Site Under Construction

System Use

Product specifications

l  It uses the Mifare card which is identical to that used by the EasyCard. The Mifare card uses a special algorithm with high security.

l  Up to 10,000 cards can be stored.

l  Up to 8,000 pieces of sensing data or anomaly data can be stored.

l  A real-time clock IC (with the perpetual calendar) is built in to display the year, month, date, and time.

l  Operating mode: A card is inserted to check the balance. Press the external button to deduct points

l  It can operate standalone or is connected to the PC for management and setup purpose. Up to 255 units can be connected externally.

l  It has a detection circuit contact that can be connected to a detector to prevent intrusion.

l  The casing is designed with a tampering-resistant contact. The alarm contact is triggered when it is damaged by outside force.

l  It features Watchdog to ensure correct functioning of the card reader.

l  When the PC crashes or the network is disconnected, the card reader can operate standalone.

l  The records are specially designed and will not disappear even in case of power outage.

l  When a card is inserted, only the balance is shows. Press the OK button (the amount is adjustable), and its shows “Balance? dollars. Please add value!” The beep sounds comes shortly and continuously. They continuously sound off until the card is removed. At the time, press the “OK” button to continuously operate the dryer. It will operate until the card amount becomes zero. When the balance is sufficient for the washing machine, press the OK button and nothing will happen.

l  You can set the deduction unit. You can select “Deduct” using the external keyboard. Press once to deduct ten dollars (the amount is adjustable).

l  You can set the upper limit of the Card Add-Value machine. The machine will not operation if this limit is exceeded.

l  You can set the relay activation time, activation times, and interval. It can substitute any coin-operated device.

l  You can set the dealer code and region on the Card Add-Value machine. You can also set the interoperability of the different cards in different regions.

l  The remote billing software can issue a command to send the activation signal.

l  The amount deducted of each card be recorded and received by the software.

l  After a card is inserted, it can show the prompts, such as “Press the button to add,” “Points per purchase,” and “card number.”

l  You can set the add-value limit. If this limit is exceeded, IS-75CD will not function.

 

Functions of Auto Card Vending and Add-Value Machine

l  It can be set to recognize the current banknotes in more than 80 countries (using the software).

l  The Mifare card can be built in. The card is 0.76mm thick (300 pcs); The whole magnetic card is 0.27mm thick (800 pcs).

l  The painted metal box can withstand rust, and is robust, tampering resistant, as well as very secure.

l  The internal cash box is locked. It can be removed without a key.

l  When cards are sold out, the display will show a prompt and deny bills.

l  The cash box can accommodate 800 banknotes.

l  There are two records of accumulated amount for the administrator to check.

l  The initial time of these two records will be logged or zeroed.

l  The body is built with a keyboard that can be used by the administrator to set a banknote currency (up to 8 currencies).

l  The built-in banknote validator has the anti-phishing capability.

l  The add-value ratio can be adjusted separately for flexible promotions.

l  The card balance can be checked.

l  The add-value limit can be set.

l  The amount added of each card be recorded and received by the software.

l  It features a RS-485 port.

 

 

I. Machine installation case (Automatic Laundry)

II. Card usage overview

The Automated Parking Management System Solution using FETC e-Tag

Since May 15, FETC has started accepting the application for the Highway Electronic Toll Collection system e-Tag. The long-range sensing characteristic of the FETC e-Tag allows us to develop the community parking system which is one of the most advanced automated parking management methods and indicates the trend of the parking management. Its safety, stability, and automation are far superior to those of the manual management or short-range identification system. Its unforgeability and rapid identification undoubtedly provides a solution to various parking management systems. This system enables full non-stop during access, auto identification, auto logging, and auto release. The back-end management software enables you to check the vehicle information the access time, reports, payment records, and alerts.

 

I. Functions and advantages:

 

1. Rapid identification

The effective range between the FETC e-Tag and the reader system is 3-6 meters and it can identify fast-moving objects. such as the vehicle attached with a card and moving at 20 ~ 40 km/h.


2. Uniqueness

The FETC e-Tag and the reader system provides unique IDs for users, which eliminates the risk of duplication, forgery, and cheating. In the system, each FETC e-Tag has a unique identification code in the world and this code cannot be duplicated or modification. During the working process, the identification card generates a unique identification using composite coding for uniqueness.

 

3. Good safety and anti-interference

It operates with the frequency hopping technology and has an excellent anti-interference capability. It also uses the anti-collision protocol to effectively read the FETC e-tag.

 

4. High adaptability

This system has the lower environmental requirements of the installation and is adaptable to every environmental requirement.

 

5. Low costs

FETC provides the free FETC e-Tag that is compatible with all parking facilities for cost-effectiveness.

 

6. Convenience

Unlike traditional card sensing or remote control that may cause the inconvenience, the FETC e-tag allows the owner of the vehicle to rapidly and conveniently access as if he/she pass through the highway toll station.

 

7. Fairness

After the FETC e-tag Parking Management System is used, all vehicles are identified and counted during the access process to eliminate the error and cheating to ensure the benefit of all stakeholders.

 

8. High level of safety management

One card is used for one vehicle only to ensure the safety of vehicles parked.

 

9. Real-time full automation

It features the fully automated operation process 24/7. Once the system is activated and set up, no additional labor is required to save the labor and time. The FETC e-Tag used in this system is maintenance-free, full sealing, contact-less with a long lifetime. The system will automatically read as well as verify the card, and open the gate to eliminate the need of manual opening of the gate. When a vehicle moves to the entrance of the parking garage, its gate will open automatically, while a log is kept in the system. Through the software interface, the system administrator can monitor the access of the entrance of all parking garage on PC’s desktop in real time.

 

The UHF long-range RF identification technology is the most advanced automated identification technology in the world. In the recent years, it has become popular and been widely promoted. It features long-range identification, high identification rate, fast identification speed, good anti-interference capability, and long lifetime. It can penetrate through non-metal materials and be widely used in the actual life. The intelligent parking management system prevents vintage and interference to the parking management system by eliminating the human factor. It enables intelligent and scientific management for parking garages in buildings and communities to minimize the costs, improve the operational efficiency, and ensure vehicle safety.

 

II. System components

It consists of the FETC e-Tag attached to the vehicle, UHF antenna, antenna controller, management software, and internal communication network.

 

A. Central Control Room devices: 1. Computers 2. Management software 3. Networking devices

B. Entrance devices: 1. UHF antenna, antenna controller (JST-520), raising barrier, vehicle detector, and entrance communicator

C. Exit devices (identical to the entrance ones)

D. FETC e-Tag (identical to the number of the registered vehicles)

III. System Architecture Diagram

As shown in the figure above: the long-range controller asks the UHF antenna to continuously emit the electric waves to search for a vehicle, or when the sensing coils or IR detector detects the incoming vehicle. When a vehicle passes the entry and exit transceiver, the vehicle transceiver is triggered and emits the code information (such as the license plate number, model type, vehicle color, license plate color, bank account number, organization name and user name) indicating the identity of the vehicle. At the same time, it receives the identification, inspection, and video information. When the transceiver at the Entry and Exit Management Station receives signals, signals are processed and transmitted to the PC for information management and archive. After information storage (entry) or comparison (exit), it controls the behavior of the raising barrier at the entrance. 

IV. Device List
1.JST-520PC is connected to the Lane Control Host

2. UHF long-range reader: JLR-902and JLR-903

3. USB short-range reader: JUR-907

I. Foreword

It is not possible to identify the authenticity of the information provided by visitors if the traditional manual registration system is used. Meanwhile, the record management is not standardized with poor traceability. This system does not allow for complete recording and identification. When an accident occurs, it is not possible to effectively investigate into it, which has adverse impact on the entrance and exit management.

The “Intelligent Visitor Management System” includes all hardware facilities, and can safely and reliably manages your visitors.

 

II. System overview

The complete visitor management system consists of the visited unit registration system, ID card recognition and archive, photo-taking and archive, printing of a Visitor Form, card issuance operation, card returning management, door access at each location or control of the elevator floors. Therefore, a comprehensive visitor system has more things to do, in addition to the control of the visitor entrance access. It can also be used for the area access or floor control, the collection of the clock-in time and clock-out time of the staff, the collection and archiving of the visitor activity records, reports printing, etc. It can effectively control visitor activities and what they do to accurately recognize the data and eliminate the need to put effort and time in comparison and check of large data.

 

III. Fully automated visitor management process




 

Iv. System devices

1. Panel PC + Touchscreen

2. USB camera

3. Dot matrix printer (recommended EPSON LQ--310)

4. ID card scanner

5. Card reader PR-500M

6. Visiting Card

7. Relevant door card reader, elevator floor controls, electronic gates, etc.

 

New thoughts on the door access   Build an automated visitor management solution

8 procedures to build a automated visitor management system

Because a number of people will pass through the entrance of office buildings, it is very difficult to perform precise control of the visitor’s information obtained through the traditional manual registration system. Therefore, there is a need to build “an Intelligent Visitor Management System” to integrate all hardware and software. The “visitor management” is “automated” to improve the management level and image of each business units, in addition to ensure its safety.
 

1. The visited unit’s reservation and registration

The visitor can make a reservation through the system interface in advance, and get his/her Visiting Card faster. In addition, the visited unit can also know if the visitors are blacklisted by other visited units and determine if they should be authorized.
 

2. ID card recognition

The ID card recognition includes the recognition of the “ID card,” “National Health Insurance Card,” and “driver's license.” After the system scans a document, it automatically classifies and recognizes its image, recognizes the text on the main fields of the document, and captures photos to save time. After recognition is completed, it works with the visitor software system for easy digitalization of the information.

 

3. Photo-taking

During the visitor’s registration, the camera takes a photo of the visitor and saves the photo for verification purpose. Through the Visitor System, the security guard can verify the identify using the photo of the visitor when he/she leaves to shorten the time.

 

4. Print a Visitor Form

The system can automatically print a Visitor Form during the visitor’s registration. The format of the Visitor Form can be customized according to the user’s requirements.

 

5. Automatic card issuance

After the visited unit verifies the visitor through the reservation and registration system, it can issue a visiting card through the card dispenser, make a registration, and dispatch a door permit. In addition, the visitor can also exchange his/her ID card for a visiting card at the Help Desk.

 

6. Gate management & visiting card returning

With the auto gate, a two-way electronic auto control channel can be established for the personnel to pass through. After the visitor finishes visiting and passes through gate, he/she has to return his/her visiting card to the card receiver to cancel the recorded data, while the visitor door access is monitored and controlled.

 

7. Door access & floor management

Each visitor’s access data is registered in the system to enhance the safety of the unit by checking the statistics provided by the system and paying attention to those who frequently pay a visit to a large unit. The elevator floor control system is dedicated to the door access control of particular floors to ensure the safety of each floor. After the accessible floors are setup, it is impossible to certain some floors without the permit, even if the visitor press an elevator button. The visitor can directly go to the floor where the visited unit is located.    

 

8. Statistical report and list setup

Statistical report: A visitor frequency statistical report is provided for each unit and shows the number of visitors to enhance the safety of each area.

VIP List Setup: Those who often pay a visit can be added to the VIP List and receive a VIP card to eliminate the identity verification process.

Blacklist: To enhance the management of the visitor identity, those who are suspicious or prohibited to access can be blacklisted. A warning will be issued if they pay a visit next time.

Query function: The visitor management system allows the security guard to query, make statistics, and print the visitor's information and those who are stay in the building using any computer which is connected to the visitor system.

Access Cards_Extended Corporate Applications:  Download→ WORD

Can access cards be applied to corporations for purposes other than employee identification, door control and attendance management?

Can a card be used diversely and realize a model of multiple intelligence management applications?

We provide a comprehensive corporate application system applicable to, for example, dormitory power-saving and door control applications,

mess hall payment applications, meal order systems, parking lot control systems, multi-function printer controls, employee benefits allocations,

concessional commodity payment applications, visitor systems, and guard patrol sign-on systems.

It provides all the required software and hardware to provide a total solution for enterprises.