Main station|Member Center|Save the desktop|Mobile browsing
Ordinary Member

New Vision Electronic Products Sales Center

http://b2b.titker.com/member/

sell
  • There is no classification
contact
  • Contact:朱经理
  • Phone:099-3774769
search
 
link
  • There is no link yet
home > sell > Xinshitong attendance machine system is efficient and safe, and a free installation package is specially launched.
Xinshitong attendance machine system is efficient and safe, and a free installation package is specially launched.
products: Views:5Xinshitong attendance machine system is efficient and safe, and a free installation package is specially launched. 
brand: 新视通
price: 1.00元/台
MOQ: 1 台
Total supply: 9999 台
Delivery date: Shipped within 3 days from the date of payment by the buyer
Valid until: Long-term validity
Last updated: 2016-10-18 13:38
 
Details
The system supports the second-generation ID card and temporary card to open the door. The system can realize the comparison of the person's ID card. When swiping the card with the ID card, the system can compare the face, facial bones and other characteristics based on the captured photo and the ID card photo to ensure whether it is the person holding the card. If not, If you hold the pass, the alarm will be triggered in the guard room. , seamlessly link video and picture captures with multiple mainstream brands of surveillance camera protocols and store them in the system server for review at any time.
The ID card registration and card swiping mode encourages outsiders to take the initiative to go to the monitoring center to register information. In terms of card issuance authorization management, everyone must register to ensure that the information of entrance and exit personnel is accurate.
Unauthorized personnel cannot enter and exit, and criminals will not be able to take advantage of it, which greatly improves the level of security management in application scenarios.
All entry and exit records are linked with video capture, which greatly facilitates the public security department's subsequent tracing and quick identification of the perpetrators. Combined with publicity, criminals can retreat when faced with difficulties and protect their lives and property.
, can seamlessly connect with the public security information system to achieve information sharing. Once the identity documents of fugitives and criminals are registered in the system or their card information is swiped, they can be immediately matched to the public security system. The security personnel of the fugitive warehouse can detect and deal with them in time.
, industry-leading technology, ultra-high-performance video linkage snapshots per second while ensuring smooth platform operation.
Multi-level server architecture data dynamic information is summarized in real time and provides a powerful report query function to accurately find classification groups with specific attributes.
, meet the requirements of simultaneous management of multiple operators and multiple terminals. Operator permissions can be accurately set to what operating permissions each door point has, effectively preventing permission cross-over. For example, the information registrar can only enter personnel information but cannot delete personnel or change equipment parameters. set up.
Request for quotation
A total of0articles  Related Comments: