
Subject to optical and technical changes without notice; No liability assumed for setting and printing errors.
ekey TOCA Solution - F1.doc
Call (941) 782-1227 or visit www.ekeyUSA.com
Page
11
3.4 Option 3 - ekey
®
TOCAnet M
ekey® TOCAnet is the networkable version of the system that consists of multiple sets each with
weather resistant fingerprint scanner/s
(outside unit) and one control unit (inside unit)
providing 1-to-many matching for up to 200
fingers at each scanner. Inside and outside
units are connected on RS485 serial bus to
LAN/RS485 converter. The converter is
connected to the LAN using RJ45 plug. The
system architecture is client/server that allows
any local/remote computer on the LAN/WAN to
access it and managed it based on a defined
security level.
A user has to swipe his/her finger on a USB
Scanner connected to computer for enrolled.
The generated fingerprint template is stored at a
central server and then distributed to each
Scanner in the network based on access rights.
In addition to the ekey basic special features, the network version TOCAnet, offers features such as
• Door Man or Secretary Mode - an icon in the Windows taskbar (system tray) allows
activation of any relay (to open a door for example) right from the computer.
• Single/Dual Authorization – each system can be configured to activate its relays with
single finger, two fingers of the same person, or two fingers from two different users (for
high security applications).
• Misuse prevention - After 10 consecutive unauthorized swipes the system blocks itself
for 40 seconds, indicated by a red/orange blinking LED.
• Time Schedule – restrict users’ access time to a specific time period and during a specific
day of the week and for a specific system by the simple drag and drop
• Remote Access – through a LAN or VPN or WAN network, remote access and
management of the system is possible for adding/deleting/changing users, terminal, or
system configuration
• Centralized Management – Users and terminals are managed by a client program that
includes activities such as:
adding/deleting, activating/deactivating users or terminals
Fingerprints are captured through USB fingerprint scanner and distributed to each
scanner or group of scanners in the system depending on assigned access rights
• Logging – Activity logs are reported in real-time while scanner is online with the server;
otherwise it is captured and maintained locally at each scanner until communication is
restored
This option consists of the following items:
Comentarios a estos manuales