{"id":1446,"date":"2020-11-20T07:50:12","date_gmt":"2020-11-20T08:50:12","guid":{"rendered":"http:\/\/rcoder.ir\/armanco\/?post_type=product&p=1446"},"modified":"2020-12-05T08:03:24","modified_gmt":"2020-12-05T09:03:24","slug":"%d8%b3%db%8c%d8%b3%d8%aa%d9%85-%d8%a7%d8%ab%d8%b1-%d8%a7%d9%86%da%af%d8%b4%d8%aa%db%8c-bio500i","status":"publish","type":"product","link":"https:\/\/www.armanco.ir\/en\/product\/%d8%b3%db%8c%d8%b3%d8%aa%d9%85-%d8%a7%d8%ab%d8%b1-%d8%a7%d9%86%da%af%d8%b4%d8%aa%db%8c-bio500i\/","title":{"rendered":"Fingerprint System Bio500i"},"content":{"rendered":"
<\/p>\n
<\/p>\n
One of the most widely used access control systems is the fingerprint type.<\/p>\n
Biometric access control systems (fingerprint and face recognition) are commonly used to equip server rooms.<\/p>\n
Combining the biometric method with one of the card or code methods used as AND or OR will definitely increase the input security factor.<\/p>\n
The Bio500i card fingerprint system is an independent access control system. Combining this system with the M300N controller will increase the security of your passageway.<\/p>\n
<\/p>\n
Technical Specifications :<\/span><\/p>\n - Capacity of 500 users (fingerprint, card)<\/p>\n - Has NO \/ NC \/ COM outputs, external alarms in the form of relays<\/p>\n - Ability to use independently with relay output without the need for software<\/p>\n - Has a highly sensitive optical fingerprint sensor with (Resolution 500Dpi)<\/p>\n - Ability to unload and transfer user information via MicroSD<\/p>\n - Has an alarm key on the system case to connect to the internal alarm of the building<\/p>\n - Remote control, connection to video iPhone and push key<\/p>\n - Ability to register the card or fingerprint as a Master to access the settings<\/p>\n - Can be used with any type of electric lock, magnetic, drop bolt and automatic doors<\/p>\n - Record 2000 acccess by the M300 board off-line and unlimited on-line<\/p>\n - Communication with the computer via RS485 and TCP \/ IP port up to 64 units by M300 board<\/p>\n - Ability to connect to the M300N controller and exploit hardware and software locations<\/p>\n <\/p>\n <\/p>\n <\/p>","protected":false},"excerpt":{"rendered":" \u06cc\u06a9\u06cc \u0627\u0632 \u067e\u0631 \u06a9\u0627\u0631\u0628\u0631\u062f\u062a\u0631\u06cc\u0646 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u062a\u0631\u062f\u062f \u0627\u0632 \u0646\u0648\u0639 \u0627\u062b\u0631 \u0627\u0646\u06af\u0634\u062a\u06cc \u0645\u06cc \u0628\u0627\u0634\u062f. \u0645\u0639\u0645\u0648\u0644\u0627\u064b \u062c\u0647\u062a \u062a\u062c\u0647\u06cc\u0632 \u0627\u062a\u0627\u0642 \u0647\u0627\u06cc \u0633\u0631\u0648\u0631 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u062a\u0631\u062f\u062f \u0628\u0627\u06cc\u0648\u0645\u062a\u0631\u06cc\u06a9 (\u0627\u062b\u0631 \u0627\u0646\u06af\u0634\u062a\u06cc \u0648 \u062a\u0634\u062e\u06cc\u0635 \u0686\u0647\u0631\u0647 ) \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u06af\u0631\u062f\u062f. \u062a\u0631\u06a9\u06cc\u0628 \u0631\u0648\u0634 \u0628\u0627\u06cc\u0648\u0645\u062a\u0631\u06cc\u06a9 \u0628\u0627 \u06cc\u06a9\u06cc \u0627\u0632 \u0631\u0648\u0634 \u0647\u0627\u06cc \u06a9\u0627\u0631\u062a \u0648 \u06cc\u0627 \u06a9\u062f \u06a9\u0647 \u0628\u0647 \u0635\u0648\u0631\u062a AND \u0648 \u06cc\u0627 OR […]<\/p>","protected":false},"featured_media":1180,"template":"","meta":[],"yoast_head":"\n