EUCHNER EKS DRIVER

If an authorized user was detected, an access level is output with which the user receives a certain authorization. Due to the combination of Electronic-Key and information store, however, it offers much more than just a password replacement. The uniquely coded inductive key tags, can providing various levels of authorization. The rounded shape of the Electronic-Key adapter and the FDA-approved plastic permit usage in hygienically sensitive areas. For this purpose the data structure on the Electronic-Key and the evaluation electronics in the read-only station form a closed system with user group identification and up to 16 access levels that can used directly for a suitable application. EKS Light keys can be programmed by our Syracuse office. Fill in This Form and email it to [techsupport at euchner-usa.

Uploader: Kekree
Date Added: 22 August 2008
File Size: 30.64 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 4179
Price: Free* [*Free Regsitration Required]

Fill in This Form and email it to [techsupport at euchner-usa. For operation the Electronic-Key is placed in the Electronic-Key adapter. The derivation of access rights onto machine functions is carried out through the programming of the control by the system intergrator.

As an open, freely configurable system with various data interfaces, EKS is of very universal application.

Electronic-Key adapter EKS Light FSA modular

Your advantages Secure, controlled access to your processes Automatic logging on and logging off by positioning the Electronic-Key Variety of possible applications in all sectors due to industrial housing Straightforward integration due to 4-bit parallel interface Increased product quality due to controlled euchnr Increased reliability of your systems and as a result lower production costs. The uniquely coded inductive key tags, can providing various levels of authorization.

  EV DH2T COMPRESSION DRIVER DOWNLOAD

With EKS Light you therefore procure not just the EKS hardware, but an integrated solution for managing user groups who is allowed to access what? In a further step, the data are transferred to a control system.

A control system is not necessary for this check. If this is the case, the access level is determined and transferred to the control system via the 4-bit parallel rks.

Electronic-Key-System EKS

The FSA devices also have a second, redundant channel, which is generally available in the form of an additional semiconductor switching contact. For this purpose the data structure on the Electronic-Key and the evaluation electronics in the read-only station form a closed system with user group identification and up to 16 access levels that can used directly for euvhner suitable application.

For example, different levels of access can be established for programming, maintenance, operation, etc. uechner

For this euhcner the Electronic-Key has a pre-defined data structure that is evaluated directly by the read-only station. These data can, e. With the modular design, the Electronic-Key adapter and electronics are mounted physically separated.

EKS Light keys can be programmed by our Syracuse office. The EKS makes passwords obsolete. Due to the combination of Electronic-Key and information store, however, it offers much more than just a password replacement. With this design the Electronic-Key is only held in front or dropped into place. As previously with the EKS, the Light version also permits controlled access to individual machines, entire installations or other facilities.

During this process, e. This switching contact is used in connection with functionally safe applications. The rounded shape of the Electronic-Key adapter and the FDA-approved plastic permit usage in hygienically sensitive areas. EKS Light is optimized for quick, straightforward integration into a control system environment.

  HP DESKJET D4363 DRIVER DOWNLOAD

Easily integrated Parameter assignment for the Electronic-Keys is performed via a programming station on the PC Made for harsh environments Secure with an infinite number of key tag combinations Byte Not affected by magnetic fields Easy to upgrade to an EKM single-user or full version later Two operating modes for flexability Euchnsr match codes and ‘any bit’.

The device first determines whether rks Electronic-Key read is valid and access to the machine is allowed. The authorization for a specific machine function eichner be assigned in the control system for each access level detected; the machine function is enabled in this way. If an authorized user was detected, an access level is output with which the user receives a certain authorization.

The complete evaluation logic for Electronic-Key detection is already integrated into the device and does not therefore need to be programmed into a control system.

Electronic Key System EKS

Also view our other Electronic Key Systems. It is used primarily for electronic access control and access management as an alternative to the normal, password-based systems.

You will find further information in our product catalog and flyer.