 |
Apart from the customization it offers, HID also applies encryption to the contents of the card to maintain high level of security and to eliminate duplications. The HID cards are stable and reliable. This explains why many companies and organizations are using HID cards for door access control and time attendance system. Instead of changing the cards every so often when the company wants to shift to a different system, upgrade of the HID card is available to suit the needs. For example, FingerTec system incorporated with HID module can use the existing HID Prox II cards, which does not require the change of cards whenever there is a system shift. FingerTec system with HID can read the 26-bit HID Prox II card with 125kHz, which means that users can register their current Prox II cards with FingerTec. With FingerTec system, users are given a few verification options. R2 as an example, can support 15 verification combinations i.e. fingerprint only, card only, fingerprint and card, etc. The latest FingerTec model with HID system are R2i, the slave fingerprint/card access terminal and also Kadex and iKadex system, FingerTec card system. Fingerprint template can be stored in HID card and to report attendance or to gain access at FingerTec terminal, user has to wave the cards and followed by the fingerprints. Contact info@fingertec.com for any enquiries about FingerTec readers with card system. |