NCK TECHNOLOGY PTE LTD
  • Home
  • About Us
  • Products
  • Make An Enquiry
  • Home
  • About Us
  • Products
  • Make An Enquiry
Access Controls
​Electronic Card Access System offers a better alternative as their authorisation to your office is programmable.  An employee who leaves the firm can be denied access simply by programming the reader.  While they are generally referred to as Card Access Systems, the technology is varied and include Keypad PIN numbers, proximity cards, RFID, MIFARE as well as biometric fingerprint.

We offer a wide range of card access solutions, suited to your needs and budgets. Check out the various solutions below or contact us for an obligation free evaluation and quote.
Picture

Single Door Access
​
Single Door Access applications utilised controllers that comes with a built-in reader and keypad. They can be
  • Standalone Reader Controller
  • Networked Reader Controller
These Readers are commonly used for premises where only one door is it to be controlled. For offices, this would normally be the main entrance. For homes, it may be a side gate or the main door.
In many applications, there is seldom a need to link to a computer except where the office has many staff (beyond 20) and it would be difficult to manage the cards without the use of the a computer. Or where they wish to track when staff come into the office.
Picture

Multiples Door Access
​
Multiple doors access applications utilized controllers that are connected with a wide range of readers.  They are linked in a network with a PC running an Access Management software.  Such applications tended to be in offices where there is more than 1 doors to be controlled.  They are also implemented in commercial buildings, condominiums as well as industrial plants.  And they are used to control gates, barriers, turnstiles, auto sliding doors as well as office doors and private apartments.  
The systems can be integrated with other systems like CCTV, Fire Alarm, Building Automation and Burglar Alarm Systems, and customized according to your need. Depending on your scale, budget and complexity, we have the various ranges and brands to meet your needs.
Picture

Biometric & Facial Recognition
​
There are several forms of biometric identification employed in access control. They are:
  • Fingerprint
  • Face​
Using biometric technology increases the security level of the systems as it eliminates problems such as lost, stolen or loaned ID cards, and forgotten or guessed PINs. For application of time & attendance, it prevents the problem of someone else clocking on another person's behalf.

All biometric readers function by comparing templates stored in its memory to the scan obtained during the process of identification. If the scan match the the template, the ID number of that person is sent to a control panel. The control panel then checks permissions of the user and makes the decision whether to grant access or not.
​
The communication between the reader and the control panel is usually done in the industry standard Wiegand protocol. The only exception is intelligent biometric readers that do not require any panels and directly control all door hardware.
Picture
Powered by Create your own unique website with customizable templates.