ZKTeco MB360 is an innovative product featured with ZK advanced fingerprint and face recognition technologies. It supports multiple verification methods including face, fingerprint, card, password.
ZKTeco MB360 Time Attendance Access Control
Client check is acted in under 1 second, which smoothes out the cycle of access.
The correspondence between the ZKTeco MB360 and PC is by TCP/IP or USB interface for manual information move. Its smooth plan fits totally in any environment.
ZKTeco MB360 Specification:
Face Capacity: 1,500
Unique mark Capacity: 2,000
Card Capacity: 2,000
Record Capacity: 100,000
Show: 2.8-inch TFT Screen
Correspondence: TCP/IP, USB-Host, Wi-Fi (Optional
Standard Functions: SMS, DST, Scheduled-ringer, Self-Service Query, Automatic Status Switch, T9 Input, Photo ID, Camera, Multi-
check, 12V Output, RS232 Printer (Optional Cable)
Interface: for Access Control outsider Electric Lock, Exit Button, Alarm
Discretionary Functions: ID/IC Cards, Work Code, ADMS, Webserver
Force Supply: DC 12V 1.5A
Check Speed: ≤1 Sec.
Working Temp: 0°c – 45°c
Working Humidity: 20% – 80%
Measurement: 167.5×148.8×32.2 mm (Length*Width*Thickness)
Net Weight: 380g
ZKTeco MB360 Fingerprint Time Attendance Terminal is an innovative product featured with ZK advanced fingerprint and face recognition technologies which have standard functions like SMS, DTS, Scheduled-bell, Self Service Query, Automatic Status Switch, T9 Input, Photo ID, Camera, Multi-verification, 12V Output, RS232 Printer (Optional Cable). It supports multiple verification methods including face, fingerprint, card, password, combinations between them, and basic access control functions
FAQ on the ZKTeco Biometrics attendance system.
Which is the recommended finger to be used for a fingerprint scanner?
You can use any of the ten fingers for verification. The index and thumb are much easier for the scanner to capture rather than other fingers.
Does this fingerprint device secure?
It is highly secure for you, and it enhances your privacy by providing encryption and biometrics functionality. In this technology, fingerprints cannot be duplicated, lent, or stolen.