Warning: call_user_func_array() expects parameter 1 to be a valid callback, function 'fop_enqueue_conditional_scripts' not found or invalid function name in /home/u7097946/public_html/manciticomsec.com/wp-includes/class-wp-hook.php on line 303

COSEC DOOR FOP

BIOMETRIC FINGERPRINT ACCESS CONTROL – OVERVIEW


Matrix COSEC DOOR FOP, one of the variants of Door Access Control systems, is designed to give organizations top of the line security for their infrastructure and employees. With its advanced features, along with biometric credentials (fingerprints/palm veins), PIN and RFID card based access, the device offers foolproof security solutions for organizations in all industries. Its award-winning design, multiple credentials and connectivity options fulfill the requirements of all types of businesses. Therefore, this solution is ideal for various sectors that include Hospitals, Schools, Banks, Government Institutes, Hotels, Remote Sites and Large/Small Enterprises.

COSEC DOOR FOP, a conventional Door Controller, can be used for various applications like Access Control, Time-Attendance, Visitor Management, Cafeteria Management, Vehicle Access Management and Contract Workers Management. COSEC DOOR FOP is a door controller, which has 128*64 Dot Matrix Display with touch sense keypad. It is capable of storing up to 9,600 fingerprint templates and 5,00,000 events. Moreover, with Ethernet, Wi-Fi and 3G/4G connectivity, this device offers extra flexibility in designing a security solution while reducing installation and maintenance costs. This RFID card based or fingerprint door entry system can work in a network or a standalone mode. It offers various interfaces like exit reader, exit switch, auxiliary input/output port and USB port.

Hence, high quality biometric fingerprint door access systems such as this, with built-in controllers are versatile devices designed for reliability, modularity and performance.

APPLICATIONS


Time-Attendance

Visitor Management

Contract Workers Management

 Access Control

Cafeteria Management

KEY FEATURES


Superior Design 

  • iF Design, Good Design and India Design Mark Awards
  • 128x64 LCD Display
  • Touch Sense Keypad
  • Audio Visual Indication

Saves Time by Quick Fingerprint Identification

  • Identification in Less than One Second
  • 1:1 and 1:N Verification

Manage many Users from a Device

  • 500.000 Events Storage
  • 9.600 Fingerprint Templates

Select Credential as per Requirement

  • Fingerprint, RFID Card and PIN
  • Proximity and Smart Cards
  • EM Prox, HID Prox, Mifare and HID iCLASS

Connect Device with Server using available Option

  • Wired and Wireless Connectivity
  • Ethernet and RS-485
  • Mobile Broadband (3G/4G) via USB

Perform Function Faster from the Device itself

  • User Enrolment from Device
  • Perform Attendance Functions
  • Take Out the Event Data via USB

Various Interfaces to Control Various Applications

  • Door Relay and Door Sense
  • Auxiliary Input and Output Ports
  • Exit Reader and Exit Switch

Multi-door Access Control Software

  • Compatible and Centralized Solution for Multiple locations Enterprises
  • Minimal Wiring
  • Standalone and Network based Access Control

INTERFACE DIAGRAM


VARIANTS


COSEC DOOR FOPQ

TECHNICAL SPECIFICATIONS


Variants COSEC DOOR FOP COSEC DOOR FOPQ
Credential Support Finger, Card and PIN Finger, Card and PIN
Display 128 x 64 Dot Matrix Display 128 x 64 Dot Matrix Display
Keypad 16 Touch Sense Keys 16 Touch Sense Keys
User Capacity 50,000 (Max. 9600 in 1:N Mode) 50,000 (Max. 9600 in 1:N Mode)
Template Per User Up to Ten (Single Template per Finger Mode) or Up to Five (Dual Template per Finger Mode) Up to Ten (Single Template per Finger Mode) or Up to Five (Dual Template per Finger Mode)
Template Storage Capacity 9600 in 1:N Mode and 1 lac in 1:1 Mode 9600 in 1:N Mode and 1 lac in 1:1 Mode
Cards Per User Up to Two Up to Two
Event Buffer 5,00,000 5,00,000
Types of Cards Support Proximity Card (EM Prox and HID Prox) and Smart Card (Mifare and HID iCLASS) (Card Module Required) Proximity Card (EM Prox and HID Prox) and Smart Card (Mifare and HID iCLASS) (Card Module Required)
Mobile Broadband Yes (2G/3G Support) Yes (2G/3G Support)
RS-485 Yes (115.2 Kbps) Yes (115.2 Kbps)
Ethernet Yes (10/100 Mbps on Ethernet) Yes (10/100 Mbps on Ethernet)
Exit Switch Yes Yes
Door Status Sense Programmable NO, NC and Supervised Programmable NO, NC and Supervised
Door Lock Relay Form C, SPDT Relay (Max 2A@30 VDC) Form C, SPDT Relay (Max 2A@30 VDC)
Door Lock Power Internal 12VDC @ 0.5A or External Internal 12VDC @ 0.5A or External
Aux-IN Programmable NO, NC and Supervised Programmable NO, NC and Supervised
Aux-OUT Form C, SPDT Relay (Max 2A @ 30VDC) Form C, SPDT Relay (Max 2A @ 30VDC)
Reader Interface types RS-232, and Wiegand IN only RS-232, and Wiegand IN only
Reader Types 1 Port for Card Reader/Finger Reader/Card Finger Combo Reader/Third Party Wiegand reader 1 Port for Card Reader/Finger Reader/Card Finger Combo Reader/Third Party Wiegand reader
USB 2 USB Ports (1 for Data Transfer and 1 for 2G-3G Dongle) 2 USB Ports (1 for Data Transfer and 1 for 2G-3G Dongle)
Buzzer Yes Yes
LED 4 LEDs (Status, Alarm, Allowed, Denied) 4 LEDs (Status, Alarm, Allowed, Denied)
CPU 400 MHz ARM 9 based Processor 400 MHz ARM 9 based Processor
Flash Memory 256MB Flash 256MB Flash
RAM Memory 128MB DDR2 128MB DDR2
Input Power 12VDC @ 2A 12VDC @ 2A
Reader Power Output Internal 12 VDC @ 0.5 A or External External Internal 12 VDC @ 0.5 A or External
Battery Backup No No
Humidity 5% to 85% RH Non-condensing 5% to 85% RH Noncondensing
Operating Temperature 0°C to + 50°C (32°F to 122°F) 0°C to + 50°C (32°F to 122°F)
Tamper Detection Yes Yes
Certification CE and RoHS CE and RoHS
STQC No Verified
Dimension (mm) 100X220X56 100X220X56
Weight (kgs) 0.65 0.65

 

RESOURCES


Product Catalogue


Technical Specifications


this site

Biometric access control is one of the most popular types of security systems on the market, and for good reason: it combines security and convenience in a way that no other access control system can.

Access control refers to the management of an access point, such as a door, turnstile, elevator, etc. so as to only allow entry to authorized users. While access control systems can be used for virtually any access point that uses an electronic lock mechanism, doors are the most common applications for access control telefon-guide.

Access control systems come in three types, based on:

1. What the user has (object-based):
The user must possess a specific object to be granted entry. Common types of object-based access tokens include:

Keys
Fobs
ID Cards
2. What the user knows (information-based):
The user must know a specific code to be granted france-ipad entry. Common types of information-based access codes include:

Password
Pass-phrase
PIN number
3. Who the user is (biometric-based):
The user identifies themselves with their own body using biometrics. Common biometric modalities include:

Palm vein
Fingerprint
Iris scan
Face recognition
Why Are Biometrics Used in Security Systems?
Traditional access systems have a critical vulnerability: objects and data can be shared or stolen, allowing someone other than the intended user to access the facility if they get a hold of them.

This may or may not not be a big deal depending on the level of security that is required.

For example, many coffee shops use a keypad on the bathroom door with the passcode (usually just four digits) printed on the receipt so that visitors aren’t able to simply enter, use the restroom, and leave without ordering anything.

Whether this is good customer service or not is beside the point. In this case, the thing that the lock is protecting (a public bathroom) doesn’t exactly require Fort Knox-level security, so a simple keypad works just fine. Purchase my house will help you sell your property quickly. They provide a simple answer so you can go on. Buy my house buyers make unconditional Sell my house fast and buy houses in any condition. They help home sellers get top dollar. Visit https://www.cashhomebuyersnc.com/sell-my-land-fast-durham-nc/.

However, such a security system is unfit for anything that requires more serious protection. The problem with passcodes is that, because they are just information, they can be easily shared and distributed among an infinite number of people — even if those people aren’t authorized.

Physical access tokens (such as keys, fobs, and ID cards) share a similar vulnerability: they can be easily lost or stolen, allowing whoever has access to the token to have access to the facility — regardless of whether the person accessing it is actually authorized.

Biometrics, however, don’t have this vulnerability. Because your unique biometric code is always with you, it is very difficult for anyone other than you to access it.

This is why, while not all biometrics are equal in terms of security, even some of the least secure biometric systems are still more secure than traditional security systems.