647-50 FINGERPRINT AND RFID READER
12 October 2009
Keeping the bad apples away from your business with the ProxNet 647-50
In a world where workplace crime is spiralling, business owners are becoming increasingly desperate to find ways of separating the good apples from the bad.
“Gone are the days when it was the norm for strangers to enter the workplace,” says Rory Webber, national sales manager for Elvey Security Technologies. “Allowing unauthorised access to one’s premises militates against good risk management policy in today’s world.”
The solution is far simpler and more cost effective than one would think, he says. “Thanks to cutting-edge developments in biometric technology, security architects are incorporating it into workplaces the world over. Why? Because it is the most secure and convenient authentication tool available on the market today owing to the fact that personal biometrics cannot be borrowed, stolen, forgotten or forged.”
Leading the field, according to Elvey’s product manager Valerie Bingham, is GSC System’s ProxNet 647-50 fingerprint and RFID reader. She explains: “This unique new product makes it possible to implement control access into any building. It does so by verifying users’ fingerprints and then sending their associated card or individual numbers to the ProxNet/ ProxNetPro system for validation. Acceptance or rejection is then indicated by a multi-coloured LED (Light Emitting Diode).”
Available in two models, the 647-50 RFID card and fingerprint is designed for large applications requiring up to 5 000 users, while the 647-50 fingerprint can support up to 600 templates.
Fingerprint enrolment is achieved through the use of template management software which is simply connected to the enrolment PC. The 647-50 requires a separate connection for the template management with the link being either the RS-232 or the RS-485. It runs on a Windows (2000/XP/Vista) operating system though not necessarily on the computer that runs the ProxNet or ProxNetPro systems.
Another impressive feature is that templates created and used on one unit may be transferred in their entirety or selectively uploaded to other units on the network, thereby making it possible to grant restricted access to specified personnel.