EUCHNER EKS DRIVER

For this purpose the data structure on the Electronic-Key and the evaluation electronics in the read-only station form a closed system with user group identification and up to 16 access levels that can used directly for a suitable application. The authorization for a specific machine function must be assigned in the control system for each access level detected; the machine function is enabled in this way. It is used primarily for electronic access control and access management as an alternative to the normal, password-based systems. For operation the Electronic-Key is placed in the Electronic-Key adapter. A control system is not necessary for this check. Due to the combination of Electronic-Key and information store, however, it offers much more than just a password replacement.

Uploader: Vok
Date Added: 9 May 2011
File Size: 15.53 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 2427
Price: Free* [*Free Regsitration Required]

With this design the Electronic-Key is only held in front or dropped into place. In a further step, the data are transferred to a control system.

Electronic-Key-System EKS

For operation the Electronic-Key is placed in the Electronic-Key adapter. The EKS makes passwords obsolete. These data can, e.

If this is the case, the access level is determined and transferred to the control system via the 4-bit parallel interface.

The authorization for a specific machine function must be assigned in the control system for each access level detected; the machine function is enabled in this way.

As previously with the EKS, the Light version also permits controlled access to individual machines, entire installations or other facilities. Easily integrated Parameter assignment for the Electronic-Keys is performed via a programming station on the PC Euchnee for harsh environments Secure with an infinite number of key tag combinations Byte Not affected by magnetic fields Easy to upgrade to an EKM single-user or full version later Two operating modes for flexability Exact match codes and ‘any bit’.

  DFM-562IS WINDOWS 7 DRIVER

The derivation of access rights eke machine functions is carried out through the programming of the control by the system intergrator. During this process, e. It is used primarily for electronic access control and access management as an alternative to the normal, password-based systems. EKS Light keys can be programmed by our Syracuse office.

The complete evaluation logic for Electronic-Key detection is already integrated into the device and does not therefore need to be programmed into a control system.

You will find further information in our product catalog and flyer. The rounded shape of the Electronic-Key adapter and the FDA-approved plastic permit usage in hygienically sensitive areas. This switching contact is used in connection with functionally safe applications. Fill in This Form and email it to [techsupport at ejchner. As an open, freely configurable system with various data interfaces, EKS is of very universal application.

EKS-A-K1BKWTEU READ/WRITE KEY

A control system is not necessary for this check. With the modular design, the Electronic-Key adapter and electronics are mounted physically separated.

Your advantages Secure, controlled access to your processes Automatic logging on and logging off by uechner the Electronic-Key Variety of possible applications in all sectors due to industrial housing Straightforward integration due to 4-bit parallel interface Increased product quality due to controlled manufacture Increased reliability of your systems and as a result lower production costs. For example, different levels of access can be established for programming, maintenance, operation, etc.

  FLYCAMONE HD DRIVER DOWNLOAD

Due to the combination of Electronic-Key and information store, however, it offers much more than just a password replacement. The uniquely coded inductive key tags, can providing various levels of authorization. Also view our other Electronic Key Systems. The device first determines whether the Electronic-Key read is valid and access to the machine is allowed. The FSA devices also have a second, redundant channel, which is generally available in the form of an additional semiconductor switching contact.

For this purpose the Electronic-Key has a pre-defined data structure that is evaluated directly by the read-only station.

Electronic Key System EKS

EKS Light is optimized for quick, straightforward integration into a control system environment. For this purpose the data structure on the Electronic-Key and the evaluation electronics in the read-only station form a eucjner system with user group identification and up to 16 access levels that can used directly for a suitable application. With EKS Light you therefore procure not just the EKS kes, but an integrated solution for managing user groups who is allowed to access what?

If an authorized user was detected, an access level is output with which the user receives a certain authorization.