Download PDF version Contact company

ELATEC introduced the TCP3 authentication/release station, a small network appliance that enables devices without a USB port to incorporate an RFID or biometric reader, PIN pad or other form of user authentication and access control, and which supports USB 3.0 and gigabit Ethernet networks.

Most organisations extend the use of their employee ID badge or card to authenticate for applications beyond building access. This includes most multi-function printers. However, not all printers and devices have support for the direct connection of a card reader, such as those with no USB port. In these situations, the ELATEC TCP3 station extends ID card-based capabilities such as authentication for pull printing to any printing device regardless of the manufacturer, make or model.

Minimise information technology support costs

TCP3 provides unmatched security, performance, device management and flexibility"The TCP3 station was designed to minimise information technology support costs associated with additional IP or MAC addresses while consuming only one network drop from its Host port,” said Kenneth Buck, Solutions Architect for ELATEC. “TCP3 has two Ethernet connectors designated as Host and Device. The Device port enables connection of a printer or other peripheral without requiring a second network drop.

While primarily designed for the secure printing market, the station can also be used to control access to devices which require special operator training and certification such as sophisticated manufacturing equipment. The TCP3 station would communicate ID card data to the authenticator responsible to unlock such equipment.

TCP3 was designed around ever-increasing network performance requirements for high speed graphic printers and engineering plotters allowing simultaneous communication of print data and printer status at gigabit speeds,” added Buck. “But whichever the application, TCP3 provides unmatched security, performance, device management and flexibility – welcome benefits for any IT network and networked devices.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?