Zkteco Access Control Terminal
ZKTeco MB560-VL is a multi-biometric identification terminal featuring zkteco innovative Visible Light Facial Recognition technology. With the latest algorithm and facial recognition-related technologies, the device can perform recognition of a target in a distance from 0.3m to 2m and will function automatically when it detects a face in the detection distance so as to deliver better recognition quality in terms of speed and accuracy than the previous near-infrared facial recognition terminal.
ZKTeco MB560 With the applied Deep Learning algorithm, pose angle tolerance and anti-spoofing have been greatly enhanced against the dynamic environment and various spoofing attacks. Apart from all these, together with the world’s cutting-edge 3D Neuron Fingerprint Algorithm and comprehensive support in mainstream card modules and additional support in WiFi, MB560-VL must be the best fit in various working environments satisfying different customer’s needs
ZKTeco MB560-VL Specification:
Display: 2.8-inch TFT Screen
Face Capacity: 3,000
Fingerprint Capacity: 3,000
Card Capacity: 10,000 (Optional)
Transactions: 100,000
Communication: TCP/IP, WiFi (Optional), USB Host
Standard Functions: ADMS, Work Code, DST, Self-service Query, Automatic Status Switch, T9 Input,
Camera, 9-digit User ID, Multiple Verify Modes, Schedule Bell
Hardware: 900MHz Dual-Core CPU; Memory 512MB RAM / 8G ROM;
2MP WDR Low Light Camera; Adjustable LED Supplement Lighting
Operation System: Linux
Access Control Interface: 3rd Party Electric Lock, Door Sensor, Exit Button
Optional Functions: 125KHz ID Card (EM) / 13.56MHz IC Card (MF)
Biometrics Algorithms: ZKFace V5.8 & ZKFinger V10.0
Facial Recognition Speed: ≤1s
Power Supply: 12V 1.5A
Working Humidity: 20% – 80%
Working Temperature: 0 °C – 45 °C
Dimensions (W*H*D): 170 * 138 * 38.55 (mm)
Supported Software: BioTime8.0
For more information please watch this video
FAQ:
How does It work?
Access control systems perform identification authentication and authorization of users and entities by evaluating required login credentials that can include passwords, personal identification numbers, biometric scans, security tokens or other authentication factors. Multifactor authentication, which requires two or more authentication factors, is often an important part of layered defense to protect access control systems.
Reviews
There are no reviews yet.