
Joe Touch USC/ISI July 10, The X-Bone ICB Meeting July 10, 2003 Joe Touch Director, Postel Center for Experimental Networking Computer Networks.
M. Cooper Communication Skills Making Oral presentations.
Project of the Darmstadt University of Technology within the competence network New Services, Standardization, Metadata (bmb+f) Stephan Körnig Ali Mahdoui.
/ department of mathematics and computer science TU/e eindhoven university of technology CEDEFOP workshop: Policy, Practice, Partnership: Getting to Work.
NexSentry Imaging Solutions
Secura Key Access Control Product Overview.
Rosslare Access Control Solutions
25 July Navigating Doors. 25 July Starting the Program A Doors shortcut icon is on the computer desktop Double-click the icon to start Doors.
Distributed AI an overview. D Goforth - COSC 4117, fall Why distributed AI? situated expert – the importance of general knowledge and incorporation.
Readers DigiReader Series Digital Proximity Readers
1 School Administrators Guide Standards-based Report Card (SBRC) Special Access/Privileges for School Administrators Interim Reporting Interim Reporting.
Introduction Senior Design Team SD0609 ECE Card Key Security System Nick Moszer Raylin Nevland Ryan Lindsay.
25 July Find ID. 25 July Identifies a Card Identifies to whom the card was assigned Three methods for identification: –By presenting a card.
28 July Doors Creating Time Zones. 28 July What is a Time Zone? A designated period of time in which access can be granted to a secure area.
Algorithms and Data Structures Lecture III
Eigen-decomposition Techniques for Skywave Interference Detection in Loran-C Receivers Abbas Mohammed, Fernand Le Roux and David Last Dept. of Telecommunications.
1 Credentials 2 WSE Credentials Pick the credential that best suits your needs Multiple technology card gives ultimate flexibility Long-read range card.
How To Use Google Forms to Create A Test Quick Easy Self-Graded!! Instant Reports.
Software for Traders real tools for real life September ITC Software. All Rights Reserved.
Mining for Patterns Based on Contingency Tables by KL-Miner First Experience Jan Rauch Milan Šimůnek (PhD. student) Václav Lín (student) University of.
© McClureTech Inc System Engineering Applying Architectural Principles to Complex System Development.
Context-Aware Resource Management for Mobile Servers C. Ververidis, E.C. Efstathiou, S. Soursos and G.C. Polyzos Mobile Multimedia Laboratory Department.
27 June Report on two themes: Airport Management Weather & Environment by: Jan Terlouw (NLR) ATM 2003 Seminar, Budapest June 27, 2003.
Lecture 23: Everything Else You Should Know (but won’t see on Exam 2)
The European Parliament and the Semantic Web - Some considerations Peter Brown Head of Information Resources Management European Parliament 01D-GRI_GEN(2003)0014.
February 19, Benefit Claims to Prior Applications under 35 U.S.C. §§ 119(e), 120, 121, and 365(c) Prepared by: Office of Patent Legal Administration.
SWCAP Budgeting July 30, 2003.
July 30, Pro Rata Budgeting. July 30, Pro Rata Budgeting Pro Rata Detail by Funds reports are available on the Internet no later than October.
RK-65K Product Training Installation Operation Troubleshooting
ENAV S.p.A. ASAS TN I Workshop, April 20031/13 Airborne Spacing and Safety Alberto Pasquini - Deep Blue (ENAV)
ASAS TN 2nd Workshop 6-8 October ADS-B Safety Analysis (ASA & GSA) Bob Darby EUROCONTROL ADS Programme ASAS Thematic Network Second Workshop 6-8.
20031 Outcomes of Minnesota’s Statewide Family Home Visiting Program Family Home Visiting Team Minnesota Department of Health.
Reconstruction of Smooth Surface Suitable for LOD Model Construction Jaroslav Semančík KSVI MFF UK Josefův Důl, MIS 2003.
27 June Decision Support Summary 27 June 2003.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Brook for GPUs Ian Buck, Tim Foley, Daniel Horn, Jeremy Sugerman Pat Hanrahan GCafe December 10th, 2003.
Committed to Excellence May TACOM Tank-automotive & Armaments COMmand Recoil Reduction in the Barrett Model 82A1/XM107 and XM109 Frank Dindl U.S.
CompTest Residual Curing Stresses in Thin [0/90] Unsymmetric Composite Plates Marco Gigliotti°, Michael R. Wisnom, Kevin Potter Department of Aerospace.
Using XSLT for Interoperability: DOE and The Traveling Domain Experiment Monday 20 th of October, 2003 Antoine Isaac, Raphaël Troncy and Véronique Malaisé.
A. BobbioReggio Emilia, June 17-18, Dependability & Maintainability Theory and Methods 3. Reliability Block Diagrams Andrea Bobbio Dipartimento di.
Analog and Low-Power Design Lecture 20 (c) Lecture 20 Current Source Biasing and MOS Amplifier Design Michael L. Bushnell CAIP Center and WINLAB.
May 21, 2003Wu and Dai, ICDCS A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks Jie Wu and Fei Dai Dept. of Comp. Sci. & Eng. Florida.
Constraint Satisfaction taking advantage of internal structure of states when paths don’t matter.
Director of Product Line Management HID Proprietary & Confidential
U-GAGE ® T30UX Series Ultrasonic Sensor with TEACH-Mode Configuration.
System Overview The Perfect Solution For Small ‘Entry Level’ Access Control Applications August 2014.
TagMaster Access Products. TagMaster AB22/10/2015 All reader applications; PassMan, WatchMan, WiseMan + SDK Read range up to 5 metres* * depending on.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
Kronos® InTouch® Terminal Job Aid
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Presentation transcript:

February 5, MS-Series Readers and Credentials

February 5, Keri MS-Series Proximity Readers All Readers use a secure, proprietary data format –Compatible with PXL-500P/510P controllers

February 5, Keri MS-Series Proximity Readers All Readers: –Have a beeper to indicate credential read status 1 –One beep indicates the credential was read and recognizedbeep –Two beeps indicates the credential was rejectedbeeps – 1 For security reasons, the MS-4000 does not have a beeper.

February 5, Keri MS-Series Proximity Readers All Readers: –Have a tri-color LED to indicate state 1 –Amber indicates normal state. –Green indicates credential accepted –Red indicates credential rejected. – 1 For security reasons, the MS-4000 does not have an LED.

February 5, MS-3000 Reader Designed to be mounted on door or window frames (mullions) –3.4 H x 1.4 W x 0.38 T (86mm x 36mm x 10mm) Read range of up to 4 inches

February 5, MS-4000 Reader Designed to be bullet proof and flame resistant for high vandalism areas –5.25 H x 2 W x 0.75 T (134mm x 51mm x 19mm) Uses a stainless-steel body and interwoven fiberglass face Read range of up to 2 inches

February 5, MS-5000 Reader Designed to be mounted to a single gang electric junction box –4.3 H x 3 W x 0.38 T (109mm x 76mm x 10mm) Read range of up to 6 inches

February 5, MS-7000 Reader Designed for applications where greater read range is required (such as parking or physically challenged access areas) –8.5 H x 6 W x 0.83 T (21.6cm x 15.2cm x 2.1 cm) Read range of up to 14 inches

February 5, Keri Credentials Designed to work with Keri MS-Series Readers Extremely durable

February 5, KC-10X Credit card sized –Easily fits in wallet or purse –Slot punch allows card to be worn with a clip or a lanyard Card ID number printed on card body Lifetime Warranty

February 5, MT-10X Credit card sized –Easily fits in wallet or purse –Slot punchable allows card to be worn with a clip or a lanyard Photo ID or bar code printable for added security Optional magnetic stripe Card ID number printed on card body 1-year Warranty

February 5, PKT-10X Small, durable Attach to a key ring or necklace Tag ID number printed on card body Lifetime Warranty

February 5, How Proximity Works A Credential is presented The Reader sends an excitation signal which generates current in the Credential

February 5, How Proximity Works The current powers an identification IC in the Credential which sends a response signal to the Reader

February 5, How Proximity Works The Reader sends the response signal to the controller for processing

February 5, Credential to Reader Presentation To maximize read range on MS-3000, MS-5000, and MS-7000 readers

February 5, Credential to Reader Presentation To maximize read range on MS-4000 readers