![]() You may not use any technology (including spiders, crawlers, bots and similar virtual agents) to search or gain any information from this website.Ĥ.1 Capacity and agreement. You may not deep link (link to any other page) or link in any way that could suggest that we endorse or support you, or that you have any rights in our website or intellectual property.ģ.5 Virtual agents. ![]() You may only link to the home page of this website. You may not frame this website or any of its pages.ģ.4 Linking. If you breach any of the terms or infringe any other person's rights (including copyright), we may cancel your licence, block you from using the website, claim specific performance or damages against you and take any other steps the law allows, without affecting our rights.ģ.3 Framing. Your licence is automatically cancelled if you do not get our written permission before using this website in a way these terms do not allow.ģ.2 Breach. We may cancel your licence at any time for any reason. We grant you a limited licence to use this website on these terms. Specific terms apply to a specific section of the website or have been specifically agreed between you and us.ģ.1 Licence. If the meaning of any general term conflicts with any other relevant specific term, the specific term will apply. You or your means any visitor to this website, including any other person, website, business or agent (including any virtual or robotic agent) associated with the visitor.Ģ.2 Conflict. It includes our officers, agents, employees, owners, co-branders and associates where the terms limit or exclude our liability We, us, or our means Complete Security Intelligence SA (Pty) Ltd, the owner of the website. You agree to the terms by visiting and using this website.Īny other relevant specific terms, policies, disclaimers, rules and notices agreed between the parties, (including any that may be applicable to a specific section or module of the website) Users may choose from serial communication or Ethernet to get linked to software for central management.įor more information and volume incentive discounts please contact us.These are the general terms of the relationship between you (website visitor) and us (website owner). InBIO is specially designed for applications like home, offices and enterprises. Along with relay contacts for controlling door locks, easily programmable auxiliary relays can be used for additional control and interface to lights, alarms, annunciators, intrusion detection panels, or even extra locking devices or gate controllers. ![]() The InBio continues to operate if the network connection is interrupted. The Controller is backed up in real-time to an onboard SD card. The Controller stores up to 3,000 fingerprint templates, 30,000 card users, and up to 100,000 events and transactions. InBio Fingerprint Access Controller firmware can be upgraded in the field. ![]() A free Auto-discovery tool allows setting and modification of network parameters directly and easily. The InBio Controllers support the FR Series of readers – which transmit fingerprint templates to InBio via RS-485 for fast and accurate matching with templates stored in a database. 1-door, 2-door, and 4-door models can be mixed and matched in an optimized system architecture.Īnti-Passback, First-Card Opening, Multi-Card Opening, Duress Password Entry, and Auxiliary Input/Output Linkages are built into controller firmware. InBio Fingerprint Access Controllers come in three sizes to suit project needs and reduce the cost of unused capacity. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |