These data can, e. You will find further information in our product catalog and flyer. The FSA devices also have a second, redundant channel, which is generally available in the form of an additional semiconductor switching contact. Due to the combination of Electronic-Key and information store, however, it offers much more than just a password replacement. With this design the Electronic-Key is only held in front or dropped into place. For operation the Electronic-Key is placed in the Electronic-Key adapter. The uniquely coded inductive key tags, can providing various levels of authorization.
|Date Added:||13 June 2005|
|File Size:||62.80 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
The device first determines whether the Electronic-Key read is valid and access to the machine is allowed. Easily integrated Parameter assignment for the Electronic-Keys is eos via a programming station on the PC Made for harsh environments Secure with an infinite number of key tag combinations Sks Not affected by magnetic fields Easy to upgrade to an EKM single-user or full version later Two operating modes for flexability Exact match codes and ‘any bit’.
A control system is not necessary for this check. With the modular design, the Electronic-Key adapter and electronics are mounted physically separated. The FSA devices also have a second, redundant channel, which is generally available in the form of an additional semiconductor eis contact.
The EKS makes passwords obsolete. With this design the Electronic-Key is only held in front or dropped into place. It is used primarily for electronic access control and access management as an alternative sks the normal, password-based systems. For this purpose the Electronic-Key has a pre-defined data structure that is evaluated directly by the read-only station.
This switching contact is used in connection with functionally safe applications. If an authorized user was detected, an access level is output with which the user receives a certain authorization. For this purpose the data structure on the Electronic-Key and the evaluation electronics in the read-only station form a closed system with user group identification and up to 16 access levels that can used directly for a suitable application.
EKS-A-K1BKWTEU READ/WRITE KEY
With EKS Light you therefore procure not just the EKS hardware, but an integrated solution for eucgner user groups who is allowed to access what? If this is the case, the access level is determined and transferred to the control system via the 4-bit parallel interface.
Also view our other Electronic Key Systems. Your advantages Secure, controlled access to euhner processes Automatic logging on and logging off by positioning the Electronic-Key Variety of possible applications in all sectors due to industrial housing Straightforward integration due to 4-bit parallel interface Increased product quality due to controlled manufacture Increased reliability of your systems and as a result lower production costs.
The uniquely coded inductive key tags, can providing various levels of authorization.
The authorization for a specific machine function must be assigned in the control system for each access level detected; the machine function is enabled in this way. For example, different levels of access can be established for programming, maintenance, operation, etc.
The rounded shape of the Electronic-Key adapter and the FDA-approved plastic permit usage in hygienically sensitive areas.
Electronic-Key adapter EKS Light FSA modular
EKS Light is optimized for quick, straightforward integration into a control system environment. These data can, e.
Due to the combination of Electronic-Key and information store, however, it offers much more than just a password replacement. The derivation of access rights onto machine functions is carried out through the programming of the control by the system intergrator. You will find further information in our product catalog and flyer.
During this process, e. EKS Light keys can be programmed by euchnrr Syracuse office. Fill in This Form and email it to [techsupport at euchner-usa. In a further step, the data are transferred to a control system. As previously with the EKS, the Light version also permits controlled access to individual machines, entire installations or other facilities.
EKS Electronic Key System
For operation the Electronic-Key is placed in the Electronic-Key adapter. The complete evaluation logic for Electronic-Key detection is already integrated into the device and does not therefore need to be programmed into a control system. As an open, eucyner configurable system with various data interfaces, EKS is of very universal application.