You will find further information in our product catalog and flyer. If this is the case, the access level is determined and transferred to the control system via the 4-bit parallel interface. The EKS makes passwords obsolete. The authorization for a specific machine function must be assigned in the control system for each access level detected; the machine function is enabled in this way. It is used primarily for electronic access control and access management as an alternative to the normal, password-based systems.
|Date Added:||5 May 2017|
|File Size:||41.46 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
Easily integrated Parameter assignment for the Electronic-Keys is performed via a programming station on ekss PC Made for harsh environments Secure with an infinite number of key tag combinations Byte Not affected by magnetic fields Easy to upgrade to an EKM single-user or full version later Two operating modes for flexability Exact match codes and ‘any bit’.
Electronic-Key adapter EKS Light FSA modular
The uniquely coded inductive key tags, can providing various levels of authorization. The derivation of access rights onto machine functions is carried out through the programming of the control by the system intergrator. With the modular design, the Electronic-Key adapter and electronics are mounted euchneer separated. These data can, e. You will find further information in our product catalog and flyer. With EKS Light you therefore procure not just the EKS hardware, but an integrated solution for managing user groups who is allowed to access what?
The device first determines whether the Electronic-Key read is valid and access to the machine is allowed. The authorization for a specific machine function must be assigned in the control system for each access level detected; the machine function is enabled in this way. The complete evaluation logic for Electronic-Key detection is already integrated into the device euchneer does not therefore need to be programmed into a control system.
For example, different levels of access can be established for programming, maintenance, operation, etc. As previously with the EKS, the Light version also permits controlled access to individual machines, entire installations or other facilities. If an authorized user was detected, an access level is output with which the user receives a certain authorization. EKS Light keys can be programmed by our Syracuse office.
Your advantages Secure, controlled access to your processes Automatic logging on dks logging off by positioning the Electronic-Key Variety of possible applications in all sectors due to industrial housing Straightforward integration due to 4-bit parallel interface Increased product quality due to controlled manufacture Increased reliability of your systems and as a result euxhner production costs.
During this process, e. As an open, freely configurable system with various data interfaces, EKS is of very universal application. With this design the Electronic-Key is only held in front or dropped into place. Due to the combination of Electronic-Key and information store, however, it offers much more than just a password replacement.
The FSA devices also have a second, redundant channel, which is generally available in the form of an additional euvhner switching contact.
Fill in This Form and email it to [techsupport at euchner-usa. EKS Light is optimized for quick, straightforward integration into a control system environment.
If this is the case, the access level is determined and transferred to the control system via the 4-bit parallel interface. This switching contact is used in connection with functionally safe applications.
A control system is not necessary for this check. It is used primarily for electronic access control and access management as an alternative to the suchner, password-based systems.
Electronic-Key adapter EKS Light FSA modular
For this purpose the data structure on the Electronic-Key euuchner the evaluation electronics in the read-only station form a closed system with user group identification and up to suchner access levels that can used directly for a suitable application.
For operation the Electronic-Key is placed in the Electronic-Key adapter. The rounded shape of the Electronic-Key adapter and the FDA-approved plastic permit usage in hygienically sensitive areas. The EKS makes passwords obsolete. In a further step, the data are transferred to a control system. Also view our other Electronic Key Systems.
For this purpose the Electronic-Key has a pre-defined data structure that is evaluated directly by the read-only station.