HandKey Time Clock Biometric - II
The no-compromise security solution is at hand.
HandKey Time Clock Biometric - II
The benefits of biometrics security were once reserved for high security applications, but the HandKey II changes that. Tens of thousands of HandKeys are already installed in applications that range from health clubs and day care centers to laboratories and prisons. Its ease of use and reliability have made the HandKey the biometrics standard for the access control industry. The lower cost of the HandKey II now makes the choice even easier.
The HandKey II provides the security and convenience you need at a price you can afford, even when compared to card-based systems. Because your hand is your card, HandKey II allows access only to authorized people without the hassles of a card or key. By eliminating cards, you reduce administrative costs while greatly increasing the level of security. Users appreciate the convenience of never worrying about keeping track of a card or key.
Door control and monitoring
- The HandKey II’s design provides the ultimate in system reliability. Each HandKey II is a complete door controller providing door lock operation, request for exit, and alarm monitoring. All information, including biometric data and decision-making capability resides locally. This ensures your doors are secure and will continue to operate properly even if all communications to the main access control computer are lost.
Stand-alone or fully integrated
- Systems can be as simple as one unit on the computer room door to hundreds of units networked together. The HandKey II’s card reader emulation mode makes adding it to existing access control systems fast and easy. A variety of communications options, including dial-up modems and Ethernet, allow you to design a system that’s right for your facilities.
In a network
- Schlage Recognition Systems’ HandNet for Windows software links a virtually unlimited number of HandKey units into an integrated door access control system. All alarms and transactions report back in real time to the central computer, making door and alarm monitoring easy and efficient. Activity, user and system reports can be easily generated. The central computer handles all hand template management automatically, allowing supervised enrollment at any reader and system-wide deletions. An optional internal modem lets you include remote site operations. Ethernet communication is also available
Features
Door operation and monitoring |
Card reader input |
Request for exit |
Tamper switch |
Memory expansion from 512 (standard) to 32,512 users |
RS-232 printer output |
Stand alone or networked operation |
Card reader emulation mode |
Integrated wall mount design |
Multiple auxiliary inputs and outputs |
62 user definable time zones |
Outdoor version available |
Specifications
Part Number | HK-2 | ||||||||||||||||||||
Size | 8.85 in (22.3 cm) wide 11.65 in (29.6 cm) high 8.55 in (21.7 cm) deep | ||||||||||||||||||||
Weight | 6 lbs (2.7 kg) | ||||||||||||||||||||
Power | 12 to 24 VDC or 12 to 24 VAC 50-60 Hz, 7 watts | ||||||||||||||||||||
Environment | Operating: 32°F to 113°F (0°C to 45°C) Relative Humidity: 20% to 80% NC Non-operating (storage): 14°F to 140°F (-10°C to 60°C) Relative Humidity: 5% to 85% NC | ||||||||||||||||||||
Verification Time | Less than one second | ||||||||||||||||||||
Memory Retention | Up to 5 years via the standard internal lithium battery. | ||||||||||||||||||||
Transaction Storage | 5120 transactions | ||||||||||||||||||||
ID Number Length | 1 to 10 digits from keypad or card | ||||||||||||||||||||
User Capacity | 512 users expandable to 32,512 users | ||||||||||||||||||||
Template Size | 9 bytes | ||||||||||||||||||||
Communications | RS-485 (4 and 2 wire) RS-232 Serial Printer Support or network communications | ||||||||||||||||||||
Baud Rate | 300 to 28.8 Kbps | ||||||||||||||||||||
Card Reader Input | Proximity, Weigand, Magnetic Stripe, Bar Code (5 VDC provided by HandReader) | ||||||||||||||||||||
Card Reader Output | Weigand, Magnetic Stripe, Bar Code | ||||||||||||||||||||
Duress Code | 1 leading digit (user definable) | ||||||||||||||||||||
Regulatory | FCC, CE, UL294 | ||||||||||||||||||||
Door Controls | Request to Exit input (switch or keypad), Door Switch input, Door Lock output. (open collector, 5 VDC present, sinks to ground, 100 mA max) | ||||||||||||||||||||
Alarm Monitoring | Tamper, Door Forced, Duress There are a variety of monitoring options | ||||||||||||||||||||
Event Monitoring | including events such as: Invalid ID, Time Zone Violation, ID Refused, Try Again, Power Failure | ||||||||||||||||||||
Time Zones | 62 user definable time zones Unlimited holidays | ||||||||||||||||||||
Auxiliary Outputs | 3 user definable (open collector, 5 VDC present, sinks to ground, 100 mA max) | ||||||||||||||||||||
Auxiliary Inputs | 2 user definable (open collector, 5 VDC present, sinks to ground, 100 mA max) | ||||||||||||||||||||
Options |
|
Benefits
- REAL security
- Saves money over card-based systems
- Fast and easy to use
- Increases convenience by eliminating cards
- Integrates into existing systems
- Field proven reliable technology