The FSA devices also have a second, redundant channel, which is generally available in the form of an additional semiconductor switching contact. As previously with the EKS, the Light version also permits controlled access to individual machines, entire installations or other facilities. If this is the case, the access level is determined and transferred to the control system via the 4-bit parallel interface. This switching contact is used in connection with functionally safe applications. For this purpose the data structure on the Electronic-Key and the evaluation electronics in the read-only station form a closed system with user group identification and up to 16 access levels that can used directly for a suitable application.
|Date Added:||6 August 2015|
|File Size:||39.60 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
EKS-A-K1BKWTEU READ/WRITE KEY
The authorization for a specific machine function must be assigned in the control system for each access level detected; the machine function is enabled in this way. The rounded shape of the Electronic-Key adapter and the FDA-approved plastic permit usage in hygienically sensitive areas.
The EKS makes passwords obsolete. The uniquely coded inductive key tags, ekks providing various levels of authorization.
You will find further information in our product catalog and flyer. During this process, e.
Electronic Key System EKS
The complete evaluation logic for Electronic-Key detection is already integrated into the device and does not therefore need to be programmed into a control system. For operation the Electronic-Key is placed in the Electronic-Key adapter. As previously with the EKS, the Light version also permits euchndr access to individual machines, euchmer installations or other facilities. In a further step, the data are transferred to a control system.
The FSA devices also have a second, redundant channel, which is generally available in the form of an additional semiconductor switching contact. Fill in This Form and email it to [techsupport at euchner-usa.
For this purpose the data structure on the Electronic-Key and the evaluation electronics in the read-only station form a closed system with user group identification and up to 16 access levels that can used directly for a suitable application. A control system is not necessary for this check. This switching contact is used in connection with functionally safe applications.
With EKS Light you therefore procure not just the EKS hardware, but an integrated solution for managing user groups who eka allowed to access what? For this purpose the Electronic-Key has a pre-defined data structure that is evaluated directly by the euhner station.
If this is the case, the access level is determined and transferred to the control system via the 4-bit parallel interface. If an authorized user was detected, an access level is output with which the user receives es certain authorization.
EKS Light keys can be programmed by our Syracuse office. The derivation of eucuner rights onto machine functions is carried out through the programming of the control by the system intergrator. For example, different levels of access can be established for programming, maintenance, operation, etc. As an open, freely configurable system with various data interfaces, EKS is of very universal application.
Due to the combination of Electronic-Key and information store, however, it offers much more than just a password replacement. ekks
The device first determines whether the Electronic-Key read is valid and access to the machine is allowed. Your advantages Secure, controlled access to your processes Automatic logging eychner and logging off by positioning the Electronic-Key Variety of possible applications in all sectors due to industrial housing Straightforward integration due to 4-bit parallel interface Increased product quality due to controlled manufacture Increased reliability of your systems and as a result lower production costs.
With this design the Electronic-Key is only held in front or dropped into place. Also view our other Electronic Key Systems. Easily integrated Parameter assignment for the Electronic-Keys is performed via a programming station on the PC Made for harsh environments Secure with an infinite number of key tag combinations Byte Not affected by magnetic fields Easy to upgrade to an EKM single-user or full version later Two operating modes for flexability Exact match codes and ‘any bit’.
With the modular design, the Electronic-Key adapter and electronics are mounted physically separated. EKS Light is optimized for quick, straightforward integration into a control system environment.
These data can, e. It is used primarily for electronic access control and access management as an alternative to the normal, password-based systems.