ZKTeco iClock 360 Fingerprint Time Attendance Terminal

*Image may differ with actual product's layout, color, size & dimension. No claim will be accepted for image mismatch.

ZKTeco iClock 360 Fingerprint Time Attendance Terminal

Product Id: 127.06.691.03

Regular Price  16,060
Special Price  15,000

Availability?

Quick Overview

Model - ZKTeco iClock 360
Function - Communication: TCP/IP, RS232/485, USB (host & Client),
Standard Functions: Work code, SMS, DST,
Scheduled-bell, Self-Service Query,
Automatic Status Switch, T9 input, and photo-ID, 9 digit user ID
Model
ZKTeco iClock 360
Standard Function
Workcode, SMS, DST, Scheduled-bell, Self-Service Query, Automatic Status Switch, T9 input, 9 digit user ID, and photo-ID
Optional Function
ID/Mifare/HID, Webserver and Wi-Fi, ADMS, External Bell and Printer
Display
3.5 Inch Screen
Verification Speed
1 sec
Fingerprint Capacity
8000
RF Card Capacity
10000
Logs Capacity
200000
Communication Interface
TCP/IP, RS232, USB host/client (optional)
SDL/Software
ZKTime Enterprise, ZKTime Small Business, BioTime 7, ZKTime.Net 3.0
Power Adapter
DC 12V 1.5A
Dimensions
192 x 40 x 1mm
Weight (Kg)
1.05 kg
Feature
Communication: TCP/IP, RS232/485, USB (host & Client), Standard Functions: Workcode, SMS, DST, Scheduled-bell, Self-Service Query, Automatic Status Switch, T9 input, and photo-ID , 9 digit user ID
Others
User: 10,000, Fingerprint Time Attendance Terminal with Adapter
Additional Accessories (Not Included)
31.048.01 Twinmos Patch Cord (20 Meter), 130.691.02 ZKTeco LM-1802 Electromagnetic Lock, 130.691.11 ZKTeco LM-2805 Electromagnetic Lock, 130.691.04 ZKTeco LMB-180L L Bracket, 130.691.09 Zkteco LMB-180U U Bracket, 130.691.10 ZKTeco EX-800B Exit Button (Size86L,86W, 20T(mm)), 130.197.29 Installation for Access Control
Necessary Accessories (Not Included)
A. Lock 180Kg 127.09.691.02 ZKTeco LM-1802 Electromagnetic Lock 127.09.691.03 ZKTeco AL-180D Electromagnetic Doub Bracket for wooded door 127.09.691.04 ZKTeco LMB-180L L Bracket Bracket for Glass door 127.09.691.09 Zkteco LMB-180U U Brack B. Lock for 280kg 127.09.691.11 ZKTeco LM-2805 Electromagnetic Lock 127.09.691.05 ZKTeco AL-280 (LED) Electromagnetic Lock 127.09.691.14 ZKTeco AL-280D (LED) Electromagnetic Double Lock Bracket for wooded door 127.09.691.12 ZKTeco LMB-280L Electromagnetic Lock L Bracket Bracket for Glass door 127.09.691.13 ZKTeco AL-280PU Electromagnetic Lock U Bracket C. Optional Z Bracket 127.09.691.07 Zkteco Z bracket for LM-2802 (280kg) D. Exit Button 127.09.691.10 ZKTeco EX-800B Exit Button (Size 86L,86W, 20T(mm) E. Exit Reader F. Cat 6 Cable G. RJ 45 Connector
Warranty
1 year
Country Of Origin
China
Made in/ Assemble
China

Details

ZKTeco iClock 360

                                                                      

The firmware of iClock360 has been updated to the New version with whole new experiences including stunning GUI, rock-solid stability, fast matching and expandability.
Users can easily manage data by networking iClock360 via RS232, TCP/IP, and USB host/client (optional). Most importantly, all the functions can still operate in a networking state. iClock360 is compatible with various types of USB flash disks, ADMS and former SDK. It also supports data backup and retrieve to avoid the risk of accidental deletion.
It promotes the fingerprint time & attendance management to the next level. You can get the best of benefits from the iClock360.

Features

iClock360Data backup and retrieve

iClock360Intuitive and stunning UI

iClock360Advanced User ID consisting of letters and numbers

 

Model - ZKTeco iClock 360, Standard Function - Workcode, SMS, DST, Scheduled-bell, Self-Service Query, Automatic Status Switch, T9 input, 9 digit user ID, and photo-ID, Optional Function - ID/Mifare/HID, Webserver and Wi-Fi, ADMS, External Bell and Printer, Display - 3.5 Inch Screen, Verification Speed - 1 sec, Fingerprint Capacity - 8000, RF Card Capacity - 10000, Log Capacity - 200000, Communication Interface - TCP/IP, RS232, USB host/client (optional), SDL/Software - ZKTime Enterprise, ZKTime Small Business, BioTime 7, ZKTime.Net 3.0, Power Adapter - DC 12V 1.5A, Dimension - 192 x 40 x 1mm, Weight - 1.05 kg, Feature - Communication: TCP/IP, RS232/485, USB (host & Client),  Standard Functions:  Workcode, SMS, DST, Scheduled-bell, Self-Service Query, Automatic Status Switch, T9 input,  and photo-ID , 9 digit user ID, Others - User: 10,000, Fingerprint Time Attendance Terminal with Adapter, Additional Accessories (Not Included) - 31.048.01 Twinmos Patch Cord (20 Meter), 130.691.02 ZKTeco LM-1802 Electromagnetic Lock, 130.691.11 ZKTeco LM-2805 Electromagnetic Lock, 130.691.04 ZKTeco LMB-180L L Bracket, 130.691.09 Zkteco LMB-180U U Bracket, 130.691.10 ZKTeco EX-800B Exit Button (Size86L,86W, 20T(mm)), 130.197.29 Installation for Access Control, Necessary Accessories (Not Included) - A. Lock 180Kg 127.09.691.02 ZKTeco LM-1802 Electromagnetic Lock 127.09.691.03 ZKTeco AL-180D Electromagnetic Doub Bracket for wooded door 127.09.691.04 ZKTeco LMB-180L L Bracket Bracket for Glass door 127.09.691.09 Zkteco LMB-180U U Brack B. Lock for 280kg 127.09.691.11 ZKTeco LM-2805 Electromagnetic Lock 127.09.691.05 ZKTeco AL-280 (LED) Electromagnetic Lock 127.09.691.14 ZKTeco AL-280D (LED) Electromagnetic Double Lock Bracket for wooded door 127.09.691.12 ZKTeco LMB-280L Electromagnetic Lock L Bracket Bracket for Glass door 127.09.691.13 ZKTeco AL-280PU Electromagnetic Lock U Bracket C. Optional Z Bracket 127.09.691.07 Zkteco Z bracket for LM-2802 (280kg) D. Exit Button 127.09.691.10 ZKTeco EX-800B Exit Button (Size 86L,86W, 20T(mm) E. Exit Reader F. Cat 6 Cable G. RJ 45 Connector, Warranty - 1 year, Country of Origin - China, Made in/ Assemble - China

General


Access control is a fundamental concept in security that minimizes risk to the business or organization. This system is a safeguard for selective restriction of access to a place or other resource while access management describes the process. The act of accessing may mean consuming, entering, or using.

There are two types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data.

How It works:


To secure a facility, Access control systems perform identification authentication and authorization of users and entities by evaluating required login credentials that can include passwords, personal identification numbers (PINs), biometric scans, security tokens or other authentication factors. Multifactor authentication, which requires two or more authentication factors, is often an important part of layered defense to protect access control systems.

Access control system components

Components of an access control system include:

·        An access control panel (also known as a controller)

·        An access-controlled entry, such as a door, turnstile, parking gate, elevator, or other physical barrier

·        A reader installed near the entry. (In cases where the exit is also controlled, a second reader is used on the opposite side of the entry.)

·        Locking hardware, such as electric door strikes and electromagnetic locks

·        A magnetic door switch for monitoring door position

·        Request-to-exit (REX) devices for allowing egress. When a REX button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the door.

Access control topology


Access control decisions are made by comparing the credentials to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has observed a steady push of the look-up out from a central host to the edge of the system, or the reader. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks.

Implementing access control


Access control is a process that is integrated into an organization's IT environment. It can involve identity and access specific surroundings. The best practice of "least privilege" restricts access to only resources that an employee requires to perform their immediate job functions.

A common security issue is failure to revoke credentials and access to systems and data when an individual moves into a different job internally or leaves the company.

Your review

  • মোবাইল ফোন দিয়ে Access Control ডিভাইস চালানো যাবে কি না?
  • মোবাইল ফোন দিয়েও ডিভাইসটি চালানো যাবে, তবে সেক্ষেত্রে কাস্টমাইজ্ড সফটওয়্যার প্রয়োজন হবে।
  • Access Control এর সাথে কি ডেডিকেটেড সফটওয়্যার থাকে, নাকি আলাদা করে কিনতে হয়?
  • সাধারণত ডিভাইসের সঙ্গে একটি ডেডিকেটেড সফটওয়্যার থাকে। তবে বেশ কিছু বাড়তি সুবিধা পেতে চাইলে ফাংশন বুঝে কাস্টমাইজ্ড সফটওয়্যারে কিনে নিতে হয়। রায়ান্স থেকে ১৩০০টাকার বিনিময়ে ৩ বছরের জন্য এমন সফটওয়্যার নিতে পারবেন গ্রাহক।

Your Question