BQT's miPASS range of Biometric readers is the ideal choice for high security applications
Product Profile
The miPASS Bio Series range offers the ultimate security by combining leading edge fingerprint scanning technology and encryption for secure user verification and authentication, limiting exposure through lost or stolen access cards.
Card holder's access control data and fingerprint template is encoded directly into the memory chip of the miPASS card, which is secured with encryption keys protecting the card holder's information from being compromised. The Bio Series reads the cardholder's data from the memory chip of a miPASS card and only transmits to a door controller once a valid finger has been presented.
Authentication is performed locally within the Bio Series reader and does not require reference to a centralised database, thus improving performance by minimising verifi cation time and eliminating privacy concerns. The 1:1 matching method eliminates False Acceptance Rates (F.A.R) normally prone to 1:N (1 to many) systems.
Ideal for new site installations or security enhancements of any existing access control systems using Mifare, `Swipe' or `Prox' (125 KHz) card and reader technologies, the Bio Series offers a cost-effective solution for high security requirements.
Technical Specification
Make | BQT Solutions |
---|---|
Manufacturer | BQT Solutions (UK) Ltd |
Category | Access Control>Access control readers |
Model code | BT910 |
Series | Bio Series |
Reader Type | Biometric |
Standalone/ Networkable | Standalone |
IP Rating | IP40 |
Mount Type | Wall mount |
Reader Output format | RS-485 |
Read Range mm | 20 ~ 40 mm |
LED / Beep | LED |
Colour | Silver & Charcoal |
Wiegand Interface | Yes |
Electrical Specifications |
Voltage: 12 V DC@1/2amp Power Consumption: 370 mA |
Physical Specifications | Dimensions mm: 140 x 59 x 65 |
Environmental Specifications |
Operating Temp oC: 0 ~ +55 Operating Humidity %: 0 ~ 90 |
Additional info | The BT910 Mifare fingerprint reader can be configured to various output protocols and programmed with customised encryption keys unique to each customer. Also upgradeable with further security enhancements when requirements increase. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Integrated access control: reap the benefits of connected security
Three essential reasons to upgrade your access control technology in 2022
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
Download