ZKTeco MB560-VL Linux-Based Hybrid Biometric Time & Attendance and Access Control Terminal with Visible Light Facial Recognition

*Image may differ with actual product's layout, color, size & dimension. No claim will be accepted for image mismatch.

ZKTeco MB560-VL Linux-Based Hybrid Biometric Time & Attendance and Access Control Terminal with Visible Light Facial Recognition

Product Id: 127.06.691.55

Regular Price  15,190
Special Price  14,200

Delivery time?

Quick Overview

Model - ZKTeco MB560-VL
Display - 2.8 inch TFT Screen
Fingerprint Capacity - 3000
Face Capacity - 3000
Communication Interface - USB
Model
ZKTeco MB560-VL
Standard Function
ADMS, Work Code, DST, Self-service Query, Automatic Status Switch, T9 Input, Camera, 9-digit User ID, Multiple Verify Modes, Schedule Bell
Optional Function
125KHz ID Card (EM) / 13.56MHz IC Card (MF)
Display
2.8 Inch TFT Screen
Fingerprint Capacity
3000
RF Card Capacity
10000
Face Capacity
3000
Communication Interface
USB
Access Control Interface
3rd Party Electric Lock, Door Sensor, Exit Button
Algorithm Version
ZKFace V5.8 & ZKFinger V10.0
Power Adapter
12V 1.5A
Dimensions
170 x 138 x 38.55mm
Specialty
MB560-VL is a multi-biometric identification terminal featuring ZKTeco sinnovative Visible Light Facial Recognition technology. With the latest algorithm and facial recognition related technologies, the device can perform recognition of a target in a distance from 0.3m to 2m and will function automatically when it detects a face in the detection distance so as to deliver better recognition quality in terms of speed and accuracy than the previous near-infrared facial recognition terminal. With the applied Deep Learning algorithm, pose angle tolerance and anti-spoofing have been greatly enhanced against dynamic environment and various spoofing attacks. Apart from all these, together with the worlds cutting-edge 3D Neuron Fingerprint Algorithm and comprehensive support in mainstream card modules and additional support in WiFi, MB560-VL must be a best fit in various working environments satisfying different customers needs.
Others
Transactions: 100,000, Hardware: 900MHz Dual Core CPU; Memory 512MB RAM / 8G ROM; 2MP WDR Low Light Camera; Adjustable LED Supplement Lighting, Operation System: Linux, Facial Recognition Speed: <-1s, Working Humidity: 20% - 80%, Working Temperature: 0 degree C - 45 degree C, Supported Software: BioTime8.0
Warranty
1 year

Details

Model - ZKTeco MB560-VL, Standard Function - ADMS, Work Code, DST, Self-service Query, Automatic Status Switch, T9 Input, Camera, 9-digit User ID, Multiple Verify Modes, Schedule Bell, Optional Function - 125KHz ID Card (EM) / 13.56MHz IC Card (MF), Display - 2.8 Inch TFT Screen, Fingerprint Capacity - 3000, RF Card Capacity - 10000, Face Capacity - 3000, Communication Interface - USB, Access Control Interface - 3rd Party Electric Lock, Door Sensor, Exit Button, Algorithm Version - ZKFace V5.8 &amp; ZKFinger V10.0, Power Adapter - 12V 1.5A, Dimension - 170 x 138 x 38.55mm, Specialty - MB560-VL is a multi-biometric identification terminal featuring ZKTeco sinnovative Visible Light Facial Recognition technology. With the latest algorithm and facial recognition related technologies, the device can perform recognition of a target in a distance from 0.3m to 2m and will function automatically when it detects a face in the detection distance so as to deliver better recognition quality in terms of speed and accuracy than the previous near-infrared facial recognition terminal. With the applied Deep Learning algorithm, pose angle tolerance and anti-spoofing have been greatly enhanced against dynamic environment and various spoofing attacks. Apart from all these, together with the worlds cutting-edge 3D Neuron Fingerprint Algorithm and comprehensive support in mainstream card modules and additional support in WiFi, MB560-VL must be a best fit in various working environments satisfying different customers needs., Others - Transactions: 100,000, Hardware: 900MHz Dual Core CPU; Memory 512MB RAM / 8G ROM; 2MP WDR Low Light Camera; Adjustable LED Supplement Lighting, Operation System: Linux, Facial Recognition Speed: &lt;-1s, Working Humidity: 20% - 80%, Working Temperature: 0 degree C - 45 degree C, Supported Software: BioTime8.0, Warranty - 1 Year

General


Access control is a fundamental concept in security that minimizes risk to the business or organization. This system is a safeguard for selective restriction of access to a place or other resource while access management describes the process. The act of accessing may mean consuming, entering, or using.

There are two types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data.

How It works:


To secure a facility, Access control systems perform identification authentication and authorization of users and entities by evaluating required login credentials that can include passwords, personal identification numbers (PINs), biometric scans, security tokens or other authentication factors. Multifactor authentication, which requires two or more authentication factors, is often an important part of layered defense to protect access control systems.

Access control system components

Components of an access control system include:

·        An access control panel (also known as a controller)

·        An access-controlled entry, such as a door, turnstile, parking gate, elevator, or other physical barrier

·        A reader installed near the entry. (In cases where the exit is also controlled, a second reader is used on the opposite side of the entry.)

·        Locking hardware, such as electric door strikes and electromagnetic locks

·        A magnetic door switch for monitoring door position

·        Request-to-exit (REX) devices for allowing egress. When a REX button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the door.

Access control topology


Access control decisions are made by comparing the credentials to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has observed a steady push of the look-up out from a central host to the edge of the system, or the reader. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks.

Implementing access control


Access control is a process that is integrated into an organization's IT environment. It can involve identity and access specific surroundings. The best practice of "least privilege" restricts access to only resources that an employee requires to perform their immediate job functions.

A common security issue is failure to revoke credentials and access to systems and data when an individual moves into a different job internally or leaves the company.

Your review

  • মোবাইল ফোন দিয়ে Access Control ডিভাইস চালানো যাবে কি না?
  • মোবাইল ফোন দিয়েও ডিভাইসটি চালানো যাবে, তবে সেক্ষেত্রে কাস্টমাইজ্ড সফটওয়্যার প্রয়োজন হবে।
  • Access Control এর সাথে কি ডেডিকেটেড সফটওয়্যার থাকে, নাকি আলাদা করে কিনতে হয়?
  • সাধারণত ডিভাইসের সঙ্গে একটি ডেডিকেটেড সফটওয়্যার থাকে। তবে বেশ কিছু বাড়তি সুবিধা পেতে চাইলে ফাংশন বুঝে কাস্টমাইজ্ড সফটওয়্যারে কিনে নিতে হয়। রায়ান্স থেকে ১৩০০টাকার বিনিময়ে ৩ বছরের জন্য এমন সফটওয়্যার নিতে পারবেন গ্রাহক।

Your Question